3 answers
2
3 answers
3
ln neural network, the network capacity is defined as:The traffic (tarry capacity of the networkThe total number of nodes in the networkThe number of patterns that can be...
2 answers
4
4 answers
5
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
6 answers
7
What is the output of tho following program?main(){ int x=2, y=5; if(x<y) return (x=x+y); else printf("z1"); printf("z2"); }$z2$$z1z2$Compilation errorNone of these
3 answers
8
in a file which contains $1$ million records and the order of the tree is $100$, then what is the maximum number of nodes to be accessed if $B$+ tree index is used?$5$$4$...
3 answers
10
The domain of the function $\log (\log \sin(x))$ is:$0<x<$$\pi$$2n$$\pi$$<$$x$$<$$(2n+1)$$\pi$, for $n$ in $N$Empty setNone of the above
3 answers
11
A computer uses ternary system instead of the traditional systen, An $n$ bit string in the binary system will occupy$3+n$ ternary digits$2n/3$ ternary digits$n$$\log_{2}3...
2 answers
13
Consider the following program{ int x=1; printf("%d",(*char(char*)&x)); }Assuming required header files are included and if the machine in which this program is executed ...
2 answers
14
The $FSM$ (Finite State Machine) machine pictured in the figure aboveComplements a given bit patternFinds $2's$ complement of a given bit patternIncrements a given bit pa...
3 answers
17
A $32$-$bit$ adder is formed by cascading $4$-$bit$ CLA adder.The gate delays (latency)for getting the sum bits is$16$$18$$17$$19$
1 answer
18
6 answers
20
The proposition $(P\Rightarrow Q)\wedge (Q\Rightarrow P)$ is aTautologyContradictionContingencyAbsurdity
1 answer
25
Please write grammar for it and explain with example.$L=\{w \: : n_a(w) n_b(w) \}$
1 answer
29
$x=a \cos(t), y=b \sin(t)$ is the parametric form ofEllipseHyperbolaCircleParabola
3 answers
30