420 views

Please log in or register to answer this question.

Related questions

0 votes
0 votes
0 answers
1
rsansiya111 asked Dec 6, 2021
376 views
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attackBandwidth flooding...
0 votes
0 votes
1 answer
2
rapidxy asked Dec 14, 2021
395 views
Let $C(n,r)= \binom{n}{r}$.The value of $\sum_{k=0}^{20}(2k+1)C(41,2k+1)$ is :A)40(2)^40 B)40(2)^39C)41(2)^40D)41(2)^39
1 votes
1 votes
0 answers
3
rsansiya111 asked Dec 6, 2021
408 views
If a hash table is implemented asa search tree, the expected time required to enter n names and make m searches is proportional to: (n + m) $log_{2} n$(n + m) $log_{2} m$...
0 votes
0 votes
0 answers
4
rsansiya111 asked Dec 6, 2021
188 views
Consider a relation R with attributes {A,B,C} and functional dependency set S ={A → B, A → C}. Then relation R can be decomposed into two relations: R1{A,B} AND R2{A...