Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2014-paper2
3.5k
views
2
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 50
Match the following $:$\begin{array} {cIcI} & \textbf{List - I} && \textbf{List - II} \\ \text{a.} & \text{DDL} & \text{i.} & \text{LOCK TABLE} \\ \text{b.} & \text{DML ... $\text{a-iv; b-i; c-ii; d-iii}$
makhdoom ghaya
3.5k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
+
–
20.2k
views
3
answers
2
votes
UGC NET CSE | June 2014 | Part 2 | Question: 49
Let $R =\{A, B, C, D, E, F\}$ be a relation schema with the following dependencies $C \rightarrow F$, $E \rightarrow A$, $EC \rightarrow D$, $A \rightarrow B$. Which of the following is a key for $R$ ? CD EC AE AC
makhdoom ghaya
20.2k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
database-normalization
+
–
4.4k
views
3
answers
3
votes
UGC NET CSE | June 2014 | Part 2 | Question: 48
A clustering index is created when _______. Primary key is declared and ordered No key orderedForeign key orderedThere is no key and no order
makhdoom ghaya
4.4k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
indexing
+
–
11.0k
views
2
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 46
Manager’s salary details are hidden from the employee. This is called asConceptual level data hidingPhysical level data hidingExternal level data hiding Local level data hiding
makhdoom ghaya
11.0k
views
makhdoom ghaya
asked
Jul 1, 2016
Databases
ugcnetcse-june2014-paper2
databases
+
–
2.8k
views
1
answers
2
votes
UGC NET CSE | June 2014 | Part 2 | Question: 45
Which of the following is the correct value returned to the operating system upon the successful completion of a program ? 01-1Program do not return a value.
makhdoom ghaya
2.8k
views
makhdoom ghaya
asked
Jul 1, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
+
–
5.2k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 44
A friend function can be used toAvoid arguments between classes.Allow access to classes whose source code is unavailable. Allow one class to access an unrelated class. None of the above
makhdoom ghaya
5.2k
views
makhdoom ghaya
asked
Jul 1, 2016
Object Oriented Programming
ugcnetcse-june2014-paper2
object-oriented-programming
friend-function
+
–
2.4k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 43
While (87) printf(“computer”); The above $C$ statement will print “computer” $87$ timesprint “computer” $0$ timesprint “computer” $1$ times print “computer” infinite times
makhdoom ghaya
2.4k
views
makhdoom ghaya
asked
Jul 1, 2016
Programming in C
ugcnetcse-june2014-paper2
programming-in-c
+
–
1.7k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 42
When we pass an array as an argument to a function, what actually gets passed ? Address of the array Values of the elements of the array Base address of the arrayNumber of elements of the array
makhdoom ghaya
1.7k
views
makhdoom ghaya
asked
Jul 1, 2016
Programming in C
ugcnetcse-june2014-paper2
programming
programming-in-c
+
–
1.9k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 41
Match the following $:$\begin{array}{cIcI} & \textbf{List - I} && \textbf{List - II} \\ \text{a.} & \text{Automatic Storage} & \text{i.} & \text{Scope of the variable is ... $\text{a-iv; b-iii; ci; d-ii}$
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Jul 1, 2016
Programming in C
ugcnetcse-june2014-paper2
programming-in-c
storage-classes-in-c
+
–
2.4k
views
2
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 39
An algorithm is made up of $2$ modules $M_{1}$ and $M_{2}$ . If time complexity of modules $M_{1}$ and $M_{2}$ are $h(n)$ and $g(n)$ respectively, the time complexity of the algorithm ... $\max (h(n), g(n))$ $h(n) + g(n)$ $h(n) * g(n)$
makhdoom ghaya
2.4k
views
makhdoom ghaya
asked
Jul 1, 2016
Algorithms
ugcnetcse-june2014-paper2
algorithms
time-complexity
asymptotic-notation
+
–
3.6k
views
2
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 38
Searching for an element in the hash table requires $O(1)$ time for the _________time, whereas for direct addressing it holds for the _______ time.worst-case, averageworst-case, worst-caseaverage, worst-case best, average
makhdoom ghaya
3.6k
views
makhdoom ghaya
asked
Jun 29, 2016
DS
ugcnetcse-june2014-paper2
hashing
data-structures
+
–
5.5k
views
2
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 37
A text is made up of the characters $\alpha, \beta, \gamma, \delta$ and $\sigma$ with the probability $0.12, 0.40, 0.15, 0.08$ and $0.25$ respectively. The optimal coding technique will have the average length of $1.7$2.15$ $3.4$3.8$
makhdoom ghaya
5.5k
views
makhdoom ghaya
asked
Jun 29, 2016
Digital Logic
ugcnetcse-june2014-paper2
computer-networks
encoding
+
–
6.1k
views
2
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 36
Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ?The array elements form a heap.Elements ... or equal to elements in second half of the array.All of the above
makhdoom ghaya
6.1k
views
makhdoom ghaya
asked
Jun 29, 2016
Algorithms
ugcnetcse-june2014-paper2
algorithms
sorting
merge-sort
+
–
2.1k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 35
Which of the following commands will output “onetwothree” ?for val; do echo-n $val; done < one two threefor one two three; do echo-n-; donefor n in one two three; do echo-n $n; donefor n in one two three {echo –n $ n}
makhdoom ghaya
2.1k
views
makhdoom ghaya
asked
Jun 29, 2016
Others
ugcnetcse-june2014-paper2
non-gate
unix
shell-script
+
–
6.5k
views
2
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 34
Match the following $:$\begin{array}{clcl} \text{} & \textbf{List - I} && \textbf{List - II} \\ \text{a.} & \text{Contiguous allocation} & \text{i.} & \text{This scheme supports ... {a-i; b-ii; c-iv; d-iii}$\text{a-i; b-iv; c-ii; d-iii}$
makhdoom ghaya
6.5k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
file-system
+
–
7.7k
views
4
answers
3
votes
UGC NET CSE | June 2014 | Part 2 | Question: 33
Consider a system with five processes $P_{0}$ through $P_{4}$ and three resource types $R_{1}$, $R_{2}$ and $R_{3}$ ... . The state resulting after this allocation will be Ready state Safe state Blocked stateUnsafe state
makhdoom ghaya
7.7k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
resource-allocation
+
–
3.4k
views
2
answers
2
votes
UGC NET CSE | June 2014 | Part 2 | Question: 32
Match the following $:$\begin{array}{clcl} & \textbf{List - I} && \textbf{List - II} \\ \text{a}. & \text{Multilevel feedback queue} & \text{i.} & \text{Time-slicing} \\ \text{ ... text{a-iii; b-i; c-iv; d-i}$\text{a-ii; b-iii; c-iv; d-i}$
makhdoom ghaya
3.4k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
process-scheduling
+
–
9.2k
views
3
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 31
In a paged memory management algorithm, the hit ratio is $70$%. If it takes $30$ nanoseconds to search Translation Look-aside Buffer (TLB) and $100$ nanoseconds (ns) ... the effective memory access time is $91$ ns$69$ ns$200$ ns $160$ ns
makhdoom ghaya
9.2k
views
makhdoom ghaya
asked
Jun 29, 2016
Operating System
ugcnetcse-june2014-paper2
operating-system
virtual-memory
+
–
1.9k
views
2
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 30
SET, an open encryption and security specification model that is designed for protecting credit card transactions on ... Electronic TransactionSecular Enterprise for TransactionSecurity Electronic TransmissionSecured Electronic Termination
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Jun 27, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
network-security
+
–
1.8k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 29
Match the following $:$\begin{array}{clcl} & \textbf{List - I} & & \textbf{List - II} \\ \text{a.} & \text{Classification} & \text{i.} & \text{Principal component analysis} \\ \ ... {a-iii; b-iv; c-i; d-ii}$\text{a-iv; b-iii; c-ii; d-i}$
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jun 27, 2016
Others
ugcnetcse-june2014-paper2
machine-learning
+
–
1.9k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 28
A software agent is defined asA software developed for accomplishing a given task.A computer program which is capable of acting on behalf of the user in order to accomplish ... for accomplishing a given task.$I$ $II$ $III$ All of the above
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Jun 27, 2016
IS&Software Engineering
ugcnetcse-june2014-paper2
is&software-engineering
+
–
1.9k
views
1
answers
0
votes
UGC NET CSE | June 2014 | Part 2 | Question: 27
Object Request Broker (ORB) isI. A software program that runs on the client as well as on the application server.II. A software program that runs on the client side only.III. A software ... I$, $II$ & $III$I$ & $II$ $II$ & $III$ $I$ only
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Jun 27, 2016
Distributed Computing
ugcnetcse-june2014-paper2
non-gate
distributed-computing
+
–
2.9k
views
1
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 26
Match the following with respect to the mobile computing technologies $:$\begin{array}{cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{GPRS} & \text{i.} & \text{ ... {a-ii; b-iii; c-iv; d-i}$\text{a-ii; b-i; c-iv; d-iii}$
makhdoom ghaya
2.9k
views
makhdoom ghaya
asked
Jun 27, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
mobile-communication
+
–
3.0k
views
1
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 25
How many cards must be chosen from a deck to guarantee that at leasttwo aces of two kinds are chosen.two aces are chosen.two cards of the same kind are chosen.two cards of two different ... $52, 52, 14, 5$ $51, 51, 14, 5$
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Jun 27, 2016
Combinatory
ugcnetcse-june2014-paper2
combinatory
+
–
5.5k
views
3
answers
2
votes
UGC NET CSE | June 2014 | Part 2 | Question: 24
Big-$O$ estimates for the factorial function and the logarithm of the factorial function i.e. $n!$ and $\log n!$ is given by $O(n!)$ and $O(n \log n)$O(n^{n})$ and $O(n \log n)$ $O(n!)$ and $O(\log n!)$ $O(n^{n})$ and $O(\log n!)$
makhdoom ghaya
5.5k
views
makhdoom ghaya
asked
Jun 27, 2016
Algorithms
ugcnetcse-june2014-paper2
algorithms
time-complexity
asymptotic-notation
+
–
7.4k
views
2
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 23
Consider a complete bipartite graph $k_{m,n}$. For which values of $m$ and $n$ does this, complete graph have a Hamilton circuit $m = 3, n = 2$m = 2, n = 3$ $m = n > 2$m = n > 3$
makhdoom ghaya
7.4k
views
makhdoom ghaya
asked
Jun 27, 2016
Graph Theory
ugcnetcse-june2014-paper2
graph-theory
hamiltonian-graph
+
–
2.7k
views
1
answers
1
votes
UGC NET CSE | June 2014 | Part 2 | Question: 22
The upper bound and lower bound for the number of leaves in a B-tree of degree $K$ with height $h$ is given by : $K^{h}$ and $2 \lceil \frac{k}{2} \rceil ^{h-1}$ ... {2} \rfloor ^{h-1}$K * h$ and $2 \lceil \frac{k}{2} \rceil ^{h-1}$
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Jun 27, 2016
Databases
ugcnetcse-june2014-paper2
databases
b-tree
+
–
3.6k
views
2
answers
2
votes
UGC NET CSE | June 2014 | Part 2 | Question: 21
Consider the graph given below as :Which one of the following graph is isomorphic to the above graph ?
makhdoom ghaya
3.6k
views
makhdoom ghaya
asked
Jun 27, 2016
Graph Theory
ugcnetcse-june2014-paper2
graph-theory
non-gate
graph-isomorphism
+
–
5.9k
views
1
answers
2
votes
UGC NET CSE | June 2014 | Part 2 | Question: 20
Give a compound proposition involving propositions $p, q$ and $r$ that is true when exactly two of $p, q$ and $r$ ...
makhdoom ghaya
5.9k
views
makhdoom ghaya
asked
Jun 25, 2016
Mathematical Logic
ugcnetcse-june2014-paper2
mathematical-logic
propositional-logic
+
–
2.2k
views
2
answers
4
votes
UGC NET CSE | June 2014 | Part 2 | Question: 19
The notation $\exists ! x P(x)$ denotes the proposition “there exists a unique $x$ such that $P(x)$ is true”. Give the truth values of the following statements : I. ... false. $I$ - false, $II$ - true $I$ - true, $II$ - false
makhdoom ghaya
2.2k
views
makhdoom ghaya
asked
Jun 25, 2016
Mathematical Logic
ugcnetcse-june2014-paper2
mathematical-logic
first-order-logic
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register