Recent questions and answers in Non GATE

0 votes
0 answers
2
A program that includes the file containing a class declaration is called a ________ program of the class.
0 votes
1 answer
5
The condition $\text{num}!$ $=65$ cannot be replaced by$\text{num}$ $>65$ || $\text{num}$ $<65$$!($ num $==65)$$\text{num}$ $-65$$! (\text{num}-65)$
0 votes
1 answer
7
0 votes
1 answer
8
Which mode is a block cipher implementation as a self-synchronizing stream cipher?Cipher Block Chaining Mode,Cipher Feedback ModeElectronic Codebook ModeOutput Feedback M...
0 votes
1 answer
10
0 votes
1 answer
14
The term hacker was originally associated with :A computer programVirusComputer professionals who solved complex computer problemsAll of the above
0 votes
1 answer
17
Regression testing focuses on validatingmodule structuremodule interfacessoftware changesNone of the above
1 votes
1 answer
18
Consider the following automata:Let $N$ be the number of $0 / 1$-strings of length exactly $6$ accepted by this automata. Which of the following is true about $\text{N}$?...
0 votes
1 answer
19
For any positive integer $\text{N}$, let $\text{p(N)}$ be the probability that a uniformly random number $a \in\{1, \ldots, N\}$ has an odd number of factors (including 1...
1 votes
2 answers
32
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
0 votes
2 answers
33
The MCDC software testing technique stands forMultiple Conditions Decision CoverageMultiple coverage Decision conditionsModified Condition Decision CoverageNone of the ab...
0 votes
1 answer
34
0 votes
1 answer
35
1 votes
1 answer
38
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
0 votes
0 answers
39
Which of the following clustering technique is used by K-Means algorithm:Hierarchical TechniquePartitional techniqueDivisiveAgglomerative
To see more, click for all the questions in this category.