NEW**UGC NET Solved Papers Held On June 2015

Download Admit Card
                                Important Dates      Schedule Of Examination       Eligibility      

April 19, 2013

Important Objectives Of System Software and Operating System

1   2   

1-Translator for low level programming language were termed as-Assembler
2-Analysis which determines the meaning of a statement once its grammatical structure becomes known is termed as-Semantic analysis
3-Load address for the first word of the program is called-load address origin
4-Symbolic names can be associated with-data or instruction
5-The translator which perform macro expansion is called a-Macro pre-processor
6-Shell is the exclusive feature of-UNIX
7-A program in execution is called-Process
8-Interval between the time of submission and completion of the job is called-Turnaround time
9-A scheduler which selects processes from secondary storage device is called-Medium term scheduler.
10-The scheduling in which CPU is allocated to the process with least CPU-burst time is called-Shortest job first Scheduling
11-The term ‘page traffic’ describes-the movement of pages in and out of memory.
12-The “turn-around” time of a user job is the-total time taken to execute the job.
13-Which of the following can be used as a criterion for classification of data structures used in language processing. A-nature of a data structure B-purpose of a data structure C-lifetime of a data structure D-All  Ans-D
14-Memory utilization factor shall be computed as follows-memory in use/total memory connected.
15-Program ‘preemption’ is-forced deallocation of the CPU from a program which is executing on the CPU.
16-An assembler is-machine dependant.
17-Which of the following is not a fundamental process state-
(A) ready (B) terminated(C) executing (D) blocked  Ans-D
18-Which of the following is true?
(A) Block cipher technique is an encryption technique.
(B) Steam cipher technique is an encryption technique.
(C) Both (A) and (B).  (D) Neither of (A) and (B).                       Ans-C
19-Which of the following approaches do not require knowledge of the system state?
(A) deadlock detection. (B) deadlock prevention.(C) deadlock avoidance. (D) none of the above.                  Ans-D
20-Program generation activity aims at-Automatic generation of program
21-Which amongst the following is not an advantage of Distributed systems?
(A) Reliability (B) Incremental growth (C) Resource sharing (D) None of the above     Ans: (A)
22- An imperative statement- Indicates an action to be performed during execution of assembled program
23- Which of the following loader is executed when a system is first turned on or Restarted- Bootstrap loader
24- Poor response time is usually caused by-
(A) Process busy (B) High I/O rates (C) High paging rates (D) Any of the above     Ans-D
25- “Throughput” of a system is- Number of programs processed by it per unit time


April 17, 2013

Imporatant Notes Of Computer Architecture

<<--BACK

31-Time for which D-input of D-FF must not change after clock is applied is known as-Hold time.
32-How many memory chips of (128 x 8) are needed to provide memory capacity of 4096x16?  64
33-In addition of two signed numbers, represented in 2' s complement form generates an overflow if-A B 1
34-Addition of (1111)2 to a 4 bit binary number 'a' results:- No change
35-In a microprocessor system, suppose. TRAP, HOLD, RESET Pin got activated at the same time, while the processor was executing some instructions, then it will first respond to-None
36-Pseudo instructions are-Machine instructions
37-An attempt to access a location not owned by a Program is called-Address fault
38-Dynamic RAM consumes _Less_ Power and _Slower_ then the Static RAM.
39-Which flag of 8085's flag register is not accessible to programmer directly?Auxiliary carry flag
40-Cache memory works on the principle of-Locality of reference
41- Which of the following is a Pseudo instruction?- END
42- A demultiplexer can be used as- Decoder
43- Excess-3 equivalent representation of (1234)H is- (4567)Ex-3
44- Which of the memory holds the information when Power Supply is switched off?- EEROM
45- Minimum no. of NAND gate required to implement a Ex-OR function is- 4
46- Which of the following interrupt is maskable?- RST 7.5
47- Which of the following expression is not equivalent to x?- x NOR 1
48- Word 20 contains 40  ; Word 30 contains 50  ; Word 40 contains 60  ; Word 50 contains 70
Which of the following instructions does not, load 60 into the Accumulator- Load direct 30
49- An interrupt for which hardware automatically transfers the program to a specific memory location is known as- Hardware interrupt
50- Synchronous means at the same time
51- 'n' Flip flops will divide the clock frequency by a factor of- n
52- In DMA the data transfer is controlled by- I/O devices
53- The number of instructions needed to add a numbers an store the result in memory using only one address instruction is- Independent of n
54- Negative numbers cannot be represented in- 2's complement form
55- Which of the following architecture is/are not suitable for realizing SIMD- Von Neumann
56- In Boolean expression A+BC equals- (A+B)(A+C)
57- A JK flip-flop can be implemented using D flip-flop connected such that-(A+B)(A+c)
58- An effective solution to the power consumption problem lies in using transistors to implement ICs.- both NMOS & PMOS
59- Memory interleaving technique is used to address the memory modules in order to Have- reduced complexity in mapping hardware
60- In a multiprogramming system, which of the following is used- Paging concept

Important objectives of Computer Architecture



1-An address used by programmers in a system supporting virtual memory concept is called virtual address and the set of such addresses are called address space.

2-The method for updating main memory as soon as word is removed fromCache is called- write-back

3-A control character is sent at the beginning as well as at the end of each block in the   synchronous-transmission in order to-Supply information needed to separate the incoming bits into individual character.

4-In non-vectored interrupt, the address of interrupt service routine is -Assigned to a fixed memory location.

5-Divide overflow is generated when-Sign of the dividend is same as that of divisor.

6-Which method is used for resolving data dependency conflict by compiler Itself-Delayed load.

7-Stack overflow causes-Internal interrupt.

8-Arithmetic shift left operation-Produces the same result as obtained with logical shift left operation. For Example-
Important objectives of Computer Architecture


9-Zero address instruction format is used for-Stack-organized architecture.

10-Address symbol table is generated by the-assembler.

11-The negative numbers in the binary system can be represented by-2's complement

13-ABCD - seven segment decoder / driver in connected to an LED display.

Which segments are illuminated for the input code DCBA = 0001. A)b, c

14-How many flip-flops are required to produce a divide-by-32 device? 5

15-The content of a 4-bit register is initially 1101. The register is shifted 2 times to the right with the serial input being 1011101. What is the content of the register after each shift?- 1110, 0111
16-How many different addresses are required by the memory that contain 16K words?- 16,384
17-What is the bit storage capacity of a ROM with a 512' 4-organization?- 2048  
18-DMA interface unit eliminates the need to use CPU registers to transfer data From-Memory to I/O units

19-How many 128 x 8 RAM chips are needed to provide a memory capacity of  2048 bytes?-16

20-Which of the following is a self complementing code?-8421

21-Which gate can be used as anti-coincidence detector?-XOR
22-Which of the following technology can give high speed RAM?- ECL
23-In 8085 microprocessor how many I/O devices can be interfaced in I/O mapped I/O technique?- 256 input devices & 256 output devices.
24-After reset, CPU begins execution of instruction from memory address-0000H
25-Which is true for a typical RISC architecture?- Micro programmed control unit.
26-When an instruction is read from the memory, it is called-Fetch cycle
27-Which activity does not take place during execution cycle?- Branch address is calculated & Branching conditions are checked.
28-A circuit in which connections to both AND and OR arrays can be programmed is called-RAM
29-If a register containing data (11001100)2 is subjected to arithmetic shift left operation, then the content of the register after 'ashl' shall be-(10011000)2
30-Which logic is known as universal logic? NAND logic.

Important Objectives for DBMS

<<--BACK
31-Cartesian product-produce the relation that has attributes  of R1 and R2
32-File organization that provides very fast access to any arbitrary record of a file is -Hashed file
33-Which of the following is correct:
(A) SQL query automatically eliminates duplicates.
(B) SQL permits attribute names to be repeated in the same relation.
(C) SQL query will not work if there are no indexes on the relations
(D) None of these           Ans-D
34- It is better to use files than a DBMS when there are -Multiple users wish to access the data.
35-The conceptual model is-independent of both hardware and software.
36-Which of the following operation is used if we are interested in only certain columns of a table?–projection
37-Which of the following operations need the participating relations to be union compatible?
(A) UNION  (B) INTERSECTION  (C) DIFFERENCE    (D) All of the above Ans-D   
38-Which of the following is an advantage of view? 
(A) Data security (B) Derived columns (C)  Hiding of complex queries (D) All   Ans-D
39-The user who use easy-to-use menu are called-Natïve users   
40-Which database level is closest to the users? 
(A) External (B) Internal (C) Physical  (D) Conceptual    Ans-A
41-Which are the two ways in which entities can participate in a relationship?-Total and partial
42-The result of the UNION operation between R1 and R2 is a  relation that includes-all the tuples of R1 and R2 which have common columns
43-Which of the following is a comparison operator in SQL?   
(A) =           (B) LIKE      (C) BETWEEN      (D) All of the above  Ans-D
44-A set of possible data values is called-Domain
45-Which of the operation constitute a basic set of operations for manipulating relational data?Relational  algebra
46-Which of the following is another name for weak entity? - Child
47-Which of the following database object does not physically exist?-View
48-NULL is
(A) the same as 0 for integer  (B) the same as blank for character
(C) the same as 0 for integer and blank for character (D) not a value Ans: D
49-Which of the following is record based logical model? - Network Model
50-A data dictionary is a special file that contains:
(A) The name of all fields in all files.       (B) The width of all fields in all files.
(C) The data type of all fields in all files. (D) All of the above.  Ans: D
51-A file manipulation command that extracts some of the records from a file is called - SELECT
52-The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is :- B-Tree File
53-Using Relational Algebra the query that finds customers, who have a balance of over 1000 is - PCustomer_name(s balance >1000(Deposit))
54-In E-R Diagram derived attribute are represented by  -Dashed ellipse
55-Cross Product is a:- Binary Operator
56-An instance of relational schema R (A, B, C) has distinct values of A including NULL values. Which one of the following is true?- A is not a candidate key
57-Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the maximum size of join is: - mn
58-The natural join is equal to :- Combination of projection and Cartesian product
59-Which one of the following is not true for a view:
(A) View is derived from other tables.  (B) View is a virtual table.
(C) View definition is permanently stored as part of database
(D) View never contains derived columns.      Ans-C
60-In E-R Diagram relationship type is represented by  -Diamond
61-To delete a particular column in a relation the command  used is:-Alter
62-The ______ operator is used to compare a value to a list of literals values that have been specified.- BETWEEN
63-A B-tree of order m has maximum of ______children – m
64-In E-R diagram generalization is represented by-Triangle
65-View is a virtual table that draws its data from the result of an SQL  SELECT statement.
66-_________ data type can store unstructured data- RAW
67-Which two files are used during operation of the DBMS-Data dictionary and transaction log