Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
sh!va
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by sh!va
6
votes
81
ISRO2009-62
If $\text{A, B, C}$ are any three matrices, then $\text{A}'+\text{B}'+\text{C}' $ is equal to a null matrix $\text{A + B + C}$ $\text{(A + B + C)}'$ $\text{-(A + B + C})$
If $\text{A, B, C}$ are any three matrices, then $\text{A}'+\text{B}'+\text{C}' $ is equal toa null matrix$\text{A + B + C}$$\text{(A + B + C)}'$$\text{-(A + B + C})$
3.0k
views
answered
Apr 15, 2017
Linear Algebra
isro2009
linear-algebra
matrix
+
–
3
votes
82
UGC NET CSE | December 2015 | Part 2 | Question: 32
Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the proportion of persons having meningitis is $\frac{1}{50000}$, and that the proportion od people having stiff neck is $\frac{1}{20}$. Then the percentage of people who had meningtis and complain about stiff neck is: 0.01% 0.02% 0.04% 0.05%
Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the proportion of persons having meningitis is $\frac{1}{50000}$, ...
2.0k
views
answered
Apr 7, 2017
Quantitative Aptitude
ugcnetcse-dec2015-paper2
quantitative-aptitude
percentage
+
–
3
votes
83
UGC NET CSE | December 2015 | Part 2 | Question: 3
Which of the following is/are not true ? The set of negative integers is countable. The set of integers that are multiples of 7 is countable. The set of even integers is countable. The set of real numbers between 0 and 1⁄2 is countable. i and iii ii and iv ii only iv only
Which of the following is/are not true ?The set of negative integers is countable.The set of integers that are multiples of 7 is countable.The set of even integers is cou...
3.7k
views
answered
Apr 7, 2017
Mathematical Logic
ugcnetcse-dec2015-paper2
discrete-mathematics
set-theory
+
–
1
votes
84
C PROGRAMMING
3.1k
views
answered
Mar 20, 2017
0
votes
85
full binary tree , complete and almost complete binary tree difference
what is the difference between all these types of trees 1)full binary tree 2) complete binary tree 3) almost complete binary tree 4)perfect binary tree 5)strictly binary tree is every full binary tree is of all types of binary trees
what is the difference between all these types of trees1)full binary tree 2) complete binary tree 3) almost complete binary tree 4)perfect binary tree 5)strictly binary t...
4.3k
views
answered
Mar 20, 2017
2
votes
86
Bridges
Which of the following are not true? I. Only gateway can be used to connect different protocol networks II. Gateway occur at all layers. III. Bridge and switch some times occur in network layer also IV. Repeater occur at both physical layer and data link layer. A)Only I and IV B)Only II, III and IV C)Only III and IV D)Only I, II and III
Which of the following are not true? I. Only gateway can be used to connect different protocol networks II. Gateway occur at all layers. III. Bridge and switch some times...
3.1k
views
answered
Mar 20, 2017
4
votes
87
Peter Linz Exercise 3.2
GIve a DFA that accepts the following language : L(ab(a+ab)*(a+aa)) What could be the minimum number of states in such DFA?
GIve a DFA that accepts the following language :L(ab(a+ab)*(a+aa))What could be the minimum number of states in such DFA?
635
views
answered
Mar 13, 2017
Theory of Computation
theory-of-computation
regular-expression
finite-automata
+
–
0
votes
88
Peter Linz Exercise 3.2
Provide dfa for the below regular expression
Provide dfa for the below regular expression
650
views
answered
Mar 13, 2017
Theory of Computation
theory-of-computation
regular-expression
+
–
4
votes
89
UGC NET CSE | December 2012 | Part 3 | Question: 32
A thread is a light weight process. In the above statement, weight refers to time number of resources speed all of the above
A thread is a light weight process.In the above statement, weight refers totimenumber of resourcesspeedall of the above
2.9k
views
answered
Mar 10, 2017
Operating System
ugcnetcse-dec2012-paper3
operating-system
threads
+
–
0
votes
90
UGC NET CSE | December 2012 | Part 3 | Question: 46
Two graphs A and B are shown below: Which one of the following statements is true? Both A and B are planar Neither A nor B is planar A is planar and B is not B is planar and A is not
Two graphs A and B are shown below: Which one of the following statements is true?Both A and B are planarNeither A nor B is planarA is planar and B is notB is planar and ...
2.2k
views
answered
Mar 10, 2017
Graph Theory
ugcnetcse-dec2012-paper3
graph-theory
graph-planarity
+
–
0
votes
91
UGC NET CSE | December 2012 | Part 3 | Question: 33
The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be handled by this algorithm shall depend on the application be arbitrary no. of objects depend on the memory availability depend on the processor
The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be handled by this algorithm shalldepend on the applicationbe...
4.8k
views
answered
Mar 10, 2017
Computer Graphics
ugcnetcse-dec2012-paper3
computer-graphics
+
–
2
votes
92
UGC NET CSE | December 2013 | Part 3 | Question: 74
Which of the following commands would return process_id of sleep command? Sleep 1 and echo $ Sleep 1 and echo $# Sleep 1 and echo $* Sleep 1 and echo $!
Which of the following commands would return process_id of sleep command?Sleep 1 and echo $Sleep 1 and echo $#Sleep 1 and echo $*Sleep 1 and echo $!
2.2k
views
answered
Mar 9, 2017
Operating System
ugcnetcse-dec2013-paper3
operating-system
non-gate
unix
+
–
0
votes
93
UGC NET CSE | August 2016 | Part 3 | Question: 39
Which of the following is a correct statement ? Composition is a strong type of association between two classes with full ownership. Composition is a strong type of association between two classes with partial ownership. ... classes with partial ownership. Composition is a weak type of association between two classes with strong ownership.
Which of the following is a correct statement ?Composition is a strong type of association between two classes with full ownership.Composition is a strong type of associa...
2.1k
views
answered
Mar 8, 2017
Object Oriented Programming
ugcnetcse-aug2016-paper3
object-oriented-programming
composition
+
–
0
votes
94
UGC NET CSE | August 2016 | Part 3 | Question: 41
Which of the following tag in HTML is used to surround information, such as signature of the person who created the page? <body></body> <address></address> <strong></strong> <em></em>
Which of the following tag in HTML is used to surround information, such as signature of the person who created the page?<body></body><address></address><strong></strong>...
2.0k
views
answered
Mar 8, 2017
Web Technologies
ugcnetcse-aug2016-paper3
web-technologies
html
+
–
1
votes
95
UGC NET CSE | August 2016 | Part 3 | Question: 43
An Operating System $(OS)$ crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to recover the OS, that is, the Mean Time To Repair (MTTR) = 10 minutes. The availability of the OS with these reliability figures is approximately : 96.97% 97.97% 99.009% 99.97%
An Operating System $(OS)$ crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to rec...
2.8k
views
answered
Mar 8, 2017
Operating System
ugcnetcse-aug2016-paper3
operating-system
system-reliability
+
–
0
votes
96
UGC NET CSE | August 2016 | Part 3 | Question: 45
Match each software term in List-I to its description in List-II : ... $\text{a-iv, b-iii, c-v, d-i, e-ii}$ $\text{a-iv, b-iii, c-ii, d-v, e-i}$
Match each software term in List-I to its description in List-II :$\begin{array}{clcl} & \textbf{List-I} && \textbf{List-II} \\ \text{I.} & \text{Wizards} & \text{a.} ...
1.1k
views
answered
Mar 8, 2017
Others
ugcnetcse-aug2016-paper3
system-software-compilers
macros
+
–
3
votes
97
UGC NET CSE | August 2016 | Part 3 | Question: 54
An experimental file server is up $75$% of the time and down for $25$% of the time due to bugs. How many times does this file server have to be replicated to give an availability of at least $99$% ? $2$ $4$ $8$ $16$
An experimental file server is up $75$% of the time and down for $25$% of the time due to bugs. How many times does this file server have to be replicated to give an avai...
5.2k
views
answered
Mar 8, 2017
Probability
ugcnetcse-aug2016-paper3
probability
+
–
1
votes
98
UGC NET CSE | August 2016 | Part 3 | Question: 53
Consider a file currently consisting of $50$ blocks. Assume that the file control block and the index block is already in memory. If a block is added at the end (and the block information to be added is stored in memory), then how many disk $I/O$ operations are required for indexed (single-level) allocation strategy ? $1$ $101$ $27$ $0$
Consider a file currently consisting of $50$ blocks. Assume that the file control block and the index block is already in memory. If a block is added at the end (and the ...
3.2k
views
answered
Mar 8, 2017
Operating System
ugcnetcse-aug2016-paper3
operating-system
file-system
+
–
1
votes
99
UGC NET CSE | August 2016 | Part 3 | Question: 50
Consider a system which have $‘n’$ number of processes and $‘m’$ number of resource types. The time complexity of the safety algorithm, which checks whether a system is in safe state or not, is of the order of : $O(mn)$ $O(m^{2}n^{2})$ $O(m^{2}n)$ $O(mn^{2})$
Consider a system which have $‘n’$ number of processes and $‘m’$ number of resource types. The time complexity of the safety algorithm, which checks whether a sys...
4.5k
views
answered
Mar 8, 2017
Operating System
ugcnetcse-aug2016-paper3
operating-system
deadlock-prevention-avoidance-detection
+
–
2
votes
100
UGC NET CSE | August 2016 | Part 3 | Question: 75
Which formal system provides the semantic foundation for Prolog ? Predicate calculus Lambda calculus Hoare logic Propositional logic
Which formal system provides the semantic foundation for Prolog ?Predicate calculusLambda calculusHoare logicPropositional logic
4.1k
views
answered
Mar 8, 2017
Others
ugcnetcse-aug2016-paper3
artificial-intelligence
prolog
+
–
1
votes
101
UGC NET CSE | August 2016 | Part 3 | Question: 70
Let $ν(x)$ mean $x$ is a vegetarian, $m(y)$ for $y$ is meat, and $e(x, y)$ for $x$ eats $y$ ... Only $II$ and $III$ are equivalent sentences. Only $I$ and $III$ are equivalent sentence . $I, II,$ and $III$ are equivalent sentences.
Let $ν(x)$ mean $x$ is a vegetarian, $m(y)$ for $y$ is meat, and $e(x, y)$ for $x$ eats $y$. Based on these, consider the following sentences :I. $\forall x \vee (x)\Lef...
2.0k
views
answered
Mar 8, 2017
Discrete Mathematics
ugcnetcse-aug2016-paper3
discrete-mathematics
propositional-logic
+
–
1
votes
102
UGC NET CSE | August 2016 | Part 3 | Question: 69
Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX ? I. It is used to set or change the priority of a process. II. A process’s nice value can be set at the time of creation. III. ‘nice’ takes a command line as an argument. $I, II$ only $II, III$ only $I, II, III$ $I, III$ only
Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX ?I. It is used to set or change the priority of a process.II. A process’s nice valu...
2.1k
views
answered
Mar 8, 2017
Others
ugcnetcse-aug2016-paper3
unix
+
–
4
votes
103
UGC NET CSE | August 2016 | Part 3 | Question: 27
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is $G(x) = x^{4}+ x + 1$. After implementing $CRC$ encoder, the encoded word sent from sender side is _____. 11010110111110 11101101011011 110101111100111 110101111001111
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is $G(x) = x^{4}+ x + 1$. After implementing $CRC$ encoder, th...
16.6k
views
answered
Mar 8, 2017
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
crc-polynomial
checksum
+
–
1
votes
104
UGC NET CSE | August 2016 | Part 3 | Question: 25
Suppose transmission rate of a channel is $32$ kbps. If there are $‘8’$ routes from source to destination and each packet $p$ contains $8000$ bits. Total end to end delay in sending packet $P$ is _____. $2$ sec $3$ sec $4$ se $1$ sec
Suppose transmission rate of a channel is $32$ kbps. If there are $‘8’$ routes from source to destination and each packet $p$ contains $8000$ bits. Total end to end d...
2.9k
views
answered
Mar 8, 2017
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
network-switching
+
–
2
votes
105
UGC NET CSE | August 2016 | Part 3 | Question: 26
Consider the following statements : A. High speed Ethernet works on optic fiber. B. A point to point protocol over Ethernet is a network protocol for encapsulating $PPP$ frames inside Ethernet frames. C. High speed Ethernet does not work on optic fiber. D. A point to point ... $D$ are true. $A, B, C$ and $D$ are true. $A, B, C$ and $D$ are false.
Consider the following statements :A. High speed Ethernet works on optic fiber.B. A point to point protocol over Ethernet is a network protocol for encapsulating $PPP$ fr...
2.7k
views
answered
Mar 8, 2017
Computer Networks
ugcnetcse-aug2016-paper3
computer-networks
ethernet
network-protocols
+
–
1
votes
106
UGC NET CSE | August 2016 | Part 3 | Question: 60
If the histogram of an image is clustered towards origin on X-axis of a histogram plot then it indicates that the image is ______. Dark Good contrast Bright Very low contrast
If the histogram of an image is clustered towards origin on X-axis of a histogram plot then it indicates that the image is ______.DarkGood contrastBrightVery low contrast...
1.2k
views
answered
Mar 8, 2017
Others
ugcnetcse-aug2016-paper3
digital-image-processing
+
–
4
votes
107
ISRO 2015- Eigen Values [mech]
$\begin{bmatrix} 4 & 1 \\ 1& 4 \end{bmatrix}$ Eigen values of the matrix are: a) 3,-3 b) -3, -5 c) 3, 5 d) 5 ,0
$\begin{bmatrix} 4 & 1 \\ 1& 4 \end{bmatrix}$Eigen values of the matrix are:a) 3,-3b) -3, -5c) 3, 5d) 5 ,0
827
views
answered
Mar 7, 2017
Linear Algebra
engineering-mathematics
isro-mech
linear-algebra
eigen-value
+
–
0
votes
108
ISRO 2016 Number of trials [Mech]
There are 20 locks and 20 matching keys. Maximum number of trials required to match all the locks is (a) 190 (b) 210 (c) 400 (d) 40
There are 20 locks and 20 matching keys. Maximum number of trials required to match all the locks is(a) 190(b) 210(c) 400(d) 40
815
views
answered
Mar 7, 2017
Probability
engineering-mathematics
isro-mech
probability
+
–
10
votes
109
How many transitive relations are there on a set with n elements if a)n=1 b) n=2 c) n=3
How many transitive relations are there on a set with n elements if a)n=1 b) n=2 c) n=3
How many transitive relations are there on a set with n elements ifa)n=1 b) n=2 c) n=3
46.5k
views
answered
Mar 7, 2017
2
votes
110
UGC NET CSE | June 2013 | Part 3 | Question: 44
Interrupt which arises from illegal or erroneous use of an instruction or data is Software interrupt Internal interrupt External interrupt None of the above
Interrupt which arises from illegal or erroneous use of an instruction or data isSoftware interruptInternal interruptExternal interruptNone of the above
2.9k
views
answered
Mar 7, 2017
CO and Architecture
ugcnetcse-june2013-paper3
co-and-architecture
assembly
interrupts
+
–
Page:
« prev
1
2
3
4
5
6
7
8
...
17
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register