3 answers
5
Given a Non-deterministic Finite Automaton (NFA) with states $\text{p}$ and $\text{r}$ as initial and final states respectively and transition table as given below $:$$$\...
3 answers
8
A shift reduce parser suffers from Shift reduce conflict only Reduce reduce conflict only Both shift reduce conflict and reduce reduce conflict Shift handle and reduce ha...
1 answer
14
In a two-pass assembler, symbol table is Generated in first pass Generated in second pass Not generated at all Generated and used only in second pass
1 answer
18
Wireless interconnection to the $\text{PSTN}$ are also known as:Localities$\text{CLECs}$$\text{POPs}$$\text{IXCs}$
2 answers
20
Qn. 68 Which of the data structure is suitable for implementing a buffer to file?(A) File(B) Linked List(C) Array(D) All of the above(E) None of the above
2 answers
21
The branch logic that provides decision making capabilities in the control unit is known asControlled transferConditional transferUnconditional transferNone of the above
1 answer
22
Q 69. Which data structure is used to implement a request handler in a web server?(A) Stack(B) Queue(C) Arrays(D) All of the above(E) None of the above
1 answer
23
Qn 70. Which of the data structure is not suitable for building a cache?(A) File(B) Linked List(C) Arrays(D) All of the above(E) None of the above
3 answers
24
Data security threats includePrivacy invasionHardware failureFraudulent manipulation of dataEncryption and decryption
3 answers
25
Which of the following switching techniques is most suitable for interactive traffic ?Circuit switchingMessage switchingPacket switchingAll of the above
1 answer
26