The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged ugcnetaug2016iii
0
votes
1
answer
1
UGCNETAUG2016III45
Match each software term in List  I to its description in List  II : List  I List  II I. Wizards a. Forms that provide structure for a document II. Templates b. A series of commands grouped into a single command III. Macro c. A single program that incorporates most commonly used tools IV ... of software programs Codes : I II III IV V d a b c e b a d c e d e b a c e c b a d
asked
Oct 4, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

263
views
ugcnetaug2016iii
systemsoftwarecompilers
macros
+2
votes
1
answer
2
UGCNETAUG2016III44
Match each software lifecycle model in List  I to its description in List  II : List  I List  II I. CodeandFix a. Assess risks at each step; do most critical action first. II. Evolutionary prototyping b. Build an initial small requirement specifications, code it, then evolve the specifications ... adhoc) Codes : I II III IV V e b a c d e c a b d d a b c e c e a b d
asked
Oct 4, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
30.2k
points)

354
views
ugcnetaug2016iii
is&softwareengineering
softwaremodels
+1
vote
1
answer
3
UGCNETAUG2016III43
An Operating System $(OS)$ crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to recover the OS, that is, the Mean Time To Repair (MTTR) = 10 minutes. The availability of the OS with these reliability figures is approximately : 96.97% 97.97% 99.009% 99.97%
asked
Oct 4, 2016
in
Operating System
by
makhdoom ghaya
Boss
(
30.2k
points)

1.1k
views
ugcnetaug2016iii
operatingsystem
systemreliability
+2
votes
3
answers
4
UGCNETAUG2016III42
Java uses threads to enable the entire environment to be ______. Symmetric Asymmetric Synchronous Asynchronous
asked
Oct 4, 2016
in
Java
by
makhdoom ghaya
Boss
(
30.2k
points)

706
views
ugcnetaug2016iii
java
threads
+1
vote
2
answers
5
UGCNETAUG2016III41
Which of the following tag in HTML is used to surround information, such as signature of the person who created the page? <body></body> <address></address> <strong></strong> <em></em>
asked
Oct 4, 2016
in
Web Technologies
by
makhdoom ghaya
Boss
(
30.2k
points)

500
views
ugcnetaug2016iii
webtechnologies
html
+1
vote
1
answer
6
UGCNETAUG2016III40
Which of the following is not a correct statement ? Every class containing abstract method must be declared abstract. Abstract class can directly be initiated with ‘new’ operator. Abstract class can be initiated. Abstract class does not contain any definition of implementation.
asked
Oct 1, 2016
in
Java
by
makhdoom ghaya
Boss
(
30.2k
points)

250
views
ugcnetaug2016iii
java
abstractmethod
+1
vote
1
answer
7
UGCNETAUG2016III39
Which of the following is a correct statement ? Composition is a strong type of association between two classes with full ownership. Composition is a strong type of association between two classes with partial ownership. Composition is a weak ... between two classes with partial ownership. Composition is a weak type of association between two classes with strong ownership.
asked
Oct 1, 2016
in
Object Oriented Programming
by
makhdoom ghaya
Boss
(
30.2k
points)

531
views
ugcnetaug2016iii
objectorientedprogramming
composition
+1
vote
2
answers
8
UGCNETAUG2016III38
Method overriding can be prevented by using final as a modifier at ______. The start of the class. The start of method declaration. The start of derived class. The start of the method declaration in the derived class.
asked
Oct 1, 2016
in
Java
by
makhdoom ghaya
Boss
(
30.2k
points)

366
views
ugcnetaug2016iii
java
methodoverriding
+1
vote
1
answer
9
UGCNETAUG2016III37
Constructors have _____ return type. void char int no
asked
Oct 1, 2016
in
Object Oriented Programming
by
makhdoom ghaya
Boss
(
30.2k
points)

216
views
ugcnetaug2016iii
objectorientedprogramming
constructor
+1
vote
1
answer
10
UGCNETAUG2016III36
Match the following : a. Prim’s algorithm i. $O(V^{2}E)$ b. BellmanFord algorithm ii. $O(VE lgV)$ c. FloydWarshall algorithm iii. $O(E lgV)$ d. Johnson’s algorithm iv. $O(V^{3})$ Where V is the set of nodes and E is the set of edges in the graph. Codes : a b c d i iii iv ii i iii ii iv iii i iv ii iii i ii iv
asked
Oct 1, 2016
in
Algorithms
by
makhdoom ghaya
Boss
(
30.2k
points)

357
views
ugcnetaug2016iii
algorithms
+1
vote
1
answer
11
UGCNETAUG2016III35
If there are $n$ integers to sort, each integer has d digits, and each digit is in the set $\left\{1, 2, …, k\right\}$, radix sort can sort the numbers in : $O (k (n + d))$ $O (d (n + k))$ $O ((n + k) l g d)$ $O ((n + d) l g k)$
asked
Oct 1, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

263
views
ugcnetaug2016iii
datastructure
radixsort
+1
vote
1
answer
12
UGCNETAUG2016III34
A priority queue is implemented as a maxheap. Initially, it has five elements. The levelorder traversal of the heap is as follows : 20, 18, 15, 13, 12 Two new elements 10' and 17' are inserted in the heap in that order. The levelorder traversal of the heap after the insertion of the ... 10 20, 18, 17, 12, 13, 10, 15 20, 18, 17, 10, 12, 13, 15 20, 18, 17, 13, 12, 10, 15
asked
Oct 1, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

780
views
ugcnetaug2016iii
datastructure
priorityqueue
+1
vote
1
answer
13
UGCNETAUG2016III33
Consider a weighted complete graph $G$ on the vertex set $\left\{ν_{1} , ν_{2},.... ν_{n} \right\}$ such that the weight of the edge $(ν_{i} , ν_{j})$ is $4  i – j$. The weight of minimum cost spanning tree of $G$ is : $4n^{2}$ $n$ $4n – 4$ $2n – 2$
asked
Oct 1, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

326
views
ugcnetaug2016iii
datastructure
spanningtree
+1
vote
1
answer
14
UGCNETAUG2016III32
Consider a hash table of size $m = 10000$, and the hash function $h(K) = floor (m(KA \bmod 1))$ for $A = ( \sqrt{5} – 1)/2$. The key $123456$ is mapped to location ______. $46$ $41$ $43$ $48$
asked
Oct 1, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

287
views
ugcnetaug2016iii
datastructure
hashing
+3
votes
2
answers
15
UGCNETAUG2016III31
Consider the problem of a chain <$A_{1} , A_{2} , A_{3},A_{4}$> of four matrices. Suppose that the dimensions of the matrices $A_{1} , A_{2} , A_{3}$ and $A_{4}$ are $30 \times 35, 35 \times 15, 15 \times 5$ ... . The minimum number of scalar multiplications needed to compute the product $A_{1}A_{2}A_{3}A_{4}$ is ____. $14875$ $21000$ $9375$ $11875$
asked
Oct 1, 2016
in
Algorithms
by
makhdoom ghaya
Boss
(
30.2k
points)

600
views
ugcnetaug2016iii
algorithms
dynamicprogramming
numericalanswers
matrices
+3
votes
2
answers
16
UGCNETAUG2016III30
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$ for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is _____. ABHI HAQC IHBA BHQC
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

1.8k
views
ugcnetaug2016iii
cryptography
computernetworks
+3
votes
1
answer
17
UGCNETAUG2016III29
An analog signal has a bit rate of $8000$ bps and a baud rate of $1000$. Then analog signal has _____ signal elements and carry _____ data elements in each signal. $256, 8$ bits $128, 4$ bits $256, 4$ bits $128, 8$ bits
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

1.4k
views
ugcnetaug2016iii
computernetworks
transmissionmedia
+1
vote
2
answers
18
UGCNETAUG2016III28
A slotted ALOHA network transmits $200$ bits frames using a shared channel with $200$ kbps bandwidth. If the system (all stations put together) produces $1000$ frames per second, then the throughput of the system is _______. $0.268$ $0.468$ $0.368$ $0.568$
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

654
views
ugcnetaug2016iii
computernetworks
multipleaccessprotocol
transmissionmedia
+3
votes
3
answers
19
UGCNETAUG2016III27
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is $G(x) = x^{4}+ x + 1$. After implementing $CRC$ encoder, the encoded word sent from sender side is _____. 11010110111110 11101101011011 110101111100111 110101111001111
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

1.8k
views
ugcnetaug2016iii
computernetworks
crc
checksum
+1
vote
2
answers
20
UGCNETAUG2016III26
Consider the following statements : A. High speed Ethernet works on optic fiber. B. A point to point protocol over Ethernet is a network protocol for encapsulating $PPP$ frames inside Ethernet frames. C. High speed Ethernet does not work on optic fiber. D. A point to point protocol over Ethernet ... $D$ are true. $A, B, C$ and $D$ are true. $A, B, C$ and $D$ are false.
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

577
views
ugcnetaug2016iii
computernetworks
ethernet
networkprotocols
+3
votes
2
answers
21
UGCNETAUG2016III25
Suppose transmission rate of a channel is $32$ kbps. If there are $‘8’$ routes from source to destination and each packet $p$ contains $8000$ bits. Total end to end delay in sending packet $P$ is _____. $2$ sec $3$ sec $4$ se $1$ sec
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

1.5k
views
ugcnetaug2016iii
computernetworks
networkswitching
+4
votes
2
answers
22
UGCNETAUG2016III24
Consider the following identities for regular expressions : (a) (r + s)* = (s + r)* (b) (r*)* = r* (c) (r* s*)* = (r + s)* Which of the above identities are true ? (a) and (b) only (b) and (c) only (c) and (a) only (a), (b) and (c)
asked
Oct 1, 2016
in
Theory of Computation
by
makhdoom ghaya
Boss
(
30.2k
points)

745
views
ugcnetaug2016iii
theoryofcomputation
regularexpressions
+2
votes
2
answers
23
UGCNETAUG2016III23
Let $\Sigma= {a, b}$ and language $L = {aa, bb}$. Then, the complement of $L$ is $\left\{\lambda, a, b, ab, ba \right\} \cup \left\{w \in\left\{a, b\right\}^{*}  w > 3 \right\}$ ... $\left\{\lambda, a, b, ab, ba\right\} \cup \left\{w \in \left\{a, b\right\}^{*}  w \geq 3 \right\}$
asked
Oct 1, 2016
in
Theory of Computation
by
makhdoom ghaya
Boss
(
30.2k
points)

200
views
ugcnetaug2016iii
theoryofcomputation
complement
+2
votes
2
answers
24
UGCNETAUG2016III22
The regular grammar for the language $L$ = {$a^{n}b^{m}$  $n + m$ is even} is given by (1) $S \rightarrow S_{1}  S_{2}$ $S_{1} \rightarrow a S_{1}  A_{1}$ $A_{1} \rightarrow b A_{1}  \lambda$ $S_{2} \rightarrow aaS_{2}  A_{2}$ ... $S_{2} \rightarrow aaS_{2}  aA_{2}$ $A_{1} \rightarrow bbA_{1}  \lambda$ $A_{2} \rightarrow bbA_{2}  b$
asked
Oct 1, 2016
in
Theory of Computation
by
makhdoom ghaya
Boss
(
30.2k
points)

370
views
ugcnetaug2016iii
theoryofcomputation
regulargrammar
+3
votes
1
answer
25
UGCNETAUG2016III21
Assume that the program $‘P’$ is implementing parameter passing with ‘call by reference’. What will be printed by following print statements in $P$? { x=10; y=3; funb(y,x,x) print x; print y; } funb (x,y,z) { y=y+4; z=x+y+z; } 10, 7 31, 3 10, 3 31, 7
asked
Oct 1, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

733
views
ugcnetaug2016iii
+2
votes
1
answer
26
UGCNETAUG2016III20
Aliasing in the context of programming languages refers to : Multiple variables having the same location Multiple variables having the same identifier Multiple variables having the same value Multiple use of same variable
asked
Oct 1, 2016
in
Programming
by
makhdoom ghaya
Boss
(
30.2k
points)

324
views
ugcnetaug2016iii
programming
aliasing
+1
vote
1
answer
27
UGCNETAUG2016III19
Match the following with reference to Functional programming history : a. Lambda calculus i. Church, 1932 b. Lambda calculus as programming language ii. Wordsworth, 1970 c. Lazy evaluation iii. Haskel, 1990 d. Type classes iv. Mecarthy, 1960 Codes : a b c d iv i iii ii i iv ii iii iii ii iv i ii i iv iii
asked
Oct 1, 2016
in
Programming
by
makhdoom ghaya
Boss
(
30.2k
points)

264
views
ugcnetaug2016iii
programming
+1
vote
2
answers
28
UGCNETAUG2016III18
The LiangBarsky line clipping algorithm uses the parametric equation of a line from $(x_{1} , y_{1} )$ to $(x_{2} , y_{2} )$ along with its infinite extension which is given as : $x = x_{1} + \Delta x.u$ $y = y_{1} + \Delta y.u$ ... is given as : $(0, \frac{2}{3})$ $\left(\frac{1}{6},\frac{5}{6}\right)$ $(0, \frac{1}{3})$ $(0, 1)$
asked
Oct 1, 2016
in
Computer Graphics
by
makhdoom ghaya
Boss
(
30.2k
points)

878
views
ugcnetaug2016iii
computergraphics
linedrawingalgorithm
+1
vote
1
answer
29
UGCNETAUG2016III17
In perspective projection (from 3D to 2D), objects behind the centre of projection are projected upside down and backward onto the viewplane. This is known as _____. Topological distortion Vanishing point View confusion Perspective foreshortening
asked
Oct 1, 2016
in
Computer Graphics
by
makhdoom ghaya
Boss
(
30.2k
points)

619
views
ugcnetaug2016iii
computergraphics
projection
+6
votes
1
answer
30
UGCNETAUG2016III16
A point $P(2, 5)$ is rotated about a pivot point $(1, 2)$ by 60°. What is the new transformed point $P'$ ? $(1, 4)$ $(–1, 4)$ $(1, – 4)$ $(– 4, 1)$
asked
Oct 1, 2016
in
Computer Graphics
by
makhdoom ghaya
Boss
(
30.2k
points)

1.9k
views
ugcnetaug2016iii
computergraphics
projection
Page:
« prev
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Linear Algebra Important Points
GATE 2020
OFFICIAL GATE MOCK TEST RELEASED
IIITH: Winter Research Admissions 2019 (For Spring 2020)
TIFR and JEST exam
Follow @csegate
Recent questions tagged ugcnetaug2016iii
Recent Blog Comments
Even In 2019 my 16 questions goes for negative...
i also don't have any pdf, actually, I added the...
i don't have , if you have upload it
@mohan123 Do you have all standard book...
bro can be upload all standard book questions in...
50,647
questions
56,497
answers
195,489
comments
100,805
users