Aspire Faculty ID #15039 · Topic: UGC NET Computer Science 26 June 2025 (Paper II) · Just now
UGC NET Computer Science 26 June 2025 (Paper II)

Which of the following technique is used for Clipping?

Solution

Used for line clipping in computer graphics — efficiently finds visible portions of a line segment.

Previous 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Nearest first
1
Estimation of software development effort for organic software in basic COCOMO is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
2
Right sequence of CPU program to input data:A. Read status registerB. Check flag bitC. Read data registerD. Transfer da…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
3
Let m and n be positive integers.(A) If n ≠ 1, then m < mn.(B) If k is composite, then k = mn where 1 < m, n >…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
4
Once a process is executing on the CPU, which events could not occur?A. Issues an I/O request and then placed in the Re…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
5
Consider T1(A,B,C,D,E) with FDs { EB→C, D→E, EA→B } and T2(A,B,C,D) with FDs { C→A, A→B, A→D }. Which is TRUE?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
6
List I List II A. Overloading III. Supports compile-time polymorphism B. Early Binding …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
7
Which of the following algorithms use the Greedy strategy?A. Dijkstra’s algorithmB. Kruskal’s algorithmC. Huffman codin…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
8
Consider the following statements regarding Agent systems:A. Agent system comprises of an agent and an environment on w…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
9
Which of the following statements are TRUE about encryption techniques?A. In symmetric key cryptography, the secrecy/pr…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
10
Only legal pointer operations:A. pointer + number → pointerB. pointer – number → numberC. pointer + pointer → pointerD.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)

Next 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Ascending by ID
1
Which of the followings shows the correct hierarchy of a layered file system in an operating system?A. Logical File Sys…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
2
Choose the correct statement for a group G:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
3
Considering the following statements:A. A non-serial schedule is said to be conflict-serializable, if it is conflict-eq…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
4
Consider the following DFAWhich of the following NFA is valid for the given DFA?(a) (b) (c) 
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
5
Gray code equivalent to decimal number 8 is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
6
List I (GA termination criteria) List II (description) A. Worst Individual I. At least half of the individual will be…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
7
Which of the following Grammars is/are only Context-Free? LabelProductions Note A S → Ab aS → aA A → a LHS “aS” h…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
8
Match List I with List II List I (Software Quality Characteristic) List II (Description) A. Reliability II. Capabil…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
9
STRIPS Representation of a Planning ProblemA. STRIPS is a feature-centric representationB. The features describing the …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
10
Consider the following disc Queue with requests for l/O to block on cylinders : 45, 81, 185, 33, 175, 99, 150, 77&…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Ask Your Question or Put Your Review.

loading...