1. Which of the following is not a solution representation in a genetic algorithm?
1. Binary valued
2. Real valued
3. Permutation
4. Combinations
Solution - (4) Combinations
2. Consider two hosts P and Q that are connected through a router R. The maximum transfer unit (MTU) value of the link between P and R is 1500 bytes and between R and Q is 820 bytes. A TCP segment of size 1400 bytes is transferred from P to Q through R with IP identification value of 0x1234. Assume that IP header size is 20 bytes. Further the peaket is allowed to be fragmented that is Don't fragment (DF) flag in the IP Header is not set by P.
Which of the following statement/s is/are true?
A. Two fragments are created at R and IP datagram size carrying the second fragment is 620 bytes B. If the second fragment is lost, then R resends the fragment with IP identification value of 0x1234
C. If the second fragment lost, then P requires to resend the entire TCP segment.
D. TCP destination port can be determined by analyzing the second fragment only.
Choose the correct answer from the options given below:
1. A. B and C only
2. A and C only
3. C and D only
4. B and D only
Solution - (2) A and C only
3. Consider the following statements:
S1: LRU page replacement algorithm suffers from the belady's anomaly
S2: Shortest remaining time first scheduling may cause starvations
S3: Stack is shared by all threads in a process
1. S1 S2 and S3 are true
2. S1. S3 false and S2 is true
3. S1. S2 are false and S3 is true
4. S1. S2 and S3 are false
Solution - (2) S1. S3 false and S2 is true
4. Which of the following transforms in 2 dimension is used to resize a 2-dimensional object?
1. Translation
2. Rotation
3. Scaling
4. Shearing
Solution - (3) Scaling
5. What is the output of following code?
main ()
{ static float a[ ] = { 13, 24, 1.5, 4.5, 5, 4, 3, 5}
float *j, *k:
j-a:
k=a + 4
j-j*2:
k=k/2:
printf("% f% f". *j. *k):
}
1. 13.25, 4.5
2.1.5, 3.5
3. 13.24, 1.5, 4.5, 5.4, 3.5
4. Illegal use of pointer in main functions
Solution - (4) Illegal use of pointer in main functions
6. let R (A.B.C. D) be a relational schema with following function dependencies:
A→B, B→C
C→D and D→B
The decomposition of R into
(A.B) (B,C) (B.D)
1. gives a lossless join, and is dependency preserving
2. gives lossless join, but is not dependency preserving
3. does not give a lossless join, but is dependency preserving
4. does not give a lossless join and is not dependency preserving
Solution (1) gives a lossless join, and is dependency preserving
7. Consider the following language:
L is
1. Context free but not linear
2. Not context free
3. Context free and linear
4. Linear
Solution (1). Context free but not linear
8. _____________ is intended to show that a system both conforms to its specifications and meets the expectations of the system customer.
1. Software specification
2. Software design
3. Software evaluation
4. software validation
Solution (4) software validation
9. Which one of the following is NOT a part of ACID properties of a database transaction?
1. Atomicity
2. Consistency
3. Isolation
4. Deadlock-freedom
Solution (4) Deadlock-freedom
Choose the correct answer from the options given below:
1. A-III B-II C-I D-IV
2. A-II B-III C-I D-IV
3. A-III B-I C-II D-IV
4. A-II B-IV C-I D-III
Solution (3) A-III B-I C-II D-IV