Question 16 Two transactions T1 and T2 are given as T1: r1(X)w1(X)r1(Y)w1(Y) T2: r2(Y)w2(Y)r2(Z)w2(Z) where ri(V) denotes a read operation by transaction Ti on a variable […]
Question 30 Consider the following program that attempts to locate an element x in a sorted array a[] using binary search. Assume N>1. The program is […]
Question 29 K-mean clustering algorithm has clustered the given 8 observations into 3 clusters after 1st iteration as follows: C1 : {(3,3), (5,5), (7,7)} C2 : […]
Which of the following is asymptotically smaller? Correct Answer: A Question 367 Explanation: Option-A & B: lg(lg*n) is smaller than lg*(lgn). Because lg*(lg n) = lg*n-1. […]
Consider the file named ‘file 1’. In order to remove write permission to the owner and grant execute permission to others, which of the following UNIX […]
Question 5 Match the following typical example problems with suitable algorithm-design paradigms A: Minimal Spanning Tree B: Binary Search Algorithm C: Depth-First Search D: Optimization I: […]