Este test está cronometrado.
Tienes 3 horas para completar 150 preguntas de este test.
Given a binary tree whose inorder and preorder traversal are given by Inorder : EICFBGDJHK Preorder : BCEIFDGHJK The post order traversal of the above binary tree is
IEFCGJKHDB
IEFCJGKHDB
IEFCGKJHDB
IEFCGJKDBH
An all-pairs shortest-paths problem is efficiently solved using
Dijkstra' algorithm
Bellman-Ford algorithm
Kruskal Algorithm
Floyd-Warshall algorithm
Consider the Breshenham’s circle generation algorithm for plotting a circle with centre (0,0) and radius ‘r’ units in first quadrant. If the current point is (x1,y1) and decision parameter is pi then what will be the next point (xi+1,yi+1) and updated decision parameter pi+1 for pi ≥ 0
xi+1 = xi + 1 yi+1 = yi pi+1 = pi + 4xi + 6
xi+1 = xi + 1 yi+1 = yi - 1 pi+1 = pi + 4(xi - yi) + 10
xi+1 = xi yi+1 = yi - 1 pi+1 = pi + 4(xi - yi) + 6
xi+1 = xi - 1 yi+1 = yi pi+1 = pi + 4xi + 10
A point P(5,1) is rotated by 900 about a pivot point (2,2). What is the coordinate of new transformed point P’ ?
(3,5)
(5,3)
(2,4)
(1,5)
Consider a triangle A(0, 0), B(1, 1), C(5, 2). The triangle has to be rotated by an angle of 450 about the point P(-1, -1). What shall be the coordinates of the new triangle?
A'=(1, √2-1), B'=(-1, 2√2-1), C'=(3√2-1, (9/2)√2-1)
A'=(1, √2-1), B'=(2√2-1, -1), C'=(3√2-1, (9/2)√2-1)
A'=(-1, √2-1), B'=(-1, 2√2-1), C'=(3√2-1, (9/2)√2-1)
A'=(√2-1, -1), B'=(-1, 2√2-1), C'=(3√2-1, (9/2)√2-1)
Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-hand corner at (-5,1) and upper right-hand corner at (3,7). Consider the following three lines for clipping with the given end point co-ordinates: Line AB: A(-6,2) and B(-1,8) Line CD: C(-1,5) and D(4,8) Line EF: E(-2,3) and F(1,2) Which of the following line(s) is/are candidate for clipping?
AB
CD
EF
AB and CD
The Boolean expression x' y' z + y z + x z is equivalent to
x
y
z
x+y+z
Match the following: (a) Huffman codes (i) O(n2) (b) Optimal polygon triangulation (ii) θ(n3) (c) Activity selection problem (iii) O(nlgn) (d) Quicksort (iv) θ(n) Codes: (a) (b) (c) (d)
(i) (ii) (iv) (iii)
(i) (iv) (ii) (iii)
(iii) (ii) (iv) (i)
(iii) (iv) (ii) (i)
Which of the following is asymptotically smaller?
lg(lg*n)
lg*(lg n)
lg(n!)
lg*(n!)
Suppose that we have numbers between 1 and 1000 in a binary search tree and want to search for the number 364. Which of the following sequences could not be the sequence of nodes examined?
925, 221, 912, 245, 899, 259, 363, 364
3, 400, 388, 220, 267, 383, 382, 279, 364
926, 203, 912, 241, 913, 246, 364
3, 253, 402, 399, 331, 345, 398, 364
Which of the following statement is correct?
Aggregation is a strong type of association between two classes with full ownership.
Aggregation is a strong type of association between two classes with partial ownership.
Aggregation is a weak type of association between two classes with partial ownership.
Aggregation is a weak type of association between two classes with full ownership.
When one object reference variable is assigned to another object reference variable then
a copy of the object is created.
a copy of the reference is created.
a copy of the reference is not created.
it is illegal to assign one object reference variable to another object reference variable.
Software safety is quality assurance activity that focuses on hazards that
affect the reliability of a software component
may cause an entire system to fail.
may result from user input errors.
prevent profitable marketing of the final product
Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing order of maturity?
Initial, Defined, Repeatable, Managed, Optimized.
Initial, Repeatable, Defined, Managed, Optimized.
Initial, Defined, Managed, Repeatable, Optimized.
Initial, Repeatable, Managed, Defined, Optimized.
Which design metric is used to measure the compactness of the program in terms of lines of code?
Consistency
Conciseness
Efficiency
Accuracy
What is resolution of 4k UHD
480*720
720*1020
1024*768
4096*2160
What are the two main types of access control lists (ACLs)? 1. Standard 2. IEEE 3. Extended 4. Specialized
1 and 3
2 and 4
3 and 4
1 and 2
What is the name of the views that allow to organize the position of the graphical components on the active screen in Android?
frames
containers
layouts
grids
Which of the following services use TCP? 1. DHCP 2. SMTP 3. HTTP 4. TFTP 5. FTP
2, 3 and 5
1, 2 and 4
1, 3 and 4
What is the default subnet mask for a class C network?
127.0.0.1
255.0.0.0
255.255.0.0
255.255.255.0
None of the above
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
FTP
SNMP
SMTP
RPC
What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
192
192.168
192.168.10
51
Which WAN encapsulations can be configured on an asynchronous serial connection? 1. PPP 2. ATM 3. HDLC 4. SDLC 5. Frame Relay
3, 4 and 5
All of the above
Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? 1. Switch 2. NIC 3. Hub 4. Repeater 5. RJ45 transceiver
1 only
5 only
Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____.
3, 3, 1, 7
3, 2, 1, none
3, 2, 1, 7
3, 3, 2, none
A Process Control Block(PCB) does not contain which of the following
Program Counter
Process State
I/O status information
bootstrap program
With round robin scheduling algorithm in a time shared system,
using very large time slices converts it into First come First served scheduling algorithm
using very small time slices converts it into First come First served scheduling algorithm
using extremely small time slices increases performance
using very small time slices converts it into Shortest Job First algorithm
The following three conditions must be satisfied to solve the critical section problem : (choose three)
Aging
Mutual Exclusion
Deadlock
Progress
Bounded Waiting
Each request requires that the system consider the __________, _____________, ____________ to decide whether the current request can be satisfied or must wait to avoid a future possible deadlock. (choose three)
resources currently available
processes that have previously been in the system
resources currently allocated to each process
future requests and releases of each process
The main memory accommodates : (choose two)
operating system
CPU
user processes
All of these
Linux uses a time-sharing algorithm
to pair preemptive scheduling between multiple processes
for tasks where absolute priorities are more important than fairness
both (a) and (b)
none of the mentioned
In CRC there is no error if the remainder at the receiver is _____.
equal to the remainder at the sender
zero
nonzero
the quotient at the sender
What is Pending Intent in android?
It is a kind of an intent
It is used to pass the data between activities
It will fire at a future point of time.
None of the Above
Which one of the following statements is NOT correct about HTTP cookies?
A cookie is a piece of code that has the potential to compromise the security of an internet user
A cookie gains entry to the user‟s work area through an HTTP header
A cookie has an expiry date and time
Cookies can be used to track the browsing pattern of a user at a particular site
The minimum number of JK flip-flops required to construct a synchronous counter with the count sequence (0,0, 1, 1, 2, 2, 3, 3, 0, 0,.......) is ___________.
1
2
3
4
8
Consider six memory partitions of sizes 200 KB, 400 KB, 600 KB, 500 KB, 300 KB and 250 KB, where KB refers to kilobyte. These partitions need to be allotted to four processes of sizes 357 KB, 210KB, 468 KB and 491 KB in that order. If the best fit algorithm is used, which partitions are NOT allotted to any process?
200KB and 300 KB
200KB and 250 KB
250KB and 300 KB
300KB and 400 KB
How many address lines are needed to address each memory location in a 2048 x 4 memory chip?
10
11
16
Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web server. 3. The web server sends the requested webpage using HTTP. 4. The web browser resolves the domain name using DNS.
4,2,1,3
1,2,3,4
4,1,2,3
2,4,1,3
Assume that there are 3 page frames which are initially empty. If the page reference string 1, 2, 3, 4, 2, 1, 5, 3, 2, 4, 6, the number of page faults using the optimal replacement policy is ___________
5
6
7
Mnemonic a memory trick is used in which of the following language?
Machine language
Assembly language
High level language
None of above
The smallest integer than can be represented by an 8-bit number in 2’s complement form is
- 256
- 127
- 128
0
A process executes the code fork (); fork (); fork (); The total number of child processes created is -------------.
Which of the following provides access to the uploaded file in the temporary directory on the web server?
$_FILES['file']['tmp_name']
$_FILES['file']['name']
$_FILES['file']['size']
$_FILES['file']['type']
An instruction cycle is made up of
One or more execute cycle
One or more fetch cycles
One opcode and one execute cycle
One fetch cycle and one or more execute cycle
Which of the following method can be used to create a MySql database using PHP?
mysql_connect()
mysql_query()
mysql_close()
When determining the efficiency of algorithm, the space factor is measured by
Counting the maximum memory needed by the algorithm
Counting the minimum memory needed by the algorithm
Counting the average memory needed by the algorithm
Counting the maximum disk space needed by the algorithm
Which of the following is not a valid rule for XOR
0 XOR 0 =0
1 XOR 1 = 1
1 XOR 0 = 1
B XOR B = 0
Linked lists are best suited
for relatively permanent collections of data
for the size of the structure and the data in the structure are constantly changing
for both of above situation
for none of above situation
In linear search algorithm the Worst case occurs when
The item is somewhere in the middle of the array
The item is not in the array at all
The item is the last element in the array
The item is the last element in the array or is not there at all
For an algorithm the complexity of the average case is
Much more complicated to analyze than that of worst case
Much more simpler to analyze than that of worst case
Sometimes more complicated and some other times simpler than that of worst case
None or above
Which of the following data structure is linear data structure?
Trees
Graphs
Arrays
The elements of an array are stored successively in memory cells because
by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated
the architecture of computer memory does not allow arrays to store other than serially
both of above
none of above
Which of the following data structure is not linear data structure?
Linked lists
Both of above
The Average case occur in linear search algorithm
When Item is somewhere in the middle of the array
When Item is not in the array at all
When Item is the last element in the array
When Item is the last element in the array or is not there at all
Which of the following case does not exist in complexity theory
Best case
Worst case
Average case
Null case
The operation of processing each element in the list is known as
Sorting
Merging
Inserting
Traversal
Arrays are best data structures
A disk drive has 100 cyclinders, numbered 0 to 99. Disk requests come to the disk driver for cyclinders 12, 26, 24, 4, 42, 8 and 50 in that order. The driver is currently serving a request at cyclinder 24. A seek takes 6 msec per cyclinder move. How much seek time is needed for shortest seek time first (SSTF) algorithm ?
0.984 sec
0.396 sec
0.738 sec
0.42 sec
<SCRIPT> … </SCRIPT> tag can be placed within
head
body
both head and body
none of the above
Which of the following is NOT an example of a client-side operation in web page rendering?
A database lookup for a customer name.
A format check for a phone number field input.
The detection of which web browser is being used.
Writing a cookie.
An alert popup.
Which of the following is valid declaration for array?
1. char [] startsWith []; 2. int [] Score; 3. char [8] dist; 4. School students[]; 5. School students[5];
1, 2, 4
2, 4, 5
2, 3, 4
All are correct.
In this Below which of the following statement is suitable to start the thread? class ABC implements Runnable { Public static void main(String args[]) { /**** Some Code is Missing Here *****/ } public void run() {} }
Thread t = new Thread(ABC);
Thread t = new Thread(ABC); t.start();
ABC run = new ABC(); Thread t = new Thread(run); t.start();
Thread t = new Thread(); t.run();
Which of the following sentences is FALSE:
In a magnetic disk, a sector is a group of clusters
In a magnetic disk, a cluster is a group of sectors
In a magnetic disk, the same magnetic head reads and writes the data
A magnetic disk is slower than a SSD
Select the INCORRECT sentence:
RAM contents are lost in the event of a power failure
RAM memory stores both programs and data
Cache memory is faster than standard RAM memory
RAM memory and ROM memory are interchangeable, as they can do the same functions
CMOS memory has a low power consumption
Which Of the following are true regarding Java.lang.ArrayList ?
Elements in the ArrayList is Ordered.
Collections are gaurentee to Immutable
Elements in Collections are unique.
Elements in the Collections are acessed using Unique value
public class A implements Runnable { public static void main(String args[]) { //Some Code is missig here } public void run() {} } From the below which of the following statement is suitable to replace that code missig Comment?
Thread x = new Thread(A);
Thread x = new Thread(A); x.start();
A run = new A(); Thread t = new Thread(run); x.start();
Thread x = new Thread(); x.run();
What will be the content of array variable table after executing the following code? for(int i = 0; i < 3; i + +) for(int j = 0; j < 3; j + +) if(j = i) table[i][j] =1; else table[i][j] = 0;
0 0 0 0 0 0 0 0 0.
1 0 0 1 1 0 1 1 1.
1 0 0 0 1 0 0 0 1.
0 0 1 0 1 0 1 0 0.
What is Expected Output Of the Following Program Class A{ public static void main(String args[]){ int i = l, j = 6; while (j--) { i++; } System.out.println("x = " + x +" y = " + y); } }
i = 6 j = 0
i = 7 j = 0
i = 6 j = -1
Compile Error
Match the following : (a) Disk scheduling 1. Round-robin (b) Batch processing 2. SCAN (c) Time sharing 3. LIFO (d) Interrupt processing 4. FIFO
(a) (b) (c) (d) 3 4 2 1
(a) (b) (c) (d) 4 3 2 1
(a) (b) (c) (d) 2 4 1 3
(a) (b) (c) (d) 1 4 3 2
consider the 3 processes, P1, P2 and P3 shown in the table
Process Arrival time Time unit required P1 0 5 P2 1 7 P3 3 4 The completion order of the 3 processes under the policies FCFS and RRS (round robin scheduling with CPU quantum of 2 time units) are
FCFS: P1, P2, P3 RR2: P1, P2, P3
FCFS: P1, P3, P2 RR2: P1, P3, P2
FCFS: P1, P2, P3 RR2: P1, P3, P2
FCFS: P1, P3, P2 RR2: P1, P2, P3
Consider the virtual page reference string 1, 2, 3, 2, 4, 1, 3, 2, 4, 1 On a demand paged virtual memory system running on a computer system that main memory size of 3 pages frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number of page faults under the corresponding page replacements policy. Then
OPTIMAL < LRU < FIFO
OPTIMAL < FIFO < LRU
OPTIMAL = LRU
OPTIMAL = FIFO
In the architecture of a database system external level is the
physical level.
logical level.
conceptual level
view level.
The sum of products expansion for the function F(x, y, z) = (x + y)z’ is given as
x’y’z + xyz’ + x’yz’
xyz + xyz’ + xy’z’
xy’z’ + x’y’z’ + xyz’
xyz’ + xy’z’ + x’yz’
The property / properties of a database is / are :
It is an integrated collection of logically related records
It consolidates separate files into a common pool of data records.
Data stored in a database is independent of the application programs using it.
Which one of the following statements is false?
The data dictionary is normally maintained by the database administrator.
Data elements in the database can be modified by changing the data dictionary.
The data dictionary contains the name and description of each data element.
The data dictionary is a tool used exclusively by the database administrator.
Transaction processing is associated with everything below except
producing detail, summary, or exception reports
recording a business activity.
confirming an action or triggering a response.
maintaining data.
SET concept is used in :
Network Model
Hierarchical Model
Relational Model
None of these
The file organization that provides very fast access to any arbitrary record of a file is
Ordered file
Unordered file
Hashed file
B-tree
Which of the following operation is used if we are interested in only certain columns of a table?
PROJECTION
SELECTION
UNION
JOIN
Using Relational Algebra the query that finds customers, who have a balance of over 1000 is
PCustomer_name(s balance >1000(Deposit))
s Customer_name(Pbalance >1000(Deposit))
PCustomer_name(s balance >1000(Borrow))
s Customer_name(Pbalance >1000(Borrow))
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,then the maximum size of join is:
mn
m+n
(m+n)/2
2(m+n)
What is Manifest.xml in android?
It has information about layout in an application
It has the information about activities in an application
It has all the information about an application
What is the life cycle of broadcast receivers in android?
send intent()
onRecieve()
implicitBroadcast()
sendBroadcast(), sendOrderBroadcast(), and sendStickyBroadcast().
Which of the following method is suitable when you need to send larger form submissions?
Get
Post
Both Get and Post
There is no direct way for larger form. You need to store them in a file and retrieve
Is it mandatory to call onCreate() and onStart() in android?
No, we can write the program without writing onCreate() and onStart()
Yes, we should call onCreate() and onStart() to write the program
At least we need to call onCreate() once
The difference between include() and require() in PHP
are different how they handle failure
both are same in every aspects
is include() produced a Fatal Error while require results in a Warning
Which of the following is not true?
PHP can be used to develop web applications.
PHP makes a website dynamic.
PHP applications can not be compiled.
PHP can not be embedded into html.
Any type of modification on the parameter inside the function will reflect in actual variable value can be related to
call by value
call by reference
Which of the following is NOT a valid deadlock prevention scheme?
Release all resources before requesting a new resource
Number the resources uniquely and never request a lower numbered resource than the last one requested
Never request a resource after releasing any resource
Request and all required resources be allocated before execution.
UML meaning is
Unique modeling language
Unified modeling language
Unified modern language
Unified master language
In Python, What is the output when following code is executed ? str1="helloworld" str1[ : : -1]
dlrowolleh
hello
world
helloworld
In python, What will be the output? t=(1,2,4,3) t[1:3]
(1, 2)
(1, 2, 4)
(2, 4)
(2, 4, 3)
Which of the following is a Python tuple?
[1, 2, 3]
(1, 2, 3)
{1, 2, 3}
{ }
Which of the following are unary operators in C? 1. ! 2. sizeof 3. ~ 4. &&
1, 2
1, 3
2, 4
1, 2, 3
Which bitwise operator is suitable for turning on a particular bit in a number?
&& operator
& operator
|| operator
| operator
What will be the output of the program? #include<stdio.h> int main() { printf("%d %d\n", 32<<1, 32<<0); printf("%d %d\n", 32<<-1, 32<<-0); printf("%d %d\n", 32>>1, 32>>0); printf("%d %d\n", 32>>-1, 32>>-0); return 0; }
Garbage values
64 32 0 32 16 32 0 32
All zeros
8 0 0 0 32 0 0 16
Which one is not a nickname of a version of Android ?
Cupcake
Gingerbread
Honeycomb
Muffin
In Unix/Linux, Which command is used to print a file
print
ptr
lpr
pg
Which of the following commands is used to update access and modification times of a file?
grep
wc
touch
cat
What is the minimum number of two-input NAND gates used to perform the function of two input OR gate ?
One
Two
Three
Four
The decimal equivalent of hex number 1A53 is
6793
6739
6973
6379
How many Flip-Flops are required for mod–16 counter?
The 2’s complement of the number 1101101 is
0101110
0111110
0110010
0010011
When simplified with Boolean Algebra (x + y)(x + z) simplifies to
x + x(y + z)
x(1 + yz)
x + yz
A 4-bit synchronous counter uses flip-flops with propagation delay times of 15 ns each. The maximum possible time required for change of state will be
15 ns
30 ns
45 ns
60 ns
1’s complement representation of decimal number of -17 by using 8 bit representation is
1110 1110
1101 1101
1100 1100
0001 0001
Which command is used to extract specific columns from the file?
cut
find
Grant and revoke are ....... statements.
DDL
TCL
DCL
DML
How many lines the truth table for a four-input NOR gate would contain to cover all possible input combinations ?
12
Match the following A.Plasma paneL i) Polarizer B.DVST ii) Zinc sulfide C.LCD iii) Dielectric mesh D.Thin film electroluminescent iv) Neon gas
A-ii, B-iv, C-i, D-iii
A-ii, B-iii, C-iv, D-i
A-iv, B-iii, C-i, D-ii
A-i ,B-iv, C-ii, D-iii
What type of join is needed when you wish to include rows that do not have matching values?
Equi-join
Natural join
Outer join
All the above
If an object is rotated through an angle A in clockwise direction, the rotation matrix R= ...............
cos A sin A -sin A cos A
cos A -sin A sin A cos A
sin A cos A cos A sin A
None
Forming products of transformation matrices is often referred as
Concatenation
Composition
both a&b
In a risk-based approach the risks identified may be used to: i. Determine the test technique to be employed ii. Determine the extent of testing to be carried out iii. Prioritize testing in an attempt to find critical defects as early as possible. iv. Determine the cost of the project
ii is True; i, iii, iv and v are False
i,ii,iii are true and iv is false
ii and iii are True; i, iv are False
ii, iii and iv are True; i is false
Which of the following is not a part of the Test Implementation and Execution Phase?
Creating test suites from the test cases
Executing test cases either manually or by using test execution tools
Comparing actual results
Designing the Tests
What can static analysis NOT find?
The use of a variable before it has been defined.
Unreachable (“dead”) code.
Memory leaks.
Array bound violations.
Which plan describes how the skills and experience of the project team members will be developed ?
HR Plan
Manager Plan
Team Plan
Staff Development Plan
Alpha and Beta Testing are forms of _______ .
Acceptance testing
Integration testing
System Testing
Unit testing
Which is the most important feature of spiral model?
Quality management
Risk management
Performance management
Efficiency management
Key to represent relationship between tables is called
primary key
secondary key
foreign key
Which method executes only once
start() method
init() method
stop() method
destroy() method
__________ generate interrupt signal to microprocessor and receive acknowledge
priority resolver
control logic
interrupt request register
interrupt register
In 8086 the overflow flag is set when _____________.
the sum is more than 16 bits.
signed numbers go out of their range after an arithmetic operation.
carry and sign flags are set.
subtraction
Address line for TRAP is?
0023H
0024H
0033H
0099H
The instruction, MOV AX, 1234H is an example of
register addressing mode
direct addressing mode
immediate addressing mode
based indexed addressing mode
In which order, Processor status word of 8085 microprocessor has five flags ?
S, Z, AC, P, CY
S, OV, AC, P, CY
S, Z, OV, P, CY
S, Z, AC, P, OV
In Java, Runnable is
Class
Method
Variable
Interface
Consider the following statements: In 8085 microprocessor, data-bus and address bus are multiplexed in order to I) Increase the speed of microprocessor. II) Reduce the number of pins. III) Connect more peripheral chips. Which of these statements is/are correct?
(I) only
(II) only
(II) & (III)
(I),(II) & (III)
colspan can be added to only what tag?
<table>
<tr>
<td>
Which class cannot be subclassed (or extended) in java?
abstract class
parent class
Final class
A technology called ____ makes it possible for one person's computer to directly access the contents of another person's hard disk.
P2P
URL
HTML
DTD
The main reason for using encryption on the Internet is:
To speed up the communication
To prevent people other than the recipients from reading the message
To guarantee that the message reached its intended target..
The Internet allows strangers to group together to gain bulk price discounts normally available to large companies; this is defined as:
Customer-to-customer transaction
Business-to-business transaction
Price bidding
Buying cartel
How can you open a link in a new browser window?
<a href="url" new>
<a href="url" target="new">
<a href="url" target="_blank">
<a href="url" target="_new">
What method is used to specify a container's layout in JSP?
setLayout()
setContainerLayout()
ContainerLayout()
setConLayout().
What value does readLine() return when it has reached the end of a file in JSP?
Last character in the file
Null
True.
False
In JSP, a Canvas object provides access to a Graphics object via one of its method called:
getCanvas()
getGraphics()
paint()
accessGraphics()
The following web page is loaded into a web server: <html> <head><title>JavaScript question</title></head> <body> <script language="JavaScript"> book = new Array(1,2,3,4,5,6,7,8); document.write(book[1]); book[10]=10; document.write(book[10]); </script> </body> </html> Once the above web page is loaded what will its body contain?
2 10
1 10
210
110
Consider the following script: <html> <head><title>JavaScript</title></head> <body> <script language="JavaScript"> document.write((125/5)%12); </script> </body> </html> What would be the output of the above script?
2.083
25%12
Consider the following entries in a Cascading Style Sheet (CSS) file. P {colour: blue; background-colour: white; border-colour: red; border-left: solid} BODY {colour: black; border-colour: green} What is the colour of text in a paragraph of an HTML document that uses the above style sheet?
green
blue
black
White.
Matlab stands for
Mathematics Lab
Matrix Laboratory
Mathematical Laboratory
Look at this series: 664, 332, 340, 170, ____, 89, ... What number should fill the blank?
85
97
109
178
Which of the following is not a pair tag?
<p>
<u>
<i>
<img>
CALANDER is coded in a code as CLANAEDR. Find the code for CIRCULAR under the same rule.
LACANDER
CRIUCALR
CLANADER
In one's complement representation 1111 1111 represents
+0
-0
+1
-1
Using Demorgan's theorem we can convert AND-OR circuit to
OR-AND
NOR-NOR
NAND-NAND
NAND-NOR
The number of interrupt lines in 8085 is
Ability to learn how to do tasks based on the data given for training or initial experience
Self Organization
Adaptive Learning
Fault tolerance
Robustness
Which of the following propositions is tautology?
(p v q)→q
p v (q→p)
p v (p→q)
Both (b) & (c)
Which actions can be triggered by a button click in Android ? (check all that apply)
change appearance of other views of the same activity
start a different activity
change appearance of the button