". VdoTips: COMPUTER FUNDAMENTAL PRACTICE SET 37

APPLY LATEST GOVT JOBS

hi

COMPUTER FUNDAMENTAL PRACTICE SET 37

271. A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79?
(A). 1
(B). 2
(C). 3
(D). 4

(B). 272. Which of the following is true while converting CFG to LL (I) grammar?
(A). Remove left recursion alone
(B). Factoring grammar alone
(C). Both of the above
(D). None of the above

(D). 273. Identify the Risk factors which are associated with Electronic payment system.
(A). Fraudulent use of Credit Cards.
(B). Sending Credit Card details over internet.
(C). Remote storage of Credit Card details.
(D). All of the above

(B). 274. Which of the following are two special functions that are meant for handling exception that occurs during exception handling itself?
(A). Void terminate ( ) and Void unexpected ( )
(B). Non void terminate ( ) and void unexpected ( )www.netugc.com
(C). Void terminate ( ) and non-void unexpected ( )
(D). Non void terminate ( ) and non-void unexpected ( )

(D). 275. Which of the following memory allocation scheme suffers from external fragmentation?
(A). Segmentation
(B). Pure demand paging
(C). Swapping
(D). Paging

(D).