Description : A vertex cover of an undirected graph G(V, E) is a subset V1 ⊆ V vertices such that (A) Each pair of vertices in V1 is connected by an edge (B) If (u, v) ∈ E then u ∈ V1 and v ∈ V1 (C) If (u, v) ∈ E then u ∈ V1 or v ∈ V1 (D) All pairs of vertices in V1 are not connected by an edge
Last Answer : (C) If (u, v) ∈ E then u ∈ V1 or v ∈ V1
Description : A ................. complete subgraph and a ................. subset of vertices of a graph G=(V,E) are a clique and a vertex cover respectively. (A) minimal, maximal (B) minimal, minimal (C) maximal, maximal (D) maximal, minimal
Last Answer : (D) maximal, minimal
Description : Abinary number with 4 bitsiscalleda_ a. Bit b. Bytes ce. Nibble d. None of these
Last Answer : ce. Nibble
Description : Each device represent : a. 1 bit b. 2 bit c. 3 bit d. 4 bit
Last Answer : a. 1 bit
Description : AOinthesignbitrepresentsa sand. 1 in the sign bit represents a ee a. Positive number b. Negative number c. Both d. None of these
Last Answer : c. Both
Description : Which are the types of important ideas to notice about these odometer readings: a. The MSB is the sign bit .O for a +sign and 1 for a— sign b. The negative number represent the 2’s complement of the positive number c. Both d. __ Allof these
Description : 3 bit binary numbers can be represented by a. Binary number b. Decimal number Cc. Hexadecimal number d. Octal number
Last Answer : d. Octal number
Description : Which number is formed from a binary number by grouping bits in groups of 4-bit each starting at the binary point: a. Binary b. Octal c. Decimal d. Hexadecimal
Last Answer : d. Hexadecimal
Description : The number of bit required to express and ___ are determined by the accuracy desired from the computing system . a. Exponent b. Mantissa ce. Both d. None f these
Last Answer : ce. Both
Description : How many bit of exponent: a. 4 b 6 Cc. 8 d. 10
Last Answer : b 6
Description : has the property that corrupting or garbling a code word will likely produce a bit string that is not a code word: a. Error deleting codes b. Error detecting codes c. Error string codes
Last Answer : b. Error detecting codes
Description : Areceived sith a bit error will be closer to the originally transmitted code word than to any other code word: a. Code word b. Noncode word c. Decoding d. All of these
Last Answer : b. Noncode word
Description : The bit positionina can be numbered from 1 through 2h, a. Hamming code word b. Hamming distance word c. Both d. None of these
Last Answer : a. Hamming code word
Description : Each check bit is grouped with the information bits as specified by a__ a. Parity check code b. Parity check matrix c. Parity check bit d. All of these
Last Answer : b. Parity check matrix
Description : Which is addressed by sign extending the 16-bit displacement to 32-bit: a. Memory address b. Effective memory address c. Both a and b d. None of these
Last Answer : b. Effective memory address
Description : Information is handled in the computer by _ __ a. Electrical digit b. Electrical component c. Electronic bit d. None of these
Last Answer : b. Electrical component
Description : Oand 1 are know as a. Byte b. Bit c. Digits d. Component
Last Answer : b. Bit
Description : A micro operation every bit of a register is a: a. Constant b. Variable c. Both d. None
Last Answer : b. Variable
Description : every bit of register has. a 2 common line b 3 common line c. 1 common line d none of these
Last Answer : c. 1 common line
Description : One last bit of control output is for control of___ state. a. Minor b. Major c. Mixer d. None of these
Last Answer : b. Major
Description : Which is data manipulation types are. a. Arithmetic instruction b. Shift instruction c. Logical and bit manipulation instructions d. All of these
Last Answer : d. All of these
Description : In which instruction are used to perform Boolean operation on non-numerical data: a. Logical and bit manipulation b. Shift manipulation c. Circular manipulation d. None of these
Last Answer : a. Logical and bit manipulation
Description : Which operation is used to shift the content of an operand to one or more bits to provide necessary variation: a. Logical and bit manipulation b. Shift manipulation c. Circular manipulation d. None of these
Last Answer : b. Shift manipulation
Description : In the case of a right arithmetic shift the sign bit values are shifted to the a. Left b. Right Cc. Up d. Down
Last Answer : a. Left
Description : A popular method knows as double-dabble method also knows as a. Divided-by-one method b. Divided-by-two method c. Both d. None of these
Last Answer : b. Divided-by-two method
Description : One way to convert from decimal to hexadecimalisthe a. Double dabble method b. Hex dabble method c. Binary dabble method d. __ Allof these
Last Answer : b. Hex dabble method
Description : Which method is used to detect double errors and pinpoint erroneous bits. a. Even parity method b. Odd parity method c. Check sum method. d. All of these
Last Answer : c. Check sum method.
Description : The standard ASCII A. is version II of ASC B. is used only in US and Canada C. has 132 characters including 32 control characters D. is subset of 8-bit EBCDIC code
Last Answer : C. has 132 characters including 32 control characters
Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : Which are the not causes of the interrupt: a. In any single device b. In processor poll devices c. Itis an external analogy to exception d. None of these
Last Answer : c. Itis an external analogy to exception
Description : Which are the causes of the interrupt: a. In any single device b. In processor poll devices c. In a device whose ID number is stored on the address bus d. Allof these
Last Answer : d. Allof these
Description : SIMD stands for: a. System instruction multiple data b. Single instruction multiple data c. Symmetric instruction multiple data d. Scale instruction multiple data
Last Answer : b. Single instruction multiple data
Description : Which types of register holds a single vector containing at least two read ports and one write ports: a. Data system b. Data base Cc. Memory d. Vector register
Last Answer : d. Vector register
Description : Which processor has a single instruction multiple data stream organization that manipulates the common instruction by means of multiple functional units. a. Attached array processor b. SIMD array processor c. Both d. None
Last Answer : b. SIMD array processor
Description : Consider the following statements : `1.` `Nuu(BnnZ)=(NuuB)nnZ` for any subset `B` of `R`, where `N` is the set of positive integers, `Z` is the set of
Last Answer : Consider the following statements : `1.` `Nuu(BnnZ)=(NuuB)nnZ` for any subset `B` of `R`, where `N` is the ... Both `1` and `2` D. Neither `1` nor `2`
Description : With conventional hydrogen cooling it is possible to increase the rating of a single unit to (a) 50 MW (b) 100 MW (c) 200 MW (d) none ofthe above
Last Answer : (c) 200 MW
Description : A burst error means that two or more bits in the dataunit havechanged. A) double-bit B) burst C) single-bit D) none of the above
Last Answer : burst
Description : How do I show that a simple graph of size n >= 2 always has at least two vertices of the same degree?
Last Answer : Here's one idea... just use counting:
Description : How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components? (A) M+N-C (B) M-N-C (C) M-N+C (D) M+N+C
Last Answer : (C) M-N+C
Description : Cyclometric complexity of a flow graph G with n vertices and e edges is (A) V(G) = e+n-2 (B) V(G) = e-n+2 (C) V(G) = e+n+2 (D) V(G) = e-n-2
Last Answer : (B) V(G) = e-n+2
Description : A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have degree 1, how many vertices are there in the graph? (A) 5 (B) n – 3 (C) 20 (D) 11
Last Answer : (D) 11
Description : A tree with n vertices is called graceful, if its vertices can be labelled with integers 1, 2, ...,n such that the absolute value of the difference of the labels of adjacent vertices are all different. Which of the following trees are ... (B) (b) and (c) (C) (a) and (c) (D) (a), (b) and (c)
Last Answer : Answer: D
Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these
Last Answer : Mutex
Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes
Last Answer : . Critical sectio
Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section
Last Answer : . Critical section
Description : hich section is the remaining part of a process’s code: a. Racing section b. Critical section Cc. Entry section d. Reminder secti
Last Answer : b. Entry section
Description : Which are the characteristics of deadlocks. a. Mutual exclusion b. Hold and wait Cc. No pre-emption d. = Circular wait e. Allof these
Last Answer : e. Allof these
Description : How many events concerning RAG can occur in a system: a. 1 b 2 c. 3 d 4
Last Answer : c. 3
Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these
Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4