Recent questions tagged out-of-gate-syllabus

254
views
1 answers
0 votes
HELLO SIR , SIR I HAVE LEFT WITH TOC, CD , DM AND CN AND I THOUGHT , I SHOULD LEAVE ANY TWO OF THESE SO THAT I CAN FOCUS ON REVISION PROPERLY… SO , I WANT TO KNOW THAT WHICH 2 OF THESE SHOULD LEFT ASIDE .
168
views
0 answers
0 votes
Calculate cyclomatic complexity for the program to find the smallest of three numbers.
873
views
1 answers
0 votes
Classes communicate with one another via:processed informationInterfacesmessagescoupling
291
views
0 answers
0 votes
Use Secant method to find roots of:$x^3-2x^2+3x-5=0$x+1 = 4sinx$e^x = x + 2$
214
views
0 answers
0 votes
Use NR method to find a root of the equation with tolerance x=0.00001.$x^3-2x-5=0$e^x-3x^2=0$
115
views
0 answers
0 votes
Use Bisection method to find all roots of $x^3 – 5x + 3 = 0$
289
views
0 answers
0 votes
Use Bisection method to find the root of the following equation with tolerance 0.001.$x^4 - 2x^3 - 4x^2 + 4x + 4 = 0$x^3 – e^x + sin(x) = 0$
1.4k
views
0 answers
0 votes
Consider a CRT display that has a text mode display format of $80×25$ characters with a $9×12$ character cell. What is the size of the video buffer RAM for the display to be used in monochrome ($1$ bit per pixel) graphics mode
9.3k
views
6 answers
13 votes
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes ... Totient Function, then the prime factor of $n$ which is greater than $50$ is _________
24.5k
views
12 answers
39 votes
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
12.8k
views
3 answers
39 votes
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of ... of the following are possible security violations?I and II onlyI onlyII onlyII and III only
654
views
0 answers
1 votes
The following table gives the cost of transporting one tonne of goods from the origins A, B, C to the destinations F, G, H. Also shown are the ... above, calculate the values of the duals and determine whether this is an optimal solution.
807
views
0 answers
1 votes
If $x \| \underline{x} \| \infty = 1< i^{max} < n \: \: max \: \: ( \mid x1 \mid ) $ ... easy to calculate for any matrix, explain why the condition number is difficult (i.e. expensive) to calculate.
763
views
1 answers
1 votes
Consider the following well-formed formula: ... resolution principle that the well-formed formula, given above, cannot be satisfied for any interpretation.
718
views
1 answers
1 votes
Consider the following well-formed formula:$\exists x \forall y [ \neg \: \exists z [ p (y, z) \wedge p (z, y) ] \equiv p(x,y)]$Express the above well-formed formula in clausal form.
1.3k
views
3 answers
7 votes
Are the two digraphs shown in the above figure isomorphic? Justify your answer.
590
views
1 answers
1 votes
Verify whether the following mapping is a homomorphism. If so, determine its kernel.$f(x)=x^3$, for all $x$ belonging to $G$.
507
views
0 answers
2 votes
Verify whether the following mapping is a homomorphism. If so, determine its kernel.$\overline{G}=G$
474
views
0 answers
1 votes
Verify whether the following mapping is a homomorphism. If so, determine its kernel.$G$ is the group of non zero real numbers under multiplication.
858
views
1 answers
1 votes
Translate the executable statements of the following Pascal Program into quadruples. Assume that integer and real values require four words each.repeat flag[i]:=true; while turn !=i do begin ... i:<=10 do begin a[i]:=0; i:=i+1 end; end.
520
views
0 answers
1 votes
Consider the following Ada program:Procedure P is BAD-FORMAT: exception Procedure Q is begin ... if S/='b' then raise BAD-FORMAT end if; ... end Q; Procedure ... 2 end P;Under what conditions are the two handler bodies $1$ and $2$ executed?
530
views
1 answers
0 votes
Write a LISP function to compute the product of all the numbers in a list. Assume that the list contains only number.
281
views
0 answers
0 votes
Briefly explain the term “Configuring a programmable peripheral chip”.
508
views
0 answers
0 votes
Which of the following features are available in Ada?procedures, monitors, packages, common statement, goto statement, generic unit tasks, backtracking, recursion, exceptions, pragmas, classes.
656
views
1 answers
0 votes
555
views
0 answers
0 votes
Consider a database with the following three relations:CREDITS (STUDENT; COURSE)OFFERS (TEACHER; COURSE)BELONGS (TEACHER; DEPARTMENT)Given below is a code in query language QUEL. ... LIST3 retrieve(E1.I) where e1.I=e2.I and where e1.I=e3.I
527
views
0 answers
0 votes
Give one property of the field of real numbers which no longer holds when we compute using finite-precision floating point numbers.
405
views
0 answers
1 votes
If the transportation problem is solved using some version of the simplex algorithm, under what condition will the solution always have integer values?
464
views
0 answers
1 votes
An $8212$ in handshake mode of implementation is used in a device controller of a microprocessor-based system. The $8212$ control signals used for the ... handshaking are _________ at the microprocessor end, and ________ at the device end.