search
Log In
Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

Recent questions and answers in Others

0 votes
3 answers
1
Maximum number of superkeys for the relation schema $R(X,Y,Z,W)$ with $X$ as the key is $6$ $8$ $9$ $12$
answered Jul 13 in Others GursimranSingh8075 171 views
0 votes
4 answers
2
For the given recurrence equation $\begin{array} T(n) & =2T(n-1), &\text{if } n>0 \\ & =1, & \text{otherwise} \end{array}$ $O(n \log n)$ $O(n^2)$ $O(2^n)$ $O(n)$
answered Jun 11 in Others immanujs 145 views
0 votes
1 answer
3
Data Mining can be used as _________ Tool. Software Hardware Research Process
answered Jun 3 in Others Mohit Kumar 6 31 views
0 votes
2 answers
4
Let us consider the length of the side of a square represented by $2y+3$. The length of the side of an equilateral triangle is $4y$. If the square and the equilateral triangle have equal perimeter, then what is the value of $y$? $3$ $4$ $6$ $8$
answered May 31 in Others vishwanath s 393 views
0 votes
1 answer
5
Let $n$ be a positive real number and $p$ be a positive integer. Which of the following inequalities is true? $n^p > \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $n^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $(n+1)^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ none of the above
answered May 23 in Others Amartya 54 views
0 votes
3 answers
6
The context free grammar $S \rightarrow aSb \mid bSa \mid \epsilon$ generates: Equal number of a’s and b’s Unequal number of a’s and b’s Any number of a’s followed by any number of b’s Any number of b’s followed by any number of a’s
answered May 2 in Others Lakshay Kakkar 154 views
1 vote
2 answers
7
Let $A_{\alpha_0}$ denotes the $\alpha$-cut of a fuzzy set $A$ at $\alpha_0$. If $\alpha_1 < \alpha_2$, then $A_{\alpha_1} \supseteq A_{\alpha_2}$ $A_{\alpha_1} \supset A_{\alpha_2}$ $A_{\alpha_1} \subseteq A_{\alpha_2}$ $A_{\alpha_1} \subset A_{\alpha_2}$
answered May 2 in Others Girjesh Chouhan 229 views
1 vote
2 answers
8
Identify the subnet mask for the given direct broadcast address of subnet is $201.15.16.31$ $255.255.192.192$ $255.255.255.198$ $255.255.255.240$ $255.255.257.240$
answered Apr 28 in Others Niteesh Kumar 245 views
0 votes
2 answers
9
A construction company ready to finish a construction work in $180$ days, hired $80$ workers each working $8$ hours daily. After $90$ days, only $2/7$ of the work was completed. How many workers are to be increased to complete the work on time? Note: If additionally acquired workers do agree to work for $10$ hours daily. $90$ workers $80$ workers $65$ workers $85$ workers
answered Apr 17 in Others hemantsoni 1k views
0 votes
1 answer
10
While solving the differential equation $\frac{d^2 y}{dx^2} +4y = \tan 2x$ by the method of variation of parameters, then value of Wronskion (W) is: $1$ $2$ $3$ $4$
answered Apr 9 in Others Akanksha Singh 130 views
0 votes
1 answer
11
Link analysis operation in data mining uses ___________ technique. Classification. Association discovery. Visualisation. Neural clustering.
answered Apr 2 in Others immanujs 25 views
0 votes
1 answer
12
The maximum size of SMS in $IS-95$ is ______ octets. $120$ $95$ $128$ $64$
answered Apr 2 in Others immanujs 29 views
0 votes
0 answers
13
Identify the incorrect statement : The internet has evolved into phenomenally successful e-commerce engine e-business is synonymous with e-commerce The e-commerce model $B2C$ did not begin with billboardware The e-commerce model $G2C$ began with billboardware
asked Mar 28 in Others jothee 45 views
0 votes
0 answers
14
Identify the incorrect statement : ATM provides both real time and non-real time service ATM provides faster packet switching than $X.25$ ATM was developed as part of the work on broadband ISDN ATM does not have application in Non-ISDN environments where very high data rates are required
asked Mar 28 in Others jothee 14 views
0 votes
0 answers
15
The term $hacker$ was originally associated with : A computer program Virus Computer professionals who solved complex computer problems All of the above
asked Mar 27 in Others jothee 17 views
0 votes
3 answers
16
The following table has two attributes $X$ and $Y$ where $X$ is the primary key and $Y$ is the foreign key referencing $X$ ... $(4,3)$ and $(6,4)$ $(2,4)$ and $(7,2)$ $(3,2)$ and $(9,5)$ $(3,4), (4,5)$ and $(6,4)$
answered Mar 24 in Others habedo007 396 views
1 vote
3 answers
17
Divide $88$ into four parts such as first part known as a, second part b, third part c, and fourth part is d, when $5$ is added to the first part, $5$ is subtracted from the second part, $3$ is multiplied by the third part and the fourth part is divided by 5, then all results value are equal. Find the value of a, b, c and d respectively. $7, 17, 4, 60$ $8, 25, 5, 50$ $10, 30, 3, 45$ $17, 7, 4, 60$
answered Mar 22 in Others himanshu26 826 views
0 votes
2 answers
18
Suppose a fraud shopkeeper sells rice to the customer at the cost price, but he uses a false weight of $900$ gm for a kg then his percentage gain is ______ $5.75 \%$ $5.56 \%$ $5.20 \%$ $5.00 \%$
answered Mar 22 in Others himanshu26 1.7k views
0 votes
3 answers
19
Among all given option, ____ must reside in the main memory. Assembler Compiler Linker Loader
answered Mar 18 in Others smsubham 160 views
0 votes
2 answers
20
In the disk, swap space is used to _______. save XML files save process data save drivers save HTML files
answered Mar 18 in Others topper98 159 views
0 votes
2 answers
21
Baud rate measures the number of ____ transmitted per second Symbols Bits Byte None of these
answered Mar 18 in Others topper98 321 views
0 votes
2 answers
22
Identify the true statement from the given statements: Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus one B/B+ tree is defined by a term minimum degree. And minimum degree depends on hard disk block size, key and address size (1) (1) and (2) (2) None of these
answered Mar 18 in Others topper98 278 views
0 votes
2 answers
23
_____ is holding an entry for each terminal symbol and is acting as permanent database. Variable Table Terminal Table Keyword Table Identifier Table
answered Mar 18 in Others topper98 283 views
0 votes
2 answers
24
Identify the true statement from the given statements. Lossless, dependency-preserving Decompositoin into $3$ NF is always possible Any relation with two attributes is BCNF $1$ $2$ $1$ and $2$ None of these
answered Mar 18 in Others topper98 159 views
0 votes
2 answers
25
A RAM chip has a capacity of $1024$ words of $8$ bits each $(1K \times 8)$. The number of $2 \times 4$ decoders with enable line needed to construct a $32 K \times 8$ RAM from $1K \times 8$ RAM is $4$ $5$ $6$ $7$
answered Mar 18 in Others topper98 188 views
0 votes
2 answers
26
____ symbol is used to denote derived attributes in ER model Dashed ellipse Squared ellipse Ellipse with attribute name underlined Rectangular Box
answered Mar 18 in Others topper98 119 views
0 votes
2 answers
27
The smallest element that can be found in time ____ in a binary max heap. $O(n \log n)$ $O( \log n)$ $O(n)$ $O(n^2)$
answered Mar 18 in Others topper98 130 views
0 votes
2 answers
28
Identify the correct nodes and edges in the given intermediate code $i=1$ $t1=5*i$ $t2=4*t1$ $t3=t2$ $a[t3]=0$ $i=i+1$ if $i<15$ goto(2) $33$ $44$ $43$ $34$
answered Mar 18 in Others topper98 350 views
0 votes
2 answers
29
_____ merges the bodies of two loops loop rolling loop folding loop merge loop jamming
answered Mar 18 in Others topper98 107 views
0 votes
2 answers
30
Which of the following code replacements is an example of operator strength reduction? Replace $ \text{P^2} $ by $P^*P$ Replace $ P^*16$ by $P<<4$ Replace $ \text{pow}(P,3) $ by $P^*P^*P$ Replace $ (P <<5) -P $ by $P^*3$
answered Mar 18 in Others topper98 346 views
0 votes
2 answers
31
_____ IP address can be used in WAN $256.0.0.1$ $172.16.0.10$ $15.1.5.6$ $127.256.0.1$
answered Mar 18 in Others topper98 511 views
0 votes
2 answers
32
____ number of underlined graphs can be constructed using $V=(v1,v2, \dots,vn)$. $n^3$ $2^{n(n-1)}/2$ $n-1/2$ $2^{(n-1)}/2$
answered Mar 18 in Others topper98 203 views
0 votes
2 answers
33
Given message $M=1010001101$. The CRC for this given message using the divisor polynomial $x^5+x^4+x^2+1$ is ______ $01011$ $10101$ $01110$ $10110$
answered Mar 18 in Others topper98 150 views
0 votes
2 answers
34
Dijkstra’s algorithm is based on Greedy approach Dynamic programming Backtracking paradigm Divide and conquer paradigm
answered Mar 18 in Others topper98 107 views
0 votes
2 answers
35
Minimum ____ full adders and ____ half adders are required by the BCD adder to add two decimal digits. $3,2$ $9,4$ $6,5$ $5,2$
answered Mar 18 in Others topper98 230 views
0 votes
2 answers
36
____ number of gates are required to implement the Boolean function $(AB+C)$ with using only $2$-input NOR gates. $2$ $3$ $4$ $5$
answered Mar 18 in Others topper98 185 views
0 votes
3 answers
37
______ transport layer protocol is used to support clectronic mail SNMP IP SMTP TCP
answered Mar 18 in Others topper98 145 views
0 votes
3 answers
38
____ number of leaf nodes in a rooted tree of $n$ nodes, where each node is having $0$ or $3$ children $\frac{n}{2}$ $\frac{(2n+1)}{3}$ $\frac{(n-1)}{n}$ $(n-1)$
answered Mar 18 in Others topper98 136 views
0 votes
3 answers
39
Evaluation of the given postfix expression $10 \: 10 + 60 \: 6/^*8$- is $192$ $190$ $110$ $92$
answered Mar 18 in Others topper98 149 views
0 votes
3 answers
40
Time to Live(TTL) field in the IP datagram is used ______ to optimize throughput to prevent packet looping to reduce delays to prioritize packets
answered Mar 18 in Others topper98 191 views
To see more, click for all the questions in this category.
...