Which strings is not generated by the grammar

Assignment Help Computer Engineering
Reference no: EM131041836

1. Which of the following is the key shaded part?

2425_Figure.jpg

a) 17
b) 24
c) 19
d) 31
e) 33

2. Set of terminal symbol {a, b} and non terminal symbols is {S, A} and starting symbol is S

S → SS
S → aAb
A → aAb
A → b
A → ε

Which strings is not generated by the grammar?
a) ab
b) aabb
c) abab
d) abba
e) ababb

3) What is the decimal value of the sum of the binary number 11001 and hexadecimal number 84 ?
a) 153
b) 154
c) 155
d) 156
e) 157

4) UML diagram

546_Figure1.jpg

Which of the following possibilities classes A and B be modeled by this diagram?
   Class A    Class B
a) car         Vehicle
b) chapter   book
c) country   capital city
d) building    Floor
e) Judge      Lawyer

5)

1010_Figure2.jpg

How many simple paths are there for vertex A to vertex B?
a) 12   c) 45   e) 81
b) 20   d) 64

6) (x, y) Vectors

x
y
1

homogeneous coordinates

Which 3 x3 matrices represent transformation that will mark point (x, y) to point ( x+2, 3 y)?

a ) 1 0 0
c)  1 2 0

0 3 1

0 1 3

2 0 1

0 0 1









b ) 1 0 2
d)  2 0 0

0 3 0

0 1 3

0 0 1

0 0 1









e)  2 0 1





0 3 1





1 0 1




7) Which of these are not desired characteristics of a hash function in used to construct a hash table?
a) h(x) is an integer value
b) if x = y, then h(x) - h(y)
c) given x, it is easy to computer h(x)
d) given h(x), it is easy to computer x
e) h(x) produces evenly distributed values

8) When value in a programming is said to have first class status if it has which characters?
a) it can be passed as a parameter
b) it can be returned from a function
c) it can be assigned to a variable

this has more than one answer

9) Which number when maximum flow from note S to note T?

1201_Figure3.jpg

a) 5
b) 6
c) 7
d) 8
e) 9

10 (aaa + bbb) * (bb +c) *(acb*)(acba*)

Which length of the shortest string in the language represented by the expression?
a) 2
b) 4
c) 5
d) 7
e) 16

11 ) Database management system, an attribute of one table that matches the primary key of another table
a) candidate key
b) composite key
c) foreign key
d) primary key
e) secondary key

12 Quickest algorithm (nlogn)
Which one is the worst case running ?
a) (nlog2n)
b) (n3/2)
c) (n2)
d) (n2logn)
e) (n3)

13 Which binary strings of length 10 contain either exactly one 0 or exactly the 0's?
a) 45
b) 55
c) 100
d) 450
e) 1024

14) "All cold things are wet"
"no blabs are purple"
"same purple things are cold"
Which one of these?
a) some wet things are not blobs
b) some cold things are blabs
c) some blabs are not cold
d) all wet things are purple
e) all purple things are wet

15) Testing to detect the introduction of errors into software that way previously corrected is called?
a) unit testing
b) system testing
c) regression testing
d) integration testing
e) debugging

16 ) Asymptotic ordering from least to greatest of the these functions?

√n, nlog2n, log2(n2)

17) 3 step random walk that starts at node A
The next node will be visited randomly chosen from among two nodes adjacent to the current node.
What is the probability the 3 steps random walk will end at node B?
a) 0
b) 1/8
c) ¼
d) 3/8
e) ½

18. Consider tables R and S
R

A

B

0

0

0

1

2

1


S

B

C

0

1

1

0

1

2

How many types are in the natural join of R and S?
a) 3
b) 4
c) 5
d) 6
e) 7

19. An Euler path

311_figure.jpg

This graph is known to have an Euler path because it is planner; all nodes have a degree greater than or equal 2.
Which are of these are true?
a) it has more edges then nodes
b) it has exactly two add degree nodes
c) it has an add number of nodes
There can be more than one answer

20 which of the following two input Boolean function cannot be learned by a single layer neural network such as a perception?
a) AND
b) OR
c) NAND
d) NOR
e) XOR

21) Consider a computer system with 32 bit address, 4 GB of byte addressable RAM, and a data cache that has 32 byte blocks. What additional information can be used to compute the size of a tag in the data cache?

a) The size of the data cache in byte and the number of blocks per ser
b) the number of page table entries and the number of sets in the data cache
c) the size of the data cache in bytes and the size of a page
d) the size of the cache divided by the number of blocks per set
e) the number of translation look aside buffer (TLB) entries and the number of set in the data cache.

22) The computer graphics operation of rotations, translation, and projection can be all be implemented using matrix transformation from linear algebra. For this reason advanced graphics units (GPU) commonly found in today's microcomputer from which class of computer architecture?
a) SISD
b) SIMD
c) MIMD
e) NUMA

I need some help with my computer science assignment. There are 22 computer science questions in multiple choice. You can just circle the write answers or make a list.

Reference no: EM131041836

Questions Cloud

Attention from the admission office : The following is the instructions. Please be creative and grasp the attention from the admission office. Show the understanding of this major .and be original. no plagirism
Determine whether you would use static or dynamic routing : Determine whether you would use static or dynamic routing to connect the routers. Justify your response with the key benefits that your choice provides.
Order quantity utilizing the all-units quantity discounts : In your own words, define training, and explain how training has evolved from training as an event to learning. Discuss the difference between learning and knowledge in your responseA company is trying to decide the optimal order quantity utilizing t..
Determining the acceptable purchase price : A company's 12-month trailing earnings per share [EPS] are $4.50,and the EPS are expected to grow 10% annually. If an investor is willing to paya P/E multiple that is no higher than 2.5 times its growth rate, and the stock is currently selling at ..
Which strings is not generated by the grammar : What is the decimal value of the sum of the binary number 11001 and hexadecimal number 84 - Which of these are not desired characteristics of a hash function in used to construct a hash table?
Required rate of return : Mintzberg Inc., a golf club manufacturer, is currently paying a dividend of $0.50 per share. The dividend is expected to grow at a 20% rate for the next two years and at a 3% rate thereafter (forever). What is the value of the stock if the require..
Assumption of the regression model : Which of the following is not an assumption of the regression model? The errors are independent. The errors are normally distributed. The errors have constant variance. The mean of the errors is zero. The errors should have a standard deviation equal..
Discuss the difference between learning and knowledge : In your own words, define training, and explain how training has evolved from training as an event to learning. Discuss the difference between learning and knowledge in your response.
Good channels of communication with the sales associates : Glenn was recently promoted to be the manager of a new store being opened by a large department store chain. He wants to start out right by making sure that communications are always good between him, the six department heads, and the 50 full-time an..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Implementing the java program

Write down a Java program which allows the user to enter the loan amount and loan period in number of years and show the monthly and total payments.

  Choose decision support systems (dss) function

You are developing a new information system for The Fitness Center, company that has five fitness centers in your metropolitan area, with about 650 members and 30 employees in each location.

  Xpath and xslt transformation

Explain the context in XPath. Explain at least three things you will require to perform an XSLT transformation.

  Determine that the relationship between the volume

On the first test we looked at a cooling tank for a radioisotope test facility. From Geometry and calculus we can determine that the relationship between the volume of the heavy water (m^3) and the height of the water (m) in the storage tank is gi..

  Which mark-up type would be most appropriate for business

Which Mark-up Type would be most appropriate for the business? Why? How would the choice of the Mark-up Type impact on the customer's decision to purchase from the company? Why?

  Rea modelling and rea diagrams

REA is an acronym for Entities, Resources, and Agents. REA data modelling does not involve the traditional accounting elements like ledgers, chart of accounts, debits and credits.

  The origin and history of the sip protocol

Explain, in a couple of paragraphs, the origin and history of the SIP protocol and the H.323 protocol suite. What are the most noticeable characteristics of each. What are some of their cons

  Write down an account class

Write down an Account Class.

  Estimating average access time of system

The hit ratio for read accesses only is 0.9. A write-through procedure is used. Explain the average access time of system taking only memory read cycles?

  Class diagram and pseudocode describing the class

Design the class diagram and write down the pseudocode that describes the class.

  Does the marie architecture owe more to aiken

Two pioneers of early computers and computer organization were Howard H. Aiken and John von Neumann - Is Aiken or is von Neumann associated with the so-called Princeton architecture?

  Evaluate in gf polynomial

Evaluate in GF(2^8): (x^4+x+1)/(x^7+x^6+x^3+x^2), where the irreducible polynomial is the one used by AES, P(x)=x^8+x^4+x^3+x+1.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd