Recent questions tagged ugcnetcse-june2019-paper2

2 votes
2 answers
61
Match List-I with List-II:$$\begin{array}{|c|c|c|c|} \hline {} & \text{List-I} & {} & \text{List-II} \\ \hline (a) & \text{Prim’s algorithm} & (i) & O(V^3 \log V) \\ \h...
2 votes
1 answer
63
7 votes
3 answers
64
Which of the following is best running time to sort $n$ integers in the range $0$ to $n^2-1$?$O(\text{lg } n)$$O(n)$$O(n\text { lg }n)$$O(n^2)$
1 votes
1 answer
65
1 votes
1 answer
71
Which data structure is used by the compiler for managing variables and their attributes?Binary treeLink listSymbol tableParse table
1 votes
1 answer
72
1 votes
1 answer
73
1 votes
2 answers
74
Shift-reduce parser consists ofinput bufferstackparse tableChoose the correct option from those given below:a and b onlya and c onlyc onlya, b and c
4 votes
2 answers
75
3 votes
4 answers
82
What is the name of the protocol that allows a client to send a broadcast message with its MAC address and receive an IP address in reply?ARPDNSRARPICMP
5 votes
4 answers
84
You need $500$ subnets, each with about $100$ usable host address per subnet. What network mask will you assign using a class B network address?$255.255.255.252$$255.255....
2 votes
1 answer
86
2 votes
4 answers
88
What percentage $(\%)$ of the IPv4, IP address space do all class C addresses consume?$12.5 \%$$25 \%$$37.5 \%$$50 \%$
2 votes
2 answers
89
The ability to inject packets into the Internet with a false source address is known asMan-in-the-middle attackIP phishingIP sniffingIP spoofing
2 votes
1 answer
90