search
Log In

Questions by Sanjay Sharma

0 votes
1 answer
1
asked Nov 17, 2020 in CBSE/UGC NET 60 views
0 votes
2 answers
2
asked Nov 17, 2020 in CBSE/UGC NET 71 views
0 votes
1 answer
3
asked Nov 17, 2020 in CBSE/UGC NET 38 views
0 votes
1 answer
4
asked Nov 17, 2020 in CBSE/UGC NET 33 views
0 votes
1 answer
5
asked Nov 17, 2020 in CBSE/UGC NET 42 views
0 votes
0 answers
6
asked Nov 17, 2020 in CBSE/UGC NET 41 views
0 votes
0 answers
7
asked Nov 16, 2020 in CBSE/UGC NET 27 views
1 vote
2 answers
8
is given ans correct ?
asked Aug 31, 2020 in Digital Logic 337 views
3 votes
2 answers
9
Which of the following is not a monotonically increasing grammar? (A) Context-sensitive grammar (B) Unrestricted grammar (C) Regular grammar (D) Context-free grammar
asked Jul 20, 2020 in Theory of Computation 543 views
1 vote
5 answers
10
Given a mask, M=255.255.255.248. How many subnet bits are required for given mask M? (A) 2 (B) 3 (C) 4 (D)5
asked Jul 18, 2020 in Computer Networks 772 views
2 votes
1 answer
11
15. a) How many cards must be chosen from a standard deck of 52 cards to guarantee that at least two of the four aces are chosen? b) How many cards must be chosen from a standard deck of 52 cards to guarantee that at least two of the four aces and at least ... many cards must be chosen from a standard deck of 52 cards to guarantee that there are at least two cards of each of two different kinds?
asked Jul 4, 2020 in Combinatory 316 views
0 votes
0 answers
12
asked Dec 30, 2019 in CO and Architecture 511 views
4 votes
2 answers
13
$\text{What is the output of the following C program?}$ #include <stdio.h> main() { int i, j ,x=0 ; for (i=0; i <5 ; ++ i) for (j=0;j <i ;++j) { x+ = (i+j-1); break ; } printf(“%d” ,x); } $1)6 \;\;\; 2)5 \;\;\; 3)4 \;\;\; 4) 3$
asked Dec 29, 2019 in Programming 698 views
1 vote
1 answer
14
The Data Encryption Standard (DES) has a function consists of four steps. Which of the following is correct order of these four steps? An expansion permutation, S boxes, an XOR operation, a straight permutation An expansion permutation, an XOR operation, S-boxes, ... , S - boxes, an XOR operation, an expansion permutation A straight permutation, an XOR operation, S boxes, an expansion permutation
asked Dec 29, 2019 in Computer Networks 513 views
0 votes
1 answer
15
In a system for a restaurant the main scenario for placing order is given below: Customer reads menu Customer places order Order is sent to kitchen for preparation Order items are served Customer request for a bill for the order Bill is prepared for this order Customer is given the bill ... will have at least how many objects among whom the messages will be exchanged) 1) 3 (2) 4 (3) 5 (4) 6
asked Dec 29, 2019 in Object Oriented Programming 603 views
0 votes
1 answer
16
Consider the following statements: $\mathbf{S_1:}\;\;$If a group $\mathbf{(G,*)}$ is of order $\mathbf n$ and $\mathrm {a \in G}$ is such that $\mathrm {a^m=e}$ for some integer $\mathrm {m \le n}$ then $\mathbf m$ must divide $\mathbf n$. $\mathbf {S_2:}\;\;$If a ... $(3)\;\;\;\text{Niether}\; \mathrm{S_1}\;\text{nor}\;\mathrm{S_2}$
asked Dec 29, 2019 in Set Theory & Algebra 392 views
5 votes
2 answers
17
Match List I List II a) Micro operation (i) Specify micro operation b) Microprogrammed control unit (ii) Improve CPU utilization c) Interrupts (iii) Control Memory d) Micro instruction (Iv) Elementary operation performed on data stored in registers Choose the correct option from these given below 1) a-iv , b-iii , c-ii , d ... , c-i , d-ii 3) a-iii , b-iv , c- i , d-ii 4) a-iii , b-iv , c-ii , d-i
asked Dec 27, 2019 in CO and Architecture 693 views
3 votes
1 answer
18
$\mathbf{Que39}$ Let $\mathrm{a^{2c}\;mod\;n = a(a^c)^2\;mod\;n}$ and $\mathrm{a^{2c+1}\;mod\;n = a(a^c)^2\;mod\;n}$. For $\mathrm{a = 7, b = 17}$ and $\mathrm{n = 561}$. What is the value of $\mathrm{a^b(mod\;n)}$. $1) 160\;\;\; 2) 166 \;\;\; 3 ) 157 \;\;\; 4 ) 67$
asked Dec 27, 2019 in Computer Networks 1.1k views
1 vote
1 answer
19
Consider the following statements : a) The running time of dynamic programming algorithm is always θ (p) where p is number of subproblems b)when a recurrence relation has cyclic dependency, it is impossible to use that recurrence relation (unmodified) in a correct dynamic program c) For a dynamic ... of the statement(s) is/are true 1) only b and a 2)only b 3) only b and c 4)only b and d
asked Dec 22, 2019 in Algorithms 976 views
1 vote
2 answers
20
Consider the following statements with respect to network security a) Message confidentially means that the sender and the receiver expect privacy. b) Message integrity means that the data must arrive at the receiver exactly as they were sent . c) Message authentication means the receiver ensured that the message is coming ... and (b) 2) only (a) and (c) 3) only (b) and (c) 4) (a), (b) and (c)
asked Dec 22, 2019 in Computer Networks 531 views
...