External entities in DFD are shown by:- (A) Circle (B) Rectangle (C) Ellipse (D) Hexagon Answer: (B)Explanation:Quiz of this QuestionPlease comment below if you find… Read More

# Category Archives: Algorithms Quiz

What happens when a top-down approach of dynamic programming is applied to any problem? (A) It increases both, the time complexity and the space complexity… Read More

What is the other name of Dijkstra algorithm? (A) single-source shortest path problem (B) multiple-source shortest path problem (C) multiple-destination shortest path problem (D) single-destination… Read More

Consider a sorted array of n numbers and a number x. What would be the time complexity of the best known algorithm to find a… Read More

This topic contains basic questions of Algorithm which can be helpful for GATE CS Preparation. So, it is recommended to solve each of these questions… Read More

Consider the following code snippet for checking whether a number is power of 2 or not. /* Incorrect function to check if x is power… Read More

N = 496 – 2191 How many digits would be there if N is expressed in binary base. (A) 191 (B) 96 (C) 95 (D)… Read More

In how many ways a deck of 52 cards can be distributed among 4 people uniformly? (A) (52! / 48! * 4!)*4! (B) 52! /… Read More

Two fair dice are rolled. What is the probability that the sum of outcome is either 5 or 8? (A) 1/2 (B) 1/3 (C) 1/4… Read More

A and B can finish a work in 6 days, B and C can finish the same work in 8 days and A and C… Read More

How many zeros will be there at the end of product of 0!5! * 1!6! * 2! 7! * 3! 8! * 4!9! * 5!10!… Read More

The shell command find -name passwd -print is executed in /etc directory of a computer system running Unix. Which of the following shell commands will… Read More

The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network? (A) 172.57.88.62 and… Read More

Which of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5 (A)… Read More

Which one of the following is NOT desired in a good Software Requirement Specifications (SRS) document? (A) Functional Requirements (B) Non-Functional Requirements (C) Goals of… Read More