Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Recent
Hot!
Most votes
Most answers
Most views
Previous GATE
Featured
Most answered questions in Others
0
votes
0
answers
1381
UGC NET CSE | June 2008 | Part 2 | Question: 26
The $\text{ATM}$ cells are __________ bytes long. $48$ $53$ $64$ $69$
The $\text{ATM}$ cells are __________ bytes long.$48$$53$$64$$69$
admin
39
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1382
UGC NET CSE | June 2008 | Part 2 | Question: 27
For slotted ALOHA, the maximum channel utilization is : $100 \%$ $50 \%$ $36 \%$ $18 \%$
For slotted ALOHA, the maximum channel utilization is :$100 \%$$50 \%$$36 \%$$18 \%$
admin
49
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1383
UGC NET CSE | June 2008 | Part 2 | Question: 30
With reference to hierarchical routing, the optimum number of levels for an $m$ router subnet is: $m^{2}$ $m$ $\ln m$ $\sqrt{m}$
With reference to hierarchical routing, the optimum number of levels for an $m$ router subnet is:$m^{2}$$m$$\ln m$$\sqrt{m}$
admin
101
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1384
UGC NET CSE | June 2008 | Part 2 | Question: 32
In the indirect addressing scheme, the second part of an instruction contains : the operand in decimal form the address of the location where the value of the operand is stored the address of the location where the address of the operand is stored the operand in an encoded form
In the indirect addressing scheme, the second part of an instruction contains :the operand in decimal formthe address of the location where the value of the operand is st...
admin
47
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1385
UGC NET CSE | June 2008 | Part 2 | Question: 34
Dead-code elimination in machine code optimization refers to : removal of all labels. removal of values that never get used. removal of function which are not involved. removal of a module after its use.
Dead-code elimination in machine code optimization refers to :removal of all labels.removal of values that never get used.removal of function which are not involved.remov...
admin
133
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1386
UGC NET CSE | June 2008 | Part 2 | Question: 35
A parse tree is an annotated parse tree if : it shows attribute values at each node. there are no inherited attributes. it has synthesized nodes as terminal nodes. every non-terminal nodes is an inherited attribute.
A parse tree is an annotated parse tree if :it shows attribute values at each node.there are no inherited attributes.it has synthesized nodes as terminal nodes.every non-...
admin
64
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1387
UGC NET CSE | June 2008 | Part 2 | Question: 36
An example of a non-preemptive $\text{CPU}$ scheduling algorithm is : Shortest job first scheduling. Round robin scheduling. Priority scheduling. Fair share scheduling.
An example of a non-preemptive $\text{CPU}$ scheduling algorithm is :Shortest job first scheduling.Round robin scheduling.Priority scheduling.Fair share scheduling.
admin
53
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1388
UGC NET CSE | June 2008 | Part 2 | Question: 37
There are ' $n$ ' processes in memory. A process spends a fraction ' $p$ ' of its time waiting for $\mathrm{I} / \mathrm{O}$ to complete. The CPU utilization is given by : $p^{n}$ $1-p^{n}$ $(1-p)^{n}$ $1-n p$
There are ' $n$ ' processes in memory. A process spends a fraction ' $p$ ' of its time waiting for $\mathrm{I} / \mathrm{O}$ to complete. The CPU utilization is given by ...
admin
47
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1389
UGC NET CSE | June 2008 | Part 2 | Question: 38
An example of a memory management system call in $\text{UNIX}$ is : fork. mmap. sigaction. execve.
An example of a memory management system call in $\text{UNIX}$ is :fork.mmap.sigaction.execve.
admin
49
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1390
UGC NET CSE | June 2008 | Part 2 | Question: 39
With $64$ bit virtual addresses, a $4 \mathrm{~KB}$ page and $256 \mathrm{MB}$ of RAM, an inverted page table requires : $8192$ entries. $16384$ entries. $32768$ entries. $65536$ entries.
With $64$ bit virtual addresses, a $4 \mathrm{~KB}$ page and $256 \mathrm{MB}$ of RAM, an inverted page table requires :$8192$ entries.$16384$ entries.$32768$ entries.$65...
admin
54
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1391
UGC NET CSE | June 2008 | Part 2 | Question: 40
A computer has $6$ tape drives with ' $n$ ' processes competing for them. Each process may need two drives. For which values of ' $n$ ' is the system deadlock free? $1$ $2$ $3$ $6$
A computer has $6$ tape drives with ' $n$ ' processes competing for them. Each process may need two drives. For which values of ' $n$ ' is the system deadlock free?$1$$2$...
admin
59
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
deadlock-prevention-avoidance-detection
+
–
0
votes
0
answers
1392
UGC NET CSE | June 2008 | Part 2 | Question: 41
Water fall model for software development is : a top down approach. a bottom up approach. a sequential approach. a consequential approach.
Water fall model for software development is :a top down approach.a bottom up approach.a sequential approach.a consequential approach.
admin
45
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1393
UGC NET CSE | June 2008 | Part 2 | Question: 43
While designing the user interface, one should : use as many short cuts as possible. use as many defaults as possible. use as many visual layouts as possible. reduce the demand on short-term memory.
While designing the user interface, one should :use as many short cuts as possible.use as many defaults as possible.use as many visual layouts as possible.reduce the dema...
admin
74
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1394
UGC NET CSE | June 2008 | Part 2 | Question: 44
In software cost estimation, base estimation is related to : cost of similar projects already completed. cost of the base model of the present project. cost of the project with the base minimum profit. cost of the project under ideal situations.
In software cost estimation, base estimation is related to :cost of similar projects already completed.cost of the base model of the present project.cost of the project w...
admin
47
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1395
UGC NET CSE | June 2008 | Part 2 | Question: 45
In clean room software engineering : only eco-friendly hardware is used. only hired facilities are used for development. correctness of the code is verified before testing. implementation is done only after ensuring correctness.
In clean room software engineering :only eco-friendly hardware is used.only hired facilities are used for development.correctness of the code is verified before testing.i...
admin
48
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1396
UGC NET CSE | June 2008 | Part 2 | Question: 47
With reference to cluster analysis in data mining, a distance measure that is NOT used is : Euclidean distance. Manhattan distance. Chebychev's distance. Lee distance.
With reference to cluster analysis in data mining, a distance measure that is NOT used is :Euclidean distance.Manhattan distance.Chebychev's distance.Lee distance.
admin
56
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1397
UGC NET CSE | June 2008 | Part 2 | Question: 48
In a mobile communication system, a geographic region is divided into cells. For each frequency set, there is a buffer _________ wide where that frequency is not used. one-cell two-cells three-cells four-cells
In a mobile communication system, a geographic region is divided into cells. For each frequency set, there is a buffer _________ wide where that frequency is not used.one...
admin
57
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1398
UGC NET CSE | June 2008 | Part 2 | Question: 49
Identify the incorrect statement : The overall strategy drives the e-commerce data warehousing strategy. Data warehousing in an e-commerce environment should be done in a classical manner. E-commerce opens up an entirely new world of web servers. E-commerce security threats can be grouped into three major categories.
Identify the incorrect statement :The overall strategy drives the e-commerce data warehousing strategy.Data warehousing in an e-commerce environment should be done in a c...
admin
46
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1399
UGC NET CSE | June 2008 | Part 2 | Question: 50
Identify the incorrect statement : The $\text{ATM}$ adaptation layer is not service dependent. Logical connections in $\text{ATM}$ are referred to as virtual channel connections. $\text{ATM}$ is a streamlined protocol with minimal error and flow control capabilities. $\text{ATM}$ is also known as cell relay.
Identify the incorrect statement :The $\text{ATM}$ adaptation layer is not service dependent.Logical connections in $\text{ATM}$ are referred to as virtual channel connec...
admin
60
views
admin
asked
Jan 6
Others
ugcnetcse-june2008-paper2
+
–
0
votes
0
answers
1400
Hi sir, this is Akash, I'm trying to attempt the AIMT from 9:30 but I can't ,so please resolve this as soon as possible I'm waiting from 2months to give the AIMT, so please help me.
akashp12
249
views
akashp12
asked
Dec 31, 2023
Page:
« prev
1
...
65
66
67
68
69
70
71
72
73
74
75
...
137
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register