Explanation
speaks about itself
Correct Answered :
Wrong Answered :
A
will speak to itself
B
speaks for itself
C
has been speaking
D
speaks about itself
speaks about itself
Correct Answered :
Wrong Answered :
A
Influx
B
Home coming 30
C
Return
D
Restoration
Exodus means a mass departure of people. So, the opposite of the word will be influx. Influx means arrival or entry of people in large numbers.
Correct Answered :
Wrong Answered :
A style in which a writer makes a display of his knowledge.
A
Pendantic
B
Verbose
C
Pompous
D
Ornate
A
Comfort : Stimulant
B
Grief : Consolation
C
Trance : Narcotic
D
Ache : Extraction
Grief : Consolation
Correct Answered :
Wrong Answered :
A
19/9 days
B
27 days
C
28/9 days
D
25/8 days
A
20 years
B
25 years
C
30 years
D
35 years
A
50 sec
B
80 sec
C
190 sec
D
240 sec
A
BGYEPYK
B
BGYPYEK
C
GLPEYKB
D
LKBGYPK
A
a + b = 1
B
a - b = 1
C
a = b
D
a2 + b2 = 1
a + b = 1
Correct Answered :
Wrong Answered :
A
1
B
-1
C
2
D
-1
Given: One root of 2x2 + kx – 6 = 0 is 2
Then At x = 2, the equation will be satisfied.
2 (2)2 + k × 2 – 6 = 0
8 + 2 k – 6 = 0
2 k + 2 = 0
K = –1
So now the equation becomes 2x2 + 2x – 6 = 0
For this equation, Product of the roots = (–6/2)
Product of roots = – 3
Let a and b be the roots of the equation and it is given that a = 2
2 × b = –3
B = –3/2
Hence the value of k = –1 and other root is –3/2.
Correct Answered :
Wrong Answered :
A
b = a + c
B
2b = a + c
C
b2 = a + c
D
2b2 = a + c
Correct Answered :
Wrong Answered :
A
250
B
350
C
450
D
550
If repetition of the digits is allowed, then the number of even natural numbers having three digits is 450.
Correct Answered :
Wrong Answered :
A
Radius = 5, Center = (2, 3)
B
Radius = 5, Center = (3, 2)
C
Radius = 1, Center = (2, 3)
D
Radius = 1, Center = (3, 2)
Correct Answered :
Wrong Answered :
A
1
B
2
C
3
D
4
A
y = tanx + c
B
y = tan(x + c)
C
tan-1(y + c) = x
D
tan-1(y + c) = 2x
A
35 m
B
140 m
C
60.6 m
D
20.2 m
When sun`s altitude changes from 30° to 60°, the length of the shadow of a tower decreases by 70 m.
∴ The height of the tower is 60.6 m.
Correct Answered :
Wrong Answered :
A
1/2
B
2
C
4/2
D
5/2
A
1/4
B
1/8
C
1/16
D
1/2
A
√μ
B
µ2
C
µ
D
1/µ
A
Mean is more than mode
B
Mean is less than mode
C
Median is at right to the mode
D
Mean is at right to Median
Correct Answered :
Wrong Answered :
A
5e³ˣ + cos x
B
15e³ˣ + cos x
C
15e³ˣ - cos x
D
5e³ˣ + sin x
y = 5e3x + sin(x)
First, to find the derivative, dydx of an exponential function, we use this general form:
aenx = a* dydx(nx)enx = a*nenx
dydx of sin(x) = cos(x)
Applying this to the question we have:
dydx = 5* dydx(3x)e3x + cos(x)
And,
dydx(3x) = 3
Therefore,
dydx = 15e3x + cos(x)
Correct Answered :
Wrong Answered :
A
3
B
1/3
C
2
D
1/2
A
John Von Neumann
B
Charles Babbage
C
Blaise Pascal
D
Garden Moore
The von Neumann
architecture — also known as the von Neumann model or Princeton
architecture — is a computer architecture based on a 1945 description by
John von Neumann, and by others, in the First Draft of a Report on the EDVAC.
Correct Answered :
Wrong Answered :
A
755110
B
877110
C
555710
D
778110
= 1*163 + 13*162 + 7*161 + 15*160 = 4076 + 3328 + 112 + 15 = 7551
Correct Answered :
Wrong Answered :
A
1000
B
1024
C
4096
D
8196
Kilobytes (KB) | Bytes (B) decimal | Bytes (B) binary |
---|---|---|
4 KB | 4000 Bytes | 4096 Bytes |
5 KB | 5000 Bytes | 5120 Bytes |
6 KB | 6000 Bytes | 6144 Bytes |
7 KB | 7000 Bytes | 7168 Bytes |
Correct Answered :
Wrong Answered :
A
Logical address
B
Physical address
C
Actual address
D
Simple address
Correct Answered :
Wrong Answered :
A
Absolute mode
B
Indirect mode
C
Immediate mode
D
Index mode
Base indexed mode : The effective address of the operand is generated by adding a constant value to the content of a register.
Correct Answered :
Wrong Answered :
A
A + 0 = 0
B
A + 1 = 1
C
A + A = A.A
D
A + A.B = A + B
A + A.B = A + B
Correct Answered :
Wrong Answered :
A
Miss ratio
B
Latency ratio
C
Read ratio
D
Hit ratio
The performance of cache memory is frequently measured in terms of a quantity called Hit ratio.
Correct Answered :
Wrong Answered :
A
^
B
==
C
.
D
!
Correct Answered :
Wrong Answered :
A
Virtual functions are functions that can be overridden in derived class with the same signature.
B
Virtual functions enable run-time polymorphism in a inheritance hierarchy.
C
If a function is virtual in the base class, the most-derived class implementation of the function is called according to the actual type of the object referred to, regardless of the declared type of the pointer or reference. In non-virtual functions, the functions are called according to the type of reference or pointer.
D
All of these
All of these
Correct Answered :
Wrong Answered :
A
1
B
2
C
3
D
4
Correct Answered :
Wrong Answered :
A
Int
B
Do datatype
C
Depends upon the type of the variable to which it is pointing
D
Unsigned int
Unsigned int
Correct Answered :
Wrong Answered :
A
Database Schema
B
Database Instance
C
Database Snapshot
D
All of the above
Database Instance
Correct Answered :
Wrong Answered :
A
A domain constraint
B
A range constraint
C
An intra relation constraint
D
An inter relation constraint
A domain constraint
Correct Answered :
Wrong Answered :
T1 : R(X) T1 : W(X) T2 : R(X) T2 : W(X)
This is called ______Problem
A
Dirty Read
B
Lost update
C
Incorrect summary
D
Unrepeatable Read
A
Non repeatable read
B
Phantom read
C
Dirty read
D
Consistent read
A
Stack
B
Priority Queue
C
Output restricted queue
D
Input restricted queue
Input restricted queue
Correct Answered :
Wrong Answered :
A
Stack
B
Graph
C
List
D
None of these
A
Backtracking
B
Greedy Algorithm
C
Divide and Conquer
D
Dynamic Programming
Divide and Conquer
Correct Answered :
Wrong Answered :
A
Binary Search Tree
B
Binary Tree
C
Completely Balanced Tree
D
Heap
In a Max. Binary Heap, the key value at each node is as least as large
as the values at its children. Similarly in Min Binary Heap, the key at
root must be minimum among all keys present in Binary Heap.
Correct Answered :
Wrong Answered :
A
Library
B
System calls
C
Assembly instructions
D
API
To access services of the Operating System an interface is provided by the System Calls.
Correct Answered :
Wrong Answered :
A
Each thread is allocated with new memory from main memory
B
Main thread terminates after the termination of child threads
C
Every process can have only one thread
D
None of the above
Main thread terminates after the termination of child threads
Correct Answered :
Wrong Answered :
A
Process Blocking
B
Context Switch
C
Time Sharing
D
None of above
Context Switch
Correct Answered :
Wrong Answered :
A
They are in different memory spaces.
B
They are in different logical addresses
C
They have a protection algorithm
D
Every address generated by the CPU is being checked against the relocation and limit registers.
Every address generated by the CPU is being checked against the relocation and limit registers.
Correct Answered :
Wrong Answered :
A
O(n)
B
O(nlogn)
C
O(n2)
D
O(logn)
Given a set of non negative integers, and a value K, determine if there is a subset of the given set with sum equal to K?
A
Divide and Conquer
B
Dynamic Programming
C
Greedy Algorithm
D
Brand and Bound
“Subset sum
problem”: Given a set of non-negative integers, and a value sum,
determine if there is a subset of the given set with sum equal to given
sum(K). Dynamic Programming paradigm can be used to find the solution of the problem in minimum time.
Correct Answered :
Wrong Answered :
A
Set
B
List
C
Stack
D
Queue
BFS performs level-order traversal which can be fairly done using a queue.
Correct Answered :
Wrong Answered :
A
O(N)
B
O(LOGN)
C
O(NLOGN)
D
O(N2)
The time complexity of the binary search algorithm is O(log n). The best-case time complexity would be O(1)
when the central index would directly match the desired value. Binary
search worst case differs from that. The worst-case scenario could be
the values at either extremity of the list or values not in the list.
Correct Answered :
Wrong Answered :
A
Type 0
B
Type 1
C
Type 2
D
Type 3
Type 3 grammars are
generated by regular languages. These languages are exactly all those
languages that can be accepted by finite state automata. Type 3 is the
most restricted grammar.
Correct Answered :
Wrong Answered :
A
16
B
26
C
32
D
64
Number of DFA’s = 2n * n(2*n).
Correct Answered :
Wrong Answered :
A
Context free language is the subset of context sensitive language
B
Regular language is the subset of context sensitive language
C
Recursively enumerable language is the super set of regular language
D
Context sensitive language is a subset of context free language
Context sensitive language is a subset of context free language
Correct Answered :
Wrong Answered :
A
Push down Automata
B
Turing machine
C
NDFA
D
All of the mentioned
A
Packet switching
B
Circuit switching
C
Line switching
D
Frequency switching
Correct Answered :
Wrong Answered :
A
Datalink
B
Network
C
Transport
D
Application
Bridge works at Data link layer.
Correct Answered :
Wrong Answered :
A
MA
B
CSMA
C
FDMA
D
CDMA
A
routing
B
inter networking
C
congestion control
D
error control
in the osi model, network layer is the third layer and it provides data
routing paths for network communications. error control is a function of
the data link layer and the transport layer.
Correct Answered :
Wrong Answered :