Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by LeenSharma
1
votes
91
UGC NET CSE | December 2013 | Part 2 | Question: 24
For any B-tree of minimum degree t $\geq$ 2, every node other than the root must have at least ____ keys and every node can have at most ____ keys. t-1, 2t+1 t+1, 2t+1 t-1, 2t-1 t+1, 2t-1
For any B-tree of minimum degree t $\geq$ 2, every node other than the root must have at least ____ keys and every node can have at most ____ keys.t-1, 2t+1t+1, 2t+1t-1, ...
3.8k
views
answered
Jul 25, 2016
Algorithms
ugcnetcse-dec2013-paper2
algorithms
b-tree
+
–
0
votes
92
UGC NET CSE | December 2013 | Part 2 | Question: 23
______ is often used to prove the correctness of a recursive function. Diagnolization Communitivity Mathematical Induction Matrix Manipulation
______ is often used to prove the correctness of a recursive function.DiagnolizationCommunitivityMathematical InductionMatrix Manipulation
1.9k
views
answered
Jul 25, 2016
Others
ugcnetcse-dec2013-paper2
+
–
1
votes
93
UGC NET CSE | December 2013 | Part 2 | Question: 21
What is the value of the postfix expression a b c d + - * (where a=8, b=4, c=2 and d=5) $-\frac{3}{8}$ $-\frac{8}{3}$ 24 -24
What is the value of the postfix expression a b c d + - * (where a=8, b=4, c=2 and d=5)$-\frac{3}{8}$$-\frac{8}{3}$24-24
2.7k
views
answered
Jul 25, 2016
Programming in C
ugcnetcse-dec2013-paper2
evaluation-postfix
+
–
0
votes
94
UGC NET CSE | December 2013 | Part 2 | Question: 19
_____ allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. Overloading Inheritance Polymorphism Encapsulation
_____ allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members.OverloadingIn...
741
views
answered
Jul 25, 2016
Object Oriented Programming
ugcnetcse-dec2013-paper2
inheritance
+
–
0
votes
95
UGC NET CSE | December 2013 | Part 2 | Question: 18
Which of the following operators cannot be overloaded in C++? * += == : :
Which of the following operators cannot be overloaded in C++?*+===: :
785
views
answered
Jul 25, 2016
Object Oriented Programming
ugcnetcse-dec2013-paper2
programming-in-c
operator-overloading
+
–
1
votes
96
UGC NET CSE | December 2013 | Part 2 | Question: 14
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. Entity Constraints Rules Keys
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual ...
2.9k
views
answered
Jul 24, 2016
Databases
ugcnetcse-dec2013-paper2
databases
cardinality-ratio
+
–
1
votes
97
UGC NET CSE | December 2013 | Part 2 | Question: 4
The VLF and LF bauds use _____ propagation for communication Ground Sky Line of sight Space
The VLF and LF bauds use _____ propagation for communicationGroundSkyLine of sightSpace
3.2k
views
answered
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
unguided-media
+
–
1
votes
98
UGC NET CSE | December 2013 | Part 2 | Question: 1
When data and acknowledgement are sent in same frame, this is called as Piggy packing Piggy backing Back packing Good packing
When data and acknowledgement are sent in same frame, this is called as Piggy packingPiggy backingBack packingGood packing
3.8k
views
answered
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
osi-model
+
–
2
votes
99
Mathematical logic
Let p, q, and r be the propositions p : Grizzly bears have been seen in the area. q : Hiking is safe on the trail. r : Berries are ripe along the trail. Write these propositions using p, q, and r and logical connectives (including negations). ... it is necessary but not sufficient that berries not be ripe along the trail and for grizzly bears not to have been seen in the area.
Let p, q, and r be the propositionsp : Grizzly bears have been seen in the area.q : Hiking is safe on the trail.r : Berries are ripe along the trail. Write these proposit...
1.3k
views
answered
Jul 24, 2016
Mathematical Logic
propositional-logic
discrete-mathematics
engineering-mathematics
+
–
0
votes
100
UGC NET CSE | September 2013 | Part 3 | Question: 57
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with thePublic key of user APublic key of user BPrivate key of user APrivate key ...
2.4k
views
answered
Jul 24, 2016
Others
ugcnetcse-sep2013-paper3
cryptography
encryption-decryption
+
–
2
votes
101
UGC NET CSE | September 2013 | Part 3 | Question: 58
A _____ can forward or block packets based on the information in the network layer and transport layer header Proxy firewall Firewall Packet filter firewall Message digest firewall
A _____ can forward or block packets based on the information in the network layer and transport layer headerProxy firewallFirewallPacket filter firewallMessage digest fi...
2.9k
views
answered
Jul 24, 2016
Computer Networks
ugcnetcse-sep2013-paper3
computer-networks
firewall
+
–
2
votes
102
UGC NET CSE | September 2013 | Part 3 | Question: 49
Match the following: a. i. One to One Relationship b. ii. Relationship c. iii. Many to Many Relationship d. iv. Many to One Relationship a-iii, b-iv, c-ii, d-i a-iv, b-iii, c-ii, d-i a-ii, b-iii, c-iv, d-i a-iii, b-iv, c-i, d-ii
Match the following:a. i. One to One Relationshipb. ii. Relationshipc. iii. Many to Many Relationshipd. iv. Many to One Relationship a-iii, b-iv, c-ii, d-ia-iv, b-iii, c...
999
views
answered
Jul 24, 2016
Databases
ugcnetcse-sep2013-paper3
databases
er-diagram
match-the-following
easy
+
–
2
votes
103
UGC NET CSE | September 2013 | Part 3 | Question: 32
A given memory chip has 14 address and 8 data pins. It has the following number of locations. $2^8$ $2^{14}$ $2^6$ $2^{12}$
A given memory chip has 14 address and 8 data pins. It has the following number of locations.$2^8$$2^{14}$$2^6$$2^{12}$
8.0k
views
answered
Jul 24, 2016
CO and Architecture
ugcnetcse-sep2013-paper3
co-and-architecture
memory
+
–
5
votes
104
ACE-BOOKLET-VOL1-CHAPTER1 (questions #9 page #53)
Question 9 solution is given as
Question 9solution is given as
544
views
answered
Jul 22, 2016
Theory of Computation
ace-booklet
theory-of-computation
regular-expression
+
–
5
votes
105
Find the number of states required in the minimized DFA
Let L be the language over {a,b} and it contains all strings with following rules. 1. Every string starts with "a" 2. Every string contains "ab" 3. Every string ends with "b" Find the number of states required in the minimized DFA that accepts L.
Let L be the language over {a,b} and it contains all strings with following rules.1. Every string starts with "a"2. Every string contains "ab"3. Every string ends with "b...
820
views
answered
Jul 22, 2016
Theory of Computation
theory-of-computation
+
–
4
votes
106
How Many States required to construct equivalent DFA
L={am^n | n>=1,m>n} How Many States required to construct equivalent DFA?
L={am^n | n>=1,m>n}How Many States required to construct equivalent DFA?
1.1k
views
answered
Jul 22, 2016
Theory of Computation
theory-of-computation
+
–
2
votes
107
Can someone explain classfull classification of ip addresses in short ?
What Ip addresses do we actually use and what we do not ?
What Ip addresses do we actually use and what we do not ?
1.5k
views
answered
Jul 21, 2016
Computer Networks
computer-networks
ip-address
+
–
3
votes
108
DFA
1.3k
views
answered
Jul 21, 2016
0
votes
109
UGC NET CSE | September 2013 | Part 2 | Question: 43
Thoma’s-write rule is Two phase locking protocol Timestamp ordering protocol One phase locking protocol Sliding window protocol
Thoma’s-write rule isTwo phase locking protocolTimestamp ordering protocolOne phase locking protocolSliding window protocol
1.6k
views
answered
Jul 21, 2016
Databases
ugcnetsep2013ii
databases
transaction-and-concurrency
+
–
3
votes
110
UGC NET CSE | December 2014 | Part 2 | Question: 12
What does the following expression means ? char $∗(∗(∗ a\left[N\right]) ( )) ( )$; A pointer to a function returning array of n pointers to function returning character pointers. A function return ... function returning pointers to characters An array of n pointers to function returning pointers to functions returning pointers to characters.
What does the following expression means ?char $∗(∗(∗ a\left[N\right]) ( )) ( )$;A pointer to a function returning array of n pointers to function returning charact...
2.9k
views
answered
Jul 20, 2016
Programming in C
ugcnetcse-dec2014-paper2
programming-in-c
pointers
+
–
2
votes
111
UGC NET CSE | December 2014 | Part 2 | Question: 15
Which of the following differentiates between overloaded functions and overridden functions ? Overloading is a dynamic or runtime binding and overridden is a static or compile time binding. Overloading is a static or compile time ... class is called function overloading, while redefining a function in a friend class is called function overriding.
Which of the following differentiates between overloaded functions and overridden functions ? Overloading is a dynamic or runtime binding and overridden is a static or co...
4.7k
views
answered
Jul 20, 2016
Object Oriented Programming
ugcnetcse-dec2014-paper2
object-oriented-programming
+
–
1
votes
112
UGC NET CSE | December 2014 | Part 2 | Question: 16
Division operation is ideally suited to handle queries of the type : Customers who have no account in any of the branches in Delhi. Customers who have an account at all branches in Delhi. Customers who have an account in atleast one branch in Delhi. Customers who have only joint account in any one branch in Delhi
Division operation is ideally suited to handle queries of the type : Customers who have no account in any of the branches in Delhi. Customers who have an account at all b...
2.5k
views
answered
Jul 20, 2016
Databases
ugcnetcse-dec2014-paper2
databases
sql
+
–
3
votes
113
UGC NET CSE | December 2014 | Part 2 | Question: 18
What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagram Generalization Aggregation Specialization Adding suitable attributes
What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagramGeneralization Aggregation Specia...
4.7k
views
answered
Jul 20, 2016
Databases
ugcnetcse-dec2014-paper2
databases
er-diagram
+
–
2
votes
114
UGC NET CSE | December 2014 | Part 2 | Question: 13
Which of the following is not a member of class ? Static function Friend function Const function Virtual function
Which of the following is not a member of class ? Static functionFriend functionConst functionVirtual function
6.6k
views
answered
Jul 20, 2016
Object Oriented Programming
ugcnetcse-dec2014-paper2
object-oriented-programming
c++
+
–
4
votes
115
UGC NET CSE | December 2014 | Part 2 | Question: 20
Identify the minimal key for relational scheme $R(A, B, C, D, E)$ with functional dependencies $F = \left\{A \rightarrow B, B \rightarrow C, AC \rightarrow D\right\}$ $A$ $AE$ $BE$ $CE$
Identify the minimal key for relational scheme $R(A, B, C, D, E)$ with functional dependencies $F = \left\{A \rightarrow B, B \rightarrow C, AC \rightarrow D\right\}$ $A$...
4.4k
views
answered
Jul 20, 2016
Databases
ugcnetcse-dec2014-paper2
databases
database-normalization
+
–
2
votes
116
UGC NET CSE | September 2013 | Part 2 | Question: 23
Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation? AND, OR, NOT NAND, NOR EX-OR, EX-NOR None of the above
Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?AND, OR, NOTNAND, NOREX-OR, EX-NORNone of the...
5.8k
views
answered
Jul 20, 2016
Digital Logic
ugcnetsep2013ii
digital-logic
digital-circuits
+
–
4
votes
117
UGC NET CSE | September 2013 | Part 2 | Question: 22
A simple graph G with n vertices is connected if the graph has (n-1)(n-2)/2 edges more than (n-1) (n-2)/2 edges less than (n-1) (n-2)/2 edges $\Sigma_{i=1}^k C(n_i, 2)$ edges
A simple graph G with n vertices is connected if the graph has(n-1)(n-2)/2 edgesmore than (n-1) (n-2)/2 edgesless than (n-1) (n-2)/2 edges$\Sigma_{i=1}^k C(n_i, 2)$ edges...
10.5k
views
answered
Jul 20, 2016
Graph Theory
ugcnetsep2013ii
graph-theory
graph-connectivity
+
–
3
votes
118
UGC NET CSE | September 2013 | Part 2 | Question: 14
Regular expression for the language $L=w \in \{0,1\}* \mid w$ has no pair of consecutive zeros $\}$ is $(1+010)*$ $(01+10)*$ $(1+010)*(0+ \lambda)$ $(1+01)* (0+\lambda)$
Regular expression for the language $L=w \in \{0,1\}* \mid w$ has no pair of consecutive zeros $\}$ is$(1+010)*$$(01+10)*$$(1+010)*(0+ \lambda)$$(1+01)* (0+\lambda)$
1.3k
views
answered
Jul 20, 2016
Theory of Computation
ugcnetsep2013ii
theory-of-computation
regular-expression
+
–
4
votes
119
UGC NET CSE | September 2013 | Part 2 | Question: 8
Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that the graph is not connected is 2451 4950 4851 9900
Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that the graph is not connected is2451495048519900
10.6k
views
answered
Jul 20, 2016
Graph Theory
ugcnetsep2013ii
graph-theory
graph-connectivity
+
–
2
votes
120
UGC NET CSE | September 2013 | Part 2 | Question: 6
The count-to-infinity problem is associated with Flooding algorithm Hierarchical routing algorithm Distance vector routing algorithm Link state routing algorithm
The count-to-infinity problem is associated withFlooding algorithmHierarchical routing algorithmDistance vector routing algorithmLink state routing algorithm
2.2k
views
answered
Jul 20, 2016
Computer Networks
ugcnetsep2013ii
computer-networks
routing-algorithm
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
...
13
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register