Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetsep2013ii
1
votes
2
answers
1
UGC NET CSE | September 2013 | Part 2 | Question: 50
The speed up of a pipeline processing over an equivalent non-pipeline processing is defined by the ration: where $n \rightarrow$ no. of tasks $t_n \rightarrow$ time of completion of each tasks $k \rightarrow$ no. of segments of pipeline $t_p \rightarrow $ ... $S=\frac{n t_n}{(k-n+1)t_p}$ $S=\frac{(k+n-1)t_p}{n t_n}$
The speed up of a pipeline processing over an equivalent non-pipeline processing is defined by the ration:where $n \rightarrow$ no. of tasks$t_n \rightarrow$ time of comp...
go_editor
2.6k
views
go_editor
asked
Jul 21, 2016
Operating System
ugcnetsep2013ii
operating-system
pipelining
+
–
2
votes
2
answers
2
UGC NET CSE | September 2013 | Part 2 | Question: 49
What type of logic circuit is represented by the figure shown below ? $\text{XOR}$ $\text{XNOR}$ $\text{XAND}$ $\text{XNAND}$
What type of logic circuit is represented by the figure shown below ?$\text{XOR}$$\text{XNOR}$$\text{XAND}$$\text{XNAND}$
go_editor
2.0k
views
go_editor
asked
Jul 21, 2016
Digital Logic
ugcnetsep2013ii
digital-logic
circuit-output
+
–
1
votes
1
answer
3
UGC NET CSE | September 2013 | Part 2 | Question: 48
Which of the following set of Unix commands will always display “WELCOME”? export title =WELCOME; Echo $\$title title =WELCOME; export $\$title ; sh –c “echo $\$title” title =WELCOME; export title ; sh –c “echo $\$title” title =WELCOME; echo $\$title
Which of the following set of Unix commands will always display “WELCOME”?export title =WELCOME; Echo $\$$titletitle =WELCOME; export $\$$title ; sh –c ...
go_editor
1.5k
views
go_editor
asked
Jul 21, 2016
Others
ugcnetsep2013ii
unix
+
–
1
votes
3
answers
4
UGC NET CSE | September 2013 | Part 2 | Question: 47
Assume that an implementation of Unix operating system uses i-nodes to keep track of data blocks allocated to a file. It supports 12 direct block addresses, one in direct block address and one double indirect block address. The file system has ... disk block address. The maximum possible size of a file in this system is 16 MB 16 KB 70 KB 71 KB
Assume that an implementation of Unix operating system uses i-nodes to keep track of data blocks allocated to a file. It supports 12 direct block addresses, one in direct...
go_editor
3.0k
views
go_editor
asked
Jul 21, 2016
Operating System
ugcnetsep2013ii
operating-system
unix
+
–
5
votes
1
answer
5
UGC NET CSE | September 2013 | Part 2 | Question: 46
Consider the input/output (I/O) request made at different instants of time directed at a hypothetical disk having $200$ tracks as given in the following table $:$ ... : $144$ and $123$ milliseconds $143$ and $123$ milliseconds $149$ and $124$ milliseconds $256$ and $186$ milliseconds
Consider the input/output (I/O) request made at different instants of time directed at a hypothetical disk having $200$ tracks as given in the following table $:$$\begin{...
go_editor
4.2k
views
go_editor
asked
Jul 21, 2016
Operating System
ugcnetsep2013ii
operating-system
disk-scheduling
+
–
1
votes
2
answers
6
UGC NET CSE | September 2013 | Part 2 | Question: 45
The hit ratio of a Transaction Look Aside Buffer (TLAB) is 80%. It takes 20 nanoseconds (ns) to search TLAB and 100 ns to access main memory. The effective memory access time is _____ 36 ns 140 ns 122 ns 40 ns
The hit ratio of a Transaction Look Aside Buffer (TLAB) is 80%. It takes 20 nanoseconds (ns) to search TLAB and 100 ns to access main memory. The effective memory access ...
go_editor
4.8k
views
go_editor
asked
Jul 21, 2016
Operating System
ugcnetsep2013ii
operating-system
cache-memory
hit-ratio
+
–
1
votes
2
answers
7
UGC NET CSE | September 2013 | Part 2 | Question: 44
Match the following $:$ ... $\text{a-iv, b-iii, c-i, d-ii}$ $\text{a-iii, b-iv, c-ii, d-i}$
Match the following $:$$\begin{array}{} & \textbf{List – I} && \textbf{List – II} \\ & \textbf{Process state} && \textbf{Reason for transition}\\ & \textbf{transiti...
go_editor
2.8k
views
go_editor
asked
Jul 21, 2016
Operating System
ugcnetsep2013ii
operating-system
process-scheduling
match-the-following
easy
+
–
1
votes
2
answers
8
UGC NET CSE | September 2013 | Part 2 | Question: 43
Thoma’s-write rule is Two phase locking protocol Timestamp ordering protocol One phase locking protocol Sliding window protocol
Thoma’s-write rule isTwo phase locking protocolTimestamp ordering protocolOne phase locking protocolSliding window protocol
go_editor
1.6k
views
go_editor
asked
Jul 21, 2016
Databases
ugcnetsep2013ii
databases
transaction-and-concurrency
+
–
1
votes
2
answers
9
UGC NET CSE | September 2013 | Part 2 | Question: 42
A method to provide secure transmission of email is called TLS SA IPSec PGP
A method to provide secure transmission of email is calledTLSSAIPSecPGP
go_editor
2.9k
views
go_editor
asked
Jul 21, 2016
Computer Networks
ugcnetsep2013ii
computer-networks
network-security
network-protocols
+
–
1
votes
2
answers
10
UGC NET CSE | September 2013 | Part 2 | Question: 41
Cross_tab displays permit users to view ____ of multidimensional data at a time. One dimension Two dimensions Three dimensions Multidimensions
Cross_tab displays permit users to view ____ of multidimensional data at a time.One dimensionTwo dimensionsThree dimensionsMultidimensions
go_editor
1.4k
views
go_editor
asked
Jul 21, 2016
Databases
ugcnetsep2013ii
databases
crosstabquery
+
–
1
votes
2
answers
11
UGC NET CSE | September 2013 | Part 2 | Question: 40
The decision tree classifier is a widely used technique for Classification Association Partition Clustering
The decision tree classifier is a widely used technique forClassificationAssociationPartitionClustering
go_editor
1.9k
views
go_editor
asked
Jul 21, 2016
Data Mining and Warehousing
ugcnetsep2013ii
machine-learning
decision-tree
+
–
1
votes
2
answers
12
UGC NET CSE | September 2013 | Part 2 | Question: 39
Views are useful for ____ unwanted information, and for collecting together information from more than one relation into a single view. Hiding Deleting Highlighting All of the above
Views are useful for ____ unwanted information, and for collecting together information from more than one relation into a single view.HidingDeletingHighlightingAll of th...
go_editor
2.0k
views
go_editor
asked
Jul 21, 2016
Databases
ugcnetsep2013ii
databases
data-model
+
–
2
votes
1
answer
13
UGC NET CSE | September 2013 | Part 2 | Question: 38
The _____ language was originally designed as the Transformation Language for Style Sheet Facility XSTL XML XQuery XPath
The _____ language was originally designed as the Transformation Language for Style Sheet FacilityXSTLXMLXQueryXPath
go_editor
3.3k
views
go_editor
asked
Jul 21, 2016
Web Technologies
ugcnetsep2013ii
web-technologies
xml
html
+
–
1
votes
1
answer
14
UGC NET CSE | September 2013 | Part 2 | Question: 37
Usage of Preemption and Transaction Rollback prevents _____. Unauthorized usage of data file Deadlock situation Data manipulation File pre-emption
Usage of Preemption and Transaction Rollback prevents _____.Unauthorized usage of data fileDeadlock situationData manipulationFile pre-emption
go_editor
1.9k
views
go_editor
asked
Jul 21, 2016
Databases
ugcnetsep2013ii
databases
transaction-and-concurrency
+
–
1
votes
3
answers
15
UGC NET CSE | September 2013 | Part 2 | Question: 36
Consider the following program segment: d=0; for(i=1; i<31, ++i) for (j=1; j < 31; ++j) for (k=1; k < 31; ++k) if((i+j+k%3)==0)) d=d+1; printf(“%d”, d); The output will be 9000 3000 90 2700
Consider the following program segment:d=0; for(i=1; i<31, ++i) for (j=1; j < 31; ++j) for (k=1; k < 31; ++k) if((i+j+k%3)==0)) d=d+1; printf(“%d”, d);The output will...
go_editor
2.7k
views
go_editor
asked
Jul 21, 2016
Programming and DS
ugcnetsep2013ii
programming-in-c
+
–
1
votes
1
answer
16
UGC NET CSE | September 2013 | Part 2 | Question: 35
Assume that $x$ and $y$ are non-zero positive integers. What does the following program segment perform? while (x!=0) { if(x>y) x=x-y; else y=y-x; printf(“%d”, x) } Computes LCM of two numbers Computes GCD of two numbers Divides large number with small number Subtracts smaller number from larger number
Assume that $x$ and $y$ are non-zero positive integers. What does the following program segment perform?while (x!=0) { if(x>y) x=x-y; else y=y-x; printf(“%d”, x) }Com...
go_editor
865
views
go_editor
asked
Jul 21, 2016
Programming in C
ugcnetsep2013ii
programming-in-c
+
–
1
votes
1
answer
17
UGC NET CSE | September 2013 | Part 2 | Question: 34
What is the output of the following program segment? sum(n) { if (n<1) return n; else return (n+sum(n-1)); } main() { printf(“%d”, sum(5)); } 10 16 15 14
What is the output of the following program segment?sum(n) { if (n<1) return n; else return (n+sum(n-1)); } main() { printf(“%d”, sum(5)); }10161514
go_editor
1.8k
views
go_editor
asked
Jul 21, 2016
Programming and DS
ugcnetsep2013ii
programming-in-c
+
–
1
votes
2
answers
18
UGC NET CSE | September 2013 | Part 2 | Question: 33
What is the size of the following union? Assume that the size of int=2, size of float =4, size of char=1 union tag { int a; float b; char c; }; 2 4 1 7
What is the size of the following union? Assume that the size of int=2, size of float =4, size of char=1union tag { int a; float b; char c; };2417
go_editor
3.8k
views
go_editor
asked
Jul 21, 2016
Programming and DS
ugcnetsep2013ii
programming-in-c
+
–
1
votes
1
answer
19
UGC NET CSE | September 2013 | Part 2 | Question: 31
Consider the following characteristics: Correct and unambiguous Complete and consistent Ranked for importance and/or stability and verifiable Modifiable and Traceable Which of the following is true for a good SRS? I, II and III I, III and IV II, III and IV I, II, III and IV
Consider the following characteristics:Correct and unambiguousComplete and consistentRanked for importance and/or stability and verifiableModifiable and TraceableWhich of...
go_editor
3.6k
views
go_editor
asked
Jul 21, 2016
IS&Software Engineering
ugcnetsep2013ii
is&software-engineering
software-requirement-specification
+
–
1
votes
1
answer
20
UGC NET CSE | September 2013 | Part 2 | Question: 30
Equivalence partitioning is a _____ testing method that divides the input domain of a program into classes of data from which test cases can be derived. White box Black box Regression Smoke
Equivalence partitioning is a _____ testing method that divides the input domain of a program into classes of data from which test cases can be derived.White boxBlack box...
go_editor
857
views
go_editor
asked
Jul 21, 2016
IS&Software Engineering
ugcnetsep2013ii
is&software-engineering
software-testing
+
–
1
votes
1
answer
21
UGC NET CSE | September 2013 | Part 2 | Question: 29
Working software is not available until late in the process in Waterfall model Prototyping model Incremental model Evolutionary Development model
Working software is not available until late in the process inWaterfall modelPrototyping modelIncremental modelEvolutionary Development model
go_editor
2.0k
views
go_editor
asked
Jul 21, 2016
IS&Software Engineering
ugcnetsep2013ii
is&software-engineering
software-development-life-cycle-models
+
–
1
votes
1
answer
22
UGC NET CSE | September 2013 | Part 2 | Question: 28
The _____ of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these components and the relationship among them. E-R diagram Data flow diagram Software architecture Software design
The _____ of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these co...
go_editor
1.0k
views
go_editor
asked
Jul 21, 2016
IS&Software Engineering
ugcnetsep2013ii
is&software-engineering
+
–
1
votes
1
answer
23
UGC NET CSE | September 2013 | Part 2 | Question: 27
In which one of the following continuous process improvement is done? ISO9001 RMMM CMM None of the above
In which one of the following continuous process improvement is done?ISO9001RMMMCMMNone of the above
go_editor
2.8k
views
go_editor
asked
Jul 21, 2016
IS&Software Engineering
ugcnetsep2013ii
is&software-engineering
software-development
+
–
1
votes
1
answer
24
UGC NET CSE | September 2013 | Part 2 | Question: 26
Match the following identities/laws to their corresponding name $:$ ... $\text{(a)-iv, (b)-iii, (c)-ii, (d)-i}$ $\text{(a)-iii, (b)-iv, (c)-ii, (d)-i}$
Match the following identities/laws to their corresponding name $:$$\begin{array}{} \text{(a)} & \text{x+x = x} & \text{i.} & \text{Dominance} \\ & \text{x $\cdot$x = x}...
go_editor
1.0k
views
go_editor
asked
Jul 21, 2016
Digital Logic
ugcnetsep2013ii
digital-logic
match-the-following
easy
+
–
2
votes
1
answer
25
UGC NET CSE | September 2013 | Part 2 | Question: 24
The quantification $\exists ! x P(x)$ ... $\exists x P(x) \wedge \forall x \forall y ((P(x) \vee P(y)) \rightarrow x=y)$
The quantification $\exists ! x P(x)$ denotes the proposition “There exists a unique x such that P(x) is true”, express he quantification using universal and existent...
go_editor
2.2k
views
go_editor
asked
Jul 20, 2016
Mathematical Logic
ugcnetsep2013ii
discrete-mathematics
propositional-logic
+
–
2
votes
2
answers
26
UGC NET CSE | September 2013 | Part 2 | Question: 23
Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation? AND, OR, NOT NAND, NOR EX-OR, EX-NOR None of the above
Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?AND, OR, NOTNAND, NOREX-OR, EX-NORNone of the...
go_editor
6.0k
views
go_editor
asked
Jul 20, 2016
Digital Logic
ugcnetsep2013ii
digital-logic
digital-circuits
+
–
3
votes
1
answer
27
UGC NET CSE | September 2013 | Part 2 | Question: 22
A simple graph G with n vertices is connected if the graph has (n-1)(n-2)/2 edges more than (n-1) (n-2)/2 edges less than (n-1) (n-2)/2 edges $\Sigma_{i=1}^k C(n_i, 2)$ edges
A simple graph G with n vertices is connected if the graph has(n-1)(n-2)/2 edgesmore than (n-1) (n-2)/2 edgesless than (n-1) (n-2)/2 edges$\Sigma_{i=1}^k C(n_i, 2)$ edges...
go_editor
10.7k
views
go_editor
asked
Jul 20, 2016
Graph Theory
ugcnetsep2013ii
graph-theory
graph-connectivity
+
–
1
votes
1
answer
28
UGC NET CSE | September 2013 | Part 2 | Question: 21
Consider the In-order and Post-order traversals of a tree as given below: In-order: j e n k o p b f a c l g m d h i Post-order: j n o p k e f b c l m g h I d a The Pre-order traversal of the tree shall be a b f e j k n o p c d g l m h i a b c d e f j k n o p g l m h i a b e j k n o p f c d g l m h i j e n o p k f b c l m g h I d a
Consider the In-order and Post-order traversals of a tree as given below:In-order: j e n k o p b f a c l g m d h iPost-order: j n o p k e f b c l m g h I d aThe Pre-order...
go_editor
5.0k
views
go_editor
asked
Jul 20, 2016
DS
ugcnetsep2013ii
data-structures
binary-tree
+
–
1
votes
1
answer
29
UGC NET CSE | September 2013 | Part 2 | Question: 19
Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow and the rest ones white. 55,440 1,66,320 4.790E+08 39,91,680
Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow and the rest ones white.55,4401,66,3204.790E+0839,91,680
go_editor
4.2k
views
go_editor
asked
Jul 20, 2016
Others
ugcnetsep2013ii
combinatory
+
–
1
votes
1
answer
30
UGC NET CSE | September 2013 | Part 2 | Question: 17
Assume the statements $S_1$ and $S_2$ given as: $S_1$: Given a context free grammar G, there exists an algorithm for determining whether L(G) is infinite. $S_2$: There exists an algorithm to determine whether two context free grammars generate ... $S_2$ are correct Both $S_1$ and $S_2$ are not correct $S_1$ is not correct and $S_2$ is correct
Assume the statements $S_1$ and $S_2$ given as:$S_1$: Given a context free grammar G, there exists an algorithm for determining whether L(G) is infinite.$S_2$: There exis...
go_editor
3.5k
views
go_editor
asked
Jul 20, 2016
Theory of Computation
ugcnetsep2013ii
theory-of-computation
grammar
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register