December 2012 - Paper 2

31:   The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
A. DBMS & the Host record
B. Host program and Host record
C. Host program and DBMS
D. Host program and Host language
 
 

Option: C

Explanation :

Click on Discuss to view users comments.

Write your comments here:



32:  

The maximum number of keys stored in a B-tree of order m and depth d is

A.

md + 1 - 1

B.

md+1 - 1/(m - 1)

C.

(m - 1) (md + 1 - 1)

D.

(md - 1) / (m - 1)  None of these

 
 

Option: D

Explanation :

Option A given as right answer in keys provided by UGC
Maximum number of keys in the B-tree of order m, height d:
     - Level analysis
            Level 1:  m – 1 keys max
           Level 2:  m(m-1)  keys max
          Level 3:  m2 (m-1)  keys max
         Level d:  md-1 (m-1)  keys max
Summation of all levels  =  (m-1) + m(m-1) + m2 (m-1) + . . . + md-1 (m-1)
            = (m-1)( 1 + m + m2 + . . . + md-1)
          so,       max  number of keys     =   (m-1) [(md-1) / (m-1)]

                                =md-1

Click on Discuss to view users comments.

Write your comments here:



33:   Which of the following is the most powerful parring method ?
A. LL(I)
B. Canonical LR
C. SLR
D. LALR
 
 

Option: B

Explanation :

Click on Discuss to view users comments.

Write your comments here:



34:   In UNIX, which of the following command is used to set the task priority ?
A. init
B. nice
C. kill
D. PS
 
 

Option: B

Explanation :

Click on Discuss to view users comments.

Anuradha said: (5:17pm on Thursday 9th January 2014)
nice becomes useful when several processes are demanding more resources than the CPU can provide. In this state, a higher priority process will get a larger chunk of the CPU time than a lower priority process. If the CPU can deliver more resources than the processes are requesting, then even the lowest priority process can get up to 99% of the CPU. Only the superuser (root) may set the niceness to a smaller (higher priority) value. On Linux it is possible to change /etc/security/limits.conf to allow other users or groups to set low nice values.[1]If a user wanted to compress a large file, but not slow down other processes, they might run the following:$ nice -n 19 tar cvzf archive.tgz largefileThe related renice program can be used to change the priority of a process that is already running.

Write your comments here:



35:   AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
A. 5, 7, 15
B. 10, 12, 14
C. 5, 6, 7
D.

20, 12, 14

 
 

Option: B

Explanation :

Click on Discuss to view users comments.

Anuradha said: (5:14pm on Thursday 9th January 2014)
AES supports three key sizes: 128 bits, 192 bits, and 256 bits. The default key size is 128 bits, and all implementations MUST supportthis key size. Implementations MAY also support key sizes of 192 bits and 256 bits.AES uses a different number of rounds for each of the defined key sizes. When a 128-bit key is used, implementations MUST use 10 rounds. When a 192-bit key is used, implementations MUST use 12 rounds. When a 256-bit key is used, implementations MUST use 14 rounds.

Write your comments here: