# Questions by Sanjay Sharma

0 votes
1 answer
1
0 votes
2 answers
2
0 votes
1 answer
3
0 votes
1 answer
4
0 votes
1 answer
5
0 votes
0 answers
6
0 votes
0 answers
7
1 vote
2 answers
8
is given ans correct ?
3 votes
2 answers
9
Which of the following is not a monotonically increasing grammar? (A) Context-sensitive grammar (B) Unrestricted grammar (C) Regular grammar (D) Context-free grammar
1 vote
5 answers
10
Given a mask, M=255.255.255.248. How many subnet bits are required for given mask M? (A) 2 (B) 3 (C) 4 (D)5
2 votes
1 answer
11
15. a) How many cards must be chosen from a standard deck of 52 cards to guarantee that at least two of the four aces are chosen? b) How many cards must be chosen from a standard deck of 52 cards to guarantee that at least two of the four aces and at least ... many cards must be chosen from a standard deck of 52 cards to guarantee that there are at least two cards of each of two different kinds?
0 votes
0 answers
12
4 votes
2 answers
13
$\text{What is the output of the following C program?}$ #include <stdio.h> main() { int i, j ,x=0 ; for (i=0; i <5 ; ++ i) for (j=0;j <i ;++j) { x+ = (i+j-1); break ; } printf(“%d” ,x); } $1)6 \;\;\; 2)5 \;\;\; 3)4 \;\;\; 4) 3$
1 vote
1 answer
14
The Data Encryption Standard (DES) has a function consists of four steps. Which of the following is correct order of these four steps? An expansion permutation, S boxes, an XOR operation, a straight permutation An expansion permutation, an XOR operation, S-boxes, ... , S - boxes, an XOR operation, an expansion permutation A straight permutation, an XOR operation, S boxes, an expansion permutation
0 votes
1 answer
15
In a system for a restaurant the main scenario for placing order is given below: Customer reads menu Customer places order Order is sent to kitchen for preparation Order items are served Customer request for a bill for the order Bill is prepared for this order Customer is given the bill ... will have at least how many objects among whom the messages will be exchanged) 1) 3 (2) 4 (3) 5 (4) 6
0 votes
1 answer
16
Consider the following statements: $\mathbf{S_1:}\;\;$If a group $\mathbf{(G,*)}$ is of order $\mathbf n$ and $\mathrm {a \in G}$ is such that $\mathrm {a^m=e}$ for some integer $\mathrm {m \le n}$ then $\mathbf m$ must divide $\mathbf n$. $\mathbf {S_2:}\;\;$If a ... $(3)\;\;\;\text{Niether}\; \mathrm{S_1}\;\text{nor}\;\mathrm{S_2}$
5 votes
2 answers
17
Match List I List II a) Micro operation (i) Specify micro operation b) Microprogrammed control unit (ii) Improve CPU utilization c) Interrupts (iii) Control Memory d) Micro instruction (Iv) Elementary operation performed on data stored in registers Choose the correct option from these given below 1) a-iv , b-iii , c-ii , d ... , c-i , d-ii 3) a-iii , b-iv , c- i , d-ii 4) a-iii , b-iv , c-ii , d-i
3 votes
1 answer
18
$\mathbf{Que39}$ Let $\mathrm{a^{2c}\;mod\;n = a(a^c)^2\;mod\;n}$ and $\mathrm{a^{2c+1}\;mod\;n = a(a^c)^2\;mod\;n}$. For $\mathrm{a = 7, b = 17}$ and $\mathrm{n = 561}$. What is the value of $\mathrm{a^b(mod\;n)}$. $1) 160\;\;\; 2) 166 \;\;\; 3 ) 157 \;\;\; 4 ) 67$
1 vote
1 answer
19
Consider the following statements : a) The running time of dynamic programming algorithm is always θ (p) where p is number of subproblems b)when a recurrence relation has cyclic dependency, it is impossible to use that recurrence relation (unmodified) in a correct dynamic program c) For a dynamic ... of the statement(s) is/are true 1) only b and a 2)only b 3) only b and c 4)only b and d
1 vote
2 answers
20
Consider the following statements with respect to network security a) Message confidentially means that the sender and the receiver expect privacy. b) Message integrity means that the data must arrive at the receiver exactly as they were sent . c) Message authentication means the receiver ensured that the message is coming ... and (b) 2) only (a) and (c) 3) only (b) and (c) 4) (a), (b) and (c)