search
Log In

Recent questions tagged ugcnetdec2012ii

2 votes
2 answers
1
Given a Relation POSITION (Posting-No, Skill), then the query to retrieve all distinct pairs of posting-nos. requiring skill is Select p.posting-No, p.posting-No from position p where p.skill=p.skill and p.posting-No < p.posting-No Select p$_1$.posting-No, p$_2$.posting-No from ... posting-No from position p$_1$, position p$_2$ where p$_1$.skill=p$_2$.skill and p$_1$.posting.No = p$_2$.posting-No
asked Jul 11, 2016 in Databases jothee 1.5k views
4 votes
2 answers
2
Identify the operation which is commutative but not associative? OR NOR EX-OR NAND
asked Jul 11, 2016 in Digital Logic jothee 4.9k views
3 votes
1 answer
3
Match the following : $\begin{array}{|l|l|l|l|} \hline \text{a.} & \text{TTL} & \text{1.} & \text{High fan out} \\\hline \text{b.} & \text{ECL} & \text{2.} & \text{Low propagation delay} \\\hline \text{d.} & \text{CMOS} & \text{3.} & \text{High power dissipation} \\\hline \end{array}$ a-iii, b-ii, c-i a-i, b-ii, c-iii a-i, b-iii, c-ii a-iii, b-i, c-ii
asked Jul 11, 2016 in Digital Logic jothee 1.1k views
1 vote
1 answer
4
_____ is an “umbrella” activity that is applied throughout the software engineering process. Debugging Testing Designing Software quality assurance
asked Jul 11, 2016 in IS&Software Engineering jothee 2.4k views
0 votes
1 answer
5
Back propagation is a learning technique that adjusts weights in the neutral network by propagating weight changes. Forward from source to sink Backward from sink to source Forward from source to hidden nodes Backward from sink to hidden nodes
asked Jul 11, 2016 in Machine Learning jothee 5.5k views
0 votes
1 answer
6
What is the result of the following expression? (1 & 2) + (3 & 4) 1 3 2 0
asked Jul 11, 2016 in Programming and DS jothee 2k views
2 votes
2 answers
7
Let L be set accepted by a non-deterministic finite automaton. The number of states in non-deterministic finite automaton is $\mid Q \mid$. The maximum number of states in equivalent finite automaton that accepts L is $\mid Q \mid$ $ 2 \mid Q \mid$ $2^{\mid Q \mid} -1$ $2^{\mid Q \mid}$
asked Jul 11, 2016 in Theory of Computation jothee 2.3k views
1 vote
2 answers
8
Data Encryption Techniques are particularly used for _____ protecting data in Data Communication System reduce Storage Space Requirement enhances Data Integrity decreases Data Integrity
asked Jul 11, 2016 in Computer Networks jothee 1.6k views
0 votes
1 answer
9
Which of the following mode declaration used in C++ to open a file for input? ios : : app in : : ios ios : : file ios : : in
asked Jul 11, 2016 in Programming jothee 1.2k views
0 votes
1 answer
10
Enumeration is a process of Declaring a set of numbers Sorting a list of strings Assigning a legal values possible for a variable Sequencing a list of operators
asked Jul 11, 2016 in Programming jothee 1.1k views
0 votes
2 answers
11
Given an empty stack, after performing push(1), push(2), pop, push(3), push(4), pop, pop, push(5), pop, what is the value of the top of the stack? 4 3 2 1
asked Jul 11, 2016 in DS jothee 2.3k views
0 votes
1 answer
12
Match the following with respect to C++ data types: ... a-ii, b-iii, c-iv, d-i a-iii, b-i, c-iv, d-ii a-iv, b-i, c-ii, d-iii a-iii, b-iv, c-i, d-ii
asked Jul 11, 2016 in Programming jothee 959 views
0 votes
1 answer
13
Match the following IC families with their basic circuits: $\begin{array}{|l|l|l|}\hline \text{a.} & \text{TTL} & \text{1.} & \text{NAND} \\\hline \text{b.} & \text{ECL} & \text{2.} & \text{NOR} \\ \hline \text{c.} & \text{CMOS} & \text{3.} & \text{Inverter} \\ \hline\end{array}$ Code: a-i, b-ii, c-iii a-iii, b-ii, c-i a-ii, b-iii, c-i a-ii, b-i, c-iii
asked Jul 11, 2016 in Digital Logic jothee 1.7k views
0 votes
1 answer
14
In UNIX, which of the following command is used to set the task priority? init nice kill PS
asked Jul 11, 2016 in Operating System jothee 1.2k views
4 votes
1 answer
15
The maximum number of keys stored in a B-tree of order $m$ and depth $d$ is $m^{d +1}-1$ $\frac{m^{d+1}-1}{m-1}$ $(m-1)(m^{d+1}-1)$ $\frac{m^d-1}{m-1}$
asked Jul 11, 2016 in DS jothee 2.6k views
0 votes
1 answer
16
Consider the tree given below: Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree: d & h c & k g, b, c, h, i, m c & h
asked Jul 11, 2016 in Graph Theory jothee 2.1k views
0 votes
1 answer
17
The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between DBMS and the Host record Host program and the Host record Host program and DBMS Host program and Host language
asked Jul 11, 2016 in Databases jothee 1.1k views
1 vote
1 answer
18
Basis path testing falls under system testing white box testing black box testing unit testing
asked Jul 11, 2016 in IS&Software Engineering jothee 1.8k views
0 votes
1 answer
19
Which of the following memory allocation scheme suffers from external fragmentation? Segmentation Pure demand paging Swapping Paging
asked Jul 11, 2016 in Operating System jothee 3k views
1 vote
1 answer
20
Which of the following are two special functions that are meant for handling exception, that occur during exception handling itself? Void terminate () and void unexpected() Non void terminate () and void unexpected() Void terminate () and non void unexpected() Non void terminate () and non void unexpected()
asked Jul 11, 2016 in Programming jothee 1k views
1 vote
2 answers
21
Which of the following is true while converting CFG to an LL(1) grammar? Removing left recursion alone Factoring the grammar alone Removing left recursion and factoring the grammar None of the above
asked Jul 10, 2016 in Compiler Design Arjun 1.9k views
0 votes
1 answer
22
Identify the Risk factors which are associated with Electronic payment system Fraudulent use of credit card Sending credit card details over internet Remote storage of credit card details All of the above
asked Jul 10, 2016 in Web Technologies jothee 998 views
0 votes
1 answer
23
A hash function $f$ defined as $f (key) = key \mod 13$, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79? 1 2 3 4
asked Jul 10, 2016 in DS jothee 3.9k views
0 votes
1 answer
24
0 votes
1 answer
25
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75 $\Omega$ used for Cable TV Ethernet Thin Ethernet Thick Ethernet
asked Jul 10, 2016 in Computer Networks jothee 1.2k views
1 vote
1 answer
26
In DML, RECONNCT command cannot be used with OPTIONAL Set FIXED Set MANDATOR Set All of the above
asked Jul 10, 2016 in Databases jothee 1.9k views
1 vote
2 answers
27
Which API is used to draw a circle? Circle () Ellipse () Round Rect () Pie ()
asked Jul 10, 2016 in Programming jothee 1.3k views
1 vote
3 answers
28
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using: Parity bit Aging Compaction Timer
asked Jul 8, 2016 in Operating System jothee 3.6k views
0 votes
2 answers
29
The maturity levels used to measure a process are Initial, Repeatable, Defined, Managed, Optimized Primary, Secondary, Defined, Managed, Optimized Initial, Stating, Defined, Managed, Optimized None of the above
asked Jul 8, 2016 in IS&Software Engineering jothee 1.7k views
2 votes
3 answers
30
Given the following expressions of a grammar $E \rightarrow E * F / F + E / F$ $F \rightarrow F &ndash; F / id$ Which of the following is true? $*$ has the higher precedence than + - has the higher precedence than $*$ + and &ndash; have same precedence + has the higher precedence than $*$
asked Jul 8, 2016 in Compiler Design jothee 866 views
...