Recent questions tagged ugcnetcse-dec2013-paper2

1 votes
1 answer
1
0 votes
2 answers
6
The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organization.ISOANSII...
1 votes
1 answer
7
Match the following $:$$\begin{array}{} \text{} & \textbf{List – I} & & & \textbf{List – II} \\ \text{a.} & \text{Wireless Application Environment} & & \text{i.} &...
1 votes
2 answers
8
1 votes
4 answers
10
A graph is non-planar if and only if it contains a subgraph homomorphic to$K_{3,2} \text{ or } K_5$$K_{3,3} \text{ or } K_6$$K_{3,3} \text{ or } K_5$$K_{2,3} \text{ or } ...
1 votes
1 answer
11
2 votes
2 answers
12
2 votes
2 answers
13
3 votes
3 answers
16
1 votes
1 answer
18
4 votes
2 answers
21
Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed in the worst case by the merge sort algorithm will bem $\times$ nmax(m, n)min(m, ...
1 votes
1 answer
22
For any B-tree of minimum degree t $\geq$ 2, every node other than the root must have at least ____ keys and every node can have at most ____ keys.t-1, 2t+1t+1, 2t+1t-1, ...
1 votes
1 answer
23
______ is often used to prove the correctness of a recursive function.DiagnolizationCommunitivityMathematical InductionMatrix Manipulation
1 votes
1 answer
25
1 votes
1 answer
26
2 votes
1 answer
28
0 votes
2 answers
29
2 votes
1 answer
30
Data Integrity control usesUpper and lower limits on numeric dataPasswords to prohibit unauthorized access to filesData dictionary to keep the dataData dictionary to find...