Recent questions tagged nielit-scb-2020

1 votes
1 answer
31
Calculate the modulation percentage if the modulating signal is $8\:V$ and carrier is of $12\:V$?$50$$67$$150$$33$
1 votes
1 answer
35
In which of the following hash functions, do consecutive keys map to consecutive hash values?Division methodMultiplication methodFolding methodMid-square method
0 votes
1 answer
36
Which element is used to define discrete unit of content such as a blogpost, comment and so on?sectionclassarticlenone of the options
1 votes
1 answer
37
Which of the following machine model can be used in a necessary and sufficient sense for lexical analysis in modern computer language?Deterministic Push down AutomataFini...
1 votes
1 answer
38
Typical time requirement for operations on queues is :$O(1)$$O(n)$$O(logn)$$O(n^2)$
2 votes
1 answer
39
What is the best case complexity of QuickSort?$O(nlogn)$$O(logn)$$O(n)$$O(n^2)$
2 votes
1 answer
40
To the detection of up to $5$ errors in all cases, the minimum Hamming distance in a block code must be ______________.$5$$6$$10$$8$
1 votes
1 answer
41
Which of the following is component of Hadoop?$YARN$$HDFS$Map reduceAll of the options
0 votes
2 answers
42
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?Data leak from stolen credentials from deskData leak ...
1 votes
1 answer
43
Binary search tree contains the values $\text{1, 2, 3, 4, 5, 6, 7, 8}$. The tree is traversed in pre-order and the values are printed out. Which of the following sequence...
0 votes
1 answer
44
In an $\text{IPv6}$ header, the traffic class field is similar to the ________ field in the $\text{IPv4}$ header.$TOS$ fieldFragmentation fieldFast SwitchingOption field...
1 votes
1 answer
45
Identify the odd one out.Amazon web serviceMicrosoft AzureGoogle cloud PlatformTwitter Platform
0 votes
1 answer
46
Which of the following can be used when creating a pool of global addresses instead of the netmask command?/(slash notation)prefix-lengthno maskblock-size
0 votes
1 answer
47
___________ is a partitioning of single physical server into multiple logical servers.VirtualizationPrivate cloudHybrid cloudPublic cloud
1 votes
1 answer
48
How to specify the comment in the $XML$ document?$\text{<? >}$$\text{<! !>}$$\text{<! >}$$\text{</ >}$
1 votes
1 answer
49
A direct mapped cache is of size $\text{32 KB}$ and has block size $32$ Bytes. CPU also generates $32$ bit address. Number of bits needed for indexing the cache:$14$$15$$...
1 votes
1 answer
50
On computers where there are multiple operating system, the decision to load a particular one is done by ________.$PCB$InodeFile Control BlockBoot Loader
0 votes
0 answers
51
The resistance to be connected across terminal $a, b$ for maximum power transfer to it is:$40\; \Omega$$5\; \Omega$$2.5 \;\Omega$$10\; \Omega$
1 votes
1 answer
53
Which open addressing technique is free from Clustering problems?Linear probingQuadratic probingDouble hashingRehashing
0 votes
1 answer
54
In classful addressing, a large part of the available addresses are __________.DispersedBlockedWastedReserved
1 votes
1 answer
55
What is the basis of $KVL$?Conservation of chargeConservation of energyConservation of powerAll of the options
0 votes
1 answer
56
In ____________ $VMs$ do not simulate the underlying hardware.Para VirtualizationFull VirtualizationHardware-Assisted VirtualizationNetwork Virtualization
1 votes
1 answer
57
The recurrence relation $T(n)=7T(n/7)+n$ has the solution:$O(n)$$O(logn)$$O(nlog(n))$$O(n^2)$
0 votes
1 answer
58
____________ uses pretty good privacy algorithm.Electronic mailsFile encryptionBoth Electronic mails and File encryptionNone of the options
1 votes
1 answer
59
Which of the following property is related to a cryptographic hash functions?One way FunctionInversibleNon-DeterministicAll of the options