UGC NET PAPER 2 COMPUTER SCIENCE – SET 3
Period: DEC 2010
41. Data mining is?
Software Engineering • Data mining • DEC 2010
42. Data mart may contain?
Software Engineering • Data warehousing • DEC 2010
43. Warnier diagram helps?
Software Engineering • Design methods • DEC 2010
44. E-Choupal refers to?
Software Engineering • E-commerce • DEC 2010
45. Not maintenance activity?
Software Engineering • Maintenance • DEC 2010
46. In generalisation, member differences are?
Software Engineering • Object-oriented design • DEC 2010
47. Ethics in info society include?
Software Engineering • Professional ethics • DEC 2010
48. Prototyping used to?
Software Engineering • Requirement analysis • DEC 2010
49. “Black” in black-box testing means?
Software Engineering • Software testing • DEC 2010
50. System specification excludes?
Software Engineering • Specification • DEC 2010
51. Transistor threshold voltage for CMOS on 10 V supply is approximately
Computer Organization and Architecture • CMOS Technology • DEC 2010
52. CDMA cell uses ______ carriers of 1.25 MHz.
Data Communication and Computer Networks • Cellular Technologies • DEC 2010
53. Internet layer services include: 1. QoS 2.Routing 3.Addressing 4.Connection-oriented delivery 5.Framing
Data Communication and Computer Networks • IP Layer Functions • DEC 2010
54. Network cost is usually determined by:
Data Communication and Computer Networks • Network Economics • DEC 2010
55. End-to-end connectivity is provided at which layer?
Data Communication and Computer Networks • OSI/TCP-IP Models • DEC 2010
56. The ______ field in SNMP PDU reports an error in a response.
Data Communication and Computer Networks • SNMP Protocol • DEC 2010
57. A 1.544 Mbps leased connection is called a ______ carrier.
Data Communication and Computer Networks • WAN Technologies • DEC 2010
58. Maximum operating rate of an IR wireless LAN is:
Data Communication and Computer Networks • Wireless LANs • DEC 2010
59. To maximize ATM code brute-force time t, choose
Data Communication and Computer Networks • Authentication • DEC 2010
60. In a chained hash table of size 100, the maximum entries is:
Data Structures and Algorithms • Hashing • DEC 2010
Disclaimer for MCQ Quiz
This quiz is for educational purposes only…