Description : Weighted voting of correction vectors is a technique of A : Recursive filtering B : Filtering C : Laandmark D : Pose estimation
Last Answer : A : Recursive filtering
Description : Weighted voting of correction vectors is a technique of A : Recursive filtering B : FilteringC : Laandmark D : Pose estimation
Description : Convergense of the estimates is a technique of A : Recursive filtering B : Filtering C : Laandmark D : Pose estimation
Description : Adaptive localization at multiple scales is a technique of A : Recursive filtering B : Filtering C : Laandmark D : Pose estimation
Description : Classification of data points is a technique of A : Recursive filtering B : Filtering C : Laandmark D : Pose estimation
Description : Which recursive sorting technique always makes recursive calls to sort subarrays that are about half size of the original array?
Last Answer : Mergesort always makes recursive calls to sort subarrays that are about half size of the original array, resulting in O(n log n) time.
Description : The device shown in the illustration is a/an ____________. EL-0083 A. noise filtering choke B. autotransformer C. fluorescent light ballast D. power factor correction inductor
Last Answer : Answer: B
Description : Postal voting is otherwise called – (1) plural voting (2) proxy voting (3) weighted voting (4) sceret voting
Last Answer : (2) proxy voting Explanation: Postal voting describes the method of voting in an election whereby ballot papers are distributed or returned by post to electors. in contrast to electors voting ... of the People Act 1945 again made temporary provision for postal voting by service voters.
Description : Triagulation is a technique associate with A : Pose B : Landmarks classes C : Robot D : Odometry
Last Answer : A : Pose
Description : Heuristics estimation technique depends on A. educated guess B. prior experience C. Common sense D. All of the above
Last Answer : D. All of the above
Description : Which of the following serves as project estimation technique? A. Empirical estimation B. Heuristic technique C. Analytical estimation D. All of the above
Description : Which technique is applicable when other projects in the same analogy application domain have been completed? a) Algorithmic cost modelling b) Expert judgement c) Estimation by analogy d) Parkinson’s Law
Last Answer : c) Estimation by analogy
Description : What is backup? 1) Adding more components to your network 2) Protecting data by copying it from the original source to a different destination 3) Filtering old data from the new data 4) Accessing data on tape 5) None of these
Last Answer : Answer :2
Description : Which of the following devices is specially designed to forward packets to specific ports based on the packet's address? 1) Specialty hub 2) Switching hub 3) Port hub 4) Filtering hub
Last Answer : 2) Switching hub
Description : A packet filtering firewall operates at which of the following OSI layer? 1) At the Application layer 2) At the Transport Layer 3) At the Network Layer 4) Both 2 and 3
Last Answer : 4) Both 2 and 3
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall
Last Answer : 2) Packet Filtering Firewall
Description : Which of the following devices is specially designed to forward packets to specific ports based on the packet's address? 1 Specialty hub 2 Switching hub 3 Port hub 4 Filtering hub
Last Answer : 2 Switching hub
Description : A packet filtering firewall operates at which of the following OSI layer? 1 At the Application layer 2 At the Transport Layer 3 At the Network Layer 4 Both 2 and 3
Last Answer : 4 Both 2 and 3
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall
Last Answer : 2 Packet Filtering Firewall
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above
Last Answer : D) All of the above
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : CRAR stands for _________ A. Capital to Risk-Weighted Assets Ratio B. Capital to Risk Assets Ratio C. Credit Rating-Weighted Assets Ratio D. Credit Rating Assets Ratio
Last Answer : A. Capital to Risk-Weighted Assets Ratio Explanation: The Capital Adequacy Ratio (CAR) or Capital-to-Risk weighted Assets Ratio (CRAR) is a measure of a bank s capital. It is ... It is used to protect depositors and promote the stability and efficiency of financial systems around the world.
Description : IFC is a non-banking finance company with Capital to Risk (Weighted) Assets Ratio (CRAR) of _____ A. 15% B. 20% C. 25% D. 30% E. None of the Above
Last Answer : A. 15% Explanation: IFC is a non-banking finance company with Capital to Risk (Weighted) Assets Ratio (CRAR) of 15%.
Description : Which of the following is not a weighted code? (1) Excess 3-Code (2) Binary Number System (3) Decimal Number System (4) BCD Number System
Last Answer : Excess 3-Code
Description : Visual servoing associate with A : Robot pose B : Robot action C : Robot position D : Robat path
Last Answer : A : Robot pose
Description : Active or inactive can be category of A : Localization B : Landmarks classes C : pose evalution D : Robot
Last Answer : B : Landmarks classes
Description : Imge based servoing associate with A : Robot pose B : Robot action C : Robot position D : Robat path
Description : Sensor based servoing associate with A : Robot pose B : Robot action C : Robot position D : Robat path
Description : Natural or artificial can be category of A : Localization B : Landmarks classes C : Pose evalution D : Robot
Description : Active or inactive can be category of A : Localization B : Landmarks classesC : pose evalution D : Robot