2 answers
9
A. L2 is DCFLB. L2 is CFL but not DCFLC. L2 is not CFLD. None of these
1 answer
15
____________ uses pretty good privacy algorithm.Electronic mailsFile encryptionBoth Electronic mails and File encryptionNone of the options
1 answer
16
In ____________ $VMs$ do not simulate the underlying hardware.Para VirtualizationFull VirtualizationHardware-Assisted VirtualizationNetwork Virtualization
1 answer
17
___________ is a partitioning of single physical server into multiple logical servers.VirtualizationPrivate cloudHybrid cloudPublic cloud
1 answer
20
Which of the following techniques are used to control data flow?WindowingRouting$\text{RPCs}$Buffering $1,4$$2,3,4$$1,3,4$$1,2,3,4$
1 answer
22
The data node and name node in HADOOP areWorker Node and Master Node respectivelyMaster Node and Worker Node respectivelyBoth Worker NodesBoth Master Nodes
2 answers
24
$\sigma_{A=B \text{ and } B=C \text{ and } C=A} \bigg( \Pi_A (R) \times \Pi_B (R) \times \Pi_C (R) \bigg)$The number of rows returned by the above relational algebraic ex...
4 answers
25
In questions like, when asked to find the edges or nodes in the DAG of following expression,a=a+b*c-(a+b)+(b*c)do we also consider "=" as a node and its related edges?