Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by sh!va
7
votes
3
answers
91
ISRO2017-11
Given the following statements S1 : Every context-sensitive language $L$ is recursive S2 : There exists a recursive language that is not context-sensitive Which statements are true? Only S1 is correct Only S2 is correct Both S1 and S2 are not correct Both S1 and S2 are correct
Given the following statementsS1 : Every context-sensitive language $L$ is recursiveS2 : There exists a recursive language that is not context-sensitiveWhich statements a...
6.0k
views
asked
May 7, 2017
Theory of Computation
isro2017
theory-of-computation
context-sensitive
+
–
11
votes
3
answers
92
ISRO2017-1
If $\text{A}$ is a skew symmetric matrix then $\text{A}^t$ is Diagonal matrix $\text{A}$ $0$ $-\text{A}$
If $\text{A}$ is a skew symmetric matrix then $\text{A}^t$ isDiagonal matrix $\text{A}$$0$$-\text{A}$
5.5k
views
asked
May 7, 2017
Linear Algebra
isro2017
linear-algebra
matrix
+
–
7
votes
3
answers
93
ISRO2017-4
What does a data dictionary will identify? Field name Field format Field types All of the above
What does a data dictionary will identify?Field nameField formatField typesAll of the above
10.4k
views
asked
May 7, 2017
Databases
isro2017
databases
file-system
+
–
5
votes
3
answers
94
ISRO2017-76
Which of the following algorithms solves the all pair shortest path problem? Prim's algorithm Dijkstra's algorithm Bellman ford algorithm Floyd warshalls algorithm
Which of the following algorithms solves the all pair shortest path problem?Prim's algorithmDijkstra's algorithmBellman ford algorithmFloyd warshalls algorithm
4.4k
views
asked
May 7, 2017
Algorithms
isro2017
algorithms
graph-algorithms
+
–
14
votes
4
answers
95
ISRO 2017-79
The output of a lexical analyzer is A parse tree Intermediate code Machine code A stream of tokens
The output of a lexical analyzer isA parse treeIntermediate codeMachine codeA stream of tokens
6.2k
views
asked
May 7, 2017
Compiler Design
isro2017
compiler-design
lexical-analysis
+
–
5
votes
2
answers
96
ISRO2017-75
Choose the most appropriate HTML tag in the following to create a numbered list <dl> <list> <ul> <ol>
Choose the most appropriate HTML tag in the following to create a numbered list<dl><list><ul><ol>
5.1k
views
asked
May 7, 2017
Web Technologies
isro2017
web-technologies
html
non-gate
+
–
5
votes
2
answers
97
ISRO2017-71
At a particular time the value of counting semaphore is 10. It will become 7 after: 3 V operations 3 P operations 5 V operations and 2 P operations 2 V operations and 5 P operations
At a particular time the value of counting semaphore is 10. It will become 7 after:3 V operations3 P operations5 V operations and 2 P operations2 V operations and 5 P ope...
13.6k
views
asked
May 7, 2017
Operating System
isro2017
operating-system
semaphore
+
–
6
votes
2
answers
98
ISRO2017-16
Given two statements Insertion of an element should be done at the last node of the circular list Deletion of an element should be done at the last node of the circular list Both are true Both are false First is false and second is true None of the above
Given two statementsInsertion of an element should be done at the last node of the circular listDeletion of an element should be done at the last node of the circular lis...
10.6k
views
asked
May 7, 2017
DS
isro2017
data-structures
linked-list
bad-question
+
–
12
votes
2
answers
99
ISRO2017-18
How many $128\times 8$ bit RAMs are required to design $32\;\text{K}\times 32$ bit RAM? $512$ $1024$ $128$ $32$
How many $128\times 8$ bit RAMs are required to design $32\;\text{K}\times 32$ bit RAM?$512$$1024$$128$$32$
7.1k
views
asked
May 7, 2017
CO and Architecture
isro2017
co-and-architecture
memory-interfacing
+
–
4
votes
4
answers
100
ISRO2017-53
In a doubly linked list the number of pointers affected for an insertion operation will be 4 0 1 Depends on the nodes of doubly linked list
In a doubly linked list the number of pointers affected for an insertion operation will be401Depends on the nodes of doubly linked list
13.6k
views
asked
May 7, 2017
DS
isro2017
data-structures
linked-list
bad-question
+
–
0
votes
1
answer
101
Cyclomayic complexity
What is the cyclomatic complexity of given code? while(i<3 AND j>9){.....} A. 1 B. 2 C. 3 D. 4
What is the cyclomatic complexity of given code?while(i<3 AND j>9){.....}A. 1B. 2C. 3D. 4
618
views
asked
May 5, 2017
1
votes
2
answers
102
MIME Protocol
MIME protocol works in which layer? A. Transport B. Session C. Presentation D. Application
MIME protocol works in which layer?A. Transport B. Session C. Presentation D. Application
865
views
asked
May 4, 2017
Computer Networks
computer-networks
+
–
1
votes
2
answers
103
Hamiltonian circuit
Hamiltonian circuit can be most perfectly related with: A. Greedy approach B. Dynamic programming C. Backtracking D. Branch and bound
Hamiltonian circuit can be most perfectly related with:A. Greedy approachB. Dynamic programmingC. BacktrackingD. Branch and bound
1.3k
views
asked
Apr 30, 2017
Algorithms
algorithms
normal
algorithm-design-technique
+
–
0
votes
1
answer
104
Subschema View Virtual table in DBMS
What is the difference between Subschema, View and Virtual table in DBMS? please explain!!
What is the difference between Subschema, View and Virtual table in DBMS?please explain!!
580
views
asked
Apr 27, 2017
Databases
databases
+
–
4
votes
1
answer
105
Selection sort and Insertion sort
Selection sort is an example of ____(I)_______ and insertion sort is an example of __(II)______. a) I- Greedy, II- Brute Force b) I- Brute Force II- Divide and conquer c) I- Greedy II- Divide and conquer d) I- Brute Force II- Brute Force
Selection sort is an example of ____(I)_______ and insertion sort is an example of __(II)______.a) I- Greedy, II- Brute Forceb) I- Brute Force II- Divide and conquerc) I-...
1.8k
views
asked
Apr 27, 2017
Algorithms
sorting
algorithms
+
–
0
votes
1
answer
106
External schema
External schema consists of: a) Subschemas b) Virtual Tables c) Both a and b d) None of these
External schema consists of:a) Subschemasb) Virtual Tablesc) Both a and bd) None of these
263
views
asked
Apr 27, 2017
Databases
databases
+
–
0
votes
0
answers
107
Peripheral devices : CAO
Consider READ and WRITE bits: a) Both are written by CPU b) Both are written by peripheral c) READ bit is written by peripheral while WRITE bit is written by CPU d) WRITE bit is written by peripheral while READ bit is written by CPU
Consider READ and WRITE bits:a) Both are written by CPUb) Both are written by peripheralc) READ bit is written by peripheral while WRITE bit is written by CPUd) WRITE bit...
833
views
asked
Apr 26, 2017
CO and Architecture
io-organization
co-and-architecture
+
–
4
votes
3
answers
108
TOC: empty language and epsilon
What is ∅ U ∅* ? a) ∅ b) ϵ c) Both a and b can be answer d) Neither a nor b
What is ∅ U ∅* ?a) ∅b) ϵc) Both a and b can be answerd) Neither a nor b
2.5k
views
asked
Apr 19, 2017
Theory of Computation
theory-of-computation
+
–
0
votes
1
answer
109
Spin lock vs Mutexes
If no resource is free then: a) Both Spin lock and mutexes will keep on spinning on the blocked variable b) Both Spin lock and mutexes will go to sleep and check the variable periodically. c) Spin lock will keep on spinning on the blocked ... . d) Mutexes will keep on spinning on the blocked variable while Spin lock will go to sleep and check the variable periodically.
If no resource is free then:a) Both Spin lock and mutexes will keep on spinning on the blocked variableb) Both Spin lock and mutexes will go to sleep and check the variab...
1.2k
views
asked
Mar 15, 2017
Operating System
process-synchronization
operating-system
+
–
0
votes
1
answer
110
NET 2011- Communication Noise
In a communication system, noise is most likely to affect the signal (A) at a transmitter (B) in a channel (C) in the information source (D) at the destination
In a communication system, noise is most likely to affect the signal(A) at a transmitter(B) in a channel(C) in the information source(D) at the destination
519
views
asked
Mar 14, 2017
Computer Networks
net
computer-networks
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
10
...
31
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register