Match List I with List II
| List I (Grammar Type) | List II (Production Form) |
|---|---|
| A. Type 3 Grammar | IV. $V \rightarrow V\Sigma \mid \Sigma$ |
| B. Type 2 Grammar | I. $V \rightarrow (V \cup \Sigma)^{*}$ |
| C. Type 1 Grammar | II. $\lambda A \beta \rightarrow \lambda\,\gamma\,\beta,\;(\lambda,\beta)\in (V\cup\Sigma)^{*}$ |
| D. Type 0 Grammar | III. $(V\cup\Sigma)^{*} \rightarrow (V\cup\Sigma)^{*}$ |
Previous 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)
Nearest first
1
2
3
4
5
6
7
8
9
10
Which of the following gates do not give output 1 when both inputs are 0?A. NAND gateB. NOR gateC. XOR gateD. XNOR gate
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
void main() { int *i, a = 12, b = 2, c; c = (a = a + b, b = a / b, a = a * b, b = a - b);&nbs…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Arrange the following types of testing in the order they are usually performed in the Software Development Life Cycle (…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following is NOT a parent selection technique used in genetic algorithm implementations?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Identify the correct statement(s) from the following with respect to Spinlock Semaphores:A. The name refers to busy wai…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
CB84000D001C001C is the content of a UDP header in hexadecimal format. The source port number is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
In a Stop-and-Wait system, the bandwidth of the line is 1 Mbps, and 1 bit takes 30 milliseconds to make a round trip.
T…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Binary equivalent to $(A0F)_{16}$ is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Match List I with List II
List I (Hashing Collision Handling Method)List II (Strategy) A. ChainingI. Check next slot …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
In a relational database, which one of the following is CORRECT:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Next 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)
Ascending by ID
1
2
3
4
5
6
7
8
9
10
int x = 128, y = 110;do { if (x > y) x = x - y; else y = y - x;}…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following is not a requirement elicitation technique?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following cohesions are better than the Procedural Cohesion?A. Functional CohesionB. Sequential CohesionC.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Consider the following steps used by a knowledge base designer to represent a world:A. Selects atoms to represent propo…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Only legal pointer operations:A. pointer + number → pointerB. pointer – number → numberC. pointer + pointer → pointerD.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following statements are TRUE about encryption techniques?A. In symmetric key cryptography, the secrecy/pr…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Consider the following statements regarding Agent systems:A. Agent system comprises of an agent and an environment on w…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Which of the following algorithms use the Greedy strategy?A. Dijkstra’s algorithmB. Kruskal’s algorithmC. Huffman codin…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
List I
List II
A. Overloading
III. Supports compile-time polymorphism
B. Early Binding
…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Consider T1(A,B,C,D,E) with FDs { EB→C, D→E, EA→B } and T2(A,B,C,D) with FDs { C→A, A→B, A→D }. Which is TRUE?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)