Recent questions tagged ugcnetcse-dec2012-paper2

3.1k
views
3 answers
2 votes
Given a Relation POSITION (Posting-No, Skill), then the query to retrieve all distinct pairs of posting-nos. requiring skill isSelect p.posting-No, p.posting-No from posi...
10.6k
views
2 answers
4 votes
Identify the operation which is commutative but not associative?ORNOREX-ORNAND
1.9k
views
1 answers
3 votes
Match the following :$\begin{array}{clcl} \text{a.} & \text{TTL} & \text{i.} & \text{High fan out} \\ \text{b.} & \text{ECL} & \text{ii.} & \text{Low propagation delay}...
5.2k
views
1 answers
1 votes
_____ is an “umbrella” activity that is applied throughout the software engineering process.DebuggingTestingDesigningSoftware quality assurance
13.1k
views
2 answers
0 votes
Back propagation is a learning technique that adjusts weights in the neutral network by propagating weight changes.Forward from source to sinkBackward from sink to source...
3.5k
views
1 answers
1 votes
What is the result of the following expression?(1 & 2) + (3 & 4)1320
4.7k
views
2 answers
2 votes
Let L be set accepted by a non-deterministic finite automaton. The number of states in non-deterministic finite automaton is $\mid Q \mid$. The maximum number of states ...
3.4k
views
2 answers
1 votes
Data Encryption Techniques are particularly used for _____protecting data in Data Communication Systemreduce Storage Space Requirementenhances Data Integritydecreases Dat...
2.4k
views
1 answers
0 votes
Which of the following mode declaration used in C++ to open a file for input?ios : : appin : : iosios : : fileios : : in
2.6k
views
1 answers
0 votes
Enumeration is a process ofDeclaring a set of numbersSorting a list of stringsAssigning a legal values possible for a variableSequencing a list of operators
5.0k
views
2 answers
0 votes
Given an empty stack, after performing push(1), push(2), pop, push(3), push(4), pop, pop, push(5), pop, what is the value of the top of the stack?4321
2.2k
views
1 answers
0 votes
Match the following with respect to $\text{C++}$ data types :$\begin{array}{clcl} \text{a.} & \text{User defined type} & \text{i.} & \text{Qualifier} \\ \text{b.} & \tex...
3.1k
views
1 answers
0 votes
Match the following $\textsf{IC}$ families with their basic circuits :$\begin{array}{clcl} \text{a.} & \text{TTL} & \text{i.} & \text{NAND} \\ \text{b.} & \text{ECL} & \...
2.9k
views
1 answers
0 votes
In UNIX, which of the following command is used to set the task priority?initnicekillPS
4.5k
views
2 answers
4 votes
The maximum number of keys stored in a B-tree of order $m$ and depth $d$ is$m^{d +1}-1$$\frac{m^{d+1}-1}{m-1}$$(m-1)(m^{d+1}-1)$$\frac{m^d-1}{m-1}$
4.9k
views
1 answers
1 votes
Consider the tree given below:Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree:d & hc & kg, b, c, h, i, mc & h
2.0k
views
1 answers
0 votes
The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records betweenDBMS and the Host recordHost ...
3.3k
views
1 answers
1 votes
Basis path testing falls undersystem testingwhite box testingblack box testingunit testing
4.7k
views
1 answers
0 votes
Which of the following memory allocation scheme suffers from external fragmentation?SegmentationPure demand pagingSwappingPaging
1.8k
views
1 answers
1 votes
Which of the following are two special functions that are meant for handling exception, that occur during exception handling itself?Void terminate () and void unexpected...
6.0k
views
2 answers
1 votes
Which of the following is true while converting CFG to an LL(1) grammar?Removing left recursion aloneFactoring the grammar aloneRemoving left recursion and factoring the ...
2.1k
views
1 answers
0 votes
Identify the Risk factors which are associated with Electronic payment systemFraudulent use of credit cardSending credit card details over internetRemote storage of credi...
8.2k
views
1 answers
0 votes
A hash function $f$ defined as $f (key) = key \mod 13$, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79?1234
1.1k
views
1 answers
0 votes
RAD stands forRapid and DesignRapid Aided DevelopmentRapid Application DevelopmentRapid Application Design
2.5k
views
1 answers
0 votes
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75 $\Omega$ used forCable TVEthernetThin Et...
2.7k
views
1 answers
1 votes
In DML, RECONNCT command cannot be used withOPTIONAL SetFIXED SetMANDATOR SetAll of the above
2.5k
views
2 answers
1 votes
Which API is used to draw a circle?Circle ()Ellipse ()Round Rect ()Pie ()
8.4k
views
3 answers
1 votes
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using:Parity bitAgingCompactionTimer
3.0k
views
2 answers
0 votes
The maturity levels used to measure a process areInitial, Repeatable, Defined, Managed, OptimizedPrimary, Secondary, Defined, Managed, OptimizedInitial, Stating, Defined,...
2.0k
views
5 answers
2 votes
Given the following expressions of a grammar$E \rightarrow E * F / F + E / F$$F \rightarrow F – F / id$Which of the following is true?$*$ has the higher precedence ...