UGC NET CSA 2014 paper III

UGC NET CSA 2014 paper III

Q1➡ | Computer organization
A hierarchical memory system that uses cache memory has cache access time of 50 nano seconds, main memory access time of 300 nanoseconds, 75% of memory requests are for read, hit ratio of 0.8 for read access and the write-through scheme is used. What will be the average access time of the system both for read and write requests ?
i ➥ 157.5 n.sec.
ii ➥ 110 n.sec.
iii ➥ 75 n.sec.
iv ➥ 82.5 n.sec.

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMemory hierarchyHelp-Line

Q2➡ |
For switching from a CPU user mode to supervisor mode following type of interrupt is most appropriate
i ➥ Internal interrupts
ii ➥ External interrupts
iii ➥ Software interrupts
iv ➥ None of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeInterruptsHelp-Line

Q3➡ |
In a dot matrix printer to print a character is 6 m.sec., time to space in between characters is 2 m.sec., and the number of characters in a line are 200. The printing speed of the dot matrix printer in characters per second and the time to print a character line are given by which of the following options ?
i ➥ 125 chars/second and 0.8 seconds
ii ➥ 250 chars/second and 0.6 seconds
iii ➥ 166 chars/second and 0.8 seconds
iv ➥ 250 chars/second and 0.4 seconds

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraphicsHelp-Line

Q4➡ |
Match the following 8085 instructions with the flags :
i ➥ a-iv, b-i, c-iii, d-ii
ii ➥ a-iii, b-ii, c-i, d-iv
iii ➥ a-ii, b-iii, c-i, d-iv
iv ➥ a-ii, b-iv, c-i, d-iii

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFlagsHelp-Line

Q5➡ |
How many times will the following loop be executed ? LXI B, 0007 H LOP : DCX B MOV A, B ORA C JNZ LOP
i ➥ 05
ii ➥ 07
iii ➥ 09
iv ➥ 00

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMachine instructionsHelp-Line

Q6➡ |
Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085 microprocessor performs addition of 87 H and 79 H.
i ➥ 11, 1, 1, 1
ii ➥ 10, 0, 1, 0
iii ➥ 01, 1, 0, 0
iv ➥ 00, 0, 1, 1

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMicroprocessorHelp-Line

Q7➡ |
Location transparency allows :
I. Users to treat the data as if it is done at one location.
II. Programmers to treat the data as if it is at one location.
III. Managers to treat the data as if it is at one location.
Which one of the following is correct ?
i ➥ I, II and III
ii ➥ I and II only
iii ➥ II and III only
iv ➥ II only

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSecurityHelp-Line

Q8➡ |
Which of the following is correct ?
I. Two phase locking is an optimistic protocol.
II. Two phase locking is pessimistic protocol
III. Time stamping is an optimistic protocol.
IV. Time stamping is pessimistic protocol.
i ➥ I and III
ii ➥ II and IV
iii ➥ I and IV
iv ➥ II and III

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransactionsHelp-Line

Q9➡ |
_____ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information
i ➥ Write-ahead log
ii ➥ Check-pointing
iii ➥ Log buffer
iv ➥ Thomas

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransactionsHelp-Line

Q10➡ |
Let R = ABCDE is a relational scheme with functional dependency set F = {A → B, B → C, AC → D}. The attribute closures of A and E are
i ➥ ABCD,ɸ
ii ➥ ABCD, E
iii ➥ ABCD, E
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFunctional dependencyHelp-Line

Q11➡ |
Consider the following statements :
I. Re-construction operation used in mixed fragmentation satisfies commutative rule.
II. Re-construction operation used in vertical fragmentation satisfies commutative rule
Which of the following is correct
i ➥ I
ii ➥ II
iii ➥ Both are correct
iv ➥ None of the statements are correct

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q12➡ |
Which of the following is false ?
i ➥ Every binary relation is never be in BCNF.
ii ➥ Every BCNF relation is in 3NF.
iii ➥ 1 NF, 2 NF, 3 NF and BCNF are based on functional dependencies.
iv ➥ Multivalued Dependency (MVD) is a special case of Join Dependency (JD).

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNormalizationHelp-Line

Q13➡ |
Which of the following categories of languages do not refer to animation languages ?
i ➥ Graphical languages
ii ➥ General-purpose languages
iii ➥ Linear-list notations
iv ➥ None of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraphicsHelp-Line

Q14➡ |
Match the following :
i ➥ a-ii, b-i, c-iv, d-iii
ii ➥ a-i, b-iv, c-iii, d-ii
iii ➥ a-i, b-ii, c-iii, d-iv
iv ➥ a-iv, b-iii, c-ii, d-i

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeComputer basicsHelp-Line

Q15➡ |
A technique used to approximate halftones without reducing spatial resolution is known as ______.
i ➥ Halftoning
ii ➥ Dithering
iii ➥ Error diffusion
iv ➥ Error diffusion

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDitheringHelp-Line

Q16➡ |
Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45 degrees about a point P(–1, –1). The coordinates of the new triangle obtained after rotation shall be ______
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q17➡ |
In Cyrus-Beck algorithm for line clipping the value of t parameter is computed by the relation :
(Here P1 and P2 are the two end points of the line, f is a point on the boundary, n1 is inner normal)
i ➥ (P1 – fi) × ni / (P2 – P1) × ni
ii ➥ (fi – P1) × ni / (P2 – P1) × ni
iii ➥ (P2 – fi) × ni / (P1 – P2) × ni
iv ➥ (fi – P2) × ni / (P1 – P2) × ni

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCyrus Beck AlgorithmHelp-Line

Q18➡ |
Match the following :
i ➥ a-i, b-iii, c-iv, d-ii
ii ➥ a-ii, b-iii, c-i, d-iv
iii ➥ a-iv, b-ii, c-iii, d-i
iv ➥ a-i, b-ii, c-iii, d-iv

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProjectionsHelp-Line

Q19➡ |
Consider the following statements S1, S2 and S3 :
S1 : In call-by-value, anything that is passed into a function call is unchanged in the caller’s scope when the function returns.
S2 : In call-by-reference, a function receives implicit reference to a variable used as argument.
S3 : In call-by-reference, caller is unable to see the modified variable used as argument.
i ➥ S3 and S2 are true.
ii ➥ S3 and S1 are true.
iii ➥ S2 and S1 are true.
iv ➥ S1, S2, S3 are true.

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFunctionsHelp-Line

Q20➡ |
How many tokens will be generated by the scanner for the following statement ?
x = x * (a + b) – 5;
i ➥ 12
ii ➥ 11
iii ➥ 10
iv ➥ 07

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLexical analyzerHelp-Line

Q21➡ |
Which of the following statements is not true ?
i ➥ MPI_Isend and MPI_Irecv are non-blocking message passing routines of MPI.
ii ➥ MPI_Issend and MPI_Ibsend are non-blocking message passing routines of MPI.
iii ➥ MPI_Send and MPI_Recv are non-blocking message passing routines of MPI.
iv ➥ MPI_Ssend and MPI_Bsend are blocking message passing routines of MPI.

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeInter Process CommunicationHelp-Line

Q22➡ |
Given two languages :
L1 = {(ab)n ak | n > k, k ≥ 0}
L2 = {an bm | n ≠ m}
Using pumping lemma for regular language, it can be shown that
i ➥ L1 is regular and L2 is not regular.
ii ➥ L1 is not regular and L2 is regular.
iii ➥ L1 is regular and L2 is regular.
iv ➥ L1 is not regular and L2 is not regular.

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q23➡ |
Regular expression for the complement of language L = {an bm | n ≥ 4, m ≤ 3} is
i ➥ (a + b)* ba(a + b)*
ii ➥ a* bbbbb*
iii ➥ None of the above
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRegular ExpressionHelp-Line

Q24➡ |
For n devices in a network, ________ number of duplex-mode links are required for a mesh topology.
i ➥ n(n + 1)
ii ➥ n (n – 1)
iii ➥ n(n + 1)/2
iv ➥ n(n – 1)/2

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTopologiesHelp-Line

Q25➡ |
How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)
i ➥ 300
ii ➥ 320
iii ➥ 360
iv ➥ 400

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSynchronous and asynchronous CommunicationHelp-Line

Q26➡ |
Which of the following is not a field in the TCP header ?
i ➥ Sequence number
ii ➥ Fragment offset
iii ➥ Checksum
iv ➥ Window size

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTCPHelp-Line

Q27➡ |
What is the propagation time if the distance between the two points is 48,000 ? Assume the propagation speed to be 2.4 × 108 metre/second in cable.
i ➥ 0.5 ms
ii ➥ 20 ms
iii ➥ 50 ms
iv ➥ 200 ms

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransmission and Propagation DelayHelp-Line

Q28➡ |
_______ is a bit-oriented protocol for communication over point-to-point and multipoint links.
i ➥ Stop-and-wait
ii ➥ HDLC
iii ➥ Sliding window
iv ➥ Go-back-N

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q29➡ |
Which one of the following is true for asymmetric-key cryptography ?
i ➥ Private key is kept by the receiver and public key is announced to the public.
ii ➥ Public key is kept by the receiver and private key is announced to the public.
iii ➥ Both private key and public key are kept by the receiver.
iv ➥ Both private key and public key are kept by the receiver.

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork SecurityHelp-Line

Q30➡ |
Match the following :
i ➥ a-iv, b-ii, c-i, d-iii
ii ➥ a-ii, b-iv, c-i, d-iii
iii ➥ a-iv, b-ii, c-iii, d-i
iv ➥ a-iii, b-ii, c-iv, d-i

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTime ComplexityHelp-Line

Q31➡ |
We can show that the clique problem is NP-hard by proving that
i ➥ CLIQUE ≤ P 3-CNF_SAT
ii ➥ CLIQUE ≤ P VERTEX_COVER
iii ➥ CLIQUE ≤ P SUBSET_SUM
iv ➥ None of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeP-NPHelp-Line

Q32➡ |
Dijkstra algorithm, which solves the single-source shortest–paths problem, is a , and the Floyd-Warshall algorithm, which finds shortest paths between all pairs of vertices, is a
i ➥ Greedy algorithm, Divide-conquer algorithm
ii ➥ Divide-conquer algorithm, Greedy algorithm
iii ➥ Greedy algorithm, Dynamic programming algorithm
iv ➥ Dynamic programming algorithm, Greedy algorithm

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeAlgorithm ParadigmsHelp-Line

Q33➡ |
Consider the problem of a chain < A1, A2, A3> of three matrices. Suppose that the dimensions of the matrices are 10 × 100, 100 × 5 and 5 × 50 respectively. There are two different ways of parenthesization : (i) ((A1 A2)A3) and (ii) (A1(A2 A3)). Computing the product according to the first parenthesization is _______ times faster in comparison to the second parenthesization.
i ➥ 5
ii ➥ 10
iii ➥ 20
iv ➥ 100

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDynamic ProgrammingHelp-Line

Q34➡ |
Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to search for the number 365. Which of the following sequences could not be the sequence of nodes examined ?
i ➥ 4, 254, 403, 400, 332, 346, 399, 365
ii ➥ 926, 222, 913, 246, 900, 260, 364, 365
iii ➥ 927, 204,913, 242, 914, 247, 365
iv ➥ 4, 401, 389, 221, 268, 384, 383, 280, 365

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeBinary Search treeHelp-Line

Q35➡ |
Which methods are utilized to control the access to an object in multi-threaded programming ?
i ➥ Asynchronized methods
ii ➥ Synchronized methods
iii ➥ Serialized methods
iv ➥ None of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMultithreadingHelp-Line

Q36➡ |
How to express that some person keeps animals as pets ?
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubePropertiesHelp-Line

Q37➡ |
Converting a primitive type data into its corresponding wrapper class object instance is called
i ➥ Boxing
ii ➥ Wrapping
iii ➥ Instantiation
iv ➥ Autoboxing

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeClass and objectHelp-Line

Q38➡ |
The behaviour of the document elements in XML can be defined by
i ➥ Using document object
ii ➥ Registering appropriate event handlers
iii ➥ Using element object
iv ➥ All of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeXMLHelp-Line

Q39➡ |
What is true about UML stereotypes ?
i ➥ Stereotype is used for extending the UML language.
ii ➥ Stereotyped class must be abstract
iii ➥ The stereotype indicates that the UML element cannot be changed
iv ➥ UML profiles can be stereotyped for backward compatibility

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeUMLHelp-Line

Q40➡ |
Which method is called first by an applet program ?
i ➥ start( )
ii ➥ run( )
iii ➥ init( )
iv ➥ begin( )

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeJAVAHelp-Line

Q41➡ |
Which one of the following is not a source code metrics ?
i ➥ Halstead metric
ii ➥ Function point metric
iii ➥ Complexity metric
iv ➥ Length metric

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFunctional PointsHelp-Line

Q42➡ |
To compute function points (FP), the following relationship is used
FP = Count – total × (0.65 + 0.01 × Σ(Fi)) where Fi (i = 1 to n) are value adjustment
factors (VAF) based on n questions. The value of n is
i ➥ 12
ii ➥ 14
iii ➥ 16
iv ➥ 18

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q43➡ |
Assume that the software team defines a project risk with 80% probability of occurrence of risk in the following manner :
Only 70 percent of the software components scheduled for reuse will be integrated into the application and the remaining functionality will have to be custom developed. If 60 reusable components were planned with average component size as 100 LOC and software engineering cost for each LOC as $ 14, then the risk exposure would be
i ➥ $ 25,200
ii ➥ $ 20,160
iii ➥ $ 17,640
iv ➥ $ 15,120

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSoftware configuration managementHelp-Line

Q44➡ |
Maximum possible value of reliability is
i ➥ 100
ii ➥ 10
iii ➥ 1
iv ➥ 0

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSoftware ReliabilityHelp-Line

Q45➡ |
‘FAN IN’ of a component A is defined as
i ➥ Count of the number of components that can call, or pass control, to a component A
ii ➥ Number of components related to component A
iii ➥ Number of components dependent on component A
iv ➥ None of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFAN IN AND OUTHelp-Line

Q46➡ |
Temporal cohesion means
i ➥ Coincidental cohesion
ii ➥ Cohesion between temporary variables
iii ➥ Cohesion between local variables
iv ➥ Cohesion with respect to time

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCoupling and CohesionHelp-Line

Q47➡ |
Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed :
i ➥ Magnetic tapes → magnetic disks → optical disks → electronic disks → main memory → cache → registers
ii ➥ Magnetic tapes → magnetic disks → electronic disks → optical disks → main memory → cache → registers
iii ➥ Magnetic tapes → electronic disks → magnetic disks → optical disks → main memory → cache → registers
iv ➥ Magnetic tapes → optical disks → magnetic disks → electronic disks → main memory → cache → registers

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTyes of storage devicesHelp-Line

Q48➡ |
How many disk blocks are required to keep list of free disk blocks in a 16 GB hard disk with 1 kB block size using linked list of free disk blocks ? Assume that the disk block number is stored in 32 bits.
i ➥ 1024 blocks
ii ➥ 16794 blocks
iii ➥ 20000 blocks
iv ➥ 1048576 blocks

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFile systemHelp-Line

Q49➡ |
Consider an imaginary disk with 40 cylinders. A request come to read a block on cylinder 11. While the seek to cylinder 11 is in progress, new requests come in for cylinders 1, 36, 16, 34, 9 and 12 in that order. The number of arm motions using shortest seek first algorithm is
i ➥ 111
ii ➥ 112
iii ➥ 60
iv ➥ 61

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDisk SchedulingHelp-Line

Q50➡ |
An operating system has 13 tape drives. There are three processes P1, P2 & P3. Maximum requirement of P1 is 11 tape drives, P2 is 5 tape drives and P3 is 8 tape drives. Currently, P1 is allocated 6 tape drives, P2 is allocated 3 tape drives and P3 is allocated 2 tape drives. Which of the following sequences represent a safe state ?
i ➥ P2 P1 P3
ii ➥ P2 P3 P1
iii ➥ P1 P2 P3
iv ➥ P1 P3 P2

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDeadlockHelp-Line

Q51➡ |
Monitor is an Interprocess Communication (IPC) technique which can be described as
i ➥ It is higher level synchronization primitive and is a collection of procedures, variables, and data structures grouped together in a special package.
ii ➥ It is a non-negative integer which apart from initialization can be acted upon by wait and signal operations
iii ➥ It uses two primitives, send and receive which are system calls rather than language constructs.
iv ➥ It consists of the IPC primitives implemented as system calls to block the process when they are not allowed to enter critical region to save CPU time.

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeInter Process CommunicationHelp-Line

Q52➡ |
In a distributed computing environment, distributed shared memory is used which is
i ➥ Logical combination of virtual memories on the nodes.
ii ➥ Logical combination of physical memories on the nodes.
iii ➥ Logical combination of the secondary memories on all the nodes.
iv ➥ All of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMemory hierarchyHelp-Line

Q53➡ |
Equivalent logical expression for the Well Formed Formula (WFF),
~(∀x) F[x]
is
i ➥ ∀x (~F[x])
ii ➥ ~(∃x) F[x]
iii ➥ ∃x (~F[x])
iv ➥ ∀x F[x]

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubePropositional logicHelp-Line

Q54➡ |
An A* algorithm is a heuristic search technique which
i ➥ is like a depth-first search where most promising child is selected for expansion
ii ➥ generates all successor nodes and computes an estimate of distance (cost) from start node to a goal node through each of the successors. It then chooses the successor with shortest cost.
iii ➥ saves all path lengths (costs) from start node to all generated nodes and chooses shortest path for further expansion.
iv ➥ none of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeAO* algorithmHelp-Line

Q55➡ |
The resolvent of the set of clauses
(A v B, ~A v D, C v ~B) is
i ➥ A v B
ii ➥ C v D
iii ➥ A v C
iv ➥ A v D

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubePropositional logicHelp-Line

Q56➡ |
Match the following :
i ➥ a-iv, b-ii, c-i, d-iii
ii ➥ a-iv, b-iii, c-ii, d-i
iii ➥ a-ii, b-iii, c-iv, d-i
iv ➥ a-i, b-iii, c-iv, d-ii

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeComputer basicsHelp-Line

Q57➡ |
i ➥ a-i, b-iii, c-iv, d-ii
ii ➥ a-iv, b-iii, c-i, d-ii
iii ➥ a-i, b-iii, c-ii, d-iv
iv ➥ a-iv, b-i, c-iii, d-ii

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeKnowledge representationHelp-Line

Q58➡ |
A computer based information system is needed :
I. as it is difficult for administrative staff to process data.
II. due to rapid growth of information and communication technology.
III. due to the growing size of organizations which need to process large volumes of data.
IV. as timely and accurate decisions are to be taken.
Which of the above statement(s) is/are true ?
i ➥ I and II
ii ➥ III and IV
iii ➥ II and III
iv ➥ II and IV

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMISHelp-Line

Q59➡ |
Given the recursively enumerable language (LRE), the context sensitive language (LCS), the recursive language (LREC), the context free language (LCF) and deterministic context free language (LDCF). The relationship between these families is given by
i ➥ LCF ⊆ LDCF ⊆ LCS ⊆ LRE ⊆ LREC
ii ➥ LCF ⊆ LDCF ⊆ LCS ⊆ LREC ⊆ LRE
iii ➥ LDCF ⊆ LCF ⊆ LCS ⊆ LRE ⊆ LREC
iv ➥ LDCF ⊆ LCF ⊆ LCS ⊆ LREC ⊆ LRE

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLanguages and GrammarsHelp-Line

Q60➡ |
i ➥ a-ii, b-iv, c-iii, d-i
ii ➥ a-ii, b-iv, c-i, d-iii
iii ➥ a-iv, b-i, c-ii, d-iii
iv ➥ a-i, b-iv, c-iii, d-ii

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLanguages and GrammarsHelp-Line

Q61➡ |
According to pumping lemma for context free languages :
Let L be an infinite context free language, then there exists some positive integer m such
that any w ∈ L with | w | ≥ m can be decomposed as w = u v x y z
i ➥ with | vxy | ≤ m such that uvi xyi z ∈ L for all i = 0, 1, 2
ii ➥ with | vxy | ≤ m such that uvi xyi z ∈ L for all i = 0, 1, 2
iii ➥ with | vxy | ≥ m, and | vy | ≤ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….
iv ➥ with | vxy | ≥ m, and | vy | ≥ 1, such that uvi xyi z ∈ L for all i = 0, 1, 2, …….

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeContext Free LanguageHelp-Line

Q62➡ |
Given two spatial masks

The Laplacian of an image at all points (x, y) can be implemented by convolving the image with spatial mask. Which of the following can be used as the spatial mask ?
i ➥ only S1
ii ➥ only S2
iii ➥ Both S1 and S2
iv ➥ None of these

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeConvolutionHelp-Line

Q63➡ |
Given a simple image of size 10 × 10 whose histogram models the symbol probabilities and is given by

The first order estimate of image entropy is maximum when
i ➥ a = 0, b = 0, c = 0, d = 1
ii ➥ a =1/2, b =1/2, c = 0, d = 0
iii ➥ a =1/3, b =1/3, c =1/3, d = 0
iv ➥ a =1/4, b =1/4, c =1/4, d =1/4

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeEntropyHelp-Line

Q64➡ |
A Butterworth lowpass filter of order n, with a cutoff frequency at distance D0 from the origin, has the transfer function H(u, v) given by
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFiltersHelp-Line

Q65➡ |
If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is
i ➥ Optimum
ii ➥ Infeasible
iii ➥ Unbounded
iv ➥ Degenerate

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSimplexHelp-Line

Q66➡ |
The occurrence of degeneracy while solving a transportation problem means that
i ➥ total supply equals total demand
ii ➥ total supply does not equal total demand
iii ➥ the solution so obtained is not feasible
iv ➥ none of these

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransportation ProblemHelp-Line

Q67➡ |
Five men are available to do five different jobs. From past records, the time (in hours) that each man takes to do each job is known and is given in the following table :

Find out the minimum time required to complete all the jobs.
i ➥ 5
ii ➥ 11
iii ➥ 13
iv ➥ 15

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeAssignment ProblemHelp-Line

Q68➡ |
Consider the following statements about a perception :
I. Feature detector can be any function of the input parameters
.
II. Learning procedure only adjusts the connection weights to the output layer.
Identify the correct statement out of the following :
i ➥ I is false and II is false.
ii ➥ I is true and II is false.
iii ➥ I is false and II is true.
iv ➥ I is true and II is true.

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubePerceptronHelp-Line

Q69➡ |
i ➥ a-i, b-ii, c-iii, d-iv
ii ➥ a-i, b-iii, c-ii, d-iv
iii ➥ a-ii, b-iv, c-iii, d-i
iv ➥ a-ii, b-iii, c-iv, d-i

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSupervised and Unsupervised LearningHelp-Line

Q70➡ |
Which of the following versions of Windows O.S. contain built-in partition manager, which allows us to shrink and expand pre-defined drives ?
i ➥ Windows Vista
ii ➥ Windows 2000
iii ➥ Windows NT
iv ➥ Windows 98

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeWindow Operating systemHelp-Line

Q71➡ |
A Trojan horse is
i ➥ A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation.
ii ➥ A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred.
iii ➥ A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
iv ➥ All of the above

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSecurityHelp-Line

Q72➡ |
Which of the following computing models is not an example of distributed computing environment ?
i ➥ Cloud computing
ii ➥ Parallel computing
iii ➥ Cluster computing
iv ➥ Peer-to-peer computing

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDistributed ComputingHelp-Line

Q27➡ |
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I (Marks to all )
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?