Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged ugcnetcse-dec2014-paper3
2
votes
1
answer
31
UGC NET CSE | December 2014 | Part 3 | Question: 45
Assume that the software team defines a project risk with $80$% probability of occurrence of risk in the following manner: Only $70$ percent of the software components scheduled for reuse will be integrated into the application and the remaining functionality ... $25,200 $20,160 $17,640 $15,120
makhdoom ghaya
asked
in
IS&Software Engineering
Jul 29, 2016
by
makhdoom ghaya
8.4k
views
ugcnetcse-dec2014-paper3
is&software-engineering
risk-management
3
votes
2
answers
32
UGC NET CSE | December 2014 | Part 3 | Question: 44
To compute function points $(FP)$, the following relationship is used $FP$ = Count - total $\times (0.65 + 0.01 \times \sum(F_{i}))$ where $F_{i} (i = 1$ to $n$) are value adjustment factors $(VAF)$ based on $n$ questions. The value of $n$ is $12$ $14$ $16$ $18$
makhdoom ghaya
asked
in
IS&Software Engineering
Jul 29, 2016
by
makhdoom ghaya
5.4k
views
ugcnetcse-dec2014-paper3
is&software-engineering
function-point-metric
2
votes
2
answers
33
UGC NET CSE | December 2014 | Part 3 | Question: 43
Which one of the following is not a source code metric ? Halstead metric Function point metric Complexity metric Length metric
makhdoom ghaya
asked
in
IS&Software Engineering
Jul 29, 2016
by
makhdoom ghaya
2.7k
views
ugcnetcse-dec2014-paper3
is&software-engineering
source-code-metric
2
votes
1
answer
34
UGC NET CSE | December 2014 | Part 3 | Question: 42
Which method is called first by an applet program ? start( ) run( ) init( ) begin( )
makhdoom ghaya
asked
in
Java
Jul 28, 2016
by
makhdoom ghaya
1.4k
views
ugcnetcse-dec2014-paper3
java
applet
2
votes
1
answer
35
UGC NET CSE | December 2014 | Part 3 | Question: 41
What is true about $UML$ stereotypes ? Stereotype is used for extending the $UML$ language. Stereotyped class must be abstract The stereotype indicates that the $UML$ element cannot be changed UML profiles can be stereotyped for backward compatibility
makhdoom ghaya
asked
in
IS&Software Engineering
Jul 28, 2016
by
makhdoom ghaya
1.6k
views
ugcnetcse-dec2014-paper3
object-oriented-modelling
uml
1
vote
1
answer
36
UGC NET CSE | December 2014 | Part 3 | Question: 40
The behaviour of the document elements in $XML$ can be defined by Using document object Registering appropriate event handlers Using element object All of the above
makhdoom ghaya
asked
in
Web Technologies
Jul 28, 2016
by
makhdoom ghaya
1.5k
views
ugcnetcse-dec2014-paper3
web-technologies
xml
1
vote
1
answer
37
UGC NET CSE | December 2014 | Part 3 | Question: 39
Converting a primitive type data into its corresponding wrapper class object instance is called Boxing Wrapping Instantiation Autoboxing
makhdoom ghaya
asked
in
Java
Jul 28, 2016
by
makhdoom ghaya
2.6k
views
ugcnetcse-dec2014-paper3
java
wrapper-class-object
2
votes
2
answers
38
UGC NET CSE | December 2014 | Part 3 | Question: 38
How to express that some person keeps animals as pets?
makhdoom ghaya
asked
in
Databases
Jul 28, 2016
by
makhdoom ghaya
3.3k
views
ugcnetcse-dec2014-paper3
databases
er-diagram
1
vote
2
answers
39
UGC NET CSE | December 2014 | Part 3 | Question: 37
Which methods are utilized to control the access to an object in multi-threaded programming ? Asynchronized methods Synchronized methods Serialized methods None of the above
makhdoom ghaya
asked
in
Java
Jul 28, 2016
by
makhdoom ghaya
6.0k
views
ugcnetcse-dec2014-paper3
java
multi-threaded-programming
1
vote
3
answers
40
UGC NET CSE | December 2014 | Part 3 | Question: 36
Suppose that we have numbers between $1$ and $1000$ in a binary search tree and we want to search for the number $365$. Which of the following sequences could not be the sequence of nodes examined ? $4, 254, 403, 400, 332, 346, 399, 365$ ... $927, 204,913, 242, 914, 247, 365$ $4, 401, 389, 221, 268, 384, 383, 280, 365$
makhdoom ghaya
asked
in
Programming in C
Jul 28, 2016
by
makhdoom ghaya
9.6k
views
ugcnetcse-dec2014-paper3
data-structures
binary-search-tree
1
vote
4
answers
41
UGC NET CSE | December 2014 | Part 3 | Question: 35
Consider the problem of a chain $\langle A_{1}, A_{2}, A_{3}\rangle$ of three matrices. Suppose that the dimensions of the matrices are $10 \times 100$, $100 \times 5$ and $5 \times 50$ respectively. There are ... according to the first parenthesization is ______ times faster in comparison to the second parenthesization. $5$ $10$ $20$ $100$
makhdoom ghaya
asked
in
Algorithms
Jul 28, 2016
by
makhdoom ghaya
2.2k
views
ugcnetcse-dec2014-paper3
algorithms
matrix-chain-ordering
1
vote
1
answer
42
UGC NET CSE | December 2014 | Part 3 | Question: 34
Dijkstra algorithm, which solves the single-source shortest--paths problem, is a _______, and the Floyd-Warshall algorithm, which finds shortest paths between all pairs of vertices, is a ________. ... Divide-conquer algorithm, Greedy algorithm Greedy algorithm, Dynamic programming algorithm Dynamic programming algorithm, Greedy algorithm
makhdoom ghaya
asked
in
Algorithms
Jul 28, 2016
by
makhdoom ghaya
3.3k
views
ugcnetcse-dec2014-paper3
algorithms
shortest-path
1
vote
1
answer
43
UGC NET CSE | December 2014 | Part 3 | Question: 33
We can show that the clique problem is $NP$-hard by proving that CLIQUE $\leq$ P 3-CNF_SAT CLIQUE $\leq$ P VERTEX_COVER CLIQUE $\leq$ P SUBSET_SUM None of the above
makhdoom ghaya
asked
in
Algorithms
Jul 28, 2016
by
makhdoom ghaya
3.6k
views
ugcnetcse-dec2014-paper3
algorithms
p-np-npc-nph
1
vote
1
answer
44
UGC NET CSE | December 2014 | Part 3 | Question: 32
Match the following $:$ ... $\text{a-iv, b-ii, c-iii, d-i}$ $\text{a-iii, b-ii, c-iv, d-i}$
makhdoom ghaya
asked
in
Algorithms
Jul 28, 2016
by
makhdoom ghaya
2.0k
views
ugcnetcse-dec2014-paper3
algorithms
time-complexity
3
votes
2
answers
45
UGC NET CSE | December 2014 | Part 3 | Question: 31
Any decision tree that sorts $n$ elements has height $\Omega(n)$ $\Omega(\text{lg}n)$ $\Omega(n \text{lg} n)$ $\Omega(n^2)$
makhdoom ghaya
asked
in
Algorithms
Jul 28, 2016
by
makhdoom ghaya
1.9k
views
ugcnetcse-dec2014-paper3
algorithms
decision-tree
1
vote
1
answer
46
UGC NET CSE | December 2014 | Part 3 | Question: 30
Which one of the following is true for asymmetric-key cryptography ? Private key is kept by the receiver and public key is announced to the public. Public key is kept by the receiver and private key is announced to the public. Both private key and public key are kept by the receiver. Both private key and public key are announced to the public.
makhdoom ghaya
asked
in
Computer Networks
Jul 28, 2016
by
makhdoom ghaya
4.7k
views
ugcnetcse-dec2014-paper3
computer-networks
asymmetric-key-cryptography
2
votes
1
answer
47
UGC NET CSE | December 2014 | Part 3 | Question: 29
________ is a bit-oriented protocol for communication over point-to-point and multipoint links. Stop-and-wait HDLC Sliding window Go-back-N
makhdoom ghaya
asked
in
Computer Networks
Jul 27, 2016
by
makhdoom ghaya
5.3k
views
ugcnetcse-dec2014-paper3
computer-networks
bit-oriented-protocol
1
vote
2
answers
48
UGC NET CSE | December 2014 | Part 3 | Question: 28
What is the propagation time if the distance between the two points is $48,000$ ? Assume the propagation speed to be $2.4 × 10^{8}$ metre/second in cable. $0.5$ ms $20$ ms $50$ ms $200$ ms
makhdoom ghaya
asked
in
Computer Networks
Jul 27, 2016
by
makhdoom ghaya
6.6k
views
ugcnetcse-dec2014-paper3
computer-networks
propagation-time
1
vote
1
answer
49
UGC NET CSE | December 2014 | Part 3 | Question: 27
Which of the following is not a field in $TCP$ header ? Sequence number Fragment offset Checksum Window size
makhdoom ghaya
asked
in
Computer Networks
Jul 27, 2016
by
makhdoom ghaya
4.5k
views
ugcnetcse-dec2014-paper3
computer-networks
tcp-header
4
votes
1
answer
50
UGC NET CSE | December 2014 | Part 3 | Question: 26
How many characters per second ($7$ bits + $1$ parity) can be transmitted over a $3200$ bps line if the transfer is asynchronous ? (Assuming $1$ start bit and $1$ stop bit) $300$ $320$ $360$ $400$
makhdoom ghaya
asked
in
Computer Networks
Jul 27, 2016
by
makhdoom ghaya
6.0k
views
ugcnetcse-dec2014-paper3
computer-networks
data-transmission
asynchronous-transmission
1
vote
1
answer
51
UGC NET CSE | December 2014 | Part 3 | Question: 25
For $n$ devices in a network, ________ number of duplex-mode links are required for a mesh topology. $n(n + 1)$ $n (n – 1)$ $n(n + 1)/2$ $n(n – 1)/2$
makhdoom ghaya
asked
in
Computer Networks
Jul 27, 2016
by
makhdoom ghaya
4.1k
views
ugcnetcse-dec2014-paper3
computer-networks
network-topologies
mesh-topology
1
vote
3
answers
52
UGC NET CSE | December 2014 | Part 3 | Question: 23
Given two languages : $L_{1}=\left\{(ab)^{n} a^{k} | n > k, k \geq 0\right\}$ $L_{2}=\left\{a^{n}b^{m} | n \neq m\right\}$ Using pumping lemma for regular language, it can be shown that $L_{1}$ is regular and $L_{2}$ is not ... and $L_{2}$ is regular. $L_{1}$ is regular and $L_{2}$ is regular. $L_{1}$ is not regular and $L_{2}$ is not regular.
makhdoom ghaya
asked
in
Theory of Computation
Jul 27, 2016
by
makhdoom ghaya
4.9k
views
ugcnetcse-dec2014-paper3
theory-of-computation
regular-language
2
votes
2
answers
53
UGC NET CSE | December 2014 | Part 3 | Question: 22
The pushdown automation $M=(\left\{q_{0}, q_{1}, q_{2}\right\}, \left\{a, b\right\}, \left\{0, 1\right\}, \delta, q_{0}, 0, \left\{q_{0}\right\})$ with $\delta (q_{0}, a, 0)= \left\{(q_{1}, 10)\right\}$ ... $L=\left\{a^{n}b^{m} | n, m > 0\right\}$ $L=\left\{a^{n}b^{n} | n > 0\right\}$
makhdoom ghaya
asked
in
Theory of Computation
Jul 27, 2016
by
makhdoom ghaya
2.4k
views
ugcnetcse-dec2014-paper3
theory-of-computation
pushdown-automata
2
votes
1
answer
54
UGC NET CSE | December 2014 | Part 3 | Question: 21
Which of the following statements is not true ? MPI_Isend and MPI_Irecv are non-blocking message passing routines of MPI. MPI_Issend and MPI_Ibsend are non-blocking message passing routines of MPI. MPI_Send and MPI_Recv are non-blocking message passing routines of MPI. MPI_Ssend and MPI_Bsend are blocking message passing routines of MPI.
makhdoom ghaya
asked
in
Others
Jul 27, 2016
by
makhdoom ghaya
2.0k
views
ugcnetcse-dec2014-paper3
8
votes
1
answer
55
UGC NET CSE | December 2014 | Part 3 | Question: 20
How many tokens will be generated by the scanner for the following statement ? $x = x ∗ (a + b) - 5$; $12$ $11$ $10$ $07$
makhdoom ghaya
asked
in
Compiler Design
Jul 25, 2016
by
makhdoom ghaya
4.0k
views
ugcnetcse-dec2014-paper3
compiler-design
lexical-analysis
2
votes
2
answers
56
UGC NET CSE | December 2014 | Part 3 | Question: 19
Consider the following statements $S1, S2$ and $S3$: $S1$: In call-by-value, anything that is passed into a function call is unchanged in the caller's scope when the function returns. $S2$: In call-by-reference, a function receives implicit reference to a ... $S3$ and $S1$ are true. $S2$ and $S1$ are true. $S1, S2, S3$ are true.
makhdoom ghaya
asked
in
Compiler Design
Jul 25, 2016
by
makhdoom ghaya
2.8k
views
ugcnetcse-dec2014-paper3
compiler-design
runtime-environment
parameter-passing
2
votes
1
answer
57
UGC NET CSE | December 2014 | Part 3 | Question: 18
Match the following $:$ ... $\text{a-iv, b-ii, c-iii, d-i}$ $\text{a-i, b-ii, c-iii, d-iv}$
makhdoom ghaya
asked
in
Computer Graphics
Jul 25, 2016
by
makhdoom ghaya
3.2k
views
ugcnetcse-dec2014-paper3
computer-graphics
projection
non-gate
1
vote
2
answers
58
UGC NET CSE | December 2014 | Part 3 | Question: 17
In Cyrus-Beck algorithm for line clipping the value of $t$ parameter is computed by the relation: (Here $P_{1}$ and $P_{2}$ are the two end points of the line, $f$ is a point on the boundary, $n_{1}$ ... $\frac{(f_{i}-P_{2}).n_{i}}{(P_{1}-P_{2}).n_{i}}$
makhdoom ghaya
asked
in
Computer Graphics
Jul 25, 2016
by
makhdoom ghaya
2.1k
views
ugcnetcse-dec2014-paper3
non-gate
computer-graphics
line-clipping
2
votes
1
answer
59
UGC NET CSE | December 2014 | Part 3 | Question: 16
Consider a triangle represented by $A(0, 0), B(1, 1), C(5, 2)$. The triangle is rotated by $45$ degrees about a point $P(-1, -1)$ ...
makhdoom ghaya
asked
in
Geometry
Jul 25, 2016
by
makhdoom ghaya
1.6k
views
ugcnetcse-dec2014-paper3
geometry
non-gate
2
votes
1
answer
60
UGC NET CSE | December 2014 | Part 3 | Question: 15
A technique used to approximate halftones without reducing spatial resolution is known as________. Halftoning Dithering Error diffusion None of the above
makhdoom ghaya
asked
in
Computer Graphics
Jul 25, 2016
by
makhdoom ghaya
1.8k
views
ugcnetcse-dec2014-paper3
computer-graphics
non-gate
Page:
« prev
1
2
3
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
(3.5k)
Engineering Mathematics
(10.4k)
Digital Logic
(3.6k)
Programming and DS
(6.2k)
Algorithms
(4.8k)
Theory of Computation
(6.9k)
Compiler Design
(2.5k)
Operating System
(5.2k)
Databases
(4.8k)
CO and Architecture
(4.0k)
Computer Networks
(4.9k)
Artificial Intelligence
(79)
Machine Learning
(48)
Data Mining and Warehousing
(25)
Non GATE
(1.4k)
Others
(2.7k)
Admissions
(684)
Exam Queries
(1.6k)
Tier 1 Placement Questions
(17)
Job Queries
(80)
Projects
(11)
Unknown Category
(870)
64.3k
questions
77.9k
answers
244k
comments
80.0k
users
Recent questions tagged ugcnetcse-dec2014-paper3
Recent Blog Comments
category ?
Hi @Arjun sir, I have obtained a score of 591 in ...
download here
Can you please tell about IIT-H mtech CSE self...
Please add your admission queries here:...