# Recent questions tagged nielit2017dec-assistanta

1
Correct expression tor UDP user datagram length is length of UDP = length of IP- length of IP header's length of UDP= length of UDP-length of UDP header's length of UDP = length of IP+length of IP header's length of UDP = length of UDP+length of UDP header's
2
In binary search tree which traversal is used for getting ascending order values ? Inorder Preorder Postorder None of the options
1 vote
3
The automaton which allows transformation to a new state without consuming any input symbols : $NFA$ $DFA$ $NFA - 1$ All of the options
4
Complement of a $DFA$ can be obtained by : making starting state as final state. make final as a starting state. making final states non-final and non-final as final. None of the options
5
Concatenation Operation refers to which of the following set operations : Union Dot Kleene None of the options
6
Which of the following statements is true ? Melay and Moore machines are language acceptors. Finite State automata is language translator. NPDA is more powerful than DPDA. Melay machine is more powerful than Moore machine.
1 vote
7
If file size is large and if it is to be accessed randomly then which of the following allocation strategy should be best to use in a system? Linked allocation Indexed allocation Contiguous allocation None of the options
8
Microprocessors are used in which generation of computers? I – st Generation II – nd Generation III – rd Generation IV – th Generation
9
Operating System maintains the page table for : each process each thread each instruction each address
10
The function $f\left ( x \right )=\dfrac{x^{2}-1}{x-1}$ at $x=1$ is : Continuous and differentiable Continuous but not differentiable Differentiable but not continuous Neither continuous nor differentiable
11
Closed - Loop control mechanism try to : Remove congestion after it occurs Remove congestion after sometime Prevent congestion before it occurs Prevent congestion before sending packets
12
In classless addressing, there are no classes but addresses are still granted in : Codes Blocks IPs Sizes
13
Which multiple access technique is used by $\text{IEEE } 802.11$ standard for wireless $\text{LAN}$ ? $\text{CDMA}$ $\text{CSMA/CA}$ $\text{ALOHA}$ None of the options
14
$PGP$ encrypts data by using a block cipher called : international data encryption algorithm private data encryption algorithm internet data encryption algorithm none of the options
15
If $L1$ and $L2$ are regular sets then intersection of these two will be : Regular Non Regular Recursive Non Recursive
1 vote
16
The smallest integer that can be represented by an $8$-bit number in $2$'s complement form is : $-256$ $-128$ $-127$ $0$
1 vote
17
Non-contiguous memory allocation splits program into blocks of memory called ________ that can be loaded in non-adjacent holes in main memory. Pages Frames Partition Segments
18
In a full binary tree number of nodes is $63$ then the height of the tree is : $2$ $4$ $3$ $6$
19
Let $P, Q, R$ be a regular expression over $\Sigma$. If $P$ does not contain null string, then $R=Q+RP$ has a unique solution ___________ . $Q^{*}P$ $QP^{*}$ $Q^{*}P^{*}$ $\left ( P^{*}O^{*} \right)^{*}$
20
Total number of simple graphs that can be drawn using six vertices are: $2^{15}$ $2^{14}$ $2^{13}$ $2^{12}$
1 vote
21
The $2-3-4$ tree is a self-balancing data structure, which is also called : $2-4$ tree $B+$ tree $B-$ tree None of the options
1 vote
22
Which type of algorithm is used to solve the "$8$ Queens" problem ? Greedy Dynamic Divide and conquer Backtracking
1 vote
23
A $3.5$ inch micro floppy high density disk contains the data _________ . $720 \: MB$ $1.44 \: MB$ $720 \: KB$ $1.44 \: KB$
24
A subnet mask in class $C$ can have _____________ $1$’s with the remaining bits $0$’s. $10$ $24$ $12$ $7$
25
What is the value of acknowledgement field in a segment Number of previous bytes to receive Total number of bytes to receive Number of next bytes to receive Sequence of zero's and one's
26
The number $(25)_6$, in base $6$ is equivalent to _________ in binary number system. $11001$ $10001$ $11000$ $10000$
27
Which of the following is a class $B$ host address ? $230.0.0.0$ $130.4.5.6$ $230.7.6.5$ $30.4.5.6$
1 vote
28
There is a need to create a network that has $5$ subnets, each with at least $16$ hosts. Which one is used as classful subnet mask ? $255.255.255.192$ $255.255.255.248$ $255.255.255.240$ $255.255.255.224$
1 vote
29
What is Compaction ? a technique for overcoming internal fragmentation a paging technique a technique for overcoming external fragmentation a technique for overcoming fatal error
1 vote
How can we set a Cookie visibility scope to local storage ? $\$ $\%$ $/$ All of the options