Description : Loop unrolling is a code optimization technique: (A) that avoids tests at every iteration of the loop (B) that improves performance by decreasing the number of instructions in a basic block. ... loops with outer loops (D) that reorders operations to allow multiple computations to happen in parallel.
Last Answer : (A) that avoids tests at every iteration of the loop
Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree
Last Answer : a. spanning tree
Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree
Last Answer : A. spanning tree
Description : One subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree
Description : following are structured programs written in simple structures. a Sequence b. Selection c. Iteration d. All of these
Last Answer : d. All of these
Description : The spiral model of software development (A) Ends with the delivery of the software product (B) Is more chaotic than the incremental model (C) Includes project risks evaluation during each iteration (D) All of the above
Last Answer : (C) Includes project risks evaluation during each iteration
Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above
Last Answer : databaseaccessplanning
Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL5
Description : Basic C programming question about while loops.
Last Answer : The logic falls out of the loop and continues on…
Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model
Last Answer : b. One layer may duplicate lower layer functionality
Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol
Last Answer : a. datagram congestion control protocol
Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model
Last Answer : Functionality at one layer no way requires information from another layer
Description : What are the types of structures in structured programming ?
Last Answer : There are 4 types of structure in structured programming.
Description : What is Structured Programming ?
Last Answer : Structured programming Structured programming is a subset of procedural programming that uses logical structures to facilitate programming. This is a top-down design model so that developers can split the entire ... statement is discouraged. Examples: Basic , Fortran , Koble , Pascal , C, etc.
Description : In Visual Basic .NET or Visual C# programming, when would you use Structured Query Language (SQL)? How are they executed?
Last Answer : ADO.NET handles most of the database communication for you behind-thescenes. You would only use SQL statements when generating ad-hoc queries for the database. You execute SQL statements by ... returning statements, such as DELETE, INSERT INTO, or UPDATE statements, use the ExecuteNonQuery method.
Description : _______is a structured programming language used for all purposes such as scientific application, commercial application, developing games etc. a) C b) C++ c) FORTRAN d) None of These
Last Answer : a) C
Description : Which of the following are not programming paradigms types: a) Object Oriented Programming b) Aspect Oriented Programming c) Session Oriented Programming d) Structured Programming e) None of These
Last Answer : c) Session Oriented Programming
Description : What is structured programming and why is it important?
Last Answer : Ans. Structured programming is a term which was coined in the late 1960's to mean programming without using go to statements, programming using only while loops and if statements as ... Structured programming means programs can be read sequentially and are therefore easier to understand and inspect.
Description : Design phase includes? data, architectural and procedural design only architectural, procedural and interface design only data, architectural and interface design only data, architectural, interface and procedural design
Last Answer : data, architectural, interface and procedural design
Description : Will the next iPhone be an iteration (5s) or evolution (6)?
Last Answer : Yup
Description : What is an indefinite iteration?
Last Answer : Need answer
Description : Traditional Work Breakdown Structures tend to a. focus on the design of the system as oppose to the needs of the current phase and iteration b. force too many levels of detail early on for large ... project and difficult to compare across projects d. all of the above e. none of the above
Last Answer : d. all of the above
Description : From where did the new fact inferred on new iteration is derived? a) Old fact b) Narrow fact c) New fact d) All of the mentioned
Last Answer : c) New fact
Description : Iteration also called: a. Repetition b. Straight c. Selection d. Sequence
Last Answer : a. Repetition
Description : In_ instructions are followed one after the other in the preset order in which they appear within program: a. Sequence b Selection c. Break d. Iteration
Last Answer : a. Sequence
Description : _is sequence of instructions is executed and repeated any no. of times in loop until logical condition is true: a. Iteration b. Repetition c Botha&b d. None of these
Last Answer : c Botha&b
Description : What is the difference between recursion and iteration?
Last Answer : A: Recursion is usually slower than iteration due to overhead of maintaining stack, whereas, Iteration does not use stack so it's faster than recursion. Recursion uses more memory than ... whereas, Iteration consume less memory. Recursion makes code smaller, whereas, Iteration makes code longer.
Description : Advantage of Gauss-Seidel method is a) applicable for large power system network b) calculation time for each iteration is less c) number of iterations are less d) all of the above
Last Answer : b) calculation time for each iteration is less
Description : At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any nonbasic variable Xj is obtained as zero, the solution under the test is (A) Degenerate solution (B) Unbounded solution (C) Alternative solution (D) Optimal solution
Last Answer : (C) Alternative solution
Description : Does the word "triage" have a "damage control" meaning, or is it really only about sequencing by severity?
Last Answer : I see triage as relevant in an emergency context - we have to triage the wounded soldiers to take care of the critically injured ones first . In other words, it is immediate and critical. Damage control ... . As in we have to do damage control after the CEO was arrested for raping his secretary .
Description : Instructions and memory address are represented by a. Character code b. Binary codes c. Binary word d. Parity bit
Last Answer : Binary codes
Description : In_______, the sequences aregenerated using orthogonal codes such the Walsh tables. A) FDMA B) TDMA C) CDMA D) none of the above
Last Answer : CDMA
Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above
Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above
Last Answer : Cyclic
Description : Codes consisting of lines of varying widths or lengths that arecomputer-readable are known as– (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E) None of these
Last Answer : a bar code
Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
Last Answer : cyclic redundancy codes
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : If 99% of the program is written in FORTRAN and the remaining 1% in assembly language, the percentage increase in the programming time compared to writing the entire program in FORTRAN and rewriting the 1% in assembly language is ? 10 5 13 8
Last Answer : 5
Description : DTP computer abbreviation usually means ? DeskTop Publishing Data Type Programming Digital Transmission Protocol None Of above
Last Answer : Data Type Programming
Description : The term IPv4 stands for? a. Internet Protocol Version 4 b. Internet Programming Version 4 c. International Programming Version 4 d. None of these
Last Answer : a. Internet Protocol Version 4
Description : Given a source code with 10 operators includes 6 unique operators, and 6 operand including 2 unique operands. The program volume is ? 48 120 720 insufficient data
Last Answer : 48
Description : A _________ digital signal includes timing informationin the data beingtransmitted. A) self-synchronizing B) self-modulated C) self-transmitted D) none of the above
Last Answer : self-synchronizing
Description : To make SONET backward-compatible with the current hierarchy, its framedesign includes asystem of. A) OCs B) STMs C) STSs D) VTs
Last Answer : VTs
Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above
Last Answer : noneof the above
Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields
Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field
Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link
Last Answer : B. physical, data link, network
Description : Match the following types of variables with the corresponding programming languages: (a) Static variables (i) Local variables in Pascal (b) Stack dynamic (ii) All variables in APL (c) Explicit heap dynamic (iii) Fortran 77 (d) Implicit ... (ii) (C) (iii) (i) (iv) (ii) (D) (ii) (i) (iii) (iv)
Last Answer : (C) (iii) (i) (iv) (ii)
Description : Which among the following includes the areas of Artificial Intelligence specialization: a) Games (Programming computers to play games against human opponents) b) Natural Languages (Programming computers to understand natural ... that occur in animal brains) d) All of the Above e) None of These
Last Answer : d) All of the Above
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way