The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged ugcnetdec2014iii
UGC NET December 2014 Paper 3, Computer Applications
+3
votes
2
answers
1
UGCNETDec2014III44
To compute function points $(FP)$, the following relationship is used $FP$ = Count  total $\times (0.65 + 0.01 \times \sum(F_{i}))$ where $F_{i} (i = 1$ to $n$) are value adjustment factors $(VAF)$ based on $n$ questions. The value of $n$ is $12$ $14$ $16$ $18$
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
30.2k
points)

1.2k
views
ugcnetdec2014iii
is&softwareengineering
functionpoint
+2
votes
2
answers
2
UGCNETDec2014III43
Which one of the following is not a source code metric ? Halstead metric Function point metric Complexity metric Length metric
asked
Jul 29, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
30.2k
points)

803
views
ugcnetdec2014iii
is&softwareengineering
sourcecodemetric
+2
votes
1
answer
3
UGCNETDec2014III42
Which method is called first by an applet program ? start( ) run( ) init( ) begin( )
asked
Jul 28, 2016
in
Java
by
makhdoom ghaya
Boss
(
30.2k
points)

401
views
ugcnetdec2014iii
java
applet
+2
votes
1
answer
4
UGCNETDec2014III41
What is true about $UML$ stereotypes ? Stereotype is used for extending the $UML$ language. Stereotyped class must be abstract The stereotype indicates that the $UML$ element cannot be changed UML profiles can be stereotyped for backward compatibility
asked
Jul 28, 2016
in
IS&Software Engineering
by
makhdoom ghaya
Boss
(
30.2k
points)

473
views
ugcnetdec2014iii
objectorientedmodelling
uml
+1
vote
2
answers
5
UGCNETDec2014III40
The behaviour of the document elements in $XML$ can be defined by Using document object Registering appropriate event handlers Using element object All of the above
asked
Jul 28, 2016
in
Web Technologies
by
makhdoom ghaya
Boss
(
30.2k
points)

441
views
ugcnetdec2014iii
webtechnologies
xml
+1
vote
1
answer
6
UGCNETDec2014III39
Converting a primitive type data into its corresponding wrapper class object instance is called Boxing Wrapping Instantiation Autoboxing
asked
Jul 28, 2016
in
Java
by
makhdoom ghaya
Boss
(
30.2k
points)

625
views
ugcnetdec2014iii
java
wrapperclassobject
+1
vote
1
answer
7
UGCNETDec2014III38
How to express that some person keeps animals as pets?
asked
Jul 28, 2016
in
Databases
by
makhdoom ghaya
Boss
(
30.2k
points)

775
views
ugcnetdec2014iii
databases
erdiagram
+1
vote
2
answers
8
UGCNETDec2014III37
Which methods are utilized to control the access to an object in multithreaded programming ? Asynchronized methods Synchronized methods Serialized methods None of the above
asked
Jul 28, 2016
in
Java
by
makhdoom ghaya
Boss
(
30.2k
points)

955
views
ugcnetdec2014iii
java
multithreadedprogramming
+1
vote
2
answers
9
UGCNETDec2014III36
Suppose that we have numbers between $1$ and $1000$ in a binary search tree and we want to search for the number $365$. Which of the following sequences could not be the sequence of nodes examined ? $4, 254, 403, 400, 332, 346, 399, 365$ $926, 222, 913, 246, 900, 260, 364, 365$ $927, 204,913, 242, 914, 247, 365$ $4, 401, 389, 221, 268, 384, 383, 280, 365$
asked
Jul 28, 2016
in
Programming
by
makhdoom ghaya
Boss
(
30.2k
points)

560
views
ugcnetdec2014iii
datastructure
binarysearchtree
+1
vote
2
answers
10
UGCNETDec2014III35
Consider the problem of a chain $<A_{1}, A_{2}, A_{3}>$ of three matrices. Suppose that the dimensions of the matrices are $10 \times 100$, $100 \times 5$ and $5 \times 50$ respectively. There are two different ways of ... the product according to the first parenthesization is ______ times faster in comparison to the second parenthesization. $5$ $10$ $20$ $100$
asked
Jul 28, 2016
in
Algorithms
by
makhdoom ghaya
Boss
(
30.2k
points)

466
views
ugcnetdec2014iii
algorithms
matrixchainmultiplication
+1
vote
1
answer
11
UGCNETDec2014III34
Dijkstra algorithm, which solves the singlesource shortestpaths problem, is a _______, and the FloydWarshall algorithm, which finds shortest paths between all pairs of vertices, is a ________. Greedy algorithm, Divideconquer algorithm Divideconquer algorithm, Greedy algorithm Greedy algorithm, Dynamic programming algorithm Dynamic programming algorithm, Greedy algorithm
asked
Jul 28, 2016
in
Algorithms
by
makhdoom ghaya
Boss
(
30.2k
points)

965
views
ugcnetdec2014iii
algorithms
shortestpath
+1
vote
1
answer
12
UGCNETDec2014III33
We can show that the clique problem is $NP$hard by proving that CLIQUE $\leq$ P 3CNF_SAT CLIQUE $\leq$ P VERTEX_COVER CLIQUE $\leq$ P SUBSET_SUM None of the above
asked
Jul 28, 2016
in
Algorithms
by
makhdoom ghaya
Boss
(
30.2k
points)

1k
views
ugcnetdec2014iii
algorithms
pnpnpcnph
+1
vote
1
answer
13
UGCNETDec2014III32
Match the following : LISTI LISTII a. Bucket sort i. $O(n^{3}lgn)$ b. Matrix chain multiplication ii. $O(n^{3})$ c. Huffman codes iii. $O(nlgn)$ d. All pairs shortest paths iv. $O(n)$ Codes : a b c d iv ii i iii ii iv i iii iv ii iii i iii ii iv i
asked
Jul 28, 2016
in
Algorithms
by
makhdoom ghaya
Boss
(
30.2k
points)

573
views
ugcnetdec2014iii
algorithms
timecomplexity
+3
votes
2
answers
14
UGCNETDec2014III31
Any decision tree that sorts n elements has height $\Omega(n)$ $\Omega(\text{lg}n)$ $\Omega(n \text{lg} n)$ $\Omega(n^2)$
asked
Jul 28, 2016
in
Algorithms
by
makhdoom ghaya
Boss
(
30.2k
points)

665
views
ugcnetdec2014iii
algorithms
decisiontree
+1
vote
1
answer
15
UGCNETDec2014III30
Which one of the following is true for asymmetrickey cryptography ? Private key is kept by the receiver and public key is announced to the public. Public key is kept by the receiver and private key is announced to the public. Both private key and public key are kept by the receiver. Both private key and public key are announced to the public.
asked
Jul 28, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

789
views
ugcnetdec2014iii
computernetworks
asymmetrickeycryptography
+1
vote
1
answer
16
UGCNETDec2014III29
________ is a bitoriented protocol for communication over pointtopoint and multipoint links. Stopandwait HDLC Sliding window GobackN
asked
Jul 27, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

1.2k
views
ugcnetdec2014iii
computernetworks
bitorientedprotocol
+1
vote
2
answers
17
UGCNETDec2014III28
What is the propagation time if the distance between the two points is $48,000$ ? Assume the propagation speed to be $2.4 × 10^{8}$ metre/second in cable. $0.5$ ms $20$ ms $50$ ms $200$ ms
asked
Jul 27, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

1.6k
views
ugcnetdec2014iii
computernetworks
propagationtime
+1
vote
1
answer
18
UGCNETDec2014III27
Which of the following is not a field in $TCP$ header ? Sequence number Fragment offset Checksum Window size
asked
Jul 27, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)

760
views
ugcnetdec2014iii
computernetworks
tcpheader
+4
votes
1
answer
19
UGCNETDec2014III26
How many characters per second ($7$ bits + $1$ parity) can be transmitted over a $3200$ bps line if the transfer is asynchronous ? (Assuming $1$ start bit and $1$ stop bit) $300$ $320$ $360$ $400$
asked
Jul 27, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

1.7k
views
ugcnetdec2014iii
computernetworks
datatransmission
asynchronoustransmission
+1
vote
1
answer
20
UGCNETDec2014III25
For $n$ devices in a network, ________ number of duplexmode links are required for a mesh topology. $n(n + 1)$ $n (n – 1)$ $n(n + 1)/2$ $n(n – 1)/2$
asked
Jul 27, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

788
views
ugcnetdec2014iii
computernetworks
networktopologies
meshtopology
+1
vote
3
answers
21
UGCNETDec2014III23
Given two languages : $L_{1}=\left\{(ab)^{n} a^{k}  n > k, k \geq 0\right\}$ $L_{2}=\left\{a^{n}b^{m}  n \neq m\right\}$ Using pumping lemma for regular language, it can be shown that $L_{1}$ is regular and $L_{2}$ is not regular. $L_{1}$ is not regular and $L_{2}$ is regular. $L_{1}$ is regular and $L_{2}$ is regular. $L_{1}$ is not regular and $L_{2}$ is not regular.
asked
Jul 27, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

1.1k
views
ugcnetdec2014iii
theoryofcomputation
regularlanguages
+2
votes
2
answers
22
UGCNETDec2014III22
The pushdown automation $M=(\left\{q_{0}, q_{1}, q_{2}\right\}, \left\{a, b\right\}, \left\{0, 1\right\}, \delta, q_{0}, 0, \left\{q_{0}\right\})$ with $\delta (q_{0}, a, 0)= \left\{(q_{1}, 10)\right\}$ $\delta (q_{1}, a, 1)= \left\{(q_{1}, 11)\right\}$ ... $L=\left\{a^{n}b^{m}  n, m > 0\right\}$ $L=\left\{a^{n}b^{n}  n > 0\right\}$
asked
Jul 27, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

654
views
ugcnetdec2014iii
theoryofcomputation
pushdownautomata
+2
votes
1
answer
23
UGCNETDec2014III21
Which of the following statements is not true ? MPI_Isend and MPI_Irecv are nonblocking message passing routines of MPI. MPI_Issend and MPI_Ibsend are nonblocking message passing routines of MPI. MPI_Send and MPI_Recv are nonblocking message passing routines of MPI. MPI_Ssend and MPI_Bsend are blocking message passing routines of MPI.
asked
Jul 27, 2016
in
Others
by
makhdoom ghaya
Boss
(
30.2k
points)

485
views
ugcnetdec2014iii
+8
votes
1
answer
24
UGCNETDec2014III20
How many tokens will be generated by the scanner for the following statement ? $x = x ∗ (a + b)  5$; $12$ $11$ $10$ $07$
asked
Jul 25, 2016
in
Compiler Design
by
makhdoom ghaya
Boss
(
30.2k
points)

1.1k
views
ugcnetdec2014iii
compilerdesign
lexicalanalysis
+2
votes
3
answers
25
UGCNETDec2014III19
Consider the following statements $S1, S2$ and $S3$: $S1$: In callbyvalue, anything that is passed into a function call is unchanged in the caller's scope when the function returns. $S2$ ... and $S2$ are true. $S3$ and $S1$ are true. $S2$ and $S1$ are true. $S1, S2, S3$ are true.
asked
Jul 25, 2016
in
Compiler Design
by
makhdoom ghaya
Boss
(
30.2k
points)

668
views
ugcnetdec2014iii
compilerdesign
runtimeenvironments
parameterpassing
+2
votes
1
answer
26
UGCNETDec2014III18
Match the following : LISTI LISTII a. Cavalier Projection i. The direction of projection is chosen so that there is no foreshortening of lines perpendicular to the $xy$ plane b. Cabinet Projection ii. The direction of projection is chosen so that lines perpendicular to the $xy$ planes are ... to the view plane. Codes : a b c d i iii iv ii ii iii i iv iv ii iii i i ii iii iv
asked
Jul 25, 2016
in
Computer Graphics
by
makhdoom ghaya
Boss
(
30.2k
points)

700
views
ugcnetdec2014iii
graphics
projection
nongate
+1
vote
2
answers
27
UGCNETDec2014III17
In CyrusBeck algorithm for line clipping the value of $t$ parameter is computed by the relation: (Here $P_{1}$ and $P_{2}$ are the two end points of the line, $f$ is a point on the boundary, $n_{1}$ is inner normal). $\frac{(P_{1}f_{i}).n_{i}}{(P_{2}P_{1}).n_{i}}$ ... $\frac{(f_{i}P_{2}).n_{i}}{(P_{1}P_{2}).n_{i}}$
asked
Jul 25, 2016
in
Computer Graphics
by
makhdoom ghaya
Boss
(
30.2k
points)

764
views
ugcnetdec2014iii
nongate
graphics
lineclipping
+2
votes
2
answers
28
UGCNETDec2014III16
Consider a triangle represented by $A(0, 0), B(1, 1), C(5, 2)$. The triangle is rotated by $45$ degrees about a point $P(1, 1)$ ...
asked
Jul 25, 2016
in
Geometry
by
makhdoom ghaya
Boss
(
30.2k
points)

660
views
ugcnetdec2014iii
geometry
nongate
+2
votes
1
answer
29
UGCNETDec2014III15
A technique used to approximate halftones without reducing spatial resolution is known as________. Halftoning Dithering Error diffusion None of the above
asked
Jul 25, 2016
in
Computer Graphics
by
makhdoom ghaya
Boss
(
30.2k
points)

822
views
ugcnetdec2014iii
graphics
nongate
+2
votes
1
answer
30
UGCNETDec2014III14
Match the following : LISTI LISTII a. Tablet, Joystick i. Continuous devices b. Light Pen, Touch Screen ii. Direct devices c. Locator, Keyboard iii. Logical devices d. Data Globe, Sonic Pen iv. 3D interaction devices Codes : a b c d ii i iv iii i iv iii ii i ii iii iv iv iii ii i
asked
Jul 25, 2016
in
Computer Peripherals
by
makhdoom ghaya
Boss
(
30.2k
points)

690
views
ugcnetdec2014iii
nongate
computerperipherals
iodevices
Page:
« prev
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
ECIL Interview Experience
Linear Algebra Important Points
GATE 2020
OFFICIAL GATE MOCK TEST RELEASED
IIITH: Winter Research Admissions 2019 (For Spring 2020)
Follow @csegate
Recent questions tagged ugcnetdec2014iii
Recent Blog Comments
Not really. It was excluding shipping I guess....
Ok sir. Actually pricing on Flipkart is 200 less...
NO.
Is this application open for 2020 graduates i.e....
@Ayush Upadhyaya sir any approximate idea...
50,645
questions
56,615
answers
195,894
comments
102,332
users