Question 22 Consider the following statements about heap sort algorithm A.The MAX-HEAPIFY procedure which runs in O lg(n) time, is the key to maintaining the max […]
Question 383 What is the appropriate pairing items in the two columns listing various activities encountered in a software life cycle? A P-3, Q-2,R-4,S-1 B […]
Kadane algorithm is used to find Correct Answer: B Question 39 Explanation: Kadane algorithm is used to find the maximum sum subarray in an array. It […]
A system has n resources R0,..,Rn-1 and k processes P0,..Pk-1. The implementation of the resources request logic of each process P i is a follows: if(i%2==0) […]
In a ripple counter using edge triggered JK flip-flops, the pulse input is applied to the Correct Answer: B Question 4 Explanation: In a ripple counter […]
In comparison with static RAM memory, the dynamic RAM memory has Correct Answer: B Question 29 Explanation: Dynamic memory uses capacitor for storing information, so it […]
Which one is a connectionless transport-layer protocol that belongs to the Internet protocol family? Correct Answer: B A Transmission Control Protocol (TCP) B User Datagram Protocol […]
Question 20 Given below are two statements Statement I: Breadth-First Search is optimal when all the step costs are equal whereas uniform-cost search is optimal with […]
Question 25 Consider the following 3 processes with the length of the CPU burst time given in milliseconds: What is the average waiting time for these […]