# Recent questions tagged ugcnetdec2012ii

1
Given a Relation POSITION (Posting-No, Skill), then the query to retrieve all distinct pairs of posting-nos. requiring skill is Select p.posting-No, p.posting-No from position p where p.skill=p.skill and p.posting-No < p.posting-No Select p$_1$.posting-No, p$_2$.posting-No from ... posting-No from position p$_1$, position p$_2$ where p$_1$.skill=p$_2$.skill and p$_1$.posting.No = p$_2$.posting-No
2
Identify the operation which is commutative but not associative? OR NOR EX-OR NAND
3
Match the following : $\begin{array}{|l|l|l|l|} \hline \text{a.} & \text{TTL} & \text{1.} & \text{High fan out} \\\hline \text{b.} & \text{ECL} & \text{2.} & \text{Low propagation delay} \\\hline \text{d.} & \text{CMOS} & \text{3.} & \text{High power dissipation} \\\hline \end{array}$ a-iii, b-ii, c-i a-i, b-ii, c-iii a-i, b-iii, c-ii a-iii, b-i, c-ii
1 vote
4
_____ is an “umbrella” activity that is applied throughout the software engineering process. Debugging Testing Designing Software quality assurance
5
Back propagation is a learning technique that adjusts weights in the neutral network by propagating weight changes. Forward from source to sink Backward from sink to source Forward from source to hidden nodes Backward from sink to hidden nodes
6
What is the result of the following expression? (1 & 2) + (3 & 4) 1 3 2 0
7
Let L be set accepted by a non-deterministic finite automaton. The number of states in non-deterministic finite automaton is $\mid Q \mid$. The maximum number of states in equivalent finite automaton that accepts L is $\mid Q \mid$ $2 \mid Q \mid$ $2^{\mid Q \mid} -1$ $2^{\mid Q \mid}$
1 vote
8
Data Encryption Techniques are particularly used for _____ protecting data in Data Communication System reduce Storage Space Requirement enhances Data Integrity decreases Data Integrity
9
Which of the following mode declaration used in C++ to open a file for input? ios : : app in : : ios ios : : file ios : : in
10
Enumeration is a process of Declaring a set of numbers Sorting a list of strings Assigning a legal values possible for a variable Sequencing a list of operators
11
Given an empty stack, after performing push(1), push(2), pop, push(3), push(4), pop, pop, push(5), pop, what is the value of the top of the stack? 4 3 2 1
12
Match the following with respect to C++ data types: ... a-ii, b-iii, c-iv, d-i a-iii, b-i, c-iv, d-ii a-iv, b-i, c-ii, d-iii a-iii, b-iv, c-i, d-ii
13
Match the following IC families with their basic circuits: $\begin{array}{|l|l|l|}\hline \text{a.} & \text{TTL} & \text{1.} & \text{NAND} \\\hline \text{b.} & \text{ECL} & \text{2.} & \text{NOR} \\ \hline \text{c.} & \text{CMOS} & \text{3.} & \text{Inverter} \\ \hline\end{array}$ Code: a-i, b-ii, c-iii a-iii, b-ii, c-i a-ii, b-iii, c-i a-ii, b-i, c-iii
14
In UNIX, which of the following command is used to set the task priority? init nice kill PS
15
The maximum number of keys stored in a B-tree of order $m$ and depth $d$ is $m^{d +1}-1$ $\frac{m^{d+1}-1}{m-1}$ $(m-1)(m^{d+1}-1)$ $\frac{m^d-1}{m-1}$
16
Consider the tree given below: Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree: d & h c & k g, b, c, h, i, m c & h
17
The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between DBMS and the Host record Host program and the Host record Host program and DBMS Host program and Host language
1 vote
18
Basis path testing falls under system testing white box testing black box testing unit testing
19
Which of the following memory allocation scheme suffers from external fragmentation? Segmentation Pure demand paging Swapping Paging
1 vote
20
Which of the following are two special functions that are meant for handling exception, that occur during exception handling itself? Void terminate () and void unexpected() Non void terminate () and void unexpected() Void terminate () and non void unexpected() Non void terminate () and non void unexpected()
1 vote
21
Which of the following is true while converting CFG to an LL(1) grammar? Removing left recursion alone Factoring the grammar alone Removing left recursion and factoring the grammar None of the above
22
Identify the Risk factors which are associated with Electronic payment system Fraudulent use of credit card Sending credit card details over internet Remote storage of credit card details All of the above
23
A hash function $f$ defined as $f (key) = key \mod 13$, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79? 1 2 3 4
24
RAD stands for Rapid and Design Rapid Aided Development Rapid Application Development Rapid Application Design
25
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75 $\Omega$ used for Cable TV Ethernet Thin Ethernet Thick Ethernet
1 vote
26
In DML, RECONNCT command cannot be used with OPTIONAL Set FIXED Set MANDATOR Set All of the above
1 vote
27
Which API is used to draw a circle? Circle () Ellipse () Round Rect () Pie ()
1 vote
Given the following expressions of a grammar $E \rightarrow E * F / F + E / F$ $F \rightarrow F &ndash; F / id$ Which of the following is true? $*$ has the higher precedence than + - has the higher precedence than $*$ + and &ndash; have same precedence + has the higher precedence than $*$