Recent questions in Non GATE

#981
6.1k
views
2 answers
1 votes
Which methods are utilized to control the access to an object in multi-threaded programming ? Asynchronized methods Synchronized methods Serialized methodsNone of the above
#982
991
views
1 answers
2 votes
Important advantage of using new and delete operators in C++ isAllocation of memoryFrees the memory previously allocatedInitialization of memory easilyAllocation of memory and frees the memory previously allocated
#983
1.4k
views
1 answers
2 votes
C++ actually supports the following two complete dynamic systems:One defined by C++ and the other not defined by COne defined by C and one specific to C++Both are specific to C++Both of them are improvements of C
#984
1.7k
views
1 answers
3 votes
The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is HTML pageDOC type procedureStyle sheetStored procedure
#985
1.4k
views
1 answers
2 votes
Match the following style rules for reusability $:$\begin{array}{} & \textbf{List - I} && \textbf{List - II} \\ \text{a.} & \text{Keep methods coherent} & \text{i.} & \text{Write ... {a-iii, b-iv, c-ii, d-i}$\text{a-ii, b-iii, c-iv, d-i}$
#986
2.5k
views
1 answers
2 votes
Match the following with respect to relationship objects and classes $:$\begin{array}{} & \textbf{List - I} && \textbf{List - II} \\ \text{a.} & \text{State diagram} & \text{i.} & \ ... a-iii, b-iv, c-ii, d-i}$\text{a-ii, b-iv, c-i, d-iii}$
#987
3.6k
views
1 answers
2 votes
Which of the following is not a software myth?Once we write the program and get it to work, our job is doneProjects requirements continually ... software projects internally, it will invariably struggle when it outsources software projects.
#988
4.6k
views
1 answers
3 votes
One weakness of boundary value analysis and equivalence partitioning isthey are not effectivethey do not explore combinations of input circumstancesthey explore combinations of input circumstancesnone of the above
#989
1.8k
views
1 answers
2 votes
A process which defines a series of tasks that have the following four primary objectives is known asto identify all ... ProcessSoftware Configuration Management ProcessSoftware Version Management ProcessSoftware Change Management Process
#990
3.2k
views
1 answers
4 votes
Match the following $:$\begin{array}{} & \textbf{List - I} && \textbf{List - II} \\ \text{a.} & \text{Data Coupling} & \text{i. }& \text{Module A and Module B have shared data ... text{a-ii, b-iii, c-iv, d-i}$\text{a-iii, b-ii, c-iv, d-i}$
#991
5.3k
views
2 answers
2 votes
Function points can be calculated byUFP * CAFUFP * FACUFP * CostUFP * Productivity
#992
2.5k
views
1 answers
2 votes
The following Linear Programming problem has:$\text{Max} \quad Z=x_1+x_2$Subject to $\quad x_1-x_2 \geq 0$\quad \quad \quad 3x_1 - ... Feasible solutionNo feasible solutionUnbounded solutionSingle point as solution
#993
925
views
1 answers
2 votes
Given the problem to maximize $f(x), X=(x_1, x_2, \dots , x_n)$ subject to m number of in equality constraints. $g_i(x) \leq b_i$, i=1, 2, .... m including the non- ... i=1,2 \dots m$g_i (\bar{X}) \leq b_i, i=1,2 \dots m$All of these
#994
2.4k
views
1 answers
3 votes
If the primal Linear Programming problem has unbounded solution, then it's dual problem will havefeasible solutionalternative solutionno feasible solution at allno alternative solution at all
#995
4.0k
views
1 answers
1 votes
Electronic Data Interchange Software consists of the following four layers:Business application, Internal format conversion, Network translator, EDI envelopBusiness ... EDI envelopApplication layer, Transport layer, IP layer, EDI envelop
#996
2.8k
views
2 answers
0 votes
The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organization.ISOANSIITU-TIEEE
#997
1.1k
views
2 answers
1 votes
Active X controls are Pentium binary programs that can be embedded inWord pagesURL pagesScript pagesWeb pages
#998
3.3k
views
1 answers
2 votes
Match the following $:$\begin{array}{clcl} & \textbf{List - I} && \textbf{List - II} \\ \text{a.} & \text{Cavalier} & \text{i.} & \text{The direction of projection is chosen so ... {a-iv, b-ii, c-iii, d-i}$\text{a-i, b-ii, c-iii, d-iv}$
#999
2.2k
views
2 answers
1 votes
In Cyrus-Beck algorithm for line clipping the value of $t$ parameter is computed by the relation: (Here $P_{1}$ and $P_{2}$ are the two end points of the line, $f$ is a point on the ... {i}}$\frac{(f_{i}-P_{2}).n_{i}}{(P_{1}-P_{2}).n_{i}}$
#1000
1.7k
views
1 answers
2 votes
Consider a triangle represented by $A(0, 0), B(1, 1), C(5, 2)$. The triangle is rotated by $45$ degrees about a point $P(-1, -1)$. The co ordinates of the new triangle ...