search
Log In

Recent questions tagged ugcnetdec2015iii

4 votes
1 answer
1
Consider a unit square centered at origin. The coordinates at the square are translated by a factor $\biggr( \dfrac{1}{2}, 1 \biggl)$ and rotated by an angle of $90^{\circ}$ ...
asked Aug 11, 2016 in Computer Graphics jothee 3.4k views
3 votes
1 answer
2
Which raster locations would be chosen by Bresenham's algorithm when scan converting a line from $(1,1)$ to $(8,5)$? $\begin{array}{|c|c|} \hline x & y \\ \hline 1 & 1 \\ 2 & 2 \\ 3 & 3 \\ 4 & 3 \\ 5 & 4 \\ 6 & 4 \\ 7 & 5 \\ 8 & 6 \\ \hline \end{array}$ ...
asked Aug 11, 2016 in Computer Graphics jothee 2.5k views
2 votes
1 answer
3
Which of the following steps is/are not required for analog to digital conversion? Sensing Conversion Amplification Conditioning Quantization a and b c and d a, b and e None of the above
asked Aug 11, 2016 in Computer Networks jothee 1.3k views
2 votes
1 answer
4
Which of the following is/are the principle components of a memory-tube display? Flooding gun Collector Phosphorus grains Ground a and b c only d only All of the above
asked Aug 11, 2016 in Computer Graphics jothee 1.9k views
2 votes
1 answer
5
A bell shaped membership function is specified by three parameters $(a,b,c)$ as follows: $\dfrac{1}{1+\bigg(\dfrac{x-c}{a} \bigg)^b} \\$ $\dfrac{1}{1+\bigg(\dfrac{x-c}{a} \bigg)^{2b}} \\$ $1+\bigg(\dfrac{x-c}{a}\bigg)^b \\$ $1+\bigg(\dfrac{x-c}{a} \bigg)^{2b}$
asked Aug 11, 2016 in Others jothee 913 views
1 vote
1 answer
6
Consider a standard additive model consisting of rules of the form of If $x$ is $A_i$ AND $y$ is $B_i$ THEN $z$ is $C_i$. Given crisp inputs $x=x_0, \: y=y_0$ the output of the model is $z=\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0) \mu_{C_i} (z)$ ... $z=\text{centroid } (\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0)$
asked Aug 11, 2016 in Others jothee 824 views
2 votes
1 answer
7
Consider the two class classification task that consists of the following points: Class $C_1: [-1, -1], [-1, 1], [1, -1]$ Class $C_2: [1,1]$ The decision boundary between the two classes $C_1$ and $C_2$ using single perception is given by: $x_1-x_2-0.5=0$ $-x_1-x_2-0.5=0$ $0.5(x_1+x_2)-1.5=0$ $x_1+x_2-0.5=0$
asked Aug 11, 2016 in Artificial Intelligence jothee 2.3k views
2 votes
2 answers
8
Consider the following three tables $R, S$ and $T.$ In this question, all the join operations are natural joins $(\bowtie )$. $(\pi )$ ... (a) (b) (c) (d)
asked Aug 11, 2016 in Databases jothee 2.1k views
1 vote
1 answer
9
The distributed system is a collection of _____(P)_____ and communication is achieved in disributed system by ____(Q)____, where (P) and (Q) are: Loosely coupled hardware on tightly coupled software and disk sharing, repspectively Tightly ... software on loosely coupled hardware and message passing, repspectively Loosely coupled software on tightly coupled hardware and file sharing, repspectively
asked Aug 11, 2016 in Distributed Computing jothee 1.2k views
2 votes
2 answers
10
Consider the following three SQL queries (Assume the data in the people table): Select Name from people where $\text{Age}>21$; Select Name from people where $\text{Height}>180$; Select Name from people where $(\text{Age}>21)$ or $(\text{Height}>180)$ ... in the result set respectively, then what is one possible number of rows returned by the SQL query $c$? $3$ $7$ $10$ $21$
asked Aug 11, 2016 in Databases jothee 1.8k views
2 votes
2 answers
11
Suppose ORACLE relation $R(A,B)$ currently has tuples $\{(1,2), (1,3), (3,4)\}$ and relation $S(B,C)$ currently has $\{(2,5), (4,6), (7,8)\}$.Consider the following two SQL queries SQ1 and SQ2: SQ1: Select * From R Full Join S On R.B=S.B; SQ2: ... SQL query SQ1 and the SQL query SQ2 are given by: $2$ and $6$ respectively $6$ and $2$ respectively $2$ and $4$ respectively $4$ and $2$ respectively
asked Aug 11, 2016 in Databases jothee 3.2k views
1 vote
1 answer
12
Which of the following statements regarding the features of the object-oriented approach to databases are true? The ability to develop more realistic models of the real world The ability to represent the world in a non-geometric way The ability to develop databases using natural language approaches The need ... location rather than state and behaviour a, b and c b, c and d a, d, and e c, d, and e
asked Aug 11, 2016 in Databases jothee 1.2k views
2 votes
2 answers
13
What will be the output of the following Unix command? $\text{\$rm chap0\[1-3\]}$ Remove file $\text{chap0[1-3]}$ Remove file $\text{chap01, chap02, chap03}$ Remove file $\text{chap \[1-3\]}$ None of the above
asked Aug 11, 2016 in Operating System jothee 1k views
2 votes
1 answer
14
In Unix, the command to enable execution permission for file "mylife" by all is_____ Chmod ugo $+$ X mylife Chmod a $+$ X mylife Chmod $+$ X mylife All of the above
asked Aug 11, 2016 in Operating System jothee 886 views
2 votes
1 answer
15
The character set used in Windows $2000$ operating system is $8$ bit ASCII Extended ASCII $16$ bit UNICODE $12$ bit UNICODE
asked Aug 11, 2016 in Operating System jothee 1.1k views
3 votes
1 answer
16
Consider the following transportation problem: The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel's Approximation method is $1450$ $1465$ $1480$ $1520$
asked Aug 11, 2016 in Optimization jothee 3k views
2 votes
1 answer
17
Consider the following conditions: The solution must be feasible, i.e. it must satisfy all the supply and demand constraints The number of positive allocations must be equal to $m+n-1$, where $m$ is the number of rows and $n$ is the number of columns All the positive allocations must be in independent ... solution if it satisfies: $a$ and $b$ only $a$ and $c$ only $b$ and $c$ only $a$, $b$ and $c$
asked Aug 11, 2016 in Optimization jothee 987 views
1 vote
1 answer
18
A basic feasible solution of a linear programming problem is said to be ______ if at least one of the basic variable is zero generate degenerate infeasible unbounded
asked Aug 11, 2016 in Optimization jothee 2k views
1 vote
1 answer
19
Blind image disconvolution is Combination of blur identification and image restoration Combination of segmentation and classification Combination of blur and non-blur image None of the above
asked Aug 11, 2016 in Digital Signal Processing jothee 684 views
3 votes
1 answer
20
Which of the following is not a lossy compression technique? JPEG MPEG FFT Arithmetic coding
asked Aug 11, 2016 in Computer Graphics jothee 1.6k views
2 votes
1 answer
21
Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has alphabet $X=\{0,1\}$ and associated probabilities ${\dfrac{1}{2}, \dfrac{1}{2}}$. The channel matrix is $\begin{pmatrix} 1-p & p \\ p & 1-p \end{pmatrix}$ wgere p is the transition probability. Then ... is given by: $1$ $-p \log(p)-(1-p) \log(1-p)$ $1+p \log(p)+(1-p) \log(1-p)$ $0$
asked Aug 11, 2016 in Digital Image Processing jothee 1.2k views
1 vote
1 answer
22
As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage: It has high level of flexibility It does not require cash up-front It is a business investment Little risk of obsolescence
asked Aug 11, 2016 in Others jothee 573 views
3 votes
2 answers
23
In constraint satisfaction problem, constraints can be stated as Arithmetic equations and inequalities that bind the values of variables Arithmetic equations and inequalities that does not bind any restriction over variables Arithmetic equations that impose restrictions over variables Arithmetic equations that discard constraints over the given variables
asked Aug 11, 2016 in Optimization jothee 796 views
3 votes
1 answer
24
Language model used in LISP is Functional programming Logic programming Object oriented programming All of the above
asked Aug 11, 2016 in Artificial Intelligence jothee 1k views
1 vote
1 answer
25
Reasoning strategies used in expert systems include Forward chaining, backward chaining and problem reduction Forward chaining, backward chaining and boundary mutation Forward chaining, backward chaining and back propagation Forward chaining, problem reduction and boundary mutation
asked Aug 11, 2016 in Data Mining and Warehousing jothee 1.2k views
1 vote
4 answers
26
In propositional logic, given $P$ and $P \rightarrow Q$, we can infer ________ $\sim Q$ $Q$ $P \wedge Q$ $\sim P \wedge Q$
asked Aug 11, 2016 in Mathematical Logic jothee 1.2k views
1 vote
1 answer
27
In Unix operating system, special files are used to buffer data received in its input from where a process reads provide a mechanism to map physical device to file names store list of file names plus pointers associated with i-nodes store information entered by a user application program or utility program
asked Aug 11, 2016 in Digital Logic jothee 928 views
2 votes
3 answers
28
Consider a system with twelve magnetic tape drives and three processes $P_1, P_2$ and $P_3$. process $P_1$ requires maximum ten tape drives, process $P_2$ may need as many as four tape drives and $P_3$ ... and process $P_3$ is holding three tape drives, At time $t_1$, system is in: safe state unsafe state deadlocked state starvation state
asked Aug 11, 2016 in Operating System jothee 3.6k views
2 votes
1 answer
29
Which of the following is/are correct with reference to Abstract class and interface? A class can inherit only one Abstract class but may inherit several interfaces An abstract class can provide complete and default code but an interface has no code a is true b is true Both a and b are true Neitehr a nor b are true
asked Aug 10, 2016 in Object Oriented Programming jothee 820 views
2 votes
1 answer
30
Which of the following statements are true with reference to the way of describing XML data? XML uses DTD to describe the data XML uses XSL to describe the data XML uses a description node to describe the data a only b only a and b a and c
asked Aug 10, 2016 in Web Technologies jothee 871 views
...