Welcome to your UGC NET DECEMBER 2018 Computer Science Paper - II Modal Exam
The maturity levels used to measure a process are
A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79 ?
Data security threats include
Which API is used to draw a circle ?
The VLF and LF bauds use propagation for communication
Encryption and Decryption is the responsibility of Layer.
Match the following IC families with their basic circuits : a. TTL 1. NAND b. ECL 2. NOR c. CMOS 3. Inverter Code
Testing of software with actual data and in actual environment is called
What is the size of the Unicode character in Windows Operating System?
Match the following : List-I List – II a. Wireless Application Environment i. HTTP b. Wireless Transaction Protocol ii. IP c. Wireless Datagram Protocol iii. Scripts d. Wireless iv. UDP
Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ?
The design issue of Datalink Layer in OSI Reference Model is
Active X controls are Pentium binary programs that can be embedded in ____________
Emergency fixes known as patches are result of
Basis path testing falls under
A station in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
All of the following are examples of real security and privacy risks except
Match the following with respect to C++ data types : a. User defined type 1. Qualifier b. Built in type 2. Union c. Derived type 3. Void d. Long double 4. Pointer
Which of the following is true ?
How many edges are there in a forest of t-trees containing a total of n vertices ?
How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
Which of the following is a bad example of recursion ?
Web Mining is not used in which of the following areas ?
RAD stands for______.
The number of bits required for an IPV 6 address is
Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
“Black” refers in the “Black-box” testing means
Component level design is concerned with
Optical storage is a
B + tree are preferred to binary tree in database because
What is the result of the following expression ? (l&2) + (3&4)
The relationship of data elements in a module is called
Linux operating system uses
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using :
In how many ways can 15 indistinguishable fish be placed into 5 different ponds, so that each pond contains atleast one fish ?
The amount of uncertainty in a system of symbol is called
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
The ‘C’ language is
In UNIX, which of the following command is used to set the task priority ?
If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is______ fragment
In which tree, for every node the height of its left subtree and right subtree differ almost by one
The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be
A graph is non-planar if and only if it contains a subgraph homomorphic to
The value of the following expression (13 / 4 * 3) % 5 + 1 is
The worst case time complexity of AVL tree is better in comparison to binary search tree for
The time complexity to build a heap of n elements is
Consider the tree given below : Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree.
A chip having 150 gates will be classified as
Dijkestra banking algorithm in an operating system, solves the problem of
The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
Please fill in the comment box below.
Be sure to click Submit Quiz to see your results!
Time's up
Instructions:
Comments are closed.
1. Suganthi 2. Anu 3. saranya 4. Malini 5. vICKY