search
Log In
Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

Recent questions and answers in Others

0 votes
2 answers
1
Identify the total number of tokens in the given statement printf("A%B="&i); $7$ $8$ $9$ $13$
answered Sep 22 in Others Hira Thakur 480 views
0 votes
2 answers
2
For a given hash table $T$ with $10$ slots that stores $1000$ elements, the load factor $\alpha$ for $T$ is $100$ $0.01$ $200$ $1.05$
answered Sep 22 in Others Hira Thakur 455 views
0 votes
2 answers
3
______ is NOT a part of the ACID properties Inconsistency Consistency Atomicity Isolation
answered Sep 22 in Others Hira Thakur 153 views
0 votes
3 answers
4
Maximum number of superkeys for the relation schema $R(X,Y,Z,W)$ with $X$ as the key is $6$ $8$ $9$ $12$
answered Jul 13 in Others GursimranSingh8075 284 views
0 votes
4 answers
5
For the given recurrence equation $\begin{array} T(n) & =2T(n-1), &\text{if } n>0 \\ & =1, & \text{otherwise} \end{array}$ $O(n \log n)$ $O(n^2)$ $O(2^n)$ $O(n)$
answered Jun 11 in Others immanujs 267 views
0 votes
1 answer
6
Data Mining can be used as _________ Tool. Software Hardware Research Process
answered Jun 3 in Others Mohit Kumar 6 46 views
1 vote
1 answer
7
0 votes
1 answer
8
Let $n$ be a positive real number and $p$ be a positive integer. Which of the following inequalities is true? $n^p > \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $n^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $(n+1)^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ none of the above
answered May 23 in Others Amartya 86 views
1 vote
3 answers
9
The context free grammar $S \rightarrow aSb \mid bSa \mid \epsilon$ generates: Equal number of a’s and b’s Unequal number of a’s and b’s Any number of a’s followed by any number of b’s Any number of b’s followed by any number of a’s
answered May 2 in Others Lakshay Kakkar 231 views
1 vote
2 answers
10
Let $A_{\alpha_0}$ denotes the $\alpha$-cut of a fuzzy set $A$ at $\alpha_0$. If $\alpha_1 < \alpha_2$, then $A_{\alpha_1} \supseteq A_{\alpha_2}$ $A_{\alpha_1} \supset A_{\alpha_2}$ $A_{\alpha_1} \subseteq A_{\alpha_2}$ $A_{\alpha_1} \subset A_{\alpha_2}$
answered May 2 in Others Girjesh Chouhan 365 views
1 vote
1 answer
11
While solving the differential equation $\frac{d^2 y}{dx^2} +4y = \tan 2x$ by the method of variation of parameters, then value of Wronskion (W) is: $1$ $2$ $3$ $4$
answered Apr 9 in Others Akanksha Singh 258 views
0 votes
1 answer
12
Link analysis operation in data mining uses ___________ technique. Classification. Association discovery. Visualisation. Neural clustering.
answered Apr 2 in Others immanujs 59 views
0 votes
1 answer
13
The maximum size of SMS in $IS-95$ is ______ octets. $120$ $95$ $128$ $64$
answered Apr 2 in Others immanujs 42 views
0 votes
0 answers
14
Identify the incorrect statement : The internet has evolved into phenomenally successful e-commerce engine e-business is synonymous with e-commerce The e-commerce model $B2C$ did not begin with billboardware The e-commerce model $G2C$ began with billboardware
asked Mar 28 in Others jothee 59 views
0 votes
0 answers
15
Identify the incorrect statement : ATM provides both real time and non-real time service ATM provides faster packet switching than $X.25$ ATM was developed as part of the work on broadband ISDN ATM does not have application in Non-ISDN environments where very high data rates are required
asked Mar 28 in Others jothee 21 views
0 votes
0 answers
16
The term $hacker$ was originally associated with : A computer program Virus Computer professionals who solved complex computer problems All of the above
asked Mar 27 in Others jothee 22 views
0 votes
3 answers
17
The following table has two attributes $X$ and $Y$ where $X$ is the primary key and $Y$ is the foreign key referencing $X$ ... $(4,3)$ and $(6,4)$ $(2,4)$ and $(7,2)$ $(3,2)$ and $(9,5)$ $(3,4), (4,5)$ and $(6,4)$
answered Mar 24 in Others habedo007 631 views
0 votes
3 answers
18
Among all given option, ____ must reside in the main memory. Assembler Compiler Linker Loader
answered Mar 18 in Others smsubham 264 views
0 votes
2 answers
19
In the disk, swap space is used to _______. save XML files save process data save drivers save HTML files
answered Mar 18 in Others topper98 236 views
0 votes
2 answers
20
Baud rate measures the number of ____ transmitted per second Symbols Bits Byte None of these
answered Mar 18 in Others topper98 585 views
0 votes
2 answers
21
Identify the true statement from the given statements: Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus one B/B+ tree is defined by a term minimum degree. And minimum degree depends on hard disk block size, key and address size (1) (1) and (2) (2) None of these
answered Mar 18 in Others topper98 420 views
0 votes
2 answers
22
_____ is holding an entry for each terminal symbol and is acting as permanent database. Variable Table Terminal Table Keyword Table Identifier Table
answered Mar 18 in Others topper98 492 views
0 votes
2 answers
23
Identify the true statement from the given statements. Lossless, dependency-preserving Decompositoin into $3$ NF is always possible Any relation with two attributes is BCNF $1$ $2$ $1$ and $2$ None of these
answered Mar 18 in Others topper98 261 views
0 votes
2 answers
24
A RAM chip has a capacity of $1024$ words of $8$ bits each $(1K \times 8)$. The number of $2 \times 4$ decoders with enable line needed to construct a $32 K \times 8$ RAM from $1K \times 8$ RAM is $4$ $5$ $6$ $7$
answered Mar 18 in Others topper98 341 views
0 votes
2 answers
25
____ symbol is used to denote derived attributes in ER model Dashed ellipse Squared ellipse Ellipse with attribute name underlined Rectangular Box
answered Mar 18 in Others topper98 195 views
0 votes
2 answers
26
The smallest element that can be found in time ____ in a binary max heap. $O(n \log n)$ $O( \log n)$ $O(n)$ $O(n^2)$
answered Mar 18 in Others topper98 172 views
0 votes
2 answers
27
Identify the correct nodes and edges in the given intermediate code $i=1$ $t1=5*i$ $t2=4*t1$ $t3=t2$ $a[t3]=0$ $i=i+1$ if $i<15$ goto(2) $33$ $44$ $43$ $34$
answered Mar 18 in Others topper98 673 views
0 votes
2 answers
28
_____ merges the bodies of two loops loop rolling loop folding loop merge loop jamming
answered Mar 18 in Others topper98 153 views
0 votes
2 answers
29
Which of the following code replacements is an example of operator strength reduction? Replace $ \text{P^2} $ by $P^*P$ Replace $ P^*16$ by $P<<4$ Replace $ \text{pow}(P,3) $ by $P^*P^*P$ Replace $ (P <<5) -P $ by $P^*3$
answered Mar 18 in Others topper98 544 views
0 votes
2 answers
30
_____ IP address can be used in WAN $256.0.0.1$ $172.16.0.10$ $15.1.5.6$ $127.256.0.1$
answered Mar 18 in Others topper98 936 views
0 votes
2 answers
31
____ number of underlined graphs can be constructed using $V=(v1,v2, \dots,vn)$. $n^3$ $2^{n(n-1)}/2$ $n-1/2$ $2^{(n-1)}/2$
answered Mar 18 in Others topper98 260 views
0 votes
2 answers
32
Given message $M=1010001101$. The CRC for this given message using the divisor polynomial $x^5+x^4+x^2+1$ is ______ $01011$ $10101$ $01110$ $10110$
answered Mar 18 in Others topper98 234 views
0 votes
2 answers
33
Dijkstra’s algorithm is based on Greedy approach Dynamic programming Backtracking paradigm Divide and conquer paradigm
answered Mar 18 in Others topper98 152 views
0 votes
2 answers
34
Minimum ____ full adders and ____ half adders are required by the BCD adder to add two decimal digits. $3,2$ $9,4$ $6,5$ $5,2$
answered Mar 18 in Others topper98 411 views
0 votes
2 answers
35
____ number of gates are required to implement the Boolean function $(AB+C)$ with using only $2$-input NOR gates. $2$ $3$ $4$ $5$
answered Mar 18 in Others topper98 253 views
0 votes
3 answers
36
______ transport layer protocol is used to support clectronic mail SNMP IP SMTP TCP
answered Mar 18 in Others topper98 234 views
0 votes
3 answers
37
____ number of leaf nodes in a rooted tree of $n$ nodes, where each node is having $0$ or $3$ children $\frac{n}{2}$ $\frac{(2n+1)}{3}$ $\frac{(n-1)}{n}$ $(n-1)$
answered Mar 18 in Others topper98 201 views
0 votes
3 answers
38
Evaluation of the given postfix expression $10 \: 10 + 60 \: 6/^*8$- is $192$ $190$ $110$ $92$
answered Mar 18 in Others topper98 237 views
0 votes
3 answers
39
Time to Live(TTL) field in the IP datagram is used ______ to optimize throughput to prevent packet looping to reduce delays to prioritize packets
answered Mar 18 in Others topper98 251 views
0 votes
3 answers
40
Identify the true statement from the given statements: A recursive formal language is a recursive subset in the set of all possible words over the alphabet of the language. The complement of a recursive languages is recursive The complement of a context-free language is context-free Only $1$ $1$ and $2$ $1$, $2$ and $3$ $2$ and $3$
answered Mar 18 in Others topper98 275 views
To see more, click for all the questions in this category.
...