Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2011-paper2
0
votes
2
answers
1
UGC NET CSE | June 2011 | Part 2 | Question: 50
Which is the most valuable electronic commerce to the individual customer in long run ? Business to Customer Business to Business Customer to Customer None of the above
Which is the most valuable electronic commerce to the individual customer in long run ?Business to CustomerBusiness to BusinessCustomer to CustomerNone of the above
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
e-technologies
e-commerce
+
–
0
votes
3
answers
2
UGC NET CSE | June 2011 | Part 2 | Question: 49
The principal electronic payment systems for electronic commerce is Credit Card Digital Wallet Electronic Cheque All of the above
The principal electronic payment systems for electronic commerce isCredit CardDigital WalletElectronic ChequeAll of the above
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
e-technologies
e-payment
+
–
2
votes
1
answer
3
UGC NET CSE | June 2011 | Part 2 | Question: 48
"M-Commerce" refers to A myth which does not exist in reality The ability of business to reach potential customers wherever they are The ability to have large capacity of memory storage dealing trade and commerce None of the above
"M-Commerce" refers toA myth which does not exist in realityThe ability of business to reach potential customers wherever they areThe ability to have large capacity of me...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
e-technologies
+
–
1
votes
2
answers
4
UGC NET CSE | June 2011 | Part 2 | Question: 47
Virtual memory is Related to virtual reality A form of ROM A form of RAM None of the above
Virtual memory isRelated to virtual realityA form of ROMA form of RAMNone of the above
makhdoom ghaya
1.3k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
co-and-architecture
virtual-memory
+
–
1
votes
2
answers
5
UGC NET CSE | June 2011 | Part 2 | Question: 46
Data warehousing refers to Storing data offline at a separate site Backing up data regularly Is related to data mining Uses tape as opposed to disk
Data warehousing refers toStoring data offline at a separate siteBacking up data regularlyIs related to data miningUses tape as opposed to disk
makhdoom ghaya
1.4k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
data-warehousing
+
–
1
votes
1
answer
6
UGC NET CSE | June 2011 | Part 2 | Question: 45
Many causes of the software crisis can be traced to mythology based on Management Myths Customer Myths Practitioner Myths All of the above
Many causes of the software crisis can be traced to mythology based onManagement MythsCustomer MythsPractitioner MythsAll of the above
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
management-information-system
+
–
1
votes
1
answer
7
UGC NET CSE | June 2011 | Part 2 | Question: 44
Which of these are the 5 generic software engineering framework activities ? Communication, planning, modelling, construction, deployment Communication, risk management, measurement, production, reviewing Analysis, designing, programming, Debugging, maintenance Analysis, planning, designing, programming, testing
Which of these are the 5 generic software engineering framework activities ?Communication, planning, modelling, construction, deploymentCommunication, risk management, me...
makhdoom ghaya
6.5k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
is&software-engineering
software-engineering-framework
+
–
1
votes
1
answer
8
UGC NET CSE | June 2011 | Part 2 | Question: 43
By means of a data flow diagram, the analyst can detect Task duplication Unnecessary delays Task overlapping All of the above
By means of a data flow diagram, the analyst can detectTask duplicationUnnecessary delaysTask overlappingAll of the above
makhdoom ghaya
2.2k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
is&software-engineering
data-flow-diagram
+
–
1
votes
3
answers
9
UGC NET CSE | June 2011 | Part 2 | Question: 42
What is the first stage in program development ? Specification and design System Analysis Testing None of the above
What is the first stage in program development ?Specification and designSystem AnalysisTestingNone of the above
makhdoom ghaya
2.8k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
is&software-engineering
software-development-life-cycle-models
+
–
1
votes
3
answers
10
UGC NET CSE | June 2011 | Part 2 | Question: 41
Which one of the items listed below is not one of the software engineering layers ? Process Manufacturing Method Tools
Which one of the items listed below is not one of the software engineering layers ?ProcessManufacturingMethodTools
makhdoom ghaya
4.7k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
is&software-engineering
+
–
0
votes
0
answers
11
UGC NET CSE | June 2011 | Part 2 | Question: 40
Which command allows you to view your file $24$ lines at a time ? More Cat Pg None of the above
Which command allows you to view your file $24$ lines at a time ?MoreCatPgNone of the above
makhdoom ghaya
692
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
unix
linux
+
–
1
votes
2
answers
12
UGC NET CSE | June 2011 | Part 2 | Question: 39
How many states can a process be in ? $3$ $4$ $2$ $5$
How many states can a process be in ?$3$$4$$2$ $5$
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
operating-system
process-scheduling
+
–
2
votes
1
answer
13
UGC NET CSE | June 2011 | Part 2 | Question: 38
A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as Semaphore Mutual exclusion Multiprogramming Message passing
A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is kn...
makhdoom ghaya
903
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
operating-system
process-scheduling
+
–
1
votes
1
answer
14
UGC NET CSE | June 2011 | Part 2 | Question: 37
A file organization component VSAM file is Relative records data set Keyed sequential data set Entry sequential data set All of the above
A file organization component VSAM file isRelative records data setKeyed sequential data setEntry sequential data setAll of the above
makhdoom ghaya
975
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
operating-system
file-system
+
–
0
votes
1
answer
15
UGC NET CSE | June 2011 | Part 2 | Question: 36
Block or Buffer caches are used to Improve disk performance Handle interrupts Increase the capacity of main memory Speed up main memory Read operations
Block or Buffer caches are used toImprove disk performanceHandle interruptsIncrease the capacity of main memorySpeed up main memory Read operations
makhdoom ghaya
810
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
operating-system
disk
+
–
4
votes
1
answer
16
UGC NET CSE | June 2011 | Part 2 | Question: 35
Which of the following can be accessed by transfer vector approach of linking ? External data segments External subroutine Data located in other procedure All of the above
Which of the following can be accessed by transfer vector approach of linking ?External data segmentsExternal subroutineData located in other procedureAll of the above
makhdoom ghaya
1.7k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
operating-system
linker
+
–
0
votes
1
answer
17
UGC NET CSE | June 2011 | Part 2 | Question: 34
In which way(s) a macroprocessor for assembly language can be implemented? Independent two-pass processor Independent one-pass processor Expand macrocalls and substitute arguments All of the above
In which way(s) a macroprocessor for assembly language can be implemented?Independent two-pass processorIndependent one-pass processorExpand macrocalls and substitute arg...
makhdoom ghaya
993
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
co-and-architecture
microprocessors
assembly
+
–
1
votes
1
answer
18
UGC NET CSE | June 2011 | Part 2 | Question: 33
Which of the following permanent database that has an entry for each terminal symbol ? Literal table Identifier table Terminal table Source table
Which of the following permanent database that has an entry for each terminal symbol ?Literal tableIdentifier tableTerminal tableSource table
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
databases
+
–
1
votes
2
answers
19
UGC NET CSE | June 2011 | Part 2 | Question: 32
A special software that is used to create a job queue is called Drive Spooler Interpreter Linkage editor
A special software that is used to create a job queue is calledDriveSpoolerInterpreterLinkage editor
makhdoom ghaya
628
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
operating-system
job
+
–
1
votes
1
answer
20
UGC NET CSE | June 2011 | Part 2 | Question: 31
Object modules generated by assembler that contains unresolved external references are resolved for two or more object module by a/an Operating system Loader Linker Compiler
Object modules generated by assembler that contains unresolved external references are resolved for two or more object module by a/anOperating systemLoaderLinkerCompiler
makhdoom ghaya
1.5k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
operating-system
linker
+
–
0
votes
3
answers
21
UGC NET CSE | June 2011 | Part 2 | Question: 30
Which of the following switching techniques is most suitable for interactive traffic ? Circuit switching Message switching Packet switching All of the above
Which of the following switching techniques is most suitable for interactive traffic ?Circuit switchingMessage switchingPacket switchingAll of the above
makhdoom ghaya
2.6k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
computer-networks
network-switching
+
–
1
votes
1
answer
22
UGC NET CSE | June 2011 | Part 2 | Question: 29
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ? Communication software Error detection protocols Link access procedure (LAP) Telecommunications
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?Communicatio...
makhdoom ghaya
1.2k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
computer-networks
+
–
0
votes
1
answer
23
UGC NET CSE | June 2011 | Part 2 | Question: 28
Consider the following statement : (i) The bandwidth of the A.M., wave depends on the band width of the modulating signal. (ii) The bandwidth of the A.M., wave depends on the modulation index. (iii) The bandwidth of the F.M, wave for ... of the carrier. Of these statements the correct statements are (i, ii) (i, iii) (ii, iii) All of the above
Consider the following statement :(i) The bandwidth of the A.M., wave depends on the band width of the modulating signal.(ii) The bandwidth of the A.M., wave depends on t...
makhdoom ghaya
1.4k
views
makhdoom ghaya
asked
Aug 30, 2016
Others
ugcnetcse-june2011-paper2
computer-networks
+
–
1
votes
2
answers
24
UGC NET CSE | June 2011 | Part 2 | Question: 27
If carrier modulated by a digital bit stream, has one one of the possible phase of $0, 90, 180$ and $270$ degrees, then modulation called BPSK QPSK QAM MSK
If carrier modulated by a digital bit stream, has one one of the possible phase of $0, 90, 180$ and $270$ degrees, then modulation calledBPSKQPSKQAMMSK
makhdoom ghaya
2.2k
views
makhdoom ghaya
asked
Aug 24, 2016
Unknown Category
ugcnetcse-june2011-paper2
computer-networks
physical-layer
+
–
1
votes
1
answer
25
UGC NET CSE | June 2011 | Part 2 | Question: 26
A comparison of frequency division and time division multiplexing system shows that $FDM$ requires a lower bandwidth, but $TDM$ has greater noise immunity. $FDM$ has greater noise immunity and requires lower bandwidth than $TDM$. $FDM$ ... , while $TDM$ has greater noise immunity. $FDM$ requires more multiplex while $TDM$ requires band pass filter.
A comparison of frequency division and time division multiplexing system shows that$FDM$ requires a lower bandwidth, but $TDM$ has greater noise immunity.$FDM$ has greate...
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Aug 24, 2016
Unknown Category
ugcnetcse-june2011-paper2
computer-networks
multiplexing
+
–
2
votes
2
answers
26
UGC NET CSE | June 2011 | Part 2 | Question: 25
When the priority queue is represented by max heap, the insertion and deletion of an element can be performed in (queue containing $n$ elements) $\theta(n)$ and $\theta(1)$ respectively $\theta(n)$ and $\theta(n)$ respectively $\theta(1)$ and $\theta(1)$ respectively None of the above
When the priority queue is represented by max heap, the insertion and deletion of an element can be performed in (queue containing $n$ elements)$\theta(n)$ and $\theta(1)...
makhdoom ghaya
2.4k
views
makhdoom ghaya
asked
Aug 24, 2016
Others
ugcnetcse-june2011-paper2
data-structures
queue
binary-heap
+
–
4
votes
1
answer
27
UGC NET CSE | June 2011 | Part 2 | Question: 24
Consider a hash table of size $m = 10000$ and the hash function $ h(k) = \lfloor m (KA \bmod 1) ' \rfloor$ for $A= \frac{(\sqrt{5}-1}{2}$ . The location to the key $k = 123456$ is 46 47 41 43
Consider a hash table of size $m = 10000$ and the hash function $ h(k) = \lfloor m (KA \bmod 1) ' \rfloor$ for $A= \frac{(\sqrt{5}-1}{2}$ . The location to the key $k = ...
makhdoom ghaya
4.3k
views
makhdoom ghaya
asked
Aug 24, 2016
Others
ugcnetcse-june2011-paper2
data-structures
hashing
+
–
6
votes
3
answers
28
UGC NET CSE | June 2011 | Part 2 | Question: 23
The number of disk accesses performed by insertion operation in B-tree of height $h$ is $0(1)$ $0(1gh)$ $0(h)$ None of these
The number of disk accesses performed by insertion operation in B-tree of height $h$ is$0(1)$$0(1gh)$$0(h)$None of these
makhdoom ghaya
1.7k
views
makhdoom ghaya
asked
Aug 23, 2016
Others
ugcnetcse-june2011-paper2
operating-system
disk-scheduling
+
–
4
votes
2
answers
29
UGC NET CSE | June 2011 | Part 2 | Question: 22
Given a binary tree whose inorder and preorder traversal are given by Inorder : EICFBGDJHK Preorder : BCEIFDGHJK The post order traversal of the above binary tree is I E F C G J K H D B I E F C J G K H D B I E F C G K J H D B I E F C G J K D B H
Given a binary tree whose inorder and preorder traversal are given byInorder : EICFBGDJHKPreorder : BCEIFDGHJKThe post order traversal of the above binary tree isI E F C ...
makhdoom ghaya
4.9k
views
makhdoom ghaya
asked
Aug 23, 2016
Others
ugcnetcse-june2011-paper2
algorithms
binary-tree
+
–
3
votes
2
answers
30
UGC NET CSE | June 2011 | Part 2 | Question: 21
The number of different trees with $8$ nodes is 256 255 248 None of these
The number of different trees with $8$ nodes is256255248None of these
makhdoom ghaya
3.1k
views
makhdoom ghaya
asked
Aug 23, 2016
Others
ugcnetcse-june2011-paper2
algorithms
tree
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register