Skip to content

Category Archives: Quizzes

Consider a disk system with 100 cylinders. The requests to access the cylinders occur in the following sequence: 4,34,10,7,19,73,2,15,6,20 Assuming that the head is current… Read More
Suppose that a connected planar graph has six vertices, each of degrees four. Into how many regions is the plane divided by a planar representation… Read More
In the TCP/IP model, encryption and decryption are functions of ____ layer. (A) Datalink layer (B) Network layer (C) Transport layer (D) Application layer Answer:… Read More
Match List-I with List-II List-I                    List-II (a) Disk                … Read More
Consider the equation (146)​ b​ + (313)​ b-2​ = (246)​ 8​ . Which of the following is the value of b? (A) 8 (B) 7… Read More
How many different Boolean functions of degree n are there? (A) 22n (B) (2^2)^n (C) 2^2^n-1 (D) 2^n Answer: (A) Explanation: As we can see… Read More
Which type of addressing mode, less number of memory references are required? (A) Immediate (B) Implied (C) Register (D) Indexed (E) None of the above… Read More
Which data structure is used by the compiler for managing variables and their attributes? (A) Binary tree (B) Link lIst (C) Symbol table (D) Parse… Read More
A fuzzy conjunction operator denoted as t(x,y) and a fuzzy disjunction operator denoted as s(x, y) form a dual pair if they satisfy the condition:… Read More
Replacing the expression 4*2.14 by 8.56 is known as (A) Constant folding (B) Induction variable (C) Strength reduction (D) Code reduction Answer: (A) Explanation: Given… Read More
Consider the following methods: M​ 1 ​ : mean of maximum M​ 2​ : Centre of area M​ 3​ : Height method Which of the… Read More
Match List-I with List-II List-I                          List-II (a) p → q      … Read More
Which of the following is the principal conjunctive normal form for [(pVq) ∧ ~p → ~q]? (A) pV~q (B) pVq (C) ~pVq (D) ~pV~q Answer:… Read More
Software Reuse is (A) The process of analyzing software with the objective of recovering its design and specification. (B) The process of existing software artifacts… Read More
Which of the following key constraints is required for the functioning of the foreign keys in the context of a relational database? (A) Unique Key… Read More