The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged ugcnetdec2012iii
+2
votes
2
answers
1
UGCNETDec2012III75
Let $\theta(x, y, z)$ be the statement “x+y=z” and let there be two quantification given as $\forall x \forall y \exists z \theta (x,y,z)$ $\exists z \forall x \forall y \theta (x,y,z)$ where x, y, z are real numbers, then which one of the following is correct? I is true and II is true I is true and II is false I is false and II is true I is false and II is false
asked
Jul 13, 2016
in
Discrete Mathematics
by
jothee
Veteran
(
105k
points)

834
views
ugcnetdec2012iii
discretemathematics
propositionallogic
+1
vote
1
answer
2
UGCNETDec2012III74
A* algorithm is guaranteed to find an optimal solution if h’ is always 0 g is always 1 h’ never overestimates h h’ never underestimates h
asked
Jul 13, 2016
in
IS&Software Engineering
by
jothee
Veteran
(
105k
points)

1.1k
views
ugcnetdec2012iii
artificialintelligence
+1
vote
2
answers
3
UGCNETDec2012III73
Match the following: a. Supervised learning 1. The decision system receives rewards for its action at the end of a sequence of steps b. Unsupervised learning 2. Manual labels of inputs are not used c. Reinforcement learning 3. Manual labels of inputs are used d. Inductive learning 4. System learns by example a b c d A 1 2 3 4 B 2 3 1 4 C 3 2 4 1 D 3 2 1 4
asked
Jul 13, 2016
in
Machine Learning
by
jothee
Veteran
(
105k
points)

570
views
ugcnetdec2012iii
machinelearning
+1
vote
1
answer
4
UGCNETDec2012III72
A cryptarithmetic problem of the type Can be solved efficiently using depth first technique breadth first technique constraint satisfaction technique bidirectional technique
asked
Jul 13, 2016
in
Computer Networks
by
jothee
Veteran
(
105k
points)

953
views
ugcnetdec2012iii
computernetworks
networksecurity
+2
votes
1
answer
5
UGCNETDec2012III71
You are given four images to represent as $I_1 = \begin{bmatrix} 0 & 0 \\ 0 & 0 \end{bmatrix}, I_2 = \begin{bmatrix} 0 & 1 \\ 0 & 0 \end{bmatrix}$, $I_3 = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix}, I_4 = \begin{bmatrix} 1 & 1 \\ 1 & 0 \end{bmatrix}$ The value of entropy is maximum for image $I_1$ $I_2$ $I_3$ $I_4$
asked
Jul 13, 2016
in
Computer Graphics
by
jothee
Veteran
(
105k
points)

1.1k
views
ugcnetdec2012iii
computergraphics
imageentropy
0
votes
2
answers
6
UGCNETDec2012III70
Referential integrity is directly related to Relation key Foreign key Primary key Candidate key
asked
Jul 13, 2016
in
Databases
by
jothee
Veteran
(
105k
points)

574
views
ugcnetdec2012iii
databases
sql
+1
vote
1
answer
7
UGCNETDec2012III69
Which is the method used to retrieve the current state of a check box? get State ( ) put State ( ) retrieve State ( ) write State ( )
asked
Jul 13, 2016
in
Object Oriented Programming
by
jothee
Veteran
(
105k
points)

482
views
ugcnetdec2012iii
objectorientedprogramming
java
+1
vote
1
answer
8
UGCNETDec2012III67
An expert system shell is an expert system without domain knowledge explanation facility reasoning with knowledge all of the above
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
105k
points)

801
views
ugcnetdec2012iii
artificialintelligence
expertsystem
+1
vote
2
answers
9
UGCNETDec2012III66
Match the following with respect to HTML tags and usage a. CITE 1. Italic representation b. EM 2. Represents outputs from programmes c. VAR 3. Represents to other source d. SAMP 4. Argument to a programme a b c d A 3 1 4 2 B 2 3 1 4 C 4 2 3 1 D 1 3 4 1
asked
Jul 13, 2016
in
Web Technologies
by
jothee
Veteran
(
105k
points)

446
views
ugcnetdec2012iii
webtechnologies
html
0
votes
1
answer
10
UGCNETDec2012III65
_____ establishes information about when,why and by whom changes are made in a Software. Software Configuration Management Change Control Version Control An Audit Trail
asked
Jul 13, 2016
in
IS&Software Engineering
by
jothee
Veteran
(
105k
points)

741
views
ugcnetdec2012iii
is&softwareengineering
softwarevalidation
+1
vote
2
answers
11
UGCNETDec2012III63
The third normal form is based on the concept of_____ Closure Dependency Transitive Dependency Normal Dependency Functional Dependency
asked
Jul 13, 2016
in
Databases
by
jothee
Veteran
(
105k
points)

1.4k
views
ugcnetdec2012iii
databases
databasenormalization
+1
vote
1
answer
12
UGCNETDec2012III61
Which one is a collection of templates and rules? XML CSS DHTML XSL
asked
Jul 13, 2016
in
Web Technologies
by
jothee
Veteran
(
105k
points)

845
views
ugcnetdec2012iii
webtechnologies
xsl
+1
vote
1
answer
13
UGCNETDec2012III60
The transform which posses ‘multiresolution’ property is Fourier transform Shorttime Fourier transform Wavelet transform KarhunenLoere transform
asked
Jul 13, 2016
in
Mathematical Logic
by
jothee
Veteran
(
105k
points)

347
views
ugcnetdec2012iii
engineeringmathematics
+1
vote
1
answer
14
UGCNETDec2012III58
Skolmization is the process of bringing all the quantifiers in the beginning of a formula in FDL removing all the universal quantifiers removing all the extential quantifiers all of the above
asked
Jul 13, 2016
in
Discrete Mathematics
by
jothee
Veteran
(
105k
points)

556
views
ugcnetdec2012iii
engineeringmathematics
discretemathematics
firstorderlogic
+1
vote
2
answers
15
UGCNETDec2012III56
If a relation with a Schema R is decomposed into two relations $R_1$ and $R_2$ such that $(R_1 \cup R_2) = R_1$ then which one of the following is to be satisfied for a lossless joint decomposition ($\rightarrow$ ... $R_1 \cap R_2 \rightarrow R_2$ $(R_1 \cap R_2) \rightarrow R_1 \text{ and } R_1 \cap R_2 \rightarrow R_2$
asked
Jul 13, 2016
in
Databases
by
jothee
Veteran
(
105k
points)

646
views
ugcnetdec2012iii
databases
decomposition
+1
vote
1
answer
16
UGCNETDec2012III55
The factors that determine the quality of a software system are correctness, reliability efficiency, usability, maintainability testability, portability, accuracy, error tolerances, expandability, access control, audit All of the above
asked
Jul 13, 2016
in
IS&Software Engineering
by
jothee
Veteran
(
105k
points)

498
views
ugcnetdec2012iii
is&softwareengineering
softwarequalityassurance
+1
vote
1
answer
17
UGCNETDec2012III54
The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system Class Model , Object Model and Analysis Model Object Model, Dynamic Model and Functional Model Class Model, Dynamic Model and Functional Model Object Model, Analysis Model and Dynamic Model
asked
Jul 13, 2016
in
Object Oriented Programming
by
jothee
Veteran
(
105k
points)

568
views
ugcnetdec2012iii
softwaredesign
objectorientedprogramming
+1
vote
1
answer
18
UGCNETDec2012III51
Suppose there are $\log_n$ sorted lists of n $\log_n$ element each. The time complexity of producing a sorted list of all these elements is (use heap data structure) $O (n \log \log_n)$ $\theta (n \log_n)$ $\Omega (n \log_n)$ $\Omega (n^{3/2})$
asked
Jul 13, 2016
in
Algorithms
by
jothee
Veteran
(
105k
points)

514
views
ugcnetdec2012iii
algorithms
timecomplexity
heap
+4
votes
5
answers
19
UGCNETDec2012III50
Which of the following definitions generates the same Language as $L$, where $L=\{ WW^R \mid W \in \{a, b\}$*$\}$? $S \rightarrow asb \mid bsa \mid \in$ $S \rightarrow asa \mid bsb \mid \in$ $S \rightarrow asa \mid bsa \mid asa \mid bsb \mid \in$ $S \rightarrow asa \mid bsa \mid asa \mid bsb \mid$
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
105k
points)

925
views
ugcnetdec2012iii
theoryofcomputation
0
votes
1
answer
20
UGCNETDec2012III49
Let $f$ be the fraction of the computation (in terms of time) that is parallelizabl$e$. $P$ the number of processors in the system, and $s_p$ the speed up achievable in comparison with sequential execution – then the $s_p$ can be calculated using the relation: $\frac{1}{1ff/P}$ $\frac{P}{Pf(P+1)}$ $\frac{1}{1f+f/P}$ $\frac{P}{P+f(P1)}$
asked
Jul 13, 2016
in
CO and Architecture
by
jothee
Veteran
(
105k
points)

490
views
ugcnetdec2012iii
coandarchitecture
speedup
0
votes
2
answers
21
UGCNETDec2012III48
Functions defined with class name are called as Inline Function Friend Function Constructor Static Function
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
105k
points)

506
views
ugcnetdec2012iii
objectorientedprogramming
functions
+4
votes
2
answers
22
UGCNETDec2012III47
The minimum number of states of the nondeterministic finite automaton which accepts the language $\{ a b a b^n \mid n \geq 0 \} \cup \{ a b a^n \mid n \geq 0 \}$ is 3 4 5 6
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
105k
points)

1.9k
views
ugcnetdec2012iii
theoryofcomputation
nfadfa
+4
votes
2
answers
23
UGCNETDec2012III46
Two graphs A and B are shown below: Which one of the following statements is true? Both A and B are planar Neither A nor B is planar A is planar and B is not B is planar and A is not
asked
Jul 13, 2016
in
Graph Theory
by
jothee
Veteran
(
105k
points)

814
views
ugcnetdec2012iii
graphtheory
graphplanarity
+1
vote
2
answers
24
UGCNETDec2012III44
The Default Parameter Passing Mechanism is called as Call by Value Call by Reference Call by Address Call by Name
asked
Jul 13, 2016
in
Programming and DS
by
jothee
Veteran
(
105k
points)

1.8k
views
ugcnetdec2012iii
programminginc
parameterpassing
+3
votes
2
answers
25
UGCNETDec2012III42
The grammar ‘GI’ $S \rightarrow OSO \mid ISI \mid 0 \mid 1 \mid \in$ and the grammar G2 is $ S \rightarrow as \mid asb \mid X, X \rightarrow Xa \mid a$. Which is the correct statement? G1 is ambiguous, G2 is unambiguous G1 is unambiguous, G2 is ambiguous Both G1 and G2 are ambiguous Both G1 and G2 are unambiguous
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
105k
points)

774
views
ugcnetdec2012iii
theoryofcomputation
grammar
+2
votes
2
answers
26
UGCNETDec2012III40
Which of the following operating system is better for implementing clientserver network? Windows 95 Windows 98 Windows 2000 All of these
asked
Jul 13, 2016
in
Operating System
by
jothee
Veteran
(
105k
points)

644
views
ugcnetdec2012iii
operatingsystem
computernetworks
nongate
+1
vote
4
answers
27
UGCNETDec2012III38
Which is not the correct statement? The class of regular sets is closed under homomorphisms The class of regular sets is not closed under inverse homomorphisms The class of regular sets is closed under quotient The class of regular sets is closed under substitution
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
105k
points)

631
views
ugcnetdec2012iii
theoryofcomputation
closureproperty
+1
vote
2
answers
28
UGCNETDec2012III37
Everything below the system call interface and above the physical hardware is known as Kernel Bus Shell Stub
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
105k
points)

708
views
ugcnetdec2012iii
unix
+1
vote
2
answers
29
UGCNETDec2012III35
In Win32, which function is used to create Windows Applications? Win APP Win API Win Main Win Void
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
105k
points)

901
views
ugcnetdec2012iii
applicationsinwindows
0
votes
2
answers
30
UGCNETDec2012III34
The power set of AUB, where A={2, 3, 5, 7} and B={2, 5, 8, 9}is 256 64 16 4
asked
Jul 12, 2016
in
Discrete Mathematics
by
jothee
Veteran
(
105k
points)

939
views
ugcnetdec2012iii
engineeringmathematics
discretemathematics
sets
Page:
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
ISRO CSE 2020 PAPER ANALYSE
BARC OCES/DGFS 2020
ISI CMI PDF by GATE Overflow
Calculus Important Points
Management Trainee Recruitment COAL INDIA 2020
Follow @csegate
Recent questions tagged ugcnetdec2012iii
Recent Blog Comments
@nsaisirisha Yes they will give marks only...
When will the results be declared based on...
For the questions with two answers as per the...
@MiNiPanda Congrax mate for this success !
Mostly authentic links, it can be Stackoverflow,...
50,737
questions
57,332
answers
198,441
comments
105,197
users