Recent questions in Others

0 votes
3 answers
1481
Application of data structure queue is :Levelwise printing of treeImplementation of priority queuesFunction call implementationDepth first search in a graph
0 votes
1 answer
1482
What is the transmission signal coding method for a $T1$ carrier called?Binary$\text{NRZ}$BipolarManchester
0 votes
0 answers
1483
How much bandwidth is required to send $132$ voice- grade channels by $\text{FDM}$ on an international satellite system?$500 \text{ MHz}$$10 \text{ MHz}$$1320 \text{ MHz}...
0 votes
1 answer
1484
What is the difference between the Ethernet frame preamble field and the $\text{IEEE}$ $802.3$ preamble and start of frame Delimiter fields?$1$ byte$1$ bit$4$ bits$16$ bi...
0 votes
1 answer
1485
What is the function of a translating bridge?Connect similar remote $\text{LANs}$Connect similar local $\text{LANs}$Connect different types of $\text{LANs}$Translate the ...
0 votes
1 answer
1486
The program used to determine the round – trip delay between a workstation and a destination adress is :TracertTraceroutePingPop
0 votes
1 answer
1487
$T$ is a graph with n vertices. $T$ is connected and has exactly $n-1$ edges, then :$T$ is a tree$T$ contains no cyclesEvery pairs of vertices in $T$ is connected by exac...
0 votes
0 answers
1488
If the proposition $7P\Rightarrow Q$ is true, then the truth value of the proportion $7PV \left ( P \Rightarrow Q \right )$ is :TrueMulti – ValuedFalseCan not determine...
0 votes
1 answer
1490
0 votes
1 answer
1491
Consider the following circuit :to make it a Tautology the $?$ should be :$\text{NAND}$ gate$\text{AND}$ gate$\text{OR}$ gate$\text{EX-OR}$ gate
0 votes
2 answers
1492
0 votes
1 answer
1493
Data members and member function of a class by default is respectively :private and publicpublicpublic and privateprivate
0 votes
2 answers
1494
Function over loading done at :RuntimeCompile timeLinking timeSwitching from function to function
0 votes
2 answers
1495
A schema describes :data elementsrecords and filesrecord relationshipall of the above
0 votes
1 answer
1496
One approach to standarolizing storing of data :$\text{MIS}$ $\text{CODASYL}$Stuctured ProgramingNone of the above
0 votes
0 answers
1497
An embedded printer provides :Physical record keyAn inserted IndexA secondary access pathAll the above
0 votes
0 answers
1498
A locked file can be :accessed by only one usermodified by users with the correct passwordis used to hide sensitive informationboth $B$ and $C$
0 votes
0 answers
1499
In what tree, for every node the height of its left subtree and right subtree differ at least by one:Binary search tree$\text{AVL}$-treeThreaded binary treeComplete tree
0 votes
1 answer
1500
The data unit in the $\text{TCP/IP}$ application Layer is called a ____________ .messagesegmentdatagramframe