Ugcnet
Ugcnet
Table of Contents 1
Contributors 16
1 Algorithms (99) 17
1.1 Activity Selection Problem (1) 20
1.2 Algorithm Design Techniques (1) 20
1.3 Algorithm Efficiency (1) 20
1.4 Algorithms Sorting (1) 20
1.5 Arrays (2) 20
1.6 Artificial Intelligence (2) 21
1.7 Asymptotic Notations (7) 21
1.8 B Tree (2) 22
1.9 Binary Search Tree (1) 22
1.10 Binary Tree (4) 22
1.11 Branch And Bound (1) 23
1.12 Decision Tree (1) 23
1.13 Dfs (2) 23
1.14 Dijkstras Algorithm (1) 24
1.15 Double Hashing (1) 24
1.16 Dynamic Programming (3) 24
1.17 Graph Algorithms (3) 24
1.18 Greedy Algorithms (1) 25
1.19 Hashing (1) 25
1.20 Heap (1) 25
1.21 Huffman Code (2) 26
1.22 In Place Algo (1) 26
1.23 Knapsack (2) 26
1.24 Linear Search (1) 26
1.25 Longest Common Subsequence (1) 27
1.26 Matrix Chain Ordering (3) 27
1.27 Optimal Search Tree (1) 27
1.28 Optimal Solution (1) 28
1.29 P Np Npc Nph (3) 28
1.30 Parenthesization (1) 28
1.31 Quicksort (1) 29
1.32 Recurrence (6) 29
1.33 Recursion (2) 30
1.34 Red Black Tree (1) 30
1.35 Shortest Path (2) 30
1.36 Sorting (5) 30
1.37 Space Complexity (1) 31
1.38 Time Complexity (8) 31
1.39 Tree Search Algorithm (1) 33
1.40 Tree Traversal (1) 33
1.41 Tree Traversals (1) 33
1.42 Trees (2) 33
Answer Keys 33
2 CO and Architecture (105) 35
2.1 8085 Microprocessor (6) 35
2.2 Accumultor (1) 37
2.3 Addressing Modes (11) 37
2.4 Amdahls Law (1) 39
2.5 Assembly (13) 39
2.6 Byte Addressable (1) 41
2.7 Cache Memory (4) 41
2.8 Cmos (1) 42
2.9 Co And Architecture (9) 42
2.10 Computer Architecture (3) 44
2.11 Control Unit (2) 44
2.12 Cpu (1) 45
2.13 Data Transfer (1) 45
2.14 Disks (1) 45
2.15 Dma (1) 45
2.16 Dynamic Ram (1) 45
2.17 Flags (1) 45
2.18 Hardware Interrupt (1) 46
2.19 Instruction Format (1) 46
2.20 Integrated Circuits (1) 46
2.21 Interrupts (4) 46
2.22 Language (1) 47
2.23 Machine Instructions (2) 47
2.24 Macros (1) 47
2.25 Memory (4) 47
2.26 Memory Data Transfer (1) 48
2.27 Microprocessors (12) 48
2.28 Microprogram Control Unit (1) 50
2.29 Parallel Computing (1) 50
2.30 Parallel Processing (1) 50
2.31 Pipelining (4) 50
2.32 Priority Encoder (1) 51
2.33 Processor Address Bus (1) 51
2.34 Register (1) 51
2.35 Runtime Environments (1) 51
2.36 Speedup (1) 52
2.37 Tlb (1) 52
Answer Keys 52
3 Compiler Design (68) 53
3.1 Code Optimization (1) 57
3.2 Compilation Phases (1) 57
3.3 Compiler (1) 57
3.4 Compiler Optimization (2) 57
3.5 Constant Folding (1) 58
3.6 Control Flow Graph (1) 58
3.7 Grammar (4) 58
3.8 Infix Prefix (1) 59
3.9 Intermediate Code (1) 59
3.10 Lexical Analysis (3) 59
3.11 Linker (1) 60
3.12 Lr Parser (2) 60
3.13 Machine Instructions (1) 60
3.14 Parameter Passing (1) 60
3.15 Parsing (12) 61
3.16 Quadruple Representation (1) 63
3.17 Runtime Environments (1) 63
3.18 Shift Reduce Parser (2) 63
3.19 Symbol Table (3) 64
3.20 System Software& Compilers (1) 64
3.21 Translator (1) 64
3.22 Two Pass Assembler (1) 64
Answer Keys 65
4 Computer Networks (290) 66
4.1 Analog & Digital Transmission (1) 74
4.2 Analog Signals (1) 74
4.3 Application Layer (1) 75
4.4 Asymmetric Key Cryptography (1) 75
4.5 Binary Search Tree (1) 75
4.6 Binary Symmetric Channel (1) 75
4.7 Bit Oriented Protocol (1) 75
4.8 Bit Rate (1) 75
4.9 Bridges (1) 76
4.10 Cache Memory (1) 76
4.11 Checksum (1) 76
4.12 Classful Addressing (2) 76
4.13 Classless Addressing (1) 76
4.14 Communication (9) 77
4.15 Computer Neworks (1) 78
4.16 Crc Polynomial (2) 78
4.17 Cryptography (7) 78
4.18 Data Communication (7) 80
4.19 Data Link Layer (7) 81
4.20 Data Mining Algorithm (1) 82
4.21 Data Transmission (1) 82
4.22 Distance Vector Routing (1) 82
4.23 Edi Layers (1) 82
4.24 Electronic Payment Systems (1) 83
4.25 Encoding (2) 83
4.26 Encryption Decryption (2) 83
4.27 Entropy (1) 83
4.28 Error Correction (3) 83
4.29 Error Detection Correction (1) 84
4.30 Ethernet (5) 84
4.31 Firewall (1) 85
4.32 Hamming Code (3) 85
4.33 Hamming Distance (1) 85
4.34 Huffman Code (1) 85
4.35 Internal Memory (1) 85
4.36 Internet Security (1) 86
4.37 Internet Stack Layers (1) 86
4.38 Ip Addressing (10) 86
4.39 Ip Packet (2) 87
4.40 Ipv6 (1) 87
4.41 Lan Technologies (2) 88
4.42 Link State Routing (1) 88
4.43 Loopback Address (1) 88
4.44 Mesh Topology (3) 88
4.45 Mobile Communication (7) 89
4.46 Modulation (2) 90
4.47 Multimedia Protocol (1) 90
4.48 Multiple Access Protocol (1) 90
4.49 Multiplexing (2) 91
4.50 Network Addressing (2) 91
4.51 Network Layer (1) 91
4.52 Network Layering (5) 91
4.53 Network Protocols (10) 92
4.54 Network Security (16) 94
4.55 Network Switching (5) 96
4.56 Network Topologies (4) 97
4.57 Osi Model (11) 98
4.58 Osi Protocol (5) 99
4.59 Physical Layer (4) 100
4.60 Port Numbers (1) 101
4.61 Propagation Delay (1) 101
4.62 Propagation Time (1) 101
4.63 Protocol (1) 101
4.64 Pure Aloha (1) 102
4.65 Rarp Protocol (1) 102
4.66 Routers Bridge Hubs Switches (2) 102
4.67 Routing (4) 102
4.68 Routing Algorithm (3) 103
4.69 Rsa (1) 103
4.70 Rsa Public Key (1) 103
4.71 Rsa Security Networks (2) 104
4.72 Serial Communication (2) 104
4.73 Session Layer (1) 104
4.74 Signalling (1) 104
4.75 Signals (1) 105
4.76 Sliding Window (4) 105
4.77 Slotted Aloha (1) 105
4.78 Subnetting (1) 106
4.79 Tcp (4) 106
4.80 Tcp Header (1) 106
4.81 Tcp Ip Model (1) 106
4.82 Tcp Ip Suit Protocols (1) 107
4.83 Tele Communication (1) 107
4.84 Token Bucket (1) 107
4.85 Transmission Media (9) 107
4.86 Transport Layer (2) 108
4.87 Unguided Media (1) 109
4.88 Wifi (1) 109
4.89 Wireless Communication (1) 109
4.90 Wireless Lan (4) 109
4.91 Wireless Networks (1) 110
4.92 Wireless Protocol (1) 110
4.93 Wireless Transmission (1) 110
Answer Keys 110
5 Databases (176) 113
5.1 Aggregation (2) 118
5.2 B Tree (3) 119
5.3 B+tree (1) 119
5.4 Candidate Keys (4) 119
5.5 Cardinality Ratio (1) 120
5.6 Circular Queue (1) 120
5.7 Concurrency Control Protocols (1) 121
5.8 Crosstabquery (1) 121
5.9 Data Dependences (2) 121
5.10 Data Integrity (1) 121
5.11 Data Mining (2) 122
5.12 Data Model (2) 122
5.13 Database Constraints (1) 122
5.14 Database Design (1) 122
5.15 Database Normalization (23) 123
5.16 Decomposition (3) 126
5.17 Dependency Preserving (1) 127
5.18 Distributed Databases (2) 127
5.19 Enhanced Er Model (1) 128
5.20 Er Diagram (15) 128
5.21 File System (1) 130
5.22 Generalization (1) 131
5.23 Granularity (1) 131
5.24 Hierarchical Database (1) 131
5.25 Indexing (2) 131
5.26 Java (1) 131
5.27 Joins (1) 131
5.28 Object Oriented Database (2) 132
5.29 Protocol (1) 133
5.30 Rdbms (9) 133
5.31 Recovery From Failure (1) 134
5.32 Referential Integrity (2) 135
5.33 Relation (2) 135
5.34 Relational Algebra (3) 135
5.35 Relational Calculus (2) 136
5.36 Relational Model (2) 137
5.37 Relational Schema (1) 137
5.38 Relations (1) 137
5.39 Sql (31) 138
5.40 Transaction And Concurrency (9) 146
5.41 Transactions And Concurrency Control (1) 148
5.42 Tree (1) 148
5.43 Weak Entity (1) 148
Answer Keys 149
6 Digital Logic (104) 150
6.1 Adder (3) 152
6.2 Boolean Algebra (9) 153
6.3 Boolean Function (1) 154
6.4 Circuit Output (2) 154
6.5 Combinational Circuits (3) 155
6.6 Digital Circuits (11) 155
6.7 Digital Counter (2) 157
6.8 Dual Function (2) 158
6.9 Encoding (1) 158
6.10 Excess 3 (1) 158
6.11 Flip Flop (7) 158
6.12 Floating Point Representation (1) 159
6.13 Full Adder (1) 159
6.14 Ieee Representation (2) 160
6.15 K Map (3) 160
6.16 Logic Circuit Diagram (1) 161
6.17 Memory (1) 161
6.18 Multiplexer (4) 161
6.19 Number Representation (12) 162
6.20 Number System (6) 163
6.21 Number Theory (1) 164
6.22 Priority Encoder (1) 164
6.23 Ripple Counter Operation (3) 164
6.24 Rom (1) 165
6.25 Sequential Circuit (6) 165
6.26 Sum Of Product (1) 166
6.27 Unix (1) 166
Answer Keys 166
7 Discrete Mathematics: Combinatory (14) 168
7.1 Binary Tree (1) 168
7.2 Counting (2) 168
7.3 Discrete Mathematics (2) 169
7.4 Euler Phi Function (1) 169
7.5 Inclusion Exclusion (1) 169
7.6 Pigeonhole Principle (1) 169
7.7 Recurrence (1) 170
Answer Keys 170
8 Discrete Mathematics: Graph Theory (46) 171
8.1 Binary Tree (1) 174
8.2 Discrete Mathematics (2) 174
8.3 Euler Graph (2) 174
8.4 Flow Network (1) 175
8.5 Graph (1) 175
8.6 Graph Coloring (2) 175
8.7 Graph Connectivity (8) 176
8.8 Graph Isomorphism (1) 177
8.9 Graph Planarity (2) 177
8.10 Hamiltonian Graph (1) 178
8.11 Handshaking Theorem (1) 178
8.12 Minimum Spanning Trees (1) 178
8.13 Non Planar (1) 178
8.14 Trees (2) 178
Answer Keys 179
9 Discrete Mathematics: Mathematical Logic (30) 180
9.1 Discrete Mathematics (2) 182
9.2 First Order Logic (2) 182
9.3 Functions (1) 183
9.4 Prolog (1) 183
9.5 Propositional Logic (11) 183
Answer Keys 185
10 Discrete Mathematics: Set Theory & Algebra (22) 187
10.1 Boolean (1) 187
10.2 Complement In Fuzzy Set (1) 187
10.3 Discrete Mathematics (1) 188
10.4 Euler Phi Function (1) 188
10.5 Factors (2) 188
10.6 Function Composition (1) 188
10.7 Functions (4) 188
10.8 Inclusion Exclusion (1) 189
10.9 Poset (1) 189
10.10 Power Set (1) 190
10.11 Relational Algebra (1) 190
10.12 Relations (4) 190
Answer Keys 191
11 Engineering Mathematics: Discrete Mathematics (49) 192
11.1 Boolean Function (1) 192
11.2 Discrete Mathematics (19) 192
11.3 Equivalence Classes (1) 195
11.4 First Order Logic (5) 195
11.5 Functions (2) 196
11.6 Group Theory (2) 196
11.7 Linear Programming (1) 197
11.8 Number Representation (1) 197
11.9 Partial Order (2) 197
11.10 Propositional Logic (9) 197
11.11 Quantifiers (1) 199
11.12 Relations (2) 200
11.13 Sets (3) 200
Answer Keys 200
12 Engineering Mathematics: Linear Algebra (1) 202
Answer Keys 202
13 Engineering Mathematics: Probability (11) 203
13.1 Binary Tree (1) 203
13.2 Poisson Distribution (1) 203
13.3 Probability (8) 203
Answer Keys 204
14 General Aptitude: Quantitative Aptitude (25) 205
14.1 Data Interpretation (5) 205
14.2 Number System (1) 206
14.3 Percentage (1) 207
14.4 Quadratic Equations (1) 207
14.5 Quantitative Aptitude (16) 207
Answer Keys 210
15 General Aptitude: Verbal Aptitude (8) 211
15.1 Logical Reasoning (2) 211
15.2 Quantitative Aptitude (2) 212
Answer Keys 212
16 Non GATE: Artificial Intelligence (44) 213
16.1 Artificial Intelligence (14) 213
16.2 Artificial Neural Network (1) 216
16.3 Back Propagation (1) 216
16.4 Blocks World Problem (1) 216
16.5 Chaining (1) 216
16.6 Expert System (2) 216
16.7 Fuzzy Logic (1) 216
16.8 Genetic Algorithms (1) 217
16.9 Heuristic Search (1) 217
16.10 Linear Programming (1) 217
16.11 Machine Learning (4) 217
16.12 Map Coloring (1) 218
16.13 Means End (1) 218
16.14 Minimax Procedure (1) 218
16.15 Neural Network (4) 219
16.16 Planning (1) 219
16.17 Prolog (2) 220
16.18 Reinforcement Learning (1) 220
16.19 Searches (1) 220
16.20 Sigmoid Function (1) 221
16.21 Strips (1) 221
Answer Keys 221
17 Non GATE: Big Data Systems (1) 222
17.1 Big Data Systems (1) 222
Answer Keys 222
18 Non GATE: Cloud Computing (1) 223
18.1 Cloud Computing (1) 223
Answer Keys 223
19 Non GATE: Computer Graphics (80) 224
19.1 2d Geometry (1) 224
19.2 2d Transformation (1) 224
19.3 3d Graphics (2) 224
19.4 3d Rotation (1) 224
19.5 Animation (1) 225
19.6 Anti Aliasing (1) 225
19.7 Breshenmans Algorithm (1) 225
19.8 Color Models (1) 225
19.9 Computer Graphics (38) 225
19.10 Crt (2) 233
19.11 Digital Image Processing (5) 233
19.12 Display Devices (1) 234
19.13 Frame Buffer (1) 234
19.14 Halftoning (1) 234
19.15 Image Compression (1) 235
19.16 Image Entropy (1) 235
19.17 Line Clipping (1) 235
19.18 Line Drawing Algorithm (3) 235
19.19 Parametric Line Equation (1) 236
19.20 Phong Color Model (1) 236
19.21 Projection (8) 236
19.22 Raster Graphics (2) 238
19.23 Resolution (1) 238
19.24 Rotation (2) 238
19.25 Transformation (2) 239
Answer Keys 239
20 Non GATE: Computer Peripherals (3) 240
20.1 Computer Peripherals (1) 240
20.2 Io Devices (1) 240
20.3 Matrix Printer (1) 240
Answer Keys 240
21 Non GATE: Data Mining and Warehousing (16) 241
21.1 Data Cube (1) 241
21.2 Data Mining (1) 241
21.3 Data Mining And Warehousing (1) 241
21.4 Decision Tree (1) 241
21.5 Expert System (1) 241
21.6 Fuzzy Sets (1) 242
21.7 Group Decision Support System (1) 242
21.8 K Means Clustering (1) 242
21.9 Knowledge Representation (5) 242
21.10 Olap (1) 243
21.11 Perceptron (1) 243
Answer Keys 244
22 Non GATE: Digital Image Processing (8) 245
22.1 Discovolution (1) 245
22.2 Entropy (2) 245
22.3 Fourier Transform (1) 245
22.4 Image Compression (4) 245
Answer Keys 246
23 Non GATE: Digital Signal Processing (4) 247
23.1 Butterworth Lowpass Filter (1) 247
23.2 Digital Signal Processing (1) 247
23.3 Discrete Memoryless Channel (1) 247
23.4 Spatial Mask (1) 247
Answer Keys 247
24 Non GATE: Distributed Computing (11) 248
24.1 Computing Models (1) 248
24.2 Distributed Computing (3) 248
24.3 Distributed Databases (2) 248
24.4 Distributed System (2) 249
24.5 Message Passing (1) 249
24.6 Parallel Virtual Machine (1) 249
24.7 Rpc (1) 249
Answer Keys 250
25 Non GATE: Geometry (2) 251
25.1 Geometry (1) 251
25.2 Lines Curves (1) 251
Answer Keys 251
26 Non GATE: Integrated Circuits (1) 252
26.1 Integrated Circuits (1) 252
Answer Keys 252
27 Non GATE: IS&Software Engineering (210) 253
27.1 Adaptive Maintenance (1) 256
27.2 Artificial Intelligence (2) 256
27.3 Assignment Problem (1) 257
27.4 Cmm Model (3) 257
27.5 Cmmi (1) 258
27.6 Cocomo Model (3) 258
27.7 Coding And Testing (1) 258
27.8 Cohesion (2) 259
27.9 Cost Estimation Model (2) 259
27.10 Coupling (3) 259
27.11 Coupling Cohesion (1) 260
27.12 Crc Polynomial (1) 260
27.13 Cyclomatic Complexity (3) 260
27.14 Data Mining (2) 261
27.15 Digital Marketing (1) 261
27.16 Dual Linear Programming (1) 262
27.17 Fan In (1) 262
27.18 Flow Chart (1) 262
27.19 Function Point Metric (2) 262
27.20 Git (1) 262
27.21 Information System (1) 262
27.22 Is&software Engineering (60) 263
27.23 Life Cycle Model (1) 274
27.24 Linear Programming (1) 274
27.25 Mis (1) 274
27.26 Model View Controller (1) 274
27.27 Object Oriented Modelling (1) 274
27.28 Project Planning (1) 274
27.29 Project Tracking (1) 275
27.30 Risk Management (3) 275
27.31 Size Metrices (1) 275
27.32 Software (1) 276
27.33 Software Configuration (1) 276
27.34 Software Cost Estimation (1) 276
27.35 Software Design (14) 276
27.36 Software Development (3) 279
27.37 Software Development Life Cycle Models (11) 279
27.38 Software Development Models (1) 281
27.39 Software Intergrity (1) 282
27.40 Software Maintenance (2) 282
27.41 Software Metrics (3) 282
27.42 Software Process (1) 283
27.43 Software Quality Assurance (2) 283
27.44 Software Quality Characteristics (1) 283
27.45 Software Reliability (8) 283
27.46 Software Requirement Specification (1) 284
27.47 Software Requirement Specifications (1) 285
27.48 Software Reuse (1) 285
27.49 Software Testing (23) 285
27.50 Software Validation (1) 288
27.51 Source Code Metric (1) 288
27.52 Uml (1) 289
27.53 Validation (1) 289
27.54 Waterfall Model (2) 289
27.55 White Box Testing (1) 289
Answer Keys 290
28 Non GATE: Java (11) 292
28.1 Abstract Method (1) 292
28.2 Applet (1) 292
28.3 Java (4) 292
28.4 Method Overriding (1) 293
28.5 Multi Threaded Programming (1) 293
28.6 Oops (1) 293
28.7 Servlet (1) 293
28.8 Wrapper Class Object (1) 294
Answer Keys 294
29 Non GATE: Numerical Methods (3) 295
29.1 Hungarian Method (1) 295
29.2 Operation Research Pert Cpm (1) 295
29.3 Simplex Method (1) 295
Answer Keys 295
30 Non GATE: Object Oriented Programming (59) 296
30.1 Abstract Class (2) 296
30.2 C++ (2) 296
30.3 Class (1) 297
30.4 Composition (1) 297
30.5 Constructor (3) 297
30.6 Cpp (1) 298
30.7 Final (1) 298
30.8 Friend Class (1) 298
30.9 Friend Function (2) 298
30.10 Inheritance (3) 299
30.11 Java (10) 299
30.12 Object Oriented Programming (24) 301
30.13 Operator Overloading (1) 305
30.14 Programming In C (1) 306
30.15 Software Design (1) 306
30.16 Template Vs Macro (1) 306
30.17 Windows (1) 306
Answer Keys 306
31 Non GATE: Optimization (17) 308
31.1 Assignment Problem (2) 308
31.2 Linear Programming (7) 308
31.3 Linear Programming Problem (1) 309
31.4 Optimization (2) 309
31.5 Transportation Problem (5) 310
Answer Keys 311
32 Non GATE: Others (51) 312
32.1 3 Puzzle (1) 313
32.2 Alpha Beta Pruning (1) 313
32.3 Alpha Cut (1) 313
32.4 Application Software (1) 313
32.5 Bigdata Hadoop (1) 314
32.6 Convex Optimization (1) 314
32.7 Data Mining (2) 314
32.8 Data Warehousing (4) 315
32.9 Debugger (1) 315
32.10 Defuzzification (1) 316
32.11 Encryption Decryption (1) 316
32.12 Fuzzy Relation (1) 316
32.13 Fuzzy Sets (5) 316
32.14 Hill Climbing Search (1) 317
32.15 Inventory (1) 318
32.16 K Mean Clustering (1) 318
32.17 Linear Programming (1) 318
32.18 Llp (1) 318
32.19 Machine Learning (1) 318
32.20 Operational Research (2) 319
32.21 Searching (1) 319
32.22 Shell (1) 319
32.23 Shell Script (2) 319
32.24 Simplex Method (2) 320
32.25 System Software& Compilers (1) 320
32.26 Transportation Problem (1) 320
32.27 Unified Modeling Language (1) 321
32.28 Unix (5) 321
32.29 Windows (1) 322
Answer Keys 322
33 Non GATE: Web Technologies (32) 323
33.1 Activex (1) 323
33.2 Client Server Application (1) 323
33.3 Data Warehousing (1) 323
33.4 E Commerce (1) 323
33.5 Edi Layers (2) 323
33.6 Html (5) 324
33.7 Javascript (2) 324
33.8 Transmission Media (1) 325
33.9 Trojan Horse (1) 325
33.10 Web Technologies (8) 325
33.11 Xml (7) 327
33.12 Xsl (1) 328
Answer Keys 328
34 Operating System (227) 329
34.1 Applications In Windows (1) 335
34.2 Bankers Algorithm (1) 335
34.3 Binary Semaphore (1) 335
34.4 Context Switch (1) 335
34.5 Counting Semaphores (1) 335
34.6 Critical Section (1) 335
34.7 Deadlock (2) 336
34.8 Deadlock Prevention Avoidance Detection (6) 336
34.9 Delay (1) 337
34.10 Demand Paging (1) 337
34.11 Dijkstras Bankers Algorithm (1) 337
34.12 Directory Structure (1) 338
34.13 Disk Cpu Memory Interrupt (1) 338
34.14 Disk Scheduling (9) 338
34.15 Disks (7) 340
34.16 Distributed Computing (1) 341
34.17 Distributed System (1) 341
34.18 Dynamic Linking (1) 341
34.19 File System (7) 341
34.20 Fragmentation (1) 342
34.21 Hit Ratio (1) 343
34.22 Input Output (2) 343
34.23 Interrupts (2) 344
34.24 Io Handling (2) 344
34.25 Java (1) 344
34.26 Linux (1) 344
34.27 Lru (2) 345
34.28 Memory Management (8) 345
34.29 Mmu (1) 346
34.30 Monitors (1) 347
34.31 Multiprogramming Os (1) 347
34.32 Mutual Exclusion (1) 347
34.33 Os Protection (2) 347
34.34 Page Fault (6) 347
34.35 Page Replacement (5) 349
34.36 Paging (8) 349
34.37 Pipelining (1) 351
34.38 Process (2) 351
34.39 Process Model (2) 351
34.40 Process Scheduling (21) 351
34.41 Process Synchronization (2) 355
34.42 Ram (1) 356
34.43 Resource Allocation (3) 356
34.44 Runtime Environments (1) 357
34.45 Scheduling (4) 357
34.46 Seek Latency (1) 358
34.47 Semaphores (4) 358
34.48 Shell Script (7) 359
34.49 Sjf (1) 360
34.50 Sstf (1) 360
34.51 Storage Devices (1) 360
34.52 System Call (2) 361
34.53 System Reliability (1) 361
34.54 Threads (5) 362
34.55 Tlb (2) 362
34.56 Transaction And Concurrency (1) 363
34.57 Unix (25) 363
34.58 Virtual Memory (8) 367
34.59 Vsam (1) 369
34.60 Windows (5) 369
Answer Keys 369
35 Others: Others (709) 372
35.1 Acid Properties (1) 462
35.2 Artificial Intelligence (1) 463
35.3 Assembly (1) 463
35.4 Binary Codes (1) 463
35.5 Binary Tree (1) 463
35.6 Boolean Algebra (1) 463
35.7 Compilation Phases (1) 464
35.8 Crypt Arithmetic (1) 464
35.9 Data Compression (1) 464
35.10 Data Flow Diagram (1) 464
35.11 Data Mart (1) 464
35.12 Data Mining (4) 464
35.13 Data Structures (1) 465
35.14 Data Warehousing (2) 465
35.15 Decomposition (1) 465
35.16 Digital Image Processing (3) 466
35.17 Disk Scheduling (1) 466
35.18 Disks (1) 466
35.19 Duality (1) 466
35.20 E Commerce (2) 467
35.21 E Payment (1) 467
35.22 E Technologies (3) 467
35.23 Encryption Decryption (2) 467
35.24 Enterprise Resource Planning (2) 468
35.25 Er Diagram (1) 468
35.26 File System (1) 468
35.27 Fuzzy Logic (2) 469
35.28 Fuzzy Relations (1) 469
35.29 Fuzzy Sets (2) 469
35.30 General Awareness (33) 470
35.31 Geographical Information System (1) 476
35.32 Hard Disk Drive (1) 476
35.33 Hashing (3) 477
35.34 Image Compression (1) 477
35.35 Information System (1) 477
35.36 Interpreter (1) 477
35.37 Is&software Engineering (1) 477
35.38 Java (1) 478
35.39 Job (1) 478
35.40 Linear Programming (3) 478
35.41 Linker (2) 479
35.42 Linux (1) 479
35.43 Management Information System (2) 479
35.44 Microprocessors (2) 480
35.45 Minimum Spanning Trees (1) 480
35.46 Mis (1) 480
35.47 Mobile Communication (2) 480
35.48 Multiple Document Interface (1) 481
35.49 Natural Join (1) 481
35.50 Natural Language Processing (1) 481
35.51 Network Switching (1) 481
35.52 Neural Network (6) 482
35.53 Oops Concept (1) 483
35.54 Operator Overloading (1) 483
35.55 Pipelining (1) 483
35.56 Process Scheduling (2) 483
35.57 Prolog (1) 483
35.58 Quadratic Equations (1) 484
35.59 Queue (1) 484
35.60 Rdbms (2) 484
35.61 Relations (1) 484
35.62 Semantic Nets (1) 485
35.63 Shell (1) 485
35.64 Single Layer Perceptron (1) 485
35.65 Software Development Life Cycle Models (1) 485
35.66 Software Engineering Framework (1) 485
35.67 Software Testing (1) 486
35.68 Sql (4) 486
35.69 System Software Compilers (1) 486
35.70 Transaction And Concurrency (3) 487
35.71 Transportation Problem (3) 487
35.72 Trees (1) 488
35.73 Unix (4) 488
35.74 Virtual Memory (1) 489
35.75 Windows (4) 489
35.76 Windows Programming (2) 489
Answer Keys 490
36 Programming and DS (30) 494
36.1 Array Of Pointers (1) 494
36.2 Arrays (3) 494
36.3 Dangling Pointers (1) 494
36.4 Data Types (1) 495
36.5 Dynamic Memory Allocation (1) 495
36.6 Input Output Statement (1) 495
36.7 Operator Precedence (2) 495
36.8 Operators (2) 496
36.9 Parameter Passing (1) 496
36.10 Pointer Declaration (1) 496
36.11 Programming In C (14) 496
36.12 Storage Classes In C (1) 499
36.13 Three Dimensional Array (1) 500
Answer Keys 500
37 Programming and DS: DS (102) 501
37.1 Avl Tree (1) 503
37.2 B And Bplus Trees (1) 503
37.3 B Tree (1) 503
37.4 Bfs (1) 503
37.5 Binary Codes (1) 503
37.6 Binary Heap (1) 503
37.7 Binary Search Tree (5) 504
37.8 Binary Tree (8) 504
37.9 Cryptography (1) 506
37.10 Data Structures (6) 506
37.11 Graph Algorithms (1) 507
37.12 Graph Connectivity (1) 507
37.13 Graphs (1) 507
37.14 Hashing (10) 508
37.15 Heap (6) 509
37.16 Heap Sort (1) 510
37.17 Infix Prefix (1) 510
37.18 Linked Lists (3) 510
37.19 Max Heap (1) 511
37.20 Priority (1) 511
37.21 Priority Queue (2) 511
37.22 Queue (4) 512
37.23 Quicksort (1) 512
37.24 Radix Sort (2) 512
37.25 Recursion (1) 513
37.26 Relational Algebra (1) 513
37.27 Spanning Tree (2) 513
37.28 Stack (12) 513
37.29 Tree Traversal (1) 515
37.30 Trees (9) 516
Answer Keys 517
38 Programming and DS: Programming (85) 518
38.1 Abstract Data Type (1) 523
38.2 Aliasing (1) 523
38.3 Arrays (2) 524
38.4 Binary Search Tree (1) 524
38.5 Bitwise Operation (1) 524
38.6 Data Types (2) 525
38.7 Evaluation Postfix (1) 525
38.8 Exception Handling (1) 525
38.9 Expression Evaluation (1) 525
38.10 File Handling (1) 525
38.11 Graphs (1) 525
38.12 Io Statement (1) 526
38.13 Java (4) 526
38.14 Linked Lists (1) 527
38.15 Loop (1) 527
38.16 Object Oriented Programming (3) 527
38.17 Operator Precedence (1) 528
38.18 Parameter Passing (1) 528
38.19 Pointers (2) 528
38.20 Programming In C (15) 529
38.21 Programming Paradigms (1) 531
38.22 Pseudocode (1) 532
38.23 Row Major Address Calculation (1) 532
38.24 Storage Classes In C (2) 532
38.25 Tree Traversal (1) 533
38.26 Undefined Behaviour (1) 533
38.27 Variable Binding (1) 533
38.28 Variable Scope (4) 533
Answer Keys 534
39 Theory of Computation (139) 536
39.1 Cfg (1) 541
39.2 Chomsky Normal Form (1) 541
39.3 Closure Property (2) 541
39.4 Cnf (1) 542
39.5 Complement (1) 542
39.6 Context Free Grammars (7) 542
39.7 Context Free Languages (7) 543
39.8 Context Sensitive (2) 544
39.9 Decidability (4) 545
39.10 Expression (1) 546
39.11 Finite Automata (6) 546
39.12 Grammar (15) 547
39.13 Identify Class Language (7) 550
39.14 Language (1) 551
39.15 Languages Classification (1) 551
39.16 Languages Relationships (1) 552
39.17 Minimal State Automata (1) 552
39.18 Nfa Dfa (3) 552
39.19 Parsing (1) 553
39.20 Pumping Lemma (3) 553
39.21 Pushdown Automata (5) 553
39.22 Recursive And Recursively Enumerable Languages (2) 554
39.23 Regular Expressions (17) 554
39.24 Regular Grammar (3) 557
39.25 Regular Languages (11) 558
39.26 Right Quotient (1) 561
39.27 Strings (1) 561
39.28 Turing Machine (5) 561
Answer Keys 562
40 Unknown Category (235) 564
40.1 Binary Search Tree (1) 605
40.2 Cloud Computing (1) 605
40.3 Clustering (1) 605
40.4 Co And Architecture (2) 605
40.5 Computer Architecture (1) 605
40.6 Counting (1) 606
40.7 Deadlock (1) 606
40.8 Disk Scheduling (1) 606
40.9 Disks (1) 606
40.10 Dynamic Programming (1) 606
40.11 E Technologies (1) 606
40.12 Ethernet (1) 607
40.13 Finite Automata (1) 607
40.14 Floating Point Representation (1) 607
40.15 Graph Algorithms (1) 607
40.16 Heap (1) 607
40.17 Indexing (1) 608
40.18 Ip Addressing (1) 608
40.19 Linked Lists (1) 608
40.20 Microprocessors (1) 608
40.21 Minimum Spanning Trees (1) 608
40.22 Multiplexing (1) 609
40.23 Network Security (1) 609
40.24 Osi Model (1) 609
40.25 Page Fault (1) 609
40.26 Physical Layer (1) 609
40.27 Probability (1) 609
40.28 Process Synchronization (1) 610
40.29 Recurrence (1) 610
40.30 Round Robin (1) 610
40.31 Software Testing (1) 610
40.32 Sql (1) 610
40.33 Stack (1) 611
40.34 Subnetting (1) 611
40.35 Transaction And Concurrency (1) 611
Answer Keys 611
Contributors
User , Answers User Added User Done
sanjay 1082, 555 GO Editor 1398 sanjay 175
shekhar chauhan 677, 169 makhdoom ghaya 541 Arjun Suresh 145
Arjun Suresh 406, 19 Arjun Suresh 342 Sankaranarayanan P.N 84
Leen Sharma 349, 114 RISHABH KUMAR 143 RISHABH KUMAR 67
VIPIN NARAYAN 313, 175 Pooja Khatri 97 Prashant Singh 47
Prashant Singh 221, 89 soujanyareddy13 76 VIPIN NARAYAN 44
Rajarshi Sarkar 136, 2 sanjay 56 Leen Sharma 39
Mojo Jojo 127, 1 Debasmita Bhoumik 21 srestha 34
Sachin Mittal 93, 1 Kathleen Bankson 18 Debasmita Bhoumik 32
Sandeep_Uniyal 89, 1 sourav. 27
Muktinath Vishwakarma 87, 15 Manoj Kumar 24
papesh 82, 29 shekhar chauhan 18
Bikram 81, 3 Dhananjay Kumar Sharma 14
Debasmita Bhoumik 78, 58 Lakshman Patel 13
Akash Kanase 74, 1 Resmi Arjun 13
Rajesh Pradhan 72, 27 papesh 12
jayendra 65, 2 Bikram 10
Amar Vashishth 63, 1 Abhishek 10
Satbir Singh 59, 19 asutosh kumar Biswal 10
Gate Keeda 56, 2 Kapil Phulwani 10
shashi shekhar 53, 1 Satbir Singh 9
RISHABH KUMAR 44, 102 deepthi 9
Dhananjay Kumar Sharma 41, 12 Tauhin Gangwar 9
Praveen Saini 36, 4 shahidhope 9
srestha 35, 16 soujanyareddy13 8
asutosh kumar Biswal 32, 16 Hira 8
Hira 32, 43 Desert_Warrior 8
Kapil Phulwani 31, 7 Aboveallplayer 7
Don't you worry 30, 8 shivani Sharma 7
kunal chalotra 29, 20 Rajesh Pradhan 7
sumit kumar singh dixit 26, 1 Jeet Rajput 6
Sankaranarayanan P.N 26, 13 kenzou 6
Vicky rix 25, 1 Prajwal Bhat 6
Ashwani Kumar 25, 22 Rishabh Gupta 6
Prasanjeet Ghosh 25, 26 im.raj 6
Shaik Masthan 23, 19 Rishi yadav 6
Shyam Singh 22, 1 Praveen Saini 5
Sayan Bose 22, 14 Meenakshi Sharma 5
Roma Nagpal 5
Shobhit Joshi 5
Ram Swaroop1 4
Prabhanjan_1 4
Shubham Pandey 4
Debashish Deka 4
Shaik Masthan 4
Sayan Bose 4
V Sharma 3
nocturnal123 3
Prasanjeet Ghosh 3
Don't defeat anybody but yourself. 3
Subham Mishra 3
Muktinath Vishwakarma 3
Pooja Palod 3
Suvasish Dutta 2
Arnabi Bej 2
Akash Kanase 2
Akhil Nadh PC 2
saurabh rai 2
Hradesh patel 2
gatecse 2
gshivam63 2
Kuljeet Singh 2
rio 2
kunal chalotra 2
Mk Utkarsh 2
Milicevic3306 2
sushmita 2
Rohit kumar1 2
DEVWRITT ARYA 2
omveer 2
SuShrut2311 2
1 Algorithms (99)
Using Prim’s algorithm to construct a minimum spanning tree starting with node a, which one of the following sequences of
edges represents a possible order in which the edges would be added to construct the minimum spanning tree?
A. (a, b), (a, h), (g, h), (f, g), (c, f), (c, i), (c, d), (d, e)
B. (a, b), (b, h), (g, h), (g, i), (c, i), (c, f), (c, d), (d, e)
C. (a, b), (b, c), (c, i), (c, f), (f, g), (g, h), (c, d), (d, e)
D. (a, b), (g, h), (g, f), (c, f), (c, i), (f, e), (b, c), (d, e)
ugcnet-oct2020-ii algorithms
ugcnet-oct2020-ii algorithms
The post order traversal of a binary tree is DEBFCA. Find out the pre-order traversal
Which algorithm has same average, worst case and best case time ?
A. Binary search B. Maximum of n number
C. Quick sort D. Fibonacci search
ugcnetdec2006ii
Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed in the worst case by the merge
sort algorithm will be
ugcnet-oct2020-ii algorithms
ugcnetaug2016iii algorithms
Consider a Boolean function of 'n' variables. The order of an algorithm that determines whether the Boolean function
produces a output 1 is
The time complexity of an efficient algorithm to find the longest monotonically increasing subsequence of n numbers is
In Activity-Selection problem, each activity i has a start time si and a finish time fi where si ≤ fi . Activities i and j
are compatible if
A. si ≥ fj B. sj ≥ fi
C. si ≥ fj or sj ≥ fi D. si ≥ fj and sj ≥ fi
ugcnetdec2015iii algorithms activity-selection-problem
Which of the following algorithms sort n integers, having the range 0 to (n2 − 1), in ascending order in O(n) time?
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element
in a sorted array ?
Let A[1, . . . , n] be an array of n distinct numbers. If i < j and A[i] > A[j], then the pair (i, j) is called an inversion
of A. What is the expected number of inversions in any permutation on n elements?
Consider f(N) = g(N) + h(N) Where function g is a measure of the cost of getting from the start node to the
current node. N and h is an estimate of the additional cost of getting from the current node N to the goal node. Then
f(N) = h(N) is used in which one of the following algorithms?
A. A∗ algorithm B. AO∗ algorithm
C. Greedy best first search algorithm D. Iterative A∗ algorithm
ugcnetjune2014iii artificial-intelligence algorithms
________ is used in game trees to reduce the number of branches of the search tree to be traversed without affecting
the solution.
A. Best first search B. Goal stack planning
C. Alpha-beta pruning procedure D. Min-max search
ugcnetjune2014iii artificial-intelligence algorithms
Let A and B be two n ×n matrices. The efficient algorithm to multiply the two matrices has the time complexity
A. O(n2 ) B. O(nlg m )
C. O(n2 lg n) D. O(n lg n)
ugcnetdec2013iii algorithms asymptotic-notations recurrence
1.7.4 Asymptotic Notations: UGCNET-Jan2017-III: 31 https://gateoverflow.in/335207
The asymptotic upper bound solution of the recurrence relation given by T(n) = 2T ( n2 ) + n
lg n
is:
Big-O estimates for the factorial function and the logarithm of the factorial function i.e. n! and log n! is given by
A. O(n!) and O(n log n) B. O(nn ) and O(n log n)
C. O(n!) and O(log n!) D. O(nn ) and O(log n!)
ugcnetjune2014ii algorithms time-complexity asymptotic-notations
Given the following equalities : E1 : nK+∈ + nK lg n = θ(nK+∈ ) for all fixed K and ∈, K ≥ 0 and ∈> 0.
E2 : n3 2n + 6n2 3n = O(n3 2n ) . Which of the following is true ?
asymptotic-notations ugcnetjune2014iii
Let f(n) and g(n) be asymptotically non-negative functions. Which of the following is correct?
What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0) ?
For any B-tree of minimum degree t ≥ 2, every node other than the root must have at least ____ keys and every node
can have at most ____ keys.
A. a B. b C. c D. d
ugcnetjan2017ii algorithms binary-tree binary-search-tree
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
The number of nodes in a complete binary tree of height h (with roots at level 0) is equal to
A. 20 + 21 + … . . 2h B. 20 + 21 + … . . 2h−1
C. 20 + 21 + … . . 2h+1 D. 21 + … . . 2h+1
ugcnetdec2011ii algorithms binary-tree
In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown as
x/y, where x is discovery time stamp and y is finishing time stamp.
ugcnetjune2019ii dfs
Consider the problem of a chain < A1 , A2 , A3 , A4 > of four matrices. Suppose that the dimensions of the matrices
A1 , A2 , A3 and A4 are 30 × 35, 35 × 15, 15 × 5 and 5 × 10 respectively. The minimum number of scalar
multiplications needed to compute the product A1 A2 A3 A4 is ____.
The longest common subsequence of the sequences X =< A, B, C, B, D, A, B > and Y =< B, D, C, A, B, A >
has length
A. 2 B. 3 C. 4 D. 5
ugcnetdec2013iii algorithms dynamic-programming
A triangulation of a polygon is a set of T chords that divide the polygon into disjoint triangles. Every triangulation of n
vertex convex polygon has ____ chords and divides the polygon into ____ triangles
A. n − 2, n − 1 B. n − 3, n − 2 C. n − 1, n D. n − 2, n − 2
ugcnetjune2016iii algorithms dynamic-programming
Consider a weighted, undirected graph with positive edge weights and let uv be an edge in the graph. It is known that
the shortest path from the source vertex s to u has weight 53 and the shortest path from s to v has weight 65. Which
one of the following statements is always TRUE?
A. Weight (u, v) ≤ 12 B. Weight (u, v) = 12
C. Weight (u, v) ≥ 12 D. Weight (u, v) > 12
gateit-2007 algorithms graph-algorithms normal ugcnetjune2012iii
Floyd-Warshall algorithm utilizes _____ to solve the all-pairs shortest paths problem on a directed graph in ____ time
A. Greedy algorithm, θ(V 3 ) B. Greedy algorithm, θ(V 2 lgn)
C. Dynamic programming, θ(V 3 ) D. Dynamic programming, θ(V 2 lgn)
ugcnetdec2015iii graph-algorithms algorithms
List-I List-II
(a) Prim’s algorithm (i) O(V 3 log V )
(b) Dijkstra’s algorithm (ii) O(V E 2 )
(c) Faster all-pairs shortest path (iii) O(ElgV )
(d) Edmonds-Karp algorithm (iv) O(V 2 )
ugcnetjune2019ii graph-algorithms
1 1 1 2 3 5 5 12 respectively.
Given the symbols A, B, C, D, E, F, G and H with the probabilities 30 , 30 , 30 , 30 , 30 , 30 , 30 and 30 The
average Huffman code size in bits per symbol is
67 70 76 78
A. 30 B. 34 C. 30 D. 30
ugcnetjune2015iii algorithms greedy-algorithms huffman-code
If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where
n ≤ m, the expected number of collisions involving a particular key x is less than _____
Suppose there are logn sorted lists of n logn element each. The time complexity of producing a sorted list of all these
elements is (use heap data structure)
A. O(n log logn ) B. θ(n logn )
C. Ω(n logn ) D. Ω(n3/2 )
ugcnetdec2012iii algorithms time-complexity heap
Consider a source with symbols A, B, C, D with probabilities 1/2, 1/4, 1/8, 1/8 respectively. What is the average
number of bits per symbol for the Huffman code generated from above information?
A. 2 bits per symbol B. 1.75 bits per symbol
C. 1.50 bits per symbol D. 1.25 bits per symbol
ugcnetjune2016iii algorithms huffman-code probability
There are many sorting algorithms based on comparison. The running time of heapsort algorithm is O(nlgn). Like P ,
but unlike Q, heapsort sorts in place where (P , Q) is equal to
A. 40 B. 38 C. 32 D. 30
ugcnetjune2014iii algorithms greedy-algorithm knapsack
Given 0-1 knapsack problem and fractional knapsack problem and the following statements:
S1 : 0-1 knapsack is efficiently solved using Greedy algorithm.
S2 : Fractional knapsack is efficiently solved using Dynamic programming.
Which of the following is true?
A. S1 is correct and S2 is not correct B. Both S1 and S2 are correct
C. Both S1 and S2 are not correct D. S1 is not correct and S2 is correct
ugcnetsep2013iii algorithms knapsack
Consider the problem of a chain < A1 , A2 , A3 > of three matrices. Suppose that the dimensions of the matrices are
10 × 100, 100 × 5 and 5 × 50 respectively. There are two different ways of parenthesization : (i) ((A1 A2 )A3 ) and
(ii) (A1 (A2 A3 )) . Computing the product according to the first parenthesization is ______ times faster in comparison to the
second parenthesization.
A. 5 B. 10 C. 20 D. 100
ugcnetdec2014iii algorithms matrix-chain-ordering
The minimum number of scalar multiplication required, for parenthesization of a matrix-chain product whose
sequence of dimensions for four matrices is < 5, 10, 3, 12, 5 > is
3 3 1 1
L e tn=4 and (a1 , a2 , a3 , a4 ) =(do, if, int, while). Let p(1 : 4) = ( ,, , ) and
8 8 8 8
2 3 1 1 1
q(1 : 4) = ( , , , , ) where p(i) and q(i) denotes the probability with which we search ai and the identifier x being
8 8 8 8 8
searched satisfy ai < x < ai+1 respectively. The optimal search tree is given by:
ugcnetdec2015iii algorithms optimal-search-tree
In how many ways can the string A ∩ B − A ∩ B − A be fully paranthesized to yield an infix expression?
A. 15 B. 14 C. 13 D. 12
ugcnetjune2016ii parenthesization
Suppose that the splits at every level of quicksort are in the proportion (1– α) to α, where 0 < α ≤ 1 is a constant.
2
The minimum depth of a leaf in the recursion tree is approximately given by
lgn lg(1−α)
A. − lg(1−α) B. − lgn
lgn lgα
C. − lgα D. − lgn
ugcnetjune2014iii data-structures sorting algorithms quicksort
A. Θ(lg m) B. Θ(m)
C. Θ(m lg m) D. Θ(lg lg m)
ugcnetjuly2018ii algorithms time-complexity recurrence
Red-black trees are one of many search tree schemes that are “balanced” in order to guarantee that basic dynamic–set
operations take____ time in the worst case.
Dijkstra algorithm, which solves the single-source shortest--paths problem, is a _______, and the Floyd-Warshall
algorithm, which finds shortest paths between all pairs of vertices, is a ________.
Assuming there are n keys and each key is in the range [0, m-1]. The run time of bucket sort is
You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements. Which of the following
sorting method would be most suitable for such a task ?
A. Bubble sort B. Selection sort
C. Quick sort D. Insertion sort
ugcnetdec2014ii algorithms data-structures sorting
If there are n integers to sort, each integer had d digits and each digit is in the set {1, 2, … , k}, radix sort can sort the
numbers in
Which of the following is best running time to sort n integers in the range 0 to n2 − 1 ?
Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the
merge step ?
The time complexities of some standard graph algorithms are given. Match each algorithm with its time complexity ? (
n and m are no. of nodes and edges respectively)
a. Bellman Ford algorithm i. O(m log n)
b. Kruskals algorithm ii. O(n3 )
c. Floyd Warshall algorithm iii. O(mn)
d. Topological sorting iv. O(n + m)
Codes :
A. a-iii, b-i, c-ii, d-iv B. a-ii, b-iv, c-iii, d-i
C. a-iii, b-iv, c-i, d-ii D. a-ii, b-i, c-iii, d-iv
ugcnetdec2012iii algorithms time-complexity
An algorithm is made up of 2 modules M1 and M2 . If time complexity of modules M1 and M2 are h(n) and g(n)
respectively, the time complexity of the algorithm is
A. min(h(n), g(n)) B. max(h(n), g(n))
C. h(n) + g(n) D. h(n) ∗ g(n)
ugcnetjune2014ii algorithms time-complexity
If algorithm A and another algorithm B take log2 (n) and √− n microseconds, respectively, to solve a problem, then the
largest size n of a problem these algorithms can solve, respectively, in one second are ______ and ______.
n n n n
A. 210 and 106 B. 210 and 1012 C. 210 and 6.106 D. 210 and 6.1012
ugcnet-oct2020-ii algorithms time-complexity
The amortized time complexity to perform ____ operation(s) in Splay trees is O(Ig n)
A. Search B. Search and Insert
C. Search and Delete D. Search, Insert and Delete
ugcnetsep2013ii algorithms time-complexity
The strategy used to reduce the number of tree branches and the number of static evaluations applied in case of a game
tree is
A. Minmax strategy B. Alpha-beta pruning strategy
C. Constraint satisfaction strategy D. Static max strategy
ugcnetjune2012iii algorithms graph-search tree-traversals
The number of disk pages access in B-tree search, where h is height, n is the number of keys and t is the minimum
degree, is
A. θ(logn h ∗ t) B. θ(logt n ∗ h)
C. θ(logh n) D. θ(logt n)
ugcnetdec2015ii algorithms trees
Answer Keys
1.0.1 A 1.0.2 A 1.0.3 A;C 1.0.4 A 1.0.5 C
1.0.6 Q-Q 1.0.7 D 1.0.8 D 1.0.9 X 1.0.10 B
1.0.11 A 1.0.12 Q-Q 1.0.13 Q-Q 1.0.14 Q-Q 1.0.15 B
1.1.1 C 1.2.1 Q-Q 1.3.1 B 1.4.1 C 1.5.1 C
1.5.2 D 1.6.1 C 1.6.2 C 1.7.1 B 1.7.2 B
1.7.3 X 1.7.4 A 1.7.5 B 1.7.6 B 1.7.7 D
1.8.1 Q-Q 1.8.2 C 1.9.1 B 1.10.1 Q-Q 1.10.2 Q-Q
1.10.3 Q-Q 1.10.4 C 1.11.1 C 1.12.1 C 1.13.1 A
1.13.2 C 1.14.1 A 1.15.1 C 1.16.1 Q-Q 1.16.2 C
1.16.3 B 1.17.1 C 1.17.2 A 1.17.3 B 1.18.1 C
1.19.1 Q-Q 1.20.1 A 1.21.1 C 1.21.2 B 1.22.1 D
1.23.1 B 1.23.2 C 1.24.1 A 1.25.1 B 1.26.1 B
1.26.2 A 1.26.3 C 1.27.1 C 1.28.1 A 1.29.1 D
1.29.2 C 1.29.3 C 1.30.1 B 1.31.1 C 1.32.1 C
1.32.2 C 1.32.3 Q-Q 1.32.4 D 1.32.5 C 1.32.6 C
1.33.1 B 1.33.2 Q-Q 1.34.1 A 1.35.1 C 1.35.2 D
1.36.1 D 1.36.2 D 1.36.3 D 1.36.4 B 1.36.5 B
1.37.1 C 1.38.1 Q-Q 1.38.2 A 1.38.3 C 1.38.4 B
1.38.5 A 1.38.6 B 1.38.7 A 1.38.8 D 1.39.1 C
1.40.1 D 1.41.1 B 1.42.1 D 1.42.2 A
2 CO and Architecture (105)
A computer with 32 bit wide data bus user 4kx8 static RAM memory chips. The smallest memory this computer can
have is...?
A) 32kb
B) 16kb
C)8 KB
D)24kb
A compiler that runs on one machine and produces code for a different machine is called :
A. Cross compilation
B. One pass compilation
C. Two pass compilation
D. None of the above
ugcnetjune2009ii
In which addressing mode the operand is given explicitly in the instruction itself ?
A. Absolute mode B. Immediate mode
C. Indirect mode D. Index mode
ugcnetjune2009ii
Suppose that a computer program takes 100 seconds of execution time on a computer with multiplication operation
responsible for 80 seconds of this time. How much do you have to improve the speed of the multiplication operation if
you are asked to execute this program four times faster?
A. 14 times faster B. 15 times faster
C. 16 times faster D. 17 times faster
ugcnetjune2019ii
ugcnetdec2004ii
With four programs in memory and with 80% average I /O wait, the CPU utilization is ?
A. 60% B. 70%
C. 90% D. 100%
ugcnetjune2009ii
A. 05 B. 07 C. 09 D. 00
ugcnetdec2014iii 8085-microprocessor non-gate
Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085 microprocessor performs
addition of 87H and 79H .
What is the value of ax and cx registers after the completion of the doloop ?
A. ax = FFF5 h and cx = 0 h B. ax = FFF6 h and cx = 0 h
C. ax = FFF7 h and cx = 0A h D. ax = FFF5 h and cx = 0A h
ugcnetnov2017-ii co-and-architecture 8085-microprocessor
The contents of the destination register ax (in hexadecimal ) and the status of Carry Flag (CF) after the execution of above
instructions, are:
A. ax = 003CH; CF = 0 B. ax = 001EH; CF = 0
C. ax = 007BH; CF = 1 D. ax = 00B7H; CF = 1
ugcnetnov2017-ii 8085-microprocessor non-gate
The following program is stored in memory unit of the basic computer. What is the content of the accumulator after the
execution of program? (All location numbers listed below are in hexadecimal).
Location Instruction
210 CLA
211 ADD 217
212 INC
213 STA 217
214 LDA 218
215 CMA
216 AND 217
217 1234H
218 9CE2H
In which addressing mode, the effectives address of the operand is generated by adding a constant value to the content
of a register?
A. Absolute mode B. Indirect mode
C. Immediate mode D. Index mode
isro2009 co-and-architecture ugcnetdec2012ii addressing-modes
In _____ addressing mode, the operands are stored in the memory. The address of the corresponding memory location
is given in a register which is specified in the instruction.
A. Register direct B. Register indirect
C. Base indexed D. Displacement
ugcnetaug2016iii co-and-architecture addressing-modes
The register or main memory location which contains the effective address of the operand is known as
A. Pointer B. Special location
C. Indexed register D. None of the above
ugcnetdec2010ii co-and-architecture addressing-modes
Which type of addressing mode, less number of memory references are required?
Identify the addressing modes of the below instructions and match them :
(a) ADI (i) Immediate addressing
(b) STA (ii) Direct Addressing
(c) CMA (iii) Implied Addressing
(d) SUB (iv) Register addressing
A. a-i, b-ii, c-iii, d-iv B. a-ii, b-i, c-iv, d-iii
C. a-iii, b-ii, c-i, d-iv D. a-iv, b-iii, c-ii, d-i
ugcnetjune2012iii co-and-architecture addressing-modes
The advantage of _______ is that it can reference memory without paying the price of having a full memory address in
the instruction.
A. Direct addressing B. Indexed addressing
C. Register addressing D. Register Indirect addressing
ugcnetjune2014iii co-and-architecture addressing-modes
2.3.9 Addressing Modes: UGCNET-June2016-III: 5 https://gateoverflow.in/57097
The ____ addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents
of the register. The offset and register are specified in the instruction.
A. Base indexed B. Base indexed plus displacement
C. Indexed D. Displacement
ugcnetjune2016iii co-and-architecture addressing-modes
Which of the following addressing mode is best suited to access elements of an array of contiguous memory locations?
In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents
of register ?
A. absolute mode B. immediate mode
C. indirect mode D. index mode
ugcnetdec2008ii co-and-architecture addressing-modes
In the case of parallelization, Amdahl's law states that if P is the proportion of a program that can be made parallel and
(1 − P ) is the proportion that cannot be parallelized, then the maximum speed-up that can be achieved by using N
processors is:
1 1 1 1
A. B. C. D. (1−P)
(1 − P) + N. P (N − 1)P + P (1 − P) + P
N P+ N
ugcnetjune2015ii parallel-processing amdahls-law
The content of the accumulator after the execution of the following 8085 assembly language program, is
MVI A, 35H
MOV B, A
STC
CMC
RAR
XRA B
Status register
ugcnetjune2016iii co-and-architecture assembly
The instruction : MOV CL, [BX] [DI] + 8 represents the ____ addressing mode
A. Based Relative B. Based Indexed
C. Indexed Relative D. Register Indexed
ugcnetsep2013iii co-and-architecture assembly addressing-modes
A byte addressable computer has a memory capacity of 2m Kbytes and can perform 2n operations. An instruction
involving 3 operands and one operator needs a maximum of
A. 3m bits B. m + n bits
C. 3m + n bits D. 3m + n + 30 bits
ugcnetjune2014iii co-and-architecture byte-addressable
A hierarchical memory system that uses cache memory has cache access time of 50 nano seconds, main memory access
time of 300 nano seconds, 75% of memory requests are for read, hit ratio of 0.8 for read access and the write-through
scheme is used. What will be the average access time of the system both for read and write requests ?
A. 157.5 n.sec. B. 110 n.sec.
C. 75 n.sec. D. 82.5 n.sec.
ugcnetdec2014iii co-and-architecture cache-memory
Which of the following mapping is not used for mapping process in cache memory
A. Associative mapping B. Direct mapping
C. Set-Associative mapping D. Segmented - page mapping
ugcnetjuly2018ii co-and-architecture cache-memory
In ___ method, the word is written to the block in both the cache and main memory, in parallel
A. Write through B. Write back
C. Write protected D. Direct mapping
ugcnetjune2016iii co-and-architecture cache-memory
Consider a machine with a byte addressable main memory of 216 bytes block size of 8 bytes. Assume that a direct
mapped cache consisting of 32 lines used with this machine. How many bits will be there in Tag, line and word field of
format of main memory addresses?
A. 8, 5, 3 B. 8, 6, 2 C. 7, 5, 4 D. 7, 6, 3
ugcnet-oct2020-ii co-and-architecture cache-memory
In an enhancement of a CPU design, the speed of a floating point unit has been increased by 20% and the speed of a
fixed point unit has been increased by 10%. What is the overall speed achieved if the ratio of the number of floating
point operations to the number of fixed point operations is 2:3 and the floating point operation used to take twice the time taken
by the fixed point operation in original design?
The branch logic that provides decision making capabilities in the control unit is known as
A. Controlled transfer B. Conditional transfer
C. Unconditional transfer D. None of the above
ugcnetjune2012ii co-and-architecture
Which of the following statements with respect to multiprocessor system are true?
a. Multiprocessor system is
b. controlled
In Multiprocessor
by one operating
system,
c. multiple
Multiprocessor
system computers
system
are is Choosebythe
connected
classified correct
asthe
multiple answer from
meansinstruction the and
of communication
stream options
lines given
multiple data stream sy
below:
A. (a) only B. (a) and (b) only C. (a) and (c) only D. (b) and (c) only
ugcnet-oct2020-ii co-and-architecture
ugcnetdec2008ii co-and-architecture
2.10 Computer Architecture (3)
Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which
memory models are best suited (i.e. improves the performance most) for which programs ?
The concept of pipelining is a most effective in improving performance in the tasks being performed in different stages:
Consider a 32-bit microprocessor, with a 16-bit external data bus, driven by an 8 MHz input clock. Assume that this
microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What is the maximum data
transfer rate for this microprocessor?
Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average seek time of 40 msec. What
is the time in msec to read a block of 1024 bytes from this disk?
A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that
transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an
average rate of one million instructions per second. By how much will the CPU be slowed down because of the DMA transfer?
A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 msec and a memory
cycle requires 250 msec. What percentage of memory's total operating time is required for refreshes?
Which of the following flags are set when ‘JMP’ instruction is executed?
A. 2 B. 3 C. 4 D. 5
ugcnetjune2016iii co-and-architecture hardware-interrupt
Which of the following is an interrupt according to temporal relationship with system clock?
A. Maskable interrupt B. Periodic interrupt
C. Division by zero D. Synchronous interrupt
ugcnetjan2017iii interrupts co-and-architecture
2.21.4 Interrupts: UGCNET-June2012-II: 37 https://gateoverflow.in/55881
a. SISD b. MIMD c. SIMD Choose the correct answer from the options given
below:
A. a, b, c B. c, b, a C. b. c. a D. c, a, b
ugcnet-oct2020-ii co-and-architecture machine-instructions
Suppose that the register A and the register K have the bit configuration. Only the three leftmost bits of A are
compared with memory words because K has 1’s in these positions. Because of its organization, this type of memory
is uniquely suited to parallel searches by data association. This type of memory is known as
A. RAM B. ROM
C. content addressable memory D. secondary memory
ugcnetjune2019ii memory
2.25.2 Memory: UGCNET-June-2019-II: 19 https://gateoverflow.in/316260
How many address lines and data lines are required to provide a memory capacity of 16K × 16?
A given memory chip has 14 address and 8 data pins. It has the following number of locations.
A. 28 B. 214 C. 26 D. 212
ugcnetsep2013iii co-and-architecture memory
The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for executing an instruction.
The fifty percent of the cycles use memory bus. A memory read/write employs one machine cycle. For execution of the
programs, the system utilizes 90% of the CPU time. For block data transfer, an IO device is attached to the system while CPU
executes the background programs continuously. What is the maximum IO data transfer rate if programmed IO data transfer
technique is used?
A. 500 Kbytes/sec B. 2.2 Mbytes/sec
C. 125 Kbytes/sec D. 250 Kbytes/sec
ugcnetjune2015iii co-and-architecture memory-data-transfer
A. 32 B. 16 C. 8 D. 4
ugcnetaug2016iii co-and-architecture microprocessors 8085-microprocessor
A. traps are asynchronous and interrupts are synchronous with the program.
B. traps are synchronous and interrupts are asynchronous with the program.
C. traps are synchronous and interrupts are asynchronous with the I/O devices.
D. None of these
ugcnetdec2013iii microprocessors
2.27.4 Microprocessors: UGCNET-Jan2017-II: 34 https://gateoverflow.in/335129
The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and 3AH respectively. The
contents of AL, the status of carry flag (CF) and sign flag (SF) after executing ′ SUBAL, BL′ assembly language
instruction, are
A. AL = 0FH; CF = 1; SF = 1 B. AL = F0H; CF = 0; SF = 0
C. AL = F1H; CF = 1; SF = 1 D. AL = 1FH; CF = 1; SF = 1
ugcnetjan2017ii microprocessors machine-instructions co-and-architecture
In 8085, which of the following performs: load register pair immediate operation?
In 8085 microprocessor which of the following flag(s) is (are) affected by an arithmetic operation?
A. AC flag only B. CY flag Only
C. Z flag Only D. AC, CY, Z flags
ugcnetnov2017-iii microprocessors 8085-microprocessor co-and-architecture
A. 4 B. 8 C. 16 D. 32
ugcnetnov2017-iii microprocessors 8085-microprocessor co-and-architecture
A. In memory – mapped I/O, the CPU can manipulate I/O data residing in interface registers that are not used to manipulate
memory words.
B. The isolated I/O method isolates memory and I/O addresses so that memory address range is not affected by interface
address assignment.
C. In asynchronous serial transfer of data the two units share a common clock.
D. In synchronous serial transmission of data the two units have different clocks.
A micro-instruction format has micro-ops field which is divided into three subfields F1 , F2 , F3 each having seven
distinct micro-operations, conditions field CD for four status bits, branch field BR having four options used in
conjunction with address field ADF . The address space is of 128 memory locations. The size of micro-instruction is
The fault can be easily diagnosed in the micro-program control unit using diagnostic tools by maintaining the contents
of
A. flags and counters B. registers and counters
C. flags and registers D. flags, registers and counters
ugcnetjune2019ii microprogram-control-unit
Suppose that the given application is run on a 64-processor machine and that 70 percent of the application can be
parallelized. Then the expected performance improvement using Amdahl’s law is
Which of the following statements with respect to K -segment pipelining are true?
A. (a) and (b) only B. (b) and (c) only C. (a) and (c) only D. (a), (b) and (c)
ugcnet-oct2020-ii co-and-architecture pipelining
A non-pipeline system takes 50ns to process a task. The same task can be processed in six-segment pipeline with a
clockcycle of 10ns. Determine approximately the speedup ratio of the pipeline for 500 tasks.
The three outputs x1 x2 x3 from the 8 × 3 priority encoder are used to provide a vector address of the form
101x1 x2 x3 00 . what is the second highest priority vector address in hexadecimal if the vector addresses are starting
from the one with the highest priority?
A. BC B. A4 C. BD D. AC
ugcnetdec2015iii co-and-architecture priority-encoder
A processor can support a maximum memory of 4 GB where memory is word addressable and a word is 2 bytes. What
will be the size of the address bus of the processor?
A. At least 28 bits B. At least 2 bytes
C. At least 31 bits D. Minimum 4 bytes
ugcnetjune2019ii processor-address-bus
The register that stores the bits required to mask the interrupts is ______.
A. Status register B. Interrupt service register
C. Interrupt mask register D. Interrupt request register
ugcnetaug2016iii co-and-architecture register interrupts
2.35.1 Runtime Environments: GATE CSE 2001 | Question: 1.10, UGCNET-Dec2012-III: 36 https://gateoverflow.in/703
Suppose a processor does not have any stack pointer registers, which of the following statements is true?
Let f be the fraction of the computation (in terms of time) that is parallelizabl e. P the number of processors in the
system, and sp the speed up achievable in comparison with sequential execution – then the sp can be calculated using
the relation:
1 P 1 P
A. 1−f−f/P
B. P−f(P+1)
C. 1−f+f/P
D. P+f(P−1)
ugcnetdec2012iii co-and-architecture speedup
In a paging system, it takes 30 ns to search translation Look-aside Buffer (TLB) and 90 ns to access the main memory.
If the TLB hit ratio is 70%, the effective memory access time is
A. 48 ns B. 147 ns C. 120 ns D. 84 ns
ugcnetdec2016ii co-and-architecture tlb
Answer Keys
2.0.1 Q-Q 2.0.2 Q-Q 2.0.3 Q-Q 2.0.4 C 2.0.5 Q-Q
2.0.6 Q-Q 2.1.1 D 2.1.2 B 2.1.3 D 2.1.4 A
2.1.5 B 2.1.6 A 2.2.1 D 2.3.1 D 2.3.2 Q-Q
2.3.3 Q-Q 2.3.4 C 2.3.5 C 2.3.6 X 2.3.7 A
2.3.8 D 2.3.9 D 2.3.10 A 2.3.11 D 2.4.1 C
2.5.1 Q-Q 2.5.2 Q-Q 2.5.3 Q-Q 2.5.4 C 2.5.5 Q-Q
2.5.6 C 2.5.7 D 2.5.8 C 2.5.9 B 2.5.10 D
2.5.11 C 2.5.12 B 2.5.13 Q-Q 2.6.1 D 2.7.1 A
2.7.2 Q-Q 2.7.3 A 2.7.4 A 2.8.1 Q-Q 2.9.1 Q-Q
2.9.2 X 2.9.3 A 2.9.4 D 2.9.5 C 2.9.6 A
2.9.7 C 2.9.8 D 2.9.9 Q-Q 2.10.1 D 2.10.2 B
2.10.3 B 2.11.1 A 2.11.2 A 2.12.1 Q-Q 2.13.1 B
2.14.1 B 2.15.1 B 2.16.1 D 2.17.1 D 2.18.1 D
2.19.1 D 2.20.1 Q-Q 2.21.1 C 2.21.2 D 2.21.3 C
2.21.4 D 2.22.1 C 2.23.1 A 2.23.2 C 2.24.1 Q-Q
2.25.1 C 2.25.2 C 2.25.3 D 2.25.4 B 2.26.1 D
2.27.1 Q-Q 2.27.2 Q-Q 2.27.3 B 2.27.4 C 2.27.5 D
2.27.6 B 2.27.7 Q-Q 2.27.8 D 2.27.9 C 2.27.10 B
2.27.11 B 2.27.12 B 2.28.1 D 2.29.1 B 2.30.1 Q-Q
2.31.1 X 2.31.2 C 2.31.3 A 2.31.4 B 2.32.1 A
2.33.1 C 2.34.1 Q-Q 2.35.1 X 2.36.1 C 2.37.1 Q-Q
3 Compiler Design (68)
In which file the compiler manage various objects, which are used in windows programming?
Unix command to change the case of first three lines of file "shortlist" from lower to upper
A. B.
C. $ tr head-3 shortlist '[A-Z]' '[a-z]' D. $ tr shortlist head-3 '[a-z]' '[A-Z]'
ugcnetdec2016iii compiler-design
Find the lexicographic ordering of the bit strings given below based on the ordering 0 < 1 .
a. 001
b. 010
c. 011
d. 0001
e. 0101
Choose the correct answer from the options given below:
ugcnet-oct2020-ii compiler-design
A. user defined address symbols are correlated with their binary equivalent
B. the syntax of the statement is checked and mistakes, if any, are listed
C. object program is generated
D. semantic of the source program is elucidated
ugcnetdec2007ii
ugcnetdec2007ii
ugcnetdec2007ii
The equivalent production rules corresponding to the production rules S → Sα1 ∣ Sα2 ∣ β1 ∣ β2 is
A. S → β1 ∣ β2 , A → α1 A ∣ α2 A ∣ λ
B. S → β1 ∣ β2 ∣ β1 A ∣ β2 A , A → α1 A ∣ α2 A
C. S → β1 ∣ β2 , A → α1 A ∣ α2 A
D. S → β1 ∣ β2 ∣ β1 A ∣ β2 A, A → α1 A ∣ α2 A ∣ λ
ugcnetjune2013ii compiler-design
Loading operating system from secondary memory to primary memory is called ____________ .
ugcnetdec2006ii
A compiler for a high level language that runs on one machine and produces code for a different machine is called :
A. Optimizing B. One pass compiler
C. Cross compiler D. Multipass compiler
ugcnetdec2006ii
ugcnetjune2008ii
The compiler converts all operands upto the type of the largest operand is called
A. Type Promotion B. Type Evaluation
C. Type Conversion D. Type Declaration
ugcnetdec2013iii compiler-design
3.0.20 UGCNET-Dec2004-II: 31 https://gateoverflow.in/335548
Which activity is not included in the first pass of two pass assemblers ?
A. Build the symbol table B. Construct the intermediate code
C. Separate mnemonic opcode and operand fields D. None of the above
ugcnetdec2004ii
The process of assigning load addresses to the various parts of the program and adjusting the code and data in the
program to reflect the assigned address is called
The linker :
A. is similar to interpreter
B. uses source code as its input
C. is required to create a load module
D. none of the above
ugcnetjune2009ii
Match the description of several parts of a classic optimizing compiler in List-I, with the names of those parts in
List-II :
List-I List-II
(a) A part of a compiler that is responsible (i) Optimizer
for recognizing syntax.
(b) A part of a compiler that takes as input a stream of (ii) Semantic Analysis
characters and produces as output a stream of words
along with their associated syntactic categories.
ugcnetnov2017-ii compiler-design
In compiler optimization, operator strength reduction uses mathematical identities to replace slow math operations with
faster operations. Which of the following code replacements is an illustration of operator strength reduction ?
A. Replace P + P by 2∗ P or Replace 3 + 4 by 7.
B. Replace P ∗ 32 by P << 5
C. Replace P ∗ 0 by 0
D. Replace (P << 4) − P by P ∗ 15
In ____, the bodies of the two loops are merged together to form a single loop provided that they do not make any
references to each other.
A. Loop unrolling B. Strength reductions
C. Loop concatenation D. Loop jamming
ugcnetjune2016ii compiler-design compiler-optimization
Given a flow graph with 10 nodes, 13 edges and one connected components, the number of regions and the number of
predicate (decision) nodes in the flow graph will be
A. 4, 5 B. 5, 4 C. 3, 1 D. 13, 8
ugcnetdec2013iii compiler-design control-flow-graph
The language of all non-null strings of a's can be defined by a context free grammar as follow :
S→aS∣Sa∣a
The word a3 can be generated by ______ different trees.
(A) LL grammar
(C) LR grammar
How many tokens will be generated by the scanner for the following statement ?
x = x ∗ (a + b) − 5;
A. 12 B. 11 C. 10 D. 07
ugcnetdec2014iii compiler-design lexical-analysis
II. Syntax Analysis is specified by regular expressions and implemented by finite-state machine.
Which of the following is used for grouping of characters into tokens (in a computer) ?
A. 0 B. 1 C. 2 D. None of these
ugcnetdec2006ii lr-parser compiler-design
What will be the hexadecimal value in the register ax (32-bit) after executing the following instructions?
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
Which of the following derivations does a top-down parser use while parsing an input string? The input is scanned
from left to right.
A. Leftmost derivation B. Leftmost derivation traced out in reverse
C. Rightmost derivation D. Rightmost derivation traced out in reverse
gatecse-2000 compiler-design parsing normal ugcnetdec2013ii
A. Top-down parsers are LL parsers where first L stands for left-to-right scan and second L stands for a leftmost derivation
B. (000)* is a regular expression that matches only strings containing an odd number of zeroes, including the empty string
C. Bottom-up parsers are in the LR family, where L stands for left-to-right scan and R stands for rightmost derivation
D. The class of context-free languages is closed under reversal. That is, if L is any context-free language, then the language
LR = {wR : wεL} is context-free
A grammar G is LL(1) if and only if the following conditions hold for two distinct productions A → α ∣ β
I. First (α)∩ First (β) ≠ {a} where a is some terminal symbol of the grammar.
II. First (α)∩ First (β) ≠ λ
III. First (α)∩ Follow (A) = ϕ if λ ∈ First (β)
A. The grammar S → a Sb ∣ bSa ∣ SS ∣∈ , where S is the only non-terminal symbol and ∈ is the null string, is ambiguous
B. SLR is powerful than LALR
C. An LL(1) parser is a top-down parser
D. YACC tool is an LALR(1) parser generator
A shift-reduce parser carries out the actions specified within braces immediately after reducing with the corresponding
rule of the grammar.
S --> x x W [ print “1”]
S --> y [print “2”]
W --> S2 [print “3”],
(B) 1 1 2 3 3
(C) 2 3 1 3 1
(D) 2 3 3 2 1
ugcnetdec2009ii compiler-design parsing
On translating the expression given below into quadruple representation, how many operations are required?
(i ∗ j) + (e + f) ∗ (a ∗ b + c)
A. 5 B. 6 C. 3 D. 7
ugcnetjune2019ii intermediate-code quadruple-representation
I. A function of a linker is to combine several object modules into a single load module.
II. A function of a linker is to replace absolute references in an object module by symbolic references to locations in other
modules.
A. Only I B. Only II
C. Both I and II D. Neither I nor II
ugcnetjan2017ii runtime-environments compiler-design
A. Shift step that advances in the input stream by K(K > 1) symbols and Reduce step that applies a completed grammar rule
to some recent parse trees, joining them together as one tree with a new root symbol.
B. Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule to some
recent parse trees, joining them together as one tree with a new root symbol.
C. Shift step that advances in the input stream by K(K = 2) symbols and Reduce step that applies a completed grammar rule
to form a single tree.
D. Shift step that does not advance in the input stream and Reduce step that applies a completed grammar rule to form a single
tree.
a. input buffer b. stack c. parse table Choose the correct option from those given
below:
A. a and b only B. a and c only C. c only D. a, b and c
ugcnetjune2019ii shift-reduce-parser
Which data structure is used by the compiler for managing variables and their attributes?
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a) (b) and (c)
Answer Keys
3.0.1 B 3.0.2 Q-Q 3.0.3 D 3.0.4 Q-Q 3.0.5 B
3.0.6 B 3.0.7 Q-Q 3.0.8 Q-Q 3.0.9 Q-Q 3.0.10 Q-Q
Which of the following is widely used inside the telephone system for long-haul data traffic?
A. ISDN
B. ATM
C. Frame Relay
D. ISTN
ugcnetdec2013ii computer-networks
Which of the following TCP/IP Internet protocol does diskless machine uses to obtain its IP address from a server?
Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum
bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.
A. 30, 000 B. 32, 700
C. 33, 000 D. None of the above
ugcnetjune2014iii computer-networks
What is the size (in terms of bits) of Header length field in IPV4 header?
A. 2 B. 4 C. 8 D. 16
ugcnetjune2012iii computer-networks
If link transmits 4000 frames per scond and each slot has 8 bits , the transmission rate of circuits of this TDM is _____
Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per
channel, then the bit rate for the link is
computer-networks
A. 16 B. 32 C. 64 D. 128
computer-networks
4.0.16 UGCNET-June2016-II: 26 https://gateoverflow.in/63433
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?
computer-networks
Checksum used along with each packet computes the sum of the data, where data is treated as a sequence of
A network device is sending out the data at the rate of 2000 bps. How long does it take to send a file of 1, 00, 000
characters?
A network with bandwidth of 10 Mbps can pass only an average of 15, 000 frames per minute with each
frame carrying an average of 8, 000 bits. What is the throughput of this network ?
5 2 3∗ 5 3∗ n
O( +2 ) & O( n!) O( ) & O( )
A. O(n5 + 2n2 ) & O(n3∗ n!) B. O(n5 ) & O(n3∗ 2n )
C. O(n5 ) & O(n3∗ n!) D. O(n5 + 2n2 )& O(n3∗ 2n )
ugcnetjune2013ii
ugcnet-oct2020-ii computer-networks
ugcnetdec2006ii
A. 24 B. 672 C. 14 D. 28
ugcnetdec2006ii
Let e : B^m → B^n is a group code. The minimum distance of ‘e’ is equal to :
A. the maximum weight of a non zero code word B. the minimum weight of a non zero code word
C. m D. n
ugcnetdec2007ii
4.0.29 UGCNET-Dec2004-II: 26 https://gateoverflow.in/335371
Error control is needed at the transport layer because of potential error occurring __________.
A. from transmission line noise B. in router
C. from out of sequency delivery D. from packet losses
ugcnetdec2004ii
ugcnetdec2007ii
Making sure that all the data packets of a message are delivered to the destination is _________ control.
Which of the following steps is/are not required for analog to digital conversion?
a. Sensing b. Conversion c. Amplification d. Conditioning e. Quantization
A. aB.
andcC.
banda,D.
db and
Nonee of the above
ugcnetdec2015iii computer-networks
All of the following are examples of real security and privacy risks except
ugcnetjune2008ii
ugcnetnov2017-iii computer-networks
1. time slots
2. bandpass filters
3. handsets
4. frequency bands
ugcnetjune2009ii
With reference to hierarchical routing, the optimum number of levels for an m router subnet is:
(A) m2 (B) m
(C) ln m (D) √m
ugcnetjune2008ii
4.0.43 UGCNET-Sep2013-II: 5 https://gateoverflow.in/59010
The ____ is a set of standards that defines how a dynamic web document should be written, how input data should be
supplied to the program, and how the output result should be used.
A. Hyper Text Markup Language B. File Transfer Protocol
C. Hyper Text Transfer Protocol D. Common Gateway Interface
ugcnetsep2013ii computer-networks
ugcnetjune2009ii
ugcnetjune2009ii
E-commerce includes :
A. B2C B. B2B
C. C2C D. All of the above
ugcnetjune2009ii
When compared with analog cellular systems, an advantage of digital TDMA cellular system is that :
A. it is less complicated
B. it requires less of computer memory
C. it conserves spectrum bandwidth
D. it costs less
ugcnetjune2009ii
For a channel of 3 KHz bandwidth and signal to noise ratio of 30 dB, the maximum data rate is:
(A) 3000 bps (B) 6000 bps
(C) 15000 bps (D) 30000 bps
ugcnetjune2008ii
4.0.50 UGCNET-june2009-ii-41 https://gateoverflow.in/154821
Which one of the following ISO standard is used for software process ?
A. ISO9000 B. ISO9001
C. ISO9003 D. ISO9000 − 3
ugcnetjune2009ii
If in an error detection and correction code a message M : “You are good students” is stored as M' : Youare areyou
aregood goodare goodstudents studentsgood. What is the space required to store M' in general ? (assume that ‘n’ is the
length of M)
(A) 2n
(B) 3n
(C) 4n
A. Layering
B. Cryptography
C. Grade of service
D. None of the above
ugcnetjune2009ii
GSM/CDMA systems :
ugcnetjune2009ii
ugcnetjune2009ii
4.0.56 UGCNET-dec2009-ii-30 https://gateoverflow.in/152898
In order that a code is error correcting, the minimum Hamming distance should be :
1. t
2. 2t − 1
3. 2t
4. 2t + 1
ugcnetjune2009ii
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called:
The maximum size of the data that the application layer can pass on to the TCP layer below is ________.
A. 216 bytes B. 216 bytes + T CP header length
C. 216 bytes – T CP header length D. 215 bytes
ugcnetjan2017ii computer-networks application-layer
A. Private key is kept by the receiver and public key is announced to the public.
B. Public key is kept by the receiver and private key is announced to the public.
C. Both private key and public key are kept by the receiver.
D. Both private key and public key are announced to the public.
Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88?
A. 90, 40, 65, 50, 88 B. 90, 110, 80, 85, 88
C. 190, 60, 90, 85, 88 D. 65, 140, 80, 70, 88
ugcnetdec2010ii computer-networks binary-search-tree
________ is a bit-oriented protocol for communication over point-to-point and multipoint links.
An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each
signal element
A. 0.336 bits/baud B. 3 bits/baud
C. 120, 00, 000 bits/baud D. None of the above
ugcnetdec2014ii computer-networks bit-rate
Suppose it takes 100 ns to access page table and 20 ns to access associative memory. If the average access time is 28
ns, the corresponding hit rate is:
A. 100 percent
B. 90 percent
C. 80 percent
D. 70 percent
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is
G(x) = x4 + x + 1 . After implementing CRC encoder, the encoded word sent from sender side is _____.
A. 11010110111110 B. 11101101011011
C. 110101111100111 D. 110101111001111
ugcnetaug2016iii computer-networks crc-polynomial checksum
A. A B. B C. C D. D
ugcnetdec2012iii computer-networks ip-addressing classful-addressing
What is the bit rate for transmitting uncompressed 800 × 600 pixel colour frames with 8 bits/pixel at 40
frames/second?
A. 2.4 Mbps B. 15.36 Mbps
C. 153.6 Mbps D. 1536 Mbps
ugcnetdec2013iii computer-networks communication
A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay
in response to a request? (Note that the speed of light in air is 3,00,000 km/second)
A. 133.33 m sec B. 266.67 m sec
C. 400.00 m sec D. 533.33 m sec
ugcnetdec2013iii communication computer-networks
____ is a type of transmission impairment in which the signal looses strength due to the resistance of the transmission
medium
_____ is a satellite based tracking system that enables the determination of person’s position
A. Bluetooth B. WAP
C. Short Message Service D. Global Positioning System
computer-networks communication ugcnetjune2012ii
Match the following with link quality measurement and handoff initiation :
(a) Networked-Controlled (i) MS connect to BS
Handoff (NCHO)
(b) Mobile-Assisted Handoff (ii) Process via channel the target
(MAHO) BS
(c) Forward Handoff (iii) First generation Analog Cellular
System
(d) Hard Handoff (iv) Second generation digital cellular
system
A. (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i) B. (a)-(ii), (b)-(iii), (c)-(i), (d)-(iv)
C. (a)-(ii), (b)-(i), (c)-(iv), (d)-(iii) D. (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
computer-networks communication ugcnetjune2012iii
4.14.8 Communication: UGCNET-June2014-II: 01 https://gateoverflow.in/48594
Infrared signals can be used for short range communication in a closed area using _______ propagation.
In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second
does the receiver receive if the data rate is 1 Mbps ?
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets
on the basis of
a. Source IP address b. Destination IP address
c. TCP Source Port d. UDP Source Port
e. TCP Destination Port Choose the correct answer from the options given below:
A. (a), (b) and (c) only B. (b) and (e) only
C. (c) and (d) only D. (a), (b), (c), (d) and (e) only
ugcnet-oct2020-ii computer-neworks network-security
The message 11001001 is to be transmitted using the CRC polynomial x3 + 1 to protect it from errors. The message
that should be transmitted is
Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct
odd numbered error bits, will be:
A. (1 + x) is factor of G(x) B. (1 − x) is factor of G(x)
C. (1 + x2 ) is factor of G(x) D. x is factor of G(x)
ugcnetjan2017iii computer-networks crc-polynomial
The plain text message BAHI encrypted with RSA algorithm using e = 3, d = 7 and n = 33 and the characters of
the message are encoded using the values 00 to 25 for letters A to Z. Suppose character by character encryption was
implemented. Then, the Cipher Text message is _____.
A. In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.
B. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.
C. The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
D. Public key algorithms use two different keys for Encryption and Decryption
How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ?
A. 16 B. 17 C. 18 D. 19
ugcnetdec2014ii computer-networks cryptography
Match the following symmetric block ciphers with corresponding block and key sizes:
List-I List-II
(a) DES (i) block size 64 and key size ranges between 32 and 448
(b) IDEA (ii) block size 64 and key size 64
(c) BLOW FISH (iii) block size 128 and key sizes 128, 192, 256
(d) AES (iv) block size 64 and key size 128
A. a-iv; b-ii; c-i; d-iii B. a-ii; b-iv; c-i; d-iii
C. a-ii; b-iv; c-iii; d-i D. a-iv; b-ii; c-iii; d-i
ugcnetjuly2018ii cryptography computer-networks
Using ‘RSA’ public key cryptosystem, if p = 3 , q = 11 and d = 7 , find the value of e and encrypt the number ′ 19′
A. (a) only B. (b) and (c) only C. (a) and (c) only D. (b) only
ugcnet-oct2020-ii computer-networks network-security cryptography
A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps
is known as ________ carrier.
A. T1 B. T2 C. T3 D. T4
ugcnetjune2010ii computer-networks data-communication
A. 9 B. 18 C. 22 D. 64
ugcnetjune2010ii computer-networks data-communication
Suppose a digitazed voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample
the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each
sample required 8 bits?
Device on one network can communicate with devices on another network via a
(A) Hub/Switch
(D) Gateway
ugcnetdec2009ii computer-networks data-communication
Assume that we need to download text documents at the rate of 100 pages per minute. A page is in average of 24 lines
with 80 characters in each line requires 8 bits. Then the required bit rate of the channel is
Suppose we want to download text documents at the rate of 100 pages per second. Assume that a page consists of an
average of 24 lines with 80 characters in each line. What is the required bit rate of the channel?
If a file consisting of 50, 000 characters takes 40 seconds to send, then the data rate is _________
In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome
of a random number generated.
Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each
frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total
overhead time is
2. HSSI
3. Frame Relay
4. 10 – Base T
5. Token Ring
(A) 1, 2, 3
(B) 1, 3, 5
(C) 1, 3, 4, 5
(D) 1, 2, 3, 4, 5
ugcnetdec2009ii computer-networks data-link-layer
An example of a data mining algorithm which uses squared error score function is :
A. CART algorithm
B. back propagation algorithm
C. a priori algorithm
D. vector space algorithm
How many characters per second ( 7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is
asynchronous ? (Assuming 1 start bit and 1 stop bit)
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing
algorithm are updated __________.
A. automatically B. by server
C. by exchanging information with neighbour nodes D. with back up database
ugcnetjan2017ii computer-networks distance-vector-routing
E-commerce involves :
____ uses electronic means to transfer funds directly from one account to another rather than by cheque or cash
Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for
this code is
Key {
Plain Text 2413
Cipher Text 1234
A. HLLEO YM AEDRZ B. EHOLL ZYM RAED
C. ELHL MDOY AZER D. ELHL DOMY ZAER
ugcnetjuly2018ii cryptography encryption-decryption computer-networks
In the TCP/IP model, encryption and decryption are functions of ____ layer.
To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ______
A. t + 1 B. t − 2 C. 2t − 1 D. 2t + 1
ugcnetjuly2018ii computer-networks error-correction error-detection
If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before
division?
A. 1111110000 B. 1111111010 C. 111111000 D. 111111
ugcnetsep2013iii computer-networks error-correction crc-polynomial
A. 5 B. 10 C. 8 D. 9
ugcnetjune2014iii computer-networks error-detection-correction hamming-distance
The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is ____
The minimum frame length for 10 Mbps Ethernet is ________ bytes and maximum is _______ bytes.
A. 64 & 128 B. 128 & 1518
C. 1518 & 3036 D. 64 & 1518
ugcnetjune2014ii computer-networks ethernet
A file is downloaded in a home computer using 56 kbps MODEM connected to an Internet Service Provider. If the
download of the file completes in 2 minutes, what is the maximum size of the data downloaded?
What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
A _____ can forward or block packets based on the information in the network layer and transport layer header
A. Proxy firewall B. Firewall
C. Packet filter firewall D. Message digest firewall
ugcnetsep2013iii computer-networks firewall
Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
In a binary Hamming Code the number of check digits is r then number of message digits is equal to
A. 2r − 1 B. 2r − r − 1 C. 2r − r + 1 D. 2r + r − 1
ugcnetjune2015iii computer-networks hamming-code
Consider a code with only four valid code words: 0000000000, 0000011111, 1111100000, and 1111111111. This
code has distance 5. If the code word arrived is 0000000111 then the original code word must be _______
A. 3 B. 4 C. 5 D. 6
ugcnetjune2013iii computer-networks hamming-distance
A data file of 1, 00, 000 characters contains only the characters g-1, with the frequencies as indicated in table:
g h i j k l
Frequency 45 13 12 16 9 5
in thousand
using the variable-length code by Huffman codes, the file can be encoded with
A. 2, 52, 000 bits B. 2, 64, 000 bits
C. 2, 46, 000 bits D. 2, 24, 000 bits
ugcnetjune2013iii computer-networks huffman-code data-link-layer
For the 8 bit word 00111001,the check bits stored with it would we 0111. Suppose when the word is read from
memory, the check bits are calculated to be 1101. What is the data word that was read from memory?
Which of the following statements is/are true with regard to various layers in the Internet stack?
P: At the link layer, a packet of transmitted information is called a frame.
Q: At the network layer, a packet of transmitted information is called a segment.
The dotted-decimal notation of the following IPV4 address in binary notation is ____
10000001 00001011 00001011 11101111
A. 111.56.45.239 B. 129.11.10.238
C. 129.11.11.239 D. 111.56.11.239
ugcnetjuly2018ii computer-networks ip-addressing
What percentage (%) of the IPv4, IP address space do all class C addresses consume?
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
The address of a class B host is to be split into subnets with a 6– bit subnet number. What is the maximum number of
subnets and maximum number of hosts in each subnet?
A. 62 subnets and 1022 hosts B. 64 subnets and 1024 hosts
C. 62 subnets and 254 hosts D. 64 subnets and 256 hosts
ugcnetnov2017-iii ip-addressing computer-networks
Given the IP address 201.14.78.65 and the subset mask 255.255.255.224. What is the subset address?
Which of the following is the size of Network bits and Host bits of Class A of IP address?
A. Network bits 7, Host bits 24 B. Network bits 14, Host bits 16
C. Network bits 15, Host bits 16 D. Network bits 16, Host bits 16
ugcnetsep2013iii computer-networks ip-addressing
If a packet arrive with M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is ____ fragement.
A. (a) and (b) Only B. (b) and (c) Only C. (a) and (c) Only D. (a), (b) and (c)
ugcnetnov2017-iii computer-networks ip-addressing ipv6
Suppose there are n stations in a slotted LAN . Each station attempts to transmit with a probability P in each time
slot. The probability that only one station transmits in a given slot is
In link state routing algorithm after construction of link state packets, new routes are computed using :
A. DES algorithm B. Dijkstra's algorithm
C. RSA algorithm D. Packets
ugcnetjan2017ii computer-networks link-state-routing
Consider the following two statements with respect to IPv4 in computer networking:
P: The loopback (IP) address is a member of class B network.
Q: The loopback (IP) address is used to send a packet from host to itself.
What can you say about the statements P and Q?
A. P – True; Q – False B. P – False; Q – True
C. P – True; Q – True D. P – False; Q – False
ugcnetjune2019ii ip-addressing loopback-address
For n devices in a network, ________ number of duplex-mode links are required for a mesh topology.
A. n(n + 1) B. n(n– 1)
C. n(n + 1)/2 D. n(n– 1)/2
ugcnetdec2014iii computer-networks network-topologies mesh-topology
A fully connected network topology is a topology in which there is a direct link between all pairs of nodes. Given a
fully connected network with n nodes, the number of direct links as a function of n can be expressed as
n(n+1) (n+1) n n(n−1)
A. 2 B. 2 C. 2 D. 2
ugcnetjune2019ii mesh-topology
In a fully connected mesh network with 10 computers, total ___ number of cables are required and ____ number od
ports are required for each device
The GSM network is divided into the following three major systems:
A. SS, BSS, OSS B. BSS, BSC, MSC
C. CELL, BSS, OSS D. SS, CELL, MSC
ugcnetdec2012ii computer-networks communication mobile-communication
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent cells. If
840 frequencies are available, how many can be used in a given cell?
Which of the following is an bit rate of an 8-PSK signal having 2500 Hz bandwidth?
In electronic mail, which of the following protocols allows the transfer of multimedia messages?
A slotted ALOHA network transmits 200 bits frames using a shared channel with 200 kbps bandwidth. If the system
(all stations put together) produces 1000 frames per second, then the throughput of the system is _______.
A. Exhibited by all demodulator, when the input signal to noise ratio is low.
B. The rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
C. The property exhibited by all A.M. suppressed carrier coherent demodulator.
D. The property exhibited by correlation receiver.
A high performance switching and multiplexing technology that utilizes fixed length packets to carry different types of
traffic is:
Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers
to ensure correct re-composition from end to end of the network?
Decryption and encryption of data are responsibility of which of the following layer?
A. Physical layer B. Data link layer
C. Presentation layer D. Session layer
ugcnetjune2012ii computer-networks network-layering
Both hosts and routers and TCP/IP protocol software. However, routers do not use protocol from all layers. The layer
for which the protocol software is not needed by a router is
A. Layer – 5 (Application) B. Layer – 1 (Physical)
C. Layer – 3 (Internet) D. Layer – 4 (Network Interface)
ugcnetjune2012ii computer-networks network-layering
Which of the following protocols is used by email server to maintain a central repository that can be accessed from any
machine ?
Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and
remote server ?
A. FT P B. T FT P C. T ELNET D. NFS
ugcnetdec2010ii computer-networks network-protocols
The Mobile Application Protocol (MAP) typically runs on top of which protocol?
A. SNMP (Simple Network Management Protocol) B. SMTP (Simple Mail Transfer Protocol)
C. SS7 (Signalling System 7) D. HTTP (Hyper Text Transfer Protocol)
ugcnetdec2012ii computer-networks network-protocols
The ______ field is the SNMP PDV reports an error in a response message.
Protocols in which the sender sends one frame and then waits for an acknowledgment before proceeding for next frame
are called as ______
A. Simplex protocols B. Unrestricted simplex protocols
C. Simplex stop and wait protocols D. Restricted simplex protocols
ugcnet-oct2020-ii computer-networks network-protocols
Post office protocol (POP) is a message access protocol which is used to extract message for client. In this regards,
which of the following are true?
a. POP has two modes, Delete mode and keep b. In Delete mode, mail is deleted from mail box after each retrival
c. In Delete mode, mail is deleted from mail box before each
d. In keep mode, mail is deleted before retrival
retriveal Choose the correct answer from the options given below:
e. In keep mode, mail remains in mail box after retrival
A. (a) and (b) only B. (a) , (d) and (e) only
C. (a), (b), (c) and (d) only D. (a), (b) and (e) only
ugcnet-oct2020-ii computer-networks network-protocols
An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some
time without altering the information. This attack is called as _____.
A. Denial of service attack B. Masquarade attack
C. Simple attack D. Complex attack
ugcnetaug2016ii computer-networks network-security
Which of the following is the process by which a user’s access to physical data in the application is limited, based on
his privileges?
A. Authorization B. Authentication
C. Access Control D. All of these
ugcnetdec2010ii computer-networks network-security
AES is a round cipher based on the Rijndal Algorithm that uses a 128 – bit block of data. AES has three different
configurations. ______ rounds with a key size of 128-bits, ______ rounds with a key size of 192 bits and ______
rounds with a key size of 256 –bits
Using RSA algorithm, what is the value of cipher text C, if the plain text M=5 and p=3, q=11 and d=7?
A. 33 B. 5 C. 25 D. 26
ugcnetdec2012iii computer-networks network-security
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5?
A. 13 B. 21 C. 26 D. 33
ugcnetdec2015ii computer-networks network-security
The ability to inject packets into the Internet with a false source address is known as
A. Man-in-the-middle attack B. IP phishing
C. IP sniffing D. IP spoofing
ugcnetjune2019ii network-security
For your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any clue, a brute-force
attack takes time-′ t′ to crack the code on an ATM terminal. Therefore ′ t′ is the secure-time for a customer to report in
case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out of the following, which option
should provide the largest rise in the value of ′ t′ ?
SET, an open encryption and security specification model that is designed for protecting credit card transactions on the
internet, stands for
A. Secure Electronic Transaction B. Secular Enterprise for Transaction
C. Security Electronic Transmission D. Secured Electronic Termination
ugcnetjune2014ii computer-networks network-security
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key
"LAYER". The encrypted message is
A. CTTOEWMROPNRUEK B. MROUEKCTTPNROEW
C. OEWPNRCTTUEKMRO D. UEKPNRMROOEQCTT
ugcnetjune2015iii computer-networks network-security
If there are N people in the world and are using secret key encryption and decryption for privacy purpose, then the
number of secret keys required will be
N(N−1) N(N+1)
A. N B. (N − 1) C. 2 D. 2
ugcnetjune2016ii computer-networks network-security
An attacker sits between customer and banker and captures the information from the customer and retransmits to the
banker by altering the information . This attack is called as
A. Masquerade attack B. Replay attack
C. Passive attack D. Denial of service attack
ugcnetjune2016ii computer-networks network-security
Encrypt the plain text message ‘‘EXTRANET " using Transposition cipher technique with the following key :
3 5 2 1 4 (Cipher text)
1 2 3 4 5 (Plain text)
Using ‘Z' as bogus character.
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as
:
A. Authenticity
B. Non-Repudiability
C. Auditability
D. Repudiability
ugcnetjune2009ii network-security
Suppose transmission rate of a channel is 32 kbps. If there are ‘8′ routes from source to destination and each packet p
contains 8000 bits. Total end to end delay in sending packet P is _____.
Which of the following network access standard disassembler is used for connection station to a packet switched
network ?
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24
packets are required to transmit the message, the packet size is
i. Circuit
ii. Packet
iii.Switched
Message
Switched
Networks
Switched
Networks
Networks
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM?
In a fully connected mesh network with n devices, there are _____ physical channels to link all devices.
(A) Modulation
(B) Polling
(C) Segmentation
When data and acknowledgement are sent in same frame, this is called as
A. Piggy packing B. Piggy backing
C. Back packing D. Good packing
ugcnetdec2013ii computer-networks osi-model
A. 1, 2, 3 B. 2, 3, 4 C. 1, 3, 4, 5 D. 2, 3, 4, 5
ugcnetjune2010ii computer-networks osi-model
A. Network layer
B. Physical layer
C. Presentation layer
D. Application layer
A. Both (A) and (R) are true and (R) is the correct explanation for (A)
B. Both (A) and (R) are true but (R) is not the correct explanation
C. (A) is true but (R) is false
D. (A) is false but (R) is true
A. Physical layer
B. Presentation layer
C. Network layer
D. Application layer
Match the following Layers and Protocols for a user browsing with SSL :
Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
A. Transport layer B. Data link layer
C. Network layer D. Application layer
ugcnetjune2012iii computer-networks osi-protocol
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia
sessions?
A. Session Maintenance Protocol B. Real-time Streaming Protocol
C. Real-time Transport Control Protocol D. Session Initiation Protocol
ugcnetjune2015ii osi-protocol computer-networks
An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of
the signal are _____ and _____
A. 4000 bauds/sec & 1000 bps B. 2000 bauds/sec & 1000 bps
C. 1000 bauds/sec & 500 bps D. 1000 bauds/sec & 4000 bps
ugcnetdec2013ii computer-networks osi-model physical-layer
You are designing a link layer protocol for a link with bandwidth of 1 Gbps ( 109 bits/second) over a fiber link with
length of 800 km. Assume the speed of light in this medium is 200000 km/second. What is the propagation delay in
this link?
A. 1 millisecond B. 2 milliseconds
C. 3 milliseconds D. 4 milliseconds
ugcnetjune2019ii propagation-delay
What is the propagation time if the distance between the two points is 48, 000 ? Assume the propagation speed to be
2.4 × 108 metre/second in cable.
A. 0.5 ms B. 20 ms C. 50 ms D. 200 ms
ugcnetdec2014iii computer-networks propagation-time
A Pure ALOHA Network transmits 200 bit frames using a shared channel with 200 kbps bandwidth . If the system (all
stations put together) produces 500 frames per sec , then the throughput of the system is
What is the name of the protocol that allows a client to send a broadcast message with its MAC address and receive an
IP address in reply?
The device which connects dissimilar LANs of different topologies using different sets of communication protocols so
that information can flow from one to another is called :
A. Router
B. Bridge
C. Gateway
D. Switch
A station in a network in a network forward incoming packets by placing them on its shortest output queue. What
routing algorithm is being used ?
A. Hot potato routing B. Flooding
C. Static routing D. Delta routing
ugcnetdec2011ii computer-networks routing
Consider a subnet with 720 routers. If a three level hierarchy is chosen with 8 clusters, each containing 9 regions of 10
routers, then total number of entries in the routing table is _______
A. 25 B. 27 C. 53 D. 72
computer-networks routing ugcnetdec2015iii
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is
In RSA public key cryptosystem suppose n = p ∗ q where p and q are primes. (e, n) and (d, n) are public and private
keys respectively. Let M be an integer such that o < M < n and ϕ(n) = (p − 1)(q − 1).
Which of the following equations represent RSA public key cryptosystem?
C ≡ M e (mod n)
I.
M ≡ C d (mod n)
II. ed ≡ 1(mod n)
III. ed ≡ 1(mod ϕ(n))
C ≡ M e (mod ϕ(n))
IV.
M ≡ C d (mod ϕ(n))
A. I and II B. I and III
C. II and III D. I and IV
ugcnetjan2017iii computer-networks rsa-security-networks
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and
decrypt it using the public key. This property is used in
A. instruction detection systems B. digital signatures
C. data compression D. certification
ugcnetjune2019ii network-security rsa-security-networks computer-networks
The start and stop bits are used in serial communication for
A. error detection B. error correction
C. synchronization D. slowing down the communication
ugcnetdec2013iii computer-networks serial-communication
The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is _________.
A. 500 baud/sec B. 1000 baud/sec
C. 3000 baud/sec D. 18000 baud/sec.
ugcnetjune2014ii computer-networks serial-communication
The ______ measure the relative strengths of two signals or a signal at two different points.
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing
data frame is known as
Station A uses 32 byte packets t transmit messages to station B using sliding window protocol. The round trip delay
between A and B is 40 milliseconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The
optimal window size of A is
A. 20 B. 10 C. 30 D. 40
ugcnetjan2017iii computer-networks sliding-window
Four bits are used for packed sequence numbering in a slinding window protocol used in a computer network. What is
the maximum window size?
A. 4 B. 8 C. 15 D. 16
ugcnetjune2014iii computer-networks sliding-window
What is the maximum window size in sliding window protocol used in a computer
network ?
(A) 4
(B) 8
(C) 15
(D) 16
ugcnetdec2009ii computer-networks sliding-window
A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the
throughput of the system (all stations put together) produces 250 frames per second:
You need 500 subnets, each with about 100 usable host address per subnet. What network mask will you assign using
a class B network address?
A. 255.255.255.252 B. 255.255.255.128
C. 255.255.255.0 D. 255.255.254.0
ugcnetjune2019ii subnetting
A packet whose destination is outside the local TCP /IP network segment is sent to ________.
Which one of the following control fields in TCP header is used to specify whether the sender has no more data to
transmit?
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged?
A. TCP header length B. Window size
C. Acknowledgement number D. Urgent pointer
ugcnetsep2013iii computer-networks tcp
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them
independently to the destination
Which provides an interface to the TCP/IP suit protocols in Windows 95 and Windows NT?
A. FTP Active-X Control B. TCP/IP Active-X Control
C. Calinsock Active-X Control D. HTML Active-X Control
ugcnetdec2012iii computer-networks tcp-ip-suit-protocols
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which
they were sent by the sender?
A. Broadcasting B. Unicasting
C. Packet switching D. Circuit switching
ugcnetjune2015iii computer-networks data-communication tele-communication
A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token
bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is
______secs.
A. 1 B. 2 C. 3 D. 4
ugcnetjan2017iii computer-networks token-bucket
In a fast Ethernet cabling, 100 Base-TX uses ______ cable and maximum segment size is ______.
A. Twisted pair, 100 metres B. Twisted pair, 200 metres
C. Fibre optics, 1000 metres D. Fibre optics, 2000 metres
ugcnetaug2016ii computer-networks transmission-media
A network with bandwidth of 10 Mbps can pass only an average of 12, 000 frames per minute with each frame
carrying an average of 10, 000 bits. What is the throughput of this network ?
An analog signal has a bit rate of 8000 bps and a baud rate of 1000. Then analog signal has _____ signal elements and
carry _____ data elements in each signal.
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with
impedance 75 Ω used for
A. Cable TV B. Ethernet C. Thin Ethernet D. Thick Ethernet
ugcnetdec2012ii computer-networks transmission-media
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical angle
A. equal to B. less than
C. greater than D. less than or equal to
ugcnetjune2016ii computer-networks transmission-media
Transmission of N signals, each band limited to fm Hz by TDM, requires a minimum band-width of:
A. fm
B. 2 fm
C. N fm
D. 2N fm
1. 48 bytes long
2. 53 bytes long
3. 64 bytes long
4. 69 bytes long
Error control is needed at the transport layer because of potential error occurring ..............
(A) from transmission line noise
(B) in router
(C) from out of sequence delivery
(D) from packet losses
tcp transport-layer
Making sure that all the data packets of a message are delivered to the destination is ................ control.
(A) Error (B) Loss
(C) Sequence (D) Duplication
transport-layer tcp
(A) Wi-Max
(C) Wi-Fi
(D) 802.11 g
ugcnetdec2009ii computer-networks wifi
Which of the following services is not provided by wireless access point in 802.11 WLAN?
A. Association B. Disassociation
C. Error correction D. Integration
ugcnetdec2015ii computer-networks wireless-lan
What is the maximum operating rate of a wireless LAN using infrared communication ?
(A) MMDS
(B) ATM
(C) LMDS
(D) CDMA
ugcnetdec2009ii computer-networks wireless-lan
The unlicensed National Information Infrastructure band operates at the _________ frequency
(B) 5 GHz
(C) 33 MHz
(D) 5 MHz
ugcnetdec2009ii computer-networks wireless-lan
A. Both (A) and (R) are true and (R) is the correct explanation for (A)
B. (B) Both (A) and (R) are true but (R) is not the correct explanation
C. (A) is true but (R) is false
D. (A) is false but (R) is true
If the period of a signal is 1000 ms, then what is its frequency in kiliohertz?
Answer Keys
4.0.1 B 4.0.2 Q-Q 4.0.3 D 4.0.4 Q-Q 4.0.5 Q-Q
4.0.6 Q-Q 4.0.7 X 4.0.8 Q-Q 4.0.9 B 4.0.10 B
4.0.11 C 4.0.12 D 4.0.13 A 4.0.14 Q-Q 4.0.15 D
4.0.16 C 4.0.17 Q-Q 4.0.18 D 4.0.19 B 4.0.20 B
4.0.21 D 4.0.22 C 4.0.23 A 4.0.24 B 4.0.25 Q-Q
4.0.26 Q-Q 4.0.27 Q-Q 4.0.28 Q-Q 4.0.29 Q-Q 4.0.30 Q-Q
4.0.31 Q-Q 4.0.32 Q-Q 4.0.33 Q-Q 4.0.34 Q-Q 4.0.35 Q-Q
4.0.36 Q-Q 4.0.37 C 4.0.38 Q-Q 4.0.39 Q-Q 4.0.40 D
4.0.41 Q-Q 4.0.42 Q-Q 4.0.43 D 4.0.44 Q-Q 4.0.45 Q-Q
4.0.46 Q-Q 4.0.47 Q-Q 4.0.48 Q-Q 4.0.49 Q-Q 4.0.50 Q-Q
4.0.51 D 4.0.52 Q-Q 4.0.53 Q-Q 4.0.54 Q-Q 4.0.55 Q-Q
4.0.56 Q-Q 4.0.57 Q-Q 4.0.58 Q-Q 4.0.59 D 4.1.1 D
4.2.1 B 4.3.1 X 4.4.1 A 4.5.1 Q-Q 4.6.1 A
4.7.1 B 4.8.1 B 4.9.1 Q-Q 4.10.1 Q-Q 4.11.1 Q-Q
4.12.1 A 4.12.2 X 4.13.1 D 4.14.1 C 4.14.2 D
4.14.3 A 4.14.4 B 4.14.5 C 4.14.6 D 4.14.7 A
4.14.8 C 4.14.9 C 4.15.1 D 4.16.1 D 4.16.2 A
4.17.1 Q-Q 4.17.2 C 4.17.3 D 4.17.4 Q-Q 4.17.5 C
4.17.6 C 4.17.7 C 4.18.1 Q-Q 4.18.2 Q-Q 4.18.3 Q-Q
4.18.4 Q-Q 4.18.5 Q-Q 4.18.6 C 4.18.7 Q-Q 4.19.1 B
4.19.2 D 4.19.3 D 4.19.4 D 4.19.5 C 4.19.6 Q-Q
4.19.7 Q-Q 4.20.1 Q-Q 4.21.1 B 4.22.1 C 4.23.1 Q-Q
4.24.1 B 4.25.1 D 4.25.2 A 4.26.1 C 4.26.2 D
4.27.1 Q-Q 4.28.1 C 4.28.2 Q-Q 4.28.3 C 4.29.1 X
4.30.1 A 4.30.2 B 4.30.3 D 4.30.4 B 4.30.5 A
4.31.1 A 4.32.1 Q-Q 4.32.2 B 4.32.3 A 4.33.1 D
4.34.1 D 4.35.1 B 4.36.1 Q-Q 4.37.1 A 4.38.1 C
4.38.2 Q-Q 4.38.3 A 4.38.4 D 4.38.5 C 4.38.6 C
4.38.7 A 4.38.8 B 4.38.9 A 4.38.10 Q-Q 4.39.1 A
4.39.2 D 4.40.1 D 4.41.1 Q-Q 4.41.2 C 4.42.1 B
4.43.1 B 4.44.1 D 4.44.2 D 4.44.3 C 4.45.1 A
4.45.2 C 4.45.3 B 4.45.4 D 4.45.5 A 4.45.6 B
4.45.7 B 4.46.1 C 4.46.2 C 4.47.1 C 4.48.1 Q-Q
4.49.1 Q-Q 4.49.2 Q-Q 4.50.1 B 4.50.2 D 4.51.1 A
4.52.1 A 4.52.2 C 4.52.3 C 4.52.4 A 4.52.5 A
4.53.1 Q-Q 4.53.2 Q-Q 4.53.3 Q-Q 4.53.4 C 4.53.5 Q-Q
4.53.6 C 4.53.7 D 4.53.8 B 4.53.9 D 4.53.10 C
4.54.1 Q-Q 4.54.2 Q-Q 4.54.3 B 4.54.4 C 4.54.5 D
4.54.6 X 4.54.7 D 4.54.8 Q-Q 4.54.9 A 4.54.10 B
4.54.11 C 4.54.12 C 4.54.13 B 4.54.14 A 4.54.15 A
4.54.16 Q-Q 4.55.1 Q-Q 4.55.2 Q-Q 4.55.3 A 4.55.4 Q-Q
4.55.5 B 4.56.1 A 4.56.2 A 4.56.3 Q-Q 4.56.4 Q-Q
4.57.1 Q-Q 4.57.2 A 4.57.3 B 4.57.4 C 4.57.5 Q-Q
4.57.6 Q-Q 4.57.7 B 4.57.8 A 4.57.9 Q-Q 4.57.10 Q-Q
4.57.11 Q-Q 4.58.1 C 4.58.2 A 4.58.3 A 4.58.4 C
4.58.5 D 4.59.1 Q-Q 4.59.2 D 4.59.3 Q-Q 4.59.4 C
4.60.1 D 4.61.1 D 4.62.1 X 4.63.1 B 4.64.1 B
4.65.1 C 4.66.1 A 4.66.2 Q-Q 4.67.1 Q-Q 4.67.2 A
4.67.3 B 4.67.4 D 4.68.1 X 4.68.2 C 4.68.3 Q-Q
4.69.1 A 4.70.1 B 4.71.1 C 4.71.2 B 4.72.1 C
4.72.2 A 4.73.1 C 4.74.1 Q-Q 4.75.1 D 4.76.1 B
4.76.2 A 4.76.3 C 4.76.4 Q-Q 4.77.1 Q-Q 4.78.1 B
4.79.1 D 4.79.2 A 4.79.3 D 4.79.4 B 4.80.1 B
4.81.1 X 4.82.1 X 4.83.1 D 4.84.1 A 4.85.1 Q-Q
4.85.2 Q-Q 4.85.3 Q-Q 4.85.4 Q-Q 4.85.5 Q-Q 4.85.6 A
4.85.7 C 4.85.8 Q-Q 4.85.9 Q-Q 4.86.1 Q-Q 4.86.2 Q-Q
4.87.1 A 4.88.1 Q-Q 4.89.1 B 4.90.1 C 4.90.2 Q-Q
4.90.3 Q-Q 4.90.4 Q-Q 4.91.1 Q-Q 4.92.1 D 4.93.1 A
5 Databases (176)
The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of
individual records between
A. DBMS and the Host record B. Host program and the Host record
C. Host program and DBMS D. Host program and Host language
ugcnetdec2012ii databases
Which one of the following pairs is correctly matched in the context of database design ?
List-I(Database term) List-II(Definition)
I. Specialization A. Result of taking the union of two or more
disjoint (lower-level) entity sets to produce
a higher-level entity set.
II. Generalization B. Express the number of entities to which
another entity can be associated via a
relationship set.
III. Aggregation C. Result of taking a subset of a higher-level
entity set to form a lower-level entity set.
IV. Mapping cardinality D. An abstraction in which relationship sets
(along with their associated entity sets) are
treated as higher-level entity sets, and can
participate in relationships.
Codes :
A. I-D, II-A, III-B, IV-C B. I-D, II-C, III-B, IV-A
C. I-C, II-D, III-A, IV-B D. I-C, II-A, III-D, IV-B
ugcnetaug2016iii
A. Top - down B. Bottom - up C. Both (A) and (B) D. None of the above
ugcnetdec2004ii
Manager’s salary details are hidden from the employee. This is called as
A. Conceptual level data hiding B. Physical level data hiding
C. External level data hiding D. Local level data hiding
ugcnetjune2014ii databases
In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
i. Entities
ii. The relationship among entities
iii. The attributes of the entities
Then
A. (i) and (iii) B. (i) and (ii) C. (ii) and (iii) D. None of the above
ugcnetdec2004ii
(i) DML includes a query language based on both relation algebra and tuple calculus
(ii) DML includes a query language based on tuple calculus
(iii) DML includes a query language based on relational algebra
(iv) DML includes a query language based on none of the relational algebra and tuple calculus
Which one is correct ?
A. (i) only
B. (ii) only
C. (iii) only
D. (iv) only
ugcnetjune2009ii
ugcnetdec2006ii
A. A specific concrete object with a defined set of processes (e.g. Jatin with diabetes)
B. A value given to a particular attribute (e.g. height - 230 cm)
C. A thing that we wish to collect data about zero or more, possibly real world examples of it may exist
D. A template for a group of things with the same set of characteristics that may exist in the real world
ugcnetdec2015ii databases
5.0.16 UGCNET-July-2018-II: 68 https://gateoverflow.in/225818
Database systems that store each relation in a separate operating system file may use the operating system's
authorization scheme, instead of defining a special scheme themselves. In this case, which of the following is false?
ugcnetjuly2018ii databases
GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
A. 28-th record B. 27-th record
C. 3-rd record D. 4-th record
ugcnetdec2013ii databases
Which construct in SQL is used to test whether a subquery has any tuples in its result ?
A. UNIQUE
B. EXISTS
C. GROUP BY
D. EXCEPT
ugcnetjune2009ii
ORACLE supports :
ugcnetjune2009ii
The entity type on which the __________ type depends is called the identifying owner.
The problem that occurs when one transaction updates a database item and the transaction fails for some reason is
A. Temporary Select Problem B. Temporary Modify Problem
C. Dirty Read Problem D. None
ugcnetjune2012iii databases
A data which improves the performance and accessibility of the database are called:
A. Indexes B. User Data
C. Application Metadata D. Data Dictionary
ugcnetdec2015ii databases
ugcnetdec2007ii
ugcnetdec2006ii
Which of the following statement(s) is/are FALSE in the context of Relational DBMS?
I. Views in a database system are important because they with access control by aloowing users to see only a particular
subset of the data in the databse
II. E-R diagrams are useful to logically model concepts
III. An update anamoly is when it is not possible to store information unless some other, unrelated information is stored as well
IV. SQL is a procedural language
A. I and IV only B. III and IV only C. I, II and III only D. II, III and IV only
ugcnetjune2016ii databases
For each of the SQL queries, what is the cardinality (number of rows) of the result obtained when applied to the instances
above?
(A) 2 and 1 respectively (B) 1 and 2 respectively
(C) 2 and 2 respectively (D) 1 and 1 respectively
A. Aggregation is a strong type of association between two classes with full ownership
B. Aggregation is a strong type of association between two classes with partial ownership
C. Aggregation is a weak type of association between two classes with partial ownership
D. Aggregation is a weak type of association between two classes with full ownership
Aggregation is :
A B+ - tree index is to be built on the Name attribute of the relation STUDENT. Assume that all the student names are
of length 8 bytes, disk blocks are of size 512 bytes, and index pointers are of size 4 bytes. Given the scenario, what
would be the best choice of the degree (i.e. number of pointers per node) of the B+ - tree?
A. 16 B. 42 C. 43 D. 44
gatecse-2002 databases b-tree normal ugcnetjune2012ii
The upper bound and lower bound for the number of leaves in a B-tree of degree K with height h is given by :
The order of a leaf node in a B+ tree is the maximum number of children it can have. Suppose that block size is 1
kilobytes, the child pointer takes 7 bytes long and search field value takes 14 bytes long. The order of the leaf node is
_________.
A. 16 B. 63 C. 64 D. 65
ugcnetjan2017ii databases b+tree
Which of the following key constraints is required for functioning of foreign key in the context relational databases?
In relational database management, which of the following is/are property/properties of candidate key?
P: Uniqueness
Q: Irreducibility
Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys
(I, II, III and IV) for this table :
A B C D
a1 b1 c1 d1
a2 b3 c3 d1
a1 b2 c1 d2
I : {B} II : {B, C} III : {A, D} IV : {C, D}
If different symbols stand for different values in the table (e.g., d1 is definitely not equal to d2 ), then which of the above could
not be the candidate key for the database table?
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the Foreign
Key Design, the Cross Referencing Design or Mutual Referencing Design.
A. circular queue
B. linear queue
C. stack
D. deque
Consider a relational schema S = (U, V , W, X, Y , Z) on which the following functional dependencies hold:
(U → V , V W → X, Y → W, X → U)
Which are the candidate keys among following options?
A. UY , V Y B. UY , V Y , XY C. UY Z, V Y Z, V W Z D. UY Z, V Y Z, XY Z
ugcnet-oct2020-ii databases data-dependences
__________ refers loosely to the process of semi-automatically analyzing large databases to find useful patterns.
(A) OLTP
(B) OLAP
(C) OLDP
(D) OLPP
ugcnetdec2009ii databases data-mining
Which level of abstraction describes what data are stored in the database?
A. Physical level B. View level
C. Abstraction level D. Logical level
ugcnetjune2012iii databases data-model ugcnetdec2012iii
Views are useful for ____ unwanted information, and for collecting together information from more than one relation
into a single view.
An attribute A of datatype varchar (20) has value 'Ram' and the attribute B of datatype char (20) has value 'Sita' in
oracle. The attribute A has ________ memory spaces and B has _______ memory spaces.
A. 20, 20 B. 3, 20 C. 3, 4 D. 20, 4
ugcnetjan2017ii databases database-design
5.15 Database Normalization (23)
5.15.2 Database Normalization: GATE CSE 2005 | Question: 29, UGCNET-June2015-III: 9 https://gateoverflow.in/1365
5.15.3 Database Normalization: GATE CSE 2007 | Question: 62, UGCNET-June2014-II: 47 https://gateoverflow.in/1260
Consider a schema R(A, B, C, D) and functional dependencies A → B and C → D. Then the decomposition of R
into R1 (A, B) and R2 (C, D) is
The dependency preservation decomposition is a property to decompose database schema D, in which each functional
dependency X → Y specified in F ,
Armstrong (1974) proposed systematic approach to derive functional dependencies. Match the following w.r.t
functional dependencies:
List-I List -II
a. Decomposition Rule i. If X → Y and Z → W then {X, Z} → {Y , W}
b. Union rule ii. If X → Y and {Y , W} → Z then {X, W} → Z
c. Composition rule iii. If X → Y and X → Z then X → {Y , Z}
d. Psedudo transitivity rule iv. If X → {Y , Z} then X → Y and X → Z
Codes:
A. a-iii, b-ii, c-iv, d-i B. a-i, b-iii, c-iv, d-ii
C. a-ii, b-i, c-iii, d-iv D. a-iv, b-iii, c-i, d-ii
ugcnetdec2013iii databases database-normalization
The best normal form of relation scheme R(A, B, C, D) along with the set of functional dependencies
F = {AB → C, AB → D, C → A, D → B} is
A. Boyce-Codd Normal form B. Third Normal form
C. Second Normal form D. First Normal form
ugcnetdec2014ii databases database-normalization
Identify the minimal key for relational scheme R(A, B, C, D, E) with functional dependencies
F = {A → B, B → C, AC → D}
A. A B. AE C. BE D. CE
ugcnetdec2014ii databases database-normalization
A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies: F={AD→E, BE→F, B→C,
AF→G}. Which of the following is a candidate key?
A. A B. AB C. ABC D. ABD
ugcnetdec2015ii databases database-normalization
For database relation R(A, B, C, D) where the domains of A, B, C and D include only atomic values, only the
following functional dependencies and those that can be inferred from them are:
A→C
B→D
The relation R is in
In relational databases, if relation R is in BCNF, then which of the following is true about relation R?
A. R is in 4NF B. R is not in 1NF
C. R is in 2NF and not in 3NF D. R is in 2NF and 3NF
ugcnetjune2019ii database-normalization
For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional
dependency a → c, b → d holds in the following relation.
A. CD B. EC C. AE D. AC
ugcnetjune2014ii databases database-normalization
5.15.19 Database Normalization: UGCNET-June2014-III: 22 https://gateoverflow.in/56753
The Relation
Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because
If every non-key attribute is functionally dependent on the primary key, then the relation is in ________
A. First normal form B. Second normal form
C. Third normal form D. Fourth normal form
ugcnetnov2017-iii database-normalization
Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and R2 form a
decomposition of R. Then the decomposition is a lossless join decomposition of R provided that:
A. R1∩R2→R1 is in F+
B. R1∩R2→R2 is in F+
C. both R1∩R2→R1 and R1∩R2→R2 functional dependencies are in F+
D. at least one from R1∩R2→R1 and R1∩R2→R2 is in F+
(B) 2 NF
(C) 4 NF
(D) BCNF
ugcnetdec2009ii databases database-normalization
Consider the table R with attributes A, B and C . The functional dependencies that hold on R are : A → B, C → AB .
Which of the following statements is/are True ?
I. The decomposition of R into R1(C, A) and R2(A, B) is lossless.
II. The decomposition of R into R1(A, B) and R2(B, C) is lossy.
If a relation with a Schema R is decomposed into two relations R1 and R2 such that (R1 ∪ R2 ) = R1 then which one
of the following is to be satisfied for a lossless joint decomposition (→ indicates functional independency)
A. (R1 ∩ R2 ) → R1 or R1 ∩ R2 → R2
B. R1 ∩ R2 → R1
C. R1 ∩ R2 → R2
D. (R1 ∩ R2 ) → R1 and R1 ∩ R2 → R2
The relation schemas R1 and R2 form a Lossless join decomposition of R if and only if
A. aB.
andaC.
band
happen
aD.
dand
happen
b cand
happen
c happen
ugcnetjune2015iii databases decomposition database-normalization
Consider a schema R(MNP Q) and functional dependencies M → N, P → Q . Then the decomposition of R into
R1 (MN) and R2 (P Q) is __________.
The Global conceptual Schema in a distributed database contains information about global relations. The condition that
all the data of the global relation must be mapped into the fragments, that is, it must not happen that a data item which
belongs to a global relation does not belong to any fragment, is called :
A. Disjointness condition B. Completeness condition
C. Reconstruction condition D. Aggregation condition
ugcnetaug2016iii databases distributed-databases
In distributed databases, location transparency allows for database users, programmers and administratirs to treat the
data as if it is at one location, A SQL query with location transparency needs to specify
A. 2 B. 3 C. 4 D. 5
ugcnetdec2013iii databases er-diagram
A. The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999)
B. A weak relationship occurs when two relationship types are linked by either Event- Precedent sequence or Condition-
recedent sequence.
C. Conceptual model is not accurate representation of “Universe of interest”.
D. Ternary, Quaternary and Quintary relationships are shown through a series of application scenario’s and vignette’s.
What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-
relationship diagram
A. Generalization B. Aggregation
C. Specialization D. Adding suitable attributes
ugcnetdec2014ii databases er-diagram
5.20.6 Er Diagram: UGCNET-Dec2014-III: 38 https://gateoverflow.in/60653
A. B. C. D.
ugcnetdec2014iii databases er-diagram
Find minimum number of tables required for converting the following entity relationship diagram into relational
database?
A. 2 B. 4 C. 3 D. 5
ugcnetdec2019ii er-diagram
Let M and N be two entities in an E − R diagram with simple single value attributes. R1 and R2 are two relationship
between M and N , where as R1 , is one-to-many and R2 , is many-to-many.
The minimum number of tables required to represent M, N, R1 , and R2 , in the relational model are ___________.
A. 4 B. 6 C. 7 D. 3
ugcnetjan2017ii databases er-diagram
A. 1 NF B. 2 NF C. 3 NF D. 4 NF
databases er-diagram database-normalization ugcnetjuly2018ii
A. Weak entities can be deleted automatically when their strong entity is deleted
B. Weak entity set avoids the data duplication and consequent possible inconsistencies caused by duplicating the key of the
string entity
C. A weak entity set has no primary keys unless attributes of the strong entity set on which it depends are included
D. Tuples in a weak entity set are not partitioned according to their relationship with tuples with a strong entity set
Let E1 and E2 be two entities in E-R diagram with simple single valued attributes. R1 and R2 are two relationships
between E1 and E2 where R1 is one-many and R2 is many-many. R1 and R2 do not have any attribute of their own.
How many minimum number of tables are required to represent this situation in the Relational Model?
A. 4 B. 3 C. 2 D. 1
databases er-diagram ugcnetjune2015iii
An entity has:
(i) a set of properties
(ii) a set of properties and values for all the properties
(iii) a set of properties and the values for some set of properties may non-uniquely identify an entity
(iv) a set of properties and the values for some set of properties may uniquely identify an entity
Which of the above are valid?
A. (i) only
B. (ii) only
C. (iii) only
D. (iv) only
(A) I, II
(B) I, II, IV
(A) top-down
(B) bottom up
Database application were directly built on top of file system to overcome the following drawbacks of using file-
systems:
What is Granularity?
A. The size of database B. The size of data item
C. The size of record D. The size of file
ugcnetjune2012iii databases granularity
A. B. C. D.
ugcnetdec2016iii b-tree indexing
Consider the following three tables R, S and T. In this question, all the join operations are natural joins (⋈). (π) is the
projection operation of a relation:
R S T
A B B C A C
1 2 6 2 7 1
3 2 2 4 1 2
5 6 8 1 9 3
7 8 8 3 5 4
9 8 2 5 3 5
Possible answer tables for this question are also given as below:
A B C
1 2 4
1 2 5 A B C A B C
3 2 4 1 2 2 1 6 2 A B C
3 2 5 3 2 5 3 2 5 3 2 5
5 6 2 5 6 4 5 2 4 7 8 1
7 8 1 7 8 1 7 8 1 9 8 3
7 8 3 9 8 3 9 8 3 (d)
9 8 1 (b) (c)
9 8 3
(a)
Which of the following statements regarding the features of the object-oriented approach to databases are true?
A. a,B.b and
b,C.c cand
a,D.d,dc,
andd, eand e
ugcnetdec2015iii databases object-oriented-database
A. Objects in object-oriented databse contain not only data but also methods for processing the data
B. Object-oriented database store computational instructions in the same place as the data
C. Object-oriented database are mmore adapt at handling structured (analytical) data than relational databases
D. Object-oriented databases store more types of data than relational databases and access that data faster
Which of the following concurrency protocol ensues both conflict serializability and freedom from deadlock:
I. 2-phase locking
II. Time phase ordering
In RDBMS, which type of Join returns all rows that satisfy the join condition?
A. Inner Join B. Outer Join
C. Semi Join D. Anti Join
ugcnetjuly2018ii databases rdbms joins
Consider a relation book (title, price) which contains the titles and prices of different books. Assuming that no two
books have the same price, what does the following SQL query?
Select title
from book as B
where (select count(*)
from book as T
where T.price > B. price < 7
For a database relation R(a, b, c, d) where the domains of a, b, c and d include only atomic values and only the
following functional dependencies and those that can be inferred from them hold:
a→c
b→d
The relation is in ____
A. First normal form but not in second normal form B. Second normal form but not in third normal form
C. Third normal form D. BCNF
ugcnetjuly2018ii databases rdbms
A many-to-one relationship exists between entity sets r1 and r2 . How will it be represented using functional
dependencies if P k(r) denotes the primary key attribute of relation r?
The “PROJECT” operator of a relational algebra creates a new table that has always
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:
A. Referential integrity B. Multi-valued dependency
C. Entity integrity D. Functional dependency
ugcnetjune2016ii databases rdbms sql
In a relational database model, NULL values canbe used for all but which one of the following?
A. To allow duplicate tuples in the table by filling the primary key column(s) with NULL
B. To avoid confusion with actual legitimate data values like 0 (zero) or integer columns and " (the empty string) for string
columns
C. To leave columns in a tuple marked as "unknown" when the actual value is unknown
D. To fill a column in a tuple when that column does not really "exist" for that particular tuple
Consider a relation R(A, B, C, D, E, F, G, H) where each attribute is atomic, and following functional dependencies
exist.
CH → G
A → BC
B → CFH
E→A
F → EG
The relation R is ________
A. In 1NF but not in 2NF B. In 2NF but not in 3NF
C. In 3NF but not in BCNF D. In BCNF
ugcnetnov2017-iii databases rdbms database-normalization
_________ rules used to limit the volume of log information that has to be handled and processed in the event of
system failure involving the loss of volatile information.
A. Write-ahead log B. Check-pointing
C. Log buffer D. Thomas
ugcnetdec2014iii databases transaction-and-concurrency recovery-from-failure
Following table has two attributes Employee_id and Manager_id, where Employee_id is a primary key and manager_id
is a foreign key referencing Employee_id with on-delete cascade:
Employee_id Manager_id
20 40
25 40
30 35
35 20
40 45
45 25
On deleting the table (20, 40), the set of other tuples that must be deleted to maintain the referential integrity of table is
____ constraints ensure that a value that appears in one relation for a given set of attributes also appears for a certain set
of attributes in another relation.
A. Logical Integrity B. Referential Integrity
C. Domain Integrity D. Data Integrity
ugcnetsep2013iii databases referential-integrity
Let R1 (a, b, c) and R2 (x, y, z) be two relations in which a is the foreign key of R1 that refers to the primary key of
R2 . Consider the following four options.
a. Insert into R1 b. Insert into R2
c. Delete from R1 d. Delete from R2
Which of the following is correct about the referential integrity constraint with respect to above?
A. Operations a and b will cause violation B. Operations b and c will cause violation
C. Operations c and d will cause violation D. Operations d and a will cause violation
ugcnetjuly2018ii databases relation
A. πcustomer−name(σbalance>10000(Deposit))
B. σcustomer−name(σbalance>10000(Deposit))
C. πcustomer−name(σbalance>10000(Borrow) )
D. σcustomer−name(πbalance>10000(Borrow) )
Let pk(R) denotes primary key of relation R. A many-to-one relationship that exists between two relation R1 and R2
can be expressed as follows:
A. pk(R2 ) → pk(R1 ) B. pk(R1 ) → pk(R2 )
C. pk(R2 ) → R1 ∩ R2 D. pk(R1 ) → R1 ∩ R2
ugcnetjan2017iii databases relational-algebra
With respect to relational algebra, which of the following operations are included from mathematical set theory?
A. aB.
andbC.
dandcD.
candb dand d
ugcnetjune2019ii relational-algebra
Which of the following has same expressive power with regard to relational query language?
A. Dependency preserving and lossless join B. Lossless join but dependency preserving
C. Dependency preserving but not lossless join D. Not dependency preserving and not lossless join
ugcnetnov2017-iii databases relational-schema rdbms
Consider a database table R with attributes A and B. Which of the following SQL queries is illegal ?
A. SELECT A FROM R; B. SELECT A, COUNT(*) FROM R;
C. SELECT A, COUNT(*) FROM R GROUP BY A; D. SELECT A, B, COUNT(*) FROM R GROUP BY A, B;
ugcnetaug2016ii databases sql
Consider the following ORACLE relations : One (x, y) = , , , , , Two (x, y) = , , , , , , , Consider the following two
SQL queries SQ1 and SQ2 :
SQ1 :
SELECT * FROM One)
EXCEPT
(SELECT * FROM Two);
SQ2 :
SELECT * FROM One)
EXCEPT ALL
(SELECT * FROM Two);
For each of the SQL queries, what is the cardinality (number of rows) of the result obtained when applied to the instances
above ?
A. 2 and 1 respectively B. 1 and 2 respectively
C. 2 and 2 respectively D. 1 and 1 respectively
ugcnetaug2016iii databases sql
Given a Relation POSITION (Posting-No, Skill), then the query to retrieve all distinct pairs of posting-nos. requiring
skill is
A. Select p.posting-No, p.posting-No from position p where p.skill=p.skill and p.posting-No < p.posting-No
B. Select p1 .posting-No, p2 .posting-No from position p 1 , position p 2 where p 1 .skill=p2 .skill
C. Select p1 .posting-No, p2 .posting-No from position p 1 , position p 2 where p 1 .skill=p2 .skill and p 1 .posting.No < p 2 .posting-
No
D. Select p1 .posting-No, p2 .posting-No from position p 1 , position p 2 where p 1 .skill=p2 .skill and p 1 .posting.No = p 2 .posting-
No
Consider the table student (stuid, name, course, marks). Which one of the following two queries is correct to find the
highest marks student in course 5?
Q.1. Select S.stuid from student S where not exist (select * from student e where e course ='5' and e marks ≥ s marks)
Q.2. select s.stu.id From student S where s.marks > any (select distinct marks from student S where s.course =5)
A. Q.1 B. Q.2 C. Both Q.1 and Q.2 D. Neither Q.1 nor Q.2
ugcnetdec2013iii databases sql
Consider a "CUSTOMERS" database table having a column "CITY" filled with all the names of Indian cities (in capital
letters). The SQL statement that finds all cities that have "GAR" somewhere in its name, is:
A. select * from customers where city='%GAR%';
A. 5 B. 10 C. 15 D. 50
ugcnetdec2015iii databases sql
Suppose ORACLE relation R(A, B) currently has tuples {(1, 2), (1, 3), (3, 4)} and relation S(B, C) currently has
{(2, 5), (4, 6), (7, 8)}.Consider the following two SQL queries SQ1 and SQ2:
SQ1: Select * From R Full Join S On R.B=S.B;
SQ2: Select * From R Inner Join S On R.B=S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given by:
A. 2 and 6 respectively B. 6 and 2 respectively
C. 2 and 4 respectively D. 4 and 2 respectively
ugcnetdec2015iii databases sql
Consider the following three SQL queries (Assume the data in the people table):
A. 3 B. 7 C. 10 D. 21
ugcnetdec2015iii databases sql
ugcnetdec2019ii sql
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data
consistency. Which of the following statement(s) is (are) true w.r.t.the examples of integrity constraints?
a. An instructor Id. No. cannot be null, provided Instructor Id No.
b. No two citizens have same Adhar-ld.
being primary key.
c. Budget of a company must be zero.
A. a, b and c are true. B. a false, b and c are true.
C. a and b are true; c false. D. a,b and c are false.
ugcnetjan2017ii databases sql
A. Find the highest paid employee who earns more than the average salary of all employees of his company.
B. Find the highest paid employee who earns more than the average salary of all the employees of all the companies.
C. Find all employees who earn more than the average salary of all employees all the companies.
D. Find all employees who earn more than the average salary of all employees of their company.
Which data management language component enabled the DBA to define the schema components ?
The employee information of an organization is stored in a relation: Employee (name, sex, salary, deptname). Consider
the following SQL query:
Select deptname from Employee where sex=’M’ group by dept name having
avg (salary) > {select avg (salary) from Employee}
An Assertion is predicate expressing a condition we wish database to always satisfy. The correct syntax for Assertion
is:
A. CREATE ASSERTION 'ASSERTION Name' CHECK 'Predicate'
B. CREATE ASSERTION 'ASSERTION Name'
C. CREATE ASSERTION, CHECK 'Predicate' D. SELECT ASSERTION
ugcnetjune2015ii databases sql
A. a B. a, b and c C. d D. a and d
ugcnetjune2015ii databases sql
The STUDENT information in a university stored in the relation STUDENT (Name, SEX, Marks, DEPT_Name).
COnsider the following SQL Query:
SELECT DEPT_Name from STUDENT where SEX='M'
group by DEPT_Name having avg(Marks)>SELECT avg(Marks) from STUDENT
A. The average marks of Male students is more than the average marks of students in the department
B. The average marks of Male students is more than the average marks of students in the university
C. The average marks of students is more than the average marks of male students in the university
D. The average marks of Male students is more than the average marks of male students in the university
Consider the following two comments C1 and C2 on the relation R from an SQL database:
C1 : drop table R;
C2 : delete from R
Consider teh relations R(A, B) and S(B, C) and the following four relational algebra queries over R ans S
I. πA,B (R ⋈ S)
II. R ⋈ πB (S)
III. R ∩ (πA (R) × πB (S))
IV. ΠA.R.B (R × S) where R. B refers to the column B in table R
Given two relations R1 (A, B) and R2 (C, D), the result of following query
Select distinct A, B
From R1, R2
DEPARTMENT
PROJECT WORK:
Refer table, structures given above, University decided to give all employees in the ‘SCIENCE’ department a 20% rise in
salary. Which of the following query/queries will compute the above results?
UPDATE
SETWHERE
SALARY
EMPLOYEE
DEPT
= SALARY*1.20
NO.
UPDATE
SET
IN (SELECT
SALARY
TABLE EMPLOYEE
=
DID
SALARY*1.20
ALTER
FROM
SETDEPARTMENT
WHERE
TABLE
SALARY=SALARY*1.20
WHERE
DEPTNO.
EMPLOYEE
DNAME=’SCIENCE’;
WHERE
IN DNAME
(SELECT
= ‘SCIENCE’);
DNAME FROM DEPARTMENT WHERE D
Consider the following table structures related to a university for the below question.
EMPLOYEE
NAME VARCHAR (30) NOT NULL,
EID VARCHAR (10) NOT NULL,
DEPTNO INT (5) NOT NULL,
HODEID VARCHAR (10),
SALARY INT (10),
PRIMARY KEY (EID),
FOREIGN KEY (HODEID) REFERENCES EMPLOYEE (EID),
FOREIGN KEY (DEPTNO) REFERENCES DEPARTMENT (DID);
DEPARTMENT
DID INT (5) NOT NULL,
DNAME VARCHAR(30) NOT NULL,
HODID VARCHAR (10) NOT NULL,
HODNAME VARCHAR (30),
PRIMARY KEY (DID),
UNIQUE (DNAME),
FOREIGN KEY (HODID) REFERENCES EMPLOYEE (EID)
PROJECT WORK:
EMPID VARCHAR (10) NOTNULL,
PROJNO INT(5) NOT NULL,
PROJECTLOC VARCHAR (30) NOT NULL,
PRIMARY KEY (EMPID, PROJNO),
FOREIGN KEY (EMPID) REFERENCES EMPLOYEE (EID),
On the basis of above given table structures, retrieve the distinct employee ID (EMPID) of all employees of university who are
working on project. No. 20, 30 and 40
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Given below are two statements to find the sum of salaries of all employees of the English department as well as the maximum,
minimum and average salary in English department
STATEMENT I :
SELECT SUM (SALARY) MAX(SALARY) MIN(SALARY),
AVG (SALARY) FROM EMPLOYEE, DEPARTMENT
WHERE DEPTNO=DID AND DNAME=’ENGLISH’
STATEMENT II :
SELECT SUM (SALARY), MAX(SALARY), MIN (SALARY),
AVG (SALARY), FROM EMPLOYEE, DEPARTMENT
WHERE DNAME=’ENGLISH’
In the light of the above statements, choose the correct answer from the options given below:
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Which of the following query/queries return the employee ID and name of employees whose salary is greater than the salary of
all employees in department number 20 of university. Order result by employee ID (refer table structures given above).
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
In reference to the above given table structures, which of the following query/queries will drop the ‘SALARY’ column from
‘EMPLOYEE’ table?
A. All branches that have greater assets than some branch located in Mumbai
B. All branches that have greater assets than all branches in Mumbai
C. The branch that has greatest asset in Mumbai
D. Any branch that has greater assets than any branch in Mumbai
Consider the following four schedules due to three transactions (indicated by the subscript) using read and write on a
data item X , denoted by r(X) and w(X) respectively. Which one of them is conflict serializable?
S1 : r1(X); r2(X); w1(X); r3(X); w2(X)
S2 : r2(X); r1(X); w2(X); r3(X); w1(X)
S3 : r3(X); r2(X); r1(X); w2(X); w1(X)
S4 : r2(X); w2(X); r3(X); r1(X); w1(X)
A. S1 B. S2 C. S3 D. S4
ugcnetnov2017-iii databases transaction-and-concurrency
Suppose a database schedule S involves transactions T1, T2, … , Tn . Consider the precedence graph of S with
vertices representing the transactions and edges representing the conflicts. If S is serializable, which one of the
following orderings of the vertices of the precedence graph is guaranteed to yield a serial schedule?
A. Topological order B. Depth – first order
C. Breadth – first order D. Ascending order of transactions indices
ugcnetnov2017-iii databases transaction-and-concurrency
5.40.8 Transaction And Concurrency: UGCNET-Sep2013-II: 37 https://gateoverflow.in/59245
Thoma’s-write rule is
A. Two phase locking protocol B. Timestamp ordering protocol
C. One phase locking protocol D. Sliding window protocol
ugcnetsep2013ii databases transaction-and-concurrency
In the context of concurrency control, a given pair of operations in a schedule is called conflict schedule if
a. At least one of the operations is write operation b. Both the operations are performed on the same data item
c. Both the operations are performed by different transactions d. Both the operations are performed on different data items
Choose the correct answer from the options given below:
A. (a) and (b) only B. (a), (b) and (c) only
C. (a), (c) and (d) only D. (c) and (d) only
ugcnet-oct2020-ii databases transactions-and-concurrency-control
If following sequence of keys are inserted in a B+ tree with K(= 3) pointers: 8, 5, 1, 7, 3, 12, 9, 6
Which of the following shall be correct B+ tree?
A. B. C. D.
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their
attribute values, is called as:
A. Neighbour Set B. Strong Entity Set
C. Owner Entity Set D. Weak Set
ugcnetjune2015ii databases weak-entity
Answer Keys
5.0.1 Q-Q 5.0.2 B 5.0.3 C 5.0.4 Q-Q 5.0.5 Q-Q
5.0.6 D 5.0.7 Q-Q 5.0.8 Q-Q 5.0.9 C 5.0.10 D
5.0.11 D 5.0.12 Q-Q 5.0.13 Q-Q 5.0.14 Q-Q 5.0.15 D
5.0.16 Q-Q 5.0.17 B 5.0.18 B 5.0.19 Q-Q 5.0.20 Q-Q
5.0.21 Q-Q 5.0.22 Q-Q 5.0.23 Q-Q 5.0.24 C 5.0.25 A
5.0.26 Q-Q 5.0.27 Q-Q 5.0.28 Q-Q 5.0.29 D 5.0.30 D
5.0.31 Q-Q 5.1.1 C 5.1.2 Q-Q 5.2.1 B 5.2.2 C
5.2.3 A 5.3.1 X 5.4.1 C 5.4.2 B 5.4.3 C
The period of a signal is 100 ms, then the frequency of this signal in kilohertz is ______
ugcnetdec2004ii
digital-logic
6.0.8 UGCNET-June2013-III: 46 https://gateoverflow.in/58518
The simplified form of the Boolean equation (AB̄ + AB̄ + AC)(ĀC̄ + B̄) is
Synchronization is achieved by a timing device called a ______ which generates a periodic train of __________.
A. clock generator, clock pulse B. master generator, clock pulse
C. generator, clock D. master clock generator, clock pulse
ugcnetdec2013iii digital-logic
ugcnetdec2013ii digital-logic
In order to build a MOD - 18 counter, the minimum number of flip flops needed is equal to :
A. 18 B. 9 C. 5 D. 4
ugcnetdec2007ii
I. A circuit that adds two bits, producing a sum bit and carry bit is called half adder.
II. A circuit that adds two bits, producing a sum bit and carry bit is called full adder.
III. A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
IV. A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
A. I & II B. II & III C. I, II, III D. I, III & IV
ugcnetdec2013ii digital-logic adder
A. 24 B. 28 C. 212 D. 216
ugcnetjune2013ii digital-logic boolean-algebra
How many different truth tables of the compound propositions are there that involve the propositions p & q ?
A. 2 B. 4 C. 8 D. 16
ugcnetjune2014ii digital-logic boolean-algebra
A Boolean function F is called self dual if and only if F(x1 , x2 , . . . . . xn ) = F(x̄1 , x̄2 , . . . . x̄n ) . How many Boolean
functions of degree n are self-dual ?
n 2 n−1
A. 2n B. (2)2 C. (2)n D. (2)2
ugcnetjune2014ii digital-logic boolean-algebra
A. (a) only B. (b) only C. (a) and (b) only D. (b) and (d) only
(A) X + Y + ZX + Y
(B) XY – YZ
(C) X + YZ
(D) XZ + Y
ugcnetdec2009ii digital-logic boolean-algebra
If A⊕B=C, then:
(A) A⊕C=B (B) B⊕C=A
(C) A⊕B⊕C=1 (D) A⊕B⊕C=0
boolean-algebra
A. x B. y C. z D. x + y + z
ugcnetjune2009ii digital-logic boolean-algebra
The simplified function in product of sums of Boolean function F(W, X, Y , Z) = Σ(0, 1, 2, 5, 8, 9, 10) is
What are the final values of Q1 and Q0 after 4 clock cycles, if initial values are 00 in the sequential circuit shown
below:
A. 11 B. 01 C. 10 D. 00
isro2014 digital-logic circuit-output ugcnetdec2012iii ugcnetdec2013iii
6.4.2 Circuit Output: UGCNET-Dec2012-II: 1 https://gateoverflow.in/56500
Consider the circuit shown below. IN a certain steady state, ‘Y’ is at logical ‘l’. What are the possible values of A, B,
C?
Which of the following logic operations is performed by the following given combinational circuit ?
is :
A. X. Y B. X + Y
C. X ⨁ Y D. X ⨁ Y
ugcnetaug2016iii digital-logic combinational-circuits
A. (a) and (b) B. (b) and (c) C. (c), (d) and (e) D. (d) and (e)
ugcnetaug2016iii digital-logic digital-circuits
¯ B) is equivalent to
AB + (A +
A. A ⨁ B B. A ⨀ B
C. (A ⨁ B) ⨀ A D. (A ⨀ B) ⨁ A
ugcnetdec2010ii digital-logic digital-circuits
ECL is the fastest of all logic families. High speed in ECL is possible because transistors are used in difference
amplifier configuration, in which they are never driven into ________.
The logic expression for the output of the circuit shown in the figure is
A. ĀC̄ + B̄C̄ + CD B. AC̄ + BC̄ + C̄ D
C. ABC + C̄D̄ D. ĀB̄ + B̄C̄ + C̄D̄
ugcnetjune2010ii digital-logic digital-circuits
What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
A. 1V B. 2V C. 5V D. 10V
ugcnetjune2010ii digital-logic digital-circuits
Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?
A. AND, OR, NOT B. NAND, NOR C. EX-OR, EX-NOR D. None of the above
ugcnetsep2013ii digital-logic digital-circuits
Extremely low power dissipation and low cost per gate can be achieved in:
A. MOS ICs B. C MOS ICs
C. TTL ICs D. ECL ICs
ugcnetdec2008ii digital-logic digital-circuits
1. X − OR gate
2. AND gate
3. OR gate
4. NOR gate
A binary 3 − bit down counter uses J − K flip-flops, FFi with inputs Ji , Ki and outputs Qi , i = 0, 1, 2
respectively. The minimized expression for the input from following is
I. J0 = K0 =0
II. J0 = K0 =1
III. J1 = K1 = Q0
IV. J1 = K1 = Q′0
V. J2 = K2 = Q1 Q0
VI. J2 = K2 = Q′1 Q′0
What will be the number of states when a MOD- 2 counter is followed by a MOD- 5 counter?
A. 5 B. 10 C. 15 D. 20
ugcnetjune2019ii digital-counter
A text is made up of the characters α, β, γ, δ and σ with the probability 0.12, 0.40, 0.15, 0.08 and 0.25 respectively.
The optimal coding technique will have the average length of
A binary 3-bit down counter uses J -K flip-flops, FFi with inputs Ji , Ki and outputs Qi , i = 0, 1, 2 respectively. The
minimized expression for the input from following is :
I. J0 = K0 =0
II. J0 = K0 =1
III. J1 = K1 = Q0
IV. J1 = K1 = ¯Q
¯¯¯
0
V. J2 = K2 = Q1 Q0
VI. J2 = K2 = ¯Q
¯¯¯ ¯¯¯¯
1 Q0
In RS flip-flop, the output of the flip-flop at time (t + 1) same as the output at time t, after the occurrence of a clock
pulse if :
A. S = R = 1 B. S = 0, R = 1 C. S = 2, R = 0 D. S = R = 0
ugcnetjuly2018ii digital-logic flip-flop
In a positive edge triggered J -K flip flop , if J and K both are high then the output will be ______on the rising edge
of the clock :
The power dissipation of a flip-flop is 3 mW. The power dissipation of a digital system with 4 flip-flops is given by :
A. 34 mW B. 43 mW C. 4/3 mW D. 12 mW
ugcnetsep2013iii digital-logic flip-flop
An Astable multi vibrator using the 555 timer to generate a square wave of 5 KHz with 70% duty cycle will have :
The range of representable normalized numbers in the floating point binary fractional representation in a 32-bit word
with 1-bit sign, 8-bit excess 128 biased exponent and 23-bit mantissa is :
The IEEE-754 double precision format to represent floating point numbers, has a length of ______ bits.
A. 16 B. 32 C. 48 D. 64
ugcnetjune2016ii digital-logic ieee-representation
The IEEE single-precision and double-precision format to represent floating-point numbers, has a length of ______
and ________ respectively.
A. 8 bits and 16 bits B. 16 bits and 32 bits
C. 32 bits and 64 bits D. 64 bits and 128 bits
ugcnetsep2013ii digital-logic ieee-representation
Consider the below circuit and find the output function f(x, y, z)
A terminal multiplexer has six 1200 bps terminals and ′ n′ 300 bps terminals connected to it. If the outgoing line is
9600 bps, what is the value of n?
A. 4 B. 8 C. 16 D. 28
ugcnetjune2014iii digital-logic multiplexer
A. 16 input MUX
B. 8 input MUX
C. 4 input MUX
D. 2 input MUX
Which of the following is the most efficient to perform arithmetic operations on the numbers ?
A. Sign-magnitude B. 1′ s complement
C. 2′ s complement D. 9′ s complement
ugcnetaug2016ii digital-logic number-representation
A. D24 B. 1 B D C. 1 A E D. 1 A D
ugcnetjuly2018ii digital-logic number-representation
Perform the following operation for the binary equivalent of the decimal numbers (−14)10 + (−15)10 . The solution in
8 bit representation is
If an integer needs two bytes of storage, then the maximum value of signed integer is
(A) 150
(B) 241
(C) 142
(D) 101011110
ugcnetdec2009ii digital-logic number-representation
(A) 8
(B) 9
(C) 10
(D) 11
ugcnetdec2009ii digital-logic number-representation
Given that (292)10 = (1204)x in some number system x. The base x of that number system is
A. 11 … 11 B. 00 … 00 C. 100 … 0 D. 000 … 1
ugcnetjan2017ii digital-logic number-system
Convert the octal number 0.4051 into its equivalent decimal number.
Consider the equation (146)b + (313)b−2 = (246)8 . Which of the following is the value of b?
A. 8 B. 7 C. 10 D. 16
ugcnetjune2019ii number-system
The parallel bus arbitration technique uses an external priority encoder and a decoder. Suppose, a parallel arbiter has 5
bus arbiters. What will be the size of priority encoder and decoder respectively?
A. 4 × 2, 2 × 4 B. 2 × 4, 4 × 2
C. 3 × 8, 8 × 3 D. 8 × 3, 3 × 8
ugcnetjune2019ii priority-encoder
A binary ripple counter is required to count up to 16383. How many flip-flops are required?
The size of the ROM required to build an 8-bit adder / subtractor with mode control, carry input, carry output and
two's complement overflow output is given as
A. 216 × 8 B. 218 × 10
C. 216 × 10 D. 218 × 8
ugcnetdec2014ii digital-logic rom
A. 8 B. 9 C. 27 D. 11
ugcnetjune2015iii digital-logic sequential-circuit flip-flop
A reduced state table has 18 rows. The minimum number of Flip-flops needed to implement the sequential machine is :
A. 18 B. 9 C. 5 D. 4
ugcnetjune2009ii digital-logic sequential-circuit
The sum of products expansion for the function F(x, y, z) = (x + y)z̄¯ is given as
ugcnetdec2015iii unix
Answer Keys
6.0.1 C 6.0.2 Q-Q 6.0.3 Q-Q 6.0.4 Q-Q 6.0.5 Q-Q
6.0.6 Q-Q 6.0.7 Q-Q 6.0.8 C 6.0.9 A 6.0.10 A
6.0.11 Q-Q 6.0.12 C 6.0.13 C 6.0.14 C 6.0.15 A
6.0.16 A 6.0.17 Q-Q 6.1.1 Q-Q 6.1.2 D 6.1.3 D
6.2.1 C 6.2.2 D 6.2.3 D 6.2.4 D 6.2.5 D
6.2.6 D 6.2.7 Q-Q 6.2.8 Q-Q 6.2.9 Q-Q 6.3.1 A
6.4.1 D 6.4.2 A;D 6.5.1 Q-Q 6.5.2 Q-Q 6.5.3 Q-Q
6.6.1 Q-Q 6.6.2 Q-Q 6.6.3 A 6.6.4 A 6.6.5 B;D
6.6.6 B 6.6.7 Q-Q 6.6.8 Q-Q 6.6.9 C 6.6.10 Q-Q
6.6.11 Q-Q 6.7.1 Q-Q 6.7.2 B 6.8.1 C 6.8.2 Q-Q
6.9.1 B 6.10.1 A OR C 6.11.1 Q-Q 6.11.2 D 6.11.3 Q-Q
6.11.4 D 6.11.5 D 6.11.6 X 6.11.7 Q-Q 6.12.1 D
6.13.1 A 6.14.1 D 6.14.2 C 6.15.1 Q-Q 6.15.2 Q-Q
6.15.3 Q-Q 6.16.1 B 6.17.1 Q-Q 6.18.1 A 6.18.2 B
6.18.3 Q-Q 6.18.4 Q-Q 6.19.1 Q-Q 6.19.2 Q-Q 6.19.3 Q-Q
6.19.4 Q-Q 6.19.5 Q-Q 6.19.6 Q-Q 6.19.7 B 6.19.8 C
6.19.9 B 6.19.10 Q-Q 6.19.11 Q-Q 6.19.12 Q-Q 6.20.1 D
6.20.2 C 6.20.3 B 6.20.4 A 6.20.5 B 6.20.6 C
6.21.1 Q-Q 6.22.1 D 6.23.1 Q-Q 6.23.2 Q-Q 6.23.3 D
6.24.1 B 6.25.1 Q-Q 6.25.2 C 6.25.3 C 6.25.4 B
6.25.5 C 6.25.6 Q-Q 6.26.1 D 6.27.1 D
7 Discrete Mathematics: Combinatory (14)
The number of distinct bracelets of five beads made up of red, blue and green beads (two bracelets are indistinguishable
if the rotation of one yield another) is,
A. 243 B. 81 C. 51 D. 47
ugcnetdec2012iii
How many cards must be chosen from a deck to guarantee that at least
How many committees of five people can be chosen from 20 men and 12 women such that each committee contains at
least three women
How many multiples of 6 are there between the following pairs of numbers ?
(1) 16 and 6
(2) 17 and 6
(3) 17 and 7
(4) 16 and 7
How many ways are there to place 8 indistinguishable balls into four distinguishable bins?
A. 70 B. 165 C. 8 C4 D. 8 P4
ugcnetjune2019ii combinatory
A. 6 B. 42 C. 132 D. 256
ugcnetjune2016iii combinatory binary-tree
How many strings of 5 digits have the property that the sum of their digits is 7?
A. 66 B. 330 C. 495 D. 99
ugcnetjune2015ii discrete-mathematics counting
In how many ways can 15 indistinguishable fish be placed into 5 different ponds, so that each pond contains at least
one fish?
How many ways are there to pack six copies of the same book into four identical boxes, where a box can contain as
many as six books?
A. 4 B. 6 C. 7 D. 9
ugcnet-oct2020-ii discrete-mathematics combinatory
1
ϕ(n) = n Π ( (1– ) )
p/n p
where p runs over all the primes dividing n. What is the value of ϕ(45)?
A. 3 B. 12 C. 6 D. 24
ugcnetjune2019ii euler-phi-function
How many bit strings of length ten either start with a 1 bit or end with two bits 00 ?
How many cards must be selected from a standard deck of 52 cards to guarantee that at least three hearts are present
among them?
A. 9 B. 13 C. 17 D. 42
ugcnetjune2019ii combinatory pigeonhole-principle
The number of bit strings of length eight that will either start with a 1 bit and end with two bits 00 shall be
A. 32 B. 64 C. 128 D. 160
ugcnetdec2012ii combinatory recurrence
Answer Keys
7.0.1 C 7.0.2 A 7.0.3 B 7.0.4 Q-Q 7.0.5 B
7.1.1 C 7.2.1 B 7.2.2 A 7.3.1 A 7.3.2 D
7.4.1 D 7.5.1 C 7.6.1 D 7.7.1 D
8 Discrete Mathematics: Graph Theory (46)
For which values of m and n does the complete bipartite graph km,n have a Hamiltonian circuit ?
A. m ≠ n, m, n ≥ 2 B. m ≠ n, m, n ≥ 3
C. m = n, m, n ≥ 2 D. m = n, m, n ≥ 3
ugcnetjune2019ii graph-theory
a. A connected multigraphb.has
A an
connected
Euler Circuit
multigraph
if andc.has
only
A an
complete
if Euler
each of
Path
graph
its but
vertices
(Knot
n) has
d.
an
has
Euler
Aa even
Hamilton
cycle
Circuit
degree.
overCircuit
six
if and
vertices
only if(CCodes
whenever n≥
it6)has
is :3.a bipartite
not
exactly two vertices
graph but
of odd
a comple
degre
The two distinct set of vertices, which make the graph bipartite are
A. (v1 , v4 , v6 ); (v2 , v3 , v5 , v7 , v8 )
B. (v1 , v7 , v8 ); (v2 , v3 , v5 , v6 )
C. (v1 , v4 , v6 , v7 ); (v2 , v3 , v5 , v8 )
D. (v1 , v4 , v6 , v7 , v8 ); (v2 , v3 , v5 )
ugcnetdec2015ii graph-theory
When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell
getting strongest signal. This process is known as
A. handoff B. mobile switching
C. mobile routing D. cell switching
ugcnetjune2013ii
ugcnetjune2014iii graph-theory
1. Which of the following connected graph has exactly one spanning tree?
Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement form?
The following lists are the degrees of all the vertices of a graph :
i. 1, 2, 3, 4, 5
ii. 3, 4, 5, 6, 7
iii. 1, 4, 5, 8, 6
iv. 3, 4, 5, 6
A. (i) and (ii) B. (iii) and (iv) C. (iii) and (ii) D. (ii) and (iv)
ugcnetdec2004ii
Weighted graph :
A. Is a bi-directional graph B. Is directed graph
C. Is graph in which number associated with arc D. Eliminates table method
ugcnetdec2004ii
How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected
components?
A. 3
B. 4
C. 5
D. 6
ugcnetjune2009ii
E is the number of edges in the graph and f is maximum flow in the graph. When the capacities are integers, the
runtime of Ford-Fulberson algorithm is bounded by
A. O (E ∗ f) B. O (E 2 ∗ f) C. O (E ∗ f 2 ) D. O (E 2 ∗ f 2 )
ugcnetjuly2018ii graph-theory
(A) No vertices
(C) ∞ vertices
The set of positive integers under the operation of ordinary multiplication is:
(A) not a monoid (B) not a group
(C) a group (D) an Abelian group
ugcnetjune2008ii
Consider a full binary tree with n internal nodes, internal path length I , and external path length e. the internal length
of a full binary tree is the sum, taken over all nodes of the tree, of the depth of each node. Similarly, the external path
length is the sum, taken over all leaves of the tree, of the depth of each leaf.
Which of the following is correct for the full binary tree?
A. e = i + n B. e = i + 2n C. e = 2i + n D. e = 2n + i
ugcnetnov2017-iii data-structures binary-tree
A ____ complete subgraph and a _____ subset of vertices of a graph G=(V,E) are a clique and a vertex cover
respectively
A. minimal, maximal B. minimal, minimal
C. maximal, minimal D. maximal, maximal
ugcnetdec2013iii engineering-mathematics discrete-mathematics graph-theory
Consider a Hamiltonian Graph(G) with no loops and parallel edges. Which of the following is true with respect to this
graph (G)?
(G1 ) (G2 )
Which of the following is correct ?
A. G1 contains Euler circuit and (G2 ) does not contain Euler circuit.
B. (G1 ) does not contain Euler circuit and (G2 ) contains Euler circuit.
C. Both (G1 ) and (G2 ) do not contain Euler circuit.
D. Both (G1 ) and (G2 ) contain Euler circuit.
An undirected graph possesses an eulerian circuit if and only if it is connected and its vertices are
A. All of even degree B. All of odd degree
C. Of any degree D. Even in number
ugcnetdec2010ii graph-theory euler-graph
Consider the following properties with respect to a flow network G = (V , E) in which a flow is a real-valued function
f : V × V → R:
P1 : For all u, v, ∈ V , f(u, v) = −f(v, u)
P2 : Σ f(u, v) = 0 for all u ∈ V
v∈V
Which one of the following is/are correct?
(A) n
(D) (n^2)/2
ugcnetdec2009ii graph graph-theory
Consider a Hamiltonian Graph G with no loops or parallel edges and with |V (G)| = n ≥ 3 . The which of the
following is true?
The number of colours required to properly colour the vertices of every planer graph is
A. 2 B. 3 C. 4 D. 5
ugcnetjune2012ii graph-theory graph-coloring
Consider an undirected graph G where self-loops are not allowed. The vertex set of G is
(i, j)|1 ≤ i ≤ 12, 1 ≤ j ≤ 12 . There is an edge between (a, b) and (c, d) if |a– c| ≤ 1 or |b– d| ≤ 1 . The number of
edges in this graph is
Consider a Hamiltonian Graph G with no loops or parallel edges and with |V (G)| = n ≥ 3. Then which of the
following is true?
The minimum number of edges in a connected graph with ‘n′ vertices is equal to
n(n−1)
A. n(n– 1) B. 2 C. n2 D. n– 1
ugcnetdec2010ii graph-theory graph-connectivity
McCabe’s cyclomatic metric V (G) of a graph G with n vertices, e edges and p connected component is
A. e B. n
C. e– n + p D. e– n + 2p
ugcnetdec2011ii graph-theory graph-connectivity
Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that the graph
is not connected is
C. D.
A. B.
ugcnetjune2014ii graph-theory non-gate graph-isomorphism
Two graphs A and B are shown below: Which one of the following statements is true?
Consider a complete bipartite graph km,n . For which values of m and n does this, complete graph have a Hamilton
circuit
A. m = 3, n = 2 B. m = 2, n = 3
C. m = n > 2 D. m = n > 3
ugcnetjune2014ii graph-theory hamiltonian-graph
Suppose that a connected planar graph has six vertices, each of degree four. Into how many regions is the plane divided
by a planar representation of this graph?
A. 6 B. 8 C. 12 D. 20
ugcnetjune2019ii graph-planarity handshaking-theorem
A.
B. C. D.
ugcnetjune2015ii graph-theory minimum-spanning-trees
How many edges are there in a forest of t-trees containing a total of n vertices ?
A. n + t B. n – t C. n ∗ t D. nt
ugcnetdec2013ii data-structures trees
Answer Keys
8.0.1 Q-Q 8.0.2 C 8.0.3 D 8.0.4 C 8.0.5 C
8.0.6 A 8.0.7 B 8.0.8 B 8.0.9 D 8.0.10 B
8.0.11 Q-Q 8.0.12 Q-Q 8.0.13 Q-Q 8.0.14 Q-Q 8.0.15 C
8.0.16 Q-Q 8.0.17 Q-Q 8.0.18 Q-Q 8.0.19 Q-Q 8.0.20 Q-Q
8.1.1 B 8.2.1 C 8.2.2 D 8.3.1 Q-Q 8.3.2 Q-Q
8.4.1 A 8.5.1 Q-Q 8.6.1 D 8.6.2 C 8.7.1 Q-Q
8.7.2 Q-Q 8.7.3 Q-Q 8.7.4 D 8.7.5 D 8.7.6 C
8.7.7 B 8.7.8 C 8.8.1 C 8.9.1 A 8.9.2 D
8.10.1 C 8.11.1 B 8.12.1 B 8.13.1 C 8.14.1 D
8.14.2 B
9 Discrete Mathematics: Mathematical Logic (30)
Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when exactly
two of the p, q and r are true and is false otherwise?
A. (p ∨ q∧⌉r) ∨ (p ∧ q ∧ r) ∧ (⌉p ∧ q ∨ r)
B. (p ∧ q ∨ r) ∧ (p ∧ q ∧ r) ∨ (⌉q∧⌉q∧⌉r)
C. (p ∧ q∧⌉r) ∨ (p∧⌉q ∧ r) ∨ (⌉p ∧ q ∧ r)
D. (p ∨ r ∧ q) ∨ (p ∧ q ∧ r) ∨ (⌉p ∧ q ∧ r)
ugcnetjune2013ii
A. A∨ B B. C∨ D
C. A∨ C D. A∨ D
ugcnetdec2014iii mathematical-logic
List – I List – II
a. Absurd i. Clearly impossible being contrary to some evident truth.
b. Ambiguous ii. Capable of more than one interpretation or meaning.
c. Axiom iii. An assertion that is accepted and used without a proof.
d. Conjecture iv. An opinion preferably based on some experience or wisdom.
Codes:
a b c d
A. i ii iii iv
B. i iii iv ii
C. ii iii iv i
D. ii i iii iv
ugcnetjan2017ii mathematical-logic
∃!xP (x) → ∃xP (x) and ∃!x⌉P (x) →⌉∀xP (x), (where the notation ∃!xP (x) denotes the proposition “There exists a
unique x such that P (x) is true”) are:
A. True and False B. False and True C. False and False D. True and True
ugcnetjune2013ii
The tracing model in Prolog describes program execution in terms of certain events. These events are
A. call and exit B. call and fail
C. call, exit and redo D. call, exit, redo and fail
ugcnetsep2013iii
9.0.6 UGCNET-Nov-2017-III: 70 https://gateoverflow.in/221692
Consider a Takagi - Sugeno - Kang (TSK) Model consisting of rules of the form :
If x1 is A i1 and ... and xr is A ir
THEN y =fi (x1, x 2, ..., x r) = b i0+bi1 x1+.....+birxr assume, αi is the matching degree of rule i, then the total output of the model
is given by :
(1) y = ∑L
i=1 α i fi (x1, x2,....., xr)
(2) y = ∑L L
i=1 α i fi (x1,x2,....., xr)/∑i=1 α i
(3) y = ∑L L
i=1 fi (x1,x2,....., xr)/∑i=1 α i
(4) y = maxi [αi fi (x1,x2,....., xr)]
A. ˄˅x2˅x1¬x1¬x1 B. (x2˅¬x2)˄(x1˅x2)
C. (¬x1˅x2)˄(¬x1˅x2) D. None
ugcnetjune2009ii
"If my computations are correct and I pay the electric bill, then I will run out of money. If I don't pay the electric bill,
the power will be turned off. Therefore, If I don't run out of money and the power is still on then my computations are
incorrect."
Convert this argument into logical notations using the variables c, b, r, p for propositions of computations, electric bills, out of
money and the power respectively. (Where ¬ means NOT).
ugcnetjune2015ii mathematical-logic
A. A∧B∧C ⇒D
B. A ∨ B ∨ C ∨ D ⇒ true
C. A ∧ B ∧ C ∧ D ⇒ true
D. A ∧ B ∧ C ∧ D ⇒ false
ugcnetjune2015iii mathematical-logic
________ predicate calculus allows quantified variables to refer to objects in the domain of discourse and not to
predicates or functions.
A. Zero-order B. First-order
C. Second-order D. High-order
ugcnetjune2014iii discrete-mathematics mathematical-logic
A. P ↔ ¬Q B. ¬P ↔ Q
C. ¬P ↔ ¬Q D. Q → P
ugcnetnov2017-ii discrete-mathematics mathematical-logic
The notation ∃!xP (x) denotes the proposition “there exists a unique x such that P (x) is true”. Give the truth values of
the following statements :
I.∃!xP (x) → ∃xP (x)
II.∃!x¬P (x) → ¬∀xP (x)
Which of the following is a correct predicate logic statement for “Every Natural number has one successor”?
first-order-logic ugcnetsep2013iii
How many atoms are matched to the variable 'X' before the query father(X, Jane) reports a Result?
A. 1 B. 2 C. 3 D. 4
ugcnetdec2015iii mathematical-logic prolog non-gate
In propositional logic, if (P → Q) ∧ (R → S) and (P ∨ R) are two premises such that Y is the premise:
(P → Q) ∧ (R → S)
P ∨R
A. P ∨ R B. P ∨ S C. Q ∨ R D. Q ∨ S
ugcnetdec2016ii mathematical-logic propositional-logic
9.5.2 Propositional Logic: UGCNET-Dec2006-II: 2 https://gateoverflow.in/335669
A. B. C. D.
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of positive
integers. Determine the truth values of each of the following propositions:
(P → Q) ∧ (R → S)
P ∨R
Y
Y is the premise :
A. P ∨ R B. P ∨ S C. Q ∨ R D. Q ∨ S
ugcnetjan2017ii discrete-mathematics propositional-logic
Which of the following is principal conjunctive normal form for [(p ∨ q) ∧ ¬p → ¬q] ?
A. p ∨ ¬q B. p ∨ q
C. ¬p ∨ q D. ¬p ∨ ¬q
ugcnetjune2019ii propositional-logic
List-I List-II
(a) p→q (i) ⌉(q →⌉p)
(b) p∨q (ii) p∧⌉q
(c) p∧q (iii) ⌉p → q
(d) ⌉(p → q) (iv) ⌉p ∨ q
ugcnetjune2019ii propositional-logic
Give a compound proposition involving propositions p, q and r that is true when exactly two of p, q and r are true and
is false otherwise
A. (p ∨ q ∧ ¬r) ∧ (p ∧ ¬q ∧ r) ∧ (¬p ∧ q ∧ r)
B. (p ∧ q ∧ ¬r) ∧ (p ∨ q ∧ ¬r) ∧ (¬p ∧ q ∧ r)
C. (p ∧ q ∧ ¬r) ∨ (p ∧ ¬q ∧ r) ∧ (¬p ∧ q ∧ r)
D. (p ∧ q ∧ ¬r) ∨ (p ∧ ¬q ∧ r) ∨ (¬p ∧ q ∧ r)
The quantification ∃!xP (x) denotes the proposition “There exists a unique x such that P(x) is true”, express he
quantification using universal and existential quantifications and logical operators?
Answer Keys
9.0.1 C 9.0.2 B 9.0.3 A 9.0.4 D 9.0.5 D
9.0.6 Q-Q 9.0.7 Q-Q 9.0.8 C 9.0.9 Q-Q 9.0.10 A
9.0.11 C 9.0.12 A 9.0.13 X 9.1.1 B 9.1.2 A;B
9.2.1 A 9.2.2 A 9.3.1 Q-Q 9.4.1 A 9.5.1 Q-Q
9.5.2 Q-Q 9.5.3 C 9.5.4 B 9.5.5 D 9.5.6 A
9.5.7 D 9.5.8 D 9.5.9 C 9.5.10 A 9.5.11 C
10 Discrete Mathematics: Set Theory & Algebra (22)
Find the zero-one matrix of the transitive closure of the relation given by the matrix A :
⎡1 0 1⎤
A = ⎢0 1 0⎥
⎣1 1 0⎦
⎡1 1 1⎤
A. ⎢ 0 1 0⎥
⎣1 1 1⎦
⎡1 0 1⎤
B. ⎢ 0 1 0⎥
⎣1 1 0⎦
⎡1 0 1⎤
C. ⎢ 0 1 0⎥
⎣1 0 1⎦
⎡1 1 1⎤
D. ⎢ 0 1 0⎥
⎣1 0 1⎦
ugcnetjune2019ii set-theory&algebra
A. g B. g + 1 C. g 4 D. None of these
ugcnetdec2004ii
Given
U = {1, 2, 3, 4, 5, 6, 7}A = {(3, 0.7), (5, 1), (6, 0.8)}
~
then A will be: (where ∼→ complement)
A. {(4, 0.7), (2, 1), (1, 0.8)} B. {(4, 0.3), (5, 0), (6, 0.2)}
C. {(1, 1), (2, 1), (3, 0.3), (4, 1), (6, 0.2), (7, 1)} D. {(3, 0.3), (6, 0.2)}
ugcnetjune2014iii fuzzy-sets complement-in-fuzzy-set
How many difference equivalence relations with exactly three different equivalence classes are there on a set with five
elements?
A. 10 B. 15 C. 25 D. 30
ugcnetjune2016ii discrete-mathematics set-theory&algebra
How many multiples of 6 are there between the following pairs of numbers?
0 and 100 and −6 and 34
How many multiples of 6 are there between the following pairs of numbers?
Let f and g be the functions from the set of integers defined by f(x) = 2x + 3 and g(x) = 3x + 2 . Then the
composition of f and g and g and f is given as
A. 6x+7, 6x+11 B. 6x+11, 6x+7
C. 5x+5, 5x+5 D. None of the above
ugcnetdec2013ii algebra function-composition
−4
B. (x2 + 1) and [(x3 − 4x) + 1]
4 2
4
and [(x2 − 4x) + 1]
−4 2
C. (x2 + 1)
−4
and [(x3 − 4x) + 1]
−4 2
D. (x2 + 1)
If F and G are Boolean functions of degree n. Then, which of the following is true?
A. F ≤ F + G and F G ≤ F B. G ≤ F + G and F G ≥ G
C. F ≥ F + G and F G ≤ F D. G ≥ F + G and F G ≤ F
functions ugcnetsep2013ii
The number of positive integers not exceeding 100 that are either odd or the square of an integer is _______
A. 63 B. 59 C. 55 D. 50
ugcnet-oct2020-ii discrete-mathematics inclusion-exclusion
1. reflexive
2. symmetric
3. transitive
4. not reflexive, not symmetric and not transitive
If she is my friend and you are her friend, then we are friends. Given this, the friend relationship in this context is
____________.
(B) (iii)
"x1 is a clone of x" means x1 is identical to x in terms of the physical attributes namely, height, weight and
complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning is an
equivalence relation. What is your impression about this statement ?
A. The statement is true B. The statement is false
C. The truth value of the statement cannot be computed D. None of these
ugcnetjune2010ii set-theory&algebra relations
Suppose that R1 and R2 are reflecive relations on a set A. Which of the following statements is correct?
Answer Keys
10.0.1 A 10.0.2 Q-Q 10.0.3 Q-Q 10.1.1 A 10.2.1 C
10.3.1 C 10.4.1 A 10.5.1 Q-Q 10.5.2 C 10.6.1 A
10.7.1 Q-Q 10.7.2 D 10.7.3 D 10.7.4 A 10.8.1 C
10.9.1 D 10.10.1 B 10.11.1 Q-Q 10.12.1 Q-Q 10.12.2 Q-Q
10.12.3 B 10.12.4 C
11 Engineering Mathematics: Discrete Mathematics (49)
A. q B. p ∧ r C. p ∨ q D. p
ugcnetaug2016ii discrete-mathematics boolean-function
The number of ways to distribute n distinguishable objects into k distinguishable boxes, so that ni objects are placed
into box i, i = 1, 2, … k equals which of the following?
n! n1 !+n2 !+⋯+nk !
A. n1 !+n2 !+⋯+nk ! B. n1 !n2 !…nk !
n1 ! n1 !n2 !…nk !
C. n1 !n2 !…nk ! D. n1 !−n2 !–n3 !⋯−nk !
ugcnetdec2012iii discrete-mathematics combinatory
The objective of ____ procedure is to discover at least one ____ that causes two literals to match.
A. unification, validation B. unification, substituion
C. substitution, unification D. minimax, maximum
ugcnetdec2013iii discrete-mathematics mathematical-logic
How many solutions are there for the equation x + y + z + u = 29 subject to the constraints that
x ≥ 1, y ≥ 2 z ≥ 3 and u ≥ 0 ?
2
a. "If Gora gets the job andb.works
"Either
hard,
Puneet
thenishenot
will
guilty
be
c. promoted.
IfornPankaj
is a real
ifisGora
number
telling
gets
the
such n >then
promotion,
truth. 1 ,isthen
thatPankaj he
notwill >
be 1happy.
telling
n the
. Suppose
truth, n2 >
Hetherefore,
will
that not 1happy,
bePuneet
, thenisn > guilty."
1
therefore,
not eith
A. aB.
andbC.
canda,b,
D.
c and
a and
cb
ugcnetdec2015ii discrete-mathematics mathematical-logic
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of positive
integers. Determine the truth values of each of the following propositions:
a. ∀m∀nP(m, n) , b. ∀nP(1, n)
c. ∃m∀nP(m, n)
A. a-True, b-True, c-False B. a-True, b-False, c-False
C. a-False, b-False, c-False D. a-True, b-True, c-True
ugcnetdec2015ii discrete-mathematics mathematical-logic
A. Z B. Q C. R D. C
ugcnetjuly2018ii discrete-mathematics
Let Q(x, y) denote “x+y=0” and let there be two quantifications given as
I. ∃y∀xQ(x, y)
II. ∀x∃yQ(x, y)
where x and y are real numbers. Then which of the following is valid?
A. I is true and II is false B. I is false and II is true
C. I is false and II is also false D. both I and II are true
ugcnetjune2012iii discrete-mathematics mathematical-logic
How many relations are there on a set with n elements that are symmetric and a set with n elements that are reflexive
and symmetric?
Let G be a directed graph whose vertex set is the set of numbers from 1 to 100. There is an edge from a vertex i to a
vertex j if and only if either j = i + 1 or j = 3i. The minimum number of edges in a path in G from vertex 1 to
vertex 100 is ______
A. 23 B. 99 C. 4 D. 7
ugcnet-oct2020-ii discrete-mathematics graph-theory
I f f(x) = x is my friend, and p(x) = x is perfect, then correct logical translation of the statement “some of my
friends are not perfect” is ______
A. ∀x (f(x) ∧ ¬p(x)) B. ∃x (f(x) ∧ ¬p(x))
C. ¬(f(x) ∧ ¬p(x)) D. ∃x (¬f(x) ∧ ¬p(x))
ugcnet-oct2020-ii discrete-mathematics mathematical-logic
Let G be a simple undirected graph, TD be a DFS tree on G, and TB be the BFS tree on G. Consider the following
statements.
Statement I : No edge of G is a cross with respect to TD
Statement II : For every edge (u, v) of G, if u is at depth i and v is at depth j in TB then ∣i − j ∣= 1
In the light of the above statements, choose the correct answer from the options given below
P : “Program is a step by step execution of the instructions”. Given P, which of the following is true ?
Which of the following is an equivalence relation on the set of all functions from Z to Z?
The first order logic (FOL) statement ((R ∨ Q) ∧ (P ∨ ¬Q)) is equivalent to which of the following?
A. It is syntactically valid but does not express the meaning of the English sentence
B. It is syntactically valid and expresses the meaning of the English sentence also
C. It is syntactically invalid but expresses the meaning of the English sentence
D. It is syntactically invalid and does not express the meaning of the English sentence
If we convert ∃u∀v∀x∃y(P (f(u), v, x, y) → Q(u, v, y)) to ∀v∀x(P (f(a), v, x, g(v, x)) → Q(a, v, g(v, x))). This
process is known as
Consider the following argument with premise ∀x (P (x) ∨ Q(x)) and conclusion (∀x P (x)) ∧ (∀x Q(x))
(A) ∀x (P (x) ∨ Q(x)) Premise
(B) P (c) ∨ Q(c) Universal instantiation from (A)
(C) P (c) Simplification from (B)
(D) ∀x P (x) Universal Generalization of (C)
(E) Q(c) Simplification from (B)
(F) ∀x Q(x) Universal Generalization of (E)
(G) (∀x P (x)) ∧ (∀x Q(x)) Conjuction of (D) and (F)
A. This is a valid argument B. Steps (C) and (E) are not correct inferences
C. Steps (D) and (F) are not correct inferences D. Step (G) is not a correct inference
ugcnet-oct2020-ii discrete-mathematics first-order-logic
−−−−−−−
Domain and Range of the function Y = −√−2x + 3 is
3 3
A. x ≥ 2,y ≥0 B. x > 2,y ≤0
3 3
C. x ≥ 2,y ≤0 D. x ≤ 2,y ≤0
ugcnetdec2011ii discrete-mathematics functions
Which of the following property/ies a Group G must hold, in order to be an Abelian group?
A. aB.
andbC.
bandaD.
conly
b only
ugcnetdec2015ii discrete-mathematics set-theory&algebra group-theory
Then,
A. Only I is true B. Only II is true
C. I or II is true D. I and II is false
ugcnetjune2012iii discrete-mathematics set-theory&algebra group-theory
A partially ordered set is said to be a lattice if every two elements in the set have
A. A unique least upper bound B. A unique greatest lower bound
C. Both (A) and (B) D. None of the above
ugcnetdec2010ii discrete-mathematics partial-order
Let us assume that you construct ordered tree to represent the compound proposition (∼ (p ∧ q)) ↔ (∼ p∨ ∼ q) .
Then, the prefix expression and post-fix expression determined using this ordered tree are given as _____ and
______ respectively.
Let ν(x) mean x is a vegetarian, m(y) for y is meat, and e(x, y) for x eats y. Based on these, consider the following
sentences :
I. ∀x ∨ (x) ⇔ (∀ye(x, y) ⟹ ¬m(y))
II.∀x ∨ (x) ⇔ (¬(∃ym(y) ∧ e(x, y)))
III.∀x(∃ym(y) ∧ e(x, y)) ⇔ (x) ⇔ ¬ ∨ (x)
One can determine that
A. Only I and II are equivalent sentences B. Only II and III are equivalent sentences.
C. Only I and III are equivalent sentence . D. I, II, and III are equivalent sentences.
ugcnetaug2016iii discrete-mathematics propositional-logic
Let θ(x, y, z) be the statement “x+y=z” and let there be two quantification given as
I. ∀x∀y∃zθ(x, y, z)
II. ∃z∀x∀yθ(x, y, z)
where x, y, z are real numbers, then which one of the following is correct?
A. I is true and II is true B. I is true and II is false
C. I is false and II is true D. I is false and II is false
ugcnetdec2012iii discrete-mathematics propositional-logic
a. False ⊨ True
b. If α ⊨ (β ∧ γ then α ⊨ γ
A. (B) only B. (C) only C. (A) and (C) only D. (B) and (D) only
ugcnet-oct2020-ii discrete-mathematics propositional-logic
A. ∃ x ¬ Q (x)
B. ∀ x ¬ Q (x)
C. ¬ ∃ x ¬ Q (x)
¬ ∃ x ¬ Q (x)
D. ∀ x Q (x)
Let A and B be sets in a finite universal set U . Given the following : |A − B|, |A ⨁ B|, |A| + |B| and |A ∪ B|
Which of the following is in order of increasing size ?
A. 256 B. 64 C. 16 D. 4
ugcnetdec2012iii engineering-mathematics discrete-mathematics sets
A. aB.
andbC.
candbD.
donly
d only
ugcnetdec2015ii discrete-mathematics sets
Answer Keys
11.1.1 Q-Q 11.2.1 C 11.2.2 D 11.2.3 B 11.2.4 C
11.2.5 B 11.2.6 B 11.2.7 A 11.2.8 B 11.2.9 Q-Q
AV A = A is called :
A. Identity law B. De Morgan’s law
C. Idempotent law D. Complement law
ugcnetdec2004ii
Answer Keys
12.0.1 Q-Q
13 Engineering Mathematics: Probability (11)
A box contains six red balls and four green balls. Four balls are selected at random from the box. What is the
probability that two of the selected balls are red and two are green ?
3 4 5 6
A. 7 B. 7 C. 7 D. 7
ugcnetdec2007ii
A text is made up of the characters A, B, C, D, E each occurring with the probability 0.08, 0.40, 0.25, 0.15 and 0.12
respectively. The optimal coding will have the average length of
The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the
probability that no request are made in 45 minutes is
What is the probability that a randomly selected bit string of length 10 is a palindrome ?
1 1 1 1
A. 64 B. 32 C. 8 D. 4
ugcnetaug2016ii probability
An experimental file server is up 75% of the time and down for 25% of the time due to bugs. How many times does
this file server have to be replicated to give an availability of at least 99% ?
A. 2 B. 4 C. 8 D. 16
ugcnetaug2016iii probability
What is the probability of choosing correctly an unknown integer between 0 and 9 with 3 chances ?
963 973 983 953
A. 1000 B. 1000 C. 1000 D. 1000
ugcnetdec2011ii probability
Consider the set of all possible five-card poker hands dealt fairly from a standard deck of fifty-two cards. How many
atomic events are there in the joint probability distribution?
Digital data received from a sensor can fill up 0 to 32 buffers. Let the sample space be S = {0, 1, 2, … , 32} where
1 (33 − i) . Let A denote the event that the even number
the sample j denote that j of the buffers are full and p(i) = 562
of buffers are full. Then P (A) is
Considering an experiment of tossing two fair dice, one black and one red. What is the probability that the number on
the black die divides the number on red die?
22 12 14 6
A. B. C. D.
36 36 36 36
ugcnetjune2015ii probability
There are three cards in a box. Both sides of one card are black, both sides of one card are red and the third card has one
black side and one red side. We pick a card at random and observe only one side. What is the probability that the
opposite side is the same colour as the one side we observed?
How many people must there be in a room before there is a 50% chance that two of them were born on the same day of
the year?
Answer Keys
13.0.1 Q-Q 13.1.1 Q-Q 13.2.1 A 13.3.1 Q-Q 13.3.2 Q-Q
13.3.3 Q-Q 13.3.4 Q-Q 13.3.5 Q-Q 13.3.6 C 13.3.7 B
13.3.8 A
14 General Aptitude: Quantitative Aptitude (25)
If the time is now 4 O' clock, what will be the time 101 hours from now?
The following table shows total number of students in the Department of the Institute along with percentage of Females
and Male students. Answer the question based on the data given below:
Department Total No. of Percentage of Percentage of
Students Female Male
Computer 840 45 55
Civil 220 35 65
Mech. 900 23 77
Electrical 360 65 35
Electronics 450 44 56
Mining 540 40 60
What is the respective ratio of the number of females in Mechanical Department to the number of females in Electronics
Department?
A. 4 : 3 B. 23 : 22 C. 24 : 21 D. 23 : 21
ugcnet-oct2020-i general-aptitude quantitative-aptitude data-interpretation
The following table shows total number of students in the Department of the Institute along with percentage of Females
and Male students. Answer the question based on the data given below:
Department Total No. of Percentage of Percentage of
Students Female Male
Computer 840 45 55
Civil 220 35 65
Mech 900 23 77
Electrical 360 65 35
Electronics 450 44 56
Mining 540 40 60
What is the total number of students in all the Departments?
The following table shows total number of students in the Department of the Institute along with percentage of Females
and Male students. Answer the question based on the data given below:
Department Total No. of Percentage of Percentage of
Students Female Male
Computer 840 45 55
Civil 220 35 65
Mech 900 23 77
Electrical 360 65 35
Electronics 450 44 56
Mining 540 40 60
What is the total number of male students in Computer and Mining Department together?
The following table shows total number of students in the Department of the Institute along with percentage of Females
and Male students. Answer the question based on the data given below:
Department Total No. of Percentage of Percentage of
Students Female Male
Computer 840 45 55
Civil 220 35 65
Mech 900 23 77
Electrical 360 65 35
Electronics 450 44 56
Mining 540 40 60
What is the ratio of the number of females in Civil and Electrical departments together to the number of males in the same
departments together?
The following table shows total number of students in the Department of the Institute along with percentage of Females
and Male students. Answer the question based on the data given below:
Department Total No. of Percentage of Percentage of
Students Female Male
Computer 840 45 55
Civil 220 35 65
Mech 900 23 77
Electrical 360 65 35
Electronics 450 44 56
Mining 540 40 60
What is the average percentage of female students in the whole institute?
A. 2n B. 3n C. 5n D. 7n
ugcnetdec2011ii quantitative-aptitude number-system
Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the proportion of
1 , and that the proportion od people having stiff neck is 1 . Then the percentage of
persons having meningitis is 50000 20
people who had meningtis and complain about stiff neck is:
What is the radix of the numbers if the solution to the quadratic equation x2 − 10x + 26 = 0 is x = 4 and x = 7 ?
A. 8 B. 9 C. 10 D. 11
ugcnet-oct2020-ii quadratic-equations
The number of integers between 1 and 250 that are divisible by 2, 5 and 7 is
A. 2 B. 3 C. 5 D. 8
ugcnetdec2010ii quantitative-aptitude
Consider the problem of connecting 19 lamps to a single electric outlet by using extension cords each of which has
four outlets. The number of extension cords required is
A. 4 B. 5 C. 6 D. 7
ugcnetdec2010ii quantitative-aptitude
Suppose that someone starts with a chain letter. Each person who receives the letter is asked to send it on to 4 other
people. Some people do this, while some do not send any letter. How many people have seen the letter, including the
first person, if none receives more than one letter and if the chain letter ends after there have been 100 people who read it but
did not send it out? Also find out how many people sent out the letter?
58 lamps are to be connected to a single electric outlet by using an extension board each of which has four outlets. The
number of extension boards needed to connect all the light is
A. 28 B. 29 C. 20 D. 19
ugcnetdec2012iii quantitative-aptitude
A computer program selects an integer in the set {k : 1 ≤ k ≤ 10, 00, 000} at random and prints out the result. This
process is repeated 1 million times. What is the probability that the value k = 1 appears in the printout atleast once ?
Consider a vocabulary with only four propositions A, B, C and D. How many models are there for the following
sentence?
B∨C
A. 10 B. 12 C. 15 D. 16
ugcnetjuly2018ii quantitative-aptitude
If 152 is divided into four parts proportional to 3, 4, 5 and 7, then the smallest part is
A. 29 B. 26 C. 25 D. 24
ugcnetjune2019-i general-aptitude quantitative-aptitude
In a new budget, the price of petrol rose by 25%. By how much percent must a person reduce his consumption so that
his expenditure on it does not increase?
A sum of money doubles at compound interest in 6 years. In how many years it will become 16 times?
Given below are two premises with four conclusions drawn from them. Which of the following conclusions could be
validly drawn from the premises?
Premises:
i. No paper is pen
ii. Some paper are handmade
Conclusions:
A. All paper are handmade B. Some handmade are pen
C. Some handmade are not pen D. All handmade are paper
ugcnetjune2019-i general-aptitude quantitative-aptitude
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from 2012 to 2018. Answer the question based on the data contained in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What was the approximate percentage increase/decrease in the sales of 32-inch LED Television sets in 2017 compared to that
in 2013?
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from 2012 to 2018. Answer the question based on the data contained in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
For which size LED Television sets in the total sales of all seven years the maximum?
A. 22 – inch Television B. 24 – inch Television
C. 32 – inch Television D. 49 – inch Television
ugcnetjune2019-i general-aptitude quantitative-aptitude
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from 2012 to 2018. Answer the question based on the data contained in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What is the difference in the number of 40-inch Television sets sold in 2013 and 2018
A. 1, 600, 000 B. 1, 500, 000 C. 15, 000, 000 D. 16, 000, 000
ugcnetjune2019-i general-aptitude quantitative-aptitude
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from 2012 to 2018. Answer the question based on the data contained in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What is the total sale of Television sets of size 49-inches (in lakhs) over all the seven years?
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from 2012 to 2018. Answer the question based on the data contained in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
For which LED Television set is the total sales of all the seven years the minimum?
A. 22 - inch Television B. 24 - inch Television
C. 49 - inch Television D. 40 - inch Television
ugcnetjune2019-i general-aptitude quantitative-aptitude
Answer Keys
14.0.1 A 14.1.1 B 14.1.2 D 14.1.3 C 14.1.4 D
14.1.5 A 14.2.1 Q-Q 14.3.1 B 14.4.1 D 14.5.1 B
14.5.2 Q-Q 14.5.3 C 14.5.4 D 14.5.5 C 14.5.6 Q-Q
14.5.7 B 14.5.8 D 14.5.9 C 14.5.10 B 14.5.11 C
14.5.12 B 14.5.13 C 14.5.14 A 14.5.15 D 14.5.16 D
15 General Aptitude: Verbal Aptitude (8)
A knowledge base contains just one sentence, ∃x AsHighAs (x, Everest). Consider the following two sentences
obtained after applying existential instantiation.
ugcnetjuly2018ii verbal-aptitude
‘All republics are grateful’ and ‘Some republics are not grateful’ cannot both be true, and they cannot both be false.
This is called as
If the proposition ‘Houses are not bricks’ is taken to be False then which of the following propositions can be True?
A. All houses are bricks B. No house is brick C. Some houses are bricksD. Some houses are not bricksSelect the correct answer
from the options given
below:
Given two jugs of capacities 5 litres and 3 litres with no measuring marks on them. Then the minimum number of
states to measure 4 litres of water will be
A. 3 B. 4 C. 5 D. 7
ugcnetjune2013iii quantitative-aptitude general-aptitude
Answer Keys
15.0.1 Q-Q 15.0.2 B 15.0.3 D 15.0.4 C 15.1.1 B
15.1.2 A 15.2.1 D 15.2.2 A
16 Non GATE: Artificial Intelligence (44)
A perceptron has input weights W1 = −3.9 and W2 = 1.1 with threshold value T = 0.3. What output does it give
for the input x1 = 1.3 and x2 = 2.2?
A. −2.65 B. −2.30 C. 0 D. 1
ugcnetjune2016iii
A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as:
A. Data dictionary B. Reference mechanism
C. Inference engine D. Control strategy
ugcnetjune2016iii
The mean-end analysis process centers around the detection of differences between the current state and goal state.
Once such a difference is isolated, an operator that can reduce the difference must be found. But perhaps that operator
cannot be applied to the current state. So a sub-problem of getting to a state in which it can be applied is set up. The kind of
backward chaining in which operators are selected and then sub goals are set up to establish the precondition of operators is
called
A. backward planning B. goal stack planning
C. operator subgoaling D. operator overloading
ugcnetdec2013iii artificial-intelligence
Consider the two class classification task that consists of the following points:
Class C1 : [−1, −1], [−1, 1], [1, −1]
Class C2 : [1, 1]
The decision boundary between the two classes C1 and C2 using single perception is given by:
A. x1 − x2 − 0.5 = 0 B. −x1 − x2 − 0.5 = 0
C. 0.5(x1 + x2 ) − 1.5 = 0 D. x1 + x2 − 0.5 = 0
ugcnetdec2015iii artificial-intelligence
ugcnetjuly2018ii artificial-intelligence
16.1.5 Artificial Intelligence: UGCNET-July-2018-II: 72 https://gateoverflow.in/225814
In artificial Intelligence (AI), a simple reflex agent selects actions on the basis of ___
ugcnetjuly2018ii artificial-intelligence
Consider following sentences regarding A∗ , an informed search strategy in Artificial Intelligence (AI).
Here, C ∗ is the cost of the optimal solution path. Which of the following is correct with respect to the above statements?
ugcnetjuly2018ii artificial-intelligence
A∗ algorithm uses f ′ = g + h′ to estimate the cost of getting from the initial state to the goal state, where g is a
measure of cost getting from initial state to the current node and the function h′ is an estimate of the cost of getting
from the current node to the goal state. To find a path involving the fewest number of steps, we should test,
A. g = 1 B. g = 0 C. h′ = 0 D. h′ = 1
ugcnetjune2012iii artificial-intelligence
ugcnetjune2015iii artificial-intelligence
An artificial neuron receives n inputs x1 , x2 , … , xn with weights w1 , w2 , … , wn attached to the input links. The
weighted sum ____ is computed to be passed on to a non-linear filter ϕ called activation function to release the output.
A. Σ wi B. Σ xi
C. Σ wi + Σ xi D. Σ wi ⋅ Σ xi
ugcnetdec2013iii machine-learning artificial-neural-network
Back propagation is a learning technique that adjusts weights in the neutral network by propagating weight changes.
A. Forward from source to sink B. Backward from sink to source
C. Forward from source to hidden nodes D. Backward from sink to hidden nodes
ugcnetdec2012ii machine-learning data-mining back-propagation
Forward chaining systems are ____ where as backward chaining systems are ____
A. Data driven, Data driven B. Goal driven, Data driven
C. Data driven, Goal driven D. Goal driven, Goal driven
ugcnetdec2015iii artificial-intelligence chaining
A fuzzy conjunction operator denoted as t(x, y) and a fuzzy disjunction operator denoted as s(x, y) form a dual pair if
they satisfy the condition:
A. t(x, y) = 1 − s(x, y) B. t(x, y) = s(1 − x, 1 − y)
C. t(x, y) = 1 − s(1 − x, 1 − y) D. t(x, y) = s(1 + x, 1 + y)
ugcnetjune2019ii artificial-intelligence fuzzy-logic
If h* represents an estimate from the cost of getting from the current node N to the goal node and h represents actual
cost of getting from the current node to the goal node, then A* algorithm gives an optimal solution if
A. h* is equal to h B. h* overestimates h
C. h* underestimates h D. none of these
ugcnetdec2013iii artificial-intelligence heuristic-search
If an artificial variable is present in the ‘basic variable’ of optimal simplex table then the solution is
A. Alternative solution B. Infeasible solution
C. Unbounded solution D. Degenerate solution
ugcnetsep2013iii artificial-intelligence linear-programming
ugcnetdec2012iii machine-learning
Match the following learning modes w. r. t. characteristics of available information for learning :
a. Supervised i. Instructive information on desired responses, explicitly specified by a teacher.
b. Recording ii. A priori design information for memory storing
c. Reinforcement iii. Partial information about desired responses, or only “right” or “wrong” evaluative information
d. Unsupervised iv. No information about desired responses
Codes :
a b c d
A. i ii iii iv
B. i iii ii iv
C. ii iv iii i
D. ii iii iv i
Perceptron learning, Delta learning and LMS learning are learning methods which falls under the category of
ugcnetjune2014iii machine-learning
The map colouring problem can be solved using which of the following technique?
A. Means-end analysis B. Constraint satisfaction
C. AO* search D. Breadth first search
ugcnetjune2013iii artificial-intelligence map-coloring
Means-Ends Analysis process centres around the detection of difference between the current state and the goal state.
Once such a difference is found, then to reduce the difference one applies
A. 4 B. 7 C. 11 D. 12
ugcnetjune2019ii artificial-intelligence minimax-procedure
You are given an OR problem and XOR problem to solve. Then, which one of the following statements is true?
A. Both OR and XOR problems can be solved using single layer perception
B. OR can be solved using single layer perception and XOR problem can be solved using self organizing maps
C. OR problem can be solved using radial basis function and XOR problem can be solved using single layer perception
D. OR can be solved using single layer perception and XOR problem can be solved using radial basis function
T
A neuron with 3 inputs has the weight vector [ 0.2 −0.1 0.1 ] and a bias θ = 0. If the input vector is
T
X = [ 0.2 0.4 0.2 ] then the total input to the neuron is:
ugcnetjuly2018ii planning
Which one of the following is the correct implementation of the meta-predicate “not” in PROLOG (Here G represents a
goal)?
A. not(G):- !, call(G), fail. not(G). B. not(G):- call(G), !, fail. not(G).
C. not(G):- call(G), fail, !, not(G). D. not(G):- call(G), !, fail.not(G):- !.
ugcnetjune2013iii artificial-intelligence prolog
Reinforcement learning can be formalized in terms of ____ in which the agent initially only knows the set of possible
_____ and the set of possible actions.
A. Markov decision processes, objects B. Hidden states, objects
C. Markov decision processes, states D. objects, states
ugcnetjune2019ii artificial-intelligence reinforcement-learning
List-I List-II
(a) Greedy best-first (i) Minimal cost (p) + h(p)
(b) Lowest cost-first (ii) Minimal h(p)
(c) ∗
A algorithm (iii) Minimal cost (p)
1
The value of the derivative of Sigmoid function given by f(x) = at x = 0 is
1 + e−2x
1 1
A. 0 B. 2 C. 4 D. ∞
ugcnetjune2019ii artificial-intelligence sigmoid-function
A. a feature-centric representation
B. an action-centric representation
C. a combination of feature-centric and action-centric representations
D. a hierarchical feature-centric representation
Answer Keys
16.0.1 C 16.0.2 C 16.1.1 C 16.1.2 C 16.1.3 B
16.1.4 B 16.1.5 Q-Q 16.1.6 Q-Q 16.1.7 Q-Q 16.1.8 A
16.1.9 D 16.1.10 B 16.1.11 B 16.1.12 A 16.1.13 B
16.1.14 D 16.2.1 D 16.3.1 B 16.4.1 B 16.5.1 D
16.6.1 A 16.6.2 B 16.7.1 C 16.8.1 C 16.9.1 C
16.10.1 B 16.11.1 D 16.11.2 A 16.11.3 B 16.11.4 A
16.12.1 B 16.13.1 D 16.14.1 B 16.15.1 D 16.15.2 C
16.15.3 D 16.15.4 C 16.16.1 Q-Q 16.17.1 B 16.17.2 C
16.18.1 C 16.19.1 D 16.20.1 B 16.21.1 B
17 Non GATE: Big Data Systems (1)
Answer Keys
17.1.1 A
18 Non GATE: Cloud Computing (1)
Which of the following cloud concept/s is/are related to pooling and sharing of resources?
a. Virtual Memory b. Service c. Virtualization Choose the correct answer from the options given
below:
A. (c) only B. (a) and (b) only C. (a) only D. (b) only
ugcnet-oct2020-ii non-gate cloud-computing
Answer Keys
18.1.1 A
19 Non GATE: Computer Graphics (80)
⎡2 0 2⎤
Consider the matrix M = ⎢ 0 1 1 ⎥ representing a set of planar (2D) geometric transformations in homogeneous
⎣0 0 1⎦
coordinates. Which of the following statements about the matrix M is True?
Which of the following statements is/are True regarding the solution of the visibility problem in 3D graphics?
S1: The painter's algorithm sorts polygons by depth and then paints (scan - converts) each Polygon on to the screen
starting with the most nearest polygon
S2: Backface Culling refers to eliminating geometry with backfacing normals
In the context of 3D computer graphics, which of the following statements is/are true?
P : Orthographic transformations keep parallel lines parallel.
Q : Orthographic transformations are affine transformations.
Select the correct answer from the options given below:
⎡ ⎤
[T] = ⎢
⎢
⎥
⎥
⎢ ⎥
⎡ cos θ sin θ 0 0⎤
[T] = ⎢
0⎥
⎢ ⎥
− sin θ cos θ 0
⎢ 0 0 1 0⎥
⎣ 0 0 0 1⎦
This matrix rotates an object by an angle θ about:
Consider the Breshenman's circle generation algorithm for plotting a circle with centre (0,0) and radius 'r' unit in first
quadrant. If the current point is (xi , yi ) and decision parameter is pi then what will be the next point (xi+1 , yi+1 ) and
updates decision parameter pi+1 for p ≥ 0 ?
Let V1 = 2I − J + k and V2 = I + J − K , then the angle between V1 and V2 and a vector perpendicular to both V1
and V2 shall be
A. 90o and (−2I + J − 3K) B. 60o and (2I + J + 3K)
C. 90o and (2I + J − 3K) D. 90o and (−2I − J + 3K)
ugcnetdec2012iii computer-graphics
The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be
handled by this algorithm shall
A. depend on the application B. be arbitrary no. of objects
C. depend on the memory availability D. depend on the processor
ugcnetdec2012iii computer-graphics
ugcnetdec2012iii computer-graphics
Which of the following points lies on the same side as the origin, with reference to the line 3x+7y=2?
The transformation required for conversion of CMY colour model to RGB colour model is given as:
⎡ ⎤ ⎡ ⎤ ⎡ ⎤
⎢ ⎥=⎢ ⎥−⎢ ⎥
⎣ ⎦ ⎣ ⎦ ⎣ ⎦
⎡R⎤ ⎡C⎤ ⎡1⎤
B. ⎢ G ⎥ = ⎢ M ⎥ − ⎢ 2 ⎥
⎣B⎦ ⎣ Y ⎦ ⎣3⎦
⎡R⎤ ⎡1⎤ ⎡ C ⎤
C. ⎢ G ⎥ = ⎢ 1 ⎥ − ⎢ M ⎥
⎣B⎦ ⎣1⎦ ⎣ Y ⎦
⎡ R ⎤ ⎡ C ⎤ ⎡ 0.5 ⎤
D. ⎢ G ⎥ = ⎢ M ⎥ − ⎢ 0.5 ⎥
⎣ B ⎦ ⎣ Y ⎦ ⎣ 0.5 ⎦
What steps shall be required to rotate an object from point P1 (as shown in fig. 1) and its placement such that what was
at P1 is now reduced and is at P2 (as shown in fig. 2)?
I. Translate P1 to origin
II. Scale as required
III. Rotate
IV. Translate to the final position P2
A. I, II and III B. II, III and IV C. I, III and IV D. All of the above
ugcnetdec2013iii computer-graphics non-gate
A technique used to approximate halftones without reducing spatial resolution is known as________.
A. Halftoning B. Dithering
C. Error diffusion D. None of the above
ugcnetdec2014iii computer-graphics non-gate
Which of the following graphic primitives are considered as the basic building blocks of computer graphics?
A. aB.
only
a,C.b, aand
D.
andac band c
ugcnetdec2015iii computer-graphics
A. aB.
andcC.
bonly
dD.only
All of the above
ugcnetdec2015iii computer-graphics
19.9.13 Computer Graphics: UGCNET-Dec2015-III: 69 https://gateoverflow.in/62784
Which raster locations would be chosen by Bresenham's algorithm when scan converting a line from (1, 1) to (8, 5)?
x y
1 1
2 2
3 3
A. 4 3
5 4
6 4
7 5
8 6
x y
1 1
2 2
3 2
B. 4 3
5 4
6 5
7 6
8 7
x y
1 1
2 2
3 2
C. 4 3
5 3
6 4
7 4
8 5
x y
1 1
2 2
3 2
D. 4 3
5 5
6 4
7 5
8 5
ugcnetdec2015iii computer-graphics
1
Consider a unit square centered at origin. The coordinates at the square are translated by a factor ( , 1) and rotated
2
by an angle of 90∘ . What shall be the coordinates of the new square?
−1 −1 −3 −3
A. ( , 0), ( , 1), ( , 1), ( , 0)
2 2 2 2
−1 1 3 3
B. ( , 0), ( , 1), ( , 1), ( , 0)
2 2 2 2
( , 0), ( , 0), ( , 1), ( , 0)
−1 1 −3 −3
C. ( , 0), ( , 0), ( , 1), ( , 0)
2 2 2 2
−1 1 −3 −3
D. ( , 0), ( , 1), ( , 1), ( , 0)
2 2 2 2
ugcnetdec2015iii computer-graphics
Below are the few steps given for scan-converting a circle using Bresenham’s Algorithm. Which of the given steps is
not correct?
A. Compute d = 3 − 2r (where r is radius) B. Stop if x > y
C. If d < 0 , then d = 4x + 6 and x = x + 1 D. If d ≥ 0 , then d = 4 ∗ (x − y) + 10, x = x + 1 and y = y + 1
ugcnetjan2017iii non-gate computer-graphics
Consider a line AB with A = (0, 0) and B = (8, 4) . Apply a simple DDA algorithm and compute the first four plots
on this line.
A. [(0, 0), (1, 1), (2, 1), (3, 2)] B. [(0, 0), (1, 1.5), (2, 2), (3, 3)]
C. [(0, 0), (1, 1), (2, 2.5), (3, 3)] D. [(0, 0), (1, 2), (2, 2), (3, 2)]
ugcnetjan2017iii non-gate computer-graphics
A graphic display system has a frame buffer that is 640 pixels high , 480 pixels high and 1 bit of color depth. If the
access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame buffer is
approximately:
A. 16 frames per second B. 19 frames per second
C. 21 frames per second D. 23 frames per second
ugcnetjuly2018ii computer-graphics
If the pixels of an image are shuffled then the parameter that may change is
If a and b are the end points of a line, then which of the following is true?
A. If both end points are left, right, above or below the window, the line is invisible.
B. If both end points are left, right, above or below the window, the line is completely visible.
C. If both end points are left, right, above or below the window, the line is trivially visible
D. If both end points are left, right, above or below the window, the line is trivially invisible
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of
the following is not true ?
I. The beam-penetration is used with random scan monitors.
II. Shadow-mask is used in rasterscan systems.
III. Beam-penetration method is better than shadow-mask method.
IV. Shadow-mask method is better than beam-penetration method.
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps
used are
A. Butt cap and sharp cap B. Butt cap and round cap
C. Butt cap, sharp cap and round cap D. Butt cap, round cap and projecting square cap
ugcnetjune2014iii non-gate computer-graphics
Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding
attributes :
List – I List – II
a. Line i. Type, Size, Color
b. Fill Area ii. Color, Size, Font
c. Text iii. Style, Color, Pattern
d. Marker iv. Type, Width, Color
Codes :
A. a-i, b-ii, c-iii, d-iv B. a-ii, b-i, c-iii, d-iv
C. a-iv, b-iii, c-ii, d-i D. a-iii, b-i, c-iv, d-ii
ugcnetjune2014iii non-gate computer-graphics
Consider a window bounded by the lines : x = 0; y = 0; x = 5 and y = 3 . The line segment joining (−1, 0) and
(4, 5), if clipped against this window will connect the points
A. (0, 1) and (2, 3) B. (0, 1) and (3, 3)
C. (0, 1) and (4, 3) D. (0, 1) and (3, 2)
ugcnetjune2014iii non-gate geometry computer-graphics
Which of the following color models are defined with three primary colors ?
A. RGB and HSV color models B. CMY and HSV color models
C. HSV and HLS color models D. RGB and CMY color models
ugcnetjune2014iii non-gate computer-graphics
Which of the following is not a basic primitive of the Graphics Kernel System (GKS)?
A. aB.
only
aC.andcD.
bonly
d only
ugcnetjune2015iii computer-graphics
ugcnetjune2015iii computer-graphics
Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping
algorithm. The rectangular window has lower rectangular corner at (-5, 1) and upper right-hand corner at (3, 7).
Consider the following three lines for clipping with the given end-point coordinates?
Line AB:A(-6,2) and B(-1,8)
Line CD: C(-1,5) and D(4,8)
Line EF: E(-2,3) and F(1,2)
Which of the following lines is/are candidate for clipping?
A. AB B. DC C. EF D. AB and CD
ugcnetjune2016iii computer-graphics
Let us consider that the original point is (x,y) and new transformed point is (x’,y’). Further Sh x and Sh y are shearing
factors in x and y directions. If we perform the y direction shear relative to x=sref then the transformed point is given
by
A. x′ = x + Shx . (y − yref ); y ′ = y B. x′ = x; y ′ = y. Shx
C. x′ = x; y ′ = Shy (x − xref ) + y D. x′ = Shy . y; y ′ = y. (x − xref )
ugcnetjune2016iii computer-graphics
Which of the following statements is/are correct with reference to curve generation?
I. Hermite curves are generated using the concepts of interpolation
II. Bezier curves are generated using the concepts of approximation
III. The Bezier curve lies entirely within the convex hull of its control points
IV. The degree of Bezier curve does not depend on the number of control points
A. I, II and IV only B. II and III only C. I and II only D. I, II and III only
ugcnetjune2016iii computer-graphics
In the context of 3D Computer graphics, which of the following statements is/are correct?
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a), (b) and (c)
ugcnet-oct2020-ii non-gate computer-graphics
Concerning phong shading and Gouraud shading in a 3D scene, which of the following statements are true?
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a), (b) and (c)
ugcnet-oct2020-ii non-gate computer-graphics
Match List I with List II. List I gives 3 × 3 matrices representing 2D transformations and List II shows the
corresponding transformation diagrams.
Given below are different properties of 3D projections from A − D. Identify the correct order on the basis of property
true of (i) a perspective projection only, (ii) an orthographic projection only, (iii) both orthographic and projective
transformations and (iv) neither orthographic nor projective transformation, respectively.
Which of the following graphics devices are known as active graphics devices?
I. Alphanumeric devices
II. Thumb wheels
III. Digitizers
IV. Joystics
A. I and II B. III and IV C. I, II and III D. I, II, III and IV
ugcnetsep2013iii computer-graphics
A. aB.
anda,C.
db and
a,D.b,da,
c and
c and
dd
ugcnetdec2015iii computer-graphics crt
A. The path an electron beam takes when returning to the left side of the CRT
B. The path an electron beam takes when returning to the right side of the CRT
C. The technique of turning, the electron beam off while retracing
D. The technique of turning, the electron beam on/ off while retracing
An image is 1024 ∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it make to
transmit it over a 10 Mbps Ethernet?
A. 196.6 seconds B. 19.66 seconds
C. 1.966 seconds D. 0.1966 seconds
ugcnetjune2013iii computer-graphics digital-image-processing
19.11.2 Digital Image Processing: UGCNET-June2013-III: 31 https://gateoverflow.in/58489
Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the
color of each pixel is represented by a n-bit number, (in an 8-bit machines) is
A. n × 8 MB B. n/8 MB
C. (1024 × 1024)/8 MB D. 1024 MB
ugcnetjune2013iii computer-graphics digital-image-processing
The number of distinct binary images which can be generated from a given binary image of right M × N are
The refresh rate above which a picture stops flickering and fuses into a steady image is called ____
A. Crucial fusion frequency B. Current frequency fusion
C. Critical fusion frequency D. Critically diffused frequency
ugcnetjune2013iii computer-graphics display-devices
Consider a N -bit plane frame buffer with W -bit wide lookup table with W > N . How many intensity levels are
available at a time ?
A. 2N B. 2W C. 2N+W D. 2N−1
ugcnetaug2016iii computer-graphics frame-buffer
Halftoning is defined as
MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and
temporal compression removes _____ frames.
A. I1 B. I2 C. I3 D. I4
ugcnetdec2012iii computer-graphics image-entropy
In Cyrus-Beck algorithm for line clipping the value of t parameter is computed by the relation:
(Here P1 and P2 are the two end points of the line, f is a point on the boundary, n1 is inner normal).
(P1 −fi ).ni (fi −P1 ).ni
A. (P2 −P1 ).ni
B. (P2 −P1 ).ni
(P2 −fi ).ni (fi −P2 ).ni
C. (P1 −P2 ).ni
D. (P1 −P2 ).ni
ugcnetdec2014iii non-gate computer-graphics line-clipping
Consider the Breshenham’s line generation algorithm for a line with gradient greater than one, current point (xi , yi )
and decision parameter, di . The next point to be plotted (xi+1 , yi+1 ) and updated decision parameter, di+1 , for di < 0
are given as _______.
The Liang-Barsky line clipping algorithm uses the parametric equation of a line from (x1 , y1 ) to (x2 , y2 ) along with its
infinite extension which is given as :
x = x1 + Δx. u
y = y1 + Δy. u
Where Δx = x2 – x1 , Δy = y2 – y1 , and u is the parameter with 0 ≤ u ≤ 1 . A line AB with end points A(– 1, 7) and
B(11, 1) is to be clipped against a rectangular window with xmin = 1, xmax = 9, ymin = 2 , and ymax = 8 . The lower and
upper bound values of the parameter u for the clipped line using Liang-Barsky algorithm is given as :
The parametric representation of the line segment between the position vectors P1 (2, 3) and P2 (5, 4) is given as
Using the phong reflectance model, the strength of the specular highlight is determined by the angle between
A. the view vector and the normal vector B. the light vector and the normal vector
C. the light vector and the reflected vector D. the reflected vector and the view vector
ugcnetjune2019ii phong-color-model
A point P (2, 5) is rotated about a pivot point (1, 2) by 60°. What is the new transformed point P ′ ?
A. (1, 4) B. (– 1, 4) C. (1, – 4) D. (– 4, 1)
ugcnetaug2016iii computer-graphics projection
In perspective projection (from 3D to 2D), objects behind the centre of projection are projected upside down and
backward onto the view-plane. This is known as _____.
A. Topological distortion B. Vanishing point
C. View confusion D. Perspective foreshortening
ugcnetaug2016iii computer-graphics projection
The perspective projection matrix, on the view plan z=d where the centre of projection is the origin (0, 0, 0) shall be
⎡0 0 0 d⎤
⎢0 d 0⎥
⎢ ⎥
0
⎢0 0 0⎥
A.
⎣d 0 1⎦
d
0
⎡d 0 0 0⎤
⎢0 0 0⎥
⎢ ⎥
d
⎢0 d 0⎥
B.
0
⎣0 0 1 0⎦
⎡0 0 0 d⎤
⎢0 d 0⎥
⎢ ⎥
0
⎢0 0 0⎥
C.
⎣1 0 0⎦
d
0
⎡d 0 0 0⎤
⎢0 0 0⎥
⎢ ⎥
d
⎢0 d 0⎥
D.
0
⎣0 0 0 1⎦
In perspective projection, if a line segment joining a point which lies in front of the viewer to a point in back of the
viewer is projected to a broken line of infinte extent. This is known as ____
A. View confusion B. Vanishing point
C. Topological distortion D. Perspective foreshortening
ugcnetjune2016iii computer-graphics projection
19.21.7 Projection: UGCNET-Nov2017-iii-14 https://gateoverflow.in/166390
I. two of the three foreshortening factors are equal and third is arbitrary
II. all of the three foreshortening factors are equal
III. all of the three foreshortening factors are arbitrary
Consider a raster grid having XY -axes in positive X -direction and positive upward Y -direction with Xmax = 10 ,
Xmin =– 5 , Ymax = 11 , and Ymin = 6 . What is the address of memory pixel with location (5, 4) in raster grid
assuming base address 1 (one) ?
Consider a raster system with resolution 640 by 480. What size is frame buffer (in bytes) for this system to store 12
bits per pixel?
A. 450 kilobytes B. 500 kilobytes
C. 350 kilobytes D. 400 kilobytes
ugcnetjune2019ii raster-graphics
If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
A. 40 line-pairs per inch B. 80 line-pairs per inch
C. 1600 lines per inch D. 40 lines per inch
ugcnetjune2013iii computer-graphics resolution
Consider a triangle A(0,0), B(1, 1) and C(5, 2). The triangle has to be rotated by an angle of 45 o about the point P(-1, -
1). What shall be the coordinates of new triangle?
– – – –
A. A′ = (1, √2 − 1), B′ (−1, 2√2 − 1) and C ′ = ((3√2 − 1, 92 √2 − 1))
– – – –
B. A′ = (1, √2 − 1), B′ (2√2 − 1, −1) and C ′ = ((3√2 − 1, 92 √2 − 1))
– – – –
C. A′ = (−1, √2 − 1), B′ (−1, 2√2 − 1) and C ′ = ((3√2 − 1, 92 √2 − 1))
– – – –
D. A′ = (√2 − 1, −1)B′ (−1, 2√2 − 1) and C ′ = ((3√2 − 1, 92 √2 − 1))
ugcnetjune2015iii computer-graphics rotation
A point P(5,1) is rotated by 90 o about a pivot point (2,2). What is the coordinate of new transformed point P'?
The Mandelbrot set used for the construction of beautiful images is based on the following transformation.
xn+1 = x2n + z . Here,
A. Both x and z are real numbers B. Both x and z are complex numbers
C. x is real and z is complex D. x is complex and z is real
ugcnetdec2012iii computer-graphics transformation
Give the number of principal vanishing point(s) along with their direction for the standard prospective transformation:
A. Only one in the direction K B. Two in the directions i and j
C. Three in the directions I, J and K D. Only two in the directions J and K
ugcnetjune2015iii computer-graphics transformation
Answer Keys
19.1.1 Q-Q 19.2.1 B 19.3.1 Q-Q 19.3.2 A 19.4.1 C
19.5.1 D 19.6.1 A 19.7.1 B 19.8.1 A 19.9.1 X
19.9.2 B 19.9.3 A 19.9.4 D 19.9.5 C 19.9.6 D
19.9.7 C 19.9.8 X 19.9.9 B 19.9.10 D 19.9.11 X
19.9.12 B 19.9.13 C 19.9.14 D 19.9.15 B 19.9.16 D
19.9.17 B 19.9.18 Q-Q 19.9.19 D 19.9.20 D 19.9.21 C
19.9.22 D 19.9.23 C 19.9.24 A 19.9.25 D 19.9.26 B
19.9.27 D 19.9.28 A 19.9.29 D 19.9.30 C 19.9.31 D
19.9.32 D 19.9.33 A 19.9.34 C 19.9.35 D 19.9.36 C
19.9.37 D 19.9.38 D 19.10.1 C 19.10.2 A 19.11.1 C
19.11.2 B 19.11.3 D 19.11.4 A 19.11.5 C 19.12.1 C
19.13.1 Q-Q 19.14.1 B 19.15.1 D 19.16.1 C 19.17.1 B
19.18.1 Q-Q 19.18.2 Q-Q 19.18.3 B 19.19.1 C 19.20.1 D
19.21.1 Q-Q 19.21.2 Q-Q 19.21.3 D 19.21.4 B 19.21.5 D
19.21.6 C 19.21.7 D 19.21.8 C 19.22.1 Q-Q 19.22.2 A
19.23.1 A 19.24.1 C 19.24.2 A 19.25.1 B 19.25.2 A
20 Non GATE: Computer Peripherals (3)
Which of the following is not true with respect to to a trackball and/or spaceball?
I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom
II. Unlike the trackball a spaceball does not actually move
III. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom
A. I and II B. II and III C. II only D. III only
ugcnetdec2013iii non-gate computer-peripherals
In a dot matrix printer the time to print a character is 6 m.sec., time to space in between characters is 2 m.sec., and the
number of characters in a line are 200. The printing speed of the dot matrix printer in characters per second and the
time to print a character line are given by which of the following options ?
A. 125 chars/second and 0.8 seconds B. 250 chars/second and 0.6 seconds
C. 166 chars/second and 0.8 seconds D. 250 chars/second and 0.4 seconds
ugcnetdec2014iii computer-peripherals non-gate matrix-printer io-devices
Answer Keys
20.1.1 D 20.2.1 C 20.3.1 X
21 Non GATE: Data Mining and Warehousing (16)
A data cube C, has n dimensions, and each dimensions has exactly p distinct values in the base cuboid. Assume that
there are no concept hierarchies associated with the dimensions. What is the maximum number of cells possible in the
data cube, C?
The process of removing details from a given state representation is called _____
____ allows selection of the relevant information necessary for the data warehouse:
A. The Top-Down View B. Data Warehouse View
C. Datasource View D. Business Query View
ugcnetdec2015ii data-warehousing data-mining-and-warehousing
A. {0.9, 0.7, 0.4, 0.8, 0.9} B. {0.2, 0.4, 0.8, 0.5, 0.2}
C. {0.1, 0.3, 0.6, 0.3, 0.1} D. {0.7, 0.3, 0.4, 0.2, 0.7}
ugcnetjune2012iii fuzzy-sets
In the light of the above statements, choose the correct answer from the options given below
ugcnet-oct2020-ii k-means-clustering
High level knowledge which relates to the use of sentences in different contexts and how the context affect the meaning
of the sentences?
'R is a robot of M ’ means R can perform some of the tasks that otherwise M would do and R is unable to
do anything else.Which of the following is the most appropriate representation to model this situation?
D. None of these
A. B. C.
ugcnetjune2010ii knowledge-representation non-gate
Which of the following is a knowledge representation technique used to represent knowledge about stereotype
situation?
A. {(40, 0.4)}
B. {50, 60, 70, 80}
C. {(20, 0.1), (30, 0.2)}
D. {(20, 0), (30, 0), (40, 1), (50, 1), (60, 1), (70, 1), (80, 1)}
____ system is market oriented and is used for data analysis by knowledge workers including Managers, Executives
adn Analysts.
Answer Keys
21.0.1 Q-Q 21.1.1 D 21.2.1 D 21.3.1 A 21.4.1 A
21.5.1 B 21.6.1 X 21.7.1 Q-Q 21.8.1 C 21.9.1 D
21.9.2 B 21.9.3 Q-Q 21.9.4 C 21.9.5 D 21.10.1 B
21.11.1 D
22 Non GATE: Digital Image Processing (8)
Given a simple image of size 10 × 10 whose histogram models the symbol probabilities and is given by
P1 P2 P3 P4
a b c d
The first order estimate of image entropy is maximum when
1
A. a = 0, b = 0, c = 0, d = 1 B. a = 2,b = 12 , c = 0, d = 0
C. a = 13 , b = 13 , c = 13 , d = 0 D. a = 1
4,b = 14 , c = 14 , d = 14
ugcnetdec2014iii digital-image-processing entropy
Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has
1 1 1−p
, . The channel matrix is ( ) wgere p is the
p
alphabet X = {0, 1} and associated probabilities
2 2 p 1−p
transition probability. Then the conditional entropy is given by:
A. 1 B. −p log(p) − (1 − p) log(1 − p)
C. 1 + p log(p) + (1 − p) log(1 − p) D. 0
ugcnetdec2015iii digital-image-processing entropy
If the Fourier transform of the function f(x,y) is F(m,n), then the Fourier transform of the function f(2x,2y) is
1 m n 1 1 1 m n
A. 4 F( 2 , 2 ) B. 4 F(2m, 2n) C. 4 F(m, n) D. 4 F( 4 , 4 )
ugcnetdec2012iii fourier-transform digital-image-processing
In an image compression system 16384 bits are used to represent 256 × 256 image with 256 gray levels. What is the
compression ratio for this system?
A. 1 B. 2 C. 4 D. 8
ugcnetjune2012iii image-compression
Given an image of size 1024 × 1024 pixels in which intensity of each pixel is an 8-bit quality. It requires _______ of
storage space if the image is not compressed.
A. One Terabyte B. One Megabyte
C. 8 Megabytes D. 8 Terabytes
ugcnetjune2014iii image-compression computer-graphics
Which of the following is used for the boundary representation of an image object?
Answer Keys
22.1.1 D 22.2.1 D 22.2.2 D 22.3.1 A 22.4.1 X
22.4.2 A 22.4.3 B 22.4.4 D
23 Non GATE: Digital Signal Processing (4)
A Butterworth lowpass filter of order n, with a cutoff frequency at distance D0 from the origin, has the transfer
function H(u, v) given by
1 1
A. D(u,v) 2n
B. D(u,v) n
1+[ ] 1+[ D0
]
D0
1 1
C. 2n D. n
]
D
]
D
0 0
1+[ D(u,v) 1+[ D(u,v)
Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and
speed (i.e., modulation rate)
Consider a discrete memoryless channel and assume that H(x) is the amount of information per symbol at the input of
the channel; H(y) is the amount of information per symbol at the output of the channel. H(x ∣ y) is the amount of
uncertainty remaining on x knowing y; and I(x;y)is the information transmission. Which of the following does not define the
channel capacity of a descrete memoryless channel?
A. max I(x;y); p(x) B. max [H(y)-H(y ∣ x)]; p(x)
C. max [H(x)-H(x ∣ y)]; p(x) D. max H(x ∣y); p(x)
ugcnetjune2016iii digital-image-processing discrete-memoryless-channel
Answer Keys
23.1.1 A 23.2.1 A 23.3.1 D 23.4.1 B
24 Non GATE: Distributed Computing (11)
Which of the following computing models is not an example of distributed computing environment ?
A. Cloud computing B. Parallel computing
C. Cluster computing D. Peer-to-peer computing
ugcnetdec2014iii distributed-computing computing-models
ugcnetdec2014iii distributed-computing
Semi-join strategies are techniques for query processing in distributed database system. Which of the following is semi-
joined technique?
A. Only the joining attributes are sent from one site to another and then all of the rows are returned
B. All of the attributes are sent from one site to another and then only the required rows are returned
C. Only the joining attributes are sent from one site to another and then only the required rows are returned
D. All of the attributes are sent from one site to another and then only the required rows are returned
The distributed system is a collection of _____(P)_____ and communication is achieved in disributed system by
____(Q)____, where (P) and (Q) are:
A. Loosely coupled hardware on tightly coupled software and disk sharing, repspectively
B. Tightly coupled hardware on loosely coupled software and shared memory, repspectively
C. Tightly coupled software on loosely coupled hardware and message passing, repspectively
D. Loosely coupled software on tightly coupled hardware and file sharing, repspectively
ugcnetdec2015iii distributed-system
Which of the following statements is not correct with respect to the distributed systems?
A. Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by controlling
and managing resources across the network on all the sites.
B. Distributed system is built on bare machine, not an add-on to the existing software
C. In a distributed system, kernel provides smallest possible set of services on which other services are built. This kernel is
called microkernel. Open servers provide other services and access to shared resources.
D. In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their
beneficial aspects, user has to log on to that site.
ugcnetsep2013iii distributed-system
Which of the following is not valid with reference to Message Passing Interface(MPI)?
Which of the following statements is incorrect for Parallel Virtual Machine (PVM)?
A. The PVM communication model provides asynchronous blocking send, asynchronous blocking receive, amd non-blocking
receive function
B. Message buffers are allocated dynamically
C. The PVM communication model assumes that any task can send a message to any order PVM task and that there is no limit
to the size or number of such messages
D. In PVM model, the message order is not preserved
Suppose that the time to do a null remote procedure call (RPC) (i.e., 0 data bytes) is 1.0 msec with an additional 1.5
msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs?
Answer Keys
24.1.1 B 24.2.1 D 24.2.2 B 24.2.3 D 24.3.1 A
24.3.2 C 24.4.1 B 24.4.2 D 24.5.1 C 24.6.1 D
24.7.1 B
25 Non GATE: Geometry (2)
Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45 degrees about a point
P (−1, −1). The co ordinates of the new triangle obtained after rotation shall be ________.
– – – 9 √–
A. A′ (−1, √2 − 1), B′ (−1, 2√2 − 1), C ′ ( 32 √2 − 1, 2 2 − 1)
– – – 9 √–
B. A′ (√2 − 1, −1), B′ (2√2 − 1, −1), C ′ ( 32 √2 − 1, 2 2 − 1)
– – – 9 √–
C. A′ (−1, √2 − 1), B′ (2√2 − 1, −1), C ′ ( 32 √2 − 1, 2 2 − 1)
– – – 3 √–
D. A′ (−1, √2 − 1), B′ (2√2 − 1, −1), C ′ ( 92 √2 − 1, 2 2 − 1)
The end points of a given line are (0, 0) and (6, 18). Compute each value of y as x steps from 0 to 3, by using equation
of straight line:
A. For x = 0, y = 0; x = 1, y = 3; x = 2, y = 6; x = 3, y = 9
B. For x = 0, y = 1; x = 1, y = 3; x = 2, y = 4; x = 3, y = 9
C. For x = 0, y = 2; x = 1, y = 3; x = 2, y = 6; x = 3, y = 9
D. For x = 0, y = 0; x = 1, y = 3; x = 2, y = 4; x = 3, y = 6
Answer Keys
25.1.1 A 25.2.1 C
26 Non GATE: Integrated Circuits (1)
Which of the following logic families is well suited for high-speed operations?
Answer Keys
26.1.1 B
27 Non GATE: IS&Software Engineering (210)
ugcnetdec2004ii
Which possibility among the following is invalid in case of a Data Flow Diagram ?
A. A process having in-bound data flows more than out-bound data flows
B. A data flow between two processes
C. A data flow between two data stores
D. A data store having more than one in-bound data flows
ugcnetdec2006ii
ugcnetdec2007ii
ugcnetdec2004ii
Which of the following tools is not required during system analysis phase of system development life cycle ?
In software development, value adjustment factors include the following among others:
(A) the criticality of the performance and reusability of the code.
(B) number of lines of code in the software.
(C) number of technical manpower and hardware costs.
(D) time period available and the level of user friendliness.
ugcnetjune2008ii
The LAPB frame structure and the frame structure of SDLC are :
ugcnetdec2006ii
A legacy software system has 940 modules. The latest release required that 90 of these modules be changed. In
addition, 40 new modules were added and 12 old modules were removed. Compute the software maturity index for the
system.
ugcnetdec2006ii
A. Programs
B. Data
C. Documentation
D. All of the above
ugcnetjune2009ii
A. Product
B. Process
C. Product and Process
D. None of the above
ugcnetjune2009ii
A. Size measurement
B. Cost measurement
C. Design recovery
D. All of the above
ugcnetjune2009ii
ugcnetdec2006ii
ugcnetdec2006ii
ugcnetdec2006ii
ugcnetdec2007ii
Software products need adaptive maintenance for which of the following reasons?
ugcnetjune2019ii adaptive-maintenance
Which of the following prolog programs correctly implement “if G succeeds then execute goal P else execute goal θ”?
ugcnetjune2012iii artificial-intelligence
The optimal solution of the following assignment problem using Hungarian method is
I II III IV
A 8 26 17 11
B 13 28 4 26
C 38 19 18 15
D 19 26 24 10
Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated
Supplier Management are process areas required to achieve maturity level
Which one of the following is not a key process area in CMM level 5 ?
A. Defect prevention B. Process change management
C. Software product engineering D. Technology change management
ugcnetjune2014iii is&software-engineering cmm-model
Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing order of
maturity?
Match the 5 CMM Maturity levels /CMMI staged representations in List-I with their characterizations in List-II :
List-I List-II
(a) Initial
(i) Processes are improved quantitatively
and continually.
(b) Repeatable (ii) The plan for a project comes from a
template for plans.
(c) Defined (iii) The plan uses processes that can be
measured quantitatively.
(d) Managed (iv) There may not exist a plan or it may
be abandoned.
(e) Optimizing (v) There’s a plan and people stick to it.
Code :
A. (a)-(iv); (b)-(v); (c)-(i); (d)-(iii); (e)-(ii)
B. (a)-(i); (b)-(ii); (c)-(iv); (d)-(v); (e)-(iii)
C. (a)-(v); (b)-(iv); (c)-(ii); (d)-(iii); (e)-(i)
D. (a)-(iv); (b)-(v); (c)-(ii); (d)-(iii); (e)-(i)
The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
A. Abraham Silberschatz B. Barry Boehm
C. C.J. Date D. D.E. Knuth
ugcnetdec2010ii is&software-engineering cocomo-model
A software company needs to develop a project that is estimated as 1000 function points and is planning to use JAVA
as the programming language whose approximate lines of code per function point is accepted as 50. Considering
a = 1.4 as multiplicative factor, b = 1.0 as exponention factor for the basic COCOMO effort equation and c = 3.0 as
multiplicative factor, d = 0.33 as exponention factor for the basic COCOMO duration equation, approximately how long does
project take to complete?
A. 11.2 months B. 12.2 months
C. 13.2 months D. 10.2 months
ugcnetjan2017iii is&software-engineering cocomo-model
Codes :
(A) (i) (ii) (iv)
(B) (ii) (iii) (iv)
(C) (i) (ii) (iii)
(D) (i) (ii) (iii) (iv)
ugcnetdec2009ii is&software-engineering cost-estimation-model
Coupling is a measure of the strength of the interconnections between software modules. Which of the following are
correct statements with respect to module coupling?
P: Common coupling occurs when one module controls the flow of another module by passing it information on what to do
Q: In data coupling, the complete data structure is passed from one module to another through parameters.
R: Stamp coupling occurs when modules share a composite data structure and use only parts of it.
Code:
In _____, modules A and B make use of a common data type, but perhaps perform different operations on it.
A. Data coupling B. Stamp coupling
C. Control coupling D. Content coupling
ugcnetsep2013iii is&software-engineering coupling
A. aB.
anda,C.
cb, a,
cD.and
c, a,
anddb, dand d
ugcnetdec2015iii is&software-engineering crc-polynomial
A. 2
B. 3
C. 4
D. 5
ugcnetjune2016ii cyclomatic-complexity
______ is process of extracting previously non known valid and actionable information from large data to make crucial
business and strategic decisions.
A. Count of the number of components that can call, or pass control, to a component A
B. Number of components related to component A
C. Number of components dependent on component A
D. None of the above
To compute function points (FP ), the following relationship is used FP = Count - total ×(0.65 + 0.01 × ∑(Fi ))
where Fi (i = 1 to n) are value adjustment factors (V AF) based on n questions. The value of n is
A. 12 B. 14 C. 16 D. 18
ugcnetdec2014iii is&software-engineering function-point-metric
A. 10 B. 12 C. 14 D. 20
ugcnetjune2014ii is&software-engineering function-point-metric
ugcnetaug2016iii is&software-engineering
Which of the following is/are CORRECT statement(s) about version and release ?
I. A version is an instance of a system, which is functionally identical but nonfunctionally distinct from other instances
of a system.
II. A version is an instance of a system, which is functionally distinct in some way from other system instances.
III. A release is an instance of a system, which is distributed to users outside of the development team.
IV. A release is an instance of a system, which is functionally identical but nonfunctionally distinct from other instances of a
system.
Match the terms related to Software Configuration Management (SCM) in List-I with the description in List-II.
List-I List-II
I. Version
A. An instance of a system that is described
to customers
II. Release B. An instance of a system which is functionally
identical to other instances, but designed for
different hardware/software instances.
III. Variant C. An instance of a system that differs, in some
way, from other instances
Codes :
A. I-B; II-C; III-A B. I-C; II-A; III-B
C. I-C; II-B; III-A D. I-B; II-A; III-C
ugcnetdec2016iii is&software-engineering
An SRS
A. Establishes the basis for agreement between client and the supplier.
B. Provides a reference for validation of the final product.
C. Is a prerequisite to high quality software.
D. All of the above.
ugcnetdec2011ii is&software-engineering
A. the changes due to the evolution of work products as the project proceeds
B. the changes due to defects (bugs) being found and then fixed
C. the changes due to requirement changes
D. all of the above
ugcnetdec2013ii is&software-engineering
A. Once we write the program and get it to work, our job is done
B. Projects requirements continually change, but change can be easily accommodated because software is flexible
C. If we get behind schedule, we can add more programmers and catch up
D. If an organization does not understand how to control software projects internally, it will invariably struggle when it
outsources software projects.
ugcnetdec2013iii is&software-engineering
27.22.13 Is&software Engineering: UGCNET-Dec2015-III: 25 https://gateoverflow.in/62481
Which of the following non-functional quality attributes is not highly affected by the architecture of the software?
A. Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management.
B. Reliability of a software specifies the probability of failure-free operation of that software for a given time duration.
C. The reliability of a system can also be specified as the Mean Time To Failure (MTTF).
D. In white-box testing, the test cases are decided from the specifications or the requirements.
ugcnetdec2015iii is&software-engineering
Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect?
ugcnetdec2015iii is&software-engineering
ugcnetjan2017ii is&software-engineering
Which of the following is not one of three software product aspects addressed by McCall's software quality factors ?
A. Ability to undergo change B. Adaptiability to new environments
C. Operational characteristics D. Production costs and scheduling
ugcnetjan2017ii is&software-engineering
Which of the following statement(s) is/are true with respect to software architecture?
S1 : Coupling is a measure of how well the things grouped together in a module belong together logically.
S2 : Cohesion is a measure of the degree of interaction between software modules.
S3 : If coupling is low and cohesion is high then it is easier to change one module without affecting others.
ugcnetjan2017ii is&software-engineering
Match the terms related to Software Configuration Management (SCM) in List-Ⅰ with the descriptions in List-II.
List-I List-II
I. Version
A. An instance of a system that is distributed
to customers
II. Release B. An instance of a system which is functionally
identical to other instances but designed for
different hardware/software instances.
III. Variant C. An instance of a system that differs, in some
way, from other instances
Codes:
A. I-B; II-C; III-C B. I-C; II-A; III-B
C. I-C; II-B; III-A D. I-B; II-A; III-C
ugcnetjan2017iii is&software-engineering
A software project was estimated at 352 Function Points(FP). A four person team will be assigned to this project
consisting of an architect, two programmers, and a tester The salary of the architect is ₹80, 000 per month, the
programmer ₹60, 000 per month and the tester ₹50, 000 per month. The average productivity for the team is 8 FP per
person month. Which of the following represents the projected cost of the project?
A. ₹28, 16, 000 B. ₹20, 90, 000
C. ₹26, 95, 000 D. ₹27, 50, 000
ugcnetjan2017iii is&software-engineering
Complete each of the following sentences in List- I on the left hand side by filling in the word or phase from the
List- II on the right hand side that best completes the sentences :
List-I List-II
I. Determining whether you have built A. Software testing
the right system is called ________
II. Determining whether you have built B. Software verification
the system right is called _______
III. _______ is the process of demonstrating C. Software debugging
the existence of defects or providing
confidence that they do not appear to
be present.
IV. _______ is the process of discovering D. Software validation
the causes of a defect and fixing it.
Codes :
A. I-B; II-D; III-A; IV-C B. I-B; II-D; III-C; IV-A
C. I-D; II-B; III-C; IV-A D. I-D; II-B; III-A; IV-C
ugcnetjan2017iii is&software-engineering
27.22.23 Is&software Engineering: UGCNET-July-2018-II: 12 https://gateoverflow.in/225874
Which one of the following is not typically provided by Source Code Management Software?
A. Synchronization B. Versioning and Revision history
C. Syntax highlighting D. Project forking
ugcnetjuly2018ii is&software-engineering
A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart. Approximately,
what was the software availability in that year?
Which of the following is not a key strategy followed by the clean room approach to software development?
A. Formal specification B. Dynamic verification
C. Incremental development D. Statistical testing of the system
ugcnetjuly2018ii is&software-engineering
Key process areas of CMM level 4 are also classified by a process which is
Validation means
A. are we building the product right B. are we building the right product
C. verification of fields D. None of the above
ugcnetjune2012ii is&software-engineering non-gate
Which of the following metric does not depend on the programming language used?
A. Line of code B. Function count
C. Member of token D. All of the above
non-gate is&software-engineering ugcnetjune2012ii
While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one
of the following?
A. Length of code B. Size of software
C. Functionality of software D. None of the above
is&software-engineering ugcnetjune2013ii
_________ of a system is the structure or structures of the system which comprise software elements, the externally
visible properties of these elements and the relationship amongst them.
A. Software construction B. Software evolution
C. Software architecture D. Software reuse
ugcnetjune2014ii is&software-engineering
A. I B. II
C. III D. All of the above
ugcnetjune2014ii is&software-engineering
A. It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct
value.
B. It refers to the actual output of a software and the correct output.
C. It refers to a condition that causes a system to fail.
D. It refers to human action that results in software containing a defect or fault.
ugcnetjune2014iii is&software-engineering
Which design matric is used to measure the compactness of the program in terms of lines of code?
I f S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct
function depends on prior processing then the number of modules not dependent on prior processing is:
S3 S3 S1 S1
A. 1 + S1 B. 1 − S1 C. 1 + S3 D. 1 − S3
ugcnetjune2016ii is&software-engineering
A company has a choice of two languages L1 and L2 to develop a software for their client. Number of LOC required to
develop an application in L2 is thrice the LOC in language L1 . Also, software has to be maintained for next 10 years.
Various parameters for two languages are given below to decide which language should be preferred for development.
PARAMETER L1 L2
Man-year needed for development LOC / LOC
1000 / 1000
Development cost Rs. 70, 000 Rs. 90, 000
Cost of Maintenance per year Rs.1, 00, 000 Rs.40, 000
Total cost of project include cost of development and maintenance. What is the LOC for L1 for which cost of developing the
software with both languages must be same?
A Software project was estimated at 864 Function Points. A six person team will be assigned to project consisting of a
requirement gathering person, one designer, two programmers and two testers. The salary of the designer is
Rs. 70, 000 per month, requirement gatherer is Rs. 50, 000 per month, programmer is Rs. 60, 000 per month and a tester is
Rs. 60, 000 per month. Average productivity for the team is 12 FP per person month. Which of the following represents the
projected cost of the project
A. Rs. 33, 20, 000 B. Rs. 43, 20, 000
C. Rs. 33, 10, 000 D. Rs. 22, 10, 000
ugcnet-oct2020-ii non-gate is&software-engineering
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a) (b) and (c)
ugcnet-oct2020-ii non-gate is&software-engineering
a. Execution Time b. Calender Time c. Clock Time Choose the correct answer from the options given
below:
A. (a) and (b) only B. (b) and (c) only C. (a), (b) and (c) D. (a) and (c) only
ugcnet-oct2020-ii non-gate is&software-engineering
Arrange the following types of Cohesion from the best to worst type.
a. Logical Cohesion
b. Sequential Cohesion
c. Communication Cohesion
d. Temporal Cohesion
e. Procedural Cohesion
A. a→d→e→c→b
B. a→e→d→c→b
C. b→e→c→d→a
D. b→c→e→d→a
Statement I : Quality control involves the series of inspections, reviews and tests used throughout the software process,
to ensure each work product meets the requirements placed upon it.
Statement II : Quality assurance consists of auditing and reporting functions of management
In the light of the above statements, choose the correct answer from the options given below
The _____ of a program or computing system is the structure or structures of the system, which comprise software
components, the externally visible properties of these components and the relationship among them.
A. E-R diagram B. Data flow diagram
C. Software architecture D. Software design
ugcnetsep2013ii is&software-engineering
In any simplex table, if corresponding to any negative Δ j, all elements of the column are negative or zero, the solution
under the test is
A. degenerate solution B. unbounded solution
C. alternative solution D. non-existing solution
ugcnetjune2012iii optimization linear-programming
27.25 Mis (1)
A. Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or comparing
alternatives
B. Draws on diverse yet predictable data resources to aggregate and summarize data
C. High volume, data capture focus
D. Has as its goal the efficiency of data movement and processing and interfacing different TPS
A. user interface
B. security of the system
C. business logic and domain objects
D. translating between user interface actions/events and operations on the domain objects
ugcnetjune2019ii model-view-controller
Which one from the following is highly associated activity of project planning?
Which of the following are the primary objectives of risk monitoring in software project tracking?
P: To assess whether predicted risks do, in fact, occur
Q: To ensure that risk aversion steps defined for the risk are being properly applied
R: To collect information that can be used for future risk analysis
Assume that the software team defines a project risk with 80% probability of occurrence of risk in the following
manner: Only 70 percent of the software components scheduled for reuse will be integrated into the application and the
remaining functionality will have to be custom developed. If 60 reusable components were planned with average component
size as 100 LOC and software engineering cost for each LOC as $14, then the risk exposure would be
Which one of the following is not a risk management technique for managing the risk due to unrealistic schedules and
budgets ?
A. Detailed multi source cost and schedule estimation. B. Design cost
C. Incremental development D. Information hiding
ugcnetjune2014ii is&software-engineering risk-management
Sixty reusable components were available for an application. If only 70% of these components can be used, rest 30%
would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will
be risk of exposure if risk probability is 80%?
A. Rs. 25, 200 B. Rs. 20, 160 C. Rs. 25, 160 D. Rs. 20, 400
ugcnetsep2013iii is&software-engineering risk-management
A software design pattern used to enhance the functionality of an object at run-time is:
A process which defines a series of tasks that have the following four primary objectives is known as
The quick design of a software that is visible to end users leads to _____.
A. Iterative model B. Prototype model
C. Spiral model D. Waterfall model
ugcnetaug2016ii is&software-engineering software-design
The software _______ of a program or a computing system is the structure or structures of the system, which comprise
software components, the externally visible properties of those components, and the relationships among them.
A. Design B. Architecture
C. Process D. Requirement
ugcnetdec2014ii is&software-engineering software-design
The Software Maturity Index (SMI) is defined as SMI = [Mf – (Fa + Fc + Fd )]/Mf
where Mf = number of modules in current release
Fa =the number of module in the current release that have been added
Fc = the number of module in the current release that have been changed
Fd = the number of module in the current release that have been deleted
The product begins to stabilize when
A. SMI approaches 1 B. SMI approaches 0
C. SMI approaches -1 D. None of the above
ugcnetjune2013iii is&software-engineering software-design non-gate
______ is a process model that removes defects before they can precipitate serious hazards.
A. Incremental model B. Spiral model
C. Cleanroom software engineering D. Agile model
ugcnetjune2013iii is&software-engineering software-design
are of
A. User satisfaction B. Good interface design
C. Saving system’s resources D. None of these
ugcnetjune2013iii is&software-engineering software-design
Modulo design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement
this rule?
A. Inheritance B. Polymorphism C. Encapsulation D. Abstraction
ugcnetjune2015iii software-design is&software-engineering
If E, D and C are the estimated development effort (in person-month), estimated development time (in months), and estimated
development cost (in INR Lac) respectively, then (E, D, C) = ______
Software Engineering is a discipline that integrates _________ for the development of computer software.
(A) Process
(B) Methods
(C) Tools
(D) All
ugcnetdec2009ii is&software-engineering software-development
The system specification is the first deliverable in the computer system engineering process which does not include
A. Functional Description B. Cost
C. Schedule D. Technical Analysis
ugcnetdec2010ii is&software-engineering software-development-life-cycle-models
For a data entry project for office staff who have never used computers before (user interface and user friendliness are
extremely important), one will use
A. Spiral model B. Component based model
C. Prototyping D. Waterfall model
ugcnetdec2011ii is&software-engineering software-development-life-cycle-models
27.37.5 Software Development Life Cycle Models: UGCNET-Dec2012-II: 24 https://gateoverflow.in/56841
_____ is an “umbrella” activity that is applied throughout the software engineering process.
A. Debugging B. Testing
C. Designing D. Software quality assurance
ugcnetdec2012ii is&software-engineering software-development-life-cycle-models
List-I
(Software
Process
Models) List-II
(Software Systems)
(a) Waterfall model (i) e-business software that starts with only the
basic functionalities and then moves on to
more advanced features
(b) Incremental
development (ii) An inventory control system for super-
market to be developed within three months
(c) Prototyping (iii) A virtual reality system for simulating
vehicle nevigation in a highway
(d) RAD (iv) Automate the manual system for student
record maintenance in a school
The ____ model is preferred for software development when the requirements are not clear.
A. Rapid Application Development B. Rational Unified Process
C. Evolutionary Model D. Waterfall Model
ugcnetjune2016ii is&software-engineering software-development-life-cycle-models
27.37.10 Software Development Life Cycle Models: UGCNET-Sep2013-II: 29 https://gateoverflow.in/59227
A Web application and its support environment has not been fully fortified against attack. Web engineers estimate that
the likelihood of repelling an attack is only 30 percent. The application does not contain sensitive or controversial
information, so the threat probability is 25 percent. What is the integrity of the web application?
Which one of the following set of attributes should not be encompassed by effective software metrics ?
A. Simple and computable B. Consistent and objective
C. Consistent in the use of units and dimensions D. Programming language dependent
ugcnetdec2014ii is&software-engineering software-metrics
27.41.2 Software Metrics: UGCNET-June2012-III: 33 https://gateoverflow.in/56265
The number of function points of a proposed system is calculated as 500. Suppose that the system is planned to be
developed in Java and the LOC/FP ratio of Jave is 50. Estimate teh effort (E) required to complete the project using the
effort formula of basic COCOMO given: E=a(KLOC)b
Assume that the values of a and b are 2.5 and 1.0 respectively
A. 25 person months B. 75 person months
C. 62.5 person months D. 72.5 person months
ugcnetjune2016iii is&software-engineering software-metrics
A. correctness, reliability
B. efficiency, usability, maintainability
C. testability, portability, accuracy, error tolerances, expandability, access control, audit
D. All of the above
The extent to which a software performs its intended functions without failures, is termed as
A. 100 B. 10 C. 1 D. 0
ugcnetdec2014iii is&software-engineering software-reliability
Software safety is a ______ activity that focuses on the identification and assessment of potential hazards that may
affect software negatively and cause an entire system to fail.
A. Risk mitigation, monitoring and management B. Software quality assurance
C. Software quality assurance D. Defect removal efficiency
ugcnetjune2013iii is&software-engineering software-reliability
Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The initial
failure intensity was 20 failures/CPU hr. Then the current failure intensity will be
A. 5 failured/CPU hr B. 10 failured/CPU hr
C. 20 failured/CPU hr D. 40 failured/CPU hr
ugcnetjune2014iii is&software-engineering software-reliability
A server crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) is 30 days. When it
happens it takes 12 hours to reboot it, that is, Mean Time To Repair (MTTR) is 12 hours. The availability of server with
these reliability data values is approximately.
The failure intensity for a basic model as a function of failures experienced is given as λ(μ) − λ0 [1 − (μ)/(V0 )]
where λ0 is the initial failure intensity at the start of the execution, μ is the average or expected number of failures at a
given point in time, the quantity V0 is the total number of failures that would occur in infinite time.
Assume that a program will experience 100 failures in infinite time, the initial failure intensity was 10 failures/CPU hr. Then
the decrement of failures intensity per failure will be
A. 10 per CPU hr B. 0.1 per CPU hr
C. -0.1 per CPU hr D. 90 per CPU hr
ugcnetsep2013iii is&software-engineering software-reliability
A. I, II and III B. I, III and IV C. II, III and IV D. I, II, III and IV
ugcnetsep2013ii is&software-engineering software-requirement-specification
A.
n1
B.
n1
C. n1 + n2 D. n1 − n2 Where n1 is the number
n2 n2
of requirements for
which all reviewers have identical interpretations, n2 is number of requirements in a specification.
Software reuse is
A. the process of analysing software with the objective of recovering its design and specification
B. the process of using existing software artifacts and knowledge to build new software
C. concerned with reimplementing legacy system to make them more maintainable
D. the process of analysing software to create a representation of a higher level of abstraction and breaking software down into
its parts to see how it works
ugcnetjune2019ii software-reuse
If a program P calls two subprograms P 1 and P 2 and P 1 can fail 50% of the time and P 2 can fail 40% of the time,
what is the failure rate of program P ?
For a program of k variables, boundary value analysis yields ______ test cases.
A. 4k– 1 B. 4k C. 4k + 1 D. 2k – 1
ugcnetaug2016ii is&software-engineering software-testing
Prototyping is used to
A. Test the software as an end product B. Expand design details
C. Refine and establish requirements gathering D. None of the above
ugcnetdec2010ii is&software-engineering software-testing
Following is used to demonstrate that the new release of software still performs the old one did by rerunning the old
tests :
A. Functional testing B. Path testing
C. Stress testing D. Regression testing
ugcnetdec2011ii is&software-engineering software-testing
In software testing, how the error, fault and failure are related to each other?
A. Error leads to failure but fault is not related to error and failure
B. Fault leads to failure but error is not related to fault and failure
C. Error leads to fault and fault leads to failure
D. Fault leads to error and error leads to failure
Which of the following statement(s) is/are TRUE with regard to software testing?
I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance.
II. Equivalence partitioning is a white-box testing technique that divides the input domain of a program into classes of data
from which test cases can be derived.
A. only I B. only II
C. both I and II D. neither I nor II
ugcnetjan2017iii is&software-engineering software-testing
Which of the following are facts about a top-down software testing approach?
A. Only I B. Only II
C. Both I and II D. Neither I nor II
ugcnetjan2017iii is&software-engineering software-testing
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a
probability of success 0.9. The reliability of the module is
A. at least greater than 0.9 B. equal to 0.9
C. at most 0.81 D. at least 1/0.81
ugcnetjune2012iii is&software-engineering software-testing
Equivalence partitioning is a ______ method that divides the input domain of a program into classes of data from which
test cases can be derived
A. White-box testing B. Black-box testing
C. Orthogonal array testing D. Stress testing
ugcnetjune2013iii is&software-engineering software-testing non-gate
Software testing is
Which of the testing strategy requirements established during requirements analysis are validated against developed
software?
A. validation testing B. integration testing
C. regression testing D. system testing
ugcnetjune2015ii software-testing is&software-engineering
Equivalence partitioning is a _____ testing method that divides the input domain of a program into classes of data from
which test cases can be derived.
____ refers to the discrepancy among a computed, observed or measured value and the true specified or theoretically
correct values?
Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a
program works correctly for all the other values in that class. This is used _____
A. verification
B. validation
C. both verification and validation
D. none of the above
Any error whose cause cannot be identified anywhere within the software system is called ________
(A) to show that s/w is operational at its interfaces i.e. input and output.
(B) to examine internal details of code.
(C) at client side.
(D) none of above.
ugcnetdec2009ii is&software-engineering software-testing
_____ establishes information about when,why and by whom changes are made in a Software.
A. Software Configuration Management B. Change Control
C. Version Control D. An Audit Trail
ugcnetdec2012iii is&software-engineering software-validation
An actor in an animation is a small program invoked _____ per frame to determine the characteristics of some object in
the animation.
In the context of software testing, which of the following statements is/are NOT correct?
P: A minimal test set that achieves 100% path coverage will also achieve 100% statement coverage.
Q: A minimal test set that achieves 100% path coverage will generally detect more faults than one that achieves 100%
statement coverage.
R: A minimal test set that achieves 100% statement coverage will generally detect more faults than one that achieves 100%
branch coverage.
Answer Keys
27.0.1 Q-Q 27.0.2 Q-Q 27.0.3 Q-Q 27.0.4 Q-Q 27.0.5 Q-Q
27.0.6 Q-Q 27.0.7 Q-Q 27.0.8 Q-Q 27.0.9 Q-Q 27.0.10 Q-Q
27.0.11 Q-Q 27.0.12 Q-Q 27.0.13 Q-Q 27.0.14 Q-Q 27.0.15 Q-Q
27.0.16 Q-Q 27.0.17 Q-Q 27.0.18 Q-Q 27.0.19 Q-Q 27.0.20 Q-Q
27.0.21 Q-Q 27.0.22 Q-Q 27.1.1 B 27.2.1 C 27.2.2 B
27.3.1 B 27.4.1 C 27.4.2 C 27.4.3 B 27.5.1 Q-Q
27.6.1 Q-Q 27.6.2 A 27.6.3 Q-Q 27.7.1 B 27.8.1 D
27.8.2 C 27.9.1 A 27.9.2 Q-Q 27.10.1 B 27.10.2 Q-Q
27.10.3 B 27.11.1 B 27.12.1 C 27.13.1 B 27.13.2 D
27.13.3 A 27.14.1 C 27.14.2 C 27.15.1 B 27.16.1 A
27.17.1 A 27.18.1 Q-Q 27.19.1 B 27.19.2 C 27.20.1 C
27.21.1 B 27.22.1 Q-Q 27.22.2 Q-Q 27.22.3 B 27.22.4 Q-Q
27.22.5 Q-Q 27.22.6 A 27.22.7 C 27.22.8 B 27.22.9 C
27.22.10 D 27.22.11 C 27.22.12 D 27.22.13 D 27.22.14 A
27.22.15 A 27.22.16 C 27.22.17 D 27.22.18 B 27.22.19 B
27.22.20 D 27.22.21 A 27.22.22 A 27.22.23 Q-Q 27.22.24 Q-Q
27.22.25 Q-Q 27.22.26 Q-Q 27.22.27 Q-Q 27.22.28 Q-Q 27.22.29 Q-Q
27.22.30 D 27.22.31 C 27.22.32 B 27.22.33 C 27.22.34 B
27.22.35 B 27.22.36 B 27.22.37 B 27.22.38 B 27.22.39 A
27.22.40 C 27.22.41 B 27.22.42 A 27.22.43 C 27.22.44 B
27.22.45 B 27.22.46 B 27.22.47 B 27.22.48 B 27.22.49 B
27.22.50 C 27.22.51 C 27.22.52 B 27.22.53 C 27.22.54 C
27.22.55 A 27.22.56 B 27.22.57 C 27.22.58 D 27.22.59 A
27.22.60 C 27.23.1 A 27.24.1 B 27.25.1 B 27.26.1 C
27.27.1 A 27.28.1 C 27.29.1 D 27.30.1 B 27.30.2 D
27.30.3 B 27.31.1 D 27.32.1 B 27.33.1 B 27.34.1 D
27.35.1 Q-Q 27.35.2 Q-Q 27.35.3 B 27.35.4 Q-Q 27.35.5 Q-Q
27.35.6 Q-Q 27.35.7 A 27.35.8 X 27.35.9 C 27.35.10 B
A. 59 B. 95 C. 69 D. 99
ugcnetdec2016iii java programming recursion
Which methods are utilized to control the access to an object in multi-threaded programming ?
A. Asynchronized methods B. Synchronized methods
C. Serialized methods D. None of the above
ugcnetdec2014iii java multi-threaded-programming
Converting a primitive type data into its corresponding wrapper class object instance is called
Answer Keys
28.1.1 Q-Q 28.2.1 C 28.3.1 Q-Q 28.3.2 B 28.3.3 Q-Q
28.3.4 X 28.4.1 Q-Q 28.5.1 B 28.6.1 B;C 28.7.1 D
28.8.1 D
29 Non GATE: Numerical Methods (3)
Five men are available to do five different jobs. From past records, the time (in hours) that each man takes to do each
job is known and is given in the following table :
Find out the minimum time required to complete all the jobs.
A. 5 B. 11 C. 13 D. 15
ugcnetdec2014iii assignment-problem hungarian-method
A. x1 = 52 , x2 = 0, x3 = 0, Z = 5 B. x1 = 0, x2 = 0, x3 = 52 , Z = 5
C. x1 = 0, x2 = 52 , x3 = 0, Z = − 52 D. x1 = 0, x2 = 0, x3 = 10, Z = 20
ugcnetjune2019ii simplex-method
Answer Keys
29.1.1 C 29.2.1 Q-Q 29.3.1 B
30 Non GATE: Object Oriented Programming (59)
A. “Private” elements of a base class are not accessible by members of its derived class.
B. “Protected” elements of base class are not accessible by members of its derived class.
C. When base class access specified is “Public”, public elements of the base class become public members of its derived class.
D. When base class access specified is “Public”, protected elements of a base class become protected members of its derived
class.
ugcnetdec2007ii
Polymorphism means :
A. A template function B. Runtime type identification within a class hierarchy
C. Another name for operator overloading D. Virtual inheritance
ugcnetdec2004ii
ugcnetdec2007ii
Which of the following is/are correct with reference to Abstract class and interface?
a. A class can inherit only one Abstract class but may inherit several
b. An abstract class can provide complete and default code but an
interfaces interface has no code
A. a is true B. b is true
C. Both a and b are true D. Neitehr a nor b are true
ugcnetdec2015iii object-oriented-programming abstract-class
Which one of the following is correct, when a class grants friend status to another class?
A. The member functions of the class generating friendship can access teh members of the friend class
B. All member functions of the class granted friendship have unrestricted access to the members of the class granting the
friendship
C. Class friendship is reciprocal to each other
D. There is no such concept
oops class
A. Composition is a strong type of association between two classes with full ownership.
B. Composition is a strong type of association between two classes with partial ownership.
C. Composition is a weak type of association between two classes with partial ownership.
D. Composition is a weak type of association between two classes with strong ownership.
A. zero
B. 1
C. 2
D. any number
Which one of the following is correct, when a class grants friend status to another class?
A. The member functions of the class generating friendship can access the members of the friend class
B. All member functions of the class granted friendship have unrestricted access to the members of the class granting the
friendship
C. Class friendship is reciprocal to each other
D. There is no such concept
_____ allows to create classes which are derived from other classes, so that they automatically include some of its
"parent's" members, plus its own members.
Which of the following, in C++, is inherited in a derived class from base class?
When the inheritance is private, the private methods in base class are _____ in the derived class (in C++)
Which is the method used to retrieve the current state of a check box?
A. get State ( ) B. put State ( )
C. retrieve State ( ) D. write State ( )
ugcnetdec2012iii object-oriented-programming java
A. 20 : 20 B. 18 : 18 C. 18 : 20 D. 20 : 18
ugcnetjan2017iii object-oriented-programming java
Which of the following statement(s) with regard to an abstract class in JAVA is /are TRUE ?
A. Only I B. only II
C. Neither I nor II D. Both I and II
ugcnetjan2017iii object-oriented-programming java
Assume that we have constructor functions for both base class and derived class. Now consider the declaration in
main()
Base *P=New Derived;
In what sequence will the constructor be called?
The Servlet Response interface enables a servlet to formulate a response for a client using the method
A. void log(Exception e, String s) B. void destroy()
C. int get ServerPort() D. void set ContextType(String Type)
ugcnetjune2015iii object-oriented-programming java
It is possible to define a class within a class termed as nested class. There are __ types of nested classes
A. 2 B. 3 C. 4 D. 5
ugcnetjune2016iii object-oriented-programming java
When one object reference variable is assigned to another object reference variable then
Which of the following differentiates between overloaded functions and overridden functions ?
A. Overloading is a dynamic or runtime binding and overridden is a static or compile time binding.
B. Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
C. Redefining a function in a friend class is called overloading, while redefining a function in a derived class is called as
overridden function.
D. Redefining a function in a derived class is called function overloading, while redefining a function in a friend class is called
function overriding.
ugcnetdec2014ii object-oriented-programming
Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software
development. What can you say about the following two statements?
I. Abstraction allows us to focus on what something does without considering the complexities of how it works.
II. Encapsulation allows us to consider complex ideas while ignoring irrelevant detail that would confuse us.
A. (a) only B. (b) only C. (c) only D. (b) and (c) only
ugcnetjuly2018ii object-oriented-programming
Member of a class specified as ______ are accessible only to method of the class.
ugcnetjune2010ii object-oriented-programming
ugcnetjune2014iii object-oriented-programming
Match the following with respect to I/O classes in object oriented programming :
List – I List – II
a. fopen() i. returns end of file
b. fclose() ii. return for any problem report
c. ferror() iii. return 0
d. feof() iv. returns a file pointer
Codes :
A. a-iv, b-i, c-ii, d-iii B. a-iii, b-i, c-iv, d-ii
C. a-ii, b-iii, c-iv, d-i D. a-iv, b-iii, c-i, d-ii
ugcnetjune2014iii object-oriented-programming programming-in-c
A. collection of continuous objects that incorporates both data structure and behaviour.
B. collection of discrete objects that incorporates both discrete structure and behaviour.
C. collection of discrete objects that incorporates both data structure and behaviour.
D. collection of objects that incorporates both discrete data structure and behaviour.
ugcnetjune2014iii object-oriented-programming
The "part-whole”or "a-part-of", relationship in which objects representing the components of something associated with
an object representing the entire assembly is called as
A. Association B. Aggregation
C. Encapsulation D. Generalisation
ugcnetjune2014iii object-oriented-programming
The pure object oriented programming language with extensive metadata available and modifiable at run time is
When a method in subclass has the same name and type signatures as a method in the superclass, then the method in the
subclass ____ the method in the superclass.
Consider the following recursive Java function f that takes two long arguments and returns a float value:
public static float f (long m, long n) {
float result = (float)m / (float)n;
if (m < 0 || n<0) return 0.0f;
else result -=f(m*2, n*3);
return result;
}
Which of the following real values best approximates the value of f(1, 3)?
When a language has the capability to produce new data types, it is said to be :
A. extensible
B. encapsulated
C. overloaded
D. none of the above
ugcnetdec2008ii object-oriented-programming
A. * B. += C. == D. : :
ugcnetdec2013ii programming-in-c operator-overloading
The function f() returns the int that represents the ____P____ in the binary representation of positive integer n, where P is
A. number of 0’s B. number of bits
C. number of consecutive 1’s D. number of 1’s
ugcnetjune2019ii programming-in-c
The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system
A. when we write overloaded function we must code the function for each usage
B. when we write function template we code the function only once
C. it is difficult to debug macros
D. templates are more efficient than macros
Answer Keys
30.0.1 Q-Q 30.0.2 Q-Q 30.0.3 Q-Q 30.1.1 B 30.1.2 C
30.2.1 Q-Q 30.2.2 B 30.3.1 Q-Q 30.4.1 Q-Q 30.5.1 Q-Q
30.5.2 Q-Q 30.5.3 Q-Q 30.6.1 Q-Q 30.7.1 Q-Q 30.8.1 B
30.9.1 Q-Q 30.9.2 C 30.10.1 B 30.10.2 C 30.10.3 A
30.11.1 A 30.11.2 C 30.11.3 A 30.11.4 A 30.11.5 B
30.11.6 C 30.11.7 X 30.11.8 D 30.11.9 A 30.11.10 B
30.12.1 C 30.12.2 A 30.12.3 A 30.12.4 B 30.12.5 D
30.12.6 B 30.12.7 A 30.12.8 A 30.12.9 D 30.12.10 A
30.12.11 D 30.12.12 B 30.12.13 Q-Q 30.12.14 Q-Q 30.12.15 Q-Q
The given maximization assignment problem can be converted into a minimization problem by
A. Subtracting each entry in a column from the maximum value in that column.
B. Subtracting each entry in the table from the maximum value in that table.
C. Adding each entry in a column from the maximum value in that column.
D. Adding maximum value of the table to each entry in the table.
In the Hungarian method for solving assignment problem, an optimal assignment requires that the maximum number of
lines that can be drawn through squares with zero opportunity cost be equal to the number of
A. rows or columns B. rows + columns
C. rows + columns -1 D. rows + columns +1
ugcnetjune2015iii assignment-problem optimization
In a Linear Programming Problem, suppose there are three basic variables and 2 non-basic variables, then the possible
number of basic solutions are
A. 6 B. 8 C. 10 D. 12
ugcnetdec2012iii optimization linear-programming
Given the problem to maximize f(x), X = (x1 , x2 , … , xn ) subject to m number of in equality constraints.
gi (x) ≤ bi , i=1, 2, .... m including the non-negativity constrains x ≥ 0 . Which of the following conditions is a Kuhn-
Tucker necessary condition for a local maxima at x̄?
∂L(X̄,λ̄,S̄ )
A. ∂xj
= 0, j = 1, 2 … m
B. λ̄i [gi (X̄) − bi ] = 0, i = 1, 2 … m
C. gi (X̄) ≤ bi , i = 1, 2 … m
D. All of these
A basic feasible solution of a linear programming problem is said to be ______ if at least one of the basic variable is
zero
A. 23 B. 9.5 C. 13 D. 8
ugcnet-oct2020-ii non-gate linear-programming
If the primal Linear Programming pro blem has unbounded solution, then it's dual problem will have
ugcnetdec2015iii optimization
31.4.2 Optimization: UGCNET-June2014-III: 58 https://gateoverflow.in/57216
Which of the following special cases does not require reformulation of the problem in order to obtain a solution ?
A. Alternate optimality B. Infeasibility
C. Unboundedness D. All of the above
ugcnetjune2014iii optimization
The initial basic feasible solution to the following transportation problem using Vogel’s approximation method is
D1 D2 D3 D4 Supply
S1 1 2 1 4 30
S2 3 3 2 1 50
S3 4 2 5 9 20
Demand 20 40 30 10
A. x11 = 20, x13 = 10, x21 = 20, x23 = 20, x24 = 10, x32 = 10 , Total cost = 180
B. x11 = 20, x12 = 20, x13 = 10, x22 = 20, x23 = 20, x24 = 10 , Total cost = 180
C. x11 = 20, x13 = 10, x22 = 20, x23 = 20, x24 = 10, x32 = 10 , Total cost = 180
D. None of the above
The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel's Approximation
method is
A. 76 B. 78 C. 80 D. 82
ugcnetjune2014iii optimization transportation-problem
The initial basic feasible solution of the above transportation problem using Vogel's Approximation method (VAM) is given
below:
Answer Keys
31.1.1 B 31.1.2 A 31.2.1 C 31.2.2 D 31.2.3 B
31.2.4 A 31.2.5 B 31.2.6 D 31.2.7 D 31.3.1 C
31.4.1 A 31.4.2 A 31.5.1 D 31.5.2 A 31.5.3 B
31.5.4 A 31.5.5 B
32 Non GATE: Others (51)
ugcnetdec2007ii
ugcnetdec2004ii
A. 120 B. 95 C. 128 D. 64
ugcnetdec2006ii
ugcnetdec2006ii
ugcnetdec2007ii
Which of the following changes permission to deny write permission to group and others ?
ugcnetjune2009ii
Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty space. Given the
initial state
12
3
which of the following state cannot be reached?
31
A
2
3
B
21
13
C
2
2
D
13
Consider the following game tree in which root is a maximizing node and children are visited left to right. What nodes
will be pruned by the alpha-beta pruning?
A. I B. HI C. CHI D. GHI
ugcnetjune2016iii artificial-intelligence alpha-beta-pruning
Applications-software
A. Is used to control the operating system B. Includes programs designed to help programmers
C. Performs a specific task for computer users D. All of the above
ugcnetjune2010ii application-software
Hadoop (a big data tool) works with number of related tools. Choose from the following, the common tools included
into Hadoop:
A. MySQL, Google API and Map reduce B. Map reduce, Scala and Hummer
C. Map reduce, H Base and Hive D. Map reduce, Hummer and Heron
ugcnetjune2019ii bigdata-hadoop
ugcnetjuly2018ii convex-optimization
Data Mining uses _______, _______ and _______ to build effective predictive model.
I. Business intelligence and Data warehousing is used for forecasting and Data mining
II. Business intelligence and Data warehousing is used for analysis of large volumes of sales data
I. Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse
II. Data scrubling is a process of rejecting data from data warehouse to create indexes
ugcnetdec2014ii debugger
Decrypt the message "WTAAD" using the Caesar Cipher with key =15
Consider a fuzzy set A defined on the interval X=[0, 10]of integers by the membership Junction μA (x) = x
x+2 . Then
the α cut corresponding to $\alpha =0.5 will be
A. {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10} B. {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
C. {2, 3, 4, 5, 6, 7, 8, 9, 10} D. {}
ugcnetdec2012iii fuzzy-sets
32.13.2 Fuzzy Sets: UGCNET-Dec2014-III: 71 https://gateoverflow.in/61524
ugcnetdec2015iii fuzzy-sets
A. {(0.5, 12), (0.6, 13), (1, 14), (0.7, 15), (0.7, 16), (1, 17), (1, 18)}
B. {(0.5, 12), (0.6, 13), (1, 14), (1, 15), (1, 16), (1, 17), (1, 18)}
C. {(0.3, 12), (0.5, 13), (0.5, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
D. {(0.3, 12), (0.5, 13), (0.6, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
ugcnetjune2016iii fuzzy-sets
How does randomized Hill climbing choose the next move each time?
________ model is designed to bring prices down by increasing the number of customers who buy a particular product
at once.
A. Economic Order Quantity B. Inventory
C. Data Mining D. Demand-Sensitive Pricing
ugcnetdec2014ii optimization inventory
K-mean clustering algorithm has clustered the given 8 observations into 3 clusters after 1st iteration as follows:
C1 : {(3, 3), (5, 5), (7, 7)}
C2 : {(0, 6), (6, 0), (3, 0)}
C3 : {(8, 8), (4, 4)}
What will be the Manhattan distance for observation (4, 4) from cluster centroid C1 in the second iteration?
–
A. 2 B. √2 C. 0 D. 18
ugcnetjune2019ii k-mean-clustering data-mining
The region of feasible solution of a linear programminig problem has a ____ property in geometry, provided the
feasible solution of the problem exists
An optimal assignment requires that the minimum number of horizontal and vertical lines that can be drawn to cover all
zeros be equal to the number of
A. rows or columns B. rows + columns
C. rows + columns -1 D. rows + columns +1
ugcnetsep2013iii operational-research assignment-problem
A. Is like a depth-first search where most promising child is selected for expansion
B. Generates all successor nodes and computes an estimate of distance (cost) from start node to a goal node through each of
the successors. It then chooses the successor with shortest cost.
C. Saves all path lengths (costs) from start node to all generated nodes and chooses shortest path for further expansion.
D. None of the above
If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is
A. Optimum B. Infeasible
C. Unbounded D. Degenerate
ugcnetdec2014iii linear-programming simplex-method
The content of the accumulator after the execution of the following 8085 assembly language program, is:
MVI A,
42H
MVI B, 05h
UGC: ADD B
DCR B
JNZ UGC
ADI 25H
HLT
A. 82 H B. 78 H C. 76 H D. 47 H
ugcnetjune2016ii system-software&-compilers
Which diagram provides a formal graphic notation for modelling objects, classes and their relationships to one another?
A. Object diagram B. Class diagram
C. Instance diagram D. Analysis diagram
ugcnetjune2012iii unified-modeling-language
At any given time Parallel Virtual Machine (PVM) has _______ send buffer and ________ receive buffer.
In UNIX, ____ creates three subdirectories; 'PIS' and two subdirectories 'progs' and 'data' from just created subdirectory
'PIS'
A. mkdir PIS/progs PIS/data PIS B. mkdir PIS progs data
C. mkdir PIS PIS/progs PIS/data D. mkdir PIS/progs data
ugcnetjune2016ii unix
Which of the following option with reference to UNIX operating system is not correct?
A. INT signal is sent by the terminal driver when one types <Control-C> and it is a request to terminate the current operation
B. TERM is a request to terminate execution completely. The receiving process will clean up its state and exit
C. QUIT is similat to TERM, except that it defaults to producing a core dump if not caught.
D. KILL is a blockable signal
ugcnetjune2016iii unix
A. It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process
B. It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the
background
C. It counts the error during the execution of the process, a, and puts the result in process b
D. It copies the 'l' numbers of lines of program file, a, and stores in file b
ugcnetjune2016iii unix
32.28.5 Unix: UGCNET-june2008-ii-24 https://gateoverflow.in/155609
Files that are related to input/output and are used to model serial I/O devices such as terminals, printers and
networks are called :
(A) regular files (B) character special files
(C) directories (D) block special files
ugcnetjune2008ii unix
ugcnetjune2012iii windows
Answer Keys
32.0.1 Q-Q 32.0.2 Q-Q 32.0.3 Q-Q 32.0.4 Q-Q 32.0.5 Q-Q
32.0.6 Q-Q 32.0.7 Q-Q 32.1.1 C 32.2.1 B 32.3.1 A
32.4.1 Q-Q 32.5.1 C 32.6.1 Q-Q 32.7.1 Q-Q 32.7.2 B
32.8.1 B 32.8.2 B 32.8.3 B 32.8.4 A 32.9.1 C
32.10.1 D 32.11.1 Q-Q 32.12.1 C 32.13.1 C 32.13.2 C
32.13.3 D 32.13.4 A 32.13.5 D 32.14.1 C 32.15.1 D
32.16.1 A 32.17.1 B 32.18.1 Q-Q 32.19.1 C 32.20.1 C
32.20.2 A 32.21.1 B 32.22.1 C 32.23.1 C 32.23.2 C
32.24.1 B 32.24.2 D 32.25.1 C 32.26.1 B 32.27.1 A
32.28.1 Q-Q 32.28.2 C 32.28.3 D 32.28.4 B 32.28.5 Q-Q
32.29.1 D
33 Non GATE: Web Technologies (32)
Which e-business model allows consumers to name their own price for products and services ?
The document standards for EDI were first developed by large business house during the 1970s and are now under the
control of the following standard organization.
Which of the following tag in HTML is used to surround information, such as signature of the person who created the
page?
A. <body></body> B. <address></address>
C. <strong></strong> D. <em></em>
ugcnetaug2016iii web-technologies html
Which of the following HTML code will affect the vertical alignment of the table content?
HTML is defined using SGML – an _____ standard, information processing-text and office systems (SGML) for text
information processing.
A. aB.
only
a,C.b, aand
D.
andac band c
ugcnetdec2015iii web-technologies javascript
I f M is the number of alert dialog boxes generated by this JavaScript code and D1, D2, …, DM represents the content
displayed in the each of the M dialog boxes, then:
Identify the Risk factors which are associated with Electronic payment system
A. Fraudulent use of credit card B. Sending credit card details over internet
C. Remote storage of credit card details D. All of the above
ugcnetdec2012ii computer-networks transmission-media
A Trojan horse is
A. A program that performs a legitimate function that is known to an operating system or its user and also has a hidden
component that can be used for nefarious purposes like attacks on message security or impersonation.
B. A piece of code that can attach itself to other programs in the system and spread to other systems when programs are
copied or transferred.
C. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of
remote processes
D. All of the above
ugcnetdec2014iii trojan-horse
The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format
is
A. HTML page B. DOC type procedure
C. Style sheet D. Stored procedure
ugcnetdec2013iii web-technologies
33.10.2 Web Technologies: UGCNET-Dec2015-III: 75 https://gateoverflow.in/61452
__________ tag is an extension to HTML that can enclose any number of Javascript statements.
A. <SCRIPT> B. <BODY>
C. <HEAD> D. <TITLE>
ugcnetdec2015iii web-technologies
Linking to another place in the same or another webpage require two A (Anchor) tags, the first with the _______
attribute and the second with the _______ attribute.
A. NAME & LINK B. LINK & HREF
C. HREF & NAME D. TARGET & VALUE
ugcnetjune2014iii web-technologies
Which of the following statements are true with reference to the way of describing XML data?
A. aB.
only
bC.only
aD.
anda band c
ugcnetdec2015iii web-technologies xml
The definitions in an XML document are said to be ______ when the tagging system ans definitions in the DTD are all
in compliance
The _____ language was originally designed as the Transformation Language for Style Sheet Facility
Answer Keys
33.0.1 C 33.1.1 D 33.2.1 B 33.3.1 B 33.4.1 D
33.5.1 B 33.5.2 B 33.6.1 Q-Q 33.6.2 A 33.6.3 B
33.6.4 B 33.6.5 D 33.7.1 C 33.7.2 Q-Q 33.8.1 D
33.9.1 A 33.10.1 C 33.10.2 B 33.10.3 B 33.10.4 A
33.10.5 D 33.10.6 D 33.10.7 C 33.10.8 B 33.11.1 D
33.11.2 B 33.11.3 Q-Q 33.11.4 A 33.11.5 C 33.11.6 A
33.11.7 A 33.12.1 D
34 Operating System (227)
A. (a) only B. (a) and (b)only C. (b) and (c) only D. (a),(b) and (c)
ugcnetjan2017iii operating-system
Consider a system with twelve magnetic tape drives and three processes P1 , P2 and P3 . process P1 requires maximum
ten tape drives, process P2 may need as many as four tape drives and P3 may need upto nine tape drives. Suppose that
at time t1 , process P1 is holding five tape drives, process P2 is holding two tape drives and process P3 is holding three tape
drives, At time t1 , system is in:
A. safe state B. unsafe state
C. deadlocked state D. starvation state
ugcnetdec2015iii operating-system
Match the following for operating system techniques with the most appropriate advantage :
List-I List-II
(a) Spooling (i) Allows several jobs to improve CPU utilization
(b) Multiprogramming
(ii) Access to shared resources among geographically
dispersed computers in a transparant way
(c) Time sharing (iii) Overlapping I/O and computations
(d) Distributed computing (iv) Allows many users to share a computer
simultaneously by switching processor frequently
Codes :
A. (a)-(iii), (b)-(i), (c)-(ii), (d)-(iv) B. (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii)
C. (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i) D. (a)-(ii), (b)-(iii), (c)-(iv), (d)-(i)
ugcnetjune2015iii operating-system
In which of the following storage replacement strategies, is a program placed in the largest available hole in the
memory ?
User level threads are threads that are visible to the programmer and are unknown to the kernel. The operating system
kernel supports and manages kernel level threads. Three different types of models relate user and kernel level threads.
Which of the following statements is/are true ?
(a) (i) The Many - to - one model maps many user threads to one kernel thread
(ii) The one - to - one model maps one user thread to one kernel thread
(iii) The many - to - many model maps many user threads to smaller or equal kernel threads
(b) (i) Many - to - one model maps many kernel threads to one user thread
(ii) One - to - one model maps one kernel thread to one user thread
(iii) Many - to - many model maps many kernel threads to smaller or equal user threads
Code :
(a) is true; (b) is (a) is false; (b) is
(1) (2)
false true
Both (a) and (b) are Both (a) and (b) are
(3) (4)
true false
A program has five virtual pages, numbered from 0 to 4. If the pages are referenced in the order 012301401234, with
three page frames, the total number of page faults with FIFO will be equal to :
A. 0 B. 4 C. 6 D. 9
ugcnetdec2007ii
Optical storage is a
ugcnetdec2010ii operating-system
34.0.12 UGCNET-Dec2015-II: 29 https://gateoverflow.in/62273
A system has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as follows:
Allocated Maximum Available
Process A 1 0 2 1 1 1 1 2 1 3 00x11
Process B 2 0 1 1 0 2 2 2 1 0
Process C 1 1 0 1 0 2 1 3 1 0
Process D 1 1 1 1 0 1 1 2 2 1
The smallest value of x for which the above system in safe state is
A. 1 B. 3 C. 2 D. 0
ugcnetdec2015ii operating-system
Consider a system with five processes P0 through P4 and three resource types A, B and C. Resource type A has seven
instances, resource type B has two instances and resource type C has six instances suppose at time T0 we have the
following allocation.
Remote Computing Service involves the use of time sharing and _______.
Multi-processing
Interactive processing
Batch processing
Real-time processing
ugcnetjune2010ii operating-system
Which of the following is the correct value returned to the operating system upon the successful completion of a
program ?
A. 0 B. 1
C. -1 D. Program do not return a value.
ugcnetjune2014ii operating-system
An operating system is :
A. Collection of hardware components B. Collection of input-output devices
C. Collection of software routines D. All the above
ugcnetdec2006ii
The aging algorithm with a = 0.5 is used to predict run times. The previous four runs from oldest to most recent are
40, 20, 20, and 15 msec. The prediction for the next time will be :
The performance of a file system depends upon the cache hit rate. If it takes 1 msec to satisfy a request from the cache
but 10 msec to satisfy a request if a disk read is needed, then the mean time (ms) required for a hit rate ′ h′ is given by :
A. 1 B. h + 10(1 − h) C. (1 − h) + 10h D. 10
ugcnetdec2007ii
34.0.23 UGCNET-Jan2017-II: 40 https://gateoverflow.in/335123
ugcnetjan2017ii operating-system
____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking
methods on their handles.
A. Windows NT B. Windows XP
C. Windows VISTA D. Windows 95/98
ugcnetjune2012iii operating-system
In a multi-user operating system, 30 requests are made to use a particular resource per hour, on an average. The
probability that no requests are made in 40 minutes, when arrival pattern is a poisson distribution, is ______
Which of the following operating system is better for implementing client-server network?
A. 2 B. 3 C. 4 D. 5
ugcnetdec2007ii
Assume N segments in memory and a page size of P bytes. The wastage on account of internal fragmentation is :
1. NP /2 bytes
2. P /2 bytes
3. N /2 bytes
4. NP bytes
ugcnetjune2009ii
Average process size = s bytes. Each page entry requires e bytes. The optimum page size is given by :
−−− −−−−
A. √(se) B. √(2se) C. s D. e
ugcnetdec2007ii
An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same type) and has
three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8 respectively. There are two states of
allocation of devices as follows:
State 1 Processes P1 P2 P3
Devices allocated 2 3 4
State 2 Processes P1 P2 P3
Devices allocated 0 2 4
Which of the following is correct?
A. State 1 is unsafe and State 2 is safe B. State 1 is safe and State 2 is unsafe
C. Both State 1 and State 2 are safe D. Both State 1 and State 2 are unsafe
ugcnetjune2013iii operating-system bankers-algorithm deadlock-prevention-avoidance-detection
In order to allow only one process to enter its critical section, binary semaphore are initialized to
A. 0 B. 1 C. 2 D. 3
ugcnetjune2010ii operating-system binary-semaphore
Let the time taken to switch from user mode to kernel mode of execution be T1 while time taken to switch between
two user processes be T2. Which of the following is correct?
A. T 1 > T 2 B. T 1 = T 2
C. T 1 < T 2 D. Nothing can be said about the relation between T 1 and T 2
gatecse-2011 operating-system context-switch easy ugcnetjune2013iii
At a particular time of computation, the value of a counting semaphore is 7. Then 20 P (wait) operations and 15 V
(signal) operations are completed on this semaphore. What is the resulting value of the semaphore?
A. 28 B. 12 C. 2 D. 42
ugcnetjune2019ii counting-semaphores
Which of the following conditions does not hold good for a solution to a critical section problem ?
Consider a system with seven processes A through G and six resources R through W .
Resource ownership is as follows :
process A holds R and wants T
process B holds nothing but wants T
process C holds nothing but wants S
process D holds U and wants S & T
process E holds T and wants V
process F holds W and wants S
process G holds V and wants U
Is the system deadlocked ? If yes, _______ processes are deadlocked.
Consider a system having ‘m’ resources of the same type. These resources are shared by three processes P1 , P2 and P3
which have peak demands of 2, 5 and 7 resources respectively. For what value of ′ m′ deadlock will not occur ?
A. 70 B. 14 C. 13 D. 7
ugcnetaug2016ii operating-system deadlock-prevention-avoidance-detection
Consider a system which have ‘n′ number of processes and ‘m′ number of resource types. The time complexity of the
safety algorithm, which checks whether a system is in safe state or not, is of the order of :
An operating system has 13 tape drives. There are three processes P 1, P 2 & P 3. Maximum requirement of P 1 is 11
tape drives, P 2 is 5 tape drives and P 3 is 8 tape drives. Currently, P 1 is allocated 6 tape drives, P 2 is allocated 3
tape drives and P 3 is allocated 2 tape drives. Which of the following sequences represent a safe state?
1. P 2P 1P 3
2. P 2P 3P 1
3. P 1P 2P 3
4. P 1P 3P 2
A computer has six tape drives with n processes competing for them. Each process may need two drives. What is the
maximum value of n for the system to be deadlock free?
A. 5 B. 4 C. 3 D. 6
ugcnetjune2019ii deadlock-prevention-avoidance-detection
A Multicomputer with 256 CPUs is organized as 16 ×16 grid . What is the worst case delay(in hops) that a message
might have to take
A. 16 B. 15 C. 32 D. 30
ugcnetjune2016iii operating-system delay
In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if
an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced page is
modified. What is the average access time to service a page fault assuming that the page to be replaced is modified 70% of the
time ?
A. 11.6 m.sec. B. 16.4 m.sec.
C. 28 m.sec. D. 14 m.sec.
ugcnetdec2014ii operating-system demand-paging
A system contains 10 units of resource of same type. The resource requirement and current allocation of these
resources for three processes P, Q and R are as follows :
P Q R
Maximum requirement 8 7 5
Current allocation 4 1 3
Now, consider the following resource requests:
The directory can be viewed as _______ that translates filenames into their directory entries.
List-I List-II
(a) Disk (i) Thread
(b) CPU (ii) Signal
(c) Memory (iii) File system
(d) Interrupt (iv) Virtual address space
If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O
blocks requests are 98. 37, 14, 124, 65, 67.
Consider a disk queue with request for input/output to block cylinders 98, 183, 37, 122, 14, 124, 65, 67 in that order.
Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of
head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are respectively
A. 236 and 252 cylinders B. 640 and 236 cylinders
C. 235 and 640 cylinders D. 235 and 252 cylinders
ugcnetdec2013ii operating-system disk-scheduling
Consider an imaginary disk with 40 cylinders. A request come to read a block on cylinder 11. While the seek to
cylinder 11 is in progress, new requests come in for cylinders 1, 36, 16, 34, 9 and 12 in that order. The number of arm
motions using shortest seek first algorithm is
A. 111 B. 112 C. 60 D. 61
ugcnetdec2014iii operating-system disk-scheduling
Consider a disk queue with I/O requests on the following cylinders in their arriving order:
6, 10, 12, 54, 97, 73, 128, 15, 44, 110, 34, 45 . The disk head is assumed to be at cylinder 23 and moving in the
direction of decreasing number of cylinders. Total number of cylinders in the disk is 150. The disk head movement using
SCAN –scheduling algorithm is:
A. 172 B. 173
C. 227 D. 228
ugcnetjan2017iii operating-system disk-scheduling
On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in
the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in
FIFO order contains requests for the following tracks:
123, 874, 692, 475, 105, 376
(Assume scan algorithm)
A disk drive has 100 cylinders, numbered 0 to 99. Disk requests come to the disk driver for cylinders
12, 26, 24, 4, 42, 8 and 50 in that order. The driver is currently serving a request at a cylinder 24. A seek takes 6 msec
per cylinder moved. How much seek time is needed for shortest seek time first (SSTF) algorithm?
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if
the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67
Consider a disk system having 60 cylinders. Disk requests are received by a disk drive for cylinders
10, 22, 20, 2, 40, 6 and 38, in that order. Assuming the disk head is currently at cylinder 20, what is the time taken to
satisfy all the requests if it takes 2 milliseconds to move from one cylinder to adjacent one and Shortest Seek Time First
(SSTF) algorithm is used?
A. 240 milliseconds B. 96 milliseconds
C. 120 milliseconds D. 112 milliseconds
ugcnet-oct2020-ii operating-system disk-scheduling
Consider the input/output (I/O) request made at different instants of time directed at a hypothetical disk having 200
tracks as given in the following table :
Serial No. 1 2 3 4 5
TranckNo. 12 85 40 100 75
Time of Arrival 65 80 110 100 175
Assume that :
Current head position is at track no. 65
Direction of last movement is towards higher number of tracks.
Current clock time is 160 milliseconds
Head movement time per track is 1 millisecond
‘‘look” is a variant of ‘‘SCAN” disk-arm scheduling algorithm. In this algorithm, if no more I/O requests are left in current
direction, the disk head reveres its direction. The seek time in Shortest Seek First (SSF) and ‘‘look” disk-arm scheduling
algorithms respectively are :
A. 144 and 123 milliseconds B. 143 and 123 milliseconds
C. 149 and 124 milliseconds D. 256 and 186 milliseconds
ugcnetsep2013ii operating-system disk-scheduling
34.15 Disks (7)
How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size?
A. 332.8 KB
B. 83.6 KB
C. 266.2 KB
D. 256.6 KB
Suppose you have a Linux file system where the block size is 2K bytes, a disk address is 32 bits, and an i−node
contains the disk addresses of the first 12 direct blocks of file, a single indirect block and a double indirect block.
Approximately, what is the largest file that can be represented by an i−node?
Comprehension:
For the question given below: concern a disk with a sector size of 512 bytes, 2000 tracks per surface, 50 sectors per
track, five double-sided platters, and average seek time of 10 milliseconds.
If T is the capacity of a track in bytes, and S is the capacity of each surface in bytes, then (T, S) = _______
Comprehension:
For the question given below: concern a disk with a sector size of 512 bytes, 2000 tracks per surface, 50 sectors per
track, five double-sided platters, and average seek time of 10 milliseconds.
What is the capacity of the disk, in bytes?
Comprehension:
For the question given below: concern a disk with a sector size of 512 bytes, 2000 tracks per surface, 50 sectors per
track, five double-sided platters, and average seek time of 10 milliseconds.
Given below are two statements:
Statement I : The disk has a total number of 2000 cylinders.
Statement II : 51200 bytes is not a valid block size for the disk.
In the light of the above statements, choose the correct answer from the options given below:
Comprehension:
For the question given below, concern a disk with a sector size of 512 bytes, 2000 tracks per surface, 50 sectors per
track, five double-sided platters, and average seek time of 10 milliseconds.
If the disk platters rotate at 5400 rpm (revolutions per minute), then approximately what is the maximum rotational delay?
A. 0.011 seconds B. 0.11 seconds
C. 0.0011 seconds D. 1.1 seconds
ugcnet-oct2020-ii operating-system disks
For the question given below, concern a disk with a sector size of 512 bytes, 2000 tracks per surface, 50 sectors per
track, five double-sided platters, and average seek time of 10 milliseconds.
If one track of data can be transferred per revolution, then what is the data transfer rate?
A. 2, 850 KBytes/second B. 4, 500 KBytes/second
C. 5, 700 KBytes/second D. 2, 250 KBytes/second
ugcnet-oct2020-ii operating-system disks
The efficiency (E) and speed up (sp) for Multiprocessor with p processors satisfies:
A. E ≤ p and sp ≤ p B. E ≤ 1 and sp ≤ p
C. E ≤ p and sp ≤ 1 D. E ≤ 1 and sp ≤ 1
ugcnetdec2012iii operating-system distributed-computing
Consider a file currently consisting of 50 blocks. Assume that the file control block and the index block is already in
memory. If a block is added at the end (and the block information to be added is stored in memory), then how many
disk I /O operations are required for indexed (single-level) allocation strategy ?
A. 1 B. 101 C. 27 D. 0
ugcnetaug2016iii operating-system file-system
34.19.2 File System: UGCNET-Dec2013-III: 72 https://gateoverflow.in/60811
How many disk blocks are required to keep list of free disk blocks in a 16 GB hard disk with 1 kB block size using
linked list of free disk blocks ? Assume that the disk block number is stored in 32 bits.
A. 1024 blocks B. 16794 blocks
C. 20000 blocks D. 1048576 blocks
ugcnetdec2014iii operating-system file-system
In the indexed scheme of blocks to a file, the maximum possible size of the file depends on:
A. The number of blocks used for index and the size of index B. Size of Blocks and size of Address
C. Size of index D. Size of block
ugcnetjune2015iii operating-system file-system
In _____ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is easy
The hit ratio of a Transaction Look Aside Buffer (TLAB) is 80%. It takes 20 nanoseconds (ns) to search TLAB and 100
ns to access main memory. The effective memory access time is _____
A. 36 ns B. 140 ns C. 122 ns D. 40 ns
ugcnetsep2013ii operating-system cache-memory hit-ratio
List – I List – II
a. Device controller i. Extracts information from the controller register and store it in data buffer
b. Device driver ii. I/O scheduling
c. Interrupt handler iii. Performs data transfer
d. Kernel I/O subsystem iv. Processing of I/O request
a b c d
A. iii iv i ii
B. ii i iv iii
C. iv i ii iii
D. i iii iv ii
ugcnetjan2017ii operating-system input-output
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate
A. Internal interrupts B. External interrupts
C. Software interrupts D. None of the above
ugcnetdec2014iii operating-system interrupts
Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having explicit
I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with memory
mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with memory mapped I/O?
Which UNIX/Linux command is used to mae all files and sub-directions in the directory "progs" executable by all
users?
A. chmod - R a + x progs B. chmod - R 222 progs
C. chmod - X a + x progs D. chmod - X 222 progs
ugcnetjuly2018ii unix linux operating-system non-gate
Suppose that the virtual Address space has eight pages and physical memory with four page frames. If LRU page
replacement algorithm is used, ______ number of page faults occur with the reference string.
021354637473355311172341
A. 11 B. 12 C. 10 D. 9
ugcnetaug2016ii operating-system lru page-replacement
Consider that a process has been allocated 3 frames and has a sequence of page referencing as 1, 2, 1, 3, 7, 4, 5, 6, 3, 1 .
What shall be the difference in page faults for the above string using the algorithms of LRU and optimal page
replacement for referencing the string?
A. 2 B. 0 C. 1 D. 3
ugcnetjune2019ii page-replacement lru
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are
there in the physical address ?
1. 9 bits
2. 11 bits
3. 13 bits
4. 15 bits
Given a memory partitions of 100 K, 500 K, 200 K, 300 K and 600 K (in order) and processes of 212 K, 417 K, 112 K
and 426 K (in order), using the first fit algorithm, in which partition would the process requiring 426 K be placed?
Which of the following memory allocation scheme suffers from external fragmentation?
A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames
Number of bits required in logical and physical address are respectively:
A. UNIX
B. DOS
C. Windows NT
D. None of the above
(D) buddy
ugcnetdec2009ii operating-system memory-management
A. It is higher level synchronization primitive and is a collection of procedures, variables, and data structures grouped together
in a special package.
B. It is a non-negative integer which apart from initialization can be acted upon by wait and signal operations.
C. It uses two primitives, send and receive which are system calls rather than language constructs.
D. It consists of the IP C primitives implemented as system calls to block the process when they are not allowed to enter
critical region to save CP U time.
A. aB.
only
aC.andaD.
band
only
a,cb,only
and c only
ugcnetdec2012iii operating-system multiprogramming-os
Consider the methods used by processes P1 and P2 for accessing their critical sections. The initial values of shared
Boolean variables S1 and S2 are randomly assigned,
P1 P2
while ( S1 ==S2 ); while ( S1 ==S2);
critical section critical section
S1 =S2 ; S1 =S2 ;
Which one of the following statements describes the properties achieved?
A. Mutual exclusion but not progress B. Progress but not mutual exclusion
C. Neither mutual exclusion nor progress D. Both mutual exclusion and progress
ugcnetjune2012iii operating-system mutual-exclusion critical-section
A user level process in Unix traps the signal sent on a Ctrl-C input, and has a signal handling routine that saves
appropriate files before terminating the process. When a Ctrl-C input is given to this process, what is the mode in which
the signal handling routine executes?
Suppose that the number of instructions executed between page fault is directly proportional to the number of page
frames allocated to a program. If the available memory is doubled, the mean interval between the page faults is also
doubled. Further, consider that a normal instruction takes one microsecond, but if a page fault occurs, it takes 2001
microseconds. If a program takes 60 sec to run, during which time it gets 15,000 page faults, how long would it take to run
twice as much memory were available?
Consider a virtual page reference string 1, 2, 3, 2, 4, 2, 5, 2, 3, 4. Suppose LRU page replacement algorithm is
implemented with 3 page frames in main memory. Then the number of page faults are _____
A. 5 B. 7 C. 9 D. 10
ugcnetjuly2018ii operating-system page-fault paging
A. 10, 9 B. 9, 9 C. 10, 10 D. 9, 10
ugcnetjune2016ii operating-system page-replacement page-fault
A page fault
A. 8 B. 9 C. 10 D. 12
operating-system page-replacement ugcnetjune2012ii
Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the
pages. The page reference string is :
123256346373153634243451
The number of page faults in LRU and optimal page replacement algorithms are respectively (without including initial page
faults to fill available page frames with pages) :
A LRU page replacement is used with 4 page frames and eight pages. How many page faults will occur with the
reference string 0172327103 if the four frames are initially empty?
A. 6 B. 7 C. 5 D. 8
ugcnetjune2015ii operating-system page-replacement
Consider a hypothetical machine with 3 pages of physical memory, 5 pages of virtual memory, and
< A, B, C, D, A, B, E, A, B, C, D, E, B, A, B > as the stream of page reference by an application. If P and Q are
the number of page faults that the application would incur with FIFO and LRU page replacement algorithms respectively, then
(P , Q) = _______(Assuming enough space for storing 3 page frames)
Consider a main memory with three page frames for the following page reference string:
5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
Assuming that the execution of process is initialized after loading page 5 in memory,, the number of page faults in FIFO and
second chance replacement respectively are
An operating system supports a paged virtual memory, using a central processor with a cycle time of one microsecond.
It costs an additional one microsecond to access a page other than the current one. Pages have 1000 words, and the
paging device is a drum that rotates at 3000 revolutions per minute and transfers one million words per second. Further, one
percent of all instructions executed accessed a page other than the current page. The instruction that accessed another page,
80% accessed a page already in memory and when a new page was required, the replaced page was modified 50% of the time.
What is the effective access time on this system, assuming that the system is running only one process and the processor is idle
during drum transfers ?
A. 30 microseconds B. 34 microseconds
C. 60 microseconds D. 68 microseconds
ugcnetaug2016iii operating-system paging
34.36.2 Paging: UGCNET-Dec2010-II: 39 https://gateoverflow.in/67022
For the implementation of a paging scheme, suppose the average process size be x bytes, the page size be y bytes, and
each page entry requires z bytes. The optimum page size that minimizes the total overhead due to the page table and
the internal fragmentation loss is given by
−−− √xz
A. x
2 B. xz
2 C. √2xz D. 2
ugcnetdec2014ii operating-system paging
In a paging system, it takes 30 ns to search translation Look-a-side Buffer (TLB) and 90 ns to access the main memory.
If the TLB hit ratio is 70%, the effective memory access time is :
In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal to 120
ns. The time required to access a page in primary memory is 15 ns. The average time required to access a page is ____
A. 105 B. 68 C. 75 D. 78
ugcnetjuly2018ii operating-system paging
Page information memory is also called as Page Table. The essential contents in each entry of a page table is/are ____
A. Page Access information B. Virtual Page number
C. Page Frame number D. Both virtual page number and Page frame number
ugcnetjuly2018ii operating-system paging
The minimum number of page frames that must be allocated to a running process in a virtual memory environment is
determined by
A. page size B. physical size of memory
C. the instruction set architecture D. number of processes in memory
ugcnetjune2019ii virtual-memory paging
A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in
following order:
ABACABDBACD
Assuming that the page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is
swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
The speed up of a pipeline processing over an equivalent non-pipeline processing is defined by the ration:
where n → no. of tasks
tn → time of completion of each tasks
k → no. of segments of pipeline
tp → clock cycle time
S → speed up ratio
ntn ntn
A. S = (k+n−1)tp
B. S = (k+n+1)tp
ntn (k+n−1)tp
C. S = (k−n+1)tp D. S = ntn
ugcnetsep2013ii operating-system pipelining
A specific editor has 200K of program text, 15K of initial stack, 50K of initialized data, and 70K of bootstrap code.
If five editors are started simultaneously, how much physical memory is needed if shared text is used?
N processes are waiting for I /O . A process spends a fraction p of its time in I /O wait state. The CP U utilization is
given by :
1. 1-p-N
2. 1-pN
3. pN
4. p-N
If holes are half as large as processes, the fraction of memory wasted in holes is :
A. 2/3
B. 1/2
C. 1/3
D. 1/5
34.40.1 Process Scheduling: GATE CSE 1998 | Question: 2.17, UGCNET-Dec2012-III: 43 https://gateoverflow.in/1690
Consider n processes sharing the CPU in a round-robin fashion. Assuming that each process switch takes s seconds,
what must be the quantum size q such that the overhead resulting from process switching is minimized but at the same
time each process is guaranteed to get its turn at the CPU at least every t seconds?
t−ns t−ns
q≤ q≥
t−ns t−ns
A. q ≤ n−1 B. q ≥ n−1
t−ns t−ns
C. q ≤ n+1 D. q ≥ n+1
gate1998 operating-system process-scheduling normal ugcnetdec2012iii
Five jobs A, B, C, D and E are waiting in Ready Queue. Their expected runtimes are 9, 6, 3, 5 and x respectively. All
jobs entered in Ready queue at time zero. They must run in _____ order to minimize average response time if
3 < x < 5.
A. B, A, D, E, C B. C, E, D, B, A
C. E, D, C, B, A D. C, B, A, E, D
ugcnetaug2016ii operating-system process-scheduling
Consider three CPU intensive processes P 1, P 2, P 3 which require 20, 10 and 30 units of time, arrive at times 1, 3 and
7 respectively. Suppose operating system is implementing Shortest Remaining Time first (preemptive scheduling)
algorithm, then _____ context switches are required (suppose context switch at the beginning of Ready queue and at the end of
Ready queue are not counted).
A. 3 B. 2 C. 4 D. 5
ugcnetaug2016ii operating-system process-scheduling
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using:
Consider a preemptive priority based scheduling algorithm based on dynamically changing priority. Larger priority
number implies higher priority. When the process is waiting for CPU in the ready queue (but not yet started execution),
its priority changes at a rate a=2. When it starts running, its priority changes at a rate b=1. All the processes are assigned
priority value 0 when they enter ready queue. Assume that the following processes want to execute:
Process Arrival Service
ID Time Time
P1 0 4
P2 1 1
P3 2 2
P4 3 1
The time quantum q=1. When two processes want to join ready queue simultaneously, the process which has not executed
recently is given priority. The finish time of processes P1, P2, P3 and P4 will respectively be
Consider the following justifications for commonly using the two-level CP U scheduling:
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the FIFO .
III. Because it facilitates putting some set of processes into memory and a choice is made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
In which of the following scheduling criteria, context switching will never take place?
A. ROUND ROBIN B. Preemptive SJF
C. Non-preemptive SJF D. Preemptive priority
ugcnetjuly2018ii process-scheduling operating-system
Consider three CPU intensive processes, which require 10, 20 and 30 units of time and arrive at times 0, 2 and 6
respectively. How many context switches are needed if the operating system implements a shortest remaining time first
scheduling algorithm? Do not count the context switches at time zero and at the end.
A. 4 B. 2 C. 3 D. 1
ugcnetjune2019ii process-scheduling
In round robin CPU scheduling as time quantum is increased the average turn around time
A. increases
B. decreases
C. remains constant
D. varies irregularly
Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored):
Process A B C D
Arrival
0 1 2 3
time
CPU
8 4 9 5
Cycle
The average turnaround time of these processes will be
Consider a uniprocessor system where new processes arrive at an average of five processes per minute and each process
needs an average of 6 seconds of service time. What will be the CPU utilization ?
A. 80 % B. 50 % C. 60 % D. 30 %
ugcnetjune2014iii operating-system process-scheduling
Which of the following statements is not true about disk-arm scheduling algorithms ?
Which of the following statements is not true for Multi Level Feedback Queue processor scheduling algorithm?
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority
zero (lowest priority). The scheduler reevaluates the process priority for every 'T' time units and declares next process
to be scheduled. If teh process have no I/O operations and all arrive at time zero, then the schduler implements ___ criteria
A. Priority scheduling B. Rond Robin Scheduling
C. Shortest Job First D. FCFS
ugcnetjune2016ii operating-system process-scheduling
Consider the following set of processes with the length of CPU burst time in milliseconds (ms) :
Process A B C D E
Burst time 6 1 2 1 5
Priority 3 1 3 4 2
Assume that processes are stored in ready queue in following order :
A–B–C–D–E
Using round robin scheduling with time slice of 1 ms, the average turn around time is
In the process management Round-robin method is essentially the pre-emptive version of _________
(A) FILO
(B) FIFO
(C) SSF
Semaphores
At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and "x" V
operations were performed on this semaphore. If the final value of semaphore is 7, x will be
A. 8 B. 9 C. 10 D. 11
ugcnetjuly2018ii operating-system process-synchronization
A. multiprocessing
B. multiprogramming
C. multitasking
D. all of the above
34.43.1 Resource Allocation: GATE CSE 1993 | Question: 7.9, UGCNET-Dec2012-III: 41 https://gateoverflow.in/2297
Consider a system having m resources of the same type. These resources are shared by 3 processes A, B, and C which
have peak demands of 3, 4, and 6 respectively. For what value of m deadlock will not occur?
A. 7 B. 9 C. 10 D. 13 E. 15
gate1993 operating-system resource-allocation normal ugcnetdec2012iii multiple-selects
Consider a system with five processes P0 through P4 and three resource types R1 , R2 and R3 . Resource type R1 has
10 instances, R2 has 5 instances and R3 has 7 instances. Suppose that at time T0 , the following snapshot of the system
has been taken :
Allocation
R1 R2 R3
P0 0 1 0
P1 2 0 0
P2 3 0 2
P3 2 1 1
P4 0 2 2
Max
R1 R2 R3
7 5 3
3 2 2
9 0 2
2 2 2
4 3 3
Available
R1 R2 R3
3 3 2
Assume that now the process P1 requests one additional instance of type R1 and two instances of resource type R3 . The state
resulting after this allocation will be
A. Ready state B. Safe state
C. Blocked state D. Unsafe state
ugcnetjune2014ii operating-system resource-allocation
(A) re-allocation
(B) allocation
(C) linking
(D) loading
ugcnetdec2009ii operating-system runtime-environments
Consider the following three processes with the arrival time and CPU burst time given in miliseconds:
Arrival Burst
Process
Time Time
P1 0 7
P2 1 4
P3 2 8
The Gantt Chart for preemptive SJF scheduling algorithm is _______
A. B. C. D.
ugcnetjuly2018ii operating-system scheduling process-scheduling
For a magnetic disk with concentric circular tracks, the seek latency is not linearly proportional to the seek distance due
to
ugcnetjune2019ii seek-latency
There are three processes P1, P2 and P3 sharing a semaphore for synchronising a variable. Initial value of semaphore is
one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access the
semaphore in following order:
a. P2 needs to access b. P1 needs to access c. P3 needs to access d. P2 exits critical section e. Pi exits critical section
The final value of semaphore will be:
A. 0 B. 1 C. −1 D. −2
ugcnetdec2016ii operating-system process-synchronization semaphores
There are three processes P1 , P2 and P3 sharing a semaphore for synchronizing a variable. Initial value of semaphore
is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access
the semaphore in following order :
a. P2 needs to access
b. P1 needs to access
c. P 3 needs to access
A. 0 B. 1 C. −1 D. −2
ugcnetjan2017ii operating-system semaphores
Suppose S and Q are two semaphores initialized to 1. P1 and P2 are two processes which are sharing resources.
P1 has statements P2 has statements
wait(S); wait(Q);
wait(Q); wait(S);
critical-section 1; critical-section 2;
signal(S); signal(Q);
Signal(Q); signal(S);
Their execution may sometimes lead to an undesirable situation called
A semaphore count of negative n means (s = – n) that the queue contains ________ waiting processes.
(A) n + 1
(B) n
(C) n – 1
(D) 0
ugcnetdec2009ii operating-system semaphores
Which of the following UNIX/Linux pipes will count the number of lines in all the files having .c and .h as their
extension in the current working directory?
A. cat ∗⋅ ch ∣ wc −1 B. cat ∗⋅[ c-h ] ∣ wc −1
C. cat ∗⋅[ ch ] ∣ ls −1 D. cat ∗⋅[ ch ] ∣ wc −1
ugcnetjune2019ii shell-script
A. It will print all of the lines in the file x that match the search string "abc"
B. It will print all of the lines in file x that do not match the search string "abc"
C. It will print the total number of lines in the file x that match the search string "abc"
D. It will print the specific line numbers of the file x in which there is a match for string "abc"
ugcnetjune2015iii shell-script
Which of the following statements is not correct with reference to cron daemon in UNIX OS?
A. The cron daemon is the standard tool for running commands on a predetermined-schedule
B. It starts when the system boots and runs as long as the system is up
C. Cron reads configuration files that contain list of command lines and the times at which they invoked
D. Crontab for individual users are not stored
In Unix, files can be protected by assigning each one a 9-bit mode called rights bits, now, consider the following two
statements:
I. A mode of 641 (octal) means that the owner can read and write the file, other members of the owner's group can read it, and
users can execute only
II. A mode of 100 (octal) allows the owner to execute the file , but prohibits all other access
Which of the following shell scripts will produce the output “my first script”?
Which of the following statements is not true for UNIX Operating System?
A. Major strength of UNIX Operating System is its open standards which enables large number of organizations ranging from
academicia to industries to participate in its development
B. UNIX kernel uses modules with well specified interfaces and provides advantages like simplified tesing and maintenance
of kernel.
C. UNIX is kernel based operating system with two main components viz. process management subsystem and file
management subsystem.
D. All devices are represented as files which simplify the management of I/O devices and files. The directories structure used
is directed acyclic graph.
Four jobs J1, J2, J3 and J4 are waiting to be run. Their expected run times are 9, 6, 3 and 5 respectively. In order to
minimize average response time, the jobs should be run in the order:
(A) J1 J2 J3 J4 (B) J4 J3 J2 J1
(C) J3 J4 J1 J2 (D) J3 J4 J2 J1
ugcnetdec2008ii operating-system sjf scheduling
Consider a disk system with 100 cylinders. The requests to access the cylinders occur in the following sequences:
Various storage devices used by an operating system can be arranged as follows in increasing order of accessing speed
:
A. Magnetic tapes → magnetic disks → optical disks → electronic disks → main memory → cache → registers
B. Magnetic tapes → magnetic disks → electronic disks → optical disks → main memory → cache → registers
C. Magnetic tapes → electronic disks → magnetic disks → optical disks → main memory → cache → registers
D. Magnetic tapes → optical disks → magnetic disks → electronic disks → main memory → cache → registers
Match the following WINDOWS system calls and UNIX system calls with reference to process control and File
manipulation.
Windows UNIX
(a) Create – process ( ) (i) Open ( )
(b) WaitForSingleObject ( ) (ii) Close ( )
(c) CreateFile ( ) (iii) Fork ( )
(d) CloseHandle ( ) (iv) Wait ( )
Assuming that the system call fork() never fails, consider the following C program P 1 and P 2 executed on a
UNIX/Linux system:
/ ∗ P1 ∗ / / ∗ P2 ∗ /
int main(){ int main(){
fork(); fork();
fork(); printf(“Happy \n”);
fork(); fork();
printf(“Happy \n”); printf(“Happy \n”);
} fork();
printf(“Happy \n”);
}
Statement I : P 1 displays “Happy” 8 times
Statement II : P 2 displays “Happy” 12 times
In the light of the above statements, choose the correct answer from the options given below
An Operating System (OS) crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF)
= 30 days. When this happens, it takes 10 minutes to recover the OS, that is, the Mean Time To Repair (MTTR) = 10
minutes. The availability of the OS with these reliability figures is approximately :
A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data
structure for a thread than for a process. In relation to this, which of the following statement is correct?
One of the disadvantages of user level threads compared to Kernel level thread is
A. If a user level thread of a process executes a system call, all threads in that process are blocked.
B. Scheduling is application dependent.
C. Thread switching doesn’t require kernel mode privileges.
D. The library procedures invoked for thread management in user level threads are local procedures.
Which of the following are NOT shared by the threads of the same process?
The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page
table entries and a 4-way set associative (i.e. with 4-cache lines in the set). The page size is 4 KB. The minimum size
of TLB tag is
Consider a single-level page table system, with the page table stored in the memory. If the hit rate to TLB is 80%, and
it takes 15 nanoseconds to search the TLB, and 150 nanoseconds to access the main memory, then what is the
effective memory access time, in nanoseconds?
Let P − i and Pj two processes, R be the set of variables read from memory, and W be the set of variables written to
memory. For the concurrent execution of two processes pi and Pj which of the conditions are not true?
The Unix Operating System Kernel maintains two key data structures related to processes, the process table and the
user structure. Now, consider the following two statements :
I. The process table is resident all the time and contain information needed for all processes, even those that are not currently in
memory.
II. The user structure is swapped or paged out when its associated process is not in memory, in order not to waste memory on
information that is not needed.
Which of the following options is correct with reference to above statements ?
In UNIX, which of the following command is used to set the task priority?
Everything below the system call interface and above the physical hardware is known as
In Unix, how do you check that two given strings a and b are equal?
A. test $a -eq $b B. test $a -equal $b
C. test $a = $b D. Sh-C test $a == $b
ugcnetdec2013iii operating-system unix non-gate
Which statement is not true about process O in the Unix operating system ?
In Unix, the login prompt can be changed by changing the contents of the file_____
In Unix, the command to enable execution permission for file "mylife" by all is_____
A. Chmod ugo + X mylife B. Chmod a + X mylife
C. Chmod + X mylife D. All of the above
ugcnetdec2015iii unix operating-system non-gate
What will be the output of the following Unix command? $rm chap0\[1-3\]
A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains
ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block
entry?
A. 30 GB B. 64 GB C. 16 GB D. 1 GB
ugcnetjune2013iii ugcnetdec2015ii operating-system unix non-gate
__________ maintains the list of free disk blocks in the Unix file system.
A. I-node B. Boot block
C. Super block D. File allocation table
ugcnetjune2014iii operating-system unix
The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which
of following information is not the part of user structure?
A. File descriptor table B. System call state
C. Scheduling parameters D. Kernel stack
ugcnetjune2015ii unix
In UNIX , processes that have finished execution but have not yet had their status collected are known as _________
A. Sleeping processes B. Stopped Processes
C. Zombie Process D. Orphan Processes
ugcnetjune2016iii operating-system unix
In UNIX OS , when a process creates a new process using the fork() system call , which of the following state is shared
between the parent process and child process
A. Heap B. Stack
C. Shared memory segments D. Both heap and Stack
ugcnetjune2016iii operating-system unix
Which of the following information about the UNIX file system is not correct?
A. Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks
B. An i-node contains accounting information as well as enough information to locate all the disk blocks that holds the file's
data
C. Each i-node is 256-bytes long
D. All the files and directories are stored in data blocks
Assume that an implementation of Unix operating system uses i-nodes to keep track of data blocks allocated to a file. It
supports 12 direct block addresses, one in direct block address and one double indirect block address. The file system
has 256 bytes block size and 2 bytes for disk block address. The maximum possible size of a file in this system is
A. 16 MB B. 16 KB C. 70 KB D. 71 KB
ugcnetsep2013ii operating-system unix
The Unix command used to find out the number of characters in a file is
(A) nc
(B) wc
(C) chcnt
(D) lc
ugcnetdec2009ii unix operating-system
34.58.1 Virtual Memory: GATE CSE 1998 | Question: 2.18, UGCNET-June2012-III: 48 https://gateoverflow.in/1691
If an instruction takes i microseconds and a page fault takes an additional j microseconds, the effective instruction time
if on the average a page fault occurs every k instruction is:
j i+j
A. i + B. i + (j × k) C. D. (i + j ) × k
k k
gate1998 operating-system virtual-memory easy ugcnetjune2012iii
34.58.2 Virtual Memory: GATE CSE 2006 | Question: 63, UGCNET-June2012-III: 45 https://gateoverflow.in/1841
A computer system supports 32-bit virtual addresses as well as 32-bit physical addresses. Since the virtual address
space is of the same size as the physical address space, the operating system designers decide to get rid of the virtual
memory entirely. Which one of the following is true?
A. Efficient implementation of multi-user support is no longer possible
B. The processor cache organization can be made more efficient now
C. Hardware support for memory management is no longer needed
D. CPU scheduling can be made more efficient now
34.58.3 Virtual Memory: GATE CSE 2011 | Question: 20, UGCNET-June2013-II: 48 https://gateoverflow.in/2122
Let the page fault service time be 10 milliseconds(ms) in a computer with average memory access time being 20
nanoseconds (ns). If one page fault is generated every 106 memory accesses, what is the effective access time for
memory?
A. 21 ns B. 30 ns C. 23 ns D. 35 ns
gatecse-2011 operating-system virtual-memory normal ugcnetjune2013ii
A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page
table contains the following entries :
Page Block
0 3
2 1
5 2
7 0
Which of the following list of virtual addresses (in decimal) will not cause any page fault if referenced by the CPU?
A. 1024, 3072, 4096, 6144 B. 1234, 4012, 5000, 6200
C. 1020, 3012, 6120, 8100 D. 2021, 4050, 5112, 7100
ugcnetdec2015ii operating-system virtual-memory
In a paged memory management algorithm, the hit ratio is 70%. If it takes 30 nanoseconds to search Translation Look-
aside Buffer (TLB) and 100 nanoseconds (ns) to access memory, the effective memory access time is
A. 91 ns B. 69 ns C. 200 ns D. 160 ns
ugcnetjune2014ii operating-system virtual-memory
If the executing program size is greater than the existing RAM of a computer, it is still possible to execute the
program if the OS supports :
A. multitasking
B. virtual memory
C. paging system
D. none of the above
In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called
A. NTFS file system B. Hardware abstraction layer
C. Microkernel D. Process Manger
ugcnetdec2013iii operating-system windows non-gate
Which of the following versions of Windows O. S . contain built-in partition manager which allows us to shrink and
expand pre-defined drives ?
A. Windows Vista B. Windows 2000
C. Windows NT D. Windows 98
ugcnetdec2014iii operating-system windows
The versions of windows operating system like Windows XP and Window Vista uses following file system:
A. FAT-16 B. FAT-32
C. NTFS (NT File System) D. All of the above
ugcnetjune2013iii operating-system windows
Answer Keys
34.0.1 B 34.0.2 D 34.0.3 B 34.0.4 Q-Q 34.0.5 Q-Q
34.0.6 Q-Q 34.0.7 Q-Q 34.0.8 Q-Q 34.0.9 Q-Q 34.0.10 Q-Q
34.0.11 Q-Q 34.0.12 X 34.0.13 Q-Q 34.0.14 Q-Q 34.0.15 C
34.0.16 C 34.0.17 Q-Q 34.0.18 A 34.0.19 Q-Q 34.0.20 Q-Q
34.0.21 Q-Q 34.0.22 Q-Q 34.0.23 C 34.0.24 A 34.0.25 A
34.0.26 Q-Q 34.0.27 A 34.0.28 B 34.0.29 C 34.0.30 Q-Q
34.0.31 Q-Q 34.0.32 Q-Q 34.0.33 D 34.0.34 Q-Q 34.0.35 A
34.1.1 C 34.2.1 A 34.3.1 B 34.4.1 C 34.5.1 C
34.6.1 C 34.7.1 Q-Q 34.7.2 Q-Q 34.8.1 Q-Q 34.8.2 Q-Q
34.8.3 B 34.8.4 D 34.8.5 A 34.8.6 A 34.9.1 D
34.10.1 B 34.11.1 C 34.12.1 A 34.13.1 B 34.14.1 C
34.14.2 X 34.14.3 D 34.14.4 C 34.14.5 B 34.14.6 D
34.14.7 C 34.14.8 C 34.14.9 B 34.15.1 A 34.15.2 B
34.15.3 C 34.15.4 B 34.15.5 A 34.15.6 A 34.15.7 D
34.16.1 B 34.17.1 Q-Q 34.18.1 B 34.19.1 Q-Q 34.19.2 C
34.19.3 X 34.19.4 B 34.19.5 B 34.19.6 A 34.19.7 B
34.20.1 Q-Q 34.21.1 B 34.22.1 A 34.22.2 C 34.23.1 Q-Q
34.23.2 C 34.24.1 Q-Q 34.24.2 Q-Q 34.25.1 A 34.26.1 Q-Q
34.27.1 Q-Q 34.27.2 A 34.28.1 Q-Q 34.28.2 X 34.28.3 A
34.28.4 B 34.28.5 A 34.28.6 C 34.28.7 Q-Q 34.28.8 Q-Q
34.29.1 A 34.30.1 A 34.31.1 D 34.32.1 C 34.33.1 A
34.33.2 B 34.34.1 Q-Q 34.34.2 C 34.34.3 Q-Q 34.34.4 D
34.34.5 A 34.34.6 Q-Q 34.35.1 C 34.35.2 B 34.35.3 B
34.35.4 D 34.35.5 D 34.36.1 B 34.36.2 Q-Q 34.36.3 C
34.36.4 B 34.36.5 Q-Q 34.36.6 Q-Q 34.36.7 C 34.36.8 C
34.37.1 A 34.38.1 B 34.38.2 B 34.39.1 Q-Q 34.39.2 Q-Q
34.40.1 A 34.40.2 Q-Q 34.40.3 Q-Q 34.40.4 B 34.40.5 B
34.40.6 D 34.40.7 A 34.40.8 Q-Q 34.40.9 B 34.40.10 Q-Q
34.40.11 A 34.40.12 D 34.40.13 B 34.40.14 D 34.40.15 B
34.40.16 B 34.40.17 C 34.40.18 B 34.40.19 A 34.40.20 A
34.40.21 Q-Q 34.41.1 B 34.41.2 Q-Q 34.42.1 Q-Q 34.43.1 D;E
34.43.2 A 34.43.3 B 34.44.1 Q-Q 34.45.1 Q-Q 34.45.2 B
34.45.3 Q-Q 34.45.4 Q-Q 34.46.1 B 34.47.1 Q-Q 34.47.2 A
34.47.3 D 34.47.4 Q-Q 34.48.1 D 34.48.2 B 34.48.3 B
34.48.4 D 34.48.5 C 34.48.6 C 34.48.7 B 34.49.1 Q-Q
34.50.1 D 34.51.1 D 34.52.1 A 34.52.2 C 34.53.1 D
34.54.1 C 34.54.2 B 34.54.3 B 34.54.4 C 34.54.5 C
34.55.1 C 34.55.2 B 34.56.1 C 34.57.1 3 34.57.2 B
34.57.3 A 34.57.4 B 34.57.5 C 34.57.6 A 34.57.7 D
34.57.8 C 34.57.9 B 34.57.10 B 34.57.11 A 34.57.12 A;C
34.57.13 C 34.57.14 C 34.57.15 C 34.57.16 C 34.57.17 C
34.57.18 D 34.57.19 A 34.57.20 C 34.57.21 C 34.57.22 C
34.57.23 X 34.57.24 C 34.57.25 Q-Q 34.58.1 A 34.58.2 C
34.58.3 B 34.58.4 D 34.58.5 C 34.58.6 C 34.58.7 D
34.58.8 Q-Q 34.59.1 Q-Q 34.60.1 B 34.60.2 A 34.60.3 C
34.60.4 D 34.60.5 D
35 Others: Others (709)
A basic feasible solution of an m × n transportation problem is said to be non-degenerate, if basic feasible solution
contains exactly _______ number of individual allocation in ______ positions.
A. m + n + 1 , independent B. m + n − 1 , independent
C. m + n − 1 , appropriate D. m − n + 1 , independent
ugcnetdec2019ii
Consider a schema R(MNPQ) and functional dependencies M→N, P→Q. Then the decomposition of R into R1(MN)
and R2(PQ) is _______
ugcnetdec2016ii
Given an open address hash table with load factor α < 1 , the expected number of probes in a successful search is
1 1
A. Atmost 1
α In ( 1−α
α )
B. Atmost α In ( 1−α )
1 1 1 α
C. Atleast α In ( 1−α ) D. Atleast α In ( 1−α )
ugcnetjune2013ii
In IPv4 header, the ____ field is needed to allow the destination host to determine which datagram a newly arrived
fragments belongs to
A. identification B. fragment offset
C. time to live D. header checksum
ugcnetjune2013ii
A test contains 100 true/false questions. How many different ways can a student answer the question on the test, if the
answer may be left blank also.
100 100
A. P2 B. C2 C. 2100 D. 3100
ugcnetjune2013ii
A. AND and OR gates B. AND gates C. NAND and NOR gatesD. NAND gates
ugcnetjune2011ii
Which of the following statements is/are True regarding some advantages that an objectoriented DBMS (OODBMS)
offers over a relational database ?
I. An OODBMS avoids the “impedance mismatch” problem.
II. An OODBMS avoids the “phantom” problem.
III. An OODBMS provides higher performance concurrency control than most relational databases.
IV. An OODBMS provides faster access to individual data objects once they have been read from disk.
A. II and III only B. I and IV only C. I, II, and III only D. I, III and IV only
ugcnetaug2016iii databases
ugcnetaug2016ii
The maximum size of the data that the application layer can pass on to the TCP layer below is _____
A. 216 bytes B. 216 bytes + TCP header length
C. 216 bytes – TCP header length D. 216 bytes
ugcnetdec2016ii
35.0.14 UGCNET-DEC2016-II: 25 https://gateoverflow.in/113167
1. Optimal binary search tree construction can be performed efficiently using dynamic programming
2. Breadth-first search cannot be used to find connected components of a graph
3. Given the prefix and postfix walks of a binary tree, the tree cannot be re-constructed uniquely
4. Depth-first-search can be used to find the components of a graph
A. 1 B. 2 C. 3 D. 4
ugcnetdec2016ii
A. A B. B C. C D. D
ugcnetdec2016ii
The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e., starting from G. The stack is
popped five times and each element is inserted into a queue. Two elements are deleted from the queue and pushed back
onto the stack. Now, one element is popped from the stack. The popped item is ________
A. A B. B C. F D. G
ugcnetdec2016ii
An attribute A of datatype varchar(20) has value ‘Ram’ and the attribute B of datatype char(20) has value ‘Sita’ in
oracle. The attribute A has _______ memory spaces and B has _______ memory spaces.
A. 20, 20 B. 3, 20 C. 3, 4 D. 20, 4
ugcnetdec2016ii
A. 17 B. 131 C. 64 D. 52
ugcnetjune2013ii
35.0.19 UGCNET-June2011-II: 9 https://gateoverflow.in/64353
Which of the following permanent database that has an entry for each terminal symbol ?
A. Literal table B. Identifier table
C. Terminal table D. Source table
ugcnetjune2011ii databases
From the point of view of the programmer, what are the major advantages of using a high-level language rather than
internal machine code or assembly language?
A. Program portability B. Easy development
C. Efficiency D. None of the above
ugcnetjune2011ii
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate
instructions to the modem for this purpose ?
A. Communication software B. Error detection protocols
C. Link access procedure (LAP) D. Telecommunications
ugcnetjune2011ii computer-networks
ugcnetdec2016ii
If X is a binary number which is the power of 2, then the value of X&(X-1) is:
ECL is the fastest of all logic families. High Speed in ECL is possible because transistors are used in difference
amplifier configuration, in which they are never driven into ________
Convert the octal number 0.4051 into its equivalent decimal number.
For a B-tree of height h and degree t, the total CPU time used to insert a node is
Repository of information gathered from multiple sources, storing under unified scheme at a single site is called
A. 1 B. 2 C. 3 D. 0
ugcnetjune2013ii
Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow and the
rest ones white.
A. 5 B. 6 C. 7 D. 8
ugcnetjune2011ii
The circumference of the two concentric disks are divided into 100 sections each. For the outer disk, 100 of the
sections are painted red and 100 of the sections are painted blue. For the inner disk, the sections are painted red and
blue in an arbitrary manner. It is possible to align the two disks so that
A. 100 or more B. 125 or more C. 150 or more D. 175 or more of the sections on the
inner disks have their
colours matched with the corresponding section on outer disk.
ugcnetjune2011ii
¯ is equivalent to
(A + B)AB
A. A ⨁ B B. A ⨀ B
C. (A ⨁ B) ⨀ A D. (A ⨀ B) ⨁ A
ugcnetjune2011ii
A Network Schema
A. restricts to one to many relationship B. permits to many to many relationship
C. Stores Data in a Database D. Stores Data in a Relation
ugcnetjune2013ii
Manager’s salary details are to be hidden from Employee table. This Technique is called as
A. Conceptual level Datahiding B. Physical level Datahiding
C. External level Datahiding D. Logical level Datahiding
ugcnetjune2013ii
How many times the word ‘print’ shall be printed by the following program segment?
for (i=1, i ≤ 2, i++)
for (j=1, j ≤ 2, j++)
for (k=1, k ≤ 2, k++)
printf(“print\n”)
A. 1 B. 3 C. 6 D. 8
ugcnetjune2013ii
A. m B. m2 C. m(m+1) D. m(m+2)
ugcnetjune2013ii
In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the
routing table for the three-layer hierarchy?
A. 10 clusters, 24 regions and 20 routers B. 12 clusters, 20 regions and 20 routers
C. 16 clusters, 12 regions and 25 routers D. 15 clusters, 16 regions and 20 routers
ugcnetjune2013ii
In _____ substitution, a character in the plaintext is always changed to the same character in ciphertext, regardless of its
position in the text.
A. polyalphabetic B. monoalphabetic
C. transpositional D. multialphabetic
ugcnetjune2013ii
A set of processors P 1, P 2, … P k can execute in parallel if Bernstein’s conditions are satisfied on a pairwise basis;
that is P 1 ∥ P 2 ∥ P 3 ∥ ⋯ ∥ P k if and only if:
A virtual memory based memory management algorithm partially swaps out a process. This is an example of
A. short term scheduling B. long term scheduling
C. medium term scheduling D. mutual exclusion
ugcnetjune2013ii
35.0.59 UGCNET-June2013-II: 49 https://gateoverflow.in/58059
A. Sort, taking the input from “temp”, prints 20 lines from temp and delete the file temp
B. Sort eh file “temp”, removes 30 lines from temp and delete the file temp
C. Sort, taking the input from “in” and writing the output to “temp”, then prints 30 lines from temp on terminal. Finally
“temp” is removed
D. Sort, taking the input from “temp”, and then prints 30 lines from “temp” on terminal. Finally “temp” is removed.
ugcnetjune2013ii
Which of the following addresses is used to deliver a message to the correct application program running on a host?
When the following code is executed what will be the value of x and y?
int x=1, y=0;
y=x++;
A. 2, 1 B. 2, 2 C. 1, 1 D. 1, 2
ugcnetjune2013ii
Which of the following binary tree is optimal, if probabilities of successful search and unsuccessful search are same?
D.
B. C.
A.
ugcnetjune2012iii
35.0.65 UGCNET-June2012-III: 47 https://gateoverflow.in/56298
The colour of an object is largely determined by its diffuse reflection coefficient. If Kd = (0.8, 0.4, 0) , then what shall
be the colour of the object, of the light used is blue and magenta?
A. White and Red B. Red and Blue C. Black and White D. Black and Red
ugcnetjune2012iii
ugcnetjune2013ii
If D1 , D2 , … Dn are domains in a relational model, then the relation is a table, which is a subset of
A. D1 + D2 + ⋯ + Dn B. D1 × D2 × ⋯ × Dn
C. D1 ∪ D2 ∪ ⋯ ∪ Dn D. D1 − D2 − ⋯ − Dn
ugcnetjune2013ii
Given below are two Statements – One is labelled as Assertion (A) and other is labelled as Reason (R):
Assertion (A): Use of slang in formal teaching makes communication lively and interesting.
Reasons (R): Academic decency demands the avoidance of slang in the classroom environment.
In the light of the above statements, choose the correct option:
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true and (R) is not the correct explanation of (A)
C. (A) is true, but (R) is false
D. (A) is false, but (R) is true
ugcnetdec2019i
Which is the protocol for performing RPCs between applications in a language and system independent way?
ugcnetdec2013iii
Which of the following sampling procedures will be appropriate for conducting researches with empirico-inductive
research paradigm?
A. Simple random sampling procedure B. Systematic sampling procedure
C. Stratified sampling procedure D. Any of the non-probability sampling procedures
ugcnetdec2019i
In which of the following formats ‘Chapter Scheme’ of the document has to be formally approved by a research degree
committee in the university?
A. Thesis/dissertation B. Seminar papers
C. Research articles D. Research monographs
ugcnetdec2019i
A research scholar while submitting his/her thesis, did not acknowledge in the preface the help and support of the
respondents of questionnaires. This will be called an instance of
A. Technical lapse B. Wilful negligence
C. Unethical act D. Lack of respect
ugcnetdec2019i
A flow graph F with entry node (1) and exit node (11) is shown below:
The national agency for responding to computer security incidents as and when they occur, is
Under Green India Mission, how many hectares of degraded forest land is to be brought under afforestation?
A. 02 million hectares B. 06 million hectares
C. 08 million hectares D. 20 million hectares
ugcnetdec2019i
Consider a typical mobile communication system. If 840 frequencies are available, how many can be used in a given
cell ?
A. 140 B. 120 C. 84 D. 60
ugcnetdec2007ii
A. Set of all strings containing ′ ab′ B. Set of all strings containing ′ aab′
C. Set of all strings ending in ′ abab′ D. None of the above
ugcnetjune2007ii
A. A B C D E F B. A B D E F C
C. A C E B D F D. None of the above
ugcnetjune2007ii
ugcnetjune2007ii
With reference to implementation of different association mining algorithms, identify the correct statement :
A. The FP growth method was usually better than the best implementation of the apriori algorithm
B. Apriori algorithm is usually better than CHARM
C. Apriori algorithm is good when the support required is low
D. At very low support the number of frequent items becomes less
ugcnetdec2007ii
A university teacher plans to improve the study habits of students in his/her class. Which type of research paradigm
will be helpful in this regard?
A. Evaluative research paradigm B. Fundamental research paradigm
C. Applied research paradigm D. Action research paradigm
ugcnetdec2019i
ugcnetdec2007ii
Given a parallel algorithm A with computation time t, if parallel algorithm A performs m computational operation,
then p processors can execute algorithm A in time given by :
ugcnetdec2007ii
Identify from the options given below, the co-benefit of Montreal Protocol
ugcnetdec2019i
If A ⊕ B = C, then:
A. A ⊕ C = B B. B ⊕ C = A
C. A ⊕ B ⊕ C = 1 D. A ⊕ B ⊕ C = 0
ugcnetjune2007ii
A. 8 B. 9 C. 10 D. 11
ugcnetjune2007ii
ugcnetjune2007ii
35.0.99 UGCNET-June2007-II: 15 https://gateoverflow.in/335718
ugcnetjune2007ii
In case of right shift bitwise operator in ′ C ′ language, after shifting n bits, the leftmost n bits:
A. are always filled with zeros B. are always filled with ones
C. are filled with zeros or ones and is machine dependent D. none of the above
ugcnetjune2007ii
What is the maximum counting speed of a 4-bit binary counter which is composed of Flip-Flop with a propagation
delay of 25 ns?
A researcher intends to make use of ICT in his/her research. What considerations should weigh most in such a
decision?
a. Appropriateness of the tool used b. Cost involved in procuring it
c. Availability of tools in the department where research is to d.be Willingness of his/her supervisor to offer help
undertaken Choose your answer from the following options:
e. The company from which the ICT equipment has been procured
A. (a), (b) and (c) B. (c) , (d) and (e)
C. (a), (c) and (d) D. (b), (c) and (e)
ugcnetdec2019i
Which of the following types of assessment is conducted periodically with an eye on standards?
A. Formative assessment B. Summative assessment
C. Portfolio assessment D. Performance assessment
ugcnetdec2019i
35.0.106 UGCNET-Dec2019-I: 16 https://gateoverflow.in/360717
In a certain coding language, ‘AEIOU’ is written as ‘TNHDZ’. Using the same coding language, ‘BFJPV’ will be
written as
Which of the following modes of communication can be employed in a classroom for effective teaching?
a. Top-down b. Iconic
c. Associational d. Dissociational
e. Symbolic f. Abstract
Choose the most appropriate option from the following:
A. (a), (b) and (f) B. (c) , (e) and (f)
C. (b) , (c) and (e) D. (a), (c) and (d)
ugcnetdec2019i
The following table gives the percentage of marks obtained by 6 students in 5 different subjects in an examination. The
numbers in the parenthesis give the maximum marks in each subject. Answer the given questions based on the table:
In which subject the performance of the students is worst in terms of percentage of marks?
The following table gives the percentage of marks obtained by 6 students in 5 different subjects in an examination. The
numbers in the parenthesis give the maximum marks in each subject. Answer the given questions based on the table:
How many students obtained 60% and above marks in all the subjects?
The following table gives the percentage of marks obtained by 6 students in 5 different subjects in an examination. The
numbers in the parenthesis give the maximum marks in each subject. Answer the given questions based on the table:
What is the average marks obtained by all the six students in Chemistry?
The following table gives the percentage of marks obtained by 6 students in 5 different subjects in an examination. The
numbers in the parenthesis give the maximum marks in each subject. Answer the given questions based on the table:
What was the aggregate of marks obtained by Sanya in all the five subjects?
The following table gives the percentage of marks obtained by 6 students in 5 different subjects in an examination. The
numbers in the parenthesis give the maximum marks in each subject. Answer the given questions based on the table:
Which one of the following fallacious hetu (middle term) is not uniformly concomitant with the major term?
A. Asatpratipaksa B. Auyatireki
C. Anyonya-Asiddha D. Suy❝bhic❝ra
ugcnetdec2019i
35.0.114 UGCNET-Dec2019-I: 23 https://gateoverflow.in/360710
Which one of the following hetwabhasa (fallacy) is involved in the argument, “Sound is element because it is caused”?
ugcnetdec2019i
What is the exact equivalent discount of three successive discounts of 10%, 15% and 20% by sale of an article?
A certain principal invested at compound interest payable yearly amounts to Rs. 10816.00 in 3 years and Rs.
11248.64 in 4 years. What is the rate of interest?
A. 3% B. 4% C. 4.5% D. 5.5%
ugcnetdec2019i
The sum of a number and its inverse is −4. The sum of their cubes is:
A. −52 B. 52 C. 64 D. −64
ugcnetdec2019i
35.0.121 UGCNET-Dec2019-I: 17 https://gateoverflow.in/360716
If 3% of (a + b) = 7% of (ab)
and 5% of (a − b) = 4% of (ab),
then what percentage of b is a?
47 23 4700 2300
A. % B. % C. % D. %
23 47 23 47
ugcnetdec2019i
Which one of the following tasks is associated with changing appearance of a document in word processing?
_________ is a wireless technology built in electronic gadgets for transferring data over short distance
In which of the following types of learning materials, the presentations are highly structured and individualised?
ugcnetdec2019i
An organization needs to maintain database having five attributes A, B, C, D, E. These attributes are functionally
dependent on each other for which functionality dependency set F is given as:
F : {A → BC, D → E, BC → D, A → D} . Consider a universal relation R(A, B, C, D, E) with functional
dependency set F. Also all attributes are simple and take atomic values only.
Identify primary key of table R with functional dependency set F
A. BC B. AD C. A D. AB
ugcnetdec2019ii
Which of the following are classroom related factors that influence effectiveness of teaching?
a. Prior task related behavior of students b. Adherence to linear pattern of communication by the teacher
c. Socio-economic status of the family to which learners belong d. Inappropriate use of technological resources by the teacher
e. Cultural background of students Choose your answer from the following options:
A. (a), (b) and (c) B. (b), (c) and (d)
C. (a), (b) and (d) D. (c) , (d) and (e)
ugcnetdec2019i
Which of the learning outcomes are intended in teaching organized at understanding level?
ugcnetdec2019i
An organization needs to maintain database having five attributes A, B, C, D, E. These attributes are functionally
dependent on each other for which functionality dependency set F is given as:
F : {A → BC, D → E, BC → D, A → D} . Consider a universal relation R(A, B, C, D, E) with functional
dependency set F. Also all attributes are simple and take atomic values only.
Assume that given table R is decomposed in two tables
R1 (A, B, C) with functional dependency set f1 = {A → B, A → C} and
R2 (A, D, E) with FD set F2 = {A → D, D → E}
Which of the following option is true w.r.t. given decomposition?
A. Dependency preservation property is followed B. R1 and R2 are both in 2 NF
C. R2 is in 2 NF and R3 is in 3 NF D. R1 is in 3 NF and R2 is in 2 NF
ugcnetdec2019ii
An organization needs to maintain database having five attributes A, B, C, D, E. These attributes are functionally
dependent on each other for which functionality dependency set F is given as:
F : {A → BC, D → E, BC → D, A → D} . Consider a universal relation R(A, B, C, D, E) with functional
dependency set F. Also all attributes are simple and take atomic values only.
Identify the redundant functional dependency in F
A. BC → D B. D → E
C. A → D D. A → BC
ugcnetdec2019ii
An organization needs to maintain database having five attributes A, B, C, D, E. These attributes are functionally
dependent on each other for which functionality dependency set F is given as:
F : {A → BC, D → E, BC → D, A → D} . Consider a universal relation R(A, B, C, D, E) with functional
dependency set F. Also all attributes are simple and take atomic values only.
Identify the normal form in which relation R belong to
A. 1 NF B. 2 NF C. 3 NF D. BCNF
ugcnetdec2019ii
An organization needs to maintain database having five attributes A, B, C, D, E. These attributes are functionally
dependent on each other for which functionality dependency set F is given as:
F : {A → BC, D → E, BC → D, A → D} . Consider a universal relation R(A, B, C, D, E) with functional
dependency set F. Also all attributes are simple and take atomic values only.
MInimal cover F′ of functional dependency set F is
A. F′ = {A → B, A → C, BC → D, D → E}
B. F′ = {A → BC, B → D, D → E}
C. F′ = {A → B, A → C, A → D, D → E}
D. F′ = {A → B, A → C, B → D, C → D, D → E}
ugcnetdec2019ii
According to classical Indian school of logic, what is the correct sequence of steps involved in Anum ❝na (influence)?
ugcnetdec2019i
A flow graph F with entry node (1) and exit node (11) is shown below:
How many predicate nodes are there and what are their names?
A. Three: (1, (2, 3), 6) B. Three: (1, 4, 6)
C. Four: ((2, 3), 6, 10, 11) D. Four: ((2, 3), 6, 9, 10)
ugcnetdec2019ii
A flow graph F with entry node (1) and exit node (11) is shown below:
A. 6 B. 7 C. 8 D. 9
ugcnetdec2019ii
A flow graph F with entry node (1) and exit node (11) is shown below:
When there is an animated discussion between a teacher and his or her students in the classroom, it can be classified as
A. Horizontal communication B. Mechanical communication
C. Linear communication D. Categorical communication
ugcnetdec2019i
M Σti=0 ( ) (q − 1)i ≤ X
n
I
Where M is the number of code words and X is
A. q n B. q t C. q −n D. q −t
ugcnetdec2016iii
Let C be a binary linear code with minimum distance 2t+1 then it can correct upto ___ bits of error
ugcnetdec2016iii
ugcnetdec2016iii
The fist logic order (FOL) statement ((R ∨ Q) ∧ (P ∨ ¬Q)) is equivalent to which of the following?
ugcnetdec2016iii
With respect to a loop in the transportation table, which one of the following is not correct?
ugcnetdec2016iii
Match the following Layers and Protocols for a user browsing with SSL :
a. Application layer i. TCP
b, Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP
Codes :
A. a-iv; b-i; c-ii; d-iii B. a-iii; b-ii; c-i; d-iv
C. a-ii; b-iii; c-iv; d-i D. a-iii; b-i; c-iv; d-ii
ugcnetdec2016ii
Red-black trees are one of many search tree schemes that are “balanced” in order to guarantee that basic dynamic-set
operations take _____ time in the worst case.
The asymptotic upper bound solution of the recurrence relation given by T(n) = 2T (( n2 ))+ lgnnis
A. O(n2 ) B. O(n lg n)
C. O(n lg lg n) D. O(lg lg n)
ugcnetdec2016iii
In 8085, which of the following performs: load register pair immediate operation?
A. a b B. b b C. b a D. b a a b
ugcnetdec2016iii
Which of the following statement(s) is/are true with respect to software architecture?
S1: Coupling is a measure of how well the things grouped together in a module belong together logically.
S2: Cohesion is a measure of the degree of interaction between software modules.
S3: If coupling is low and cohesion is high then it is easier to change one module without affecting others.
Let pk(R) denotes primary key of the relation R. A many to one relationship that exists between two relations R1 and
R2 can be expressed as follows:
A. pk(R2 ) → pk(R1 ) B. pk(R1 ) → pk(R2 )
C. pk(R2 ) → R1 ∩ R2 D. pk(R1 ) → R1 ∩ R2
ugcnetdec2016iii
ugcnetdec2016ii
ugcnetdec2016ii
Which of the following is not one of three software product aspects addressed by McCall’s software quality factors?
A. Ability to undergo change B. Adaptability to new environments
C. Operational characteristics D. Production costs and scheduling
ugcnetdec2016ii
ugcnetdec2016ii
35.0.168 UGCNET-DEC2016-III: 1 https://gateoverflow.in/113752
Which of the following is an interrupt according to temporal relationship with system clock?
A. Maskable interrupt B. Periodic interrupt
C. Division by zero D. Synchronous interrupt
ugcnetdec2016iii
A software design pattern used to enhance the functionality of an object at run-time is:
_______ refers loosely to the process of semi-automatically analysing large databases to find useful patterns.
In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)?
a. ERP automates and integrates majority of business processes. b. ERP provides access to information in a Real Time Environment.
c. ERP is inexpensive to implement.
A. a, b and c are false. B. a and b false; c true.
C. a and b true; c false D. a true; b and c are false
ugcnetdec2016ii
a. MS-DOS b. XENIX c. OS/2 In the above list, following operating systems did
not provide multiuser facility
At which of the following stage(s), the degeneracy do not occur in transportation problem? (m, n represents number of
sources and destinations respectively).
A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token
bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is
______ secs.
A. 1 B. 2 C. 3 D. 4
ugcnetdec2016iii
Which of the following statement(s) with regard to an abstract class in JAVA is/are TRUE?
Consider the following two rules R1 and R2 in logical reasoning in Artificial Intelligence (AI):
R1 : From α ⊃ β
and α is known as Modus Tollens (MT)
Inter β
R2 : From α ⊃ β
and ¬β
Inter ¬α
is known as Modus Ponens (MP)
A. Only R1 is correct B. Only R2 is correct
C. Both R1 and R2 are correct D. Neither R1 nor R2 is correct
ugcnetdec2016iii
35.0.180 UGCNET-DEC2016-III: 54 https://gateoverflow.in/114266
ugcnetdec2016iii
One of the disadvantages of user level threads compared to Kernel level threads is
A. If a user level thread of a process executes a system call, all threads in that process are blocked
B. Scheduling is application dependent
C. Thread switching does not require kernel mode privileges
D. The library procedures invoked for thread management in user level threads are local procedures
ugcnetdec2016iii
Consider a disk queue with I/O requests on the following cylinders in their arriving order:
6, 10, 12, 54, 97, 73, 128, 15, 44, 110, 34, 45
The disk head is assumed to be at cylinder 23 and moving in the direction of decreasing number of cylinders. Total number of
cylinders in the disk is 150. The disk head movement using SCAN-scheduling algorithm is:
A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames.
Number of bits required in logical and physical address are respectively:
A software company needs to develop a project that is estimated as 1000 function points and is planning to use JAVA
as the programming language whose approximate lines of code per function point is accepted as 50. Considering a=1.4
as multiplicative factor, b=1.0 as exponention factor for the basic COCOMO effort equation and c=3.0 as multiplicative factor,
d=0.33 as exponention factor for the basic COCOMO duration equation, approximately how long does the project take to
complete?
Complete each of the following sentences in List-I on the left hand side by filling in the word or phrase from the List –
II on the right hand side that best completes the sentence :
List-I List-II
I. Determining whether you have built A. Software testing
the right system is called ______
II. Determining whether you have built B. Software verification
the system right is called ______
III. ______ is the process of demostrating C. Software debuggingthe existence of defects
IV. _______ is the process of discovering the D. Software validation
cause of a defect and fixing it
Codes :
A. I-B, II-D, III-A, IV-C B. I-B, II-D, III-C, IV-A
C. I-D, II-B, III-C, IV-A D. I-D, II-B, III-A, IV-C
ugcnetdec2016iii
A. A B. B C. C D. B and C
ugcnetdec2016iii
A software project was estimated at 352 Function Points (FP). A four person team will be assigned to this project
consisting of an architect, two programmers, and a tester. The salary of the architect is Rs. 80, 000 per month, the
programmer 60,000 per month and the tester 50, 000 per month. The average productivity of the team is 8 FP per person
month. Which of the following represents the projected cost of the project?
A. Rs. 28, 16, 000 B. Rs. 20, 90, 000
C. Rs. 26, 95, 000 D. Rs. 27, 50, 000
ugcnetdec2016iii
35.0.190 UGCNET-DEC2016-III: 43 https://gateoverflow.in/113841
Which of the following statement(s) is/are TRUE with regard to software testing?
I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance
II. Equivalence partitioning is a white-box testing technique that divides the input domain of a program into classes of data
from which test cases can be derived
Which of the following HTML code will affect the vertical alignment of the table content?
ugcnetdec2016iii
The order of a leaf node in a B+ tree is the maximum number of children it can have. Suppose that block size is 1
kilobytes, the child pointer takes 7 bytes long and search field value takes 14 bytes long. The order of the leaf node is
_________
A. 16 B. 63 C. 64 D. 65
ugcnetdec2016ii
ugcnetdec2016iii
Then, the resulting relaiton T, which relates elements of universe x to the elements of universe z using max-min composition is
given by:
A. B. C. D.
ugcnetdec2016iii
T
A neuron with inputs has the weight vector [ 0.2 −0.1 0.1 ] and a bias θ = 0 . If the input vector is
T
X=
X = [ 0.2 0.4 0.2 ] T . Then the total input to the neuron is:
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data
consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints?
1. An instructor Id. No. cannot be null, provided Instructor Id. No. being the primary key.
2. No two citizens have same Adhar-Id.
3. The budget of a company must be zero.
Let M and N be two entities in an E-R diagram with simple single vale attributes. R1 and R2 are two relationships
between M and N, whereas R1 is one-to-many and R2 is many-to-many. The minimum number of tables required to
represent M, N, R1 and R2 in the relational model are _______
A. 4 B. 6 C. 7 D. 3
ugcnetdec2016ii
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element
in a sorted array?
ugcnetdec2016ii
Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software
development. What can you say about the following two statements?
I. Abstraction allows us to focus on what something does without considering the complexities of how it works
II. Encapsulation allows us to consider complex ideas while ignoring irrelevant detail that would confuse us
A. Neither I nor II is correct B. Bith I and II are correct
C. Only II is correct D. Only I is correct
ugcnetdec2016iii
ugcnetdec2016iii
The minimum number of scalar multiplication required, for parenthesization of a matrix-chain product whose sequence
of dimensions for four matrices is <5, 10, 3, 12, 5> is
Which of the following are facts about a top-down software testing approach?
A. Find the highest paid employee who earns more than the average salary of all employees of his company
B. Find the highest paid employee who earns more than the average salary of all employees of all the companies
C. Find all employees who earn more than the average salary of all employees of all the companies
D. Find all employees who earn more than the average salary of all employees of their company
ugcnetdec2016iii
In RSA public key cryptosystem suppose n = p ∗ q wher p and q are primes. (e, n) and (d, n) are public and private
keys respectively. Let M be an integer such that o < M < n and ϕ(n) = (p − 1)(q − 1). Which one of the
following equations represent RSA public key cryptosystem?
ugcnetdec2014iii
If Im denotes the set of integers modulo m, then the following are fields with respect to the operations of addition
modulo m and multiplication modulo m :
i. Z23
ii. Z29
iii. Z31
iv. Z33
A. (i) only B. (i) and (ii) only
C. (i), (ii) and (iii) only D. (i), (ii), (iii) and (iv)
ugcnetdec2004ii
ugcnetdec2004ii
ugcnetjan2017iii non-gate
A segment is any object described by GKS commands and data that start with CREATE SEGMENT and Terminates
with CLOSE SEGMENT command. What functions can be performed on these segments?
A. Translation and Rotation B. Panning and Zooming
C. Scaling and Shearing D. Translation, Rotation, Panning and Zooming
ugcnetjan2017iii non-gate
Consider following two rules R 1 and R2 in logical reasoning in Artificial Intelligence (AI):
R1: From α ⊃ β Interβ
andα is known as Modulus Tollens (MT)
and¬β
R2:From α ⊃ β Inter¬α is known as Modus Ponens(MP)
ugcnetjan2017iii non-gate
In link state routing algorithm after construction of link state packets, new routes are computed using:
A. DES algorithm B. Dijkstra’s algorithm
C. RSA algorithm D. Packets
ugcnetdec2016ii
Match the following WINDOWS system calls and UNIX system calls with reference to process control and File
manipulation.
Windows UNIX
(a) Create – process() (i) Open()
(b) WaitForSingleObject() (ii) Close()
(c) CreateFile() (iii) Fork()
(d) CloseHandle() (iv) Wait()
Code :
A. (a)-(iii), (b)-(iv), (c)-(i), (d)-(ii) B. (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
C. (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i) D. (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
A. IS − 54 B. IS − 95 C. DS − 45 D. ANSI − 41
ugcnetjune2005ii
I. A function of a linker is to combine several object modules into a single load module.
II. A function of a linker is to replace absolute references in an object module by symbolic references to locations in other
modules.
In alpha-beta pruning, _____ is used to cut off the search at maximizing level only and ____ is used to cut off the
search at maximizing level only.
A packet whose destination is outside the local TCP/IP network segment is sent to _______
The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and 3AH respectively. The contents
of AL, the status of carry flag (CF) and sign flag (SF) after executing 'SUB AL, BL' assembly language instruction, are
A. AL=0FH; CF=1; SF=1 B. AL=F0H; CF=0; SF=0
C. AL=F1H; CF=1; SF=1 D. AL=1FH; CF=1; SF=1
ugcnetdec2016ii
Max. z = 0.50 x2 – 0.10x1 Subject to the constraints 2x1 + 5x2 < 80 x1 + x2 < 20 and x1 , x2 > 0
(1) 6
(2) 8
(3) 10
(4) 12
Find the equation of the circle x 2+y2=1 in terms of x'y' coordinates, assuming that the xy coordinate system results
from a scaling of 3 units in the x' direction and 4 units in the y' direction.
(1) 3(x')2+4(y')2 = 1
( ) ( )
(2)( x3 )2 + ( 4 )2 = 1
′ y′
66. A perceptron has input weights W1 = – 3.9 and W2 = 1.1 with threshold value T = 0.3. What output does it give for
the input x1 = 1.3 and x2 = 2.2 ?
(1) – 2.65
(2) – 2.30
(3) 0
(4) 1
A. Both (A) and (R) are true and (R) is correct explanation for (A)
B. Both(A) and (R) are true but (R) is not correct explanation for (A)
C. (A) is true (R) is false
D. (A) is false (R) is true
ugcnetjune2009ii
Which of the following checks cannot be carried out on the input data to a system ?
(A) Consistency check (B) Syntax check
(C) Range check (D) All the above
The present form of Inter University Board that was previously established for promoting cooperation and coordination
among Universities is
Find the normalization transformation that maps a window whose lower left corner is at (1, 1) and upper right corner is
at (3, 5) onto a viewport that is the entire normalized device screen.
35.0.245 UGCNET-June2005-II: 49 https://gateoverflow.in/335414
Theoretically, how many 1.25 MHz Carriers are there in a CDMA cell ?
A. 18 B. 22 C. 9 D. 64
ugcnetjune2005ii
The frequency reuse plan is divided into cell grouping using how many cells, where the number of cells equals N ?
A. 3 B. 10 C. 7 D. 21
ugcnetjune2005ii
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24
packets are required to transmit the message, the packet size is
Consider the languages L1 = ϕ and L2 = {1} . Which one of the following represents L∗1 ∪ L∗2 L∗1 ?
A. {∈} B. {∈, 1} C. ϕ D. 1∗
ugcnetdec2016iii
A segment is any object described by GKS commands and data that start with CREATE SEGMENT and Terminates
with CLOSE SEGMENT command. What functions can be performed on these segments?
A. Translation and Rotation B. Planning and Zooming
C. Scaling and Shearing D. Translation, Rotation, Panning and Zooming
ugcnetdec2016iii
Below are the few steps given for scan-converting a circle using Bresenham’s Algorithm. Which of the given steps is
not correct?
A. Compute d=3-2r (where r is radius) B. Stop if x > y
C. If d <0, then d=4x+6 and x=x+1 D. If d ≥ 0, then d=4*(x-y)+10, x=x+1 and y=y+1
ugcnetdec2016iii
35.0.252 UGCNET-DEC2016-III: 17 https://gateoverflow.in/113784
Consider a line AB with A=(0,0) and B=(8, 4). Apply a simple DDA algorithm and compute the first four plots on this
line.
A. [(0,0), (1,1), (2, 0), (3, 2)] B. [(0, 0), (1, 1.5), (2, 2), (3, 3)]
C. [(0, 0), (1, 1), (2, 2.5), (3, 3)] D. [(0, 0), (1, 2), (2, 2), (3, 2)]
ugcnetdec2016iii
Let G = (V , T, S, P ) be a context-free grammar such that every one of its production is of the form A → v , with
∣v ∣= K > 1 . The derivation tree for any W ∈ L(G) has a height h such that
A. logk ∣ W ∣≤ h ≤ logk ( )
∣W∣−1
K−1
B. logk ∣ W ∣≤ h ≤ logk (K ∣ W ∣)
C. logk ∣ W ∣≤ h ≤ K logk ∣ W∣
D. logk ∣ W ∣≤ h ≤( )
∣W∣−1
K−1
ugcnetdec2016iii
1. A class of languages that is closed under union and complementation has to be closed under intersection
2. A class of languages that is closed under union and intersection has to be closed under complementation
For a database relation R(A,B,C,D) where the domains of A, B, C and D include only atomic values, only the following
functional dependencies and those that can be inferred from them are:
A→C
B→D
The relation R is in _____.
ugcnetdec2016iii
ugcnetdec2016iii
A. 0 B. 1 C. 2 D. -1
ugcnetdec2016iii
Suppose there are N stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot.
The probability that only one station transmits in a given slot is____
Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay
between A and B is 40 milliseconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal
window size of A is ______
A. 20 B. 10 C. 30 D. 40
ugcnetdec2016iii
Let G(x) be generator polynomial used for CRC checking. The condition that should eb satisfied by G(x) to correct odd
numbered error bits, will be:
A. (1+x) is factor of G(x) B. (1-x) is factor of G(x)
C. (1+x2 ) is factor of G(x) D. x is factor of G(x)
ugcnetdec2016iii
ugcnetdec2016iii
a. First-come-first-served b. Round Robin c. Priority d. Shortest process next e. Shortest remaining time first
List-I List-II
a. Affiliate Marketing i. Vendors ask partners to place logos on
partner’s site. If customers click, come to
vendors and buy.
b. Viral Marketing ii. Spread your brand on the net by
word-of-mouth. Receivers will send
your information to their friends.
c. Group Purchasing iii. Aggregating the demands of small buyers
to get a large volume. Then negotiate a price.
d. Bartering Online iv. Exchanging surplus products and services
with the process administered completely
online by an intermediary. Company receives
“points” for its contribution.
Codes :
A. a-i, b-ii, c-iii, d-iv B. a-i, b-iii, c-ii, d-iv
C. a-iii, b-ii, c-iv, d-i D. a-ii, b-iii, c-i, d-iv
ugcnetjan2017ii
I. Requirement analysis
II. Coding
III. Design
IV. Testing
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)?
A. a b B. b b C. b a D. b a a b
ugcnetjan2017iii
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing
algorithm are updated ______
A. automatically B. by server
C. by exchanging information with neighbour nodes D. with back up database
ugcnetdec2016ii
35.0.275 UGCNET-Jan2017-III: 75 https://gateoverflow.in/335163
List-I List-II
a. :w i. saves the file and quits editing mode
b. :x ii. escapes unix shell
c. :q iii. saves file and remains in editing mode
d. :sh iv. quits editing mode and no change are
saved to the file
Codes :
A. a-ii, b-iii, c-i, d-iv B. a-iv, b-iii, c-ii, d-i
C. a-iii, b-iv, c-i, d-ii D. a-iii, b-i, c-iv, d-ii
ugcnetjan2017iii non-gate
Unix command to change the case of first three lines of file “shortlist” from lower to upper
ugcnetjan2017iii non-gate
A. Multilayer perception
B. Self organizing feature map
C. Hopfield network
A. (A) only
B. (B) only
C. (A) and (B) only
D. (A) and (C) only
ugcnetjan2017iii non-gate
At which of the following stage(s), the degeneracy do not occur in transportation problem?
(m, n represents number of sources and destinations respectively)
With respect to a loop in the transportation table, which one of following is not correct?
ugcnetjan2017iii
35.0.280 UGCNET-DEC2016-II: 31 https://gateoverflow.in/117894
Which of the following strings would match the regular expression: p +[3-5]*[xyz]?
I. p443y
II. p6y
III. 3xyz
IV. p35z
V. p353535x
VI. ppp5
A. I, III and Vl only B. IV, V and VI only C. II, IV and V only D. I, IV and V only
ugcnetdec2016ii
The most important pollutants that cause degradation of water quality in rivers and streams are
a. Bacteria b. Nutrients
c. Metals d. Total dissolved solids
e. Algae Choose the most appropriate answer from the options given
below:
A. a, b and c B. a, b and d
C. a, b, d and e D. a, b, c, d and e
ugcnetdec2019i
Correct matching is :
a b c d e
A (i) (ii) (iii) (iv) (v)
B (iv) (iii) (ii) (i) (v)
C (v) (i) (iii) (ii) (iv)
D (v) (ii) (i) (iii) (iv)
ugcnetjune2005ii
Which activity is not included in the first pass of two pass assemblers?
A. Build the symbol table B. Construct the machine code
C. Separate mnemonic opcode and operand fields. D. None of these
ugcnetjune2005ii
The initial configuration of quaue is a, b, c, d. ′ a′ is at the front. To get the configuration d, c, b, a how many deletions
and additions required:
A. 2 deletions, 3 additions B. 3 deletions, 2 additions
C. 3 deletions, 4 additions D. 3 deletions, 3 additions
ugcnetdec2005ii
What is the correct subnet mask to use for a class- B address to support 30 Networks and also have the most hosts
possible ?
A. 255.255.255.0 B. 255.255.192.0
C. 255.255.240.0 D. 255.255.248.0
ugcnetjune2005ii
Which of the following tools is not required during system analysis phase of system development Life cycle ?
A. CASE Tool B. RAD Tool
C. Reverse engineering tool D. None of these
ugcnetjune2005ii
Which protocol is used to encapsulate a data pocket created of a higher OSI model layer ?
Which type of links are used for a connection between two DTE devices ?
Which type of Bridge would be used to connect an Ethernet Segment with a token ring Segment ?
A. Transparent Bridge B. Source-Route Bridge
C. Translation Bridge D. None of these
ugcnetjune2005ii
1. Ethernet
2. HSSI
3. Frame Relay
4. 10-base T
5. Token ring
A. 1, 2 B. 1, 3, 5 C. 1, 3, 4, 5 D. 1, 2, 3, 4, 5
ugcnetjune2005ii
The algorithm that will efficiently sort an array that is nearly sorted except for the interchange of some adjacent pairs of
numbers like {1, 3, 2, 5, 4, 6} is :
A. 2 NF B. 3 NF C. 4 NF D. 5 NF
ugcnetjune2005ii
¯¯z
A. x̄ B. xyz C. y D. yz
ugcnetjune2005ii
The time required to find the shortest path in a graph with n vertices and e edges is:
Minimum number of individual shoes to be picked up from a dark room ( containing 10 pair of shoes) if we have to get
atleast one proper pair :
A. 2 B. 20 C. 11 D. None of these
ugcnetjune2005ii
A. 4 B. 8 C. 10 D. 16
ugcnetjune2005ii
Consider the relation on the set of non-negative integers defined by x ≡ y if and only if:
A. x mod 3 = 3 mod y B. 3 mod x ≡ 3 mod y
C. x mod 3 = y mod 3 D. None of the above
ugcnetjune2005ii
35.0.317 UGCNET-June2005-II: 18 https://gateoverflow.in/335445
⎡0 1 0⎤
The transitive closure of a relation R on set A whose relation matrix ⎢ 0 0 1 ⎥ is :
⎣1 0 0⎦
⎡0 1 0⎤
A. ⎢0 0 1⎥
⎣1 0 0⎦
⎡1 1 0⎤
B. ⎢1 1 0⎥
⎣1 1 0⎦
⎡1 1 1⎤
C. ⎢1 1 1⎥
⎣1 1 1⎦
⎡0 1 1⎤
D. ⎢0 1 1⎥
⎣0 1 1⎦
ugcnetjune2005ii
ugcnetjune2005ii
Encryption and decryption are the functions of the _________ layer of OSI model :
__________ provide a method to recover data that has been delivered but not get used :
A. Segmentation B. Concatenation
C. Transalation D. Synchronization
ugcnetdec2005ii
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted as a child of
the node “g” ?
A. 1 B. 3 C. 7 D. 8
ugcnetjune2005ii
What is the time required to insert an element in a stack with linked implementation?
The number of 1’s present in the binary representation of (3 × 512 + 7 × 64 + 5 × 8 + 3)10 is:
A. 8 B. 9 C. 10 D. 11
ugcnetjune2006ii
The program used to determine the round – trip delay between a workstation and a destination adress is :
A hash function f defined as f(key) = key mod 7, with linear probing it is used to insert the key
37, 38, 72, 48, 98, 11, 56 into a table index from 0 to 6. What will be the locations of 11:
A. 3 B. 4 C. 5 D. 6
ugcnetdec2005ii
In what tree, for every node the height of its left subtree and right subtree differ at least by one:
A. Binary search tree B. AVL -tree
C. Threaded binary tree D. Complete tree
ugcnetdec2005ii
A schema describes :
A. data elements B. records and files
C. record relationship D. all of the above
ugcnetdec2005ii
A. 3 B. 4 C. 5 D. 6
ugcnetjune2006ii
A. 2 B. 5 C. 13 D. 12
ugcnetdec2005ii
A. 35 B. 7 C. 42 D. 39
ugcnetdec2005ii
ugcnetdec2005ii
When an inventor is placed between both inputs of an S-R flip flop, the resulting flip flop is :
What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of
frame Delimiter fields?
A. 10 B. 9 C. 12 D. 11
ugcnetjune2006ii
Which traversal techniques lists the nodes of a binary search tree in ascending order?
A. post – order B. in – order
C. pre – order D. linear – order
ugcnetdec2005ii
Which data management language component enabled the DBA to define the schema components?
How much bandwidth is required to send 132 voice- grade channels by FDM on an international satellite system?
If the post fix form of a string is ABC + −D*, The actual string is:
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted as a child of
the node ”g”.
A. 1 B. 3 C. 7 D. 8
ugcnetjune2006ii
According to GATS (General Agreement on Trade and Services), higher education should be a commodity in the
A. domestic public sector B. domestic private sector
C. non-trading sector D. global marketplace
ugcnetdec2019i
ugcnetjune2006ii
A. A B. AC C. AD D. None of these
ugcnetjune2006ii
# define max (x, y)x = (x > y)?x : y is a macro definition, which can find the maximum of two numbers x and y if:
A. x and y are both integers only B. x and y are both declared as float only
C. x and y are both declared as double only D. x and y are both integers, float or double
ugcnetjune2006ii
while(num>=0)
ugcnetjune2006ii
35.0.367 UGCNET-June2006-II: 8 https://gateoverflow.in/335530
x
Let A = {x| − 1 < x < 1} = B. The function f(x) = from A to B is:
2
A. injective B. surjective
C. both injective and surjective D. neither injective nor surjective
ugcnetjune2006ii
A. q → p B. p → q
C. (q → p) ∨ (p → q) D. (p → q) ∨ (q → p)
ugcnetjune2006ii
For a complete graph with N vertices, the total number of spanning trees is given by:
A. 2N − 1 B. N N−1 C. N N−2 D. 2N + 1
ugcnetjune2006ii
Which of the following strings is in the language defined by grammar S → OA, A → 1A/0A/1
The mechanism with which several uses can share a medium without interference is :
A. Frequency modulation B. Amplitude modulation
C. Multiplexing D. None of these
ugcnetdec2005ii
Which of the following checks cannot be carried out on the input data to a system?
A. Consistency check B. Syntax check
C. Range check D. All the above
ugcnetdec2005ii
Which activities is not included in the first pass of two pass assembler?
A. build the symbol table B. construct the Intermediate code
C. separate memonic opcode and operand field. D. none of these
ugcnetdec2005ii
In processor management, round robin method essentially uses the preemptive version of_____.
MMS (Multimedia Messaging Service) uses ______ types of messages to perform messaging transactions.
A. 4 B. 6 C. 8 D. 10
ugcnetjune2006ii
The Register or main memory location which contains the effective address of the operand is known as:
A. Pointer B. Indexed register
C. Special Locations D. Scratch Pad
ugcnetdec2005ii
Downflow is the process associated with _____ and back up of data in a warehouse.
A. c = e − n + 2p B. c = e − n − 2p C. c = e + n + 2p D. c = e− n*2p
ugcnetjune2006ii
A page fault_____.
ugcnetjune2006ii
If you want to execute more than one program at a time, the systems software that are used must be capable of :
A. word processing B. virtual memory
C. compiling D. multitasking
ugcnetdec2005ii
Which technical concept sets cellular apart from all preceding mobile/ratio systems?
A. FM -Transmission B. Duplex Functionality
C. Frequency Reuse D. TDMA Technology
ugcnetjune2007ii
ugcnetdec2006ii
ugcnetjune2006ii
ugcnetdec2006ii
ugcnetdec2006ii
A. 960 − 985 MHz B. 935 − 960 MHz C. 920 − 945 MHz D. 930 − 955 MHz
ugcnetdec2006ii
ugcnetdec2006ii
A. a2 − b2 = 3 B. a2 − b2 = a − b
2 2
C. a − b = a + b D. a2 − b2 = 5
ugcnetdec2006ii
A. B. A−B=A ∩ ~ B C. D.
ugcnetdec2006ii
The U-NII (Unlicensed National Information Infrastructure) band operates at the _______frequency:
The action of passing the source program into the proper syntactic class is known as:
A. Syntax analysis B. Lexical analysis
C. Interpretation analysis D. Uniform symbol generation
ugcnetjune2006ii
Which of the following combination is preferred with respect to cohesion and coupling:
A. low and low B. low and high C. high and low D. high and high
ugcnetjune2007ii
Which of the following expression removes static hazard from a two level AND-OR gate implementation of xy + zx̄
Part of a program where the shared memory is accessed and which should be executed indivisibly, is called:
A. Semaphores B. Directory
C. Critical section D. Mutual exclusion
ugcnetjune2007ii
1. Quality of service
2. Routing
3. Addressing
4. Connection-oriented delivery
5. Framming bits
A. 1, 2, 3 B. 2, 3, 4 C. 1, 3, 4, 5 D. 2, 3, 4, 5
ugcnetjune2007ii
TDM is _____.
A. A primary /secondary type protocol B. A peer/peer protocol
C. A Non-priority peer/peer protocol D. A priority type protocol
ugcnetjune2007ii
1. Windowing
2. Routing
3. RPCs
4. Buffering
A. 1, 4 B. 2, 3, 4 C. 1, 3, 4 D. 1, 2, 3, 4
ugcnetjune2007ii
Which algorithm has some average, worst case and best case time:
A. Binary search B. Maximum of n numbers
C. Quick sort D. Fibonacci search
ugcnetjune2007ii
ugcnetjune2006ii
List I List II
(a) Physical layer (i) Provide token management service
(b) Transport layer
(ii) Concerned with transmitting raw bits
over a communication channel
(c) Session Layer (iii) Concerned with the syntax and
semantics of the information transmitted
(d) Presentation layer (iv) True end-to-end layer from source to
destination
ugcnetdec2019ii
List I List II
(a) Frame attribute (i) to create link in HTML
(b) <tr> tag (ii) for vertical alignment of content in cell
(c) Valign attribute (iii) to enclose each row in table
(d) <a> tag (iv) to specify the side of the table
frame that display border
Choose the correct option from those given below:
A. (a)-(i) , (b)-(ii), (c)-(iii), (d)-(iv) B. (a)-(ii) , (b)-(i), (c)-(iii), (d)-(iv)
C. (a)-(iv) , (b)-(iii), (c)-(ii), (d)-(i) D. (a)-(iii) , (b)-(iv), (c)-(ii), (d)-(i)
ugcnetdec2019ii
35.0.458 UGCNET-Dec2019-II: 27 https://gateoverflow.in/360806
Consider a paging system where translation look aside buffer ( TLB) a special type of associative memory is used with
hit ratio of 80%.
Assume that memory reference takes 80 nanoseconds and reference time to TLB is 20 nanoseconds. What will be the effective
memory access time given 80% hit ratio?
A. 110 nanoseconds B. 116 nanoseconds
C. 200 nanoseconds D. 100 nanoseconds
ugcnetdec2019ii
Suppose a system has 12 magnetic tape drives and at time t0 , three processes are allotted tape drives out of their need
as given below:
A. ⟨ p0 , p1 , p2 ⟩
B. ⟨ p1 , p0 , p2 ⟩
C. ⟨ p2 , p1 , p0 ⟩
D. ⟨ p0 , p2 , p1 ⟩
ugcnetdec2019ii
Match the Agile Process models with the task performed during the model:
List I List II
(a) Scrum (i) CRC cards
(b) Adaptive software development (ii) Sprint backlog
(c) Extreme programming (iii)<action> the <result> <by/for/of/to>
a(n) <object>
(d) Feature-driven development (iv) Time box release plan
ugcnetdec2019ii
Which of the following interprocess communication model is used to exchange messages among co-operative
processes?
A. Shared memory model B. Message passing model
C. Shared memory and message passing model D. Queues
ugcnetdec2019ii
According to the ISO − 9126 Standard Quality Model, match the attributes given in List-I with their definitions in
List-II:
List I List II
(a) Functionality(i) Relationship between level of
performance and amount of resources
(b) Reliability (ii) Characteristics related with
achievement of purpose
(c) Efficiency (iii) Effort needed to make for improvement
(d) Maintainability (iv) Capability of software to maintain
performance of software
ugcnetdec2019ii
A. P (A ∩ B) = P (A) P (B)
B. P (P ∪ B) = P (A) + P (B)
C. P (A ∪ B) ≤ P (A) + P (B)
D. P (A/B) = P (A ∩ B) + P (B)
ugcnetdec2005ii
Which of the following methods are used to pass any number of parameters to the operating system through system
calls?
A. Registers B. Block or table in main memory
C. Stack D. Block in main memory and stack
ugcnetdec2019ii
Consider the following statements with respect to approaches to fill area on raster systems:
P : To determine the overlap intervals for scan lines that cross the area
Q: To start from a given interior position and pain outward from this point until we encounter the specified boundary
conditions.
Select the correct answer from the options given below:
A. Only (b) and (a) B. Only (b) C. Only (b) and (c) D. Only (b) and (d)
ugcnetdec2019ii
An instruction is stored at location 500 with its address field at location 501. The address field has the value 400. A
processor register R1 contains the number 200. Match the addressing mode (List – I) given below with effective
address (List-II) for the given instruction:
List I List II
(a) Direct (i) 200
(b) Register indirect (ii) 902
(c) Index with R1 as the index register (iii) 400
(d) Relative (iv) 600
List I List II
(a) Isolated I/O (i) same set of control signal for I/O
and memory communication
(b) Memory mapped I/O (ii) separate instructions for I/O
and memory communication
(c) I/O interface (iii) requires control signals to be
transmitted between the
communicating units
(d) Asynchronous data transfer (iv) resolve the differences in central
computer and peripherals
A flow graph F with entry node (1) and exit node (11) is shown below:
A. 9 B. 10 C. 11 D. 12
ugcnetdec2019ii
35.0.476 UGCNET-June2007-II: 19 https://gateoverflow.in/335714
A. A B. AC C. AD D. None of these
ugcnetjune2007ii
Consider a subnet with 720 routers. If a three-level hierarchy is chosen, with eight clusters, each containing 9 regions
of 10 routers, then total number of entries in hierarchical table of each router is
A. 25 B. 27 C. 53 D. 72
ugcnetdec2019ii
Which of the following class of IP address has the last address as 223.255.255.255?
L e t A = {001, 0011, 11, 101} and B = {01, 111, 111, 010} . Similarly, let C = {00, 001, 1000} and
D = {0, 11, 011} .
Which of the following pairs have a post-correspondence solution?
A. Only pair (A, B) B. Only pair (C, D)
C. Both (A, B) and (C, D) D. Neither (A, B) nor (C, D)
ugcnetdec2019ii
A. L1 ⊆ L2 ⊆ L3 ⊆ L4
B. L2 ⊆ L1 ⊆ L3 ⊆ L4
C. L1 ⊆ L2 ⊆ L4 ⊆ L3
D. L2 ⊆ L1 ⊆ L4 ⊆ L3
ugcnetdec2019ii
35.0.482 UGCNET-Dec2019-II: 89 https://gateoverflow.in/360744
The sequence diagram given in Figure 1 for the Weather Information System takes place when an external system requests the
summarized data from the weather station. The increasing order of lifeline for the objects in the system are:
ugcnetdec2019ii
List I List II
(a) Micro operation (i) Specify micro operations
(b) Micro programmed control unit (ii) Improve CPU utilization
(c) Interrupts (iii) Control Memory
(d) Micro instruction (iv) Elementary operation performed
on data stored in registers
Choose the correct option from those given below:
A. (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i) B. (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
C. (a)-(iii), (b)-(iv), (c)-(i), (d)-(ii) D. (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
ugcnetdec2019ii
Let G = (V , T, S, P ) be any context-free grammar without any λ-productions or unit productions. Let K be the
maximum number of symbols on the right of any production in P . The maximum number of production rules for any
equivalent grammar in Chomsky normal form is given by:
A. (K − 1) ∣ P ∣ + ∣ T ∣ −1 B. (K − 1) ∣ P ∣ + ∣ T ∣
C. K ∣ P ∣ + ∣ T ∣ −1 D. K ∣ P ∣ + ∣ T ∣
Where ∣⋅∣ denotes the cardinality of the set.
ugcnetdec2019ii
A. Only (a) and (b) B. Only (a) and (c) C. only (b) and (c) D. (a), (b) and (c)
ugcnetdec2019ii
Which of the following binary codes for decimal digits are self complementing?
A. 8421 code B. 2421 code C. excess-3 code D. excess-3 gray code Choose the correct
option:
A. (a) and (b) B. (b) and (c) C. (c) and (d) D. (d) and (a)
ugcnetdec2019ii
Java Virtual Machine (JVM) is used to execute architectural neutral byte code. Which of the following is needed by
the JVM for execution of Java Code?
A. Class loader only B. Class loader and Java Interpreter
C. Class loader, Java Interpreter and API D. Java Interpreter only
ugcnetdec2019ii
Which of the following CPU scheduling algorithms is/are supported by LINUX operating system?
A. Non-preemptive priority scheduling B. Preemptive priority scheduling and time sharing CPU scheduling
C. Time sharing scheduling only D. Priority scheduling only
ugcnetdec2019ii
Two concurrent executing transactions T1 and T2 are allowed to update same stock item say ′ A′ in an uncontrolled
manner. In such scenario, following problems may occur:
a. Dirty read problem b. Lost update problem
c. Transaction failure d. Inconsistent database state
Which of the following option is correct if database system has no concurrency module and allows concurrent execution of
above two transactions?
A. (a), (b) and (c) only B. (c) and (d) only
C. (a) and (b) only D. (a), (b) and (d) only
ugcnetdec2019ii
A network with bandwidth of 10 Mbps can pass only an average of 12, 000 frames per minute with each frame
carrying an average of 10, 000 bits. What is the throughput of this network?
A. 1, 000, 000 bps B. 2, 000, 000 bps
C. 12, 000, 000 bps D. 1, 200, 00, 000 bps
ugcnetdec2019ii
The time complexity to multiply two polynomials of degree n using Fast Fourier transform method is:
Which of the component module of DBMS does rearrangement and possible ordering of operations, eliminate
redundancy in query and use efficient algorithms and indexes during the execution of a query?
A. query compiler B. query optimizer
C. Stored data manager D. Database processor
ugcnetdec2019ii
A counting semaphore is initialized to 8. 3 wait ( ) operations and 4 signal ( ) operations are applied. Find the current
value of semaphore variable.
A. 9 B. 5 C. 1 D. 4
ugcnetdec2019ii
S → 0A ∣ 0BB
A → 00A ∣ λ
B → 1B ∣ 11C
C→B
Which language does this grammar generate?
A. L((00)∗ 0 + (11)∗ 1) B. L(0(11)∗ + 1(00)∗ )
C. L((00)∗ 0) D. L(0(11)∗ 1)
ugcnetdec2019ii
ugcnetdec2019ii
Consider the language L = {an bn−3 ∣ n > 2} on Σ = {a, b} . Which one of the following grammars generates the
language L?
A. S → aA ∣ a, A → aAb ∣ b
B. S → aaA ∣ λ, A → aAb ∣ λ
C. S → aaaA ∣ a, A → aAb ∣ λ
D. S → aaaA, A → aAb ∣ λ
ugcnetdec2019ii
When using Dijkstra’s algorithm to find shortest path in a graph, which of the following statement is not true?
A. It can find shortest path within the same graph data structure
B. Every time a new node is visited, we choose the node with smallest known distance/ cost (weight) to visit first
C. Shortest path always passes through least number of vertices
D. The graph needs to have a non-negative weight on every edge
ugcnetdec2019ii
What are the greatest lower bound (GLB) and the least upper bound (LUB) of the sets A = {3, 9, 12} and
B = {1, 2, 4, 5, 10} if they exist in poset (z + , /) ?
ugcnetdec2019ii
Consider a weighted directed graph. The current shortest distance from source S to node x is represented by d[x]. Let
d[v] = 29, d[u] = 15, w[u, v] = 12. What is the updated value of d[v] based on current information?
A. 29 B. 27 C. 25 D. 17
ugcnetdec2019ii
Give asymptotic upper and lower bound for T(n) given below. Assume T(n) is constant for n ≤ 2 .
T(n) = 4T(√−
n) + lg2 n
A. T(n) = θ(lg(lg2 n) lg n)
B. T(n) = θ(lg2 n lg n)
C. T(n) = θ(lg2 n lg lg n)
D. T(n) = θ(lg(lg n) lg n)
ugcnetdec2019ii
In a B-Tree, each node represents a disk block. Suppose one block holds 8192 bytes. Each key uses 32 bytes. In a B-
tree of order M there are M − 1 keys. Since each branch is on another disk block, we assume a branch is of 4 bytes.
The total memory requirement for a non-leaf node is
A. 32M − 32 B. 36M– 32
C. 36M– 36 D. 32M– 36
ugcnetdec2019ii
What is the worst case running time of Insert and Extract-min, in an implementation of a priority queue using an
unsorted array? Assume that all the insertions can be accomodated.
A. θ(1), θ(n) B. θ(n), θ(1)
C. θ(1), θ(1) D. θ(n), θ(n)
ugcnetdec2019ii
Let a2c mod n = (ac )2 mod n and a2c+1 mod n = a ⋅ (ac )2 mod n. For a = 7 , b = 17 and n = 561 , What is the
value of ab (mod n)?
An _______ chart is a project schedule representation that presents project plan as a directed graph. The critical path is
the __________ sequence of ________ tasks and it defines project ________.
A. Activity, Shortest, Independent, Cost B. Activity, Longest, Dependent, Duration
C. Activity, Longest, Independent, Duration D. Activity, Shortest, Dependent, Duration
ugcnetdec2019ii
Let P be the set of all people. Let R be a binary relation on P such that (a, b) is in R if a is a brother of b. Is R
symmetric transitive, an equivalence relation, a partial order relation?
A. NO, NO, NO, NO B. NO, NO, YES, NO
C. NO, YES, NO, NO D. NO, YES, YES, NO
ugcnetdec2019ii
A. (a) and (b) B. (b) and (c) C. (b) and (d) D. (a) and (d)
ugcnetdec2019ii
A rectangle is bound by the lines x = 0; y = 0; x = 5 and y = 3 . The line segment joining (−1, 0) and (4, 5), if
clipped against this window will connect the points __________.
A. (0, 1) and (3, 3) B. (0, 1) and (2, 3) C. (0, 1) and (4, 5) D. (0, 1) and (3, 5)
ugcnetdec2019ii
h(w) = zxyy
If L is the regular language denoted by r = (w + x∗ )(ww)∗ , then the regular language h(L) is given by
The Data Encryption Standard (DES) has a function consists of four steps. Which of the following is correct order of
these four steps?
ugcnetdec2019ii
A micro instruction format has microoperation field which is divided into 2 sunbfields F1 and F2 , each having 15
distinct microoperations, condition field CD for four status bits, branch field BR having four options used in
conjunction with address field AD. The address space is of 128 memory words. The size of micro instruction is:
A. 19 B. 18 C. 17 D. 20
ugcnetdec2019ii
If we want to resize a 1024 × 768 pixels image to one that is 640 pixels wide with the same aspect ratio, what would
be the height of the resized image?
Which tag is used to enclose any number of javascript statements in HTML document?
A. <code> B. <script>
C. <title> D. <body>
ugcnetdec2019ii
A tree has 2n vertices of degree 1, 3n vertices of degree 2, n vertices of degree 3. Determine the number of vertices
and edges in tree.
Let A be the base class in C++ and B be the derived class from A with protected inheritance. Which of the following
statement is false for class B?
ugcnetdec2019ii
A. 6 B. 5 C. 4 D. 3
ugcnetdec2019ii
The following program is stored in the memory unit of the basic computer. Give the content of accumulator register in
hexadecimal after the execution of the program.
Location Instruction
010 CLA
011 ADD 016
012 BUN 014
013 HLT
014 AND 017
015 BUN 013
016 C1A5
017 93C6
A. 3 B. 6 C. 7 D. 5
ugcnetdec2019ii
A computer uses a memory unit of 512 K words of 32 bits each. A binary instruction code is stored in one word of the
memory. The instruction has four parts: an addressing mode field to specify one of the two-addressing mode (direct and
indirect), an operation code, a register code part to specify one of the 256 registers and an address part. How many bits are
there in addressing mode part, opcode part, register code part and the address part?
A. 1, 3, 9, 19 B. 1, 4, 9, 18 C. 1, 4, 8, 19 D. 1, 3, 8, 20
ugcnetdec2019ii
Given two tables R1(x, y) and R2(y, z) with 50 and 30 number of tuples respectively. Find maximum number of
tuples in the output of natural join between tables R1 and R2 i.e. R1 ∗ R2? ( ∗- Natural Join)
A. 30 B. 20 C. 50 D. 1500
ugcnetdec2019ii
A. 24 B. 212 C. 42 D. 2
ugcnetdec2019ii
Piconet is a basic unit of a bluetooth system consisting of __________ master node and up to _________ active slave
nodes.
In a system for a restaurant, the main scenario for placing order is given below:
A. 3 B. 4 C. 5 D. 6
ugcnetdec2019ii
A. (a) and (b) B. (b) and (c) C. (a) and (d) D. (c) and (d)
ugcnetdec2019ii
A fuzzy conjuction operators, t(x, y), and a fuzzy disjunction operator, s(x, y), form a pair if they satisfy:
t(x, y) = 1 − s(1 − x, 1 − y).
xy
If t(x, y) = then s(x, y) is given by
(x + y − xy)
x+y x + y − 2xy x + y − xy x + y − xy
A. B. C. D.
1 − xy 1 − xy 1 − xy 1 + xy
ugcnetdec2019ii
35.0.534 UGCNET-Dec2007-II: 43 https://gateoverflow.in/335741
Let the population of chromosomes in genetic algorithm is represented in terms of binary number. The strength of
fitness of a chromosome in decimal form, x, is given by
f(x)
Sf(x) = where f(x) = x2
Σf(x)
The population is given by P where:
P = {(01101, (11000), (01000), (10011)}
The strength of fitness of chromosome (11000) is ________
ugcnetdec2019ii
ugcnetdec2019ii
A. Whoami B. wc C. Is D. put
ugcnetjune2005ii
35.0.540 UGCNET-Dec2019-I: 47 https://gateoverflow.in/360685
ugcnetjune2007ii
Rashtriya Uchhatar Shiksha Abhiyan (RUSA) aims to achieve the following in Higher Education System:
a. Equity b. Access
c. 50% GER d. Excellence
Choose the correct option from those given below:
A. a, b and c B. a, c and d
C. a, b and d D. b, c and d
ugcnetdec2019i
ugcnetdec2019i
Let Wij represents weight between node i at layer k and node j at layer (k − 1) of a given multilayer perceptron. The
weight updation using gradient descent method is given by
∂E
A. Wij (t + 1) = Wij (t) + α ,0 ≤ α ≤ 1
∂Wij
∂E
B. Wij (t + 1) = Wij (t) − α ,0 ≤ α ≤ 1
∂Wij
∂E
C. Wij (t + 1) = α ,0 ≤ α ≤ 1
∂Wij
∂E
D. Wij (t + 1) =– α ,0 ≤ α ≤ 1
∂Wij
Where α and E represents learning rate and Error in the output respectively.
ugcnetdec2019ii
35.0.548 UGCNET-Dec2019-II: 64 https://gateoverflow.in/360769
The order of schema ?10?101? and ???0??1 are _______ and _______ respectively.
A. 5, 3 B. 5, 2 C. 7, 5 D. 8, 7
ugcnetdec2019ii
Amongst the logic families DTL, TTL, ECL and CMOS , the family with the least power dissipation is :
A. CMOS B. DT L C. T T L D. ECL
ugcnetdec2007ii
ugcnetdec2007ii
ugcnetdec2007ii
A. 14 B. 17 C. 111 D. 112
ugcnetdec2019ii
ugcnetdec2007ii
The name of the transaction file shall be provided by the operator and the file that contains the edited transactions ready
for execution shall be called
(D) Edit.Exe
ugcnetdec2009ii databases acid-properties
Match each Artificial Intelligence term in List-I that best describes a given situation in List-II :
List-I List-II
I. Semantic Network
a. Knowledge about what to do as
opposed to how to do it
II. Frame b. A premise of rule that is not concluded
by any rule
III. Declarative Knowledge c. A method of knowledge representation that
uses a graph
IV. Primitive d. A data structure representing stereotypical
knowledge
Codes :
A. I-d, II-a, III-b, IV-c B. I-d, II-c, III-a, IV-b
C. I-d, II-c, III-b, IV-a D. I-c, II-d, III-a, IV-b
ugcnetaug2016iii artificial-intelligence
A. q n B. q t C. q −n D. q −t
ugcnetjan2017iii binary-codes
Given a binary tree whose inorder and preorder traversal are given by
Inorder : EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
A. I E F C G J K H D B B. I E F C J G K H D B
C. I E F C G K J H D B D. I E F C G J K D B H
ugcnetjune2011ii algorithms binary-tree
¯¯¯¯
The Boolean expression AB + A¯B
¯¯¯
+ AC + AC is unaffected by the value of the Boolean variable _________.
A. A B. B C. C D. A, B and C
ugcnetdec2019ii digital-logic boolean-algebra
Assume that each alphabet can have a value between 0 to 9 in a cryptoarithmetic problem
Data mining is
A. The process of extracting valid, previously unknown, comprehensible and actionable information from large databases and
using it to make crucial business decisions.
B. A tool that allows end users direct access and manipulation of data from within datawarehousing environment without the
intervention of customised programming activity.
C. A tool that helps end users extract useful business information from large database.
D. All of the above
_______ is subject oriented, integrated, time variant, nonvolatile collection of data in support of management decisions.
A. Data mining B. Web mining
C. Data warehouse D. Database Management System
ugcnetaug2016ii data-warehousing
If the histogram of an image is clustered towards origin on X-axis of a histogram plot then it indicates that the image is
______.
Consider the formula in image processing RD = 1 − C1 where CR = nn12 . CR is called as compression ratio n1
R
and n2 denotes the number of information carrying units in two datasets that represent the same information. In this
situation RD is called as relative ____ of the first data set.
A. Data Compression B. Data Redundancy
C. Data Relation D. Data Representation
ugcnetdec2013iii digital-image-processing
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a), (b) and (c)
ugcnetaug2016iii linear-programming duality
Which is the most valuable electronic commerce to the individual customer in long run ?
A. Business to Customer B. Business to Business
C. Customer to Customer D. None of the above
ugcnetjune2011ii e-technologies e-commerce
E-Choupal refers to
ugcnetdec2010ii e-technologies
"M-Commerce" refers to
ugcnetjune2011ii e-technologies
Which of the following substitution technique have the relationship between a character in the plaintext and a character
in the ciphertext as one-to-many?
A. Monoalphabetic B. Polyalphabetic
C. Transpositional D. None of the above
ugcnetsep2013ii cryptography encryption-decryption
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the
A. Public key of user A B. Public key of user B
C. Private key of user A D. Private key of user B
ugcnetsep2013iii cryptography encryption-decryption
Consider the following Entity-Relationship (E − R) diagram and three possible relationship sets (I, IIandIII) for
this E − R diagram:
If different symbols stand for different values (e.g., t1 is definitely not equal to t2 ), then which of the above could not be the
relationship set for the E − R diagram ?
What are the following sequence of steps taken in designing a fuzzy logic machine ?
x1 x2 x3 x4
Let A be a set of comfortable houses given as A = {{ 0.8 , 0.9 , 0.1 , 0.7 }}and be the set of affordable houses
x1 x2 x3 x4
B = {{ 0.9 , 0.8 , 0.6 , 0.2 }Then
} the set of comfortable and affordable houses is
x1 x2 x3 x4
A. {{ 0.8 , 0.8 , 0.1 , 0.2 }}
x1 x2 x3 x4
B. {{ 0.9 , 0.9 , 0.6 , 0.7 }}
x1 x2 x3 x4
C. {{ 0.8 , 0.8 , 0.6 , 0.7 }}
x1 x2 x3 x4
D. {{ 0.7 , 0.7 , 0.7 , 0.9 }}
A. B. C. D.
A. {0.2, 0.5, 0.6, 0.7, 0.9} B. {0.2, 0.5, 0.2, 0.1, 0.8}
C. {0.1, 0.5, 0.6, 0.1, 0.8} D. {0.1, 0.5, 0.2, 0.1, 0.8}
ugcnetdec2013iii fuzzy-sets
To organize discussion method in teaching effectively, which of the following conditions should be met?
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of the
painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the time he
lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon of investigation
in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on accurate details. In
painting and sculpture, artists focussed on not so casual but verifiable and minute details. Michaelangelo’s paintings are no
exception to it. In a study published in the journal of the Royal Society of medicine, a group of surgeons are of the opinion that
the great master was “afflicted by an illness involving his joints”. They have used his portraits as evidence to argue their view.
During his life, he complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors
would find to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They attribute the
pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master was seen hammering
days before his death at an old age, he did not write or sign his own letters before his death. In recent times there have been
attempts to diagnose famous artists with diseases that were not known during their time. This practice has raised many
questions, especially on the issue of ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted
in his work until his last days. This theory would emphasize that his artistic subject defined his physical infirmities.
Michaelangelo lived during a time that lets us know that
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of the
painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the time he
lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon of investigation
in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a accurate details. In
painting and sculpture, artists focussed on not so casual but verifiable and minute details. Michaelangelo’s paintings are no
exception to it. In a study published in the journal of the Royal Society of medicine, a group of surgeons are of the opinion that
the great master was “afflicted by an illness involving his joints”. They have used his portraits as evidence to argue their view.
During his life, he complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors
would find to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They attribute the
pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master was seen hammering
days before his death at an old age, he did not write or sign his own letters before his death. In recent times there have been
attempts to diagnose famous artists with diseases that were not known during their time. This practice has raised many
questions, especially on the issue of ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted
in his work until his last days. This theory would emphasize that his artistic subject defined his physical infirmities.
Renaissance painting in Europe was sceptical of
A. The obsessive medieval method of accuracy B. The classical simplicity and lack of control
C. The case and decorative excess of earlier art D. Expressionist technique
ugcnetjune2019-i general-awareness passage-reading
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of the
painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the time he
lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon of investigation
in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a accurate details. In
painting and sculpture, artists focussed on not so casual but verifiable and minute details. Michaelangelo’s paintings are no
exception to it. In a study published in the journal of the Royal Society of medicine, a group of surgeons are of the opinion that
the great master was “afflicted by an illness involving his joints”. They have used his portraits as evidence to argue their view.
During his life, he complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors
would find to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They attribute the
pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master was seen hammering
days before his death at an old age, he did not write or sign his own letters before his death. In recent times there have been
attempts to diagnose famous artists with diseases that were not known during their time. This practice has raised many
questions, especially on the issue of ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted
in his work until his last days. This theory would emphasize that his artistic subject defined his physical infirmities.
The controversy that the passage above refers to is whether
A. Michaelangelo worked under duress
B. Michaelangelo could contain his physical infirmity by artistic excellence
C. Michaelangelo submitted to disease
D. Michaelangelo survived different diseases before pursuing art
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of the
painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the time he
lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon of investigation
in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a accurate details. In
painting and sculpture, artists focussed on not so casual but verifiable and minute details. Michaelangelo’s paintings are no
exception to it. In a study published in the journal of the Royal Society of medicine, a group of surgeons are of the opinion that
the great master was “afflicted by an illness involving his joints”. They have used his portraits as evidence to argue their view.
During his life, he complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors
would find to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They attribute the
pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master was seen hammering
days before his death at an old age, he did not write or sign his own letters before his death. In recent times there have been
attempts to diagnose famous artists with diseases that were not known during their time. This practice has raised many
questions, especially on the issue of ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted
in his work until his last days. This theory would emphasize that his artistic subject defined his physical infirmities.
What generalisations do people subscribe to?
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of the
painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the time he
lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon of investigation
in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a accurate details. In
painting and sculpture, artists focussed on not so casual but verifiable and minute details. Michaelangelo’s paintings are no
exception to it. In a study published in the journal of the Royal Society of medicine, a group of surgeons are of the opinion that
the great master was “afflicted by an illness involving his joints”. They have used his portraits as evidence to argue their view.
During his life, he complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors
would find to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They attribute the
pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master was seen hammering
days before his death at an old age, he did not write or sign his own letters before his death. In recent times there have been
attempts to diagnose famous artists with diseases that were not known during their time. This practice has raised many
questions, especially on the issue of ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted
in his work until his last days. This theory would emphasize that his artistic subject defined his physical infirmities.
What actually may be concluded from the above passage?
The dance of the honeybee conveying to other bees where nector will be found is an example of
A. Mass communication B. Group communication
C. Interpersonal communication D. Intrapersonal communication
ugcnetjune2019-i general-awareness
Choose the correct sequence of communication from the options given below:
ugcnetjune2019-i general-awareness
1. To transmit culture
2. To formulate national policies
3. To help the judiciary take its decision
4. To stabilise the share market
ugcnetjune2019-i general-awareness
In a classroom situation, a teacher organises group discussion to help arrive at a solution of a problem. In terms of a
model communication used, it will be called
A. A transaction model B. An interaction model
C. A horizontal model D. A linear model
ugcnetjune2019-i general-awareness
From the list of the effective teaching behaviours, identify those which are called key behaviours.
Which of the following is a type of malware intentionally inserted into a software system that will setoff a malicious
function when specified conditions are met?
A. An OS controls peripherals, allocates memory and organises data into fields and records
B. An OS provides protection against viruses and controls peripherals
C. An OS controls peripheral, and allocates memory and processor time
D. An OS controls the procesor and peripherals and allows user to connect to the Internet
ugcnetjune2019-i general-awareness
Select the option that shows the storage devices in order of capacity from lowest to highest
A. CD-ROM, DVD-ROM, Blu-ray B. Blu-ray, CD-ROM, DVD-ROM
C. DVD-ROM, Blu-ray, CD-ROM D. DVD-ROM, CD-ROM, Blu-ray
ugcnetjune2019-i general-awareness
ugcnetjune2019-i general-awareness
ugcnetjune2019-i general-awareness
In the last few years, India has been affected by which of the following tropical cyclones?
A. Gaja, Hudhud, Bhima B. Hudhud, Bhima, Ockhi
C. Gaja, Hudhud, Ockhi D. Gaja, Bhima, Ockhi
ugcnetjune2019-i general-awareness
Which of the following are priority areas in relation to the Sustainable Development Goals?
A. No poverty B. Zero hunger Choose
C. Reducing urbanization D. Peace, justice and strong institutions the correct
answer from the options
given below :
A. a, b, c B. a, c, d C. b, c, d D. a, b, d
ugcnetjune2019-i general-awareness
Assertion (A) : Methemoglobinemia is a condition in which blood is not able to carry and deliver enough oxygen to the
body.
Reason (R) : Consuming drinking water with high nitrate levels may cause methemoglobinemia.
Choose the correct answer from the options given below :
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is not the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnetjune2019-i general-awareness
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is not the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnetjune2019-i general-awareness
In post independence India, which one of the following committee/commission’s report deals with all levels of
education in India?
A. Sargeant Commission B. Hartog Committee
C. Kothari Commission D. Radhakrishnan Commission
ugcnetjune2019-i general general-awareness
The Education Commission of India that first took serious note of the problem of Brain Drain was
A. The Education Commission of India B. The University Education Commission
C. The Calcutta University Commission D. The Sargeant Commission
ugcnetjune2019-i general-awareness
Which one of the following instructional designs is not a part of SWAYAM launched by Government of India?
A. E-tutorial B. E-Content
C. Physical interaction D. Discussion Forum
ugcnetjune2019-i general-awareness
Which among the following best describes the Emotional Intelligence of learners?
A. Only i and ii B. Only ii and iii C. Only iii D. Only i and iii
ugcnetjune2019-i general-awareness
The research design is specifically related to which of the following features in research?
i. Sample selection
ii. Formulation of a plan
iii. Deciding about the tool for data collection
iv. Hypothesis making
v. Choice of a field of inquiry
Through which research method, the manipulation of an independent variable and its effect on dependent variable is
examined with reference to a hypothesis under controlled conditions?
A. Ex-post facto research B. Descriptive research
C. Case study research D. Experimental research
ugcnetjune2019-i general-awareness
In which of the following research studies interpretation and meaning get more attention than formulation of
generalisations?
i. Historical studies
ii. Survey studies
iii. Philosophical studies
iv. Ethnographic studies
v. Hypothetico – deductive studies
vi. Ex-post facto studies
The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack
(without further movement of the arm with multiple heads)
A. A plate of data B. A cylinder of data
C. A track of data D. A block of data
ugcnetdec2011ii operating-system system hard-disk-drive
A hash table has space for 75 records, then the probability of collision before the table is 6% full.
(√5−1
Consider a hash table of size m = 10000 and the hash function h(k) = ⌊m(KA mod 1)′ ⌋ for A = 2 . The
location to the key k = 123456 is
A. 46 B. 47 C. 41 D. 43
ugcnetjune2011ii data-structures hashing
As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS),
purchase method has following advantage:
A. It has high level of flexibility B. It does not require cash up-front
C. It is a business investment D. Little risk of obsolescence
ugcnetdec2015iii information-system
Which one of the items listed below is not one of the software engineering layers ?
A. 6 B. 8 C. 10 D. 12
ugcnetaug2016iii linear-programming
35.40.2 Linear Programming: UGCNET-Jan2017-III: 70 https://gateoverflow.in/335168
ugcnetjan2017iii linear-programming
At any iteration of simplex method if Δj(Zj– Cj) corresponding to any non-basic variable Xj is obtained as zero, the
solution under the test is
A. Degenerate solution B. Unbounded solution
C. Alternative solution D. Optimal solution
ugcnetjune2013iii linear-programming
Object modules generated by assembler that contains unresolved external references are resolved for two or more
object module by a/an
ugcnetjune2014iii microprocessors
A micro-instruction format has micro-ops field which is divided into three subfields F1, F2, F3 each having seven
distinct micro operations, condition field CD for four status bits, branch field BR having four options used in
conjunction with address field ADF. The address space is of 128 memory locations. The size of micro-instruction is :
The weight of minimum spanning tree in graph G, calculated using Kruskal’s algorithm is:
A. 14 B. 15 C. 17 D. 18
ugcnetdec2019ii algorithms minimum-spanning-trees
In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is
Which of the following statements is incorrect for a Windows Multiple Document Interface (MDI) ?
A. Each document in an MDI application is displayed in a separate child window within the client area of the application’s
main window.
B. An MDI application has three kinds of windows namely a frame window, an MDI client window and number of child
windows.
C. An MDI application can support more than one kind of document.
D. An MDI application displays output in the client area of the frame window.
Suppose database table T1(P , R) currently has tuples (10, 5), (15, 8), (25, 6) and table T2(A, C) currently has
(10, 6), (25, 3), (10, 5). Consider the following three relational algebra queries RA1, RA2 and RA3:
RA1 :T1 ⋈T1.P=T2.A T2 where ⋈ is natural join symbol
RA2 :T1 =⋈T1.P=T2.A T2 where =⋈ is left outer join symbol
RA3 :T1 ⋈T1.P=T2.A and T1.R=T2.C T2
The number of tuples in the resulting table of RA1, RA2 and RA3 are given by :
A. 2, 4, 2 respectively B. 2, 3, 2 respectively
C. 3, 3, 1 respectively D. 3, 4, 1 respectively
ugcnetaug2016iii databases natural-join
STRIPS addresses the problem of efficiently representing and implementation of a planner. It is not related to which
one of the following?
Which of the following switching techniques is most suitable for interactive traffic ?
A. Circuit switching B. Message switching
C. Packet switching D. All of the above
ugcnetjune2011ii computer-networks network-switching
A fuzzy set A on R is ______ iff A(λx1 + (1 − λ)x2 ) ≥ min[A(x1 ), A(x2 )] for all x1 , x2 ∈ R and all λ ∈ [0, 1]
where minimum denotes the minimum operator.
A. Support
B. α - cut
C. Convex
D. Concave
A. {0.9, 0.5, 0.6, 0.8, 0.8} B. {0.6, 0.2, 0.1, 0.7, 0.5}
C. {0.1, 0.5, 0.4, 0.2, 0.2} D. {0.1, 0.5, 0.4, 0.2, 0.3}
ugcnetjune2013iii neural-network fuzzy-sets
Consider the two class classification task that consists of the following points:
Class C1 : [1 1.5] [1 -1.5]
Class C2 : [-2 2.5] [-2 -2.5]
The decision boundary between the two classes using single perceptron is given by:
Suppose the function y and a fuzzy integer number around - 4 for x are given as y = (x − 3)2 + 2 . Around - 4 ={(2,
0.3), (3, 0.6), (4, 1), (5, 0.6), (6, 0.3)} respectively. Then f(Around-4) is given by
A. {(2, 0.6), (3, 0.3), (6, 1), (11, 0.3)} B. {(2, 0.6), (3, 1), (6, 1), (11, 0.3)}
C. {(2, 0.6), (3, 1), (6, 0.6), (11, 0.3)} D. {(2, 0.6), (3, 0.3), (6, 0.6), (11, 0.3)}
ugcnetjune2015iii fuzzy-sets neural-network
x1 x2 x3 x4 x5
Support of a fuzzy set A = {{ 0.2 , 0.15 , 0.9 , 0.95 , 0.15 }within
} a universal set X is given as
x1 x2 x3 x4 x5
A. {{ 0.15 , 0.15 , 0.15 , 0.15 , 0.15 }}
x1 x2 x3 x4 x5
B. {{ 0.95 , 0.95 , 0.95 , 0.915 , 0.95 }}
C. {x3 , x4 }
D. {x1 , x2 , x3 , x4 , x5 }
A non-pipelined system takes 30ns to process a task. The same task can be processed in a four-segment pipeline with a
clock cycle of 10ns. Determine the speed up of the pipeline for 100 tasks.
A. 3 B. 4 C. 3.91 D. 2.91
ugcnetdec2019ii co-and-architecture pipelining
A relationship between processes such that each has some part (critical section) which must not be executed while the
critical section of another is being executed, is known as
A. Semaphore B. Mutual exclusion
C. Multiprogramming D. Message passing
ugcnetjune2011ii operating-system process-scheduling
A. 3 B. 4 C. 2 D. 5
ugcnetjune2011ii operating-system process-scheduling
The golden ratio φ and its conjugate φ̄ both satisfy the equation
A. x3 – x − 1 = 0 B. x3 + x − 1 = 0 C. x2 – x − 1 = 0 D. x2 + x − 1 = 0
ugcnetjune2013iii quadratic-equations
When the priority queue is represented by max heap, the insertion and deletion of an element can be performed in
(queue containing n elements)
A. θ(n) and θ(1) respectively B. θ(n) and θ(n) respectively
C. θ(1) and θ(1) respectively D. None of the above
ugcnetjune2011ii data-structures queue heap
A. Is a graph-based method of knowledge representation where nodes represent concepts and arcs represent relations between
concepts.
B. Is a graph-based method of knowledge representation where nodes represent relations between concepts and arcs represent
concepts.
C. Represents an entity as a set of slots and associated rules.
D. Is a subset of first-order logic.
f(t){1, t > 0 0, t ≤ 0
The above perception can solve
Verification:
A. refers to the set of activities that ensure that software correctly implements a specific function
B. Gives answer to the question - Are we building the right product
C. requires execution of software
D. both A and B
Which command classes text file, which has been created using "SET ALTERNATIVE" "Command" ?
A. SET ALTERNATE OFF B. CLOSE DATABASE
C. CLOSE ALTERNATE D. CLEAR ALL
ugcnetdec2011ii databases sql
Which of the following statements is true, when structure of database file with 20 records is modified ?
A. ? EOF ( ) Prints. T B. ? BOF ( ) Prints F
C. ? BOF ( ) Prints T D. ? EOF ( ) Prints F
ugcnetdec2011ii databases sql
35.68.4 Sql: UGCNET-Dec2011-II: 25 https://gateoverflow.in/63675
The SQL Expression Select distinct T . branch name from branch T , branch S where T . assets > S . assets and S .
branch-city = DELHI, finds the name of
A. All branches that have greater asset than any branch located in DELHI.
B. All branches that have greater assets than allocated in DELHI.
C. The branch that has the greatest asset in DELHI.
D. Any branch that has greater asset than any branch located in DELHI.
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a), (b) and (c)
ugcnetaug2016iii linear-programming transportation-problem
A basic feasible solution to a m-origin, n-destination transportation problem is said to be ______ if the number of
positive allocations are less than m+n-1.
The total transportation cost in an initial basic feasible solution to the following transportation problem using Vogel’s
Approximation method is
W1 W2 W3 W4 W5 Supply
F1 4 2 3 2 6 8
F2 5 4 5 2 1 12
F3 6 5 4 7 3 14
Demand 4 4 6 8 8
A. 76 B. 80 C. 90 D. 96
ugcnetjune2013iii linear-programming transportation-problem
Consider the following operations to be performed in Unix : "The pipe sorts all files in the current directory modified in
the month of "June" by order of size and prints them to the terminal screen. The sort option skips ten fields then sorts
the lines in numeric order." Which of the following Unix command will perform above set of operations ?
ugcnetaug2016iii unix
Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX ?
I. It is used to set or change the priority of a process.
II. A process’s nice value can be set at the time of creation.
III. ‘nice’ takes a command line as an argument.
A. I, II only B. II, III only C. I, II, III D. I, III only
ugcnetaug2016iii unix
A. IS − X B. IS C. IS − 1 D. IS − f − X
ugcnetdec2010ii unix
Which of the following set of Unix commands will always display “WELCOME”?
ugcnetsep2013ii unix
Virtual memory is
A. Related to virtual reality B. A form of ROM
C. A form of RAM D. None of the above
ugcnetjune2011ii co-and-architecture virtual-memory
All the classes necessary for windows programming are available in the module :
(I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000.
Which of the following is true?
A. only (I)
B. only (II)
C. both (I) and (II)
D. None of the above
ugcnetdec2008ii windows
WOW32 is a
ugcnetjune2015iii windows-programming
A. Recycle
B. My Computer
C. Internet explorer
D. None of the above
ugcnetjune2009ii windows-programming
Answer Keys
35.0.1 Q-Q 35.0.2 Q-Q 35.0.3 B 35.0.4 B 35.0.5 D
35.0.6 A 35.0.7 D 35.0.8 Q-Q 35.0.9 Q-Q 35.0.10 Q-Q
35.0.11 Q-Q 35.0.12 Q-Q 35.0.13 Q-Q 35.0.14 B 35.0.15 Q-Q
35.0.16 Q-Q 35.0.17 Q-Q 35.0.18 D 35.0.19 Q-Q 35.0.20 Q-Q
35.0.21 Q-Q 35.0.22 D 35.0.23 Q-Q 35.0.24 Q-Q 35.0.25 Q-Q
35.0.26 Q-Q 35.0.27 Q-Q 35.0.28 Q-Q 35.0.29 Q-Q 35.0.30 Q-Q
35.0.31 Q-Q 35.0.32 Q-Q 35.0.33 Q-Q 35.0.34 D 35.0.35 C
35.0.36 Q-Q 35.0.37 D 35.0.38 B 35.0.39 Q-Q 35.0.40 Q-Q
35.0.41 Q-Q 35.0.42 Q-Q 35.0.43 Q-Q 35.0.44 Q-Q 35.0.45 D
35.0.46 Q-Q 35.0.47 B 35.0.48 B 35.0.49 C 35.0.50 D
35.0.51 D 35.0.52 D 35.0.53 B 35.0.54 D 35.0.55 B
35.0.56 B 35.0.57 A 35.0.58 C 35.0.59 C 35.0.60 Q-Q
35.0.61 A 35.0.62 A 35.0.63 A 35.0.64 D 35.0.65 D
35.0.66 B 35.0.67 C 35.0.68 B 35.0.69 Q-Q 35.0.70 Q-Q
35.0.71 C 35.0.72 Q-Q 35.0.73 Q-Q 35.0.74 Q-Q 35.0.75 Q-Q
35.0.76 Q-Q 35.0.77 Q-Q 35.0.78 Q-Q 35.0.79 Q-Q 35.0.80 Q-Q
35.0.81 Q-Q 35.0.82 Q-Q 35.0.83 Q-Q 35.0.84 Q-Q 35.0.85 Q-Q
35.0.86 Q-Q 35.0.87 Q-Q 35.0.88 Q-Q 35.0.89 Q-Q 35.0.90 Q-Q
35.0.91 Q-Q 35.0.92 Q-Q 35.0.93 Q-Q 35.0.94 Q-Q 35.0.95 Q-Q
35.0.96 Q-Q 35.0.97 Q-Q 35.0.98 Q-Q 35.0.99 Q-Q 35.0.100 Q-Q
35.0.101 Q-Q 35.0.102 Q-Q 35.0.103 Q-Q 35.0.104 Q-Q 35.0.105 Q-Q
35.0.106 Q-Q 35.0.107 Q-Q 35.0.108 Q-Q 35.0.109 Q-Q 35.0.110 Q-Q
35.0.111 Q-Q 35.0.112 Q-Q 35.0.113 Q-Q 35.0.114 Q-Q 35.0.115 B
35.0.116 Q-Q 35.0.117 Q-Q 35.0.118 Q-Q 35.0.119 Q-Q 35.0.120 Q-Q
35.0.121 Q-Q 35.0.122 Q-Q 35.0.123 Q-Q 35.0.124 Q-Q 35.0.125 Q-Q
35.0.126 Q-Q 35.0.127 Q-Q 35.0.128 Q-Q 35.0.129 Q-Q 35.0.130 Q-Q
35.0.131 Q-Q 35.0.132 Q-Q 35.0.133 Q-Q 35.0.134 Q-Q 35.0.135 Q-Q
35.0.136 Q-Q 35.0.137 Q-Q 35.0.138 Q-Q 35.0.139 Q-Q 35.0.140 C
35.0.141 A 35.0.142 Q-Q 35.0.143 A 35.0.144 C 35.0.145 B
35.0.146 D 35.0.147 B 35.0.148 C 35.0.149 D 35.0.150 C
35.0.151 Q-Q 35.0.152 A 35.0.153 C 35.0.154 B 35.0.155 C
35.0.156 D 35.0.157 A 35.0.158 D 35.0.159 D 35.0.160 Q-Q
35.0.161 D 35.0.162 B 35.0.163 Q-Q 35.0.164 C 35.0.165 Q-Q
35.0.166 Q-Q 35.0.167 Q-Q 35.0.168 D 35.0.169 Q-Q 35.0.170 Q-Q
35.0.171 Q-Q 35.0.172 Q-Q 35.0.173 A 35.0.174 Q-Q 35.0.175 D
35.0.176 C 35.0.177 D 35.0.178 D 35.0.179 D 35.0.180 C
35.0.181 B 35.0.182 C 35.0.183 A 35.0.184 B 35.0.185 C
35.0.186 B 35.0.187 A 35.0.188 A 35.0.189 A 35.0.190 C
35.0.191 A 35.0.192 B 35.0.193 C 35.0.194 C 35.0.195 Q-Q
35.0.196 A 35.0.197 C 35.0.198 A 35.0.199 C 35.0.200 Q-Q
35.0.201 Q-Q 35.0.202 Q-Q 35.0.203 B 35.0.204 A 35.0.205 A
35.0.206 D 35.0.207 C 35.0.208 C 35.0.209 B 35.0.210 B
35.0.211 A 35.0.212 C 35.0.213 Q-Q 35.0.214 Q-Q 35.0.215 A
35.0.216 Q-Q 35.0.217 Q-Q 35.0.218 Q-Q 35.0.219 Q-Q 35.0.220 D
35.0.221 A 35.0.222 C 35.0.223 B 35.0.224 B 35.0.225 Q-Q
35.0.226 Q-Q 35.0.227 Q-Q 35.0.228 Q-Q 35.0.229 Q-Q 35.0.230 Q-Q
35.0.231 B 35.0.232 Q-Q 35.0.233 Q-Q 35.0.234 Q-Q 35.0.235 C
35.0.236 Q-Q 35.0.237 Q-Q 35.0.238 Q-Q 35.0.239 Q-Q 35.0.240 Q-Q
35.0.241 Q-Q 35.0.242 Q-Q 35.0.243 B 35.0.244 Q-Q 35.0.245 Q-Q
35.0.246 Q-Q 35.0.247 A 35.0.248 D 35.0.249 B 35.0.250 A
35.0.251 D 35.0.252 B 35.0.253 C 35.0.254 A 35.0.255 D
35.0.256 B 35.0.257 A 35.0.258 A 35.0.259 C 35.0.260 B
35.0.261 D 35.0.262 B 35.0.263 D 35.0.264 Q-Q 35.0.265 Q-Q
35.0.266 A 35.0.267 Q-Q 35.0.268 Q-Q 35.0.269 Q-Q 35.0.270 D
35.0.271 C 35.0.272 D 35.0.273 A 35.0.274 Q-Q 35.0.275 C
35.0.276 B 35.0.277 A 35.0.278 A;B 35.0.279 D 35.0.280 Q-Q
35.0.281 Q-Q 35.0.282 Q-Q 35.0.283 Q-Q 35.0.284 Q-Q 35.0.285 Q-Q
35.0.286 Q-Q 35.0.287 Q-Q 35.0.288 Q-Q 35.0.289 Q-Q 35.0.290 Q-Q
35.0.291 Q-Q 35.0.292 Q-Q 35.0.293 Q-Q 35.0.294 Q-Q 35.0.295 Q-Q
35.0.296 Q-Q 35.0.297 Q-Q 35.0.298 Q-Q 35.0.299 Q-Q 35.0.300 Q-Q
35.0.301 Q-Q 35.0.302 Q-Q 35.0.303 Q-Q 35.0.304 Q-Q 35.0.305 Q-Q
35.0.306 Q-Q 35.0.307 Q-Q 35.0.308 Q-Q 35.0.309 Q-Q 35.0.310 Q-Q
35.0.311 C 35.0.312 Q-Q 35.0.313 Q-Q 35.0.314 Q-Q 35.0.315 Q-Q
35.0.316 Q-Q 35.0.317 Q-Q 35.0.318 Q-Q 35.0.319 Q-Q 35.0.320 Q-Q
35.0.321 Q-Q 35.0.322 Q-Q 35.0.323 D 35.0.324 Q-Q 35.0.325 Q-Q
35.0.326 Q-Q 35.0.327 Q-Q 35.0.328 Q-Q 35.0.329 Q-Q 35.0.330 Q-Q
35.0.331 Q-Q 35.0.332 Q-Q 35.0.333 Q-Q 35.0.334 Q-Q 35.0.335 Q-Q
35.0.336 Q-Q 35.0.337 Q-Q 35.0.338 Q-Q 35.0.339 Q-Q 35.0.340 Q-Q
35.0.341 Q-Q 35.0.342 Q-Q 35.0.343 Q-Q 35.0.344 Q-Q 35.0.345 Q-Q
35.0.346 Q-Q 35.0.347 Q-Q 35.0.348 Q-Q 35.0.349 Q-Q 35.0.350 Q-Q
35.0.351 Q-Q 35.0.352 Q-Q 35.0.353 Q-Q 35.0.354 Q-Q 35.0.355 Q-Q
35.0.356 Q-Q 35.0.357 Q-Q 35.0.358 Q-Q 35.0.359 Q-Q 35.0.360 Q-Q
35.0.361 Q-Q 35.0.362 Q-Q 35.0.363 Q-Q 35.0.364 Q-Q 35.0.365 Q-Q
35.0.366 Q-Q 35.0.367 Q-Q 35.0.368 Q-Q 35.0.369 Q-Q 35.0.370 Q-Q
35.0.371 Q-Q 35.0.372 Q-Q 35.0.373 Q-Q 35.0.374 Q-Q 35.0.375 Q-Q
35.0.376 Q-Q 35.0.377 Q-Q 35.0.378 Q-Q 35.0.379 Q-Q 35.0.380 Q-Q
35.0.381 Q-Q 35.0.382 Q-Q 35.0.383 Q-Q 35.0.384 Q-Q 35.0.385 Q-Q
35.0.386 Q-Q 35.0.387 Q-Q 35.0.388 Q-Q 35.0.389 Q-Q 35.0.390 Q-Q
35.0.391 Q-Q 35.0.392 Q-Q 35.0.393 Q-Q 35.0.394 Q-Q 35.0.395 Q-Q
35.0.396 Q-Q 35.0.397 Q-Q 35.0.398 Q-Q 35.0.399 Q-Q 35.0.400 Q-Q
35.0.401 Q-Q 35.0.402 Q-Q 35.0.403 Q-Q 35.0.404 Q-Q 35.0.405 Q-Q
35.0.406 Q-Q 35.0.407 Q-Q 35.0.408 Q-Q 35.0.409 Q-Q 35.0.410 Q-Q
35.0.411 Q-Q 35.0.412 Q-Q 35.0.413 Q-Q 35.0.414 Q-Q 35.0.415 Q-Q
35.0.416 Q-Q 35.0.417 Q-Q 35.0.418 Q-Q 35.0.419 Q-Q 35.0.420 Q-Q
35.0.421 Q-Q 35.0.422 Q-Q 35.0.423 Q-Q 35.0.424 Q-Q 35.0.425 Q-Q
35.0.426 Q-Q 35.0.427 Q-Q 35.0.428 Q-Q 35.0.429 Q-Q 35.0.430 Q-Q
35.0.431 Q-Q 35.0.432 Q-Q 35.0.433 Q-Q 35.0.434 Q-Q 35.0.435 Q-Q
35.0.436 Q-Q 35.0.437 Q-Q 35.0.438 Q-Q 35.0.439 Q-Q 35.0.440 Q-Q
35.0.441 Q-Q 35.0.442 Q-Q 35.0.443 Q-Q 35.0.444 Q-Q 35.0.445 Q-Q
35.0.446 Q-Q 35.0.447 Q-Q 35.0.448 Q-Q 35.0.449 Q-Q 35.0.450 Q-Q
35.0.451 Q-Q 35.0.452 Q-Q 35.0.453 Q-Q 35.0.454 Q-Q 35.0.455 Q-Q
35.0.456 Q-Q 35.0.457 Q-Q 35.0.458 Q-Q 35.0.459 Q-Q 35.0.460 Q-Q
35.0.461 Q-Q 35.0.462 Q-Q 35.0.463 Q-Q 35.0.464 Q-Q 35.0.465 Q-Q
35.0.466 Q-Q 35.0.467 Q-Q 35.0.468 Q-Q 35.0.469 Q-Q 35.0.470 Q-Q
35.0.471 Q-Q 35.0.472 Q-Q 35.0.473 Q-Q 35.0.474 Q-Q 35.0.475 Q-Q
35.0.476 Q-Q 35.0.477 Q-Q 35.0.478 Q-Q 35.0.479 Q-Q 35.0.480 Q-Q
35.0.481 Q-Q 35.0.482 Q-Q 35.0.483 Q-Q 35.0.484 Q-Q 35.0.485 Q-Q
35.0.486 Q-Q 35.0.487 Q-Q 35.0.488 Q-Q 35.0.489 Q-Q 35.0.490 Q-Q
35.0.491 Q-Q 35.0.492 Q-Q 35.0.493 Q-Q 35.0.494 Q-Q 35.0.495 Q-Q
35.0.496 Q-Q 35.0.497 Q-Q 35.0.498 Q-Q 35.0.499 Q-Q 35.0.500 Q-Q
35.0.501 Q-Q 35.0.502 Q-Q 35.0.503 Q-Q 35.0.504 Q-Q 35.0.505 Q-Q
35.0.506 Q-Q 35.0.507 Q-Q 35.0.508 Q-Q 35.0.509 Q-Q 35.0.510 Q-Q
35.0.511 Q-Q 35.0.512 Q-Q 35.0.513 Q-Q 35.0.514 Q-Q 35.0.515 Q-Q
35.0.516 Q-Q 35.0.517 Q-Q 35.0.518 Q-Q 35.0.519 Q-Q 35.0.520 Q-Q
35.0.521 Q-Q 35.0.522 Q-Q 35.0.523 Q-Q 35.0.524 Q-Q 35.0.525 Q-Q
35.0.526 Q-Q 35.0.527 Q-Q 35.0.528 Q-Q 35.0.529 Q-Q 35.0.530 Q-Q
35.0.531 Q-Q 35.0.532 Q-Q 35.0.533 Q-Q 35.0.534 Q-Q 35.0.535 Q-Q
35.0.536 Q-Q 35.0.537 Q-Q 35.0.538 Q-Q 35.0.539 Q-Q 35.0.540 Q-Q
35.0.541 Q-Q 35.0.542 Q-Q 35.0.543 Q-Q 35.0.544 Q-Q 35.0.545 Q-Q
35.0.546 Q-Q 35.0.547 Q-Q 35.0.548 Q-Q 35.0.549 Q-Q 35.0.550 Q-Q
35.0.551 Q-Q 35.0.552 Q-Q 35.0.553 Q-Q 35.0.554 Q-Q 35.0.555 Q-Q
35.0.556 Q-Q 35.0.557 Q-Q 35.0.558 Q-Q 35.0.559 Q-Q 35.1.1 Q-Q
35.2.1 Q-Q 35.3.1 Q-Q 35.4.1 A 35.5.1 Q-Q 35.6.1 Q-Q
35.7.1 Q-Q 35.8.1 B 35.9.1 B 35.10.1 Q-Q 35.11.1 Q-Q
35.12.1 Q-Q 35.12.2 Q-Q 35.12.3 Q-Q 35.12.4 Q-Q 35.13.1 Q-Q
35.14.1 Q-Q 35.14.2 Q-Q 35.15.1 Q-Q 35.16.1 Q-Q 35.16.2 B
35.16.3 D 35.17.1 Q-Q 35.18.1 Q-Q 35.19.1 Q-Q 35.20.1 Q-Q
35.20.2 Q-Q 35.21.1 Q-Q 35.22.1 Q-Q 35.22.2 Q-Q 35.22.3 Q-Q
35.23.1 B 35.23.2 B 35.24.1 Q-Q 35.24.2 Q-Q 35.25.1 Q-Q
35.26.1 Q-Q 35.27.1 Q-Q 35.27.2 A 35.28.1 Q-Q 35.29.1 D
35.29.2 C 35.30.1 A 35.30.2 A;D 35.30.3 A 35.30.4 C
35.30.5 B 35.30.6 D 35.30.7 B 35.30.8 B 35.30.9 C
35.30.10 A 35.30.11 A 35.30.12 D 35.30.13 A 35.30.14 D
35.30.15 C 35.30.16 A 35.30.17 A 35.30.18 D 35.30.19 C
35.30.20 C 35.30.21 D 35.30.22 A 35.30.23 D 35.30.24 C
35.30.25 C 35.30.26 A 35.30.27 C 35.30.28 A 35.30.29 C
35.30.30 A 35.30.31 B 35.30.32 D 35.30.33 D 35.31.1 Q-Q
35.32.1 Q-Q 35.33.1 Q-Q 35.33.2 Q-Q 35.33.3 Q-Q 35.34.1 Q-Q
35.35.1 D 35.36.1 Q-Q 35.37.1 Q-Q 35.38.1 Q-Q 35.39.1 Q-Q
35.40.1 Q-Q 35.40.2 2 35.40.3 C 35.41.1 Q-Q 35.41.2 Q-Q
35.42.1 Q-Q 35.43.1 Q-Q 35.43.2 2 35.44.1 C 35.44.2 Q-Q
35.45.1 Q-Q 35.46.1 Q-Q 35.47.1 B 35.47.2 D 35.48.1 Q-Q
35.49.1 Q-Q 35.50.1 C 35.51.1 C 35.52.1 C 35.52.2 C
35.52.3 C 35.52.4 D 35.52.5 C 35.52.6 D 35.53.1 Q-Q
35.54.1 Q-Q 35.55.1 Q-Q 35.56.1 Q-Q 35.56.2 Q-Q 35.57.1 Q-Q
35.58.1 C 35.59.1 D 35.60.1 Q-Q 35.60.2 Q-Q 35.61.1 D
35.62.1 Q-Q 35.63.1 A 35.64.1 B 35.65.1 Q-Q 35.66.1 Q-Q
35.67.1 D 35.68.1 Q-Q 35.68.2 Q-Q 35.68.3 Q-Q 35.68.4 Q-Q
35.69.1 Q-Q 35.70.1 Q-Q 35.70.2 Q-Q 35.70.3 Q-Q 35.71.1 Q-Q
35.71.2 A 35.71.3 B 35.72.1 Q-Q 35.73.1 Q-Q 35.73.2 Q-Q
35.73.3 Q-Q 35.73.4 C 35.74.1 Q-Q 35.75.1 B 35.75.2 A
35.75.3 D 35.75.4 Q-Q 35.76.1 D 35.76.2 Q-Q
36 Programming and DS (30)
int * f[]()
declares :
When an array is passed as parameter to a function, which of the following statements is correct ?
Suppose you are compiling on a machine with 1-byte chars, 2-byte shorts, 4-byte ints, and 8-byte doubles, and with
alignment rules that require the address of every primitive data element to be an integer multiple of the element’s size.
Suppose further that the compiler is not permitted to reorder fields; padding is used to ensure alignment. How much space will
be consumed by the following array?
struct {
short s;
char c;
short t;
char d;
double r;
int i;
} A[10]; /*10 element array of structs */
If an integer needs two bytes of storage, then the maximum value of unsigned integer is
What would be the output of the following program, if run from the command line as “myprog 1 2 3” ?
{ int i ;
(A) 123
(B) 6
(C) Error
(D) “123”
ugcnetdec2009ii programming-in-c input-output-statement
X− = Y + 1 means
A. X = X– Y + 1 B. X = −X − Y − 1
C. X = −X + Y + 1 D. X = X − Y − 1
ugcnetdec2011ii programming-in-c operator-precedence
A. 1 B. 3 C. 2 D. 0
ugcnetdec2012ii programming-in-c operators
A. 10 B. 0 C. 12 D. 1
ugcnetjune2010ii programming-in-c operators
A. −1 B. 0 C. 1 D. 2
ugcnetaug2016ii programming-in-c
Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise ?
A. If (x = 3)y = 5 B. If x == 3(y = 5)
C. If (x == 3); y = 5 D. If (x == 3)y = 5
ugcnetdec2010ii programming-in-c
A horn clause is
programming-in-c ugcnetdec2015iii
What is the output of the following ‘C’ program? (Assuming little – endian representation of multi-byte data in which
Least Significant Byte (LSB) is stored at the lowest memory address.)
#include<stdio.h>
#include<stdlib.h>
/* Assume short int occupies two bytes of storage */
int main ()
{
union saving
{
short int one;
char two[2];
};
union saving m;
m.two [0] =5;
m.two [1] =2;
printf(“%d, %d, %d\n”, m.two[0], m.two[1], m.one);
}/* end of main */
A. 5, 2, 1282 B. 5, 2, 52 C. 5, 2, 25 D. 5, 2, 517
ugcnetjuly2018ii programming-in-c
Consider the following pseudo-code fragment, where a and b are integer variables that have been initialized:
/* Pre-conditions : (a > 1 ∧ a < b) */
/* Assume that overflow never occurs */
int x = 0 ; int p = 1 ;
while (p < b){
p = p ∗ a;
x = x + 1;
}
When the while loop terminates, what will be the value of x in terms of a and b?
A. ab
B. ba
C. ⌊logba ⌋ /* ⌊ ⌋ means floor */
D. ⌊logba ⌋ /* ⌈ ⌉ means ceil */
ugcnet-oct2020-ii programming-in-c
36.11.11 Programming In C: UGCNET-Sep2013-II: 33 https://gateoverflow.in/59233
What is the size of the following union? Assume that the size of int=2, size of float =4, size of char=1
union tag {
int a;
float b;
char c;
};
A. 2 B. 4 C. 1 D. 7
ugcnetsep2013ii programming-in-c
A. 10 B. 16 C. 15 D. 14
ugcnetsep2013ii programming-in-c
A. 15 B. 25 C. 45 D. 20
ugcnetsep2013iii programming-in-c
A three dimensional array in 'C' is declared as int A[x][y][z]. Here, the address of an item at the location A[p][q][r] can
be computed as follows: (where w is the word length of an integer)
A. &A[0][0][0]+w(y*z*q+z*p+r) B. &A[0][0][0]+w(y*z*p+z*q+r)
C. &A[0][0][0]+w(x*y*p+z*q+r) D. &A[0][0][0]+w(x*y*q+z*p+r)
ugcnetdec2015ii programming-in-c three-dimensional-array
Answer Keys
36.1.1 Q-Q 36.2.1 A 36.2.2 C 36.2.3 C 36.3.1 B
36.4.1 A 36.5.1 D 36.6.1 Q-Q 36.7.1 Q-Q 36.7.2 D
36.8.1 D 36.8.2 Q-Q 36.9.1 A 36.10.1 D 36.11.1 Q-Q
36.11.2 Q-Q 36.11.3 Q-Q 36.11.4 B 36.11.5 B 36.11.6 Q-Q
36.11.7 Q-Q 36.11.8 D 36.11.9 C 36.11.10 X 36.11.11 B
36.11.12 C 36.11.13 C 36.11.14 D 36.12.1 B 36.13.1 B
37 Programming and DS: DS (102)
What operation is supported in constant time by the doubly linked list, but not by the singly linked list ?
ugcnetdec2004ii
1. defbc/ + +∗
2. def + /bc + ∗
3. def + /bc ∗ +
4. None of these
ugcnetdec2006ii
What item is at the root after the following sequence of insertions into an empty splay tree :
1, 11, 3, 10, 8, 4, 6, 5, 7, 9, 2, ?
A. 1 B. 2 C. 4 D. 8
ugcnetdec2004ii
Suppose we are implementing quadratic probing with a Hash function, Hash (y) = X mode 100. If an element with
key 4594 is inserted and the first three locations attempted are already occupied, then the next cell that will be tried is :
A. 2 B. 3 C. 9 D. 97
ugcnetdec2004ii
Which of the following piece of code will insert the node pointed to by q at the end of the list ?
ugcnetdec2007ii
What is the time required to insert an element in a stack with linked implementation ?
A binary tree is said to have heap property if the elements along any path :
ugcnetjune2009ii
ugcnetdec2007ii
Which of the following data structures is most efficient in terms of both space and time to reverse a string of
characters?
(A) Linked list (B) Stack
(C) Array (D) Tree
ugcnetjune2008ii
Consider a rooted tree in which every node has at least three children. What is the minimum number of nodes at level i
(i > 0) of the tree ? Assume that the root is at level 0:
A. 3i B. 3i C. 3 D. 3i + 1
ugcnetdec2007ii
The worst case time complexity of AVL is tree is better in comparison to binary search tree for
A. Search and Insert Operations B. Search and Delete Operations
C. Insert and Delete Operations D. Search, Insert and Delete Operations
data-structures binary-tree ugcnetdec2012ii avl-tree
In a B tree of order 5, the following keys are inserted as follows : 7, 8, 1, 4, 13, 20, 2, 6 and 5 How many elements are
present in the root of the tree ?
A. 1 B. 2 C. 3 D. 4
ugcnetjune2010ii data-structures b-and-bplus-trees
A. (a) and (c) only B. (a) and (d) only C. (b) and (c) only D. (c) and (d) only
ugcnet-oct2020-ii data-structures bfs
Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _______ bits of error
t
A. t + 1 B. t C. t − 2 D. 2
ugcnetjan2017iii data-structures binary-codes
In a binary max heap containing n numbers, the smallest element can be found in ______
The runtime for traversing all the nodes of a binary search tree with n nodes and printing them in an order is
A binary search tree in which every non-leaf node has non-empty left and right subtrees is called a strictly binary tree.
Such a tree with 19 leaves:
A. cannot have more than 37 nodes B. has exactly 37 nodes
C. has exactly 35 nodes D. cannot have more than 35 nodes
ugcnetjuly2018ii data-structures binary-search-tree
If we remove the root node which of the node from the left subtree will be the new root?
A. 11 B. 12 C. 13 D. 16
data-structures binary-tree binary-search-tree ugcnetjune2016ii
Suppose that we have numbers between 1 and 1,000 in a binary search tree and want to search for the number 364.
Which of the following sequences could not be the sequence of nodes examined?
A. 925, 221, 912, 245, 899, 259, 363, 364 B. 3, 400, 388, 220, 267, 383, 382, 279, 364
C. 926, 203, 912, 241, 913, 246, 364 D. 3, 253, 402, 399, 331, 345, 398, 364
ugcnetjune2016iii data-structures binary-search-tree
Given a binary search trees for a set of n = 5 keys with the following probabilities :
i 0 1 2 3 4 5
pi - 0.15 0.10 0.05 0.10 0.20
qi 0.05 0.10 0.05 0.05 0.05 0.10
The expected optimal cost of the search is
The Inorder traversal of the tree will yield a sorted listing of elements of tree in
A. Binary tree B. Binary search tree
C. Heaps D. None of the above
data-structures binary-tree ugcnetjune2012ii
A complete n-ary tree is a tree in which each node has n children or no children. Let I be the number of internal nodes
and L be the number of leaves in a complete n-ary tree. If L = 41 , and I = 10 , what is the value of n?
A. 3 B. 4 C. 5 D. 6
ugcnet-oct2020-ii data-structures binary-tree
A. (2d + 1) B. (2(d+1) − 1) C. d D. d + 1
binary-tree data-structures ugcnetsep2013ii
If the number of leaves in a strictly binary tree is an odd number, then what can you say with full conviction about total
number of nodes in the tree ?
(A) It is an odd number.
(B) It is an even number.
(C) It cannot be equal to the number of leaves.
(D) It is always greater than twice the number of leaves.
ugcnetdec2009ii data-structures binary-tree
A. 2k-1
B. 2k-1
C. 2k
D. 2k+1
If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where
n ≤ m, the expected number of collisions involving a particular key x is less than __________.
Suppose you want to delete the name that occurs before ‘Vivek’ in an alphabetical listing. Which one of the following
data structures shall be most efficient for this operation?
A. Circular linked list B. Doubly linked list
C. Linked list D. Dequeue
ugcnetjune2013iii data-structures
The number of different spanning trees in complete graph, K4 and bipartite graph, K2,2 have ____ and ___
respectively.
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph.
How many cliques are there in a graph shown below?
A. 2 B. 4 C. 5 D. 6
ugcnetjune2016ii data-structures graph-theory
Which of the following is the minimum cost for an assignment problem given below?
A B C D
I 5 3 2 8
Jobs Workers II 7 9 2 6
III 6 4 5 7
IV 5 7 7 8
A. 13 B. 16 C. 17 D. 18
ugcnetsep2013iii data-structures
I. A graph in which there is a unique path between every pair of vertices is a tree.
II. A connected graph with e=v-1 is a tree
III. A connected graph with e=v-1 that has no circuit is a tree
Consider a hash table of size m = 10000, and the hash function h(K) = floor(m(KA mod 1)) for
–
A = (√5– 1)/2 . The key 123456 is mapped to location ______.
A. 46 B. 41 C. 43 D. 48
ugcnetaug2016iii data-structures hashing
A hash function f defined as f(key) = key mod 13 , with linear probing is used to insert keys 55, 58, 68, 91, 27,
145. What will be the location of 79?
A. 1 B. 2 C. 3 D. 4
ugcnetdec2012ii data-structures hashing
A hash function h defined h(key)=key mod 7, with linear probing, is used to insert the keys 44, 45, 79, 55, 91, 18, 63
into a table indexed from 0 to 6. What will be the location of key 18?
A. 3 B. 4 C. 5 D. 6
ugcnetjuly2018ii data-structures hashing
Consider a hash table of sze seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming that the hash
table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into
the table using closed hashing? Here "____" denotes an empty location in the table.
A. 3, 10, 1, 8, ___ , ____ , ____ B. 1, 3, 8, 10, ___, ___, ___
C. 1, ___, 3, ___, 8, ___, 10 D. 3, 10, ___, ____, 8, ___, ___
ugcnetjuly2018ii data-structures hashing
A chained hash table has an array size of 100. What is the maximum number of entries that can be placed in the table ?
A. 100 B. 200
C. 10000 D. There is no upper limit
ugcnetjune2010ii data-structures hashing
Searching for an element in the hash table requires O(1) time for the _________time, whereas for direct addressing it
holds for the _______ time.
A. worst-case, average B. worst-case, worst-case
C. average, worst-case D. best, average
ugcnetjune2014ii hashing data-structures
37.14.8 Hashing: UGCNET-June2014-III: 64 https://gateoverflow.in/57283
If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where
n ≤ m, the expected number of collisions involving a particular key K is
A. Less than 1 B. Less than lgn
C. Greater than 1 D. Greater than lgn
ugcnetjune2014iii data-structures hashing
(√5−1)
Consider a hash table of size m=100 and the hash function h(k)=floor (m(kA mod 1)) for A = 2 = 0.618033 .
Compute the location to which the key k=123456 is placed in hash table
A. 77 B. 82 C. 88 D. 89
ugcnetjune2015iii data-structures hashing
A hash function f defined as f(key) = key mod 7, with linear probing used to resolve collisions. Insert the keys 37, 38,
72, 48, 98 and 11 into the table indexed from 0 to 6.
(A) 3
(B) 4
(C) 5
(D) 6
ugcnetdec2009ii data-structures hashing
a. b. d.
c.
A. a B. b C. c D. d
ugcnetjan2017ii data-structures heap
Consider the array A=<4, 1, 3, 2, 16, 9, 10, 14, 8, 7>. After building heap from the array A, the depth of the heap and
the right child of max-heap are ______ and _____ respectively (Root is at level 0).
A. 3, 14 B. 3, 10 C. 4, 14 D. 4, 10
ugcnetjuly2018ii data-structures heap
[ ] [ ]
C. greater than [ 2hn+1 ] D. less than equal to [ 2hn+1 ]
A. maximum
B. minimum
C. sum
D. product
37.18.1 Linked Lists: GATE CSE 1994 | Question: 1.17, UGCNET-Sep2013-II: 32 https://gateoverflow.in/2460
Linked lists are not suitable data structures for which one of the following problems?
A. Insertion sort B. Binary search
C. Radix sort D. Polynomial manipulation
gate1994 data-structures linked-lists normal ugcnetsep2013ii
37.18.2 Linked Lists: UGCNET-AUG2016-II: 21 https://gateoverflow.in/69564
Consider an implementation of unsorted single linked list. Suppose it has its representation with a head and a tail
pointer (i.e. pointers to the first and last nodes of the linked list). Given the representation, which of the following
operation can not be implemented in O(1) time ?
(A) An algorithm to search for an element in a singly linked list requires 0(n)
operations in the worst case.
(B) An algorithm for deleting the first element in a singly linked list requires 0(n)
operations in the worst case.
(C) An algorithm for finding the maximum value in a circular linked list requires 0(n)
operations.
(D) An algorithm for deleting the middle node of a circular linked list requires 0(n)
operations.
ugcnetdec2009ii data-structures linked-lists time-complexity
A priority queue is implemented as a max-heap. Initially, it has five elements. The levelorder traversal of the heap is as
follows :
20, 18, 15, 13, 12
Two new elements ‘10’ and ‘17’ are inserted in the heap in that order. The level-order traversal of the heap after the insertion
of the element is :
A. 20, 18, 17, 15, 13, 12, 10 B. 20, 18, 17, 12, 13, 10, 15
C. 20, 18, 17, 10, 12, 13, 15 D. 20, 18, 17, 13, 12, 10, 15
ugcnetaug2016iii data-structures priority-queue
37.21.2 Priority Queue: UGCNET-June2010-II: 22 https://gateoverflow.in/67876
At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in and park right behind the car
in front of them, one behind another. A car can’t leave until all the cars in front of it have left. Is the parking lot more
like
(A) An array
(B) A stack
(C) A queue
Suppose that the splits at every level of Quicksort are in proportion 1 − β to β, where 0 < β ≤ 0.5 is a constant. The
number of elements in an array is n. The maximum depth is approximately
A. 0.5 β Ig n B. 0.5 (1-β ) Ig n
C. -(Ig n)/(Ig β ) D. -(Ig n)/Ig (1-β )
ugcnetsep2013ii data-structures sorting algorithms quicksort
If there are n integers to sort, each integer has d digits, and each digit is in the set {1, 2, … , k}, radix sort can sort the
numbers in :
A. O(k(n + d)) B. O(d(n + k))
C. O((n + k)lgd) D. O((n + d)lgk)
ugcnetaug2016iii data-structures radix-sort
The maximum number of comparisons needed to sort 9 items using radix sort is (assume each item is 5 digit octal
number):
A. 45 B. 72 C. 360 D. 450
ugcnetjuly2018ii data-structures radix-sort
A. 0 B. 1 C. 2 D. −1
ugcnetjan2017iii data-structures recursion
Consider a weighted complete graph G on the vertex set {ν1 , ν2 , . . . . νn } such that the weight of the edge (νi , νj ) is
4|i– j|. The weight of minimum cost spanning tree of G is :
The total number of spanning trees that can be drawn using five labeled vertices is:
1. 125
2. 64
3. 36
4. 16
Given an empty stack, after performing push(1), push(2), pop, push(3), push(4), pop, pop, push(5), pop, what is the
value of the top of the stack?
A. 4 B. 3 C. 2 D. 1
ugcnetdec2012ii data-structures stack
Which of the following permutations can be obtained in the output using a stack of size 3 elements assuming that input,
sequence is 1, 2, 3, 4, 5?
A. 3, 2, 1, 5, 4 B. 5, 4, 3, 2, 1
C. 3, 4, 5, 2, 1 D. 3, 4, 5, 1, 2
ugcnetdec2012iii data-structures stack
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation
in a stack machine (A ∗ B) + (C ∗ D/E) ?
Convert the following infix expression into its equivalent post fix expression (A + B^D)/(E– F) + G
The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e., starting from G. The stack
is popped five times and each element is inserted into a queue. Two elements are deleted from the queue and pushed
back onto the stack. Now, one element is popped from the stack. The popped item is ___________.
A. A B. B C. F D. G
ugcnetjan2017ii data-structures stack
If we have six stack operationspushing and popping each of A, B and C -such that push (A) must occur before push
(B) which must occur before push (C), then A, C, B is a possible order for the pop operations, since this could be our
sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which one of the following orders could not be the
order the pop operations are run, if we are to satisfy the requirements described above?
The following postfix expression is evaluated using a stack. 823^/23*+51*- . The top two elements of the stack after
first * is evaluated
A. 6,1 B. 5, 7 C. 3,2 D. 1, 5
ugcnetjune2012iii data-structures stack
What is the maximum number of parenthesis that will appear on the stack at any one time for parenthesis expression
given by
(() (()) (()))
A. 2
B. 3
C. 4
D. 5
The reverse polish notation equivalent to the infix expression ((A + B)∗ C + D)/(E + F + G)
A. AB + C ∗ D + EF + G + / B. AB + C D∗ + EF + G + /
C. AB + C ∗ D + EFG + +/ D. AB + C ∗ D + E + FG + /
ugcnetjune2014iii data-structures stack
What is the time required to insert an element in a stack with linked implementation?
(A) O (log 2n) (B) O (n)
(C) O (n log 2n) (D) O (1)
linked-lists stack
In which tree, for every node the height of its left subtree and right subtree differ almost by 1?
A. Binary Search Tree B. AVL Tree
C. Threaded Binary Tree D. Complete Binary Tree
ugcnetdec2012ii data-structures trees binary-tree
A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have
degree 1, how many vertices are there in the graph ?
A. 5 B. n– 3 C. 20 D. 11
ugcnetdec2014ii data-structures trees
A tree with n vertices is called graceful, if its vertices can be labelled with integers 1, , ..., n such that the absolute value
of the difference of the labels of adjacent vertices are all different. Which of the following trees are graceful?
a.
c.
b.
A 5-ary tree in which every internal node has exactly 5 children. The number of left nodes in such a tree with 8 internal
nodes will be:
A. 30 B. 33 C. 45 D. 125
ugcnetjuly2018ii data-structures trees
In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path counts as !
A. About log2 n B. About 2 log2 n
C. About n log2 n D. About 2n
ugcnetjune2010ii data-structures trees
A. Binary tree
B. B-tree
C. AVL-tree
D. Expression tree
ugcnetjune2012ii programming trees
A. 32 B. 36 C. 120 D. 42
ugcnetjune2012iii data-structures trees
Suppose you are given a binary tree with n nodes, such that each node has exactly eiter zero or two children. The
maximum height of the tree will be
n n
A. 2 −1 B. 2 +1 C. (n − 1)/2 D. (n + 1)/2
ugcnetjune2016ii data-structures trees
Answer Keys
37.0.1 Q-Q 37.0.2 Q-Q 37.0.3 Q-Q 37.0.4 Q-Q 37.0.5 Q-Q
37.0.6 Q-Q 37.0.7 Q-Q 37.0.8 Q-Q 37.0.9 Q-Q 37.0.10 Q-Q
37.0.11 Q-Q 37.0.12 Q-Q 37.0.13 Q-Q 37.0.14 Q-Q 37.0.15 Q-Q
37.1.1 D 37.2.1 Q-Q 37.3.1 X 37.4.1 C 37.5.1 A
37.6.1 A 37.7.1 Q-Q 37.7.2 Q-Q 37.7.3 D 37.7.4 C
37.7.5 C 37.8.1 A 37.8.2 B 37.8.3 D 37.8.4 C
37.8.5 C 37.8.6 C 37.8.7 Q-Q 37.8.8 Q-Q 37.9.1 A
37.10.1 D 37.10.2 C 37.10.3 B 37.10.4 C 37.10.5 C
37.10.6 C 37.11.1 Q-Q 37.12.1 D 37.13.1 Q-Q 37.14.1 Q-Q
37.14.2 X 37.14.3 C 37.14.4 Q-Q 37.14.5 Q-Q 37.14.6 Q-Q
37.14.7 C 37.14.8 A 37.14.9 C 37.14.10 Q-Q 37.15.1 B
37.15.2 Q-Q 37.15.3 D 37.15.4 X 37.15.5 B 37.15.6 Q-Q
37.16.1 B 37.17.1 Q-Q 37.18.1 B 37.18.2 Q-Q 37.18.3 Q-Q
37.19.1 C 37.20.1 D 37.21.1 Q-Q 37.21.2 Q-Q 37.22.1 Q-Q
37.22.2 C 37.22.3 Q-Q 37.22.4 Q-Q 37.23.1 D 37.24.1 Q-Q
37.24.2 Q-Q 37.25.1 D 37.26.1 D 37.27.1 Q-Q 37.27.2 Q-Q
37.28.1 D 37.28.2 A;C 37.28.3 B 37.28.4 A 37.28.5 B
37.28.6 Q-Q 37.28.7 A 37.28.8 B 37.28.9 A 37.28.10 B
37.28.11 C 37.28.12 Q-Q 37.29.1 D 37.30.1 B 37.30.2 D
37.30.3 D 37.30.4 Q-Q 37.30.5 Q-Q 37.30.6 Q-Q 37.30.7 B
37.30.8 D 37.30.9 C
38 Programming and DS: Programming (85)
What cannot replace ‘?’ in the following C-code to print all odd numbers less than 100 ?
for (i=1; ? ; i=i+2)
printf("%d\n", i);
1. i ≤ 100
2. i ≤ 101
3. i < 100
4. i < 101
ugcnetdec2007ii
In case of right shift bitwise operator in ‘C’ language, after shifting n bits, the left most n bits:
(A) are always filled with zeroes
(B) are always filled with ones
(C) are filled with zeroes or ones and is machine dependent
(D) none of the above
Which of the following concepts means adding new concepts to a program as it runs?
A. Data hiding B. Dynamic loading
C. Dynamic typing D. Dynamic binding
ugcnetdec2013iii programming
ugcnetjune2008ii
______ comparisons are necessary in the worst case to find both the maximum and minimum of n numbers.
A. 2n – 2 B. n + floor (lg n) – 2
C. floor ( 3n
2 )–2
D. 2 lg n – 2
ugcnetdec2013iii programming
ugcnetjune2008ii
A. 1 B. 2 C. 3 D. 4
ugcnetdec2006ii
A. x='A' ;
switch(x)
{case 'A'= printf ( "%d\n" , x);
....
case 'C'= printf ( "%d\n" , x);
}
B. x='A';
switch(x)
{case 'A' <= x <= 'C' : printf ( "%d\n" , x);}
C. x='A' ;
switch(x)
{
case 'A' : printf ( "%d\n" , x);
break;
case 'B' : printf ( "%d\n" , x);
break;
case 'C' : printf ( "%d\n" , x);
break;
}
D. x='A' ;
switch(x)
{
case 'A' =printf ( "%d\n" , x);
case 'B' =printf ( "%d\n" , x);
case 'C' =printf ( "%d\n" , x);
}
ugcnetdec2007ii
A. 7, 2, 8 B. 5, 2, 10 C. 6, 2, 8 D. 4, 2, 8
ugcnetdec2004ii
In C++, which system - provided function is called when no handler is provided to deal with an exception?
The programming languages C and C++ are not strongly typed languages because
A. Both C and C++ allow functions for which parameters are not type checked
B. Both C and C++ allow functions for which parameters are type checked
C. Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are
not type checked.
D. Union types in these (C and C++) languages are not type checked
ugcnetsep2013iii programming
What is the value returned by the function f given below when n=100?
let f(int n)
{ if (n==0) then return n;
else
return n+f(n-2);
}
A function object :
ugcnetdec2004ii
Match the following types of variables with the corresponding programming languages :
(a) Static variable (i) Local variables in Pascal
(b) Stack dynamic (ii) All variables in APL
(c) Explicit heap dynamic (iii) Fortran 77
(d) Implicit heap dynamic (iv) All Objects in JAVA
Codes :
A. (a)-(i), (b)-(iii), (c)-(iv), (d)-(ii) B. (a)-(iv), (b)-(i), (c)-(iii), (d)-(ii)
C. (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii) D. (a)-(ii), (b)-(i), (c)-(iii), (d)-(iv)
ugcnetjune2016iii programming
Which of the following is false regarding the evaluation of computer programming language:
A. Application oriented features B. Efficiency and reliability
C. Software development D. Hardware maintenance cost
ugcnetjune2016iii programming
38.0.21 UGCNET-Dec2015-II: 45 https://gateoverflow.in/62323
The ____ transfers the executable image of a C++ program from hard disk to main memory
There exists a construct which returns a value ‘true’ if the argument subquery is :
A. empty
B. non-empty
C. in error
D. none of the above
ugcnetjune2009ii
Code blocks allow many algorithms to be implemented with the following parameters :
A. clarity, elegance, performance B. clarity, elegance, efficiency
C. elegance, performance, execution D. execution, clarity, performance
ugcnetjune2014iii programming non-gate
When a programming language has the capacity to produce new datatype, it is called as,
A. Overloaded Language B. Extensible Language
C. Encapsulated Language D. Abstraction Language
programming ugcnetdec2012iii
Enumeration is a process of
A. Declaring a set of numbers B. Sorting a list of strings
C. Assigning a legal values possible for a variable D. Sequencing a list of operators
ugcnetdec2012ii programming
When an array is passed as a parameter to a function which of the following statements is correct?
A. The function can values in the original array B. The function cannot values in the original array
C. Results in compilation error D. Results in run-time error
ugcnetjune2013iii programming-in-c arrays
What is the output of the following program: (Assume that the appropriate preprocessor directives are included and
there is not syntax error)
main( )
{ char S[]="ABCDEFGH";
printf("%C", *(&S[3]));
printf("%s", S+4);
printf("%u", S);
/*Base address of S is 1000 */
}
Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to search for the number 365.
Which of the following sequences could not be the sequence of nodes examined ?
Suppose x and y are two Integer Variables having values 0x5AB6 and 0x61CD respectively. The result (in hex) of
applying bitwise operator and to x and y will be :
1. 0x5089
2. 0x4084
3. 0x78A4
4. 0x3AD1
A. 4 4 4 B. 4 8 10 C. 8 4 8 D. 8 8 8
ugcnetdec2005ii programming-in-c data-types
What is the value of the postfix expression a b c d + - * (where a=8, b=4, c=2 and d=5)
A. − 38 B. − 83 C. 24 D. -24
ugcnetdec2013ii evaluation-postfix
Which of the following are two special functions that are meant for handling exception, that occur during exception
handling itself?
Which of the following mode declaration used in C++ to open a file for input?
is :
A. x=1
B. compilation error
C. x=20
D. none of the above
The mechanism that binds code and data together and keeps them secure form outside world is known as
If the queue is implemented with a linked list, keeping track of a front pointer, which of these pointers will change
during an insertion into an non-empty queue?
A. Neither of the pointer change B. Only front pointer changes
C. Only rear pointer changes D. Both of the pointer changes
ugcnetdec2013ii data-structures linked-lists
Encapsulation is
(B) Destructor
(C) Constructor
(D) Structure
ugcnetdec2009ii programming object-oriented-programming
(D) I, II, IV
ugcnetdec2009ii object-oriented-programming
38.18.1 Parameter Passing: GATE CSE 2001 | Question: 2.17 | UGCNET-AUG2016-III: 21 https://gateoverflow.in/735
What is printed by the print statements in the program P 1 assuming call by reference parameter passing?
Program P1()
{
x = 10;
y = 3;
func1(y,x,x);
print x;
print y;
}
func1(x,y,z)
{
y = y + 4;
z = x + y + z
}
void main ()
{
char *p= "ayqm";
char c;
c=++*p;
printf ("%c" , c);
}
A. a B. c C. b D. q
ugcnetjune2010ii programming-in-c pointers
main ()
{ int x = 128;
printf ("\n%d", 1+x++);
}
S B[10];
S*p=&B[4];
S*q=&B[5];
p → U.b=0x1234;
/* structure S takes 32-bits */
If M is the value of q − p and N is the value of ((int )&(p → c))– ((int)p), then (M, N) is
A. (1, 1) B. (3, 2) C. (1, 2) D. (4, 4)
ugcnetjune2019ii programming-in-c
printf(“%c”, 100);
A. prints 100 B. prints ASCII equivalent of 100
C. prints garbage D. None of the above
non-gate programming-in-c ugcnetjune2012ii
Given that x = 7.5, j = −1.0, n = 1.0, m = 2.0 the value of − − x + j == x > n >= m is:
A. 0 B. 1 C. 2 D. 3
ugcnetjune2015ii programming-in-c
38.20.11 Programming In C: UGCNET-June2016-II: 11 https://gateoverflow.in/63105
Given i=0, j=1, k=-1, x=0.5, y=0.0, what is the output of the following expression in C language?
x*y<i+j ∣∣k
A. -1 B. 0 C. 1 D. 2
ugcnetjune2016ii programming-in-c
ugcnetjune2016ii programming-in-c
Assume that x and y are non-zero positive integers. What does the following program segment perform?
while (x!=0)
{
if(x>y)
x=x-y;
else y=y-x;
printf(“%d”, x)
}
programming-in-c
Consider the following pseudo-code fragment in which an invariant for the loop is “ m∗ xk = pn and k ≥ 0 ” (here, p
and n are integer variable that have been initialized):
/* Pre-conditions : p ≥ 1 ∧ n ≥ 0 */
/* Assume that overflow never occurs */
int x = p ; int k = n; int m = 1;
while (k <> 0) {
if (k is odd) then m = m∗ x ;
x = x∗ x ;
k = ⌊k/2⌋ ; /* floor (k/2) */
}
Which of the following must be true ar the end of the while loop?
A. x = pn B. m = pn C. p = xn D. p = mn
ugcnetjune2019ii pseudocode
Consider an array A [20, 10], assume 4 words per memory cell and the base address of array A is 100. What is the
address of A [11, 5] ? Assume row major storage.
Which of the following does not represent a valid storage class in ’c’?
A. automatic B. static
C. union D. extern
ugcnetjune2009ii programming-in-c storage-classes-in-c
Level order Traversal of a rooted Tree can be done by starting from root and performing:
A. Breadth First Search B. Depth First Search
C. Root Search D. Deep Search
ugcnetjune2015ii data-structures tree-traversal
What is the value of ‘b′ after the execution of the following code statements :
C = 10;
B = + + c + + + c;
A. 20
B. 22
C. 23
D. None
Consider the program below in a hypothetical programming language which allows global variables and a choice of
static or dynamic scoping.
int i;
program main()
{
i = 10;
call f();
}
procedure f()
{
int i = 20;
call g ();
}
procedure g()
{
print i;
}
Let x be the value printed under static scoping and y be the value printed under dynamic scoping. Then, x and y are:
After 3 calls of the c function bug ( ) below, the values of i and j will be :
int j = 1;
bug ()
{
static int i = 0; int j = 0;
i++; j++;
return (i);
}
A. i = 0, j = 0 B. i = 3, j = 3 C. i = 3, j = 0 D. i = 3, j = 1
ugcnetjune2005ii programming-in-c variable-scope
Main()
{ char *str="abcde";
printf("%c",*str);
printf("%c",*str++);
printf("%c",*(str++));
printf("%s",str);
}
A. It cannot be initialized
B. It is initialized once at the commencement of execution and cannot be changed at run time
C. It retains its value during the life of the program
D. None of the above
Answer Keys
38.0.1 Q-Q 38.0.2 A 38.0.3 A 38.0.4 C 38.0.5 B
38.0.6 Q-Q 38.0.7 C 38.0.8 Q-Q 38.0.9 Q-Q 38.0.10 Q-Q
38.0.11 Q-Q 38.0.12 Q-Q 38.0.13 A 38.0.14 C 38.0.15 C
38.0.16 B 38.0.17 A 38.0.18 A 38.0.19 C 38.0.20 D
38.0.21 D 38.0.22 X 38.0.23 Q-Q 38.0.24 B 38.0.25 Q-Q
38.0.26 B 38.0.27 A 38.0.28 B 38.0.29 A 38.0.30 C
38.0.31 C 38.1.1 D 38.2.1 Q-Q 38.3.1 A 38.3.2 D
38.4.1 C 38.5.1 B 38.6.1 Q-Q 38.6.2 Q-Q 38.7.1 D
38.8.1 A 38.9.1 Q-Q 38.10.1 D 38.11.1 C 38.12.1 Q-Q
38.13.1 B 38.13.2 Q-Q 38.13.3 C 38.13.4 A 38.14.1 C
38.15.1 Q-Q 38.16.1 Q-Q 38.16.2 Q-Q 38.16.3 Q-Q 38.17.1 Q-Q
38.18.1 B 38.19.1 X 38.19.2 Q-Q 38.20.1 B 38.20.2 D
38.20.3 B 38.20.4 C 38.20.5 B 38.20.6 A 38.20.7 C
38.20.8 D 38.20.9 A 38.20.10 A 38.20.11 C 38.20.12 A
38.20.13 B 38.20.14 A 38.20.15 Q-Q 38.21.1 C 38.22.1 B
38.23.1 A 38.24.1 B 38.24.2 Q-Q 38.25.1 A 38.26.1 Q-Q
38.27.1 A 38.28.1 Q-Q 38.28.2 Q-Q 38.28.3 Q-Q 38.28.4 Q-Q
39 Theory of Computation (139)
ugcnetdec2014iii theory-of-computation
ugcnetdec2006ii
i. Intersection
ii. Union
iii. Complementation
iv. Kleene Star
A. (i) and (iv) B. (i) and (iii) C. (ii) and (iv) D. (ii) and (iii)
ugcnetdec2004ii
There are exactly ____ different finite automata with three states x, y and z over the alphabet {a, b} where x is always
the start state
Given a Non-deterministic Finite Automaton (NFA) with states p and r as initial and final states respectively and
transition table as given below :
a b
p - q
q r s
r r s
s r s
The minimum number of states required in Deterministic Finite Automaton (DFA) equivalent to NFA is
A. 5 B. 4 C. 3 D. 2
ugcnetjune2013ii theory-of-computation
Which of the following definitions generates the same Language as L, where L = {W W R ∣ W ∈ {a, b} *}?
A. S → asb ∣ bsa ∣∈
B. S → asa ∣ bsb ∣∈
C. S → asa ∣ bsa ∣ asa ∣ bsb ∣∈
D. S → asa ∣ bsa ∣ asa ∣ bsb∣
ugcnetdec2012iii theory-of-computation
A. Both time and space complexities are better in recursive than in non-recursive program
B. Both time and space complexities are better in non-recursive than in recursive program
C. Time complexity is better in recursive version but space complexity is better in non-recursive version of a program
D. Space complexity is better in recursive version but time complexity is better in non-recursive version of a program
ugcnetdec2015ii theory-of-computation
The grammar with production rules S → aSb ∣ SS ∣ λ generates language L given by:
A. L = {w ∈ {a, b}∗ ∣ na (w) = nb (w) and na (v) ≥ nb (v) where v is any prefix of w}
B. L = {w ∈ {a, b}∗ ∣ na (w) = nb (w) and na (v) ≤ nb (v) where v is any prefix of w}
C. L = {w ∈ {a, b}∗ ∣ na (w) ≠ nb (w) and na (v) ≥ nb (v) where v is any prefix of w}
D. L = {w ∈ {a, b}∗ ∣ na (w) ≠ nb (w) and na (v) ≤ nb (v) where v is any prefix of w}
ugcnetjune2013iii theory-of-computation
The Greibach normal form grammar for the language L = {an bn+1 ∣ n ≥ 0} is
A. S → a SB, B → bB ∣ λ B. S → a SB, B → bB ∣ b
C. S → a SB ∣ b, B → b D. S → a Sb ∣ b
ugcnetdec2013iii theory-of-computation
Then L(M), the language accepted by the machine M, is the set of all strings having :
Where δ is a transition function defined as δ(q0 , 0) = (q0 , 0, R) δ(q0 , B) = (q1 , B, R) The language L(M) accepted by Turing
machine is given as :
(1) 0* 1*
(2) 00*
(3) 10*
(4) 1*0*
Any syntactic construct that can be described by a regular expression can also be described by a :
A. Context sensitive grammar B. Non context free grammar
C. Context free grammar D. None of the above
ugcnetjune2009ii
A. (i) and (ii) B. (i) and (iii) C. (ii) and (iii) D. (i), (ii) and (iii)
ugcnetjune2012iii theory-of-computation cfg
If the parse tree of a word w generated by a Chomsky form grammar has no path of length greater than i, then the word
w is of length
A. no greater than 2i+1 B. no greater than 2i
C. no greater than 2i−1 D. no greater than i
chomsky-normal-form ugcnetdec2012iii
To obtain a string of n Terminals from a given Chomsky normal from grammar, the number of productions to be used
is
A. 2n − 1 B. 2n C. n + 1 D. n2
ugcnetjuly2018ii theory-of-computation cnf
Let G = (V , T, S, P ) be a context-free grammar such that every one of its productions is of the form A → ν , with
|ν| = k > 1 . The derivation tree for any string W ∈ L(G) has a height such that
(|W |−1) B. logk |W | ≤ h
A. h < k−1
(|W |−1) (|W |−1)
C. logk |W | < h < k−1 D. logk |W | ≤ h ≤ k−1
ugcnetaug2016iii theory-of-computation context-free-grammars
A. S → aaa A; A → aAb ∣ B, B → Bb ∣ λ
B. S → aaaA ∣ λ, A → aAb ∣ B, B → Bb ∣ λ
C. S → aaaA ∣ aaA ∣ λ, A → aAb ∣ B, B → Bb ∣ λ
D. S → aaaA ∣ aa A ∣ aA ∣ λ, A → aAb ∣ B, B → Bb ∣ λ
Let G = (V , T, S, P ) be a context-free grammer such that every one of its productions is of the form A → v , with
∣v ∣= K > 1 . The derivation tree for any W ∈ L(G) has a height h such that
∣ W ∣≤ h ≤ ( )
A. logK ∣ W ∣≤ h ≤ logK ( )
∣W∣−1
K−1
B. logK ∣ W ∣≤ h ≤ logK (K ∣ W ∣)
C. logK ∣ W ∣≤ h ≤ K logK ∣ W∣
D. logK |W ∣≤ h ≤ ( )
∣W∣–1
K−1
For every context free grammar (G) there exists an algorithm that passes any w ∈ L(G) in number of steps
proportional to
A. ln ∣ w∣ B. ∣w∣
C. ∣w∣2 D. ∣w∣3
ugcnetjune2013iii theory-of-computation context-free-grammars
A. S → 0 ∣ 0S ∣ 1SS
B. S → 0S ∣ 1S ∣ 0SS ∣ 1SS ∣ 0 ∣ 1
C. S → 0 ∣ 0S ∣ 1SS ∣ S1S ∣ SS1
D. S → 0S ∣ 1S ∣ 0 ∣ 1
How can the decision algorithm be constructed for deciding whether context-free language L is finite?
a. By constructing redundant
b. By
CFG
constructing
G in CNF generating
non-redundant
c. By
language
constructing
CFG G L in CNF Which
non-redundant
generating CFGof G
theinfollowing
language L is correct?
CNF generating language L − {∧} ( ∧ stands for
The following CFG S → aB ∣ bA, A → a ∣ as ∣ bAA, B → b ∣ bs ∣ aBB generates strings of terminals that have
A. odd number of a’s and odd number of b’s B. even number of a’s and even number of b’s
C. equal number of a’s and b’s D. not equal number of a’s and b’s
ugcnetjune2012iii theory-of-computation context-free-languages
ugcnetjune2016iii context-free-languages
The family of context sensitive languages is _____ under union and ____ under reversal
A. closed, not closed B. not closed, not closed
C. closed, closed D. not closed, closed
ugcnetdec2015iii theory-of-computation closure-property context-sensitive
39.8.2 Context Sensitive: UGCNET-July-2018-II: 37 https://gateoverflow.in/225849
Which of the following problems is/are decidable problem(s) (recursively enumerable) on turing machine M ?
∣ω∣
=ϕ
a. G is a CFG with L(G) b. There exist two TMs Mc.
1 and
MM is a2 TM
suchthat
thataccepts
L(M) ω ⊆ using
{L(Mat1 )most
∪ L(2M )} =oflanguage
2cells tape of all TMs.
Let G1 and G2 be arbitrary context free languages and R an arbitrary regular language. Consider the following
problems:
a. Is L(G1 ) = L(G2 ) ? b. Is L(G2 ) ≤ L(G1 ) ? c. Is L(G1 ) = R ? Which of the problems are undecidable?
Choose the correct answer from the options given
below:
A. (a) only B. (b) only C. (a) and (b) only D. (a), (b) and (c)
ugcnet-oct2020-ii theory-of-computation decidability
Minimal deterministic finite automaton for the language L = {0n ∣ n ≥ 0, n ≠ 4} will have:
The transition function for the language L = {w ∣ na (w) and nb (w) are both odd} is given by:
δ(q0 , a)
; δ(q0 , b) = q2
= q1
δ(q1 , a)
; δ(q1 , b) = q3
= q0
δ(q2 , a)
; δ(q2 , b) = q0
= q3
δ(q3 , a)
; δ(q3 , b) = q1
= q2
The initial and final states of the automata are
A. q0 and q0 respectively B. q0 and q1 respectively
C. q0 and q2 respectively D. q0 and q3 respectively
ugcnetjune2015iii theory-of-computation finite-automata
The number of states in a minimal deterministic finite automaton corresponding to the language L = {an ∣ n ≥ 4} is
A. 3 B. 4 C. 5 D. 6
ugcnetsep2013ii theory-of-computation finite-automata
A. The grammar S → aS|aSbS| ∈ , where S is the only non-terminal symbol, and ∈ is the null string, is ambiguous.
B. An unambiguous grammar has same left most and right most derivation.
C. An ambiguous grammar can never be LR(k) for any k.
D. Recursive descent parser is a top-down parser.
Which of the following is/are the fundamental semantic model(s) of parameter passing?
If all the production rules have single non-terminal symbol on the left side, the grammar defined is:
A. Context free grammar B. Context sensitive grammar
C. Unrestricted grammar D. Phase grammar
ugcnetjune2015ii theory-of-computation grammar
39.12.11 Grammar: UGCNET-Nov2017-ii-34 https://gateoverflow.in/166268
A. (a) and (c) only B. (b) only C. (b) and (c) only D. (a) and (b) only
ugcnet-oct2020-ii theory-of-computation grammar ambiguous
A. S → aSc ∣ S1 ; S1 → bS1 c ∣ λ
B. S → aSc ∣ S1 λ ∣ S1 ∣ λ; S1 → bS1 c
C. S → aSc ∣ S1 λ ∣ S1 ∣ λ; S1 → bS1 c ∣ λ
D. S → aSc ∣ S1 λ; S1 → bS1 c ∣ λ
A. The language corresponding to the given grammar is a set of even number of a’s
B. The language corresponding to the given grammar is a set of odd number of a’s
C. The language corresponding to the given grammar is a set of even number of a’s followed by odd number of b’s
D. The language corresponding to the given grammar is a set of odd number of a’s followed by even number of b’s
ugcnetsep2013iii theory-of-computation grammar
A. regular language
B. Not a deterministic context free language but a context free language
C. Recursive and is a deterministic context free language
D. Not recursive
Given the recursively enumerable language (LRE ), the context sensitive language (LCS ), the recursive language
(LREC ), the context free language (LCF ) and deterministic context free language (LDCF ). The relationship between
these families is given by
ugcnetdec2014iii languages-relationships
How many states are there in a minimum state automata equivalent to regular expression given below?
Regular expression is a∗ b(a + b)
A. 1 B. 2 C. 3 D. 4
ugcnetjune2019ii finite-automata minimal-state-automata
Let L be set accepted by a non-deterministic finite automaton. The number of states in non-deterministic finite
automaton is ∣Q∣. The maximum number of states in equivalent finite automaton that accepts L is
A. ∣Q∣ B. 2 ∣ Q∣
C. 2∣Q∣ − 1 D. 2∣Q∣
ugcnetdec2012ii theory-of-computation nfa-dfa
The minimum number of states of the non-deterministic finite automaton which accepts the language
{ababn ∣ n ≥ 0} ∪ {aban ∣ n ≥ 0} is
A. 3 B. 4 C. 5 D. 6
ugcnetdec2012iii theory-of-computation nfa-dfa
I. The power of deterministic finite state machine and non- deterministic finite state machine are same.
II. The power of deterministic pushdown automaton and non- deterministic pushdown automaton are same.
A pushdown automata behaves like a Turing machine when the number of auxiliary memory is
A. 0 B. 1 C. 1 or more D. 2 or more
ugcnetjuly2018ii theory-of-computation pushdown-automata
Non-deterministic pushdown automaton that accepts the language generated by the grammar: S → aSS ∣ ab is
A. δ(q0 , λ, z) = {(q1 , z)}; δ(q0 , a, S) = {(q1 , SS)}, (q1 , B)}δ(q0 , b, B) = {(q1 , λ)}, δ(q1 , λ, z) = {(qf , λ)}
B. δ(q0 , λ, z) = {(q1 , Sz)}; δ(q0 , a, S) = {(q1 , SS)}, (q1 , B)}δ(q0 , b, B) = {(q1 , λ)}, δ(q1 , λ, z) = {(qf , λ)}
C. δ(q0 , λ, z) = {(q1 , Sz)}; δ(q0 , a, S) = {(q1 , S)}, (q1 , B)}δ(q0 , b, λ) = {(q1 , B)}, δ(q1 , λ, z) = {(qf , λ)}
D. δ(q0 , λ, z) = {(q1 , z)}; δ(q0 , a, S) = {(q1 , SS)}, (q1 , B)}δ(q0 , b, λ) = {(q1 , B)}, δ(q1 , λ, z) = {(qf , λ)}
Consider L = L1 ∩ L2 where
L1 = {0m 1m 20n 1n ∣ m, n ≥ 0}
L2 = {0m 1n 2k ∣ m, n, k ≥ 0}
Then, the language L is
A. Recursively enumerable but not context free B. Regular
C. Context free but not regular D. Not recursive
The number of strings of length 4 that are generated by the regular expression (0 + 1 + |2 + 3+)∗ , where | is an
alternation character and +,∗ are quantification characters, is :
A. 08 B. 09 C. 10 D. 12
ugcnetaug2016ii theory-of-computation regular-expressions
A. (a) and (b) only B. (b) and (c) only C. (c) and (a) only D. (a), (b) and (c)
ugcnetaug2016iii theory-of-computation regular-expressions
Which of the following strings would match the regular expression : p + [3 − 5] ∗ [xyz]?
I. p443y
II. p6y
III. 3xyz
IV. p35z
V. p353535x
VI. ppp5
A. I, IlI and VI only B. IV, V and VI only
C. II, IV and V only D. I, IV and V only
ugcnetjan2017ii regular-expressions theory-of-computation
A. (ii) and (iii) are same, (i) is different. B. (ii) and (iii) are not same.
C. (i), (ii) and (iii) are different. D. (i), (ii) and (iii) are same.
ugcnetjune2010ii theory-of-computation regular-expressions
Consider the regular expression (a+b)(a+b) ..... (a+b) (n-times). The minimum number of states in finite automaton that
recognizes the language represented by this regular expression contains
The number of strings of length 4 that are generated by the regular expression
(0 ∣ ϵ)1+ 2∗ (3 ∣ ϵ)
, where ∣ is an alternation character, {+, ∗} are quantification characters, and ϵ is the null string, is:
A. 08 B. 10 C. 11 D. 12
ugcnetjune2016ii theory-of-computation regular-expressions
The regular expression for the complement of the language L = {an bm ∣ n ≥ 4, m ≤ 3} is:
Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M.
Consider the relation RM defined by M as all states that are reachable from the start state. RM has ___ equivalence
classes.
A. 2 B. 4 C. 5 D. 6
ugcnetjune2016iii theory-of-computation regular-expressions regular-languages
Which of the following regular expressions, each describing a language of binary numbers (MSB to LSB) that
represents non-negative decimal values, does not include even values?
A. 0∗ 1+ 0∗ 1∗ B. 0∗ 1∗ 0+ 1∗ C. 0∗ 1∗ 0∗ 1+ D. 0+ 1∗ 0∗ 1∗ W h e r e {+, ∗} are
quantification
characters.
L e t L1 and L2 be languages over Σ = {a, b} represented by the regular expressions (a∗ + b)∗ and (a + b)∗
respectively.
Which of the following is true with respect to the two languages?
A. L1 ⊂ L2 B. L2 ⊂ L1
C. L1 = L2 D. L1 ∩ L2 = ϕ
ugcnet-oct2020-ii theory-of-computation regular-expressions
Regular expression for the language L = w ∈ {0, 1}∗ ∣ w has no pair of consecutive zeros } is
(1) S → S1 |S2
S1 → aS1 |A1
A1 → bA1 |λ
S2 → aaS2 |A2
A2 → bA2 |λ
(2) S → S1 |S2
S1 → aS1 |aA1
S2 → aaS2 |A2
A1 → bA1 |λ
A2 → bA2 |λ
(3) S → S1 |S2
S1 → aaaS1 |aA1
S2 → aaS2 |A2
A1 → bA1 |λ
A2 → bA2 |λ
(4) S → S1 |S2
S1 → aaS1 |A1
S2 → aaS2 |aA2
A1 → bbA1 |λ
A2 → bbA2 |b
ugcnetaug2016iii theory-of-computation regular-grammar
The regular grammar for the language L= { w ∣ na (w) and nb (w) are both even, w ∈ {a, b} * } is given by : (Assume,
p, q, r and s are states)
A. p → aq ∣ br ∣ λ, q → bs ∣ apr → as ∣ bp, s → ar ∣ bq , p and s are initial and final states.
B. p → aq ∣ br, q → bs ∣ apr → as ∣ bp, s → ar ∣ bq , p and s are initial and final states.
C. p → aq ∣ br ∣ λ, q → bs ∣ apr → as ∣ bp, s → ar ∣ bq p is both initial and final states.
D. p → aq ∣ br, q → bs ∣ apr → as ∣ bp, s → ar ∣ bq p is both initial and final states.
A regular grammar for the language L = {an bm ∣ n is even and m is even } is given by
A. S → aSb ∣ S1 ; S1 → bS1 a ∣ λ
B. S → aaS ∣ S1 ; S1 → bSb ∣ λ
C. S → aSb ∣ S1 ; S1 → S1 ab ∣ λ
D. S → aaS ∣ S1 ; S1 → bbS1 ∣ λ
regular-languages theory-of-computation
Consider the languages L1 = ϕ and L2 = {1} . Which one of the following represents L∗1 ∪ L∗2 L∗1 ?
A. {∈} B. {∈, 1} C. ϕ D. 1∗
ugcnetjan2017iii theory-of-computation regular-languages
Let L be any language. Define Even(W) as the strings obtained by extracting from W the letters in the even-
numbered positions and Even(L) = {Even(W) ∣ W ∈ L}. We define another language Chop(L) by removing the
two leftmost symbols of every string in L given by Chop(L) = {W ∣ vW ∈ L, with ∣v ∣= 2}. If L is regular language then
A. Even(L) is regular and Chop(L) is not regular B. Both Even(L) and Chop(L) are regular
C. Even(L) is not regular and Chop(L) is regular D. Both Even(L) and Chop(L) are not regular
ugcnetjune2014iii theory-of-computation regular-languages
A. The family of regular languages is closed under symmetric difference but not closed under nor
B. The family of regular languages is closed under nor but not closed under symmetric difference
C. The family of regular languages are closed under both symmetric difference and nor
D. The family of regular languages are not closed under both symmetric difference and nor
Given L1=L(a*baa*) L2=L(ab*). The regular expression corresponding to language L3=L1/L2 (right quotient) is given
by
A. 0∗ 1∗ B. 00∗ C. 10∗ D. 1∗ 0∗
ugcnetaug2016iii theory-of-computation turing-machine
For a statement
A language L ⊆ Σ∗ is recursive if there exists some turing machine M . Which of the following conditions is satisfied
for any string ω?
ugcnetjune2019ii turing-machine
Answer Keys
39.0.1 B 39.0.2 A 39.0.3 Q-Q 39.0.4 Q-Q 39.0.5 B
39.0.6 C 39.0.7 B 39.0.8 B 39.0.9 B 39.0.10 B
39.0.11 A 39.0.12 B 39.0.13 Q-Q 39.0.14 C 39.0.15 B
39.0.16 D 39.0.17 A 39.0.18 C 39.0.19 C 39.0.20 B
39.0.21 Q-Q 39.0.22 Q-Q 39.0.23 C 39.0.24 A 39.0.25 Q-Q
39.0.26 Q-Q 39.0.27 D 39.0.28 Q-Q 39.1.1 C 39.2.1 C
39.3.1 B 39.3.2 B 39.4.1 Q-Q 39.5.1 Q-Q 39.6.1 Q-Q
39.6.2 D 39.6.3 X 39.6.4 D 39.6.5 D 39.6.6 C
39.6.7 Q-Q 39.7.1 Q-Q 39.7.2 A 39.7.3 C 39.7.4 C
39.7.5 D 39.7.6 C 39.7.7 A 39.8.1 B 39.8.2 Q-Q
39.9.1 C 39.9.2 D 39.9.3 D 39.9.4 A 39.10.1 B
39.11.1 Q-Q 39.11.2 Q-Q 39.11.3 D 39.11.4 D 39.11.5 C
39.11.6 C 39.12.1 Q-Q 39.12.2 B 39.12.3 B 39.12.4 Q-Q
39.12.5 Q-Q 39.12.6 D 39.12.7 D 39.12.8 D 39.12.9 C
39.12.10 A 39.12.11 D 39.12.12 D 39.12.13 C 39.12.14 A
39.12.15 B 39.13.1 X 39.13.2 C 39.13.3 D 39.13.4 C
39.13.5 B 39.13.6 A 39.13.7 B 39.14.1 C 39.15.1 B
39.16.1 D 39.17.1 C 39.18.1 D 39.18.2 C 39.18.3 B
39.19.1 B 39.20.1 B 39.20.2 D 39.20.3 D 39.21.1 B
39.21.2 Q-Q 39.21.3 Q-Q 39.21.4 C 39.21.5 B 39.22.1 A
A. (a) and (b) only B. (b) and (c) only C. (c) and (d) only D. (b) and (d) only
ugcnet-oct2020-ii
A member function can always access the data in, (in C++)
A. the class of which it is member B. the object of which it is a member
C. the public part of its class D. the private part of its class
ugcnetnov2017-ii
How many distinguishable permutations of the letters in the word of BANANA are there?
Use Kruskal’s algorithm to find a minimal spanning tree for the graph. The List of the edges of the tree in the order in which
they are chosen is
A. AD, AE, AG, GC, GB, BF B. GC, GB, BF, GA, AD, AE
C. GC, AD, GB, GA, BF, AE D. AD, AG, GC, AE, GB, BF
ugcnetnov2017-ii
⎡1 1 1 0⎤
⎢0 0⎥
⎢ ⎥
1 1
⎢1 0⎥
A.
1 1
⎣1 0 1 1⎦
⎡1 1 0 1⎤
⎢0 1⎥
⎢ ⎥
1 0
⎢1 0⎥
B.
1 1
⎣1 0 1 1⎦
⎡1 1 0 1⎤
⎢0 0⎥
⎢ ⎥
1 1
⎢1 0⎥
C.
1 1
⎣1 0 1 1⎦
⎡1 1 1 0⎤
⎢0 0⎥
⎢ ⎥
1 1
⎢1 1⎥
D.
0 1
⎣1 0 1 1⎦
ugcnetnov2017-ii
A. ∃ x ¬ H(x) B. ∀ x ¬ H(x)
C. ∀ x H(x) D. ¬ x H(x)
ugcnetnov2017-ii
is
A. (A + C) ⋅ D + B B. (A + B) ⋅ C + D
C. (A + D) ⋅ C + B D. (A + C) ⋅ B + D
ugcnetnov2017-ii
prtdata is a pointer to a data type. The expression ∗ prtdata + + is evaluated as (in C++)
A. ∗ (prtdata++) B. (∗ prtdata) + +
C. ∗ (prtdata) + + D. Depends on compiler
ugcnetnov2017-ii
A. Class templates and function templates are instantiated in the same way
B. Class templates differ from function templates in the way they are initiated
C. Class template is initiated by defining an object using the template argument
D. Class templates are generally used for storage classes
ugcnetnov2017-ii
Consider an array representation of an n element binary heap where the elements are stored from index 1 to index n of
the array. For the element stored at index i of the array (i ≤ n), the index of the parent is
In RDBMS, different classes of relations are created using ________ technique to prevent modification anomolies.
A. Functional Dependencies B. Data integrity
C. Referential integrity D. Normal Forms
ugcnetnov2017-ii
The following numbers are inserted into an empty binary search tree in the given order: 10, 1, 3, 5, 15, 12, 16 . What is
the height of the binary search tree?
A. 3 B. 4 C. 5 D. 6
ugcnetnov2017-ii
Post-order traversal of a given binary search tree T produces following sequence of keys:
3, 5, 7, 9, 4, 17, 16, 20, 18, 15, 14 . Which one of the following sequences of keys can be the result of an in-order
traversal of the tree T ?
A. 3, 4, 5, 7, 9, 14, 20, 18, 17, 16, 15 B. 20, 18, 17, 16, 15, 14, 3, 4, 5, 7, 9
C. 20, 18, 17, 16, 15, 14, 9, 7, 5, 4, 3 D. 3, 4, 5, 7, 9, 14, 15, 16, 17, 18, 20
ugcnetnov2017-ii
Which of the following devices takes data sent from one network device and forwards it to the destination node based
on MAC address?
_________ do not take their decisions on measurements or estimates of the current traffic and topology.
A. Static algorithms B. Adaptive algorithms
C. Non-Adaptive algorithms D. Recursive algorithms.
ugcnetnov2017-ii
40.0.24 UGCNET-Nov2017-ii-23 https://gateoverflow.in/166257
Let G be an undirected connected graph with distinct edge weight. Let Emax be the edge with maximum weight and
Emin the edge with minimum weight. Which of the following statements is false?
A. Every minimum spanning tree of G must contain Emin
B. If Emax is in minimum spanning tree, then its removal must disconnect G
C. No minimum spanning tree contains Emax
D. G has a unique minimum spanning tree
ugcnetnov2017-ii
A list of n strings, each of length n, is sorted into lexicographic order using merge - sort algorithm. The worst case
running time of this computation is:
ugcnetnov2017-ii
A simple stand – alone software utility is to be developed in ‘C’ programming by a team of software experts for a
computer running Linux and the overall size of this software is estimated to be 20, 000 lines of code. Considering
(a, b) = 2.4, 1.05) as multiplicative and exponention factor for the basic COCOMO effort estimation equation and
(c, d) = (2.5, 0.38) as multiplicative and exponention factor for the basic COCOMO development time estimation equation,
approximately how long does the software project take to complete?
A. Re-constructing the original source code from the existing machine (low-level) code program and modifying it ti make it
more user-friendly
B. Scrapping the source code of a software and re-writing it entirely from scratch
C. Re-organising and modifying existing software systems to make them more maintainable
D. Translating source code of an existing software to a new machine (low-level) language
ugcnetnov2017-ii
During physical treatment process of waste water, what is the correct order of following operations to be followed?
a. Flocculation b. Filtration
c. Screening d. Sedimentation
Choose the correct answer from the options given below:
A. (c), (d), (b), (a) B. (c), (d), (a), (b)
C. (b), (d), (a), (c) D. (b), (c), (d), (a)
ugcnet-oct2020-i
Wind energy is very sensitive to the wind velocity because wind power is directly proportional to the
A. wind velocity B. square of the wind velocity
C. square root of the wind velocity D. cube of the wind velocity
ugcnet-oct2020-i
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R)
Assertion (A) : Carbon dioxide emissions from bioenergy. Production have traditionally
been excluded from most emission inventories and climate impact studies.
Reason (R) : Carbon dioxide emissions associated with production of bioenergy are
significantly less compared to those from combustion of fossil fuels.
In the light of the above statements, choose the correct answer from the options given below:
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is NOT the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnet-oct2020-i
Which of the International Agreements/Convention/Protocols are legally binding on the member countries (parties)?
a. Convention on Biological
b. Diversity
Kyoto Protocol c. Montreal Protocol d. Paris Agreement Choose the most
appropriate answer from
the options given below:
Which of the given wireless technologies used in IoT, consumes the least amount of power?
In Distributed system, the capacity of a system to adapt the increased service load is called
Which module gives control of the CPU to the process selected by the short-term schedular?
Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it evolves,
because
ugcnetnov2017-ii
Suppose there are six files F1, F2, F3, F4, F5, F6 with corresponding sizes 150 KB, 225 KB, 75 KB 60 KB, 275
KB and 65 KB respectively. The files are to be stored on a sequential device in such a way that optimizes access time.
In what order should the files be stored?
A. F5, F2, F1, F3, F6, F4 B. F4, F6, F3, F1, F2, F5
C. F1, F2, F3, F4, F5, F6 D. F6, F5, F4, F3, F2, F1
ugcnetnov2017-ii
Which of the following is not a key issue stressed by an agile philosophy of software engineering?
A. The importance of self-organizing teams as well as communication and collaboration between team members and
customers
B. Recognition that change represents opportunity
C. Emphasis on rapid delivery of software that satisfies the customer
D. Having a separate testing phase after a build phase
ugcnetnov2017-ii
What is the normal order of activities in which traditional software testing is organized?
a. Integration Testing b. System Testing
c. Unit Testing d. Validation Testing
A. (c), (a), (b), (d) B. (c), (a), (d), (b)
C. (d), (c), (b), (a) D. (b), (d), (a), (c)
ugcnetnov2017-ii
Find the normalization transformation that maps a window whose lower left corner is at (1, 1) and upper right corner is
at (3, 5) onto a viewpoint that is the entire normalized device screen
⎛ 1
0
−1 ⎞
⎜ 2 2 ⎟
A. ⎜
⎜ 1 −1 ⎟
⎟
⎜ 0 ⎟
⎝ ⎠
4 4
0 0 1
⎛1 0
1 ⎞
⎜2 2 ⎟
B. ⎜
⎜0 −1 1 ⎟
⎟
⎜ ⎟
⎝1 ⎠
4 4
1 1
⎛1 0
−1 ⎞
⎜2 2 ⎟
C. ⎜
⎜0 1 1 ⎟
⎟
⎜ ⎟
⎝1 ⎠
4 4
0 0
⎛1 0
1 ⎞
⎜2 2 ⎟
D. ⎜
⎜0 1 −1 ⎟
⎟
⎜ ⎟
⎝1 ⎠
4 4
0 0
ugcnetnov2017-iii
40.0.45 UGCNET-Nov2017-iii-16 https://gateoverflow.in/166392
Find the equation of the circle x2 + y 2 = 1 in terms of x′ y ′ coordinates, assuming that the xy coordinate system
results from a scaling of 3 units in the x′ direction and 4 units in the y ′ direction.
A. 3(x′ )2 + 4(y ′ )2 = 1 x′ 2 y′ 2
B. ( ))+ ( ))= 1
3 4
C. (3x′ )2 + (4y ′ )2 = 1 1 ′ 2 1 ′ 2
D. (x ) + (y ) = 1
3 4
ugcnetnov2017-iii
n
You are given a sequence of n elements to sort. The input sequence consists of subsequences, each containing k
k
elements. The elements in a given subsequence are all smaller than the elements in the succeeding subsequence and larger than
the elements in the preceding subsequence. Thus, all that is needed to sort the whole sequence of length n is to sort the k
n
elements in each of the subsequences.
k
The lower bound on the number of comparisons needed to solve this variant of the sorting problem is
A. Ω(n)
B. Ω( )
n
k
C. Ω(n lg k)
D. Ω( lg )
n n
k k
ugcnetnov2017-iii
( )
n
T(n) = 8T + Cn, if n > 1
2
= b, if n = 1
Where b and c are constants.
The order of the algorithm corresponding to above recurrence relation is
A. n B. n2 C. n lg n D. n3
ugcnetnov2017-iii
A. 5 B. 3 C. 4 D. 2
ugcnetnov2017-iii
A text is made up of the characters a, b, c, d, e each occuring with the probability 0.11, 0.40, 0.16, 0.09 and 0.24
respectively. The optimal Huffman coding technique will have the average length of
An undirected graph G(V , E) contains n(n > 2) nodes named v1 , v2 , … , vn . Two nodes vi and vj are connected if
and only if 0 <∣ i − j ∣≤ 2. Each edge (vi , vj ) is assigned a weight i + j. The cost of the minimum spanning tree of
such a graph with 10 nodes is
A. 88 B. 91 C. 49 D. 21
ugcnetnov2017-iii
An XML document that adheres to syntax rules specified by XML 1.0 specification in that it must satisfy both physical
and logical structured, is called
A. B. C. D.
ugcnetnov2017-iii
A process residing in Main Memory and Ready and Waiting for execution, is kept on
Match List I with List II: List I consists of the Vedangas and List II contains subjects dealt in them.
List I List II
(A) Nirukta (I) Phonetics
(B) Chhandas (II) Ritual
(C) Shiksha (III) Metrics
(D) Kalpa (IV ) Etymology
Choose the correct answer from the options given below:
A. (A) − (II), (B) − (IV ), (C) − (III), (D) − (I) B. (A) − (IV ), (B) − (III), (C) − (I), (D) − (II)
C. (A) − (III), (B) − (I), (C) − (II), (D) − (IV ) D. (A) − (I), (B) − (II), (C) − (IV ), (D) − (III)
ugcnet-oct2020-i
Consider a single perceptron with sign activation function. The perceptron is represented by weight vector
[ 0.4 −0.3 0.1 ] t and a bias θ = 0 . If the input vector to the perceptron is X = [ 0.2 0.6 0.5 ] then the output
of the perceptron is
A. 1 B. 0 C. −0.05 D. −1
ugcnetnov2017-iii
In Software Configuration Management (SCM), which of the following is a use-case supported by standard version
control systems?
a. Managing several versions or release of a software b. Filing bug reports and tracking their progress
c. Allowing team members to work in parallel d. Identifying when and where a regression occurred
A. Only (a), (c), and (d) B. Only (a), (b), and (c)
C. Only (a), (b), and (d) D. Only (b), (c), and (d)
ugcnetnov2017-iii
Consider the following four processes with the arrival time and length of CPU burst given in milliseconds:
Process Arrival Time Burst Time
P1 0 8
P2 1 4
P3 2 9
P4 3 5
The average waiting time for preemptive SJF scheduling algorithm is ____________
User level threads are threads that are visible to the programmer and are unknown to the kernel. The operating system
kernel supports and manages kernel level threads. Three different types of models relate user and kernel level threads.
Which of the following statements is/are true?
a. b.
i. The Many – to – one model maps many user threads to one i. Many – to – one model maps many kernel threads to one user
kernel thread thread
ii. The one – to – one model maps one user thread to one kernel ii. One – to – one model maps one kernel thread to one user
thread thread
iii. The many – to – many model maps many user threads to iii. Many – to – many model maps many kernel threads to smaller
smaller or equal kernel threads or equal user threads
A. (a) is true; (b) is false B. (a) is false; (b) is true
C. Both (a) and (b) are true D. Both (a) and (b) are false
ugcnetnov2017-iii
40.0.61 UGCNET-Nov2017-iii-52 https://gateoverflow.in/166428
Consider a system with five processes P0 through P4 and three resource types A, B and C . Resource type A has seven
instances, resource type B has two instances and resource type C has six instances suppose at time T0 we have the
following allocation.
If b is the branching factor and m is the maximum depth of the search tree, what is the space complexity of greedy
search?
Consider a disk queue with requests for I/O to blocks on cylinders 98, 183, 37, 122, 14, 124, 65, 67 . Suppose
SSTF disk scheduling algorithm implemented to meet the requests then the total number of head movements are
________ if the disk head is initially at 53.
ugcnetnov2017-iii
“If X , then Y unless Z ” is represented by which of the following formulae in propositional logic?
A. (X ∧ Y ) → ¬Z B. (X ∧ ¬Z) → Y
C. X → (Y ∧ ¬Z) D. Y → (X ∧ ¬Z)
ugcnetnov2017-iii
A signal processor software is expected to operate for 91.25 days after repair, and the mean software repair time is
expected to be 5 minutes. Then, the availability of the software is
ugcnetnov2017-iii
ugcnetnov2017-iii
ugcnetnov2017-iii
⎡ ⎤
⎢ ⎥
⎢ ⎥
⎢ ⎥
2 = −1
⎡1 1 1 1 ⎤
1⎢1 x −1 y ⎥ 2
⎢ ⎥ j = −1
2 ⎢ 1 −1 1 −1 ⎥
⎣ 1 −j −1 j ⎦
Where the values of x and y are ______, _____ respectively.
A. 1, −1 B. −1, 1 C. −j, j D. j, −j
ugcnetnov2017-iii
Entropy of a discrete random variable with possible values {x1 , x2 , … , xn } and probability density function P (X) is
n
H(X) = – ∑ P (xi ) logb P (xi )
i=1
The value of b gives the units of entropy. The unit for b = 10 is
For any binary (n, h) linear code with minimum distance (2t + 1) or greater n − h ≥ log2 [[ ∑ ( ) ]where
]
α n
α is
i=0 i
A. 2t + 1 B. t + 1 C. t − 1 D. t
ugcnetnov2017-iii
Which of the following is a valid reason for causing degeneracy in a transportation problem? Here m is number of
rows and n is number of columns in transportation table.
ugcnetnov2017-iii
If
M1 = Number of tests to exhaustively test mcq();
M2 = Minimum number of tests to achieve full statement coverage for mcq (); and
M3 = Minimum number of tests to achieve full branch coverage for mcq ( );
then (M1, M2, M3) = ______________
Which of the following statements is/are FALSE with respect to software testing?
S1 : White-box tests are based on specifications; better at telling whether program meets specification, better at finding
errors of ommission.
S2 : Black-box tests are based on code; better for finding crashes, out of bounds errors, file not closed errors.
S3 : Alpha testing is conducted at the developer’s site by a team of highly skilled testers for software that is developed as a
product to be used by many customers.
A. Only S1 and S2 are FALSE B. Only S1 and S3 are FALSE
C. Only S2 and S3 are FALSE D. All of S1, S2 , and S3 are FALSE
ugcnetnov2017-iii
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser
requests a webpage from a remote server, assuming that the host has just been restarted.
A. HTTP GET request, DNS query, TCP SYN B. DNS query, HTTP GET request, TCP SYN
C. TCP SYN, DNS query, HTTP GET request D. DNS query, TCP SYN, HTTP GET request
ugcnetdec2018ii computer-networks
ReadWriteExecute permission
permission
permission
for owner
for group
for others
A. Only (a) B. Only (b) C. Both (a) and (b) D. Neither (a) nor (b)
ugcnetnov2017-iii
A full joint distribution for the Toothache, Cavity and Catch is given in the table below.
Toothache ¬ Toothache
Catch ¬ Catch Catch ¬ Catch
Cavity 0.108 0.012 0.072 0.008
¬ Cavity 0.016 0.064 0.144 0.576
What is the probability of Cavity, given evidence of Toothache?
A. < 0.2, 0.8 > B. < 0.4, 0.8 >
C. < 0.6, 0.8 > D. < 0.6, 0.4 >
ugcnetdec2018ii
ugcnetdec2018ii
Consider a vocabulary with only four propositions A, B, C and D. How many models are there for the following
sentence?
¬A ∨ ¬B ∨ ¬C ∨ ¬D
A. 7 B. 8 C. 15 D. 16
ugcnetdec2018ii
A. 3 B. 4 C. 5 D. 6
ugcnetdec2018ii
ugcnetdec2018ii
ugcnetdec2018ii
Match List I with List II and choose the correct answer from the code given below.
List I List II
Selects a node for
Greedy Best- expansion if optimal
(a) (i) path to that node has
First Search
been found
Avoids substantial
overhead associated
(b) A* Search (ii)
with keeping the sorted
queue of nodes
Recursive Best- Suffers from excessive
(c) (iii)
First Search node generation
Iterative- Time complexity
(d) deepening A* (iv) depends on the quality
Search of heuristic
Code:
ugcnetdec2018ii
Consider the following terminology and match List I with List II and choose the correct answer from the code given
below.
b= branching factor
d = depth of the shallowest solution
m= maximum depth of the search tree
l=depth limit
ListI (Algorithms) List II (Space Complexity)
(a) BFS search (i) O(bd)
(b) DFS search (ii) O(bd )
(c) Depth-limited search (iii) O(bm)
(d) Iterative deepening search (iv) O(bl)
Code:
ugcnetdec2018ii
ugcnetdec2018ii
A host is connected to a department network which is part of a university network. The university network, in turn, is
part of the Internet. The largest network, in which the Ethernet address of the host is unique, is
A. the Internet B. the university network
C. the department network D. the subnet to which the host belongs
ugcnetdec2018ii computer-networks
Let P , Q, R and S be Propositions. Assume that the equivalences P ⇔ (Q ∨ ¬Q) and Q ⇔ R hold. Then the truth
value of the formula (P ∧ Q) ⇒ ((P ∧ R) ∨ S) is always
A. True B. False
C. Same as truth table of Q D. Same as truth table of S
ugcnetnov2017-iii
Performance
Roll-No Course Marks
18CS101 DBMS 60
18CS101 Compiler Design 65
18CS102 DBMS 80
18CS103 DBMS 85
18CS102 Compiler Design 75
18CS103 Operating System 70
Primary keys in the tables are shown using underline. Now, consider the following query:
SELECT S.Name, Sum (P.Marks) FROM Students, Performance P WHERE S.Roll-No=P.Roll-No GROUP BY S.Name
A. 0 B. 1 C. 2 D. 3
ugcnetdec2018ii databases
40.0.98 UGCNET-DEC2018-II: 82 https://gateoverflow.in/288295
Consider a relation schema R = (A, B, C, D, E, F) on which the following functional dependencies hold :
A→B
B, C → D
E→C
D→A
What are the candidate keys of R ?
A. AE and BE B. AE, BE and DE C. AEF, BEF and BCFD. AEF, BEF and DEF
ugcnetdec2018ii databases
Data scrubbing is
A. A process to reject data from the data warehouse and to create the necessary indexes.
B. A process to load the data in the data warehouse and to create the necessary indexes.
C. A process to upgrade the quality of data after it is moved into a data warehouse
D. A process to upgrade the quality of data before it is moved into a data warehouse
ugcnetdec2018ii
Data warehouse contains _____ data that is never found in operational environment.
An attribute A of datatype varchar( 20) has the value ‘xyz ′, and the attribute B of datatype char( 20) has the value
“lmnop”, then the attribute A has _____ spaces and attribute B has ____ spaces.
A. 3, 5 B. 20, 20 C. 3, 20 D. 20, 5
ugcnetdec2018ii
40.0.104 UGCNET-DEC2018-II: 76 https://gateoverflow.in/288301
Which of the following routing technique / techniques is/are used in distributed systems?
A. (a) only B. (a) and (b) only C. (c) only D. All (a), (b), (c)
ugcnetnov2017-iii
ugcnetnov2017-iii
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R)
Assertion (A) : Carbon monoxide (CO) is a serious asphyxiant; even a short exposure
may have fatal health issues.
Reason (R) : Hemoglobin present in the blood has greater affinity towards
carbon monoxide than oxygen
In the light of the above statements, choose the most appropriate answer from the options given below:
A. Both (A) and (R) are correct and (R) is the correct explanation of (A)
B. Both (A) and (R) are correct but (R) is NOT the correct explanation of (A)
C. (A) is correct but (R) is not correct
D. (A) is not correct but (R) is correct
ugcnet-oct2020-i
Suppose P , Q and R are co-operating processes satisfying Mutual Exclusion condition. Then, if the process Q is
executing in its critical section then
A. (i) and (ii) only B. (ii) and (iii) only C. (iii) only D. (ii) only
ugcnetdec2018ii
Software products need perfective maintenance for which of the following reasons?
ugcnetdec2018ii
The Software Requirement Specification (SRS) is said to be _____ if and only if no subset of individual requirements
described in it conflict with each other.
ugcnetdec2018ii
Which of the following HTML5 codes will affect the horizontal as well as vertical alignment of the table content ?
ugcnetdec2018ii
What does the following Java function perform? (Assume int occupies four bytes of storage)
public static int f(int a)
{ // Pre-conditions : a > 0 and no oveflow/underflow occurs
int b=0;
for (int i=0; i<32; i++)
{
b = b<<1;
b=b | ( a & 1);
a=a >>>1; // This is a logical shift
}
return b;
}
ugcnetdec2018ii
Consider the following recursive Java function f that takes two long arguments and returns a float value :
public static float f(long m, long n)
{
float result = (float) m / (float) n;
if (m<0 || n <0)
return 0.0f;
else
result +=f(m*2, n*3);
return result;
}
Which of the following integers best approximates the value of f(2, 3)?
A. 0 B. 1 C. 2 D. 3
ugcnetdec2018ii
Consider the following two C + + programs P 1 and P 2 and two statements S1 and S2 about these programs:
P1 P2
void f(int a, int *b, int
&c) double a=1, b=2;
{ double &f(double &d)
a=1; {
*b=2; d=4;
c=3; return b;
} }
int main() int main()
{ {
int i=0; f(a)=5;
f(i, &i, i); count < < a< < “:” < <
count <<i; b;
} }
S1 : P 1 prints out 3.
S2 : P 2 prints out 4 : 2
What can you say about the statements S1 and S2 ?
Code :
A. Only S1 is true B. Only S2 is true
C. Both S1 and S2 are true D. Neither S1 nor S2 is true
ugcnetdec2018ii
Consider the following pseudo-code fragment, where m is a non-negative integer that has been initialized:
p=0
k=0
while (k < m)
p = p + 2k
k=k+1
end while
Which of the following is a loop invariant for the while statement?
(Note: a loop invariant for a while statement is an assertion that is true each time the guard is evaluated during the execution of
the while statement).
Which of the following come under the mandate of the University Grants Commission (UGC)?
a. Promotion and coordination of University education b. Determining and monitoring standards of teaching, examination
and research in Universities
c. Organising continuous professional development programmes d. forFraming regulations on minimum standards of education
college and University teachers Choose the correct answer from the options given below:
e. Disbursing and regulating grants to the universities and colleges
A. (a), (b), (c), (d) only B. (b), (c), (d), (e) only
C. (a), (c), (d), (e) only D. (a), (b), (d), (e) only
ugcnet-oct2020-i
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R)
Assertion (A): Substance is always the subject of all predicates
Reason (R): Substance is self-existent and self-conceived
In the light of the above statements, choose the correct answer from the options given below:
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is NOT the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnet-oct2020-i
Which one of the following schools has not accepted anumana (inference) as a valid source of knowledge?
Three pipes fill a tank in 4 hours. If two of them take 8 and 12 hours each to fill the tank, how many hours will the
third pipe take to fill the tank?
In a ternary tree, the number of internal nodes of degree 1, 2, and 3 is 4, 3, and 3 respectively. The number of leaf
nodes in the ternary tree is
A. 9 B. 10 C. 11 D. 12
ugcnetdec2018ii
a. All pencils are pens b. Some sharpeners are pencils d. Some pencils are not pens Choose
c. Some pens are not sharpener the correct
answer from the options
given below:
A. (a) and (c) only B. (b) and (c) only C. (a) and (d) only D. (b) and (d) only
ugcnet-oct2020-i
Match each UML diagram in List I to its appropriate description in List II.
List I List II
(a) State (i) Describes how the external entities (people, devices) can
Diagram interect with the System
(b) Use Case (ii) Used to describe the static or structural view of a system
Diagram
(c) Class (iii) Used to show the flow of a business process, the steps
Diagram of a use-case or the logic of an object behaviour
(d) Activity (iv) Used to describe the dynamic behaviour of objects and
Diagram could also be used to describe the entire system behaviour
Code :
A. (a)-(i); (b)-(iv); (c)-(ii); (d)-(iii) B. (a)-(iv); (b)-(ii); (c)-(i); (d)-(iii)
C. (a)-(i); (b)-(iv); (c)-(iii); (d)-(ii) D. (a)-(iv); (b)-(i); (c)-(ii); (d)-(iii)
ugcnetdec2018ii
If P is the minimum number of tests to achieve full statement coverage for f(), and Q is the minimum number of tests to
achieve full branch coverage for f(), then (P , Q) =
In a park, A, B, C, D, E and F are sitting. C is the brother of D’s husband and son of A. F is the daughter of D and
sister of E.
a. E is the grandson of A b. F is the daughter of C
c. B is the father of F d. There are one son and one daughter in the group
e. C is the uncle of E Choose the correct answer from the options given below:
A. (A), (B) and (C) only B. (A), (C) and (E) only
C. (B), (D) and (E) only D. (B), (C) and (D) only
ugcnet-oct2020-i
Which homogeneous 2D matrix transforms the figure (a) on the left side to figure (b) on the right?
⎛0 2 −6 ⎞
A. ⎜2 0 1 ⎟
⎝0 0 1 ⎠
⎛0 −2 6 ⎞
B. ⎜1 0 1⎟
⎝0 0 1⎠
⎛1 −2 6 ⎞
C. ⎜1 0 2⎟
⎝0 0 1⎠
⎛0 2 6⎞
D. ⎜1 0 1⎟
⎝0 0 1⎠
ugcnetdec2018ii
If a graph (G) has no loops or parallel edges, and if the number of vertices (n) the graph is n ≥ 3 , then graph G is
Hamiltonian if
A. deg(v) ≥ n
for each vertex
B. deg(v)
v + deg(w) ≥ nC. E(G) ≥v 13and
whenever (n −
w1)(n
are not Choose thebycorrect
− 2)connected
+2 an edgeanswer from the code given
3
below:
A. (i) and (iii) only B. (ii) only C. (ii) and (iii) only D. (iii) only
ugcnetdec2018ii
Consider a system with 2 level cache. Access times of Level 1 cache, Level 2 cache and main memory are 0.5 ns, 5 ns
and 100 ns respectively. The hit rates of Level 1 and Level 2 caches are 0.7 and 0.8 respectively. What is the average
access time of the system ignoring the search time within the cache?
Find the boolean expression for the logic circuit shown below:
¯¯¯¯ ¯¯¯¯
A. AB B. AB
C. AB ¯¯¯¯¯¯¯¯
D. AB
ugcnetdec2018ii digital-logic
40.0.140 UGCNET-DEC2018-II: 41 https://gateoverflow.in/288336
If the frame buffer has 10-bits per pixel and 8-bits are allocated for each of the R, G, and B components, then what
would be the size of the color lookup table (LUT)?
Consider the midpoint (or Bresenham) algorithm for rasterizing lines given below:
A computer uses a memory unit with 256 K words of 32 bits each. A binary instruction code is stored in one word of
memory. The instruction has four parts: an indirect bit, an operation code and a register code part to specify one of 64
registers and an address part. How many bits are there in the operation code, the register code part and the address part?
A. 7, 6, 18 B. 6, 7, 18 C. 7, 7, 18 D. 18, 7, 7
ugcnetdec2018ii
Which of the following is not one of the principles of agile software development method?
A. Customer involvement B. Embrace change
C. Incremental delivery D. Following the plan
ugcnetdec2018ii
In Linux operating system environment ____ command is used to print a file.
In 3D Graphics, which of the following statements about perspective and parallel projection is/are true?
P : In a perspective projection, the farthest an object is from the center of projection, the smaller it appears
Q : Parallel projection is equivalent to a perspective projection where the viewer is standing infinitely far away
R : Perspective projections do not preserve straight lines.
Choose the correct answer from the code given below:
Code :
The second smallest of n elements can be found with ____ comparisons in the worst case.
3n
A. n − 1 B. lg n C. n + ceil(lg n) − 2 D. 2
ugcnetdec2018ii algorithms
40.0.151 UGCNET-DEC2018-II: 63 https://gateoverflow.in/288314
Consider ISO − OSI network architecture reference model. Session layer of this model offers dialog control, token
management and ______ as services.
A. B.
C. D.
The four byte IP address consists of
A. Network Address B. Host Address
C. Both Network and Host Addresses D. Neither Network nor Host Addresses
ugcnetdec2018ii
Match the following Secret Key Algorithms (list I) with Corresponding Key Lengths (List II) and choose the correct
answer from the code given below:
List I List II
(a) Blowfish (i) 128 – 256 bits
(b) DES (ii) 128 bits
(c) IDEA (iii) 1-448 bits
(d) RC5 (iv) 56 bits
Code:
ugcnetdec2018ii
Software coupling involves dependencies among pieces of software called modules. Which of the following are correct
statements with respect to module coupling ?
P : Common coupling occurs when two modules share the same global data
Q : Control coupling occurs when modules share a composite data structure and use only parts of it
R : Content coupling occurs when one module modifies or relies on the internal working of another module
Choose the correct answer from the code given below :
Code :
A. P and Q only B. P and R only C. Q and R only D. All of P, Q and R
ugcnetdec2018ii
The ratio of ages of two persons A and B is 3 : 4 and that of ages B and C is 4 : 5 . If the average of all three is 40
years, what is B’s age?
ugcnet-oct2020-i
i. wx + w(x + y) + x(x + y) = x + wy
ii. (wx̄¯¯(y + xz̄¯ ) + ¯¯ ¯¯)y = x̄
¯¯ x̄
w ¯¯y
The grammar S → (S) ∣ SS ∣ ϵ is not suitable for predictive parsing because the grammar is
A. B.
C. D.
Consider R to be any regular language and L1 , L2 be any two context-free languages. Which of the following is correct?
¯¯¯¯¯¯ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
A. L1 is context free B. (L1 ∪ L2 ) – R is context free
C. L1 ∩ L2 is context free D. L1 – R is context free
ugcnetdec2018ii
ugcnet-oct2020-i
A. effect improvement through a joint review of achievement of performance goals within a given timeframe
B. integrate external and internal controls by managers
C. provide managers scope to review the accepted output variables
D. agree upon different performance goals for managers and employees
ugcnet-oct2020-i
¯¯¯¯
The boolean expression A ⋅ B + A ⋅ ¯B
¯¯¯
+ A ⋅ B is equivalenet to
¯¯¯¯ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯
A. A ⋅ B B. A + B C. A ⋅ B D. A + B
ugcnetdec2018ii digital-logic
i. If x ≤ y and y ≤ z , then x ≤ z
ii. If x ≤ y and y ≤ x , then x = y
iii. If x < y and y < z , then x ≤ y
iv. If x < y and y < z , then x < y
Choose the correct answer from the code given below:
ugcnetdec2018ii
i. Every logic network is equivalent to one using just NAND gates or just NOR gates.
ii. Boolean expressions and logic networks correspond to labelled acyclic diagraphs.
iii. No two Boolean algebras with n atoms are isomorphic.
iv. Non-zero elements of finite Boolean algebras are not uniquely expressible as joins of atoms
A. i and iv only B. i, ii and iii only C. i and ii only D. ii, iii, and iv only
ugcnetdec2018ii digital-logic
Match List-I with List-II and choose the correct answer from the code given below :
List I List II
(a) Equivalence (i) p⇒q
(b) Contrapositive (ii) p ⇒ q; q ⇒ p
(c) Converse (iii) p ⇒ q :∼ q ⇒∼ p
(d) Implication (iv) p⇔q
Which of the following teacher competency belongs to the domain of personality and attitude?
A. Locus of control and self-efficacy B. Managing and Monitoring
C. Planning and instructing D. Personalising and contextualizing
ugcnet-oct2020-i
Which one of the following problems is decidable for recursive languages (L) ?
A. Is L = ϕ ? B. Is w ∈ L , where w is a string ?
C. Is L = Σ∗ ? D. Is L = R , where R is a given regular set ?
ugcnetdec2018ii
1. Cluster sampling
2. Judgemental sampling
3. Systematic sampling
4. Snowball sampling
5. Quota sampling
ugcnet-oct2020-i
What are the advantages of Choice Based Credit System (CBCS) introduces by the UGC for higher education
institutions?
a. Focuses on student centric education b. Allows students to choose inter-disciplinary and intra-disciplinary
courses
c. Makes education at par with global standards d. Makes it easy to estimate the performance levels of students in
terms of marks
e. Offers flexibility for students to undertake studies at differentChoose the correct answer from the options given below:
times and at different institutions
A. (a), (b), (c), (d) only B. (b), (c), (d), (e) only
C. (a), (b), (c), (e) only D. (c), (d), (e), (a) only
ugcnet-oct2020-i
ugcnet-oct2020-i
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R)
Assertion (A) : In order to bring the gap between theory and practice
both fundamental and applied research formats have to be promoted.
Reason (R) : Fundamental research focuses on theory making and applied research
is directed at exploring the applicability of theory in varied
practical situations
In the light of the above statements, choose the most appropriate answer from the options given below:
A. Both (A) and (R) are correct and (R) is the correct explanation of (A)
B. Both (A) and (R) are correct but (R) is NOT the correct explanation of (A)
C. (A) is correct and (R) is not incorrect
D. (A) is not correct and (R) is correct
ugcnet-oct2020-i
In conducting an empirical study, a researcher employs a non-parametric test for data analysis and finds that the
‘statistics’ arrived at is ‘significant’ at .05 level. What decisions will be warranted thereafter?
Identify the teaching strategies which are employed during indirect instruction:
In which of the following, there is a greater flexibility in both the methods and process of research?
A. Ethnography and phenomenology B. Descriptive survey and impact studies
C. Experimental and observation based studies D. Expost facto and historical studies
ugcnet-oct2020-i
ugcnet-oct2020-i
In which level of teaching, the teacher’s role is more active rather than being interactive?
A. Memory level B. Understanding level
C. Reflective level D. Autonomous development level
ugcnet-oct2020-i
A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus, Train and
Automobile as a major method of travelling to work. More than one answer was permitted. The results reported were as
follows :
Bus 30 people; Train 35 people; Automobile 100 people; Bus and Train 15 people; Bus and Automobile 15 people; Train and
Automobile 20 people; and all the three methods 5 people. How many people completed the survey form?
A. 5 B. 6 C. 7 D. 3
ugcnetdec2018ii data-structures binary-search-tree
Suppose a cloud contains software stack such as Operating systems, Application softwares, etc. This model is referred
as ____ model
Which speed up could be achieved according to Amdahl's Law for infinte number of processes if 5% of a program is
sequential and the remaining part is ideally parallel?
A. Infinite B. 5 C. 20 D. 50
ugcnetnov2017-ii co-and-architecture
A. 10 B. 45 C. 55 D. 56
Suppose a system has 12 instances of some resource with n processes competing for that resource. Each process may
require 4 instances of the resources. The maximum value of n for which the system never enters into deadlock is
A. 3 B. 4 C. 5 D. 6
ugcnetdec2018ii operating-system deadlock
In ________ disk scheduling algorithm, the disk head moves from one end to other end of the disk, serving the requests
along the way. When the head reaches the other end, it immediately returns to the beginning of the disk without serving
any requests on the return trip.
Consider a disk pack with 32 surfaces, 64 tracks and 512 sectors per pack. 256 bytes of data are stored in a bit serial
manner in a sector. The number of bits required to specify a particular sector in the disk is
A. 18 B. 19 C. 20 D. 22
ugcnetdec2018ii operating-system disks
A. 2 B. 3 C. 4 D. 5
ugcnetdec2018ii algorithms dynamic-programming
ugcnetnov2017-ii e-technologies
The minimum number of states of finite automaton which accepts the language L is
n(n+1)
A. n B. n + 1 C. 2 D. 2n
ugcnetdec2018ii theory-of-computation finite-automata
The decimal floating point number −40.1 represented using IEEE − 754 32 -bit representation and written in
hexadecimal form is
Match List I with List II and choose the correct answer from the code given below.
List I List II
(Graph Algorithm) (Time Complexity)
(a) Dijkstra’s algorithm (i) O(E lg E)
(b) Kruskal’s algorithm (ii) Θ(V 3 )
(c) Floyd-Warshall algorithm (iii) O(V 2 )
(d) Topological sorting (iv) Θ(V + E)
where V and E are the number of vertices and edged in graph respectively.
Code :
A. (a)-(i), (b)-(iii), (c)-(ii), (d)-(iv) B. (a)-(iii), (b)-(i), (c)-(ii), (d)-(iv)
C. (a)-(i), (b)-(iii), (c)-(iv), (d)-(ii) D. (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii)
ugcnetdec2018ii algorithms graph-algorithms time-complexity
The elements 42, 25, 30, 40, 22, 35, 26 are inserted one by one in the given order into a max-heap. The resultant max-
heap is sorted in an array implementation as
A. < 42, 40, 35, 25, 22, 30, 26 > B. < 42, 35, 40, 22, 25, 30, 26 >
C. < 42, 40, 35, 25, 22, 26, 30 > D. < 42, 35, 40, 22, 25, 26, 30 >
ugcnetdec2018ii data-structures heap
The IP address _________ is used by hosts when they are being booted.
Consider a singly linked list. What is the worst case time complexity of the best-known algorithm to delete the node a,
pointer to this node is q, from the list?
Which of the following 8085 microprocessor hardware interrupt has the lowest priority?
Use Kruskal’s algorithm to find the minimum spanning tree of the graph. The weight of this minimum spanning tree is
A. 17 B. 14 C. 16 D. 13
ugcnetdec2018ii algorithms minimum-spanning-trees
A comparison of frequency division and time division multiplexing system shows that
A. FDM requires a lower bandwidth, but TDM has greater noise immunity.
B. FDM has greater noise immunity and requires lower bandwidth than TDM .
C. FDM requires channel synchronization, while TDM has greater noise immunity.
D. FDM requires more multiplex while TDM requires band pass filter.
Suppose that everyone in a group of N people wants to communicate secretly with (N − 1) other people using
symmetric key cryptographic system. The communication between any two persons should not be decodable by the
others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
Which of the following layer of OSI Reference model is also called end-to-end layer ?
A. Network layer B. Datalink layer
C. Session layer D. Transport layer
ugcnetnov2017-ii computer-networks osi-model
Suppose for a process P , reference to pages in order are 1, 2, 4, 5, 2, 1, 2, 4 . Assume that main memory can
accomodate 3 pages and the main memory has already 1 and 2 in the order 1 – first, 2 – second. At this moment,
assume FIFO Page Replacement Algorithm is used then the number of page faults that occur to complete the execution of
process P is
A. 4 B. 3 C. 5 D. 6
ugcnetdec2018ii operating-system page-replacement page-fault
If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90, 180 and 270 degrees, then
modulation called
A box contains six red balls and four green balls. Four balls are selected at random from the box. What is the
probability that two of the selected balls will be red and two will be in green?
1 3 1 1
A. 14 B. 7 C. 35 D. 9
ugcnetdec2018ii probability
To overcome difficulties in Readers-Writers problem, which of the following statement/s is/are true?
A. (i) only B. (ii) only C. (iii) only D. Both (ii) and (iii)
ugcnetdec2018ii operating-system process-synchronization
Consider the following set of processes and the length of CPU burst time given in milliseconds :
Process CPU Burst time (ms)
P1 5
P2 7
P3 6
P4 4
Assume that processes being scheduled with Round-Robin Scheduling Algorithm with time quantum 4 ms. Then the waiting
time for P4 is ______ ms
A. 0 B. 4 C. 12 D. 6
ugcnetdec2018ii operating-system process-scheduling round-robin
Which of the following testing techniques ensures that the software products runs correctly after the changes in
maintenance?
A. Path Testing B. Integration Testing
C. Unit Testing D. Regression Testing
ugcnetnov2017-ii is&software-engineering software-testing
A. 8, 2 B. 8, 1 C. 6, 2 D. 6, 3
ugcnetdec2018ii data-structures stack
An Internet Service Provider (ISP ) has following chunk of CIDR−based IP addresses available with it :
245.248.128.0/20. The ISP wants to give half of this chunk addresses to organization A and a quarter to
organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
A. 245.248.136.0/21 and 245.248.128.0/22 B. 245.248.128.0/21 and 245.248.128.0/22
C. 245.248.132.0/22 and 245.248.132.0/21 D. 245.248.136.0/24 and 245.248.132.0/21
ugcnetdec2018ii computer-networks subnetting
Consider the following sequence of two transactions on a bank account (A) with initial balance 20, 000 that transfers
5, 000 to another account (B) and then apply 10% interest.
i. T1 start
ii. T1 A old= 20, 000 new 15, 000
iii. T1 B old = 12, 000 new = 17, 000
iv. T1 commit
v. T2 start
vi. T2 A old = 15, 000 new = 16, 500
vii. T2 commit
Suppose the database system crashes just before log record (vii) is written. When the system is restarted, which one statement
is true of the recovery process?
Answer Keys
40.0.1 D 40.0.2 A 40.0.3 1 40.0.4 D 40.0.5 C
40.0.6 X 40.0.7 A 40.0.8 B 40.0.9 A 40.0.10 C
40.0.11 B 40.0.12 A 40.0.13 B 40.0.14 D 40.0.15 B;C;D
40.0.16 C 40.0.17 D 40.0.18 C 40.0.19 B 40.0.20 A
40.0.21 D 40.0.22 C 40.0.23 C 40.0.24 C 40.0.25 B
40.0.26 B 40.0.27 D 40.0.28 B 40.0.29 C 40.0.30 B
40.0.31 D 40.0.32 B 40.0.33 B 40.0.34 D 40.0.35 B
40.0.36 B 40.0.37 A 40.0.38 C 40.0.39 D 40.0.40 B
40.0.41 B 40.0.42 D 40.0.43 B 40.0.44 A 40.0.45 B
40.0.46 C 40.0.47 D 40.0.48 C 40.0.49 B 40.0.50 B
40.0.51 A 40.0.52 A 40.0.53 C 40.0.54 Q-Q 40.0.55 B
40.0.56 D 40.0.57 A 40.0.58 A 40.0.59 D 40.0.60 A
40.0.61 X 40.0.62 A 40.0.63 C 40.0.64 C 40.0.65 D
40.0.66 B 40.0.67 A 40.0.68 D 40.0.69 A 40.0.70 D
40.0.71 B 40.0.72 D 40.0.73 D 40.0.74 X 40.0.75 D
40.0.76 C 40.0.77 B 40.0.78 B 40.0.79 C 40.0.80 A
40.0.81 A 40.0.82 Q-Q 40.0.83 3 40.0.84 Q-Q 40.0.85 Q-Q
40.0.86 Q-Q 40.0.87 Q-Q 40.0.88 Q-Q 40.0.89 Q-Q 40.0.90 Q-Q
40.0.91 Q-Q 40.0.92 Q-Q 40.0.93 Q-Q 40.0.94 Q-Q 40.0.95 Q-Q
40.0.96 A 40.0.97 Q-Q 40.0.98 Q-Q 40.0.99 Q-Q 40.0.100 Q-Q
40.0.101 Q-Q 40.0.102 Q-Q 40.0.103 Q-Q 40.0.104 Q-Q 40.0.105 D
40.0.106 D 40.0.107 C 40.0.108 A 40.0.109 B 40.0.110 B
40.0.111 Q-Q 40.0.112 Q-Q 40.0.113 Q-Q 40.0.114 B 40.0.115 Q-Q
40.0.116 Q-Q 40.0.117 Q-Q 40.0.118 Q-Q 40.0.119 Q-Q 40.0.120 Q-Q
40.0.121 D 40.0.122 Q-Q 40.0.123 D 40.0.124 D 40.0.125 B
40.0.126 A 40.0.127 B 40.0.128 C 40.0.129 D 40.0.130 B
40.0.131 A 40.0.132 Q-Q 40.0.133 Q-Q 40.0.134 B 40.0.135 Q-Q
40.0.136 Q-Q 40.0.137 Q-Q 40.0.138 B 40.0.139 C 40.0.140 Q-Q
40.0.141 Q-Q 40.0.142 A 40.0.143 Q-Q 40.0.144 Q-Q 40.0.145 Q-Q
40.0.146 Q-Q 40.0.147 Q-Q 40.0.148 Q-Q 40.0.149 Q-Q 40.0.150 Q-Q
40.0.151 Q-Q 40.0.152 Q-Q 40.0.153 A 40.0.154 Q-Q 40.0.155 Q-Q
40.0.156 Q-Q 40.0.157 C 40.0.158 D 40.0.159 A 40.0.160 C
40.0.161 A 40.0.162 D 40.0.163 Q-Q 40.0.164 D 40.0.165 Q-Q
40.0.166 Q-Q 40.0.167 Q-Q 40.0.168 D 40.0.169 D 40.0.170 B
40.0.171 A 40.0.172 Q-Q 40.0.173 Q-Q 40.0.174 A 40.0.175 Q-Q
40.0.176 Q-Q 40.0.177 D 40.0.178 D 40.0.179 A 40.0.180 Q-Q
40.0.181 B 40.0.182 D 40.0.183 C 40.0.184 C 40.0.185 B
40.0.186 A 40.0.187 A 40.0.188 A 40.0.189 D 40.0.190 D
40.0.191 Q-Q 40.0.192 A 40.0.193 C 40.0.194 B 40.0.195 B
40.0.196 C 40.0.197 B 40.0.198 A 40.0.199 Q-Q 40.1.1 C
40.2.1 Q-Q 40.3.1 C 40.4.1 A 40.4.2 C 40.5.1 Q-Q
40.6.1 D 40.7.1 Q-Q 40.8.1 D 40.9.1 C 40.10.1 4
40.11.1 B 40.12.1 B 40.13.1 Q-Q 40.14.1 Q-Q 40.15.1 Q-Q
40.16.1 Q-Q 40.17.1 Q-Q 40.18.1 A 40.19.1 B 40.20.1 X
40.21.1 Q-Q 40.22.1 Q-Q 40.23.1 Q-Q 40.24.1 D 40.25.1 Q-Q
40.26.1 Q-Q 40.27.1 Q-Q 40.28.1 Q-Q 40.29.1 D 40.30.1 Q-Q
40.31.1 D 40.32.1 C 40.33.1 B 40.34.1 Q-Q 40.35.1 Q-Q