# Recent questions and answers in Others

1
Identify the total number of tokens in the given statement printf("A%B="&i); $7$ $8$ $9$ $13$
2
For a given hash table $T$ with $10$ slots that stores $1000$ elements, the load factor $\alpha$ for $T$ is $100$ $0.01$ $200$ $1.05$
3
______ is NOT a part of the ACID properties Inconsistency Consistency Atomicity Isolation
4
Maximum number of superkeys for the relation schema $R(X,Y,Z,W)$ with $X$ as the key is $6$ $8$ $9$ $12$
5
For the given recurrence equation $\begin{array} T(n) & =2T(n-1), &\text{if } n>0 \\ & =1, & \text{otherwise} \end{array}$ $O(n \log n)$ $O(n^2)$ $O(2^n)$ $O(n)$
6
Data Mining can be used as _________ Tool. Software Hardware Research Process
1 vote
7
How can we set a Cookie visibility scope to local storage ? $\$ $\%$ $/$ All of the options
8
Let $n$ be a positive real number and $p$ be a positive integer. Which of the following inequalities is true? $n^p > \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $n^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $(n+1)^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ none of the above
1 vote
9
The context free grammar $S \rightarrow aSb \mid bSa \mid \epsilon$ generates: Equal number of a’s and b’s Unequal number of a’s and b’s Any number of a’s followed by any number of b’s Any number of b’s followed by any number of a’s
1 vote
10
Let $A_{\alpha_0}$ denotes the $\alpha$-cut of a fuzzy set $A$ at $\alpha_0$. If $\alpha_1 < \alpha_2$, then $A_{\alpha_1} \supseteq A_{\alpha_2}$ $A_{\alpha_1} \supset A_{\alpha_2}$ $A_{\alpha_1} \subseteq A_{\alpha_2}$ $A_{\alpha_1} \subset A_{\alpha_2}$
1 vote
11
While solving the differential equation $\frac{d^2 y}{dx^2} +4y = \tan 2x$ by the method of variation of parameters, then value of Wronskion (W) is: $1$ $2$ $3$ $4$
12
Link analysis operation in data mining uses ___________ technique. Classification. Association discovery. Visualisation. Neural clustering.
13
The maximum size of SMS in $IS-95$ is ______ octets. $120$ $95$ $128$ $64$
14
Identify the incorrect statement : The internet has evolved into phenomenally successful e-commerce engine e-business is synonymous with e-commerce The e-commerce model $B2C$ did not begin with billboardware The e-commerce model $G2C$ began with billboardware
15
Identify the incorrect statement : ATM provides both real time and non-real time service ATM provides faster packet switching than $X.25$ ATM was developed as part of the work on broadband ISDN ATM does not have application in Non-ISDN environments where very high data rates are required
16
The term $hacker$ was originally associated with : A computer program Virus Computer professionals who solved complex computer problems All of the above
17
The following table has two attributes $X$ and $Y$ where $X$ is the primary key and $Y$ is the foreign key referencing $X$ ... $(4,3)$ and $(6,4)$ $(2,4)$ and $(7,2)$ $(3,2)$ and $(9,5)$ $(3,4), (4,5)$ and $(6,4)$
18
Among all given option, ____ must reside in the main memory. Assembler Compiler Linker Loader
19
In the disk, swap space is used to _______. save XML files save process data save drivers save HTML files
20
Baud rate measures the number of ____ transmitted per second Symbols Bits Byte None of these
21
Identify the true statement from the given statements: Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus one B/B+ tree is defined by a term minimum degree. And minimum degree depends on hard disk block size, key and address size (1) (1) and (2) (2) None of these
22
_____ is holding an entry for each terminal symbol and is acting as permanent database. Variable Table Terminal Table Keyword Table Identifier Table
23
Identify the true statement from the given statements. Lossless, dependency-preserving Decompositoin into $3$ NF is always possible Any relation with two attributes is BCNF $1$ $2$ $1$ and $2$ None of these
24
A RAM chip has a capacity of $1024$ words of $8$ bits each $(1K \times 8)$. The number of $2 \times 4$ decoders with enable line needed to construct a $32 K \times 8$ RAM from $1K \times 8$ RAM is $4$ $5$ $6$ $7$
25
____ symbol is used to denote derived attributes in ER model Dashed ellipse Squared ellipse Ellipse with attribute name underlined Rectangular Box
26
The smallest element that can be found in time ____ in a binary max heap. $O(n \log n)$ $O( \log n)$ $O(n)$ $O(n^2)$
27
Identify the correct nodes and edges in the given intermediate code $i=1$ $t1=5*i$ $t2=4*t1$ $t3=t2$ $a[t3]=0$ $i=i+1$ if $i<15$ goto(2) $33$ $44$ $43$ $34$
28
_____ merges the bodies of two loops loop rolling loop folding loop merge loop jamming
29
Which of the following code replacements is an example of operator strength reduction? Replace $\text{P^2}$ by $P^*P$ Replace $P^*16$ by $P<<4$ Replace $\text{pow}(P,3)$ by $P^*P^*P$ Replace $(P <<5) -P$ by $P^*3$
30
_____ IP address can be used in WAN $256.0.0.1$ $172.16.0.10$ $15.1.5.6$ $127.256.0.1$
31
____ number of underlined graphs can be constructed using $V=(v1,v2, \dots,vn)$. $n^3$ $2^{n(n-1)}/2$ $n-1/2$ $2^{(n-1)}/2$
32
Given message $M=1010001101$. The CRC for this given message using the divisor polynomial $x^5+x^4+x^2+1$ is ______ $01011$ $10101$ $01110$ $10110$
33
Dijkstra’s algorithm is based on Greedy approach Dynamic programming Backtracking paradigm Divide and conquer paradigm
34
Minimum ____ full adders and ____ half adders are required by the BCD adder to add two decimal digits. $3,2$ $9,4$ $6,5$ $5,2$
35
____ number of gates are required to implement the Boolean function $(AB+C)$ with using only $2$-input NOR gates. $2$ $3$ $4$ $5$
36
______ transport layer protocol is used to support clectronic mail SNMP IP SMTP TCP
37
____ number of leaf nodes in a rooted tree of $n$ nodes, where each node is having $0$ or $3$ children $\frac{n}{2}$ $\frac{(2n+1)}{3}$ $\frac{(n-1)}{n}$ $(n-1)$
Evaluation of the given postfix expression $10 \: 10 + 60 \: 6/^*8$- is $192$ $190$ $110$ $92$
Identify the true statement from the given statements: A recursive formal language is a recursive subset in the set of all possible words over the alphabet of the language. The complement of a recursive languages is recursive The complement of a context-free language is context-free Only $1$ $1$ and $2$ $1$, $2$ and $3$ $2$ and $3$