acode is simply a subset of the vertices ofthe

a. n bit
b. ncube
c. n single
d. n double

1 Answer

Answer :

b. ncube

Related questions

Description : A vertex cover of an undirected graph G(V, E) is a subset V1 ⊆ V vertices such that (A) Each pair of vertices in V1 is connected by an edge (B) If (u, v) ∈ E then u ∈ V1 and v ∈ V1 (C) If (u, v) ∈ E then u ∈ V1 or v ∈ V1 (D) All pairs of vertices in V1 are not connected by an edge

Last Answer : (C) If (u, v) ∈ E then u ∈ V1 or v ∈ V1

Description : A ................. complete subgraph and a ................. subset of vertices of a graph G=(V,E) are a clique and a vertex cover respectively. (A) minimal, maximal (B) minimal, minimal (C) maximal, maximal (D) maximal, minimal

Last Answer : (D) maximal, minimal 

Description : Abinary number with 4 bitsiscalleda_ a. Bit b. Bytes ce. Nibble d. None of these

Last Answer : ce. Nibble

Description : Each device represent : a. 1 bit b. 2 bit c. 3 bit d. 4 bit

Last Answer : a. 1 bit

Description : AOinthesignbitrepresentsa sand. 1 in the sign bit represents a ee a. Positive number b. Negative number c. Both d. None of these

Last Answer : c. Both

Description : Which are the types of important ideas to notice about these odometer readings: a. The MSB is the sign bit .O for a +sign and 1 for a— sign b. The negative number represent the 2’s complement of the positive number c. Both d. __ Allof these

Last Answer : c. Both

Description : 3 bit binary numbers can be represented by a. Binary number b. Decimal number Cc. Hexadecimal number d. Octal number

Last Answer : d. Octal number

Description : Which number is formed from a binary number by grouping bits in groups of 4-bit each starting at the binary point: a. Binary b. Octal c. Decimal d. Hexadecimal

Last Answer : d. Hexadecimal

Description : The number of bit required to express and ___ are determined by the accuracy desired from the computing system . a. Exponent b. Mantissa ce. Both d. None f these

Last Answer : ce. Both

Description : How many bit of exponent: a. 4 b 6 Cc. 8 d. 10

Last Answer : b 6

Description : has the property that corrupting or garbling a code word will likely produce a bit string that is not a code word: a. Error deleting codes b. Error detecting codes c. Error string codes

Last Answer : b. Error detecting codes

Description : The bit positionina can be numbered from 1 through 2h, a. Hamming code word b. Hamming distance word c. Both d. None of these

Last Answer : a. Hamming code word

Description : Each check bit is grouped with the information bits as specified by a__ a. Parity check code b. Parity check matrix c. Parity check bit d. All of these

Last Answer : b. Parity check matrix

Description : Which is addressed by sign extending the 16-bit displacement to 32-bit: a. Memory address b. Effective memory address c. Both a and b d. None of these

Last Answer : b. Effective memory address

Description : Information is handled in the computer by _ __ a. Electrical digit b. Electrical component c. Electronic bit d. None of these

Last Answer : b. Electrical component

Description : Oand 1 are know as a. Byte b. Bit c. Digits d. Component

Last Answer : b. Bit

Description : A micro operation every bit of a register is a: a. Constant b. Variable c. Both d. None

Last Answer : b. Variable

Description : every bit of register has. a 2 common line b 3 common line c. 1 common line d none of these

Last Answer : c. 1 common line

Description : One last bit of control output is for control of___ state. a. Minor b. Major c. Mixer d. None of these

Last Answer : b. Major

Description : Which is data manipulation types are. a. Arithmetic instruction b. Shift instruction c. Logical and bit manipulation instructions d. All of these

Last Answer : d. All of these

Description : In which instruction are used to perform Boolean operation on non-numerical data: a. Logical and bit manipulation b. Shift manipulation c. Circular manipulation d. None of these

Last Answer : a. Logical and bit manipulation

Description : Which operation is used to shift the content of an operand to one or more bits to provide necessary variation: a. Logical and bit manipulation b. Shift manipulation c. Circular manipulation d. None of these

Last Answer : b. Shift manipulation

Description : In the case of a right arithmetic shift the sign bit values are shifted to the a. Left b. Right Cc. Up d. Down

Last Answer : a. Left

Description : A popular method knows as double-dabble method also knows as a. Divided-by-one method b. Divided-by-two method c. Both d. None of these

Last Answer : b. Divided-by-two method

Description : One way to convert from decimal to hexadecimalisthe a. Double dabble method b. Hex dabble method c. Binary dabble method d. __ Allof these

Last Answer : b. Hex dabble method

Description : Which method is used to detect double errors and pinpoint erroneous bits. a. Even parity method b. Odd parity method c. Check sum method. d. All of these

Last Answer : c. Check sum method.

Description : The standard ASCII A. is version II of ASC B. is used only in US and Canada C. has 132 characters including 32 control characters D. is subset of 8-bit EBCDIC code

Last Answer : C. has 132 characters including 32 control characters

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : Which are the not causes of the interrupt: a. In any single device b. In processor poll devices c. Itis an external analogy to exception d. None of these

Last Answer : c. Itis an external analogy to exception

Description : Which are the causes of the interrupt: a. In any single device b. In processor poll devices c. In a device whose ID number is stored on the address bus d. Allof these

Last Answer : d. Allof these

Description : SIMD stands for: a. System instruction multiple data b. Single instruction multiple data c. Symmetric instruction multiple data d. Scale instruction multiple data

Last Answer : b. Single instruction multiple data

Description : Which types of register holds a single vector containing at least two read ports and one write ports: a. Data system b. Data base Cc. Memory d. Vector register

Last Answer : d. Vector register

Description : Which processor has a single instruction multiple data stream organization that manipulates the common instruction by means of multiple functional units. a. Attached array processor b. SIMD array processor c. Both d. None

Last Answer : b. SIMD array processor

Description : Consider the following statements : `1.` `Nuu(BnnZ)=(NuuB)nnZ` for any subset `B` of `R`, where `N` is the set of positive integers, `Z` is the set of

Last Answer : Consider the following statements : `1.` `Nuu(BnnZ)=(NuuB)nnZ` for any subset `B` of `R`, where `N` is the ... Both `1` and `2` D. Neither `1` nor `2`

Description : With conventional hydrogen cooling it is possible to increase the rating of a single unit to (a) 50 MW (b) 100 MW (c) 200 MW (d) none ofthe above

Last Answer : (c) 200 MW

Description : A burst error means that two or more bits in the dataunit havechanged. A) double-bit B) burst C) single-bit D) none of the above

Last Answer : burst

Description : How do I show that a simple graph of size n >= 2 always has at least two vertices of the same degree?

Last Answer : Here's one idea... just use counting:

Description : How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components? (A) M+N-C (B) M-N-C (C) M-N+C (D) M+N+C

Last Answer : (C) M-N+C

Description : Cyclometric complexity of a flow graph G with n vertices and e edges is (A) V(G) = e+n-2 (B) V(G) = e-n+2 (C) V(G) = e+n+2 (D) V(G) = e-n-2

Last Answer : (B) V(G) = e-n+2

Description : A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have degree 1, how many vertices are there in the graph? (A) 5 (B) n – 3 (C) 20 (D) 11

Last Answer : (D) 11

Description : A tree with n vertices is called graceful, if its vertices can be labelled with integers 1, 2, ...,n such that the absolute value of the difference of the labels of adjacent vertices are all different. Which of the following trees are ... (B) (b) and (c) (C) (a) and (c) (D) (a), (b) and (c)

Last Answer : Answer: D

Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these

Last Answer : Mutex

Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes

Last Answer : . Critical sectio

Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section

Last Answer : . Critical section

Description : hich section is the remaining part of a process’s code: a. Racing section b. Critical section Cc. Entry section d. Reminder secti

Last Answer : b. Entry section

Description : Which are the characteristics of deadlocks. a. Mutual exclusion b. Hold and wait Cc. No pre-emption d. = Circular wait e. Allof these

Last Answer : e. Allof these

Description : How many events concerning RAG can occur in a system: a. 1 b 2 c. 3 d 4

Last Answer : c. 3

Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these

Last Answer : d. Allof these

Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4

Last Answer : c. 3