Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Search results for ugcnetjune2014iii
0
votes
2
answers
21
UGC NET CSE | June 2014 | Part 3 | Question: 36
Which of the following statements is not true about disk-arm scheduling algorithms ? SSTF (shortest seek time first) algorithm increases performance of FCFS. The number of requests for disk service are not influenced by file allocation ... help in reducing disk arm movements. SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Which of the following statements is not true about disk-arm scheduling algorithms ? SSTF (shortest seek time first) algorithm increases performance of FCFS.The number of...
makhdoom ghaya
4.7k
views
makhdoom ghaya
asked
Jul 10, 2016
Operating System
ugcnetjune2014iii
operating-system
process-scheduling
+
–
0
votes
3
answers
22
UGC NET CSE | June 2014 | Part 3 | Question: 05
Which of the following color models are defined with three primary colors ? RGB and HSV color models CMY and HSV color models HSV and HLS color models RGB and CMY color models
Which of the following color models are defined with three primary colors ? RGB and HSV color modelsCMY and HSV color modelsHSV and HLS color modelsRGB and CMY color mode...
makhdoom ghaya
4.3k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
0
votes
2
answers
23
UGC NET CSE | June 2014 | Part 3 | Question: 55
Given an image of size $1024 \times 1024$ pixels in which intensity of each pixel is an $8$-bit quality. It requires _______ of storage space if the image is not compressed. One Terabyte One Megabyte $8$ Megabytes $8$ Terabytes
Given an image of size $1024 \times 1024$ pixels in which intensity of each pixel is an $8$-bit quality. It requires _______ of storage space if the image is not compress...
makhdoom ghaya
5.0k
views
makhdoom ghaya
asked
Jul 11, 2016
Digital Image Processing
ugcnetjune2014iii
image-compression
computer-graphics
+
–
0
votes
3
answers
24
UGC NET CSE | June 2014 | Part 3 | Question: 32
________ predicate calculus allows quantified variables to refer to objects in the domain of discourse and not to predicates or functions. Zero-order First-order Second-order High-order
________ predicate calculus allows quantified variables to refer to objects in the domain of discourse and not to predicates or functions.Zero-order First-orderSecond-ord...
makhdoom ghaya
3.5k
views
makhdoom ghaya
asked
Jul 9, 2016
Mathematical Logic
ugcnetjune2014iii
discrete-mathematics
mathematical-logic
+
–
0
votes
1
answer
25
UGC NET CSE | June 2014 | Part 3 | Question: 06
In a digital transmission, the receiver clock is $0.1$ percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is $1$ Mbps ? $10$ bps $100$ bps $1000$ bps $10000$ bps
In a digital transmission, the receiver clock is $0.1$ percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is ...
makhdoom ghaya
11.4k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Networks
ugcnetjune2014iii
computer-networks
communication
+
–
2
votes
2
answers
26
UGC NET CSE | June 2014 | Part 3 | Question: 02
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are Butt cap and sharp cap Butt cap and round cap Butt cap, sharp cap and round cap Butt cap, round cap and projecting square cap
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used areButt cap and sharp capButt cap and round ...
makhdoom ghaya
3.1k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
0
votes
2
answers
27
UGC NET CSE | June 2014 | Part 3 | Question: 30
Slots and facets are used in Semantic Networks Frames Rules All of these
Slots and facets are used inSemantic NetworksFramesRulesAll of these
makhdoom ghaya
3.6k
views
makhdoom ghaya
asked
Jul 9, 2016
Artificial Intelligence
ugcnetjune2014iii
artificial-intelligence
+
–
0
votes
2
answers
28
UGC NET CSE | June 2014 | Part 3 | Question: 33
________ is used in game trees to reduce the number of branches of the search tree to be traversed without affecting the solution. Best first search Goal stack planning Alpha-beta pruning procedure Min-max search
________ is used in game trees to reduce the number of branches of the search tree to be traversed without affecting the solution.Best first searchGoal stack planning Alp...
makhdoom ghaya
3.2k
views
makhdoom ghaya
asked
Jul 9, 2016
Algorithms
ugcnetjune2014iii
artificial-intelligence
algorithms
+
–
0
votes
1
answer
29
UGC NET CSE | June 2014 | Part 3 | Question: 16
Software testing is the process of establishing that errors are not present the process of establishing confidence that a program does what it is supposed to do the process of executing a program to show that it is working as per specifications the process of executing a program with the intent of finding errors
Software testing isthe process of establishing that errors are not presentthe process of establishing confidence that a program does what it is supposed to dothe process ...
go_editor
7.1k
views
go_editor
asked
Jan 6, 2017
IS&Software Engineering
ugcnetjune2014iii
is&software-engineering
software-testing
+
–
0
votes
2
answers
30
UGC NET CSE | June 2014 | Part 3 | Question: 31
Consider $f(N) = g(N) + h(N)$ Where function $g$ is a measure of the cost of getting from the start node to the current node. $N$ and $h$ is an estimate of the additional cost of getting from the current node $N$ to ... one of the following algorithms? $A^{*}$algorithm $AO^{*}$ algorithm Greedy best first search algorithm Iterative $A^{*}$ algorithm
Consider $f(N) = g(N) + h(N)$ Where function $g$ is a measure of the cost of getting from the start node to the current node. $N$ and $h$ is an estimate of the additional...
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Jul 9, 2016
Algorithms
ugcnetjune2014iii
artificial-intelligence
algorithms
+
–
1
votes
1
answer
31
UGC NET CSE | June 2014 | Part 3 | Question: 60
The initial basic feasible solution of the following transportion problem: is given as 5 8 7 2 2 10 then the minimum cost is 76 78 80 82
The initial basic feasible solution of the following transportion problem:is given as5 8 7 2210then the minimum cost is767880 82
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Jul 11, 2016
Optimization
ugcnetjune2014iii
optimization
transportation-problem
+
–
0
votes
2
answers
32
UGC NET CSE | June 2014 | Part 3 | Question: 21
Which one of the following is not a key process area in CMM level $5$ ? Defect prevention Process change management Software product engineering Technology change management
Which one of the following is not a key process area in CMM level $5$ ?Defect preventionProcess change managementSoftware product engineeringTechnology change management
makhdoom ghaya
3.0k
views
makhdoom ghaya
asked
Jul 9, 2016
IS&Software Engineering
ugcnetjune2014iii
is&software-engineering
cmm-model
+
–
0
votes
2
answers
33
UGC NET CSE | June 2014 | Part 3 | Question: 20
Which one of the following is not a definition of error ? It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value. It refers to the actual output of a software ... that causes a system to fail. It refers to human action that results in software containing a defect or fault.
Which one of the following is not a definition of error ?It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretica...
makhdoom ghaya
3.1k
views
makhdoom ghaya
asked
Jul 9, 2016
IS&Software Engineering
ugcnetjune2014iii
is&software-engineering
+
–
0
votes
2
answers
34
UGC NET CSE | June 2014 | Part 3 | Question: 37
__________ maintains the list of free disk blocks in the Unix file system. I-node Boot block Super block File allocation table
__________ maintains the list of free disk blocks in the Unix file system.I-nodeBoot blockSuper blockFile allocation table
makhdoom ghaya
4.3k
views
makhdoom ghaya
asked
Jul 10, 2016
Operating System
ugcnetjune2014iii
operating-system
unix
+
–
0
votes
2
answers
35
UGC NET CSE | June 2014 | Part 3 | Question: 15
Let $L$ be any language. Define $\text{Even} (W)$ as the strings obtained by extracting from $W$ the letters in the even-numbered positions and $\text{Even}(L) = \{ \text{Even} (W) \mid W \in L\}.$ ... $\text{Chop(L)}$ is regular Both $\text{Even(L)}$ and $\text{Chop(L)}$ are not regular
Let $L$ be any language. Define $\text{Even} (W)$ as the strings obtained by extracting from $W$ the letters in the even-numbered positions and $\text{Even}(L) = \{ \text...
go_editor
2.4k
views
go_editor
asked
Jan 6, 2017
Theory of Computation
ugcnetjune2014iii
theory-of-computation
regular-language
+
–
0
votes
2
answers
36
UGC NET CSE | June 2014 | Part 3 | Question: 54
Linking to another place in the same or another webpage require two A (Anchor) tags, the first with the _______ attribute and the second with the _______ attribute. NAME & LINK LINK & HREF HREF & NAME TARGET & VALUE
Linking to another place in the same or another webpage require two A (Anchor) tags, the first with the _______ attribute and the second with the _______ attribute. NAME ...
makhdoom ghaya
3.3k
views
makhdoom ghaya
asked
Jul 11, 2016
Web Technologies
ugcnetjune2014iii
web-technologies
+
–
0
votes
2
answers
37
UGC NET CSE | June 2014 | Part 3 | Question: 03
Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes $:$ ... $\text{a-iv, b-iii, c-ii, d-i}$ $\text{a-iii, b-i, c-iv, d-ii}$
Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes $:$$\begin{array}{cIcI} & \textbf{List...
makhdoom ghaya
2.5k
views
makhdoom ghaya
asked
Jul 4, 2016
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
0
votes
3
answers
38
UGC NET CSE | June 2014 | Part 3 | Question: 24
Match the following $:$ ... $\text{a-ii; b-i; c-iv; d-iii}$ $\text{a-iii; b-i; c-iv; d-iii}$
Match the following $:$ $\begin{array}{clcl} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Timeout ordering protocol} & \text{i.} & \text{Wait for...
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Jul 9, 2016
Operating System
ugcnetjune2014iii
operating-system
+
–
1
votes
2
answers
39
UGC NET CSE | June 2014 | Part 3 | Question: 22
Consider the following relational schemas for a library database : Book (Title, Author, Catalog_no, Publisher, Year, Price) Collection(Title, Author, Catalog_no) with the following functional dependencies : I. Title, Author $\rightarrow$ ... . Book is in $2$NF and Collection in $3$NF. Both Book and Collection are in $2$NF.
Consider the following relational schemas for a library database :Book (Title, Author, Catalog_no, Publisher, Year, Price) Collection(Title, Author, Catalog_no) with the ...
makhdoom ghaya
2.1k
views
makhdoom ghaya
asked
Jul 9, 2016
Databases
ugcnetjune2014iii
databases
database-normalization
+
–
0
votes
2
answers
40
UGC NET CSE | June 2014 | Part 3 | Question: 28
Match the following $:$ ... $\text{a-i, b-ii, c-iii, d-iv}$ $\text{a-iv, b-iii, c-ii, d-i}$
Match the following $:$ $\begin{array}{cIcI} & \textbf{List – I} & & \textbf{List – II} \\ \text{a.} & \text{Expert systems}& \text{i.} & \text{Pragmatics} \\ \text{...
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Jul 9, 2016
Artificial Intelligence
ugcnetjune2014iii
artificial-intelligence
+
–
Page:
« prev
1
2
3
4
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register