Once a process is executing on the CPU, which events could not occur?A. Issues an I/O request and then placed in the Ready queueB. Creates subprocesses and waits for themC. Time slice expires and it joins the Waiting queueD. Forcibly removed and put in Waiting queue due to an interrupt
Previous 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)
Nearest first
1
2
3
4
5
6
7
8
9
10
Consider T1(A,B,C,D,E) with FDs { EB→C, D→E, EA→B } and T2(A,B,C,D) with FDs { C→A, A→B, A→D }. Which is TRUE?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
List I
List II
A. Overloading
III. Supports compile-time polymorphism
B. Early Binding
…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following algorithms use the Greedy strategy?A. Dijkstra’s algorithmB. Kruskal’s algorithmC. Huffman codin…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Consider the following statements regarding Agent systems:A. Agent system comprises of an agent and an environment on w…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following statements are TRUE about encryption techniques?A. In symmetric key cryptography, the secrecy/pr…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Only legal pointer operations:A. pointer + number → pointerB. pointer – number → numberC. pointer + pointer → pointerD.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Consider the following steps used by a knowledge base designer to represent a world:A. Selects atoms to represent propo…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following cohesions are better than the Procedural Cohesion?A. Functional CohesionB. Sequential CohesionC.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following is not a requirement elicitation technique?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
int x = 128, y = 110;do { if (x > y) x = x - y; else y = y - x;}…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Next 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)
Ascending by ID
1
2
3
4
5
6
7
8
9
10
Let m and n be positive integers.(A) If n ≠ 1, then m < mn.(B) If k is composite, then k = mn where 1 < m, n >…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Right sequence of CPU program to input data:A. Read status registerB. Check flag bitC. Read data registerD. Transfer da…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Estimation of software development effort for organic software in basic COCOMO is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following technique is used for Clipping?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the followings shows the correct hierarchy of a layered file system in an operating system?A. Logical File Sys…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Choose the correct statement for a group G:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Considering the following statements:A. A non-serial schedule is said to be conflict-serializable, if it is conflict-eq…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Consider the following DFAWhich of the following NFA is valid for the given DFA?(a) (b) (c)
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Gray code equivalent to decimal number 8 is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
List I (GA termination criteria) List II (description) A. Worst Individual I. At least half of the individual will be…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)