...
OOPS
October 29, 2023
Question 9491 – GATE 2004
October 29, 2023
OOPS
October 29, 2023
Question 9491 – GATE 2004
October 29, 2023

NTA UGC NET JUNE-2023 Paper-2

Question 12
If A={4n+2| n is natural number} and B={3n| n is a natural number}.

A
{12n2+6n | n is a natural number}

B
{24 n-12| n is a natural number}
C
{60n+30| n is a natural number}
D
{12n-6| n is a natural number}
Question 13
Given below are two statements: one is labelled as Assertion A and the other is labelled as Reason R
Assertion A: Validity checks real need of system users
Reason R: Completeness checks system user defined requirements
In the light of the above statements, choose the correct answer from the options given below

A
Both A and R are correct and R is the correct explanation of A

B
Both A and R are correct and R is the NOT correct explanation of A
C
A is true but R is false
D
A is false but R is true
Question 13 Explanation: 
Both A and R are correct, but R is not the correct explanation of A.

Assertion A: This statement is correct. Validity checks are essential to ensure that the system meets the real needs and requirements of the system users.

Reason R: Completeness checks are indeed about verifying that the system user-defined requirements are fully captured, but this doesn’t directly explain the concept of validity checks.

Both A and R are independently valid statements, but Reason R doesn’t directly provide an explanation for Assertion A. So, the correct answer is:

Both A and R are correct, but R is not the correct explanation of A.

Question 14
Which of the following is not a solution representation in a genetic algorithm?
A
Binary valued

B
Real valued
C
Permutation
D
Combinations
Question 14 Explanation: 
“Combinations” is not typically a direct solution representation in a genetic algorithm. In genetic algorithms, the common solution representations include:

Binary Valued: Where each gene in an individual is represented as a binary value (0 or 1).

Real Valued: Where each gene in an individual is represented as a real number, often within a specific range.

Permutation: Where the genes represent a permutation or ordering of elements. This is often used for problems like the Traveling Salesman Problem.

“Combinations” as a direct representation is not commonly used in genetic algorithms. Instead, it might be implemented using other representations like binary, real-valued, or permutation depending on the specific problem being solved.

Question 15
In the standard Ethernet with transmission rate of 10Mbps,assume that the length of the medium us 2500m and size of a frame is 512 bytes. The propagation speed of a signal in a cable is normally 2×108 m/s. The transmission delay and propagation delay are
A
25.25 microseconds and 51.2 microseconds
B
51.2 microseconds and 12.5 microseconds
C
10.24 microseconds and 50.12 microseconds

D
12.5 microseconds and 51.2 microseconds
Question 16
Which one of the following is Not a part of ACID properties of a database transaction?
A
Atomicity
B
Consistency
C
Isolation
D
Deadlock-freedom
Question 16 Explanation: 
“Deadlock-freedom” is not typically considered one of the ACID properties of a database transaction. The ACID properties include:

Atomicity: Transactions are treated as all-or-nothing units. Either all the changes are applied, or none of them are.

Consistency: A transaction should bring the database from one consistent state to another consistent state. It ensures that the integrity constraints and rules are not violated during the transaction.

Isolation: Transactions should be isolated from each other, meaning the operations within a transaction should not interfere with other concurrent transactions.

Durability: Once a transaction is committed, its changes are permanent and will survive system failures.

“Deadlock-freedom” is related to concurrency control mechanisms and techniques but is not typically considered one of the core ACID properties. It’s concerned with avoiding situations where multiple transactions are waiting for each other, leading to a standstill in processing.

Question 17
Consider the following statements
A. C-fuzzy means cluster is supervised method of learning
B. PCA is used for dimension reduction
C. Apriori is not a supervised technique
D. When a machine learning model becomes so specially tuned to its exact input data that it fails to generalize to other similar data it is called underfitting

Choose the correct answer from the options given below

A
A and B
B
B and C
C
C and D
D
D and A
Question 17 Explanation: 
Statement B is correct. PCA (Principal Component Analysis) is indeed used for dimension reduction in machine learning and data analysis.

Statement C is also correct. Apriori is a frequent itemset mining algorithm used in association rule learning and is not a supervised technique in machine learning.

Statements A and D are not correct:

Statement A is incorrect. “C-fuzzy” is not a standard term in machine learning, and the statement doesn’t accurately describe a supervised method of learning.

Statement D is also incorrect. “Underfitting” is when a model is too simple and fails to capture the underlying patterns in data. It is the opposite of overfitting, which is when a model becomes too specialized to its training data.

Question 18
Given below are two statements: one is labeled as Assertion A and the other is labeled as Reason R
Assertion A: The AVL tree are more balanced as compared to Red black trees, but they may cause more rotations during insertions and deletion
Reason R: A Red Black tree with n nodes has height that is greater than 2 log2(n+1) and the AVL tree with n nodes has height less than log(√5(n+2))-2 (where ∅ is golden ratio)
In the light of the above statements, choose the correct answer from the options given below
A
Both A and R are correct and R is the correct explanation of A

B
Both A and R are correct and R is the NOT correct explanation of A
C
A is true but R is false
D
A is false but R is true
Question 18 Explanation: 
A is true but R is false
Assertion A: This statement is correct. AVL trees are generally more balanced than Red-Black trees, which means their heights are closer to logarithmic. However, the insertion and deletion operations in AVL trees may cause more rotations compared to Red-Black trees.

Red-Black Tree Height: In a Red-Black tree, the height is guaranteed to be at most approximately 2 * log₂(n+1), where “n” is the number of nodes in the tree. It can be at most twice the height of a balanced tree, which is log₂(n+1). So, the statement correctly indicates that the height is “greater than 2 * log₂(n+1).”

AVL Tree Height: In an AVL tree, the height is guaranteed to be at most log∅(√5(n+2)) – 2, where “n” is the number of nodes in the tree. The golden ratio (∅) is approximately 1.618. So, the height of an AVL tree is less than log∅(√5(n+2)) – 2.

Question 19
Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements. Assume that the insertion and deletion operations are carried out using REAR and FRONT as array index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full and queue empty are

A
EMPTY: REAR == FRONT , FULL: (REAR+1) mod n == FRONT
B
EMPTY: (FRONT+1) mod n == REAR,FULL: (REAR+1) mod n == FRONT
C
EMPTY: (REAR+1) mod n == FRONT,FULL: REAR == FRONT
D
EMPTY: REAR == FRONT,FULL: (FRONT+1) mod n == REAR empty
Question 19 Explanation: 
The correct conditions are:

EMPTY: REAR == FRONT, FULL: (REAR + 1) mod n == FRONT

Question 20
Consider the rectangle with vertices (0,0),(0,2),(3,0),(3,2).There is a scaling of 2 towards the x-axis and 3 towards the y-axis. The new coordinates of the rectangle are
A
(0,0)(6,0)(0,4)(6,4)
B
(0,0)(6,0)(0,4)(3,2)

C
(0,0)(6,0)(0,6)(6,6)
D
(0,0)(4,0)(0,6)(4,6)
Question 20 Explanation: 
To scale a rectangle by a factor of 2 along the x-axis and 3 along the y-axis, you can apply the scaling factor to each vertex individually. The scaling operation multiplies the x-coordinate by 2 and the y-coordinate by 3 for each vertex.

Given the original vertices of the rectangle:

(0, 0)
(0, 2)
(3, 0)
(3, 2)
After scaling, the new coordinates are:

(0 * 2, 0 * 3) = (0, 0)
(0 * 2, 2 * 3) = (0, 6)
(3 * 2, 0 * 3) = (6, 0)
(3 * 2, 2 * 3) = (6, 6)
So, the correct new coordinates of the rectangle after scaling are:

(0, 0) (0, 6) (6, 0) (6, 6)

The option that matches these coordinates is:

(0, 0) (0, 6) (6, 0) (6, 6)

Question 21
Consider the following finite automata F1 that accepts a language L

 

 

 

Let F2 be a finite automata which is obtained by reversal of F1.ten which of the following is correct?

 

A
L(F1) ≠ L(F2)

B
L(F1)=L(F2)
C
L(F1) ≤ L(F2)
D
L(F1) ≥ L(F2)
Question 21 Explanation: 
When a finite automaton F1 is reversed to obtain F2, the language accepted by F2 is the reverse of the language accepted by F1. In other words, if F1 accepts language L, then F2 accepts the language L reversed (the reverse of all strings in L)
Question 22
Consider the following statements about heap sort algorithm

A.The MAX-HEAPIFY procedure which runs in O lg(n) time, is the key to maintaining the max heap property
B. The BUILD-MAX-HEAP procedure which runs in O lg(n) time,produces max-heap from an unordered input array
C. The MAX-HEAP-INSERT, which runs in O(lg n) time, implements the insertion operation
D.The HEAP-INCREASE-KEY procedure runs in O(nlg n) time, to set the key of new node of its correct value
Choose the correct answer from the options given below

A
A,B only
B
A,C only
C
B,D only
D
A,B,C,D
Question 22 Explanation: 
A. The statement “The MAX-HEAPIFY procedure which runs in O(log n) time, is the key to maintaining the max heap property” is correct.

B. The statement “The BUILD-MAX-HEAP procedure which runs in O(log n) time, produces a max-heap from an unordered input array” is incorrect. BUILD-MAX-HEAP typically runs in O(n) time, not O(log n) time. It’s used to create a max-heap from an unordered array.

C. The statement “The MAX-HEAP-INSERT, which runs in O(log n) time, implements the insertion operation” is correct. MAX-HEAP-INSERT is used for inserting elements into a max-heap and typically runs in O(log n) time.

D. The statement “The HEAP-INCREASE-KEY procedure runs in O(n log n) time, to set the key of a new node to its correct value” is incorrect. HEAP-INCREASE-KEY usually runs in O(log n) time, not O(n log n) time.

So, the correct statements are A and C

Question 23
Given below are two statements:
Statement I: Fuzzifier is a part of a fuzzy system
Statement Ii: Inference engine is a part of fuzzy system
In the ligt of the above statements, choose the most appropriate answer from the options given below
A
Both statement I and Statement II are correct

B
Both statement I and Statement II are incorrect
C
Statement I is correct but Statement II is incorrect
D
Statement I is incorrect but Statement II is correct
Question 23 Explanation: 
Statement I correctly identifies that a “fuzzifier” is a component of a fuzzy system. A fuzzifier is responsible for converting crisp (non-fuzzy) inputs into fuzzy sets.

Statement II is also correct because an “inference engine” is a crucial component of a fuzzy system. It’s responsible for making decisions and performing reasoning based on fuzzy logic rules and inputs.

Both statements are accurate, and there is no conflict between them.

Question 24
Given below are two statements:
Statement I: If f and g are two functions and f=O(g) but g!=o(f), we say that the growth rate of g is smaller than that of f.
Statement Ii: The class of all decision problems decided by a TM in exponential time, that is O(2k), k being a constant
In the light of the above statements, choose the most appropriate answer from the options given below
A
Both statement I and Statement II are correct

B
Both statement I and Statement II are incorrect
C
Statement I is correct but Statement II is incorrect
D
Statement I is incorrect but Statement II is correct
Question 25
Let R(A,B,C,D) be a relational schema with the following function dependencies
A->B,B->C
C->D and D->B
The decomposition of R into (A,B)(B,C)(B,D)
A
gives a lossless join, and is dependency preserving
B
gives lossless join,but is not dependency preserving
C
does not give a lossless join, but is dependency preserving
D
does not give a lossless join, but is not dependency preserving
Question 25 Explanation: 
The decomposition of a relational schema R into smaller schemas can be analyzed for lossless join and dependency preservation using the properties of functional dependencies. Let’s break down the given functional dependencies:

A -> B
B -> C
C -> D
D -> B
Now, let’s consider the decomposition of R into (A, B), (B, C), and (B, D).

Lossless Join:
For the decomposition to be lossless join, we need to check if the natural join of the decomposed schemas can reconstruct the original relation R.

(A, B) ∩ (B, C) = (B)
(B, C) ∩ (B, D) = (B)
Both intersections include the attribute B. So, joining (A, B), (B, C), and (B, D) together would reconstruct all attributes of R. Therefore, the decomposition gives a lossless join.

Dependency Preservation:
For the decomposition to be dependency preserving, it should be checked if all the original functional dependencies can be inferred from the functional dependencies in the decomposed schemas.

In (A, B):

A -> B (from the original dependencies)
In (B, C):

B -> C (from the original dependencies)
In (B, D):

D -> B (from the original dependencies)
All original functional dependencies can be inferred from the functional dependencies in the decomposed schemas. Therefore, the decomposition is dependency preserving.

So, the correct answer is:

The decomposition gives a lossless join and is dependency preserving.

Correct Answer: D
Question 13 Explanation: 
Both A and R are correct, but R is not the correct explanation of A.

Assertion A: This statement is correct. Validity checks are essential to ensure that the system meets the real needs and requirements of the system users.

Reason R: Completeness checks are indeed about verifying that the system user-defined requirements are fully captured, but this doesn’t directly explain the concept of validity checks.

Both A and R are independently valid statements, but Reason R doesn’t directly provide an explanation for Assertion A. So, the correct answer is:

Both A and R are correct, but R is not the correct explanation of A.

0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x
error: Alert: Content selection is disabled!!