0 votes
241
0 votes
242
Match the following with respect to the programming language $:$$\begin{array}{} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Structured language} &...
0 votes
243
Assuming there are n keys and each key is in the range [0, m-1]. The run time of bucket sort isO(n)O(n lgn)O(n lgm)O(n+m)
0 votes
245
Which of the following TCP/IP Internet protocol does diskless machine uses to obtain its IP address from a server?RAPRIPARPX.25
0 votes
247
0 votes
248
1 votes
250
1 votes
252
0 votes
258
The register that stores the bits required to mask the interrupts is ______.Status registerInterrupt service registerInterrupt mask registerInterrupt request register
0 votes
260
Consider a hash table of size $m = 10000$, and the hash function $h(K) = floor (m(KA \bmod 1))$ for $A = ( \sqrt{5} – 1)/2$. The key $123456$ is mapped to location ____...
0 votes
262