Prep Hub

UGC NET PAPER 2 COMPUTER SCIENCE – SET 3

UGC NET PAPER 2 COMPUTER SCIENCE – SET 3

Period: DEC 2010


41. Data mining is?

Software Engineering • Data mining • DEC 2010


42. Data mart may contain?

Software Engineering • Data warehousing • DEC 2010


43. Warnier diagram helps?

Software Engineering • Design methods • DEC 2010


44. E-Choupal refers to?

Software Engineering • E-commerce • DEC 2010


45. Not maintenance activity?

Software Engineering • Maintenance • DEC 2010


46. In generalisation, member differences are?

Software Engineering • Object-oriented design • DEC 2010


47. Ethics in info society include?

Software Engineering • Professional ethics • DEC 2010


48. Prototyping used to?

Software Engineering • Requirement analysis • DEC 2010


49. “Black” in black-box testing means?

Software Engineering • Software testing • DEC 2010


50. System specification excludes?

Software Engineering • Specification • DEC 2010


51. Transistor threshold voltage for CMOS on 10 V supply is approximately

Computer Organization and Architecture • CMOS Technology • DEC 2010


52. CDMA cell uses ______ carriers of 1.25 MHz.

Data Communication and Computer Networks • Cellular Technologies • DEC 2010


53. Internet layer services include: 1. QoS 2.Routing 3.Addressing 4.Connection-oriented delivery 5.Framing

Data Communication and Computer Networks • IP Layer Functions • DEC 2010


54. Network cost is usually determined by:

Data Communication and Computer Networks • Network Economics • DEC 2010


55. End-to-end connectivity is provided at which layer?

Data Communication and Computer Networks • OSI/TCP-IP Models • DEC 2010


56. The ______ field in SNMP PDU reports an error in a response.

Data Communication and Computer Networks • SNMP Protocol • DEC 2010


57. A 1.544 Mbps leased connection is called a ______ carrier.

Data Communication and Computer Networks • WAN Technologies • DEC 2010


58. Maximum operating rate of an IR wireless LAN is:

Data Communication and Computer Networks • Wireless LANs • DEC 2010


59. To maximize ATM code brute-force time t, choose

Data Communication and Computer Networks • Authentication • DEC 2010


60. In a chained hash table of size 100, the maximum entries is:

Data Structures and Algorithms • Hashing • DEC 2010



Disclaimer for MCQ Quiz
This quiz is for educational purposes only…

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Scroll to Top