Skip to content

Category Archives: UGC-NET

The elements 42, 25, 30, 40, 22, 35, 26 are inserted one by one in the given order into a max-heap. The resultant max-heap is… Read More
Consider the following postfix expression with single digit operands : 6 2 3 * / 4 2 * + 6 8 * - The top… Read More
Which of the following statement/s is/are true ? (i) windows XP supports both peer-peer and client-server networks. (ii) Windows XP implements Transport protocols as drivers… Read More
Consider the following sequence of two transactions on a bank account(A) with initial balance 20,000 that transfers 5,000 to another account (B) and then apply… Read More
​Which of the following statement/s is/are true ? (i) Facebook has the world’s largest Hadoop cluster. (ii) Hadoop 2.0 allows live stream processing of real… Read More
Consider the singly linked list. What is the worst case time complexity of the best-known algorithm to delete the node a, pointer to this node… Read More
A full joint distribution for the Toothache, Cavity and Catch is given in the table below: Which is the probability of Cavity, given evidence of… Read More
A binary search tree is constructed by inserting the following numbers in order: 60, 25, 72, 15, 30, 68, 101, 13, 18, 47, 70, 34… Read More
An attribute A of data type varchar(20) has the value ‘xyz’ and attribute B of data type char(20) has the value “Imnop” , then the… Read More
The grammar S ⟶ (S) | SS | ∈ is ​ not​ suitable for predictive parsing because the grammar is (A) An Operator Grammar (B)… Read More
Consider the following two C++ programs P​1​ and P2​ and two statements S1​ and S2​ about the programs : S​1 : P1​ prints out 3… Read More
Consider the graph shown below : Use Kruskal’s algorithm to find the minimum spanning tree of the graph. The weight of this minimum spanning tree… Read More
A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus, Train or Automobile as a major methods of… Read More
Consider the schema R=(A, B, C, D, E, F) on which the following functional dependencies hold : A ➝ B B,C ➝ D E ➝… Read More
The four byte IP Address consists of (A) Neither network nor Host Address (B) Network Address (C) Both Network and Host Address (D) Host Address… Read More

Start Your Coding Journey Now!