# Recent questions tagged ugcnetjune2011ii

1
Which is the most valuable electronic commerce to the individual customer in long run ? Business to Customer Business to Business Customer to Customer None of the above
2
The principal electronic payment systems for electronic commerce is Credit Card Digital Wallet Electronic Cheque All of the above
3
"M-Commerce" refers to A myth which does not exist in reality The ability of business to reach potential customers wherever they are The ability to have large capacity of memory storage dealing trade and commerce None of the above
1 vote
4
Virtual memory is Related to virtual reality A form of ROM A form of RAM None of the above
1 vote
5
Data warehousing refers to Storing data offline at a separate site Backing up data regularly Is related to data mining Uses tape as opposed to disk
1 vote
6
Many causes of the software crisis can be traced to mythology based on Management Myths Customer Myths Practitioner Myths All of the above
1 vote
7
Which of these are the 5 generic software engineering framework activities ? Communication, planning, modelling, construction, deployment Communication, risk management, measurement, production, reviewing Analysis, designing, programming, Debugging, maintenance Analysis, planning, designing, programming, testing
1 vote
8
By means of a data flow diagram, the analyst can detect Task duplication Unnecessary delays Task overlapping All of the above
1 vote
9
What is the first stage in program development ? Specification and design System Analysis Testing None of the above
1 vote
10
Which one of the items listed below is not one of the software engineering layers ? Process Manufacturing Method Tools
11
Which command allows you to view your file $24$ lines at a time ? More Cat Pg None of the above
1 vote
12
How many states can a process be in ? $3$ $4$ $2$ $5$
13
A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as Semaphore Mutual exclusion Multiprogramming Message passing
1 vote
14
A file organization component VSAM file is Relative records data set Keyed sequential data set Entry sequential data set All of the above
15
Block or Buffer caches are used to Improve disk performance Handle interrupts Increase the capacity of main memory Speed up main memory Read operations
16
Which of the following can be accessed by transfer vector approach of linking ? External data segments External subroutine Data located in other procedure All of the above
17
In which way(s) a macroprocessor for assembly language can be implemented? Independent two-pass processor Independent one-pass processor Expand macrocalls and substitute arguments All of the above
1 vote
18
Which of the following permanent database that has an entry for each terminal symbol ? Literal table Identifier table Terminal table Source table
1 vote
19
A special software that is used to create a job queue is called Drive Spooler Interpreter Linkage editor
1 vote
20
Object modules generated by assembler that contains unresolved external references are resolved for two or more object module by a/an Operating system Loader Linker Compiler
21
Which of the following switching techniques is most suitable for interactive traffic ? Circuit switching Message switching Packet switching All of the above
1 vote
22
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ? Communication software Error detection protocols Link access procedure (LAP) Telecommunications
23
Consider the following statement : (i) The bandwidth of the A.M., wave depends on the band width of the modulating signal. (ii) The bandwidth of the A.M., wave depends on the modulation index. (iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude of the carrier. Of these statements the correct statements are (i, ii) (i, iii) (ii, iii) All of the above
1 vote
24
If carrier modulated by a digital bit stream, has one one of the possible phase of $0, 90, 180$ and $270$ degrees, then modulation called BPSK QPSK QAM MSK
1 vote
25
A comparison of frequency division and time division multiplexing system shows that $FDM$ requires a lower bandwidth, but $TDM$ has greater noise immunity. $FDM$ has greater noise immunity and requires lower bandwidth than $TDM$. $FDM$ requires channel synchronization, while $TDM$ has greater noise immunity. $FDM$ requires more multiplex while $TDM$ requires band pass filter.
1 vote
26
When the priority queue is represented by max heap, the insertion and deletion of an element can be performed in (queue containing $n$ elements) $\theta(n)$ and $\theta(1)$ respectively $\theta(n)$ and $\theta(n)$ respectively $\theta(1)$ and $\theta(1)$ respectively None of the above
27
Consider a hash table of size $m = 10000$ and the hash function $h(k) = \lfloor m (KA \bmod 1) ' \rfloor$ for $A= \frac{(\sqrt{5}-1}{2}$ . The location to the key $k = 123456$ is 46 47 41 43
The number of disk accesses performed by insertion operation in B-tree of height $h$ is $0(1)$ $0(1gh)$ $0(h)$ None of these
The number of different trees with $8$ nodes is 256 255 248 None of these