0 votes
2 answers
82
0 votes
2 answers
83
Consider the following $\mathrm{C}$ code :{int a = 5, b=9; float r; r= b /a ;}What is the value of $\text{r}$ ?$1.8$$1.0$$2.0$$0.0$
0 votes
0 answers
86
A superkey for an entity consists of :one attribute onlyat least two attributesat most two attributesone or more attributes
0 votes
1 answer
87
Which of the following set of keywords constitutes a mapping in $\text{SQL}$?$\text{SELECT, FROM, TABLE}$$\text{SELECT, FROM, WHERE}$$\text{CONNECT, TABLE, CREATE}$$\text...
0 votes
0 answers
88
0 votes
3 answers
91
Which of the following data structures is most efficient in terms of both space and time to reverse a string of characters?Linked listStackArrayTree
0 votes
0 answers
92
Which of the following can be the sequence of nodes examined in a binary search tree while searching for key $98$?$100, 50, 75, 60, 98$$100,120,90,95,98$$200, 70, 100, 95...
1 votes
1 answer
93
Which of the following is true for a sorted list with ' $n$ ' elements?Insertion in a sorted array takes constant time.Insertion in a sorted linear linked list takes cons...
0 votes
1 answer
94
Files that are related to input/output and are used to model serial $\text{I/O}$ devices such as terminals, printers and networks are called:regular filescharacter specia...
0 votes
0 answers
95
An example of a possible file attribute is:minimum sizepermanent flagarchive flagEBCDIC flag
0 votes
0 answers
96
0 votes
0 answers
97
For slotted ALOHA, the maximum channel utilization is :$100 \%$$50 \%$$36 \%$$18 \%$
0 votes
2 answers
98
For a channel of $3 \mathrm{KHz}$ bandwidth and signal to noise ratio of $30 \mathrm{~dB}$, the maximum data rate is:$3000 \mathrm{bps}$$6000 \mathrm{bps}$$15000 \mathrm{...
0 votes
1 answer
99
An example of a public key encryption algorithm is :Caesar cipher algorithmDES algorithmAES algorithmKnapsack algorithm
0 votes
0 answers
100
With reference to hierarchical routing, the optimum number of levels for an $m$ router subnet is:$m^{2}$$m$$\ln m$$\sqrt{m}$