Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2016-paper2
2.7k
views
1
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 50
Given the following two statements:Strategic value of data mining is timestampingInformation collection is an expensive process in building an expert systemWhich of the following ... are trueI is true, II is falseI is false, II is true
go_editor
2.7k
views
go_editor
asked
Aug 16, 2016
Others
ugcnetcse-june2016-paper2
data-mining
+
–
2.4k
views
1
answers
1
votes
UGC NET CSE | June 2016 | Part 2 | Question: 49
Consider the following two statements:Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouseData scrubling is a process of ... is false II is trueBoth I and II are falseBoth I and II are true
go_editor
2.4k
views
go_editor
asked
Aug 16, 2016
Others
ugcnetcse-june2016-paper2
data-warehousing
+
–
4.2k
views
3
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 48
Pipelining improves performance bydecreasing instruction latencyeliminating data hazardsexploiting instruction level parallelismdecreasing the cache miss rate
go_editor
4.2k
views
go_editor
asked
Aug 16, 2016
CO and Architecture
ugcnetcse-june2016-paper2
co-and-architecture
pipelining
+
–
2.1k
views
2
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 47
Consider the following two statements:Business intelligence and Data warehousing is used for forecasting and Data miningBusiness intelligence and Data warehousing is used for ... are trueI is false II is falseBoth I and II are false
go_editor
2.1k
views
go_editor
asked
Aug 16, 2016
Others
ugcnetcse-june2016-paper2
data-warehousing
+
–
2.5k
views
1
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 45
The extent to which a software tolerates the unexpected problems, is termed asAccuracyReliabilityCorrectnessRobustness
go_editor
2.5k
views
go_editor
asked
Aug 16, 2016
IS&Software Engineering
ugcnetcse-june2016-paper2
software-quality-characteristics
+
–
2.5k
views
1
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 44
The cyclomatic complexity of a flow graph V(G), in terms of predicate notes isP+1P-1P-2P+2Where P is the number of predicate nodes in flow graph V(G)
go_editor
2.5k
views
go_editor
asked
Aug 16, 2016
IS&Software Engineering
ugcnetcse-june2016-paper2
cyclomatic-complexity
+
–
5.0k
views
2
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 43
Which of the following is not included in the waterfall model?Requirement analysisRisk analysisDesignCoding
go_editor
5.0k
views
go_editor
asked
Aug 16, 2016
IS&Software Engineering
ugcnetcse-june2016-paper2
waterfall-model
+
–
10.7k
views
2
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 42
The ____ model is preferred for software development when the requirements are not clear.Rapid Application DevelopmentRational Unified ProcessEvolutionary ModelWaterfall Model
go_editor
10.7k
views
go_editor
asked
Aug 16, 2016
IS&Software Engineering
ugcnetcse-june2016-paper2
is&software-engineering
software-development-life-cycle-models
+
–
2.9k
views
1
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 41
If $S_1$ is total number of modules defined in the program architecture, $S_3$ is the number of modules whose correct function depends on prior processing then the number of modules ... $1-\frac{S_1}{S_3}$
go_editor
2.9k
views
go_editor
asked
Aug 16, 2016
IS&Software Engineering
ugcnetcse-june2016-paper2
is&software-engineering
+
–
2.2k
views
2
answers
6
votes
UGC NET CSE | June 2016 | Part 2 | Question: 40
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest ... the schduler implements ___ criteriaPriority schedulingRond Robin SchedulingShortest Job FirstFCFS
go_editor
2.2k
views
go_editor
asked
Aug 16, 2016
Operating System
ugcnetcse-june2016-paper2
operating-system
process-scheduling
+
–
3.0k
views
1
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 39
In UNIX, ____ creates three subdirectories; 'PIS' and two subdirectories 'progs' and 'data' from just created subdirectory 'PIS'mkdir PIS/progs PIS/data PISmkdir PIS progs datamkdir PIS PIS/progs PIS/datamkdir PIS/progs data
go_editor
3.0k
views
go_editor
asked
Aug 16, 2016
Others
ugcnetcse-june2016-paper2
unix
+
–
20.5k
views
2
answers
5
votes
UGC NET CSE | June 2016 | Part 2 | Question: 38
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67320322321319
go_editor
20.5k
views
go_editor
asked
Aug 16, 2016
Operating System
ugcnetcse-june2016-paper2
operating-system
disk-scheduling
+
–
4.3k
views
2
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 37
Suppose there are $4$ processes in execution with $12$ instances of a Resource $R$ in a system.The maximum need of each process and current allocation ... what is the safe sequence?NoYes, $P_1P_2P_3P_4$Yes, $P_4P_3P_1P_2$Yes, $P_2P_1P_3P_4$
go_editor
4.3k
views
go_editor
asked
Aug 16, 2016
Operating System
ugcnetcse-june2016-paper2
operating-system
+
–
8.5k
views
1
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 36
Consider the reference string:0 1 2 3 0 1 4 0 1 2 3 4If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are ____ and ___ respectively.10, 99, 910, 109, 10
go_editor
8.5k
views
go_editor
asked
Aug 16, 2016
Operating System
ugcnetcse-june2016-paper2
operating-system
page-replacement
page-fault
+
–
2.0k
views
2
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 35
Which of the following is false?The grammar $S \rightarrow a \: Sb \mid bSa \mid SS \mid \in$, where $S$ is the only non-terminal symbol and $\in$ is ... than LALRAn LL(1) parser is a top-down parserYACC tool is an LALR(1) parser generator
go_editor
2.0k
views
go_editor
asked
Aug 16, 2016
Compiler Design
ugcnetcse-june2016-paper2
compiler-design
parsing
+
–
3.1k
views
1
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 34
Which of the following is not typically a benefit of dynamic linking?Reduction in overall program execution timeReduction in overall space consumption in memoryReduction in ... in the cost of software updatesI and IVI onlyII and IIIIV only
go_editor
3.1k
views
go_editor
asked
Aug 16, 2016
Operating System
ugcnetcse-june2016-paper2
operating-system
dynamic-linking
+
–
9.6k
views
2
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 33
In ____, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.Loop unrollingStrength reductionsLoop concatenationLoop jamming
go_editor
9.6k
views
go_editor
asked
Aug 16, 2016
Compiler Design
ugcnetcse-june2016-paper2
compiler-design
compiler-optimization
+
–
8.4k
views
2
answers
5
votes
UGC NET CSE | June 2016 | Part 2 | Question: 32
The content of the accumulator after the execution of the following 8085 assembly language program, is: MVI A, 42H MVI B, 05hUGC:ADD B DCR B JNZ UGC ADI 25H HLT82 H78 H76 H47 H
go_editor
8.4k
views
go_editor
asked
Aug 16, 2016
Others
ugcnetcse-june2016-paper2
system-software&-compilers
+
–
5.9k
views
2
answers
5
votes
UGC NET CSE | June 2016 | Part 2 | Question: 31
The number of strings of length 4 that are generated by the regular expression $(0 \mid \epsilon ) 1^+ 2^{*}(3 \mid \epsilon)$, where $\mid$ is an ... $\epsilon$ is the null string, is:08101112
go_editor
5.9k
views
go_editor
asked
Aug 16, 2016
Theory of Computation
ugcnetcse-june2016-paper2
theory-of-computation
regular-expression
+
–
4.0k
views
3
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 30
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical angleequal toless thangreater thanless than or equal to
go_editor
4.0k
views
go_editor
asked
Aug 16, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
transmission-media
+
–
4.1k
views
2
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 29
If there are $N$ people in the world and are using secret key encryption and decryption for privacy purpose, then the number of secret keys required will be$N$(N-1)$\frac{N(N-1)}{2}$\frac{N(N+1)}{2}$
go_editor
4.1k
views
go_editor
asked
Aug 16, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
network-security
+
–
5.2k
views
2
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 28
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destinationPhysicalTransportApplicationHost-to-network
go_editor
5.2k
views
go_editor
asked
Aug 16, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
tcp-ip-model
+
–
19.7k
views
4
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 27
In a fully connected mesh network with 10 computers, total ___ number of cables are required and ____ number od ports are required for each device40, 945, 1045, 950, 10
go_editor
19.7k
views
go_editor
asked
Aug 16, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
mesh-topology
+
–
12.9k
views
3
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 26
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?100 Kbps200 Kbps400 Kbps1000 Kbps
go_editor
12.9k
views
go_editor
asked
Aug 16, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
+
–
7.0k
views
3
answers
5
votes
UGC NET CSE | June 2016 | Part 2 | Question: 25
In how many ways can the string $A \cap B - A \cap B -A$ be fully paranthesized to yield an infix expression?15141312
go_editor
7.0k
views
go_editor
asked
Aug 16, 2016
Combinatory
ugcnetcse-june2016-paper2
parenthesization
combinatory
+
–
3.8k
views
2
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 24
Which of the following is not an inherent application of stack?Implementation of recursionEvaluation of a postfix expressionJob schedulingReverse a string
go_editor
3.8k
views
go_editor
asked
Aug 16, 2016
DS
ugcnetcse-june2016-paper2
data-structures
stack
+
–
14.8k
views
3
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 23
Suppose you are given a binary tree with n nodes, such that each node has exactly eiter zero or two children. The maximum height of the tree will be$\frac{n}{2}-1$\frac{n}{2}+1$(n-1)/2$(n+1)/2$
go_editor
14.8k
views
go_editor
asked
Aug 16, 2016
DS
ugcnetcse-june2016-paper2
data-structures
tree
+
–
5.2k
views
1
answers
4
votes
UGC NET CSE | June 2016 | Part 2 | Question: 22
Consider the following operations performed on a stack of size 5:Push (a); Pop(); Push(b); Push(c); Pop();Push(d); ... following statements is correct?Underflow occursStack operations are performed smoothlyOverflow occursNone of the above
go_editor
5.2k
views
go_editor
asked
Aug 16, 2016
DS
ugcnetcse-june2016-paper2
data-structures
stack
easy
+
–
6.8k
views
2
answers
7
votes
UGC NET CSE | June 2016 | Part 2 | Question: 20
Consider the following database table having $\text{A, B, C}$ and $\text{D}$ as its four attributes and four possible candidate keys $\text{(I, II, III and IV)}$ for ... only$\text{III}$ and $\text{IV}$ only$\text{II}$ only$\text{I}$ only
go_editor
6.8k
views
go_editor
asked
Aug 16, 2016
Databases
ugcnetcse-june2016-paper2
databases
candidate-key
+
–
2.9k
views
1
answers
3
votes
UGC NET CSE | June 2016 | Part 2 | Question: 19
Consider the following two comments C1 and C2 on the relation R from an SQL database: C1 : drop table R;C2 : delete from RBoth C1 and C2 delete the schema RC2 ... also the schema for RI onlyI and II onlyII and III onlyI, II and III only
go_editor
2.9k
views
go_editor
asked
Aug 14, 2016
Databases
ugcnetcse-june2016-paper2
databases
sql
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register