How To Exam?

a knowledge trading engine...


Indian Institute of Technology Mumbai (IIT-M) 2005 M.E Information Technology GATE IT - Question Paper

Wednesday, 23 January 2013 02:40Web
62. 2 shared resources R1 and R2are used by processes F and P2. every process has a
certain priority for accessing every resource. Let denote the priority of P,for accessing R. A
process P,can snatch a resource Rkfrom process Pif T,kis greater than TJk.
provided the following:
I. iiii.
Which of the subsequent conditions ensures that F and P2 can never deadlock?
(A) I and IV
(B) II and III
(C) I and II
(D) None of the above
63. In a computer system, 4 files of size 11050 bytes, 4990 bytes, 5170 bytes and
12640 bytes need to be stored. For storing these files on disk, we can use either
100 byte disk blocks or 200 byte disk blocks (but can’t mix block sizes). For every block used
to store a file, four bytes of bookkeeping info also needs to be stored on the disk. Thus,
the total space used to store a file is the sum of the space taken to store the file and the space
taken to store the bookkeeping info for the blocks allocated for storing the file. A disk
block can store either bookkeeping info for a file or data from a file, but not both.
What is the total space needed for storing the files using 100 byte disk blocks
and 200 byte disk blocks respectively?
(A) 35400 and 35800 bytes
(B) 35800 and 35400 bytes
(C) 35600 and 35400 bytes
(D) 35400 and 35600 bytes
64. The availability of a complex software is 90°h. Its Mean Time ranging from Failure (MTBF) is
200 days. Because of the critical nature of the usage, the organization deploying the software
further enhanced it to find an availability of 95%. In the process, the Mean Time To Repair
(MTTR) increased by five days.
What is the MTBF of the enhanced software?
(A) 205 days
(B) 300 days
(C) 500 days
(D)700 days
66. In a data flow diagram, the segment shown beneath is identified as having transaction flow
characteristics, with p2 identified as the transaction center

A 1st level architectural design of this segment will outcome in a set of process modules with an
associated invocation sequence. The most improper architecture is:
(A) p1 invokes p2, p2 invokes either p3, or p4, or p5
(B) p2 invokes p1, and then invokes p3, or p4 , or p5
(C) A new module Tc is described to control the transaction flow. This module Tc fist invokes p1



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Indian Institute of Technology Mumbai (IIT-M) 2005 M.E Information Technology GATE IT - Question Paper