Description : The …………….. policy segments the disks request queue into sub queues of the length N. A) SCAN B) C-SCAN C) N-Step SCAN D) FSCAN
Last Answer : C) N-Step SCAN
Description : ............. policy selects the disk I/O request that requires the least movement of the disk arm from its current position. A) FSCAN B) SSTF C) SCAN D) C-SCAN
Last Answer : B) SSTF
Description : Consider a disk queue with I/O requests on the following cylinders in their arriving order: 6,10,12,54,97,73,128,15,44,110,34,45 The disk head is assumed to be at cylinder 23 and moving in the direction ... . The disk head movement using SCAN-scheduling algorithm is: (1) 172 (2) 173 (3) 227 (4) 228
Last Answer : (2) 173
Description : A Network Schema (A) restricts to one to many relationship (B) permits many to many relationship (C) stores Data in a Database (D) stores Data in a Relation
Last Answer : (B) permits many to many relationship
Description : Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used ... -penetration method. (A) I and II (B) II and III (C) III only (D) IV only
Last Answer : (C) III only
Description : Which one from the following is false ? (A) LALR parser is Bottom - Up parser (B) A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1). (C) LR parser is Bottom - Up parser. (D) In LL(1), the 1 indicates that there is a one - symbol look - ahead.
Last Answer : (B) A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1).
Description : When UPS or Fedex updates each step in tracking, are they scanning each individual package, or are they scanning the cargo container (only)?
Last Answer : I wonder the same. I am waiting with you for an answer.
Description : Consider a disk queue with request for input/output to block on cylinders 98, 183, 37, 122, 14, 124, 65, 67 in that order. Assume that disk head is initially positioned at cylinder 53 and moving ... and 252 cylinders (B) 640 and 236 cylinders (C) 235 and 640 cylinders (D) 235 and 252 cylinders
Last Answer : Answer: 236 and 208 cylinders Explanation: SSTF Initial head position =53 The closest queue to initial head position=65 head moves from 53 to 65=12 head moves from 65 to 67=2 head moves from 67 ... 122=24 head moves from 122 to 124=2 head moves from 124 to 183=59 Total head movement=208
Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.
Description : Which raster locations would be chosen by Bresenham’s algorithm when scan converting a line from (1, 1) to (8, 5) ?
Last Answer : Answer: C
Description : Which of the following is/are side effects of scan conversion? a. Aliasing b. Unequal intensity of diagonal lines c. Over striking in photographic applications d. Local or Global aliasing (1) a and b (2) a, b and c (3) a, c and d (4) a, b, c and d
Last Answer : a, b, c and d
Description : Below are the few steps given for scan-converting a circle using Bresenham's Algorithm. Which of the given steps is not correct? (1) Compute d = 3 – 2r (where r is radius) (2) Stop if x> y (3) If d
Last Answer : If d≥0,then d=4 *(x-y)+10, x=x+1 and y=y+1
Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry
Last Answer : Data Entry
Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.
Last Answer : A. Maintaining Access.
Description : The following conditions of policy must be present for a deadlock to be possible. i) Mutual exclusion ii) Hold and wait iii) No preemption iv) Circular wait A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : The Constitution _______. (1) is silent on the President's reelection to the office. (2) allows reelection of a person to the President's post (3) restricts a person to remain President for only two terms. (4) has been amended to allow a person only one term as President.
Last Answer : (2) allows reelection of a person to the President's post Explanation: According to Article 57 of the Constitution, a President is eligible for reelection to that office.The President shall hold office for a term of five years from the date on which he enters upon his office.
Description : A …………… is an acyclic digraph, which has only one node with indegree 0, and other nodes have indegree 1. A) Directed tree B) Undirected tree C) Dis-joint tree D) Direction oriented tree
Last Answer : A) Directed tree
Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex
Last Answer : B) Half-duplex
Description : Give the number of principal vanishing point(s) along with their direction for the standard perspective transformation: (A) Only one in the direction K (B) Two in the directions I and J (C) Three in the directions I, J and K (D) Only two in the directions J and K
Last Answer : (A) Only one in the direction K
Description : A context diagram is used A) as the first step in developing a detailed DFD of a system B) in systems analysis of very complex systems C) as an aid to system design D) as an aid to programmer
Last Answer : A) as the first step in developing a detailed DFD of a system
Description : ....... was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above
Last Answer : A) Star LAN
Description : Which one of the following is not a step of requirement engineering ? (A) Requirement elicitation (B) Requirement analysts (C) Requirement design (D) Requirement documentation
Last Answer : (C) Requirement design
Description : Shift-Reduce parsers perform the following : (A) Shift step that advances in the input stream by K(K>1) symbols and Reduce step that applies a completed grammar rule to some recent parse trees, ... in the input stream and Reduce step that applies a completed grammar rule to form a single tree.
Last Answer : (B) Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
Description : The ……………. Determines when a page should be brought into main memory. A) Fetch policy B) Placement policy C) Replacement policy D) Resident set management
Last Answer : A) Fetch policy
Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm
Last Answer : (A) Flow Control Policy
Description : What restricts the infiltration of water in desert soil? -Geography
Last Answer : Arid or desert soils are found in deserts. These soils are formed by wind activities and are sandy in nature. It lacks moisture and humus due to the dry climate and high temperature ... quantity of calcium carbonates and sodium, kankar is formed and restricts infiltration of water in the soil.
Description : What restricts the number of a certain type of product that can be imported into a country?
Last Answer : What is the answer ?
Description : A high Statutory Liquidity Ratio (SLR) (1) restricts lending (2) increases supply of cash (3) provides funds to the state (4) increases the strength of the banks
Last Answer : (1) restricts lending Explanation: Statutory Liquidity Ratio refers to the amount that the commercial banks require to maintain in the form gold or government approved securities before providing credit to ... , suck liquidity in the market, to tighten the measure to safeguard the customers' money.
Description : Restriction endonuclease (a) synthesizes DNA (b) cuts the DNA molecule randomly (c) cuts the DNA molecule at specific sites (d) restricts the synthesis of DNA inside the nucleus.
Last Answer : (c) cuts the DNA molecule at specific sites
Description : In IPv6, the _______ field inthe baseheader restricts the lifetime ofa datagram. A) version B) next-header C) hoplimit D) neighbor-advertisemen
Last Answer : hoplimit
Description : The secret code that restricts entry to some programs: a) Password b) Passport c) Entry Code d) None of These
Last Answer : b) Passport
Description : 29. A constraint in an LP model restricts a. Value of objective function b. Value of a decision variable c. Use of the available resources d. All of the above
Last Answer : d. All of the above
Description : In removable partial dentures, the principle of an indirect retainer is that it: a. Stabilises against lateral movement b. Prevents settling of major connectors c. Restricts tissue movement at ... base of the partial denture. d. Minimises movement of the base away from the supporting tissue
Last Answer : d. Minimises movement of the base away from the supporting tissue
Description : Indicate which of the statement is incorrect with regard to coning of Wheels a)coning of wheels help the vehicle to negotiate a curve smoothly b) It helps in smooth riding c) It increases ... enables the outer wheel of vehicle to take a longer distance e) it restricts the swaying of vehicles
Last Answer : c) It increases wear and Tear of wheel flanges*
Description : A marketing plan A)is characteristic of production -oriented firms and other mass producers. B)provides a framework for implementing and controlling marketing activities. C)always increases the marketing ... are short -term in orientation. E)restricts the marketing manager's future options.s.
Last Answer : B)provides a framework for implementing and controlling marketing activities
Description : A constraint in a Linear Programming Model restricts: a. Value of objective function b. Value of decision variable c. Use of available resources d. All of the above
Description : 6 The blood-brain barrier, which restricts entry of many drugs into brain, is constituted by: A. P-glycoprotein efflux carriers in brain capillary cells B. Tight junctions between endothelial cells of brain capillaries C. Enzymes present in brain capillary walls D. All of the above
Last Answer : D. All of the above
Description : The blood-brain barrier, which restricts entry of many drugs into brain, is constituted by: A. P-glycoprotein efflux carriers in brain capillary cells B. Tight junctions between endothelial cells of brain capillaries C. Enzymes present in brain capillary walls D. All of the above
Description : If a firm shut down at a level when AVC > Price, the firm restricts its losses to (a) Total fixed cost ; (b) Average fixed cost ; (c) Variable cost ; (d) Average variable cost
Last Answer : (a) Total fixed cost ;
Last Answer : restricts lending
Description : Arrays in C language can have ................. with reference to memory representation. (A) n-subscripts (B) two-subscripts (C) only one subscript (D) three subscripts only
Last Answer : (C) only one subscript
Description : Consider the following conditions : (a) The solution must be feasible, i.e. it must satisfy all the supply and demand constraints. (b) The number of positive allocations must be equal to m+n-1, where m is the number of rows and n is ... B) (a) and (c) only (C) (b) and (c) only (D) (a), (b) and (c)
Last Answer : (D) (a), (b) and (c)
Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is .................. (1) nP(1-P)n-1 (2) nP (3) P(1-P)n-1 (4) nP(1-P)n-1
Last Answer : nP(1-P)n-1
Description : ................... comparisons are necessary in the worst case to find both the maximum and minimum of n numbers. (A) 2n-2 (B) n + floor(lg n) - 2 (C) floor(3n/2) - 2 (D) 2 lg n – 2
Last Answer : (C) floor(3n/2) - 2
Description : Let P(m,n) be the statement m divides n where the Universe of discourse for both the variables is the set of positive integers. Determine the truth values of the following propositions. (a) ∃m ∀n P(m,n) (b) ∀n P(1,n) ( ... -False (C) (a)-False; (b)-False; (c)-False (D) (a)-True; (b)-True; (c)-True
Last Answer : Answer: A
Description : Let us consider that the original point is (x,y) and new transformed point is (x’,y’). Further, Shx and Shy are shearing factors in x and y directions. If we perform the y-direction shear relative to x=xref then the transformed point is given by ............
Last Answer : (C) x’ = x y’ = Shy(x - xref) + y
Description : Marco is an investor, and Jon is a project team member. Both have intensive technical background for the project that you are managing. However, recently they have disagreed on the next step to take ... b. Stakeholders c. The project team d. Investors e. The board of trustees of this company
Last Answer : c. The project team
Description : What will be the values of x, m and n after execution of the following statements? Int x, m, n; m=10; n=15; x= ++m + n++; A) x=25, m=10, n=15 B) x=27, m=10, n=15 C) x=26, m=11, n=16 D) x=27, m=11, n=16
Last Answer : C) x=26, m=11, n=16
Description : If m and n are int type variables, what will be the result of the expression m% n when m=5 and n=2 ? A) 0 B) 1 C) 2 D) None of the above
Last Answer : B) 1