Search results for non-gate

0 votes
1 answer
3
A constructor cannot be explicitly called by the client program. true or false?
0 votes
0 answers
4
A program that includes the file containing a class declaration is called a ________ program of the class.
13 votes
8 answers
5
If n has 3, then the statement a[++n]=n++;assigns 3 to a[5]assigns 4 to a[5]assigns 4 to a[4]what is assigned is compiler dependent
0 votes
1 answer
6
Regression testing focuses on validatingmodule structuremodule interfacessoftware changesNone of the above
1 votes
2 answers
7
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
0 votes
1 answer
9
To change the style of a particular HTML element, we use: 1) Inline CSS 2) Internal CSS 3) External CSS 4) Inline and Internal CSS . Please check If question...
0 votes
2 answers
10
The MCDC software testing technique stands forMultiple Conditions Decision CoverageMultiple coverage Decision conditionsModified Condition Decision CoverageNone of the ab...
0 votes
1 answer
11
McCabe’s cyclomatic complexity number of a program control graph ‘$G$’ with $e$edges, $n$ nodes and $p$ disconnected paths is defined as$n – e + 2p$$e – n + 2 +...
1 votes
1 answer
12
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
0 votes
2 answers
13
Temporarily renting the capacity to handle spikes in load is calledCloud sharingCloud computingcloud burstingCloud loading
0 votes
1 answer
14
A standard Java API for monitoring and managing applications isJVMJVNJMXJMY
0 votes
1 answer
15
A hybrid bayesian network containsOnly continuous variablesOnly discrete variablesBoth discrete and discontinuous variablesBoth continuous and discrete variables
0 votes
0 answers
16
Which of the following clustering technique is used by K-Means algorithm:Hierarchical TechniquePartitional techniqueDivisiveAgglomerative
3 votes
4 answers
17