The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
GATE Overflow
Facebook Login
Google Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
All Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions.
Recent questions tagged ugcnetdec2014iii
UGC NET December 2014 Paper 3, Computer Applications
+4
votes
2
answers
1
UGCNETDec2014III75
Which of the following computing models is not an example of distributed computing environment ? Cloud computing Parallel computing Cluster computing Peertopeer computing
asked
Aug 2, 2016
in
Distributed Computing
by
makhdoom ghaya
Veteran
(
47.9k
points)

494
views
ugcnetdec2014iii
distributedcomputing
computingmodels
+4
votes
2
answers
2
UGCNETDec2014III74
A Trojan horse is A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security ... computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes All of the above
asked
Aug 2, 2016
in
Web Technologies
by
makhdoom ghaya
Veteran
(
47.9k
points)

293
views
ugcnetdec2014iii
virus
trojanhorse
+2
votes
1
answer
3
UGCNETDec2014III73
Which of the following versions of Windows $O.S$. contain builtin partition manager which allows us to shrink and expand predefined drives ? Windows Vista Windows $2000$ Windows NT Windows $98$
asked
Aug 2, 2016
in
Operating System
by
makhdoom ghaya
Veteran
(
47.9k
points)

263
views
ugcnetdec2014iii
operatingsystem
windows
+3
votes
1
answer
4
UGCNETDec2014III72 Artifical intelligence
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Veteran
(
47.9k
points)

176
views
ugcnetdec2014iii
artificialintelligence
machinelearning
+4
votes
1
answer
5
UGCNETDec2014III71 fuzzy sets
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Veteran
(
47.9k
points)

248
views
ugcnetdec2014iii
fuzzysets
+3
votes
1
answer
6
UGCNETDec2014III70
Consider the following statements about a perception : $I$. Feature detector can be any function of the input parameters. $II$. Learning procedure only adjusts the connection weights to the output layer. Identify the correct statement out of the following : ... true and $II$ is false. $ I$ is false and $II$ is true. $I$ is true and $II$ is true.
asked
Aug 2, 2016
in
Knowledge Representation
by
makhdoom ghaya
Veteran
(
47.9k
points)

261
views
ugcnetdec2014iii
neuralnetwork
perceptron
+3
votes
1
answer
7
UGCNETDec2014III69
Five men are available to do five different jobs. From past records, the time (in hours) that each man takes to do each job is known and is given in the following table : Find out the minimum time required to complete all the jobs. $5$ $11$ $13$ $15$
asked
Aug 2, 2016
in
Numerical Methods
by
makhdoom ghaya
Veteran
(
47.9k
points)

894
views
ugcnetdec2014iii
assignmentproblem
hungarianmethod
+4
votes
1
answer
8
UGCNETDec2014III68
The occurrence of degeneracy while solving a transportation problem means that Total supply equals total demand Total supply does not equal total demand The solution so obtained is not feasible None of these
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Veteran
(
47.9k
points)

256
views
ugcnetdec2014iii
operationalresearch
transportationproblem
+1
vote
1
answer
9
UGCNETDec2014III67
If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is Optimum Infeasible Unbounded Degenerate
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Veteran
(
47.9k
points)

467
views
ugcnetdec2014iii
linearprogramming
simplexmethod
+2
votes
1
answer
10
UGCNETDec2014III66
A Butterworth lowpass filter of order $n$, with a cutoff frequency at distance $D_{0}$ from the origin, has the transfer function $H(u, v)$ given by $\frac{1}{1+\left[\frac{D(u, v)}{D_{0}}\right]^{2n}}$ $\frac{1}{1+\left[\frac{D(u, v)}{D_{0}}\right]^{n ... left[\frac{D_{0}}{D(u, v)}\right]^{2n}}$ $\frac{1}{1+\left[\frac{D_{0}}{D(u, v)}\right]^{n}}$
asked
Aug 2, 2016
in
Digital Signal Processing
by
makhdoom ghaya
Veteran
(
47.9k
points)

222
views
ugcnetdec2014iii
digitalimageprocessing
butterworthlowpassfilter
+1
vote
0
answers
11
UGCNETDec2014III65
Given a simple image of size $10 \times 10$ whose histogram models the symbol probabilities and is given by $P_{1}$ $P_{2}$ $P_{3}$ $P_{4}$ a b c d The first order estimate of image entropy is maximum when $a = 0, b = 0, c = 0, d = 1$ $a=\frac{1}{2}, b=\frac{1 ... {3}, c=\frac{1}{3}, d=0$ $a=\frac{1}{4}, b=\frac{1}{4}, c=\frac{1}{4}, d=\frac{1}{4}$
asked
Aug 2, 2016
in
Digital Image Processing
by
makhdoom ghaya
Veteran
(
47.9k
points)

432
views
ugcnetdec2014iii
imageprocessing
entropy
+3
votes
1
answer
12
UGCNETDec2014III64
Given two spatial masks $S_{1}= \begin{bmatrix} 0&1&0 \\ 1&4&0 \\ 0&1&0 \end{bmatrix}$ $S_{2} = \begin{bmatrix} 1&1&1 \\ 1&8&1 \\ 1&1&1 \end{bmatrix}$ The Laplacian of an image at all ... following can be used as the spatial mask ? only $S_{1}$ only $S_{2}$ Both $S_{1}$ and $S_{2}$ None of these
asked
Aug 2, 2016
in
Digital Signal Processing
by
makhdoom ghaya
Veteran
(
47.9k
points)

462
views
ugcnetdec2014iii
imageprocessing
spatialmask
0
votes
1
answer
13
UGCNETDec2014III63
According to pumping lemma for context free languages : Let $L$ be an infinite context free language, then there exists some positive integer m such that any $w \in L$ with $ w  \geq m$ can be decomposed as $w = u v x y z$ With $ vxy  \leq m$ such ...  \geq 1$, such that $uv^{i}xy^{i} z\in L$ for all $i = 0, 1, 2, …….$
asked
Aug 2, 2016
in
Theory of Computation
by
makhdoom ghaya
Veteran
(
47.9k
points)

240
views
ugcnetdec2014iii
theoryofcomputation
+3
votes
1
answer
14
UGCNETDec2014III62
Match the following : LISTI LISTII a. Context free grammar i. Linear bounded automaton b. Regular grammar ii. Pushdown automaton c. Context sensitive grammar iii. Turing machine d. Unrestricted grammar iv. Deterministic finite automaton Codes : a b c d ii iv iii i ii iv i iii iv i ii iii i iv iii ii
asked
Aug 1, 2016
in
Theory of Computation
by
makhdoom ghaya
Veteran
(
47.9k
points)

168
views
ugcnetdec2014iii
theoryofcomputation
grammars
+3
votes
1
answer
15
UGCNETDec2014III61
Given the recursively enumerable language $(L_{RE})$, the context sensitive language $(L_{CS})$, the recursive language $(L_{REC})$, the context free language $(L_{CF})$ and deterministic context free language $(L_{DCF})$. The relationship between ... L_{REC}$ $L_{DCF} \subseteq L_{CF} \subseteq L_{CS} \subseteq L_{REC} \subseteq L_{RE}$
asked
Aug 1, 2016
in
Theory of Computation
by
makhdoom ghaya
Veteran
(
47.9k
points)

243
views
ugcnetdec2014iii
languagesrelationships
+3
votes
2
answers
16
UGCNETDec2014III60
A computer based information system is needed : I. As it is difficult for administrative staff to process data. II. Due to rapid growth of information and communication technology. III. Due to growing size of organizations which need to process ... of the above statement(s) is/are true ? $I$ and $II $III$ and $IV$ $II$ and $III$ $II$ and $IV$
asked
Jul 30, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Veteran
(
47.9k
points)

183
views
ugcnetdec2014iii
informationsystem
+1
vote
1
answer
17
UGCNETDec2014III59
Match the following components of an expert system : LISTI LISTII a. I/O interface i. Accepts user's queries and responds to question through I/O interface b. Explanation module ii. Contains facts and rules about the domain c. Inference engine iii. Gives the user ... in a natural way Codes : a b c d i iii iv ii iv iii i ii i iii ii iv iv i iii ii
asked
Jul 30, 2016
in
Knowledge Representation
by
makhdoom ghaya
Veteran
(
47.9k
points)

254
views
ugcnetdec2014iii
artificialintelligence
expertsystem
0
votes
0
answers
18
UGCNETDec2014III58
Match the following : LISTI LISTII a. Script i. Directed graph with labelled nodes for graphical representation of knowledge b. Conceptual Dependencies ii. Knowledge about objects and events is stored in recordlike structures consisting of slots and slot values. c. ... scenes Codes : a b c d iv ii i iii iv iii ii i ii iii iv i i iii iv ii
asked
Jul 30, 2016
in
Knowledge Representation
by
makhdoom ghaya
Veteran
(
47.9k
points)

197
views
ugcnetdec2014iii
artificialintelligence
knowledgerepresentation
+2
votes
2
answers
19
UGCNETDec2014III57
The resolvent of the set of clauses $(A \vee B, \sim A \vee D, C \vee \sim B)$ is $A \vee​ B$ $C \vee​ D$ $A \vee​ C$ $A \vee​ D$
asked
Jul 30, 2016
in
Mathematical Logic
by
makhdoom ghaya
Veteran
(
47.9k
points)

384
views
ugcnetdec2014iii
mathematicallogic
+1
vote
1
answer
20
UGCNETDec2014III56
An $A^{*}$ algorithm is a heuristic search technique which Is like a depthfirst search where most promising child is selected for expansion Generates all successor nodes and computes an estimate of distance (cost) from start node ... (costs) from start node to all generated nodes and chooses shortest path for further expansion. None of the above
asked
Jul 30, 2016
in
Others
by
makhdoom ghaya
Veteran
(
47.9k
points)

241
views
ugcnetdec2014iii
artificialintelligence
search
a
+2
votes
2
answers
21
UGCNETDec2014III55
Equivalent logical expression for the Well Formed Formula $(WFF)$, $\sim(\forall x) F\left[x\right]$ is $\forall x (\sim F\left[x\right])$ $\sim (\exists x) F\left[x\right]$ $\exists x (\sim F\left[x\right])​$ $\forall x F\left[x\right]$
asked
Jul 30, 2016
in
Mathematical Logic
by
makhdoom ghaya
Veteran
(
47.9k
points)

333
views
ugcnetdec2014iii
mathematicallogic
+2
votes
1
answer
22
UGCNETDec2014III54
In a distributed computing environment, distributed shared memory is used which is Logical combination of virtual memories on the nodes. Logical combination of physical memories on the nodes. Logical combination of the secondary memories on all the nodes. All of the above
asked
Jul 30, 2016
in
Distributed Computing
by
makhdoom ghaya
Veteran
(
47.9k
points)

329
views
ugcnetdec2014iii
distributedcomputing
+2
votes
1
answer
23
UGCNETDec2014III52
An operating system has $13$ tape drives. There are three processes $P1, P2$ & $P3$. Maximum requirement of $P1$ is $11$ tape drives, $P2$ is $5$ tape drives and $P3$ is $8$ tape drives. Currently, $P1$ is allocated $6$ tape drives, ... drives. Which of the following sequences represent a safe state? $P2 P1 P3$ $P2 P3 P1$ $P1 P2 P3$ $P1 P3 P2$
asked
Jul 30, 2016
in
Operating System
by
makhdoom ghaya
Veteran
(
47.9k
points)

378
views
ugcnetdec2014iii
operatingsystem
deadlockpreventionavoidancedetection
+2
votes
1
answer
24
UGCNETDec2014III51
Consider an imaginary disk with $40$ cylinders. A request come to read a block on cylinder $11$. While the seek to cylinder $11$ is in progress, new requests come in for cylinders $1, 36, 16, 34, 9$ and $12$ in that order. The number of arm motions using shortest seek first algorithm is $111$ $112$ $60$ $61$
asked
Jul 30, 2016
in
Operating System
by
makhdoom ghaya
Veteran
(
47.9k
points)

574
views
ugcnetdec2014iii
operatingsystem
diskscheduling
+2
votes
2
answers
25
UGCNETDec2014III50
How many disk blocks are required to keep list of free disk blocks in a $16$ GB hard disk with $1$ kB block size using linked list of free disk blocks ? Assume that the disk block number is stored in $32$ bits. $1024$ blocks $16794$ blocks $20000$ blocks $1048576$ blocks
asked
Jul 29, 2016
in
Operating System
by
makhdoom ghaya
Veteran
(
47.9k
points)

877
views
ugcnetdec2014iii
operatingsystem
filesystem
+3
votes
3
answers
26
UGCNETDec2014III49
Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed : Magnetic tapes $\rightarrow$ magnetic disks $\rightarrow$ optical disks $\rightarrow$ electronic disks $\rightarrow$ ... $\rightarrow $ electronic disks $\rightarrow $ main memory $\rightarrow $ cache $\rightarrow $ registers
asked
Jul 29, 2016
in
Operating System
by
makhdoom ghaya
Veteran
(
47.9k
points)

370
views
ugcnetdec2014iii
storagedevices
accessingspeed
+1
vote
1
answer
27
UGCNETDec2014III48
Temporal cohesion means Coincidental cohesion Cohesion between temporary variables Cohesion between local variables Cohesion with respect to time
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Veteran
(
47.9k
points)

213
views
ugcnetdec2014iii
is&softwareengineering
cohesion
+2
votes
1
answer
28
UGCNETDec2014III47
$'FAN IN'$ of a component $A$ is defined as Count of the number of components that can call, or pass control, to a component $A$ Number of components related to component $A$ Number of components dependent on component $A$ None of the above
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Veteran
(
47.9k
points)

211
views
ugcnetdec2014iii
is&softwareengineering
fanin
+2
votes
1
answer
29
UGCNETDec2014III46
Maximum possible value of reliability is $100$ $10$ $1$ $0$
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Veteran
(
47.9k
points)

405
views
ugcnetdec2014iii
is&softwareengineering
softwarereliability
+2
votes
1
answer
30
UGCNETDec2014III45
Assume that the software team defines a project risk with $80$% probability of occurrence of risk in the following manner: Only $70$ percent of the software components scheduled for reuse will be integrated into the application and the remaining ... cost for each LOC as $14, then the risk exposure would be $25,200 $20,160 $17,640 $15,120
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Veteran
(
47.9k
points)

913
views
ugcnetdec2014iii
is&softwareengineering
riskexposure
Page:
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Applying to NUS
THANK U GO !!
need advice
A journey with GO from Air: 2494 to Air: 223
Thanks to GATE Overflow.
Follow @csegate
Gatecse
Recent questions tagged ugcnetdec2014iii
Recent Blog Comments
Congrats Bro :D
Thank You @gauravkc, @hacker16, @Sukannya ...
Congratulations Brother :) You've made it! ECE to ...
I am also thinking of applying to the same ...
34,215
questions
40,896
answers
116,103
comments
39,804
users