The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged ugcnetaug2016iii
0
votes
1
answer
1
UGCNETAUG2016III: 45
Match each software term in List  I to its description in List  II : List  I List  II I. Wizards a. Forms that provide structure for a document II. Templates b. A series of commands grouped into a single command III. Macro c. A single program that incorporates most commonly used tools ... of software programs Codes : I II III IV V d a b c e b a d c e d e b a c e c b a d
asked
Oct 4, 2016
in
Others
by
makhdoom ghaya

326
views
ugcnetaug2016iii
systemsoftwarecompilers
macros
+2
votes
1
answer
2
UGCNETAUG2016III: 44
Match each software lifecycle model in List  I to its description in List  II : List  I List  II I. CodeandFix a. Assess risks at each step; do most critical action first. II. Evolutionary prototyping b. Build an initial small requirement specifications, code it, then evolve the specifications ... adhoc) Codes : I II III IV V e b a c d e c a b d d a b c e c e a b d
asked
Oct 4, 2016
in
IS&Software Engineering
by
makhdoom ghaya

445
views
ugcnetaug2016iii
is&softwareengineering
softwaremodels
+1
vote
1
answer
3
UGCNETAUG2016III: 43
An Operating System $(OS)$ crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to recover the OS, that is, the Mean Time To Repair (MTTR) = 10 minutes. The availability of the OS with these reliability figures is approximately : 96.97% 97.97% 99.009% 99.97%
asked
Oct 4, 2016
in
Operating System
by
makhdoom ghaya

1.2k
views
ugcnetaug2016iii
operatingsystem
systemreliability
+2
votes
3
answers
4
UGCNETAUG2016III: 42
Java uses threads to enable the entire environment to be ______. Symmetric Asymmetric Synchronous Asynchronous
asked
Oct 4, 2016
in
Java
by
makhdoom ghaya

989
views
ugcnetaug2016iii
java
threads
+1
vote
2
answers
5
UGCNETAUG2016III: 41
Which of the following tag in HTML is used to surround information, such as signature of the person who created the page? <body></body> <address></address> <strong></strong> <em></em>
asked
Oct 4, 2016
in
Web Technologies
by
makhdoom ghaya

722
views
ugcnetaug2016iii
webtechnologies
html
+1
vote
1
answer
6
UGCNETAUG2016III: 40
Which of the following is not a correct statement ? Every class containing abstract method must be declared abstract. Abstract class can directly be initiated with ‘new’ operator. Abstract class can be initiated. Abstract class does not contain any definition of implementation.
asked
Oct 2, 2016
in
Java
by
makhdoom ghaya

275
views
ugcnetaug2016iii
java
abstractmethod
+1
vote
1
answer
7
UGCNETAUG2016III: 39
Which of the following is a correct statement ? Composition is a strong type of association between two classes with full ownership. Composition is a strong type of association between two classes with partial ownership. Composition is a weak ... between two classes with partial ownership. Composition is a weak type of association between two classes with strong ownership.
asked
Oct 2, 2016
in
Object Oriented Programming
by
makhdoom ghaya

660
views
ugcnetaug2016iii
objectorientedprogramming
composition
+1
vote
2
answers
8
UGCNETAUG2016III: 38
Method overriding can be prevented by using final as a modifier at ______. The start of the class. The start of method declaration. The start of derived class. The start of the method declaration in the derived class.
asked
Oct 2, 2016
in
Java
by
makhdoom ghaya

446
views
ugcnetaug2016iii
java
methodoverriding
+1
vote
1
answer
9
UGCNETAUG2016III: 37
Constructors have _____ return type. void char int no
asked
Oct 2, 2016
in
Object Oriented Programming
by
makhdoom ghaya

271
views
ugcnetaug2016iii
objectorientedprogramming
constructor
+1
vote
1
answer
10
UGCNETAUG2016III: 36
Match the following : a. Prim’s algorithm i. $O(V^{2}E)$ b. BellmanFord algorithm ii. $O(VE lgV)$ c. FloydWarshall algorithm iii. $O(E lgV)$ d. Johnson’s algorithm iv. $O(V^{3})$ Where V is the set of nodes and E is the set of edges in the graph. Codes : a b c d i iii iv ii i iii ii iv iii i iv ii iii i ii iv
asked
Oct 2, 2016
in
Algorithms
by
makhdoom ghaya

467
views
ugcnetaug2016iii
algorithms
+1
vote
1
answer
11
UGCNETAUG2016III: 35
If there are $n$ integers to sort, each integer has d digits, and each digit is in the set $\left\{1, 2, …, k\right\}$, radix sort can sort the numbers in : $O (k (n + d))$ $O (d (n + k))$ $O ((n + k) l g d)$ $O ((n + d) l g k)$
asked
Oct 2, 2016
in
DS
by
makhdoom ghaya

280
views
ugcnetaug2016iii
datastructures
radixsort
+1
vote
1
answer
12
UGCNETAUG2016III: 34
A priority queue is implemented as a maxheap. Initially, it has five elements. The levelorder traversal of the heap is as follows : 20, 18, 15, 13, 12 Two new elements 10' and 17' are inserted in the heap in that order. The levelorder traversal of the heap after the insertion of the ... 10 20, 18, 17, 12, 13, 10, 15 20, 18, 17, 10, 12, 13, 15 20, 18, 17, 13, 12, 10, 15
asked
Oct 2, 2016
in
DS
by
makhdoom ghaya

932
views
ugcnetaug2016iii
datastructures
priorityqueue
+1
vote
1
answer
13
UGCNETAUG2016III: 33
Consider a weighted complete graph $G$ on the vertex set $\left\{ν_{1} , ν_{2},.... ν_{n} \right\}$ such that the weight of the edge $(ν_{i} , ν_{j})$ is $4  i – j$. The weight of minimum cost spanning tree of $G$ is : $4n^{2}$ $n$ $4n – 4$ $2n – 2$
asked
Oct 2, 2016
in
DS
by
makhdoom ghaya

364
views
ugcnetaug2016iii
datastructures
spanningtree
+1
vote
1
answer
14
UGCNETAUG2016III: 32
Consider a hash table of size $m = 10000$, and the hash function $h(K) = floor (m(KA \bmod 1))$ for $A = ( \sqrt{5} – 1)/2$. The key $123456$ is mapped to location ______. $46$ $41$ $43$ $48$
asked
Oct 2, 2016
in
DS
by
makhdoom ghaya

332
views
ugcnetaug2016iii
datastructures
hashing
+3
votes
2
answers
15
UGCNETAUG2016III: 31
Consider the problem of a chain <$A_{1} , A_{2} , A_{3},A_{4}$> of four matrices. Suppose that the dimensions of the matrices $A_{1} , A_{2} , A_{3}$ and $A_{4}$ are $30 \times 35, 35 \times 15, 15 \times 5$ ... . The minimum number of scalar multiplications needed to compute the product $A_{1}A_{2}A_{3}A_{4}$ is ____. $14875$ $21000$ $9375$ $11875$
asked
Oct 2, 2016
in
Algorithms
by
makhdoom ghaya

754
views
ugcnetaug2016iii
algorithms
dynamicprogramming
numericalanswers
matrices
+3
votes
2
answers
16
UGCNETAUG2016III: 30
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$ for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is _____. ABHI HAQC IHBA BHQC
asked
Oct 2, 2016
in
Computer Networks
by
makhdoom ghaya

2.1k
views
ugcnetaug2016iii
cryptography
computernetworks
+3
votes
1
answer
17
UGCNETAUG2016III: 29
An analog signal has a bit rate of $8000$ bps and a baud rate of $1000$. Then analog signal has _____ signal elements and carry _____ data elements in each signal. $256, 8$ bits $128, 4$ bits $256, 4$ bits $128, 8$ bits
asked
Oct 2, 2016
in
Computer Networks
by
makhdoom ghaya

1.8k
views
ugcnetaug2016iii
computernetworks
transmissionmedia
+1
vote
2
answers
18
UGCNETAUG2016III: 28
A slotted ALOHA network transmits $200$ bits frames using a shared channel with $200$ kbps bandwidth. If the system (all stations put together) produces $1000$ frames per second, then the throughput of the system is _______. $0.268$ $0.468$ $0.368$ $0.568$
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya

789
views
ugcnetaug2016iii
computernetworks
multipleaccessprotocol
transmissionmedia
+3
votes
3
answers
19
UGCNETAUG2016III: 27
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is $G(x) = x^{4}+ x + 1$. After implementing $CRC$ encoder, the encoded word sent from sender side is _____. 11010110111110 11101101011011 110101111100111 110101111001111
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya

2.5k
views
ugcnetaug2016iii
computernetworks
crc
checksum
+1
vote
2
answers
20
UGCNETAUG2016III: 26
Consider the following statements : A. High speed Ethernet works on optic fiber. B. A point to point protocol over Ethernet is a network protocol for encapsulating $PPP$ frames inside Ethernet frames. C. High speed Ethernet does not work on optic fiber. D. A point to point protocol over Ethernet ... $D$ are true. $A, B, C$ and $D$ are true. $A, B, C$ and $D$ are false.
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya

1k
views
ugcnetaug2016iii
computernetworks
ethernet
networkprotocols
+3
votes
2
answers
21
UGCNETAUG2016III: 25
Suppose transmission rate of a channel is $32$ kbps. If there are $‘8’$ routes from source to destination and each packet $p$ contains $8000$ bits. Total end to end delay in sending packet $P$ is _____. $2$ sec $3$ sec $4$ se $1$ sec
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya

1.7k
views
ugcnetaug2016iii
computernetworks
networkswitching
+4
votes
2
answers
22
UGCNETAUG2016III: 24
Consider the following identities for regular expressions : (a) (r + s)* = (s + r)* (b) (r*)* = r* (c) (r* s*)* = (r + s)* Which of the above identities are true ? (a) and (b) only (b) and (c) only (c) and (a) only (a), (b) and (c)
asked
Oct 1, 2016
in
Theory of Computation
by
makhdoom ghaya

1.2k
views
ugcnetaug2016iii
theoryofcomputation
regularexpressions
+2
votes
2
answers
23
UGCNETAUG2016III: 23
Let $\Sigma= {a, b}$ and language $L = {aa, bb}$. Then, the complement of $L$ is $\left\{\lambda, a, b, ab, ba \right\} \cup \left\{w \in\left\{a, b\right\}^{*}  w > 3 \right\}$ ... $\left\{\lambda, a, b, ab, ba\right\} \cup \left\{w \in \left\{a, b\right\}^{*}  w \geq 3 \right\}$
asked
Oct 1, 2016
in
Theory of Computation
by
makhdoom ghaya

219
views
ugcnetaug2016iii
theoryofcomputation
complement
+2
votes
2
answers
24
UGCNETAUG2016III: 22
The regular grammar for the language $L$ = {$a^{n}b^{m}$  $n + m$ is even} is given by (1) $S \rightarrow S_{1}  S_{2}$ $S_{1} \rightarrow a S_{1}  A_{1}$ $A_{1} \rightarrow b A_{1}  \lambda$ $S_{2} \rightarrow aaS_{2}  A_{2}$ ... $S_{2} \rightarrow aaS_{2}  aA_{2}$ $A_{1} \rightarrow bbA_{1}  \lambda$ $A_{2} \rightarrow bbA_{2}  b$
asked
Oct 1, 2016
in
Theory of Computation
by
makhdoom ghaya

457
views
ugcnetaug2016iii
theoryofcomputation
regulargrammar
+3
votes
1
answer
25
UGCNETAUG2016III: 21
Assume that the program $‘P’$ is implementing parameter passing with ‘call by reference’. What will be printed by following print statements in $P$? { x=10; y=3; funb(y,x,x) print x; print y; } funb (x,y,z) { y=y+4; z=x+y+z; } 10, 7 31, 3 10, 3 31, 7
asked
Oct 1, 2016
in
Others
by
makhdoom ghaya

856
views
ugcnetaug2016iii
+2
votes
1
answer
26
UGCNETAUG2016III: 20
Aliasing in the context of programming languages refers to : Multiple variables having the same location Multiple variables having the same identifier Multiple variables having the same value Multiple use of same variable
asked
Oct 1, 2016
in
Programming
by
makhdoom ghaya

594
views
ugcnetaug2016iii
programming
aliasing
+1
vote
1
answer
27
UGCNETAUG2016III: 19
Match the following with reference to Functional programming history : a. Lambda calculus i. Church, 1932 b. Lambda calculus as programming language ii. Wordsworth, 1970 c. Lazy evaluation iii. Haskel, 1990 d. Type classes iv. Mecarthy, 1960 Codes : a b c d iv i iii ii i iv ii iii iii ii iv i ii i iv iii
asked
Oct 1, 2016
in
Programming
by
makhdoom ghaya

294
views
ugcnetaug2016iii
programming
+1
vote
2
answers
28
UGCNETAUG2016III: 18
The LiangBarsky line clipping algorithm uses the parametric equation of a line from $(x_{1} , y_{1} )$ to $(x_{2} , y_{2} )$ along with its infinite extension which is given as : $x = x_{1} + \Delta x.u$ $y = y_{1} + \Delta y.u$ ... is given as : $(0, \frac{2}{3})$ $\left(\frac{1}{6},\frac{5}{6}\right)$ $(0, \frac{1}{3})$ $(0, 1)$
asked
Oct 1, 2016
in
Computer Graphics
by
makhdoom ghaya

1.2k
views
ugcnetaug2016iii
computergraphics
linedrawingalgorithm
+1
vote
1
answer
29
UGCNETAUG2016III: 17
In perspective projection (from 3D to 2D), objects behind the centre of projection are projected upside down and backward onto the viewplane. This is known as _____. Topological distortion Vanishing point View confusion Perspective foreshortening
asked
Oct 1, 2016
in
Computer Graphics
by
makhdoom ghaya

754
views
ugcnetaug2016iii
computergraphics
projection
+6
votes
1
answer
30
UGCNETAUG2016III: 16
A point $P(2, 5)$ is rotated about a pivot point $(1, 2)$ by 60°. What is the new transformed point $P'$ ? $(1, 4)$ $(–1, 4)$ $(1, – 4)$ $(– 4, 1)$
asked
Oct 1, 2016
in
Computer Graphics
by
makhdoom ghaya

2.5k
views
ugcnetaug2016iii
computergraphics
projection
Page:
« prev
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Interview Experience for MS(R)IIT Delhi (School of Information Technology)
How am I preparing
PGEE 2020 (CSE) Experience
IIT Tirupati MS Interview 2020
IIT Bombay Mtech RA  interview experience (2020)
Subjects
All categories
General Aptitude
(2k)
Engineering Mathematics
(8.2k)
Digital Logic
(2.9k)
Programming and DS
(5k)
Algorithms
(4.4k)
Theory of Computation
(6.2k)
Compiler Design
(2.2k)
Operating System
(4.6k)
Databases
(4.2k)
CO and Architecture
(3.4k)
Computer Networks
(4.2k)
Non GATE
(1.2k)
Others
(1.5k)
Admissions
(595)
Exam Queries
(562)
Tier 1 Placement Questions
(23)
Job Queries
(71)
Projects
(19)
Unknown Category
(1k)
Recent questions tagged ugcnetaug2016iii
Recent Blog Comments
........
After getting so many mails from you...
Refund will be given for such cases if applied...
@sreejit007 they don't publish any cutoff or...
@ranjanabhi Can you please elaborate what did...
Network Sites
GO Mechanical
GO Electrical
GO Electronics
GO Civil
CSE Doubts
52,315
questions
60,430
answers
201,762
comments
95,241
users