Recent questions tagged nielit2016mar-scientistc

1.7k
views
1 answers
0 votes
The advantage of better testing in software development is in waterfall modelprototypingiterativeall of these
2.0k
views
6 answers
1 votes
The file manager is responsible fornaming filessaving filesdeleting filesall of these
2.5k
views
4 answers
3 votes
Every Boyce-Codd Normal Form (BCNF) decomposition isdependency preservingnot dependency preservingneed be dependency preservingnone of these
5.1k
views
2 answers
3 votes
A functional dependency of the form $x\to y$ is trivial if$y\subseteq x$y\subset x$x\subseteq y$x\subset y\:\text{and}\:y\subset x$
1.8k
views
5 answers
3 votes
A primary key, if combined with a foreign key createsparent child relationship between the tables that connect themmany-to-many relationship between the tables that connect themnetwork model between the tables that connect themnone of these
934
views
2 answers
0 votes
Memory mapped displaysare utilized for high resolution graphics such as mapsuses ordinary memory to store the display data in character formstores the display data as individual bitsare associated with electromechanical teleprinters
1.3k
views
4 answers
4 votes
In real-time operating systems, which of the following is the most suitable scheduling scheme?round-robinfirst-come-first-servedpreemptiverandom scheduling
1.4k
views
2 answers
3 votes
If there are $32$ segments, each of size $1$ K byte, then the logical address should have$13 \text{ bits}$14 \text{ bits}$15 \text{ bits}$16 \text{ bits}$
913
views
2 answers
0 votes
Which of the following can be accessed by transfer vector approach of linking?External data segmentsExternal subroutinesData located in other procedureAll of these
1.1k
views
2 answers
0 votes
Relocation bits used by relocating loader are specified byRelocating loader itselfLinkerAssemblerMacro processor
1.8k
views
1 answers
1 votes
The most powerful parser is$\text{SLR}$\text{LALR}$Canonical $\text{LR}$Operator-precedence
1.4k
views
1 answers
1 votes
$\text{YACC}$ builds up$\text{SLR}$ parsing tableCanonical $\text{LR}$ parsing table$\text{LALR}$ parsing tableNone of these
6.3k
views
6 answers
0 votes
Context-free grammar can be recognized by finite state automation$2$- way linear bounded automatapush down automataboth (B) and (C)
1.7k
views
1 answers
1 votes
If every string of a language can be determined, whether it is legal or illegal in finite time, the language is calleddecidableundecidableinterpretivenon-deterministic
734
views
1 answers
0 votes
The defining language for developing a formalism in which language definitions can be stated, is calledsyntactic meta languagedecidable languageintermediate languagehigh level language
943
views
1 answers
2 votes
If $f:\{a,b\}^{\ast}\rightarrow \{a,b\}^{\ast }$ be given by $f(n)=ax$ for every value of $n\in \{a,b\}$, then $f$ isone to one not ontoone to one and ontonot one to one and not ontonot one to one and onto
871
views
3 answers
1 votes
Regular expression $(a \mid b)(a \mid b)$ denotes the set$\{a,b,ab,aa\}$\{a,b,ba,bb\}$\{a,b\}$\{aa,ab,ba,bb\}$
1.1k
views
3 answers
1 votes
Two alternative package $A$ and $B$ are available for processing a database having $10^{k}$ records. Package $A$ requires $0.0001 n^{2}$ time units and package $B$ ... $ for which package $B$ will be preferred over $A$?$12$10$6$5$
1.3k
views
4 answers
0 votes
When a subroutine is called, then address of the instruction following the CAL instruction is stored in/on theStack pointerAccumulatorProgram counterStack
640
views
1 answers
1 votes
Start and stop bits are used in serial communication for error detectionerror correctionsynchronizationslowing down the communication
839
views
2 answers
0 votes
Repeaters function inPhysical layerData link layerNetwork layerBoth (A) and (B)
664
views
1 answers
1 votes
What are the primary characteristics that distinguish a cell from a packet?cells are generally smaller that packetscells do not incorporate physical addressall cells have the same fixed lengthpacket cannot be switched
1.9k
views
2 answers
0 votes
The graph theoretic concept will be useful in software testing is Cyclomatic numberHamiltonian circuitEulerian cycleNone of these
629
views
2 answers
0 votes
In testing phase, the effort distribution is upto$10\%$20\%$40\%$50\%$
828
views
2 answers
1 votes
Which of the following is FALSE?$Read\ \wedge as\ AND, \vee\ as\ OR, \sim as\ NOT, \rightarrow$ as one way implication and $\leftrightarrow$ ... rightarrow (x\vee y))$((x\vee y)\leftrightarrow (\sim x\vee \sim y))$
1.1k
views
2 answers
1 votes
The seek time of a disk is $30$ ms. It rotates at the rate of $30$ rotations/second. The capacity of each track is $300$ words. The access time is (approximately)$62$ ms$60$ ms$50$ ms$47$ ms
837
views
1 answers
0 votes
The process of entering data into a storage locationcauses variation in its address numberadds to the contents of the locationis called a readout operationis destructive of previous contents
504
views
1 answers
0 votes
Serial access memories are useful in applications wheredata consists of numbersshort access time is requiredeach stored word is processed differentlydata naturally needs to flow in and out in serial form
1.3k
views
1 answers
4 votes
An external variableis globally accessible by all functionshas a declaration “extern” associated with it when declared within a functionwill be initialized to $0$ if not initializedall of these
1.1k
views
2 answers
2 votes
A hash table with $10$ buckets with one slot per bucket is depicted. The symbols, $S1$ to $S7$ are initially emerged using a hashing function with linear probing. ... $5$4$3$