The prefix form of an infix expression p+q-r*t is?
Answers
1. + pq - *rt
2. - +pqr * t
3. - +pq * rt
4. - + * pqrt
Correct Option ?
Answers
1. + pq - *rt
2. - +pqr * t
3. - +pq * rt
4. - + * pqrt
Correct Option ?
A ________ node is a special node that is found at the beginning of the linked list.
Answers
1. main
2. header
3. start
4. beginner
Answers
1. main
2. header
3. start
4. beginner
Nothing is too easy, at the same time nothing is too hard Have a #Standards and #Consistency with you. Won or lose, it only belongs to you. In the end you earned some
Which of the following is/are not correct.
Doubly circular linked list contains only one node, if _______________.
i-next part of first node contains address of last node
ii-next part of first node contains address of first node
iii-prev part of last node contains null value
iv-prev part of last node contains address of first node
Answers
1. i,iv
2. iii
3. i
4. ii
Doubly circular linked list contains only one node, if _______________.
i-next part of first node contains address of last node
ii-next part of first node contains address of first node
iii-prev part of last node contains null value
iv-prev part of last node contains address of first node
Answers
1. i,iv
2. iii
3. i
4. ii
Which of the following statements is not true about Singly circular linked list?
Answers
1. Time complexity to searching an element is o(1).
2. Every node in circular is successor.
3. Time complexity to inserting new node at the head in list is o(n).
4. Time complexity to deleting the last node is o(n).
Answers
1. Time complexity to searching an element is o(1).
2. Every node in circular is successor.
3. Time complexity to inserting new node at the head in list is o(n).
4. Time complexity to deleting the last node is o(n).
π° List of all errors π°
- 400 (Bad request)
- 401 (Authorization required)
- 402 (Payment required)
- 403 (Forbidden)
- 404 (Not found)
- 405 (Method not allowed)
- 406 (Not acceptable)
- 407 (Proxy authentication required)
- 408 (Request Timeout)
- 409 (Conflict)
- 410 (Gone)
- 411 (Length required)
- 412 (Precondition failed)
- 413 (Request entity too large)
- 414 (Request URI too large)
- 415 (Unsupported media type)
- 416 (Request range not satisfiable)
- 417 (Expectation failed)
- 422 (Unprocessable entity)
- 423 (Locked)
- 424 (Failed dependency)
- 500 (Internal server error)
- 501 (Not Implemented)
- 502 (Bad gateway)
- 503 (Service unavailable)
- 504 (Gateway timeout)
- 505 (HTTP version not supported)
- 506 (Variant also negotiates)
- 507 (Insufficient storage)
- 510 (Not extended)
- 400 (Bad request)
- 401 (Authorization required)
- 402 (Payment required)
- 403 (Forbidden)
- 404 (Not found)
- 405 (Method not allowed)
- 406 (Not acceptable)
- 407 (Proxy authentication required)
- 408 (Request Timeout)
- 409 (Conflict)
- 410 (Gone)
- 411 (Length required)
- 412 (Precondition failed)
- 413 (Request entity too large)
- 414 (Request URI too large)
- 415 (Unsupported media type)
- 416 (Request range not satisfiable)
- 417 (Expectation failed)
- 422 (Unprocessable entity)
- 423 (Locked)
- 424 (Failed dependency)
- 500 (Internal server error)
- 501 (Not Implemented)
- 502 (Bad gateway)
- 503 (Service unavailable)
- 504 (Gateway timeout)
- 505 (HTTP version not supported)
- 506 (Variant also negotiates)
- 507 (Insufficient storage)
- 510 (Not extended)
17 Websites to Learn Programming for FREEπ§βπ»
β inprogrammer com
β javascript com
β theodinproject
β stackoverflow
β geeksforgeeks
β studytonight
β freecodecamp
β mozilla dev
β javatpoint
β codecademy
β sololearn
β programiz
β w3schools
β tutsplus
β w3school
β youtube
β scrimba
β inprogrammer com
β javascript com
β theodinproject
β stackoverflow
β geeksforgeeks
β studytonight
β freecodecamp
β mozilla dev
β javatpoint
β codecademy
β sololearn
β programiz
β w3schools
β tutsplus
β w3school
β youtube
β scrimba
USEFUL RESOURCES FOR DESIGNERS!
For illustrations
1. sketchvalley.com
2. craftwork.design
3. blush.design
4. opendoodles.com
5. ls.graphics/illustrations/wham
6. icons8.com/illustrations
7. drawkit.io
8. isometriclove.com
For illustrations
1. sketchvalley.com
2. craftwork.design
3. blush.design
4. opendoodles.com
5. ls.graphics/illustrations/wham
6. icons8.com/illustrations
7. drawkit.io
8. isometriclove.com
www.ls.graphics
Wham!
Beautiful illustrations for your next UI project
Few more questions from last CCAT Exam :
β How many page fault would occur for LRU replacement algo ?
β Which of the following option typically improves performance if we increase the RAM of the computer ?
A. Virtual memory increases
B. Virtual memory decreases
C. Less no of page faults
D. Less no of segmantation faults.
β A system contains five programs and each requires five tape units for its operation the minimum number of tape units required. Which of the system must have such that deadlock never arises ?
A. 21
B. 22
C. 23
D. 24
β A process that has terminated but whole parent has not yet called wait(), is known as a ?
A. Cascading termination
B. Zombie Process
C. Orphans Process
D. None
β OOPS concepts reflecting an IS A relationship between two classes is
A. Dynamic binding
B. Inheritance
C. Composition
D. Polymorphism
β Incorrect statement about hashing ?
A. A good hash function maps similar data items or records to the same hash values.
B. A good hash function uniformly distributes data items across the entire set of possible hash values.
C. A perfect hash function allows for constant time search, insertion, and deletion, into and from a hash table.
D. When using an open addressing method of collision resolution, all data records reside in a single bucket array.
β What actually gets passed when you pass an array as an argument to the function ?
β Octal (3232)4 to ( )16 hex conversion
A. EE
B. EF
C. FE
D. DE
β Size of IPV6
A. 48 bit
B. 64 bit
C. 128 bit
D. 256 bit
β Which of the Non-volatile storage device is fastest ?
A. SSD
B. HHD
C. Flash
D. MMC
β What does 32 represents in 32 bit cpu ?
A. String
B. Field
C. Char
D. Word size
β Lines required to connect 12 nodes in a mesh topology ?
A. 65
B. 66
C. 67
D. 56
β Polymorphism can be achieved by ?
A. Operator overloading
B. Function overloading
C. Virtual function
D. All of the above
β Full form of IC ?
β Which of this protocol is used to remote login in computer ???
A. Telnet
B. Ssh
C. Ftp
D. None
β How many page fault would occur for LRU replacement algo ?
β Which of the following option typically improves performance if we increase the RAM of the computer ?
A. Virtual memory increases
B. Virtual memory decreases
C. Less no of page faults
D. Less no of segmantation faults.
β A system contains five programs and each requires five tape units for its operation the minimum number of tape units required. Which of the system must have such that deadlock never arises ?
A. 21
B. 22
C. 23
D. 24
β A process that has terminated but whole parent has not yet called wait(), is known as a ?
A. Cascading termination
B. Zombie Process
C. Orphans Process
D. None
β OOPS concepts reflecting an IS A relationship between two classes is
A. Dynamic binding
B. Inheritance
C. Composition
D. Polymorphism
β Incorrect statement about hashing ?
A. A good hash function maps similar data items or records to the same hash values.
B. A good hash function uniformly distributes data items across the entire set of possible hash values.
C. A perfect hash function allows for constant time search, insertion, and deletion, into and from a hash table.
D. When using an open addressing method of collision resolution, all data records reside in a single bucket array.
β What actually gets passed when you pass an array as an argument to the function ?
β Octal (3232)4 to ( )16 hex conversion
A. EE
B. EF
C. FE
D. DE
β Size of IPV6
A. 48 bit
B. 64 bit
C. 128 bit
D. 256 bit
β Which of the Non-volatile storage device is fastest ?
A. SSD
B. HHD
C. Flash
D. MMC
β What does 32 represents in 32 bit cpu ?
A. String
B. Field
C. Char
D. Word size
β Lines required to connect 12 nodes in a mesh topology ?
A. 65
B. 66
C. 67
D. 56
β Polymorphism can be achieved by ?
A. Operator overloading
B. Function overloading
C. Virtual function
D. All of the above
β Full form of IC ?
β Which of this protocol is used to remote login in computer ???
A. Telnet
B. Ssh
C. Ftp
D. None