The ............... policy restricts scanning to one direction only.
A) SCAN
B) C-SCAN
C) N-Step SCAN
D) Both A and B

1 Answer

Answer :

A) SCAN

Related questions

Description : The …………….. policy segments the disks request queue into sub queues of the length N. A) SCAN B) C-SCAN C) N-Step SCAN D) FSCAN

Last Answer : C) N-Step SCAN

Description : ............. policy selects the disk I/O request that requires the least movement of the disk arm from its current position. A) FSCAN B) SSTF C) SCAN D) C-SCAN

Last Answer : B) SSTF

Description : Consider a disk queue with I/O requests on the following cylinders in their arriving order: 6,10,12,54,97,73,128,15,44,110,34,45 The disk head is assumed to be at cylinder 23 and moving in the direction ... . The disk head movement using SCAN-scheduling algorithm is: (1) 172 (2) 173 (3) 227 (4) 228

Last Answer : (2) 173

Description : A Network Schema (A) restricts to one to many relationship (B) permits many to many relationship (C) stores Data in a Database (D) stores Data in a Relation

Last Answer : (B) permits many to many relationship

Description : Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used ... -penetration method. (A) I and II (B) II and III (C) III only (D) IV only

Last Answer : (C) III only

Description : Which one from the following is false ? (A) LALR parser is Bottom - Up parser (B) A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1). (C) LR parser is Bottom - Up parser. (D) In LL(1), the 1 indicates that there is a one - symbol look - ahead.

Last Answer : (B) A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1).

Description : When UPS or Fedex updates each step in tracking, are they scanning each individual package, or are they scanning the cargo container (only)?

Last Answer : I wonder the same. I am waiting with you for an answer.

Description : Consider a disk queue with request for input/output to block on cylinders  98, 183, 37, 122, 14, 124, 65, 67  in that order. Assume that disk head is initially positioned at cylinder 53 and moving ... and 252 cylinders (B) 640 and 236 cylinders (C) 235 and 640 cylinders (D) 235 and 252 cylinders

Last Answer : Answer: 236 and 208 cylinders Explanation: SSTF Initial head position =53 The closest queue to initial head position=65 head moves from 53 to 65=12 head moves from 65 to 67=2 head moves from 67 ... 122=24 head moves from 122 to 124=2 head moves from 124 to 183=59 Total head movement=208 

Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.

Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.

Description : Which raster locations would be chosen by Bresenham’s algorithm when scan converting a line from (1, 1) to (8, 5) ?

Last Answer : Answer: C

Description : Which of the following is/are side effects of scan conversion? a. Aliasing b. Unequal intensity of diagonal lines c. Over striking in photographic applications d. Local or Global aliasing (1) a and b (2) a, b and c (3) a, c and d (4) a, b, c and d

Last Answer : a, b, c and d 

Description : Below are the few steps given for scan-converting a circle using Bresenham's Algorithm. Which of the given steps is not correct? (1) Compute d = 3 – 2r (where r is radius) (2) Stop if x> y (3) If d

Last Answer : If d≥0,then d=4 *(x-y)+10, x=x+1 and y=y+1

Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry

Last Answer : Data Entry

Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.

Last Answer : A. Maintaining Access.

Description : The following conditions of policy must be present for a deadlock to be possible. i) Mutual exclusion ii) Hold and wait iii) No preemption iv) Circular wait A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : The Constitution _______. (1) is silent on the President's reelection to the office. (2) allows reelection of a person to the President's post (3) restricts a person to remain President for only two terms. (4) has been amended to allow a person only one term as President.

Last Answer : (2) allows reelection of a person to the President's post Explanation: According to Article 57 of the Constitution, a President is eligible for reelection to that office.The President shall hold office for a term of five years from the date on which he enters upon his office.

Description : A …………… is an acyclic digraph, which has only one node with indegree 0, and other nodes have indegree 1. A) Directed tree B) Undirected tree C) Dis-joint tree D) Direction oriented tree

Last Answer : A) Directed tree

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : Give the number of principal vanishing point(s) along with their direction for the standard perspective transformation: (A) Only one in the direction K (B) Two in the directions I and J (C) Three in the directions I, J and K (D) Only two in the directions J and K 

Last Answer : (A) Only one in the direction K

Description : A context diagram is used A) as the first step in developing a detailed DFD of a system B) in systems analysis of very complex systems C) as an aid to system design D) as an aid to programmer

Last Answer : A) as the first step in developing a detailed DFD of a system

Description : ....... was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Which one of the following is not a step of requirement engineering ? (A) Requirement elicitation (B) Requirement analysts (C) Requirement design (D) Requirement documentation

Last Answer : (C) Requirement design

Description : Shift-Reduce parsers perform the following : (A) Shift step that advances in the input stream by K(K>1) symbols and Reduce step that applies a completed grammar rule to some recent parse trees, ... in the input stream and Reduce step that applies a completed grammar rule to form a single tree.

Last Answer : (B) Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.

Description : The ……………. Determines when a page should be brought into main memory. A) Fetch policy B) Placement policy C) Replacement policy D) Resident set management

Last Answer : A) Fetch policy

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : What restricts the infiltration of water in desert soil? -Geography

Last Answer : Arid or desert soils are found in deserts. These soils are formed by wind activities and are sandy in nature. It lacks moisture and humus due to the dry climate and high temperature ... quantity of calcium carbonates and sodium, kankar is formed and restricts infiltration of water in the soil.

Description : What restricts the number of a certain type of product that can be imported into a country?

Last Answer : What is the answer ?

Description : A high Statutory Liquidity Ratio (SLR) (1) restricts lending (2) increases supply of cash (3) provides funds to the state (4) increases the strength of the banks

Last Answer : (1) restricts lending Explanation: Statutory Liquidity Ratio refers to the amount that the commercial banks require to maintain in the form gold or government approved securities before providing credit to ... , suck liquidity in the market, to tighten the measure to safeguard the customers' money.

Description : Restriction endonuclease (a) synthesizes DNA (b) cuts the DNA molecule randomly (c) cuts the DNA molecule at specific sites (d) restricts the synthesis of DNA inside the nucleus.

Last Answer : (c) cuts the DNA molecule at specific sites

Description : In IPv6, the _______ field inthe baseheader restricts the lifetime ofa datagram. A) version B) next-header C) hoplimit D) neighbor-advertisemen

Last Answer : hoplimit

Description : The secret code that restricts entry to some programs: a) Password b) Passport c) Entry Code d) None of These

Last Answer : b) Passport

Description : 29. A constraint in an LP model restricts a. Value of objective function b. Value of a decision variable c. Use of the available resources d. All of the above

Last Answer : d. All of the above

Description : In removable partial dentures, the principle of an indirect retainer is that it: a. Stabilises against lateral movement b. Prevents settling of major connectors c. Restricts tissue movement at ... base of the partial denture. d. Minimises movement of the base away from the supporting tissue

Last Answer : d. Minimises movement of the base away from the supporting tissue

Description : Indicate which of the statement is incorrect with regard to coning of Wheels a)coning of wheels help the vehicle to negotiate a curve smoothly b) It helps in smooth riding c) It increases ... enables the outer wheel of vehicle to take a longer distance e) it restricts the swaying of vehicles

Last Answer : c) It increases wear and Tear of wheel flanges*

Description : A marketing plan A)is characteristic of production -oriented firms and other mass producers. B)provides a framework for implementing and controlling marketing activities. C)always increases the marketing ... are short -term in orientation. E)restricts the marketing manager's future options.s.

Last Answer : B)provides a framework for implementing and controlling marketing activities

Description : A constraint in a Linear Programming Model restricts: a. Value of objective function b. Value of decision variable c. Use of available resources d. All of the above

Last Answer : d. All of the above

Description : 6 The blood-brain barrier, which restricts entry of many drugs into brain, is constituted by: A. P-glycoprotein efflux carriers in brain capillary cells B. Tight junctions between endothelial cells of brain capillaries C. Enzymes present in brain capillary walls D. All of the above

Last Answer : D. All of the above

Description : The blood-brain barrier, which restricts entry of many drugs into brain, is constituted by: A. P-glycoprotein efflux carriers in brain capillary cells B. Tight junctions between endothelial cells of brain capillaries C. Enzymes present in brain capillary walls D. All of the above

Last Answer : D. All of the above

Description : The blood-brain barrier, which restricts entry of many drugs into brain, is constituted by: A. P-glycoprotein efflux carriers in brain capillary cells B. Tight junctions between endothelial cells of brain capillaries C. Enzymes present in brain capillary walls D. All of the above

Last Answer : D. All of the above

Description : If a firm shut down at a level when AVC > Price, the firm restricts its losses to (a) Total fixed cost ; (b) Average fixed cost ; (c) Variable cost ; (d) Average variable cost

Last Answer : (a) Total fixed cost ;

Description : A high Statutory Liquidity Ratio (SLR) (1) restricts lending (2) increases supply of cash (3) provides funds to the state (4) increases the strength of the banks 

Last Answer : restricts lending 

Description : Arrays in C language can have ................. with reference to memory representation. (A) n-subscripts (B) two-subscripts (C) only one subscript (D) three subscripts only

Last Answer : (C) only one subscript 

Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is .................. (1) nP(1-P)n-1 (2) nP (3) P(1-P)n-1 (4) nP(1-P)n-1

Last Answer :  nP(1-P)n-1

Description : ................... comparisons are necessary in the worst case to find both the maximum and minimum of n numbers. (A) 2n-2 (B) n + floor(lg n) - 2 (C) floor(3n/2) - 2 (D) 2 lg n – 2

Last Answer : (C) floor(3n/2) - 2

Description : Let P(m,n) be the statement m divides n where the Universe of discourse for both the variables is the set of positive integers. Determine the truth values of the following propositions. (a) ∃m ∀n P(m,n) (b) ∀n P(1,n) ( ... -False (C) (a)-False; (b)-False; (c)-False (D) (a)-True; (b)-True; (c)-True

Last Answer : Answer: A

Description : Let us consider that the original point is (x,y) and new transformed point is (x’,y’). Further, Shx and Shy are shearing factors in x and y directions. If we perform the y-direction shear relative to x=xref then the transformed point is given by ............ 

Last Answer : (C) x’ = x y’ = Shy(x - xref) + y

Description : Marco is an investor, and Jon is a project team member. Both have  intensive technical background for the project that you are managing.  However, recently they have disagreed on the next step to take ... b. Stakeholders c. The project team d. Investors e. The board of trustees of this company

Last Answer : c. The project team

Description : What will be the values of x, m and n after execution of the following statements? Int x, m, n; m=10; n=15; x= ++m + n++; A) x=25, m=10, n=15 B) x=27, m=10, n=15 C) x=26, m=11, n=16 D) x=27, m=11, n=16

Last Answer : C) x=26, m=11, n=16

Description : If m and n are int type variables, what will be the result of the expression m% n when m=5 and n=2 ? A) 0 B) 1 C) 2 D) None of the above

Last Answer : B) 1