The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register
|
I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Answers by Debasmita Bhoumik
User Debasmita Bhoumik
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
User Debasmita Bhoumik
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
0
votes
1
ISI2015-PCB-A-3
Consider all possible permutations of eight distinct elements $a, b, c, d, e, f, g, h$. In how many of them, will $d$ appear before $b$? Note that $d$ and $b$ may not necessarily be consecutive.
answered
May 8, 2018
in
Combinatory
|
179
views
descriptive
isi2015-pcb-a
permutation-and-combination
0
votes
2
UGCNET-Dec2012-III-28
The initial basic feasible solution to the following transportation problem using Vogel's approximation method is $D_1$ $D_2$ $D_3$ $D_4$ Supply $S_1$ 1 2 1 4 30 $S_2$ 3 3 2 1 50 $S_3$ ... = 180 $x_{11}=20, x_{13}=10, x_{22}=20, x_{23}=20, x_{24}=10, x_{32}=10$, Total cost = 180 None of the above
answered
Mar 27, 2018
in
Others
|
1.8k
views
ugcnetdec2012iii
operation-research
transportation-problem
+1
vote
3
UGCNET-DEC2016-III-55
Consider the following two rules $R1$ and $R2$ ... Only R1 is correct Only R2 is correct Both R1 and R2 are correct Neither R1 nor R2 is correct
answered
Mar 24, 2018
in
Others
|
859
views
ugcnetdec2016iii
0
votes
4
UGCNET-Jan2017-III-55
Consider following two rules R1 and R2 in logical reasoning in Artificial Intelligence (AI) : R1 : From α ⊃ β $\frac{and α} {Inter β}$ is known as Modus Tollens (MT) R2 : From α ⊃ β $\frac{and ¬β} {Inter ¬α}$ is known as Modus Ponens (MP) (1) Only R1 is correct. (2) Only R2 is correct. (3) Both R1 and R2 are correct. (4) Neither R1 nor R2 is correct.
answered
Mar 24, 2018
in
Others
|
218
views
+1
vote
5
UGCNET-Dec2015-III-65
Consider a standard additive model consisting of rules of the form of If $x$ is $A_i$ AND $y$ is $B_i$ THEN $z$ is $C_i$. Given crisp inputs $x=x_0, \: y=y_0$ the output of the model is $z=\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0) \mu_{C_i} (z)$ ... $z=centroid \: (\Sigma_i \mu_{A_i} (x_0) \mu_{B_i} (y_0)$
answered
Feb 14, 2018
in
Others
|
680
views
ugcnetdec2015iii
fuzzy-systems
+1
vote
6
UGCNET-Nov2017-ii-25
The pre-order traversal of a binary search tree is given by $3,5,7,9,4,17,16,20,18,15,14$ Which of these can be inorder traversal a. $3,4,5,7,9,14,20,18,17,16,15$ b. $20,18,17,16,15,14,3,4,5,7,9$ c. $20,18,17,16,15,14,9,7,5,4,3$ d. $3,4,5,7,9,14,15,16,17,18,20$
answered
Nov 6, 2017
in
Others
|
494
views
ugcnetnov2017-ii
+1
vote
7
UGCNET-Nov2017-ii-45
which of the following testing techniques ensures that the software products runs correctly after the changes in maintenance? 1. path testing 2. integration testing 3. unit testing 4. regression testing
answered
Nov 6, 2017
in
Others
|
678
views
ugcnetnov2017-ii
is&software-engineering
software-testing
0
votes
8
UGCNET-Nov2017-ii-46
Which of the following Super Computers is the fastest super computer. 1. sun way taihulight 2. titan 3. piz daint 4. sequoia
answered
Nov 6, 2017
in
Others
|
415
views
ugcnetnov2017-ii
co-and-architecture
0
votes
9
UGCNET-Nov2017-ii-47
Which of the following statements about ERP systems is true? A) Most ERP software implementations fully achieve seamless integration B) Some ERP software packages are themselves combinations of separate applications for manufacturing, materials resource planning, general ... to allow changes and software variations. D) Integration of ERP systems can be achieved in only one way.
answered
Nov 6, 2017
in
Others
|
425
views
ugcnetnov2017-ii
e-technologies
+1
vote
10
UGCNET-Nov2017-ii-49
Which of the wireless technologies used in IoT, consumes the least amount of power? 1. Zigbee 2. Bluetooth 3. Wi-Fi 4. GSM/CDMA
answered
Nov 6, 2017
in
Others
|
1.1k
views
ugcnetnov2017-ii
computer-networks
0
votes
11
UGCNET-Nov2017-ii-48
Which of the following is not a clustering method? 1. k-means method 2. self organizing feature map method 3. k nearest neighbour method 4. agglomerative method
answered
Nov 6, 2017
in
Others
|
828
views
ugcnetnov2017-ii
data-mining
clustering
+2
votes
12
UGCNET-Dec2012-III-71
You are given four images to represent as $I_1 = \begin{bmatrix} 0 & 0 \\ 0 & 0 \end{bmatrix}, I_2 = \begin{bmatrix} 0 & 1 \\ 0 & 0 \end{bmatrix}$, $I_3 = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix}, I_4 = \begin{bmatrix} 1 & 1 \\ 1 & 0 \end{bmatrix}$ The value of entropy is maximum for image $I_1$ $I_2$ $I_3$ $I_4$
answered
Jun 26, 2017
in
Computer Graphics
|
1.1k
views
ugcnetdec2012iii
computer-graphics
image-entropy
+2
votes
13
UGCNET-Dec2014-II-08
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine $(A ∗ B) + (C ∗ D/E)$? $4$ PUSH and $3$ POP instructions $5$ PUSH and $4$ POP instructions $6$ PUSH and $2$ POP instructions $5$ PUSH and $3$ POP instructions
answered
Mar 12, 2017
in
Others
|
2.3k
views
ugcnetdec2014ii
data-structure
stack
+2
votes
14
UGCNET-DEC2016-II-38
Match the following w.r.t. Input/Output management: List-I List-II a. Device controller i. Extracts information from the controller register and store it in data buffer b. Device driver ii. I/O scheduling c. Interrupt handler iii. Performs data transfer d. Kernel I/O subsystem iv. Processing of I/O ... ii a-ii; b-i; c-iv; d-iii a-iv; b-i; c-ii; d-iii a-i; b-iii; c-iv; d-ii
answered
Feb 12, 2017
in
CBSE/UGC NET
|
1.2k
views
ugcnetdec2016ii
+2
votes
15
UGCNET-DEC2016-II-31
Which of the following strings would match the regular expression: p+[3-5]*[xyz]? p443y p6y 3xyz p35z p353535x ppp5 I, III and Vl only IV, V and VI only II, IV and V only I, IV and V only
answered
Feb 12, 2017
in
Others
|
1.5k
views
ugcnetdec2016ii
+3
votes
16
GATE2017-1-47
The number of integers between $1$ and $500$ (both inclusive) that are divisible by $3$ or $5$ or $7$ is ____________ .
answered
Feb 11, 2017
in
Set Theory & Algebra
|
3.6k
views
gate2017-1
set-theory&algebra
normal
numerical-answers
sets
+1
vote
17
UGCNET-DEC2016-II-37
In a paging system, it takes 30 ns to search translation Look-aside Buffer (TLB) and 90 ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access time is 48 ns 147 ns 120 ns 84 ns
answered
Feb 11, 2017
in
CBSE/UGC NET
|
2.7k
views
ugcnetdec2016ii
+1
vote
18
UGCNET-DEC2016-II-43
Which of the following statement(s) is/are true with respect to software architecture? S1: Coupling is a measure of how well the things grouped together in a module belong together logically. S2: Cohesion is a measure of the degree of interaction between software ... is easier to change one module without affecting others. Only S1 and S2 Only S3 All of S1, S2 and S3 Only S1
answered
Feb 11, 2017
in
Others
|
780
views
ugcnetdec2016ii
+1
vote
19
UGCNET-DEC2016-II-44
The Prototyping model of software development is: a reasonable approach when requirements are well-defined. a useful approach when a customer cannot define requirements clearly. the best approach to use for projects with large development teams. a risky model that rarely produces a meaningful product.
answered
Feb 11, 2017
in
Others
|
605
views
ugcnetdec2016ii
0
votes
20
UGCNET-DEC2016-II-45
A software design pattern used to enhance the functionality of an object at run-time is: Adapter Decorator Delegation Proxy
answered
Feb 11, 2017
in
Others
|
1.2k
views
ugcnetdec2016ii
0
votes
21
UGCNET-DEC2016-II-46
Match the following: List-I List-II a. Affiliate marketing i. Vendors ask partners to place logos on partner's site. If customers click, come to vendors and buy b. Viral Marketing ii. Spread your brand on the net by word-of-mouth. Receivers will send your information to their friends c. Group Purchasing ... iv a-iii; b-ii; c-iv; d-i a-ii; b-iii; c-iv; d-i a-ii; b-iii; c-i; d-iv
answered
Feb 11, 2017
in
Others
|
466
views
ugcnetdec2016ii
0
votes
22
UGCNET-DEC2016-II-48
Which of the following is/are true w.r.t. applications of mobile computing? Travelling of salesman Location awareness services a true; b false Both a and b are true Both a and b are false a false; b true
answered
Feb 11, 2017
in
Others
|
571
views
ugcnetdec2016ii
0
votes
23
UGCNET-DEC2016-II-50
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)? ERP automates and integrates majority of business processes. ERP provides access to information in a Real Time Environment. ERP is inexpensive to implement. a, b and c are false. a and b false; c true. a and b true; c false a true; b and c are false
answered
Feb 11, 2017
in
Others
|
513
views
ugcnetdec2016ii
+2
votes
24
UGCNET-DEC2016-II-39
Which of the following scheduling algorithms may cause starvation? First-come-first-served Round Robin Priority Shortest process next Shortest remaining time first a, c and e c, d and e b, d and e b, c and d
answered
Feb 11, 2017
in
Others
|
2.2k
views
ugcnetdec2016ii
0
votes
25
UGCNET-DEC2016-II-41
Software Engineering is an engineering discipline that is concerned with: how computer systems work theories and methods that underlie computers and software systems all aspects of software production all aspects of computer-based systems development, including hardware, software and process engineering
answered
Feb 11, 2017
in
Others
|
678
views
ugcnetdec2016ii
+1
vote
26
UGCNET-DEC2016-II-42
Which of the following is not one of three software product aspects addressed by McCall’s software quality factors? Ability to undergo change Adaptability to new environments Operational characteristics Production costs and scheduling
answered
Feb 11, 2017
in
Others
|
776
views
ugcnetdec2016ii
+1
vote
27
UGCNET-DEC2016-II-47
_______ refers loosely to the process of semi-automatically analysing large databases to find useful patterns. Datamining Data Warehousing DBMS Data mirroring
answered
Feb 11, 2017
in
Others
|
534
views
ugcnetdec2016ii
0
votes
28
MadeEasy Subject Test: Databases - Sql
answered
Feb 7, 2017
in
Databases
|
203
views
made-easy-test-series
databases
sql
+2
votes
29
Memory management
(a) P3, Ps, P3, P2 (b)P2, P5, P3, 426k waits (c)P3, Ps, P2, 426k waits (d)P4, P2, P5, P3
answered
Feb 4, 2017
in
Operating System
|
187
views
memory-management
0
votes
30
UGCNET-DEC2016-II-21
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element in a sorted array? Insertion-O(1), Deletion-O(1), Maximum-O(1), Minimum-O(1) Insertion-O(1), Deletion-O(1), Maximum-O(n), Minimum-O(n) Insertion-O(n), Deletion-O(n), Maximum-O(1), Minimum-O(1) Insertion-O(n), Deletion-O(n), Maximum-O(n), Minimum-O(n)
answered
Feb 4, 2017
in
Others
|
974
views
ugcnetdec2016ii
+2
votes
31
test series
5's complement of a given number (43)base8,when it is expressed with base 5?
answered
Feb 4, 2017
in
Digital Logic
|
154
views
+2
votes
32
UGCNET-DEC2016-II-22
The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e., starting from G. The stack is popped five times and each element is inserted into a queue. Two elements are deleted from the queue and pushed back onto the stack. Now, one element is popped from the stack. The popped item is ________ A B F G
answered
Feb 4, 2017
in
Others
|
1.3k
views
ugcnetdec2016ii
+1
vote
33
UGCNET-DEC2016-II-23
Which of the following is a valid heap? A B C D
answered
Feb 4, 2017
in
Others
|
905
views
ugcnetdec2016ii
+11
votes
34
UGCNET-DEC2016-II-25
Which of the following statements is false? Optimal binary search tree construction can be performed efficiently using dynamic programming Breadth-first search cannot be used to find connected components of a graph Given the prefix and postfix walks of a binary tree, ... cannot be re-constructed uniquely Depth-first-search can be used to find the components of a graph 1 2 3 4
answered
Feb 4, 2017
in
Others
|
2.1k
views
ugcnetdec2016ii
+2
votes
35
UGCNET-DEC2016-II-26
Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP a-iv; b-i; c-ii; d-iii a-iii; b-ii; c-i; d-iv a-ii; b-iii; c-iv; d-i a-iii; b-i; c-iv; d-ii
answered
Feb 4, 2017
in
Others
|
588
views
ugcnetdec2016ii
+3
votes
36
UGCNET-DEC2016-II-28
A packet whose destination is outside the local TCP/IP network segment is sent to _______ File server DNS server DHCP server Default gateway
answered
Feb 4, 2017
in
Others
|
1.2k
views
ugcnetdec2016ii
+1
vote
37
UGCNET-DEC2016-II-29
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ______ automatically by server by exchanging information with neighbour nodes with back up database
answered
Feb 4, 2017
in
Others
|
824
views
ugcnetdec2016ii
+1
vote
38
UGCNET-DEC2016-II-30
In link state routing algorithm after construction of link state packets, new routes are computed using: DES algorithm Dijkstra’s algorithm RSA algorithm Packets
answered
Feb 4, 2017
in
Others
|
1.4k
views
ugcnetdec2016ii
+1
vote
39
UGCNET-AUG2016-III-60
If the histogram of an image is clustered towards origin on X-axis of a histogram plot then it indicates that the image is ______. Dark Good contrast Bright Very low contrast
answered
Feb 4, 2017
in
Others
|
387
views
ugcnetaug2016iii
image-processing
image-analysis
0
votes
40
UGCNET-AUG2016-III-59
Which of the following is a source coding technique ? Huffman coding Arithmetic coding Run-length coding DPCM
answered
Feb 4, 2017
in
Computer Networks
|
426
views
ugcnetaug2016iii
computer-networks
signalling
Page:
1
2
3
next »
50,647
questions
56,492
answers
195,460
comments
100,759
users