Welcome to your UGC NET DECEMBER 2018 Computer Science Paper - II Modal Exam
The relationship of data elements in a module is called
A station in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
Linux operating system uses
The design issue of Datalink Layer in OSI Reference Model is
RAD stands for______.
Optical storage is a
Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
All of the following are examples of real security and privacy risks except
The VLF and LF bauds use propagation for communication
Component level design is concerned with
The value of the following expression (13 / 4 * 3) % 5 + 1 is
The time complexity to build a heap of n elements is
Data security threats include
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
“Black” refers in the “Black-box” testing means
Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ?
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using :
The worst case time complexity of AVL tree is better in comparison to binary search tree for
A chip having 150 gates will be classified as
How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
The ‘C’ language is
Which of the following is a bad example of recursion ?
In how many ways can 15 indistinguishable fish be placed into 5 different ponds, so that each pond contains atleast one fish ?
In UNIX, which of the following command is used to set the task priority ?
In which tree, for every node the height of its left subtree and right subtree differ almost by one
Basis path testing falls under
Testing of software with actual data and in actual environment is called
Which API is used to draw a circle ?
Match the following IC families with their basic circuits : a. TTL 1. NAND b. ECL 2. NOR c. CMOS 3. Inverter Code
Encryption and Decryption is the responsibility of Layer.
Emergency fixes known as patches are result of
Dijkestra banking algorithm in an operating system, solves the problem of
Match the following with respect to C++ data types : a. User defined type 1. Qualifier b. Built in type 2. Union c. Derived type 3. Void d. Long double 4. Pointer
The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be
The maturity levels used to measure a process are
What is the size of the Unicode character in Windows Operating System?
Which of the following is true ?
B + tree are preferred to binary tree in database because
Active X controls are Pentium binary programs that can be embedded in ____________
Consider the tree given below : Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree.
What is the result of the following expression ? (l&2) + (3&4)
Web Mining is not used in which of the following areas ?
The number of bits required for an IPV 6 address is
If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is______ fragment
The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
A graph is non-planar if and only if it contains a subgraph homomorphic to
How many edges are there in a forest of t-trees containing a total of n vertices ?
Match the following : List-I List – II a. Wireless Application Environment i. HTTP b. Wireless Transaction Protocol ii. IP c. Wireless Datagram Protocol iii. Scripts d. Wireless iv. UDP
The amount of uncertainty in a system of symbol is called
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79 ?
Please fill in the comment box below.
Be sure to click Submit Quiz to see your results!
Time's up
Instructions:
Comments are closed.
1. dwUQQUrL 2. dwUQQUrL 3. dwUQQUrL 4. dwUQQUrL 5. dwUQQUrL