Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
gatecse
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by gatecse
1
votes
1
answer
81
NIELIT Scientist B 2020 November: 88
In which modulation discrete values of carrier frequencies is used to transmit binary data? Phase Shift Keying Amplitude Shift Keying Frequency Shift Keying Disk Shift Keying
In which modulation discrete values of carrier frequencies is used to transmit binary data?Phase Shift KeyingAmplitude Shift KeyingFrequency Shift KeyingDisk Shift Keying...
376
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
82
NIELIT Scientist B 2020 November: 89
$PI$ in $XML$ specification stands for ___________. priceless instruction processing instruction polymorphic inheritance primary instruction
$PI$ in $XML$ specification stands for ___________.priceless instructionprocessing instructionpolymorphic inheritanceprimary instruction
293
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
83
NIELIT Scientist B 2020 November: 90
Which type of linked list stores the address of the header node in the next field of the last node? Singly linked list Circular linked list Doubly linked list Hashed list
Which type of linked list stores the address of the header node in the next field of the last node?Singly linked listCircular linked listDoubly linked listHashed list
631
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
84
NIELIT Scientist B 2020 November: 91
What is the advantage of bubble sort over other sorting techniques? It is faster Consumes less memory Detects whether the input is already sorted All of the options
What is the advantage of bubble sort over other sorting techniques?It is fasterConsumes less memoryDetects whether the input is already sortedAll of the options
427
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
85
NIELIT Scientist B 2020 November: 92
Match the following: ... $\text{1-d, 2-b, 3-a, 4-c}$ $\text{1-c, 2-a, 3-b, 4-d}$
Match the following:$$\begin{array}{|l|l|l|l|} \hline (1) \text{Waterfall model} & (a) \text{Specifications can be developed} \\& \text{incrementally} \\\hline (2) \tex...
326
views
asked
Dec 9, 2020
IS&Software Engineering
nielit-scb-2020
is&software-engineering
match-the-following
non-gate
+
–
0
votes
1
answer
86
NIELIT Scientist B 2020 November: 93
$\text{58000 LOC}$ gaming software is developed with effort of $3$ person-year. What is the productivity of person-month? $\text{1.9 KLOC}$ $\text{1.6 KLOC}$ $\text{4.8 KLOC}$ $\text{4.2 KLOC}$
$\text{58000 LOC}$ gaming software is developed with effort of $3$ person-year. What is the productivity of person-month?$\text{1.9 KLOC}$$\text{1.6 KLOC}$$\text{4.8 KLOC...
875
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
87
NIELIT Scientist B 2020 November: 94
Which of the following tag is used intended for navigation in $HTML5?$ nav footer section navigation tag
Which of the following tag is used intended for navigation in $HTML5?$navfootersectionnavigation tag
296
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
88
NIELIT Scientist B 2020 November: 95
Which of the following is correct Content-Type header that a server side script should send for $SSE$ in $HTML5?$ Content-Type: text/event-stream Content-Type: text/application-stream Content-Type: text/data-stream None of the options
Which of the following is correct Content-Type header that a server side script should send for $SSE$ in $HTML5?$Content-Type: text/event-streamContent-Type: text/applica...
315
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
4
answers
89
NIELIT Scientist B 2020 November: 96
An instance of relational schema $R(A,B,C)$ has distinct values of $A$ including $NULL$ values. Which one of the following is true? $A$ is a candidate key $A$ is not a candidate key $A$ is a primary key Both “$A$ is a candidate key” and “$A$ is a primary key”
An instance of relational schema $R(A,B,C)$ has distinct values of $A$ including $NULL$ values. Which one of the following is true?$A$ is a candidate key$A$ is not a cand...
617
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
90
NIELIT Scientist B 2020 November: 97
If $x, y, z$ are Boolean variable then $(x+\overline y)(x \cdot \overline y+x\cdot z)(\overline x\cdot \overline z+\overline y)$ is equal to : $x\cdot\overline y$ $x\cdot\overline y+z$ $x\cdot \overline z$ none of the options
If $x, y, z$ are Boolean variable then $(x+\overline y)(x \cdot \overline y+x\cdot z)(\overline x\cdot \overline z+\overline y)$ is equal to :$x\cdot\overline y$$x\cdot\o...
314
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
91
NIELIT Scientist B 2020 November: 98
In the congestion avoidance algorithm, the size of the congestion window increases _________ until congestion is detected. Exponentially Additively Multiplicatively Suddenly
In the congestion avoidance algorithm, the size of the congestion window increases _________ until congestion is detected.ExponentiallyAdditivelyMultiplicativelySuddenly
427
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
92
NIELIT Scientist B 2020 November: 99
Limitations of the $XML$ Data Type are: It cannot be compared or sorted. This means an $XML$ data type cannot be used in a $\text{GROUP BY}$ statement It cannot be used as a key column in an index The value() method of the $XML$ data type returns a scalar value, so it can be specified anywhere where scalar values are allowed All of the options
Limitations of the $XML$ Data Type are:It cannot be compared or sorted. This means an $XML$ data type cannot be used in a $\text{GROUP BY}$ statementIt cannot be used as ...
326
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
93
NIELIT Scientist B 2020 November: 100
Consider the algorithm that solves problems of size $n$ by recursively solving two sub problems of size $n-1$ and then combining the solutions in constant time. Then the running time of the algorithm would be: $O(n)$ $O(\log n)$ $O(n\log n)$ $O(n^2)$
Consider the algorithm that solves problems of size $n$ by recursively solving two sub problems of size $n-1$ and then combining the solutions in constant time. Then the ...
1.2k
views
asked
Dec 9, 2020
Algorithms
nielit-scb-2020
time-complexity
+
–
1
votes
2
answers
94
NIELIT Scientist B 2020 November: 101
The program written for binary search, calculates the midpoint of the span as $\text{mid : =(Low+High)/2}$. The program works well if the number of elements in the list is small (about $32,000$) but it behaves abnormally when the number of elements is large. This can be ... $\text{mid :=(High-Low+1)/2}$ $\text{mid :=(High-Low)/2}$ $\text{mid :=(High+Low)/2}$
The program written for binary search, calculates the midpoint of the span as $\text{mid : =(Low+High)/2}$. The program works well if the number of elements in the list i...
502
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
2
answers
95
NIELIT Scientist B 2020 November: 102
_____________ has a feature of remote access through which a customer can access the data from anywhere and at any time with the help of internet connection. IaaS PaaS NaaS SaaS
_____________ has a feature of remote access through which a customer can access the data from anywhere and at any time with the help of internet connection.IaaSPaaSNaaSS...
401
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
96
NIELIT Scientist B 2020 November: 103
The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is: B-Tree File Hashed File Indexed File Sequential File
The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is:B-Tree FileHashed FileIndexed FileSequentia...
302
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
2
votes
1
answer
97
NIELIT Scientist B 2020 November: 104
Which table is used in $\text{MS DOS}$ for linked list allocation? $TLB$ Page Table $FAT$ Index Table
Which table is used in $\text{MS DOS}$ for linked list allocation?$TLB$Page Table$FAT$Index Table
412
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
98
NIELIT Scientist B 2020 November: 105
Consider the basic $COCOMO$ model where $E$ is the effort applied in person-months, $D$ is the development time in chronological months, $KLOC$ is the estimated number of delivered lines of code (in thousands) and $a_b, b_b, c_b,d_b$ ... $E=a_b\; exp(d_b), D=c_b(KLOC) \;exp(b_b)$
Consider the basic $COCOMO$ model where $E$ is the effort applied in person-months, $D$ is the development time in chronological months, $KLOC$ is the estimated number of...
317
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
2
answers
99
NIELIT Scientist B 2020 November: 106
Suppose we have to insert the following sequence of keys into an empty binary search tree: $\text{5, 7, 45, 60, 50, 23, 15, 54}$ What would be the height of binary search tree? $3$ $4$ $5$ $6$
Suppose we have to insert the following sequence of keys into an empty binary search tree:$\text{5, 7, 45, 60, 50, 23, 15, 54}$What would be the height of binary search t...
698
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
100
NIELIT Scientist B 2020 November: 107
Most NoSQL databases support automatic ___________ meaning that you get high availability and disaster recovery. Processing Scalability Replication All of the options
Most NoSQL databases support automatic ___________ meaning that you get high availability and disaster recovery.ProcessingScalabilityReplicationAll of the options
816
views
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
10
...
102
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register