CBSE NET JULY 2016 PAPER 3 SOLVED PART-4


Pages: 1 2 3 4 5


  1. Software safety is quality assurance activity that focuses on hazards that

(A) affect the reliability of a software component

(B) may cause an entire system to fail.

(C) may result from user input errors.

(D) prevent profitable marketing of the final product

Answer: B


  1. Which of the following sets represent five stages defined by Capability Maturity

Model (CMM) in increasing order of maturity?

(A) Initial, Defined, Repeatable, Managed, Optimized.

(B) Initial, Repeatable, Defined, Managed, Optimized.

(C) Initial, Defined, Managed, Repeatable, Optimized.

(D) Initial, Repeatable, Managed, Defined, Optimized.

Answer: B


  1. The number of function points of a proposed system is calculated as 500. Suppose that the system is planned to be developed in Java and the LOC/FP ratio of Java is 50. Estimate the effort (E) required to complete the project using the effort formula of basic

COCOMO given below:

E = a(KLOC)b

Assume that the values of a and b are 2.5 and 1.0 respectively.

(A) 25 person months (B) 75 person months

(C) 62.5 person months (D) 72.5 person months

Answer: C

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. In UNIX, processes that have finished execution but have not yet had their status collected are known as …………….

(A) Sleeping processes (B) Stopped Processes

(C) Zombie Processes (D) Orphan Processes

Answer: C


  1. In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process?

(A) Heap (B) Stack

(C) Shared memory segments (D) Both Heap and Stack

Answer: C


  1. Which of the following information about the UNIX file system is not correct?

(A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks.

(B) An i-node contains accounting information as well as enough information to locate all the disk blocks that holds the file’s data.

(C) Each i-node is 256-bytes long.

(D) All the files and directories are stored in data blocks.

Answer: C


  1. Which of the following option with reference to UNIX operating system is not correct?

(A) INT signal is sent by the terminal driver when one types <Control-C> and it is a request to terminate the current operation.

(B) TERM is a request to terminate execution completely. The receiving process will clean up its state and exit.

(C) QUIT is similar to TERM, except that it defaults to producing a core dump if not caught.

(D) KILL is a blockable signal.

Answer: D


  1. A Multicomputer with 256 CPUs is organized as 16×16 grid. What is the worst case delay (in hops) that a message might have to take?

(A) 16 (B) 15

(C) 32 (D) 30

Answer: D

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. Suppose that the time to do a null remote procedure call (RPC) (i.e, 0 data bytes) is 1.0 msec, with an additional 1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs?

(A) 49 msec (B) 80 msec

(C) 48 msec (D) 100 msec

Answer: B

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M. Consider the relation RM defined by M. As all states are reachable from the start state, RM has ……………. equivalence classes.

(A) 2 (B) 4

(C) 5 (D) 6

Answer: A


  1. Let L = {0n1n | n≥0} be a context free language.

Which of the following is correct?

(A) L’ is context free and Lk is not context free for any k≥1

(B) L’ is not context free and Lk is context free for any k≥1

(C) Both L’ and Lk is for any k≥1 are context free.

(D) Both L’ and Lk is for any k≥1 are not context free.

Answer: C

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. Given a Turing Machine

M = ({q0,q1,q2,q3}, {a,b}, {a,b,B}, δ, B, {q3})

Where δ is a transition function defined as

δ(q0,a) = (q1,a,R)

δ(q1,b) = (q2,b,R)

δ(q2,a) = (q2,a,R)

δ(q2,b) = (q3,b,R)

The language L(M) accepted by the Turing Machine is given as:

(A) aa*b (B) abab

(C) aba*b (D) aba*

Answer: C

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. Consider a discrete memoryless channel and assume that H(x) is the amount of information per symbol at the input of the channel; H(y) is the amount of information per symbol at the output of the channel; H(x|y) is the amount of uncertainty remaining on x knowing y; and I(x;y) is the information transmission.

Which of the following does not define the channel capacity of a discrete memoryless channel?

(A) max I(x;y)

p(x)

(B) max [(H(y) – H(y|x))]

p(x)

(C) max [(H(x) – H(x|y))]UGC net study material

p(x)

(D) max H(x|y)

p(x)

Answer: D

  1. Consider a source with symbols A, B, C, D with probabilities 1/2, 1/4, 1/8, 1/8 respectively. What is the average number of bits per symbol for the Huffman code generated from above information?

(A) 2 bits per symbol (B) 1.75 bits per symbol

(C) 1.50 bits per symbol (D) 1.25 bits per symbol

Answer: B

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/





  1. Which of the following is used for the boundary representation of an image object?

(A) Quad Tree (B) Projections

(C) Run length coding (D) Chain codes

Answer: D


Pages: 1 2 3 4 5

Leave a comment