Which strings is not generated by the grammar

Assignment Help Computer Engineering
Reference no: EM131041836

1. Which of the following is the key shaded part?

2425_Figure.jpg

a) 17
b) 24
c) 19
d) 31
e) 33

2. Set of terminal symbol {a, b} and non terminal symbols is {S, A} and starting symbol is S

S → SS
S → aAb
A → aAb
A → b
A → ε

Which strings is not generated by the grammar?
a) ab
b) aabb
c) abab
d) abba
e) ababb

3) What is the decimal value of the sum of the binary number 11001 and hexadecimal number 84 ?
a) 153
b) 154
c) 155
d) 156
e) 157

4) UML diagram

546_Figure1.jpg

Which of the following possibilities classes A and B be modeled by this diagram?
   Class A    Class B
a) car         Vehicle
b) chapter   book
c) country   capital city
d) building    Floor
e) Judge      Lawyer

5)

1010_Figure2.jpg

How many simple paths are there for vertex A to vertex B?
a) 12   c) 45   e) 81
b) 20   d) 64

6) (x, y) Vectors

x
y
1

homogeneous coordinates

Which 3 x3 matrices represent transformation that will mark point (x, y) to point ( x+2, 3 y)?

a ) 1 0 0
c)  1 2 0

0 3 1

0 1 3

2 0 1

0 0 1









b ) 1 0 2
d)  2 0 0

0 3 0

0 1 3

0 0 1

0 0 1









e)  2 0 1





0 3 1





1 0 1




7) Which of these are not desired characteristics of a hash function in used to construct a hash table?
a) h(x) is an integer value
b) if x = y, then h(x) - h(y)
c) given x, it is easy to computer h(x)
d) given h(x), it is easy to computer x
e) h(x) produces evenly distributed values

8) When value in a programming is said to have first class status if it has which characters?
a) it can be passed as a parameter
b) it can be returned from a function
c) it can be assigned to a variable

this has more than one answer

9) Which number when maximum flow from note S to note T?

1201_Figure3.jpg

a) 5
b) 6
c) 7
d) 8
e) 9

10 (aaa + bbb) * (bb +c) *(acb*)(acba*)

Which length of the shortest string in the language represented by the expression?
a) 2
b) 4
c) 5
d) 7
e) 16

11 ) Database management system, an attribute of one table that matches the primary key of another table
a) candidate key
b) composite key
c) foreign key
d) primary key
e) secondary key

12 Quickest algorithm (nlogn)
Which one is the worst case running ?
a) (nlog2n)
b) (n3/2)
c) (n2)
d) (n2logn)
e) (n3)

13 Which binary strings of length 10 contain either exactly one 0 or exactly the 0's?
a) 45
b) 55
c) 100
d) 450
e) 1024

14) "All cold things are wet"
"no blabs are purple"
"same purple things are cold"
Which one of these?
a) some wet things are not blobs
b) some cold things are blabs
c) some blabs are not cold
d) all wet things are purple
e) all purple things are wet

15) Testing to detect the introduction of errors into software that way previously corrected is called?
a) unit testing
b) system testing
c) regression testing
d) integration testing
e) debugging

16 ) Asymptotic ordering from least to greatest of the these functions?

√n, nlog2n, log2(n2)

17) 3 step random walk that starts at node A
The next node will be visited randomly chosen from among two nodes adjacent to the current node.
What is the probability the 3 steps random walk will end at node B?
a) 0
b) 1/8
c) ¼
d) 3/8
e) ½

18. Consider tables R and S
R

A

B

0

0

0

1

2

1


S

B

C

0

1

1

0

1

2

How many types are in the natural join of R and S?
a) 3
b) 4
c) 5
d) 6
e) 7

19. An Euler path

311_figure.jpg

This graph is known to have an Euler path because it is planner; all nodes have a degree greater than or equal 2.
Which are of these are true?
a) it has more edges then nodes
b) it has exactly two add degree nodes
c) it has an add number of nodes
There can be more than one answer

20 which of the following two input Boolean function cannot be learned by a single layer neural network such as a perception?
a) AND
b) OR
c) NAND
d) NOR
e) XOR

21) Consider a computer system with 32 bit address, 4 GB of byte addressable RAM, and a data cache that has 32 byte blocks. What additional information can be used to compute the size of a tag in the data cache?

a) The size of the data cache in byte and the number of blocks per ser
b) the number of page table entries and the number of sets in the data cache
c) the size of the data cache in bytes and the size of a page
d) the size of the cache divided by the number of blocks per set
e) the number of translation look aside buffer (TLB) entries and the number of set in the data cache.

22) The computer graphics operation of rotations, translation, and projection can be all be implemented using matrix transformation from linear algebra. For this reason advanced graphics units (GPU) commonly found in today's microcomputer from which class of computer architecture?
a) SISD
b) SIMD
c) MIMD
e) NUMA

I need some help with my computer science assignment. There are 22 computer science questions in multiple choice. You can just circle the write answers or make a list.

Reference no: EM131041836

Questions Cloud

Attention from the admission office : The following is the instructions. Please be creative and grasp the attention from the admission office. Show the understanding of this major .and be original. no plagirism
Determine whether you would use static or dynamic routing : Determine whether you would use static or dynamic routing to connect the routers. Justify your response with the key benefits that your choice provides.
Order quantity utilizing the all-units quantity discounts : In your own words, define training, and explain how training has evolved from training as an event to learning. Discuss the difference between learning and knowledge in your responseA company is trying to decide the optimal order quantity utilizing t..
Determining the acceptable purchase price : A company's 12-month trailing earnings per share [EPS] are $4.50,and the EPS are expected to grow 10% annually. If an investor is willing to paya P/E multiple that is no higher than 2.5 times its growth rate, and the stock is currently selling at ..
Which strings is not generated by the grammar : What is the decimal value of the sum of the binary number 11001 and hexadecimal number 84 - Which of these are not desired characteristics of a hash function in used to construct a hash table?
Required rate of return : Mintzberg Inc., a golf club manufacturer, is currently paying a dividend of $0.50 per share. The dividend is expected to grow at a 20% rate for the next two years and at a 3% rate thereafter (forever). What is the value of the stock if the require..
Assumption of the regression model : Which of the following is not an assumption of the regression model? The errors are independent. The errors are normally distributed. The errors have constant variance. The mean of the errors is zero. The errors should have a standard deviation equal..
Discuss the difference between learning and knowledge : In your own words, define training, and explain how training has evolved from training as an event to learning. Discuss the difference between learning and knowledge in your response.
Good channels of communication with the sales associates : Glenn was recently promoted to be the manager of a new store being opened by a large department store chain. He wants to start out right by making sure that communications are always good between him, the six department heads, and the 50 full-time an..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Examples of polyfunctional compounds

Examples of polyfunctional compounds

  Explaining the rsa

Using the RSA with p = 3, q = 11, e = 7: Explain the suitable value for d? Encode the message “cat” by encrypting each letter separately, i.e., by encrypting ASCII code of each letter.

  Make an html document that includes a javascript

make an html document that includes a JavaScript program that creates a new constructor function named Automobile in the document head.

  Give the pseudocode for the flowchart

make a flowchart and give the pseudocode for searching an array for a specified value.

  What role does reasoned paranoia play in the minded and

what is the mindset required to properly protect information? what role does reasoned paranoia play in the minded and

  Hardware tools need to search cell phone

After looking upon the warrant this search and seizure is justified thus, your team now should search the cell phone for the digital evidence. Explain the hardware tools required to search this cell phone?

  Questionproblem 1using java development kit and jgrasp

questionproblem 1using java development kit and jgrasp develop a program in response to following prompt-write down a

  Questionwrite down java-like pseudocode to specify the

questionwrite down java-like pseudocode to specify the logic for following program application-write down an

  Display the account in a listbox

Create an application that list accounts from a Dictionary Object - Display the account in a ListBox. If the user enters new values, they can click on the Add Button to add a new account to the dictionary item.

  By using various internet sources find an article or

using various internet sources find an article or website about website security. show your personal content mastery by

  Program that prints to screen results of dividing 23 by 5

create a program, using C++ that prints to screen the results of dividing 23 by 5, where 23 and 5 are ints. Provide the results of what was printed to screen via comments in the program ; need in hardcopy.

  Software driver that will implement a byte-wide data

Design the hardware and software driver that will implement a byte-wide data transfer from your processor to a peripheral device. Each transfer must be accompanied by a strobe to deskew the data. Draw the UML sequence diagram and the timing diagra..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd