Recent questions tagged ugcnetcse-dec2011-paper2

1.2k
views
2 answers
2 votes
Following is used to demonstrate that the new release of software still performs the old one did by rerunning the old tests :Functional testingPath testingStress testingR...
2.9k
views
2 answers
4 votes
Design recovery from source code is done duringreverse engineeringre-engineeringreuseall of the above
2.8k
views
2 answers
2 votes
Emergency fixes known as patches are result ofAdaptive maintenancePerfective maintenanceCorrective maintenanceNone of the above
1.3k
views
0 answers
1 votes
McCabe’s cyclomatic metric $V(G)$ of a graph $G$ with $n$ vertices, $e$ edges and $p$ connected component is$e$$n$$e – n + p$$e – n + 2p$
2.3k
views
1 answers
2 votes
McCabe’s cyclomatic metric $V(G)$ of a graph $G$ with $n$ vertices, $e$ edges and $p$ connected component is$e$ $n$ $e – n + p$ $e – n + 2p$
2.2k
views
1 answers
2 votes
An SRSEstablishes the basis for agreement between client and the supplier.Provides a reference for validation of the final product.Is a prerequisite to high quality softw...
3.1k
views
1 answers
1 votes
For a data entry project for office staff who have never used computers before (user interface and user friendliness are extremely important), one will useSpiral modelCom...
674
views
1 answers
2 votes
Start and stop bits are used in serial communications forError detectionError correctionSynchronizationSlowing down the communication
2.6k
views
1 answers
2 votes
A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?Hot potato routingFloodin...
1.8k
views
1 answers
1 votes
Which of the following network access standard disassembler is used for connection station to a packet switched network ?$X.3$$X.21$$X.25$$X.75$
1.2k
views
1 answers
3 votes
The amount of uncertainty in a system of symbol is calledBandwidthEntropyLossQuantum
2.2k
views
2 answers
1 votes
Hub is a term used withA Star NetworksA Ring NetworksA RouterA Bridge
705
views
2 answers
2 votes
BCC in the internet refers toBlack carbon copyBlind carbon copyBlank carbon copyBeautiful carbon copy
3.7k
views
2 answers
1 votes
A hash table has space for $75$ records, then the probability of collision before the table is $6$% full.$.25$$.20$ $.35$$.30$
811
views
1 answers
3 votes
Maximum number of edges in a n -Node undirected graph without self loop is$n^{2}$$n(n – 1)$ $n(n + 1)$$\frac{n(n - 1)}{2}$
1.5k
views
1 answers
2 votes
Domain and Range of the function $Y= - \sqrt{-2x + 3}$ is$x \geq \frac{3}{2}, y \geq 0$$x \frac{3}{2}, y \leq 0$$x \geq \frac{3}{2}, y \leq 0$ $x \leq \frac{3}{2}, y \le...
2.5k
views
1 answers
3 votes
Which of the following is a bad example of recursion ?FactorialFibonacci numbersTower of HanaiTree traversal
4.8k
views
2 answers
1 votes
The total number of comparisons in a bubble sort is$0(\log n)$$0(n \log n)$$0(n)$None of the above
9.6k
views
3 answers
3 votes
Which of the following data structure is Non-linear type ?StringsListsStacksNone of the above