Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2010-paper2
0
votes
0
answers
1
UGC NET CSE | June 2010 | Part 2 | Question: 50
Data Mining uses _______, _______ and _______ to build effective predictive model. (i) Data set (ii) Information set (iii) Input set (iv) Process set (v) Output set (vi) Test set $(i), (ii)$ and $(iv)$ $(ii), (iv)$ and $(v)$ $(i), (v)$ and $(vi)$ $(ii), (iii)$ and $(v)$
Data Mining uses _______, _______ and _______ to build effective predictive model.(i) Data set(ii) Information set(iii) Input set(iv) Process set(v) Output set(vi) Test s...
makhdoom ghaya
2.1k
views
makhdoom ghaya
asked
Sep 16, 2016
Others
ugcnetcse-june2010-paper2
data-mining
+
–
1
votes
1
answer
2
UGC NET CSE | June 2010 | Part 2 | Question: 49
At any given time Parallel Virtual Machine (PVM) has _______ send buffer and ________ receive buffer. One-one One-two Two-two Two-one
At any given time Parallel Virtual Machine (PVM) has _______ send buffer and ________ receive buffer.One-oneOne-twoTwo-twoTwo-one
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Sep 16, 2016
Others
ugcnetcse-june2010-paper2
unix
+
–
0
votes
0
answers
3
UGC NET CSE | June 2010 | Part 2 | Question: 48
$CDMA$ Cell uses ________ carriers of $1.25$ MHz. $9$ $18$ $22$ $64$
$CDMA$ Cell uses ________ carriers of $1.25$ MHz.$9$$18$$22$$64$
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Sep 16, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
data-communication
+
–
0
votes
1
answer
4
UGC NET CSE | June 2010 | Part 2 | Question: 47
A leased special high-speed connection from the local telephone carrier for business users that transmits at $1.544$ mbps is known as ________ carrier. $T_{1}$ $T_{2}$ $T_{3}$ $T_{4}$
A leased special high-speed connection from the local telephone carrier for business users that transmits at $1.544$ mbps is known as ________ carrier.$T_{1}$$T_{2}$$T_{3...
makhdoom ghaya
1.4k
views
makhdoom ghaya
asked
Sep 16, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
data-communication
+
–
1
votes
0
answers
5
UGC NET CSE | June 2010 | Part 2 | Question: 46
The cost of the network is usually determined by Time complexity Switching complexity circuit complexity none of these
The cost of the network is usually determined byTime complexitySwitching complexitycircuit complexitynone of these
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Sep 16, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
+
–
0
votes
1
answer
6
UGC NET CSE | June 2010 | Part 2 | Question: 45
Applications-software Is used to control the operating system Includes programs designed to help programmers Performs a specific task for computer users All of the above
Applications-softwareIs used to control the operating systemIncludes programs designed to help programmersPerforms a specific task for computer usersAll of the above
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Sep 16, 2016
Others
ugcnetcse-june2010-paper2
application-software
+
–
1
votes
1
answer
7
UGC NET CSE | June 2010 | Part 2 | Question: 44
Design phase will usually be Top-down Bottom-up Random Centre fringing
Design phase will usually beTop-downBottom-upRandomCentre fringing
makhdoom ghaya
3.2k
views
makhdoom ghaya
asked
Sep 16, 2016
IS&Software Engineering
ugcnetcse-june2010-paper2
is&software-engineering
software-design
+
–
1
votes
2
answers
8
UGC NET CSE | June 2010 | Part 2 | Question: 43
Which model is simplest model in Software Development ? Waterfall model Prototyping Iterative None of these
Which model is simplest model in Software Development ?Waterfall modelPrototypingIterativeNone of these
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Sep 16, 2016
IS&Software Engineering
ugcnetcse-june2010-paper2
is&software-engineering
software-development-models
+
–
2
votes
1
answer
9
UGC NET CSE | June 2010 | Part 2 | Question: 42
Top-down design does not require Step-wise refinement Loop invariants Flow charting Modularity
Top-down design does not requireStep-wise refinementLoop invariantsFlow chartingModularity
makhdoom ghaya
2.0k
views
makhdoom ghaya
asked
Sep 16, 2016
IS&Software Engineering
ugcnetcse-june2010-paper2
is&software-engineering
software-design
+
–
3
votes
1
answer
10
UGC NET CSE | June 2010 | Part 2 | Question: 41
Software engineering primarily aims on Reliable software Cost effective software Reliable and cost effective software None of the above
Software engineering primarily aims onReliable softwareCost effective softwareReliable and cost effective softwareNone of the above
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Sep 16, 2016
IS&Software Engineering
ugcnetcse-june2010-paper2
is&software-engineering
+
–
1
votes
2
answers
11
UGC NET CSE | June 2010 | Part 2 | Question: 40
Remote Computing Service involves the use of time sharing and _______. Multi-processing Interactive processing Batch processing Real-time processing
Remote Computing Service involves the use of time sharing and _______.Multi-processingInteractive processingBatch processingReal-time processing
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Sep 16, 2016
Operating System
ugcnetcse-june2010-paper2
operating-system
+
–
1
votes
2
answers
12
UGC NET CSE | June 2010 | Part 2 | Question: 39
In order to allow only one process to enter its critical section, binary semaphore are initialized to $0$ $1$ $2$ $3$
In order to allow only one process to enter its critical section, binary semaphore are initialized to$0$$1$ $2$$3$
makhdoom ghaya
3.3k
views
makhdoom ghaya
asked
Sep 16, 2016
Operating System
ugcnetcse-june2010-paper2
operating-system
binary-semaphore
+
–
1
votes
2
answers
13
UGC NET CSE | June 2010 | Part 2 | Question: 38
_______ is one of pre-emptive scheduling algorithm. $RR$ $SSN$ $SSF$ Priority based
_______ is one of pre-emptive scheduling algorithm.$RR$$SSN$$SSF$Priority based
makhdoom ghaya
873
views
makhdoom ghaya
asked
Sep 16, 2016
Operating System
ugcnetcse-june2010-paper2
operating-system
process-scheduling
+
–
0
votes
0
answers
14
UGC NET CSE | June 2010 | Part 2 | Question: 37
_______ synchronizes critical resources to prevent dead lock. P-operator V-operator Semaphore Swapping
_______ synchronizes critical resources to prevent dead lock.P-operatorV-operatorSemaphoreSwapping
makhdoom ghaya
519
views
makhdoom ghaya
asked
Sep 16, 2016
Others
ugcnetcse-june2010-paper2
+
–
1
votes
2
answers
15
UGC NET CSE | June 2010 | Part 2 | Question: 36
Match the following : ... $\text{(a)-2, (b)-4, (c)-1, (d)-3}$ $\text{(a)-1, (b)-4, (c)-3, (d)-2}$
Match the following :$\begin{array}{clcl} \text{(a)} & \text{Disk scheduling} & \text{1.} & \text{Robin-round} \\ \text{(b)} & \text{Batch processing} & \text{2.} & \tex...
makhdoom ghaya
868
views
makhdoom ghaya
asked
Sep 16, 2016
Operating System
ugcnetcse-june2010-paper2
operating-system
match-the-following
easy
+
–
6
votes
3
answers
16
UGC NET CSE | June 2010 | Part 2 | Question: 35
Which of the following is used for grouping of characters into tokens (in a computer) ? A parser Code optimizer Code generator Scanner
Which of the following is used for grouping of characters into tokens (in a computer) ?A parserCode optimizerCode generatorScanner
makhdoom ghaya
8.1k
views
makhdoom ghaya
asked
Sep 16, 2016
Compiler Design
ugcnetcse-june2010-paper2
compiler-design
lexical-analysis
+
–
0
votes
2
answers
17
UGC NET CSE | June 2010 | Part 2 | Question: 34
Which of the following is the most general phase structured grammar ? Regular Context-sensitive Context free None of the above
Which of the following is the most general phase structured grammar ?RegularContext-sensitiveContext freeNone of the above
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Sep 16, 2016
Compiler Design
ugcnetcse-june2010-paper2
compiler-design
grammar
+
–
0
votes
0
answers
18
UGC NET CSE | June 2010 | Part 2 | Question: 33
Consider the following left associative operators in decreasing order of precedence : - subtraction (highest precedence) * multiplication $ exponentiation (lowest precedence) What is the result of the following expression ? 3 – 2 * 4 $ | * 2** 3 $-61$ $64$ $512$ $4096$
Consider the following left associative operators in decreasing order of precedence :- subtraction (highest precedence)* multiplication$ exponentiation (lowest precedence...
makhdoom ghaya
1.4k
views
makhdoom ghaya
asked
Sep 16, 2016
Programming in C
ugcnetcse-june2010-paper2
programming
operator-precedence
+
–
1
votes
2
answers
19
UGC NET CSE | June 2010 | Part 2 | Question: 32
Which of the following expression is represented by the parse tree ? $(A + B) ^{*} C$ $A + ^{*} BC$ $A + B * C$ $A * C + B$
Which of the following expression is represented by the parse tree ?$(A + B) ^{*} C$$A + ^{*} BC$$A + B * C$$A * C + B$
makhdoom ghaya
2.1k
views
makhdoom ghaya
asked
Sep 16, 2016
DS
ugcnetcse-june2010-paper2
data-structures
tree
+
–
1
votes
1
answer
20
UGC NET CSE | June 2010 | Part 2 | Question: 31
In an absolute loading scheme, which loader function is accomplished by a loader ? Re-allocation Allocation Linking Loading
In an absolute loading scheme, which loader function is accomplished by a loader ?Re-allocationAllocationLinkingLoading
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Sep 15, 2016
Compiler Design
ugcnetcse-june2010-paper2
system-software&-compilers
compiler-design
runtime-environment
+
–
1
votes
0
answers
21
UGC NET CSE | June 2010 | Part 2 | Question: 30
What is the maximum operating rate of a wireless LAN using infrared communication ? $1$ mbps $2$ mbps $5$ mbps $11$ mbps
What is the maximum operating rate of a wireless LAN using infrared communication ?$1$ mbps$2$ mbps$5$ mbps$11$ mbps
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Sep 15, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
wireless-lan
+
–
1
votes
2
answers
22
UGC NET CSE | June 2010 | Part 2 | Question: 29
What services does the internet layer provide ? 1. Quality of service 2. Routing 3. Addressing 4. Connection oriented delivery 5. Framing bits $1, 2, 3$ $2, 3, 4$ $1, 3, 4, 5$ $2, 3, 4, 5$
What services does the internet layer provide ?1. Quality of service2. Routing3. Addressing4. Connection oriented delivery5. Framing bits$1, 2, 3$$2, 3, 4$$1, 3, 4, 5$$2,...
makhdoom ghaya
2.9k
views
makhdoom ghaya
asked
Sep 15, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
osi-model
+
–
2
votes
2
answers
23
UGC NET CSE | June 2010 | Part 2 | Question: 28
End-to-End connectivity is provided from Last-to-Last in Network layer Session layer Transport layer Data link layer
End-to-End connectivity is provided from Last-to-Last inNetwork layerSession layerTransport layerData link layer
makhdoom ghaya
1.6k
views
makhdoom ghaya
asked
Sep 15, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
osi-model
+
–
1
votes
2
answers
24
UGC NET CSE | June 2010 | Part 2 | Question: 27
What does the URL need to access documents ? I. Path name II. Host name III. DNS IV. Retrieval method V. Server port number $\text{I, II, III}$ $\text{I, III, V}$ $\text{I, II, IV}$ $\text{III, IV, V}$
What does the URL need to access documents ?I. Path nameII. Host nameIII. DNSIV. Retrieval methodV. Server port number$\text{I, II, III}$$\text{I, III, V}$$\text{I, II, I...
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Sep 15, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
+
–
0
votes
1
answer
25
UGC NET CSE | June 2010 | Part 2 | Question: 26
The ______ field is the SNMP PDV reports an error in a response message. Error index Error status Set request Agent index
The ______ field is the SNMP PDV reports an error in a response message.Error indexError statusSet requestAgent index
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Sep 15, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
network-protocols
+
–
1
votes
2
answers
26
UGC NET CSE | June 2010 | Part 2 | Question: 25
In a $B$ tree of order $5$, the following keys are inserted as follows : $7, 8, 1, 4, 13, 20, 2, 6$ and $5$ How many elements are present in the root of the tree ? $1$ $2$ $3$ $4$
In a $B$ tree of order $5$, the following keys are inserted as follows : $7, 8, 1, 4, 13, 20, 2, 6$ and $5$ How many elements are present in the root of the tree ?$1$ $2$...
makhdoom ghaya
4.6k
views
makhdoom ghaya
asked
Sep 15, 2016
DS
ugcnetcse-june2010-paper2
data-structures
b-and-bplus-trees
+
–
0
votes
3
answers
27
UGC NET CSE | June 2010 | Part 2 | Question: 24
A chained hash table has an array size of $100$. What is the maximum number of entries that can be placed in the table ? $100$ $200$ $10000$ There is no upper limit
A chained hash table has an array size of $100$. What is the maximum number of entries that can be placed in the table ?$100$$200$$10000$There is no upper limit
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Sep 15, 2016
DS
ugcnetcse-june2010-paper2
data-structures
hashing
+
–
2
votes
1
answer
28
UGC NET CSE | June 2010 | Part 2 | Question: 23
In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path counts as ! About $\log_{2} n$ About $2 \log_{2} n$ About $n \log_{2} n$ About $2n$
In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path counts as !About $\log_{2} n$About $2 \log_{2} n$About $n \log...
makhdoom ghaya
5.2k
views
makhdoom ghaya
asked
Sep 15, 2016
DS
ugcnetcse-june2010-paper2
data-structures
tree
+
–
0
votes
2
answers
29
UGC NET CSE | June 2010 | Part 2 | Question: 22
What is the most appropriate data structure to implement a priority queue ? Heap Circular array Linked list Binary tree
What is the most appropriate data structure to implement a priority queue ?HeapCircular arrayLinked listBinary tree
makhdoom ghaya
5.9k
views
makhdoom ghaya
asked
Sep 15, 2016
DS
ugcnetcse-june2010-paper2
data-structures
priority-queue
+
–
0
votes
2
answers
30
UGC NET CSE | June 2010 | Part 2 | Question: 21
If we have six stack operationspushing and popping each of $A, B$ and $C$-such that push $(A)$ must occur before push $(B)$ which must occur before push $(C)$, then $A, C, B$ is a possible order for the pop operations, since ... not be the order the pop operations are run, if we are to satisfy the requirements described above? $ABC$ $CBA$ $BAC$ $CAB$
If we have six stack operationspushing and popping each of $A, B$ and $C$-such that push $(A)$ must occur before push $(B)$ which must occur before push $(C)$, then $A, C...
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Sep 15, 2016
DS
ugcnetcse-june2010-paper2
data-structures
stack
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register