Search results for non-gate

13 votes
8 answers
3
If n has 3, then the statement a[++n]=n++;assigns 3 to a[5]assigns 4 to a[5]assigns 4 to a[4]what is assigned is compiler dependent
0 votes
1 answer
4
Regression testing focuses on validatingmodule structuremodule interfacessoftware changesNone of the above
1 votes
2 answers
5
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
0 votes
2 answers
7
The MCDC software testing technique stands forMultiple Conditions Decision CoverageMultiple coverage Decision conditionsModified Condition Decision CoverageNone of the ab...
0 votes
1 answer
8
McCabe’s cyclomatic complexity number of a program control graph ‘$G$’ with $e$edges, $n$ nodes and $p$ disconnected paths is defined as$n – e + 2p$$e – n + 2 +...
1 votes
1 answer
9
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
0 votes
2 answers
10
Temporarily renting the capacity to handle spikes in load is calledCloud sharingCloud computingcloud burstingCloud loading
0 votes
1 answer
11
A standard Java API for monitoring and managing applications isJVMJVNJMXJMY
0 votes
1 answer
12
A hybrid bayesian network containsOnly continuous variablesOnly discrete variablesBoth discrete and discontinuous variablesBoth continuous and discrete variables
0 votes
0 answers
13
Which of the following clustering technique is used by K-Means algorithm:Hierarchical TechniquePartitional techniqueDivisiveAgglomerative
3 votes
4 answers
14
8 votes
3 answers
20
Using Newton-Raphson method, a root correct to 3 decimal places of $x^3 - 3x -5 = 0$2.2222.2752.279None of the above