The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent activity by Debasmita Bhoumik
User Debasmita Bhoumik
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
User Debasmita Bhoumik
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
1
answer
1
ISI CSB C5 B
Consider the Boolean function F(x1, x2, . . . , x10) realised by the following combinational circuit. Determine the number of input combinations for which the output function F realised by the circuit becomes true (logic 1).
answer selected
May 13, 2018
in
Digital Logic

60
views
userisi2017
usermod
1
answer
2
ISI CSB 2017 C6
Let P = {P1(x1, y1), P2(x2, y2), . . . , Pn(xn, yn)} be a set of n points located within a rectangle such that none of the points touches its boundary. The topleft corner of the rectangle is at the origin O(0, 0). A plane mirror is placed ... at angle θ2 (denoted by a dashed line), passes through only 2 points. You will get full credit only if your algorithm takes O(n log n) time.
asked
May 12, 2018
in
Algorithms

48
views
userisi2017
usermod
4
answers
3
ISI2015PCBCS4a
Consider the use of Cyclic Redundancy Code (CRC) with generator polynomial $G(x)$ for error detection. Recall that error detection with a CRC works by appending the CRC value to the bit sequence to make it a multiple of $G(x)$. Calculate the CRC value of the bit ... burst error of length $5$ in such a way that the error cannot be detected by the CRC with the $G(x)$ given above.
commented
May 11, 2018
in
Computer Networks

803
views
descriptive
isi2015pcbcs
computernetworks
errordetection
crcpolynomial
2
answers
4
ISI2015PCBA3
Consider all possible permutations of eight distinct elements $a, b, c, d, e, f, g, h$. In how many of them, will $d$ appear before $b$? Note that $d$ and $b$ may not necessarily be consecutive.
answered
May 8, 2018
in
Combinatory

187
views
descriptive
isi2015pcba
permutationandcombination
2
answers
5
UGCNETDEC2016II29
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ______ automatically by server by exchanging information with neighbour nodes with back up database
answer selected
Apr 26, 2018
in
Others

841
views
ugcnetdec2016ii
2
answers
6
UGCNETSep2013III41
Given a binary search trees for a set of n=5 keys with the following probabilities: i 0 1 2 3 4 5 $p_i$  0.15 0.10 0.5 0.10 0.20 $q_i$ 0.05 0.10 0.05 0.05 0.05 0.10 The expected optimal cost of the search is 2.65 2.70 2.75 2.80
commented
Apr 6, 2018
in
DS

2k
views
ugcnetsep2013iii
datastructures
binarysearchtree
2
answers
7
UGCNETDec2012III28
The initial basic feasible solution to the following transportation problem using Vogel's approximation method is $D_1$ $D_2$ $D_3$ $D_4$ Supply $S_1$ 1 2 1 4 30 $S_2$ 3 3 2 1 50 $S_3$ ... = 180 $x_{11}=20, x_{13}=10, x_{22}=20, x_{23}=20, x_{24}=10, x_{32}=10$, Total cost = 180 None of the above
answered
Mar 27, 2018
in
Others

1.8k
views
ugcnetdec2012iii
operationresearch
transportationproblem
1
answer
8
UGCNETDec2012III18
In a Linear Programming Problem, suppose there are three basic variables and 2 nonbasic variables, then the possible number of basic solutions are 6 8 10 12
answer selected
Mar 27, 2018
in
Others

2.2k
views
ugcnetdec2012iii
operationresearch
linearprogramming
1
answer
9
UGCNETDec2012III24
If dual has an unbounded solution, then its corresponding primal has no feasible solution unbounded solution feasible solution none of these
answer selected
Mar 27, 2018
in
IS&Software Engineering

2.2k
views
ugcnetdec2012iii
operationresearch
duallinearprogramming
2
answers
10
UGCNETDEC2016III55
Consider the following two rules $R1$ and $R2$ ... Only R1 is correct Only R2 is correct Both R1 and R2 are correct Neither R1 nor R2 is correct
answered
Mar 24, 2018
in
Others

868
views
ugcnetdec2016iii
1
answer
11
UGCNETJan2017III55
Consider following two rules R1 and R2 in logical reasoning in Artificial Intelligence (AI) : R1 : From α ⊃ β $\frac{and α} {Inter β}$ is known as Modus Tollens (MT) R2 : From α ⊃ β $\frac{and ¬β} {Inter ¬α}$ is known as Modus Ponens (MP) (1) Only R1 is correct. (2) Only R2 is correct. (3) Both R1 and R2 are correct. (4) Neither R1 nor R2 is correct.
answered
Mar 24, 2018
in
Others

224
views
1
answer
12
UGCNETDec2015III65
Consider a standard additive model consisting of rules of the form of If $x$ is $A_i$ AND $y$ is $B_i$ THEN $z$ is $C_i$. Given crisp inputs $x=x_0, \: y=y_0$ the output of the model is $z=\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0) \mu_{C_i} (z)$ ... $z=centroid \: (\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0)$
answered
Feb 14, 2018
in
Others

687
views
ugcnetdec2015iii
fuzzysystems
1
answer
13
UGCNETDec2015III66
A bell shaped membership function is specified by three parameters (a,b,c) as follows: $\frac{1}{1+(\frac{xc}{a})^b}$ $\frac{1}{1+(\frac{xc}{a})^{2b}}$ $1+(\frac{xc}{a})^b$ $1+(\frac{xc}{a})^{2b}$
commented
Jan 25, 2018
in
Others

751
views
ugcnetdec2015iii
fuzzysystems
2
answers
14
UGCNETNov2017ii25
The preorder traversal of a binary search tree is given by $3,5,7,9,4,17,16,20,18,15,14$ Which of these can be inorder traversal a. $3,4,5,7,9,14,20,18,17,16,15$ b. $20,18,17,16,15,14,3,4,5,7,9$ c. $20,18,17,16,15,14,9,7,5,4,3$ d. $3,4,5,7,9,14,15,16,17,18,20$
answered
Nov 6, 2017
in
Others

497
views
ugcnetnov2017ii
2
answers
15
UGCNETNov2017ii45
which of the following testing techniques ensures that the software products runs correctly after the changes in maintenance? 1. path testing 2. integration testing 3. unit testing 4. regression testing
answered
Nov 6, 2017
in
Others

695
views
ugcnetnov2017ii
is&softwareengineering
softwaretesting
1
answer
16
UGCNETNov2017ii46
Which of the following Super Computers is the fastest super computer. 1. sun way taihulight 2. titan 3. piz daint 4. sequoia
answered
Nov 6, 2017
in
Others

420
views
ugcnetnov2017ii
coandarchitecture
1
answer
17
UGCNETNov2017ii47
Which of the following statements about ERP systems is true? A) Most ERP software implementations fully achieve seamless integration B) Some ERP software packages are themselves combinations of separate applications for manufacturing, materials resource planning, general ... to allow changes and software variations. D) Integration of ERP systems can be achieved in only one way.
answered
Nov 6, 2017
in
Others

439
views
ugcnetnov2017ii
etechnologies
2
answers
18
UGCNETNov2017ii49
Which of the wireless technologies used in IoT, consumes the least amount of power? 1. Zigbee 2. Bluetooth 3. WiFi 4. GSM/CDMA
answered
Nov 6, 2017
in
Others

1.1k
views
ugcnetnov2017ii
computernetworks
1
answer
19
UGCNETNov2017ii48
Which of the following is not a clustering method? 1. kmeans method 2. self organizing feature map method 3. k nearest neighbour method 4. agglomerative method
answered
Nov 6, 2017
in
Others

833
views
ugcnetnov2017ii
datamining
clustering
1
answer
20
UGCNETNov2017ii33
Which of the following regular expressions, each describing a language of binary numbers (MSB to LSB) that represents nonnegative decimal values, does not include even values? $(1)\ 0^*1^+0^*1^*$ $(2)\ 0^*1^*0^+1^*$ $(3)\ 0^*1^*0^*1^+$ $(4)\ 0^+1^*0^*1^*$ Where $\{+,\ * \}$ are quantification characters.
answer selected
Nov 6, 2017
in
Theory of Computation

1.5k
views
ugcnetnov2017ii
regularexpressions
regularlanguages
2
answers
21
UGCNETNov2017ii7
The octal equivalent of the binary number $1011101011$ is : $(1)\ 7353$ $(2)\ 1353$ $(1)\ 5651$ $(1)\ 5657$
answer selected
Nov 6, 2017
in
Digital Logic

235
views
ugcnetnov2017ii
numberrepresentation
1
answer
22
UGCNETNov2017ii34
Which of the following statements is/are TRUE ? (a) The grammar $S \rightarrow SS\ \ a$ is ambiguous. (Where $S$ is the start symbol) (b) The grammar $S \rightarrow 0S1\ \ 01S\ \ \epsilon$ is ambiguous. (The special symbol $\epsilon$ represents the empty string) (Where $S$ is the ... and (c) are TRUE. $(3)$ Only (b) and (c) are TRUE. $(4)$ All of (a), (b) and (c) are TRUE.
commented
Nov 6, 2017
in
Theory of Computation

1.1k
views
ugcnetnov2017ii
grammar
contextfreelanguages
ambiguous
5
answers
23
UGCNETNov2017ii8
Let P and Q be two propositions $\sim(p\leftrightarrow Q)$ is equivalent to : $(1)P\leftrightarrow \sim Q \\ (2)\sim P\leftrightarrow Q \\ (3)\sim P \leftrightarrow \sim Q \\ (4)Q\rightarrow P$
answer selected
Nov 6, 2017
in
Discrete Mathematics

690
views
ugcnetnov2017ii
discretemathematics
mathematicallogic
3
answers
24
UGCNETNov2017II4
How many distinguishable permutations of the letters BANANA are there 720 120 60 360
answer selected
Nov 6, 2017
in
Combinatory

1.5k
views
ugcnetnov2017ii
permutationandcombination
1
answer
25
UGCNETJune2015III1
For the 8 bit word 00111001,the check bits stored with it would we 0111. Suppose when the word is read from memory, the check bits are calculated to be 1101. What is the data word that was read from memory? 10011001 00011001 00111000 11000110
answer selected
Oct 27, 2017
in
Computer Networks

4.5k
views
ugcnetjune2015iii
computerarchitecture
internalmemory
1
answer
26
UGCNETJune2015III71
Let A and B be two fuzzy integers defined as: A={(1.0.3), (2, 0.6), (3, 1), (4, 0.7), (5, 0.2)} B={(10, 0.5), (11, 1), (12, 0.5)} Using fuzzy arithmetic operation given by $\mu_{A+B^{(Z)}} = \underset{x+y=z}{\oplus} (\mu_A (x) \otimes \mu_B(y))$ $f(A+B)$ is _____ . [Note: ... ), (16, 0.5), (17, 0.2)} {(11, 0.3), (12, 0.5), (13, 0.6), (14, 1), (15, 0.7), (16, 0.5), (17, 0.2)}
commented
Oct 27, 2017
in
Others

2.1k
views
ugcnetjune2015iii
fuzzysystems
neuralnetwork
1
answer
27
UGCNETJune2015III28
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is CTTOEWMROPNRUEK MROUEKCTTPNROEW OEWPNRCTTUEKMRO UEKPNRMROOEQCTT
answer selected
Oct 27, 2017
in
Computer Networks

2.8k
views
ugcnetjune2015iii
computernetworks
networksecurity
3
answers
28
UGCNETJune2015III35
Let f(n) and g(n) be asymptotically nonnegative functions. Which of the following is correct? $\theta (f(n)^*g(n))=min (f(n),g(n))$ $\theta (f(n)^*g(n))=max(f(n),g(n))$ $\theta (f(n)+g(n))=min(f(n),g(n))$ $\theta (f(n)+g(n))=max(f(n),g(n))$
answer selected
Oct 27, 2017
in
Algorithms

1.5k
views
asymptoticnotations
algorithms
ugcnetjune2015iii
1
answer
29
UGCNETJune2015III70
Consider the two class classification task that consists of the following points: Class $C_1$ : [1 1.5] [1 1.5] Class $C_2$ : [2 2.5] [2 2.5] The decision boundary between the two classes using single perceptron is given by: $x_1+x_2+1.5=0$ $x_1+x_21.5=0$ $x_1+1.5=0$ $x_11.5=0$
answer selected
Oct 27, 2017
in
Others

1.7k
views
ugcnetjune2015iii
fuzzysets
neuralnetwork
1
answer
30
UGCNETDec2012III49
Let $f$ be the fraction of the computation (in terms of time) that is parallelizabl$e$. $P$ the number of processors in the system, and $s_p$ the speed up achievable in comparison with sequential execution – then the $s_p$ can be calculated using the relation: $\frac{1}{1ff/P}$ $\frac{P}{Pf(P+1)}$ $\frac{1}{1f+f/P}$ $\frac{P}{P+f(P1)}$
answer selected
Jun 27, 2017
in
CO and Architecture

489
views
ugcnetdec2012iii
coandarchitecture
speedup
2
answers
31
UGCNETDec2012III66
Match the following with respect to HTML tags and usage a. CITE 1. Italic representation b. EM 2. Represents outputs from programmes c. VAR 3. Represents to other source d. SAMP 4. Argument to a programme a b c d A 3 1 4 2 B 2 3 1 4 C 4 2 3 1 D 1 3 4 1
answer selected
Jun 26, 2017
in
Web Technologies

446
views
ugcnetdec2012iii
webtechnologies
html
1
answer
32
UGCNETDec2012III71
You are given four images to represent as $I_1 = \begin{bmatrix} 0 & 0 \\ 0 & 0 \end{bmatrix}, I_2 = \begin{bmatrix} 0 & 1 \\ 0 & 0 \end{bmatrix}$, $I_3 = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix}, I_4 = \begin{bmatrix} 1 & 1 \\ 1 & 0 \end{bmatrix}$ The value of entropy is maximum for image $I_1$ $I_2$ $I_3$ $I_4$
answered
Jun 26, 2017
in
Computer Graphics

1.1k
views
ugcnetdec2012iii
computergraphics
imageentropy
4
answers
33
UGCNETDec2014II08
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine $(A ∗ B) + (C ∗ D/E)$? $4$ PUSH and $3$ POP instructions $5$ PUSH and $4$ POP instructions $6$ PUSH and $2$ POP instructions $5$ PUSH and $3$ POP instructions
answered
Mar 12, 2017
in
DS

2.4k
views
ugcnetdec2014ii
datastructures
stack
1
answer
34
UGCNETJune2015II6
Consider the following statements: Boolean expressions and logic gates networks correspond to labelled acyclic digraphs Optimal boolean expressions may not correspond to simplest networks. Choosing essential blocks first in a Karnaugh map and then greedily choosing the largest remaining blocks to ... Which of these statement(s) is/are correct? a only b only a and b a, b, and c
commented
Mar 12, 2017
in
Digital Logic

868
views
ugcnetjune2015ii
digitallogic
booleanalgebra
2
answers
35
UGCNETDec2015II7
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of positive integers. Determine the truth values of each of the following propositions: $\forall m \forall n P(m, n)$, $\forall n P(1,n)$ $\exists m \forall n P(m,n)$ aTrue, bTrue, cFalse aTrue, bFalse, cFalse aFalse, bFalse, cFalse aTrue, bTrue, cTrue
answer selected
Mar 12, 2017
in
Mathematical Logic

1.3k
views
ugcnetdec2015ii
discretemathematics
mathematicallogic
8
answers
36
GATE2017147
The number of integers between $1$ and $500$ (both inclusive) that are divisible by $3$ or $5$ or $7$ is ____________ .
answer edited
Feb 13, 2017
in
Set Theory & Algebra

3.8k
views
gate20171
settheory&algebra
normal
numericalanswers
sets
2
answers
37
UGCNETDEC2016II34
The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and 3AH respectively. The contents of AL, the status of carry flag (CF) and sign flag (SF) after executing 'SUB AL, BL' assembly language instruction, are AL=0FH; CF=1; SF=1 AL=F0H; CF=0; SF=0 AL=F1H; CF=1; SF=1 AL=1FH; CF=1; SF=1
commented
Feb 12, 2017
in
Others

2.6k
views
ugcnetdec2016ii
2
answers
38
UGCNETDEC2016II49
In 3G network, WCDMA is also known as UMTS. The minimum spectrum allocation required for WCDMA is 2 MHz 20 KHz 5 KHz 5 MHz
commented
Feb 12, 2017
in
Others

766
views
ugcnetdec2016ii
2
answers
39
UGCNETDEC2016II38
Match the following w.r.t. Input/Output management: ListI ListII a. Device controller i. Extracts information from the controller register and store it in data buffer b. Device driver ii. I/O scheduling c. Interrupt handler iii. Performs data transfer d. Kernel I/O subsystem iv. Processing of I/O ... ii aii; bi; civ; diii aiv; bi; cii; diii ai; biii; civ; dii
answered
Feb 12, 2017
in
CBSE/UGC NET

1.2k
views
ugcnetdec2016ii
1
answer
40
UGCNETDEC2016II32
Consider the following assembly language instructions: mov al, 15 mov ah, 15 xor al, al mov cl, 3 shr ax, cl add al, 90H adc ah, 0 What is the value in ax register after execution of above instructions? 0270H 0170H 01E0H 0370H
commented
Feb 12, 2017
in
Others

696
views
ugcnetdec2016ii
50,737
questions
57,295
answers
198,261
comments
104,970
users