search
Log In

Most viewed questions in Others

0 votes
2 answers
1
Which of the following is an interrupt according to temporal relationship with system clock? Maskable interrupt Periodic interrupt Division by zero Synchronous interrupt
asked Jan 31, 2017 in Others jothee 1.8k views
1 vote
1 answer
2
In Artificial Intelligence (AI), what is present in the planning graph? Sequence of levels Literals Variables Heuristic estimates
asked Feb 1, 2017 in Others jothee 1.8k views
1 vote
1 answer
3
Support of a fuzzy set $A= \big\{ \frac{x_1}{0.2}, \frac{x_2}{0.15}, \frac{x_3}{0.9}, \frac{x_4}{0.95}, \frac{x_5}{0.15} \big \}$ ... $\{x_3, x_4 \}$ $\{x_1, x_2, x_3, x_4, x_5\}$
asked Jul 24, 2016 in Others jothee 1.7k views
1 vote
3 answers
4
Which formal system provides the semantic foundation for Prolog ? Predicate calculus Lambda calculus Hoare logic Propositional logic
asked Oct 5, 2016 in Others makhdoom ghaya 1.7k views
0 votes
2 answers
5
What can you say about the following statements? XML tags are case-insensitive In JavaScript, identifier names are case-sensitive Cascading Style Sheets (CSS) cannot be used within XML All well-formed XML documents must contain a document type definition Only I and II are false Only III and IV are false Only I and III are false Only II and IV are false
asked Jan 31, 2017 in Others jothee 1.7k views
0 votes
1 answer
6
Consider the following LPP: $\begin{array}{ll} \text{Min. Z } = & x_1+x_2+x_3 \\ \text{Subject to } & 3x_1 + 4x_3 \leq 5 \\ & 5x_1 +x_2 +6x_3 =7 \\ & 8x_1 +9x_3 \geq 2, \\ & x_1, x_2, x_3 \geq 0 \end{array}$ ...
asked Feb 1, 2017 in Others jothee 1.7k views
0 votes
3 answers
7
Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? Abstraction allows us to focus on what something does without considering the complexities of how it works Encapsulation ... us Neither I nor II is correct Bith I and II are correct Only II is correct Only I is correct
asked Jan 31, 2017 in Others jothee 1.7k views
25 votes
8 answers
8
What are the most common mistakes you have made in tests? A good list will help aspirants reduce their mistakes in GATE. Just listing out some common ones. Missing the NOT in question - our eyes have a tendency to focus on important words and miss the NOT ... you avoid many calculation mistakes. In any formula you do, you must get the correct unit for the result Please add more as answers.
asked Jan 26, 2019 in Revision Arjun 1.7k views
1 vote
2 answers
9
Manager’s salary details are to be hidden from Employee table. This Technique is called as Conceptual level Datahiding Physical level Datahiding External level Datahiding Logical level Datahiding
asked Jul 14, 2016 in Others jothee 1.7k views
0 votes
1 answer
10
Which of the following operators cannot be overloaded in C/C++? Bitwise right shift assignment Address of Indirection Structure reference
asked Jan 30, 2017 in Others Arjun 1.7k views
2 votes
1 answer
11
0 votes
2 answers
12
3 votes
2 answers
13
The number of different trees with $8$ nodes is 256 255 248 None of these
asked Aug 24, 2016 in Others makhdoom ghaya 1.6k views
0 votes
1 answer
14
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? An instructor Id. No. cannot be null, provided Instructor Id. No. being the ... , 2 and 3 are true 1 - false; 2 and 3 are true 1 and 2 are true; 3-false 1, 2 and 3 are false
asked Feb 4, 2017 in Others Debasmita Bhoumik 1.6k views
0 votes
1 answer
15
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element in a sorted array? Insertion-O(1), Deletion-O(1), Maximum-O(1), Minimum-O(1) Insertion-O(1), Deletion-O(1), Maximum-O(n), Minimum-O(n) Insertion-O(n), Deletion-O(n), Maximum-O(1), Minimum-O(1) Insertion-O(n), Deletion-O(n), Maximum-O(n), Minimum-O(n)
asked Feb 4, 2017 in Others Debasmita Bhoumik 1.6k views
28 votes
1 answer
16
well i don't want to write this, but can't stop myself from writting this . it's 18 jan. and if u are still thinking to cover the full syllabus, i will suggest u all please please please do not do it till u are 100% confident with all the things u have read till ... one of the fav images. it's really the real life phases we all cross during life. we all are crossing the Dip. just think about it.
asked Jan 17, 2016 in Study Resources Tendua 1.6k views
0 votes
1 answer
17
Let A be a set of comfortable houses given as $A = \big\{ \frac{x_1}{0.8}, \frac{x_2}{0.9}, \frac{x_3}{0.1}, \frac{x_4}{0.7} \big \}$ and be the set of affordable houses $B = \big\{ \frac{x_1}{0.9}, \frac{x_2}{0.8}, \frac{x_3}{0.6}, \frac{x_4}{0.2} \big \}$ Then the set of ... $\big\{ \frac{x_1}{0.7}, \frac{x_2}{0.7}, \frac{x_3}{0.7}, \frac{x_4}{0.9} \big \}$
asked Jul 24, 2016 in Others jothee 1.6k views
1 vote
1 answer
18
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
asked Jul 24, 2016 in Others jothee 1.6k views
1 vote
1 answer
19
Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many? Monoalphabetic Polyalphabetic Transpositional None of the above
asked Jul 20, 2016 in Others jothee 1.6k views
0 votes
2 answers
20
Names of the some of the operating systems are given below: MS-DOS XENIX OS/2 In the above list, following operating systems did not provide multiuser facility a only a and b only b and c only a, b, and c
asked Feb 1, 2017 in Others jothee 1.6k views
...