NEW**UGC NET Solved Papers Held On June 2015

Download Admit Card
                                Important Dates      Schedule Of Examination       Eligibility      
Showing posts with label important notes of DBMS. Show all posts
Showing posts with label important notes of DBMS. Show all posts

April 17, 2013

Imporatant Notes Of Computer Architecture

<<--BACK

31-Time for which D-input of D-FF must not change after clock is applied is known as-Hold time.
32-How many memory chips of (128 x 8) are needed to provide memory capacity of 4096x16?  64
33-In addition of two signed numbers, represented in 2' s complement form generates an overflow if-A B 1
34-Addition of (1111)2 to a 4 bit binary number 'a' results:- No change
35-In a microprocessor system, suppose. TRAP, HOLD, RESET Pin got activated at the same time, while the processor was executing some instructions, then it will first respond to-None
36-Pseudo instructions are-Machine instructions
37-An attempt to access a location not owned by a Program is called-Address fault
38-Dynamic RAM consumes _Less_ Power and _Slower_ then the Static RAM.
39-Which flag of 8085's flag register is not accessible to programmer directly?Auxiliary carry flag
40-Cache memory works on the principle of-Locality of reference
41- Which of the following is a Pseudo instruction?- END
42- A demultiplexer can be used as- Decoder
43- Excess-3 equivalent representation of (1234)H is- (4567)Ex-3
44- Which of the memory holds the information when Power Supply is switched off?- EEROM
45- Minimum no. of NAND gate required to implement a Ex-OR function is- 4
46- Which of the following interrupt is maskable?- RST 7.5
47- Which of the following expression is not equivalent to x?- x NOR 1
48- Word 20 contains 40  ; Word 30 contains 50  ; Word 40 contains 60  ; Word 50 contains 70
Which of the following instructions does not, load 60 into the Accumulator- Load direct 30
49- An interrupt for which hardware automatically transfers the program to a specific memory location is known as- Hardware interrupt
50- Synchronous means at the same time
51- 'n' Flip flops will divide the clock frequency by a factor of- n
52- In DMA the data transfer is controlled by- I/O devices
53- The number of instructions needed to add a numbers an store the result in memory using only one address instruction is- Independent of n
54- Negative numbers cannot be represented in- 2's complement form
55- Which of the following architecture is/are not suitable for realizing SIMD- Von Neumann
56- In Boolean expression A+BC equals- (A+B)(A+C)
57- A JK flip-flop can be implemented using D flip-flop connected such that-(A+B)(A+c)
58- An effective solution to the power consumption problem lies in using transistors to implement ICs.- both NMOS & PMOS
59- Memory interleaving technique is used to address the memory modules in order to Have- reduced complexity in mapping hardware
60- In a multiprogramming system, which of the following is used- Paging concept

Important Objectives for DBMS

<<--BACK
31-Cartesian product-produce the relation that has attributes  of R1 and R2
32-File organization that provides very fast access to any arbitrary record of a file is -Hashed file
33-Which of the following is correct:
(A) SQL query automatically eliminates duplicates.
(B) SQL permits attribute names to be repeated in the same relation.
(C) SQL query will not work if there are no indexes on the relations
(D) None of these           Ans-D
34- It is better to use files than a DBMS when there are -Multiple users wish to access the data.
35-The conceptual model is-independent of both hardware and software.
36-Which of the following operation is used if we are interested in only certain columns of a table?–projection
37-Which of the following operations need the participating relations to be union compatible?
(A) UNION  (B) INTERSECTION  (C) DIFFERENCE    (D) All of the above Ans-D   
38-Which of the following is an advantage of view? 
(A) Data security (B) Derived columns (C)  Hiding of complex queries (D) All   Ans-D
39-The user who use easy-to-use menu are called-Natïve users   
40-Which database level is closest to the users? 
(A) External (B) Internal (C) Physical  (D) Conceptual    Ans-A
41-Which are the two ways in which entities can participate in a relationship?-Total and partial
42-The result of the UNION operation between R1 and R2 is a  relation that includes-all the tuples of R1 and R2 which have common columns
43-Which of the following is a comparison operator in SQL?   
(A) =           (B) LIKE      (C) BETWEEN      (D) All of the above  Ans-D
44-A set of possible data values is called-Domain
45-Which of the operation constitute a basic set of operations for manipulating relational data?Relational  algebra
46-Which of the following is another name for weak entity? - Child
47-Which of the following database object does not physically exist?-View
48-NULL is
(A) the same as 0 for integer  (B) the same as blank for character
(C) the same as 0 for integer and blank for character (D) not a value Ans: D
49-Which of the following is record based logical model? - Network Model
50-A data dictionary is a special file that contains:
(A) The name of all fields in all files.       (B) The width of all fields in all files.
(C) The data type of all fields in all files. (D) All of the above.  Ans: D
51-A file manipulation command that extracts some of the records from a file is called - SELECT
52-The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is :- B-Tree File
53-Using Relational Algebra the query that finds customers, who have a balance of over 1000 is - PCustomer_name(s balance >1000(Deposit))
54-In E-R Diagram derived attribute are represented by  -Dashed ellipse
55-Cross Product is a:- Binary Operator
56-An instance of relational schema R (A, B, C) has distinct values of A including NULL values. Which one of the following is true?- A is not a candidate key
57-Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the maximum size of join is: - mn
58-The natural join is equal to :- Combination of projection and Cartesian product
59-Which one of the following is not true for a view:
(A) View is derived from other tables.  (B) View is a virtual table.
(C) View definition is permanently stored as part of database
(D) View never contains derived columns.      Ans-C
60-In E-R Diagram relationship type is represented by  -Diamond
61-To delete a particular column in a relation the command  used is:-Alter
62-The ______ operator is used to compare a value to a list of literals values that have been specified.- BETWEEN
63-A B-tree of order m has maximum of ______children – m
64-In E-R diagram generalization is represented by-Triangle
65-View is a virtual table that draws its data from the result of an SQL  SELECT statement.
66-_________ data type can store unstructured data- RAW
67-Which two files are used during operation of the DBMS-Data dictionary and transaction log


April 14, 2013

Important Descriptive Question part2


<<BACK

Q10: What is parsing? Explain any three parsing techniques.?
Ans: Parsing is the process of analyzing a text made of a sequence of tokens to determine its grammatical structure with respect to a given formal grammar. Parsing is also known as syntactic analysis and parser is used for analyzing a text. The task of  parser is essentially to determine if and how the input can be derived from the start symbol of the grammar.
Following are three parsing techniques:
Top-down parsing - Top-down parsing can be viewed as an attempt to find left-most derivations of an input-stream by searching for parse trees using a top-down expansion of the given formal grammar rules. Tokens are consumed from left to right.Inclusive choice is used to accommodate ambiguity by expanding all alternative righthand-sides of grammar rules.
Bottom-up parsing - A parser can start with the input and attempt to rewrite it to the start symbol. Intuitively, the parser attempts to locate the most basic elements, then the elements containing these, and so on. LR parsers are examples of bottom-up parsers. Another term used for this type of parser is Shift-Reduce parsing.
Recursive descent parsing- It is a top down parsing without backtracking. This parsing technique uses a set of recursive procedures to perform parsing. Salient advantages of recursive descent parsing are its simplicity and generality. It can be implemented in any language supporting recursive procedures.

Q11: Explain any three policies for process scheduling that uses resource consumption information. What is response ratio?
Ans: Three policies for process scheduling are described below in brief:
1. First-come First-served (FCFS) (FIFO)
– Jobs are scheduled in order of arrival
– Non-preemptive
Problem:
– Average waiting time can be large if small jobs wait behind long ones
– May lead to poor overlap of I/O and CPU and convoy effects
2. Shortest Job First (SJF)
– Choose the job with the shortest next CPU burst
– Provably optimal for minimizing average waiting time
Problem:
– Impossible to know the length of the next CPU burst
3. Round Robin(RR)
– Often used for timesharing
– Ready queue is treated as a circular queue (FIFO)
– Each process is given a time slice called a quantum
– It is run for the quantum or until it blocks
– RR allocates the CPU uniformly (fairly) across all participants. If average queue length is n, each
   participant gets 1/n 
– As the time quantum grows, RR becomes FCFS
– Smaller quanta are generally desirable, because they improve response time
Problem:
– Context switch overhead of frequent context switch

Q12: Macros Vs Subroutines
Ans: (i) Macros are preprocessor directives i.e. it is processed before the source program is passed to the compiler.
Subroutines are blocks of codes with a specific task, to be performed and are directly passed to compiler.
(ii) In a Macros call the preprocessor replaces the macro template with its macro expansion, in a literal way.
(iii) Macros increases the program size.

Q.13: Write short notes on:     (i) YACC    (ii) Debug monitors
Ans: (i)YACC stands for “Yet another Compiler-Compiler” : Computer program input generally has some structure; in fact, every computer program that does input can be thought of as defining an “input language” which it accepts. An input language may be as complex as a programming language, or as simple as a sequence of numbers. Unfortunately, usual input facilities are limited, difficult to use, and often are lax about
checking their inputs for validity.
YACC provides a general tool for describing the input to a computer program. The YACC user specifies the structures of his input, together with code to be invoked as each such structure is recognized. YACC turns such a specification into a subroutine that handles the input process; frequently, it is convenient and appropriate to have most of the flow of control in the user's application handled by this subroutine. The output from YACC is LALR parser for the input programming laughing
(ii)Debug monitors provide debugging support for a program. A debug monitor executes the program  being debugged under its own control thereby providing execution efficiency during debugging. There are debug monitors that are language independent and can handle programs written in many languages. For example-DEC-
Debug monitor provide the following facilities for dynamic debugging:
1. Setting breakpoints in the program
2. Initiating a debug conversation when control reaches a breakpoint.
3. Displaying values of variables
4. Assigning new values to variables.
5. Testing user defined assertions and predicates involving program variables.

Q14: Define deadlock? Explain the necessary conditions for deadlock to occur.
Ans: Deadlock is a situation, in which processes never finish executing and system resources are tied up, preventing other jobs from starting. A process requests resources; if the resources are not available at that time, the process enters a wait state. Waiting processes may never again change state, because the resources they have requested are held by other waiting processes, thereby causing deadlock.Necessary conditions for deadlock to occur are:
i. Mutual exclusion: At least one resource must be held in a nonsharable mode; that is, only one process at a time can use the resource. If another process requests that resource, the requesting process must be delayed until the resource has been released.
ii. Hold and wait: A process must be holding at least one resource and waiting to acquire additional resources that are currently being held by other processes.
iii. No pre-emption: Resources cannot be pre-empted; that is, a resource can be released only voluntarily by the process holding it, after the process holding it has completed its task.
iv. Circular wait: A set{P0, P1,……, Pn) of waiting processes must exist such that P0 is waiting for a resource that is held by P1, P1 is waiting for a resource that is held by P2, ……., Pn-1 is waiting for a resource that is held by Pn and Pn is waiting for a resource that is held by P0. All four conditions must hold simultaneously for a deadlock to occur and conditions are not completely independent. For example, the circular-wait implies the hold-and wait condition.