Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged nielit2022apr-scientistb
1
votes
1
answer
31
NIELIT 2022 April Scientist B | Section B | Question: 73
Given $\sqrt{(224)_{r}} = (13)_{r}.$ The value of the radix $r$ is: $10$ $8$ $5$ $6$
Given $\sqrt{(224)_{r}} = (13)_{r}.$ The value of the radix $r$ is:$10$$8$$5$$6$
soujanyareddy13
596
views
soujanyareddy13
asked
Apr 12, 2022
Digital Logic
nielit2022apr-scientistb
+
–
1
votes
1
answer
32
NIELIT 2022 April Scientist B | Section B | Question: 74
In context of analog & digital communication, as the length of a long-wire antenna is increased, ____________ the number of lobes also increase the number of lobes decrease efficiency increase the number of nodes decreases
In context of analog & digital communication, as the length of a long-wire antenna is increased, ____________the number of lobes also increasethe number of lobes decrease...
soujanyareddy13
643
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
33
NIELIT 2022 April Scientist B | Section B | Question: 75
In an $\text{IPv4}$ datagram, the $\text{M}$ bit is $0$, the value of $\text{HLEN}$ is $10$, the value of total length is $400$ and the fragment offset value is $300$. The position of the datagram, the sequence numbers of ... $2400$ and $2789$ First fragment, $2400$ and $2759$ Last fragment, $2400$ and $2759$ Middle fragment, $300$ and $689$
In an $\text{IPv4}$ datagram, the $\text{M}$ bit is $0$, the value of $\text{HLEN}$ is $10$, the value of total length is $400$ and the fragment offset value is $300$. Th...
soujanyareddy13
392
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
2
answers
34
NIELIT 2022 April Scientist B | Section B | Question: 76
What is printed by the print statements in the program $\text{P1}$ assuming call by reference parameter passing ? Program P1() { x = 10; y = 3; func1(y, x, x); print x; print y; } func1(x, y, z) { y = y+4; z = x+ y+ z; } $10, 3$ $31, 3$ $27, 7$ $33, 5$
What is printed by the print statements in the program $\text{P1}$ assuming call by reference parameter passing ?Program P1() { x = 10; y = 3; func1(y, x, x); print x; pr...
soujanyareddy13
531
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
35
NIELIT 2022 April Scientist B | Section B | Question: 77
Consider the following two functions. void fun1(int n) { if(n == 0) return; printf("%d", n); fun2(n - 2); printf("%d", n); } void fun2(int n) { if(n == 0) return; printf(" ... %d", n); } The output printed when $\text{fun1}(5)$ is called is $53423122233445$ $53423120112233$ $53423122132435$ $53423120213243$
Consider the following two functions.void fun1(int n) { if(n == 0) return; printf("%d", n); fun2(n - 2); printf("%d", n); } void fun2(int n) { if(n == 0) return; printf("...
soujanyareddy13
661
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
programming
normal
tricky
recursion
+
–
1
votes
0
answers
36
NIELIT 2022 April Scientist B | Section B | Question: 78
Consider the virtual page reference string $\text{1, 2, 3, 2, 4, 1, 3, 2, 4, 1}$ On a demand paged virtual memory system running on a computer system that main memory size of $3$ ... $\text{OPTIMAL < FIFO < LRU}$ $\text{OPTIMAL = LRU}$ $\text{OPTIMAL = FIFO}$
Consider the virtual page reference string$\text{1, 2, 3, 2, 4, 1, 3, 2, 4, 1}$On a demand paged virtual memory system running on a computer system that main memory size ...
soujanyareddy13
475
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
37
NIELIT 2022 April Scientist B | Section B | Question: 79
In a data flow diagram, the segment shown below is identified as having transaction flow characteristics, with $p2$ identified as the transaction center A first level architectural design of this segment will result in a set of process modules with an associated ... $p2.$ $p2$ invokes $p1,$ and then invokes $p3,$ or $p4,$ or $p5$
In a data flow diagram, the segment shown below is identified as having transaction flow characteristics, with $p2$ identified as the transaction centerA first level arch...
soujanyareddy13
474
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
1
answer
38
NIELIT 2022 April Scientist B | Section B | Question: 80
The upper triangular matrix $\text{U}$ in the $\text{LU-}$ ... $\begin{bmatrix} 1 & -2 & 3 \\ 0 & -1 & 6 \\ 0 & 0 & 10 \end{bmatrix}$
The upper triangular matrix $\text{U}$ in the $\text{LU-}$ decomposition of the matrix given below :$\begin{bmatrix} 1 & -2 & 3 \\ 2 & -5 & 8 \\ 1 & 2 & -10 \end{bmatr...
soujanyareddy13
515
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
39
NIELIT 2022 April Scientist B | Section B | Question: 81
The number of distinct minimum spanning trees for the weighted graph below is ________. $4$ $5$ $6$ $7$
The number of distinct minimum spanning trees for the weighted graph below is ________.$4$$5$$6$$7$
soujanyareddy13
392
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
40
NIELIT 2022 April Scientist B | Section B | Question: 82
Consider the following two statements: A hash function (these are often used for computing digital signatures) is an injective function. encryption technique such as $\text{DES}$ performs a permutation on the elements of its input alphabet. Which ... is true and the other is false Statement $(ii)$ is true and the other is false Both are true
Consider the following two statements:A hash function (these are often used for computing digital signatures) is an injective function.encryption technique such as $\text...
soujanyareddy13
378
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
41
NIELIT 2022 April Scientist B | Section B | Question: 83
Which of the following relational calculus expressions is not safe ? $\left\{t \mid \exists u \in R_1\left(t[A] = u[A]\right) \land \neg \exists s \in R_2 \left(t[A] = s[A]\right)\right\}$ ... (i) (ii) (iii) (iv)
Which of the following relational calculus expressions is not safe ?$\left\{t \mid \exists u \in R_1\left(t[A] = u[A]\right) \land \neg \exists s \in R_2 \left(t[A] = s[A...
soujanyareddy13
368
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
1
answer
42
NIELIT 2022 April Scientist B | Section B | Question: 84
To carry out white box testing of a program, its flow chart representation is obtained as shown in the figure below: For basis path based testing of this program, its cyclomatic complexity is $5$ $4$ $3$ $2$
To carry out white box testing of a program, its flow chart representation is obtained as shown in the figure below:For basis path based testing of this program, its cycl...
soujanyareddy13
664
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
is&software-engineering
cyclomatic-complexity
normal
+
–
0
votes
1
answer
43
NIELIT 2022 April Scientist B | Section B | Question: 85
Match the following: 1) Waterfall model a) Specifications can be developed incrementally 2) Evolutionary model b) Inflexible partitioning of the project into stages 3) Component-based c) Explicit recognition of risk software engineering 4) Spiral development d) Requirement compromises are ...
Match the following:1) Waterfall modela) Specifications can be developed incrementally2) Evolutionary modelb) Inflexible partitioning of the project into stages 3) Compon...
soujanyareddy13
827
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
is&software-engineering
normal
+
–
1
votes
1
answer
44
NIELIT 2022 April Scientist B | Section B | Question: 86
A Young tableau is a $\text{2D}$ array of integers increasing from left to right and from top to bottom. Any unfilled entries are marked with $\infty$, and hence there cannot be any entry to the right of, or below a $\infty$. The following Young ... than $1$) to be shifted, to remove $1$ from the given Young tableau is _____. $2$ $5$ $6$ $18$
A Young tableau is a $\text{2D}$ array of integers increasing from left to right and from top to bottom. Any unfilled entries are marked with $\infty$, and hence there ca...
soujanyareddy13
405
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
45
NIELIT 2022 April Scientist B | Section B | Question: 87
Consider the set of strings on $\{0,1\}$ in which, every substring of $3$ symbols has at most two zeros. For example, $001110$ and $011001$ are in the language, but $100010$ is not. All strings of length less than $3$ are also in the language. ...
Consider the set of strings on $\{0,1\}$ in which, every substring of $3$ symbols has at most two zeros. For example, $001110$ and $011001$ are in the language, but $1000...
soujanyareddy13
331
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
1
answer
46
NIELIT 2022 April Scientist B | Section B | Question: 88
The secant method formula for finding the square root of a real number $\text{R}$ from the equation $x^{2} - \text{R} = 0$ is: $x_{i+1} = \frac{x_{i}.x_{i-1}}{x_{i} + x_{i+1}}$ $x_{i+1} = \frac{x_{i}.x_{i-1} + \text{R}}{x_{i} + x_{i-1}}$ ... $x_{i+1} = \frac{2x_{i}^{2} + x_{i}.x_{i-1} - \text{R}}{x_{i} + x_{i-1}}$
The secant method formula for finding the square root of a real number $\text{R}$ from the equation $x^{2} – \text{R} = 0$ is:$x_{i+1} = \frac{x_{i}.x_{i-1}}{x_{i} + x_...
soujanyareddy13
1.1k
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
calculus
+
–
1
votes
0
answers
47
NIELIT 2022 April Scientist B | Section B | Question: 89
A company needs to develop digital signal processing software for one of its newest inventions. The software is expected to have $40000$ lines of code. The company needs to determine the effort in person-months needed to develop this software using the ... $234.25$ $932.50$ $287.80$ $122.40$
A company needs to develop digital signal processing software for one of its newest inventions. The software is expected to have $40000$ lines of code. The company needs ...
soujanyareddy13
407
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
48
NIELIT 2022 April Scientist B | Section B | Question: 90
A queue is implemented using a non-circular singly linked list. The queue has a head pointer and a tail pointer, as shown in the figure. Let $n$ denote the number of nodes in the queue. Let 'enqueue' be implemented by inserting a new node at the ... $\Theta(1), \Theta(n)$ $\Theta(n), \Theta(1)$ $\Theta(n), \Theta(n)$
A queue is implemented using a non-circular singly linked list. The queue has a head pointer and a tail pointer, as shown in the figure. Let $n$ denote the number of node...
soujanyareddy13
646
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
49
NIELIT 2022 April Scientist B | Section B | Question: 92
$\text{L1}$ is a recursively enumerable language over $\Sigma$. An algorithm $A$ effectively enumerates its words as $w_1, w_2, w_3, \dots$ Define another language $\text{L2}$ over $\Sigma$ Union $\left\{\text{#}\right\}$ ... $\text{S2}$ is true but $\text{S1}$ is not necessarily true Neither is necessarily true
$\text{L1}$ is a recursively enumerable language over $\Sigma$. An algorithm $A$ effectively enumerates its words as $w_1, w_2, w_3, \dots$ Define another language $\text...
soujanyareddy13
345
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
1
answer
50
NIELIT 2022 April Scientist B | Section B | Question: 93
A bandlimited signal is sampled at the Nyquist rate. The signal can be recovered by passing the samples through : an $\text{RC}$ filter an envelope detector a $\text{PLL}$ an ideal low-pass filter with the appropriate bandwidth
A bandlimited signal is sampled at the Nyquist rate. The signal can be recovered by passing the samples through :an $\text{RC}$ filteran envelope detectora $\text{PLL}$an...
soujanyareddy13
676
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
51
NIELIT 2022 April Scientist B | Section B | Question: 94
Consider a combination of $\text{T}$ and $\text{D}$ flip-flops connected as shown below. The output of the $\text{D}$ flipflop is connected to the input of the $\text{T}$ flip-flop and the output of the $\text{T}$ flip-flop is connected ... $3^{\text{rd}}$ cycle are $01$ and after the $4^{\text{th}}$ cycle are $01$ respectively
Consider a combination of $\text{T}$ and $\text{D}$ flip-flops connected as shown below. The output of the $\text{D}$ flipflop is connected to the input of the $\text{T}$...
soujanyareddy13
377
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
52
NIELIT 2022 April Scientist B | Section B | Question: 95
Consider the following C code: #include<stdio.h> int *assignval (int *x, int val) { *x = val; return x; } int main () { int *x = malloc(sizeof(int)); if (NULL == x) return; x = ... and not as shown. compiles successfully but execution may result in dangling pointer. compiles successfully but execution may result in memory leak.
Consider the following C code:#include<stdio.h int *assignval (int *x, int val) { *x = val; return x; } int main () { int *x = malloc(sizeof(int)); if (NULL == x) return;...
soujanyareddy13
384
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
53
NIELIT 2022 April Scientist B | Section B | Question: 96
Suppose we are sorting an array of eight integers using heapsort, and we have just finished some heapify (either maxheapify or minheapify) operations. The array now looks like this: $16 \; 14 \; 15 \; 10 \; 12 \; 27 \; 28$ How many heapify operations have been performed on root of heap ? $1$ $2$ $3$ or $4$ $5$ or $6$
Suppose we are sorting an array of eight integers using heapsort, and we have just finished some heapify (either maxheapify or minheapify) operations. The array now looks...
soujanyareddy13
606
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
1
votes
0
answers
54
NIELIT 2022 April Scientist B | Section B | Question: 97
A message is made up entirely of characters from the set $\text{X=\{P, Q, R, S, T\}}$ ... encoded using Huffman coding, then the expected length of the encoded message in bits is ______. $225$ $226$ $227$ $228$
A message is made up entirely of characters from the set $\text{X=\{P, Q, R, S, T\}}$. The table of probabilities for each of the characters is shown below:$$\begin{array...
soujanyareddy13
367
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
0
votes
0
answers
55
NIELIT 2022 April Scientist B | Section B | Question: 99
A $5$ stage pipelined $\text{CPU}$ has the following sequence of stages: $\text{IF}$ - instruction fetch from instruction memory $\text{RD}$ - Instruction decode and register read $\text{EX}$ - Execute: $\text{ALU}$ operation for ... taken to complete the above sequence of instructions starting from the fetch of $I_1$? $8$ $10$ $12$ $15$
A $5$ stage pipelined $\text{CPU}$ has the following sequence of stages:$\text{IF}$ – instruction fetch from instruction memory$\text{RD}$ – Instruction decode and re...
soujanyareddy13
382
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
0
votes
0
answers
56
NIELIT 2022 April Scientist B | Section B | Question: 101
Consider two hosts $\text{X}$ and $\text{Y}$, connected by a single direct link of rate $10^6\; \text{bits/sec}$. The distance between the two hosts is $10,000\;\text{km}$ and the propagation speed along the link is $2 \times 10^8 \;\text{m/sec}$. ... $\text{q}=400$ $\text{p}=100$ and $\text{q}=50$ $\text{p}=400$ and $\text{q}=50$
Consider two hosts $\text{X}$ and $\text{Y}$, connected by a single direct link of rate $10^6\; \text{bits/sec}$. The distance between the two hosts is $10,000\;\text{km}...
soujanyareddy13
324
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
0
votes
1
answer
57
NIELIT 2022 April Scientist B | Section B | Question: 102
Consider a machine with $40 \; \text{MHz}$ processor which has run a benchmark program. The executed program consists of $100,000$ instruction executions, with the following instructions mix and clock cycle count. What will be the effective $\text{CPI, MIPS}$ ... $:4.87 \; \text{ms}$
Consider a machine with $40 \; \text{MHz}$ processor which has run a benchmark program. The executed program consists of $100,000$ instruction executions, with the follow...
soujanyareddy13
4.0k
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
0
votes
0
answers
58
NIELIT 2022 April Scientist B | Section B | Question: 103
Which of the following are true? A programming language which does not permit global variables of any kind and has no nesting of procedures/functions, but permits recursion can be implemented with static storage allocation Multi-level access link (or display) arrangement ... $\text{(V)}$ only $\text{(II), (III)}$ and $\text{(V)}$ only
Which of the following are true?A programming language which does not permit global variables of any kind and has no nesting of procedures/functions, but permits recursio...
soujanyareddy13
353
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
0
votes
1
answer
59
NIELIT 2022 April Scientist B | Section B | Question: 104
A connected planar graph having $6$ vertices, $7$ edges contains ___________ regions. $15$ $11$ $3$ $1$
A connected planar graph having $6$ vertices, $7$ edges contains ___________ regions.$15$$11$$3$$1$
soujanyareddy13
665
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
0
votes
0
answers
60
NIELIT 2022 April Scientist B | Section B | Question: 105
What is the time complexity of the following recursive function? int ComputFun(int n) { if(n<=2) return 1; else return (DoSomething(floor(sqrt(n)))+n); } $\Theta(n)$ $\Theta(\log n)$ $\Theta(n\log n)$ $\Theta(\log \log n)$
What is the time complexity of the following recursive function?int ComputFun(int n) { if(n<=2) return 1; else return (DoSomething(floor(sqrt(n)))+n); }$\Theta(n)$$\Theta...
soujanyareddy13
449
views
soujanyareddy13
asked
Apr 12, 2022
Others
nielit2022apr-scientistb
+
–
Page:
« prev
1
2
3
4
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register