# Recent questions and answers in Others 1
Maximum number of superkeys for the relation schema $R(X,Y,Z,W)$ with $X$ as the key is $6$ $8$ $9$ $12$
2
For the given recurrence equation $\begin{array} T(n) & =2T(n-1), &\text{if } n>0 \\ & =1, & \text{otherwise} \end{array}$ $O(n \log n)$ $O(n^2)$ $O(2^n)$ $O(n)$
3
Data Mining can be used as _________ Tool. Software Hardware Research Process
4
Let us consider the length of the side of a square represented by $2y+3$. The length of the side of an equilateral triangle is $4y$. If the square and the equilateral triangle have equal perimeter, then what is the value of $y$? $3$ $4$ $6$ $8$
5
Let $n$ be a positive real number and $p$ be a positive integer. Which of the following inequalities is true? $n^p > \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $n^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ $(n+1)^p < \frac{(n+1)^{p+1} – n^{p+1}}{p+1}$ none of the above
6
The context free grammar $S \rightarrow aSb \mid bSa \mid \epsilon$ generates: Equal number of a’s and b’s Unequal number of a’s and b’s Any number of a’s followed by any number of b’s Any number of b’s followed by any number of a’s
1 vote
7
Let $A_{\alpha_0}$ denotes the $\alpha$-cut of a fuzzy set $A$ at $\alpha_0$. If $\alpha_1 < \alpha_2$, then $A_{\alpha_1} \supseteq A_{\alpha_2}$ $A_{\alpha_1} \supset A_{\alpha_2}$ $A_{\alpha_1} \subseteq A_{\alpha_2}$ $A_{\alpha_1} \subset A_{\alpha_2}$
1 vote
8
Identify the subnet mask for the given direct broadcast address of subnet is $201.15.16.31$ $255.255.192.192$ $255.255.255.198$ $255.255.255.240$ $255.255.257.240$
9
A construction company ready to finish a construction work in $180$ days, hired $80$ workers each working $8$ hours daily. After $90$ days, only $2/7$ of the work was completed. How many workers are to be increased to complete the work on time? Note: If additionally acquired workers do agree to work for $10$ hours daily. $90$ workers $80$ workers $65$ workers $85$ workers
10
While solving the differential equation $\frac{d^2 y}{dx^2} +4y = \tan 2x$ by the method of variation of parameters, then value of Wronskion (W) is: $1$ $2$ $3$ $4$
11
Link analysis operation in data mining uses ___________ technique. Classification. Association discovery. Visualisation. Neural clustering.
12
The maximum size of SMS in $IS-95$ is ______ octets. $120$ $95$ $128$ $64$
13
Identify the incorrect statement : The internet has evolved into phenomenally successful e-commerce engine e-business is synonymous with e-commerce The e-commerce model $B2C$ did not begin with billboardware The e-commerce model $G2C$ began with billboardware
14
Identify the incorrect statement : ATM provides both real time and non-real time service ATM provides faster packet switching than $X.25$ ATM was developed as part of the work on broadband ISDN ATM does not have application in Non-ISDN environments where very high data rates are required
15
The term $hacker$ was originally associated with : A computer program Virus Computer professionals who solved complex computer problems All of the above
16
The following table has two attributes $X$ and $Y$ where $X$ is the primary key and $Y$ is the foreign key referencing $X$ ... $(4,3)$ and $(6,4)$ $(2,4)$ and $(7,2)$ $(3,2)$ and $(9,5)$ $(3,4), (4,5)$ and $(6,4)$
1 vote
17
Divide $88$ into four parts such as first part known as a, second part b, third part c, and fourth part is d, when $5$ is added to the first part, $5$ is subtracted from the second part, $3$ is multiplied by the third part and the fourth part is divided by 5, then all results value are equal. Find the value of a, b, c and d respectively. $7, 17, 4, 60$ $8, 25, 5, 50$ $10, 30, 3, 45$ $17, 7, 4, 60$
18
Suppose a fraud shopkeeper sells rice to the customer at the cost price, but he uses a false weight of $900$ gm for a kg then his percentage gain is ______ $5.75 \%$ $5.56 \%$ $5.20 \%$ $5.00 \%$
19
Among all given option, ____ must reside in the main memory. Assembler Compiler Linker Loader
20
In the disk, swap space is used to _______. save XML files save process data save drivers save HTML files
21
Baud rate measures the number of ____ transmitted per second Symbols Bits Byte None of these
22
Identify the true statement from the given statements: Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus one B/B+ tree is defined by a term minimum degree. And minimum degree depends on hard disk block size, key and address size (1) (1) and (2) (2) None of these
23
_____ is holding an entry for each terminal symbol and is acting as permanent database. Variable Table Terminal Table Keyword Table Identifier Table
24
Identify the true statement from the given statements. Lossless, dependency-preserving Decompositoin into $3$ NF is always possible Any relation with two attributes is BCNF $1$ $2$ $1$ and $2$ None of these
25
A RAM chip has a capacity of $1024$ words of $8$ bits each $(1K \times 8)$. The number of $2 \times 4$ decoders with enable line needed to construct a $32 K \times 8$ RAM from $1K \times 8$ RAM is $4$ $5$ $6$ $7$
26
____ symbol is used to denote derived attributes in ER model Dashed ellipse Squared ellipse Ellipse with attribute name underlined Rectangular Box
27
The smallest element that can be found in time ____ in a binary max heap. $O(n \log n)$ $O( \log n)$ $O(n)$ $O(n^2)$
28
Identify the correct nodes and edges in the given intermediate code $i=1$ $t1=5*i$ $t2=4*t1$ $t3=t2$ $a[t3]=0$ $i=i+1$ if $i<15$ goto(2) $33$ $44$ $43$ $34$
29
_____ merges the bodies of two loops loop rolling loop folding loop merge loop jamming
30
Which of the following code replacements is an example of operator strength reduction? Replace $\text{P^2}$ by $P^*P$ Replace $P^*16$ by $P<<4$ Replace $\text{pow}(P,3)$ by $P^*P^*P$ Replace $(P <<5) -P$ by $P^*3$
31
_____ IP address can be used in WAN $256.0.0.1$ $172.16.0.10$ $15.1.5.6$ $127.256.0.1$
32
____ number of underlined graphs can be constructed using $V=(v1,v2, \dots,vn)$. $n^3$ $2^{n(n-1)}/2$ $n-1/2$ $2^{(n-1)}/2$
33
Given message $M=1010001101$. The CRC for this given message using the divisor polynomial $x^5+x^4+x^2+1$ is ______ $01011$ $10101$ $01110$ $10110$
34
Dijkstra’s algorithm is based on Greedy approach Dynamic programming Backtracking paradigm Divide and conquer paradigm
35
Minimum ____ full adders and ____ half adders are required by the BCD adder to add two decimal digits. $3,2$ $9,4$ $6,5$ $5,2$
36
____ number of gates are required to implement the Boolean function $(AB+C)$ with using only $2$-input NOR gates. $2$ $3$ $4$ $5$
37
______ transport layer protocol is used to support clectronic mail SNMP IP SMTP TCP
____ number of leaf nodes in a rooted tree of $n$ nodes, where each node is having $0$ or $3$ children $\frac{n}{2}$ $\frac{(2n+1)}{3}$ $\frac{(n-1)}{n}$ $(n-1)$
Evaluation of the given postfix expression $10 \: 10 + 60 \: 6/^*8$- is $192$ $190$ $110$ $92$