Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged nielit-scb-2020
1
votes
1
answer
31
NIELIT Scientist B 2020 November: 51
Calculate the modulation percentage if the modulating signal is $8\:V$ and carrier is of $12\:V$? $50$ $67$ $150$ $33$
Calculate the modulation percentage if the modulating signal is $8\:V$ and carrier is of $12\:V$?$50$$67$$150$$33$
gatecse
489
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
32
NIELIT Scientist B 2020 November: 52
The best running time is defined as/obtained as/by: the least or smallest of all the running times the algorithm takes, on inputs of a particular size an input that requires maximum computations or resources averaging the different running times for all inputs of a particular kind none of the options
The best running time is defined as/obtained as/by:the least or smallest of all the running times the algorithm takes, on inputs of a particular sizean input that require...
gatecse
411
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
33
NIELIT Scientist B 2020 November: 53
Which one of the following statements is incorrect? The number of regions corresponds to the cyclomatic complexity Cyclomatic complexity for a flow graph $G$ is $V(G)=N-E+2$, where $E$ is the number of edges and $N$ is the number of nodes in flow graph ... flow graph $G$ is $V(G)=P+1$, where $P$ is the number of predicate nodes contained in the flow graph $G$
Which one of the following statements is incorrect?The number of regions corresponds to the cyclomatic complexityCyclomatic complexity for a flow graph $G$ is $V(G)=N-E+2...
gatecse
490
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
34
NIELIT Scientist B 2020 November: 54
Consider a control unit generating the control signals. These control signals are divided into five mutually exclusive groups as shown below: ... many bits are saved using the Vertical Micro-programmed instead of Horizontal Micro-programmed control unit? $14$ $34$ $20$ None
Consider a control unit generating the control signals. These control signals are divided into five mutually exclusive groups as shown below:$\begin{array}{|l|l||l|l|} \h...
gatecse
529
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
35
NIELIT Scientist B 2020 November: 55
In which of the following hash functions, do consecutive keys map to consecutive hash values? Division method Multiplication method Folding method Mid-square method
In which of the following hash functions, do consecutive keys map to consecutive hash values?Division methodMultiplication methodFolding methodMid-square method
gatecse
877
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
36
NIELIT Scientist B 2020 November: 56
Which element is used to define discrete unit of content such as a blogpost, comment and so on? section class article none of the options
Which element is used to define discrete unit of content such as a blogpost, comment and so on?sectionclassarticlenone of the options
gatecse
444
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
37
NIELIT Scientist B 2020 November: 57
Which of the following machine model can be used in a necessary and sufficient sense for lexical analysis in modern computer language? Deterministic Push down Automata Finite Automata Non-Deterministic Finite Automata Turing Machine
Which of the following machine model can be used in a necessary and sufficient sense for lexical analysis in modern computer language?Deterministic Push down AutomataFini...
gatecse
348
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
38
NIELIT Scientist B 2020 November: 58
Typical time requirement for operations on queues is : $O(1)$ $O(n)$ $O(logn)$ $O(n^2)$
Typical time requirement for operations on queues is :$O(1)$$O(n)$$O(logn)$$O(n^2)$
gatecse
1.3k
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
2
votes
1
answer
39
NIELIT Scientist B 2020 November: 59
What is the best case complexity of QuickSort? $O(nlogn)$ $O(logn)$ $O(n)$ $O(n^2)$
What is the best case complexity of QuickSort?$O(nlogn)$$O(logn)$$O(n)$$O(n^2)$
gatecse
371
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
2
votes
1
answer
40
NIELIT Scientist B 2020 November: 60
To the detection of up to $5$ errors in all cases, the minimum Hamming distance in a block code must be ______________. $5$ $6$ $10$ $8$
To the detection of up to $5$ errors in all cases, the minimum Hamming distance in a block code must be ______________.$5$$6$$10$$8$
gatecse
480
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
41
NIELIT Scientist B 2020 November: 61
Which of the following is component of Hadoop? $YARN$ $HDFS$ Map reduce All of the options
Which of the following is component of Hadoop?$YARN$$HDFS$Map reduceAll of the options
gatecse
334
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
2
answers
42
NIELIT Scientist B 2020 November: 62
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat? Data leak from stolen credentials from desk Data leak by partners Data leak by 3rd party apps All of the options
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?Data leak from stolen credentials from deskData leak ...
gatecse
446
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
43
NIELIT Scientist B 2020 November: 63
Binary search tree contains the values $\text{1, 2, 3, 4, 5, 6, 7, 8}$. The tree is traversed in pre-order and the values are printed out. Which of the following sequences is a valid output? $53124786$ $53126487$ $53241678$ $53124768$
Binary search tree contains the values $\text{1, 2, 3, 4, 5, 6, 7, 8}$. The tree is traversed in pre-order and the values are printed out. Which of the following sequence...
gatecse
358
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
44
NIELIT Scientist B 2020 November: 64
In an $\text{IPv6}$ header, the traffic class field is similar to the ________ field in the $\text{IPv4}$ header. $TOS$ field Fragmentation field Fast Switching Option field
In an $\text{IPv6}$ header, the traffic class field is similar to the ________ field in the $\text{IPv4}$ header.$TOS$ fieldFragmentation fieldFast SwitchingOption field...
gatecse
432
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
45
NIELIT Scientist B 2020 November: 65
Identify the odd one out. Amazon web service Microsoft Azure Google cloud Platform Twitter Platform
Identify the odd one out.Amazon web serviceMicrosoft AzureGoogle cloud PlatformTwitter Platform
gatecse
523
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
46
NIELIT Scientist B 2020 November: 66
Which of the following can be used when creating a pool of global addresses instead of the netmask command? /(slash notation) prefix-length no mask block-size
Which of the following can be used when creating a pool of global addresses instead of the netmask command?/(slash notation)prefix-lengthno maskblock-size
gatecse
420
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
47
NIELIT Scientist B 2020 November: 67
___________ is a partitioning of single physical server into multiple logical servers. Virtualization Private cloud Hybrid cloud Public cloud
___________ is a partitioning of single physical server into multiple logical servers.VirtualizationPrivate cloudHybrid cloudPublic cloud
gatecse
463
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
48
NIELIT Scientist B 2020 November: 68
How to specify the comment in the $XML$ document? $\text{<?-- -->}$ $\text{<!-- --!>}$ $\text{<!-- -->}$ $\text{</-- -->}$
How to specify the comment in the $XML$ document?$\text{<? >}$$\text{<! !>}$$\text{<! >}$$\text{</ >}$
gatecse
382
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
49
NIELIT Scientist B 2020 November: 69
A direct mapped cache is of size $\text{32 KB}$ and has block size $32$ Bytes. CPU also generates $32$ bit address. Number of bits needed for indexing the cache: $14$ $15$ $10$ $17$
A direct mapped cache is of size $\text{32 KB}$ and has block size $32$ Bytes. CPU also generates $32$ bit address. Number of bits needed for indexing the cache:$14$$15$$...
gatecse
321
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
50
NIELIT Scientist B 2020 November: 70
On computers where there are multiple operating system, the decision to load a particular one is done by ________. $PCB$ Inode File Control Block Boot Loader
On computers where there are multiple operating system, the decision to load a particular one is done by ________.$PCB$InodeFile Control BlockBoot Loader
gatecse
347
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
0
answers
51
NIELIT Scientist B 2020 November: 71
The resistance to be connected across terminal $a, b$ for maximum power transfer to it is: $40\; \Omega$ $5\; \Omega$ $2.5 \;\Omega$ $10\; \Omega$
The resistance to be connected across terminal $a, b$ for maximum power transfer to it is:$40\; \Omega$$5\; \Omega$$2.5 \;\Omega$$10\; \Omega$
gatecse
361
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
electronic-circuit
non-gate
+
–
1
votes
1
answer
52
NIELIT Scientist B 2020 November: 72
One disk queue with requests for $I/O$ to blocks on cylinders. The Request are in the following manner: $\text{98 183 37 122 14 124 65 67}$ Considering $SSTF$ (shortest seek time first) scheduling, the total number of head movements is, if the disk head is initially at $53$ is: $236$ $246$ $220$ $240$
One disk queue with requests for $I/O$ to blocks on cylinders. The Request are in the following manner:$\text{98 183 37 122 14 124 65 67}$Considering $SSTF$ (shortest see...
gatecse
308
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
53
NIELIT Scientist B 2020 November: 73
Which open addressing technique is free from Clustering problems? Linear probing Quadratic probing Double hashing Rehashing
Which open addressing technique is free from Clustering problems?Linear probingQuadratic probingDouble hashingRehashing
gatecse
1.1k
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
54
NIELIT Scientist B 2020 November: 74
In classful addressing, a large part of the available addresses are __________. Dispersed Blocked Wasted Reserved
In classful addressing, a large part of the available addresses are __________.DispersedBlockedWastedReserved
gatecse
320
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
55
NIELIT Scientist B 2020 November: 75
What is the basis of $KVL$? Conservation of charge Conservation of energy Conservation of power All of the options
What is the basis of $KVL$?Conservation of chargeConservation of energyConservation of powerAll of the options
gatecse
338
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
56
NIELIT Scientist B 2020 November: 76
In ____________ $VMs$ do not simulate the underlying hardware. Para Virtualization Full Virtualization Hardware-Assisted Virtualization Network Virtualization
In ____________ $VMs$ do not simulate the underlying hardware.Para VirtualizationFull VirtualizationHardware-Assisted VirtualizationNetwork Virtualization
gatecse
301
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
57
NIELIT Scientist B 2020 November: 77
The recurrence relation $T(n)=7T(n/7)+n$ has the solution: $O(n)$ $O(logn)$ $O(nlog(n))$ $O(n^2)$
The recurrence relation $T(n)=7T(n/7)+n$ has the solution:$O(n)$$O(logn)$$O(nlog(n))$$O(n^2)$
gatecse
308
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
58
NIELIT Scientist B 2020 November: 78
____________ uses pretty good privacy algorithm. Electronic mails File encryption Both Electronic mails and File encryption None of the options
____________ uses pretty good privacy algorithm.Electronic mailsFile encryptionBoth Electronic mails and File encryptionNone of the options
gatecse
345
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
59
NIELIT Scientist B 2020 November: 79
Which of the following property is related to a cryptographic hash functions? One way Function Inversible Non-Deterministic All of the options
Which of the following property is related to a cryptographic hash functions?One way FunctionInversibleNon-DeterministicAll of the options
gatecse
759
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
60
NIELIT Scientist B 2020 November: 80
Consider a Simple Checkpointing Protocol and the following set of operations in the log. $(start, T_4);(write, T_4,y,2,3);(start,T_1);$ $(commit,T_4);(write,T_1,z,5,7);$ $(Checkpoint);$ $(start,T_2);(write,T_2,x,1,9);$ ... $Undo : T_3,T_1;Redo\;T_2,T_4$ $Undo : none; \;Redo\;T_2, T_4, T_3, T_1$ $Undo : T_3,T_1,T_4; \;Redo\;T_2$
Consider a Simple Checkpointing Protocol and the following set of operations in the log.$(start, T_4);(write, T_4,y,2,3);(start,T_1);$$(commit,T_4);(write,T_1,z,5,7);$$(C...
gatecse
351
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
Page:
« prev
1
2
3
4
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register