Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged ugcnetcse-june2014-paper2
0
votes
2
answers
1
UGC NET CSE | June 2014 | Part 2 | Question: 50
Match the following $:$ ... $\text{a-ii; b-iii; c-i; d-iv}$ $\text{a-iv; b-i; c-ii; d-iii}$
makhdoom ghaya
asked
in
Databases
Jul 1, 2016
by
makhdoom ghaya
3.4k
views
ugcnetcse-june2014-paper2
databases
2
votes
3
answers
2
UGC NET CSE | June 2014 | Part 2 | Question: 49
Let $R =\{A, B, C, D, E, F\}$ be a relation schema with the following dependencies $C \rightarrow F$, $E \rightarrow A$, $EC \rightarrow D$, $A \rightarrow B$. Which of the following is a key for $R$ ? CD EC AE AC
makhdoom ghaya
asked
in
Databases
Jul 1, 2016
by
makhdoom ghaya
20.0k
views
ugcnetcse-june2014-paper2
databases
database-normalization
3
votes
3
answers
3
UGC NET CSE | June 2014 | Part 2 | Question: 48
A clustering index is created when _______. Primary key is declared and ordered No key ordered Foreign key ordered There is no key and no order
makhdoom ghaya
asked
in
Databases
Jul 1, 2016
by
makhdoom ghaya
4.2k
views
ugcnetcse-june2014-paper2
databases
indexing
0
votes
2
answers
4
UGC NET CSE | June 2014 | Part 2 | Question: 46
Manager’s salary details are hidden from the employee. This is called as Conceptual level data hiding Physical level data hiding External level data hiding Local level data hiding
makhdoom ghaya
asked
in
Databases
Jul 1, 2016
by
makhdoom ghaya
10.6k
views
ugcnetcse-june2014-paper2
databases
1
vote
1
answer
5
UGC NET CSE | June 2014 | Part 2 | Question: 45
Which of the following is the correct value returned to the operating system upon the successful completion of a program ? 0 1 -1 Program do not return a value.
makhdoom ghaya
asked
in
Operating System
Jul 1, 2016
by
makhdoom ghaya
2.6k
views
ugcnetcse-june2014-paper2
operating-system
0
votes
1
answer
6
UGC NET CSE | June 2014 | Part 2 | Question: 44
A friend function can be used to Avoid arguments between classes. Allow access to classes whose source code is unavailable. Allow one class to access an unrelated class. None of the above
makhdoom ghaya
asked
in
Object Oriented Programming
Jul 1, 2016
by
makhdoom ghaya
4.9k
views
ugcnetcse-june2014-paper2
object-oriented-programming
friend-function
0
votes
1
answer
7
UGC NET CSE | June 2014 | Part 2 | Question: 43
While (87) printf(“computer”); The above $C$ statement will print “computer” $87$ times print “computer” $0$ times print “computer” $1$ times print “computer” infinite times
makhdoom ghaya
asked
in
Programming in C
Jul 1, 2016
by
makhdoom ghaya
2.3k
views
ugcnetcse-june2014-paper2
programming-in-c
0
votes
1
answer
8
UGC NET CSE | June 2014 | Part 2 | Question: 42
When we pass an array as an argument to a function, what actually gets passed ? Address of the array Values of the elements of the array Base address of the array Number of elements of the array
makhdoom ghaya
asked
in
Programming in C
Jul 1, 2016
by
makhdoom ghaya
1.6k
views
ugcnetcse-june2014-paper2
programming
programming-in-c
0
votes
1
answer
9
UGC NET CSE | June 2014 | Part 2 | Question: 41
Match the following $:$ ... $\text{a-iv; b-iii; c-ii; d-ii}$ $\text{a-iv; b-iii; ci; d-ii}$
makhdoom ghaya
asked
in
Programming in C
Jul 1, 2016
by
makhdoom ghaya
1.8k
views
ugcnetcse-june2014-paper2
programming-in-c
storage-classes-in-c
1
vote
2
answers
10
UGC NET CSE | June 2014 | Part 2 | Question: 39
An algorithm is made up of $2$ modules $M_{1}$ and $M_{2}$ . If time complexity of modules $M_{1}$ and $M_{2}$ are $h(n)$ and $g(n)$ respectively, the time complexity of the algorithm is $\min (h(n), g(n))$ $\max (h(n), g(n))$ $h(n) + g(n)$ $h(n) * g(n)$
makhdoom ghaya
asked
in
Algorithms
Jul 1, 2016
by
makhdoom ghaya
2.2k
views
ugcnetcse-june2014-paper2
algorithms
time-complexity
asymptotic-notation
1
vote
2
answers
11
UGC NET CSE | June 2014 | Part 2 | Question: 38
Searching for an element in the hash table requires $O(1)$ time for the _________time, whereas for direct addressing it holds for the _______ time. worst-case, average worst-case, worst-case average, worst-case best, average
makhdoom ghaya
asked
in
DS
Jun 29, 2016
by
makhdoom ghaya
3.4k
views
ugcnetcse-june2014-paper2
hashing
data-structures
1
vote
2
answers
12
UGC NET CSE | June 2014 | Part 2 | Question: 37
A text is made up of the characters $\alpha, \beta, \gamma, \delta$ and $\sigma$ with the probability $0.12, 0.40, 0.15, 0.08$ and $0.25$ respectively. The optimal coding technique will have the average length of $1.7$ $2.15$ $3.4$ $3.8$
makhdoom ghaya
asked
in
Digital Logic
Jun 29, 2016
by
makhdoom ghaya
5.3k
views
ugcnetcse-june2014-paper2
computer-networks
encoding
1
vote
2
answers
13
UGC NET CSE | June 2014 | Part 2 | Question: 36
Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ? The array elements form a heap. Elements in each half of the array are sorted amongst themselves. Elements in the first half of the array are less than or equal to elements in second half of the array. All of the above
makhdoom ghaya
asked
in
Algorithms
Jun 29, 2016
by
makhdoom ghaya
5.9k
views
ugcnetcse-june2014-paper2
algorithms
sorting
merge-sort
0
votes
1
answer
14
UGC NET CSE | June 2014 | Part 2 | Question: 35
Which of the following commands will output “onetwothree” ? for val; do echo-n $val; done < one two three for one two three; do echo-n-; done for n in one two three; do echo-n $n; done for n in one two three {echo –n $ n}
makhdoom ghaya
asked
in
Others
Jun 29, 2016
by
makhdoom ghaya
1.9k
views
ugcnetcse-june2014-paper2
non-gate
unix
shell-script
1
vote
2
answers
15
UGC NET CSE | June 2014 | Part 2 | Question: 34
Match the following $:$ ... $\text{a-i; b-ii; c-iv; d-iii}$ $\text{a-i; b-iv; c-ii; d-iii}$
makhdoom ghaya
asked
in
Operating System
Jun 29, 2016
by
makhdoom ghaya
6.2k
views
ugcnetcse-june2014-paper2
operating-system
file-system
3
votes
4
answers
16
UGC NET CSE | June 2014 | Part 2 | Question: 33
Consider a system with five processes $P_{0}$ through $P_{4}$ and three resource types $R_{1}$, $R_{2}$ and $R_{3}$ . Resource type $R_{1}$ has $10$ instances, $R_{2}$ has $5$ instances and $R_{3}$ has ... $R_{3}$. The state resulting after this allocation will be Ready state Safe state Blocked state Unsafe state
makhdoom ghaya
asked
in
Operating System
Jun 29, 2016
by
makhdoom ghaya
6.8k
views
ugcnetcse-june2014-paper2
operating-system
resource-allocation
2
votes
2
answers
17
UGC NET CSE | June 2014 | Part 2 | Question: 32
Match the following $:$ ... $\text{a-iii; b-i; c-iv; d-i}$ $\text{a-ii; b-iii; c-iv; d-i}$
makhdoom ghaya
asked
in
Operating System
Jun 29, 2016
by
makhdoom ghaya
3.2k
views
ugcnetcse-june2014-paper2
operating-system
process-scheduling
0
votes
3
answers
18
UGC NET CSE | June 2014 | Part 2 | Question: 31
In a paged memory management algorithm, the hit ratio is $70$%. If it takes $30$ nanoseconds to search Translation Look-aside Buffer (TLB) and $100$ nanoseconds (ns) to access memory, the effective memory access time is $91$ ns $69$ ns $200$ ns $160$ ns
makhdoom ghaya
asked
in
Operating System
Jun 29, 2016
by
makhdoom ghaya
8.8k
views
ugcnetcse-june2014-paper2
operating-system
virtual-memory
0
votes
2
answers
19
UGC NET CSE | June 2014 | Part 2 | Question: 30
SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for Secure Electronic Transaction Secular Enterprise for Transaction Security Electronic Transmission Secured Electronic Termination
makhdoom ghaya
asked
in
Computer Networks
Jun 27, 2016
by
makhdoom ghaya
1.8k
views
ugcnetcse-june2014-paper2
computer-networks
network-security
0
votes
1
answer
20
UGC NET CSE | June 2014 | Part 2 | Question: 29
Match the following $:$ ... $\text{a-iii; b-iv; c-i; d-ii}$ $\text{a-iv; b-iii; c-ii; d-i}$
makhdoom ghaya
asked
in
Others
Jun 27, 2016
by
makhdoom ghaya
1.7k
views
ugcnetcse-june2014-paper2
machine-learning
0
votes
1
answer
21
UGC NET CSE | June 2014 | Part 2 | Question: 28
A software agent is defined as A software developed for accomplishing a given task. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task. An open source software for accomplishing a given task. $I$ $II$ $III$ All of the above
makhdoom ghaya
asked
in
IS&Software Engineering
Jun 27, 2016
by
makhdoom ghaya
1.8k
views
ugcnetcse-june2014-paper2
is&software-engineering
0
votes
1
answer
22
UGC NET CSE | June 2014 | Part 2 | Question: 27
Object Request Broker (ORB) is I. A software program that runs on the client as well as on the application server. II. A software program that runs on the client side only. III. A software program that runs on the application server, where most of the components reside. $I$, $II$ & $III$ $I$ & $II$ $II$ & $III$ $I$ only
makhdoom ghaya
asked
in
Distributed Computing
Jun 27, 2016
by
makhdoom ghaya
1.8k
views
ugcnetcse-june2014-paper2
non-gate
distributed-computing
1
vote
1
answer
23
UGC NET CSE | June 2014 | Part 2 | Question: 26
Match the following with respect to the mobile computing technologies $:$ ... $\text{a-ii; b-iii; c-iv; d-i}$ $\text{a-ii; b-i; c-iv; d-iii}$
makhdoom ghaya
asked
in
Computer Networks
Jun 27, 2016
by
makhdoom ghaya
2.7k
views
ugcnetcse-june2014-paper2
computer-networks
mobile-communication
1
vote
1
answer
24
UGC NET CSE | June 2014 | Part 2 | Question: 25
How many cards must be chosen from a deck to guarantee that at least two aces of two kinds are chosen. two aces are chosen. two cards of the same kind are chosen. two cards of two different kinds are chosen. $50, 50, 14, 5$ $51, 51, 15, 7$ $52, 52, 14, 5$ $51, 51, 14, 5$
makhdoom ghaya
asked
in
Combinatory
Jun 27, 2016
by
makhdoom ghaya
2.9k
views
ugcnetcse-june2014-paper2
combinatory
2
votes
3
answers
25
UGC NET CSE | June 2014 | Part 2 | Question: 24
Big-$O$ estimates for the factorial function and the logarithm of the factorial function i.e. $n!$ and $\log n!$ is given by $O(n!)$ and $O(n \log n)$ $O(n^{n})$ and $O(n \log n)$ $O(n!)$ and $O(\log n!)$ $O(n^{n})$ and $O(\log n!)$
makhdoom ghaya
asked
in
Algorithms
Jun 27, 2016
by
makhdoom ghaya
5.3k
views
ugcnetcse-june2014-paper2
algorithms
time-complexity
asymptotic-notation
1
vote
2
answers
26
UGC NET CSE | June 2014 | Part 2 | Question: 23
Consider a complete bipartite graph $k_{m,n}$. For which values of $m$ and $n$ does this, complete graph have a Hamilton circuit $m = 3, n = 2$ $m = 2, n = 3$ $m = n > 2$ $m = n > 3$
makhdoom ghaya
asked
in
Graph Theory
Jun 27, 2016
by
makhdoom ghaya
7.0k
views
ugcnetcse-june2014-paper2
graph-theory
hamiltonian-graph
1
vote
1
answer
27
UGC NET CSE | June 2014 | Part 2 | Question: 22
The upper bound and lower bound for the number of leaves in a B-tree of degree $K$ with height $h$ is given by : $K^{h}$ and $2 \lceil \frac{k}{2} \rceil ^{h-1}$ $K * h$ and $2 \lfloor \frac{k}{2} \rfloor ^{h-1}$ $K^{h}$ and $2 \lfloor \frac{k}{2} \rfloor ^{h-1}$ $K * h$ and $2 \lceil \frac{k}{2} \rceil ^{h-1}$
makhdoom ghaya
asked
in
Databases
Jun 27, 2016
by
makhdoom ghaya
2.6k
views
ugcnetcse-june2014-paper2
databases
b-tree
2
votes
2
answers
28
UGC NET CSE | June 2014 | Part 2 | Question: 21
Consider the graph given below as : Which one of the following graph is isomorphic to the above graph ?
makhdoom ghaya
asked
in
Graph Theory
Jun 27, 2016
by
makhdoom ghaya
3.4k
views
ugcnetcse-june2014-paper2
graph-theory
non-gate
graph-isomorphism
2
votes
1
answer
29
UGC NET CSE | June 2014 | Part 2 | Question: 20
Give a compound proposition involving propositions $p, q$ and $r$ that is true when exactly two of $p, q$ and $r$ are true and is false otherwise $(p\vee q \wedge \neg r) \wedge (p \wedge \neg q \wedge r) \wedge (\neg p \wedge q \wedge r)$ ... $(p \wedge q \wedge \neg r) \vee (p \wedge \neg q \wedge r) \vee (\neg p \wedge q \wedge r)$
makhdoom ghaya
asked
in
Mathematical Logic
Jun 25, 2016
by
makhdoom ghaya
5.8k
views
ugcnetcse-june2014-paper2
mathematical-logic
propositional-logic
4
votes
2
answers
30
UGC NET CSE | June 2014 | Part 2 | Question: 19
The notation $\exists ! x P(x)$ denotes the proposition “there exists a unique $x$ such that $P(x)$ is true”. Give the truth values of the following statements : I.$\exists ! x P(x) \rightarrow \exists x P(x)$ ... $II$ are true. Both $I$ & $II$ are false. $I$ - false, $II$ - true $I$ - true, $II$ - false
makhdoom ghaya
asked
in
Mathematical Logic
Jun 25, 2016
by
makhdoom ghaya
2.0k
views
ugcnetcse-june2014-paper2
mathematical-logic
first-order-logic
Page:
1
2
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
(3.5k)
Engineering Mathematics
(10.4k)
Digital Logic
(3.6k)
Programming and DS
(6.2k)
Algorithms
(4.8k)
Theory of Computation
(6.9k)
Compiler Design
(2.5k)
Operating System
(5.2k)
Databases
(4.8k)
CO and Architecture
(4.0k)
Computer Networks
(4.9k)
Artificial Intelligence
(79)
Machine Learning
(48)
Data Mining and Warehousing
(25)
Non GATE
(1.4k)
Others
(2.7k)
Admissions
(684)
Exam Queries
(1.6k)
Tier 1 Placement Questions
(17)
Job Queries
(80)
Projects
(11)
Unknown Category
(870)
64.3k
questions
77.9k
answers
244k
comments
80.0k
users
Recent questions tagged ugcnetcse-june2014-paper2
Recent Blog Comments
category ?
Hi @Arjun sir, I have obtained a score of 591 in ...
download here
Can you please tell about IIT-H mtech CSE self...
Please add your admission queries here:...