How To Exam?

a knowledge trading engine...


Indian Institute of Technology Mumbai (IIT-M) 2005 M.E Information Technology GATE IT - Question Paper

Wednesday, 23 January 2013 02:40Web
III. Courses
(A) land II only
(B) II and III only
(C) II only
(D)I and III only
18. The shell command
find. —name passwd —print is executed in/etc directory of a computer system running Unix.
Which of the subsequent shell commands will provide the identical info as the above command
when executed in the identical directory?
(A) Is passwd
(B) cat passwd
(C) grep name passwd
(D) grep print passwd
19. A user level process in Unix traps the signal sent on a Ctrl-C input, and has a signal
handling routine that saves improper files before terminating the process. When a Ctrl-C
input is provided to this process, what is the mode in which
the signal handling routine executes?
(A) kernel mode
(B) superuser mode
(C) privileged mode
(D) user mode
20. The Function Point (FP) computed for a software project are often used to find an
estimate of Lines of Code (LOC) needed for that project. Which of the subsequent statements if
FALSE in this situation.
(A) The relationship ranging from FP and LOC depends on the programming language used to
implement the software.
(B) LOC requirement for an assembly language implementation will be more for a provided FP
value, than LOC for implementation in COBOL.
(C) On an average, 1 LOC of C++ provides approximately 1.6 times the functionality of a
single LOC of FORTRAN.
(D) FP and LOC are not related to every other.
21. Consider the entities ‘hotel room’, and ‘person’ with a many to many relationship ‘lodging’
as shown below:
Hotel Room Person
If we wish to store info about the rent payment to be made by person(s) occupying
various hotel rooms, then this info should appear as an
attribute of
(A) Person
(B) Hotel Room
(C) Lodging
(D)None of these
22. A table has fields Fl, F2, F3, F4, F5 with the subsequent functional dependencies
Fl - F3 F2 - F4 (F1.F2) - F5
In terms of Normalization, this table is in
(A) one NF
(B) two NF
(C) three NF
(D)None of these
23. A B-tree used as an index for a large database table has 4 levels including the root
node. If a new key is inserted in this index, then the maximum number of nodes that could be



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Indian Institute of Technology Mumbai (IIT-M) 2005 M.E Information Technology GATE IT - Question Paper