The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged ugcnetdec2012iii
+2
votes
2
answers
1
UGCNETDec2012III75
Let $\theta(x, y, z)$ be the statement “x+y=z” and let there be two quantification given as $\forall x \forall y \exists z \theta (x,y,z)$ $\exists z \forall x \forall y \theta (x,y,z)$ where x, y, z are real numbers, then which one of the following is correct? I is true and II is true I is true and II is false I is false and II is true I is false and II is false
asked
Jul 13, 2016
in
Discrete Mathematics
by
jothee
Veteran
(
104k
points)

808
views
ugcnetdec2012iii
discretemathematics
propositionallogic
+1
vote
1
answer
2
UGCNETDec2012III74
A* algorithm is guaranteed to find an optimal solution if h’ is always 0 g is always 1 h’ never overestimates h h’ never underestimates h
asked
Jul 13, 2016
in
IS&Software Engineering
by
jothee
Veteran
(
104k
points)

1.1k
views
ugcnetdec2012iii
artificialintelligence
+1
vote
2
answers
3
UGCNETDec2012III73
Match the following: a. Supervised learning 1. The decision system receives rewards for its action at the end of a sequence of steps b. Unsupervised learning 2. Manual labels of inputs are not used c. Reinforcement learning 3. Manual labels of inputs are used d. Inductive learning 4. System learns by example a b c d A 1 2 3 4 B 2 3 1 4 C 3 2 4 1 D 3 2 1 4
asked
Jul 13, 2016
in
Machine Learning
by
jothee
Veteran
(
104k
points)

547
views
ugcnetdec2012iii
machinelearning
+1
vote
1
answer
4
UGCNETDec2012III72
A cryptarithmetic problem of the type Can be solved efficiently using depth first technique breadth first technique constraint satisfaction technique bidirectional technique
asked
Jul 13, 2016
in
Computer Networks
by
jothee
Veteran
(
104k
points)

923
views
ugcnetdec2012iii
computernetworks
networksecurity
+2
votes
1
answer
5
UGCNETDec2012III71
You are given four images to represent as $I_1 = \begin{bmatrix} 0 & 0 \\ 0 & 0 \end{bmatrix}, I_2 = \begin{bmatrix} 0 & 1 \\ 0 & 0 \end{bmatrix}$, $I_3 = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix}, I_4 = \begin{bmatrix} 1 & 1 \\ 1 & 0 \end{bmatrix}$ The value of entropy is maximum for image $I_1$ $I_2$ $I_3$ $I_4$
asked
Jul 13, 2016
in
Computer Graphics
by
jothee
Veteran
(
104k
points)

1.1k
views
ugcnetdec2012iii
computergraphics
imageentropy
0
votes
2
answers
6
UGCNETDec2012III70
Referential integrity is directly related to Relation key Foreign key Primary key Candidate key
asked
Jul 13, 2016
in
Databases
by
jothee
Veteran
(
104k
points)

559
views
ugcnetdec2012iii
databases
sql
+1
vote
1
answer
7
UGCNETDec2012III69
Which is the method used to retrieve the current state of a check box? get State ( ) put State ( ) retrieve State ( ) write State ( )
asked
Jul 13, 2016
in
Object Oriented Programming
by
jothee
Veteran
(
104k
points)

470
views
ugcnetdec2012iii
objectorientedprogramming
java
+1
vote
1
answer
8
UGCNETDec2012III67
An expert system shell is an expert system without domain knowledge explanation facility reasoning with knowledge all of the above
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
104k
points)

769
views
ugcnetdec2012iii
artificialintelligence
expertsystem
+1
vote
2
answers
9
UGCNETDec2012III66
Match the following with respect to HTML tags and usage a. CITE 1. Italic representation b. EM 2. Represents outputs from programmes c. VAR 3. Represents to other source d. SAMP 4. Argument to a programme a b c d A 3 1 4 2 B 2 3 1 4 C 4 2 3 1 D 1 3 4 1
asked
Jul 13, 2016
in
Web Technologies
by
jothee
Veteran
(
104k
points)

423
views
ugcnetdec2012iii
webtechnologies
html
0
votes
1
answer
10
UGCNETDec2012III65
_____ establishes information about when,why and by whom changes are made in a Software. Software Configuration Management Change Control Version Control An Audit Trail
asked
Jul 13, 2016
in
IS&Software Engineering
by
jothee
Veteran
(
104k
points)

713
views
ugcnetdec2012iii
is&softwareengineering
softwarevalidation
+1
vote
2
answers
11
UGCNETDec2012III63
The third normal form is based on the concept of_____ Closure Dependency Transitive Dependency Normal Dependency Functional Dependency
asked
Jul 13, 2016
in
Databases
by
jothee
Veteran
(
104k
points)

1.3k
views
ugcnetdec2012iii
databases
databasenormalization
+1
vote
1
answer
12
UGCNETDec2012III61
Which one is a collection of templates and rules? XML CSS DHTML XSL
asked
Jul 13, 2016
in
Web Technologies
by
jothee
Veteran
(
104k
points)

819
views
ugcnetdec2012iii
webtechnologies
xsl
+1
vote
1
answer
13
UGCNETDec2012III60
The transform which posses ‘multiresolution’ property is Fourier transform Shorttime Fourier transform Wavelet transform KarhunenLoere transform
asked
Jul 13, 2016
in
Mathematical Logic
by
jothee
Veteran
(
104k
points)

324
views
ugcnetdec2012iii
engineeringmathematics
+1
vote
1
answer
14
UGCNETDec2012III58
Skolmization is the process of bringing all the quantifiers in the beginning of a formula in FDL removing all the universal quantifiers removing all the extential quantifiers all of the above
asked
Jul 13, 2016
in
Discrete Mathematics
by
jothee
Veteran
(
104k
points)

524
views
ugcnetdec2012iii
engineeringmathematics
discretemathematics
firstorderlogic
+1
vote
2
answers
15
UGCNETDec2012III56
If a relation with a Schema R is decomposed into two relations $R_1$ and $R_2$ such that $(R_1 \cup R_2) = R_1$ then which one of the following is to be satisfied for a lossless joint decomposition ($\rightarrow$ ... $R_1 \cap R_2 \rightarrow R_2$ $(R_1 \cap R_2) \rightarrow R_1 \text{ and } R_1 \cap R_2 \rightarrow R_2$
asked
Jul 13, 2016
in
Databases
by
jothee
Veteran
(
104k
points)

623
views
ugcnetdec2012iii
databases
decomposition
+1
vote
1
answer
16
UGCNETDec2012III55
The factors that determine the quality of a software system are correctness, reliability efficiency, usability, maintainability testability, portability, accuracy, error tolerances, expandability, access control, audit All of the above
asked
Jul 13, 2016
in
IS&Software Engineering
by
jothee
Veteran
(
104k
points)

484
views
ugcnetdec2012iii
is&softwareengineering
softwarequalityassurance
+1
vote
1
answer
17
UGCNETDec2012III54
The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system Class Model , Object Model and Analysis Model Object Model, Dynamic Model and Functional Model Class Model, Dynamic Model and Functional Model Object Model, Analysis Model and Dynamic Model
asked
Jul 13, 2016
in
Object Oriented Programming
by
jothee
Veteran
(
104k
points)

556
views
ugcnetdec2012iii
softwaredesign
objectorientedprogramming
+1
vote
1
answer
18
UGCNETDec2012III51
Suppose there are $\log_n$ sorted lists of n $\log_n$ element each. The time complexity of producing a sorted list of all these elements is (use heap data structure) $O (n \log \log_n)$ $\theta (n \log_n)$ $\Omega (n \log_n)$ $\Omega (n^{3/2})$
asked
Jul 13, 2016
in
Algorithms
by
jothee
Veteran
(
104k
points)

496
views
ugcnetdec2012iii
algorithms
timecomplexity
heap
+4
votes
5
answers
19
UGCNETDec2012III50
Which of the following definitions generates the same Language as $L$, where $L=\{ WW^R \mid W \in \{a, b\}$*$\}$? $S \rightarrow asb \mid bsa \mid \in$ $S \rightarrow asa \mid bsb \mid \in$ $S \rightarrow asa \mid bsa \mid asa \mid bsb \mid \in$ $S \rightarrow asa \mid bsa \mid asa \mid bsb \mid$
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
104k
points)

893
views
ugcnetdec2012iii
theoryofcomputation
0
votes
1
answer
20
UGCNETDec2012III49
Let $f$ be the fraction of the computation (in terms of time) that is parallelizabl$e$. $P$ the number of processors in the system, and $s_p$ the speed up achievable in comparison with sequential execution – then the $s_p$ can be calculated using the relation: $\frac{1}{1ff/P}$ $\frac{P}{Pf(P+1)}$ $\frac{1}{1f+f/P}$ $\frac{P}{P+f(P1)}$
asked
Jul 13, 2016
in
CO and Architecture
by
jothee
Veteran
(
104k
points)

471
views
ugcnetdec2012iii
coandarchitecture
speedup
0
votes
2
answers
21
UGCNETDec2012III48
Functions defined with class name are called as Inline Function Friend Function Constructor Static Function
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
104k
points)

486
views
ugcnetdec2012iii
objectorientedprogramming
functions
+4
votes
2
answers
22
UGCNETDec2012III47
The minimum number of states of the nondeterministic finite automaton which accepts the language $\{ a b a b^n \mid n \geq 0 \} \cup \{ a b a^n \mid n \geq 0 \}$ is 3 4 5 6
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
104k
points)

1.8k
views
ugcnetdec2012iii
theoryofcomputation
nfa
+4
votes
2
answers
23
UGCNETDec2012III46
Two graphs A and B are shown below: Which one of the following statements is true? Both A and B are planar Neither A nor B is planar A is planar and B is not B is planar and A is not
asked
Jul 13, 2016
in
Graph Theory
by
jothee
Veteran
(
104k
points)

791
views
ugcnetdec2012iii
graphtheory
graphplanarity
+1
vote
2
answers
24
UGCNETDec2012III44
The Default Parameter Passing Mechanism is called as Call by Value Call by Reference Call by Address Call by Name
asked
Jul 13, 2016
in
Programming and DS
by
jothee
Veteran
(
104k
points)

1.7k
views
ugcnetdec2012iii
programminginc
parameterpassing
+3
votes
2
answers
25
UGCNETDec2012III42
The grammar ‘GI’ $S \rightarrow OSO \mid ISI \mid 0 \mid 1 \mid \in$ and the grammar G2 is $ S \rightarrow as \mid asb \mid X, X \rightarrow Xa \mid a$. Which is the correct statement? G1 is ambiguous, G2 is unambiguous G1 is unambiguous, G2 is ambiguous Both G1 and G2 are ambiguous Both G1 and G2 are unambiguous
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
104k
points)

751
views
ugcnetdec2012iii
theoryofcomputation
grammar
+2
votes
2
answers
26
UGCNETDec2012III40
Which of the following operating system is better for implementing clientserver network? Windows 95 Windows 98 Windows 2000 All of these
asked
Jul 13, 2016
in
Operating System
by
jothee
Veteran
(
104k
points)

621
views
ugcnetdec2012iii
operatingsystem
computernetworks
nongate
+1
vote
4
answers
27
UGCNETDec2012III38
Which is not the correct statement? The class of regular sets is closed under homomorphisms The class of regular sets is not closed under inverse homomorphisms The class of regular sets is closed under quotient The class of regular sets is closed under substitution
asked
Jul 13, 2016
in
Theory of Computation
by
jothee
Veteran
(
104k
points)

609
views
ugcnetdec2012iii
theoryofcomputation
closureproperty
+1
vote
2
answers
28
UGCNETDec2012III37
Everything below the system call interface and above the physical hardware is known as Kernel Bus Shell Stub
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
104k
points)

691
views
ugcnetdec2012iii
unix
+1
vote
2
answers
29
UGCNETDec2012III35
In Win32, which function is used to create Windows Applications? Win APP Win API Win Main Win Void
asked
Jul 13, 2016
in
Others
by
jothee
Veteran
(
104k
points)

879
views
ugcnetdec2012iii
applicationsinwindows
0
votes
2
answers
30
UGCNETDec2012III34
The power set of AUB, where A={2, 3, 5, 7} and B={2, 5, 8, 9}is 256 64 16 4
asked
Jul 12, 2016
in
Discrete Mathematics
by
jothee
Veteran
(
104k
points)

912
views
ugcnetdec2012iii
engineeringmathematics
discretemathematics
sets
Page:
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
IIITH: Winter Research Admissions 2019 (For Spring 2020)
TIFR and JEST exam
Minimal Deterministic Finite Automata
To be aware of fake GATE test series
Standard Book Exercise Questions for Computer Science
Follow @csegate
Recent questions tagged ugcnetdec2012iii
Recent Blog Comments
Favorite is not working for blogs.. In favorites...
Favourite option does work. But list options...
Blog favorite button doesnt work?
@Arjun Sir can we have an option to save such...
Thanks Sir
50,666
questions
56,163
answers
193,778
comments
93,864
users