1 votes
61
Which of the following sentences can be generated by S - aS $\mid$ bAA - d $\mid$ cAbccddabbccaabcabcabcd
2 votes
62
Find the output of the following Java code line System.out.printIn(math.floor(-7.4))-7-8-7.4-7.0
1 votes
64
2 votes
65
Logic family popular for low power dissipationCMOSECLTTLDTL
1 votes
69
The addition of $4-bit$, two's complement, binary numbers $1101$ and $0100$ results in$0001$ and an overflow$1001$ and no overflow$0001$ and no overflow$1001$ and an over...
3 votes
71
Compared to CISC processors,RISC processors containMore register and smaller instruction setlarger instruction setless registers and smaller instruction setmore transisto...
3 votes
72
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field?ReplaceJoinChangeUpdate
0 votes
73
$\textsf{SHA-1}$ is aencryption algorithmdecryption algorithmkey exchange algorithmmessage digest function
0 votes
74
Use of IPSEC in tunnel mode results inIP packet with same headerIP packet with new headerIP packet without headerNo changes in IP packet
1 votes
75
Purpose of 'Foreign Key' in a table is to ensureNull IntegrityReferential IntegrityDomain IntegrityNull and Domain Integrity
1 votes
76
Which of the following is a MAC address?$\textsf{192.166.200.50}$$\textsf{00056A:01A01A5CCA7FF60}$$\textsf{568, Airport Road}$$\textsf{01:A5:BB:A7:FF:60}$
3 votes
77
A page faultOccurs when a program accesses an available page on memoryis an error in a specific pageis a reference to a page belonging to another programoccurs when a pro...
1 votes
78
A full binary tree with $n$ leaves contains$n$ nodes$\log_2 n$ nodes$2n-1$$2^n$ nodes
3 votes
79
In a graph $\text{G}$ there is one and only one path between every pair of vertices then $\text{G}$ is aPathWalkTreeCircuit
2 votes
80
A square matrix $\text{A}$ is called orthogonal if $\text{A}'\text{A}=$$\text{I}$$\text{A}$$-\text{A}$$-\text{I}$
1 votes
81
Activities which ensure that the software that has been built, is traceable to customer requirement is covered as part ofVerificationValidationMaintenanceModeling
2 votes
82
Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time?Transaction logQuery languageRepo...
3 votes
83
Process isA program in high level language kept on diskContents of main memoryA program in executionA job in secondary memory
0 votes
84
The expression $1 * 2 \wedge 3 * 4 \wedge 5 * 6$ will be evaluated as$32^{30}$$162^{30}$49152173458In original quetion 5 is not given.
2 votes
85
4 votes
87
In which addressing mode, the effectives address of the operand is generated by adding a constant value to the content of a register?Absolute modeIndirect modeImmediate m...
1 votes
88
A locked database file can beAccessed by only one userModified by users with the correct passwordUsed to hide sensitive informationUpdated by more than one user
0 votes
89
For the counting sequence 100, 200, 300 , 400 , 100 (repeat), the number of flip flops required are ?
1 votes
90
Which of the following flip-flops is free from race condition ?(A) T flip-flop(B) SR flip-flop(C) Master-slave JK flip-flop(D) None of the above