search
Log In

Recent questions tagged ugcnetjune2009ii

–1 vote
0 answers
1
We cannot delete the __________ icon but we can made it invisible. Recycle My Computer Internet explorer None of the above
asked Sep 24, 2017 in Others rishu_darkshadow 257 views
1 vote
2 answers
2
The device which connects dissimilar $LANs$ of different topologies using different sets of communication protocols so that information can flow from one to another is called : Router Bridge Gateway Switch
asked Sep 24, 2017 in Computer Networks rishu_darkshadow 666 views
1 vote
2 answers
3
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as : Authenticity Non-Repudiability Auditability Repudiability
asked Sep 24, 2017 in Computer Networks rishu_darkshadow 304 views
0 votes
1 answer
4
A clustering technique that permits a convenient graphical display is : partition based clustering probabilistic model based clustering hierarchical clustering agglomerative clustering
asked Sep 24, 2017 in Computer Networks rishu_darkshadow 307 views
0 votes
1 answer
5
E-commerce includes : $B2C$ $B2B$ $C2C$ All of the above
asked Sep 24, 2017 in Computer Networks rishu_darkshadow 151 views
0 votes
1 answer
6
When compared with analog cellular systems, an advantage of digital $TDMA$ cellular system is that : it is less complicated it requires less of computer memory it conserves spectrum bandwidth it costs less
asked Sep 24, 2017 in Computer Networks rishu_darkshadow 207 views
0 votes
1 answer
7
The spacing between character pairs is called : Kerning x-height intercap serif
asked Sep 24, 2017 in Others rishu_darkshadow 270 views
0 votes
1 answer
8
Reverse engineering is the process which deals with : Size measurement Cost measurement Design recovery All of the above
asked Sep 24, 2017 in IS&Software Engineering rishu_darkshadow 536 views
0 votes
1 answer
9
Which one of the following ISO standard is used for software process ? $ISO 9000$ $ISO 9001$ $ISO 9003$ $ISO 9000-3$
asked Sep 24, 2017 in Computer Networks rishu_darkshadow 518 views
0 votes
2 answers
10
In the light of software engineering software consists of : Programs Data Documentation All of the above
asked Sep 23, 2017 in IS&Software Engineering rishu_darkshadow 267 views
0 votes
1 answer
11
Capability Maturity Model is meant for : Product Process Product and Process None of the above
asked Sep 23, 2017 in IS&Software Engineering rishu_darkshadow 246 views
0 votes
0 answers
12
Variable partition memory management technique with compaction results in : Reduction of fragmentation Minimal wastage Segment sharing None of the above
asked Sep 23, 2017 in Operating System rishu_darkshadow 455 views
0 votes
1 answer
13
Which of the following changes permission to deny write permission to group and others ? Chmod go-w filex Chmod go w filex Chmod go=w filex None of the above
asked Sep 23, 2017 in Others rishu_darkshadow 192 views
0 votes
1 answer
14
Any syntactic construct that can be described by a regular expression can also be described by a : Context sensitive grammar Non context free grammar Context free grammar None of the above
asked Sep 23, 2017 in Theory of Computation rishu_darkshadow 730 views
2 votes
2 answers
15
A compiler that runs on one machine and produces code for a different machine is called : Cross compilation One pass compilation Two pass compilation None of the above
asked Sep 23, 2017 in CO and Architecture rishu_darkshadow 455 views
0 votes
1 answer
16
The linker : is similar to interpreter uses source code as its input is required to create a load module none of the above
asked Sep 23, 2017 in Compiler Design rishu_darkshadow 692 views
0 votes
1 answer
17
Usually information security in a network is achieved by : Layering Cryptography Grade of service None of the above
asked Sep 23, 2017 in Computer Networks rishu_darkshadow 249 views
0 votes
2 answers
18
GSM/CDMA systems : are limited to very low speed data require no local loop wires are predominantly used for voice all of the above
asked Sep 23, 2017 in Computer Networks rishu_darkshadow 305 views
0 votes
1 answer
19
$X.25$ protocol consists of : Physical and Frame levels Frame and Packet levels Physical, Frame and Packet levels None of the above
asked Sep 23, 2017 in Computer Networks rishu_darkshadow 403 views
0 votes
2 answers
20
In a full binary tree of height k, there are ______ internal nodes . 2k-1 2k-1 2k 2k+1
asked Sep 23, 2017 in DS rishu_darkshadow 575 views
1 vote
4 answers
21
Queue is a …………. list . $LIFO$ $LILO$ $FILO$ $FIFO$
asked Sep 23, 2017 in DS rishu_darkshadow 139 views
0 votes
1 answer
22
The prepositional formula given by the tree : is : ˄˅x2˅x1¬x1¬x1 (x2˅¬x2)˄(x1˅x2) (¬x1˅x2)˄(¬x1˅x2) None
asked Sep 23, 2017 in Mathematical Logic rishu_darkshadow 162 views
0 votes
1 answer
23
In a B tree of order m with p nodes the average number of splits is at most : 1/(⌈m/2⌉−1) ⌈m/2⌉−1 1/(m/2) None
asked Sep 23, 2017 in DS rishu_darkshadow 242 views
0 votes
3 answers
24
Which two of the following are equivalent for an undirected graph G ? (i) G is a tree (ii) There is at least one path between any two distinct vertices of G (iii) G contains no cycles and has (n-1) edges (iv) G has n edges (i) and (ii) (i) and (iii) (i) and (iv) (ii) and (iii)
asked Sep 23, 2017 in Graph Theory rishu_darkshadow 1.1k views
1 vote
1 answer
25
ORACLE supports : inner join and outer join only outer join and semi join only inner join, outer join , semi join only inner join, outer join, semi join and anti join
asked Sep 23, 2017 in Databases rishu_darkshadow 278 views
4 votes
3 answers
26
Which construct in SQL is used to test whether a subquery has any tuples in its result ? UNIQUE EXISTS GROUP BY EXCEPT
asked Sep 23, 2017 in Databases rishu_darkshadow 554 views
0 votes
1 answer
27
There exists a construct which returns a value ‘true’ if the argument subquery is : empty non-empty in error none of the above
asked Sep 22, 2017 in Programming rishu_darkshadow 368 views
4 votes
3 answers
28
(i) $\text{DML}$ includes a query language based on both relation algebra and tuple calculus (ii) $\text{DML}$ includes a query language based on tuple calculus (iii) $\text{DML}$ includes a query language based on relational algebra (iv) $\text{DML}$ includes a query language based on none of the relational algebra and tuple calculus Which one is correct ? (i) only (ii) only (iii) only (iv) only
asked Sep 22, 2017 in Databases rishu_darkshadow 524 views
1 vote
1 answer
29
The friend functions are used in situations where : We want to have access to unrelated classes Dynamic binding is required Exchange of data between classes to take place None of the above
asked Sep 22, 2017 in Programming rishu_darkshadow 279 views
1 vote
3 answers
30
Which of the following does not represent a valid storage class in ’c’? (A) automatic (B) static (C) union (D) extern
asked Sep 22, 2017 in Programming rishu_darkshadow 592 views
...