Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Recent
Hot!
Most votes
Most answers
Most views
Previous GATE
Featured
Recent questions in Others
0
votes
3
answers
1481
UGC NET CSE | June 2006 | Part 2 | Question: 25
Application of data structure queue is : Levelwise printing of tree Implementation of priority queues Function call implementation Depth first search in a graph
Application of data structure queue is :Levelwise printing of treeImplementation of priority queuesFunction call implementationDepth first search in a graph
go_editor
871
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-june2006-paper2
+
–
0
votes
1
answer
1482
UGC NET CSE | June 2006 | Part 2 | Question: 26
What is the transmission signal coding method for a $T1$ carrier called? Binary $\text{NRZ}$ Bipolar Manchester
What is the transmission signal coding method for a $T1$ carrier called?Binary$\text{NRZ}$BipolarManchester
go_editor
186
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-june2006-paper2
+
–
0
votes
0
answers
1483
UGC NET CSE | June 2006 | Part 2 | Question: 27
How much bandwidth is required to send $132$ voice- grade channels by $\text{FDM}$ on an international satellite system? $500 \text{ MHz}$ $10 \text{ MHz}$ $1320 \text{ MHz}$ $50 \text{ MHz}$
How much bandwidth is required to send $132$ voice- grade channels by $\text{FDM}$ on an international satellite system?$500 \text{ MHz}$$10 \text{ MHz}$$1320 \text{ MHz}...
go_editor
178
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-june2006-paper2
+
–
0
votes
1
answer
1484
UGC NET CSE | June 2006 | Part 2 | Question: 28
What is the difference between the Ethernet frame preamble field and the $\text{IEEE}$ $802.3$ preamble and start of frame Delimiter fields? $1$ byte $1$ bit $4$ bits $16$ bits
What is the difference between the Ethernet frame preamble field and the $\text{IEEE}$ $802.3$ preamble and start of frame Delimiter fields?$1$ byte$1$ bit$4$ bits$16$ bi...
go_editor
1.1k
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-june2006-paper2
+
–
0
votes
1
answer
1485
UGC NET CSE | June 2006 | Part 2 | Question: 29
What is the function of a translating bridge? Connect similar remote $\text{LANs}$ Connect similar local $\text{LANs}$ Connect different types of $\text{LANs}$ Translate the network adresses into a layer $2$ address
What is the function of a translating bridge?Connect similar remote $\text{LANs}$Connect similar local $\text{LANs}$Connect different types of $\text{LANs}$Translate the ...
go_editor
281
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-june2006-paper2
+
–
0
votes
1
answer
1486
UGC NET CSE | June 2006 | Part 2 | Question: 30
The program used to determine the round – trip delay between a workstation and a destination adress is : Tracert Traceroute Ping Pop
The program used to determine the round – trip delay between a workstation and a destination adress is :TracertTraceroutePingPop
go_editor
719
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-june2006-paper2
+
–
0
votes
1
answer
1487
UGC NET CSE | December 2005 | Part 2 | Question: 1
$T$ is a graph with n vertices. $T$ is connected and has exactly $n-1$ edges, then : $T$ is a tree $T$ contains no cycles Every pairs of vertices in $T$ is connected by exactly one path All of these
$T$ is a graph with n vertices. $T$ is connected and has exactly $n-1$ edges, then :$T$ is a tree$T$ contains no cyclesEvery pairs of vertices in $T$ is connected by exac...
go_editor
343
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
1488
UGC NET CSE | December 2005 | Part 2 | Question: 2
If the proposition $7P\Rightarrow Q$ is true, then the truth value of the proportion $7PV \left ( P \Rightarrow Q \right )$ is : True Multi – Valued False Can not determined
If the proposition $7P\Rightarrow Q$ is true, then the truth value of the proportion $7PV \left ( P \Rightarrow Q \right )$ is :TrueMulti – ValuedFalseCan not determine...
go_editor
255
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
1489
UGC NET CSE | December 2005 | Part 2 | Question: 3
Let $A$ and $B$ be two arbitrary events, then : $P\left ( A\cap B \right )= P\left ( A \right )P\left ( B \right )$ $P\left ( P\cup B \right )= P\left ( A \right ) + P\left ( B \right )$ $P\left ( A\cup B \right )\leq P\left ( A \right ) + P\left ( B \right )$ $P\left ( A/ B \right )=P\left ( A\cap B \right )+P\left ( B \right )$
Let $A$ and $B$ be two arbitrary events, then :$P\left ( A\cap B \right )= P\left ( A \right )P\left ( B \right )$$P\left ( P\cup B \right )= P\left ( A \right ) + P\left...
go_editor
280
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
1490
UGC NET CSE | December 2005 | Part 2 | Question: 8
Consider the following sequence of instructions : $a= a \oplus b, b= a \oplus b, a= b \oplus a$ This Sequence retains the value of the $a$ and $b$ complements the value of $a$ and $b$ swap $a$ and $b$ negates values of $a$ and $b$
Consider the following sequence of instructions : $a= a \oplus b, b= a \oplus b, a= b \oplus a$ This Sequenceretains the value of the $a$ and $b$complements the value of...
go_editor
1.0k
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
1491
UGC NET CSE | December 2005 | Part 2 | Question: 9
Consider the following circuit : to make it a Tautology the $?$ should be : $\text{NAND}$ gate $\text{AND}$ gate $\text{OR}$ gate $\text{EX-OR}$ gate
Consider the following circuit :to make it a Tautology the $?$ should be :$\text{NAND}$ gate$\text{AND}$ gate$\text{OR}$ gate$\text{EX-OR}$ gate
go_editor
897
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
2
answers
1492
UGC NET CSE | December 2005 | Part 2 | Question: 12
The bitwise $\text{OR}$ of $35$ with $7$ in $C$ will be : $35$ $7$ $42$ $39$
The bitwise $\text{OR}$ of $35$ with $7$ in $C$ will be :$35$$7$$42$$39$
go_editor
395
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
digital-logic
number-system
+
–
0
votes
1
answer
1493
UGC NET CSE | December 2005 | Part 2 | Question: 13
Data members and member function of a class by default is respectively : private and public public public and private private
Data members and member function of a class by default is respectively :private and publicpublicpublic and privateprivate
go_editor
254
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
2
answers
1494
UGC NET CSE | December 2005 | Part 2 | Question: 14
Function over loading done at : Runtime Compile time Linking time Switching from function to function
Function over loading done at :RuntimeCompile timeLinking timeSwitching from function to function
go_editor
331
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
2
answers
1495
UGC NET CSE | December 2005 | Part 2 | Question: 16
A schema describes : data elements records and files record relationship all of the above
A schema describes :data elementsrecords and filesrecord relationshipall of the above
go_editor
1.3k
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
1496
UGC NET CSE | December 2005 | Part 2 | Question: 17
One approach to standarolizing storing of data : $\text{MIS}$ $\text{CODASYL}$ Stuctured Programing None of the above
One approach to standarolizing storing of data :$\text{MIS}$ $\text{CODASYL}$Stuctured ProgramingNone of the above
go_editor
231
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
1497
UGC NET CSE | December 2005 | Part 2 | Question: 19
An embedded printer provides : Physical record key An inserted Index A secondary access path All the above
An embedded printer provides :Physical record keyAn inserted IndexA secondary access pathAll the above
go_editor
288
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
1498
UGC NET CSE | December 2005 | Part 2 | Question: 20
A locked file can be : accessed by only one user modified by users with the correct password is used to hide sensitive information both $B$ and $C$
A locked file can be :accessed by only one usermodified by users with the correct passwordis used to hide sensitive informationboth $B$ and $C$
go_editor
201
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
1499
UGC NET CSE | December 2005 | Part 2 | Question: 21
In what tree, for every node the height of its left subtree and right subtree differ at least by one: Binary search tree $\text{AVL}$-tree Threaded binary tree Complete tree
In what tree, for every node the height of its left subtree and right subtree differ at least by one:Binary search tree$\text{AVL}$-treeThreaded binary treeComplete tree
go_editor
302
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
1500
UGC NET CSE | December 2005 | Part 2 | Question: 26
The data unit in the $\text{TCP/IP}$ application Layer is called a ____________ . message segment datagram frame
The data unit in the $\text{TCP/IP}$ application Layer is called a ____________ .messagesegmentdatagramframe
go_editor
2.1k
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
Page:
« prev
1
...
70
71
72
73
74
75
76
77
78
79
80
...
114
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register