Study Viral (Java Tutorials For Beginners - Step By Step)
  • Home
  • Java Tutorials
    • Core Java
    • Java Swing
    • MS Access JDBC Java Application
  • Facebook Page
  • Programs
    • C Programs
    • C++ Programs
    • Java Programs
    • Python Programs
  • UGC NET
  • Home
  • Java Tutorials
    • Core Java
    • Java Swing
    • MS Access JDBC Java Application
  • Facebook
  • Programs
    • C Programs
    • C++ Programs
    • Java Programs
    • Python Programs
  • UGC NET

Java Program 41 - Java Program to Print Alphabet Patterns - Study Viral

 November 23, 2018     Alphabet Pattern, Java Programs     No comments   

Java Program 41 - Java Program to Print Alphabet Patterns - Study Viral



In This Video You Can See how to Make Following
Kind of Alphabet Pattern...With two ways using integer and character data-type

EDCBA
EDCB
EDC
ED
E



Email :: info@studyviral.in
Or
Email :: studyviral.in@gmail.com 
Website:: www.StudyViraL.in 

Facebook Page ::  https://www.facebook.com/StudyViral.in/
For Suggestions You Can Email :: info@studyviral.in
http://studyviral.blogspot.in/
Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 61-64)

 November 23, 2018     Computer Science And Applications Paper-II, DBMS, UGC NET JULY 2018     No comments   

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 61-64)



Q 61. In RDBMS, which type of Join returns all rows that satisfy the join condition?
 
(A) Inner Join
(B) Outer Join
(C) Semi Join
(D) Anti Join

Answer : (B) Outer Join
Explanation : Outer Join return all rows that satisfy condition from both the participating relations. An outer join extends the result of a simple join. An outer join returns all rows that satisfy the join condition and also returns some or all of those rows from one table for which no rows from the other satisfy the join condition. 
 

Q 62. Consider a relation book (title, price) which contains the titles and prices of different books. Assuming that no two books have the same price, what does the following SQL query list ?

Select title
from book as B
where (select count ( * )
    from book as T
    where T.price > B.price) < 7
 
(A) Titles of the six most expensive books.
(B) Title of the sixth most expensive books.
(C) Titles of the seven most expensive books.
(D) Title of the seventh most expensive books.
 

Answer :  (C) Titles of the seven most expensive books.
 
Q 63.  In a Hierarchical database, a hashing function is used to locate the ________.

(A) Collision
(B) Root
(C) Foreign Key
(D) Records
 
Answer :  (B) Root
Explanation :  A Data Model is the methodology used by a particular DBMS to organize and access the data.
Hierarchical, Network and Relational Model are the three popular data models. 
However, the relational model is more widely used.
 
Hierarchical Model :

  • The hierarchical model was developed by IBM in 1968.
  • The data is organize in a tree structure where the nodes represent the records and the branches of the tree represent the fields.
  • Since the data is organized in a tree structure, the parent node has the links to its child nodes.
  • If we want to search a record, we have to traverse the tree from the root through all its parent nodes to reach the specific record. Thus, searching for a record is very time consuming.
  • The hashing function is used to locate the root.

 
Q 64. Relations produced from E – R Model will always be in ________.

(A) 1 NF
(B) 2 NF
(C) 3 NF
(D) 4 NF
 
Answer :  (A) 1 NF




Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 60)

 November 23, 2018     Computer Science And Applications Paper-II, Operation System, UGC NET JULY 2018     No comments   

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 60)



Q 60. In which of the following scheduling criteria, context switching will never take place ?

(A) ROUND ROBIN
(B) Preemptive SJF
(C) Non-preemptive SJF
(D) Preemptive priority


Answer : (C) Non-preemptive SJF


In Non – preemptive algorithms context switching will never take place because it doesn’t allow to switch the process until it is completed fully.

Except Non-Preemptive SJF , All are Preemptive.
CPU will leave the Shotest Process only after its Full execution,Once process is started to execute.
Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 59)

 November 23, 2018     Computer Science And Applications Paper-II, Operation System, UGC NET JULY 2018     No comments   

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 59)



Q 59. Consider the following three processes with the arrival time and CPU burst time given in milliseconds:

ProcessArrival TimeBurst Time
P107
P214
P328

The Gantt Chart for preemptive SJF scheduling algorithm is _________.

(A)
                    P1                               P2                     P3           
0                                           7                      13                        21

(B)
         P1                      P2                    P1                     P         
0                      1                        5                      11                    19    

(C)
                    P1                               P2                     P3           
0                                           7                      13                        19

(D)
          P2                    P3                                P1                     
0                      4                       12                                            19

Answer : (B)

Explanation : 
A) Not preemptive. P1 continues execution without being preempted.
B) Preemptive SJF . P1 executes for 1 second followed by execution of P2 for 4 secs. Then P1 finishes execution followed by P3.
C) Not preemptive as each of the processes carries on execution without being preempted.
D)Preemptive but P2 starts execution even before it has arrived which can't happen in reality.

P1 arrive at 0 it will be served by CPU for 1 unit. After 1 unit P2 arrived ans it is shortest So it will execute for 4 unit, after its execution There are 2 processes out of which P1 is shortest so it will execute for 6 unit after its execution P1 will execute for 8 unit.
Read More
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 56-58)

 November 23, 2018     Computer Science And Applications Paper-II, Operation System, UGC NET JULY 2018     No comments   

UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 56-58)



Q 56. Which of the following statements are true ?
(a) External Fragmentation exists when there is enough total memory space to satisfy a request but the available space is contiguous.
(b) Memory Fragmentation can be internal as well as external.
(c) One solution to external Fragmentation is compaction.


Code:
(A) (a) and (b) only
(B) (a) and (c) only
(C) (b) and (c) only
(D) (a), (b) and (c)

Answer : (C) (b) and (c) only

Explanation:

  • External Fragmentation exists when there is enough total memory space to satisfy a request but the available space is contiguous. This is a false statement because external fragmentation occurs due to non contiguous available space.
  • Memory Fragmentation can be internal as well as external.True
  • One solution to external Fragmentation is compaction or shuffle memory contents.True


  • Q 57. Page information in memory is also called as Page Table. The essential contents in each entry of a page table is/are _________.

    (A) Page Access information
    (B) Virtual Page number
    (C) Page Frame number
    (D) Both virtual page number and Page Frame Number

    Answer : (C) Page Frame number

    Explanation: Page information in memory is also called as Page Table. The essential contents in each entry of a page table is page frame number. (i.e. Frame Number is essential in page table.)


    Q 58. Consider a virtual page reference string 1, 2, 3, 2, 4, 2, 5, 2, 3, 4. Suppose LRU page replacement algorithm is implemented with 3 page frames in main memory. Then the number of page faults are_________.

    (A) 5
    (B) 7
    (C) 9
    (D) 10


    Answer : (B) 7

    Explanation: Page replacement diagram for LRU:


    Read More
    • Share This:  
    •  Facebook
    •  Twitter
    •  Google+
    •  Stumble
    •  Digg

    UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 54-55)

     November 23, 2018     Computer Science And Applications Paper-II, Operation System, UGC NET JULY 2018     No comments   

    UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 54-55)





    Q 54. Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPU's having explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with memory mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with memory mapped I/O ?

    (A) I/O protection is ensured by operating system routines.
    (B) I/O protection is ensured by a hardware trap.
    (C) I/O protection is ensured during system configuration.
    (D) I/O protection is not possible.

    Answer : (A) I/O protection is ensured by operating system routines.

    Explanation: Memory mapped I/O means, accessing I/O via general memory access as opposed to specialized IO instructions.
    The programmer can directly access any memory location directly. To prevent such an access, the OS (kernel) will divide the address space into kernel space and user space. An user application can easily access user application. To access kernel space, we need system calls (traps).


    Q 55. Which UNIX/Linux command is used to make all files and sub-directories in the directory “progs” executable by all users ?

    (A) chmod− R a+x progs
    (B) chmod −R 222 progs
    (C) chmod−X a+x progs
    (D) chmod −X 222 progs

    Answer : (A) chmod− R a+x progs

    Solution : Option A will make all files and sub-directories in the directory (progs) executable by all users.
    -R is for recurssive calls, so that sub-directories within the directories can be accessed.
    a is for all users
    +x is for making things executable
    Read More
    • Share This:  
    •  Facebook
    •  Twitter
    •  Google+
    •  Stumble
    •  Digg

    UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 51-53)

     November 23, 2018     Computer Science And Applications Paper-II, UGC NET JULY 2018     2 comments   

    UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 51-55)



    Q 51. At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and “x” V operations were performed on this semaphore. If the final value of semaphore is 7, x will be:

    (A) 8
    (B) 9
    (C) 10
    (D) 11

    Answer :  (B) 9
    Solution : P operation : Decrements the value of semaphore by 1
    V operation : Increments the value of semaphore by 1
    Initially, value of semaphore = 10
    After 12 P operations, value of semaphore = 10 – 12 = – 2
    Now, after x V operations, value of semaphore = 7
    – 2 + xV = 7
    xV = 2 + 7 = 9 


    Q 52. In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal to 120 ns. The time required to access a page in primary memory is 15 ns. The average time required to access a page is ________.

    (A) 105
    (B) 68
    (C) 75
    (D) 78

    Answer :  (D) 78

    Solution : Average access time = hit ratio * primary memory access time + (1 – hit ratio) * secondary memory access time

    Average access time = 0.4 * 15 + 0.6 * 120←
    Average access time = 6 + 72
    Average access time = 78.
    So, option (D) is correct.


    Q 53. In a multi-user operating system, 30 requests are made to use a particular resource per hour, on an average. The probability that no requests are made in 40 minutes, when arrival pattern is a poisson distribution, is _________.
     
    (A) e-15
    (B) 1 – e-15
    (C) 1 – e-20
    (D) e-20


    Answer : (D) e-20

    Solution : In One Hour = 30 Requests Sent
     in 40 minutes =   30 x 40   =  20  Requests Sent

                                            60 
     Here 20 is Number of request Sent in 40 minutes. (Let 𝛌 is number of request in 40 minutes)
    Therefore  𝛌 = 20

    But according to given statement in question Actual requests are made in 40 minutes is ZERO.
    Let x is actual requests in 40 minutes. (According to Question)
    i.e. x = 0 
      

    e−t/θe−t/θ
    e−t/θ

    Read More
    • Share This:  
    •  Facebook
    •  Twitter
    •  Google+
    •  Stumble
    •  Digg
    Newer Posts Older Posts Home

    Facebook

    StudyViral

    Labels

    Alphabet Pattern Binary Tree BLOB (Binary Large Object) Computer Networks Computer Science And Applications Paper-II Data Structure DBMS Digital Clock Digital Watch Extra Tutorials File Upload Find Age from Date of Birth Graph-Algorithms Java and J2EE web applications JAVA JDK 12 Java Mail API Java MySQL Java Programs Java Programs List Java Servlets Java Swing Java Swing With MySQL Database Java Tutorials JCalender KVS Compuer Science - January 2017 Question Paper MS Access JDBC Java Application Multiuser Login NETBEANS 11 IDE Occurrence of Digits in Number Operation System Pattern Program Reverse of String Sending Email Servlet Servlet Tutorial Software Engineering Star Struts 2 FrameWork Struts 2 Registration Form UGC NET JULY 2018 Windows Commands

    Popular Posts

    • Create CON, AUX, NUL name folder and files in Windows - Study Viral
      Create CON, AUX, NUL name folder and files in Windows - Study Viral Most of you may be aware of many MS-DOS commands but still n...
    • UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 26)
      UGC NET JULY 2018 (Computer Science And Applications Paper-II) (Question 26) Q 26. A binary search tree in which every non-leaf node...
    • Java Swing Application for Sending E-Mail - StudyViral
      Java Swing Application for Sending E-Mail - StudyViral Hello Friends Welcome to StudyViraL Channel In this video I am going...

    Categories

    • Alphabet Pattern (13)
    • Binary Tree (2)
    • BLOB (Binary Large Object) (1)
    • Computer Networks (2)
    • Computer Science And Applications Paper-II (40)
    • Data Structure (6)
    • DBMS (1)
    • Digital Clock (1)
    • Digital Watch (1)
    • Extra Tutorials (3)
    • File Upload (1)
    • Find Age from Date of Birth (1)
    • Graph-Algorithms (1)
    • Java and J2EE web applications (3)
    • JAVA JDK 12 (1)
    • Java Mail API (3)
    • Java MySQL (5)
    • Java Programs (44)
    • Java Programs List (3)
    • Java Servlets (3)
    • Java Swing (16)
    • Java Swing With MySQL Database (4)
    • Java Tutorials (37)
    • JCalender (1)
    • KVS Compuer Science - January 2017 Question Paper (6)
    • MS Access JDBC Java Application (6)
    • Multiuser Login (1)
    • NETBEANS 11 IDE (1)
    • Occurrence of Digits in Number (1)
    • Operation System (4)
    • Pattern Program (8)
    • Reverse of String (2)
    • Sending Email (1)
    • Servlet (3)
    • Servlet Tutorial (3)
    • Software Engineering (4)
    • Star (7)
    • Struts 2 FrameWork (2)
    • Struts 2 Registration Form (1)
    • UGC NET JULY 2018 (40)
    • Windows Commands (2)

    Pages

    • Java Tutorials
    • ASP.NET (in Hindi)
    • Java Programs List

    Blog Archive

    • ►  2021 (3)
      • ►  April 2021 (3)
    • ►  2019 (7)
      • ►  June 2019 (1)
      • ►  May 2019 (2)
      • ►  March 2019 (4)
    • ▼  2018 (111)
      • ▼  November 2018 (7)
        • Java Program 41 - Java Program to Print Alphabet P...
        • UGC NET JULY 2018 (Computer Science And Applicatio...
        • UGC NET JULY 2018 (Computer Science And Applicatio...
        • UGC NET JULY 2018 (Computer Science And Applicatio...
        • UGC NET JULY 2018 (Computer Science And Applicatio...
        • UGC NET JULY 2018 (Computer Science And Applicatio...
        • UGC NET JULY 2018 (Computer Science And Applicatio...
      • ►  October 2018 (20)
      • ►  September 2018 (10)
      • ►  August 2018 (3)
      • ►  July 2018 (19)
      • ►  June 2018 (5)
      • ►  May 2018 (2)
      • ►  April 2018 (3)
      • ►  March 2018 (11)
      • ►  February 2018 (18)
      • ►  January 2018 (13)
    • ►  2017 (36)
      • ►  December 2017 (10)
      • ►  November 2017 (9)
      • ►  October 2017 (7)
      • ►  September 2017 (10)

    About Me

    Rohit Basra
    Hello guys my name Rohit Basra. I love to code and teach java language.
    View my complete profile

    Followers

    Copyright © Study Viral (Java Tutorials For Beginners - Step By Step) | Powered by Blogger