Welcome to your UGC NET DECEMBER 2018 Computer Science Paper - II Modal Exam
The number of bits required for an IPV 6 address is
The design issue of Datalink Layer in OSI Reference Model is
A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79 ?
B + tree are preferred to binary tree in database because
A graph is non-planar if and only if it contains a subgraph homomorphic to
“Black” refers in the “Black-box” testing means
Component level design is concerned with
A station in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
Data security threats include
The amount of uncertainty in a system of symbol is called
The relationship of data elements in a module is called
The ‘C’ language is
Match the following IC families with their basic circuits : a. TTL 1. NAND b. ECL 2. NOR c. CMOS 3. Inverter Code
Encryption and Decryption is the responsibility of Layer.
All of the following are examples of real security and privacy risks except
In UNIX, which of the following command is used to set the task priority ?
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
Which of the following is a bad example of recursion ?
The time complexity to build a heap of n elements is
The VLF and LF bauds use propagation for communication
How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be
What is the size of the Unicode character in Windows Operating System?
Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ?
The maturity levels used to measure a process are
Web Mining is not used in which of the following areas ?
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
Which API is used to draw a circle ?
Active X controls are Pentium binary programs that can be embedded in ____________
In which tree, for every node the height of its left subtree and right subtree differ almost by one
RAD stands for______.
Optical storage is a
Which of the following is true ?
Dijkestra banking algorithm in an operating system, solves the problem of
How many edges are there in a forest of t-trees containing a total of n vertices ?
Basis path testing falls under
The worst case time complexity of AVL tree is better in comparison to binary search tree for
Consider the tree given below : Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree.
Match the following with respect to C++ data types : a. User defined type 1. Qualifier b. Built in type 2. Union c. Derived type 3. Void d. Long double 4. Pointer
Emergency fixes known as patches are result of
The value of the following expression (13 / 4 * 3) % 5 + 1 is
The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
What is the result of the following expression ? (l&2) + (3&4)
Match the following : List-I List – II a. Wireless Application Environment i. HTTP b. Wireless Transaction Protocol ii. IP c. Wireless Datagram Protocol iii. Scripts d. Wireless iv. UDP
In how many ways can 15 indistinguishable fish be placed into 5 different ponds, so that each pond contains atleast one fish ?
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using :
Linux operating system uses
Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
A chip having 150 gates will be classified as
Testing of software with actual data and in actual environment is called
If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is______ fragment
Please fill in the comment box below.
Be sure to click Submit Quiz to see your results!
Comments are closed.