>
CUET (PG)
>
Data Science A.I Cyber Security and Computer Sci.
List of top Data Science A.I Cyber Security and Computer Sci. Questions asked in CUET (PG)
Finite Languages satisfy the pumping lemma by having n = .
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Match List I with List II.
LIST I
LIST II
(A) Unification
(I) Variable can be done with a constant, another variable, or a function.
(B) Deep backtracking
(II) The entire conjunctive goal is executed.
(C) Forward movement
(III) Choose subgoal with possible unifier.
(D) Shallow backtracking
(IV) Previous subgoal to find alternative solutions.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Consider the FOL sentence F: ∀x(∃y R(x, y)). Assuming non-empty logical domains, which of the sentences below are implied by F?
(A) ∃y(∃x R(x, y))
(B) ∃y(∀x R(x, y))
(C) ∀y(∃x R(x, y))
(D) ¬∃x(∀y ¬R(x, y))
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Which of the following 'Laws' is Asimov’s first and most important law of robotics?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
What is a perception check?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Which of the following statement(s) is/are correct about Stacking in the context of machine learning?
(A) A logistic regression will definitely work better in the second stage as compared to other classification models.
(B) A machine learning model is trained on predictions of multiple machine learning models.
(C) First stage models are trained on full/partial feature space of training data.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Which is/are true about bias and variance?
(A) High bias means that the model is underfitting.
(B) High variance means that the model is overfitting.
(C) High bias means that the model is overfitting.
(D) Bias and variance are inversely proportional to each other.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Given (x1, y1), (x2, y2), ..., (xn, yn), the best fitting data to y=f(x) by least squares requires minimization of:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Which of the following activation function outputs is zero-centered?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
A natural way to visualize the process of training a self-organizing map is called:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
A 4-input neuron has weights 1, 2, 3, 4, respectively. The transfer function is linear with a constant of proportionality equal to 2. The inputs are 4, 10, 5, and 20, respectively. The output will be:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
What is meant by factoring?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
The simultaneous equations on the Boolean variables x, y, z, and w are: x + y + z = 1, xy = 0, x + y + w = 1, xy + z = 0. The solution for x, y, z, and w, respectively, is:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
Which of the following statements are not true?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
An FPGA with an embedded logic function that cannot be programmed is said to be:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
A pulse is applied to each input of a 2-input NAND gate. One pulse goes high at t=0 and goes back low at t=1ms. The other pulse goes high at t=0 and goes back low at t=3ms. The output pulse can be described as follows:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
Add the following hexadecimal numbers:
\(DF_{16} + AC_{16}\)
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
In case of DMA, after the completion of the transfer, the processor is required to be notified of the completion. This is done through.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Match List I with List II.
List I
List II
A. Supervisor mode
I. Entered when the processor encounters a software interrupt instruction
B. Abort Mode
II. Entered in response to memory fault
C. Fast Interrupt Mode
III. Entered whenever the processor receives an interrupt signal from a designated fast interrupt source
D. Interrupt Mode
IV. Entered whenever the processor receives an interrupt signal from any other source
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Cycle stealing mode of DMA operation involves:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Each instruction in an assembly language program has the following fields. What is the correct sequence of these fields?,
(A) Label field
(B) Mnemonic field
(C) Operand field
(D) Comment field
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Which of the following in 8085 microprocessor performs HL = HL + HL?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
The contents of register BL and register AL of 8085 microprocessor are 49H and 3AH, respectively. The contents of AL, the status of carry flag (CF), and sign flag (SF) after executing the instruction SUB AL, BL are:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Choose the software interrupt from the following list:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
The number of wait states required to interface 8279 to 8086 with an 8MHz clock are:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Microprocessors and Interfacing
Prev
1
2
3
Next