Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2012-paper3
1
votes
2
answers
31
UGC NET CSE | June 2012 | Part 3 | Question: 38
The following postfix expression is evaluated using a stack. 823^/23*+51*- . The top two elements of the stack after first * is evaluated 6,1 5, 7 3,2 1, 5
The following postfix expression is evaluated using a stack. 823^/23*+51*- . The top two elements of the stack after first * is evaluated6,15, 73,21, 5
go_editor
10.1k
views
go_editor
asked
Jul 7, 2016
DS
ugcnetcse-june2012-paper3
data-structures
stack
+
–
1
votes
1
answer
32
UGC NET CSE | June 2012 | Part 3 | Question: 37
Are we building the right product? – This statement refers to Verification Validation Testing Software quality assurance
Are we building the right product? – This statement refers toVerificationValidationTestingSoftware quality assurance
go_editor
1.5k
views
go_editor
asked
Jul 7, 2016
IS&Software Engineering
ugcnetcse-june2012-paper3
is&software-engineering
+
–
1
votes
1
answer
33
UGC NET CSE | June 2012 | Part 3 | Question: 36
Number of binary trees formed with 5 nodes are 32 36 120 42
Number of binary trees formed with 5 nodes are323612042
go_editor
8.4k
views
go_editor
asked
Jul 7, 2016
DS
ugcnetcse-june2012-paper3
data-structures
tree
+
–
1
votes
1
answer
34
UGC NET CSE | June 2012 | Part 3 | Question: 35
Consider the regular expression (a+b)(a+b) ..... (a+b) (n-times). The minimum number of states in finite automaton that recognizes the language represented by this regular expression contains n states n+1 states n+2 states 2$^n$ states
Consider the regular expression (a+b)(a+b) ..... (a+b) (n-times). The minimum number of states in finite automaton that recognizes the language represented by this regula...
go_editor
4.0k
views
go_editor
asked
Jul 7, 2016
Theory of Computation
ugcnetcse-june2012-paper3
theory-of-computation
regular-expression
+
–
2
votes
3
answers
35
UGC NET CSE | June 2012 | Part 3 | Question: 33
Which one of the following statements is incorrect? The number of regions corresponds to the cyclomatic complexity Cyclomatic complexity for a flow graph $G$ is $V(G)=N-E+2$, where E is the number of edges and N is the number of nodes in flow ... flow graph $G$ is $V(G)=P+1$, where P is the number of predicate nodes contained in the flow graph G.
Which one of the following statements is incorrect?The number of regions corresponds to the cyclomatic complexityCyclomatic complexity for a flow graph $G$ is $V(G)=N-E+2...
go_editor
10.7k
views
go_editor
asked
Jul 7, 2016
IS&Software Engineering
ugcnetcse-june2012-paper3
is&software-engineering
software-metrics
+
–
3
votes
2
answers
36
UGC NET CSE | June 2012 | Part 3 | Question: 32
The equivalent grammar corresponding to the grammar $G:S \rightarrow aA, A \rightarrow BB, B \rightarrow aBb \mid \varepsilon$ is $S \rightarrow aA, A \rightarrow BB, B \rightarrow aBb$ ... $S \rightarrow a \mid aA, A \rightarrow BB \mid B , B \rightarrow aBb \mid ab$
The equivalent grammar corresponding to the grammar $G:S \rightarrow aA, A \rightarrow BB, B \rightarrow aBb \mid \varepsilon$ is$S \rightarrow aA, A \rightarrow BB, B \r...
go_editor
5.4k
views
go_editor
asked
Jul 7, 2016
Theory of Computation
theory-of-computation
grammar
context-free-language
ugcnetcse-june2012-paper3
+
–
3
votes
2
answers
37
UGC NET CSE | June 2012 | Part 3 | Question: 31
The upper bound of computing time of m colouring decision problem is $O(nm)$ $O(n^m)$ $O(nm^n)$ $O(n^mm^n)$
The upper bound of computing time of m colouring decision problem is$O(nm)$$O(n^m)$$O(nm^n)$$O(n^mm^n)$
go_editor
3.1k
views
go_editor
asked
Jul 7, 2016
Programming in C
ugcnetcse-june2012-paper3
graph-theory
graph-coloring
+
–
2
votes
2
answers
38
UGC NET CSE | June 2012 | Part 3 | Question: 30
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module is at least greater than 0.9 equal to 0.9 at most 0.81 at least 1/0.81
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the ...
go_editor
6.9k
views
go_editor
asked
Jul 7, 2016
IS&Software Engineering
ugcnetcse-june2012-paper3
is&software-engineering
software-testing
+
–
2
votes
1
answer
39
UGC NET CSE | June 2012 | Part 3 | Question: 29
Which of the following IP address class is a multicast address? Class A Class B Class C Class D
Which of the following IP address class is a multicast address?Class AClass BClass CClass D
go_editor
3.2k
views
go_editor
asked
Jul 7, 2016
Computer Networks
ugcnetcse-june2012-paper3
computer-networks
ip-addressing
+
–
1
votes
2
answers
40
UGC NET CSE | June 2012 | Part 3 | Question: 28
Which one of the following is not a Greibach Normal form grammar? (i) $S \rightarrow a \mid bA \mid aA \mid bB$ $A \rightarrow a$ $B \rightarrow b$ (ii) $S \rightarrow a \mid aA \mid AB$ $A \rightarrow a$ $B \rightarrow b$ (iii) $S \rightarrow a \mid A \mid aA $ $A \rightarrow a$ (i) and (ii) (i) and (iii) (ii) and (iii) (i), (ii) and (iii)
Which one of the following is not a Greibach Normal form grammar?(i)$S \rightarrow a \mid bA \mid aA \mid bB$$A \rightarrow a$$B \rightarrow b$(ii)$S \rightarrow a \mid a...
go_editor
4.8k
views
go_editor
asked
Jul 7, 2016
Theory of Computation
ugcnetcse-june2012-paper3
theory-of-computation
context-free-grammar
+
–
1
votes
1
answer
41
UGC NET CSE | June 2012 | Part 3 | Question: 27
Identify the addressing modes of the below instructions and match them : ... $\text{a-iii, b-ii, c-i, d-iv}$ $\text{a-iv, b-iii, c-ii, d-i}$
Identify the addressing modes of the below instructions and match them :$\begin{array}{} \text{(a)} & \text{ADI} & \text{(i)} & \text{Immediate addressing} \\ \text{(b)}...
go_editor
2.1k
views
go_editor
asked
Jul 7, 2016
CO and Architecture
ugcnetcse-june2012-paper3
co-and-architecture
addressing-modes
+
–
2
votes
2
answers
42
UGC NET CSE | June 2012 | Part 3 | Question: 26
The mechanism that binds code and data together and keeps them secure form outside world is known as Abstraction Inheritance Encapsulation Polymorphism
The mechanism that binds code and data together and keeps them secure form outside world is known asAbstractionInheritanceEncapsulationPolymorphism
go_editor
4.3k
views
go_editor
asked
Jul 7, 2016
Programming in C
ugcnetcse-june2012-paper3
programming
programming-in-c
java
object-oriented-programming
+
–
2
votes
1
answer
43
UGC NET CSE | June 2012 | Part 3 | Question: 25, UGCNET-Dec2013-III: 42
Which is not the correct statement(s)? Every context sensitive language is recursive There is a recursive language that is not context sensitive I is true II is false I is true and II is true I is false II is false I is false and II is true
Which is not the correct statement(s)?Every context sensitive language is recursiveThere is a recursive language that is not context sensitiveI is true II is falseI is tr...
go_editor
4.7k
views
go_editor
asked
Jul 7, 2016
Theory of Computation
ugcnetcse-june2012-paper3
ugcnetcse-dec2013-paper3
theory-of-computation
+
–
1
votes
1
answer
44
UGC NET CSE | June 2012 | Part 3 | Question: 24
The ____________ memory allocation function modifies the previous allocated space. calloc() free() malloc() realloc()
The ____________ memory allocation function modifies the previous allocated space.calloc()free()malloc()realloc()
go_editor
2.4k
views
go_editor
asked
Jul 7, 2016
Programming in C
ugcnetcse-june2012-paper3
programming-in-c
dynamic-memory-allocation
+
–
3
votes
1
answer
45
UGC NET CSE | June 2012 | Part 3 | Question: 23
Which of the following prolog programs correctly implement if G succeeds then execute goal P else execute goal $\theta$ ? if-else (G, P, $\theta$):-!,call(G), call(P). if-else (G,P, $\theta$) :- call($\theta$). if-else (G, P, $\theta$):-call(G), !, ... (G, P, $\theta$):-call(G), call(P), !. if-else (G,P, $\theta$) :- call($\theta$). All of the above
Which of the following prolog programs correctly implement “if G succeeds then execute goal P else execute goal $\theta$”?if-else (G, P, $\theta$):-!,call(G), call(P)...
go_editor
1.2k
views
go_editor
asked
Jul 7, 2016
IS&Software Engineering
ugcnetcse-june2012-paper3
artificial-intelligence
+
–
2
votes
2
answers
46
UGC NET CSE | June 2012 | Part 3 | Question: 22
The transform which possess the highest ‘energy compaction’ property is Slant transform Cosine transform Fourier transform Karhunen-Loeve transform
The transform which possess the highest ‘energy compaction’ property isSlant transformCosine transformFourier transformKarhunen-Loeve transform
go_editor
2.1k
views
go_editor
asked
Jul 7, 2016
Others
ugcnetcse-june2012-paper3
digital-image-processing
+
–
1
votes
2
answers
47
UGC NET CSE | June 2012 | Part 3 | Question: 21
$A^*$ algorithm uses $f'=g+h'$ to estimate the cost of getting from the initial state to the goal state, where $g$ is a measure of cost getting from initial state to the current node and the function $h'$ is an estimate of the cost of getting from the ... . To find a path involving the fewest number of steps, we should test, $g=1$ $g=0$ $h'=0$ $h'=1$
$A^*$ algorithm uses $f’=g+h’$ to estimate the cost of getting from the initial state to the goal state, where $g$ is a measure of cost getting from initial state to ...
go_editor
4.4k
views
go_editor
asked
Jul 7, 2016
Artificial Intelligence
ugcnetcse-june2012-paper3
artificial-intelligence
+
–
1
votes
1
answer
48
UGC NET CSE | June 2012 | Part 3 | Question: 20
Data Warehouse provides Transaction Responsiveness Storage, Functionality Responsiveness to queries Demand and Supply Responsiveness None of the above
Data Warehouse providesTransaction ResponsivenessStorage, Functionality Responsiveness to queriesDemand and Supply ResponsivenessNone of the above
go_editor
1.8k
views
go_editor
asked
Jul 6, 2016
Others
ugcnetcse-june2012-paper3
data-warehousing
+
–
1
votes
1
answer
49
UGC NET CSE | June 2012 | Part 3 | Question: 19
The quantiser in an image-compression system is a lossy element which exploits the psychovisual redundancy lossless element which exploits the psychovisual redundancy lossy element which exploits the statistical redundancy lossless element which exploits the statistical redundancy
The quantiser in an image-compression system is alossy element which exploits the psychovisual redundancylossless element which exploits the psychovisual redundancylossy ...
go_editor
2.3k
views
go_editor
asked
Jul 6, 2016
Digital Image Processing
ugcnetcse-june2012-paper3
image-compression
+
–
2
votes
2
answers
50
UGC NET CSE | June 2012 | Part 3 | Question: 17
Let $Q(x,y)$ denote “x+y=0” and let there be two quantifications given as $\exists y \forall x Q(x,y)$ $\forall x \exists y Q(x,y)$ where $x$ and $y$ are real numbers. Then which of the following is valid? I is true and II is false I is false and II is true I is false and II is also false both I and II are true
Let $Q(x,y)$ denote “x+y=0” and let there be two quantifications given as$\exists y \forall x Q(x,y)$$\forall x \exists y Q(x,y)$where $x$ and $y$ are real numbers. T...
go_editor
2.9k
views
go_editor
asked
Jul 6, 2016
Discrete Mathematics
ugcnetcse-june2012-paper3
discrete-mathematics
mathematical-logic
+
–
1
votes
2
answers
51
UGC NET CSE | June 2012 | Part 3 | Question: 16
Given the following statements: The power of deterministic finite state machine and non- deterministic finite state machine are same. The power of deterministic pushdown automaton and non- deterministic pushdown automaton are same. Which of the above is the correct statement(s)? Both I and II Only I Only II Neither I nor II
Given the following statements:The power of deterministic finite state machine and non- deterministic finite state machine are same.The power of deterministic pushdown au...
go_editor
3.3k
views
go_editor
asked
Jul 6, 2016
Theory of Computation
ugcnetcse-june2012-paper3
theory-of-computation
finite-automata
+
–
1
votes
2
answers
52
UGC NET CSE | June 2012 | Part 3 | Question: 14
If the pixels of an image are shuffled then the parameter that may change is Histogram Mean Entropy Covariance
If the pixels of an image are shuffled then the parameter that may change isHistogramMeanEntropyCovariance
go_editor
3.0k
views
go_editor
asked
Jul 6, 2016
Computer Graphics
ugcnetcse-june2012-paper3
computer-graphics
+
–
2
votes
1
answer
53
UGC NET CSE | June 2012 | Part 3 | Question: 13
Which of the following is scheme to deal with deadlock? Time out Time in Both A and B None of the above
Which of the following is scheme to deal with deadlock?Time outTime inBoth A and BNone of the above
go_editor
2.3k
views
go_editor
asked
Jul 6, 2016
Operating System
ugcnetcse-june2012-paper3
operating-system
java
deadlock-prevention-avoidance-detection
+
–
1
votes
1
answer
54
UGC NET CSE | June 2012 | Part 3 | Question: 12
Which of the following can be used for clustering the data? Single layer perception Multilayer perception Self organizing map Radial basis function
Which of the following can be used for clustering the data?Single layer perceptionMultilayer perceptionSelf organizing mapRadial basis function
go_editor
4.8k
views
go_editor
asked
Jul 6, 2016
IS&Software Engineering
ugcnetcse-june2012-paper3
data-mining
+
–
2
votes
1
answer
55
UGC NET CSE | June 2012 | Part 3 | Question: 11
X.25 is ______ Network Connection Oriented Network Connection Less Network Either Connection Oriented or Connection Less Neither Connection Oriented nor Connection Less
X.25 is ______ NetworkConnection Oriented NetworkConnection Less NetworkEither Connection Oriented or Connection LessNeither Connection Oriented nor Connection Less
go_editor
2.0k
views
go_editor
asked
Jul 6, 2016
Computer Networks
ugcnetcse-june2012-paper3
computer-networks
osi-protocol
+
–
2
votes
2
answers
56
UGC NET CSE | June 2012 | Part 3 | Question: 10
In an image compression system 16384 bits are used to represent 256 $\times$ 256 image with 256 gray levels. What is the compression ratio for this system? 1 2 4 8
In an image compression system 16384 bits are used to represent 256 $\times$ 256 image with 256 gray levels. What is the compression ratio for this system?1248
go_editor
2.6k
views
go_editor
asked
Jul 6, 2016
Digital Image Processing
ugcnetcse-june2012-paper3
image-compression
+
–
2
votes
3
answers
57
UGC NET CSE | June 2012 | Part 3 | Question: 9
The problem that occurs when one transaction updates a database item and the transaction fails for some reason is Temporary Select Problem Temporary Modify Problem Dirty Read Problem None
The problem that occurs when one transaction updates a database item and the transaction fails for some reason isTemporary Select ProblemTemporary Modify ProblemDirty Rea...
go_editor
3.2k
views
go_editor
asked
Jul 6, 2016
Databases
ugcnetcse-june2012-paper3
databases
+
–
2
votes
1
answer
58
UGC NET CSE | June 2012 | Part 3 | Question: 8, UGCNET-Dec2012-III: 59
Which level of abstraction describes what data are stored in the database? Physical level View level Abstraction level Logical level
Which level of abstraction describes what data are stored in the database? Physical levelView levelAbstraction levelLogical level
go_editor
5.1k
views
go_editor
asked
Jul 6, 2016
Databases
ugcnetcse-june2012-paper3
databases
data-model
ugcnetcse-dec2012-paper3
+
–
1
votes
1
answer
59
UGC NET CSE | June 2012 | Part 3 | Question: 7
Match the following : ... $\text{(i)-(b), (ii)-(c), (iii)-(d), (iv)-(a) }$
Match the following :$\begin{array}{clcl} \text{(i)} & \text{OLAP} & \text{(a)} & \text{Regression} \\ \text{(ii)} & \text{OLTP} & \text{(b)} & \text{Data Warehouse} \\ ...
go_editor
2.3k
views
go_editor
asked
Jul 6, 2016
Others
ugcnetcse-june2012-paper3
data-mining
data-warehousing
+
–
3
votes
1
answer
60
UGC NET CSE | June 2012 | Part 3 | Question: 6
If two fuzzy set $A$ and $B$ are given with membership functions $\mu_A(x) = \{0.2,0.4,0.8,0.5,0.1\}$ $\mu_B(x) = \{0.1,0.3,0.6,0.3,0.2\}$ Then the value of $\mu_{\overline{A \cap B} }$ will be $\{0.9,0.7,0.4,0.8,0.9\}$ $\{0.2,0.4,0.8,0.5,0.2\}$ $\{0.1,0.3,0.6,0.3,0.1\}$ $\{0.7,0.3,0.4,0.2,0.7\}$
If two fuzzy set $A$ and $B$ are given with membership functions$\mu_A(x) = \{0.2,0.4,0.8,0.5,0.1\}$$\mu_B(x) = \{0.1,0.3,0.6,0.3,0.2\}$Then the value of $\mu_{\overline{...
go_editor
6.5k
views
go_editor
asked
Jul 6, 2016
Data Mining and Warehousing
ugcnetcse-june2012-paper3
fuzzy-set
+
–
Page:
« prev
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register