Recent questions tagged ugcnetcse-dec2015-paper2

2.7k
views
2 answers
1 votes
____ uses electronic means to transfer funds directly from one account to another rather than by cheque or cashM-BankingE-BankingO-BankingC-Banking
3.6k
views
2 answers
6 votes
How many solutions are there for the equation $x+y+z+u=29$ subject to the constraints that $x \geq 1, \: \: y \geq 2 \: \: z \geq 3 \: \: and \: \: u \geq 0$?49602600237518855
3.8k
views
1 answers
2 votes
Which of the following is not a software process model?PrototypingIterativeTimeboxiingGlassboxing
5.8k
views
1 answers
1 votes
In software testing, how the error, fault and failure are related to each other?Error leads to failure but fault is not related to error and failureFault ... fault and fault leads to failureFault leads to error and error leads to failure
2.0k
views
1 answers
1 votes
The ____ transfers the executable image of a C++ program from hard disk to main memoryCompilerLinkerDebuggerLoader
2.2k
views
2 answers
1 votes
Which of the following statements is false?Top-down parsers are LL parsers where first L stands for left-to-right scan and second L stands for a leftmost derivation(000)* is ... the language $L^R =\{w^R: w \varepsilon L\}$ is context-free
9.1k
views
2 answers
3 votes
What will be the hexadecimal value in the register $ax$ (32-bit) after executing the following instructions?mov al, 15mov ah, 15xor al, almov cl, 3shr ax, cl0F00 h0F0F h01E0 hFFFF h
3.9k
views
1 answers
1 votes
Loop unrolling is a code optimization technique:that avoids tests at every iteration of the loopthat improves preformance by decreasing the number of ... loopsthat reorders operations to allow multiple computations to happen in parallel
3.8k
views
4 answers
2 votes
Which of the following is not a congestion policy at network layer?Flow Control PolicyPacket Discard PolicyPacket Lifetime Management PolicyRouting Algorithm
2.3k
views
3 answers
2 votes
An ideal sort is an in-place-sort whose additional space requirement isO (log$_2$ n)O (nlog$_2$ n)O (1)O (n)
3.2k
views
1 answers
3 votes
The number of disk pages access in B-tree search, where h is height, n is the number of keys and t is the minimum degree, is$\theta (\log_n h*t)$\theta (\log_t n*h)$\theta (\log_h n)$\theta (\log_t n)$
8.3k
views
2 answers
6 votes
In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown as $x/y$, where $x$ is discovery time stamp and $y$ is finishing time stamp.It shows ... ,e} {f,g} {c,d} {h}{a,b,c,d} {e,f,g} {h}
4.0k
views
2 answers
3 votes
The hash function used in double hashing is of the form:$h(k,i)=(h_1(k)+h_2(k)+i) \: mod \: m$h(k,i)=(h_1(k)+h_2(k)-i) \: mod \: m$h(k,i)=(h_1(k)+i \: h_2(k)) \: mod \: m$h(k,i)=(h_1(k)-i \: h_2(k)) \: mod \: m$
4.1k
views
1 answers
3 votes
____ allows selection of the relevant information necessary for the data warehouse:The Top-Down ViewData Warehouse ViewDatasource ViewBusiness Query View
2.9k
views
1 answers
1 votes
____ system is market oriented and is used for data analysis by knowledge workers including Managers, Executives adn Analysts.OLTPOLAPData SystemMarket System
2.1k
views
1 answers
1 votes
Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the proportion of persons having meningitis is ... who had meningtis and complain about stiff neck is:0.01%0.02%0.04%0.05%
4.2k
views
1 answers
1 votes
A data cube $C,$ has $n$ dimensions, and each dimensions has exactly $p$ distinct values in the base cuboid. Assume that there are no concept hierarchies associated with the dimensions. What is ... data cube, $C?$p^n$p$(2^n-1)(p+1)$(p+1)^n$
2.9k
views
1 answers
2 votes
In Unix, the login prompt can be changed by changing the contents of the file_____contrabinitgettydefsinittab
12.1k
views
1 answers
4 votes
A system has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as follows: AllocatedMaximumAvailableProcess A1 0 2 1 11 1 2 1 ... The smallest value of x for which the above system in safe state is1320
5.1k
views
1 answers
2 votes
Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average seek time of 40 msec. What is the time in msec to read a block of 1024 bytes from this disk?57 msec49 msec48 msec17 msec
6.3k
views
2 answers
1 votes
Suppose that the number of instructions executed between page fault is directly proportional to the number of page frames allocated to a program. If the available ... take to run twice as much memory were available?60 sec30 sec45 sec10 sec
9.7k
views
1 answers
6 votes
A virtual memory has a page size of $\textsf{1K}$ ... $2021, 4050, 5112, 7100$
2.9k
views
2 answers
2 votes
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5?13212633
5.8k
views
1 answers
1 votes
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent cells. If 840 frequencies are available, how many can be used in a given cell?280210140120
5.6k
views
2 answers
2 votes
Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is400 bps800 bps1600 bps3200 bps
1.9k
views
1 answers
1 votes
Which of the following fields in IPv 4 datagram is not related to fragmentation?Type of serviceFragment offsetFlagsIndentification
3.7k
views
1 answers
1 votes
Which of the following services is not provided by wireless access point in 802.11 WLAN?AssociationDisassociationError correctionIntegration
2.5k
views
1 answers
1 votes
A data which improves the performance and accessibility of the database are called:IndexesUser DataApplication MetadataData Dictionary
2.7k
views
1 answers
3 votes
Which of the following provides the best description of an entity type?A specific concrete object with a defined set of processes (e.g. Jatin with diabetes)A ... things with the same set of characteristics that may exist in the real world
1.9k
views
1 answers
1 votes
In C++, which system - provided function is called when no handler is provided to deal with an exception?terminate()unexpected()abort()kill()