Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2015-paper3
3
votes
1
answer
31
UGC NET CSE | Junet 2015 | Part 3 | Question: 42
Modulo design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? Inheritance Polymorphism Encapsulation Abstraction
Modulo design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule?InheritancePolymorphismEncapsulationAbstractio...
go_editor
2.4k
views
go_editor
asked
Aug 1, 2016
IS&Software Engineering
ugcnetcse-june2015-paper3
software-design
is&software-engineering
+
–
3
votes
1
answer
32
UGC NET CSE | Junet 2015 | Part 3 | Question: 41
In XML, DOCTYPE declaration specifies to include a reference to ____ file Document type Definition Document type declaration Document transfer definition Document type language
In XML, DOCTYPE declaration specifies to include a reference to ____ fileDocument type DefinitionDocument type declarationDocument transfer definitionDocument type langua...
go_editor
1.5k
views
go_editor
asked
Aug 1, 2016
Web Technologies
ugcnetcse-june2015-paper3
web-technologies
xml
+
–
2
votes
4
answers
33
UGC NET CSE | Junet 2015 | Part 3 | Question: 40
In XML we can specify the frequency of an element by using the symbols: +*! #*! +*? -*?
In XML we can specify the frequency of an element by using the symbols:+*!#*!+*?-*?
go_editor
2.7k
views
go_editor
asked
Aug 1, 2016
Web Technologies
ugcnetcse-june2015-paper3
web-technologies
xml
+
–
3
votes
2
answers
34
UGC NET CSE | Junet 2015 | Part 3 | Question: 39
Which one of the following is correct? Java applets cannot be written in any programming language An applet is not a small program An applet can be run on its own Applets are embedded in another applications
Which one of the following is correct?Java applets cannot be written in any programming languageAn applet is not a small programAn applet can be run on its ownApplets are...
go_editor
3.7k
views
go_editor
asked
Aug 1, 2016
Object Oriented Programming
ugcnetcse-june2015-paper3
object-oriented-programming
java
+
–
2
votes
1
answer
35
UGC NET CSE | Junet 2015 | Part 3 | Question: 38
The Servlet Response interface enables a servlet to formulate a response for a client using the method void log(Exception e, String s) void destroy() int get ServerPort() void set ContextType(String Type)
The Servlet Response interface enables a servlet to formulate a response for a client using the methodvoid log(Exception e, String s)void destroy()int get ServerPort()voi...
go_editor
2.0k
views
go_editor
asked
Aug 1, 2016
Object Oriented Programming
ugcnetcse-june2015-paper3
object-oriented-programming
java
+
–
2
votes
1
answer
36
UGC NET CSE | Junet 2015 | Part 3 | Question: 37
In Java, when we implement an interface method, it must be declared as Private Protected Public Friend
In Java, when we implement an interface method, it must be declared asPrivateProtectedPublicFriend
go_editor
4.3k
views
go_editor
asked
Aug 1, 2016
Object Oriented Programming
ugcnetcse-june2015-paper3
object-oriented-programming
java
+
–
3
votes
2
answers
37
UGC NET CSE | Junet 2015 | Part 3 | Question: 36
The number of nodes in height h in any n-element heap is $h$ $z^h$ ceil $\biggl(\frac{n}{z^h} \biggr)$ ceil $\biggl(\frac{n}{z^{h+1}} \biggr)$
The number of nodes in height h in any n-element heap is$h$$z^h$ceil $\biggl(\frac{n}{z^h} \biggr)$ceil $\biggl(\frac{n}{z^{h+1}} \biggr)$
go_editor
1.4k
views
go_editor
asked
Aug 1, 2016
DS
ugcnetcse-june2015-paper3
data-structures
binary-heap
+
–
3
votes
2
answers
38
UGC NET CSE | Junet 2015 | Part 3 | Question: 34
Consider a hash table of size m=100 and the hash function h(k)=floor (m(kA mod 1)) for $A=\frac{ (\sqrt{5}-1)}{2} = 0.618033$. Compute the location to which the key k=123456 is placed in hash table 77 82 88 89
Consider a hash table of size m=100 and the hash function h(k)=floor (m(kA mod 1)) for $A=\frac{ (\sqrt{5}-1)}{2} = 0.618033$. Compute the location to which the key k=123...
go_editor
5.9k
views
go_editor
asked
Aug 1, 2016
DS
ugcnetcse-june2015-paper3
data-structures
hashing
+
–
3
votes
1
answer
39
UGC NET CSE | Junet 2015 | Part 3 | Question: 31
An all-pairs shortest-paths problem is efficiently solved using: Dijkstra's algorithm Bellman-Ford algorithm Kruskal algorithm Floyd-Warshall algorithm
An all-pairs shortest-paths problem is efficiently solved using:Dijkstra's algorithmBellman-Ford algorithmKruskal algorithmFloyd-Warshall algorithm
go_editor
3.3k
views
go_editor
asked
Jul 31, 2016
Algorithms
ugcnetcse-june2015-paper3
algorithms
easy
shortest-path
+
–
3
votes
2
answers
40
UGC NET CSE | Junet 2015 | Part 3 | Question: 30
The minimum payload of a TCP segment is 65,535 65,515 65,495 65,475
The minimum payload of a TCP segment is65,53565,51565,49565,475
go_editor
4.1k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
tcp
+
–
3
votes
1
answer
41
UGC NET CSE | Junet 2015 | Part 3 | Question: 29
Suppose a digitazed voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample required 8 bits? 32 kbps 64 kbps 128 kbps 256 kbps
Suppose a digitazed voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two sampl...
go_editor
3.8k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
data-communication
+
–
3
votes
1
answer
42
UGC NET CSE | Junet 2015 | Part 3 | Question: 28
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is CTTOEWMROPNRUEK MROUEKCTTPNROEW OEWPNRCTTUEKMRO UEKPNRMROOEQCTT
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message isCTTOEWMROPNRUEKMROUEKCTTPNROEWOEWPNR...
go_editor
5.4k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
network-security
+
–
2
votes
2
answers
43
UGC NET CSE | Junet 2015 | Part 3 | Question: 27
Which are two modes of IP security? Transport and certificate Transport and tunnel Certificate and tunnel Preshared and transport
Which are two modes of IP security?Transport and certificateTransport and tunnelCertificate and tunnelPreshared and transport
go_editor
2.4k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
network-security
+
–
2
votes
1
answer
44
UGC NET CSE | Junet 2015 | Part 3 | Question: 26
Which one of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? FIN RST SYN PSH
Which one of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?FINRSTSYNPSH
go_editor
4.4k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
tcp
+
–
2
votes
1
answer
45
UGC NET CSE | Junet 2015 | Part 3 | Question: 25
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? Broadcasting Unicasting Packet switching Circuit switching
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender?BroadcastingUnicastingP...
go_editor
1.8k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
data-communication
tele-communication
+
–
2
votes
2
answers
46
UGC NET CSE | Junet 2015 | Part 3 | Question: 24
Which one of the following is true? The resolvent of two Horn clauses is not a Horn clause The resolvent of two Horn clauses is a Horn clause If we resolve a negated goal G against a fact or rule A to get clause C then C has positive ... If we resolve a negated goal G against a fact or rule A to get clause C then C has positive literal or null goal
Which one of the following is true?The resolvent of two Horn clauses is not a Horn clauseThe resolvent of two Horn clauses is a Horn clauseIf we resolve a negated goal G ...
go_editor
3.3k
views
go_editor
asked
Jul 31, 2016
Discrete Mathematics
ugcnetcse-june2015-paper3
discrete-mathematics
mathematical-logic
+
–
3
votes
1
answer
47
UGC NET CSE | Junet 2015 | Part 3 | Question: 23
Which of the following is false for the programming language PROLOG? A PROLOG variable can only be assigned to a value once PROLOG is a strongly typed language The scope of a variable in PROLOG is a single clause or rule The scope of a variable in PROLOG is a single query
Which of the following is false for the programming language PROLOG?A PROLOG variable can only be assigned to a value oncePROLOG is a strongly typed languageThe scope of ...
go_editor
2.5k
views
go_editor
asked
Jul 31, 2016
Artificial Intelligence
ugcnetcse-june2015-paper3
artificial-intelligence
+
–
7
votes
2
answers
48
UGC NET CSE | Junet 2015 | Part 3 | Question: 22
The casual form of the disjunctive normal form $\neg A \vee \neg B \vee \neg C \vee D$ is: $A \wedge B \wedge C \Rightarrow D$ $A \vee B \vee C \vee D \Rightarrow true$ $A \wedge B \wedge C \wedge D \Rightarrow true$ $A \wedge B \wedge C \wedge D \Rightarrow false$
The casual form of the disjunctive normal form $\neg A \vee \neg B \vee \neg C \vee D$ is:$A \wedge B \wedge C \Rightarrow D$$A \vee B \vee C \vee D \Rightarrow true$$A \...
go_editor
4.1k
views
go_editor
asked
Jul 31, 2016
Mathematical Logic
ugcnetcse-june2015-paper3
mathematical-logic
+
–
3
votes
2
answers
49
UGC NET CSE | Junet 2015 | Part 3 | Question: 21
The transition function for the language $L=\{w \mid n_a (w) \text{ and } n_b(w) \text{ are both odd} \}$ is given by: $\delta (q_0, a)=q_1$ ; $\delta (q_0, b)=q_2$ $\delta (q_1, a)=q_0$ ... states of the automata are $q_0$ and $q_0$ respectively $q_0$ and $q_1$ respectively $q_0$ and $q_2$ respectively $q_0$ and $q_3$ respectively
The transition function for the language $L=\{w \mid n_a (w) \text{ and } n_b(w) \text{ are both odd} \}$ is given by:$\delta (q_0, a)=q_1$;$\delta (q_0, b)=q_2$$\delta (...
go_editor
2.6k
views
go_editor
asked
Jul 31, 2016
Theory of Computation
ugcnetcse-june2015-paper3
theory-of-computation
finite-automata
+
–
3
votes
2
answers
50
UGC NET CSE | Junet 2015 | Part 3 | Question: 20
The regular expression corresponding to the language L where $L=\{ x \in \{0,1\}^* \mid x \text{ ends with 1 and does not contain substring 00} $ is (1+01)* (10+01) (1+01)* 01 (1+01)* (1+01) (10+01)* 01
The regular expression corresponding to the language L where $L=\{ x \in \{0,1\}^* \mid x \text{ ends with 1 and does not contain substring 00} $ is(1+01)* (10+01)(1+01)*...
go_editor
6.5k
views
go_editor
asked
Jul 31, 2016
Theory of Computation
ugcnetcse-june2015-paper3
theory-of-computation
regular-expression
+
–
3
votes
4
answers
51
UGC NET CSE | Junet 2015 | Part 3 | Question: 19
Minimal deterministic finite automaton for the language $L=\{0^n \mid n \geq 0, n \neq 4 \}$ will have: 1 final state among 5 states 4 final states among 5 states 1 final state among 6 states 5 final state among 6 states
Minimal deterministic finite automaton for the language $L=\{0^n \mid n \geq 0, n \neq 4 \}$ will have:1 final state among 5 states4 final states among 5 states1 final st...
go_editor
6.0k
views
go_editor
asked
Jul 31, 2016
Theory of Computation
ugcnetcse-june2015-paper3
theory-of-computation
finite-automata
+
–
2
votes
1
answer
52
UGC NET CSE | Junet 2015 | Part 3 | Question: 18
Match the following : ... $\text{(a)-(iv), (b)-(v), (c)-(i), (d)-(ii), (e)-(iii)}$
Match the following :$\begin{array}{clcl} & \textbf{List-I} & & \textbf{List-II}\\ \text{(a)} & \text{Flood Gun} & \text{(i)} & \text{An electron gun designed to flood ...
go_editor
1.7k
views
go_editor
asked
Jul 31, 2016
Computer Graphics
ugcnetcse-june2015-paper3
computer-graphics
+
–
2
votes
1
answer
53
UGC NET CSE | Junet 2015 | Part 3 | Question: 17
Which of the following statements is/are incorrect? Mapping the co-ordinates of the points and lines that form the picture into the appropriate co-ordinates on the device or workstation is known as viewing transformation The right-handed cartesian co-ordinates system in ... system $\text{i only}$ $\text{i and ii}$ $\text{iii only}$ $\text{iv only}$
Which of the following statements is/are incorrect?Mapping the co-ordinates of the points and lines that form the picture into the appropriate co-ordinates on the device ...
go_editor
2.0k
views
go_editor
asked
Jul 31, 2016
Computer Graphics
ugcnetcse-june2015-paper3
computer-graphics
+
–
2
votes
1
answer
54
UGC NET CSE | Junet 2015 | Part 3 | Question: 16
Which of the following is not a basic primitive of the Graphics Kernel System (GKS)? POLYLINE POLYDRAW FILL AREA POLYMARKER
Which of the following is not a basic primitive of the Graphics Kernel System (GKS)?POLYLINEPOLYDRAWFILL AREAPOLYMARKER
go_editor
2.5k
views
go_editor
asked
Jul 31, 2016
Computer Graphics
ugcnetcse-june2015-paper3
computer-graphics
+
–
2
votes
2
answers
55
UGC NET CSE | Junet 2015 | Part 3 | Question: 15
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called: Strobing Amplification Conditioning Quantization
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called:StrobingAmplificationConditioningQuantization
go_editor
1.5k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
analog-&-digital-transmission
computer-networks
+
–
3
votes
1
answer
56
UGC NET CSE | Junet 2015 | Part 3 | Question: 14
Consider a triangle A(0,0), B(1, 1) and C(5, 2). The triangle has to be rotated by an angle of 45$^o$ ...
Consider a triangle A(0,0), B(1, 1) and C(5, 2). The triangle has to be rotated by an angle of 45$^o$ about the point P(-1, -1). What shall be the coordinates of new tria...
go_editor
15.1k
views
go_editor
asked
Jul 31, 2016
Computer Graphics
ugcnetcse-june2015-paper3
computer-graphics
image-rotation
+
–
2
votes
1
answer
57
UGC NET CSE | Junet 2015 | Part 3 | Question: 13
Give the number of principal vanishing point(s) along with their direction for the standard prospective transformation: Only one in the direction K Two in the directions i and j Three in the directions I, J and K Only two in the directions J and K
Give the number of principal vanishing point(s) along with their direction for the standard prospective transformation:Only one in the direction KTwo in the directions i ...
go_editor
3.8k
views
go_editor
asked
Jul 31, 2016
Computer Graphics
ugcnetcse-june2015-paper3
computer-graphics
transformation
+
–
6
votes
1
answer
58
UGC NET CSE | Junet 2015 | Part 3 | Question: 12
In the indexed scheme of blocks to a file, the maximum possible size of the file depends on: The number of blocks used for index and the size of index Size of Blocks and size of Address Size of index Size of block
In the indexed scheme of blocks to a file, the maximum possible size of the file depends on:The number of blocks used for index and the size of indexSize of Blocks and si...
go_editor
1.4k
views
go_editor
asked
Jul 31, 2016
Operating System
ugcnetcse-june2015-paper3
operating-system
file-system
+
–
5
votes
1
answer
59
UGC NET CSE | Junet 2015 | Part 3 | Question: 11
The relation schemas $R_1$ and $R_2$ form a Lossless join decomposition of $R$ if and only if $R_1 \cap R_2 \twoheadrightarrow (R_1-R_2)$ $R_1 \rightarrow R_2$ $R_1 \cap R_2 \twoheadrightarrow (R_2-R_1)$ $R_2 \rightarrow R_1 \cap R_2$ $\text{i and ii}$ happen $\text{i and iv}$ happen $\text{i and iii}$ happen $\text{ii and iii}$ happen
The relation schemas $R_1$ and $R_2$ form a Lossless join decomposition of $R$ if and only if$R_1 \cap R_2 \twoheadrightarrow (R_1-R_2)$$R_1 \rightarrow R_2$$R_1 \cap R_2...
go_editor
4.2k
views
go_editor
asked
Jul 31, 2016
Databases
ugcnetcse-june2015-paper3
databases
decomposition
database-normalization
+
–
4
votes
2
answers
60
UGC NET CSE | Junet 2015 | Part 3 | Question: 10
The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because Non_key attribute V_name is dependent on V_no which is part of composite key Non_key attribute V_name is dependent on Qty_sup Key attribute Qty_sup is dependent on primary key unit_price Key attribute V_ord_no is dependent on primary key unit_price
The RelationVendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF becauseNon_key attribute V_name is dependent on V_no which is part of composite keyNon_ke...
go_editor
3.4k
views
go_editor
asked
Jul 31, 2016
Databases
ugcnetcse-june2015-paper3
databases
database-normalization
+
–
Page:
« prev
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register