The objective of .................. procedure is to discover at least one ............... that causes two literals to match. (A) unification, validation (B) unification, substitution (C) substitution, unification (D) minimax, maximum

1 Answer

Answer :

(B) unification, substitution

Related questions

Description : A horn clause is ...................... (A) A clause in which no variables occur in the expression (B) A clause that has at least one negative literal (C) A disjunction of a number of literals (D) A clause that has at most one positive literal

Last Answer : (D) A clause that has at most one positive literal 

Description : In Artificial Intelligence (AI), what is present in the planning graph? (1) Sequence of levels (2) Literals (3) Variables (4) Heuristic estimates

Last Answer : Sequence of levels

Description : Requirements prioritization and negotiation belongs to: (A) Requirements validation (B) Requirements elicitation (C) Feasibility Study (D) Requirement reviews

Last Answer : (B) Requirements elicitation

Description : In which testing strategy requirements established during requirements analysis are validated against developed software? (A) Validation testing (B) Integration testing (C) Regression testing (D) System testing

Last Answer : (A) Validation testing

Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements. 

Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications. 

Description : If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as (A) Simplification (B) Unification (C) Skolemization (D) Resolution

Last Answer : (C) Skolemization

Description : PERT (Project Evaluation and Review Technique) analysis is based on  A. Optimistic time, Pessimistic time and Most likely time  B.Pessimistic time, Optional time, Maximum time  C.Optimistic time, Efficient time, Most likely time  D.Minimax time, Optimistic time and harmonic time

Last Answer : A. Optimistic time, Pessimistic time and Most likely time

Description : The statements s1 and s2 are given as: s1: Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism. s2: Context free languages are closed under complementation, ... is not correct and s2 is correct. (D) Both s1 and s2 are not correct.

Last Answer : (B) s1 is correct and s2 is not correct.

Description : In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text. (A) polyalphabetic (B) monoalphabetic (C) transpositional (D) multialphabetic

Last Answer : (B) monoalphabetic

Description : In the Indian context, the emphasis on import substitution often run counter to --------- A. the objective of managerial development B. the objective of Sports develpment C. the objective of Skill develpment D. the objective of Technological develpment

Last Answer : D. the objective of Technological develpment

Description : Which is the main objective of research ? (A) To review the literature (B) To summarize what is already known (C) To get an academic degree (D) To discover new facts or to make fresh interpretation of known facts

Last Answer : (D) To discover new facts or to make fresh interpretation of known facts

Description : Which search is similar to minimax search? a) Hill-climbing search b) Depth-first search c) Breadth-first search d) All of the mentioned

Last Answer : b) Depth-first search

Description : Which values are independant in minimax search algorithm? a) Pruned leaves x and y b) Every states are dependant c) Root is independant d) None of the mentioned

Last Answer : a) Pruned leaves x and y

Description : Which search is equal to minimax search but eliminates the branches that can’t influence the final decision? a) Depth-first search b) Breadth-first search c) Alpha-beta pruning d) None of the mentioned

Last Answer : c) Alpha-beta pruning

Description : The minimax algorithm computes the minimax decision from the current state. It uses a simple recursive computation of the minimax values of each successor state, directly implementing the defining equations. The ... are backed up through the tree as the recursion unwinds. a) True b) False

Last Answer : a) True

Description : A situation in a game where, in the payoff matrix, maximin of row is equal to minimax of column is called___ a. Centre point b. Main point c. Saddle point d. Equal point

Last Answer : c. Saddle point

Description : The position in the pay off matrix where the maximin coincides with the minimax. a. Saddle point b. Break even point c. Pivot point d. None of the above

Last Answer : a. Saddle point

Description : Which one of the following set of attributes should not be encompassed by effective software metrics ? (A) Simple and computable (B) Consistent and objective (C) Consistent in the use of units and dimensions (D) Programming language dependent

Last Answer : (D) Programming language dependent

Description : …………… can be defined as most recent and perhaps the most comprehensive technique for solving computer problems. A) System Analysis B) System Data C) System Procedure D) System Record

Last Answer : A) System Analysis

Description : Use the new system as the same time as the old system to compare the results. This is known as … A) Procedure Writing B) Simultaneous processing C) Parallel Operation D) File Conversion

Last Answer : C) Parallel Operation

Description : ................ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement. A) Procedure B) Trigger C) Curser D) None of above

Last Answer : C) Curser

Description : ............ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified. A) Procedure B) Trigger C) Curser D) None of the above

Last Answer : B) Trigger

Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is (A) HTML page (B) DOC type procedure (C) Style sheet (D) Stored procedure

Last Answer : (C) Style sheet

Description : ................ is used in game trees to reduce the number of branches of the search tree to be traversed without affecting the solution. (A) Best first search (B) Goal stack planning (C) Alpha-beta pruning procedure (D) Min-max search

Last Answer : (C) Alpha-beta pruning procedure

Description : Suppose that the time to do a null remote procedure call (RPC) (i.e, 0 data bytes) is 1.0 msec, with an additional 1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs? (A) 49 msec (B) 80 msec (C) 48 msec (D) 100 msec

Last Answer : (B) 80 msec

Description : Which of the following is least reactive in a nucleophilic substitution reaction?

Last Answer : Which of the following is least reactive in a nucleophilic substitution reaction? A. `(CH_(3))_(3)C-Cl` B. `CH_ ... 3)CH_(2)Cl` D. `CH_(2)=CHCH_(2)Cl`

Description : Which of the following compounds reacts least rapidly in electrophilic substitution reactions? (a) Nitrobenzene (b) Phenol (c) Bromobenzene (d) Toluene

Last Answer : Nitrobenzene

Description : What is called inconsistent support? a) If two literals are not negation of other b) If two literals are negation of other c) Mutually exclusive d) None of the mentioned

Last Answer : b) If two literals are negation of other

Description : What will happen if two literals are identical? a) Remains the same b) Added as three c) Reduced to one d) None of the mentioned

Last Answer : c) Reduced to one

Description : Two literals are complementary if _____________ a) They are equal b) They are identical and of equal sign c) They are identical but of opposite sign d) They are unequal but of equal sign

Last Answer : c) They are identical but of opposite sign

Description : What are the two main subroutines used for generating literals?

Last Answer : i. NEW – LITERALS  ii. CHOOSE - LITERALS

Description : How many literals are available in top-down inductive learning methods? a) 1 b) 2 c) 3 d) 4

Last Answer : c) 3

Description : Where does the degree of belief is applied? a) Propositions b) Literals c) Variables d) Statements

Last Answer : a) Propositions

Description : What are present in each level of planning graph? a) Literals b) Actions c) Variables d) Both Literals & Actions

Last Answer : d) Both Literals & Actions

Description : For resolution to apply, all sentences must be in conjunctive normal form, a conjunction of disjunctions of literals. a) True b) False

Last Answer : a) True

Description : What is the condition of variables in first-order literals? a) Existentially quantified b) Universally quantified c) Both Existentially & Universally quantified d) None of the mentioned

Last Answer : b) Universally quantified

Description : What kind of clauses are available in Conjunctive Normal Form? a) Disjunction of literals b) Disjunction of variables c) Conjunction of literals d) Conjunction of variables

Last Answer : a) Disjunction of literals

Description : Which form is called as a conjunction of disjunction of literals? a) Conjunctive normal form b) Disjunctive normal form c) Normal form d) All of the mentioned

Last Answer : a) Conjunctive normal form

Description : Define what are the different types of literals in C#?

Last Answer : Boolean literals: True and False are literals of the Boolean type that map to the true and false state, respectively. Integer literals: Used to write values of types Int, uint, long, and ulong. Real ... by a double-quote character, such as © hello . The Null literal: Represents the null-type.

Description : Define what is literals and their types?

Last Answer : Literals are value constants assigned to variables in a program. C# supports several types of literals are Integer Literals Real literals Boolean Literals Single character literals String Literals Backslash character literals

Description : Identify the literals listed below: (i) 0.5 (ii)’A’ (iii) false (iv) “a”

Last Answer : Ans. (i) Floating point literal (ii) Character literal (iii) Boolean literal (iv) String literal

Description : What are the 3 kinds of literals that can be added?

Last Answer : i. Literals using Predicate  ii. Equality and inequality literals  iii. Arithmetic comparisons

Description : Anyone have objective data on the effectiveness of the Regenexx stem cell procedure?

Last Answer : At the Regenerative Sciences, Inc. site, you can find some comments. You might wat to join the site and get some better information.

Description : A plan when expressed in quantitative terms is called– (A) Policy (B) Procedure (C) Objective (D) Budget

Last Answer : Answer: Budget

Description : Which of the following is not "essential" for communicating a research work? (a) Command over language (b) Statement of objective (c) Conclusions drawn (d) Procedure followed

Last Answer : (d) Procedure followed

Description : Which symbol will be used with grep command to match the pattern pat at the beginning of a line? A. ^pat B. $pat C. pat$ D. pat^ E. None of the above

Last Answer : A. ^pat

Description : Match the following HTTP status code to their respective definitions. i) 400 a) OK ii) 500 b) Not found iii) 200 c) Continue iv) 100 d) Internal server error A) i-b, ii-d, iii-a, iv-c B) i-a, ii-b, iii-c, iv-d C) i-b, ii-c, iii-a, iv-d D) i-b, ii-a, iii-c, iv-d

Last Answer : A) i-b, ii-d, iii-a, iv-c