Jso 2021 Paper III
Jso 2021 Paper III
PAPER – III
A
Time Allowed : 3 Hours Maximum Marks : 200
INSTRUCTIONS
2. What is the hit ratio of a cache if a system performs memory access at 30 nanoseconds
with the cache and 150 nanoseconds without it? Assume that each uses 20 nanoseconds
of memory, choose the closest approximate.
(A) 81% (B) 75%
(C) 92% (D) 87%
8. The SQL statements that are automatically executed when there is any change in the
database like insertion, deletion or updating of data is called
(A) Procedures (B) Triggers
(C) Functions (D) None of these
9. If and only if the domain of each attribute contains only atomic values and the value
of each attribute contains only a single value from that domain, then which normal
form is the relation in ?
(A) First Normal Form (B) Second Normal Form
(C) Third Normal Form (D) Fourth Normal Form
12. Two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to
each other by intervening IPv4 routers. The best solution here is
(A) to use dual-stack approach (B) to replace the system
(C) tunneling (D) hyper-texting
18. Consider a computer with 8 Mbytes of main memory and a 128 K cache. The cache
block size is 4K. It uses a direct mapping scheme for cache management. How many
different main memory blocks can map onto a given physical cache block?
(A) 1024 (B) 512
(C) 256 (D) 64
44. The critical section problem needs a solution to synchronise the different processes.
The solution to the critical section problem must satisfy the following three conditions
(A) Mutual exclusion, Progress, Bounded Waiting
(B) Critical Section, Non-Critical Section, Synchronising
(C) System Calls, IPC Mechanisms, System Protection
(D) Data Consistency, Starvation, Aging
45. CPU does not perform the operation
(A) Data Transfer (B) Logic Operation
(C) Arithmetic Operation (D) All of these
48. The entity type on which the ________ type depends is called the identifying owner.
(A) strong entity (B) weak entity
(C) relationship (D) E-R
49. Which of the following will happen after the following sequence of events is completed
as per Two Phase Commit (2PC) Protocol?
TC sends <Prepare T1> to P1 and P2
P1 sends <Ready T1> to TC
P2 sends <Ready T1> to TC
P2 crashed after sending <Ready T1> to TC
P2 recovered immediately after crash
(A) TC sends <Commit T1> to P1 and P2
(B) TC sends <Abort T1> to P1 and P2
(C) TC sends <Commit T1> only to participant P1
(D) TC sends <Abort T1> only to participant P2
51. How many layers are there in the OSI reference model?
(A) 5 (B) 6
(C) 7 (D) 10
-6-
52. The combination of an IP Address and a port number is known as
(A) Network number (B) Socket address
(C) Subnet mask number (D) MAC address
53. Which of the following is the broadcast address for a class B network ID using default
subnet mask?
(A) 172.16.10.255 (B) 255.255.255.255
(C) 172.255.255.255 (D) 172.16.255.255
56. In which addressing mode are the operands stored in the memory and the address of
the corresponding memory location given in register which is specified in the
instruction?
(A) Register Direct (B) Register Indirect
(C) Base Indexed (D) Displacement
57. If the postfix form of a string is A B C + - D *, the infix string is
(A) (A – (B+C))*D (B) ((A – B)+C)*D
(C) ((A+B) – C)*D (D) (A+(B – C))*D
58. What are two kinds of semaphores?
(A) Mutex & counting (B) Binary & counting
(C) Counting & decimal (D) Decimal & binary
59. DHCP server provides __________ to the client.
(A) Protocol (B) IP address
(C) MAC address (D) Network address
60. Which of the following methods provide dedicated communication channel between
two stations?
(A) Circuit Switching (B) Switch Network
(C) Packet Switching (D) All of these
61. Employee(empcode, name, street, city, state, pincode);
For any pincode, there is only one city and state. Also, for any given street, city and
state, there is just one pincode. In normalization terms, Employee is a relation in
(A) 1NF only
(B) 2NF and hence also in 1NF
(C) 3NF and hence also in 2NF and 1NF
(D) BCNF and hence also in 3NF, 2NF and 1NF
-7-
62. Which of the following statements contains an error?
(A) select * from employee where emp_id = 10003;
(B) select emp_id from employee where emp_id = 10006;
(C) select emp_id from employee;
(D) select emp_id where emp_id = 1009 and lastname = ‘Miller’;
63. How many times will the following C Program print ‘yes’?
main()
{
fork(); fork(); printf(“yes”);
}
(A) Only once (B) Twice
(C) Four times (D) Eight times
64. The program a computer’s microprocessor uses to start the computer system after it
is powered on is
(A) CD-ROM (B) BIOS
(C) MS DOS (D) GUI
65. The method which offers higher speeds of I/O transfers is
(A) Interrupts (B) DMA
(C) Memory mapping (D) Program-controlled I/O
66. How many RAM chips of size 256K x 1bit are required to build 1Mbyte memory?
(A) 4 (B) 8
(C) 10 (D) 32
67. What is the preferred method for enforcing data integrity during an update/delete/insert
into a table?
(A) Constraints (B) Stored Procedure
(C) Triggers (D) Cursors
68. A relation is
(A) subset of a cartesian product of a list of relations
(B) subset of a cartesian product of a list of attributes
(C) subset of a cartesian product of a list of domains
(D) subset of a cartesian product of a list of tuples
72. Which is the correct expression for the length of UDP datagram?
(A) UDP length = IP length – IP header’s length
(B) UDP length = UDP length – IP header’s length
(C) UDP length = IP length + IP header’s length
(D) UDP length = UDP length + IP header’s length
74. Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes.
R1 and R2 are two relationships between E1 and E2, where R1 is one-to-many and
R2 is many-to-many. R1 and R2 do not have any attributes of their own. What is the
minimum number of tables required to represent this situation in the relational model?
(A) 2 (B) 3
(C) 4 (D) 5
75. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is
(A) Mutual open (B) Mutual close
(C) Simultaneously open (D) Simultaneously closed
76. Which of the following protocols allows an application program on one machine to
send a datagram to an application program on another machine?
(A) SMTP (B) TCP
(C) X.25 (D) UDP
77. Consider the join of a relation A with a relation B. If A has k tuples and B has r tuples,
then the maximum and minimum sizes of the join are
(A) k + r and 0 respectively (B) r, k and 0 respectively
(C) r + k and |k – r| (D) r, k and r + k respectively
79. A class of parallel computers in Flynn’s taxonomy that describes computers with
multiple processing elements that perform the same operation on multiple data
points simultaneously.
(A) SIMD (B) MIMD
(C) SIMT (D) MDMX
-9-
80. The sharing of a medium and its link by two or more devices is called
(A) Duplexing (B) Fully Duplexing
(C) Multiplexing (D) Microplexing
81. An application protocol which allows you to connect and login to a remote computer is
(A) Telnet (B) FTP
(C) HTTP (D) SMTP
82. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
(A) 10 (B) 16
(C) 30 (D) 62
83. If the size of logical address space is 2 to the power of m, and a page size is 2 to the
power of n addressing units, then the high order _____ bits of a logical address
designate the page number, and the ____ low order bits designate the page offset.
(A) m, n (B) n, m
(C) m – n, m (D) m – n, n
84. Assume that there are 3 page frames which are initially empty. If the page reference
string is 1, 2, 3, 4, 2, 1, 5, 3, 2, 4, 6, the number of page faults using the optimal
replacement policy is
(A) 5 (B) 6
(C) 7 (D) 8
88. Which statement is used to combine data or rows from two or more tables based on a
common field between them?
(A) Union (B) All
(C) Join (D) All of these
89. The use of Hardware in Memory management through segment relocation and
protection is
(A) to perform address translation to reduce size of the memory
(B) to perform address translation to reduce execution time overhead
(C) Both (A) and (B)
(D) Neither (A) nor (B)
- 10 -
90. The size of an IPv6 address is
(A) 4 bytes (B) 8 bytes
(C) 128 bytes (D) 256 bytes
91. Consider a disk queue with requests for I/O to blocks on cylinders 98 183 37 122 14
124 65 67. Considering FCFS (first come first served) scheduling, the total number
of head movements, if the disk head is initially at 53, is
(A) 600 (B) 640
(C) 680 (D) 700
94. In the process of fetching a web page from a server, the HTTP request/response take
_______ RTTs.
(A) 4 (B) 1
(C) 2 (D) 3
95. In the ____________ scheme, a transaction that wants to update the database first
creates a complete copy of the database.
(A) Shadow Copy (B) Shadow Paging
(C) Shadow Mapping (D) Update log records
96. Which of the following statement is used to remove the privilege from the user John ?
(A) Remove update on department from John
(B) Revoke update on employee from John
(C) Delete select on department from John
(D) Grant update on employee from John
98. The size of the physical address space of a processor is 2P bytes. The word length is
2W bytes. The capacity of cache memory is 2N bytes. The size of each cache block is
2M words. For a K-way set-associative cache memory, the length (in number of bits)
of the tag field is
(A) P – N – log2K (B) P – N + log2K
(C) P – N – M – W – log2K (D) P – N – M – W + log2K
- 11 -
99. A network designer wants to connect 5 routers as point-to-point simplex line. Then
the total number of lines required would be
(A) 5 (B) 10
(C) 20 (D) 32
100. In a paged memory, the page hit ratio is 0.35. The time required to access a page in
secondary memory is equal to 100 ns. The time required to access a page in primary
memory is 10 ns. The average time required to access a page is
(A) 3.0 ns (B) 68.0 ns
(C) 68.5 ns (D) 78.5 ns