0 votes
1
Which of the following is not a Clustering method?K-Means methodSelf Organizing feature map methodK- nearest neighbor methodAgglomerative method
0 votes
4
Which module gives control of the CPU to the process selected by the short-term schedular?DispatcherInterruptSchedularThreading
0 votes
7
Match the following with respect to RDBMS :$\begin{array}{clcl} \text{(a)} & \text{Entity integrity} & \text{(i)} & \text{enforces some specific business rule that do not...
0 votes
11
0 votes
12
If $b$ is the branching factor and $m$ is the maximum depth of the search tree, what is the space complexity of greedy search?$O (b+m)$$O(bm)$$O(b^m)$$O(m^b)$
0 votes
13
The Bounded buffer problem is also known as ___________Producer – consumer problemReader – writer problemDining Philosophers problemBoth $(2)$ and $(3)$
0 votes
14
0 votes
16
The Sigmoid activation function $f(t)$ is defined as$\dfrac{1}{\text{exp} (t) + \text{exp} (-t)}$$t \text{ exp}(-t)$$\dfrac{1}{1+ \text{exp} (t)}$$\dfrac{1}{1+ \text{exp...
0 votes
17
Match the following WINDOWS system calls and UNIX system calls with reference to process control and File manipulation. $$\begin{array}{llll} & \textbf{Windows} & & \text...
0 votes
19
Which of the following routing technique / techniques is/are used in distributed systems?Fixed RoutingVirtual RoutingDynamic Routing(a) only(a) and (b) only(c) onlyAll (a...
2 votes
20
3 votes
27
The recurrence relation capturing the optimal execution time of the Towers of Hanoi problem with $n$ discs is:$T(n)=2T(n-2)+2$$T(n)=2T(n/2)+1$$T(n)=2T(n-1)+n$$T(n)=2T(n-1...