Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-aug2016-paper3
0
votes
1
answer
31
UGC NET CSE | August 2016 | Part 3 | Question: 45
Match each software term in List-I to its description in List-II : ... $\text{a-iv, b-iii, c-v, d-i, e-ii}$ $\text{a-iv, b-iii, c-ii, d-v, e-i}$
Match each software term in List-I to its description in List-II :$\begin{array}{clcl} & \textbf{List-I} && \textbf{List-II} \\ \text{I.} & \text{Wizards} & \text{a.} ...
makhdoom ghaya
1.2k
views
makhdoom ghaya
asked
Oct 4, 2016
Others
ugcnetcse-aug2016-paper3
system-software-compilers
macros
+
–
2
votes
1
answer
32
UGC NET CSE | August 2016 | Part 3 | Question: 44
Match each software lifecycle model in List - I to its description in List - II : ... $\text{I-d, II-a, III-b, IV-c, V-e}$ $\text{I-c, II-e, III-a, IV-b, V-d}$
Match each software lifecycle model in List – I to its description in List – II :$\begin{array}{clcl} \text{} & \textbf{List-I} && \textbf{List-II} \\ \text{I.} & \t...
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Oct 4, 2016
IS&Software Engineering
ugcnetcse-aug2016-paper3
is&software-engineering
software-development-life-cycle-models
+
–
1
votes
1
answer
33
UGC NET CSE | August 2016 | Part 3 | Question: 43
An Operating System $(OS)$ crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to recover the OS, that is, the Mean Time To Repair (MTTR) = 10 minutes. The availability of the OS with these reliability figures is approximately : 96.97% 97.97% 99.009% 99.97%
An Operating System $(OS)$ crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to rec...
makhdoom ghaya
2.8k
views
makhdoom ghaya
asked
Oct 4, 2016
Operating System
ugcnetcse-aug2016-paper3
operating-system
system-reliability
+
–
2
votes
3
answers
34
UGC NET CSE | August 2016 | Part 3 | Question: 42
Java uses threads to enable the entire environment to be ______. Symmetric Asymmetric Synchronous Asynchronous
Java uses threads to enable the entire environment to be ______.SymmetricAsymmetricSynchronousAsynchronous
makhdoom ghaya
2.6k
views
makhdoom ghaya
asked
Oct 4, 2016
Java
ugcnetcse-aug2016-paper3
java
threads
+
–
1
votes
2
answers
35
UGC NET CSE | August 2016 | Part 3 | Question: 41
Which of the following tag in HTML is used to surround information, such as signature of the person who created the page? <body></body> <address></address> <strong></strong> <em></em>
Which of the following tag in HTML is used to surround information, such as signature of the person who created the page?<body></body><address></address><strong></strong>...
makhdoom ghaya
2.1k
views
makhdoom ghaya
asked
Oct 4, 2016
Web Technologies
ugcnetcse-aug2016-paper3
web-technologies
html
+
–
1
votes
1
answer
36
UGC NET CSE | August 2016 | Part 3 | Question: 40
Which of the following is not a correct statement ? Every class containing abstract method must be declared abstract. Abstract class can directly be initiated with ‘new’ operator. Abstract class can be initiated. Abstract class does not contain any definition of implementation.
Which of the following is not a correct statement ?Every class containing abstract method must be declared abstract.Abstract class can directly be initiated with ‘new�...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Oct 1, 2016
Java
ugcnetcse-aug2016-paper3
java
abstract-method
+
–
1
votes
1
answer
37
UGC NET CSE | August 2016 | Part 3 | Question: 39
Which of the following is a correct statement ? Composition is a strong type of association between two classes with full ownership. Composition is a strong type of association between two classes with partial ownership. ... classes with partial ownership. Composition is a weak type of association between two classes with strong ownership.
Which of the following is a correct statement ?Composition is a strong type of association between two classes with full ownership.Composition is a strong type of associa...
makhdoom ghaya
2.1k
views
makhdoom ghaya
asked
Oct 1, 2016
Object Oriented Programming
ugcnetcse-aug2016-paper3
object-oriented-programming
composition
+
–
1
votes
2
answers
38
UGC NET CSE | August 2016 | Part 3 | Question: 38
Method over-riding can be prevented by using final as a modifier at ______. The start of the class. The start of method declaration. The start of derived class. The start of the method declaration in the derived class.
Method over-riding can be prevented by using final as a modifier at ______.The start of the class.The start of method declaration.The start of derived class.The start of ...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Oct 1, 2016
Java
ugcnetcse-aug2016-paper3
java
method-overriding
+
–
1
votes
1
answer
39
UGC NET CSE | August 2016 | Part 3 | Question: 37
Constructors have _____ return type. void char int no
Constructors have _____ return type.voidcharintno
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Oct 1, 2016
Object Oriented Programming
ugcnetcse-aug2016-paper3
object-oriented-programming
constructor
+
–
1
votes
1
answer
40
UGC NET CSE | August 2016 | Part 3 | Question: 36
Match the following : ... $\text{a-iii, b-i, c-iv, d-ii}$ $\text{a-iii, b-i, c-ii, d-iv}$
Match the following :$\begin{array}{clcl} \text{a.} & \text{Prim’s algorithm} & \text{i.} & \text{$O(V^2E)$} \\ \text{b.} & \text{Bellman-Ford algorithm} & \text{ii.} ...
makhdoom ghaya
1.3k
views
makhdoom ghaya
asked
Oct 1, 2016
Algorithms
ugcnetcse-aug2016-paper3
algorithms
+
–
1
votes
1
answer
41
UGC NET CSE | August 2016 | Part 3 | Question: 35
If there are $n$ integers to sort, each integer has d digits, and each digit is in the set $\left\{1, 2, …, k\right\}$, radix sort can sort the numbers in : $O (k (n + d))$ $O (d (n + k))$ $O ((n + k) l g d)$ $O ((n + d) l g k)$
If there are $n$ integers to sort, each integer has d digits, and each digit is in the set $\left\{1, 2, …, k\right\}$, radix sort can sort the numbers in :$O (k (n + d...
makhdoom ghaya
724
views
makhdoom ghaya
asked
Oct 1, 2016
DS
ugcnetcse-aug2016-paper3
data-structures
radix-sort
+
–
1
votes
1
answer
42
UGC NET CSE | August 2016 | Part 3 | Question: 34
A priority queue is implemented as a max-heap. Initially, it has five elements. The levelorder traversal of the heap is as follows : 20, 18, 15, 13, 12 Two new elements 10' and 17' are inserted in the heap in that order. The level-order traversal of the heap after ... 18, 17, 12, 13, 10, 15 20, 18, 17, 10, 12, 13, 15 20, 18, 17, 13, 12, 10, 15
A priority queue is implemented as a max-heap. Initially, it has five elements. The levelorder traversal of the heap is as follows :20, 18, 15, 13, 12Two new elements ‘...
makhdoom ghaya
2.6k
views
makhdoom ghaya
asked
Oct 1, 2016
DS
ugcnetcse-aug2016-paper3
data-structures
priority-queue
+
–
1
votes
4
answers
43
UGC NET CSE | August 2016 | Part 3 | Question: 33
Consider a weighted complete graph $G$ on the vertex set $\left\{ν_{1} , ν_{2},.... ν_{n} \right\}$ such that the weight of the edge $(ν_{i} , ν_{j})$ is $4 | i – j|$. The weight of minimum cost spanning tree of $G$ is : $4n^{2}$ $n$ $4n – 4$ $2n – 2$
Consider a weighted complete graph $G$ on the vertex set $\left\{ν_{1} , ν_{2},.... ν_{n} \right\}$ such that the weight of the edge $(ν_{i} , ν_{j})$ is $4 | i – ...
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Oct 1, 2016
DS
ugcnetcse-aug2016-paper3
data-structures
spanning-tree
+
–
1
votes
1
answer
44
UGC NET CSE | August 2016 | Part 3 | Question: 32
Consider a hash table of size $m = 10000$, and the hash function $h(K) = floor (m(KA \bmod 1))$ for $A = ( \sqrt{5} – 1)/2$. The key $123456$ is mapped to location ______. $46$ $41$ $43$ $48$
Consider a hash table of size $m = 10000$, and the hash function $h(K) = floor (m(KA \bmod 1))$ for $A = ( \sqrt{5} – 1)/2$. The key $123456$ is mapped to location ____...
makhdoom ghaya
862
views
makhdoom ghaya
asked
Oct 1, 2016
DS
ugcnetcse-aug2016-paper3
data-structures
hashing
+
–
3
votes
2
answers
45
UGC NET CSE | August 2016 | Part 3 | Question: 31
Consider the problem of a chain <$A_{1} , A_{2} , A_{3},A_{4}$> of four matrices. Suppose that the dimensions of the matrices $A_{1} , A_{2} , A_{3}$ and $A_{4}$ are $30 \times 35, 35 \times 15, 15 \times 5$ ... minimum number of scalar multiplications needed to compute the product $A_{1}A_{2}A_{3}A_{4}$ is ____. $14875$ $21000$ $9375$ $11875$
Consider the problem of a chain <$A_{1} , A_{2} , A_{3},A_{4}$ of four matrices. Suppose that the dimensions of the matrices $A_{1} , A_{2} , A_{3}$ and $A_{4}$ are $30 \...
makhdoom ghaya
2.4k
views
makhdoom ghaya
asked
Oct 1, 2016
Algorithms
ugcnetcse-aug2016-paper3
algorithms
dynamic-programming
numerical-answers
matrix
+
–
3
votes
2
answers
46
UGC NET CSE | August 2016 | Part 3 | Question: 30
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$ for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is _____. ABHI HAQC IHBA BHQC
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$...
makhdoom ghaya
4.8k
views
makhdoom ghaya
asked
Oct 1, 2016
Computer Networks
ugcnetcse-aug2016-paper3
cryptography
computer-networks
+
–
3
votes
1
answer
47
UGC NET CSE | August 2016 | Part 3 | Question: 29
An analog signal has a bit rate of $8000$ bps and a baud rate of $1000$. Then analog signal has _____ signal elements and carry _____ data elements in each signal. $256, 8$ bits $128, 4$ bits $256, 4$ bits $128, 8$ bits
An analog signal has a bit rate of $8000$ bps and a baud rate of $1000$. Then analog signal has _____ signal elements and carry _____ data elements in each signal.$256, 8...
makhdoom ghaya
3.4k
views
makhdoom ghaya
asked
Oct 1, 2016
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
transmission-media
+
–
1
votes
2
answers
48
UGC NET CSE | August 2016 | Part 3 | Question: 28
A slotted ALOHA network transmits $200$ bits frames using a shared channel with $200$ kbps bandwidth. If the system (all stations put together) produces $1000$ frames per second, then the throughput of the system is _______. $0.268$ $0.468$ $0.368$ $0.568$
A slotted ALOHA network transmits $200$ bits frames using a shared channel with $200$ kbps bandwidth. If the system (all stations put together) produces $1000$ frames per...
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Oct 1, 2016
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
multiple-access-protocol
transmission-media
+
–
4
votes
2
answers
49
UGC NET CSE | August 2016 | Part 3 | Question: 27
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is $G(x) = x^{4}+ x + 1$. After implementing $CRC$ encoder, the encoded word sent from sender side is _____. 11010110111110 11101101011011 110101111100111 110101111001111
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is $G(x) = x^{4}+ x + 1$. After implementing $CRC$ encoder, th...
makhdoom ghaya
16.8k
views
makhdoom ghaya
asked
Oct 1, 2016
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
crc-polynomial
checksum
+
–
1
votes
2
answers
50
UGC NET CSE | August 2016 | Part 3 | Question: 26
Consider the following statements : A. High speed Ethernet works on optic fiber. B. A point to point protocol over Ethernet is a network protocol for encapsulating $PPP$ frames inside Ethernet frames. C. High speed Ethernet does not work on optic fiber. D. A point to point ... $D$ are true. $A, B, C$ and $D$ are true. $A, B, C$ and $D$ are false.
Consider the following statements :A. High speed Ethernet works on optic fiber.B. A point to point protocol over Ethernet is a network protocol for encapsulating $PPP$ fr...
makhdoom ghaya
2.8k
views
makhdoom ghaya
asked
Oct 1, 2016
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
ethernet
network-protocols
+
–
3
votes
2
answers
51
UGC NET CSE | August 2016 | Part 3 | Question: 25
Suppose transmission rate of a channel is $32$ kbps. If there are $‘8’$ routes from source to destination and each packet $p$ contains $8000$ bits. Total end to end delay in sending packet $P$ is _____. $2$ sec $3$ sec $4$ se $1$ sec
Suppose transmission rate of a channel is $32$ kbps. If there are $‘8’$ routes from source to destination and each packet $p$ contains $8000$ bits. Total end to end d...
makhdoom ghaya
2.9k
views
makhdoom ghaya
asked
Oct 1, 2016
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
network-switching
+
–
5
votes
1
answer
52
UGC NET CSE | August 2016 | Part 3 | Question: 24
Consider the following identities for regular expressions : (a) (r + s)* = (s + r)* (b) (r*)* = r* (c) (r* s*)* = (r + s)* Which of the above identities are true ? (a) and (b) only (b) and (c) only (c) and (a) only (a), (b) and (c)
Consider the following identities for regular expressions :(a) (r + s)* = (s + r)*(b) (r*)* = r*(c) (r* s*)* = (r + s)*Which of the above identities are true ?(a) and (b)...
makhdoom ghaya
7.6k
views
makhdoom ghaya
asked
Oct 1, 2016
Theory of Computation
ugcnetcse-aug2016-paper3
theory-of-computation
regular-expression
+
–
3
votes
1
answer
53
UGC NET CSE | August 2016 | Part 3 | Question: 23
Let $\Sigma= {a, b}$ and language $L = {aa, bb}$. Then, the complement of $L$ is $\left\{\lambda, a, b, ab, ba \right\} \cup \left\{w \in\left\{a, b\right\}^{*} | |w| > 3 \right\}$ ... $\left\{\lambda, a, b, ab, ba\right\} \cup \left\{w \in \left\{a, b\right\}^{*} | |w| \geq 3 \right\}$
Let $\Sigma= {a, b}$ and language $L = {aa, bb}$. Then, the complement of $L$ is$\left\{\lambda, a, b, ab, ba \right\} \cup \left\{w \in\left\{a, b\right\}^{*} | |w| 3 \...
makhdoom ghaya
552
views
makhdoom ghaya
asked
Oct 1, 2016
Theory of Computation
ugcnetcse-aug2016-paper3
theory-of-computation
complement
+
–
2
votes
2
answers
54
UGC NET CSE | August 2016 | Part 3 | Question: 22
The regular grammar for the language $L$ = {$a^{n}b^{m}$ | $n + m$ is even} is given by (1) $S \rightarrow S_{1} | S_{2}$ $S_{1} \rightarrow a S_{1} | A_{1}$ $A_{1} \rightarrow b A_{1} | \lambda$ ... $S_{2} \rightarrow aaS_{2} | aA_{2}$ $A_{1} \rightarrow bbA_{1} | \lambda$ $A_{2} \rightarrow bbA_{2} | b$
The regular grammar for the language $L$ = {$a^{n}b^{m}$ | $n + m$ is even} is given by(1) $S \rightarrow S_{1} | S_{2}$ $S_{1} \rightarrow a S_{1} | A_{1}$ $A_{...
makhdoom ghaya
1.3k
views
makhdoom ghaya
asked
Oct 1, 2016
Theory of Computation
ugcnetcse-aug2016-paper3
theory-of-computation
regular-grammar
+
–
3
votes
1
answer
55
UGC NET CSE | August 2016 | Part 3 | Question: 21
Assume that the program $‘P’$ is implementing parameter passing with ‘call by reference’. What will be printed by following print statements in $P$? Program P { x=10; y=3; funb(y,x,x) print x; print y; } funb (x,y,z) { y=y+4; z=x+y+z; } 10, 7 31, 3 10, 3 31, 7
Assume that the program $‘P’$ is implementing parameter passing with ‘call by reference’. What will be printed by following print statements in $P$?Program P { x=...
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Oct 1, 2016
Compiler Design
ugcnetcse-aug2016-paper3
parameter-passing
+
–
3
votes
1
answer
56
UGC NET CSE | August 2016 | Part 3 | Question: 20
Aliasing in the context of programming languages refers to : Multiple variables having the same location Multiple variables having the same identifier Multiple variables having the same value Multiple use of same variable
Aliasing in the context of programming languages refers to :Multiple variables having the same locationMultiple variables having the same identifierMultiple variables hav...
makhdoom ghaya
1.7k
views
makhdoom ghaya
asked
Sep 30, 2016
Programming in C
ugcnetcse-aug2016-paper3
programming
aliasing
+
–
1
votes
1
answer
57
UGC NET CSE | August 2016 | Part 3 | Question: 19
Match the following with reference to Functional programming history : ... $\text{a-iii, b-ii, c-iv, d-i}$ $\text{a-ii, b-i, c-iv, d-iii}$
Match the following with reference to Functional programming history :$\begin{array}{clcl} \text{a.} & \text{Lambda calculus} & \text{i.} & \text{Church, 1932} \\ \text{...
makhdoom ghaya
577
views
makhdoom ghaya
asked
Sep 30, 2016
Programming in C
ugcnetcse-aug2016-paper3
programming
+
–
1
votes
2
answers
58
UGC NET CSE | August 2016 | Part 3 | Question: 18
The Liang-Barsky line clipping algorithm uses the parametric equation of a line from $(x_{1} , y_{1} )$ to $(x_{2} , y_{2} )$ along with its infinite extension which is given as : $x = x_{1} + \Delta x.u$ $y = y_{1} + \Delta y.u$ ... as : $(0, \frac{2}{3})$ $\left(\frac{1}{6},\frac{5}{6}\right)$ $(0, \frac{1}{3})$ $(0, 1)$
The Liang-Barsky line clipping algorithm uses the parametric equation of a line from $(x_{1} , y_{1} )$ to $(x_{2} , y_{2} )$ along with its infinite extension which is g...
makhdoom ghaya
3.8k
views
makhdoom ghaya
asked
Sep 30, 2016
Computer Graphics
ugcnetcse-aug2016-paper3
computer-graphics
line-drawing-algorithm
+
–
1
votes
1
answer
59
UGC NET CSE | August 2016 | Part 3 | Question: 17
In perspective projection (from 3D to 2D), objects behind the centre of projection are projected upside down and backward onto the view-plane. This is known as _____. Topological distortion Vanishing point View confusion Perspective foreshortening
In perspective projection (from 3D to 2D), objects behind the centre of projection are projected upside down and backward onto the view-plane. This is known as _____.Topo...
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Sep 30, 2016
Computer Graphics
ugcnetcse-aug2016-paper3
computer-graphics
projection
+
–
5
votes
1
answer
60
UGC NET CSE | August 2016 | Part 3 | Question: 16
A point $P(2, 5)$ is rotated about a pivot point $(1, 2)$ by 60°. What is the new transformed point $P'$ ? $(1, 4)$ $(–1, 4)$ $(1, – 4)$ $(– 4, 1)$
A point $P(2, 5)$ is rotated about a pivot point $(1, 2)$ by 60°. What is the new transformed point $P'$ ?$(1, 4)$$(–1, 4)$$(1, – 4)$$(– 4, 1)$
makhdoom ghaya
8.2k
views
makhdoom ghaya
asked
Sep 30, 2016
Computer Graphics
ugcnetcse-aug2016-paper3
computer-graphics
projection
+
–
Page:
« prev
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register