Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-dec2014-paper3
2
votes
1
answer
61
UGC NET CSE | December 2014 | Part 3 | Question: 14
Match the following $:$ ... $\text{a-i, b-ii, c-iii, d-iv}$ $\text{a-iv, b-iii, c-ii, d-i}$
Match the following $:$ $\begin{array}{clcl} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Tablet, Joystick} & \text{i.} & \text{Continuous devices}...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Jul 25, 2016
Computer Peripherals
ugcnetcse-dec2014-paper3
non-gate
computer-peripherals
io-devices
+
–
1
votes
1
answer
62
UGC NET CSE | December 2014 | Part 3 | Question: 13
Which of the following categories of languages do not refer to animation languages ? Graphical languages General-purpose languages Linear-list notations None of the above
Which of the following categories of languages do not refer to animation languages ?Graphical languagesGeneral-purpose languages Linear-list notationsNone of the above
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Jul 25, 2016
Computer Graphics
ugcnetcse-dec2014-paper3
computer-graphics
animation
non-gate
+
–
6
votes
2
answers
63
UGC NET CSE | December 2014 | Part 3 | Question: 12
Which of the following is false ? Every binary relation is never be in $BCNF$. Every $BCNF$ relation is in $3NF$. $1 NF, 2 NF, 3 NF$ and $BCNF$ are based on functional dependencies. Multivalued Dependency $(MVD)$ is a special case of Join Dependency $(JD)$
Which of the following is false ? Every binary relation is never be in $BCNF$. Every $BCNF$ relation is in $3NF$. $1 NF, 2 NF, 3 NF$ and $BCNF$ are based on functional de...
makhdoom ghaya
5.3k
views
makhdoom ghaya
asked
Jul 25, 2016
Databases
ugcnetcse-dec2014-paper3
databases
database-normalization
+
–
2
votes
1
answer
64
UGC NET CSE | December 2014 | Part 3 | Question: 11
Consider the following statements : I. Re-construction operation used in mixed fragmentation satisfies commutative rule. II. Re-construction operation used in vertical fragmentation satisfies commutative rule Which of the following is correct ? $I$ $II$ Both are correct None of the statements are correct.
Consider the following statements :I. Re-construction operation used in mixed fragmentation satisfies commutative rule.II. Re-construction operation used in vertical frag...
makhdoom ghaya
2.0k
views
makhdoom ghaya
asked
Jul 25, 2016
Distributed Computing
ugcnetcse-dec2014-paper3
distributed-computing
non-gate
+
–
4
votes
2
answers
65
UGC NET CSE | December 2014 | Part 3 | Question: 10
Let $R = ABCDE$ is a relational scheme with functional dependency set $F = \left\{A \rightarrow B, B \rightarrow C, AC \rightarrow D\right\}$. The attribute closures of $A$ and $E$ are $ABCD, \phi$ $ABCD, E$ $\Phi, \phi$ $ABC, E$
Let $R = ABCDE$ is a relational scheme with functional dependency set $F = \left\{A \rightarrow B, B \rightarrow C, AC \rightarrow D\right\}$. The attribute closures of $...
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Jul 25, 2016
Databases
ugcnetcse-dec2014-paper3
databases
database-normalization
+
–
2
votes
1
answer
66
UGC NET CSE | December 2014 | Part 3 | Question: 09
_________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information. Write-ahead log Check-pointing Log buffer Thomas
_________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information...
makhdoom ghaya
3.2k
views
makhdoom ghaya
asked
Jul 24, 2016
Databases
ugcnetcse-dec2014-paper3
databases
transaction-and-concurrency
recovery-from-failure
+
–
4
votes
1
answer
67
UGC NET CSE | December 2014 | Part 3 | Question: 08
Which of the following is correct ? I. Two phase locking is an optimistic protocol. II. Two phase locking is pessimistic protocol III. Time stamping is an optimistic protocol. IV. Time stamping is pessimistic protocol. $I$ and $III$ $II$ and $IV$ $I$ and $IV$ $II$ and $III$
Which of the following is correct ?I. Two phase locking is an optimistic protocol.II. Two phase locking is pessimistic protocolIII. Time stamping is an optimistic protoco...
makhdoom ghaya
4.0k
views
makhdoom ghaya
asked
Jul 24, 2016
Databases
ugcnetcse-dec2014-paper3
databases
transaction-and-concurrency
+
–
2
votes
1
answer
68
UGC NET CSE | December 2014 | Part 3 | Question: 07
Location transparency allows: I. Users to treat the data as if it is done at one location. II. Programmers to treat the data as if it is at one location. III. Managers to treat the data as if it is at one location. Which one of the following is correct ? $I, II$ and $III$ $I$ and $II$ only $II$ and $III$ only $II$ only
Location transparency allows:I. Users to treat the data as if it is done at one location.II. Programmers to treat the data as if it is at one location.III. Managers to tr...
makhdoom ghaya
2.9k
views
makhdoom ghaya
asked
Jul 24, 2016
Distributed Computing
ugcnetcse-dec2014-paper3
distributed-database
non-gate
+
–
1
votes
1
answer
69
UGC NET CSE | December 2014 | Part 3 | Question: 06
Specify the contents of the accumulator and the status of the $S, Z$ and $CY$ flags when $8085$ microprocessor performs addition of $87 H$ and $79 H$. $11, 1, 1, 1$ $10, 0, 1, 0$ $01, 1, 0, 0$ $00, 0, 1, 1$
Specify the contents of the accumulator and the status of the $S, Z$ and $CY$ flags when $8085$ microprocessor performs addition of $87 H$ and $79 H$. $11, 1, 1, 1$$10, 0...
makhdoom ghaya
6.1k
views
makhdoom ghaya
asked
Jul 24, 2016
CO and Architecture
ugcnetcse-dec2014-paper3
8085-microprocessor
non-gate
+
–
1
votes
2
answers
70
UGC NET CSE | December 2014 | Part 3 | Question: 05
How many times will the following loop be executed ? LXI B, 0007 H LOP : DCX B MOV A, B ORA C JNZ LOP $05$ $07$ $09$ $00$
How many times will the following loop be executed ? LXI B, 0007 HLOP : DCX B MOV A, B ORA C JNZ LOP $05$ $07$ $09$$00$
makhdoom ghaya
8.6k
views
makhdoom ghaya
asked
Jul 24, 2016
CO and Architecture
ugcnetcse-dec2014-paper3
8085-microprocessor
non-gate
+
–
0
votes
1
answer
71
UGC NET CSE | December 2014 | Part 3 | Question: 04
Match the following $8085$ instructions with the flags $:$ ... $\text{a-ii, b-iii, c-i, d-iv}$ $\text{a-ii, b-iv, c-i, d-iii}$
Match the following $8085$ instructions with the flags $:$$\begin{array}{} {} & {\textbf{List – I}} & {} & {\textbf{List – II}} \\ \text{a.} & \text{XCHG} & \text...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Jul 24, 2016
CO and Architecture
ugcnetcse-dec2014-paper3
8085-microprocessor
non-gate
+
–
0
votes
1
answer
72
UGC NET CSE | December 2014 | Part 3 | Question: 03
In a dot matrix printer the time to print a character is $6$ m.sec., time to space in between characters is $2$ m.sec., and the number of characters in a line are $200$. The printing speed of the dot matrix printer in characters per ... $0.6$ seconds $166$ chars/second and $0.8$ seconds $250$ chars/second and $0.4$ seconds
In a dot matrix printer the time to print a character is $6$ m.sec., time to space in between characters is $2$ m.sec., and the number of characters in a line are $200$. ...
makhdoom ghaya
2.4k
views
makhdoom ghaya
asked
Jul 24, 2016
Computer Peripherals
ugcnetcse-dec2014-paper3
computer-peripherals
non-gate
matrix-printer
io-devices
+
–
1
votes
2
answers
73
UGC NET CSE | December 2014 | Part 3 | Question: 02
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate Internal interrupts External interrupts Software interrupts None of the above
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriateInternal interruptsExternal interruptsSoftware interruptsNone of ...
makhdoom ghaya
2.2k
views
makhdoom ghaya
asked
Jul 24, 2016
Operating System
ugcnetcse-dec2014-paper3
operating-system
interrupts
+
–
4
votes
2
answers
74
UGC NET CSE | December 2014 | Part 3 | Question: 01
A hierarchical memory system that uses cache memory has cache access time of $50$ nano seconds, main memory access time of $300$ nano seconds, $75$% of memory requests are for read, hit ratio of $0.8$ for read access and the write-through scheme is used. ... both for read and write requests ? $157.5$ n.sec. $110$ n.sec. $75$ n.sec. $82.5$ n.sec.
A hierarchical memory system that uses cache memory has cache access time of $50$ nano seconds, main memory access time of $300$ nano seconds, $75$% of memory requests ar...
makhdoom ghaya
6.5k
views
makhdoom ghaya
asked
Jul 24, 2016
CO and Architecture
ugcnetcse-dec2014-paper3
co-and-architecture
cache-memory
+
–
6
votes
7
answers
75
UGC NET CSE | December 2014 | Part 3 | Question: 24
Regular expression for the complement of language $L=\left\{a^{n}b^{m} \mid n \geq 4, m \leq 3\right\}$ is $(a + b)^{*} ba(a + b)^{*}$ $a^{*} bbbbb^{*}$ $(\lambda + a + aa + aaa)b^{*} + (a + b)^{*} ba(a + b)^{*}$ None of the above
Regular expression for the complement of language $L=\left\{a^{n}b^{m} \mid n \geq 4, m \leq 3\right\}$ is $(a + b)^{*} ba(a + b)^{*}$ $a^{*} bbbbb^{*}$ $(\lambda + a + a...
Vivek sharma
11.0k
views
Vivek sharma
asked
Jul 17, 2015
Theory of Computation
ugcnetcse-dec2014-paper3
theory-of-computation
regular-expression
regular-language
+
–
Page:
« prev
1
2
3
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register