Recent questions in Unknown Category

1 votes
1 answer
63
In which of the following hash functions, do consecutive keys map to consecutive hash values?Division methodMultiplication methodFolding methodMid-square method
0 votes
1 answer
64
Which element is used to define discrete unit of content such as a blogpost, comment and so on?sectionclassarticlenone of the options
1 votes
1 answer
65
Which of the following machine model can be used in a necessary and sufficient sense for lexical analysis in modern computer language?Deterministic Push down AutomataFini...
1 votes
1 answer
66
Typical time requirement for operations on queues is :$O(1)$$O(n)$$O(logn)$$O(n^2)$
2 votes
1 answer
67
What is the best case complexity of QuickSort?$O(nlogn)$$O(logn)$$O(n)$$O(n^2)$
2 votes
1 answer
68
To the detection of up to $5$ errors in all cases, the minimum Hamming distance in a block code must be ______________.$5$$6$$10$$8$
1 votes
1 answer
69
Which of the following is component of Hadoop?$YARN$$HDFS$Map reduceAll of the options
0 votes
2 answers
70
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?Data leak from stolen credentials from deskData leak ...
1 votes
1 answer
71
Binary search tree contains the values $\text{1, 2, 3, 4, 5, 6, 7, 8}$. The tree is traversed in pre-order and the values are printed out. Which of the following sequence...
0 votes
1 answer
72
In an $\text{IPv6}$ header, the traffic class field is similar to the ________ field in the $\text{IPv4}$ header.$TOS$ fieldFragmentation fieldFast SwitchingOption field...
1 votes
1 answer
73
Identify the odd one out.Amazon web serviceMicrosoft AzureGoogle cloud PlatformTwitter Platform
0 votes
1 answer
74
Which of the following can be used when creating a pool of global addresses instead of the netmask command?/(slash notation)prefix-lengthno maskblock-size
0 votes
1 answer
75
___________ is a partitioning of single physical server into multiple logical servers.VirtualizationPrivate cloudHybrid cloudPublic cloud
1 votes
1 answer
76
How to specify the comment in the $XML$ document?$\text{<? >}$$\text{<! !>}$$\text{<! >}$$\text{</ >}$
1 votes
1 answer
77
A direct mapped cache is of size $\text{32 KB}$ and has block size $32$ Bytes. CPU also generates $32$ bit address. Number of bits needed for indexing the cache:$14$$15$$...
1 votes
1 answer
78
On computers where there are multiple operating system, the decision to load a particular one is done by ________.$PCB$InodeFile Control BlockBoot Loader
0 votes
0 answers
79
The resistance to be connected across terminal $a, b$ for maximum power transfer to it is:$40\; \Omega$$5\; \Omega$$2.5 \;\Omega$$10\; \Omega$