CBSE NET JULY 2016 PAPER 3 SOLVED PART-5


Pages: 1 2 3 4 5


  1. The region of feasible solution of a linear programming problem has a …………… property in geometry, provided the feasible solution of the problem exists.

(A) concavity (B) convexity

(C) quadratic (D) polyhedron

Answer: B


  1. Consider the following statements:

(a) Revised simplex method requires lesser computations than the simplex method.

(b) Revised simplex method automatically generates the inverse of the current basis matrix.

(c) Less number of entries are needed in each table of revised simplex method than usual simplex method.

Which of these statements are correct?

(A) (a) and (b) only (B) (a) and (c) only

(C) (b) and (c) only (D) (a), (b) and (c)

Answer: D


  1. The following transportation problem:

The above solution of a given transportation problem is

(A) infeasible solution (B) optimum solution

(C) non-optimum solution (D) unbounded solution

Answer: B


  1. Let R and S be two fuzzy relations defined as:

Then, the resulting relation, T, which relates elements of universe x to elements of universe z using max-min composition is given by

Answer: C


  1. Compute the value of adding the following two fuzzy integers:

A = {(0.3,1), (0.6,2), (1,3), (0.7,4), (0.2,5)}

B = {(0.5,11), (1,12), (0.5,13)}

Where fuzzy addition is defined asUGC net study material

μA+B(z) = maxx+y=z (min(μA(x), μB(x)))

Then, f(A+B) is equal to

(A) {(0.5,12), (0.6,13), (1,14), (0.7,15), (0.7,16), (1,17), (1,18)}

(B) {(0.5,12), (0.6,13), (1,14), (1,15), (1,16), (1,17), (1,18)}

(C) {(0.3,12), (0.5,13), (0.5,14), (1,15), (0.7,16), (0.5,17), (0.2,18)}

(D) {(0.3,12), (0.5,13), (0.6,14), (1,15), (0.7,16), (0.5,17), (0.2,18)}

Answer: D

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. A perceptron has input weights W1 = -3.9 and W2 = 1.1 with threshold value T = 0.3. What output does it give for the input x1 = 1.3 and x2 = 2.2?

(A) -2.65 (B) -2.30

(B) 0 (D) 1

Answer: C

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. What is the function of following UNIX command?

WC – l<a >b&

(A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process.

(B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

(C) It counts the errors during the execution of a process, a, and puts the result in process b.

(D) It copies the ‘ l ’ numbers of lines of program from file, a, and stores in file b.

Answer: B


  1. Which of the following statement is not correct with reference to cron daemon in UNIX O.S?

(A) The cron daemon is the standard tool for running commands on a pre-determined schedule.

(B) It starts when the system boots and runs as long as the system is up.

(C) Cron reads configuration files that contain list of command lines and the times at which they invoked.

(D) Crontab for individual users are not stored.

Answer: D

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/





  1. In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements:
  2. A mode of 641 (octal) means that the owner can read and write the file, other members of the owner’s group can read it, and users can execute only.
  3. A mode of 100 (octal) allows the owner to execute the file, but prohibits all other access.

Which of the following options is correct with reference to above statemenrs?

(A) Only I is correct (B) Only II is correct

(C) Both I and II are correct (D) Both I and II are incorrect

Answer: C


  1. Consider the statement,

“Either -2 ≤ x ≤ -1 or 1 ≤ x ≤ 2”

The negation of this statement is

(A) x<-2 or 2<x or -1<x<1 (B) x<-2 or 2<x

(C) -1<x<1 (D) x ≤ -2 or 2 ≤ x or -1<x<1

Answer: A

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. Which of the following is characteristic of an MIS?

(A) Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or comparing alternatives.

(B) Draws on diverse yet predictable data resources to aggregate and summarize data.

(C) High volume, data capture focus.

(D) Has as its goal the efficiency of data movement and processing and interfacing different TPS.

Answer: B


  1. How does randomized hill-climbing choose the next move each time?

(A) It generates a random move from the moveset, and accepts this move.

(B) It generates a random move from the whole state space, and accepts this move.

(C) It generates a random move from the moveset, and accepts this move only if this move improves the evaluation function.

(D) It generates a random move from the whole state space, and accepts this move only if this move improves the evaluation function.

Answer: C


  1. Consider the following game tree in which root is a maximizing node and children are visited left to right. What nodes will be pruned by the alpha-beta pruning?

(A) I (B) HI

(C) CHI (D) GHI

Answer: B

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty space. Given the initial state

which of the following state cannot be reached?

Answer: C

check Explanation: http://targatenet.com/cbse-net-june-2016-answer-keys/


  1. A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as:

(A) Data Dictionary (B) Reference Mechanism

(C) Inference Engine (D) Control Strategy

Answer: C


Pages: 1 2 3 4 5

 

Leave a comment