# Category Archives: DSA Quiz

External entities in DFD are shown by:- (A) Ellipse (B) Rectangle (C) Circle (D) Hexagon Answer: (B)Explanation:Quiz of this QuestionPlease comment below if you find… Read More
What happens when a top-down approach of dynamic programming is applied to any problem? (A) It increases both, the time complexity and the space complexity… Read More
What is the other name of Dijkstra algorithm? (A) single-source shortest path problem (B) multiple-source shortest path problem (C) multiple-destination shortest path problem (D) single-destination… Read More
Consider a sorted array of n numbers and a number x. What would be the time complexity of the best known algorithm to find a… Read More
This topic contains basic questions of Algorithm which can be helpful for GATE CS Preparation. So, it is recommended to solve each of these questions… Read More
Consider the following code snippet for checking whether a number is power of 2 or not. /* Incorrect function to check if x is power… Read More
N = 496 – 2191 How many digits would be there if N is expressed in binary base. (A) 191 (B) 96 (C) 95 (D)… Read More
In how many ways a deck of 52 cards can be distributed among 4 people uniformly? (A) (52! / 48! * 4!)*4! (B) 52! /… Read More
Two fair dice are rolled. What is the probability that the sum of outcome is either 5 or 8? (A) 1/2 (B) 1/3 (C) 1/4… Read More
A and B can finish a work in 6 days, B and C can finish the same work in 8 days and A and C… Read More
How many zeros will be there at the end of product of 0!5! * 1!6! * 2! 7! * 3! 8! * 4!9! * 5!10!… Read More
The shell command find -name passwd -print is executed in /etc directory of a computer system running Unix. Which of the following shell commands will… Read More
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network? (A) 172.57.88.62 and… Read More
Which of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5 (A)… Read More
Which one of the following is NOT desired in a good Software Requirement Specifications (SRS) document? (A) Functional Requirements (B) Non-Functional Requirements (C) Goals of… Read More