Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetjune2014iii
1
votes
2
answers
61
UGC NET CSE | June 2014 | Part 3 | Question: 19
Match the following $:$ ... $\text{a-ii, b-i, c-iv, d-iii}$ $\text{a-iv, b-ii, c-i, d-iii}$
Match the following $:$ $\begin{array}{clcl} & \textbf{List – I}&& \textbf{List – II} \\ \text{a.} & \text{Correctness}& \text{i.} & \text{The extent to which a soft...
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Jul 9, 2016
IS&Software Engineering
ugcnetjune2014iii
is&software-engineering
+
–
1
votes
1
answer
62
UGC NET CSE | June 2014 | Part 3 | Question: 18
Consider a project with the following functional units : Number of user inputs = $50$ Number of user outputs = $40$ Number of user enquiries = $35$ Number of user files = $06$ Number of external interfaces = $04$ Assuming all complexity adjustment factors and weighing factors as average, the function points for the project will be 135 722 675 672
Consider a project with the following functional units :Number of user inputs = $50$Number of user outputs = $40$Number of user enquiries = $35$Number of user files = $06...
makhdoom ghaya
19.2k
views
makhdoom ghaya
asked
Jul 9, 2016
IS&Software Engineering
ugcnetjune2014iii
is&software-engineering
software-cost-estimation
+
–
1
votes
1
answer
63
UGC NET CSE | June 2014 | Part 3 | Question: 13
Match the following with respect to I/O classes in object oriented programming $:$ ... $\text{a-ii, b-iii, c-iv, d-i}$ $\text{a-iv, b-iii, c-i, d-ii}$
Match the following with respect to I/O classes in object oriented programming $:$$\begin{array}{clcl} & \textbf{List – I}&& \textbf{List – II} \\ \text{a.} & \text{...
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jul 4, 2016
Object Oriented Programming
ugcnetjune2014iii
object-oriented-programming
match-the-following
+
–
0
votes
2
answers
64
UGC NET CSE | June 2014 | Part 3 | Question: 12
The control string in $C\text{++}$ consists of three important classifications of characters Escape sequence characters, Format specifiers and Whitespace characters Special characters, White-space characters and Non-white space ... , White-space characters and Non-white space characters Special characters, White-space characters and Format specifiers
The control string in $C\text{++}$ consists of three important classifications of charactersEscape sequence characters, Format specifiers and Whitespace charactersSpecial...
makhdoom ghaya
1.7k
views
makhdoom ghaya
asked
Jul 4, 2016
Object Oriented Programming
ugcnetjune2014iii
object-oriented-programming
+
–
0
votes
3
answers
65
UGC NET CSE | June 2014 | Part 3 | Question: 11
Match the following with respect to the jump statements $:$ ... $\text{a-iv, b-iii, c-ii, d-i}$ $\text{a-iv, b-iii, c-i, d-ii}$
Match the following with respect to the jump statements $:$$\begin{array}{cIcI} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{return} & \text{i.} ...
makhdoom ghaya
1.8k
views
makhdoom ghaya
asked
Jul 4, 2016
Programming in C
ugcnetjune2014iii
programming
programming-in-c
+
–
0
votes
2
answers
66
UGC NET CSE | June 2014 | Part 3 | Question: 10
Code blocks allow many algorithms to be implemented with the following parameters : clarity, elegance, performance clarity, elegance, efficiency elegance, performance, execution execution, clarity, performance
Code blocks allow many algorithms to be implemented with the following parameters :clarity, elegance, performance clarity, elegance, efficiencyelegance, performance, exec...
makhdoom ghaya
1.6k
views
makhdoom ghaya
asked
Jul 4, 2016
Programming in C
ugcnetjune2014iii
programming
non-gate
+
–
1
votes
2
answers
67
UGC NET CSE | June 2014 | Part 3 | Question: 09
Perceptron learning, Delta learning and $LMS$ learning are learning methods which falls under the category of Error correction learning - learning with a teacher Reinforcement learning - learning with a critic Hebbian learning Competitive learning - learning without a teacher
Perceptron learning, Delta learning and $LMS$ learning are learning methods which falls under the category ofError correction learning - learning with a teacherReinforcem...
makhdoom ghaya
4.7k
views
makhdoom ghaya
asked
Jul 4, 2016
Artificial Intelligence
ugcnetjune2014iii
machine-learning
+
–
1
votes
2
answers
68
UGC NET CSE | June 2014 | Part 3 | Question: 08
Consider a fuzzy set old as defined below Old =$ \left\{(20, 0.1), (30, 0.2), (40, 0.4), (50, 0.6), (60, 0.8), (70, 1), (80, 1)\right\}$. Then the alpha-cut for alpha = $0.4$ for the set old will be $\left\{(40, 0.4)\right\}$ ... $\left\{(20, 0), (30, 0), (40, 1), (50, 1), (60, 1), (70, 1), (80, 1)\right\}$
Consider a fuzzy set old as defined belowOld =$ \left\{(20, 0.1), (30, 0.2), (40, 0.4), (50, 0.6), (60, 0.8), (70, 1), (80, 1)\right\}$.Then the alpha-cut for alpha = $0....
makhdoom ghaya
9.3k
views
makhdoom ghaya
asked
Jul 4, 2016
Data Mining and Warehousing
ugcnetjune2014iii
knowledge-representation
fuzzy-set
+
–
0
votes
1
answer
69
UGC NET CSE | June 2014 | Part 3 | Question: 06
In a digital transmission, the receiver clock is $0.1$ percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is $1$ Mbps ? $10$ bps $100$ bps $1000$ bps $10000$ bps
In a digital transmission, the receiver clock is $0.1$ percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is ...
makhdoom ghaya
11.4k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Networks
ugcnetjune2014iii
computer-networks
communication
+
–
0
votes
3
answers
70
UGC NET CSE | June 2014 | Part 3 | Question: 05
Which of the following color models are defined with three primary colors ? RGB and HSV color models CMY and HSV color models HSV and HLS color models RGB and CMY color models
Which of the following color models are defined with three primary colors ? RGB and HSV color modelsCMY and HSV color modelsHSV and HLS color modelsRGB and CMY color mode...
makhdoom ghaya
4.3k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
0
votes
1
answer
71
UGC NET CSE | June 2014 | Part 3 | Question: 04
Consider a window bounded by the lines : $x = 0; y= 0; x = 5$ and $y = 3$. The line segment joining $(-1, 0)$ and $(4, 5)$, if clipped against this window will connect the points $(0, 1)$ and $(2, 3)$ $(0, 1)$ and $(3, 3)$ $(0, 1)$ and $(4, 3)$ $(0, 1)$ and $(3, 2)$
Consider a window bounded by the lines : $x = 0; y= 0; x = 5$ and $y = 3$. The line segment joining $(-1, 0)$ and $(4, 5)$, if clipped against this window will connect th...
makhdoom ghaya
7.1k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
geometry
computer-graphics
+
–
0
votes
2
answers
72
UGC NET CSE | June 2014 | Part 3 | Question: 03
Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes $:$ ... $\text{a-iv, b-iii, c-ii, d-i}$ $\text{a-iii, b-i, c-iv, d-ii}$
Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes $:$$\begin{array}{cIcI} & \textbf{List...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
2
votes
2
answers
73
UGC NET CSE | June 2014 | Part 3 | Question: 02
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are Butt cap and sharp cap Butt cap and round cap Butt cap, sharp cap and round cap Butt cap, round cap and projecting square cap
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used areButt cap and sharp capButt cap and round ...
makhdoom ghaya
3.1k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
0
votes
1
answer
74
UGC NET CSE | June 2014 | Part 3 | Question: 01
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used in rasterscan ... method. IV. Shadow-mask method is better than beam-penetration method. I and II II and III III only IV only
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ?I. The beam-penetration is used...
makhdoom ghaya
6.2k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
69
votes
11
answers
75
GATE CSE 1999 | Question: 2.7, UGCNET-June2014-III: 25
Consider the schema $R=(S,T, U, V)$ and the dependencies $S \rightarrow T, T \rightarrow U, U \rightarrow V$ and $V \rightarrow S$. Let $R = (R1\text{ and } R2)$ be a decomposition such that $R1 \cap R2 \neq \phi$. The decomposition ... but not $\textsf{3NF}$ in $\textsf{3NF}$ but not in $\textsf{2NF}$ in both $\textsf{2NF}$ and $\textsf{3NF}$
Consider the schema $R=(S,T, U, V)$ and the dependencies $S \rightarrow T, T \rightarrow U, U \rightarrow V$ and $V \rightarrow S$. Let $R = (R1\text{ and } R2)$ be a dec...
Kathleen
27.5k
views
Kathleen
asked
Sep 23, 2014
Databases
gate1999
databases
database-normalization
normal
ugcnetjune2014iii
+
–
Page:
« prev
1
2
3
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register