मराठी

CUET (UG) entrance exam Question Bank Solutions for Computer Science\Information Practices

Advertisements
[object Object]
[object Object]
विषय
मुख्य विषय
अध्याय
Advertisements
Advertisements
Computer Science\Information Practices
< prev  61 to 80 of 539  next > 

How many comparisons of Linear search will be required to search for key = 17 in the list [8,-4,7,17,0,12,56]?

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

If the key to be searched is the last element in the list, then linear search algorithm will make how many comparisons?

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

Advertisements

In which of the following scenarios would you prefer to use a Linear search algorithm?

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

Which is the most preferred technique used for finding a value in a list?

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

An average case occurs in linear search algorithm when ______.

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

What is true for bubble sort?

[5] Sorting
Chapter: [5] Sorting
Concept: undefined >> undefined

In the given list 1, 2, 3, 5, 6, 4. Given that number 13 is to be searched. In which call will it be known that 13 do not exist. Search is conducted using Linear search.

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

The biggest disadvantage of a Linear search is that ______.

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

Code Red is a type of ______.

[11] Security Aspects
Chapter: [11] Security Aspects
Concept: undefined >> undefined

Linear search is time consuming if applied on big lists.

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

Linear search works on the principle of divide and rule.

[4] Searching
Chapter: [4] Searching
Concept: undefined >> undefined

First message was communicated by networking between ______.

[9] Computer Networks
Chapter: [9] Computer Networks
Concept: undefined >> undefined

Identify Single Row function of MySQL among the following.

[12] Database Query using SQL
Chapter: [12] Database Query using SQL
Concept: undefined >> undefined

What will be returned by the given query? Select round(23456.1234, -2) = ______.

[12] Database Query using SQL
Chapter: [12] Database Query using SQL
Concept: undefined >> undefined

What will be returned by the given query? select mid("Computer", 2, 4) = ______.

[12] Database Query using SQL
Chapter: [12] Database Query using SQL
Concept: undefined >> undefined

What will be returned by the given query? select day of year('2015-02-10') = ______.

[12] Database Query using SQL
Chapter: [12] Database Query using SQL
Concept: undefined >> undefined

A ______ is a small malicious program that runs hidden on the infected system.

[11] Security Aspects
Chapter: [11] Security Aspects
Concept: undefined >> undefined

What will be returned by the given query? select substr("Computer", 4) = ______.

[12] Database Query using SQL
Chapter: [12] Database Query using SQL
Concept: undefined >> undefined

Which of the following would most likely NOT be a symptom of a virus?

[11] Security Aspects
Chapter: [11] Security Aspects
Concept: undefined >> undefined

What will be returned by the given query? select power(3, 2) = ______.

[12] Database Query using SQL
Chapter: [12] Database Query using SQL
Concept: undefined >> undefined
< prev  61 to 80 of 539  next > 
Advertisements
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×