<<= Back
Next =>>
You Are On Question Answer Bank SET 290
14501. What is the default port number of DNS?
Answer: 53
14502. DAT is an acronym for:
Answer: Digital Audio Tape.
14503. In a rule-based system, procedural domain knowledge is in the form of :
Answer: Production Rules.
14504. An AI technique that allows computers to understand associations and relationships between objects and events is called:
Answer: Pattern matching.
14505. Command used in SQL to remove an index from the database:
Answer: DROP INDEX.
14506. The process of cleaning junk data is called:
Answer: Data purging.
14507. URL stands for:
Answer: Uniform Resource Locator.
14508. Context Free Grammar is also called:
Answer: Type 2 grammar.
14509. Recursive languages can be recognized using:
Answer: Turing Machine.
14510. In which part of Compiler, the concept of FSA is used?
Answer: Lexical analysis.
14511. Languages that can be recognized by FSA is called:
Answer: Regular languages.
14512. Languages of Type 1 grammars can be recognized using:
Answer: Linear Bounded Automata.
14513. If the start symbol S of a given CFG G is useless, then L(G) is :
Answer: Empty.
14514. Decimal equivalent of the signed binary number 11110101 in 1’s complement form is :
Answer: -10
14515. Minimum number of AND gates required to implement the Boolean expression:ABC’ +AB’C +A’BC is
Answer: Ans: 2.
14516. Looping on a K-map always results in the elimination of :
Answer: Variables within the loop that appear in both complemented and uncomplemented form.
14517. In Boolean algebra, x+xy =x is called:
Answer: Absorption Law.
14518. A document preparation software:
Answer: LATEX.
14519. A technique in which system resources are shared among multiple users:
Answer: Multiplexing.
14520. Interaction modelling cannot be done using:
Answer: State Diagrams.
14521. The number of bits that can be transmitted over a network in a certain period of time.
Answer: Bandwidth.
14522. A network topology that combines features of linear bus and star topology?
Answer: Tree.
14523. If language L={0,1}, then the reversed language LR =
Answer: (0, 1}
14524. In Linux, the subdirectory that contains system configuration files including user passwords:
Answer: /etc.
14525. SQL command to delete a column from an existing table:
Answer: Alter table.
14526. A technique not associated with data mining:
Answer: Dimensionality Modelling.
14527. Memory bank experiencing too much contention from processor:
Answer: Thrash.
14528. T he number of nodes in a complete binary tree of height n:
Answer: 2 n+1 -1
14529. The science and art of breaking ciphers:
Answer: Steganography.
14530. A raster scan display system with 24 bits per pixel and a screen resolution of 1024x 1024 requires a frame buffer of size:
Answer: 3 Mega bytes.
14531. Process of mapping a network interface IP address to its hardware address:
Answer: ARP
14532. Data abstractions means:
Answer: Putting together essential feature without including background details.
14533. A hardware interface that allows for the connection of several peripheral devices to a single PCI board:
Answer: SCSI
14534. If n represents the dimension of cube and k, the radix(no. of nodes along each dimensions. then the number of nodes N of a K-ary n –cube network is :
Answer: N=kn
14535. A famous technique used in data ware housing:
Answer: OLAP.
14536. The environment variable in Linux , that contain a list of directories the shell automatically recognizes:
Answer: $ PATH.
14537. In C++ , a pointer that is automatically being passed to a member function during its invocation is :
Answer: this pointer.
14538. With QBE, inserting records from one or more source tables into a single target table can be achieved by :
Answer: Append action query.
14539. When a process is accessing shared modifiable data , the process is said to be in:
Answer: Critical section.
14540. The first MPI function call made by every MPI Process is the call to :
Answer: MPI _ Init ( ..
14541. Boundary value analysis is a method for :
Answer: Black box testing.
14542. Dijkstra’s Banker’s algorithm is used for :
Answer: Deadlock Avoidance.
14543. (P v q.≡ p q a famous law in logic known as :
Answer: De morgans’ law.
14544. The language accepted by a push down automata:
Answer: Type 2.
14545. In parallel algorithm design, the process of grouping tasks into larger tasks in order to improve performance :
Answer: Agglomeration.
14546. A system call in Linux operating system to create a new child process, which is a copy of the parent process:
Answer: Fork.
14547. The type of geometric transformation applied to an object for repositioning it along a straight line path from one location to another:
Answer: Translation.
14548. Vignere cipher is a kind of:
Answer: Poly alphabetic cipher.
14549. Recursive Descent parsers are a type of :
Answer: L L parsers.
14550. In a compiler the task of scanning the source code, to recognize and classify various elements is known as:
Answer: Lexical Analysis.
<<= Back
Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions