NTA-NET (Based on NTA-UGC) Computer Science (Paper-II): Questions 762 - 765 of 2104

Access detailed explanations (illustrated with images and videos) to 2104 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Unlimited Access for Unlimited Time!

View Sample Explanation or View Features.

Rs. 550.00 or

How to register?

Question number: 762

» Neural Networks and AI » Perceptron Model, Linear Separability and XOR Problem

Edit

Appeared in Year: 2013

MCQ▾

Question

Consider a single perception with weight as given in the following figure:

Figure shows the networks

Figure Shows the Networks

and defined as

The above perception can solve (June Paper III)

Choices

Choice (4)Response

a.

OR problem

b.

AND Problem

c.

XOR problem

d.

None of the above

Question number: 763

» Software Engineering » Software Metrics » Software Project Management

Edit

Appeared in Year: 2013

MCQ▾

Question

Sixty reusable components were available for an application. If only of these components can be used, rest would have to be developed from scratch. If average component is and cost of each LOC is rupees , what will be the risk exposure if risk probability is ? (September Paper-III)

Choices

Choice (4)Response

a.

Rupee

b.

Rupee

c.

Rupee

d.

Rupee

Question number: 764

» Discrete Mathematics » Bounding Functions

Edit

Appeared in Year: 2013

MCQ▾

Question

Let f and g be the functions from the set of integers to the set integers defined by

Then the composition of f and g and g and f is given as (December Paper-II)

Choices

Choice (4)Response

a.

b.

c.

d.

None of the above

Question number: 765

» Software Engineering » Software Design » Software Validation and Quality Assurance Techniques

Edit

Appeared in Year: 2013

MCQ▾

Question

Software safety is a ________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail. (June Paper III)

Choices

Choice (4)Response

a.

Risk mitigation, monitoring and management

b.

Software quality assurance

c.

Software cost estimation

d.

Defect removal efficiency

Developed by: