0% found this document useful (0 votes)
119 views13 pages

CVV Answers

When a page fault occurs before an executing instruction is complete, the instruction must be restarted. A solution to the problem of external fragmentation is compaction. The resulting value of the semaphore after 20 P operations and 15 V operations on a semaphore initially valued at 7 is 2.

Uploaded by

vishnu vardhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views13 pages

CVV Answers

When a page fault occurs before an executing instruction is complete, the instruction must be restarted. A solution to the problem of external fragmentation is compaction. The resulting value of the semaphore after 20 P operations and 15 V operations on a semaphore initially valued at 7 is 2.

Uploaded by

vishnu vardhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

When a page fault occurs before an executing instruction is complete if the instruction must be

restarted

Which one identifies a single network interface? Multicast

The IP address of Google DNS Server is__________ 8.8.8.8

The interval from the time of submission of a process to the time of completion is termed as
turnaround time

WiFi full form is________ Wired Fidelity

When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs

A solution to the problem of external fragmentation is compaction

“Page not found” status code number is______ 404

Size of virtual memory depends on size of address bus

Dispatcher function is to put tasks in I/O wait

At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and
15 V operations were completed on this semaphore. The resulting value of the semaphore is? 2

Which of the following are the process of selecting the data storage and data access characteristics
of the database? Physical database design

The maximum size of IPV4 is_________bytes 60


NTP,DNS,BOOTP, DHCP uses _____________ UDP

Which one identifies a single network interface? Unicast

DNS database contains________ All

Port number for IMAP is______ 120

Which of the following is the oldest database model? Network

The algorithm that takes a set of dependencies and adds one schema at a time, instead of
decomposing the initial schema repeatedly is 3NF synthesis algorithm

The Ipv6 address is______ 2001:0db8:85a3:0042 :0000:8a2e:0370:7334

The refinement from an initial entity set into successive levels of entity subgroupings represents a
________ design process in which distinctions are made explicit. Top-down

When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs

Port number for SSH is________ 22

Writing the buffered log to __________ is sometimes referred to as a log force. Disk

The systems which allow only one process execution at a time, are called uniprogramming
systems

CPU fetches the instruction from memory according to the value of: program counter

A solution to the problem of external fragmentation is compaction

Which protocol allows user at one site to establish connection to another site and pass keystroke
from local to remote host? Telnet
Which one out of these is not a data link layer technology? HTTP

Which of the following is the oldest database model? Network

The normal form which satisfies multivalued dependencies and which is in BCNF is 4NF

One that is not a operating system mode is system mode

Which of following are private range network Ips? 192.168.1.1

If one thread opens a file with read privileges then other threads in the same process can also
read from that file

What is the standard length of MAC address? 48 bits

WiFi full form is________ Wireless Fidelity

Which of the following are the process of selecting the data storage and data access characteristics
of the database? Physical database design

_________ is generally faster than _________ and ________ first fit, best fit, worst fit

Internet domain name and hostname are translated into IP address by___________ Domain
name system

Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge? TYPE 1

Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge? TYPE 1

What is internet? a vast collection of different networks

A system is in a safe state only if there exists a safe sequence


A solution to the problem of external fragmentation is compaction

HTTP resources are located by___________ None

208.215.179.0/24 belongs to which Class C

_________________is the use of Ping command: To test a host on the network is reachable

“Page not found” status code number is______ 404

What is the advantage of dynamic loading? An unused routine is never loaded

The maximum size of IPV4 is_________bytes 60

208.215.179.0/24 belongs to which Class C

one that is not a operating system mode is 2001:0db8:85a3:0042 :0000:8a2e:0370:7334

In the address “www.gitam.co.in”, which is top level domain. co

Which operating system reacts in the actual time Real time system

At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and
15 V operations were completed on this semaphore. The resulting value of the semaphore is? 2

Which of the following are the process of selecting the data storage and data access characteristics
of the database? Physical database design

R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving
BCNF decomposition? AB->C, C->AD

Dispatcher function is to put tasks in I/O wait


“Page not found” status code number is______ 404

One that is not a operating system mode is system mode

When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs

The algorithm that takes a set of dependencies and adds one schema at a time, instead of
decomposing the initial schema repeatedly is 3NF synthesis algorithm

With multiprogramming ______ is used productively time

How many join types in join condition 4

The first fit, best fit and worst fit are strategies to select a free hole from a set of available
holes

Which of the following is unreliable and connectionless protocol? UDP

With multiprogramming ______ is used productively time

A relation is in ____________ if an attribute of a composite key is dependent on an attribute of


other composite key. 3NF

Which one out of these is not a data link layer technology? HTTP

Class C has ___addresses assigned to them.

What is a long-term scheduler ? It selects which process has to be executed next and allocates CPU

IPv4 uses _________bit addresses 32


Ipv6 uses _________bit addresses 128

The main task carried out in the __________ is to remove repeating attributes to separate tables.
1NF

What is the advantage of dynamic loading? An unused routine is never loaded

A relation is in ____________ if an attribute of a composite key is dependent on an attribute of


other composite key. 3NF

Which is more efficient in terms of both latency and bandwidth? UDP

What does LTE stand for? Long Term Evolution

What does LTE stand for? Long Term Evolution

Which transport layer protocols is used by DHCP? UDP

CPU fetches the instruction from memory according to the value of: program counter

In the __________ phase, the system replays updates of all transactions by scanning the log forward
from the last checkpoint. Redo

NTP,DNS,BOOTP, DHCP uses _____________ UDP

Which forms has a relation that possesses data about an individual entity 4NF

Which protocol allows user at one site to establish connection to another site and pass keystroke
from local to remote host? Telnet

Which one identifies a single network interface? Unicast

Which of the following is a low level operator? Directory


CPU fetches the instruction from memory according to the value of: program counter

______ is a special type of integrity constraint that relates two relations & maintains consistency
across the relations. Referential Integrity Constraints

What is internet? a vast collection of different networks

A monitor is characterized by a set of programmer defined operators

“Page not found” status code number is______ 404

“Page not found” status code number is______ 404

The network layer concerns with___________ packets

When the memory allocated to a process is slightly larger than the process, then internal
fragmentation occurs

In the __________ phase, the system replays updates of all transactions by scanning the log forward
from the last checkpoint. Redo

Which of following are private range network Ips? 192.168.1.1

If one thread opens a file with read privileges then other threads in the same process can also
read from that file

What is the standard length of MAC address? 48 bits

_________________is the use of Ping command: To test a host on the network is reachable

Terms SSL and TLS stand for: Secure Socket Layers and Transport Layer Security

A relation is in ____________ if an attribute of a composite key is dependent on an attribute of


other composite key. 3NF
____ means that the data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed. Isolation

Relation dept year(dept name, total inst 2007, total inst 2008, total inst 2009). Here the only
functional dependencies are from dept name to the other attributes. This relation is in BCNF

The normal form which satisfies multivalued dependencies and which is in BCNF is 4NF

Class C has ___addresses assigned to them. 64

Which forms has a relation that possesses data about an individual entity 4NF

The status code “200” of server generally means_____ OK

Internet domain name and hostname are translated into IP address by___________ Domain
name system

Which of the following terms does refer to the correctness and completeness of the data in a
database? Data integrity

WiFi full form is________ Wireless Frequency

There are 10 different processes running on a workstation. Idle processes are waiting for an input
event in the input queue. Busy processes are scheduled with the Round-Robin time sharing method.
Which out of the following quantum times is the best value tQ = 15ms

______ is a special type of integrity constraint that relates two relations & maintains consistency
across the relations. Referential Integrity Constraints

For a weak entity set to be meaningful, it must be associated with another entity set, called the
Identifying set

Which forms has a relation that possesses data about an individual entity 4NF

What does LTE stand for? Long Term Evolution


WAP full form is__________ Wireless Application Protocol

A binary semaphore is a semaphore with integer values 1

Port number for POP3 is__________ 110

Interrupt table of pointers having addresses for each interrupt is located at low memory

Which forms has a relation that possesses data about an individual entity 4NF

A binary semaphore is a semaphore with integer values 1

The property of a transaction that persists all the crashes is Durability

When a page fault occurs before an executing instruction is complete if the instruction must be
restarted

The property of a transaction that persists all the crashes is Durability

In the __________ phase, the system replays updates of all transactions by scanning the log forward
from the last checkpoint. Redo

Which normal form is considered adequate for normal relational database design? 3NF

Which of the following is unreliable and connectionless protocol? UDP

What is a long-term scheduler ? It selects which process has to be brought into the ready queue

Functional dependencies are a generalization of Key dependencies

A table can be logically connected to another table by defining a Primary key

The interval from the time of submission of a process to the time of completion is termed as
turnaround time
When a page fault occurs before an executing instruction is complete if the instruction must be
restarted

The first fit, best fit and worst fit are strategies to select a process from a queue to put in
memory

Ethernet frame consists of_________ MAC address

Every octet in Ipv4 address range from 0 to____ 128

Each IP packet must contain___________ Source and destination IP Addresses

WAP full form is__________ Wireless Application Protocol

Port number for SSH is________ 22

WAP full form is__________ Wireless Application Protocol

In the address “www.gitam.co.in”, which is top level domain. co

Which normal form is considered adequate for normal relational database design? 3NF

Functional dependencies are a generalization of Key dependencies

The Ipv6 address is______ 2001:0db8:85a3:0042 :8a2e:0370:7334

first fit, best fit, worst fit

WiFi full form is________ Wireless Fidelity

The refinement from an initial entity set into successive levels of entity subgroupings represents a
________ design process in which distinctions are made explicit. Top-down

What is the TCP name for a transport service access point? port
There are 10 different processes running on a workstation. Idle processes are waiting for an input
event in the input queue. Busy processes are scheduled with the Round-Robin time sharing method.
Which out of the following quantum times is the best value tQ = 15ms

________ determines which transactions to undo, which pages were dirty at the time of the crash,
and the LSN from which the redo pass should start. Analysis pass

Dispatcher function is to put tasks in I/O wait

Which of the following is a custom port? 80

The normal form which satisfies multivalued dependencies and which is in BCNF is 4NF

There are 10 different processes running on a workstation. Idle processes are waiting for an input
event in the input queue. Busy processes are scheduled with the Round-Robin time sharing method.
Which out of the following quantum times is the best value tQ=50ms

Class C has ___addresses assigned to them. 256

In fixed sized partition, the degree of multiprogramming is bounded by the CPU utilization

Which layer is called a port layer in OSI model? Session

Which one out of these is not a data link layer technology? HTTP

208.215.179.0/24 belongs to which Class C

Terms SSL and TLS stand for: Secure Socket Layers and Transport Layer Security

Which of the following is a fundamental operation in relational algebra None

The interval from the time of submission of a process to the time of completion is termed as
turnaround time

R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving
BCNF decomposition? AB->C, C->AD
Each IP packet must contain___________ Source and destination IP Addresses

“Page not found” status code number is______ 404

The algorithm that takes a set of dependencies and adds one schema at a time, instead of
decomposing the initial schema repeatedly is 3NF synthesis algorithm

Which one out of these is not a data link layer technology? HTTP

Which of the following are introduced to reduce the overheads caused by the log-based recovery?
Checkpoints

Which of the following is Class B address? 128.0.2.3

In Unix, Which system call creates the new process? fork

Which of the following used to receive email from Gmail? smtp.google.com

_________________is the use of Ping command: To test a host on the network is reachable

In fixed sized partition, the degree of multiprogramming is bounded by the number of partitions

Relation dept year(dept name, total inst 2007, total inst 2008, total inst 2009). Here the only
functional dependencies are from dept name to the other attributes. This relation is in BCNF

Which one identifies a single network interface? Unicast

Ipv6 uses _________bit addresses 128

What is the TCP name for a transport service access point? port

Which operating system reacts in the actual time Real time system
For a weak entity set to be meaningful, it must be associated with another entity set, called the
Identifying set

What is the TCP name for a transport service access point? port

______ is a special type of integrity constraint that relates two relations & maintains consistency
across the relations. Referential Integrity Constraints

Which of following are private range network Ips? 192.168.1.1

Which of the following is unreliable and connectionless protocol? UDP

Which of the following is Class A address? 10.1.2.3

Which transport layer protocols is used by DHCP? udp

A solution to the problem of external fragmentation is compaction

Which of the following used to send email from Gmail? smtp.google.com

The address of the next instruction to be executed by the current process is provided by the
program counter

__________ denotes the largest timestamp of any transaction that executed write(Q) successfully.
R timestamp

The main task carried out in the __________ is to remove repeating attributes to separate tables.
1nf

the network layer is concerned with packets

The IP address of Google DNS Server is__________ 8.8.8.8

DNS database contains________ all

You might also like