<<= Back Next =>>
You Are On Question Answer Bank SET 290

14501. What is the default port number of DNS?

Answer: 53

14502. DAT is an acronym for:

Answer: Digital Audio Tape.

14503. In a rule-based system, procedural domain knowledge is in the form of :

Answer: Production Rules.

14504. An AI technique that allows computers to understand associations and relationships between objects and events is called:

Answer: Pattern matching.

14505. Command used in SQL to remove an index from the database:

Answer: DROP INDEX.

14506. The process of cleaning junk data is called:

Answer: Data purging.

14507. URL stands for:

Answer: Uniform Resource Locator.

14508. Context Free Grammar is also called:

Answer: Type 2 grammar.

14509. Recursive languages can be recognized using:

Answer: Turing Machine.

14510. In which part of Compiler, the concept of FSA is used?

Answer: Lexical analysis.

14511. Languages that can be recognized by FSA is called:

Answer: Regular languages.

14512. Languages of Type 1 grammars can be recognized using:

Answer: Linear Bounded Automata.

14513. If the start symbol S of a given CFG G is useless, then L(G) is :

Answer: Empty.

14514. Decimal equivalent of the signed binary number 11110101 in 1’s complement form is :

Answer: -10

14515. Minimum number of AND gates required to implement the Boolean expression:ABC’ +AB’C +A’BC is

Answer: Ans: 2.

14516. Looping on a K-map always results in the elimination of :

Answer: Variables within the loop that appear in both complemented and uncomplemented form.

14517. In Boolean algebra, x+xy =x is called:

Answer: Absorption Law.

14518. A document preparation software:

Answer: LATEX.

14519. A technique in which system resources are shared among multiple users:

Answer: Multiplexing.

14520. Interaction modelling cannot be done using:

Answer: State Diagrams.

14521. The number of bits that can be transmitted over a network in a certain period of time.

Answer: Bandwidth.

14522. A network topology that combines features of linear bus and star topology?

Answer: Tree.

14523. If language L={0,1}, then the reversed language LR =

Answer: (0, 1}

14524. In Linux, the subdirectory that contains system configuration files including user passwords:

Answer: /etc.

14525. SQL command to delete a column from an existing table:

Answer: Alter table.

14526. A technique not associated with data mining:

Answer: Dimensionality Modelling.

14527. Memory bank experiencing too much contention from processor:

Answer: Thrash.

14528. T he number of nodes in a complete binary tree of height n:

Answer: 2 n+1 -1

14529. The science and art of breaking ciphers:

Answer: Steganography.

14530. A raster scan display system with 24 bits per pixel and a screen resolution of 1024x 1024 requires a frame buffer of size:

Answer: 3 Mega bytes.

14531. Process of mapping a network interface IP address to its hardware address:

Answer: ARP

14532. Data abstractions means:

Answer: Putting together essential feature without including background details.

14533. A hardware interface that allows for the connection of several peripheral devices to a single PCI board:

Answer: SCSI

14534. If n represents the dimension of cube and k, the radix(no. of nodes along each dimensions. then the number of nodes N of a K-ary n –cube network is :

Answer: N=kn

14535. A famous technique used in data ware housing:

Answer: OLAP.

14536. The environment variable in Linux , that contain a list of directories the shell automatically recognizes:

Answer: $ PATH.

14537. In C++ , a pointer that is automatically being passed to a member function during its invocation is :

Answer: this pointer.

14538. With QBE, inserting records from one or more source tables into a single target table can be achieved by :

Answer: Append action query.

14539. When a process is accessing shared modifiable data , the process is said to be in:

Answer: Critical section.

14540. The first MPI function call made by every MPI Process is the call to :

Answer: MPI _ Init ( ..

14541. Boundary value analysis is a method for :

Answer: Black box testing.

14542. Dijkstra’s Banker’s algorithm is used for :

Answer: Deadlock Avoidance.

14543. (P v q.≡ p q a famous law in logic known as :

Answer: De morgans’ law.

14544. The language accepted by a push down automata:

Answer: Type 2.

14545. In parallel algorithm design, the process of grouping tasks into larger tasks in order to improve performance :

Answer: Agglomeration.

14546. A system call in Linux operating system to create a new child process, which is a copy of the parent process:

Answer: Fork.

14547. The type of geometric transformation applied to an object for repositioning it along a straight line path from one location to another:

Answer: Translation.

14548. Vignere cipher is a kind of:

Answer: Poly alphabetic cipher.

14549. Recursive Descent parsers are a type of :

Answer: L L parsers.

14550. In a compiler the task of scanning the source code, to recognize and classify various elements is known as:

Answer: Lexical Analysis.
<<= Back Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions