Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Search results for non-gate
1
votes
3
answers
1
How many 64 x 8 RAM chips are needed to provide a memory capacity of 2048 bytes?
Please show the working
Please show the working
rahuldb
26.9k
views
rahuldb
asked
Nov 17, 2016
CO and Architecture
co-and-architecture
non-gate
+
–
2
votes
1
answer
2
NIELIT 2017 July Scientist B (IT) - Section B: 42
Which of the following is false about abstract classes in Java? If we derive an abstract class and do not implement all the abstract methods, then the derived class should also be marked as abstract using 'abstract' ... . A class can be made abstract without any abstract method. A class can inherit from multiple abstract classes.
Which of the following is false about abstract classes in Java?If we derive an abstract class and do not implement all the abstract methods, then the derived class should...
admin
33.3k
views
admin
asked
Mar 30, 2020
Java
nielit2017july-scientistb-it
non-gate
java
+
–
13
votes
8
answers
3
ISRO2015-69
If n has 3, then the statement a[++n]=n++; assigns 3 to a[5] assigns 4 to a[5] assigns 4 to a[4] what is assigned is compiler dependent
If n has 3, then the statement a[++n]=n++;assigns 3 to a[5]assigns 4 to a[5]assigns 4 to a[4]what is assigned is compiler dependent
milankamilya
8.4k
views
milankamilya
asked
Jun 14, 2016
Programming in C
isro2015
programming-in-c
non-gate
undefined-behaviour
+
–
0
votes
1
answer
4
ISRO 2024
Regression testing focuses on validating module structure module interfaces software changes None of the above
Regression testing focuses on validatingmodule structuremodule interfacessoftware changesNone of the above
Ramayya
174
views
Ramayya
asked
Jan 7
IS&Software Engineering
non-gate
software-testing
+
–
1
votes
2
answers
5
ISRO 2024
Asymmetric encryption is not suitable for Confidentiality Authentication Key Exchange Prevention of Denail of Service
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
Ramayya
268
views
Ramayya
asked
Jan 7
Others
isro-2024
cryptography
non-gate
+
–
0
votes
2
answers
6
ISRO 2024
Which of the following scenario may not be a good fit for HDFS in Big data paradigm? HDFS is not suitable for scenarios requiring multiple.simultaneous writes to the same file HDFS is suitable for storing data related to applications requiring low latency data access HDFS is suitable for storing data related to applications requiring high latency data access None of the above
Which of the following scenario may not be a good fit for HDFS in Big data paradigm?HDFS is not suitable for scenarios requiring multiple.simultaneous writes to the same ...
Ramayya
236
views
Ramayya
asked
Jan 7
Data Mining and Warehousing
non-gate
+
–
0
votes
2
answers
7
ISRO 2024
The MCDC software testing technique stands for Multiple Conditions Decision Coverage Multiple coverage Decision conditions Modified Condition Decision Coverage None of the above
The MCDC software testing technique stands forMultiple Conditions Decision CoverageMultiple coverage Decision conditionsModified Condition Decision CoverageNone of the ab...
Ramayya
189
views
Ramayya
asked
Jan 7
IS&Software Engineering
isro-2024
non-gate
software-testing
+
–
0
votes
1
answer
8
ISRO 2024
McCabe’s cyclomatic complexity number of a program control graph ‘$G$’ with $e$edges, $n$ nodes and $p$ disconnected paths is defined as $n – e + 2p$ $e – n + 2 + p$ $e – n +2p$ $n – e + p$
McCabe’s cyclomatic complexity number of a program control graph ‘$G$’ with $e$edges, $n$ nodes and $p$ disconnected paths is defined as$n – e + 2p$$e – n + 2 +...
Ramayya
254
views
Ramayya
asked
Jan 7
IS&Software Engineering
isro-2024
is&software-engineering
non-gate
cyclomatic-complexity
+
–
1
votes
1
answer
9
ISRO 2024
CAPTCHA is used to provide protection from Zero day attack Buffer Overflow Automated scripted attack Man in the middle attack
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
Ramayya
278
views
Ramayya
asked
Jan 7
Others
isro-2024
non-gate
network-security
web-technologies
+
–
0
votes
2
answers
10
ISRO 2024
Temporarily renting the capacity to handle spikes in load is called Cloud sharing Cloud computing cloud bursting Cloud loading
Temporarily renting the capacity to handle spikes in load is calledCloud sharingCloud computingcloud burstingCloud loading
Ramayya
449
views
Ramayya
asked
Jan 7
Cloud Computing
isro-2024
non-gate
+
–
0
votes
1
answer
11
ISRO 2024
A standard Java API for monitoring and managing applications is JVM JVN JMX JMY
A standard Java API for monitoring and managing applications isJVMJVNJMXJMY
Ramayya
157
views
Ramayya
asked
Jan 7
IS&Software Engineering
java
non-gate
+
–
0
votes
1
answer
12
ISRO 2024
A hybrid bayesian network contains Only continuous variables Only discrete variables Both discrete and discontinuous variables Both continuous and discrete variables
A hybrid bayesian network containsOnly continuous variablesOnly discrete variablesBoth discrete and discontinuous variablesBoth continuous and discrete variables
Ramayya
108
views
Ramayya
asked
Jan 7
Others
non-gate
+
–
0
votes
0
answers
13
ISRO 2024
Which of the following clustering technique is used by K-Means algorithm: Hierarchical Technique Partitional technique Divisive Agglomerative
Which of the following clustering technique is used by K-Means algorithm:Hierarchical TechniquePartitional techniqueDivisiveAgglomerative
Ramayya
175
views
Ramayya
asked
Jan 7
Others
isro-2024
non-gate
machine-learning
+
–
3
votes
4
answers
14
ISRO2014-48
A frame buffer array is addressed in row major order for a monitor with pixel locations starting from $(0,0)$ and ending with $(100,100).$ What is address of the pixel $(6,10)?$ Assume one bit storage per pixel and starting pixel location is at $0.$ $1016$ $1006$ $610$ $616$
A frame buffer array is addressed in row major order for a monitor with pixel locations starting from $(0,0)$ and ending with $(100,100).$ What is address of the pixel $(...
neha singh
9.2k
views
neha singh
asked
Jun 26, 2016
Computer Graphics
isro2014
non-gate
computer-graphics
+
–
0
votes
2
answers
15
Computer Science - UGC NET 2021 [ Question ID = 2349 ]
Given below are two statements : Statement I: Cleanroom software process model incorporates the statistical quality certification of code increments as they accumulate into a system. Statement II: Cleanroom software engineering follows the classic analysis, ... I is true but Statement II is false. Statement I is false but Statement II is true.
Given below are two statements : Statement I: Cleanroom software process model incorporates the statistical quality certification of code increments as they accumulate in...
rajeshposts
377
views
rajeshposts
asked
Sep 11, 2023
IS&Software Engineering
non-gate
software-design
software-reliability
+
–
0
votes
4
answers
16
C++
Çșȇ ʛấẗẻ
375
views
Çșȇ ʛấẗẻ
asked
Aug 28, 2023
Object Oriented Programming
non-gate
object-oriented-programming
+
–
3
votes
2
answers
17
ISRO2014-65
A cube of side $1$ unit is placed in such a way that the origin coincides with one of its top vertices and the three axes along three of its edges. What are the co-ordinates of the vertex which is diagonally opposite to the vertex whose co-ordinates are $(1, 0, 1)?$ $(0, 0, 0)$ $(0, -1, 0)$ $(0, 1, 0)$ $(1, 1, 1)$
A cube of side $1$ unit is placed in such a way that the origin coincides with one of its top vertices and the three axes along three of its edges. What are the co-ordina...
go_editor
6.9k
views
go_editor
asked
Jul 1, 2016
Geometry
isro2014
geometry
non-gate
+
–
0
votes
0
answers
18
Describe RSA algorithm in detail. Calculate the private key of A wherein RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. Let the public key of A is 35.
Krishna Mohan Singh
235
views
Krishna Mohan Singh
asked
Oct 19, 2023
Analytical Aptitude
analytical-aptitude
non-gate
+
–
0
votes
1
answer
19
Computer Science - UGC NET 2021 [ Question ID = 2348 ]
Identify the correct order of the following five levels of Capability Maturity Model (from lower to higher) to measure the maturity of an organization's software process. Defined Optimizing Initial Managed Repeatable Choose the correct answer from the options given below C, A, E, D, B C, B, D, E, A C,E, A, B, D C, E, A, D, B
Identify the correct order of the following five levels of Capability Maturity Model (from lower to higher) to measure the maturity of an organization's software process....
rajeshposts
267
views
rajeshposts
asked
Sep 6, 2023
IS&Software Engineering
non-gate
software-design
+
–
8
votes
3
answers
20
ISRO2017-3
Using Newton-Raphson method, a root correct to 3 decimal places of $x^3 - 3x -5 = 0$ 2.222 2.275 2.279 None of the above
Using Newton-Raphson method, a root correct to 3 decimal places of $x^3 - 3x -5 = 0$2.2222.2752.279None of the above
sh!va
25.6k
views
sh!va
asked
May 7, 2017
Numerical Methods
isro2017
newton-raphson
non-gate
+
–
Page:
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register