Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-dec2011-paper2
0
votes
1
answer
1
UGC NET CSE | June 2011 | Part 2 | Question: 1
Any integer composed of $3^{n}$ identical digits divisible by $2^{n}$ $3^{n}$ $5^{n}$ $7^{n}$
Any integer composed of $3^{n}$ identical digits divisible by$2^{n}$$3^{n}$$5^{n}$$7^{n}$
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Aug 21, 2016
Quantitative Aptitude
ugcnetcse-dec2011-paper2
quantitative-aptitude
number-system
+
–
1
votes
2
answers
2
UGC NET CSE | December 2011 | Part 2 | Question: 50
The number of nodes in a complete binary tree of height $h$ (with roots at level $0$) is equal to $2^{0} + 2^{1} + ….. 2^{h}$ $2^{0} + 2^{1} + ….. 2^{h-1}$ $2^{0} + 2^{1} + ….. 2^{h+1}$ $2^{1} + ….. 2^{h+1}$
The number of nodes in a complete binary tree of height $h$ (with roots at level $0$) is equal to$2^{0} + 2^{1} + ….. 2^{h}$$2^{0} + 2^{1} + ….. 2^{h-1}$ $2^{0} + 2^{...
makhdoom ghaya
2.8k
views
makhdoom ghaya
asked
Aug 21, 2016
Algorithms
ugcnetcse-dec2011-paper2
algorithms
binary-tree
+
–
1
votes
4
answers
3
UGC NET CSE | December 2011 | Part 2 | Question: 49
What is the probability of choosing correctly an unknown integer between $0$ and $9$ with $3$ chances ? $\frac{963}{1000}$ $\frac{973}{1000}$ $\frac{983}{1000}$ $\frac{953}{1000}$
What is the probability of choosing correctly an unknown integer between $0$ and $9$ with $3$ chances ?$\frac{963}{1000}$$\frac{973}{1000}$$\frac{983}{1000}$$\frac{953}{1...
makhdoom ghaya
3.4k
views
makhdoom ghaya
asked
Aug 21, 2016
Probability
ugcnetcse-dec2011-paper2
probability
+
–
1
votes
2
answers
4
UGC NET CSE | December 2011 | Part 2 | Question: 48
A telephone conference call is an example of which type of communications ? Same time / same place Same time / different place Different time / different place Different time / same place
A telephone conference call is an example of which type of communications ?Same time / same placeSame time / different placeDifferent time / different placeDifferent time...
makhdoom ghaya
1.4k
views
makhdoom ghaya
asked
Aug 21, 2016
Computer Networks
ugcnetcse-dec2011-paper2
computer-networks
data-communication
+
–
1
votes
2
answers
5
UGC NET CSE | December 2011 | Part 2 | Question: 47
Web Mining is not used in which of the following areas ? Information filtering Crime fighting on the internet Online transaction processing Click stream analysis.
Web Mining is not used in which of the following areas ?Information filteringCrime fighting on the internetOnline transaction processingClick stream analysis.
makhdoom ghaya
2.9k
views
makhdoom ghaya
asked
Aug 21, 2016
Others
ugcnetcse-dec2011-paper2
data-mining
+
–
0
votes
1
answer
6
UGC NET CSE | December 2011 | Part 2 | Question: 46
To compare, overlay or cross analyze to maps in $GIS$. Both maps must be in digital form Both maps must be at the same equivalent scale. Both maps must be on the same coordinate system All of the above
To compare, overlay or cross analyze to maps in $GIS$.Both maps must be in digital formBoth maps must be at the same equivalent scale.Both maps must be on the same coordi...
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Aug 21, 2016
Others
ugcnetcse-dec2011-paper2
geographical-information-system
+
–
1
votes
1
answer
7
UGC NET CSE | December 2011 | Part 2 | Question: 45
Which of the following is false concerning Enterprise Resource Planning (ERP) ? It attempts to automate and integrate the majority of business processes. It shares common data and practices across the enterprise. It is inexpensive to implement. It provides and access information in a real-time environment.
Which of the following is false concerning Enterprise Resource Planning (ERP) ?It attempts to automate and integrate the majority of business processes.It shares common d...
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Aug 21, 2016
Others
ugcnetcse-dec2011-paper2
mis
enterprise-resource-planning
(erp)
+
–
1
votes
1
answer
8
UGC NET CSE | December 2011 | Part 2 | Question: 44
Enterprise Resource Planning (ERP) Has existed for over a decade. Does not integrate well with the functional areas other than operations. Is inexpensive to implement. Automate and integrates the majority of business processes.
Enterprise Resource Planning (ERP)Has existed for over a decade.Does not integrate well with the functional areas other than operations.Is inexpensive to implement.Automa...
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Aug 21, 2016
Others
ugcnetcse-dec2011-paper2
mis
enterprise-resource-planning
(erp)
+
–
0
votes
1
answer
9
UGC NET CSE | December 2011 | Part 2 | Question: 43
The proposition $\sim$ qvp is equivalent to p $\rightarrow$ q q $\rightarrow$ p p $\leftrightarrow$ q p $\vee$ q
The proposition $\sim$ qvp is equivalent top $\rightarrow$ q q $\rightarrow$ p p $\leftrightarrow$ q p $\vee$ q
makhdoom ghaya
850
views
makhdoom ghaya
asked
Aug 21, 2016
Discrete Mathematics
ugcnetcse-dec2011-paper2
discrete-mathematics
propositional-logic
+
–
0
votes
1
answer
10
UGC NET CSE | December 2011 | Part 2 | Question: 41
Software risk estimation involves following two tasks : Risk magnitude and risk impact Risk probability and risk impact Risk maintenance and risk impact Risk development and risk impact
Software risk estimation involves following two tasks :Risk magnitude and risk impactRisk probability and risk impactRisk maintenance and risk impactRisk development and ...
makhdoom ghaya
4.2k
views
makhdoom ghaya
asked
Aug 20, 2016
IS&Software Engineering
ugcnetcse-dec2011-paper2
is&software-engineering
software-design
+
–
2
votes
1
answer
11
UGC NET CSE | December 2011 | Part 2 | Question: 38
Which one of the following statement is false ? Context-free languages are closed under union. Context-free languages are closed under concatenation. Context-free languages are closed under intersection. Context-free languages are closed under Kleene closure.
Which one of the following statement is false ?Context-free languages are closed under union.Context-free languages are closed under concatenation.Context-free languages ...
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Aug 20, 2016
Theory of Computation
ugcnetcse-dec2011-paper2
theory-of-computation
context-free-language
+
–
0
votes
1
answer
12
UGC NET CSE | December 2011 | Part 2 | Question: 37
Handoff is the mechanism that Transfer an ongoing call from one base station to another Initiating a new call Dropping an ongoing call None of above
Handoff is the mechanism thatTransfer an ongoing call from one base station to anotherInitiating a new callDropping an ongoing callNone of above
makhdoom ghaya
950
views
makhdoom ghaya
asked
Aug 20, 2016
Computer Networks
ugcnetcse-dec2011-paper2
computer-networks
data-communication
+
–
0
votes
1
answer
13
UGC NET CSE | December 2011 | Part 2 | Question: 36
$X - = Y + 1$ means $X = X – Y + 1$ $X = -X - Y - 1$ $X = -X + Y + 1$ $X= X - Y - 1$
$X - = Y + 1$ means$X = X – Y + 1$$X = -X - Y - 1$$X = -X + Y + 1$$X= X - Y - 1$
makhdoom ghaya
678
views
makhdoom ghaya
asked
Aug 20, 2016
Programming and DS
ugcnetcse-dec2011-paper2
programming-in-c
operator-precedence
+
–
0
votes
1
answer
14
UGC NET CSE | December 2011 | Part 2 | Question: 35
The cellular frequency reuse factor for the cluster size $N$ is $N$ $N^{2}$ $\frac{1}{N}$ $\frac{1}{N^{2}}$
The cellular frequency reuse factor for the cluster size $N$ is$N$$N^{2}$ $\frac{1}{N}$$\frac{1}{N^{2}}$
makhdoom ghaya
947
views
makhdoom ghaya
asked
Aug 20, 2016
Computer Networks
ugcnetcse-dec2011-paper2
computer-networks
data-communication
+
–
2
votes
1
answer
15
UGC NET CSE | December 2011 | Part 2 | Question: 34
Negative numbers cannot be represented in Signed magnitude form $1’s$ complement form $2’s$ complement form None of the above
Negative numbers cannot be represented inSigned magnitude form$1’s$ complement form$2’s$ complement formNone of the above
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Aug 19, 2016
Discrete Mathematics
ugcnetcse-dec2011-paper2
discrete-mathematics
number-representation
+
–
2
votes
2
answers
16
UGC NET CSE | December 2011 | Part 2 | Question: 33
If an integer needs two bytes of storage, then the maximum value of unsigned integer is $2^{16} – 1$ $2^{15} – 1$ $2^{16}$ $2^{15}$
If an integer needs two bytes of storage, then the maximum value of unsigned integer is$2^{16} – 1$$2^{15} – 1$$2^{16}$ $2^{15}$
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Aug 19, 2016
Programming and DS
ugcnetcse-dec2011-paper2
programming-in-c
data-types
+
–
1
votes
1
answer
17
UGC NET CSE | December 2011 | Part 2 | Question: 32
A chip having $150$ gates will be classified as SSI MSI LSI VLSI
A chip having $150$ gates will be classified asSSIMSILSIVLSI
makhdoom ghaya
754
views
makhdoom ghaya
asked
Aug 19, 2016
CO and Architecture
ugcnetcse-dec2011-paper2
co-and-architecture
integrated-circuits
+
–
2
votes
2
answers
18
UGC NET CSE | December 2011 | Part 2 | Question: 31
CPU does not perform the operation Data transfer Logic operation Arithmetic operation All of the above
CPU does not perform the operationData transferLogic operationArithmetic operationAll of the above
makhdoom ghaya
3.4k
views
makhdoom ghaya
asked
Aug 19, 2016
CO and Architecture
ugcnetcse-dec2011-paper2
co-and-architecture
cpu
+
–
2
votes
2
answers
19
UGC NET CSE | December 2011 | Part 2 | Question: 30
Consider a logical address space of $8$ pages of $1024$ words mapped with memory of $32$ frames. How many bits are there in the physical address ? $9$ bits $11$ bits $13$ bits $15$ bits
Consider a logical address space of $8$ pages of $1024$ words mapped with memory of $32$ frames. How many bits are there in the physical address ?$9$ bits$11$ bits$13$ bi...
makhdoom ghaya
1.4k
views
makhdoom ghaya
asked
Aug 19, 2016
Operating System
ugcnetcse-dec2011-paper2
operating-system
memory-management
+
–
3
votes
0
answers
20
UGC NET CSE | December 2011 | Part 2 | Question: 29
The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads) A plate of data A cylinder of data A track of data A block of data
The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads...
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Aug 19, 2016
Operating System
ugcnetcse-dec2011-paper2
operating-system
system
hard-disk-drive
+
–
3
votes
1
answer
21
UGC NET CSE | December 2011 | Part 2 | Question: 28
On receiving an interrupt from an $I/O$ device, the $CPU$ Halts for predetermined time. Branches off to the interrupt service routine after completion of the current instruction. Branches off to the interrupt service routine immediately. Hands over control of address bus and data bus to the interrupting device.
On receiving an interrupt from an $I/O$ device, the $CPU$Halts for predetermined time.Branches off to the interrupt service routine after completion of the current instru...
makhdoom ghaya
665
views
makhdoom ghaya
asked
Aug 19, 2016
Operating System
ugcnetcse-dec2011-paper2
operating-system
interrupts
+
–
3
votes
1
answer
22
UGC NET CSE | December 2011 | Part 2 | Question: 27
The multiuser operating system, $20$ requests are made to use a particular resource per hour, on an average the probability that no request are made in $45$ minutes is $e^{-15}$ $e^{-5}$ $1 – e^{-5}$ $1 – e^{-10}$
The multiuser operating system, $20$ requests are made to use a particular resource per hour, on an average the probability that no request are made in $45$ minutes is$e^...
makhdoom ghaya
3.7k
views
makhdoom ghaya
asked
Aug 17, 2016
Probability
ugcnetcse-dec2011-paper2
probability
poisson-distribution
+
–
3
votes
3
answers
23
UGC NET CSE | December 2011 | Part 2 | Question: 26
Dijikstra banking algorithm in an operating system, solves the problem of Deadlock avoidance Deadlock recovery Mutual exclusion Context switching
Dijikstra banking algorithm in an operating system, solves the problem ofDeadlock avoidanceDeadlock recoveryMutual exclusionContext switching
makhdoom ghaya
838
views
makhdoom ghaya
asked
Aug 17, 2016
Operating System
ugcnetcse-dec2011-paper2
operating-system
deadlock-prevention-avoidance-detection
+
–
3
votes
2
answers
24
UGC NET CSE | December 2011 | Part 2 | Question: 25
The $SQL$ Expression Select distinct $T$. branch name from branch $T$, branch $S$ where $T$. assets $> S$. assets and $S$. branch-city = DELHI, finds the name of All branches that have greater asset than any branch ... in DELHI. The branch that has the greatest asset in DELHI. Any branch that has greater asset than any branch located in DELHI.
The $SQL$ Expression Select distinct $T$. branch name from branch $T$, branch $S$ where $T$. assets $ S$. assets and $S$. branch-city = DELHI, finds the name ofAll branch...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Aug 17, 2016
Databases
ugcnetcse-dec2011-paper2
databases
sql
+
–
2
votes
1
answer
25
UGC NET CSE | December 2011 | Part 2 | Question: 24
Which of the following statements is true, when structure of database file with 20 records is modified ? ? EOF ( ) Prints. T ? BOF ( ) Prints F ? BOF ( ) Prints T ? EOF ( ) Prints F
Which of the following statements is true, when structure of database file with 20 records is modified ?? EOF ( ) Prints. T? BOF ( ) Prints F? BOF ( ) Prints T? EOF ( ) P...
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Aug 17, 2016
Databases
ugcnetcse-dec2011-paper2
databases
sql
+
–
2
votes
3
answers
26
UGC NET CSE | December 2011 | Part 2 | Question: 23
Data security threats include Privacy invasion Hardware failure Fraudulent manipulation of data Encryption and decryption
Data security threats includePrivacy invasionHardware failureFraudulent manipulation of dataEncryption and decryption
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Aug 17, 2016
Databases
ugcnetcse-dec2011-paper2
databases
+
–
1
votes
0
answers
27
UGC NET CSE | December 2011 | Part 2 | Question: 22
Which command classes text file, which has been created using "SET ALTERNATIVE" "Command" ? SET ALTERNATE OFF CLOSE DATABASE CLOSE ALTERNATE CLEAR ALL
Which command classes text file, which has been created using "SET ALTERNATIVE" "Command" ?SET ALTERNATE OFFCLOSE DATABASECLOSE ALTERNATECLEAR ALL
makhdoom ghaya
1.3k
views
makhdoom ghaya
asked
Aug 17, 2016
Databases
ugcnetcse-dec2011-paper2
databases
sql
+
–
3
votes
2
answers
28
UGC NET CSE | December 2011 | Part 2 | Question: 21
What deletes the entire file except the file structure ? ERASE DELETE ZAP PACK
What deletes the entire file except the file structure ?ERASEDELETEZAPPACK
makhdoom ghaya
3.7k
views
makhdoom ghaya
asked
Aug 17, 2016
Databases
ugcnetcse-dec2011-paper2
databases
sql
+
–
1
votes
0
answers
29
UGC NET CSE | December 2011 | Part 2 | Question: 20
$B+$ tree are preferred to binary tree in database because Disk capacities are greater than memory capacities Disk access much slower than memory access Disk data transfer rates are much less than memory data transfer rate Disk are more reliable than memory
$B+$ tree are preferred to binary tree in database becauseDisk capacities are greater than memory capacitiesDisk access much slower than memory accessDisk data transfer r...
makhdoom ghaya
635
views
makhdoom ghaya
asked
Aug 16, 2016
Others
ugcnetcse-dec2011-paper2
+
–
2
votes
1
answer
30
UGC NET CSE | December 2011 | Part 2 | Question: 19
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal. ABFCDE ADBFEC ABDECF ABDCEF
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.ABFCDEADBFECABDECFABDCEF
makhdoom ghaya
2.0k
views
makhdoom ghaya
asked
Aug 16, 2016
Algorithms
ugcnetcse-dec2011-paper2
algorithms
binary-tree
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register