Академический Документы
Профессиональный Документы
Культура Документы
Comprehensive Practice - I
Question. Which of the following statements are TRUE about an SQL query?
P : An SQL query can contain a HAVING clause even if it does not have a
GROUP BY clause
Q : An SQL query can contain a HAVING clause only if it has GROUP BY
clause R : All attributes used in the GROUP BY clause must appear in the
SELECT clause
S : Not all attributes used in the GROUP BY clause need to appear in the
SELECT clause
(A) P and R (B) P and S (C) Q and R (D) Q and S
Answer:-(B)
Exp:- If we use a HAVING clause without a GROUP BY clause, the HAVING
condition applies to all rows that satisfy the search condition.
Question. A process executes the code fork (); fork (); fork (); The total
number of child processes created is
(A)3
(B)4
(C)7
(D) 8
Answer:- (C)
Exp:- If fork is called n times, there will be total 2n running processes
including the parent process. So, there will be 2n -1 child processes.
Question. Which of the following is TRUE?
(A)Every relation is 3NF is also in BCNF
(B) A relation R is in 3NF if every non-prime attribute of R is fully
functionally dependent on every key of R
(C) Every relation in BCNF is also in 3NF
(D) No relation can be in both BCNF and 3NF
Answer:- (C)
Exp:- Option A is false since BCNF is stricter than 3NF (it needs LHS of all
FDs should be candidate key for 3NF condition)
Option B is false since the definition given here is of 2NF
Option C is true, since for a relation to be in BCNF it needs to be in 3NF,
every relation in BCNF satisfies all the properties of 3NF.
Option D is false, since if a relation is in BCNF it will always be in 3NF.
Question. 18. Consider an instance of TCPs Additive Increase Multiplicative
decrease (AIMD) algorithm where the window size at the start of the slow
start phase is 2 MSS and the threshold at the start of the first transmission
is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find
the congestion window size at the end of the tenth transmission. (A) 8MSS
(B) 14MSS (C) 7MSS (D) 12MSS
Question. Consider a source computer (S) transmitting a file of size 106 bits
to a destination computer (D) over a network of two routers (R1 and R2)
and three links (L1, L2, and L3). L1 connects S to R1; L2 connects R1 to R2;
and L3 connects R2 to D. Let each link be of length 100km. Assume signals
travel over each line at a speed of 108 meters per second. Assume that the
link bandwidth on each link is 1Mbps. Let the file be broken down into 1000
packets each of size 1000 bits. Find the total sum of transmission and
propagation delays in transmitting the file from S to D?
(A) 1005ms (B) 1010ms (C) 3000ms (D) 3003ms
Answer:- (A)
Transmission delay for 1 packet from each of S, R1 and R2 will take 1ms
Propagation delay on each link L1, L2 and L3 for one packet is 1ms
Therefore the sum of transmission delay and propagation delay on each
link for one packet is 2 ms.
The first packet reaches the destination at 6th ms
The second packet reaches the destination at 7th ms
So inductively we can say that 1000th packet reaches the destination at
1005th ms
Question. A file system with 300 GByte disk uses a file descriptor with 8
direct block addresses, 1 indirect block address and 1 doubly indirect block
address. The size of each disk block is 128 Bytes and the size of each disk
block address is 8 Bytes. The maximum possible file size in this file system
is
(A) 3 KBytes (B) 35 Kbytes (C) 280 KBytes (D) dependent on the size of the
disk
Answer:-(B)
Answer:- (A)
Answer:- (A)
You have an array of n elements. Suppose you implement quick sort by
always choosing the central element of the array as the pivot. Then the
tightest upper bound for the worst case performance is
(A) 0(n2) (B) 0(nlog n) (C) theta(nlog n) ( D) theta(n2)
Answer:- (A)
In the following pairs of OSI protocol layer/sub-layer and its functionality,
the
INCORRECT pair is
(A) Network layer and Routing
(B) Data Link Layer and Bit synchronization
(C) Transport layer and End-to-end process communication
(D) Medium Access Control sub-layer and Channel sharing
Answer:- (B)
A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of
01111110. If the output bit-string after stuffing is 01111100101, then the
input bit-string is
(A) 0111110100 (B) 0111110101
(C) 0111111101 (D) 0111111111
Answer:- (B)
Host A (on TCP/IP v4 network A) sends an IP datagram D to host B (also on
TCP/IP V4 network B). Assume that no error occurred during the
transmission of D. When D reaches B, which of the following IP header
field(s) may be different from that of the original datagram D?
Answer:- (D)