Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
shahidhope
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by shahidhope
0
votes
1
UGC NET CSE | June 2016 | Part 3 | Question: 66
A perceptron has input weights $W_1=-3.9$ and $W_2=1.1$ with threshold value $T=0.3.$ What output does it give for the input $x_1=1.3$ and $x_2=2.2?$ $-2.65$ $-2.30$ $0$ $1$
A perceptron has input weights $W_1=-3.9$ and $W_2=1.1$ with threshold value $T=0.3.$ What output does it give for the input $x_1=1.3$ and $x_2=2.2?$$-2.65$$-2.30$$0$$1$
1.3k
views
answered
Mar 6, 2019
Artificial Intelligence
ugcnetcse-june2016-paper3
+
–
2
votes
2
UGC NET CSE | July 2018 | Part 2 | Question: 71
In artificial Intelligence (AI), an environment is uncertain if it is ___ Not fully observable and not deterministic Not fully observable or not deterministic Fully observable but not deterministic Not fully observable but deterministic
In artificial Intelligence (AI), an environment is uncertain if it is ___Not fully observable and not deterministicNot fully observable or not deterministicFully observab...
2.9k
views
answered
Mar 6, 2019
Artificial Intelligence
ugcnetcse-july2018-paper2
artificial-intelligence
+
–
1
votes
3
UGC NET CSE | July 2018 | Part 2 | Question: 72
In artificial Intelligence (AI), a simple reflex agent selects actions on the basis of ___ current percept, completely ignoring rest of the percept history rest of the percept history, completely ignoring the current percept both current percept and complete percept history both current percept and just previous percept
In artificial Intelligence (AI), a simple reflex agent selects actions on the basis of ___current percept, completely ignoring rest of the percept historyrest of the perc...
2.1k
views
answered
Mar 6, 2019
Artificial Intelligence
ugcnetcse-july2018-paper2
artificial-intelligence
+
–
0
votes
4
UGC NET CSE | July 2018 | Part 2 | Question: 74
Consider following sentences regarding $A^*$, an informed search strategy in Artificial Intelligence (AI). $A^*$ expands all nodes with $f(n)<C^*$ $A^*$ expands no nodes with $f(n) \geq C^*$ Pruning is integral to $A^*$ ... Both statements a and statement c are true Both statements b and statement c are true All the statements a, b and c are true
Consider following sentences regarding $A^*$, an informed search strategy in Artificial Intelligence (AI).$A^*$ expands all nodes with $f(n)<C^*$$A^*$ expands no nodes wi...
2.5k
views
answered
Jul 14, 2018
Artificial Intelligence
ugcnetcse-july2018-paper2
artificial-intelligence
+
–
0
votes
5
UGC NET CSE | July 2018 | Part 2 | Question: 73
In heuristic search algorithms in Artificial Intelligence (AI), if a collection of admissible heuristics $h_1 \dots h_m$ is available for a problem and none of them dominates any of the others, which should we choose? $h(n)=max\{h_1(n), \dots , h_m(n)\}$ ... $h(n)=avg\{h_1(n), \dots , h_m(n)\}$ $h(n)=sum\{h_1(n), \dots , h_m(n)\}$
In heuristic search algorithms in Artificial Intelligence (AI), if a collection of admissible heuristics $h_1 \dots h_m$ is available for a problem and none of them domin...
2.0k
views
answered
Jul 14, 2018
Artificial Intelligence
ugcnetcse-july2018-paper2
artificial-intelligence
+
–
1
votes
6
UGC NET CSE | July 2018 | Part 2 | Question: 70
Consider a hash table of sze seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming that the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed ... 3, 8, 10, ___, ___, ___ 1, ___, 3, ___, 8, ___, 10 3, 10, ___, ____, 8, ___, ___
Consider a hash table of sze seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming that the hash table is initially empty, which of the following is...
3.0k
views
answered
Jul 14, 2018
DS
ugcnetcse-july2018-paper2
data-structures
hashing
+
–
0
votes
7
UGC NET CSE | July 2018 | Part 2 | Question: 69
Let $R_1(a, b, c)$ and $R_2(x, y, z)$ be two relations in which a is the foreign key of $R_1$ that refers to the primary key of $R_2$. Consider the following four options. Insert into $R_1$ ... b will cause violation Operations b and c will cause violation Operations c and d will cause violation Operations d and a will cause violation
Let $R_1(a, b, c)$ and $R_2(x, y, z)$ be two relations in which a is the foreign key of $R_1$ that refers to the primary key of $R_2$. Consider the following four options...
1.2k
views
answered
Jul 14, 2018
Databases
ugcnetcse-july2018-paper2
databases
relation
+
–
0
votes
8
UGC NET CSE | July 2018 | Part 2 | Question: 66
For a database relation $R(a, b, c, d)$ where the domains of a, b, c and d include only atomic values and only the following functional dependencies and those that can be inferred from them hold: $a \rightarrow c$ ... in ____ First normal form but not in second normal form Second normal form but not in third normal form Third normal form BCNF
For a database relation $R(a, b, c, d)$ where the domains of a, b, c and d include only atomic values and only the following functional dependencies and those that can be...
704
views
answered
Jul 14, 2018
Databases
ugcnetcse-july2018-paper2
databases
rdbms
+
–
1
votes
9
UGC NET CSE | July 2018 | Part 2 | Question: 64
Relations produced from E-R Model will always be in _____ 1 NF 2 NF 3 NF 4 NF
Relations produced from E-R Model will always be in _____1 NF2 NF3 NF4 NF
23.6k
views
answered
Jul 14, 2018
Databases
databases
er-diagram
database-normalization
ugcnetcse-july2018-paper2
+
–
0
votes
10
UGC NET CSE | July 2018 | Part 2 | Question: 61
In RDBMS, which type of Join returns all rows that satisfy the join condition? Inner Join Outer Join Semi Join Anti Join
In RDBMS, which type of Join returns all rows that satisfy the join condition?Inner JoinOuter JoinSemi JoinAnti Join
2.3k
views
answered
Jul 14, 2018
Databases
ugcnetcse-july2018-paper2
databases
rdbms
joins
+
–
0
votes
11
UGC NET CSE | July 2018 | Part 2 | Question: 60
In which of the following scheduling criteria, context switching will never take place? ROUND ROBIN Preemptive SJF Non-preemptive SJF Preemptive priority
In which of the following scheduling criteria, context switching will never take place?ROUND ROBINPreemptive SJFNon-preemptive SJFPreemptive priority
1.5k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
process-scheduling
operating-system
+
–
0
votes
12
UGC NET CSE | July 2018 | Part 2 | Question: 59
Consider the following three processes with the arrival time and CPU burst time given in miliseconds: Process Arrival Time Burst Time $P_1$ 0 7 $P_2$ 1 4 $P_3$ 2 8 The Gantt Chart for preemptive SJF scheduling algorithm is _______
Consider the following three processes with the arrival time and CPU burst time given in miliseconds:ProcessArrival TimeBurst Time$P_1$07$P_2$14$P_3$28The Gantt Chart for...
2.5k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
operating-system
scheduling
process-scheduling
+
–
1
votes
13
UGC NET CSE | July 2018 | Part 2 | Question: 57
Page information memory is also called as Page Table. The essential contents in each entry of a page table is/are ____ Page Access information Virtual Page number Page Frame number Both virtual page number and Page frame number
Page information memory is also called as Page Table. The essential contents in each entry of a page table is/are ____Page Access informationVirtual Page numberPage Frame...
1.3k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
operating-system
paging
+
–
2
votes
14
UGC NET CSE | July 2018 | Part 2 | Question: 56
Which of the following statements are true? External Fragmentation exists when there is enough total memory space to satisfy a request but the available space is contiguous. Memory Fragmentation can be internal as well as external One solution to external Fragmentation is compaction i and ii only i and iii only ii and iii only i, ii and iii
Which of the following statements are true?External Fragmentation exists when there is enough total memory space to satisfy a request but the available space is contiguou...
2.5k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
operating-system
fragmentation
+
–
0
votes
15
UGC NET CSE | July 2018 | Part 2 | Question: 55
Which UNIX/Linux command is used to make all files and sub-directions in the directory "progs" executable by all users? chmod - R a + x progs chmod - R 222 progs chmod - X a + x progs chmod - X 222 progs
Which UNIX/Linux command is used to make all files and sub-directions in the directory "progs" executable by all users?chmod - R a + x progschmod - R 222 progschmod - X a...
1.5k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
unix
linux
operating-system
non-gate
+
–
1
votes
16
UGC NET CSE | July 2018 | Part 2 | Question: 54
Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with ... protection is ensured by a hardware trap I/O protection is ensured during system configuration I/O protection is not possible
Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having explicit I/O instructions, such I/O protection is ensured by ...
1.2k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
operating-system
io-handling
+
–
1
votes
17
UGC NET CSE | July 2018 | Part 2 | Question: 52
In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal to 120 ns. The time required to access a page in primary memory is 15 ns. The average time required to access a page is ____ 105 68 75 78
In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal to 120 ns. The time required to access a page in primary me...
2.6k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
operating-system
paging
+
–
0
votes
18
UGC NET CSE | July 2018 | Part 2 | Question: 51
At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and "x" V operations were performed on this semaphore. If the final value of semaphore is 7, x will be 8 9 10 11
At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and "x" V operations were performed on this semaphore. If the final val...
2.0k
views
answered
Jul 14, 2018
Operating System
ugcnetcse-july2018-paper2
operating-system
process-synchronization
+
–
1
votes
19
UGC NET CSE | July 2018 | Part 2 | Question: 49
To guarantee correction of upto $t$ errors, the minimum Hamming distance $d_{min}$ in a block code must be ______ $t+1$ $t-2$ $2t-1$ $2t+1$
To guarantee correction of upto $t$ errors, the minimum Hamming distance $d_{min}$ in a block code must be ______$t+1$$t-2$$2t-1$$2t+1$
2.4k
views
answered
Jul 14, 2018
Computer Networks
ugcnetcse-july2018-paper2
computer-networks
error-correction
error-detection
+
–
0
votes
20
UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
Decrypt the message "WTAAD" using the Caesar Cipher with key =15LIPPSHELLOPLLEHDAATW
5.3k
views
answered
Jul 14, 2018
Others
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
+
–
0
votes
21
UGC NET CSE | July 2018 | Part 2 | Question: 47
In Challenge-Response authentication the claimant ____ Proves that she knows the secret without revealing it Proves that she does not know the secret Reveals the secret Gives a challenge
In Challenge-Response authentication the claimant ____Proves that she knows the secret without revealing itProves that she does not know the secretReveals the secretGives...
969
views
answered
Jul 14, 2018
Computer Networks
ugcnetcse-july2018-paper2
computer-networks
internet-security
+
–
0
votes
22
UGC NET CSE | July 2018 | Part 2 | Question: 46
Which of the following statements are true? Three broad categories of Networks are Circuit Switched Networks Packet Switched Networks Message Switched Networks Circuit Switched Network resources need not be reserved during the set up phase In packet switching there is no ... $\text{i and iii}$ only $\text{i, ii and iii}$ only
Which of the following statements are true?Three broad categories of Networks areCircuit Switched NetworksPacket Switched NetworksMessage Switched NetworksCircuit Switche...
3.1k
views
answered
Jul 14, 2018
Computer Networks
ugcnetcse-july2018-paper2
computer-networks
network-switching
+
–
1
votes
23
UGC NET CSE | July 2018 | Part 2 | Question: 45
Match the following symmetric block ciphers with corresponding block and key sizes: ... $\text{a-ii; b-iv; c-iii; d-i}$ $\text{a-iv; b-ii; c-iii; d-i}$
Match the following symmetric block ciphers with corresponding block and key sizes:$$\begin{array} {} & \textbf{List-I} & & \textbf{List-II} \\ \text{(a)} & \text{}\tex...
1.5k
views
answered
Jul 14, 2018
Computer Networks
ugcnetcse-july2018-paper2
cryptography
computer-networks
+
–
1
votes
24
UGC NET CSE | July 2018 | Part 2 | Question: 44
Which of the following statements are true? Advanced Mobile Phone System $\text{(AMPS)}$ is a second generation cellular phone system IS.$95$ is a second generation cellular phone sysyem based on $\text{CDMA}$ and $\text{DSSS}$ The Third generation cellular phone ... $\text{i, ii,}$ and $\text{iii}$ $\text{i}$ and $\text{iii}$ only
Which of the following statements are true?Advanced Mobile Phone System $\text{(AMPS)}$ is a second generation cellular phone systemIS.$95$ is a second generation cellula...
1.1k
views
answered
Jul 14, 2018
Computer Networks
ugcnetcse-july2018-paper2
computer-networks
+
–
2
votes
25
UGC NET CSE | July 2018 | Part 2 | Question: 20
Which of the following statements is/are True? P: Refactoring is the process of changing a software system in such a way that it does not alter the external behavior of the code yet improves the internal architecture Q: An example of ... a customer requirement discovered after a project is shipped Code: P only Q only Both P and Q Neither P nor Q
Which of the following statements is/are True?P: Refactoring is the process of changing a software system in such a way that it does not alter the external behavior of th...
4.7k
views
answered
Jul 14, 2018
IS&Software Engineering
ugcnetcse-july2018-paper2
is&software-engineering
+
–
0
votes
26
UGC NET CSE | July 2018 | Part 2 | Question: 24
Which of the following algorithms solves the single-source shortest paths? Prim's algorithm Floys-Warshall algorithm Johnson's algorithm Dijkstra's algorithm
Which of the following algorithms solves the single-source shortest paths?Prim's algorithmFloys-Warshall algorithmJohnson's algorithmDijkstra's algorithm
2.6k
views
answered
Jul 14, 2018
DS
ugcnetcse-july2018-paper2
data-structures
graph-algorithm
+
–
0
votes
27
UGC NET CSE | July 2018 | Part 2 | Question: 26
A binary search tree in which every non-leaf node has non-empty left and right subtrees is called a strictly binary tree. Such a tree with 19 leaves: cannot have more than 37 nodes has exactly 37 nodes has exactly 35 nodes cannot have more than 35 nodes
A binary search tree in which every non-leaf node has non-empty left and right subtrees is called a strictly binary tree. Such a tree with 19 leaves:cannot have more than...
3.5k
views
answered
Jul 14, 2018
DS
ugcnetcse-july2018-paper2
data-structures
binary-search-tree
+
–
1
votes
28
UGC NET CSE | July 2018 | Part 2 | Question: 31
Two finite state machines are said to be equivalent if they: Have the same number of edges Have the same number of states Recognize the same set of tokens Have the same number of states and edges
Two finite state machines are said to be equivalent if they:Have the same number of edgesHave the same number of statesRecognize the same set of tokensHave the same numbe...
15.3k
views
answered
Jul 14, 2018
Theory of Computation
ugcnetcse-july2018-paper2
theory-of-computation
finite-automata
+
–
0
votes
29
UGC NET CSE | July 2018 | Part 2 | Question: 33
A pushdown automata behaves like a Turing machine when the number of auxiliary memory is 0 1 1 or more 2 or more
A pushdown automata behaves like a Turing machine when the number of auxiliary memory is011 or more2 or more
2.4k
views
answered
Jul 14, 2018
Theory of Computation
ugcnetcse-july2018-paper2
theory-of-computation
pushdown-automata
+
–
2
votes
30
UGC NET CSE | July 2018 | Part 2 | Question: 19
Which of the following is not a key strategy followed by the clean room approach to software development? Formal specification Dynamic verification Incremental development Statistical testing of the system
Which of the following is not a key strategy followed by the clean room approach to software development?Formal specificationDynamic verificationIncremental developmentSt...
2.7k
views
answered
Jul 14, 2018
IS&Software Engineering
ugcnetcse-july2018-paper2
is&software-engineering
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register