Wednesday, 14 December 2016

UGC-NET JULY 2016 PAPER 3 QUESTIONS WITH EXPLANATION

UGC-NET JULY 2016 PAPER 3 QUESTIONS WITH EXPLANATION


Q:: 61 The region of feasible solution of a linear programming problem has a _____ property in
geometry, provided the feasible solution of the problem exists.

(1) concavity                                          (2) convexity

(3) quadratic                                          (4) polyhedron

Answer:: (2)

Q:: 62 Consider the following statements :

(a) Revised simplex method requires lesser computations than the simplex method.

(b) Revised simplex method automatically generates the inverse of the current basis
matrix.

(c) Less number of entries are needed in each table of revised simplex method than
usual simplex method.

Which of these statements are correct ?

(1) (a) and (b) only                                   (2) (a) and (c) only

(3) (b) and (c) only                                   (4) (a), (b) and (c)

Answer:: (4)

63. The following transportation problem :
                      A         B          C              Supply
  I                  50        30         220               1
 II                 90        45         170               3
III                250      200        50                 4
Demand        4           2           2

has a solution
         A     B      C
I       1
II     3       0
III            2       2
The above solution of a given transportation problem is

(1) infeasible solution                                       (2) optimum solution

(3) non-optimum solution                                (4) unbounded solution

Answer:: (2)

64. Let R and S be two fuzzy relations defined as :





Then, the resulting relation, T, which relates elements of universe x to elements of
universe z using max-min composition is given by

Answer:: (3)

Q:: 65 Compute the value of adding the following two fuzzy integers :

A = {(0.3, 1), (0.6, 2), (1, 3), (0.7, 4), (0.2, 5)}

B = {(0.5, 11), (1, 12), (0.5, 13)}

Where fuzzy addition is defined as

μA+B (z) = max
x + y = z (min (μA(x), μB(x)))
Then, f (A + B) is equal to

(1) {(0.5, 12), (0.6, 13), (1, 14), (0.7, 15), (0.7, 16), (1, 17), (1, 18)}

(2) {(0.5, 12), (0.6, 13), (1, 14), (1, 15), (1, 16), (1, 17), (1, 18)}

(3) {(0.3, 12), (0.5, 13), (0.5, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}

(4) {(0.3, 12), (0.5, 13), (0.6, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}

Answer:: (4)

Q:: 66 A perceptron has input weights W1 = – 3.9 and W2 = 1.1 with threshold value T = 0.3.
What output does it give for the input x1 = 1.3 and x2 = 2.2 ?

(1) – 2.65                                             (2) – 2.30

(3) 0                                                    (4) 1

Answer:: (3)

Q:: 67 What is the function of following UNIX command ?
           
           WC – l < a > b &

(1) It runs the word count program to count the number of lines in its input, a, writing
the result to b, as a foreground process.

(2) It runs the word count program to count the number of lines in its input, a, writing
the result to b, but does it in the background.

(3) It counts the errors during the execution of a process, a, and puts the result in
process b.

(4) It copies the ‘l’ numbers of lines of program from file, a, and stores in file b.

Answer:: (2)

Q:: 68 Which of the following statement is not correct with reference to cron daemon in UNIX O.S. ?

(1) The cron daemon is the standard tool for running commands on a pre-determined
schedule.

(2) It starts when the system boots and runs as long as the system is up.

(3) Cron reads configuration files that contain list of command lines and the times at
which they invoked.

(4) Crontab for individual users are not stored.

Answer:: (4)

Q:: 69 In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements:

I. A mode of 641 (octal) means that the owner can read and write the file, other
members of the owner’s group can read it, and users can execute only.

II. A mode of 100 (octal) allows the owner to execute the file, but prohibits all other
access.

Which of the following options is correct with reference to above statements ?

(1) Only I is correct. (2) Only II is correct.

(3) Both I and II are correct. (4) Both I and II are incorrect.

Answer:: (3)

70. Consider the statement,

“Either – 2 ≤ x ≤ – 1 or 1 ≤ x ≤2”.

The negation of this statement is

(1) x < – 2 or 2 < x or – 1 < x < 1                   (2) x < – 2 or 2 < x

(3) – 1 < x < 1                                               (4) x ≤ – 2 or 2 < x or – 1 < x < 1

Answer:: (1)

71. Which of the following is characteristic of an MIS ?

(1) Provides guidance in identifying problems, finding and evaluating alternative
solutions, and selecting or comparing alternatives.

(2) Draws on diverse yet predictable data resources to aggregate and summarize data.

(3) High volume, data capture focus.

(4) Has as its goal the efficiency of data movement and processing and interfacing
different TPS.

Answer:: (2)

72. How does randomized hill-climbing choose the next move each time ?

(1) It generates a random move from the moveset, and accepts this move.

(2) It generates a random move from the whole state space, and accepts this move.

(3) It generates a random move from the moveset, and accepts this move only if this
     move improves the evaluation function.

(4) It generates a random move from the whole state space, and accepts this move only
     if this move improves the evaluation function.

Answer:: (3)

Q:: 73 Consider the following game tree in which root is a maximizing node and children are
visited left to right. What nodes will be pruned by the alpha-beta pruning ?

(1) I                                         (2) HI
(3) CHI                                    (4) GHI

Answer:: (2)

Q:: 74 Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty space. Given the initial state
 which of the following state cannot be reached ?

Answer:: (3)


Q:: 75 A software program that infers and manipulates existing knowledge in order to generate
new knowledge is known as :

(1) Data dictionary                                 (2) Reference mechanism

(3) Inference engine                                (4) Control strategy


Answer:: (3)

                                                    <<<   1   2   3   4   5   6   7   >>>

No comments:

Post a Comment