search
Log In
Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

Recent questions and answers in Others

1 vote
1 answer
1
(I) Each object in the active directory of windows 2000 has an access control list. (II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the following is true? only (I) only (II) both (I) and (II) None of the above
answered 4 days ago in Others VIDYADHAR SHELKE 1 202 views
0 votes
2 answers
2
Which of the following statements is wrong? $2-$ phase Locking Protocols suffer from dead locks. Time-Stamp Protocols suffer from more aborts. Time-Stamp Protocols suffer from cascading roll back where as $2-$ locking Protocol donot. None of these
answered Oct 21 in Others VIDYADHAR SHELKE 1 68 views
0 votes
1 answer
3
Which of the following statement is false? Every tree is a bipartite graph A tree contains a cycle A tree with $n$ nodes contains $(n-1)$ edges A tree is connected graph
answered Oct 1 in Others VIDYADHAR SHELKE 1 25 views
0 votes
0 answers
4
A solution for the differential equation $x’(t) + 2x(t) = \delta(t)$ with initial condition $x(\overline{0}) = 0$ $e^{-2t}u(t)$ $e^{2t}u(t)$ $e^{-t}u(t)$ $e^{t}u(t)$
asked Aug 28 in Others Lakshman Patel RJIT 26 views
14 votes
1 answer
5
Hi everyone. I kindly request all the people who don't find this relevant please ignore this post and follow yourself just read it once it may be helpful. It's 4 and we all are going to appear for the GATE paper on 6, so i felt to talk something about what i felt is ... KE AGE JEET HAI " And we all are going to win our fear this time only. revise hard and just go, WIsh YoU BEst Of Luck .
answered Aug 28 in Others nocturnal123 397 views
0 votes
1 answer
6
Analysis of large database to retrive information is called : $OLTP$ $LAP$ $OLDP$ $TLPP$
answered Aug 23 in Others nocturnal123 36 views
0 votes
1 answer
7
The testing of software against $SRS$ is called : Acceptance testing Integration testing Regression testing Series testing
answered Aug 23 in Others nocturnal123 34 views
0 votes
1 answer
8
Bluetooth technology uses the transmission media. Radio links Microwave links $VSAT$ communication Optical fibre links
answered Aug 23 in Others nocturnal123 49 views
0 votes
1 answer
9
Which of the following is not collision Resolution Technique : Hash addressing​​​​​​​ Chainning Indexing None of these
answered Aug 23 in Others nocturnal123 25 views
0 votes
1 answer
10
_______synchronize critical resources to prevent deadlock. $P$- operator $V$- operator Semaphores Hard disk
answered Aug 23 in Others nocturnal123 41 views
0 votes
1 answer
11
The dynamic binding occurs during the: Compile time Run time Linking time Pre-processing time
answered Aug 23 in Others nocturnal123 61 views
0 votes
1 answer
12
$YACC$ builds up _____parsing table. $LALR$ $LR$ $SLR$ $LLR$
answered Aug 23 in Others nocturnal123 40 views
0 votes
1 answer
13
Which statements is wrong If linked origin $\neq$ translated origin, relocation must be performed by the linker If load $\neq$ linked origin, the loader must perform relocation A linker always perform relocation, whereas some loaders do not None of these
answered Aug 23 in Others nocturnal123 256 views
0 votes
1 answer
14
Problems with waterfall model are: Real projects rarely follow this model proposes It is often difficult for the customer Working model is available only in the end Developers are delayed unnecessarily Which of the following is true: $1$ and $4$ only $2$ and $3$ only $1$,$2$ and $3$ only $1$,$2$,$3$ and $4$
answered Aug 23 in Others nocturnal123 28 views
0 votes
1 answer
15
Amongst the logic families $DTL, TTL, ECL$ and $CMOS$, the family with the least power dissipation is : $CMOS$ $DTL$ $TTL$ $ECL$
answered Aug 23 in Others nocturnal123 41 views
0 votes
1 answer
16
The running time of using two-way merge-sort technique to sort a file of $n>1$ record is $2T (n/2) + \theta (n)$ $\text{lg}(n) + \theta(n)$ $\theta (n)$ $O(n)$
answered Aug 21 in Others nocturnal123 25 views
0 votes
1 answer
17
Banker's algorithm is for Dead lock Prevention Dead lock Avoidance Dead lock Detection Dead lock creation
answered Aug 21 in Others nocturnal123 30 views
0 votes
1 answer
18
An Entity-relationship diagram is a tool to represent : Data model Process model Event model Customer model
answered Aug 21 in Others nocturnal123 36 views
0 votes
1 answer
19
The data hiding is taken care by : Abstraction Encapsulation Modularity Inheritance
answered Aug 21 in Others nocturnal123 72 views
0 votes
1 answer
20
Moving Process from main memory to disk is called : Caching Termination Swapping Interruption
answered Aug 21 in Others nocturnal123 46 views
0 votes
1 answer
21
The principle of Locality of reference justifies the use of : Virtual memory Interrupts Cache memory Secondary memory
answered Aug 21 in Others nocturnal123 45 views
0 votes
1 answer
22
Which of the following binary number is the same as its $2's$ complement : $1010$ $0101$ $1000$ $1001$
answered Aug 21 in Others nocturnal123 45 views
0 votes
1 answer
23
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted as a child of the node “$g$” ? $1$ $3$ $7$ $8$
answered Aug 21 in Others nocturnal123 45 views
0 votes
1 answer
24
Which of the following statement is false ? Every tree is a bipertite graph A tree contains a cycle A tree with n nodes contains $n-1$ edges A tree is a connected graph
answered Aug 21 in Others nocturnal123 24 views
0 votes
1 answer
25
What is the time required to insert an element in a stack with linked implementation? $O \left(\log_{2}n \right)$ $O \left(n \right)$ $O \left(n \log_{2}n \right)$ $O \left(1 \right)$
answered Aug 21 in Others nocturnal123 27 views
0 votes
1 answer
26
Multi-valued dependency among attribute is checked at which level ? $2$ $NF$ $3$ $NF$ $4$ $NF$ $5$ $NF$
answered Aug 21 in Others nocturnal123 21 views
0 votes
1 answer
27
The logic expression $\overline{x}y\overline{z}+\overline{x}yz+xy\overline{z}+xyz$ reduces to : $\overline{x}z$ $xyz$ $y$ $yz$
answered Aug 21 in Others nocturnal123 31 views
0 votes
1 answer
28
Encryption and decryption are the functions of the _________ layer of $OSI$ model : transport session router presentation
answered Aug 21 in Others nocturnal123 49 views
0 votes
1 answer
29
Application of data structure queue is : Levelwise printing of tree Implementation of priority queues Function call implementation Depth first search in a graph
answered Aug 21 in Others nocturnal123 27 views
0 votes
1 answer
30
What is the difference between the Ethernet frame preamble field and the $IEEE$ $802.3$ preamble and start of frame frame Delimiter fields? $1$ byte $1$ bit $4$ bits $16$ bits
answered Aug 21 in Others nocturnal123 39 views
0 votes
1 answer
31
$T$ is a graph with n vertices. $T$ is connected and has exactly $n-1$ edges, then : $T$ is a tree $T$ contains no cycles Every pairs of vertices in $T$ is connected by exactly one path All of these
answered Aug 21 in Others nocturnal123 29 views
0 votes
1 answer
32
Let $A$ and $B$ be two arbitrary events, then : $P\left ( A\cap B \right )= P\left ( A \right )P\left ( B \right )$ $P\left ( P\cup B \right )= P\left ( A \right ) + P\left ( B \right )$ $P\left ( P\cup B \right )\leq P\left ( A \right ) + P\left ( B \right )$ $P\left ( A/ B \right )=P\left ( A\cap B \right )+P\left ( B \right )$
answered Aug 21 in Others nocturnal123 24 views
0 votes
1 answer
33
Which of the following is divisible by $4$? $100101100$ $1110001110001$ $11110011$ $10101010101010$
answered Aug 21 in Others nocturnal123 35 views
0 votes
1 answer
34
The bitwise $OR$ of $35$ with $7$ in $C$ will be : $35$ $7$ $42$ $39$
answered Aug 21 in Others nocturnal123 16 views
0 votes
1 answer
35
Function over loading done at : Runtime Compile time Linking time Switching from function to function
answered Aug 21 in Others nocturnal123 19 views
0 votes
1 answer
36
What will be the value of i for the following expression: $int$ $i=11, i=3$ ; $i+=\left ( f> 3 \right )?i \& 2:5$ ; $2$ $5$ $13$ $12$
answered Aug 21 in Others nocturnal123 38 views
0 votes
1 answer
37
One approach to standarolizing storing of data : $MIS$ $CODASYL$ Stuctured Programing None of the above
answered Aug 21 in Others nocturnal123 16 views
0 votes
1 answer
38
A schema describes : data elements records and files record relationship all of the above
answered Aug 21 in Others nocturnal123 19 views
0 votes
1 answer
39
The “nice” command is used in Unix: to decrease the priority of a precess. to increase the priority of a process. to get the highest priority. nothing to do with the priorities.
answered Aug 21 in Others nocturnal123 17 views
0 votes
1 answer
40
Which of the following statement is wrong? $2-$ phase locking protocol suffers from dead locks Time-Stamp protocol suffers from more abort Time stamp protocol suffers from cascading rollbacks where as $2-$ phase locking protocol do not None of these
answered Aug 20 in Others nocturnal123 24 views
To see more, click for all the questions in this category.
...