Consider the following sequence of instructions :
10’s complement of (924)11 is ______
An example of a self complementing code is _____
The rule that a value of a foreign key must appear as a value of some specific table is called -
Output of the following program fragment is _____
A relation R is given as :
Determine weather R is
What cannot replace “?” in the following C code to print all odd numbers less than 100 for (i = 1; ? ; i = i + 2)
An equivalence relation has the following property :
What is the value of b after the execution of the following code statements?
c = 10;
b = ++c + ++c;
(P ⇒ ¬ P) ⇒ ¬ P is
In communication satellite, multiple represents are known as _______
Which of the following is central to the OSI model & its protocols?
In digital signature technique, the sender of the message uses _____ to create ciphertext.
Which of the following implements the three address code?
Recursive descent parsing is an example of _______
A Unix device driver is _____
RSA algorithm is a___________ cryptography.
Which memory management scheme permits the physical address space of a process to be non contiguous?
Any syntactic construct that can be describe d by a regular expression can also be described by a ______
An e- business that allows consumer to name their own price for products and services, is based on which e- business mode?
Which of the following I/O devices have a very high character density?
A _______ ensures that transactions executed automatically.
______ is a way by which a message send to upstream router to stop sending multicast message
The ______ defines the way of connecting or relating two or more entities together.
Match the following
Communication between application located on different devices :
When more than one attributes of a table are related with many attributes of one or more other tables.
A grammar for a programming language is a formal description of ______
The database administration function includes _______
Zero address instruction format is used for ______
The relational database environment has all of the following components except _______
In top down analysis and design
DTD definition is used along with XML to specify -
In linked list representation, a node contains at least ________
The OS of a computer may periodically collect all the free memory space to from contiguous block of free space. This is called _____
Which one is not a risk management activity?
A key difference between logic and the PROLOG representation is that the PROLOG interpreter has a ______
Software testing is ______
Which of the following is the less desirable property of the knowledge?
Software mistakes during coding are known as _____
________ can be viewed as a recursive produce
Which command is used to remove the read permission of the note from both the group and others?
A common type of error detecting code is called a ______
Which of the following is called forward error correction?
The _____ updates the probabilities every kbyte, which is tuned to speed up the process while hurting little the compression achieved.
Which of the following is true? (i) On average, neural networks have higher computational rates than conventional computers (ii) Neural networks learn by example (iii) Neural networks mimic the way the human brain works.
JPEG supports three types of selective refinement
The following context free grammar
generated strings of terminals that have .
What is the limit of data compression?
The data transmission between two sockets is organized by _______
Network programming is essentially a _______