Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2014-paper2
0
votes
2
answers
1
UGC NET CSE | June 2014 | Part 2 | Question: 50
Match the following $:$ ... $\text{a-ii; b-iii; c-i; d-iv}$ $\text{a-iv; b-i; c-ii; d-iii}$
Match the following $:$$\begin{array} {cIcI} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{DDL} & \text{i.} & \text{LOCK TABLE} \\ \text{b.} & \tex...
makhdoom ghaya
3.4k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
+
–
2
votes
3
answers
2
UGC NET CSE | June 2014 | Part 2 | Question: 49
Let $R =\{A, B, C, D, E, F\}$ be a relation schema with the following dependencies $C \rightarrow F$, $E \rightarrow A$, $EC \rightarrow D$, $A \rightarrow B$. Which of the following is a key for $R$ ? CD EC AE AC
Let $R =\{A, B, C, D, E, F\}$ be a relation schema with the following dependencies $C \rightarrow F$, $E \rightarrow A$, $EC \rightarrow D$, $A \rightarrow B$. Which of t...
makhdoom ghaya
20.0k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
database-normalization
+
–
3
votes
3
answers
3
UGC NET CSE | June 2014 | Part 2 | Question: 48
A clustering index is created when _______. Primary key is declared and ordered No key ordered Foreign key ordered There is no key and no order
A clustering index is created when _______. Primary key is declared and ordered No key orderedForeign key orderedThere is no key and no order
makhdoom ghaya
4.2k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
indexing
+
–
0
votes
2
answers
4
UGC NET CSE | June 2014 | Part 2 | Question: 46
Manager’s salary details are hidden from the employee. This is called as Conceptual level data hiding Physical level data hiding External level data hiding Local level data hiding
Manager’s salary details are hidden from the employee. This is called asConceptual level data hidingPhysical level data hidingExternal level data hiding Local level...
makhdoom ghaya
10.7k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
+
–
2
votes
1
answer
5
UGC NET CSE | June 2014 | Part 2 | Question: 45
Which of the following is the correct value returned to the operating system upon the successful completion of a program ? 0 1 -1 Program do not return a value.
Which of the following is the correct value returned to the operating system upon the successful completion of a program ? 01-1Program do not return a value.
makhdoom ghaya
2.6k
views
makhdoom ghaya
asked
Jul 1, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
+
–
0
votes
1
answer
6
UGC NET CSE | June 2014 | Part 2 | Question: 44
A friend function can be used to Avoid arguments between classes. Allow access to classes whose source code is unavailable. Allow one class to access an unrelated class. None of the above
A friend function can be used toAvoid arguments between classes.Allow access to classes whose source code is unavailable. Allow one class to access an unrelated class. No...
makhdoom ghaya
5.0k
views
makhdoom ghaya
asked
Jul 1, 2016
Object Oriented Programming
ugcnetcse-june2014-paper2
object-oriented-programming
friend-function
+
–
0
votes
1
answer
7
UGC NET CSE | June 2014 | Part 2 | Question: 43
While (87) printf(“computer”); The above $C$ statement will print “computer” $87$ times print “computer” $0$ times print “computer” $1$ times print “computer” infinite times
While (87) printf(“computer”); The above $C$ statement will print “computer” $87$ timesprint “computer” $0$ timesprint “computer” $1$ times print “compu...
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Jul 1, 2016
Programming in C
ugcnetcse-june2014-paper2
programming-in-c
+
–
0
votes
1
answer
8
UGC NET CSE | June 2014 | Part 2 | Question: 42
When we pass an array as an argument to a function, what actually gets passed ? Address of the array Values of the elements of the array Base address of the array Number of elements of the array
When we pass an array as an argument to a function, what actually gets passed ? Address of the array Values of the elements of the array Base address of the arrayNumber o...
makhdoom ghaya
1.6k
views
makhdoom ghaya
asked
Jul 1, 2016
Programming in C
ugcnetcse-june2014-paper2
programming
programming-in-c
+
–
0
votes
1
answer
9
UGC NET CSE | June 2014 | Part 2 | Question: 41
Match the following $:$ ... $\text{a-iv; b-iii; c-ii; d-ii}$ $\text{a-iv; b-iii; ci; d-ii}$
Match the following $:$$\begin{array}{cIcI} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Automatic Storage} & \text{i.} & \text{Scope of the vari...
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jul 1, 2016
Programming in C
ugcnetcse-june2014-paper2
programming-in-c
storage-classes-in-c
+
–
1
votes
2
answers
10
UGC NET CSE | June 2014 | Part 2 | Question: 39
An algorithm is made up of $2$ modules $M_{1}$ and $M_{2}$ . If time complexity of modules $M_{1}$ and $M_{2}$ are $h(n)$ and $g(n)$ respectively, the time complexity of the algorithm is $\min (h(n), g(n))$ $\max (h(n), g(n))$ $h(n) + g(n)$ $h(n) * g(n)$
An algorithm is made up of $2$ modules $M_{1}$ and $M_{2}$ . If time complexity of modules $M_{1}$ and $M_{2}$ are $h(n)$ and $g(n)$ respectively, the time complexity of ...
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Jul 1, 2016
Algorithms
ugcnetcse-june2014-paper2
algorithms
time-complexity
asymptotic-notation
+
–
1
votes
2
answers
11
UGC NET CSE | June 2014 | Part 2 | Question: 38
Searching for an element in the hash table requires $O(1)$ time for the _________time, whereas for direct addressing it holds for the _______ time. worst-case, average worst-case, worst-case average, worst-case best, average
Searching for an element in the hash table requires $O(1)$ time for the _________time, whereas for direct addressing it holds for the _______ time.worst-case, averagewors...
makhdoom ghaya
3.5k
views
makhdoom ghaya
asked
Jun 29, 2016
DS
ugcnetcse-june2014-paper2
hashing
data-structures
+
–
1
votes
2
answers
12
UGC NET CSE | June 2014 | Part 2 | Question: 37
A text is made up of the characters $\alpha, \beta, \gamma, \delta$ and $\sigma$ with the probability $0.12, 0.40, 0.15, 0.08$ and $0.25$ respectively. The optimal coding technique will have the average length of $1.7$ $2.15$ $3.4$ $3.8$
A text is made up of the characters $\alpha, \beta, \gamma, \delta$ and $\sigma$ with the probability $0.12, 0.40, 0.15, 0.08$ and $0.25$ respectively. The optimal coding...
makhdoom ghaya
5.4k
views
makhdoom ghaya
asked
Jun 29, 2016
Digital Logic
ugcnetcse-june2014-paper2
computer-networks
encoding
+
–
1
votes
2
answers
13
UGC NET CSE | June 2014 | Part 2 | Question: 36
Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ? The array elements form a heap. Elements in each half of the array are sorted amongst themselves. Elements in the first half of the array are less than or equal to elements in second half of the array. All of the above
Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ?The array elements form a heap.Elements in...
makhdoom ghaya
5.9k
views
makhdoom ghaya
asked
Jun 29, 2016
Algorithms
ugcnetcse-june2014-paper2
algorithms
sorting
merge-sort
+
–
0
votes
1
answer
14
UGC NET CSE | June 2014 | Part 2 | Question: 35
Which of the following commands will output “onetwothree” ? for val; do echo-n $val; done < one two three for one two three; do echo-n-; done for n in one two three; do echo-n $n; done for n in one two three {echo –n $ n}
Which of the following commands will output “onetwothree” ?for val; do echo-n $val; done < one two threefor one two three; do echo-n-; donefor n in one two th...
makhdoom ghaya
2.0k
views
makhdoom ghaya
asked
Jun 29, 2016
Others
ugcnetcse-june2014-paper2
non-gate
unix
shell-script
+
–
1
votes
2
answers
15
UGC NET CSE | June 2014 | Part 2 | Question: 34
Match the following $:$ ... $\text{a-i; b-ii; c-iv; d-iii}$ $\text{a-i; b-iv; c-ii; d-iii}$
Match the following $:$$\begin{array}{clcl} \text{} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Contiguous allocation} & \text{i.} & \text{This s...
makhdoom ghaya
6.2k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
file-system
+
–
3
votes
4
answers
16
UGC NET CSE | June 2014 | Part 2 | Question: 33
Consider a system with five processes $P_{0}$ through $P_{4}$ and three resource types $R_{1}$, $R_{2}$ and $R_{3}$ . Resource type $R_{1}$ has $10$ instances, $R_{2}$ has $5$ instances and $R_{3}$ has ... $R_{3}$. The state resulting after this allocation will be Ready state Safe state Blocked state Unsafe state
Consider a system with five processes $P_{0}$ through $P_{4}$ and three resource types $R_{1}$, $R_{2}$ and $R_{3}$ . Resource type $R_{1}$ has $10$ instances, $R_{2}$ ha...
makhdoom ghaya
7.0k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
resource-allocation
+
–
2
votes
2
answers
17
UGC NET CSE | June 2014 | Part 2 | Question: 32
Match the following $:$ ... $\text{a-iii; b-i; c-iv; d-i}$ $\text{a-ii; b-iii; c-iv; d-i}$
Match the following $:$$\begin{array}{clcl} & \textbf{List – I} && \textbf{List – II} \\ \text{a}. & \text{Multilevel feedback queue} & \text{i.} & \text{Time-slicin...
makhdoom ghaya
3.2k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
process-scheduling
+
–
0
votes
3
answers
18
UGC NET CSE | June 2014 | Part 2 | Question: 31
In a paged memory management algorithm, the hit ratio is $70$%. If it takes $30$ nanoseconds to search Translation Look-aside Buffer (TLB) and $100$ nanoseconds (ns) to access memory, the effective memory access time is $91$ ns $69$ ns $200$ ns $160$ ns
In a paged memory management algorithm, the hit ratio is $70$%. If it takes $30$ nanoseconds to search Translation Look-aside Buffer (TLB) and $100$ nanoseconds (ns) to a...
makhdoom ghaya
8.8k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
virtual-memory
+
–
0
votes
2
answers
19
UGC NET CSE | June 2014 | Part 2 | Question: 30
SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for Secure Electronic Transaction Secular Enterprise for Transaction Security Electronic Transmission Secured Electronic Termination
SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands forSecure Electronic Transaction...
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Jun 27, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
network-security
+
–
0
votes
1
answer
20
UGC NET CSE | June 2014 | Part 2 | Question: 29
Match the following $:$ ... $\text{a-iii; b-iv; c-i; d-ii}$ $\text{a-iv; b-iii; c-ii; d-i}$
Match the following $:$$\begin{array}{clcl} & \textbf{List – I} & & \textbf{List – II} \\ \text{a.} & \text{Classification} & \text{i.} & \text{Principal component ...
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jun 27, 2016
Others
ugcnetcse-june2014-paper2
machine-learning
+
–
0
votes
1
answer
21
UGC NET CSE | June 2014 | Part 2 | Question: 28
A software agent is defined as A software developed for accomplishing a given task. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task. An open source software for accomplishing a given task. $I$ $II$ $III$ All of the above
A software agent is defined asA software developed for accomplishing a given task.A computer program which is capable of acting on behalf of the user in order to accompli...
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jun 27, 2016
IS&Software Engineering
ugcnetcse-june2014-paper2
is&software-engineering
+
–
0
votes
1
answer
22
UGC NET CSE | June 2014 | Part 2 | Question: 27
Object Request Broker (ORB) is I. A software program that runs on the client as well as on the application server. II. A software program that runs on the client side only. III. A software program that runs on the application server, where most of the components reside. $I$, $II$ & $III$ $I$ & $II$ $II$ & $III$ $I$ only
Object Request Broker (ORB) isI. A software program that runs on the client as well as on the application server.II. A software program that runs on the client side only....
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jun 27, 2016
Distributed Computing
ugcnetcse-june2014-paper2
non-gate
distributed-computing
+
–
1
votes
1
answer
23
UGC NET CSE | June 2014 | Part 2 | Question: 26
Match the following with respect to the mobile computing technologies $:$ ... $\text{a-ii; b-iii; c-iv; d-i}$ $\text{a-ii; b-i; c-iv; d-iii}$
Match the following with respect to the mobile computing technologies $:$$\begin{array}{cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{GPRS} & \text{i...
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Jun 27, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
mobile-communication
+
–
1
votes
1
answer
24
UGC NET CSE | June 2014 | Part 2 | Question: 25
How many cards must be chosen from a deck to guarantee that at least two aces of two kinds are chosen. two aces are chosen. two cards of the same kind are chosen. two cards of two different kinds are chosen. $50, 50, 14, 5$ $51, 51, 15, 7$ $52, 52, 14, 5$ $51, 51, 14, 5$
How many cards must be chosen from a deck to guarantee that at leasttwo aces of two kinds are chosen.two aces are chosen.two cards of the same kind are chosen.two cards o...
makhdoom ghaya
2.9k
views
makhdoom ghaya
asked
Jun 27, 2016
Combinatory
ugcnetcse-june2014-paper2
combinatory
+
–
2
votes
3
answers
25
UGC NET CSE | June 2014 | Part 2 | Question: 24
Big-$O$ estimates for the factorial function and the logarithm of the factorial function i.e. $n!$ and $\log n!$ is given by $O(n!)$ and $O(n \log n)$ $O(n^{n})$ and $O(n \log n)$ $O(n!)$ and $O(\log n!)$ $O(n^{n})$ and $O(\log n!)$
Big-$O$ estimates for the factorial function and the logarithm of the factorial function i.e. $n!$ and $\log n!$ is given by $O(n!)$ and $O(n \log n)$$O(n^{n})$ and $O(n ...
makhdoom ghaya
5.3k
views
makhdoom ghaya
asked
Jun 27, 2016
Algorithms
ugcnetcse-june2014-paper2
algorithms
time-complexity
asymptotic-notation
+
–
1
votes
2
answers
26
UGC NET CSE | June 2014 | Part 2 | Question: 23
Consider a complete bipartite graph $k_{m,n}$. For which values of $m$ and $n$ does this, complete graph have a Hamilton circuit $m = 3, n = 2$ $m = 2, n = 3$ $m = n > 2$ $m = n > 3$
Consider a complete bipartite graph $k_{m,n}$. For which values of $m$ and $n$ does this, complete graph have a Hamilton circuit $m = 3, n = 2$$m = 2, n = 3$ $m = n 2$$m...
makhdoom ghaya
7.1k
views
makhdoom ghaya
asked
Jun 27, 2016
Graph Theory
ugcnetcse-june2014-paper2
graph-theory
hamiltonian-graph
+
–
1
votes
1
answer
27
UGC NET CSE | June 2014 | Part 2 | Question: 22
The upper bound and lower bound for the number of leaves in a B-tree of degree $K$ with height $h$ is given by : $K^{h}$ and $2 \lceil \frac{k}{2} \rceil ^{h-1}$ $K * h$ and $2 \lfloor \frac{k}{2} \rfloor ^{h-1}$ $K^{h}$ and $2 \lfloor \frac{k}{2} \rfloor ^{h-1}$ $K * h$ and $2 \lceil \frac{k}{2} \rceil ^{h-1}$
The upper bound and lower bound for the number of leaves in a B-tree of degree $K$ with height $h$ is given by : $K^{h}$ and $2 \lceil \frac{k}{2} \rceil ^{h-1}$$K * h$ a...
makhdoom ghaya
2.6k
views
makhdoom ghaya
asked
Jun 27, 2016
Databases
ugcnetcse-june2014-paper2
databases
b-tree
+
–
2
votes
2
answers
28
UGC NET CSE | June 2014 | Part 2 | Question: 21
Consider the graph given below as : Which one of the following graph is isomorphic to the above graph ?
Consider the graph given below as :Which one of the following graph is isomorphic to the above graph ?
makhdoom ghaya
3.5k
views
makhdoom ghaya
asked
Jun 27, 2016
Graph Theory
ugcnetcse-june2014-paper2
graph-theory
non-gate
graph-isomorphism
+
–
2
votes
1
answer
29
UGC NET CSE | June 2014 | Part 2 | Question: 20
Give a compound proposition involving propositions $p, q$ and $r$ that is true when exactly two of $p, q$ and $r$ are true and is false otherwise $(p\vee q \wedge \neg r) \wedge (p \wedge \neg q \wedge r) \wedge (\neg p \wedge q \wedge r)$ ... $(p \wedge q \wedge \neg r) \vee (p \wedge \neg q \wedge r) \vee (\neg p \wedge q \wedge r)$
Give a compound proposition involving propositions $p, q$ and $r$ that is true when exactly two of $p, q$ and $r$ are true and is false otherwise$(p\vee q \wedge \neg r) ...
makhdoom ghaya
5.8k
views
makhdoom ghaya
asked
Jun 25, 2016
Mathematical Logic
ugcnetcse-june2014-paper2
mathematical-logic
propositional-logic
+
–
4
votes
2
answers
30
UGC NET CSE | June 2014 | Part 2 | Question: 19
The notation $\exists ! x P(x)$ denotes the proposition “there exists a unique $x$ such that $P(x)$ is true”. Give the truth values of the following statements : I.$\exists ! x P(x) \rightarrow \exists x P(x)$ ... $II$ are true. Both $I$ & $II$ are false. $I$ - false, $II$ - true $I$ - true, $II$ - false
The notation $\exists ! x P(x)$ denotes the proposition “there exists a unique $x$ such that $P(x)$ is true”. Give the truth values of the following statement...
makhdoom ghaya
2.0k
views
makhdoom ghaya
asked
Jun 25, 2016
Mathematical Logic
ugcnetcse-june2014-paper2
mathematical-logic
first-order-logic
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register