Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2009-paper2
–1
votes
0
answers
1
UGC NET CSE | June 2009 | Part 2 | Question: 50
We cannot delete the __________ icon but we can made it invisible. Recycle My Computer Internet explorer None of the above
We cannot delete the __________ icon but we can made it invisible.Recycle My Computer Internet explorer None of the abov...
rishu_darkshadow
582
views
rishu_darkshadow
asked
Sep 24, 2017
Others
ugcnetcse-june2009-paper2
windows-programming
+
–
1
votes
2
answers
2
UGC NET CSE | June 2009 | Part 2 | Question: 49
The device which connects dissimilar $LANs$ of different topologies using different sets of communication protocols so that information can flow from one to another is called : Router Bridge Gateway Switch
The device which connects dissimilar $LANs$ of different topologies using different sets of communication protocols so that information can flow from one to another is ca...
rishu_darkshadow
2.1k
views
rishu_darkshadow
asked
Sep 24, 2017
Computer Networks
ugcnetcse-june2009-paper2
computer-networks
routers-bridge-hubs-switches
+
–
1
votes
1
answer
3
UGC NET CSE | June 2009 | Part 2 | Question: 48
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as : Authenticity Non-Repudiability Auditability Repudiability
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as :Authenticity Non-Repu...
rishu_darkshadow
921
views
rishu_darkshadow
asked
Sep 24, 2017
Computer Networks
ugcnetcse-june2009-paper2
network-security
+
–
0
votes
1
answer
4
UGC NET CSE | June 2009 | Part 2 | Question: 47
A clustering technique that permits a convenient graphical display is : partition based clustering probabilistic model based clustering hierarchical clustering agglomerative clustering
A clustering technique that permits a convenient graphical display is :partition based clustering probabilistic model based clustering hierarchical clustering a...
rishu_darkshadow
1.0k
views
rishu_darkshadow
asked
Sep 24, 2017
Computer Networks
ugcnetcse-june2009-paper2
+
–
0
votes
1
answer
5
UGC NET CSE | June 2009 | Part 2 | Question: 46
E-commerce includes : $B2C$ $B2B$ $C2C$ All of the above
E-commerce includes :$B2C$ $B2B$ $C2C$ All of the above
rishu_darkshadow
496
views
rishu_darkshadow
asked
Sep 24, 2017
Computer Networks
ugcnetcse-june2009-paper2
+
–
0
votes
0
answers
6
UGC NET CSE | June 2009 | Part 2 | Question: 45
When compared with analog cellular systems, an advantage of digital $TDMA$ cellular system is that : it is less complicated it requires less of computer memory it conserves spectrum bandwidth it costs less
When compared with analog cellular systems, an advantage of digital $TDMA$ cellular system is that :it is less complicated it requires less of computer memory it con...
rishu_darkshadow
599
views
rishu_darkshadow
asked
Sep 24, 2017
Computer Networks
ugcnetcse-june2009-paper2
+
–
0
votes
1
answer
7
UGC NET CSE | June 2009 | Part 2 | Question: 44
The spacing between character pairs is called : Kerning x-height intercap serif
The spacing between character pairs is called :Kerning x-height intercap serif
rishu_darkshadow
590
views
rishu_darkshadow
asked
Sep 24, 2017
Others
ugcnetcse-june2009-paper2
+
–
0
votes
1
answer
8
UGC NET CSE | June 2009 | Part 2 | Question: 43
Reverse engineering is the process which deals with : Size measurement Cost measurement Design recovery All of the above
Reverse engineering is the process which deals with :Size measurement Cost measurement Design recovery All of the above
rishu_darkshadow
1.3k
views
rishu_darkshadow
asked
Sep 24, 2017
IS&Software Engineering
ugcnetcse-june2009-paper2
+
–
0
votes
2
answers
9
UGC NET CSE | June 2009 | Part 2 | Question: 41
Which one of the following ISO standard is used for software process ? $ISO 9000$ $ISO 9001$ $ISO 9003$ $ISO 9000-3$
Which one of the following ISO standard is used for software process ?$ISO 9000$ $ISO 9001$ $ISO 9003$ $ISO 9000-3$
rishu_darkshadow
1.7k
views
rishu_darkshadow
asked
Sep 24, 2017
Computer Networks
ugcnetcse-june2009-paper2
+
–
0
votes
1
answer
10
UGC NET CSE | June 2009 | Part 2 | Question: 40
In the light of software engineering software consists of : Programs Data Documentation All of the above
In the light of software engineering software consists of :Programs Data Documentation All of the above
rishu_darkshadow
905
views
rishu_darkshadow
asked
Sep 23, 2017
IS&Software Engineering
ugcnetcse-june2009-paper2
+
–
0
votes
0
answers
11
UGC NET CSE | June 2009 | Part 2 | Question: 39
Capability Maturity Model is meant for : Product Process Product and Process None of the above
Capability Maturity Model is meant for :Product Process Product and Process None of the above
rishu_darkshadow
705
views
rishu_darkshadow
asked
Sep 23, 2017
IS&Software Engineering
ugcnetcse-june2009-paper2
+
–
0
votes
0
answers
12
UGC NET CSE | June 2009 | Part 2 | Question: 38
Variable partition memory management technique with compaction results in : Reduction of fragmentation Minimal wastage Segment sharing None of the above
Variable partition memory management technique with compaction results in :Reduction of fragmentation Minimal wastage Segment sharing None of the above
rishu_darkshadow
1.8k
views
rishu_darkshadow
asked
Sep 23, 2017
Operating System
ugcnetcse-june2009-paper2
+
–
0
votes
0
answers
13
UGC NET CSE | June 2009 | Part 2 | Question: 37
Which of the following changes permission to deny write permission to group and others ? Chmod go-w filex Chmod go w filex Chmod go=w filex None of the above
Which of the following changes permission to deny write permission to group and others ?Chmod go-w filex Chmod go w filex Chmod go=w filex N...
rishu_darkshadow
768
views
rishu_darkshadow
asked
Sep 23, 2017
Others
ugcnetcse-june2009-paper2
+
–
0
votes
1
answer
14
UGC NET CSE | June 2009 | Part 2 | Question: 35
Any syntactic construct that can be described by a regular expression can also be described by a : Context sensitive grammar Non context free grammar Context free grammar None of the above
Any syntactic construct that can be described by a regular expression can also be described by a :Context sensitive grammar Non context free grammar Context free gramm...
rishu_darkshadow
1.5k
views
rishu_darkshadow
asked
Sep 23, 2017
Theory of Computation
ugcnetcse-june2009-paper2
+
–
2
votes
1
answer
15
UGC NET CSE | June 2009 | Part 2 | Question: 34
A compiler that runs on one machine and produces code for a different machine is called : Cross compilation One pass compilation Two pass compilation None of the above
A compiler that runs on one machine and produces code for a different machine is called :Cross compilation One pass compilation Two pass compilation N...
rishu_darkshadow
1.9k
views
rishu_darkshadow
asked
Sep 23, 2017
CO and Architecture
ugcnetcse-june2009-paper2
compiler-design
compilation-phases
+
–
0
votes
1
answer
16
UGC NET CSE | June 2009 | Part 2 | Question: 32
The linker : is similar to interpreter uses source code as its input is required to create a load module none of the above
The linker :is similar to interpreter uses source code as its input is required to create a load module none of the above
rishu_darkshadow
3.1k
views
rishu_darkshadow
asked
Sep 23, 2017
Compiler Design
ugcnetcse-june2009-paper2
+
–
0
votes
0
answers
17
UGC NET CSE | June 2009 | Part 2 | Question: 31
Usually information security in a network is achieved by : Layering Cryptography Grade of service None of the above
Usually information security in a network is achieved by :Layering Cryptography Grade of service None of the above
rishu_darkshadow
717
views
rishu_darkshadow
asked
Sep 23, 2017
Computer Networks
ugcnetcse-june2009-paper2
+
–
0
votes
2
answers
18
UGC NET CSE | June 2009 | Part 2 | Question: 30
GSM/CDMA systems : are limited to very low speed data require no local loop wires are predominantly used for voice all of the above
GSM/CDMA systems :are limited to very low speed data require no local loop wires are predominantly used for voice all of the above
rishu_darkshadow
792
views
rishu_darkshadow
asked
Sep 22, 2017
Computer Networks
ugcnetcse-june2009-paper2
+
–
0
votes
1
answer
19
UGC NET CSE | June 2009 | Part 2 | Question: 29
$X.25$ protocol consists of : Physical and Frame levels Frame and Packet levels Physical, Frame and Packet levels None of the above
$X.25$ protocol consists of :Physical and Frame levels Frame and Packet levels Physical, Frame and Packet levels None of the above
rishu_darkshadow
1.1k
views
rishu_darkshadow
asked
Sep 22, 2017
Computer Networks
ugcnetcse-june2009-paper2
+
–
0
votes
2
answers
20
UGC NET CSE | June 2009 | Part 2 | Question: 27
In a full binary tree of height k, there are ______ internal nodes . 2k-1 2k-1 2k 2k+1
In a full binary tree of height k, there are ______ internal nodes .2k-1 2k-1 2k 2k+1
rishu_darkshadow
3.7k
views
rishu_darkshadow
asked
Sep 22, 2017
DS
ugcnetcse-june2009-paper2
data-structures
binary-tree
+
–
1
votes
4
answers
21
UGC NET CSE | June 2009 | Part 2 | Question: 26
Queue is a …………. list . $LIFO$ $LILO$ $FILO$ $FIFO$
Queue is a …………. list .$LIFO$ $LILO$ $FILO$ $FIFO$
rishu_darkshadow
698
views
rishu_darkshadow
asked
Sep 22, 2017
DS
ugcnetcse-june2009-paper2
data-structures
queue
easy
+
–
0
votes
1
answer
22
UGC NET CSE | June 2009 | Part 2 | Question: 25
The prepositional formula given by the tree : is : ˄˅x2˅x1¬x1¬x1 (x2˅¬x2)˄(x1˅x2) (¬x1˅x2)˄(¬x1˅x2) None
The prepositional formula given by the tree :is :˄˅x2˅x1¬x1¬x1 (x2˅¬x2)˄(x1˅x2) (¬x1˅x2)˄(¬x1˅x2) None
rishu_darkshadow
589
views
rishu_darkshadow
asked
Sep 22, 2017
Mathematical Logic
ugcnetcse-june2009-paper2
propositional-logic
+
–
0
votes
1
answer
23
UGC NET CSE | June 2009 | Part 2 | Question: 24
In a B tree of order m with p nodes the average number of splits is at most : 1/(⌈m/2⌉−1) ⌈m/2⌉−1 1/(m/2) None
In a B tree of order m with p nodes the average number of splits is at most :1/(⌈m/2⌉−1) ⌈m/2⌉−1 1/(m/2) None
rishu_darkshadow
589
views
rishu_darkshadow
asked
Sep 22, 2017
DS
ugcnetcse-june2009-paper2
+
–
0
votes
3
answers
24
UGC NET CSE | June 2009 | Part 2 | Question: 23
Which two of the following are equivalent for an undirected graph G ? (i) G is a tree (ii) There is at least one path between any two distinct vertices of G (iii) G contains no cycles and has (n-1) edges (iv) G has n edges (i) and (ii) (i) and (iii) (i) and (iv) (ii) and (iii)
Which two of the following are equivalent for an undirected graph G ?(i) G is a tree(ii) There is at least one path between any two distinct vertices of G(iii) G contain...
rishu_darkshadow
4.7k
views
rishu_darkshadow
asked
Sep 22, 2017
Graph Theory
ugcnetcse-june2009-paper2
+
–
1
votes
1
answer
25
UGC NET CSE | June 2009 | Part 2 | Question: 22
ORACLE supports : inner join and outer join only outer join and semi join only inner join, outer join , semi join only inner join, outer join, semi join and anti join
ORACLE supports :inner join and outer join only outer join and semi join only inner join, outer join , semi join only inner join, outer join, semi join and a...
rishu_darkshadow
556
views
rishu_darkshadow
asked
Sep 22, 2017
Databases
ugcnetcse-june2009-paper2
+
–
4
votes
2
answers
26
UGC NET CSE | June 2009 | Part 2 | Question: 21
Which construct in SQL is used to test whether a subquery has any tuples in its result ? UNIQUE EXISTS GROUP BY EXCEPT
Which construct in SQL is used to test whether a subquery has any tuples in its result ?UNIQUE EXISTS GROUP BY EXCEPT
rishu_darkshadow
2.3k
views
rishu_darkshadow
asked
Sep 22, 2017
Databases
ugcnetcse-june2009-paper2
+
–
0
votes
1
answer
27
UGC NET CSE | June 2009 | Part 2 | Question: 20
There exists a construct which returns a value ‘true’ if the argument subquery is : empty non-empty in error none of the above
There exists a construct which returns a value ‘true’ if the argument subquery is :empty non-empty in error none of the above
rishu_darkshadow
1.4k
views
rishu_darkshadow
asked
Sep 22, 2017
Programming in C
ugcnetcse-june2009-paper2
+
–
4
votes
2
answers
28
UGC NET CSE | June 2009 | Part 2 | Question: 18
(i) $\text{DML}$ includes a query language based on both relation algebra and tuple calculus (ii) $\text{DML}$ includes a query language based on tuple calculus (iii) $\text{DML}$ ... of the relational algebra and tuple calculus Which one is correct ? (i) only (ii) only (iii) only (iv) only
(i) $\text{DML}$ includes a query language based on both relation algebra and tuple calculus(ii) $\text{DML}$ includes a query language based on tuple calculus(iii) $\tex...
rishu_darkshadow
1.9k
views
rishu_darkshadow
asked
Sep 22, 2017
Databases
ugcnetcse-june2009-paper2
+
–
1
votes
1
answer
29
UGC NET CSE | June 2009 | Part 2 | Question: 17
The friend functions are used in situations where : We want to have access to unrelated classes Dynamic binding is required Exchange of data between classes to take place None of the above
The friend functions are used in situations where :We want to have access to unrelated classes Dynamic binding is required Exchange of data between classes to take...
rishu_darkshadow
2.4k
views
rishu_darkshadow
asked
Sep 22, 2017
Programming in C
ugcnetcse-june2009-paper2
+
–
1
votes
3
answers
30
UGC NET CSE | June 2009 | Part 2 | Question: 16
Which of the following does not represent a valid storage class in ’c’? automatic static union extern
Which of the following does not represent a valid storage class in ’c’?automaticstaticunion extern
rishu_darkshadow
8.8k
views
rishu_darkshadow
asked
Sep 22, 2017
Programming in C
ugcnetcse-june2009-paper2
programming-in-c
storage-classes-in-c
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register