Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2015-paper2
1
votes
1
answer
1
UGC NET CSE | Junet 2015 | Part 2 | Question: 50
Which of the following is not valid with reference to Message Passing Interface(MPI)? MPI can run on any hardware platform The programming model is a distributed memory model All parallelism is implicit MPI- Comm - Size returns the total number of MPI processes in specified communication
Which of the following is not valid with reference to Message Passing Interface(MPI)?MPI can run on any hardware platformThe programming model is a distributed memory mod...
go_editor
2.9k
views
go_editor
asked
Jul 31, 2016
Distributed Computing
ugcnetcse-june2015-paper2
parallel-computing
message-passing
+
–
6
votes
3
answers
2
UGC NET CSE | Junet 2015 | Part 2 | Question: 49
Which of the following statements is false about weak entity set? Weak entities can be deleted automatically when their strong entity is deleted Weak entity set avoids the data duplication and consequent possible inconsistencies caused by ... a weak entity set are not partitioned according to their relationship with tuples with a strong entity set
Which of the following statements is false about weak entity set?Weak entities can be deleted automatically when their strong entity is deletedWeak entity set avoids the ...
go_editor
5.7k
views
go_editor
asked
Jul 31, 2016
Databases
ugcnetcse-june2015-paper2
er-diagram
databases
+
–
0
votes
4
answers
3
UGC NET CSE | Junet 2015 | Part 2 | Question: 48
Which of the following algorithms sort $n$ integers, having the range $0$ to $(n^2 -1)$, in ascending order in $O(n)$ time? Selection sort Bubble sort Radix sort Insertion sort
Which of the following algorithms sort $n$ integers, having the range $0$ to $(n^2 -1)$, in ascending order in $O(n)$ time?Selection sortBubble sortRadix sortInsertion so...
go_editor
4.1k
views
go_editor
asked
Jul 31, 2016
Algorithms
ugcnetcse-june2015-paper2
algorithms-sorting
+
–
0
votes
2
answers
4
UGC NET CSE | Junet 2015 | Part 2 | Question: 47
Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? The PVM communication model provides asynchronous blocking send, asynchronous blocking receive, amd non-blocking receive function Message buffers are allocated dynamically ... to the size or number of such messages In PVM model, the message order is not preserved
Which of the following statements is incorrect for Parallel Virtual Machine (PVM)?The PVM communication model provides asynchronous blocking send, asynchronous blocking r...
go_editor
1.7k
views
go_editor
asked
Jul 31, 2016
Distributed Computing
ugcnetcse-june2015-paper2
distributed-computing
parallel-virtual-machine
+
–
0
votes
2
answers
5
UGC NET CSE | Junet 2015 | Part 2 | Question: 46
In the case of parallelization, Amdahl's law states that if $P$ is the proportion of a program that can be made parallel and $(1-P)$ is the proportion that cannot be parallelized, then the maximum speed-up that can be achieved by using $N$ ... $\dfrac{1}{(1-P)+\frac{P}{N}} \\$ $\dfrac{1}{P+\frac{(1-P)}{N}}$
In the case of parallelization, Amdahl's law states that if $P$ is the proportion of a program that can be made parallel and $(1-P)$ is the proportion that cannot be para...
go_editor
3.8k
views
go_editor
asked
Jul 31, 2016
CO and Architecture
ugcnetcse-june2015-paper2
parallel-processing
amdahls-law
+
–
1
votes
1
answer
6
UGC NET CSE | Junet 2015 | Part 2 | Question: 45
Which one from the following is highly associated activity of project planning? Keep track of the progress Compare the actual and planned progress and costs Identify the activities, milestones and deliverables produced by a project Both B and C
Which one from the following is highly associated activity of project planning?Keep track of the progressCompare the actual and planned progress and costsIdentify the act...
go_editor
3.1k
views
go_editor
asked
Jul 30, 2016
IS&Software Engineering
ugcnetcse-june2015-paper2
is&software-engineering
project-planning
+
–
0
votes
1
answer
7
UGC NET CSE | Junet 2015 | Part 2 | Question: 44
Cohesion is an extension of: Abstraction concept Refinment concept Information hiding concept Modularity
Cohesion is an extension of:Abstraction conceptRefinment conceptInformation hiding conceptModularity
go_editor
4.7k
views
go_editor
asked
Jul 30, 2016
IS&Software Engineering
ugcnetcse-june2015-paper2
is&software-engineering
cohesion
+
–
1
votes
3
answers
8
UGC NET CSE | Junet 2015 | Part 2 | Question: 43
Which process model is also called as classic life cycle model? Waterfall model RAD model Prototyping model Incremental model
Which process model is also called as classic life cycle model?Waterfall modelRAD modelPrototyping modelIncremental model
go_editor
2.8k
views
go_editor
asked
Jul 30, 2016
IS&Software Engineering
ugcnetcse-june2015-paper2
is&software-engineering
life-cycle-model
+
–
2
votes
1
answer
9
UGC NET CSE | Junet 2015 | Part 2 | Question: 42
Which of the testing strategy requirements established during requirements analysis are validated against developed software? validation testing integration testing regression testing system testing
Which of the testing strategy requirements established during requirements analysis are validated against developed software?validation testingintegration testingregressi...
go_editor
2.9k
views
go_editor
asked
Jul 30, 2016
IS&Software Engineering
ugcnetcse-june2015-paper2
software-testing
is&software-engineering
+
–
3
votes
1
answer
10
UGC NET CSE | Junet 2015 | Part 2 | Question: 41
Match the following: ... $a-iv, b-ii, c-iii, d-i$ $a-iii, b-i, c-iv, d-ii$
Match the following:$$\begin{array}{|ll|ll|} \hline \text{a.} & \text{Size-oriented} &i. & \text{uses number of external interfaces as one of} \\ &\text{metrics}&& \text{...
go_editor
1.8k
views
go_editor
asked
Jul 30, 2016
IS&Software Engineering
ugcnetcse-june2015-paper2
size-metrices
is&software-engineering
+
–
1
votes
1
answer
11
UGC NET CSE | Junet 2015 | Part 2 | Question: 39
What does the following command do? grep -vn "abc" x It will print all of the lines in the file x that match the search string "abc" It will print all of the lines in file x that do not match the search ... "abc" It will print the specific line numbers of the file x in which there is a match for string "abc"
What does the following command do? grep -vn "abc" xIt will print all of the lines in the file x that match the search string "abc"It will print all of the lines in file ...
go_editor
2.3k
views
go_editor
asked
Jul 30, 2016
Operating System
ugcnetcse-june2015-paper2
operating-system
shell-script
non-gate
+
–
3
votes
2
answers
12
UGC NET CSE | Junet 2015 | Part 2 | Question: 38
A LRU page replacement is used with $4$ page frames and eight pages. How many page faults will occur with the reference string $0172327103$ if the four frames are initially empty? $6$ $7$ $5$ $8$
A LRU page replacement is used with $4$ page frames and eight pages. How many page faults will occur with the reference string $0172327103$ if the four frames are initial...
go_editor
11.8k
views
go_editor
asked
Jul 30, 2016
Operating System
ugcnetcse-june2015-paper2
operating-system
page-replacement
+
–
3
votes
2
answers
13
UGC NET CSE | Junet 2015 | Part 2 | Question: 37
Let $P-i$ and $P_j$ two processes, R be the set of variables read from memory, and W be the set of variables written to memory. For the concurrent execution of two processes $p_i$ and $P_j$ which of the conditions are not true? $R(P_i) \cap W(P_j) = \Phi$ $W(P_i) \cap R(P_j) = \Phi$ $R(P_i) \cap R(P_j) = \Phi$ $W(P_i) \cap W(P_j) = \Phi$
Let $P-i$ and $P_j$ two processes, R be the set of variables read from memory, and W be the set of variables written to memory. For the concurrent execution of two proces...
go_editor
3.0k
views
go_editor
asked
Jul 30, 2016
Operating System
ugcnetcse-june2015-paper2
transaction-and-concurrency
+
–
3
votes
2
answers
14
UGC NET CSE | Junet 2015 | Part 2 | Question: 36
A disk drive has $100$ cylinders, numbered $0$ to $99$. Disk requests come to the disk driver for cylinders $12, 26, 24, 4, 42, 8$ and $50$ in that order. The driver is currently serving a request at a cylinder $24$. A seek takes $6$ ... seek time is needed for shortest seek time first (SSTF) algorithm? $0.984$ sec $0.396$ sec $0.738$ sec $0.42$ sec
A disk drive has $100$ cylinders, numbered $0$ to $99$. Disk requests come to the disk driver for cylinders $12, 26, 24, 4, 42, 8$ and $50$ in that order. The driver is c...
go_editor
9.7k
views
go_editor
asked
Jul 30, 2016
Operating System
ugcnetcse-june2015-paper2
operating-system
disk-scheduling
+
–
4
votes
5
answers
15
UGC NET CSE | Junet 2015 | Part 2 | Question: 35
Which phase of compiler generates stream of atoms? Syntax Analysis Lexical Analysis Code Generation Code Optimization
Which phase of compiler generates stream of atoms?Syntax AnalysisLexical AnalysisCode GenerationCode Optimization
go_editor
4.4k
views
go_editor
asked
Jul 30, 2016
Compiler Design
ugcnetcse-june2015-paper2
compiler-design
+
–
1
votes
2
answers
16
UGC NET CSE | Junet 2015 | Part 2 | Question: 34
Which one of the following is false? LALR parser is Bottom-Up parser A parsing algorithm which performs a left to right scanning and a right most deviation is RL($1$) LR parser is Bottom-Up parser In LL($1$), the $1$ indicates that there is a one symbol look-ahead
Which one of the following is false?LALR parser is Bottom-Up parserA parsing algorithm which performs a left to right scanning and a right most deviation is RL($1$)LR par...
go_editor
3.6k
views
go_editor
asked
Jul 30, 2016
Compiler Design
ugcnetcse-june2015-paper2
compiler-design
parsing
+
–
1
votes
1
answer
17
UGC NET CSE | Junet 2015 | Part 2 | Question: 33
If all the production rules have single non-terminal symbol on the left side, the grammar defined is: Context free grammar Context sensitive grammar Unrestricted grammar Phase grammar
If all the production rules have single non-terminal symbol on the left side, the grammar defined is:Context free grammarContext sensitive grammarUnrestricted grammarPhas...
go_editor
2.8k
views
go_editor
asked
Jul 30, 2016
Theory of Computation
ugcnetcse-june2015-paper2
theory-of-computation
grammar
+
–
1
votes
1
answer
18
UGC NET CSE | Junet 2015 | Part 2 | Question: 32
The translator which performs macro calls expansion is called Macro processor Micro pre-processor Macro pre-processor Dynamic linker
The translator which performs macro calls expansion is calledMacro processorMicro pre-processorMacro pre-processorDynamic linker
go_editor
2.5k
views
go_editor
asked
Jul 30, 2016
Compiler Design
ugcnetcse-june2015-paper2
translator
preprocessor
+
–
1
votes
1
answer
19
UGC NET CSE | Junet 2015 | Part 2 | Question: 31
Match the following: ... $a-iii, b-iv, c-ii, d-i$ $a-iv, b-i, c-iii, d-ii$ $a-iv, b-iii, c-ii, d-ii$
Match the following:$\begin{array}{|ll|ll|} \hline \text{a.} & \text{Forelward Reference Table} & i. & \text{Assembler directive} \\ \hline \text{b.}& \text{Mnemonic Tab...
go_editor
1.7k
views
go_editor
asked
Jul 30, 2016
CO and Architecture
ugcnetcse-june2015-paper2
assembly
+
–
1
votes
1
answer
20
UGC NET CSE | Junet 2015 | Part 2 | Question: 30
Which of the following is/are restriction(s) in classless addressing? The number of addresses needs to be a power of $2$ The mask needs to be included in the address to define the block The starting address must be divisible by the number of addresses in the block All of the above
Which of the following is/are restriction(s) in classless addressing?The number of addresses needs to be a power of $2$The mask needs to be included in the address to def...
go_editor
2.4k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
classless-addressing
+
–
4
votes
1
answer
21
UGC NET CSE | Junet 2015 | Part 2 | Question: 29
What is the size of the 'total length' field in $IPv4$ diagram? $4$ bits $8$ bits $16$ bits $32$ bits
What is the size of the 'total length' field in $IPv4$ diagram?$4$ bits$8$ bits$16$ bits$32$ bits
go_editor
1.5k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
ip-addressing
+
–
2
votes
2
answers
22
UGC NET CSE | Junet 2015 | Part 2 | Question: 28
Which of the following is not associated with the session layer? Dialog control Token management Semantics of the information transmitted synchronization
Which of the following is not associated with the session layer?Dialog controlToken managementSemantics of the information transmittedsynchronization
go_editor
2.6k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
session-layer
+
–
1
votes
1
answer
23
UGC NET CSE | Junet 2015 | Part 2 | Question: 27
Match the following port numbers with their uses: ... $a-ii, b-i, c-iv, d-iii$ $a-ii, b-iv, c-iii, d-i$ $a-ii, b-iv, c-i, d-iii$
Match the following port numbers with their uses:$\begin{array}{|ll|ll|} \hline & \textbf{List – I} & & \textbf{List – II} \\ \hline \text{a.} & 23 & i. & \text{World...
go_editor
2.0k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
port-numbers
match-the-following
+
–
2
votes
2
answers
24
UGC NET CSE | Junet 2015 | Part 2 | Question: 26
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? Session Maintenance Protocol Real-time Streaming Protocol Real-time Transport Control Protocol Session Initiation Protocol
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions?Session Maintenance ProtocolReal-time Strea...
go_editor
4.7k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
osi-protocol
computer-networks
+
–
2
votes
1
answer
25
UGC NET CSE | Junet 2015 | Part 2 | Question: 25
To determine the efficiency of an algorithm the time factor is measured by Counting micro seconds Counting number of key operations Counting number of statements Counting kilobytes of algorithm
To determine the efficiency of an algorithm the time factor is measured byCounting micro secondsCounting number of key operationsCounting number of statementsCounting kil...
go_editor
6.0k
views
go_editor
asked
Jul 30, 2016
Algorithms
ugcnetcse-june2015-paper2
algorithm-efficiency
+
–
3
votes
1
answer
26
UGC NET CSE | Junet 2015 | Part 2 | Question: 24
The average case occurs in Linear Search Algorithm when The item to be searched is in some where middle of the Array The item to be searched is not in the array The item to be searched is in the last of t he array The item to be searched is either in the last or not in the array
The average case occurs in Linear Search Algorithm whenThe item to be searched is in some where middle of the ArrayThe item to be searched is not in the arrayThe item to ...
go_editor
1.4k
views
go_editor
asked
Jul 30, 2016
Algorithms
ugcnetcse-june2015-paper2
algorithms
linear-search
+
–
2
votes
1
answer
27
UGC NET CSE | Junet 2015 | Part 2 | Question: 23
Level order Traversal of a rooted Tree can be done by starting from root and performing: Breadth First Search Depth First Search Root Search Deep Search
Level order Traversal of a rooted Tree can be done by starting from root and performing:Breadth First SearchDepth First SearchRoot SearchDeep Search
go_editor
2.1k
views
go_editor
asked
Jul 30, 2016
Programming in C
ugcnetcse-june2015-paper2
data-structures
tree-traversal
+
–
2
votes
1
answer
28
UGC NET CSE | Junet 2015 | Part 2 | Question: 21
Consider the given graph Its Minimum Cost Spanning Tree is ______
Consider the given graphIts Minimum Cost Spanning Tree is ______
go_editor
3.1k
views
go_editor
asked
Jul 30, 2016
Graph Theory
ugcnetcse-june2015-paper2
graph-theory
minimum-spanning-tree
+
–
2
votes
2
answers
29
UGC NET CSE | Junet 2015 | Part 2 | Question: 20
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as: Neighbour Set Strong Entity Set Owner Entity Set Weak Set
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as:Neighbour SetStrong...
go_editor
15.6k
views
go_editor
asked
Jul 30, 2016
Databases
ugcnetcse-june2015-paper2
databases
weak-entity
+
–
1
votes
1
answer
30
UGC NET CSE | Junet 2015 | Part 2 | Question: 19
Database application were directly built on top of file system to overcome the following drawbacks of using file-systems: Data redundancy and inconsistency Difficulty in accessing data Data isolation Integrity problems $\text{i}$ $\text{i and iv}$ $\text{i, ii, and iii}$ $\text{i, ii, iii, and iv}$
Database application were directly built on top of file system to overcome the following drawbacks of using file-systems:Data redundancy and inconsistencyDifficulty in ac...
go_editor
4.7k
views
go_editor
asked
Jul 30, 2016
Databases
ugcnetcse-june2015-paper2
databases
file-system
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register