Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged uttarakhand-asst-prof-2018
1
vote
1
answer
31
Uttrakhand Asst. Professor Exam-70
A group technique that may be used during requirement elicitation to understand the requirements is System prototyping Software reengineering Brain storming System designing
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
253
views
uttarakhand-asst-prof-2018
is&software-engineering
2
votes
2
answers
32
Uttrakhand Asst. Professor Exam-69
Which of the following is the most important feature of spiral model? Quality management Performance management Efficiency management Risk management
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
1.2k
views
uttarakhand-asst-prof-2018
is&software-engineering
0
votes
1
answer
33
Uttrakhand Asst. Professor Exam-68
SRS stands for Software Requirement Specification System Requirement Specification Systematic Requirements Specification None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
192
views
uttarakhand-asst-prof-2018
0
votes
1
answer
34
Uttrakhand Asst. Professor Exam-67
System testing performed by the development team is called ______ whereas the system testing performed by a friendly set of customers is called ______ $\beta$ -testing , acceptance testing $\alpha $- testing , acceptance testing $\alpha $- testing, $\beta$ -testing $\beta$ -testing, $\alpha $- testing
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
1.6k
views
uttarakhand-asst-prof-2018
is&software-engineering
1
vote
1
answer
35
Uttrakhand Asst. Professor Exam-66
Let $T_1(n) = O (f(n))$ and $T_2(n) = O (g(n))$, then ${T_1(n)}.{T_2(n)}$ will be $O(f(n).g(n))$ $O(f(n))+O(g(n))$ $O(f(n))-O(g(n))$ None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
195
views
uttarakhand-asst-prof-2018
algorithms
0
votes
0
answers
36
Uttrakhand Asst. Professor Exam-65
Statement 1 : In greedy method the input stream is divided into two parts. Statement 2 : In greedy method, one input is considered at time for decision making Which of the following is correct ? Both statements are true. Both statements are false. Statement 1 is true and Statement 2 is false Statement 1 is false and Statement 2 is true
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
192
views
uttarakhand-asst-prof-2018
algorithms
1
vote
2
answers
37
Uttrakhand Asst. Professor Exam-64
Which of the following problem cannot be solved without recursion? Tower of Hanoi Fibonacci series Tree Traversal None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
2.3k
views
uttarakhand-asst-prof-2018
data-structures
0
votes
1
answer
38
Uttrakhand Asst. Professor Exam-63
If there is a graph such that there is a unique path between any pair of vertices. The graph is a ________ Mesh Grid Tree Bipartite graph
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
338
views
uttarakhand-asst-prof-2018
graph-theory
data-structures
0
votes
1
answer
39
Uttrakhand Asst. Professor Exam-62
The running time of an algorithm $T(n)$, where $n$ is the input size, is given by following: $T(n) = \begin{cases} 8T(n/2) + qn & \text{ if } n>1 \\ p & \text{ if } n = 1 \end{cases}$ where $p$ and $q$ are constants, the order of algorithm is $n^2$ $n^3$ $n$ $n^n$
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
207
views
uttarakhand-asst-prof-2018
algorithms
recurrence-relation
master-theorem
0
votes
1
answer
40
Uttrakhand Asst. Professor Exam-61
The solution that satisfies all constraints of the given problem and either maximizes or minimizes a given objective function is called ________ solution. greedy feasible optimal ordered
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
339
views
uttarakhand-asst-prof-2018
algorithms
0
votes
1
answer
41
Uttrakhand Asst. Professor Exam-60
Which of the following is a solution of mobile IP problem? Care of address Carefree address Don't care address None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
201
views
uttarakhand-asst-prof-2018
mobile-communication
0
votes
2
answers
42
Uttrakhand Asst. Professor Exam-59
In distance vector routing, a router sends out information of estimated delays Only when there is a change in its table Only when, a new host is added At regularly scheduled intervals Only when a new network is added
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
812
views
uttarakhand-asst-prof-2018
computer-networks
0
votes
1
answer
43
Uttrakhand Asst. Professor Exam-58
What is difference between a Router and a Brouter? A brouter routinely broadcasts routing information. A brouter is a basic functionality of router. A brouter can function as a bridge as well as a router. A brouter is a router that routes signals on broadband network.
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
285
views
uttarakhand-asst-prof-2018
computer-networks
0
votes
2
answers
44
Uttrakhand Asst. Professor Exam-57
A jam signal sent through a network means The network traffic is too congested There has been a data collision It is time to go The printer's paper feeder is jammed
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
288
views
uttarakhand-asst-prof-2018
computer-networks
0
votes
2
answers
45
Uttrakhand Asst. Professor Exam-56
Bit stuffing is used to Pad insufficient information Distinguish beginning and ending flags from information Convert 8 bit words into 16 bit words Fill a data turkey
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
281
views
uttarakhand-asst-prof-2018
computer-networks
0
votes
1
answer
46
Uttrakhand Asst. Professor Exam-55
The maximum data rate that a medium of 3 KHz and signal to noise ratio of 30 dB is roughly 10 kbps 100 kbps 3 kbps 30 kbps
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
220
views
uttarakhand-asst-prof-2018
0
votes
2
answers
47
Uttrakhand Asst. Professor Exam-54
The ________ information is used to limit the amount of recovery operations to be done following a system crash resulting in the lose of volatile storage Log Data file Check point None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
293
views
uttarakhand-asst-prof-2018
operating-system
recovery-system
0
votes
1
answer
48
Uttrakhand Asst. Professor Exam-53
A table space is further broken down into ______ . Blocks Extents Files Segments
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
237
views
uttarakhand-asst-prof-2018
databases
0
votes
2
answers
49
Uttrakhand Asst. Professor Exam-52
Which of the following normal form is based on the concept of full functional dependency on each candidate key of the relation? 1NF 2NF 3NF None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
289
views
uttarakhand-asst-prof-2018
0
votes
4
answers
50
Uttrakhand Asst. Professor Exam-51
Which of the following operation of relational algebra, selects certain columns from the table and discards the other columns? SELECT PROJECT DIVISION None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
599
views
uttarakhand-asst-prof-2018
databases
relational-algebra
0
votes
1
answer
51
Uttrakhand Asst. Professor Exam-50
In a sequential file records are maintained in the logical sequence of their primary key value storage location primary and secondary key value None of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
179
views
uttarakhand-asst-prof-2018
databases
file-organization
0
votes
1
answer
52
Uttrakhand Asst. Professor Exam-49
Each row or record of a relational table is known as Domain Attribute Tuple Key
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
217
views
uttarakhand-asst-prof-2018
databases
0
votes
1
answer
53
Uttrakhand Asst. Professor Exam-48
Choose the incorrect statement Shell scripts can accept arguments Shell scripts are interpreted Shell is a programming language Shell scripts are compiled
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
1.3k
views
uttarakhand-asst-prof-2018
unix
0
votes
1
answer
54
Uttrakhand Asst. Professor Exam-47
Mutual exclusion problem occurs between two disjoint processes that do not interact among processes that share resources among processes that do not use the same resource None of the above.
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
204
views
uttarakhand-asst-prof-2018
0
votes
1
answer
55
Uttrakhand Asst. Professor Exam-46
Suppose that a process is in "BLOCKED" state waiting for some I/O service, when the service is completed, it goes to Ready state Running state Terminated state Suspended state
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
3.2k
views
uttarakhand-asst-prof-2018
1
vote
2
answers
56
Uttrakhand Asst. Professor Exam-45
Which of the following scheduling algorithms gives minimum average waiting time? FCFS SJF Round Robin Priority
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
684
views
uttarakhand-asst-prof-2018
0
votes
1
answer
57
Uttrakhand Asst. Professor Exam-44
In a multiprogramming environment The processor executes more than one process at a time The programs are developed by more than one person More than one process resides in the memory A single user can execute many programs at the same time
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
249
views
uttarakhand-asst-prof-2018
operating-system
1
vote
1
answer
58
Uttrakhand Asst. Professor Exam-43
The command cat > x in unix is invalid creates a file x and displays an error message creates a file x and waits for the user to give input from the keyboard none of the above
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
329
views
uttarakhand-asst-prof-2018
unix
0
votes
1
answer
59
Uttrakhand Asst. Professor Exam-42
In which of the following records are maintained in the logical sequence of their primary key values? Index sequential file Sequential file Relative file Direct file
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
244
views
uttarakhand-asst-prof-2018
databases
file-organisation
0
votes
1
answer
60
Uttrakhand Asst. Professor Exam-41
Which of the following is not used for hash function? Mid-square method Division method Folding method Probe method
gatecse
asked
in
Unknown Category
Mar 2, 2018
by
gatecse
6.0k
views
uttarakhand-asst-prof-2018
data-structures
hashing
Page:
« prev
1
2
3
4
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
(3.5k)
Engineering Mathematics
(10.4k)
Digital Logic
(3.6k)
Programming and DS
(6.2k)
Algorithms
(4.8k)
Theory of Computation
(6.9k)
Compiler Design
(2.5k)
Operating System
(5.2k)
Databases
(4.8k)
CO and Architecture
(4.0k)
Computer Networks
(4.9k)
Artificial Intelligence
(79)
Machine Learning
(48)
Data Mining and Warehousing
(25)
Non GATE
(1.4k)
Others
(2.7k)
Admissions
(684)
Exam Queries
(1.6k)
Tier 1 Placement Questions
(17)
Job Queries
(80)
Projects
(11)
Unknown Category
(870)
64.3k
questions
77.9k
answers
244k
comments
80.0k
users
Recent questions tagged uttarakhand-asst-prof-2018
Recent Blog Comments
category ?
Hi @Arjun sir, I have obtained a score of 591 in ...
download here
Can you please tell about IIT-H mtech CSE self...
Please add your admission queries here:...