search
Log In

Recent questions tagged ugcnetjune2012ii

3 votes
2 answers
1
To represent hierarchical relationship between elements, which data structure is suitable? Dequeue Priority Tree All of the above
asked Jul 5, 2016 in DS jothee 1.5k views
2 votes
2 answers
2
Which of the following data structure is linear type? Strings Lists Queues All of the above
asked Jul 5, 2016 in DS jothee 694 views
2 votes
1 answer
3
Pipelining strategy is called implement instruction execution instruction prefetch instruction decoding instruction manipulation
asked Jul 5, 2016 in CO and Architecture jothee 2.5k views
2 votes
2 answers
4
Where does a computer add and compare data? Hard disk Floppy disk CPU chip Memory chip
asked Jul 5, 2016 in CO and Architecture jothee 985 views
2 votes
1 answer
5
A complete micro computer system consists of Microprocessor Memory Peripheral equipment All of the above
asked Jul 5, 2016 in CO and Architecture jothee 552 views
2 votes
1 answer
6
_____ is a satellite based tracking system that enables the determination of person’s position Bluetooth WAP Short Message Service Global Positioning System
asked Jul 5, 2016 in Computer Networks jothee 709 views
3 votes
1 answer
7
_______ is not an E-Commerce application House banking Buying stocks Conducting an auction Evaluating an employee
asked Jul 5, 2016 in Web Technologies jothee 535 views
2 votes
1 answer
8
Reliability of software is directly dependent on quality of the design number of errors present software engineers experience user requirement
asked Jul 5, 2016 in IS&Software Engineering jothee 1.6k views
2 votes
1 answer
9
Identify the incorrect statement: The overall strategy drives the E-Commerce data warehousing strategy Data warehousing in an E-Commerce environment should be done in classical manner E-Commerce opens up and entirely new world web server E-Commerce security threats can be grouped into three major categories
asked Jul 5, 2016 in Web Technologies jothee 778 views
3 votes
4 answers
10
What is the routing algorithm used by RIP and IGRP? OSPF Link-state Dynamic Dijikstra vector
asked Jul 5, 2016 in Computer Networks jothee 2.1k views
4 votes
1 answer
11
Consider the following statements: Recursive languages are closed under complementation Recursively enumerable languages are closed under union Recursively enumerable languages are closed under complementation Which of the above statements are true? I only I and II I and III II and III
asked Jul 5, 2016 in Theory of Computation jothee 761 views
2 votes
1 answer
12
For the transmission of the signal. Bluetooth wireless technology uses time division multiplexing frequency division multiplexing time division duplex frequency division duplex
asked Jul 5, 2016 in Computer Networks jothee 1.5k views
2 votes
2 answers
13
printf(“%c”, 100); prints 100 prints ASCII equivalent of 100 prints garbage None of the above
asked Jul 5, 2016 in Programming jothee 1.3k views
3 votes
1 answer
14
Interrupts which are initiated by an instruction are Internal External Hardware Software
asked Jul 5, 2016 in CO and Architecture jothee 2k views
2 votes
1 answer
15
Which of the following logic families is well suited for high-speed operations? TTL ECL MOS CMOS
asked Jul 5, 2016 in Integrated Circuits jothee 706 views
4 votes
2 answers
16
If an integer needs two bytes of storage, then the maximum value of signed integer is $2^{16}-1$ $2^{15}-1$ $2^{16}$ $2^{15}$
asked Jul 5, 2016 in Digital Logic jothee 2.7k views
3 votes
1 answer
17
Checksum used along with each packet computes the sum of the data, where data is treated as a sequence of Integer Character Real numbers Bits
asked Jul 5, 2016 in Computer Networks jothee 1.2k views
2 votes
2 answers
18
Consider the following page trace: 4,3,2,1,4,3,5,4,3,2,1,5 Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m=4 will be 8 9 10 12
asked Jul 5, 2016 in Operating System jothee 2.1k views
4 votes
3 answers
19
Resources are allocated to the process on non-sharable basis is mutual exclusion hold and wait no pre-emption circular wait
asked Jul 5, 2016 in Operating System jothee 1.9k views
4 votes
4 answers
20
Pre-emptive scheduling is the strategy of temporarily suspending a running process before the CPU time slice expires to allow starving processes to run when it requires I/O to avoid collision
asked Jul 5, 2016 in Operating System jothee 3.2k views
2 votes
1 answer
21
The Inorder traversal of the tree will yield a sorted listing of elements of tree in Binary tree Binary search tree Heaps None of the above
asked Jul 5, 2016 in DS jothee 1.6k views
1 vote
2 answers
22
Which of the following metric does not depend on the programming language used? Line of code Function count Member of token All of the above
asked Jul 5, 2016 in IS&Software Engineering jothee 1.2k views
1 vote
2 answers
23
In a function oriented design, we minimize cohesion and maximize coupling maximize cohesion and minimize coupling maximize cohesion and maximize coupling minimize cohesion and minimize coupling
asked Jul 5, 2016 in IS&Software Engineering jothee 846 views
1 vote
2 answers
24
If a process is under statistical control, then it is Maintainable Measurable Predictable Verifiable
asked Jul 5, 2016 in IS&Software Engineering jothee 1.2k views
1 vote
3 answers
25
Validation means are we building the product right are we building the right product verification of fields None of the above
asked Jul 5, 2016 in IS&Software Engineering jothee 709 views
1 vote
2 answers
26
Key process areas of CMM level 4 are also classified by a process which is CMM level 2 CMM level 3 CMM level 5 All of the above
asked Jul 5, 2016 in IS&Software Engineering jothee 1.4k views
1 vote
1 answer
27
Main aim of software engineering is to produce program software within budget software within budget in the given schedule
asked Jul 5, 2016 in IS&Software Engineering jothee 919 views
2 votes
1 answer
28
The station to hub distance in which it is 2000 meters 100 Base-T$_X$ 100 Base-F$_X$ 100 Base-T$_4$ 100 Base-T$_1$
asked Jul 5, 2016 in Computer Networks jothee 1.9k views
3 votes
1 answer
29
Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e., modulation rate) 2400 bauds 1200 bauds 4800 bauds 9600 bauds
asked Jul 5, 2016 in Digital Signal Processing jothee 2.1k views
3 votes
3 answers
30
In which routing method do all the routers have a common database? Distance vector Link state Link vector Dijikstra method
asked Jul 5, 2016 in Computer Networks jothee 2.1k views
...