Home
About Us
Contact Us
Bookmark
Saved Bookmarks
Current Affairs
General Knowledge
Chemical Engineering
UPSEE
BSNL
ISRO
BITSAT
Amazon
ORACLE
Verbal Ability
→
Ugc Net
→
Nta Ugc Net 2019 June – Ii in Ugc Net
→
The third generation mobile phone are digital and...
1.
The third generation mobile phone are digital and based on(A) AMPS(B) Broadband CDMA(C) CDMA(D) D-AMPS
Answer»
Show Answer
Discussion
No Comment Found
Post Comment
Related InterviewSolutions
If the frame buffer has 10-bits per pixel and 8-bits are allocated for each of the R, G and B components then what would be the size of the color lookup table (LUT)(A) (210 +211 ) bytes(B) (210 +28 ) bytes(C) (210 + 224 ) bytes(D) (28 + 29 ) bytes
Suppose P, Q and R are co-operating processes satisfying Mutual Exclusion condition. Then if the process Q is executing in its critical section then(A) ‘P’ executes in critical section(B) ‘R’ executes in critical section(C) Neither ‘P’ nor ‘Q’ executes in their critical section(D) Both ‘P’ and ‘R’ executes in critical section
A Computer uses a memory unit with 256K word of 32 bits each. A binary instruction code is stored in one word of memory. The instruction has four parts: an indirect bit, an operation code and a register code part to specify one of 64 registers and an address part. How many bits are there in operation code, the register code part and the address part ?(A) 7, 7, 18(B) 18, 7, 7(C) 7, 6, 18(D) 6, 7, 18
Consider the following set of processes and the length of CPU burst time given in milliseconds:Assume that processes being scheduled with Round-Robin Scheduling Algorithm with Time Quantum 4ms. Then The waiting time for P4 is _________ ms.(A) 0(B) 4(C) 12(D) 6
Which homogeneous 2D matrix transforms the figure (a) on the left side to the figure (b) on the right ?(A) (B) (C) (D)
The number of substrings that can be formed from string given by “a d e f b g h n m p” is(A) 10(B) 45(C) 56(D) 55
Which of the following statement/s is/are true ?(i) Firewall can screen traffic going into or out of an organization.(ii) Virtual private networks cam simulate an old leased network to provide certain desirable properties.Choose the correct answer from the code given below:(A) (i) only(B) Neither (i) nor (ii)(C) Both (i) and (ii)(D) (ii) only
Consider the following statements related to AND-OR Search algorithm.S1 : A solution is a subtree that has a goal node at every leaf.S2 : OR nodes are analogous to the branching in a deterministic environmentS3 : AND nodes are analogous to the branching in a non-deterministic environment.Which one of the following is true referencing the above statements ? Choose the correct answer from the code given below:(A) S1- False, S2- True, S3- True(B) S1- True, S2- True, S3- True(C) S1- False, S2- True, S3- False(D) S1- True, S2- True, S3- False
Which of the following HTML5 codes will affect the horizontal as well as vertical alignment of the table content ?(A) < t d halign = " middle" valign = " center" > BASH < / td >(B) < t d style = " text − a lign : center; vertical − a lign : middle; " > BASH < / td >(C) < t d align = "middle" valign = " center" > B ASH < / td >(D) < t d style = " horizontal − a lign : c enter; vertical − a lign : m iddle; " > B ASH < / td >
Consider a system with 2 level cache. Access times of Level 1, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level1 and Level2 caches are 0.7 and 0.8 respectively. What is the average access time of the system ignoring the search time within cache ?(A) 20.75 ns(B) 7.55 ns(C) 24.35 ns(D) 35.20 ns
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies