search
Log In

Recent questions tagged nielit2016mar-scientistc

0 votes
1 answer
1
0 votes
7 answers
2
2 votes
5 answers
3
Every Boyce-Codd Normal Form (BCNF) decomposition is dependency preserving not dependency preserving need be dependency preserving none of these
asked Apr 2, 2020 in Databases Lakshman Patel RJIT 608 views
2 votes
2 answers
4
A functional dependency of the form $x\to y$ is trivial if $y\subseteq x$ $y\subset x$ $x\subseteq y$ $x\subset y\:\text{and}\:y\subset x$
asked Apr 2, 2020 in Databases Lakshman Patel RJIT 624 views
0 votes
3 answers
5
A primary key, if combined with a foreign key creates parent child relationship between the tables that connect them many-to-many relationship between the tables that connect them network model between the tables that connect them none of these
asked Apr 2, 2020 in Databases Lakshman Patel RJIT 352 views
0 votes
2 answers
6
Memory mapped displays are utilized for high resolution graphics such as maps uses ordinary memory to store the display data in character form stores the display data as individual bits are associated with electromechanical teleprinters
asked Apr 2, 2020 in Computer Graphics Lakshman Patel RJIT 136 views
2 votes
4 answers
7
In real-time operating systems, which of the following is the most suitable scheduling scheme? round-robin first-come-first-served preemptive random scheduling
asked Apr 2, 2020 in Operating System Lakshman Patel RJIT 471 views
2 votes
3 answers
8
If there are $32$ segments, each of size $1$ K byte, then the logical address should have $13 \text{ bits}$ $14 \text{ bits}$ $15 \text{ bits}$ $16 \text{ bits}$
asked Apr 2, 2020 in Operating System Lakshman Patel RJIT 390 views
0 votes
1 answer
9
Which of the following can be accessed by transfer vector approach of linking? External data segments External subroutines Data located in other procedure All of these
asked Apr 2, 2020 in Compiler Design Lakshman Patel RJIT 294 views
0 votes
1 answer
10
0 votes
1 answer
11
0 votes
1 answer
12
0 votes
1 answer
13
Context-free grammar can be recognized by finite state automation $2$- way linear bounded automata push down automata both (B) and (C)
asked Apr 2, 2020 in Compiler Design Lakshman Patel RJIT 175 views
0 votes
1 answer
14
0 votes
1 answer
15
0 votes
1 answer
16
If $f:\{a,b\}^{\ast}\rightarrow \{a,b\}^{\ast }$ be given by $f(n)=ax$ for every value of $n\in \{a,b\}$, then $f$ is one to one not onto one to one and onto not one to one and not onto not one to one and onto
asked Apr 2, 2020 in Set Theory & Algebra Lakshman Patel RJIT 169 views
0 votes
1 answer
17
0 votes
1 answer
18
Two alternative package $A$ and $B$ are available for processing a database having $10^{k}$ records. Package $A$ requires $0.0001 n^{2}$ time units and package $B$ requires $10n\log _{10}n$ time units to process $n$ records. What is the smallest value of $k$ for which package $B$ will be preferred over $A$? $12$ $10$ $6$ $5$
asked Apr 2, 2020 in Algorithms Lakshman Patel RJIT 191 views
0 votes
4 answers
19
When a subroutine is called, then address of the instruction following the CAL instruction is stored in/on the Stack pointer Accumulator Program counter Stack
asked Apr 2, 2020 in CO and Architecture Lakshman Patel RJIT 288 views
0 votes
1 answer
20
Start and stop bits are used in serial communication for error detection error correction synchronization slowing down the communication
asked Apr 2, 2020 in Computer Networks Lakshman Patel RJIT 171 views
0 votes
1 answer
21
0 votes
1 answer
22
What are the primary characteristics that distinguish a cell from a packet? cells are generally smaller that packets cells do not incorporate physical address all cells have the same fixed length packet cannot be switched
asked Apr 2, 2020 in Computer Networks Lakshman Patel RJIT 123 views
0 votes
1 answer
23
0 votes
1 answer
25
Which of the following is FALSE? $Read\ \wedge as\ AND, \vee\ as\ OR, \sim as\ NOT, \rightarrow$ as one way implication and $\leftrightarrow$ as two way implication? $((x\rightarrow y)\wedge x)\rightarrow y$ $((\sim x\rightarrow y)\wedge (\sim x\wedge \sim y))\rightarrow x$ $(x\rightarrow (x\vee y))$ $((x\vee y)\leftrightarrow (\sim x\vee \sim y))$
asked Apr 2, 2020 in Mathematical Logic Lakshman Patel RJIT 113 views
1 vote
2 answers
26
The seek time of a disk is $30$ ms. It rotates at the rate of $30$ rotations/second. The capacity of each track is $300$ words. The access time is (approximately) $62$ ms $60$ ms $50$ ms $47$ ms
asked Apr 2, 2020 in Operating System Lakshman Patel RJIT 222 views
0 votes
1 answer
27
The process of entering data into a storage location causes variation in its address number adds to the contents of the location is called a readout operation is destructive of previous contents
asked Apr 2, 2020 in CO and Architecture Lakshman Patel RJIT 155 views
0 votes
1 answer
28
Serial access memories are useful in applications where data consists of numbers short access time is required each stored word is processed differently data naturally needs to flow in and out in serial form
asked Apr 2, 2020 in CO and Architecture Lakshman Patel RJIT 116 views
1 vote
0 answers
29
An external variable is globally accessible by all functions has a declaration “extern” associated with it when declared within a function will be initialized to $0$ if not initialized all of these
asked Apr 2, 2020 in Programming Lakshman Patel RJIT 222 views
0 votes
2 answers
30
A hash table with $10$ buckets with one slot per bucket is depicted. The symbols, $S1$ to $S7$ are initially emerged using a hashing function with linear probing. Maximum number of comparisons needed in searching an item that is not present is $6$ $5$ $4$ $3$
asked Apr 2, 2020 in DS Lakshman Patel RJIT 218 views
...