What is the process of defining more than one method in a class differentiated by method signature?
The data structure required for Breadth-First Traversal on a graph is?
A queue follows __________
Find out maximum capacity of the channel (in Mbps) in an Ethernet LAN with frame size 1000 bits. Consider signal speed in the cable is 20,000 km/s and length of the cable is 2km
The access methods for Wireless LANs (IEEE 802.11) and Ethernet LAN(IEEE802 .3) respectively
Let f and g be the function from the set of integers to itself, defined by f(x) = 2x + 1 and g(x) = 3x + 4 . Then the composition of f and g is ____________
A function is said to be ______________ if and only if f(a) = f(b) implies that a = b for all a and b in the domain of f.
Concatenation Operation refers to which of the following set operations?
The total number of substrings present in “GATE” is?
The pushdown automata consist of a _____.
Consider the following problems: A) If A is a recursive language, then A’ is also recursive B) If A is a regular language, then A’ is also regular C) If A is a recursive enumerable language, then A’ is also recursive enumerable D) If A is context-free, then A’ is also context-free Which one of the above problems is decidable?
Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called?
Consider a single level paging scheme. The virtual address space is 128 TB and page size is 32 MB. What is the number of pages in process?
Scheduling is done so as to ____________
CREATE TABLE employee (name VARCHAR, id INTEGER)
What type of statement is this?
Which SQL keyword is used to retrieve a maximum value?
Consider the following schedules due to three transactions (indicated by the subscript) using read and write on a data item x, denoted by r(x) and w(x) respectively. Which one of them is conflict serializable?
A single transaction failure leads to a series of transaction rollbacks is called as:
Given a hash table T with 25slots that stores2000elements, the load factor α for T is____________.
Load the keys 23, 13, 21, 14, 7, 8, and 15 in this order, in a hash table of size 7 using quadratic probing with c(i) = ±i2 the hash function h(key) = key % 7. [Note: The required probe sequences are given by:
hi (key) = (h(key) ±i2)%7, i = 0, 1, 2, 3 … n
How many collisions can occur in the hash table?
Calculate the standard deviation of the sum of the numbers obtained in tossing a pair of unbiased dice.
Table below shows the variable x and its probability mass function p(x) value for different ‘x’. What is the mean of x ?
Which hazard occurs when instruction J tries to write data before instruction, I reads it.
Pipelining improves CPU performance due to the?
Which of the following determines a high hit rate of the cache memory?
Grammar that produces more than one Parse tree for the same sentence is:
How many derivation trees are there for string aaa given grammar G? S→aS | Sa | a
The decimal number 31 is represented in its BCD form as __________
The advantage of 2’s complement system is that _________