# Recent questions tagged ugcnetdec2015iii 1
Consider a unit square centered at origin. The coordinates at the square are translated by a factor $\biggr( \dfrac{1}{2}, 1 \biggl)$ and rotated by an angle of $90^{\circ}$ ...
2
Which raster locations would be chosen by Bresenham's algorithm when scan converting a line from $(1,1)$ to $(8,5)$? $\begin{array}{|c|c|} \hline x & y \\ \hline 1 & 1 \\ 2 & 2 \\ 3 & 3 \\ 4 & 3 \\ 5 & 4 \\ 6 & 4 \\ 7 & 5 \\ 8 & 6 \\ \hline \end{array}$ ...
3
Which of the following steps is/are not required for analog to digital conversion? Sensing Conversion Amplification Conditioning Quantization a and b c and d a, b and e None of the above
4
Which of the following is/are the principle components of a memory-tube display? Flooding gun Collector Phosphorus grains Ground a and b c only d only All of the above
5
A bell shaped membership function is specified by three parameters $(a,b,c)$ as follows: $\dfrac{1}{1+\bigg(\dfrac{x-c}{a} \bigg)^b} \\$ $\dfrac{1}{1+\bigg(\dfrac{x-c}{a} \bigg)^{2b}} \\$ $1+\bigg(\dfrac{x-c}{a}\bigg)^b \\$ $1+\bigg(\dfrac{x-c}{a} \bigg)^{2b}$
1 vote
6
Consider a standard additive model consisting of rules of the form of If $x$ is $A_i$ AND $y$ is $B_i$ THEN $z$ is $C_i$. Given crisp inputs $x=x_0, \: y=y_0$ the output of the model is $z=\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0) \mu_{C_i} (z)$ ... $z=\text{centroid } (\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0)$
7
Consider the two class classification task that consists of the following points: Class $C_1: [-1, -1], [-1, 1], [1, -1]$ Class $C_2: [1,1]$ The decision boundary between the two classes $C_1$ and $C_2$ using single perception is given by: $x_1-x_2-0.5=0$ $-x_1-x_2-0.5=0$ $0.5(x_1+x_2)-1.5=0$ $x_1+x_2-0.5=0$
8
Consider the following three tables $R, S$ and $T.$ In this question, all the join operations are natural joins $(\bowtie )$. $(\pi )$ ... (a) (b) (c) (d)
1 vote
9
The distributed system is a collection of _____(P)_____ and communication is achieved in disributed system by ____(Q)____, where (P) and (Q) are: Loosely coupled hardware on tightly coupled software and disk sharing, repspectively Tightly ... software on loosely coupled hardware and message passing, repspectively Loosely coupled software on tightly coupled hardware and file sharing, repspectively
10
Consider the following three SQL queries (Assume the data in the people table): Select Name from people where $\text{Age}>21$; Select Name from people where $\text{Height}>180$; Select Name from people where $(\text{Age}>21)$ or $(\text{Height}>180)$ ... in the result set respectively, then what is one possible number of rows returned by the SQL query $c$? $3$ $7$ $10$ $21$
11
Suppose ORACLE relation $R(A,B)$ currently has tuples $\{(1,2), (1,3), (3,4)\}$ and relation $S(B,C)$ currently has $\{(2,5), (4,6), (7,8)\}$.Consider the following two SQL queries SQ1 and SQ2: SQ1: Select * From R Full Join S On R.B=S.B; SQ2: ... SQL query SQ1 and the SQL query SQ2 are given by: $2$ and $6$ respectively $6$ and $2$ respectively $2$ and $4$ respectively $4$ and $2$ respectively
1 vote
12
Which of the following statements regarding the features of the object-oriented approach to databases are true? The ability to develop more realistic models of the real world The ability to represent the world in a non-geometric way The ability to develop databases using natural language approaches The need ... location rather than state and behaviour a, b and c b, c and d a, d, and e c, d, and e
What will be the output of the following Unix command? $\text{\$rm chap0$1-3$}$Remove file$\text{chap0[1-3]}$Remove file$\text{chap01, chap02, chap03}$Remove file$\text{chap $1-3$}$None of the above 2 votes 1 answer 14 In Unix, the command to enable execution permission for file "mylife" by all is_____ Chmod ugo$+$X mylife Chmod a$+$X mylife Chmod$+$X mylife All of the above 2 votes 1 answer 15 The character set used in Windows$2000$operating system is$8$bit ASCII Extended ASCII$16$bit UNICODE$12$bit UNICODE 3 votes 1 answer 16 Consider the following transportation problem: The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel's Approximation method is$1450146514801520$2 votes 1 answer 17 Consider the following conditions: The solution must be feasible, i.e. it must satisfy all the supply and demand constraints The number of positive allocations must be equal to$m+n-1$, where$m$is the number of rows and$n$is the number of columns All the positive allocations must be in independent ... solution if it satisfies:$a$and$b$only$a$and$c$only$b$and$c$only$a$,$b$and$c$1 vote 1 answer 18 A basic feasible solution of a linear programming problem is said to be ______ if at least one of the basic variable is zero generate degenerate infeasible unbounded 1 vote 1 answer 19 Blind image disconvolution is Combination of blur identification and image restoration Combination of segmentation and classification Combination of blur and non-blur image None of the above 3 votes 1 answer 20 Which of the following is not a lossy compression technique? JPEG MPEG FFT Arithmetic coding 2 votes 1 answer 21 Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has alphabet$X=\{0,1\}$and associated probabilities${\dfrac{1}{2}, \dfrac{1}{2}}$. The channel matrix is$\begin{pmatrix} 1-p & p \\ p & 1-p \end{pmatrix}$wgere p is the transition probability. Then ... is given by:$1-p \log(p)-(1-p) \log(1-p)1+p \log(p)+(1-p) \log(1-p)0$1 vote 1 answer 22 As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage: It has high level of flexibility It does not require cash up-front It is a business investment Little risk of obsolescence 3 votes 2 answers 23 In constraint satisfaction problem, constraints can be stated as Arithmetic equations and inequalities that bind the values of variables Arithmetic equations and inequalities that does not bind any restriction over variables Arithmetic equations that impose restrictions over variables Arithmetic equations that discard constraints over the given variables 3 votes 1 answer 24 Language model used in LISP is Functional programming Logic programming Object oriented programming All of the above 1 vote 1 answer 25 Reasoning strategies used in expert systems include Forward chaining, backward chaining and problem reduction Forward chaining, backward chaining and boundary mutation Forward chaining, backward chaining and back propagation Forward chaining, problem reduction and boundary mutation 1 vote 4 answers 26 In propositional logic, given$P$and$P \rightarrow Q$, we can infer ________$\sim QQP \wedge Q\sim P \wedge Q$1 vote 1 answer 27 In Unix operating system, special files are used to buffer data received in its input from where a process reads provide a mechanism to map physical device to file names store list of file names plus pointers associated with i-nodes store information entered by a user application program or utility program 2 votes 3 answers 28 Consider a system with twelve magnetic tape drives and three processes$P_1, P_2$and$P_3$. process$P_1$requires maximum ten tape drives, process$P_2$may need as many as four tape drives and$P_3$... and process$P_3$is holding three tape drives, At time$t_1\$, system is in: safe state unsafe state deadlocked state starvation state