Strassen algorithm was publishedin

a 1967
b. 1969
c. 1987
d. 1980

1 Answer

Answer :

b. 1969

Related questions

Description : Which algorithm is named after Volker Strassen: a. Strassen algorithm b. = Matrix algorithm c. Both d. None of these

Last Answer : a. Strassen algorithm

Description : Which algorithm is used for matrix multiplication: a. Simple algorithm b. Specific algorithm c. Strassen algorithm d. Addition algorithm

Last Answer : c. Strassen algorithm

Description : Which algorithm is a divided and conquer algorithm that is asymptotically faster: a. Simple algorithm b. Specific algorithm c. Strassen algorithm d. Addition algorithm

Last Answer : c. Strassen algorithm

Description : In which year was the Indian Space Research Organisation (ISRO) founded? (1) 1967 (2) 1969 (3) 1970 (4) 1974

Last Answer : 1969

Description : National Housing Bank(NHB) was set up under ___________ A. National Housing Bank Act, 1987 B. National Housing Bank Act, 1977 C. National Housing Bank Act, 1967 D. National Housing Bank Act, 1957 E. None of the Above

Last Answer : A. National Housing Bank Act, 1987 Explanation: NHB was set up on 9 July 1988 under the National Housing Bank Act, 1987.

Description : The Association of Southeast Asian Nations(ASEAN) was established: (a) 8 August 1967 (b) 8 August 1977 (c) 8 August 1987 (d) None of these

Last Answer : (a) 8 August 1967

Description : The first Kshetriya Gramin Bank (KGB) was opened in India is— (A) 1972 (B) 1980 (C) 1975 (D) 1969

Last Answer : (C) 1975

Description : 'Twenty Point Programme" was launched in the year?\ (A) 1969 (B) 1975 (C) 1977 (D) 1980

Last Answer : (D) 1980

Description : 'Twenty Point Programme" was launched in the year? A. 1969 B. 1975 C. 1977 D. 1980 E. None of these

Last Answer : D. 1980

Description : Which is an algorithm or techniques used to multiply two numbers. a. Addition algorithm b. Subtraction algorithm c. Multiplication algorithm d. __ Allof these

Last Answer : c. Multiplication algorithm

Description : Which algorithm are used depending on the size of the numbers: a. Simple algorithm b. Specific algorithm c. Both d. None of these

Last Answer : b. Specific algorithm

Description : Which algorithm includes repeated addition of two predetermined values A and S to a product P and then performs a rightward arithmetic shift on P. a. Booth’s algorithm b. Usual algorithm c. Multiplication algorithm d. None of these

Last Answer : a. Booth’s algorithm

Description : Which algorithm is used to find GCD of two integers. a. Multiplication algorithm b. Division algorithm c. Addition algorithm d. Simple algorithm

Last Answer : b. Division algorithm

Description : Which algorithm is used as a general variant of a theorems, in the domain of integral numbers: a. Multiplication algorithm c. Addition algorithm d. Simple algorithm

Last Answer : c. Addition algorithm

Description : How many main approaches to algorithm for division: a 2 b 3 Cc. 4 d 5

Last Answer : a 2

Description : How many algorithm based on add/subtract and shift category: a. 2 b 64 ec. 8 d 6

Last Answer : ec. 8

Description : Which are the algorithm based on add/subtract and shift category: a. Restoring division b. Non-restoring division c. SRT division d. Allofthese

Last Answer : d. Allofthese

Description : ___uses various symbols to represent function within program and is __ _representation: a. Flowchart, pictorial b. Algorithm, pictorial c. Pictorial, flowchart d. None of these

Last Answer : a. Flowchart, pictorial

Description : Avoid crossing flow lines. a. Flowchart b. Algorithm c. Botha &b d. None of these

Last Answer : a. Flowchart

Description : is useful to prepare detailed program documentation: a. Flowchart b. Algorithm c. Botha &b d. None of these

Last Answer : a. Flowchart

Description : in which year was UK’s premier computing event started? A) 1980 B) 1985 C) 1986 D) 1987

Last Answer : Answer : A

Description : in which year was UK’s premier computing event called ‚The which computer‛ started? a. 1980 b. 1985 c. 1986 d. 1987

Last Answer : 1980

Description : in which year was UK’s premier computing event called “The which computer” started? a. 1980 b. 1985 c. 1986 d. 1987

Last Answer : a. 1980

Description : Release of Bromoxynil resistant cotton a).1980 b).1999 c).1995 d).1987

Last Answer : c).1995

Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these

Last Answer : Mutex

Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes

Last Answer : . Critical sectio

Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section

Last Answer : . Critical section

Description : hich section is the remaining part of a process’s code: a. Racing section b. Critical section Cc. Entry section d. Reminder secti

Last Answer : b. Entry section

Description : Which are the characteristics of deadlocks. a. Mutual exclusion b. Hold and wait Cc. No pre-emption d. = Circular wait e. Allof these

Last Answer : e. Allof these

Description : How many events concerning RAG can occur in a system: a. 1 b 2 c. 3 d 4

Last Answer : c. 3

Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these

Last Answer : d. Allof these

Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4

Last Answer : c. 3

Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these

Last Answer : d. Allof these

Description : How many condition that should be met in order to produce a deadlock. a. 2 b 4 Cc. 6 d 8

Last Answer : b 4

Description : Which are the condition that should be met in order to produce a deadlock. a. Mutual exclusion b. Hold and Wait Cc. No preemption d. Circular wait e. Allofthese

Last Answer : e. Allofthese

Description : In protocol each process can make a request onlyinan a. Increasing order b. Decreasing order c. Botha &b d. None of these

Last Answer : a. Increasing order

Description : Which state refers to a state that is not safe not necessarily a deadlocked state. a. Safe state b. Unsafe state c. Botha &b d. None of these

Last Answer : b. Unsafe state

Description : a direct arrow is drawn from the process to the resource rectangle to represent each pending resource request: a. TS b. SP Cc. CCR d. RAG

Last Answer : d. RAG

Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these

Last Answer : h. Allof these

Description : The various file operation are: a. Crating a file b. Writing a file c. Reading a file d. Repositioning within a file e. Deleting a file truncating a file f. All of these

Last Answer : f. All of these

Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these

Last Answer : g. Allof these

Description : Which memory is assembled between main memory and CPU: a. Primary memory b. Cache memory Cc. Botha & b d. None of these

Last Answer : b. Cache memory

Description : Which is one of the important I/O devices and is most commonly used as permanent storage device in any processor: a. Soft disk b. Hard disk c. Botha &b d. None of these

Last Answer : b. Hard disk

Description : can read any printed character by comparing the pattern that is stored in the computer: a. SP b. CCR Cc. RAG d. OCR

Last Answer : d. OCR

Description : Which system is a typical example of the readers and writers problem: a. Airline reservation system b. Airport reservation system c. Both d. None of these

Last Answer : a. Airline reservation system

Description : Which lock can arise when two processes wait for phone calls from one another. a. Spine lock b. Dead lock c. Both d. None of these

Last Answer : b. Dead lock

Description : Which lock is more serious than indefinite postponement or starvation because it affect more than one job: a. Deadlock b. Spinelock c. Both d. None of these

Last Answer : a. Deadlock

Description : Anumber system that uses only two digits, O and 1 is calledthe_ a. Octal number system b. Binary number system c. Decimal number system d. Hexadecimal number system

Last Answer : b. Binary number system

Description : In which computers, the binary number are represented by a set of binary storage device such as flip flop: a. Microcomputer b. Personal computer c. Digital computer

Last Answer : c. Digital computer

Description : Abinary number canbeconvertedinto a. Binary number b. Octal number co. Decimal number d. Hexadecimal number

Last Answer : co. Decimal number