Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by rsansiya111
1
answer
1
Dijkstra's algorithm | Negative Weight Cycle
If a -ve weight cycle is reachable from source, the Dijkstra's algorithm gets into an infinite loop TRUE FALSE
If a -ve weight cycle is reachable from source, the Dijkstra's algorithm gets into an infinite loop TRUEFALSE
697
views
answered
Dec 19, 2022
Algorithms
dijkstras-algorithm
graph-algorithms
shortest-path
+
–
1
answer
2
Process state
A printf or malloc takes the process to what state? Running Ready Suspended Terminated
A printf or malloc takes the process to what state?RunningReadySuspendedTerminated
394
views
commented
Dec 19, 2022
Operating System
operating-system
process
+
–
2
answers
3
Is it also CSL?
Is the following Language, L = {xxxx | x ∈ {0, 1}*} CSL or not? I saw a explanation say that it’s REC, but it didn’t say anything about it not being CSL and I used to think strings like {xx | x ∈ {0, 1}*} are CSL where the same strings keep repeating [like x here]. So is it CSL and please do also tell is there a rule to figure that out?
Is the following Language, L = {xxxx | x ∈ {0, 1}*} CSL or not? I saw a explanation say that it’s REC, but it didn’t say anything about it not being CSL and I used ...
764
views
answer edited
Dec 19, 2022
Theory of Computation
theory-of-computation
context-sensitive
recursive-and-recursively-enumerable-languages
+
–
1
answer
4
UGC NET CSE | October 2022 | Part 1 | Question: 80
$\text{RAD}$ software process model stands for Rapid Application Development Relative Application Development Rapid Application Design Recent Application Development,
$\text{RAD}$ software process model stands forRapid Application DevelopmentRelative Application DevelopmentRapid Application DesignRecent Application Development,
402
views
answered
Dec 19, 2022
Others
ugcnetcse-oct2022-paper1
+
–
4
answers
5
GATE CSE 1995 | Question: 1.15
Which scheduling policy is most suitable for a time shared operating system? Shortest Job First Round Robin First Come First Serve Elevator
Which scheduling policy is most suitable for a time shared operating system?Shortest Job FirstRound RobinFirst Come First ServeElevator
13.3k
views
commented
Dec 19, 2022
Operating System
gate1995
operating-system
process-scheduling
easy
+
–
1
answer
6
Array P&DS | Time Complexity
What is the worst case time complexity of an efficient algorithm (in order of n) to get the last index for an actually filled element, in an array, given the condition that we may not fill the entire initialized array with elements, the array is initialized as “int a[n]; ” [Array may not be filled in a sorted order] O(n) O(1) O(log(n)) O($n^2$)
What is the worst case time complexity of an efficient algorithm (in order of n) to get the last index for an actually filled element, in an array, given the condition th...
669
views
commented
Dec 18, 2022
DS
algorithms
time-complexity
array
+
–
2
answers
7
Database Relations | Heighest normal form
MSQ A relation R(A,B,C,D) has only trivial functional dependencies of the form ( A→A, AB→AB,ABC→A, etc) Then consider the following options: The relation is surely in BCNF The relation is surely in 3NF The relation is surely in 2NF None of the above
MSQ A relation R(A,B,C,D) has only trivial functional dependencies of the form ( A→A, AB→AB,ABC→A, etc)Then consider the following options:The relation is surely in...
781
views
commented
Dec 17, 2022
Databases
database-normalization
databases
bcnf
normal-forms
multiple-selects
+
–
7
answers
8
GATE CSE 2003 | Question: 28
Which of the following functionality must be implemented by a transport protocol over and above the network protocol? Recovery from packet losses Detection of duplicate packets Packet delivery in the correct order End to end connectivity
Which of the following functionality must be implemented by a transport protocol over and above the network protocol?Recovery from packet lossesDetection of duplicate pac...
14.2k
views
commented
Dec 17, 2022
Computer Networks
gatecse-2003
computer-networks
network-layering
easy
+
–
0
answers
9
UGC NET CSE | October 2022 | Part 1 | Question: 49
If an operating system does not allow a child process to exist when the parent process has been terminated, this phenomenon is called as. Threading Cascading termination Zombie termination Process killing
If an operating system does not allow a child process to exist when the parent process has been terminated, this phenomenon is called as.ThreadingCascading terminationZom...
300
views
commented
Dec 17, 2022
Others
ugcnetcse-oct2022-paper1
+
–
0
answers
10
UGC NET CSE | October 2022 | Part 1 | Question: 34
The model in which the requirements are implemented by its category is Evolutionary Development Model Waterfall Model Prototyping Model Iterative Enhancement Model
The model in which the requirements are implemented by its category isEvolutionary Development ModelWaterfall ModelPrototyping ModelIterative Enhancement Model
204
views
commented
Dec 17, 2022
Others
ugcnetcse-oct2022-paper1
+
–
4
answers
11
NIELIT 2018-56
Identify the total number of tokens in the given statement printf("A%B=",&i); $7$ $8$ $9$ $13$
Identify the total number of tokens in the given statementprintf("A%B=",&i);$7$$8$$9$$13$
2.7k
views
commented
Dec 17, 2022
Compiler Design
nielit-2018
compiler-design
compiler-tokenization
+
–
1
answer
12
Peter Linz Edition 4 Exercise 7.4 Question 8 (Page No. 204)
Let G be a context-free grammar in Greibach normal form. Describe an algorithm which, for any given k, determines whether or not G is an LL (k) grammar.
Let G be a context-free grammar in Greibach normal form. Describe an algorithm which, for anygiven k, determines whether or not G is an LL (k) grammar.
280
views
answered
Dec 17, 2022
Theory of Computation
peter-linz
peter-linz-edition4
theory-of-computation
context-free-grammar
+
–
1
answer
13
Object Oriented Programming
Imagine a scenario where new child classes are introduced frequently from a base class. The method calling sequences for every child class are the same but the implementations are different among the child classes. Here which design pattern would you like to apply? Explain the reasons with examples j
Imagine a scenario where new child classes are introduced frequently from a base class. The method calling sequences for every child class are the same but the implementa...
311
views
answered
Dec 17, 2022
Programming in C
object-oriented-programming
programming
+
–
3
answers
14
theory regular langauge
Write a regular expression for all strings of 0’s and 1’s in which there is an even number of 0’s between any two 1’s.
Write a regular expression for all strings of 0’s and 1’s in which there is an even number of 0’s between any two 1’s.
678
views
answered
Dec 16, 2022
Theory of Computation
theory-of-computation
strings
regular-expression
+
–
1
answer
15
GATE CSE 2009 | Question: 50
Consider the following statements about the cyclomatic complexity of the control flow graph of a program module. Which of these are TRUE? The cyclomatic complexity of a module is equal to the maximum number of linearly independent circuits in the graph. The cyclomatic ... that should be tested during path coverage testing. I and II II and III I and III I, II and III
Consider the following statements about the cyclomatic complexity of the control flow graph of a program module. Which of these are TRUE? The cyclomatic complexity of a m...
4.8k
views
commented
Dec 16, 2022
IS&Software Engineering
gatecse-2009
is&software-engineering
cyclomatic-complexity
easy
+
–
3
answers
16
GATE IT 2008 | Question: 17
Find if the following statements in the context of software testing are TRUE or FALSE. (S1): Statement coverage cannot guarantee execution of loops in a program under test. (S2): Use of independent path testing criterion guarantees execution of each loop in a program under test more than once. True, True True, False False, True False, False
Find if the following statements in the context of software testing are TRUE or FALSE.(S1): Statement coverage cannot guarantee execution of loops in a program under test...
3.6k
views
answered
Dec 16, 2022
IS&Software Engineering
gateit-2008
is&software-engineering
software-testing
normal
+
–
1
answer
17
DRDO CSE 2022 Paper 1 | Question: 29
Five items $\text{A, B, C, D, E}$ are pushed onto a stack, one after other starting from item $\mathrm{A}$. The stack is then popped by three items, and each item is inserted into a queue. Next, two items are deleted from the queue, ... deleted items are pushed back onto the stack. Now, one item is popped from the stack. Which item is at the top of the stack.
Five items $\text{A, B, C, D, E}$ are pushed onto a stack, one after other starting from item $\mathrm{A}$. The stack is then popped by three items, and each item is inse...
509
views
commented
Dec 16, 2022
DS
drdocse-2022-paper1
data-structures
stack
5-marks
descriptive
+
–
0
answers
18
Operating System
Which of the following is correct? 1)In acyclic-graph directory, a file can have two different relative path name, but not two different absolute path name. 2)A dangling pointer possible for a file in tree-structured directories. 3)If Access Control List (ACL) ... directory, then size of a directory entry (with attributes) will be variable. 4)None of the above Answer given is 3
Which of the following is correct?1)In acyclic-graph directory, a file can have two different relative path name, but not two different absolute path name.2)A dangling po...
479
views
commented
Dec 16, 2022
Operating System
operating-system
test-series
file-system
+
–
1
answer
19
UGC NET CSE | October 2022 | Part 1 | Question: 4
Consider the following statements about Context Free Language $\text{(CFL)}$ : Statement I: $\text{CFL}$ is closed under homomorphism. Statement II: $\text{CFL}$ is closed under complement. Which of the following is correct? Statement $\text{I}$ ... $\text{I}$ and Statement $II$ are true Neither Statement $\text{I}$ nor Statement $\text{II}$ is true
Consider the following statements about Context Free Language $\text{(CFL)}$ :Statement I: $\text{CFL}$ is closed under homomorphism.Statement II: $\text{CFL}$ is closed...
521
views
commented
Dec 16, 2022
Others
ugcnetcse-oct2022-paper1
+
–
0
answers
20
DRDO CSE 2022 Paper 1 | Question: 33 (a)
Consider the following graph. How many nodes (apart from $s$) does the Breadth First Search algorithm discover before discovering $t$ when starting from $s$.
Consider the following graph.How many nodes (apart from $s$) does the Breadth First Search algorithm discover before discovering $t$ when starting from $s$.
338
views
commented
Dec 16, 2022
Algorithms
drdocse-2022-paper1
algorithms
graph-algorithms
breadth-first-search
2-marks
descriptive
+
–
1
answer
21
DRDO CSE 2022 Paper 1 | Question: 27
Find the number of binary tree(s) with $3$ nodes (i.e., $\text{A, B,}$ and $\text{C})$ which when traversed by pre-order gives the sequence $\textbf{C B A}$. You also need to draw each such tree.
Find the number of binary tree(s) with $3$ nodes (i.e., $\text{A, B,}$ and $\text{C})$ which when traversed by pre-order gives the sequence $\textbf{C B A}$. You also nee...
388
views
answered
Dec 16, 2022
DS
drdocse-2022-paper1
data-structures
binary-tree
5-marks
descriptive
+
–
0
answers
22
DRDO CSE 2022 Paper 1 | Question: 26 (a)
Provide the correct data structures for the following: ________ is used for delimiter checking and recursion.
Provide the correct data structures for the following:________ is used for delimiter checking and recursion.
524
views
commented
Dec 16, 2022
DS
drdocse-2022-paper1
data-structures
stack
1-mark
fill-in-the-blanks
+
–
1
answer
23
DRDO CSE 2022 Paper 1 | Question: 19
How many seven digit numbers are possible with exactly four $4 \mathrm{s}?$
How many seven digit numbers are possible with exactly four $4 \mathrm{s}?$
358
views
answered
Dec 16, 2022
Combinatory
drdocse-2022-paper1
combinatory
counting
5-marks
descriptive
+
–
1
answer
24
DRDO CSE 2022 Paper 2 | Question: 28 (b)
Provide the correct answer for the following: The phenomena in which training error of the model decreases but test error increases is called___________.
Provide the correct answer for the following:The phenomena in which training error of the model decreases but test error increases is called___________.
521
views
commented
Dec 16, 2022
Artificial Intelligence
drdocse-2022-paper2
artificial-intelligence
2-marks
fill-in-the-blanks
+
–
0
answers
25
DRDO CSE 2022 Paper 2 | Question: 15 (c)
Answer the following. Which of the following are not keys in the database? Compliment * Agreement Construct Supplement
Answer the following.Which of the following are not keys in the database?Compliment *AgreementConstructSupplement
267
views
commented
Dec 16, 2022
Databases
drdocse-2022-paper2
databases
database-normalization
1-mark
descriptive
+
–
2
answers
26
DRDO CSE 2022 Paper 2 | Question: 15 (b)
Answer the following. ___________ removes all the rows of the given table.
Answer the following.___________ removes all the rows of the given table.
405
views
commented
Dec 16, 2022
Databases
drdocse-2022-paper2
databases
database-normalization
2-marks
fill-in-the-blanks
+
–
1
answer
27
DRDO CSE 2022 Paper 2 | Question: 29
$\max (0, x)$ and $\max (0.1 x, x)$ are _________ and ________ activation functions, respectively, which are non-linear in nature.
$\max (0, x)$ and $\max (0.1 x, x)$ are _________ and ________ activation functions, respectively, which are non-linear in nature.
657
views
answered
Dec 16, 2022
Artificial Intelligence
drdocse-2022-paper2
artificial-intelligence
4-marks
fill-in-the-blanks
+
–
3
answers
28
DRDO CSE 2022 Paper 2 | Question: 24
Compute the following: $3^{32} \bmod 80$.
Compute the following: $3^{32} \bmod 80$.
569
views
answered
Dec 16, 2022
Quantitative Aptitude
drdocse-2022-paper2
quantitative-aptitude
modular-arithmetic
5-marks
descriptive
+
–
1
answer
29
DRDO CSE 2022 Paper 2 | Question: 23 (a)
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that by default, all traffic will be accepted. You can refer to an entire ... *' to many 'any'. Action A: Block all traffic to any server on the local network. Write as Rule $1.$
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that ...
347
views
answered
Dec 16, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-and-half-marks
descriptive
+
–
0
answers
30
DRDO CSE 2022 Paper 2 | Question: 21
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it securely to edit and modify. What is the one critical security protocol/tool that enables you to connect to your server securely?
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it...
438
views
commented
Dec 16, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-marks
descriptive
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register