Aspire Faculty ID #15038 · Topic: UGC NET Computer Science 26 June 2025 (Paper II) · Just now
UGC NET Computer Science 26 June 2025 (Paper II)

Estimation of software development effort for organic software in basic COCOMO is:

Solution

$E = 2.4\,(KLOC)^{1.05}\,PM$

Previous 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Nearest first
1
Right sequence of CPU program to input data:A. Read status registerB. Check flag bitC. Read data registerD. Transfer da…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
2
Let m and n be positive integers.(A) If n ≠ 1, then m < mn.(B) If k is composite, then k = mn where 1 < m, n >…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
3
Once a process is executing on the CPU, which events could not occur?A. Issues an I/O request and then placed in the Re…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
4
Consider T1(A,B,C,D,E) with FDs { EB→C, D→E, EA→B } and T2(A,B,C,D) with FDs { C→A, A→B, A→D }. Which is TRUE?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
5
List I List II A. Overloading III. Supports compile-time polymorphism B. Early Binding …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
6
Which of the following algorithms use the Greedy strategy?A. Dijkstra’s algorithmB. Kruskal’s algorithmC. Huffman codin…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
7
Consider the following statements regarding Agent systems:A. Agent system comprises of an agent and an environment on w…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
8
Which of the following statements are TRUE about encryption techniques?A. In symmetric key cryptography, the secrecy/pr…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
9
Only legal pointer operations:A. pointer + number → pointerB. pointer – number → numberC. pointer + pointer → pointerD.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
10
Consider the following steps used by a knowledge base designer to represent a world:A. Selects atoms to represent propo…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)

Next 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Ascending by ID
1
Which of the following technique is used for Clipping?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
2
Which of the followings shows the correct hierarchy of a layered file system in an operating system?A. Logical File Sys…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
3
Choose the correct statement for a group G:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
4
Considering the following statements:A. A non-serial schedule is said to be conflict-serializable, if it is conflict-eq…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
5
Consider the following DFAWhich of the following NFA is valid for the given DFA?(a) (b) (c) 
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
6
Gray code equivalent to decimal number 8 is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
7
List I (GA termination criteria) List II (description) A. Worst Individual I. At least half of the individual will be…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
8
Which of the following Grammars is/are only Context-Free? LabelProductions Note A S → Ab aS → aA A → a LHS “aS” h…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
9
Match List I with List II List I (Software Quality Characteristic) List II (Description) A. Reliability II. Capabil…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
10
STRIPS Representation of a Planning ProblemA. STRIPS is a feature-centric representationB. The features describing the …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Ask Your Question or Put Your Review.

loading...