CVV Answers
CVV Answers
restarted
The interval from the time of submission of a process to the time of completion is termed as
turnaround time
When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs
At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and
15 V operations were completed on this semaphore. The resulting value of the semaphore is? 2
Which of the following are the process of selecting the data storage and data access characteristics
of the database? Physical database design
The algorithm that takes a set of dependencies and adds one schema at a time, instead of
decomposing the initial schema repeatedly is 3NF synthesis algorithm
The refinement from an initial entity set into successive levels of entity subgroupings represents a
________ design process in which distinctions are made explicit. Top-down
When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs
Writing the buffered log to __________ is sometimes referred to as a log force. Disk
The systems which allow only one process execution at a time, are called uniprogramming
systems
CPU fetches the instruction from memory according to the value of: program counter
Which protocol allows user at one site to establish connection to another site and pass keystroke
from local to remote host? Telnet
Which one out of these is not a data link layer technology? HTTP
The normal form which satisfies multivalued dependencies and which is in BCNF is 4NF
If one thread opens a file with read privileges then other threads in the same process can also
read from that file
Which of the following are the process of selecting the data storage and data access characteristics
of the database? Physical database design
_________ is generally faster than _________ and ________ first fit, best fit, worst fit
Internet domain name and hostname are translated into IP address by___________ Domain
name system
_________________is the use of Ping command: To test a host on the network is reachable
Which operating system reacts in the actual time Real time system
At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and
15 V operations were completed on this semaphore. The resulting value of the semaphore is? 2
Which of the following are the process of selecting the data storage and data access characteristics
of the database? Physical database design
R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving
BCNF decomposition? AB->C, C->AD
When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs
The algorithm that takes a set of dependencies and adds one schema at a time, instead of
decomposing the initial schema repeatedly is 3NF synthesis algorithm
The first fit, best fit and worst fit are strategies to select a free hole from a set of available
holes
Which one out of these is not a data link layer technology? HTTP
What is a long-term scheduler ? It selects which process has to be executed next and allocates CPU
The main task carried out in the __________ is to remove repeating attributes to separate tables.
1NF
CPU fetches the instruction from memory according to the value of: program counter
In the __________ phase, the system replays updates of all transactions by scanning the log forward
from the last checkpoint. Redo
Which forms has a relation that possesses data about an individual entity 4NF
Which protocol allows user at one site to establish connection to another site and pass keystroke
from local to remote host? Telnet
______ is a special type of integrity constraint that relates two relations & maintains consistency
across the relations. Referential Integrity Constraints
When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs
In the __________ phase, the system replays updates of all transactions by scanning the log forward
from the last checkpoint. Redo
If one thread opens a file with read privileges then other threads in the same process can also
read from that file
_________________is the use of Ping command: To test a host on the network is reachable
Terms SSL and TLS stand for: Secure Socket Layers and Transport Layer Security
Relation dept year(dept name, total inst 2007, total inst 2008, total inst 2009). Here the only
functional dependencies are from dept name to the other attributes. This relation is in BCNF
The normal form which satisfies multivalued dependencies and which is in BCNF is 4NF
Which forms has a relation that possesses data about an individual entity 4NF
Internet domain name and hostname are translated into IP address by___________ Domain
name system
Which of the following terms does refer to the correctness and completeness of the data in a
database? Data integrity
There are 10 different processes running on a workstation. Idle processes are waiting for an input
event in the input queue. Busy processes are scheduled with the Round-Robin time sharing method.
Which out of the following quantum times is the best value tQ = 15ms
______ is a special type of integrity constraint that relates two relations & maintains consistency
across the relations. Referential Integrity Constraints
For a weak entity set to be meaningful, it must be associated with another entity set, called the
Identifying set
Which forms has a relation that possesses data about an individual entity 4NF
Interrupt table of pointers having addresses for each interrupt is located at low memory
Which forms has a relation that possesses data about an individual entity 4NF
When a page fault occurs before an executing instruction is complete if the instruction must be
restarted
In the __________ phase, the system replays updates of all transactions by scanning the log forward
from the last checkpoint. Redo
Which normal form is considered adequate for normal relational database design? 3NF
What is a long-term scheduler ? It selects which process has to be brought into the ready queue
The interval from the time of submission of a process to the time of completion is termed as
turnaround time
When a page fault occurs before an executing instruction is complete if the instruction must be
restarted
The first fit, best fit and worst fit are strategies to select a process from a queue to put in
memory
Which normal form is considered adequate for normal relational database design? 3NF
The refinement from an initial entity set into successive levels of entity subgroupings represents a
________ design process in which distinctions are made explicit. Top-down
What is the TCP name for a transport service access point? port
There are 10 different processes running on a workstation. Idle processes are waiting for an input
event in the input queue. Busy processes are scheduled with the Round-Robin time sharing method.
Which out of the following quantum times is the best value tQ = 15ms
________ determines which transactions to undo, which pages were dirty at the time of the crash,
and the LSN from which the redo pass should start. Analysis pass
The normal form which satisfies multivalued dependencies and which is in BCNF is 4NF
There are 10 different processes running on a workstation. Idle processes are waiting for an input
event in the input queue. Busy processes are scheduled with the Round-Robin time sharing method.
Which out of the following quantum times is the best value tQ=50ms
In fixed sized partition, the degree of multiprogramming is bounded by the CPU utilization
Which one out of these is not a data link layer technology? HTTP
Terms SSL and TLS stand for: Secure Socket Layers and Transport Layer Security
The interval from the time of submission of a process to the time of completion is termed as
turnaround time
R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving
BCNF decomposition? AB->C, C->AD
Each IP packet must contain___________ Source and destination IP Addresses
The algorithm that takes a set of dependencies and adds one schema at a time, instead of
decomposing the initial schema repeatedly is 3NF synthesis algorithm
Which one out of these is not a data link layer technology? HTTP
Which of the following are introduced to reduce the overheads caused by the log-based recovery?
Checkpoints
_________________is the use of Ping command: To test a host on the network is reachable
In fixed sized partition, the degree of multiprogramming is bounded by the number of partitions
Relation dept year(dept name, total inst 2007, total inst 2008, total inst 2009). Here the only
functional dependencies are from dept name to the other attributes. This relation is in BCNF
What is the TCP name for a transport service access point? port
Which operating system reacts in the actual time Real time system
For a weak entity set to be meaningful, it must be associated with another entity set, called the
Identifying set
What is the TCP name for a transport service access point? port
______ is a special type of integrity constraint that relates two relations & maintains consistency
across the relations. Referential Integrity Constraints
The address of the next instruction to be executed by the current process is provided by the
program counter
__________ denotes the largest timestamp of any transaction that executed write(Q) successfully.
R timestamp
The main task carried out in the __________ is to remove repeating attributes to separate tables.
1nf