Recent questions and answers in Others

0 votes
1 answer
3
The condition $\text{num}!$ $=65$ cannot be replaced by$\text{num}$ $>65$ || $\text{num}$ $<65$$!($ num $==65)$$\text{num}$ $-65$$! (\text{num}-65)$
0 votes
1 answer
5
0 votes
1 answer
6
Which mode is a block cipher implementation as a self-synchronizing stream cipher?Cipher Block Chaining Mode,Cipher Feedback ModeElectronic Codebook ModeOutput Feedback M...
0 votes
1 answer
8
0 votes
1 answer
10
The term hacker was originally associated with :A computer programVirusComputer professionals who solved complex computer problemsAll of the above
1 votes
1 answer
11
Consider the following automata:Let $N$ be the number of $0 / 1$-strings of length exactly $6$ accepted by this automata. Which of the following is true about $\text{N}$?...
0 votes
1 answer
12
For any positive integer $\text{N}$, let $\text{p(N)}$ be the probability that a uniformly random number $a \in\{1, \ldots, N\}$ has an odd number of factors (including 1...
1 votes
2 answers
24
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
0 votes
1 answer
25
1 votes
1 answer
26
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
0 votes
0 answers
27
Which of the following clustering technique is used by K-Means algorithm:Hierarchical TechniquePartitional techniqueDivisiveAgglomerative
1 votes
1 answer
28
If $y^a$ is an integrating factor of the differential equation $2xydx-(3x^2-y^2)dy=0$, then the value of $a$ is$-4$$4$$-1$$1$
0 votes
1 answer
29
0 votes
1 answer
33
Which of the following is correct for the destination address $4 \mathrm{~A}: 30: 10: 21: 10: 1 \mathrm{~A}$ ?unicast addressmulticast addressbroadcast addressunicast and...
1 votes
1 answer
35
Consider the following :$\begin{array}{ll}\text { List I } & \text { List II } \\ \text { (A) Activation record } & \text { (I) Linking Loader } \\ \text { (B) Location c...
0 votes
1 answer
37
Consider a memory system having address spaced at a distance of $m, T=$ Bank cycle time and $n$ number of banks, then the average data access time per word access in sync...
0 votes
1 answer
38
Which layer divides each message into packets at the source and re-assembles them at the destination?Network layerTransport layerData link layerPhysical layer
0 votes
1 answer
39
Which of the following is an indirect measure of product?QualityComplexityReliabilityAll of these
To see more, click for all the questions in this category.