Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent activity in Non GATE
0
votes
1
answer
1
Constructors
A constructor cannot be explicitly called by the client program. true or false?
A constructor cannot be explicitly called by the client program. true or false?
Hira Thakur
50
views
Hira Thakur
recategorized
4 days
ago
Object Oriented Programming
non-gate
object-oriented-programming
+
–
0
votes
0
answers
2
A program that includes the file containing a class declaration is called a ________ program of the class.
A program that includes the file containing a class declaration is called a ________ program of the class.
Hira Thakur
35
views
Hira Thakur
recategorized
4 days
ago
Object Oriented Programming
non-gate
object-oriented-programming
+
–
11
votes
3
answers
3
GATE CSE 2014 Set 2 | Question: 28
A graphical HTML browser resident at a network client machine $Q$ accesses a static HTML webpage from a HTTP server $S$. The static HTML page has exactly one static embedded image which is also at $S$. Assuming no caching, which one of the following ... HTTP request from $Q$ to $S$ is sufficient, and this is possible without any TCP connection between $Q$ and $S$
A graphical HTML browser resident at a network client machine $Q$ accesses a static HTML webpage from a HTTP server $S$. The static HTML page has exactly one static embed...
satyaAchar
6.9k
views
satyaAchar
commented
Apr 15
Web Technologies
gatecse-2014-set2
web-technologies
html
easy
+
–
1
votes
3
answers
4
GATE CSE 2008 | Question: 21
The minimum number of equal length subintervals needed to approximate $\int_1^2 xe^x\,dx$ to an accuracy of at least $\frac{1}{3}\times10^{-6}$ using the trapezoidal rule is 1000e 1000 100e 100
The minimum number of equal length subintervals needed to approximate $\int_1^2 xe^x\,dx$ to an accuracy of at least $\frac{1}{3}\times10^{-6}$ using the trapezoidal rule...
Ice_Cold_V
3.1k
views
Ice_Cold_V
commented
Apr 4
Numerical Methods
gatecse-2008
normal
numerical-methods
trapezoidal-rule
non-gate
+
–
1
votes
1
answer
5
UGC NET CSE | June 2019 | Part 2 | Question: 59
Which of the following are the primary objectives of risk monitoring in software project tracking? P: To assess whether predicted risks do, in fact, occur Q: To ensure that risk aversion steps defined for the risk are being properly applied R: To collect ... used for future risk analysis Only P and Q Only P and R Only Q and R All of P, Q, R
Which of the following are the primary objectives of risk monitoring in software project tracking?P: To assess whether predicted risks do, in fact, occurQ: To ensure that...
ajayraho
1.4k
views
ajayraho
commented
Mar 15
IS&Software Engineering
ugcnetcse-june2019-paper2
project-tracking
risk-monitoring
+
–
0
votes
0
answers
6
KPGCET-CSE-2019-52
In the software development, the physical architecture is related to the _______stage/s and logical architecture is related to ____________stage/s. Implementation & Deployment, Design Coding & implementation, Design Design & Implementation, Deployment Deployment & Implementation, Deployment
In the software development, the physical architecture is related to the _______stage/s and logical architecture is related to ____________stage/s. Implementation & Deplo...
ajayraho
174
views
ajayraho
commented
Mar 15
IS&Software Engineering
kpgcet-cse-2019
non-gate
is&software-engineering
+
–
0
votes
0
answers
7
KPGCET-CSE-2019-17
The good software engineering principles are used in object-oriented paradigm to Streamline the structural part of the business process Streamline the security of the business process Streamline the structure of the class Streamline the object methods of the class
The good software engineering principles are used in object-oriented paradigm toStreamline the structural part of the business processStreamline the security of the busin...
ajayraho
277
views
ajayraho
commented
Mar 15
IS&Software Engineering
kpgcet-cse-2019
non-gate
is&software-engineering
+
–
0
votes
0
answers
8
KPGCET-CSE-2019-35
The iterations of Software Development Stage Activities in different process models are used to Eliminate errors of previous iterations in the current iteration and also to accommodate the changes in the business process Only eliminate errors of previous iterations in the current iteration Only accommodate the change in business process None of these
The iterations of Software Development Stage Activities in different process models are used to Eliminate errors of previous iterations in the current iteration and also ...
ajayraho
166
views
ajayraho
commented
Mar 15
IS&Software Engineering
kpgcet-cse-2019
non-gate
is&software-engineering
+
–
1
votes
1
answer
9
NIELIT Scientific Assistant A 2020 November: 56
$\text{SRD}$ stands for __________. Software Requirements Definition Structured Requirements Definition Software Requirements Diagram Structured Requirements Diagram
$\text{SRD}$ stands for __________.Software Requirements DefinitionStructured Requirements DefinitionSoftware Requirements DiagramStructured Requirements Diagram
ajayraho
446
views
ajayraho
commented
Mar 15
IS&Software Engineering
nielit-sta-2020
is&software-engineering
+
–
7
votes
2
answers
10
ISRO2011-72
Find the output of the following Java code line System.out.printIn(math.floor(-7.4)) -7 -8 -7.4 -7.0
Find the output of the following Java code line System.out.printIn(math.floor(-7.4))-7-8-7.4-7.0
ajayraho
3.8k
views
ajayraho
commented
Mar 13
Java
isro2011
non-gate
java
+
–
0
votes
0
answers
11
UGC NET CSE | October 2022 | Part 1 | Question: 90
Modules $\mathrm{X}$ and $\mathrm{Y}$ operate on the same input and output, then the cohesion is Logical cohesion Sequential cohesion Procedural cohesion Communicational cohesion
Modules $\mathrm{X}$ and $\mathrm{Y}$ operate on the same input and output, then the cohesion isLogical cohesionSequential cohesionProcedural cohesionCommunicational cohe...
ajayraho
199
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
12
UGC NET CSE | October 2022 | Part 1 | Question: 86
Match List I with List II : List I List II (A) Localization (I) Encapsulationlation (B) Packaging or binding of a collection of items (II) Abstraction (C) Mechanism that enables designer to focus on essential details of a program component. (III) Characteristic of software that ... $\text{(A)-(III), (B)-(I), (C)-(IV), (D)-(II)}$
Match List I with List II : List IList II(A) Localization(I) Encapsulationlation(B) Packaging or binding of a collection of items(II) Abstraction(C) Mechanism that enable...
ajayraho
264
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
13
UGC NET CSE | October 2022 | Part 1 | Question: 82
The process to gather the software requirements from client, analyze and document is known as - Software Engineering Process User Engineering Process Requirement Elicitation Process Requirement Engineering Process
The process to gather the software requirements from client, analyze and document is known as -Software Engineering ProcessUser Engineering ProcessRequirement Elicitation...
ajayraho
154
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
14
UGC NET CSE | October 2022 | Part 1 | Question: 81
If every requirement can be checked by a cost-effective process, then $\text{SRS}$ is called Verifiable Traceable Modifiable Complete
If every requirement can be checked by a cost-effective process, then $\text{SRS}$ is calledVerifiableTraceableModifiableComplete
ajayraho
187
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
15
UGC NET CSE | October 2022 | Part 1 | Question: 68
Consider the following two lists : ... $\text{(A)-(II), (B)-(III), (C)-(IV), (D)-(I)}$
Consider the following two lists :$\begin{array}{ll} \text{List I} & \text{List II} \\ \\\text {(A) Stack overflow } & \text { (I) Software interrupt } \\\text {(B)} \mat...
ajayraho
216
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
16
UGC NET CSE | October 2022 | Part 1 | Question: 72
Consider the following: \begin{array}{ll} \text{List I} & \text{List II} \\ \\ \text{(A) Stack algorithm} & \text{(I) Deadlock} \\ \text{(B) Elevator algorithm} & \text{(II) Disk scheduling} \\ \text{(C) Priority scheduling algorithm} & \text{(III) Page ... $\text{(A)-(II), (B)-(III), (C)-(I), (D)-(IV)}$
Consider the following:\begin{array}{ll}\text{List I} & \text{List II} \\ \\\text{(A) Stack algorithm} & \text{(I) Deadlock} \\\text{(B) Elevator algorithm} & \text{(II) ...
ajayraho
210
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
17
UGC NET CSE | October 2022 | Part 1 | Question: 66
Which mechanism in $\text{XML}$ allows organizations to specify globally unique names as element tags in documents? root header schema namespace
Which mechanism in $\text{XML}$ allows organizations to specify globally unique names as element tags in documents?rootheaderschemanamespace
ajayraho
287
views
ajayraho
comment edited
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
18
UGC NET CSE | October 2022 | Part 1 | Question: 65
This transformation is called \[ \left[\begin{array}{l} \bar{x} \\ \bar{y} \\ \bar{z} \\ \bar{w} \end{array}\right]=\left[\begin{array}{llll} a_{1} & b_{1} & c_{1} & d_{1} \\ a_{2} & b_{2} & c_{2} ... g & h \end{array}\right]-\left[\begin{array}{l} x \\ y \\ z \\ 1 \end{array}\right] \] Scaling Shear Homography Steganography
This transformation is called\[\left[\begin{array}{l}\bar{x} \\\bar{y} \\\bar{z} \\\bar{w}\end{array}\right]=\left[\begin{array}{llll}a_{1} & b_{1} & c_{1} & d_{1} \\a_{2...
ajayraho
265
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
19
UGC NET CSE | October 2022 | Part 1 | Question: 71
Which statement is false? All function calls in $\text{C}$ pass arguments using call by value. Call by reference enables a called function to modify a variable in calling function. Call by value is always more efficient than call by reference. Programmers use pointers and indirection operation to simulate call by reference.
Which statement is false?All function calls in $\text{C}$ pass arguments using call by value.Call by reference enables a called function to modify a variable in calling f...
ajayraho
216
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
20
UGC NET CSE | October 2022 | Part 1 | Question: 62
Match List I with List II : ... $\text{(A)-(IV), (B)-(I), (C)-(II), (D)-(III)}$
Match List I with List II :$\begin{array}{II}\text{List I} & \text{List II} \\ \\\text{(A) Firmware} & \text{ (I) Number of logical records into physical blocks} \\ \\\te...
ajayraho
352
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
21
UGC NET CSE | October 2022 | Part 1 | Question: 64
Match List I with List II : ... $\text{(A)-(I), (B)-(II), (C)-(III), (D)-(IV)}$
Match List I with List II :$\begin{array}{ll} \text{List I} & \text{List II} \\ \\\text{(A) BIND} & \text {(I) Block the caller until a connection attempt arrives} \\\tex...
ajayraho
209
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
1
votes
1
answer
22
UGC NET CSE | October 2022 | Part 1 | Question: 60
What is called Journalling in Linux operating system? Process scheduling File saving as transaction, A type of thread An editor,
What is called Journalling in Linux operating system?Process schedulingFile saving as transaction,A type of threadAn editor,
ajayraho
445
views
ajayraho
answer edited
Mar 13
Others
ugcnetcse-oct2022-paper1
operating-system
process-scheduling
+
–
0
votes
0
answers
23
UGC NET CSE | October 2022 | Part 1 | Question: 58
A trigger is A statement that enables to start $\text{DBMS}$ A statement that is executed by the user when debugging an application program. A condition the system tests for the validity of the database user. A statement that is executed automatically by the system as a side effect of modification to the database.
A trigger isA statement that enables to start $\text{DBMS}$A statement that is executed by the user when debugging an application program.A condition the system tests for...
ajayraho
263
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
24
UGC NET CSE | October 2022 | Part 1 | Question: 57
Given below are two statements : one is labelled as Assertion $\text{(A)}$ and the other is labelled as Reason $\text{(R)}$: Assertion $\text{(A)}$: A load-and-go assembler avoids the overhead of writing the object program out and reading it back in. Reason ... $\text{(R)}$ is false $\text{(A)}$ is false but $\text{(R)}$ is true
Given below are two statements : one is labelled as Assertion $\text{(A)}$ and the other is labelled as Reason $\text{(R)}$:Assertion $\text{(A)}$: A load-and-go assemble...
ajayraho
376
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
25
UGC NET CSE | October 2022 | Part 1 | Question: 52
Consider the following statements: Statement $\text{I}$: Composite attributes cannot be divided into smaller subparts. Statement $\text{II}$: Complex attribute is formed by nesting composite attributes and multivalued attributes in an arbitrary way. ... $\text{I}$ false and Statement $\text{II}$, Statement $\text{III}$ true
Consider the following statements:Statement $\text{I}$: Composite attributes cannot be divided into smaller subparts.Statement $\text{II}$: Complex attribute is formed by...
ajayraho
273
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
1
answer
26
UGC NET CSE | October 2022 | Part 1 | Question: 41
Let $(\{a, b\}, *)$ be a semigroup, where $a * a=b$. (A) $a * b=b * a$ (B) $b * b=b$ Choose the most appropriate answer from the options given below : $(\text{A})$ only true $(\text{B})$ only true Both $(\text{A})$ and $(\text{B})$ true, Neither $(\text{A})$ nor $(\text{B})$ true,
Let $(\{a, b\}, *)$ be a semigroup, where $a * a=b$.(A) $a * b=b * a$(B) $b * b=b$Choose the most appropriate answer from the options given below :$(\text{A})$ only true$...
ajayraho
205
views
ajayraho
answer edited
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
27
UGC NET CSE | October 2022 | Part 1 | Question: 48
Pointers cannot be used to find the address of a variable in memory reference value directly simulate call by reference manipulate dynamic data structure
Pointers cannot be used tofind the address of a variable in memoryreference value directlysimulate call by referencemanipulate dynamic data structure
ajayraho
144
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
0
answers
28
UGC NET CSE | October 2022 | Part 1 | Question: 46
A top down approach to programming calls for : Statement $\text{I}$: Working from the general to the specific. Statement $\text{II}$: Postpone the minor decisions. Statement $\text{III}$: A systematic approach. Statement $\text{IV}$: ... Statement $\text{III}$ only Statement $\text{I}$, Statement $\text{II}$ and Statement $\text{IV}$ only
A top down approach to programming calls for :Statement $\text{I}$: Working from the general to the specific.Statement $\text{II}$: Postpone the minor decisions.Statement...
ajayraho
430
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
1
answer
29
UGC NET CSE | October 2022 | Part 1 | Question: 43
Hidden surface removal problem with minimal $3\text{D}$ pipeline can be solved with Painter's algorithm Window Clipping algorithm Brute force rasterization algorithm Flood fill algorithm
Hidden surface removal problem with minimal $3\text{D}$ pipeline can be solved withPainter's algorithmWindow Clipping algorithmBrute force rasterization algorithmFlood fi...
ajayraho
432
views
ajayraho
commented
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
1
answer
30
UGC NET CSE | October 2022 | Part 1 | Question: 38
Match List I with List II: List I List II (A) DES (I) Key size - $256$ (B) AES (II) Key size - $1024$ (C) $3$ DES (III) Key size - $56$ (D) RSA (IV) Key size -$168$ ... $(\text{A})-(\text{IV}), (\text{B})-(\text{II}), (\text{C})-(\text{III}), (\text{D})-(\text{I})$
Match List I with List II:List IList II(A) DES(I) Key size - $256$(B) AES(II) Key size - $1024$(C) $3$ DES(III) Key size - $56$(D) RSA(IV) Key size -$168$ $(\text{A})-(\t...
ajayraho
127
views
ajayraho
answered
Mar 13
Others
ugcnetcse-oct2022-paper1
+
–
To see more, click for all the
questions in this category
.
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register