Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged non-gate
3
votes
1
answer
511
UGC NET CSE | June 2012 | Part 2 | Question: 18
Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e., modulation rate) 2400 bauds 1200 bauds 4800 bauds 9600 bauds
Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e., modulation rate)2400 bauds1200 bauds4...
go_editor
3.9k
views
go_editor
asked
Jul 5, 2016
Digital Signal Processing
ugcnetcse-june2012-paper2
non-gate
digital-signal-processing
+
–
0
votes
2
answers
512
UGC NET CSE | June 2014 | Part 3 | Question: 10
Code blocks allow many algorithms to be implemented with the following parameters : clarity, elegance, performance clarity, elegance, efficiency elegance, performance, execution execution, clarity, performance
Code blocks allow many algorithms to be implemented with the following parameters :clarity, elegance, performance clarity, elegance, efficiencyelegance, performance, exec...
makhdoom ghaya
1.6k
views
makhdoom ghaya
asked
Jul 4, 2016
Programming in C
ugcnetjune2014iii
programming
non-gate
+
–
0
votes
3
answers
513
UGC NET CSE | June 2014 | Part 3 | Question: 05
Which of the following color models are defined with three primary colors ? RGB and HSV color models CMY and HSV color models HSV and HLS color models RGB and CMY color models
Which of the following color models are defined with three primary colors ? RGB and HSV color modelsCMY and HSV color modelsHSV and HLS color modelsRGB and CMY color mode...
makhdoom ghaya
4.4k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
0
votes
1
answer
514
UGC NET CSE | June 2014 | Part 3 | Question: 04
Consider a window bounded by the lines : $x = 0; y= 0; x = 5$ and $y = 3$. The line segment joining $(-1, 0)$ and $(4, 5)$, if clipped against this window will connect the points $(0, 1)$ and $(2, 3)$ $(0, 1)$ and $(3, 3)$ $(0, 1)$ and $(4, 3)$ $(0, 1)$ and $(3, 2)$
Consider a window bounded by the lines : $x = 0; y= 0; x = 5$ and $y = 3$. The line segment joining $(-1, 0)$ and $(4, 5)$, if clipped against this window will connect th...
makhdoom ghaya
7.2k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
geometry
computer-graphics
+
–
0
votes
2
answers
515
UGC NET CSE | June 2014 | Part 3 | Question: 03
Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes $:$ ... $\text{a-iv, b-iii, c-ii, d-i}$ $\text{a-iii, b-i, c-iv, d-ii}$
Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes $:$$\begin{array}{cIcI} & \textbf{List...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
2
votes
2
answers
516
UGC NET CSE | June 2014 | Part 3 | Question: 02
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are Butt cap and sharp cap Butt cap and round cap Butt cap, sharp cap and round cap Butt cap, round cap and projecting square cap
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used areButt cap and sharp capButt cap and round ...
makhdoom ghaya
3.1k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
0
votes
1
answer
517
UGC NET CSE | June 2014 | Part 3 | Question: 01
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used in rasterscan ... method. IV. Shadow-mask method is better than beam-penetration method. I and II II and III III only IV only
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ?I. The beam-penetration is used...
makhdoom ghaya
6.2k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
4
votes
2
answers
518
ISRO2016-63
Configuration management is not concerned with controlling changes to the source code choice of hardware configuration for an application controllling documentation changes maintaining versions of software
Configuration management is not concerned withcontrolling changes to the source codechoice of hardware configuration for an applicationcontrollling documentation changesm...
asu
4.3k
views
asu
asked
Jul 4, 2016
IS&Software Engineering
non-gate
is&software-engineering
isro2016
+
–
3
votes
2
answers
519
ISRO2016-65
A company needs to develop a digital signal processing software for one of its newest inventions. The software is expected to have 20000 lines of code. The company needs to determine the effort in person-months needed to develop this software using the basic COCOMO model ... exponentiation factor is given as 1.5. What is the estimated effort in person-months? 196.77 206.56 199.56 210.68
A company needs to develop a digital signal processing software for one of its newest inventions. The software is expected to have 20000 lines of code. The company needs ...
Arjun
7.5k
views
Arjun
asked
Jul 4, 2016
IS&Software Engineering
non-gate
is&software-engineering
isro2016
+
–
1
votes
1
answer
520
UGC NET CSE | June 2012 | Part 2 | Question: 9
What deletes the entire file except the file structure? ERASE DELETE ZAP PACK
What deletes the entire file except the file structure?ERASEDELETEZAPPACK
go_editor
1.1k
views
go_editor
asked
Jul 4, 2016
Web Technologies
ugcnetcse-june2012-paper2
databases
non-gate
+
–
4
votes
2
answers
521
ISRO2016-78
If a class $C$ is derived from class $B$, which is derived form class $A$, all through public inheritance, then a class $C$ member function can access only protected and public data of $C$ and $B$ Only protected and public data of $C$ all data of $C$ and private data of $A$ and $B$ public and protected data of $A$ and $B$ and all data of $C$
If a class $C$ is derived from class $B$, which is derived form class $A$, all through public inheritance, then a class $C$ member function can accessonly protected and p...
Desert_Warrior
7.2k
views
Desert_Warrior
asked
Jul 3, 2016
Object Oriented Programming
non-gate
object-oriented-programming
isro2016
+
–
3
votes
1
answer
522
ISRO2014-80
A computing architecture, which allows the user to use computers from multiple administrative domains to reach a common goal is called as Grid Computing Neutral Networks Parallel Processing Cluster Computing
A computing architecture, which allows the user to use computers from multiple administrative domains to reach a common goal is called asGrid ComputingNeutral NetworksPar...
go_editor
3.7k
views
go_editor
asked
Jul 1, 2016
Distributed Computing
isro2014
non-gate
distributed-computing
+
–
6
votes
1
answer
523
ISRO2014-76
A web client sends a request to a web server. The web server transmits a program to that client ans is executed at client. It creates a web document. What are such web documents called? Active Static Dynamic Passive
A web client sends a request to a web server. The web server transmits a program to that client ans is executed at client. It creates a web document. What are such web do...
go_editor
4.5k
views
go_editor
asked
Jul 1, 2016
Web Technologies
isro2014
web-technologies
non-gate
+
–
5
votes
1
answer
524
ISRO2014-69
For a software project, the spiral model was employed. When will the spiral stop? When the software product is retired When the software product is released after Beta testing When the risk analysis is completed After completing five loops
For a software project, the spiral model was employed. When will the spiral stop?When the software product is retiredWhen the software product is released after Beta test...
go_editor
3.3k
views
go_editor
asked
Jul 1, 2016
IS&Software Engineering
isro2014
is&software-engineering
non-gate
+
–
3
votes
2
answers
525
ISRO2014-65
A cube of side $1$ unit is placed in such a way that the origin coincides with one of its top vertices and the three axes along three of its edges. What are the co-ordinates of the vertex which is diagonally opposite to the vertex whose co-ordinates are $(1, 0, 1)?$ $(0, 0, 0)$ $(0, -1, 0)$ $(0, 1, 0)$ $(1, 1, 1)$
A cube of side $1$ unit is placed in such a way that the origin coincides with one of its top vertices and the three axes along three of its edges. What are the co-ordina...
go_editor
6.9k
views
go_editor
asked
Jul 1, 2016
Geometry
isro2014
geometry
non-gate
+
–
7
votes
2
answers
526
ISRO2014-54
The conic section that is obtained when a right circular cone is cut through a plane that is parallel to the side of the cone is called _____ parabola hyperpola circle ellipse
The conic section that is obtained when a right circular cone is cut through a plane that is parallel to the side of the cone is called _____parabolahyperpolacircleellips...
go_editor
6.5k
views
go_editor
asked
Jul 1, 2016
Geometry
isro2014
non-gate
geometry
+
–
4
votes
1
answer
527
ISRO2014-46
If the maximum output voltage of a DAC is $V$ volts and if the resolution is $R$ bits then the weight of the most significant bit is ________ $V/(2^R -1)$ $(2^{R-1}).V/(2^R-1)$ $(2^{R-1}).V$ $V/(2^{R-1})$
If the maximum output voltage of a DAC is $V$ volts and if the resolution is $R$ bits then the weight of the most significant bit is ________$V/(2^R -1)$$(2^{R-1}).V/(2^R...
go_editor
3.2k
views
go_editor
asked
Jul 1, 2016
Integrated Circuits
isro2014
non-gate
integrated-circuits
+
–
0
votes
0
answers
528
Hardware Operation Chart of one digital system, anyone can help?
I try to figure out one of the tests that adopted from GATE exams, but nothing founds, anyone can describe it for me? Question: We shown the Hardware Operation Chart of one digital system in the following figure: activity of control signals for each operational ... unit how many and, or gate is needed? A) 4, 5 B) 4, 4 C) 5,3 D)4, 3
I try to figure out one of the tests that adopted from GATE exams, but nothing founds, anyone can describe it for me?Question: We shown the Hardware Operation Chart of on...
Sara Nimlon
888
views
Sara Nimlon
asked
Jun 30, 2016
CO and Architecture
digital-logic
co-and-architecture
control-unit
cpu
microprogramming
non-gate
+
–
4
votes
2
answers
529
ISRO2014-20
Which of the following is not a maturity level as per Capability Maturity Model? Initial Measurable Repeatable Optimized
Which of the following is not a maturity level as per Capability Maturity Model?InitialMeasurableRepeatableOptimized
kvkumar
3.7k
views
kvkumar
asked
Jun 29, 2016
IS&Software Engineering
is&software-engineering
non-gate
isro2014
+
–
0
votes
1
answer
530
UGC NET CSE | June 2014 | Part 2 | Question: 35
Which of the following commands will output “onetwothree” ? for val; do echo-n $val; done < one two three for one two three; do echo-n-; done for n in one two three; do echo-n $n; done for n in one two three {echo –n $ n}
Which of the following commands will output “onetwothree” ?for val; do echo-n $val; done < one two threefor one two three; do echo-n-; donefor n in one two th...
makhdoom ghaya
2.0k
views
makhdoom ghaya
asked
Jun 29, 2016
Others
ugcnetcse-june2014-paper2
non-gate
unix
shell-script
+
–
2
votes
1
answer
531
oops java
Why Java does not support multiple inheritance? i want answer in simple words. i have searched for this answer in every textbook. Everytext just says that it doesnot support.There is no proper reason defined.Please tell me ?
Why Java does not support multiple inheritance?i want answer in simple words. i have searched for this answer in every textbook.Everytext just says that it doesnot suppor...
LavTheRawkstar
461
views
LavTheRawkstar
asked
Jun 28, 2016
Programming in C
java
non-gate
+
–
1
votes
1
answer
532
Programming Question [JAVA OOPS ]
Which of the following methods from Object is final ( that it cannot be overriden ) ? (A) finalize method (B) clone method (C) hashCode method (D) getClass method
Which of the following methods from Object is final ( that it cannot be overriden ) ?(A) finalize method(B) clone method(C) hashCode method(D) getClass method
LavTheRawkstar
2.1k
views
LavTheRawkstar
asked
Jun 28, 2016
Java
non-gate
java
+
–
2
votes
3
answers
533
ISRO2014-29
Consider the following Java code fragment: public class While { public void loop() { int x = 0; while(1) { System.out.println("x plus one is" +(x+1)); } } } There is syntax error in line no. 1 There is syntax errors in line nos. 1 & 6 There is syntax error in line no. 8 There is syntax error in line no. 6
Consider the following Java code fragment:public class While { public void loop() { int x = 0; while(1) { System.out.println("x plus one is" +(x+1)); } } }There is syntax...
shivanisrivarshini
5.0k
views
shivanisrivarshini
asked
Jun 27, 2016
Java
isro2014
java
non-gate
+
–
0
votes
1
answer
534
UGC NET CSE | June 2014 | Part 2 | Question: 27
Object Request Broker (ORB) is I. A software program that runs on the client as well as on the application server. II. A software program that runs on the client side only. III. A software program that runs on the application server, where most of the components reside. $I$, $II$ & $III$ $I$ & $II$ $II$ & $III$ $I$ only
Object Request Broker (ORB) isI. A software program that runs on the client as well as on the application server.II. A software program that runs on the client side only....
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jun 27, 2016
Distributed Computing
ugcnetcse-june2014-paper2
non-gate
distributed-computing
+
–
2
votes
2
answers
535
UGC NET CSE | June 2014 | Part 2 | Question: 21
Consider the graph given below as : Which one of the following graph is isomorphic to the above graph ?
Consider the graph given below as :Which one of the following graph is isomorphic to the above graph ?
makhdoom ghaya
3.5k
views
makhdoom ghaya
asked
Jun 27, 2016
Graph Theory
ugcnetcse-june2014-paper2
graph-theory
non-gate
graph-isomorphism
+
–
3
votes
4
answers
536
ISRO2014-48
A frame buffer array is addressed in row major order for a monitor with pixel locations starting from $(0,0)$ and ending with $(100,100).$ What is address of the pixel $(6,10)?$ Assume one bit storage per pixel and starting pixel location is at $0.$ $1016$ $1006$ $610$ $616$
A frame buffer array is addressed in row major order for a monitor with pixel locations starting from $(0,0)$ and ending with $(100,100).$ What is address of the pixel $(...
neha singh
9.5k
views
neha singh
asked
Jun 26, 2016
Computer Graphics
isro2014
non-gate
computer-graphics
+
–
6
votes
3
answers
537
ISRO2014-4
Consider the following pseudo- code while (m<n) if (x>y ) and (a<b) then a=a+1 y=y-1 end if m=m+1 end while What is cyclomatic complexity of the above pseudo -code? 2 3 4 5
Consider the following pseudo- codewhile (m<n) if (x>y ) and (a<b) then a=a+1 y=y-1 end if m=m+1 end whileWhat is cyclomatic complexity of the above pseudo -code?2345
neha singh
8.1k
views
neha singh
asked
Jun 26, 2016
IS&Software Engineering
isro2014
is&software-engineering
cyclomatic-complexity
non-gate
+
–
3
votes
2
answers
538
ISRO2011-80
Logic family popular for low power dissipation CMOS ECL TTL DTL
Logic family popular for low power dissipationCMOSECLTTLDTL
go_editor
3.7k
views
go_editor
asked
Jun 24, 2016
Integrated Circuits
isro2011
non-gate
integrated-circuits
+
–
7
votes
2
answers
539
ISRO2011-75
In HTML, which of the following can be considered a container? <SELECT> <Value> <INPUT> <BODY>
In HTML, which of the following can be considered a container?<SELECT><Value><INPUT><BODY>
go_editor
5.0k
views
go_editor
asked
Jun 23, 2016
Web Technologies
isro2011
non-gate
web-technologies
html
+
–
7
votes
2
answers
540
ISRO2011-72
Find the output of the following Java code line System.out.printIn(math.floor(-7.4)) -7 -8 -7.4 -7.0
Find the output of the following Java code line System.out.printIn(math.floor(-7.4))-7-8-7.4-7.0
go_editor
3.9k
views
go_editor
asked
Jun 23, 2016
Java
isro2011
non-gate
java
+
–
Page:
« prev
1
...
13
14
15
16
17
18
19
20
21
22
23
24
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register