CBSE NET FOR COMPUTER SCIENCE
This Blog is created for the benefit of all who aspires for lectureship/jrf in Computer Science Our focus is mostly very narrow and concentrates on CBSE NET for Computer Science and Applications
Labels
- Algorithms
- Computer Networks
- Computer Science Important Lectures
- Data Mining
- Data Structures
- DBMS
- Expected Questions
- Important Questions
- Java and OOP
- Misc.
- Most frequently asked questions
- Objective Questions
- Operating System
- Previous Year Solved Papers
- quiz
- Software Engineering
- Syllabus
- Tests
- Theory of Automata
- UGC NET Exam Updates
- UGC NET Paper-1 Study Material
- Web Technology
Tuesday, September 7, 2021
Thursday, May 30, 2019
Expected Questions Series 9
1) What is the maximum length of a field name?
a. 10 characters
b. 30 characters
c. 50 characters
d. 20 characters
2) Which command permanently deletes the record from database?
a. PACK
b. ZAP
c. SEEK
d. SKIP
b. Δ
c. o
d. □
b. A network with only one entry and no exit point.
c. A network with more than one exit and entry point
d. A network with more than one exit point.
b. It breaks up the broadcast domains in a layer 2 switch internetwork.
c. It acts as the fastest port to all servers.
d. It provides multiple collision domains.
b. Internet
c. Host - to - Host
d. Application
a. 10 characters
b. 30 characters
c. 50 characters
d. 20 characters
2) Which command permanently deletes the record from database?
a. PACK
b. ZAP
c. SEEK
d. SKIP
3) How is the failure node represented by replacing each empty subtree in an Extended Binary Tree ?
a. *b. Δ
c. o
d. □
4) Which of the following statements is / are related to a stub network?
a. A network with only one entry and exit point.b. A network with only one entry and no exit point.
c. A network with more than one exit and entry point
d. A network with more than one exit point.
5) What kind of task does VLAN do in a network?
a. It provides multiple broadcast domains within a single collision domain.b. It breaks up the broadcast domains in a layer 2 switch internetwork.
c. It acts as the fastest port to all servers.
d. It provides multiple collision domains.
6) Which layer of TCP / IP stack is equivalent to the transport layer of the OSI model?
a. Network Accessb. Internet
c. Host - to - Host
d. Application
Answers:
1) a
2) a
3) d
4) a
5) b
6) c
Expected Questions Series 8
1) We have an operating system, which is capable of loading and executing a single sequential user process at a time. If the disk head scheduling algorithm which is initially First Come First Served (FCFS) is replaced by Shortest Seek Time First (SSTF) claimed by the vendor to give 50% better benchmark results then what is the expected improvement in the I / O performance of the user programs?
a. 0%
b. 25%
c. 50%
d. 75%
b. It leads to poorer disk throughput but better disk space utilization
c. It leads to better disk throughput and better disk space utilization
d. It leads to better disk throughput and poorer disk space utilization
a. With the use of kernel supported threads context switch is faster.
b. The entire process can be blocked by the system for user - level threads.
c. Kernel supported threads can be scheduled independently.
d. User level threads are transparent to the kernel.
Which of the above statements are true?
a. a and d
b. a and b
c. b and c
d. a and c
b. UDP
c. BootP
d. ICMP
b. 1
c. 12
d. 2
' router A(config)#line cons 0 '
a. Shut down the router
b. Disable console connections
c. Set the telnet password
d. Set your console password
b. An Undirected Cyclic Graph
c. A Directed Linear Graph
d. An Undirected Linear Graph
b. while
c. if
d. for
b. Keeps its physical structure hidden from users
c. Cannot hide sensitive information from users.
d. Both A and B.
b. Queries
c. Relations
d. Joins
a. 0%
b. 25%
c. 50%
d. 75%
2) What is the effect of using a larger block size in a fixed block size file system?
a. It leads to poorer disk throughput and poorer disk space utilizationb. It leads to poorer disk throughput but better disk space utilization
c. It leads to better disk throughput and better disk space utilization
d. It leads to better disk throughput and poorer disk space utilization
3) Consider the following statements:
a. With the use of kernel supported threads context switch is faster.
b. The entire process can be blocked by the system for user - level threads.
c. Kernel supported threads can be scheduled independently.
d. User level threads are transparent to the kernel.
Which of the above statements are true?
b. a and b
c. b and c
d. a and c
4) Which protocol is mostly used to send unknown messages back from a destination network to an originating host?
a. TCPb. UDP
c. BootP
d. ICMP
5) In a 12 - port switch, when a network is segmented, how many broadcast domains are created?
a. 5b. 1
c. 12
d. 2
6) Which operation does the following command allow you to perform?
' router A(config)#line cons 0 '
b. Disable console connections
c. Set the telnet password
d. Set your console password
7) The concept of topological sorting significantly deals with an ordering of Vertices in _________.
a. A Directed Cyclic Graph b. An Undirected Cyclic Graph
c. A Directed Linear Graph
d. An Undirected Linear Graph
8) Which is the most suitable construct utilized for traversing in a Circular Linked List?
a. do - while b. while
c. if
d. for
9) What is a transparent DBMS?
a. Keeps its logical structure hidden from usersb. Keeps its physical structure hidden from users
c. Cannot hide sensitive information from users.
d. Both A and B.
10) How can a tuple be divided in a relational schema?
a. Domains b. Queries
c. Relations
d. Joins
Answers:
1) a
2) d
3) c
4) d
5) b
6) d
7) a
8) a
9) c
10) a
Labels:
Expected Questions
Location:
Sonalwadi, Maharashtra, India
Wednesday, May 29, 2019
Expected Questions Series 7
1) What are the following types of?
SERIALIZABLE
REPEATABLE READ
READ COMMITTED
a. Locks
b. Logs
c. Isolation level
d. Latch types
b. Latches are more restrictive than locks in that they are always exclusive.
c. Latch is used to protect data while lock is not.
d. Lock is used to protect data while latch is not.
b. Print Files
c. Alter files
d. All the above
b. O(n2)
c. O(n3)
d. O(n-1)2
b. Three
c. Four
d. Infinite
b. line vty 0 4
c. line telnet 0 4
d. line aux 0 4
b. copy ios tftp
c. backup IOS disk
d. copy tftp flash
b. 20 bit
c. 11 bit
d. 15 bit
1: Sometimes the page fault rate is increased if the number of page frames allocated is increased.
2: Some programs do not exhibit Locality of reference.
Which of the following is true?
a. 1 is false and 2 is true
b. both 1 and 2 are false
c. both 1 and 2 are true but 2 is not the reason for 1
d. both 1 and 2 are true and 2 is the reason for 1
b. It helps to reduce the memory access time to read or write a memory location
c. It helps to reduce the number of page faults in page replacement algorithm
d. It helps to reduce the size of a page table needed to implement the virtual address space of a process
b. 1.00s
c. 1.87s
d. 0.74s
SERIALIZABLE
REPEATABLE READ
READ COMMITTED
b. Logs
c. Isolation level
d. Latch types
2) State the main difference between a latch and a lock.
a. Locks are more restrictive than Latches in that they are always exclusive.b. Latches are more restrictive than locks in that they are always exclusive.
c. Latch is used to protect data while lock is not.
d. Lock is used to protect data while latch is not.
3) What is a report generator used for?
a. Update Filesb. Print Files
c. Alter files
d. All the above
4) What is the timing complexity of Prim's Algorithm for a graph comprising ' n ' vertices?
a. O(n)b. O(n2)
c. O(n3)
d. O(n-1)2
5) How many nested loops are present in Prim's Algorithm?
a. Twob. Three
c. Four
d. Infinite
6) Which command allows to set a Telnet password on a Cisco router?
a. line con 0 4b. line vty 0 4
c. line telnet 0 4
d. line aux 0 4
7) What command is used to take backup on IOS?
a. copy flash tftpb. copy ios tftp
c. backup IOS disk
d. copy tftp flash
8)We have a CPU that generates virtual addresses of 32 bits and the page size is of 4 kbyte. Transition Lookaside Buffer ( TLB ) of the processor can hold a total of 128 page table entries and 4 - way set associative. What is the minimum size of the TLB tag?
a. 16 bitb. 20 bit
c. 11 bit
d. 15 bit
9) Consider a virtual memory system that uses First In First Out (FIFO) page replacement policy and it allocates a fixed number of frames to a process. Consider the following two statements,
1: Sometimes the page fault rate is increased if the number of page frames allocated is increased.
2: Some programs do not exhibit Locality of reference.
Which of the following is true?
b. both 1 and 2 are false
c. both 1 and 2 are true but 2 is not the reason for 1
d. both 1 and 2 are true and 2 is the reason for 1
10) Why do we translate a virtual address to physical address where a multilevel page table is preferred in comparison to a single level page table?
a. It is required by the translation look-aside bufferb. It helps to reduce the memory access time to read or write a memory location
c. It helps to reduce the number of page faults in page replacement algorithm
d. It helps to reduce the size of a page table needed to implement the virtual address space of a process
11) An application loads 100 libraries at startup and loading each library exactly one disk access is required. 10ms is the seek time of the disk to a random location and 6000rpm is the rotational speed of the disk. Neglect the time to transfer data from the disk block once the head has been positioned at the start of the block. What will be the time taken by the application to load all the libraries, if all 100 libraries are loaded from random location on the disk?
a. 1.50sb. 1.00s
c. 1.87s
d. 0.74s
Answers
1) c
2) d
3) b
4) b
5) a
6) b
7) a
8) d
9) c
10) d
11) a
Expected Questions Series 6
1) A machine has a physical memory of 64 Mbyte and a virtual address space of 32 - bit. The page size is 4kbyte, What is the approximate size of the page table?
a. 24 Mbyte
b. 16 Mbyte
c. 2 Mbyte
d. 8 Mbyte
If Optimal Page Replacement policy is used, _______ page faults will occur for the above reference string.
a. 7
b. 8
c. 9
d. 6
b. In deadlock prevention, the request for resources is always granted, if the resulting state is safe.
c. It is the priority to have the knowledge of resource requirements for deadlock avoidance.
d. In deadlock avoidance, the request for resources is always granted, if the resulting state is safe.
b. Fixed size bit string
c. All of the Above
d. None of the Above
b. less than n.
c. less than m.
d. less than n / 2.
b. Dn = n log2n + 1
c. Dn = log2n
d. Dn = log2n + 1
b. edges
c. both a and b
d. labels
b. Transaction does not commit any writes until it completes all its writes.
c. Transactions do not dirty data read by a transaction before the transaction commits.
d. A transaction does not overwrite data updated by another user or process.
b. The number of relationships with other tables
c. Number of association among two or more entities
d. Number of foreign key dependencies
b. Foreign key
c. Unique key
d. Candidate key
a. 24 Mbyte
b. 16 Mbyte
c. 2 Mbyte
d. 8 Mbyte
2) We have a process that has been allocated 3 page frames and initially none of the pages of the process are available in the memory. The following sequence of page references (reference string) is made by the process :
1, 2, 1, 3, 7, 4, 5, 6, 3, 1If Optimal Page Replacement policy is used, _______ page faults will occur for the above reference string.
a. 7
b. 8
c. 9
d. 6
3) Which of the following statements is not true for the deadlock prevention and deadlock avoidance schemes?
a. Deadlock avoidance is less restrictive than deadlock prevention.b. In deadlock prevention, the request for resources is always granted, if the resulting state is safe.
c. It is the priority to have the knowledge of resource requirements for deadlock avoidance.
d. In deadlock avoidance, the request for resources is always granted, if the resulting state is safe.
4) What does the Cryptographic hash function return when it takes an arbitrary block of data?
a. Variable size bit stringb. Fixed size bit string
c. All of the Above
d. None of the Above
5) If ' h ' is a hashing function and it is used to hash ' n ' keys into a table of size ' m ' where n <= m . What is the expected number of collisions involving a particular key ' x ' ?
a. less than 1. b. less than n.
c. less than m.
d. less than n / 2.
6) Which of the following is the depth of a Complete Binary Tree?
a. Dn = n log2nb. Dn = n log2n + 1
c. Dn = log2n
d. Dn = log2n + 1
7) In graphs, A hyperedge is an edge that is allowed to take on any number of _____________.
a. verticesb. edges
c. both a and b
d. labels
8) What is degree 0 isolation?
a. Transaction does not read dirty data from other transactions.b. Transaction does not commit any writes until it completes all its writes.
c. Transactions do not dirty data read by a transaction before the transaction commits.
d. A transaction does not overwrite data updated by another user or process.
9) What is a degree of relation?
a. It is the number of attributes of its relation schema.b. The number of relationships with other tables
c. Number of association among two or more entities
d. Number of foreign key dependencies
10) Which of the following is / are known as a minimal superkey?
a. Primary keyb. Foreign key
c. Unique key
d. Candidate key
Answers:
1) c
2) a
3) d
4) b
5) a
6) d
7) a
8) d
9) a
10) d
Subscribe to:
Posts (Atom)