0% found this document useful (0 votes)
98 views31 pages

2 Computer Science PDF

Scientific Officer Paper for computer science

Uploaded by

AnuragGupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
98 views31 pages

2 Computer Science PDF

Scientific Officer Paper for computer science

Uploaded by

AnuragGupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 31
$/$0/2013/02 COMPUTER SCIENCE Roll_No. | | BOOKLET NO. 2101 candidate shoulawite hisfherRollNo. nthe box above. Total No. of Questions : 150 ime : 2 Hours} | No. of Printed Pages : 32 [Total Marks : 300 INSTRUCTIONS FOR CANDIDATES 1. All questions are compulsory. 2. All questions carry equal marks 3. The question paper contains 150 questions. The examinee should verify that. the requisite number of questions are printed in the question paper, otherwise he should ask for another question paper. 4. The cover page indicates the number of printed pages in the question paper. The examinee should verify that the requisite number of pages are attached in the question paper, otherwise he should ask for another question paper. 5. Read carefully the instructions given on the answer sheet supplied and indicate your answers accordingly. 6. Kindly make necessary entries on the answer sheet only at the places indicated and nowhere else. 7. Examinees should specially pay attention that 2 marks will be awarded for correct answer. 8. Examinees should do all rough work on the space meant for rough work on the last page of the question paper and nowhere else, not even on the answer sheet. $/S0/2013/02 2 Reduced form of the expression AB' + CD' + BC'D' + ABCD + ABC'D is: . (A) A+ CD'+ BD' (B) A + BCD' + A'CD' (C) AD' + AD + CD! (D) A + CD' + BCD’ Push down automata can most conveniently represent : (A) Context sensitive grammars (B) Context free grammars (C) Regular grammars (D) Unrestricted grammars How many switch points are needed in a crossbar switch network that connects 4 processors to 5 memory modules ? (A) 4x 5 = 20 (BR) 4+5=9 (C) 4x5-4=16 (D) 4x5-5 = 15 A digital computer has common bus system for 16 registers of 32 bits each The bus is constructed with multiplexers. How many multiplexers of what size will be needed ? (A) 4 multiplexers of size 32 x 1 (B) 32 multiplexers of size 16 x 1 (C) 16 multiplexers of size 32 x 1 (D) 8 multiplexers of size 16 x 1 A deterministic finite state automaton that accepts all strings of 0’s and 1’s which terminate in last two same symbols will contain minimum : (A) 3 states (B) 4 states (C) 5 states (D) 6 states Which of the following circuits can be used as parallel to serial converter ? (A) Digital counter (B) Decoder (C) Demultiplexer (D) Multiplexer $/SO/2013/02 10. 11. 12. 13. 3 Cache memory works on the principle and idea of : (A) the heuristic 80-20 rule (B) locality of reference (C) virtual memory (D) segmentation If A and B are non-terminal symbols and w is a string of terminal symbols only, then which of the following is a right linear grammar ? (A) A> Bw (B) A > Buhw (©) A> wB () A> wBlw The number of 128 x 8 RAM chips needed to provide a memory capacity of 2048 bytes will be : (A) 8 (B) 16 (Cc) 4 (D) None of these The value of k, in LRtk) can not be : (A) 0 (B) 1 () 2 () None of these The language L = {0" 1" 2'|n > 1, i > 1} is generated by the following context free grammar : (A) S > AB, A > 0A|0, B > 1B2/12 (B) S > AB, A > 0A1/01| B > 2B/2 (C) S > OA1BIO1B|B, A > 01, B > 2B|2 (D) All of the above Every symbolic reference to a memory operand has to be assembled as : (A) offset, index base (B) segment base, offset (C) index base, offset (D) offset Which of the following shows the logical state of a digital circuit output for every possible combination of logical states in the inputs ? (A) Routing table (B) Function table (C) Decision table (D) Truth table $/SO/2013/02 14, 15. 16. 17. 18. 4 The process of organizing the memory into two banks to allow 8 and 16 bit data operation is called : (A) Bank switching (B) Index mapping (C) Two-way memory interleaving (D) Memory segmentation Turing machine can be used for : (A) Accepting regular grammars (B) Accepting unrestricted grammars and computation of integer functions (C) Design of a mathematical model (D) Counting number of states in a DFA Floating point representation with 8-bit fraction and 6-bit exponent of the binary number + 1001.11 is : (A) Fraction : 01001110, Exponent : 000100 (B) Fraction : 10011100, Exponent : 000011 (C) Fraction : 00100111, Exponent ; 000100 (D) Fraction : 01001110, Exponent : 100100 The speedup ratio for a k-segment pipeline with a clock cycle time tp used to execute n tasks, given t,, as the time to complete each task by a non-pipelined unit, is expressed as : (A) S = kt/dke +n - Dt, (B) S = ntyik +n ~ Dt, (C) S = kk +n - It, (D) S = nt fk +n- 1) ty Let N be the number of bits in the sum obtained by a ripple carry adder. Then the time required by the adder is : (A) Constant time (B) O(N) ie. linear time (C) Olog N) ie, logarithmic time (D) O(N log N) S/SO/2013/02 5 Form of production rules given by A> BC| a; where B, A, C are non-terminal and a is a terminal symbol represents : (A) CNF grammar (B) GNF grammar (C) Left recursive grammar (D) Left factored grammar For any two regular expressions r and s over the alphabet 3, the regular expression (r*s*)* is equal to : (A) (s)* (B) (r + s)* (©) + st (D) None of these The number of symbols necessary to simulate a TM with m symbols and n states is : (A) m+n (B) mn (C) 8mn + 4m @) 4mn+m A push down machine behaves like a finite state machine when the number of auxiliary memory it has, is : (A 1 (B) 0 (C) 2 (D) none of these Which of the following is more responsible loading operating system from the FD/HD into RAM ? (A) Bootstrap loader (B) CPU (C) Power On Self Test (POST) @) Boot Record $/$0/2013/02 24, 25. 26. 27. 6 Access time of a high speed Cache memory is 40 ns and its hit ratio is 80% Main memory has an access time of 100 ns. The effective access time for CPU. to access memory is : (A) 52 ns (B) 70 ns (C) 80 ns (D) 60 ns Minimum number of 2-input NAND gates required to implement the function. Fe(x'+y)@+twiis: (A) 6 (B) 4 (C) 6 Mm) 3 P, Q and R are three languages. If P and R are regular and if PQ = R, then : (A) Q has to be regular (B) Q can not be regular (C) Q need not be regular ‘D) Q can not be a CFL The universal TM influenced the concept of : (A) Stored program computers ‘B) Computability \C) Interpretative implementation of programming language (D) All of the above The language of all words with at least 2 a’s is described by the regular expression : (A) b*ab*a(a + by* (B) (aby*a b* a(ba)* (C) (a + b)* ab* ala + b)* @) all of these $/SO/2013/02 30. 31 32. 33. 34, 7 Which of the following parsers is the most powerful ? (A) (C) Operator precedence (B) LALR Canonical LR (D) SLR Local and loop optimization inturns provide motivation for : (A) (B) (C) (D) Data flow analysis Constant folding Peephole optimization DFA and constant folding A6-MHz channel is used by a digital signalling system utilizing 4-level signals. The maximum possible transmission rate is : (A) 1.5 Mbaud/sec (B) 12 Mbaud/sec (C) 24 Mbaud/sec @) 6 Mbaud/sec FDDI is : (A) ring network (B) mesh network (©) star network (D) bus based network Indefinite blocking is called : (A) (C) deadlock (B) starvation both (A) and (B) (D) none of these A public key encryption system : (A) (B) (C) (D) allows only the correct receiver to decode the data allows any one to decode the data allows only the correct sender to decode the data does not encode the data before its transmission $/S0/2013/02 36. 37. 38. 39. 8 A logical addre: space of 8 pages of 1024 words is mapped to a physical memory of 32 frames. The number of bits in logical and physical addresses are: (A) 3 bits and 5 bits (B) 13 bits and 15 bits (C) 10 bits and 5 bits (D) 18 bits and 5 bits The average turn around time by using shortest job. First scheduling technique for the four jobs with next burst time as 6, 3, 8 and 7 units respectively will be : (A) 13 units (B) 15 units (C) 24 units (D) 16 units Bit vector is defined as : (A) The free space list implemented as a bit map or bit vector (B) No free space list is implemented (C) Both (A) and (B) (D) None of the above Round-Robin scheduling is essentially the pre-emptive version of : (A) SJF (B) FIFO (C) Longest time first (D) Shortest remaining time first A packet-switching network : (A) is free (B) can reduce the cost of using an information utility (C) allows communication channel to be shared among more than one user (D) both (B) and (C) above $/$0/2013/02 40. 41. 42. 43. 44. 45. A bridge operates in : (A) Physical and data link layer (B) Only data link layer (©) Only physical layer @) Network layer The dotted-decimal notation for the IP address 10000001 00001011 00001011 11101111 is : (A) 129.11.11.239 (B) 249.155.251.15 (C) 129.11.10.240 (D) none of these An IP address 227,12.14.87 is in the following class : (A) E ‘B) D (Cc) B Di Cc The signal to noise ratio for a voice grade line is 30.1 dB or a power ratio of 1028 : 1. The maximum archivable data rate on this line whose spectrum ranges from 300 Hz to 3400 Hz is : (A) 6200 bps (B) 34000 bps (C) 9600 bps (D) 31000 bps An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlock will ever arise is: (A) 3 (B) 5 (C) 4 (D) 6 Tf an instruction takes i microseconds and a page fault takes an additional j microseconds, the effective instruction time if on an average a page fault occurs every k instruction is : (A) i+ jk (B) G+ jk (Cc) i+G*k) M) G+kh*k $/$0/2013/02 46. 47. 48. 49. 50. 51. 10 The main advantage of the concept of interrupt is : (A) polling (B) spooling (C) job scheduling (D) blocking the currently running process Thrashing is : (A) the high paging activity (B) an activity in which processes spent more time paging than executing (C) both (A) and (B) (D) none of the above The network interface that permits equipment without an ISDN interface to be connected into an ISDN interface is known as : (A) TE2 (B) TA (C) TE () TE1 The number of addresses in block, 200.17.21.128/127 is : (A) 16 (B) 32 (C) 31 (D) 24 A modem that packs 6 bits into each signal change and operates at 14,400 bps can result in a maximum throughput of : (A) 14400 bps (B) 9600 bps (C) 2400 bps () 4800 bps The probability that a single bit will be in error on a typical telephone line using 4800 bps modem is 10°. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approxi- mately equal to : (A) 0.009 (B) 0.008 (©) 0.999 () 0.991 $/SO/2013/02 52. 53. 54. 55. The despatcher : (A) schedules the tasks into the processor (B) is always very small and simple (C) puts tasks in /O wait (D) never changes task priorities At a single terminal CPU, 40% of the users do not need to wait and the average wait time for all users is 50 minutes. The average wait time for those who wait, is approximately : (A) 60 (BY 80 (C) 70 ‘Di 100 Ina memory system s is the number of sectors per track, and t is the number of tracks per cylinder, then a disk address cylinder i, surface j, sector k can be mapped to one-dimensional block number b as : (A) b=k+s*@G+i*t) (B) b=es+k*G+i* t) (C) b=i+j*(s+k* t) (D) b=j+i*(s+k* t) Belady’s anomaly refers to : (A) The decrease in page faults with increase in no. of frames (B) Increase in page faults with decrease in frames (C) Increase in page faults with increase in frames (D) None of the above $/SO/2013/02 56. 57. 58. 59. 12 For a scheduling problem (J,1, Jag» Jag Jaa) = (6, 9, 15, 20) and Gor» Ina» Ing: Iba) = (12, 3, 17, 28) a task T,1 must be completed before starting Ty . Which of these is an optimal non-preemptive schedule ? (A) Jy, Ig, Ig, Jo (B) Js, Ig Jy de () Ig, In, In, Ig D) Jn Jy Ip Jy In an operating system, which is the definition of a correct process transition ? (A) Wakeup : ready-running (B) Despatch : ready-running (C) Block : ready-blocked (D) Timer runout : ready-blocked Six files F,, Fy, Fs, Fy, Fs, Fg with sizes as 100, 200, 70, 40, 250 and 50 are to be stored on a sequential device in such a way as to optimize the access time. The order of their storage should be : (A) Fg, Fg Fy Fa. Fo Fy (B) Fy, Fy Fy Fy Fs. Fe (C) Fo Fo Fy, Py. For Fa D) Fy Fg Fg Fu Fos Fs A synchronous communication line uses byte oriented protocol with size of each frame as 100 characters (including control bytes). If the bit error probability is 104 and each character is 8 bits long without a parity bit, the probability that the frame will arrive with one or more bit errors is equal to : (A) 1 - @.0001% (B) (0.9999)100 (C) (0.0001)1° ) (1 = (1 — 0.0001) $/$0/2013/02 60. 61. 62. 63. 64. 13 Communication protocols always have a : (A) Set of symbols (B) Start of header (C) Special flag symbol @) BCC Which one is the most important feature of the spiral model ? (A) Quality management (B) Risk management (©) Performance management —(D)_ Efficiency management In Putnam resource allocation model, Rayleigh curve is modeled by the equation : (A) mit) = ater” (B) mit) = 2kte*™ (C) m(t) = 2kate-®” @) mitt) = 2kbtee” ‘The function that sets the position to a desired point in the file is : (A) feeek« ) (B) getw( ) © ftell() ©) putt) What does the ‘C’ statement printf ("%d", +45); prints ? (A) 5 (B) 6 (Cc) 7 (D) an error message $/S0/2013/02 65. 66. 67. 68. 69. 14 What is the result of execution of the following ‘C’ statements ? int i=5; do{putchar(i+100); printf("%d", i-—);} while (i); (A) ibh4g3f2el (B) 14h3g2fled (C) an error message (D) none of these Which of the following is not a size metric ? (A) LOC (B) FP (C) Program length (D) Cyclomatic complexity The failure intensity of a software is 0.005 failures/hour during 10 hours of its operation. The reliability of software can be expressed as : (A) 0.90 (B) 0.92 (C) 0.95 (D) 0.98 Assume a class C with objects 01, 02 and 03. For the statement 03 = 01 - 02 to work correctly, the overloaded operator must : (A) Return a value (B) Create a named temporary object (C) Use the object of which it is a member as an operand (D) Both iA! and (C) above Virtual functions in C++ allow to : (A) Use the same function call to execute member function of objects from different classes (B) Create functions that have no body (C) Group objects of different classes so that they can all be accessed by the same function code (D) Create an array of type pointer-to-base-class that can hold pointers to derived class $/S0/2013/02 70 71. 72. 73. 74. 15 Which of the following parsing methods handles left-recursive grammars ? iA) top-down parsing (B) bottom-up parsing (C) both (A) and (B) (D) none of these For a function of n variables, boundary value analysis yields : (A) 4n + 8 test cases (B) dn + 1 test cases (C) n+ 4 test cases () none of these A program requires two 8-bit integers as inputs. If only one second is required to execute one set of inputs, how much time will it take to execute all possible combinations of inputs ? (A) 15 hours (B) 8 x 8 x 2 seconds (C) 28 x 28 x 2 seconds (D) 18 hours In Java the difference between break and continue statements is : (A) break causes the complete termination of the loop whereas continue terminates only current iteration (B) break causes the termination of the current iteration of the loop whereas continue terminates the loop permanently (C)_ break causes the complete termination of the loop whereas continue does not terminate the execution at all (D) none of the above Which Java package is automatically available when you write a Java program ? (A) java.text (B) javalang (C) java.swing (D) java.util $/S0/2013/02 1. 76. 77. 78. 79. 16 Assertions are most closely associated with what type of error ? (A) run-time (B) compile-time (C) logic (D) disk In C++ which of the following is most likely used to convert from a user defined class to basic type ? (A) a conversion function that is a member of a class (B) an overloaded = operator (C) a one-argument constructor (D) a built-in conversion function The purpose of regression testing is to : (A) increase confidence in the correctness of a modified program (B) locate errors in a modified program (C) preserve the quality and reliability of software (D) all of the above A program P calls subprograms P1 and P2. If P1, can fail 50% times and P2 can fail 40% times, then P can fail : (A) 50% (B) 60% (C) 10% (D) 70% The relationship between data elements in a module is called : (A) coupling (B) cohesion (C) modularity (D) none of. these $/SO/2013/02 80. 81. 82. 83. 17 Which class in Java provides many methods that you can call to control your threads, including yield, sleep and set priority ? (A) Thread (B) Runnable (C) Group (D) None of these What is the output of the following ‘C’ program : main( ) { int x=10, y=10, z=5, i; isx BC, B > 6, A > B, AB > C The canonical cover for this set is : (A) A> BC and B+ C (B) A> BC and AB > C () A> BC and A> B ©) A> Band BC Which of the data model is independent of both hardware and DBMS ? (A) external (B) internal (C)_ conceptual (D) all of these What will be the result of statement SELECT * FROM EMPLOYEE WHERE SALARY in (4000, 8000) ? (A) all employees whose salary is either 4000 or 8000 (B) all employees whose salary is between 4000 and 8000 (©) all employees whose salary is not between 4000 and 8000 (D) none of the above $/$0/2013/02 © = 98. 99. 100. 101. 21 The value of scale-up, if the original system can process 1000 transactions in a given time and the parallel system can process 300 transactions in the same time, is : (A) 2 (B) 3 (C) 4 (D) None of these Which of the following is not a DDL statement ? (A) ALTER (B) DROP (C) CREATE (D) SELECT Which of the following is a spatial indexing method ? (A) X-trees (B) R-trees (C) B-trees (D) None of these Degree of a table with 5000 rows and 50 columns is : (A) 50 (B) 500 (C) 5000 (D) None of these Which of the following clauses is usually used together with aggregate functions ? (A) ORDER BY ASC (B) GROUP BY (C) ORDER BY DESC @) None of these $/SO/2013/02 102. 103. 104. 106. 22 Which of these expresses the specific number of entity occurrences associated with one occurrence of the related entity ? (A) degree (B) connectivity (©) cardinality ) None of these Which of the following transformation is referred to as commutativity of projection and join ? A try (RDM 8) = Ary Ry) My = ms) ®) RUS=SuR © RAS=SOR (D) Both (B) and (C) Which of the following is a statement after which you can not issue a commit command ? (A) INSERT (B) SELECT (C) UPDATE (D) DELETE VDL is used to specify : (A) internal schema (B) external schema (C) conceptual schema (D) none of these OLAP is : (A) A dynamic synthesis of multidimensional data (B) A analysis of multidimensional data (C) A consolidation of large volume of multidimensional data (D) All of the above $/$0/2013/02 108. 109. 110. 111. 23 In distributed query processing, semi-join operation is used to : (A) Reduce the size of a relation that needs to be transmitted (B) Reduce the communication cost (C) Both (A) and (B) (D) None of the above The time required to insert an element in a stack with linked list implementation is : (A) 001) (B) O(ogy n) (C) 0) 'D) O(n . logs n) The postfix equivalent of the prefix : ~ - AB - CD (A) AB + CD -* ‘By ABCD - - * (C) AB + CD * - (D) AB +- CD * The worst case time required to search a given element in a sorted linked list of length n is : (A) 0d) (B) Oogy n) (C) O{n) (D) O(n logy n) The maximum number of binary trees that can be formed with three unlabelled nodes is : (A) 1 (B) 5 (Cc) 4 @) 3 $/S0/2013/02 112. 113. 115. 116. 24 A full binary tree with n leaf nodes contains : (A) n nodes (B) logy n nodes (©) wW-1 (D) 2° nodes The time complexity of an algorithm with n inputs is expressed as : Tn) = Ta - 1) + Im ifn > 1 = 1, otherwise The order of complexity of this algorithm is : (A) O(log n) (B) 0m) (C) 0m?) (D) O(n") Which of the following traversal techniques lists nodes of a biz tree in ascending order ? (A) postorder (B) inorder (©) preorder (D) none of these Which of the following algorithm design techniques i. n the quicksort algorithm ? (A) dynamic programming (B) back-trac’ (C) greedy method (D) divide and conquer A text is made up of the characters a, b. c. d. ¢ each occurring with the probabilities 0.12, 0.40, 0.15, 0.08, and 0.25 respeczively. The optimal coding technique will have the average length of (A) 2.15 ‘By 3.01 (C) 2.30 Dr 17s $/SO/2013/02 117. 118. 119. 120. 121. 25 The linked list representation of sparse matrices is superior to the generalised dope vector method because it is : (A) conceptually easier (B) completely dynamic (C) efficient in accessing an entry (D) efficient if the sparse matrix is a band matrix Minimum number of colours needed to colour a graph with one vertex and two edges is : (A) 4 (B) 3 (Ci 2 (D) 1 An advantage of chained hashing table (external hashing) over the open hashing is : (A) Worst case complexity of search operation is less (B) Space used is less (C) Deletion is easier (D) None of the above The number of interchanges (swap) needed to sort the numbers 8, 22, 7, 9, 31, 19 5, 13 in ascending order, using bubble sort is : (A) 11 (B) 12 «) 13 (D) 14 The minimum number of edges in a connected cyclic graph of n vertices is: (Ay n-1 (Bion () n+l (D) none of these $/S0/2013/02 122. 123. 124. 125, 26 Heap allocation is required for languages : (A) that support recursion (B) that support dynamic data structures (C) that use dynamic scope rules (D) none of the above The number of ‘ADD’ and ‘REMOVE’ operations required to access n/2 th clement of a queue of ‘n’ elements so that the original queue remains the same after the access is : (A) 4*n (B) 8*n () 4*n-1 @) 8*n-1 ‘The following sequence of operations is performed on stack push(1), push(2), pop, push(1), push(2), pop, pop, pop, push(2), pop. The sequence of popped values are : (A) 2,2,1,1,2 (B) 2, 2,1, 2,2 (C) 2, 1, 2, 2,1 (D) 2,1, 2.2.2 If B is the circuit matrix of a graph with k components. e edges, and n vertices, the rank of B is : (A) n-k (B) e-n+k (C) e-n + 2k (D) e+n-k 126. 127. 128. 129. 130. 27 Gantt charts may be prepared with : (A) spread sheet (B) database management system (C) word processor (D) (A) and (C) both Which is normally used where a high degree of interaction is necessary ? (A) batch mode processing (B) remote terminal processing (C) intelligent terminal processing (D) online processing If the logical interaction intersection of the 4-bit codes for end points of a line is not zero, the line lies : (A) entirely on the screen (B) entirely off the screen (C) partially on the screen (D) none of these An exploded slice is a feature of a : (A) bar chart (B) pie chart (C) line graph (D) none of these Animation is nothing but running of : (A) scenes . (B) blocks (C) bits (D) scan-lines $/$0/2013/02 28 181. If a point (x, y) is first scaled by a factor S, = S, = 2, then translated by ty = 10, ty = 0. The resultant transformation matrix will be : 2 00 20 0 0 20 02 0 (A) (B) 10 01 010 1 10 0 1 0 20 (C) (D) none of these 0 02 132. XML documents can be created using : (A) Wizards (B) Editors (C) Operating system (D) HTML 133. Javascript is mainly used with : (A) database (Bi text (C) web pages (D) VB 134. Which of the following colour graphics display adapter has the highest resolution ? (A) HGA (B) CGA (Cc) VDA (D) SVGA 135. Which one is the fastest driver of JDBC ? (A) type 1 (B) type 2 (C) type 3 (D) type 4 S/SO/2013/02 136. 138. 139. 140. 29 How many instances of a servelet can be created ? (A) 1 (B) 2 (Cc) 3 (D) none of these Which one of the following is not a responsibility of the stub in RMI ? (A) Initiating remote calls (B) Marshalling arguments to be sent (C) Informing the remote reference layer that the call is complete @) Calling the actual remote object implementation How many types of lists are supported by HTML ? (A) 2 'B) 3 © 5 (D) none of these An alternative protocol to the TCP is : (A) UDP (B) SMTP (©) EDP (D) None of these P < Q is logically equivalent to : A PrQ>PvV® B) PAQeKPV® © PvQ+ePrAQ (D) None of the above $/S0/2013/02 141. 142. 143. 144, 30 If there exists exactly one production deriving every non-terminal in a context free Grammar, then L(G) is (A) A finite set {B) A set containing only one string (C) An infinite set (D) None of the above Which of the following is not true about dynamic type checking ? (A) All the type errors are detected (B) Type checking is done during the execution (C) It increases the cost of execution () None of the above Which of the following does the parent and child process share after a fork( ) ? (A) The same PCB (B) The same stack (©) Data declared global to the program ) None of the above Which of the following statements are true of (hard and soft) real-time sched- uling ? (A) They minimize the average weight time (B) They maximize CPU utilization (C) They use multi-level queues (D) None of the above $/S0/2013/02 145 146. 147. 148. 149. 150. 31 ~ (P > Q) is equivalent to : (A) ~PAaQ (B) PvQ © Pa~Q (D) ~Pa~Q Embedded computers typically run on which operating system ? (A) Windows XP (B) Clustered (©) Real-time (D) None of these Block Cache and Buffer Cache are used : (A) to improve disk performance (B) to handle interrupts (C) to increase the capacity of main memory (D) to speed up main memory read operation Which of the following is not a part of CRT ? (A) Phosphor screen (B) Shadow mask (©) Gas plasma (D) Electron gun A synthesized attribute is an attribute whose value at a parse tree node depends on: (A) Attributes at siblings level only (B) Attributes at children nodes only (C) Attributes at parent nodes only (D) None of the above How many bits are required to encode all 26 letters, 10 symbols and 10 numerals ? (A) 5 (B) 6 (©) 7 (@) 46 $/$0/2013/02

You might also like