Recent questions tagged ugcnetcse-dec2010-paper2

2.3k
views
1 answers
3 votes
One of the distinguished features of super-computer over other category of computer isParallel processingHighest accuracy levelMore speedMore capacity
1.6k
views
2 answers
2 votes
The basic concepts of ethics in information society is/areResponsibilityAccountabilityLiabilityAll of the above
2.6k
views
1 answers
1 votes
E-Choupal refers toCalling meeting of Surpanches electronically.Conducting Panchayat meeting using latest electronic gadgets.Providing window of information to villagers and farmers in NIC network.None of the above
2.4k
views
1 answers
1 votes
Data mining isThe process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial ... extract useful business information from large database.All of the above
1.4k
views
1 answers
1 votes
A data mart may containSummarised dataDe-normalized dataAggregate departmental dataAll of the above
728
views
1 answers
0 votes
The Warnier diagram enables analystTo represent information hierarchy in a compact mannerTo further identify requirementTo estimate the total cost involvedNone of the above
1.3k
views
2 answers
2 votes
The COCOMO model was introduced in the book title “Software Engineering Economics” authored byAbraham SilberschatzBarry BoehmC.J. DateD.E. Knuth
1.8k
views
2 answers
0 votes
The system specification is the first deliverable in the computer system engineering process which does not includeFunctional DescriptionCostScheduleTechnical Analysis
4.0k
views
1 answers
0 votes
Which one of these are not software maintenance activity ?Error correctionAdaptationImplementation of EnhancementEstablishing scope
2.3k
views
2 answers
0 votes
Prototyping is used toTest the software as an end productExpand design detailsRefine and establish requirements gatheringNone of the above
2.5k
views
1 answers
1 votes
A Dead-lock in an Operating System isDesirable processUndesirable processDefinite waiting processAll of the above
1.5k
views
0 answers
0 votes
Page making process from main memory to disk is calledInterruptionTerminationSwappingNone of the above
914
views
1 answers
1 votes
WINDOWS is a _________ operating.Real timeMulti-userPreemptiveNon-preemptive
803
views
0 answers
0 votes
Which of the following command the file names in multiple columns ?$IS - X$IS$IS - 1$IS - f - X$
1.7k
views
1 answers
0 votes
The dynamic allocation of storage areas with VSAM files is accomplished byHashingControl splitsOverflow areasRelative recoding
2.7k
views
1 answers
1 votes
Macro-processors are ______.HardwareCompilerRegistersNone of the above
1.1k
views
1 answers
2 votes
The register or main memory location which contains the effective address of the operand is known asPointerSpecial locationIndexed registerNone of the above
3.4k
views
1 answers
2 votes
Grammar of the programming is checked at ________ phase of compiler.Semantic analysisCode generationSyntax analysisCode optimization
2.2k
views
1 answers
1 votes
'Macro' in an assembly level program is _______.Sub programA complete programA hardware portionRelative coding
1.4k
views
2 answers
0 votes
Object code is the output of ______.Operating SystemCompiler or AssemblerOnly AssemblerOnly Compiler
1.3k
views
2 answers
0 votes
The threshold effect in demodulator isExhibited by all demodulator, when the input signal to noise ratio is low.The rapid fall on output signal ... .M. suppressed carrier coherent demodulator.The property exhibited by correlation receiver.
2.3k
views
2 answers
7 votes
Which of the following file transfer protocols use $TCP$ and establishes two virtual circuits between the local and remote server ?$FTP$TFTP$ $TELNET$NFS$
5.1k
views
1 answers
0 votes
How much bandwidth is there in $1$ micron of spectrum at a wavelength of $1$ micron ?$300$ MHz$3$ GHz$300$ THz$30$ KHz
3.1k
views
2 answers
1 votes
The baud rate isAlways equal to the bit transfer rateEqual to twice the bandwidth of an ideal channelNot equal to the signalling rateEqual to half of the bandwidth of an ideal channel
2.4k
views
2 answers
0 votes
Frequency shift keying is used mostly inRadio transmissionTelegraphyTelephoneNone of the above
6.0k
views
1 answers
1 votes
Which of the following can be the sequence of nodes examined in binary search tree while searching for key $88$?$90, 40, 65, 50, 88$90, 110, 80, 85, 88$ $190, 60, 90, 85, 88$ $65, 140, 80, 70, 88$
3.3k
views
4 answers
0 votes
Linear probing suffers from a problem known asSecondary clusteringPrimary clusteringBoth (A) and (B)None of these
1.7k
views
1 answers
0 votes
The time complexity to build a heap of n elements is$0(1)$ $0(lgn)$0(n)$0(nlgn)$
7.6k
views
2 answers
0 votes
A binary tree with $27$ nodes has _______ null branches.$54$27$26$None of the above
3.4k
views
2 answers
1 votes
What is the maximum number of nodes in a B-tree of order $10$ of depth $3$ (root at depth $0$) ?$111$999$9999$None of the above