The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
GATE Overflow
Facebook Login
Google Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
All Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions. For hardcopy of previous year questions please see
here
Recent questions tagged ugcnetdec2014iii
UGC NET December 2014 Paper 3, Computer Applications
+4
votes
2
answers
1
UGCNETDec2014III75
Which of the following computing models is not an example of distributed computing environment ? Cloud computing Parallel computing Cluster computing Peertopeer computing
asked
Aug 2, 2016
in
Distributed Computing
by
makhdoom ghaya
Boss
(
40.2k
points)

769
views
ugcnetdec2014iii
distributedcomputing
computingmodels
+4
votes
2
answers
2
UGCNETDec2014III74
A Trojan horse is A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation. A ... to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes All of the above
asked
Aug 2, 2016
in
Web Technologies
by
makhdoom ghaya
Boss
(
40.2k
points)

444
views
ugcnetdec2014iii
virus
trojanhorse
+2
votes
1
answer
3
UGCNETDec2014III73
Which of the following versions of Windows $O.S$. contain builtin partition manager which allows us to shrink and expand predefined drives ? Windows Vista Windows $2000$ Windows NT Windows $98$
asked
Aug 2, 2016
in
Operating System
by
makhdoom ghaya
Boss
(
40.2k
points)

394
views
ugcnetdec2014iii
operatingsystem
windows
+3
votes
1
answer
4
UGCNETDec2014III72 Artifical intelligence
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Boss
(
40.2k
points)

322
views
ugcnetdec2014iii
artificialintelligence
machinelearning
+4
votes
1
answer
5
UGCNETDec2014III71 fuzzy sets
A ________ point of a fuzzy set $A$ is a point $x \in X$ at which $\mu_{A} (x) = 0.5$ Core Support Crossover $\alpha$cut
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Boss
(
40.2k
points)

525
views
ugcnetdec2014iii
fuzzysets
+3
votes
1
answer
6
UGCNETDec2014III70
Consider the following statements about a perception : $I$. Feature detector can be any function of the input parameters. $II$. Learning procedure only adjusts the connection weights to the output layer. Identify the correct statement out of the following : $I$ is false and $II$ ... $I$ is true and $II$ is false. $ I$ is false and $II$ is true. $I$ is true and $II$ is true.
asked
Aug 2, 2016
in
Knowledge Representation
by
makhdoom ghaya
Boss
(
40.2k
points)

440
views
ugcnetdec2014iii
neuralnetwork
perceptron
+3
votes
1
answer
7
UGCNETDec2014III69
Five men are available to do five different jobs. From past records, the time (in hours) that each man takes to do each job is known and is given in the following table : Find out the minimum time required to complete all the jobs. $5$ $11$ $13$ $15$
asked
Aug 2, 2016
in
Numerical Methods
by
makhdoom ghaya
Boss
(
40.2k
points)

1.5k
views
ugcnetdec2014iii
assignmentproblem
hungarianmethod
+4
votes
1
answer
8
UGCNETDec2014III68
The occurrence of degeneracy while solving a transportation problem means that Total supply equals total demand Total supply does not equal total demand The solution so obtained is not feasible None of these
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Boss
(
40.2k
points)

528
views
ugcnetdec2014iii
operationalresearch
transportationproblem
+1
vote
1
answer
9
UGCNETDec2014III67
If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is Optimum Infeasible Unbounded Degenerate
asked
Aug 2, 2016
in
Others
by
makhdoom ghaya
Boss
(
40.2k
points)

714
views
ugcnetdec2014iii
linearprogramming
simplexmethod
+2
votes
1
answer
10
UGCNETDec2014III66
A Butterworth lowpass filter of order $n$, with a cutoff frequency at distance $D_{0}$ from the origin, has the transfer function $H(u, v)$ given by $\frac{1}{1+\left[\frac{D(u, v)}{D_{0}}\right]^{2n}}$ $\frac{1}{1+\left[\frac{D(u, v)}{D_{0}}\right]^{n}}$ $\frac{1}{1+\left[\frac{D_{0}}{D(u, v)}\right]^{2n}}$ $\frac{1}{1+\left[\frac{D_{0}}{D(u, v)}\right]^{n}}$
asked
Aug 2, 2016
in
Digital Signal Processing
by
makhdoom ghaya
Boss
(
40.2k
points)

381
views
ugcnetdec2014iii
digitalimageprocessing
butterworthlowpassfilter
+1
vote
0
answers
11
UGCNETDec2014III65
Given a simple image of size $10 \times 10$ whose histogram models the symbol probabilities and is given by $P_{1}$ $P_{2}$ $P_{3}$ $P_{4}$ a b c d The first order estimate of image entropy is maximum when $a = 0, b = 0, c = 0, d = 1$ $a=\frac{1}{2}, b=\frac{1}{2}, c=0, d=0$ $a ... b=\frac{1}{3}, c=\frac{1}{3}, d=0$ $a=\frac{1}{4}, b=\frac{1}{4}, c=\frac{1}{4}, d=\frac{1}{4}$
asked
Aug 2, 2016
in
Digital Image Processing
by
makhdoom ghaya
Boss
(
40.2k
points)

760
views
ugcnetdec2014iii
imageprocessing
entropy
+3
votes
1
answer
12
UGCNETDec2014III64
Given two spatial masks $S_{1}= \begin{bmatrix} 0&1&0 \\ 1&4&0 \\ 0&1&0 \end{bmatrix}$ $S_{2} = \begin{bmatrix} 1&1&1 \\ 1&8&1 \\ 1&1&1 \end{bmatrix}$ The Laplacian of an image at all points $(x, y)$ can ... Which of the following can be used as the spatial mask ? only $S_{1}$ only $S_{2}$ Both $S_{1}$ and $S_{2}$ None of these
asked
Aug 2, 2016
in
Digital Signal Processing
by
makhdoom ghaya
Boss
(
40.2k
points)

776
views
ugcnetdec2014iii
imageprocessing
spatialmask
0
votes
1
answer
13
UGCNETDec2014III63
According to pumping lemma for context free languages : Let $L$ be an infinite context free language, then there exists some positive integer m such that any $w \in L$ with $ w  \geq m$ can be decomposed as $w = u v x y z$ With $ vxy  \leq m$ such that $uv^{i}xy^{i} z ... and $ vy  \geq 1$, such that $uv^{i}xy^{i} z\in L$ for all $i = 0, 1, 2, …….$
asked
Aug 2, 2016
in
Theory of Computation
by
makhdoom ghaya
Boss
(
40.2k
points)

431
views
ugcnetdec2014iii
theoryofcomputation
+3
votes
1
answer
14
UGCNETDec2014III62
Match the following : LISTI LISTII a. Context free grammar i. Linear bounded automaton b. Regular grammar ii. Pushdown automaton c. Context sensitive grammar iii. Turing machine d. Unrestricted grammar iv. Deterministic finite automaton Codes : a b c d ii iv iii i ii iv i iii iv i ii iii i iv iii ii
asked
Aug 1, 2016
in
Theory of Computation
by
makhdoom ghaya
Boss
(
40.2k
points)

247
views
ugcnetdec2014iii
theoryofcomputation
grammars
+3
votes
1
answer
15
UGCNETDec2014III61
Given the recursively enumerable language $(L_{RE})$, the context sensitive language $(L_{CS})$, the recursive language $(L_{REC})$, the context free language $(L_{CF})$ and deterministic context free language $(L_{DCF})$. The relationship between these families is given ... \subseteq L_{REC}$ $L_{DCF} \subseteq L_{CF} \subseteq L_{CS} \subseteq L_{REC} \subseteq L_{RE}$
asked
Aug 1, 2016
in
Theory of Computation
by
makhdoom ghaya
Boss
(
40.2k
points)

412
views
ugcnetdec2014iii
languagesrelationships
+3
votes
2
answers
16
UGCNETDec2014III60
A computer based information system is needed : I. As it is difficult for administrative staff to process data. II. Due to rapid growth of information and communication technology. III. Due to growing size of organizations which need to process large volume of data. ... taken. Which of the above statement(s) is/are true ? $I$ and $II $III$ and $IV$ $II$ and $III$ $II$ and $IV$
asked
Jul 30, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
40.2k
points)

278
views
ugcnetdec2014iii
informationsystem
+1
vote
1
answer
17
UGCNETDec2014III59
Match the following components of an expert system : LISTI LISTII a. I/O interface i. Accepts user's queries and responds to question through I/O interface b. Explanation module ii. Contains facts and rules about the domain c. Inference engine iii. Gives the user, the ability to ... the system in a natural way Codes : a b c d i iii iv ii iv iii i ii i iii ii iv iv i iii ii
asked
Jul 30, 2016
in
Knowledge Representation
by
makhdoom ghaya
Boss
(
40.2k
points)

446
views
ugcnetdec2014iii
artificialintelligence
expertsystem
0
votes
1
answer
18
UGCNETDec2014III58
Match the following : LISTI LISTII a. Script i. Directed graph with labelled nodes for graphical representation of knowledge b. Conceptual Dependencies ii. Knowledge about objects and events is stored in recordlike structures consisting of slots and slot values. c. Frames iii. Primitive ... props and scenes Codes : a b c d iv ii i iii iv iii ii i ii iii iv i i iii iv ii
asked
Jul 30, 2016
in
Knowledge Representation
by
makhdoom ghaya
Boss
(
40.2k
points)

383
views
ugcnetdec2014iii
artificialintelligence
knowledgerepresentation
+2
votes
3
answers
19
UGCNETDec2014III57
The resolvent of the set of clauses $(A \vee B, \sim A \vee D, C \vee \sim B)$ is $A \vee​ B$ $C \vee​ D$ $A \vee​ C$ $A \vee​ D$
asked
Jul 30, 2016
in
Mathematical Logic
by
makhdoom ghaya
Boss
(
40.2k
points)

699
views
ugcnetdec2014iii
mathematicallogic
+2
votes
2
answers
20
UGCNETDec2014III56
An $A^{*}$ algorithm is a heuristic search technique which Is like a depthfirst search where most promising child is selected for expansion Generates all successor nodes and computes an estimate of distance (cost) from start node to a goal node ... path lengths (costs) from start node to all generated nodes and chooses shortest path for further expansion. None of the above
asked
Jul 30, 2016
in
Others
by
makhdoom ghaya
Boss
(
40.2k
points)

392
views
ugcnetdec2014iii
artificialintelligence
search
a
+2
votes
3
answers
21
UGCNETDec2014III55
Equivalent logical expression for the Well Formed Formula $(WFF)$, $\sim(\forall x) F\left[x\right]$ is $\forall x (\sim F\left[x\right])$ $\sim (\exists x) F\left[x\right]$ $\exists x (\sim F\left[x\right])​$ $\forall x F\left[x\right]$
asked
Jul 30, 2016
in
Mathematical Logic
by
makhdoom ghaya
Boss
(
40.2k
points)

488
views
ugcnetdec2014iii
mathematicallogic
+2
votes
1
answer
22
UGCNETDec2014III54
In a distributed computing environment, distributed shared memory is used which is Logical combination of virtual memories on the nodes. Logical combination of physical memories on the nodes. Logical combination of the secondary memories on all the nodes. All of the above
asked
Jul 30, 2016
in
Distributed Computing
by
makhdoom ghaya
Boss
(
40.2k
points)

533
views
ugcnetdec2014iii
distributedcomputing
+2
votes
1
answer
23
UGCNETDec2014III52
An operating system has $13$ tape drives. There are three processes $P1, P2$ & $P3$. Maximum requirement of $P1$ is $11$ tape drives, $P2$ is $5$ tape drives and $P3$ is $8$ tape drives. Currently, $P1$ is allocated $6$ tape drives, $P2$ is allocated $3$ ... tape drives. Which of the following sequences represent a safe state? $P2 P1 P3$ $P2 P3 P1$ $P1 P2 P3$ $P1 P3 P2$
asked
Jul 30, 2016
in
Operating System
by
makhdoom ghaya
Boss
(
40.2k
points)

691
views
ugcnetdec2014iii
operatingsystem
deadlockpreventionavoidancedetection
+2
votes
1
answer
24
UGCNETDec2014III51
Consider an imaginary disk with $40$ cylinders. A request come to read a block on cylinder $11$. While the seek to cylinder $11$ is in progress, new requests come in for cylinders $1, 36, 16, 34, 9$ and $12$ in that order. The number of arm motions using shortest seek first algorithm is $111$ $112$ $60$ $61$
asked
Jul 30, 2016
in
Operating System
by
makhdoom ghaya
Boss
(
40.2k
points)

1k
views
ugcnetdec2014iii
operatingsystem
diskscheduling
+2
votes
2
answers
25
UGCNETDec2014III50
How many disk blocks are required to keep list of free disk blocks in a $16$ GB hard disk with $1$ kB block size using linked list of free disk blocks ? Assume that the disk block number is stored in $32$ bits. $1024$ blocks $16794$ blocks $20000$ blocks $1048576$ blocks
asked
Jul 29, 2016
in
Operating System
by
makhdoom ghaya
Boss
(
40.2k
points)

1.5k
views
ugcnetdec2014iii
operatingsystem
filesystem
+3
votes
3
answers
26
UGCNETDec2014III49
Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed : Magnetic tapes $\rightarrow$ magnetic disks $\rightarrow$ optical disks $\rightarrow$ electronic disks $\rightarrow$ main memory $\ ... magnetic disks $\rightarrow $ electronic disks $\rightarrow $ main memory $\rightarrow $ cache $\rightarrow $ registers
asked
Jul 29, 2016
in
Operating System
by
makhdoom ghaya
Boss
(
40.2k
points)

658
views
ugcnetdec2014iii
storagedevices
accessingspeed
+1
vote
1
answer
27
UGCNETDec2014III48
Temporal cohesion means Coincidental cohesion Cohesion between temporary variables Cohesion between local variables Cohesion with respect to time
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
40.2k
points)

396
views
ugcnetdec2014iii
is&softwareengineering
cohesion
+2
votes
1
answer
28
UGCNETDec2014III47
$'FAN IN'$ of a component $A$ is defined as Count of the number of components that can call, or pass control, to a component $A$ Number of components related to component $A$ Number of components dependent on component $A$ None of the above
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
40.2k
points)

339
views
ugcnetdec2014iii
is&softwareengineering
fanin
+2
votes
1
answer
29
UGCNETDec2014III46
Maximum possible value of reliability is $100$ $10$ $1$ $0$
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
40.2k
points)

665
views
ugcnetdec2014iii
is&softwareengineering
softwarereliability
+2
votes
1
answer
30
UGCNETDec2014III45
Assume that the software team defines a project risk with $80$% probability of occurrence of risk in the following manner: Only $70$ percent of the software components scheduled for reuse will be integrated into the application and the remaining functionality will have to ... engineering cost for each LOC as $14, then the risk exposure would be $25,200 $20,160 $17,640 $15,120
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
40.2k
points)

1.7k
views
ugcnetdec2014iii
is&softwareengineering
riskexposure
Page:
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
kvs pgt
Algorithms GO Classroom
Programming and DS GO Classroom
Discrete Mathematics GO Classroom
Digital Logic GO Classroom
Follow @csegate
Gatecse
Recent questions tagged ugcnetdec2014iii
Recent Blog Comments
b.tech passout are eligible to fill this form . ?
I have orderd it on 14 september 2018. Still i...
@Balaji 1.c) is undecidable, r u sure about it?
yes sir TRUE... working on it :). But this...
Second attempt doesnt mean you are strong in...
39,541
questions
46,682
answers
139,869
comments
57,687
users