Recent questions tagged ugcnetcse-june2013-paper2

1 votes
1 answer
1
The $mv$ command changesthe inodethe inode-numberthe directory entryboth the directory entry and the inode
3 votes
1 answer
3
A virtual memory based memory management algorithm partially swaps out a process. This is an example ofshort term schedulinglong term schedulingmedium term schedulingmutu...
2 votes
1 answer
4
3 votes
2 answers
6
Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement form?-42-22-21-106
6 votes
3 answers
8
1 votes
1 answer
9
A test contains 100 true/false questions. How many different ways can a student answer the question on the test, if the answer may be left blank also.$^{100}P_2$$^{100}C_...
4 votes
3 answers
11
The relation “devides” on a set of positive integers is_____Symmetric and transitiveAnti symmetric and transitiveSymmetric onlyTransitive only
1 votes
2 answers
12
The task of correcting and preprocessing data is called asData streamingData cleaningData miningData storming
1 votes
2 answers
13
Repository of information gathered from multiple sources, storing under unified scheme at a single site is calledData miningMeta DataData warehousingDatabase
2 votes
2 answers
14
1 votes
1 answer
15
For a B-tree of height h and degree t, the total CPU time used to insert a node isO(h log t)O(t log h)O(t$^2$h)O(th)
2 votes
3 answers
18
Given a Non-deterministic Finite Automaton (NFA) with states $\text{p}$ and $\text{r}$ as initial and final states respectively and transition table as given below $:$$$\...
6 votes
2 answers
22
1 votes
1 answer
23
In IPv4 header, the ____ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs toidentificationfragment offsettime t...
1 votes
1 answer
25
1 votes
2 answers
26
In _____ substitution, a character in the plaintext is always changed to the same character in ciphertext, regardless of its position in the text.polyalphabeticmonoalphab...
1 votes
2 answers
27
Which of the following addresses is used to deliver a message to the correct application program running on a host?PortIPLogicalPhysical
1 votes
2 answers
28
1 votes
1 answer
29
Which normal form is considered as adequate for usual database design?2NF3NF4NF5NF
2 votes
2 answers
30
A Network Schemarestricts to one to many relationshippermits to many to many relationshipStores Data in a DatabaseStores Data in a Relation