Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
mahesh13
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by mahesh13
0
votes
1
UGC NET CSE | December 2018 | Part 2 | Question: 64
Suppose a cloud contains software stack such as Operating systems, Application softwares, etc. This model is referred as ____ model $SaaS$ $PaaS$ $IaaS$ $MaaS$
Suppose a cloud contains software stack such as Operating systems, Application softwares, etc. This model is referred as ____ model$SaaS$$PaaS$$IaaS$$MaaS$
1.9k
views
answered
Jan 31, 2019
Cloud Computing
ugcnetcse-dec2018-paper2
cloud-computing
+
–
0
votes
2
UGC NET CSE | December 2018 | Part 2 | Question: 59
Which of the following is not one of the principles of agile software development method? Customer involvement Embrace change Incremental delivery Following the plan
Which of the following is not one of the principles of agile software development method?Customer involvementEmbrace changeIncremental deliveryFollowing the plan
5.8k
views
answered
Jan 28, 2019
Unknown Category
ugcnetcse-dec2018-paper2
+
–
3
votes
3
UGC NET CSE | December 2018 | Part 2 | Question: 57
A legacy software system has $940$ modules. The latest release required that $90$ of these modules be changed. In addition, $40$ new modules were added and $12$ old modules were removed. Compute the software maturity index for the system. $0.849$ $0.524$ $0.725$ $0.923$
A legacy software system has $940$ modules. The latest release required that $90$ of these modules be changed. In addition, $40$ new modules were added and $12$ old modul...
3.3k
views
answered
Jan 28, 2019
IS&Software Engineering
ugcnetcse-dec2018-paper2
+
–
0
votes
4
UGC NET CSE | December 2018 | Part 2 | Question: 56
Consider the following method: int f(int m, int n, boolean x, boolean y) { int res=0; if (m<0) {res=n-m;} else if (x || y) { res=-1; if(n==m){res=1;} } else {res=n;} return res; } /*end of f */ If $P$ is the minimum number of tests ... number of tests to achieve full branch coverage for $f()$, then $(P,Q)$ = $(3, 4)$ $(4,3)$ $(2,3)$ $(3,2)$
Consider the following method:int f(int m, int n, boolean x, boolean y) { int res=0; if (m<0) {res=n-m;} else if (x || y) { res=-1; if(n==m){res=1;} } else {res=n;} retur...
5.0k
views
answered
Jan 28, 2019
Unknown Category
ugcnetcse-dec2018-paper2
+
–
0
votes
5
UGC NET CSE | December 2018 | Part 2 | Question: 53
Software products need perfective maintenance for which of the following reasons? To rectify bugs observed while the system is in use When the customers need the product to run on new platforms To support new features that users want it to support To overcome wear and tear caused by the repeated use of the software
Software products need perfective maintenance for which of the following reasons?To rectify bugs observed while the system is in useWhen the customers need the product to...
2.6k
views
answered
Jan 28, 2019
Unknown Category
ugcnetcse-dec2018-paper2
+
–
0
votes
6
UGC NET CSE | December 2018 | Part 2 | Question: 52
The Software Requirement Specification $(SRS)$ is said to be _____ if and only if no subset of individual requirements described in it conflict with each other. Correct Consistent Unambiguous Verifiable
The Software Requirement Specification $(SRS)$ is said to be _____ if and only if no subset of individual requirements described in it conflict with each other.CorrectCon...
2.0k
views
answered
Jan 28, 2019
Unknown Category
ugcnetcse-dec2018-paper2
+
–
1
votes
7
UGC NET CSE | December 2018 | Part 2 | Question: 41
If the frame buffer has $10$-bits per pixel and $8$-bits are allocated for each of the $R, G$, and $B$ components, then what would be the size of the color lookup table (LUT)? $(2^8+2^9)$ bytes $(2^{10}+2^8)$ bytes $(2^{10}+2^{24})$ bytes $(2^{10}+2^{11})$ bytes
If the frame buffer has $10$-bits per pixel and $8$-bits are allocated for each of the $R, G$, and $B$ components, then what would be the size of the color lookup table (...
3.7k
views
answered
Jan 27, 2019
Unknown Category
ugcnetcse-dec2018-paper2
+
–
0
votes
8
UGC NET CSE | December 2018 | Part 2 | Question: 34
Consider the following two languages : $L_1 = \{ x \mid \text{ for some y with } \mid y \mid = 2^{\mid x \mid} , xy \in \text{ L and L is regular language} \}$ ... $L_2$ is regular language Both $L_1$ and $L_2$ are regular languages Both $L_1$ and $L_2$ are not regular languages
Consider the following two languages :$L_1 = \{ x \mid \text{ for some y with } \mid y \mid = 2^{\mid x \mid} , xy \in \text{ L and L is regular language} \}$$L_2=\{ x \m...
3.0k
views
answered
Jan 27, 2019
Theory of Computation
ugcnetcse-dec2018-paper2
theory-of-computation
+
–
0
votes
9
UGC NET CSE | July 2018 | Part 2 | Question: 67
A many-to-one relationship exists between entity sets $r_1$ and $r_2$. How will it be represented using functional dependencies if $Pk(r)$ denotes the primary key attribute of relation $r$? $Pk(r_1) \rightarrow Pk(r_2)$ ... $Pk(r_2) \rightarrow Pk(r_1) \text{ or } Pk(r_1) \rightarrow Pk(r_2)$
A many-to-one relationship exists between entity sets $r_1$ and $r_2$. How will it be represented using functional dependencies if $Pk(r)$ denotes the primary key attribu...
1.1k
views
answered
Nov 24, 2018
Databases
ugcnetcse-july2018-paper2
databases
rdbms
+
–
0
votes
10
UGC NET CSE | July 2018 | Part 2 | Question: 63
In a Hierarchical database, a hashing function is used to locate the ____ Collision Root Foreign Key Records
In a Hierarchical database, a hashing function is used to locate the ____CollisionRootForeign KeyRecords
4.7k
views
answered
Nov 24, 2018
Databases
ugcnetcse-july2018-paper2
databases
hierarchical-database
+
–
0
votes
11
UGC NET CSE | July 2018 | Part 2 | Question: 63
In a Hierarchical database, a hashing function is used to locate the ____ Collision Root Foreign Key Records
In a Hierarchical database, a hashing function is used to locate the ____CollisionRootForeign KeyRecords
4.7k
views
answered
Nov 24, 2018
Databases
ugcnetcse-july2018-paper2
databases
hierarchical-database
+
–
0
votes
12
UGC NET CSE | July 2018 | Part 2 | Question: 13
Which one of the following is not typically provided by Source Code Management Software? Synchronization Versioning and Revision history Syntax highlighting Project forking
Which one of the following is not typically provided by Source Code Management Software?SynchronizationVersioning and Revision historySyntax highlightingProject forking
1.7k
views
answered
Nov 22, 2018
IS&Software Engineering
ugcnetcse-july2018-paper2
is&software-engineering
+
–
0
votes
13
UGC NET CSE | July 2018 | Part 2 | Question: 6
In Java, which of the following statements is/are TRUE? S1: The final' keyword applied to a class definition prevents the class form being extended through derivation S2: A class can only inherit one class but can implement multiple interfaces S3: ... called method overloading Code: S1 and S2 only S1 and S3 only S2 and S3 only All of S1, S2 and S3
In Java, which of the following statements is/are TRUE?S1: The ‘final’ keyword applied to a class definition prevents the class form being extended through derivation...
3.6k
views
answered
Nov 22, 2018
Object Oriented Programming
ugcnetcse-july2018-paper2
object-oriented-programming
java
final
+
–
1
votes
14
UGC NET CSE | December 2015 | Part 3 | Question: 14
In electronic mail, which of the following protocols allows the transfer of multimedia messages? IMAP SMTP POP 3 MIME
In electronic mail, which of the following protocols allows the transfer of multimedia messages?IMAPSMTPPOP 3MIME
2.8k
views
answered
Oct 8, 2018
Computer Networks
ugcnetcse-dec2015-paper3
computer-networks
multimedia-protocol
+
–
0
votes
15
UGC NET CSE | June 2010 | Part 2 | Question: 5
For your ATM debit card, you have a $4$-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-$'t'$ to crack the code on an ATM terminal. Therefore $'t'$ is ... Reduce the processing speed of the ATM terminals to the half of their current speed. None of the above provides any improvement.
For your ATM debit card, you have a $4$-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-$'t'$ to crack the code on an ATM ...
1.1k
views
answered
Sep 9, 2018
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
network-security
+
–
0
votes
16
UGC NET CSE | December 2009 | Part 2 | Question: 01
If she is my friend and you are her friend, then we are friends. Given this, the friend relationship in this context is ____________. (i) commutative (ii) transitive (iii) implicative (iv) equivalence (A) (i) and (ii) (B) (iii) (C) (i), (ii), (iii) and (iv) (D) None of these
If she is my friend and you are her friend, then we are friends. Given this, the friend relationship in this context is ____________.(i) commutative (ii) transitive (iii)...
665
views
answered
Sep 6, 2018
Set Theory & Algebra
ugcnetcse-dec2009-paper2
set-theory&algebra
relations
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register