Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Recent
Hot!
Most votes
Most answers
Most views
Previous GATE
Featured
Most answered questions in Others
0
votes
4
answers
1
UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
Decrypt the message "WTAAD" using the Caesar Cipher with key =15LIPPSHELLOPLLEHDAATW
Pooja Khatri
5.3k
views
Pooja Khatri
asked
Jul 13, 2018
Others
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
+
–
3
votes
3
answers
2
UGC NET CSE | December 2014 | Part 3 | Question: 56
An $A^{*}$ algorithm is a heuristic search technique which Is like a depth-first search where most promising child is selected for expansion Generates all successor nodes and computes an estimate of distance (cost) from start node ... (costs) from start node to all generated nodes and chooses shortest path for further expansion. None of the above
An $A^{*}$ algorithm is a heuristic search technique whichIs like a depth-first search where most promising child is selected for expansion Generates all successor nodes ...
makhdoom ghaya
2.8k
views
makhdoom ghaya
asked
Jul 30, 2016
Others
ugcnetcse-dec2014-paper3
artificial-intelligence
searching
+
–
2
votes
3
answers
3
UGC NET CSE | June 2016 | Part 3 | Question: 73
Consider the following game tree in which root is a maximizing node and children are visited left to right. What nodes will be pruned by the alpha-beta pruning? $I$ $HI$ $CHI$ $GHI$
Consider the following game tree in which root is a maximizing node and children are visited left to right. What nodes will be pruned by the alpha-beta pruning?$I$$HI$$CH...
Abdul Majeed
5.2k
views
Abdul Majeed
asked
Jul 11, 2016
Others
ugcnetcse-june2016-paper3
artificial-intelligence
alpha-beta-pruning
+
–
1
votes
2
answers
4
ISRO 2024
Asymmetric encryption is not suitable for Confidentiality Authentication Key Exchange Prevention of Denail of Service
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
Ramayya
320
views
Ramayya
asked
Jan 7
Others
isro-2024
cryptography
non-gate
+
–
0
votes
2
answers
5
IB JIO Grade-2 Tech 2023 part-2: 27
Q.27 In a digital communication system, let the encoding scheme be "Add 1 at the end of the bit stream if number of 1 bits is odd, else add 0 at the end of bit stream". If 1011 is the bit stream, which of the ... : 6306801082303 Option 2 ID : 6306801082301 Option 3 ID : 6306801082302 Option 4 ID : 6306801082304 Status : Not Answered Chosen Option : --
Q.27 In a digital communication system, let the encoding scheme be "Add 1 at the end of the bit stream if number of 1 bits is odd, else add 0 at the end of bit stream". I...
admin
145
views
admin
asked
Jul 31, 2023
Others
ibjio2023-part2
+
–
0
votes
2
answers
6
UGC NET CSE | October 2022 | Part 1 | Question: 17
A classless address is given as $167.199 .170 .82 / 27$. The number of addresses in the network is $64$ addresses $32$ addresses $28$ addresses $30$ addresses
A classless address is given as $167.199 .170 .82 / 27$. The number of addresses in the network is$64$ addresses$32$ addresses$28$ addresses$30$ addresses
admin
354
views
admin
asked
Oct 23, 2022
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
2
answers
7
UGC NET CSE | October 2022 | Part 1 | Question: 45
Match List I with List II : List I List II (A) Type $0$ (I) Finite automata (B) Type $1$ (II) Tuning machine (C) Type $2$ (III) Linear bound automata (D) Type $3$ ...
Match List I with List II :List IList II(A) Type $0$(I) Finite automata(B) Type $1$(II) Tuning machine(C) Type $2$(III) Linear bound automata(D) Type $3$(IV) Pushdown aut...
admin
615
views
admin
asked
Oct 23, 2022
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
2
answers
8
UGC NET CSE | October 2022 | Part 1 | Question: 74
Which of the following algorithm design approach is used in Quick sort algorithm? Dynamic programming Back Tracking Divide and conquer Greedy approach
Which of the following algorithm design approach is used in Quick sort algorithm?Dynamic programmingBack TrackingDivide and conquerGreedy approach
admin
342
views
admin
asked
Oct 23, 2022
Others
ugcnetcse-oct2022-paper1
algorithm-design
quick-sort
+
–
1
votes
2
answers
9
UGC NET CSE | October 2022 | Part 1 | Question: 76
Consider the following statements: Statement $\text{I}$: $\text{LALR}$ parser is more powerful than canonical $\text{LR}$ Parser. Statement $\text{II}$: $\text{SLR}$ parser is more powerful than $\text{LALR}$ Which of the following is ... Statement $\text{I}$ and Statement $\text{II}$ false Both Statement $\text{I}$ and Statement $\text{II}$ true
Consider the following statements:Statement $\text{I}$: $\text{LALR}$ parser is more powerful than canonical $\text{LR}$ Parser.Statement $\text{II}$: $\text{SLR}$ parser...
admin
536
views
admin
asked
Oct 23, 2022
Others
ugcnetcse-oct2022-paper1
+
–
0
votes
2
answers
10
CSE EXAM 2022
??????????
??????????
rsansiya111
318
views
rsansiya111
asked
Feb 12, 2022
Others
normal
+
–
0
votes
2
answers
11
NIELIT 2021 Dec Scientist B - Section A: 17
Directions $(14 - 18) :$ Read the information given below and on the basis of the information, select the correct alternative for each question given after the information. $\text{M}$ and $\text{N}$ are good at hockey and volleyball. $\text{O}$ ... Who is good at cricket, baseball and volleyball $?$ $\text{Q}$ $\text{P}$ $\text{O}$ $\text{N}$
Directions $(14 – 18) :$ Read the information given below and on the basis of the information, select the correct alternative for each question given after the informat...
soujanyareddy13
262
views
soujanyareddy13
asked
Dec 7, 2021
Others
nielit2021dec-scientistb
+
–
0
votes
2
answers
12
NIELIT 2016 MAR Scientist C - Section B: 5
If $f(x,y)=x^{3}y+e^{x},$ the partial derivatives, $\dfrac{\partial f}{\partial x},\dfrac{\partial f}{\partial y}$ are $3x^{2}y+1, \: x^{3}+1$ $3x^{2}y+e^{x}, \: x^{3}$ $x^{3}y+xe^{x}, \: x^{3}+e^{x}$ $2x^{2}y+\dfrac{e^{x}}{x}$
If $f(x,y)=x^{3}y+e^{x},$ the partial derivatives, $\dfrac{\partial f}{\partial x},\dfrac{\partial f}{\partial y}$ are$3x^{2}y+1, \: x^{3}+1$$3x^{2}y+e^{x}, \: x^{3}$$x^{...
admin
404
views
admin
asked
Apr 2, 2020
Others
nielit2016mar-scientistc
non-gate
partial-order
+
–
2
votes
2
answers
13
ISI2015-MMA-50
Let ... $V_3<V_2<V_1$ $V_3<V_1<V_2$ $V_1<V_2<V_3$ $V_2<V_3<V_1$
Let$$\begin{array}{} V_1 & = & \frac{7^2+8^2+15^2+23^2}{4} – \left( \frac{7+8+15+23}{4} \right) ^2, \\ V_2 & = & \frac{6^2+8^2+15^2+24^2}{4} – \left( \frac{6+8+15+24...
Arjun
546
views
Arjun
asked
Sep 23, 2019
Others
isi2015-mma
inequality
non-gate
+
–
0
votes
2
answers
14
ISI2015-MMA-70
Let $w=\log(u^2 +v^2)$ where $u=e^{(x^2+y)}$ and $v=e^{(x+y^2)}$. Then $\frac{\partial w }{\partial x} \mid _{x=0, y=0}$ is $0$ $1$ $2$ $4$
Let $w=\log(u^2 +v^2)$ where $u=e^{(x^2+y)}$ and $v=e^{(x+y^2)}$. Then $\frac{\partial w }{\partial x} \mid _{x=0, y=0}$ is$0$$1$$2$$4$
Arjun
527
views
Arjun
asked
Sep 23, 2019
Others
isi2015-mma
partial-derivatives
non-gate
+
–
1
votes
2
answers
15
ISI2015-MMA-84
For positive real numbers $a_1, a_2, \cdots, a_{100}$, let $p=\sum_{i=1}^{100} a_i \text{ and } q=\sum_{1 \leq i < j \leq 100} a_ia_j.$ Then $q=\frac{p^2}{2}$ $q^2 \geq \frac{p^2}{2}$ $q< \frac{p^2}{2}$ none of the above
For positive real numbers $a_1, a_2, \cdots, a_{100}$, let $$p=\sum_{i=1}^{100} a_i \text{ and } q=\sum_{1 \leq i < j \leq 100} a_ia_j.$$ Then $q=\frac{p^2}{2}$$q^2 \geq ...
Arjun
434
views
Arjun
asked
Sep 23, 2019
Others
isi2015-mma
summation
non-gate
+
–
1
votes
2
answers
16
UGC NET CSE | June 2019 | Part 2 | Question: 95
Let $A_{\alpha_0}$ denotes the $\alpha$-cut of a fuzzy set $A$ at $\alpha_0$. If $\alpha_1 < \alpha_2$, then $A_{\alpha_1} \supseteq A_{\alpha_2}$ $A_{\alpha_1} \supset A_{\alpha_2}$ $A_{\alpha_1} \subseteq A_{\alpha_2}$ $A_{\alpha_1} \subset A_{\alpha_2}$
Let $A_{\alpha_0}$ denotes the $\alpha$-cut of a fuzzy set $A$ at $\alpha_0$. If $\alpha_1 < \alpha_2$, then$A_{\alpha_1} \supseteq A_{\alpha_2}$$A_{\alpha_1} \supset A_{...
Arjun
1.8k
views
Arjun
asked
Jul 2, 2019
Others
ugcnetcse-june2019-paper2
fuzzy-set
alpha-cut
+
–
0
votes
2
answers
17
NIELIT 2018-35
Baud rate measures the number of ____ transmitted per second Symbols Bits Byte None of these
Baud rate measures the number of ____ transmitted per secondSymbolsBitsByteNone of these
Arjun
2.7k
views
Arjun
asked
Dec 7, 2018
Others
nielit-2018
+
–
0
votes
2
answers
18
c program output
#include<stdio.h> main() { char c = 'A'+255; printf("%c", c); }
#include<stdio.h main() { char c = 'A'+255; printf("%c", c); }
shiva0
860
views
shiva0
asked
Jul 18, 2018
Others
programming-in-c
output
explanation
please
+
–
0
votes
2
answers
19
C programming
#include <stdio.h> main() { char *p = "Sanfoundry C-Test"; p[0] = 'a'; p[1] = 'b'; printf("%s", p); }
#include <stdio.h main() { char *p = "Sanfoundry C-Test"; p[0] = 'a'; p = 'b'; printf("%s", p); }
shiva0
2.2k
views
shiva0
asked
Jul 18, 2018
Others
programming-in-c
pointers
+
–
0
votes
2
answers
20
c program output
#include <stdio.h> main() { char *p = 0; *p = 'a'; printf("value in pointer p is %c\n", *p); }
#include <stdio.h>main(){char *p = 0;*p = 'a';printf("value in pointer p is %c\n", *p);}
shiva0
4.5k
views
shiva0
asked
Jul 18, 2018
Others
programming-in-c
output
explanation
please
+
–
Page:
1
2
3
4
5
6
...
21
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register