Thursday 27 September 2012

DECEMBER 2011 - PAPER II


28. On receiving an interrupt from an I/O device, the CPU

(A) halts for predetermined time
(B) branches off to the interrupt service routine after completion of the current instruction
(C) branches off to the interrupt service routine immediately.
(D) hands over control of address bus and data bus to the interrupting device.

Ans:-B


29. The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads)

(A) a plate of data
(B) a cylinder of data
(C) a track of data
(D) a block of data

Ans:-B


30. Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?

(A) 9 bits
(B) 11 bits
(C) 13 bits
(D) 15 bits

Ans:-D

Explanation:-
The question asks about the number of bits in the physical address. The word size is 1024. So, the number of bits required to calculate the offset into each page = 210=1024=10 bits.
So for 32 frames(25) of 1024 words each,we would require a total of 5+10 bits = 15 bits. Therefore the option is D.


31. CPU does not perform the operation

(A) data transfer
(B) logic operation
(C) arithmetic operation
(D) all of the above

Ans:-D


32. A chip having 150 gates will be classified as

(A) SSI
(B) MSI
(C) LSI
(D) VLSI

Ans:-B

Explanation:- The number of gates for the different classification are as follows.
Small Scale Integration(SSI) - <10
Medium Scale Integration(MSI) - between 10 to 1000
Large Scale Integration(LSI) - >1000
Very Large Scale Integration(VLSI) - >100000
So the answer is option B.


33.If an integer needs two bytes of storage, then the maximum value of unsigned integer is

(A) 216 –1
(B) 215 –1
(C) 216
(D) 215

Ans:-A

Explanation:- The same question is asked in June 2012,paper -II but there they have asked for the maximum value of signed integer.The link to that answer is JUNE 2012 - PAPER II. Here it is the maximum value of unsigned integer and the answer is option A.


34. Negative numbers cannot be represented in

(A) signed magnitude form
(B) '1’ s complement form
(C) '2’ s complement form
(D) none of the above

Ans:-D

Explanation:-
Negative numbers can be represented in signed magnitude form, or '1' complement form or '2''s complement form. So the option is D.


35. The cellular frequency reuse factor for the cluster size N is

(A) N
(B) N2
(C) 1/N
(D) 1/N2

Ans:-C


Wednesday 26 September 2012

DECEMBER 2011 - PAPER II


22. Which command classes text file, which has been created using “SET ALTERNA TIVE” “Command” ?

(A) SET ALTERNATE OFF
(B) CLOSE DATABASE
(C) CLOSE ALTERNATE
(D) CLEAR ALL

Ans:-A

Explanation:-
Actually the question should be which command is used for closing the text file, which has been created using SET ALTERNATE TO . The answer is SET ALTERNATE OFF. SET ALTERNATE ON directs the output to text file. OFF disables the output to text file.


23. Data security threats include

(A) privacy invasion
(B) hardware failure
(C) fraudulent manipulation of data
(D) encryption and decryption

Ans:-C

Explanation:-
Option B and D are completely ruled out. Since the question talks about data security threat choosing option C is correct than option A.


24. Which of the following statements is true, when structure of database file with 20 records is modified ?

A) ? EOF ( ) Prints. T
(B) ?BOF()Prints F
(C) ?BOF()Prints T
(D) ?EOF()Prints F

Ans:-A


25. The SQL Expression Select distinct T. branch name from branch T, branch S where T. assets > S. assets and S. branch-city = DELHI, finds the name of

(A) all branches that have greater asset than any branch located in DELHI.
(B) all branches that have greater assets than allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch located in DELHI.

Ans:-A


26. Dijkestra banking algorithm in an operating system, solves the problem of

(A) deadlock avoidance
(B) deadlock recovery
(C) mutual exclusion
(D) context switching

Ans:-A


27. The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes is

(A) e-15
(B) e-5
(C) 1-e-5
(D) 1-e-10

Ans:-A


Tuesday 25 September 2012

DECEMBER 2011 - PAPER II


11. A station in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?

(A) Hot potato routing
(B) Flooding
(C) Static routing
(D) Delta routing

Ans:-A


12. Start and stop bits are used in serial communications for

(A) Error detection
(B) Error correction
(C) Synchronization
(D) Slowing down the communication

Ans:-C


13. For a data entry project for office staff who have never used computers before (user interface and user- friendliness are extremely important), one will use

(A) Spiral model
(B) Component based model
(C) Prototyping
(D) Waterfall model

Ans:-C


14. An SRS

(A) establishes the basis for agreement between client and the supplier.
(B) provides a reference for validation of the final product.
(C) is a prerequisite to high quality software.
(D) all of the above.

Ans:-D


15. McCabe’ s cyclomatic metric V(G) of a graph G with n vertices, e edges and p connected component is

(A) e
(B) n
(C) e– n +p
(D) e – n + 2p

Ans:-C

Explanation:-
The cyclomatic number V(G) of a graph with n vertices, e edges and p connected component is
V(G) = e - n + p


16. Emergency fixes known as patches are result of

(A) adaptive maintenance
(B) perfective maintenance
(C) corrective maintenance
(D) none of the above

Ans:-C


17. Design recovery from source code is done during

(A) reverse engineering
(B) re-engineering
(C) reuse
(D) all of the above

Ans:-A


18. Following is used to demonstrate that the new release of software still performs the old one did by rerunning the old tests :

(A) Functional testing
(B) Path testing
(C) Stress testing
(D) Regression testing

Ans:-D


19. The post order traversal of a binary tree is DEBFCA. Find out the pre- order traversal.

(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) ABDCEF

Ans:-C

Explanation:- The same question is given in Paper II of June 2012 and i have explained the same in this blog. Please refer to paper ii - question no 2 of June 2012 paper.The link is given below
JUNE 2012 - PAPER II


20. B + tree are preferred to binary tree in database because

(A) Disk capacities are greater than memory capacities
(B) Disk access much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disk are more reliable than memory

Ans:-B

Explanation:- Again the same question is repeated in June 2012 paper and the answer is B. Explanation for the same is provided there. In Question no 11 of paper ii - june 2012.The link is
June 2012 - PAPER II


21. What deletes the entire file except the file structure ?

(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK

Ans:-C

Explanation:- Again this question is given in June 2012 paper-ii. Since i have solved june 2012-paper II before the answer for the same is available there also. Question No 9 of June 2012-Paper II.


Monday 24 September 2012

DECEMBER 2011 - PAPER II


6. A hash table has space for 75 records, then the probability of collision before the table is 6% full

(A) .25
(B) .20
(C ).35
(D).30

Explanation:
The answer which i am getting out of calculation is not available in any of the options given here. Anyhow i will go ahead and give the explanation for the same. The hash table has space for 75 records. So let us say n=75. We have to calculate the probability of collision before the table is 6% full. If the table is 6% full, then 5 slots are occupied in the table. Since it is given before the table is 6% full, let us take the occupying items as 4. Let us calculate the probability of n collision and then subtract them from 1 to get the final answer.
Prob. of no collision on first insertion = 1
Prob. of no collision on 2nd insertion=(n-1)/n=74/75
Prob. of no collision on 3rd insertion=(n-2)/n=73/75
Prob. of no collision on 4th insertion=(n-3)/n=72/75
So the probability of no collision on any of m insertions is the product of these values which is
=1 * 0.987 * 0.973 * 0.96* 0.947
= 0.873
So the likelihood of at least one collision is just 1 minus this value.
=1-0.873 = 0.123 which seems to be the answer. But there is no option like this at all. So i am not answering this question.



7. BCC in the internet refers to

(A) Black carbon copy
(B) Blind carbon copy
(C) Blank carbon copy
(D) Beautiful carbon copy
Ans:- B

8.Hub is a term used with (A) A Star Networks
(B) A Ring Networks
(C) A Router
(D) A Bridge

Ans:-A
Explanation:-
In network topology, a star network is one where each host is connected to a central hub via a point-to—point link. It is considered a s the easiest topology to design and implement. It is also very easy to add nodes. But the disadvantage is that the hub represents a single point of failure. If the hub is down then the entire network becomes down.


9.The amount of uncertainty in a system of symbol is called

(A) Bandwidth
(B) Entropy
(C ) Loss
(D) Quantum

Ans:- B

10. Which of the following network access standard disassembler is used for connection station to a packet switched network ?

(A) X.3
(B) X.21
(C) X.25
(D) X.75
Ans:- C
Explanation:-
X.25 is used in packed switched network. The idea is to connect a dumb terminal to a packet-switched network.

Thursday 20 September 2012

DECEMBER 2011 - PAPER II

4. Domain and Range of the function Y=– sqrt(–2x+3)is

(A) x≥3/2,y≥0
(B) x>3/2,y<=0
(C) x≥3/2,y≤0
(D) x≤3/2,y≤0

Ans:-D

Explanation:- Since i am not such a mathematical person, i am just giving you the link from where you can get the explanation for this answer. The same problem along with how to arrive at the answer is given in purple math. The link is,
http://www.purplemath.com/modules/fcns2.htm


5. Maximum number of edges in a n- Node undirected graph without self loop is

(A) n2
(B) n(n-1)
(C) n(n + 1)
(D) n(n-1)/2

Ans:-D

Explanation:-
Theorem.
In an undirected simple graph with N vertices without loops, there are at most N(N-1)/2 edges.
This can be proved by induction.
This can also be verified by drawing some simple graphs of 2,3, 4 and 5 vertices. But No multiple edges. So the answer is option D.


Wednesday 19 September 2012

DECEMBER 2011 - PAPER II

1. Which of the following data structure is Non-linear type ?

(A) Strings
(B) Lists
(C) Stacks
(D) None of the above

Ans:-D

Explanation:- In Linear type data can be traversed sequentially. For example, arrays, linked list. In non linear type data is traversed in a non-sequential,hierarchal manner. Example are trees, Binary search trees etc. So option D will be the correct answer.


2. The total number of comparisons in a bubble sort is

(A) 0(log n)
(B) 0(n log n)
(C) 0(n)
(D) None of the above

Ans:-D

Explanation:-
The total number of comparisons in a bubble sort is
=(N-1)+(N-2)+…+2+1
=(N-1)*N/2=O(N2)
Since this value is not available in the list of options,we go with D.


3. Which of the following is a bad example of recursion ?

(A) Factorial
(B) Fibonacci numbers
(C) Tower of Hanai
(D) Tree traversal

Ans:-B


Tuesday 18 September 2012

JUNE 2012 - PAPER II

37. Interrupts which are initiated by an instruction are

(A) Internal
(B) External
(C) Hardware
(D) Software

Ans:-D

Explanation:- There are three types of interrupts. They are

  1. External interrupts
  2. Internal interrupts
  3. Software interrupt
External interrupts come from I/O devices. Internal interrupts are from illegal or wrong use of an instruction or data. A software interrupt is initiated by executing an instruction. The answer key gives the answer as C. But i think it should be D.


38. printf(“%c”, 100);

(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above

Ans:-B

Explanation:- The %c format specifier prints the ascii equivalent of the value.


39. For the transmission of the signal, Bluetooth wireless technology uses

(A) time division multiplexing
(B) frequency division multiplexing
(C) time division duplex
(D) frequency division duplex

Ans:-C


40. Consider the following statements :
I. Recursive languages are closed under complementation.
II. Recursively enumerable languages are closed under union.
III. Recursively enumerable languages are closed under complementation.
Which of the above statements are true ?

(A) I only
(B) I and II
(C) I and III
(D) II and III

Ans:-B

Explanation:-
Recursive languages are closed under the following operations.

  1. Kleene star
  2. Concatenation
  3. Union
  4. Intersection
  5. Complement
  6. Set difference

Recursively enumerable languages are closed under the following operations.
  1. Kleene star
  2. Concatenation
  3. Union
  4. Intersection

Recursively enumerable languages are not closed under complement. So the statements I and II are only true. So the option is B.


41. What is the routing algorithm used by RIP and IGRP ?

(A) OSPF
(B) Link-state
(C) Dynamic
(D) Dijkestra vector

Ans:-

Explanation:- Actually in the answer key it is given as D which is Dijkestra vector. RIP(Routing Information Protocol) and IGRP(Interior Gateway Routing Protocol) are examples of Distance Vector routing protocols and Open Shortest Path First(OSPF) is an example of Link State routing protocols. Distance Vector routing protocols are based on Bellma and Ford algorithms. Link state routing protocols are based on Dijkstra algorithms. Here the options OSPF, Link-state are ruled out. Even Dijkestra is ruled out because link state protocols are based on that. The only left out option is C which is Dynamic and which does not comply with the answer key. So i am just not entering any particular option for it.


42. Identify the incorrect statement :

(A) The overall strategy drives the E-Commerce data warehousing strategy.
(B) Data warehousing in an E-Commerce environment should be done in a classical manner.
(C) E-Commerce opens up an entirely new world of web server.
(D) E-Commerce security threats can be grouped into three major categories.

Ans:-D

Explanation:- E-commerce security threats are more than 3 in number and so the incorrect statement here is D.


43. Reliability of software is directly dependent on

(A) quality of the design
(B) number of errors present
(C) software engineers experience
(D) user requirement

Ans:-B

Explanation:- One of the closest answer to this also could be option A which is quality of the design. But it can also be understood that if a software product has a large number of defects it is unreliable. So if the reliability of the software improves it means that the number of defects has reduced. So reliability of software is dependent on the number of errors present. So it is option B.


44. ______ is not an E-Commerce application.

(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee

Ans:-D

Explanation:- This is a simple one and in fact does not need any explanation.


45. ______ is a satellite based tracking system that enables the determination of person’s position.

(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System

Ans:-D

Explanation:- Again quite a easy one and does not need much explanation.


46. A complete microcomputer system consists of

(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above

Ans:-D

Explanation:- Again no explanation needed!!!.


47. Where does a computer add and compare data ?

(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip

Ans:-C

Explanation:- Since option A,B and D are ruled out, the answer is option C.


48. Pipelining strategy is called implement

(A) instruction execution
(B) instruction prefetch
(C) instruction decoding
(D) instruction manipulation

Ans:-B

Explanation:- Pipelining is a technique to build fast processors. It allows the execution of multiple instruction by overlapping them. In an assembly unit every stage has one and only one activity to do. It keeps repeating them again and again. In the same way in a instruction pipeline at every clock cycle one particular step of multiple instruction will be performed. Every instruction has multiple stages. Say at the first clock cycle first step of instruction1 is performed. At the second clock cycle the second step of instruction1 and 1st step of instruction2 would be performed and so on. So pipelining is called instruction prefetch. So the option is B.


49. Which of the following data structure is linear type ?

(A) Strings
(B) Lists
(C) Queues
(D) All of the above

Ans:-D

No explanation needed


50. To represent hierarchical relationship between elements, which data structure is suitable ?

(A) Dequeue
(B) Priority
(C) Tree
(D) All of the above

Ans:-C

Explanation:- Dequeue and priority are types of queues which is again a linear data structure. If you want to represent hierarchal elements we should go for tree and so answer is option C.


Monday 17 September 2012

JUNE 2012 - PAPER II

34. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of

(A) Integer
(B) Character
(C) Real numbers
(D) Bits

Ans:-B

Explanation:- Check sum is the error detecting mechanism when data is treated as a sequence of character. Parity is the mechanism used when data is treated as a sequence of bits.


35. If an integer needs two bytes of storage, then the maximum value of a signed integer is (A) 216 – 1
(B) 215 – 1
(C) 216
(D) 215

Ans:-B


36.Which of the following logic families is well suited for high-speed operations ?

(A) TTL
(B) ECL
(C) MOS
(D) CMOS

Ans:-B

Explanation:- ECL stands for Emitter-Coupled Logic. It is designed for extremely high speed application. It is well suited for large mainframe computer that require high number of operation per second.


Friday 14 September 2012

JUNE 2012 - PAPER II

30. In round robin CPU scheduling as time quantum is increased the average turn around time

(A) increases
(B) decreases
(C) remains constant
(D) varies irregularly

Ans:-D

Explanation:-
There are few criterias used for measuring the performance of a particular scheduling algorithm.
The turn around time is the interval of time between the submission of a process and its completion.
The wait time is the amount of time a process has been waiting in the ready queue.
The response time is the time taken between the process submission and the first response produced.
In RR algorithm, the value of time quantum or the time slice, plays a crucial role in deciding how effective the algorithm is. If the time quantum is too small, there could be lot of context switching happening which could slow down the performance. If the time quantum is too high, then RR behaves like FCFS. If the time quantum is increased, the average response time varies irregularly. If you take any comprehensive material on operating system, you will come across a graph which depicts this behavior. So the answer is option D.


31. Resources are allocated to the process on non-sharable basis is

(A) mutual exclusion
(B) hold and wait
(C) no pre-emption
(D) circular wait

Ans:-A

Explanation:- There are four necessary and sufficient conditions for a deadlock. One of them is Mutual Exclusion which means that the resources involved are non-sharable. So the answer is option A.


32. Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ?

(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.

Ans:-B

Explanation:- Compared to the processor speed, the speed of the primary memory is slow. Cache memory is a small memory which sits in between the processor and primary memory and fetches information to the processor at a much higher speed or it makes it appear so. Caching can be effective based on a property of computer programs called locality of reference. Analysis of program show that the majority of the execution time is spent around a small part of the program may be a simple loop,nested loop or a few functions. The rest of the program is accessed infrequently. There is something called temporal locality and spatial locality also which we need to know when we talk about cache. But cache memory is ideally suited for small loops.
Interleaved memory is a technique for increasing the speed of RAM. Here multiple memory chips are grouped together to form what are known as banks.Each of them take turns for supplying data. An interleaved memory with "n" banks is said to be n-way interleaved. Macintosh systems are considered to be one using memory interleaving.
So the answer for this question is option B.


33. Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5 Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be

(A) 8
(B) 9
(C) 10
(D) 12

Ans:-C

Explanation:-
The reference string is 4,3,2,1,4,3,5,4,3,2,1,5
The number of frames m = 4
The first 4 references(4,3,2,1) cause page faults and brought into the empty frames.
The next reference (4) is already available and so there is no page fault.
The next reference (3) is also already available and so there is no page fault.
The next reference (5) replaces page 4 which was brought in first.No of page faults=5.
Next reference (4) replaces page 3 which is the next to come in.No of page faults=6.
Next reference (3) replaces 2.No of page faults till now=7.
Next reference (2) replaces 1 which was the last of the pages to come in. No of page faults till now=8.
Next reference (1) replaces 5 which was the first to come in in the second cycle. No of page faults till now=9.
The last reference in the reference string is 5 which will replace 4. No of page faults till now=10
So the answer is option C which is 10.


Thursday 13 September 2012

JUNE 2012 - PAPER II

24. In a function oriented design, we

(A) minimize cohesion and maximize coupling
(B) maximize cohesion and minimize coupling
(C) maximize cohesion and maximize coupling
(D) minimize cohesion and minimize coupling

Ans:-B

Explanation:-
A function oriented design focusses on creating modules or functions and each module supports its own abstraction. The design purpose is to minimize coupling and maximize cohesion. Cohesion is a way of understanding how close or bound your module is. Coupling is the level of interactivity between modules. For a good design to happen cohesion should be more and coupling should be less.


25. Which of the following metric does not depend on the programming language used ?

(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above

Ans:-B

Explanation:-
Line of count and Member of token depend on the programming language. Function count does not depend on programming language. Function count are a unit of measure for software just like a unit of measure for temperature would be degrees.


26. A/B+ tree index is to be built on the name attribute of the relation STUDENT. Assume that all students names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B+ tree ?

(A) 16
(B) 42
(C) 43
(D) 44

Ans:-C

Actually the answer given in the UGC answer key is option A. But i would beg to differ with that. Using the formula for calculating the degree with the parameters specified above, the answer we are arriving at is 43 which is actually option C. Let me explain how it is done.

Let n be the degree.
Given, Key size(length of the name attribute of STUDENT) = 8 bytes(k)
   Index pointer size = 4 bytes (b)
   Disk Block size = 512 bytes
Degree of B+ tree can be calculated if we know the maximum number of key a internal node can have. The formula for that is
(n-1)k+n*b= blocksize
(n-1)*8+n*4=512
8n - 8 + 4n = 512
12n=520
n=520/12=43

So, the answer is option C.


27. The Inorder traversal of the tree will yield a sorted listing of elements of tree in

(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above

Ans:-B

Explanation:-
In a binary search tree all the elements to the root of the tree will lesser than that of the root. Also elements greater than the root will be to the right of the root. So, in order traversal of such a tree would yield a sorted listing of elements.


28. Mobile IP provides two basic functions.

(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above

Ans:-B

Explanation:-
Mobile IP is the basic behind how wireless devices offer IP connectivity. Agent discovery and registration are two basic functions involved here. So the options is B.


29. Pre-emptive scheduling is the strategy of temporarily suspending a gunning process

(A) before the CPU time slice expires
(B) to allow starving processes to run
(C) when it requests I/O
(D) to avoid collision

Ans:-A

Explanation:-
Again one of those rare non ambiguous question. Every process is allocated a specific time slice in the CPU and it runs for that entire time. In pre-emptive scheduling even before the process's time slice expires, it is temporarily suspended from its execution. So the option is A.


Wednesday 12 September 2012

JUNE 2012 - PAPER II

19. The station to hub distance in which it is 2000 metres.

(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1

Ans:-B

Explanation:- Traditional Ethernet technologies had four standards for 10Mbps. They are,

  1. 10BaseT - 100 meters
  2. 10Base2 - 185 meters
  3. 10Base5 - 500 meters
  4. 10BaseFL - 2000 meters
Fast Ethernet is referred by 100BaseX standard. 100BaseX has three specifications. Here 100 refers to the speed 100Mbps. Base refers to Baseband.The specifications are
  1. 100BaseT4
  2. 100BaseTX
  3. 100BaseFX
100BaseFx uses the 2-strand fiber-optic cable and the station to hub distance is 2000 metros.


20.Main aim of software engineering is to produce

(A) program
(B) software
(C) within budget
(D) software within budget in the given schedule

Ans:-D

Explanation:- Not much explanation needed here.


21. Key process areas of CMM level 4 are also classified by a process which is

(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above

Ans:-C

Explanation:- In CMM model there are five maturity levels identified by the numbers 1 to 5. They are

  1. Initial
  2. Managed
  3. Defined
  4. Quantitatively Managed
  5. Optimizing
If an organization is at level 2, it means it has crossed over level 1 and the same holds true for subsequent levels. At level 4, the process at level 3 is also included. CMM level 5 is not correct because the question only talks about level 4. CMM level 2 is not correct because level 3 includes level 2 as well. So option C is the correct answer.


22. Validation means

(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above

Ans:-B

Explanation:-
Validation - Are we building the right product
Verification - Are we building the product right.


23. If a process is under statistical control, then it is

(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable

Ans:-C

Explanation:-
The answer is available in the book "Integrated approach to software engineering" by Pankaj Jalote. A predictable process is also said to be under statistical control.


JUNE 2012 - PAPER II

14. Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ?

(A) RAP
(B) RIP
(C) ARP
(D) X.25

Ans:-C

Explanation:- ARP is a protocol in the TCP/IP protocol suite. This protocol is required for basic TCP/IP operations. This protocol is used to find the ethernet(hardware) address from a specific IP number.


15. Decryption and encryption of data are the responsibility of which of the following layer ?

(A) Physical layer
(B) Data Link layer
(C) Presentation layer
(D) Session layer

Ans:-C

Explanation:- Not a very complicated question. Decryption and encryption of data happens in the presentation layer. One more important activity which happens at this layer is the Compression and decompression of data.


16. In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ?

(A) Space division
(B) Time division
(C) Virtual
(D) Packet

Ans:-B


17. In which Routing Method do all the routers have a common database ?

(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method

Ans:-B

Explanation:- There are two major classes of routing methods.One is Distance vector and the other one Link state. In distance vector, each router knows only its neighbors. Decision is taken on two factors one is distance and the other vector, that is the direction to reach. In case of link state all the routers know about the paths reachable by all other routers in the network. All routers possess a synchronized copy of the area's link-state database. So the answer for this question would be option B.


18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate).

(A) 2400 bauds
(B) 1200 bauds
( C) 4800 bauds
(D) 9600 bauds

Ans:-A

Explanation:- Inorder to know why option A is the answer, let us understand the following table.

MODULATION BAUD RATE BIT RATE
4-PSK N 2N
8-PSK N 3N
16-PSK N 4N

In the question it is mentioned as page shift keying, but it is actually Phase Shift Keying. Two values are provided. One is bps which is nothing but Bits per second which is 9600 and also level which is 16. According to the table given above, for a 16-PSK, given the baud rate N, the bit rate would be 4N. Here bps is provides which is 9600. In order to calculate the baud rate we have to divide bps/4, because the signal level is 16. So the answer would be 9600/4=2400 baud. That is how the answer is arrived at.

Tuesday 11 September 2012

JUNE 2012 - PAPER II

10. Which command is the fastest among the following ?

(A) COPY TO
(B) COPY STRUCTURE TO
(C) COPY FILE
(D) COPY TO MFILE-DA T DELIMITED

Ans:-B

Explanation:- I am considering the same answer as what is given in the UGC answer key. I will find out why that command is supposedly faster than the rest. Give me some time. Meanwhile, i do not want to get stuck in this question and i want to proceed. So we are off to the next one but will visit the same sometime later.


11. B+ tree are preferred to binary tree in Database because

(A) Disk capacity are greater than memory capacities
(B) Disk access is much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disks are more reliable than memory

Ans:-B

Explanation:- Actually the same question was given in GATE CS(2000) paper and the solution is available in a webpage called geeksforgeeks. A good page with solutions to some gate questions. Everyone knows that disk access is slower compared to memory access. When we compare a binary tree to a B+ tree, B+ tree is supposed to have a higher fanout. What is a fanout actually?. B+ trees can store a relatively large number of pointers to child nodes in each node. Fanout means the number of pointers per node. B+ trees minimize the depth of the tree( and so one can reach the leaf node faster)by employing high fanout. That is linking many children from each node. Because of a high fanout the number of I/O operations required to find an element in the tree would be less. So B+ trees are preferred. The option is B.


12. A Transaction Manager is which of the following ?

(A) Maintains a log of transactions
(B) Maintains before and after database images
(C) Maintains appropriate concurrency control
(D) All of the above

Ans:-D

Explanation:- Transaction manager performs all the operations mentioned in option A,B and C.


13. Leaves of which of the following trees are at the same level ?

(A) Binary tree
(B) B-tree
(C) A VL-tree
(D) Expression tree

Ans:-B

Explanation:- In a B-tree leaves are at the same level. A B-tree of order m is an m-way tree which means that for each node there may be upto m children. m should be odd only.


JUNE 2012 - PAPER II

4. The number of colours required to properly colour the vertices of every planer graph is

(A) 2
(B) 3
(C) 4
(D) 5

Ans:-D

Explanation:- According to the Five-colour theorem, Every planar graph is 5-colourable. Any planar graph G with n vertices requires five colors for proper coloring. So the answer must be option D which is 5. But in the UGC answer key it is given as 2, option A. But the correct answer is D.


5. Networks that use different technologies can be connected by using

(A) Packets
(B) Switches
(C) Bridges
(D) Routers

Ans:-D

Explanation:- Packets are the units of exchanging information in network. A bridge connects two or more networks, or segments of the same network. Switches are basically Bridges but usually have multiple ports. Routers forward data packets from one place to another. They forward data depending on the network, not the hardware(MAC)address. So the answer is option D.

6.Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is

(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)

Ans:-A

Explanation:- Routing is a way to get one packet from one destination to the next. But the Layer - 5 (Application) includes all the higher-level protocols. So the layer for which protocol software is not needed by a router is Layer - 5, the Application Layer which is option A.


7. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by

(A) Jamming
(B) Password
(C) Documentation
(D) Record lock

Ans:-D

Explanation:- The explanation is quite simple. It is a straightforward question with less confusing options. So if we are talking about a multiuser database and if two users wish to update the same record at the same time, they are prevented from doing so by using Record lock.


8. A binary search tree is a binary tree :

(A) All items in the left subtree are less than root
(B) All items in the right subtree are greater than or equal to the root
(C) Each subtree is itself a binary search tree
(D) All of the above

Ans:-D

Explanation:- The statements given in the option A and C are true, is very clear. There could be only a slight confusion whether statement in option B is true or not. The above mentioned properties are mentioned in the book on Data structures:A pseudocode approach with C written by Richard F.Gilberg et al. According to the summary on binary search trees the following properties are mentioned.

  • All items in the left subtree are less than the root.
  • All items in the right subtree are greater than or equal to the root.
  • Each subtree is itself a binary search tree.
So the correct answer for this question would be option D.


9. What deletes the entire file except the file structure ?

(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK

Ans:-C


Monday 10 September 2012

June 2012 - Paper II

Hey everyone, back after a two day break. Since we are done with December 2010 paper, I want to choose the next one and it would be June 2012 now. From June 2012, Paper-II and Paper-III are objective so we will do with paper-II first and then get on to paper-III. Like all other solutions, it is all about understanding the answer and arriving at it conclusively, so that we can learn something out of it which can be used in another situation.
It is never about simply remembering the answer for every question. It is all about understanding it. That is why i am spending some time going through the explanation for answering every question. Infact i wanted to do only one question a day, but that way we would take a lot of time in finishing the solutions for the question papers and so i try to answer more than one question. Okay, without wasting much of time, let us start.

1. The postfix expression AB + CD – * can be evaluated using a
(A) stack
(B) tree
(C) queue
(D) linked list

Ans:-A

Explanation:-This is a simple question. The postfix expression can be evaluated using a stack. First the operands are pushed into the stack and the moment a operator is encountered, operands are popped out, operation performed on the operands and the result once again pushed into the stack. This series of activities continue till the entire expression is not evaluated. So the answer is A.


2. The post order traversal of a binary tree is DEBFCA. Find out the pre- order traversal.

(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above

Ans:-C

Explanation:-
A binary tree is a data structure which has at most two child nodes. A binary tree can be traversed in three ways. Inorder, preorder and postorder. The three methods of traversal can be explained this way.

TYPE FIRST SECOND THIRD
Inorder L - Left Ro - Root R - Right
Preorder Ro - Root L - Left R - Right
Postorder L - Left R - Right Ro - Root

Left will always be followed by right. But Root would be either in the front or in the middle or at the last depending on whether it is pre, in or postorder traversal. So given a post order traversal of a binary tree, we can know the root first. In the question, the post order traversal is given as DEBFCA. Since Root is the last node to be traversed in a post order traversal we know one thing for sure. A is the root.
Next, we are left with only DEBFC. Here some of the nodes belong to the left side of the binary tree and some belong to the right side. How many nodes belong to the left and how many belong to the right. Since left side of the binary tree is considered first, and since every node is expected to have at most two child, DEB will be the left side of the binary tree and FC would be the right.
Now, we know that FC is in the right side of the binary tree. Again the last node would be the root of the sub tree and F its left side.
Next we come to the left side of the binary tree and it is DEB. Again B would be the root of the sub tree. D and E are its left and right side respectively. So the binary tree would look something like this given below.

Tree1

After constructing the binary tree, writing the preorder traversal is very simple. In preorder traversal root comes first. Since A is the root, A would appear first. Following Root would be the Left and Right sub tree and so the left subtree would be BDE. Again B would be the root of the left sub tree followed by D and E which are the left and right child respectively. SO the preorder traversal till now would be ABDE. Last comes the Right sub tree. Here again C would be the root of the right sub tree followed by C its left child. So the entire preorder traversal of the tree would be ABDECF. So option C is the right answer.


3.The branch logic that provides making capabilities in the control unit is known as

(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above

Ans:-A

Explanation:- This question is available in lot of websites and other materials and the answer given there is unconditional transfer which is option C. But UGC answer key is given as option A. I am just going to go with A, but will find out more about this and post it. Meanwhile, if there are any explanation for this question,please post it, so that everyone can benefit.


Friday 7 September 2012

December 2010 - Question No 36 - 50

36. The dynamic allocation of storage areas with VSAM files is accomplished by

(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding

Ans:-B

Explanation:-VSAM stands for Virtual Storage Access Method. It was introduced by IBM. It is a method of managing files. It can speed up the access to data in the files. The dynamic allocation of storage areas with VSAM files is accomplished by Control Splits.


37. Which of the following command the file names in multiple columns ?

(A) IS–X
(B) IS
(C) IS – 1
(D) IS–f–X

Ans:-B

Explanation:- Although the command appears to look like IS, it should be understood as ls. There is no command called IS anywhere i could think of. ls with a -1 option will list only one entry per line. So option C is ruled out. The purpose of -X option is to sort out the list alphabetically by entry extension. The purpose of -f option is not to sort the list alphabetically. This option also puts on the -a option. So all the files including hidden ones will be displayed. So what is the option which would list columnar listing of names.It is actually -C. But the output of ls -C and ls simply matches and so i have chosen option B as the right answer which is ls itself. If anyone has any other answer or explanation please post it and we can discuss it.


38. WINDOWS is a _________ operating.

(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive

Explanation:- I would straightaway go for the explanation here. The question is a typical UGC Net one intended to confuse the candidates. WINDOWS is specified, no specific version or anything is given. If you consider windows 3.x, it was cooperative and non-preemptive. But windows 95,NT and 2000 are preemptive. Windows 3.x was not multi-user. But windows NT,2000 are multi-user. Again windows 3.x cannot be categorized as a real time operating system also. Since the question itself has got some ambiguity you can choose whatever option which you feel and keep your fingers crossed about it. I would not go with Real time. Anything else i could go with. Please post any other way of understanding this question and the correct answer for this. Till then, i refrain from answering this question.


39. Page making process from main memory to disk is called

(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above

Ans:-C

Explanation:- Swapping is one of the memory management techniques used by the operating system. Since the size of the RAM is limited and finite, all the processes or programs to be executed cannot be made to fit in it. So the disk is also treated as an extension of the memory and is referred to as virtual memory. The page making process from main memory to disk is called swapping.


40.A Dead-lock in an Operating System is

(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above

Ans:-B

Explanation:- Deadlocks are undesirable. In a deadlock situation, processes never finish executing and system resources are tied up, preventing other jobs from ever starting. So the answer for this question is B.


41. Prototyping is used to

(A) test the software as an end product
(B) expand design details
(C) refine and establish requirements gathering
(D) None of the above

Ans:-C

Explanation:- Prototyping is one of SDLC model. It starts with requirement gathering and establishing a quick prototype which is an early approximation of a final product. This prototype is then evaluated by the customer/user and used to refine the requirements for the software to be developed. So, C is the option.


42. Which one of these are not software maintenance activity ?

(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope

Ans:-D

Explanation:- Actually i have had my own doubts with the answer for this question. I have referred to lots of materials and paper and resolved the correct answer for this. According to Lientz and Swanson, software maintenance can be divided into three components. corrective, adaptive and perfective maintenance. Corrective maintenance involves correcting errors or actual faults in the software. So this is option A. Adaptive maintenance is the changes needed as a consequence of some change in the environment in which the system must operate. And this is option B. Finally perfective maintenance refers to changes that originate from user requests. Infact adaptive and perfective categories can be joined together and called as enhancements which is option C. So the only one which is not talked about is option D and so D is the right answer.


43. The system specification is the first deliverable in the computer system engineering process which does not include

(A) Functional Description
(B) Cost
(C) Schedule
(D) Technical Analysis

Ans:-A

Explanation:- The system specification document describes the system and gives a high-level view of what the system will provide. The system specification is the guide that will allow details on hardware,software and test requirements. So i think functional description will not be a part of system specification. So the correct answer is A.


44. The COCOMO model was introduced in the book title “Software Engineering Economics” authored by

(A) Abraham Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth

Ans:-B

Explanation:- This is a fairly simple question. COCOMO model was introduced in the book authored by Barry Boehm. So the correct answer is B.


45. The Warnier diagram enables analyst

(A) to represent information hierarchy in a compact manner
(B) to further identify requirement
(C) to estimate the total cost involved
(D) None of the above

Ans:-A

Explanation:- The Warnier diagram enables analyst to represent information hierarchy in a compact manner. It is also referred to as Warnier-Orr diagram. It is a graphic charting technique used in software engineering for system analysis and design.


46. A data mart may contain

(A) summarised data
(B) de-normalized data
(C) aggregate departmental data
(D) All of the above

Ans:-D

Explanation:- Datawarehouses are huge. If a department has its own data mart, it can customize the data as the data flows into the data mart from the data warehouse. It can summarize,sort,select and structure its own data.So the option would be D.


47. Data mining is

(A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions.
(B) a tool that allows end users direct access and manipulation of data from within data- warehousing environment without the intervention of customised programming activity.
(C )a tool that helps end users extract useful business information from large database.
(D)All of the above

Ans:-A

Explanation:- Since it is a definition of Data Mining which is spoken about, option A is correct.


48. E-Choupal refers to

(A) calling meeting of Surpanches electronically.
(B) conducting Panchayat meeting using latest electronic gadgets.
(C) providing window of information to villagers and farmers in NIC network.
(D) None of the above

Ans:-C

Explanation:- E-Choupal is an initiative by ITC. Through this initiative they want to empower the farmers with expert knowledge. This would enhance his competitiveness in the global market.


49. The basic concepts of ethics in information society is/are

(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the above

Ans:-D

Explanation:- Nothing much. The basic concepts of ethics in information society is/are Responsibilty,Accountability and Liability. I think most of you would have guessed it anyway.


50. One of the distinguished features of super-computer over other category of computer is

(A) parallel processing
(B) highest accuracy level
(C) more speed
(D) more capacity

Ans:-A

Explanation:- Option B is ruled out. But all the other options also look similar but since they are asking about distinguished feature i would go with option A. Any other ideas please post.




Whew…we are done with December 2010 QP. Wait and watch for the next paper and discussion of its solutions.

Thursday 6 September 2012

December 2010 - Question 31-35

31. Object code is the output of ______.

(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler

Ans:-B

Explanation:- Again this is one of those questions where more than one option looks correct. I think option B is correct because both compiler and assembler converts the source language code to the object code. If anyone has any other version,please post it and we can discuss it.


32. 'Macro' in an assembly level program is _______.

(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding

Ans:-A

Explanation:-Looking at all the other options, the only one which seems more appropriate is option A.


33. Grammar of the programming is checked at ________ phase of compiler.

(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization

Ans:-C

Explanation:- The following are the main phases of a compiler and the activities done in each one of the phases.
1.Lexical Analysis:-In this phase the source program is split into what are called 'tokens'.
2.Syntax Analysis:-The tokens are grouped together into phrases which should match some specified grammar.Normally, one of the outputs of a syntax analysis phase would be a Abstract Syntax Tree.(AST)
3.Semantic Analysis:-This phase would traverse through the AST and refine it.
4.Intermediate code generation:-This phase generates a machine independent code.
5.Code optimization:-Use some strategies to optimize the code that is generated.
6.Code generation:-Generate the machine dependent code finally.
Symbol table generation and error handling would be part of almost all phases. So the grammar checking would be done at syntax analysis phase. Hence the option is C.


34. The register or main memory location which contains the effective address of the operand is known as

(A) pointer
(B) special location
(C) indexed register
(D) None of the above

Ans:-A


35. Macro-processors are ______.

(A) Hardware
(B) Compiler
(C) Registers
(D) None of the above

Ans:-B


December 2010 - Question No 26,27,28,29,30

26. Frequency shift keying is used mostly in

(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above

Ans:-B

Explanation:- Frequency shift keying is a method of transmitting digital signals.FSK was mostly used in telegraphy. The two binary states 0 and 1 are represented by a specific analog waveform in FSK. Nowadays, a modem converts the binary data into FSK for transmitting across telephone lines and does the reverse at the receiving end. There is one more method of transmitting digitals signals where the phase of a transmitted signal is varied to convey information. This is called Phase Shift Keying(PSK).


27. The baud rate is

(A) always equal to the bit transfer rate
(B) equal to twice the bandwidth of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth of an ideal channel

Ans:-B

Explanation:-

The baud rate of a data communication system is the number of symbols per second transferred. It is equal to twice the bandwidth of an ideal channel.


28.How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron ?

(A) 300 MHz
(B) 3 GHz
(C) 300 THz
(D) 30 KHz

Ans:-D


29. Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ?

(A) FTP
(B) TFTP
(C) TELNET
(D) NFS

Ans:-A

Explanation:- There could be a ambiguity between the options A and B for this one. C and D are ruled out. So, what is the difference between FTP and TFTP. The purpose of both the protocols is to obtain files from a remote host. But TFTP stands for trivial file transfer protocol. It is not very reliable or secure. It uses the packet delivery service offered by UDP. On the other hand, FTP stands for File Transfer Protocol. It is a mechanism provided by TCP/IP. It uses the services offered by TCP. It is reliable and secure. It establishes two connections(virtual circuits)between the hosts, one for data transfer and another for control information. So the answer for this question is option A.


30. The threshold effect in demodulator is

(A) exhibited by all demodulator, when the input signal to noise ratio is low.
(B) the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
(C) the property exhibited by all A.M. suppressed carrier coherent demodulator.
(D) the property exhibited by correlation receiver.

Ans:-B


Wednesday 5 September 2012

December 2010 - Question No 24 & 25

24. Linear probing suffers from a problem known as

(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these

Ans:-B

Explanation:- Linear probing is a term associated with hashing. Linear probing is a collision resolving technique in hashing. It suffers from a problem known as primary clustering. Any chosen hash function should uniformly distribute the records across the given available address space but sometimes clusters appear. If linear probing is used, it might spend a lot of time probing within the cluster instead of searching in the subsequent available space. One more collision resolving technique is Quadratic probing. Again we might come across the same topic depending on the nature of question encountered in future.


25. Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ?

(A) 90, 40, 65, 50, 88
(B) 90, 110, 80, 85, 88
(C) 190, 60, 90, 85, 88
(D) 65, 140, 80, 70, 88

Ans:-C

Explanation:- Inorder to find a solution for a question like above, given the data draw a binary search tree for each one of the options. The first item is the root. Any value less than the root will form the left side of the tree and any value greater than the root will form the right side of the tree. When you draw such a tree, if you find no node has a left and right child then such a sequence would be valid. If you find that the tree has a left and right child for any node then that sequence is invalid. If you draw the tree for all the 4 options given in the question you will find that only option C does not have left and right child for any node. So option C is correct.

December 2010 - Question No 21 & 22 & 23

21. What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0) ?

(A) 111
(B) 999
(C) 9999
(D) None of the above

Ans:-C

Explanation:-
The formula for calculating the maximum number of nodes in a B-tree of order order n of depth h is
mh+1-1
Here, m=10 and h=3. So the formula becomes
104-1 which is 10000-1=9999 and therefore C is the correct option.


22. A binary tree with 27 nodes has _______ null branches.

(A) 54
(B) 27
(C) 26
(D) None of the above

Ans:-D

Explanation:-
This is quite a straightforward one. A binary tree with n nodes has n+1 null branches. So a binary tree with 27 nodes will have 28 null branches. Since 28 is not available as a option, D is the correct answer.
There is some question based on binary trees or trees in most of the NET paper. The following question is from June 2011 paper and this is also based on trees.

The number of different trees with 8 nodes is

(A) 256
(B) 255
(C) 248
(D) None of these

Ans:-C

Explanation:-

The number of different trees with n nodes can be calculated as 2n-n. Here the value of n=8. So, the formula would become
28-8=256-8=248
So the answer is 248 and so the option is C.


23. The time complexity to build a heap of n elements is

(A) 0(1)
(B) 0(lgn)
(C) 0(n)
(D) 0(nlgn)

Ans:-C

Explanation:-
The WORST CASE COMPLEXITY to build a heap of n elements is the option C.

Tuesday 4 September 2012

December 2010 - Question No 19 & 20

19. Optical storage is a

(A) high-speed direct access storage device.
(B) low-speed direct access storage device.
(C) medium-speed direct access storage device.
(D) high-speed sequential access storage device.

Ans:-B

Explanation:-

Actually the same question is available in the book "Database systems:Concepts, Design and application" by S.K.Singh. There are lot of questions at the end of every chapter in that book. According to the book, since the head assembly is heavier, DVD and CD drives have much longer seek time as compared to magnetic-disk drives. Rotational speeds of DVD and CD drives are lower than that of magnetic disk drives. So the answer for the above question is B which is optical storage is a low speed direct access storage device.

20. Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges ?

(A) Authorization
(B) Authentication
(C) Access Control
(D) All of these

Ans:-C

Explanation:-

In order to understand the answer for this we need to know the difference between authorization, authentication and access control. It is well explained in oracle docs.
Authentication is the process by which a user's identity is checked.
Authorization is the process by which the user's privileges are ascertained.
Access control is the process by which the user's access to physical data in the application is limited, based on his privileges.

December 2010 - Question No 18

18. Which of the following is an optimistic concurrency control method ?

(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these

Explanation:-

In order to know the answer for this let us first go through what concurrency control means. When many people try to make modifications to a database at any point of time, there should be a system of controls in place to ensure that changes made by one do not adversely affect the other. This is called concurrency control. THere are basically two major categories of concurrency control and types under them.
Types of concurrency control
  1. Pessimistic methods
    1. Timestamp ordering methods
    2. Serialization graph testing
    3. Locking methods
  2. Optimistic methods
    1. Backward validation methods
    2. Forward validation methods
    3. Hybrid methods
The main idea behind pessimistic method is that it is assumed that transaction could be problem prone. In optimistic method it is assumed that transaction may not face any problem. Optimistic methods are deadlock-free whereas pessimistic method is deadlock-prone. We can look at it in detail depending on any question which we will come across in future. In june 2011 paper -II we had the following question.
The basic variants of time-stamp- based method of concurrency control are
(A) Total time stamp-ordering
(B) Partial time stamp ordering
(C) Multiversion Time stamp ordering
(D) All of the above
We will look at all such questions later.

Ans:-A

December 2010 - Question No 17

17. The dependency preservation decomposition is a property to decompose database schema D, in which each functional dependency X → Y specified in F,

(A) appeared directly in one of the relation schemas Ri in the decomposed D.
(B) could be inferred from dependencies that appear in some Ri.
(C) both (A) and (B)
(D) None of these

Explanation:- The question itself requires a bit of explanation. It is not enough if you just know what is the right answer but you must also know why it is the right answer. The explanation would be a bit lengthy. Let us first dissect the question and explain some terms in terms of DBMS.

Decomposition - This means replacing a relation with a collection of smaller relations.

Relation - Relation is known as Table.

Relation Schema - This is known as Table definition. Relation Schema for a "student" relation can be shown in the following way:
Student(FirstName,LastName,DOB,Gender,Course,Regno,Address)

Definition of Dependency preservation decomposition:-
Each FD specified in F either appears directly in one of the relations in the decomposition, or be inferred from FDs that appear in some relation.

Let us consider an example for Dependency preservation

Let R be a relation R(A B C D)
Let there be 3 functional dependencies.
FD1: A->B
FD2: B->C
FD3: C->D
Let the relation R be decomposed into two more relations.
R1(A B C)  :  R2(C D)
Let us first consider the relation R1(A B C). Here between A and B the functional dependency FD1 is preserved. Between B and C, FD2 is preserved.
Let us now consider the second relation R2(C D). Between C and D the FD, FD3 is preserved. So in the two relations R1 and R2, all the 3 functional dependencies are preserved.

Let us consider an example for Non-dependency preservation

Let R be a relation R(A B C D) Let there be again 3 functional dependencies.
FD1:A->B
FD2:B->C
FD3:C->D
Let the relation be decomposed into two more relations>
R1(A C D) R2(B C)
Let us first consider the relation R1(A C D). There is no FD between A and C. There is a FD3 between C and D.
Now let us consider the second relation R2(B C). There is FD2 between B and C.
So, the two relations only support only FD's FD2 and FD3. FD1 is not supported. So these relations does not preserve dependency.
Generally there are three desirable properties of a decomposition.

  1. Lossless
  2. Dependency preservation
  3. Minimal redundancy
The above question was based on dependency preservation decomposition. This example has been taken from the dependency preservation presentation by Jason Allen. The explanation is quite good there.

SUMMARY:-

The dependency preservation decomposition is a property to be considered for decomposing a relation into two or more smaller relations. The functional dependency X->Y specified in F can appear directly in one of the relation schemas Ri in the decomposed D or it could be inferred from dependencies that appear in some Ri. So the answer for this question is C.

Ans:-C

Monday 3 September 2012

December 2010 - Question 15 & 16

15. "Black” refers in the “Black-box” testing means

(A) Characters of the movie “Black”
(B) I–O is hidden
(C) Design is hidden
(D) Users are hidden

Explanation:-

For obvious reasons, option A is ruled out. Now let us look at the meaning of black box testing. The term "Black box" refers to the actual software that is getting tested. In black box testing one knows only the set of inputs and expected outputs and is unaware of how those inputs are transformed into outputs by the software. So option C seems to be the right choice.

There are many types of black box testing techniques. It is better to know some of them by name.

  1. Boundary Value Analysis(BVA)
  2. Equivalence Class Testing
  3. Decision Table based testing
  4. Cause-Effect Graphing Technique
Depending on any more questions based on black box testing we can go through the techniques in detail later. I think knowing some technique names could be useful for now.


Ans:-C

16. In generalisation, the differences between members of an entity is

(A) maximized
(B) minimized
(C) both (A) & (B)
(D) None of these

Ans:-B

Explanation:-

Generalisation and specialization are two terms that have a opposite meaning. In generalization the differences between members of an entity is minimized. Generalisation is a bottom up process. It goes from more specific to more general. For example, if the subclasses are taken as car and bike they would fall under the category of superclass called vehicle. From the subclasses we would identify features which can take us to the superclass vehicle.

Specialisation is the opposite of this. In Specialisation the differences between members of an entity are maximized. Specialisation is a top down process. It goes from more general to more specific. If vehicle is a super class and car and bike are its subclasses, identifying the characteristics or uniqueness of its subclasses is what happens in specialization.

It is a sort of repeatedly asked question. In June 2010 the following question appeared.

Generalization is _______ process.

(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these

The answer of course is B, Generalisation is a bottom up process.
To summarise,
Generalisation - Bottom up - Differences between members of an entity is minimized.
Specialisation - Top down - Differences between members of an entity is maximized.
This could be a very important question. Please go through it again if need be.

Sunday 2 September 2012

December 2010 - Question No 14

Which one of the following sentences is true ?

(A) The body of a while loop is executed at least once.
(B) The body of a do ... while loop is executed at least once.
(C) The body of a do ... while loop is executed zero or more times.
(D) A for loop can never be used in place of a while loop.

Ans:-B

Explanation:- Since this question is a very simple and easy one i am posting the answer for this also today. Otherwise my idea was to take one question, explore it, analyze and then try to present the answer. Although many of the readers must be knowing this answer i still want to emphasize that the body of a do…while loop is executed at least once, since the condition is tested at the bottom. In case of while loop and for loop, the condition is tested at the top of the loop, so there are chances that they may not be executed at all. But that is not the case with the do…while loop. A do…while loop will be executed at least once.

December 2010 - Question No 13

Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise ?


(A) if (x=3)y=5
(B) if x==3(y=5)
(C) if (x==3);y=5
(D) if (x==3)y=5

ANS:-D

EXPLANATION:-
It is always tricky to answer such questions where options look similar. In such cases it is a better approach to remove all the apparent wrong options and then go for the tricky ones. In this question option A is ruled out because it is given as x=3, and = is not a comparison operator but a assignment operator and so x will be assigned the value of 3 and not compared. so A is ruled out. C is also ruled out because the presence of a ; at the end of (x==3) makes it as a independent statement and so the next statement which is y=5 will be executed irrespective of the result of the comparison. So C is ruled out.

Now we are left with only two options. It is either B or D. Since traditionally we enclose the operator to be compared within parenthesis i would choose D as the right answer. If anyone has any other explanation please post it to me.

Saturday 1 September 2012

December 2010 Question Paper - Question No 12

12. The value of the following expression (13 / 4 * 3) % 5 + 1 is
(A) 5.75
(B) 2.95
(C) 1.4875
(D) 5
The answer is (D)




Explanation:-

The explanation for this question is very simple. According to the precedence of the different binary operators in C, * / and % precedes that of + and -. Since the expression enclosed in parenthesis is executed first, the expression which would be executed first is (13 / 4 * 3). Since all these operators precedence is the same, they would execute from left to right and so 13 / 4 gets executed first.
13 / 4 = 3
This intermediate answer is multiplied with 3 in order to get the answer 9.
3 * 3 = 9
The next expression would be 9 % 5. The result is 4.
% is the mod operator. It gives the remainder of dividing two numbers.
9 % 5 = 4
Finally this 4 is added to 1 to get the final result of 5.
It is always better to just know the precedence chart table of the different operators in C.