Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-dec2005-paper2
2
votes
6
answers
31
UGC NET CSE | December 2005 | Part 2 | Question: 11
What is the output of the following $C$-program main() { printf("%d %d %d",size of (3.14f), size of (3.14), size of (3.141)); } 4 4 4 4 8 10 8 4 8 8 8 8
What is the output of the following $C$-programmain() { printf("%d %d %d",size of (3.14f), size of (3.14), size of (3.141)); }4 4 44 8 108 4 88 8 8
go_editor
2.3k
views
go_editor
asked
Mar 27, 2020
Programming in C
ugcnetcse-dec2005-paper2
programming-in-c
data-types
+
–
0
votes
2
answers
32
UGC NET CSE | December 2005 | Part 2 | Question: 12
The bitwise $\text{OR}$ of $35$ with $7$ in $C$ will be : $35$ $7$ $42$ $39$
The bitwise $\text{OR}$ of $35$ with $7$ in $C$ will be :$35$$7$$42$$39$
go_editor
405
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
digital-logic
number-system
+
–
0
votes
1
answer
33
UGC NET CSE | December 2005 | Part 2 | Question: 13
Data members and member function of a class by default is respectively : private and public public public and private private
Data members and member function of a class by default is respectively :private and publicpublicpublic and privateprivate
go_editor
259
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
2
answers
34
UGC NET CSE | December 2005 | Part 2 | Question: 14
Function over loading done at : Runtime Compile time Linking time Switching from function to function
Function over loading done at :RuntimeCompile timeLinking timeSwitching from function to function
go_editor
336
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
2
answers
35
UGC NET CSE | December 2005 | Part 2 | Question: 15
What will be the value of $i$ for the following expression: int f=11, i=3 ; i + = (f>3) ? i & 2:5 ; $2$ $5$ $13$ $12$
What will be the value of $i$ for the following expression:int f=11, i=3 ; i + = (f>3) ? i & 2:5 ;$2$$5$$13$$12$
go_editor
1.5k
views
go_editor
asked
Mar 27, 2020
Programming in C
ugcnetcse-dec2005-paper2
programming-in-c
operators
+
–
0
votes
2
answers
36
UGC NET CSE | December 2005 | Part 2 | Question: 16
A schema describes : data elements records and files record relationship all of the above
A schema describes :data elementsrecords and filesrecord relationshipall of the above
go_editor
1.3k
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
37
UGC NET CSE | December 2005 | Part 2 | Question: 17
One approach to standarolizing storing of data : $\text{MIS}$ $\text{CODASYL}$ Stuctured Programing None of the above
One approach to standarolizing storing of data :$\text{MIS}$ $\text{CODASYL}$Stuctured ProgramingNone of the above
go_editor
236
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
38
UGC NET CSE | December 2005 | Part 2 | Question: 18
In a relational schema, each tuple is divided in fields called : Relations Domains Queries All the above
In a relational schema, each tuple is divided in fields called :RelationsDomainsQueriesAll the above
go_editor
251
views
go_editor
asked
Mar 27, 2020
Databases
ugcnetcse-dec2005-paper2
databases
database-design
+
–
0
votes
0
answers
39
UGC NET CSE | December 2005 | Part 2 | Question: 19
An embedded printer provides : Physical record key An inserted Index A secondary access path All the above
An embedded printer provides :Physical record keyAn inserted IndexA secondary access pathAll the above
go_editor
292
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
40
UGC NET CSE | December 2005 | Part 2 | Question: 20
A locked file can be : accessed by only one user modified by users with the correct password is used to hide sensitive information both $B$ and $C$
A locked file can be :accessed by only one usermodified by users with the correct passwordis used to hide sensitive informationboth $B$ and $C$
go_editor
201
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
41
UGC NET CSE | December 2005 | Part 2 | Question: 21
In what tree, for every node the height of its left subtree and right subtree differ at least by one: Binary search tree $\text{AVL}$-tree Threaded binary tree Complete tree
In what tree, for every node the height of its left subtree and right subtree differ at least by one:Binary search tree$\text{AVL}$-treeThreaded binary treeComplete tree
go_editor
304
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
2
answers
42
UGC NET CSE | December 2005 | Part 2 | Question: 22
A hash function $f$ defined as $f(\text{key}) =\text{key mod}$ $7$, with linear probing it is used to insert the key $37,38,72,48,98,11,56$ into a table index from $0$ to $6$. What will be the locations of $11$: $3$ $4$ $5$ $6$
A hash function $f$ defined as $f(\text{key}) =\text{key mod}$ $7$, with linear probing it is used to insert the key $37,38,72,48,98,11,56$ into a table index from $0$ to...
go_editor
247
views
go_editor
asked
Mar 27, 2020
DS
ugcnetcse-dec2005-paper2
data-structures
hashing
linear-probing
+
–
0
votes
1
answer
43
UGC NET CSE | December 2005 | Part 2 | Question: 23
Consider the graph, which of the following is a valid topological sorting? $\text{ABCD}$ $\text{BACD}$ $\text{BADC}$ $\text{ABDC}$
Consider the graph, which of the following is a valid topological sorting?$\text{ABCD}$$\text{BACD}$$\text{BADC}$$\text{ABDC}$
go_editor
2.3k
views
go_editor
asked
Mar 27, 2020
Algorithms
ugcnetcse-dec2005-paper2
algorithms
topological-sort
+
–
0
votes
1
answer
44
UGC NET CSE | December 2005 | Part 2 | Question: 24
The initial configuration of quaue is $a, b, c, d$. $'a'$ is at the front. To get the configuration $d, c, b, a$ how many deletions and additions required: $2$ deletions, $3$ additions $3$ deletions, $2$ additions $3$ deletions, $4$ additions $3$ deletions, $3$ additions
The initial configuration of quaue is $a, b, c, d$. $'a'$ is at the front. To get the configuration $d, c, b, a$ how many deletions and additions required:$2$ deletions, ...
go_editor
388
views
go_editor
asked
Mar 27, 2020
DS
ugcnetcse-dec2005-paper2
data-structures
queue
+
–
0
votes
1
answer
45
UGC NET CSE | December 2005 | Part 2 | Question: 25
Which traversal techniques lists the nodes of a binary search tree in ascending order? post – order in – order pre – order linear – order
Which traversal techniques lists the nodes of a binary search tree in ascending order?post – orderin – orderpre – orderlinear – order
go_editor
331
views
go_editor
asked
Mar 27, 2020
DS
ugcnetcse-dec2005-paper2
data-structures
binary-search-tree
+
–
0
votes
1
answer
46
UGC NET CSE | December 2005 | Part 2 | Question: 26
The data unit in the $\text{TCP/IP}$ application Layer is called a ____________ . message segment datagram frame
The data unit in the $\text{TCP/IP}$ application Layer is called a ____________ .messagesegmentdatagramframe
go_editor
2.1k
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
47
UGC NET CSE | December 2005 | Part 2 | Question: 27
Which of following file retrieval methods use hypermedia ? $\text{HTML}$ Veronica $\text{WAIS}$ $\text{HTTP}$
Which of following file retrieval methods use hypermedia ?$\text{HTML}$Veronica$\text{WAIS}$$\text{HTTP}$
go_editor
231
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
0
answers
48
UGC NET CSE | December 2005 | Part 2 | Question: 28
Which of following is an example of a client - server model : $\text{DNS}$ $\text{FTP}$ $\text{TELNET}$ All the above
Which of following is an example of a client - server model :$\text{DNS}$$\text{FTP}$$\text{TELNET}$All the above
go_editor
184
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
49
UGC NET CSE | December 2005 | Part 2 | Question: 29
__________ provide a method to recover data that has been delivered but not get used : Segmentation Concatenation Transalation Synchronization
__________ provide a method to recover data that has been delivered but not get used :SegmentationConcatenationTransalationSynchronization
go_editor
274
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
0
votes
1
answer
50
UGC NET CSE | December 2005 | Part 2 | Question: 30
Encryption and decryption are the functions of the _________ layer of $\text{OSI}$ model : transport session router presentation
Encryption and decryption are the functions of the _________ layer of $\text{OSI}$ model :transportsessionrouterpresentation
go_editor
4.3k
views
go_editor
asked
Mar 27, 2020
Others
ugcnetcse-dec2005-paper2
+
–
Page:
« prev
1
2
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register