Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Recent
Hot!
Most votes
Most answers
Most views
Previous GATE
Featured
Recent questions in Others
1
votes
1
answer
91
UGC NET CSE | June 2008 | Part 2 | Question: 23
Which of the following is true for a sorted list with ' $n$ ... $\mathrm{O}(\log n)$ time.
Which of the following is true for a sorted list with ' $n$ ' elements?Insertion in a sorted array takes constant time.Insertion in a sorted linear linked list takes cons...
admin
142
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
sorting
array
time-complexity
+
–
0
votes
1
answer
92
UGC NET CSE | June 2008 | Part 2 | Question: 24
Files that are related to input/output and are used to model serial $\text{I/O}$ devices such as terminals, printers and networks are called: regular files character special files directories block special files
Files that are related to input/output and are used to model serial $\text{I/O}$ devices such as terminals, printers and networks are called:regular filescharacter specia...
admin
125
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
93
UGC NET CSE | June 2008 | Part 2 | Question: 25
An example of a possible file attribute is: minimum size permanent flag archive flag EBCDIC flag
An example of a possible file attribute is:minimum sizepermanent flagarchive flagEBCDIC flag
admin
37
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
94
UGC NET CSE | June 2008 | Part 2 | Question: 26
The $\text{ATM}$ cells are __________ bytes long. $48$ $53$ $64$ $69$
The $\text{ATM}$ cells are __________ bytes long.$48$$53$$64$$69$
admin
39
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
95
UGC NET CSE | June 2008 | Part 2 | Question: 27
For slotted ALOHA, the maximum channel utilization is : $100 \%$ $50 \%$ $36 \%$ $18 \%$
For slotted ALOHA, the maximum channel utilization is :$100 \%$$50 \%$$36 \%$$18 \%$
admin
49
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
2
answers
96
UGC NET CSE | June 2008 | Part 2 | Question: 28
For a channel of $3 \mathrm{KHz}$ bandwidth and signal to noise ratio of $30 \mathrm{~dB}$, the maximum data rate is: $3000 \mathrm{bps}$ $6000 \mathrm{bps}$ $15000 \mathrm{bps}$ $30000 \mathrm{bps}$
For a channel of $3 \mathrm{KHz}$ bandwidth and signal to noise ratio of $30 \mathrm{~dB}$, the maximum data rate is:$3000 \mathrm{bps}$$6000 \mathrm{bps}$$15000 \mathrm{...
admin
248
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
1
answer
97
UGC NET CSE | June 2008 | Part 2 | Question: 29
An example of a public key encryption algorithm is : Caesar cipher algorithm DES algorithm AES algorithm Knapsack algorithm
An example of a public key encryption algorithm is :Caesar cipher algorithmDES algorithmAES algorithmKnapsack algorithm
admin
134
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
98
UGC NET CSE | June 2008 | Part 2 | Question: 30
With reference to hierarchical routing, the optimum number of levels for an $m$ router subnet is: $m^{2}$ $m$ $\ln m$ $\sqrt{m}$
With reference to hierarchical routing, the optimum number of levels for an $m$ router subnet is:$m^{2}$$m$$\ln m$$\sqrt{m}$
admin
100
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
1
answer
99
UGC NET CSE | June 2008 | Part 2 | Question: 31
Assembler program is : dependent on the operating system dependent on the compiler dependent on the hardware independent of the hardware
Assembler program is :dependent on the operating systemdependent on the compilerdependent on the hardwareindependent of the hardware
admin
65
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
100
UGC NET CSE | June 2008 | Part 2 | Question: 32
In the indirect addressing scheme, the second part of an instruction contains : the operand in decimal form the address of the location where the value of the operand is stored the address of the location where the address of the operand is stored the operand in an encoded form
In the indirect addressing scheme, the second part of an instruction contains :the operand in decimal formthe address of the location where the value of the operand is st...
admin
46
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
1
answer
101
UGC NET CSE | June 2008 | Part 2 | Question: 33
At the end of parsing, tokens are identified. set of instructions are identified. the syntactic groups are identified. machine instructions are identified.
At the end of parsing,tokens are identified.set of instructions are identified.the syntactic groups are identified.machine instructions are identified.
admin
154
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
parsing
+
–
0
votes
0
answers
102
UGC NET CSE | June 2008 | Part 2 | Question: 34
Dead-code elimination in machine code optimization refers to : removal of all labels. removal of values that never get used. removal of function which are not involved. removal of a module after its use.
Dead-code elimination in machine code optimization refers to :removal of all labels.removal of values that never get used.removal of function which are not involved.remov...
admin
113
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
103
UGC NET CSE | June 2008 | Part 2 | Question: 35
A parse tree is an annotated parse tree if : it shows attribute values at each node. there are no inherited attributes. it has synthesized nodes as terminal nodes. every non-terminal nodes is an inherited attribute.
A parse tree is an annotated parse tree if :it shows attribute values at each node.there are no inherited attributes.it has synthesized nodes as terminal nodes.every non-...
admin
62
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
104
UGC NET CSE | June 2008 | Part 2 | Question: 36
An example of a non-preemptive $\text{CPU}$ scheduling algorithm is : Shortest job first scheduling. Round robin scheduling. Priority scheduling. Fair share scheduling.
An example of a non-preemptive $\text{CPU}$ scheduling algorithm is :Shortest job first scheduling.Round robin scheduling.Priority scheduling.Fair share scheduling.
admin
53
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
105
UGC NET CSE | June 2008 | Part 2 | Question: 37
There are ' $n$ ' processes in memory. A process spends a fraction ' $p$ ' of its time waiting for $\mathrm{I} / \mathrm{O}$ to complete. The CPU utilization is given by : $p^{n}$ $1-p^{n}$ $(1-p)^{n}$ $1-n p$
There are ' $n$ ' processes in memory. A process spends a fraction ' $p$ ' of its time waiting for $\mathrm{I} / \mathrm{O}$ to complete. The CPU utilization is given by ...
admin
45
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
106
UGC NET CSE | June 2008 | Part 2 | Question: 38
An example of a memory management system call in $\text{UNIX}$ is : fork. mmap. sigaction. execve.
An example of a memory management system call in $\text{UNIX}$ is :fork.mmap.sigaction.execve.
admin
47
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
107
UGC NET CSE | June 2008 | Part 2 | Question: 39
With $64$ bit virtual addresses, a $4 \mathrm{~KB}$ page and $256 \mathrm{MB}$ of RAM, an inverted page table requires : $8192$ entries. $16384$ entries. $32768$ entries. $65536$ entries.
With $64$ bit virtual addresses, a $4 \mathrm{~KB}$ page and $256 \mathrm{MB}$ of RAM, an inverted page table requires :$8192$ entries.$16384$ entries.$32768$ entries.$65...
admin
49
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
108
UGC NET CSE | June 2008 | Part 2 | Question: 40
A computer has $6$ tape drives with ' $n$ ' processes competing for them. Each process may need two drives. For which values of ' $n$ ' is the system deadlock free? $1$ $2$ $3$ $6$
A computer has $6$ tape drives with ' $n$ ' processes competing for them. Each process may need two drives. For which values of ' $n$ ' is the system deadlock free?$1$$2$...
admin
59
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
deadlock-prevention-avoidance-detection
+
–
0
votes
0
answers
109
UGC NET CSE | June 2008 | Part 2 | Question: 41
Water fall model for software development is : a top down approach. a bottom up approach. a sequential approach. a consequential approach.
Water fall model for software development is :a top down approach.a bottom up approach.a sequential approach.a consequential approach.
admin
45
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
1
answer
110
UGC NET CSE | June 2008 | Part 2 | Question: 42
In software development, value adjustment factors include the following among others : the criticality of the performance and reusability of the code. number of lines of code in the software. number of technical manpower and hardware costs. time period available and the level of user friendliness.
In software development, value adjustment factors include the following among others :the criticality of the performance and reusability of the code.number of lines of co...
admin
96
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
10
...
114
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register