Recent questions tagged uttarakhand-asst-prof-2018

1 votes
1 answer
31
A group technique that may be used during requirement elicitation to understand the requirements isSystem prototypingSoftware reengineeringBrain stormingSystem designing
2 votes
2 answers
32
Which of the following is the most important feature of spiral model?Quality managementPerformance managementEfficiency managementRisk management
0 votes
1 answer
33
SRS stands forSoftware Requirement SpecificationSystem Requirement SpecificationSystematic Requirements SpecificationNone of the above
1 votes
1 answer
35
1 votes
2 answers
37
Which of the following problem cannot be solved without recursion?Tower of HanoiFibonacci seriesTree TraversalNone of the above
0 votes
1 answer
38
If there is a graph such that there is a unique path between any pair of vertices. The graph is a ________MeshGridTreeBipartite graph
0 votes
1 answer
40
The solution that satisfies all constraints of the given problem and either maximizes or minimizes a given objective function is called ________ solution.greedyfeasibleop...
0 votes
1 answer
41
Which of the following is a solution of mobile IP problem?Care of addressCarefree addressDon't care addressNone of the above
0 votes
2 answers
42
0 votes
2 answers
44
A jam signal sent through a network meansThe network traffic is too congestedThere has been a data collisionIt is time to goThe printer's paper feeder is jammed
0 votes
2 answers
45
Bit stuffing is used toPad insufficient informationDistinguish beginning and ending flags from informationConvert 8 bit words into 16 bit wordsFill a data turkey
0 votes
1 answer
46
The maximum data rate that a medium of 3 KHz and signal to noise ratio of 30 dB is roughly 10 kbps 100 kbps 3 kbps 30 kbps
0 votes
2 answers
47
The ________ information is used to limit the amount of recovery operations to be done following a system crash resulting in the lose of volatile storage Log Data file Ch...
0 votes
1 answer
48
0 votes
2 answers
49
Which of the following normal form is based on the concept of full functional dependency on each candidate key of the relation? 1NF 2NF 3NFNone of the above
0 votes
4 answers
50
Which of the following operation of relational algebra, selects certain columns from the table and discards the other columns?SELECTPROJECTDIVISIONNone of the above
0 votes
1 answer
51
In a sequential file records are maintained in the logical sequence of theirprimary key valuestorage locationprimary and secondary key valueNone of the above
0 votes
1 answer
52
0 votes
1 answer
53
Choose the incorrect statement Shell scripts can accept arguments Shell scripts are interpretedShell is a programming languageShell scripts are compiled
0 votes
1 answer
54
Mutual exclusion problem occursbetween two disjoint processes that do not interactamong processes that share resourcesamong processes that do not use the same resource No...
0 votes
1 answer
55
Suppose that a process is in "BLOCKED" state waiting for some I/O service, when the service is completed, it goes toReady stateRunning stateTerminated stateSuspended stat...
1 votes
2 answers
56
Which of the following scheduling algorithms gives minimum average waiting time?FCFSSJFRound RobinPriority
0 votes
1 answer
57
1 votes
1 answer
58
The command cat x in unixis invalidcreates a file x and displays an error messagecreates a file x and waits for the user to give input from the keyboardnone of the above...
0 votes
1 answer
59
In which of the following records are maintained in the logical sequence of their primary key values?Index sequential fileSequential fileRelative fileDirect file
0 votes
1 answer
60
Which of the following is not used for hash function?Mid-square methodDivision methodFolding methodProbe method