Previous Year Question Papers for UGC NET Jan 2025 Computer Science with Solutions

Q1➡ | Computer Network
The network using CSMA/CD has a bandwidth of 20 Mbps. If the maximum propagation time is 25µ sec (microsecond), what is the minimum size of the frame?
i ➥ 500 bits
ii ➥ 1000 bits
iii ➥ 1500 bits
iv ➥ 2000 bits
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q2➡ | Artificial Intelligence
Which of the following is not a component of the classic Planning Definition?
i ➥ Init
ii ➥ Domain
iii ➥ Action
iv ➥Goal
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q3➡ | Theory of Computation
Which of the following CFG(s) is/are in Chomsky Normal Form (All capital letters are variables & lower case are terminals)?
ugc net-jan-2025-question-toc computer science previous year questions

a) ugc net-jan-2025-question-3_2-toc computer science previous year questions answer

b) ugc net-jan-2025-question-3_3-toc computer science previous year questions

c)ugc net-jan-2025-question-3_4-toc computer science previous year questions

d)ugc net-jan-2025-question-3_5-toc computer science previous year questions
Choose the correct answer from the options given below
i ➥ A & B only
ii ➥ B only
iii ➥ C only
iv ➥ B & D only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q4➡ | Artificial Intelligence
What is the correct sequence of steps used by knowledge base designing?
A. Ask questions about the intended interpretation.
B. Choose task domain or world to represent.
C. Select atoms to represent propositions of Interest.
D. Tell the system propositions that are true in the intended interpretation/axiomatizing the domain.
Choose the correct answer from the options given below:
i ➥ B, C, D, A
ii ➥ B, C, D, A
iii ➥C, D, A, B
iv ➥ D, A, B, C
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q5➡ | Software Engineering
Which one of the following is not a part of requirement management?
i ➥ Features Traceability Table
ii ➥ Dependency Traceability Table
iii ➥ Interface Traceability Table
iv ➥Page Traceability Table
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q6➡ | DBMS
What will be the right sequence of the phases of database design?
A. Physical Design
B. Conceptual Design
C. Logical Design
D. Requirement Collection and Analysis
Choose the correct answer from the options given below:
i ➥ D, A, B, C
ii ➥ D, B, C, A
iii ➥ D, B, A, C
iv ➥ D, A, C, B
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q7➡ |
Match the LIST-I with LIST-II
Match the LIST-I with LIST-II

LIST-I	LIST-II
A. Hadoop Distribution File System	I. Trust
B. Veracity	II. Facebook
C. Apache Pig	III. Name-Node
D. Apache Hive	IV. Yahoo
Choose the correct answer from the options given below:
Choose the correct answer from the options given below:
i ➥ A-IV, B-III, C-I, D-II
ii ➥A-III, B-I, C-IV, D-II
iii ➥ A-III, B-I, C-II, D-IV
iv ➥A-II, B-III, C-I, D-IV
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q8➡ | Discrete Math
Which of the following statements are true about the sets?
A. 0∈∅
B. ∅∈{0}
C. ∅∈{∅}
D. {∅}∈{∅}
E. {∅}⊆{∅,{∅}}
Choose the correct answer from the options given below:
i ➥ A, B, C, D, and E
ii ➥ A, B, C, and E only
iii ➥ A, C only
iv ➥ C and E only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q9➡ | Programming
Match the LIST-I with LIST-II
9.	Match the LIST-I with LIST-II 
LIST-I 
(FUNCTIONS)	LIST-II 
(Uses of functions)
A.		fseek ()	I.		Gives the current position in the file
B.		ftell()
II.		Sets the position to the beginning of the file
C.		feof()		III.		Sets the position to a desired point in the file
D.		rewind()	IV.		Used to test for an end of file condition
 Choose the correct answer from the options given below:
 Choose the correct answer from the options given below:
i ➥ A-II, B-III, C-I, D-IV
ii ➥ A-III, B-I, C-IV, D-II
iii ➥ A-III, B-I, CII-, D-IV
iv ➥A-II, B-IV, C-III, D-I
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q10➡ | DBMS
In concurrency control, phantom problem may occur, when-
i ➥ records are inserted
ii ➥ records are deleted
iii ➥ records are modified
iv ➥ records are indexed
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q11➡ | DBMS
Which of the following/s is/are FALSE statement?
A. An all key relation is always in BCNF since it has no FDs.
B. A relation that is not in 4NF due to nontrivial MVD must be decomposed to convert it into a set of relations in 4NF.
C. The decomposition removes the redundancy by the MVD.
D. 3NF is stronger than BCNF.
Choose the correct answer from the options given below:
i ➥ A only
ii ➥ A. B only
iii ➥D only
iv ➥ C only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q12➡ | Computer architecture
Correct the order of instruction cycle:
A. Read the effective address
B. Fetch the information
C. Execute the instruction
D. Decode the instruction
Choose the correct answer from the options given below:
i ➥ A, B, C, D
ii ➥ B, D, A, С
iii ➥ B, A, D, C
iv ➥A, B, D, C
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q13➡ | Computer architecture
Match the LIST-I with LIST-II
13.	Match the LIST-I with LIST-II 
LIST-I 	LIST-II 
A.		RAID level 1 	I.		bit-interleaved parity organization 
B.		RAID level 2	II.		disk mirroring 
C.		RAID level 3 	III.		block-interleaved parity organization 
D.		RAID level 4 	IV.		ECC organization
Choose the correct answer from the options given below:
i ➥ A-II, B-I, C-IV, D-III
ii ➥ A-II, B-IV, C-I, D-III
iii ➥ A-III, B-IV, C-I, D-II
iv ➥ A-IV, B-III, C-II, D-I
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q14➡ | Computer architecture
The entire set of parameters, including return address that is stored for a procedure invocation is referred to
i ➥ stack frame
ii ➥ stack base
iii ➥ stack limit
iv ➥ stack record
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q15➡ | Theory of Computation
Which of the following is TRUE about the Pumping Lemma for regular language?
i ➥ It applies to all regular language
ii ➥ It applies only to infinite regular languages
iii ➥ It applies to all context free languages
iv ➥It applies to all recursively enumerable languages
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q16➡ | Algorithm
Choose the correct statement(s)
A. A problem which is NP-Complete will have the property that it can be solved in polynomial time iff all other NP-complete problems can also be solved in polynomial time.
B. All NP-complete problem are NP-hard problems.
C. If an NP-hard problem can be solved in polynomial time, then all NP-complete problem can be solved in polynomial time
D. All NP-hard-problems are not NP-complete.
Choose the correct answer from the options given below:
i ➥ A, C only
ii ➥ B, D only
iii ➥ A, B, C only
iv ➥ A, B, C, D
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q17➡ | Computer Network
Which of the following are key features of Mobile Adhoc Networks (MANETS)
A. Self – Organizing and decentralized.
B. High Mobility of nodes.
C. Requires fixed Infrastructure for operation.
D. Network Topology is dynamic and constantly changing.
E. It requires a central controller to manage network traffic.
Choose the correct answer from the options given below:
i ➥ A, B & E only
ii ➥ B, C, D & E only
iii ➥A, B & D only
iv ➥ A, B & C only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q18➡ | Data Structure
Which of the following description(s) is/are true:
A. Red Black Tree – Guarantees worst case of O(log n) time for search, insert & delete.
B. Trie Used for efficient prefix – based searches.
C. AVL Tree – self balancing binary search tree with stricker balance criteria.
D. B- Tree Allows efficient search, inert, delete operations in disk-based system.
Choose the correct answer from the options given below:
i ➥ A & B only
ii ➥ C & D only
iii ➥ B only
iv ➥ A, B & D only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q19➡ | Data Structure
20.	Considering below binary tree, what will be the inorder traversal  
a)	BADCEGFH 
b)	GHFEDCBA 
c)	BACDEGFH 
d)	GHFDEBCA
Considering below binary tree, what will be the inorder traversal
i ➥ BADCEGFH
ii ➥GHFEDCBA
iii ➥ BACDEGFH
iv ➥GHFDEBCA
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q20➡ | Computer Network
The primary function of firewall in network security is
i ➥ To monitor network traffic and detect anomalies
ii ➥ To create virtual private networks for secure communication
iii ➥ To filter incoming and outgoing network traffic based on security rules
iv ➥ To encrypt data before Transmission
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q21➡ | Programming
The characteristics of modern programming are:
A. Each module should do only one thing.
B. Communication between modules is allowed only by a calling module.
C. Communication can take place directly between modules that do not have calling – called relationship.
D. All modules are designed as single-entry, single exit systems using control structure.
Choose the correct answer from the options given below:
i ➥ A, B & C only
ii ➥ A, B & D only
iii ➥ A, C & D only
iv ➥C & D only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q22➡ | Computer Architecture
Arrange the following in the increasing order with respect to access time.
A. Solid State Drive
B. Optical Disks
C. DRAMS
D. SRAMS
E. Registers
Choose the correct answer from the options given below:
i ➥ D, C, A, B, E
ii ➥ B, D, C, A, E
iii ➥ A, E, B, D, C
iv ➥ E, D, C, A, B
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q23➡ | Computer Architecture
Which of the following are not data manipulation instructions?
A. Call
B. Load
C. And
D. Increment
E. Shift
Choose the correct answer from the options given below:
i ➥ C & E only
ii ➥ A & B only
iii ➥ D & E only
iv ➥ A & C only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q24➡ | Discrete Math
Arrange the following graph on the basis of number of edges in increasing order [for n > 3]
A. Kn (Complete Graph) 
B. Cn (Cycle graph)
C. Wn (Wheel graph)
D. Kn,n (Complete Bipartite Graphs)
E. Qn (n-cubes graph)
Choose the correct answer from the options given below:
i ➥ A, B, C, D, E
ii ➥B, A, C, D, E
iii ➥ A, B, C, E, D
iv ➥E, D, C, A, В
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q25➡ | Data Structure
Match the LIST-I with LIST-II
25.	Match the LIST-I with LIST-II 
LIST-I	LIST-II 
A.	Breadth First Search	I.	LISP
B.	Depth First Search
II.	Syntax tree 
C.	Prefix	III.	Stack
D.	Infix 	IV.	Queue
Choose the correct answer from the options given below:
i ➥ A-III, B-IV, C-I, D-II
ii ➥ A-III, B-IV, C-II, D-I
iii ➥ A-IV, B-II, C-III, D-I
iv ➥ A-IV, B-III, C-I, D-II
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q26➡ | DBMS
Which of the following command can be used to modify data in an SQL Table?
A. INSERT
B. DELETE
C. UPDATE
D. SELECT
Choose the correct answer from the options given below:
i ➥ A, B, D only
ii ➥ A, C, D only
iii ➥ B, C, D only
iv ➥ A, B, C only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ | Computer Network
Sequence the following stages of the sliding window protocol for flow control.
A. Sender move the window to the next set of frames.
B. Sender sends a window of frames.
C. Receiver acknowledge the received frames.
D. If acknowledgment is not received, Sender retransmits the frame.
Choose the correct answer from the options given below:
i ➥ B, A, C, D
ii ➥ B, C, D, A
iii ➥ B, D, C, A
iv ➥B, C, A, D
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q28➡ | DBMS
Which of the following table contains the primary information in the data warehouse?
i ➥ Dimension table
ii ➥ Fact table
iii ➥ Lookup table
iv ➥ Primary table
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q29➡ | Operating System
Consider the following Graph of disk scheduling and identify the disk scheduling algorithm representing by this graph.
Queue 84, 125, 11, 36, 170, 20, 172, 45

29.	Consider the following Graph of disk scheduling and identify the disk scheduling algorithm representing by this graph. 
Queue 84, 125, 11, 36, 170, 20, 172, 45 
 
a)	SSTF 
b)	SCAN 
c)	C-SCAN 
d)	C-LOOK
i ➥ SSTF
ii ➥ SCAN
iii ➥ C-SCAN
iv ➥ C-LOOK
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q30➡ | Computer Network
Choose the correct statements from the following
A. In connection oriented service, the destination address is to be specified only during the setup.
B. Packet sequencing is not guaranteed in connection oriented service
C. Flooding is method in which every incoming packet is sent out on every outgoing line except the one by which it arrived.
D. Presentation layer performs detection and recovery from errors in the transmitted data.
Choose the correct answer from the options given below:
i ➥ A, B & C only
ii ➥B, C & D only
iii ➥ A & C only
iv ➥A, C & D only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q31➡ | Computer Graphics
The major adverse side effects of scan conversion are: –
A. Staircase appearance
B. Unequal brightness of slanted lines
C. Picket fence problem
D. Rasterization
E. Pre-filtering and post-filtering
Choose the correct answer from the options given below:
i ➥ A & B only
ii ➥ A, B & C only
iii ➥ B, C & D only
iv ➥ C, D & E only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q32➡ | Discrete Math
The kind of symbols for basic syntactic elements of first-order logic are
A. Constant
B. Domain
C. Predicate
D. Temporal
E. Function
Choose the correct answer from the options given below:
i ➥ B, D only
ii ➥ A, B, C only
iii ➥ A, C, E only
iv ➥C, D only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q33➡ | DBMS
The degree of a relation in database is
i ➥ the number of tuples in the relation
ii ➥ the number of attributes in the relation
iii ➥ the number of values in domain
iv ➥ the number of keys in a relation
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q34➡ | Computer Architecture
Consider a pipeline unit for fixed point multiplication of 8-bit integers. Arrange the following stages in a correct sequence.
Stage A: Consists of two CSAs and it merges four numbers from previous stage.
Stage B: is a CPA, which adds up the two numbers
Stage C: is made upto two level of four CSAs.
Stage D: Generates eight partial products.
Choose the correct answer from the options given below:
i ➥ C, A, B, D
ii ➥ D, C, A, B
iii ➥ B, D, C, A
iv ➥ A, C, D, B
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q35➡ | Computer Architecture
Which of the following is the correct sequence with regard to service routine?
A. Save contents of processor registers
B. Turn the interrupt facility on
C. Service the device whose flag is set
D. Check which flag is set
E. Restore contents of processor registers
Choose the correct answer from the options given below:
i ➥ A, B, C, D, E
ii ➥ D, B, C, A, E
iii ➥ D, C, B, E, A
iv ➥A, D, C, E, B
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q36➡ | Software Engineering
Find the correct sequence of prototype software development model.
A. Start
B. Develop Prototype
C. Deliver to customer
D. Quick Design
E. Quick Play
Choose the correct answer from the options given below:
i ➥ A, B, C, D, E
ii ➥ A, E, D, B, C
iii ➥ A, B, D, E, C
iv ➥ A, B, E D, C
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q37➡ | Programming
Which of the following statement is not True?
i ➥ A data member of a class can be declared as static and is normally used to maintain values common to the entire class.
ii ➥ A friend function can be invoked like a normal function without the help of any object.
iii ➥ The scope resolution operator (::) can be overloaded like normal operators.
iv ➥ Multiple inheritance may lead to duplication of inherited members from a “Grandparent” base class. This may be avoided by making the common base class a virtual base class.
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q38➡ | Discrete Math
Arrange the 2-D viewing transformation pipeline.
A. Convert world-coordinates to viewing coordinates
B. Map viewing coordinates to normalized viewing coordinates using window – viewpoint specifications
C. Construct world – coordinates scene using modeling coordinates transformations
D. Map normalized viewpoint to device coordinates
Choose the correct answer from the options given below:
i ➥ D, C, B, A
ii ➥ D, C, A, B
iii ➥ D. A, B, D
iv ➥B, C, A, D
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q39➡ | Artificial Intelligence
Definition’s of _____organized into following four categories namely, Thinking Humanly, Thinking Rationally, Acting Humanly, Acting Rationally
i ➥ Machine Learning
ii ➥ Deep Learning
iii ➥ Artificial Intelligence
iv ➥ Neural Network
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q40➡ | Digital Logic Design
Which of the following is the complement of the boolean function.
A’B+CD’+A’B+CD’
i ➥ A’B+CD’
ii ➥ (A’+B)(C+D’)
iii ➥ (A+B’)(C’+D)
iv ➥ AB’+CD’
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q41➡ | Software Engineering
Software Testability is simply how easily a software program can be tested. Which one characteristics does not lead to testable software?
i ➥ Observability
ii ➥ Controllability
iii ➥ Repairability
iv ➥ Understandability
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q42 | Discrete Math
If x and y are elements in a group G and if x = y³ = e, where e is the identity of G, then the inverse of x²yx⁴y² must be
i ➥ y2xy2x4
ii ➥ уху2х3
iii ➥ yx6y6x3
iv ➥xy2x2y4
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q43➡ | Programming
Which of the following is not true about Global Variables:
i ➥ The values of the Global variables which are sent to the called function may be changed inadvertently by the called function.
ii ➥ Functions are supposed to be independent and isolated modules. This character is lost, if they use global variables.
iii ➥ It is not immediately apparent to the reader which values are being sent to the called function
iv ➥ A function that uses global variables does not suffer from reusability.
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q44➡ | Computer Architecture
Which table for a dynamic pipeline become more interesting when a nonlinear pattern is follows?
i ➥ Reservation Table
ii ➥ Confusion Table
iii ➥ Inverted Table
iv ➥ Greedy Table
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q45➡ | DBMS
Which of the following is the simplified form of the given function. f(A,B,C)=∑m(0,1,3,7)
i ➥ A’B’C’+A’B’C+A’BC+ABC
ii ➥ A’B’+A’BC+ABC
iii ➥ A’B’+BC
iv ➥A’B’+BC’
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q46➡ | LPP
A linear programming problem (LPP) is as follows:
Min z=30x-18y, subject to the constraints; 3x+4y ≤ 60, 5x-3y ≥ 20 and x,y ≥ 0. In this feasible region, the solution of LPP is/are
A. (4, 0)
Β. (2, 0)
C. (7,5)
D. (0, 15)
Ε. (8,5)
Choose the correct answer from the options given below:
i ➥ A and C only
ii ➥ B only
iii ➥ E only
iv ➥ D only
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q47➡ | Operating System
If the virtual memory size is 32 MB and a physical memory size is 4MB with a page size of 2KB, Calculate the number of frames available in physical memory
i ➥ 1024
ii ➥ 2048
iii ➥ 3072
iv ➥ 4096
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q48➡ | Software Engineering
Which of the following algorithms are based on the Breadth First Search (BFS)?
A. Prim’s algorithms
B. Kruskal algorithms
C. Dijkstra algorithms
D. Greedy algorithms
E. Dynamic Programming
Choose the correct answer from the options given below:
i ➥ A & B only
ii ➥ A, C & D only
iii ➥ D & E only
iv ➥ A & C only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q49 | Theory of Computation
Match the LIST-I with LIST-II
49.	Match the LIST-I with LIST-II 
	LIST-I 		LIST-II 
A.		Type-0 grammar 
I.		Linear Grammar 
B.		Type 1 grammar 	II.		GNF 
C.		Type - 2 grammar 	III.		x→y, x<y; x, y ∈ {VUT}* 
D.		Type 3 grammar 	IV.		Recursively Enumerable 
Choose the correct answer from the options given below:
Choose the correct answer from the options given below:
i ➥ A-I, B-II, C-III, D-IV
ii ➥ A-II, B-I, C-III, D-IV
iii ➥ A-III, B-II, C-IV, D-I
iv ➥A-IV, B-III, C-I, D-II
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q50 | LPP
Which one of the following is not a basic solution of system of linear equation

i ➥ = – 1    = 2 = 1
ii ➥ = 2   = 1
iii ➥ = 5   = – 1
iv ➥ = 5/3    = 2/3
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q51➡ | Software Engineering
Match the LIST-I with LIST-II
51.	Match the LIST-I with LIST-II 
LIST-I
(Software Risk)	LIST-II 
(Uses)
A.		Predictable Risk	I.		Strategic Risk
B.		Business Risk	II.		Staffing and Organization
C.		Project Risk	III.		Implementation
D.		Past Project	IV.		Past Project Experience
Choose the correct answer from the options given below:
i ➥ A-IV, B-III, C-I, D-II
ii ➥ A-III, B-II, C-I, D-IV
iii ➥ A-I, B-IV, C-III, D-II
iv ➥ A-IV, B-I, CII-, D-III
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q52 | Artificial Intelligence
Which of the following are correct for the neural network?
A. The training time depends upon the size of network.
B. Neural network can be simulated on the conventional computer.
C. Neural network mimic the same way as that of the humans brain.
D. A neural network include feedback.
Choose the correct answer from the options given below:
i ➥ A and B only
ii ➥ A, C and D only
iii ➥ A, B and C only
iv ➥A and C only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q53➡ | Computer Graphics
The light given off by the phosphor during exposure to the electron beam is known as
i ➥ Fluorescence
ii ➥ Phosphorescence
iii ➥ Persistence
iv ➥ Retracing
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q54 | Algorithm
Which of the following is not a divide and conquer method
i ➥ Binary Search
ii ➥ Merge Sort
iii ➥ Quick Sort
iv ➥Heap Sort
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q55➡ | Compiler Design
Yacc is which of the following parsers?
i ➥ Predictive Parser
ii ➥ SLR Parser
iii ➥ CLR Parser
iv ➥ LALR Parser
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q56➡ | Software Engineering
Which one of the following is the correct estimation model based on software equation?
i ➥ E = [LOCxB0.222/P]2 x (1/t4)
ii ➥ E = [LOCxB0.333/P]3 x (1/t4)
iii ➥ E = [LOCxB0.444/P]4 x (1/t3)
iv ➥ E = [LOC×B0.111/p]6 x (1/t3)
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q57➡ | Computer Network
Arrange the following steps of the DHCP (Dynamic Host Control Protocol) process in the correct sequence.
A. DHC PACK
B. DHCP DISCOVER
C. DHCP OFFER
D. DHCP REQUEST
E. Client receives IP configuration
Choose the correct answer from the options given below:
i ➥ A, B, C, D, E
ii ➥ B, C, D, A, E
iii ➥ C, B, A, E, D
iv ➥ D, A, E, C, В
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q58➡ | Emerging Technologies
Match the LIST-I with LIST-II
58.	Match the LIST-I with LIST-II 
LIST-I	LIST-II
A.		Service Level Agreement	I.		The technology that connects and enables communication between physical devices over the Internet.
B.		Virtualization
II.		A develop environment provides over the Internet to create and deploy applications.
C.		Internet of Things	III.		Contracts that specify performance standards and services availability.
D.		Platform as a service	IV.		A method allowing multiple operating system to run on a single physical server.
Choose the correct answer from the options given below:
Choose the correct answer from the options given below:
i ➥ A-III, В-II, C-I, D-IV
ii ➥ A-III, B-IV, C-I, D-II
iii ➥ A-III. B-I. C-IV, D-I
iv ➥A-I, B-IV, C-III, D-II
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q59➡ | Operating System
Given the following processes with their times and priority (lower number indicates higher priority)
59.	Given the following processes with their times and priority (lower number indicates higher priority) 
Process	Burst Time	Priority
P1	10
3
P2	1	1
P3	2	4
P4	1	5
P5	5	2
Which of the following is a value of average waiting time using priority scheduling algorithm?
Which of the following is a value of average waiting time using priority scheduling algorithm?
i ➥ 9.2
ii ➥ 6.8
iii ➥ 7.6
iv ➥ 8.2
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q60 | Computer Network
Match the LIST-I with LIST-II
Match the LIST-I with LIST-II
LIST-I
(Process)
LIST-II
(Functions)
 
Internet message Access Protocol (IMAP)
 
A protocol that allows email clients to retrieve emails from a mail server
 
Address Resolution Protocol (ARP)
 
Used for remove login to another computer over a network
 



Post Office Protocol (POP)
 
A protocol that maps IP addresses to MAC addresses on a local area network
 
TELNET
 
A protocol that allows accessing email on the server without downloading them
Choose the correct answer from the options given below:
i ➥ A-II. В-I, C-III, D-IV
ii ➥ A-III, B-IV, C-I, D-II
iii ➥ A-IV, B-III, C-I, D-II
iv ➥A-IV, B-III, C-II, D-I
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q61➡ | Digital Logic Design
Match the LIST-I with LIST-II
Match the LIST-I with LIST-II
LIST-I
LIST-II
 



(100110011)2
 
Error detection code
 
Complements
 
CISC
 
Parity Bits
 
Negative number
 
Variable length instruction
 
(133)16
Choose the correct answer from the options given below:
i ➥ A-IV, B-I, C-III, D-II
ii ➥ A-IV, B-III, C-I, D-II
iii ➥ A-IV, B-II, C-III, D-I
iv ➥A-I, B-IV, C-II, D-III
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q62 | Operating System
Which of the following does not interrupt a running process?
i ➥ Device
ii ➥ Timer
iii ➥ Scheduler
iv ➥ Power Failure
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q63➡ | Discrete math
The mathematical notation to describe logical entailment of a sentence ” α entails another sentence β” is
i ➥ α ⊨ β
ii ➥ α ⊆ β
iii ➥ β ⊨ α
iv ➥β ⊆ α
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q64➡ | Algorithm
Which of the following is the solution of the following recurrence relation T(n) = T(2n/3) + 1?
i ➥ θ (n²)
ii ➥ θ (log n)
iii ➥ θ (n log n)
iv ➥θ (n3/2)
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q65➡ | Programming
Consider following conditional statements if (m=20-10 || n > 10). The order of execution of the following operations is
A. ==
B. –
C. ||
D. >
Choose the correct answer from the options given below:
i ➥ D, B, A, C
ii ➥ B, D, C, A
iii ➥ B, D, A, C
iv ➥ A, B, D, C
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q66➡ | Software Engineering
Collaborative document inspection technique used for?
i ➥ Requirement Validation Process
ii ➥ Requirement Verification Process
iii ➥ Integration Testing
iv ➥Blackbox Testing
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q67➡ | Data Structure
Arrange the following steps of the Inorder Traversal of Binary Tree in the correct order.
A. Visit the Left subtree
B. Visit the Root node
C. Visit the Right subtree
D. Start traversing by visiting the nodes in rooted tree
E. Repeat the above three steps.
Choose the correct answer from the options given below:
i ➥ A, B, C, D, E
ii ➥ E, A, B, C, D
iii ➥ D, A, B, C, E
iv ➥D, A, E, B, C
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q68➡ | DBMS
INSERT command is used to
A. add a single tuple to a relation
B. add multiple tuples to a relation
C. add values to specific attributes
D. insert new table
Choose the correct answer from the options given below:
i ➥ A only
ii ➥ A, B only
iii ➥ A, B, C only
iv ➥ B, C, D only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q69➡ | Discrete math
Which of the following Graph is/are planer?
ugc net jan 2025 Discrete math
Which of the following Graph is/are planer?



Choose the most appropriate answer from the options given below:
Choose the most appropriate answer from the options given below:
i ➥ A and C only
ii ➥ B only
iii ➥ A only
iv ➥A and B only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q70 | Computer Network
Consider a noiseless channel with a bandwidth of 5000Hz transmitting a signal with two signal levels. The maximum bit rate is
i ➥ 2500 bps
ii ➥ 10000 bps
iii ➥ 5000 bps
iv ➥ 20000 bps
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q71➡ | Digital Logic Design
The hamming distance between 10101 and 11110 is
i ➥ 2
ii ➥ 3
iii ➥ 4
iv ➥5
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q72➡ | Discrete Math
Match the LIST-I with LIST-II: Match the logical equivalence propositions
ugc net jan 2025 Discrete Math
Match the LIST-I with LIST-II: Match the logical equivalence propositions
LIST-I
LIST-II
 
p → q
 
(p ∧ q) ∨ (¬ p ∧ ¬ q)
 
¬ (p ∨ (¬ p ∧ q))
 
¬ p ∨ q
 



p ↔ q
 
¬ (p ∨ q)
 
¬ (p ↔ q)
 
¬ p ↔ q 
Choose the correct answer from the options given below:
i ➥ A-I, B-III, C-II, D-IV
ii ➥ A-I, B-II, C-III, D-IV
iii ➥ A-II, B-III, C-I, D-IV
iv ➥A-II, B-III, C-IV, D-I
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q73➡ | Algorithm
Match the LIST-I with LIST-II 
Match the LIST-I with LIST-II
LIST-I
Algorithm
LIST-II
Complexity
 
Insertion Sort
 
O (log n)
 
Binary Search
 
O(n²)
 
Quick Sort
 
O(n-1)
 



Selection Sort
 
O(n log n)
Choose the correct answer from the options given below:
i ➥ A-III, B-I, C-IV, D-II
ii ➥ A-II, B-III, C-I, D-IV
iii ➥ A-I, B-II, C-IV, D-III
iv ➥ A-II, B-III, C-IV, D-I
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q74➡ | Programming
Consider the following statements
int x = 10, y = 15;
x = ((x = y)? (y + x): (y – x));
What will be the value of x after executing these statements?
i ➥ 5
ii ➥ 25
iii ➥ 15
iv ➥30
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q75➡ | DBMS
Match the LIST-I with LIST-II
DBMS
Match the LIST-I with LIST-II
LIST-I
LIST-II
 
Project Join Normal Form
 
Concurrency
 
The lost update problem
 
Fifth Normal Form
 
Discretionary Access Control
 
SQL
 



Data manipulation Language
 
Security
 
Choose the correct answer from the options given below
Choose the correct answer from the options given below:
i ➥ A-II, B-I, C-IV, D-III
ii ➥ A-I, B-II, C-IV, D-III
iii ➥ A-I, B-II, C-III, D-IV
iv ➥ A-IV, B-II, C-III, D-I
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q76➡ | Computer Architecture
Which of the following do not represent memory reference instruction.
Which of the following do not represent memory reference instruction. 
A. 
1 
opcode 
mode = 1, opcode = 010 
B. 
0 opcode 
mode = 0, opcode = 111 
C. 
1 
opcode 
mode = 1, opcode = 111 
D. 
1 
opcode 
mode = 1, opcode = 110 
E. 1 opcode 
mode = 1, opcode = 001
Choose the correct answer from the options given below:
i ➥ B & C only
ii ➥ B & D only
iii ➥ A & D only
iv ➥A & E only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q77➡ | Software Engineering
In Software Engineering Jackson’s Principle based on
A. Designation
B. Definitions
C. Refutable Assertions
D. Formal Review
E. Requirement Elicitation
Choose the correct answer from the options given below:
i ➥ A, B & C Only
ii ➥ B, C & D Only
iii ➥ C, D & E Only
iv ➥ B, D & C Only
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q78➡ | Theory of Computation
Which of the following represents the output of the transition function(δ)
δ (q0, a) = (q1, x, R)
δ (q1, a) = (q1, a, R)
δ (q1, y1) = (q1, y, R)
δ (q1, b) = (q2, y, L)
δ (q2, y) = (q2, y, L)
δ (q2, a) = (q2, a, L)
δ (q2, x) = (q0, x, R)
δ (q0, y) = (q3, y, R)
δ (q3, y) = (q3, y, R)
δ (q3, □)=( qf, □, R)
 
i ➥ L={ an bn |n≥0}
ii ➥ L={ an bn |n≥1}
iii ➥ L={ an bn |n>0}
iv ➥L={ an bn |n>1}
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q79➡ | Compiler Design
Match the LIST-I with LIST-II
Compiler Design
Match the LIST-I with LIST-II
LIST-I
LIST-II
 
Conflict Resolution
 
Three - Address Code
 
Common Subsequence
 
Precedence
 
Quadruples
 
Syntax Directed Translations
 



L-Attributed definitions
 
Direct Acyclic Graph (DAG)
Choose the correct answer from the options given below:
i ➥ A-III, B-II, C-IV, D-I
ii ➥ A-II, B-IV, C-I, D-III
iii ➥ A-II, B-III, C-I, D-IV
iv ➥A-IV, B-I, C-II, D-III
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q80 | Computer Network
Consider the following statements regarding multiple access techniques & identify the CORRECT ones.
A. ALOHA is used for multiple access on a shared medium
B. TDMA uses WALSH TABLES for time slot allocation
C. CSMA/CD was invented for wireless networks
D. CDMA codes are sequence of number generated by orthogonal codes
Choose the correct answer from the options given below:
i ➥ A & B only
ii ➥ B & C only
iii ➥ C & D only
iv ➥ A & D only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q81➡ | Discrete Math
The probability that A hits a target is 1/4, and the probability that B hits the target is 2/5. Both shoot at the target, what is the probability that at least one of them hits the target, i.e., that A or B (or both) hit the target?
i ➥ 3/5
ii ➥ 11/9
iii ➥ 2/20
iv ➥11/20
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q82➡ | Compiler Design
Regarding the code optimization, choose the correct sequence
A. Algebraic Simplification
B. Use of machine idioms
C. Redundant – instruction elimination
D. Flow of control optimization
E. Improved target code
Choose the correct answer from the options given below:
i ➥ A, C, B, D, E
ii ➥ B, C, D, A, E
iii ➥ C, D, A, B, E
iv ➥ D, B, A, C, E
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q83➡ | Software Engineering
As per the Software Engineering Institute (SEI), the correct sequence is
A. Initial
B. Repeatable
C. Managed
D. Optimizing
E. Defined
Choose the correct answer from the options given below:
i ➥ A, B, C, D, E
ii ➥ A, B, E, C, D
iii ➥ A, E, C, D, B
iv ➥A, E, B, C, D
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q84➡ | Digital Logic Design
Match the LIST-I with LIST-II
Match the LIST-I with LIST-II 
LIST-I 
LIST-II 
Boolean Algebra Law 
Axioms 
A. 
Absorption Law 
I. 
a+1=1 
B. 
Bounded Law 
II. 
a+0=a 
C. 
Identity Law 
III. 
a*(b+c)=(a*b)+(a*c) 
D. 
Distributive Law 
IV. 
a+(a*b)=a
Choose the correct answer from the options given below:
i ➥ A-IV, B-I, C-II, D-III
ii ➥ A-IV, B-III, C-I, D-II
iii ➥ A-III, B-IV, C-II, D-I
iv ➥ A-II, B-III, C-IV, D-I
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q85➡ | Data Structure
Which of the following uses only increment operations for adding and removing element at either end?
i ➥ Queues
ii ➥ Stacks
iii ➥ Priority Queues
iv ➥Deques
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q86➡ | Artificial Intellegence
Which one of the following is not related to the feed forward networks on the Backpropagation Algorithm?
i ➥ Boolean function
ii ➥ Continuous function
iii ➥ Arbitrary function
iv ➥Greedy function
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q87➡ | Computer Architecture
Which are often needed to evaluate the cache performance?
i ➥ Hit Ratio
ii ➥ Latency
iii ➥ Cache Traces
iv ➥Transfer Rate
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q88➡ | Artificial Intelligence
Match the LIST-I with LIST-II
Artificial Intelligence
Match the LIST-I with LIST-II
LIST-I
LIST-II
 



Decision Tree
 
Delta Learning Rule
 
Supervised Learning
 
Self-Organizing Map
 
Artificial Neural Network
 
C4.5 Algorithm
 
Instance base Learning
 
Non-linear Regression Algorithm
Choose the correct answer from the options given below:
i ➥ A-I, B-II, C-III, D-IV
ii ➥ A-II, B-III, C-IV, D-I
iii ➥ A-III, B-IV, C-I, D-II
iv ➥ A-IV, B-I, C-II, D-III
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q89➡ | Data Structure
Identify the correct statements from the following regarding spiral model.
A. Spiral model is an incremental process model.
B. Spiral model is a risk – driven process mode.
C. Spiral model is an acyclic balancing approach.
D. Spiral model involves a set of anchor point milestone.
Choose the correct answer from the options given below:
i ➥ A & B Only
ii ➥ B & C Only
iii ➥ A & D Only
iv ➥B & D Only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q90 | DBMS
An alternate key in database table is also called
i ➥ Primary key
ii ➥ Candidate key
iii ➥ Super key
iv ➥ Foreign key
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q91➡ | Theory of Computation
Comprehension:
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted.
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted.

For the above specified passage, which of the following is DFA for the language represented/accepeted by machine?
For the above specified passage, which of the following is DFA for the language represented/accepeted by machine?
i ➥ 1
ii ➥ 2
iii ➥ 3
iv ➥4
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q92➡ | Theory of Computation
Comprehension:
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted.

For the above specified passage, which of the following represents the regular expression?
i ➥ (a+b)*aab
ii ➥ aba(a+b)*
iii ➥ b(a+b)*b(a+b)*a(a+b)*
iv ➥(a+b)*abb(a+b)*
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q93➡ | Theory of Computation
Comprehension:
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted.

For the above mentioned passage which of the following is correct?
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted. 
For the above mentioned passage which of the following is correct?
i ➥ 1
ii ➥ 2
iii ➥ 3
iv ➥4
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q94➡ | Theory of Computation
Comprehension:
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted.

Which of the following represented the minimum state DFA for the above specified passage?
94.	Comprehension: 
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted. 
Which of the following represented the minimum state DFA for the above specified passage
i ➥ 1
ii ➥ 2
iii ➥ 3
iv ➥4
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q95➡ | Theory of Computation
Comprehension:
A machine is represented by states Q, input alphabet ∑, transition function δ. Initial state q and final state F. The machine accepts all the strings over ∑ = {a, b}, which start and ended with any combination of all alphabet and abb works /lies as substring in all the strings to be accepted.

For the above specified passage, which of the following represent the grammar for the language accepted the machine?
i ➥ S→AabbB, A→aA|∈, B→bB|∈
ii ➥ S→abbA, A→aA|∈|bA
iii ➥ S→AabbA, A→aA|bA|∈
iv ➥S→Aabb, A→aA|bA|∈
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q96➡ | Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):
Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):


 
What is the average turnaround time for these Processes with First Come First Serve (FCFS) scheduling Algorithm? 
What is the average turnaround time for these Processes with First Come First Serve (FCFS) scheduling Algorithm?
i ➥ 5.3 ms
ii ➥ 6.4 ms
iii ➥ 7.0 ms
iv ➥ 8.2 ms
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q97➡ | Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):
Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):


 
What is the average turnaround time for these Processes with First Come First Serve (FCFS) scheduling Algorithm? 
Find the average weighted turnaround time for these process using Highest Response Ratio Next (HRN) Algorithm?
i ➥ 3.2 ms
ii ➥ 2.834 ms
iii ➥ 1.632 ms
iv ➥ 6.721 ms
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q98➡ | Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):
Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):


 
What is the average turnaround time for these Processes with First Come First Serve (FCFS) scheduling Algorithm? 
Calculate the average response time for these processes with non-preemptive priority Scheduling algorithm? Priority of the process are as follows and consider that all the processes came at zero (0) time. (Note low numbers represent high priority).
Calculate the average response time for these processes with non-preemptive priority Scheduling algorithm? Priority of the process are as follows and consider that all the processes came at zero (0) time
i ➥ 5.6 ms
ii ➥ 5.2 ms
iii ➥ 4.7 ms
iv ➥ 3.8 ms
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q99➡ | Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):
Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):


 
What is the average turnaround time for these Processes with First Come First Serve (FCFS) scheduling Algorithm?
 What is the average waiting time for these processes with non-preemptive Shortest Job First (SJF) scheduling Algorithm?
i ➥ 3.0 ms
ii ➥ 2.1 ms
iii ➥ 4.6 ms
iv ➥ 3.2 ms
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q100 | Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):
Operating System
Comprehension:
Consider the following set of processes with the arrival time and length of CPU Burst time given in milli-seconds (ms):


 
What is the average turnaround time for these Processes with First Come First Serve (FCFS) scheduling Algorithm?
When we apply Shortest Job First (SJF) scheduling Policy/algorithm, Process (P2) faces partial starvation and waits for the longer time to execute. Which one of the following algorithms addresses this problem?
i ➥ Round Robin
ii ➥ Priority
iii ➥ Highest Response ratio Next
iv ➥ Least Completed next
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?