Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Recent
Hot!
Most votes
Most answers
Most views
Previous GATE
Featured
Most answered questions in Unknown Category
1
votes
2
answers
101
UGC NET CSE | November 2017 | Part 3 | Question: 59
Consider the following two well-formed formulas in prepositional logic. $F1 : P \Rightarrow \neg P$ $F2: (P \Rightarrow \neg P) \vee (\neg P \Rightarrow P)$ Which of the following statements is correct? $F1$ is Satisfiable, $F2$ ... $F1$ is unsatisfiable, $F2$ is Satisfiable $F1$ is unsatisfiable, $F2$ is valid $F1$ and $F2$ both are Satisfiable
Consider the following two well-formed formulas in prepositional logic.$F1 : P \Rightarrow \neg P$$F2: (P \Rightarrow \neg P) \vee (\neg P \Rightarrow P)$Which of the fol...
Arjun
629
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper3
+
–
1
votes
2
answers
102
UGC NET CSE | November 2017 | Part 3 | Question: 52
Consider a system with five processes $P_0$ through $P_4$ and three resource types $A, B$ and $C$. Resource type $A$ has seven instances, resource type $B$ has two instances and resource type $C$ has six ... . If we implement Deadlock detection algorithm we claim that system is ________ Semaphore Deadlock state Circular wait Not in deadlock state
Consider a system with five processes $P_0$ through $P_4$ and three resource types $A, B$ and $C$. Resource type $A$ has seven instances, resource type $B$ has two instan...
Arjun
1.2k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper3
+
–
1
votes
2
answers
103
UGC NET CSE | November 2017 | Part 3 | Question: 51
User level threads are threads that are visible to the programmer and are unknown to the kernel. The operating system kernel supports and manages kernel level threads. Three different types of models relate user and kernel level threads. Which of the following ... is false; (ii) is true Both (i) and (ii) are true Both (i) and (ii) are false
User level threads are threads that are visible to the programmer and are unknown to the kernel. The operating system kernel supports and manages kernel level threads. Th...
Arjun
1.0k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper3
+
–
1
votes
2
answers
104
UGC NET CSE | November 2017 | Part 3 | Question: 47
A simple stand - alone software utility is to be developed in C' programming by a team of software experts for a computer running Linux and the overall size of this software is estimated to be $20,000$ ... long does the software project take to complete? $10.52$ months $11.52$ months $12.52$ months $14.52$ months
A simple stand – alone software utility is to be developed in ‘C’ programming by a team of software experts for a computer running Linux and the overall size of thi...
Arjun
1.4k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper3
+
–
1
votes
2
answers
105
UGC NET CSE | November 2017 | Part 3 | Question: 17
Find the normalization transformation that maps a window whose lower left corner is at $(1,1)$ and upper right corner is at $(3,5)$ ...
Find the normalization transformation that maps a window whose lower left corner is at $(1,1)$ and upper right corner is at $(3,5)$ onto a viewpoint that is the entire no...
Arjun
3.4k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper3
+
–
0
votes
2
answers
106
UGC NET CSE | November 2017 | Part 2 | Question: 48
Which of the following is not a Clustering method? K-Means method Self Organizing feature map method K- nearest neighbor method Agglomerative method
Which of the following is not a Clustering method?K-Means methodSelf Organizing feature map methodK- nearest neighbor methodAgglomerative method
Arjun
4.6k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
data-mining
clustering
+
–
1
votes
2
answers
107
UGC NET CSE | November 2017 | Part 2 | Question: 50
Which speed up could be achieved according to Amdahl's Law for infinte number of processes if $5\%$ of a program is sequential and the remaining part is ideally parallel? Infinite $5$ $20$ $50$
Which speed up could be achieved according to Amdahl's Law for infinte number of processes if $5\%$ of a program is sequential and the remaining part is ideally parallel?...
Arjun
3.1k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
co-and-architecture
+
–
0
votes
2
answers
108
UGC NET CSE | November 2017 | Part 2 | Question: 45
Which of the following testing techniques ensures that the software products runs correctly after the changes in maintenance? Path Testing Integration Testing Unit Testing Regression Testing
Which of the following testing techniques ensures that the software products runs correctly after the changes in maintenance?Path TestingIntegration TestingUnit TestingRe...
Arjun
3.1k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
is&software-engineering
software-testing
+
–
0
votes
2
answers
109
UGC NET CSE | November 2017 | Part 2 | Question: 40
Two atomic operations permissible on Semaphores are _________ and ________. wait, stop wait, hold hold, signal wait, signal
Two atomic operations permissible on Semaphores are _________ and ________.wait, stopwait, holdhold, signalwait, signal
Arjun
1.3k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
2
answers
110
UGC NET CSE | November 2017 | Part 2 | Question: 41
Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it evolves, because Software suffers from exposure to hostile environments Defects are more likely to arise ... been used often Multiple change requests introduce errors in component interactions Software spare parts become harder to order
Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it evolves, becauseSoftware suffers from exposure to hostile env...
Arjun
1.0k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
1
votes
2
answers
111
UGC NET CSE | November 2017 | Part 2 | Question: 37
In ________ disk scheduling algorithm, the disk head moves from one end to other end of the disk, serving the requests along the way. When the head reaches the other end, it immediately returns to the beginning of the disk without serving any requests on the return trip. LOOK SCAN C-LOOK C-SCAN
In ________ disk scheduling algorithm, the disk head moves from one end to other end of the disk, serving the requests along the way. When the head reaches the other end,...
Arjun
1.7k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
operating-system
disk-scheduling
+
–
0
votes
2
answers
112
UGC NET CSE | November 2017 | Part 2 | Question: 18
Match the following with respect to RDBMS : ... $\text{(a)-(ii); (b)-(iii); (c)-(iv); (d)-(i)}$
Match the following with respect to RDBMS :$\begin{array}{clcl} \text{(a)} & \text{Entity integrity} & \text{(i)} & \text{enforces some specific business rule that do not...
Arjun
1.3k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
databases
+
–
0
votes
2
answers
113
UGC NET CSE | November 2017 | Part 2 | Question: 22
The following numbers are inserted into an empty binary search tree in the given order: $10,1,3,5,15,12,16$. What is the height of the binary search tree? $3$ $4$ $5$ $6$
The following numbers are inserted into an empty binary search tree in the given order: $10,1,3,5,15,12,16$. What is the height of the binary search tree?$3$$4$$5$$6$
Arjun
1.1k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
2
answers
114
UGC NET CSE | November 2017 | Part 2 | Question: 19
In RDBMS, different classes of relations are created using ________ technique to prevent modification anomolies. Functional Dependencies Data integrity Referential integrity Normal Forms
In RDBMS, different classes of relations are created using ________ technique to prevent modification anomolies.Functional DependenciesData integrityReferential integrity...
Arjun
1.6k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
2
answers
115
UGC NET CSE | November 2017 | Part 2 | Question: 17
In SQL, ________ is an Aggregate function. SELECT CREATE AVG MODIFY
In SQL, ________ is an Aggregate function.SELECTCREATEAVGMODIFY
Arjun
446
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
databases
sql
+
–
0
votes
2
answers
116
UGC NET CSE | November 2017 | Part 2 | Question: 15
Which of the following is not correct (in C++)? Class templates and function templates are instantiated in the same way Class templates differ from function templates in the way they are initiated Class template is initiated by defining an object using the template argument Class templates are generally used for storage classes
Which of the following is not correct (in C++)?Class templates and function templates are instantiated in the same wayClass templates differ from function templates in th...
Arjun
1.9k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
2
answers
117
UGC NET CSE | November 2017 | Part 2 | Question: 11
$\text{prtdata}$ is a pointer to a data type. The expression $^*\text{prtdata}++$ is evaluated as (in C++) $^*(\text{prtdata++})$ $(^*\text{prtdata})++$ $^*(\text{prtdata})++$ Depends on compiler
$\text{prtdata}$ is a pointer to a data type. The expression $^*\text{prtdata}++$ is evaluated as (in C++)$^*(\text{prtdata++})$$(^*\text{prtdata})++$$^*(\text{prtdata})+...
Arjun
824
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
2
answers
118
UGC NET CSE | November 2017 | Part 2 | Question: 9
Negation of the proposition $\exists \: x \: H(x)$ is $\exists \: x \: \neg \: H(x)$ $\forall \: x \: \neg \: H(x)$ $\forall \: x \: H(x)$ $\neg \: x \: H(x)$
Negation of the proposition $\exists \: x \: H(x)$ is$\exists \: x \: \neg \: H(x)$$\forall \: x \: \neg \: H(x)$$\forall \: x \: H(x)$$\neg \: x \: H(x)$
Arjun
898
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
2
answers
119
probability
two cards are drawn from a well shuffled deck of 52 cards one after the other without replacement the probabaility of first card being a spade and second a black kings is
two cards are drawn from a well shuffled deck of 52 cards one after the other without replacement the probabaility of first card being a spade and second a black kings i...
focus _GATE
1.7k
views
focus _GATE
asked
Nov 25, 2016
Unknown Category
probability
+
–
3
votes
2
answers
120
#Database
Is this schedule view serializable ?? R1(x),R1(y),W1(x),R2(y),W3(y),W1(x),R2(y)
Is this schedule view serializable ??R1(x),R1(y),W1(x),R2(y),W3(y),W1(x),R2(y)
papesh
843
views
papesh
asked
Nov 22, 2016
Page:
« prev
1
2
3
4
5
6
7
8
9
10
11
...
44
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register