search
Log In

Recent questions tagged ugcnetjune2010ii

1 vote
1 answer
1
The PROJECT Command will create new table that has More fields than the original table More rows than original table Both (A) & (B) None of these
asked Sep 15, 2016 in Databases makhdoom ghaya 1.1k views
0 votes
1 answer
2
Which data management language component enabled the DBA to define the schema components ? DML Sub-schema DLL Schema DLL All of these
asked Sep 15, 2016 in Databases makhdoom ghaya 1.2k views
0 votes
1 answer
3
Match the following : \begin{array}{|l|l|l|l|L|L} \hline \text{a.} & \text{2 NF} & \text{i.} & \text{Transitive dependencies eliminated} \\ \hline \text{b.} & \text{3 NF} & \text{ii.} & \text{Multivalued attribute removed} \\ \hline \text{c.} & \text{4 NF} & \text{iii.} & \text{Contain no partial ... : a-i, b-iii, c-ii, d-iv a-ii, b-iii, c-iv, d-i a-iii, b-iv, c-i, d-ii a-iii, b-ii, c-iv, d-i
asked Sep 15, 2016 in Databases makhdoom ghaya 1.2k views
0 votes
2 answers
4
Generalization is _______ process. Top-down Bottom up Both (A) & (B) None of these
asked Sep 15, 2016 in Databases makhdoom ghaya 838 views
0 votes
3 answers
5
An entity instance is a single occurrence of an ______. Entity type Relationship type Entity and relationship type None of these
asked Sep 15, 2016 in Databases makhdoom ghaya 855 views
0 votes
1 answer
6
The data type created by the data abstraction process is called Class Structure Abstract data type User defined data type
asked Sep 15, 2016 in Programming makhdoom ghaya 559 views
0 votes
1 answer
7
Match the following : ... ii, e-iii a-i, b-v, c-ii, d-iii, d-iv a-v, b-i, c-ii, d-iii, e-iv a-v, b-iv, c-iii, d-i, e-ii
asked Sep 15, 2016 in Object Oriented Programming makhdoom ghaya 399 views
1 vote
1 answer
8
Member of a class specified as ______ are accessible only to method of the class. Private Public Protected Derive
asked Sep 15, 2016 in Object Oriented Programming makhdoom ghaya 1.6k views
0 votes
1 answer
9
What will be the output of the following c-code? void main () { char *p= "ayqm"; char c; c=++*p; printf ("%c" , c); } $a$ $c$ $b$ $q$
asked Sep 15, 2016 in Programming makhdoom ghaya 1.5k views
0 votes
1 answer
10
The statement print f (" % d", 10 ? 0 ? 5 : 1 : 12); will print $10$ $0$ $12$ $1$
asked Sep 15, 2016 in Programming and DS makhdoom ghaya 1.1k views
0 votes
1 answer
11
The function represented by the $\text{k}$-map given below is $A ⋅ B$ $AB + BC + CA$ $\overline{B \bigoplus C}$ $A ⋅ B ⋅ C$
asked Sep 15, 2016 in Digital Logic makhdoom ghaya 736 views
0 votes
1 answer
12
What is decimal equivalent of BCD $11011.1100$? $22.0$ $22.2$ $20.2$ $21.2$
asked Sep 15, 2016 in Digital Logic makhdoom ghaya 425 views
0 votes
1 answer
13
What is the transitive voltage for the voltage input of a CMOS operating from $10V$ supply ? $1V$ $2V$ $5V$ $10V$
asked Sep 15, 2016 in Digital Logic makhdoom ghaya 829 views
0 votes
1 answer
14
Advantage of synchronous sequential circuits over asynchronous ones is Faster operation Ease of avoiding problems due to hazard Lower hardware requirement Better noise immunity
asked Sep 15, 2016 in Digital Logic makhdoom ghaya 639 views
2 votes
2 answers
15
The logic expression for the output of the circuit shown in the figure is $\bar{A} \bar{C}+ \bar{B}\bar{C}+CD$ $A\bar{C}+B\bar{C}+\bar{C}D$ $ABC + \bar{C}\bar{D}$ $\bar{A}\bar{B}+\bar{B}\bar{C}+\bar{C}\bar{D}$
asked Sep 15, 2016 in Digital Logic makhdoom ghaya 843 views
1 vote
1 answer
16
For your ATM debit card, you have a $4$-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-$'t'$ to crack the code on an ATM terminal. Therefore $'t'$ is the secure-time for a customer to report in ... personal secret code. Reduce the processing speed of the ATM terminals to the half of their current speed. None of the above provides any improvement.
asked Sep 15, 2016 in Computer Networks makhdoom ghaya 512 views
0 votes
2 answers
17
$S_{1}$ : I teach algorithms and maths. $S_{2}$ : My professor teaches maths, electronics and computer science. $S_{3}$ : I have a student of maths. $S_{4}$ : Algorithm is a part of computer science. $S_{5}$ : Maths students know computer science. What would ... /relationships amongst the entities/actors as expressed in the sentences $S_{1}$ to $S_{5}$ above ? $2$ $3$ $4$ None of these
asked Sep 15, 2016 in DS makhdoom ghaya 433 views
0 votes
1 answer
18
"My Laughter Machine (MLM) recognizes the following strings : (i) $a$ (ii) $aba$ (iii) $abaabaaba$ (iv) $abaabaabaabaabaabaabaabaaba$ Using this as an information, how would you compare the following regular expressions ? (i) $(aba)^{3x}$ (ii) $a.(baa)3^{x}-1.ba$ ... $(ii)$ and $(iii)$ are not same. $(i), (ii)$ and $(iii)$ are different. $(i), (ii)$ and $(iii)$ are same.
asked Sep 14, 2016 in Theory of Computation makhdoom ghaya 563 views
0 votes
0 answers
19
'$R$ is a robot of $M$’ means $R$ can perform some of the tasks that otherwise $M$ would do and $R$ is unable to do anything else.Which of the following is the most appropriate representation to model this situation? None of these
asked Sep 14, 2016 in Data Mining and Warehousing makhdoom ghaya 624 views
0 votes
1 answer
20
"$x^{1}$ is a clone of $x$" means $x^{1}$ is identical to $x$ in terms of the physical attributes namely, height, weight and complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning is an ... is your impression about this statement ? The statement is true The statement is false The truth value of the statement cannot be computed None of these
asked Sep 14, 2016 in Set Theory & Algebra makhdoom ghaya 376 views
11 votes
1 answer
21
Semaphores synchronize critical resources to prevent deadlock synchronize critical resources to prevent contention are used to do I/O are used for memory management
asked Jun 10, 2016 in Operating System jothee 3.6k views
...