What is size of the object of following class (64 bit system)?
class student { int rollno; char name[20]; static int studentno; };
class student { int rollno; char name[20]; static int studentno; };
Anonymous Quiz
29%
a) 20
5%
b) 22
33%
c) 24
34%
d) 28
👍3
Which of the following is a characteristic of object-oriented programming?
Anonymous Quiz
25%
a) Procedural approach
54%
b) Emphasis on code reusability
17%
c) Single-level inheritance
4%
d) Reliance on global variables
Encapsulation and abstraction differ as ___________
Anonymous Quiz
70%
a) Binding and Hiding respectively
22%
b) Hiding and Binding respectively
3%
c) Can be used any way
5%
d) Hiding and hiding respectively
Which search algorithm guarantees the shortest path in an unweighted graph?
Anonymous Quiz
30%
a) Depth-First Search (DFS)
47%
b) Breadth-First Search (BFS)
19%
c) Binary Search
4%
d) Linear Search
Which operation of a stack returns the element at the top without removing it?
Anonymous Quiz
16%
a) Push
21%
b) Pop
56%
c) Peek
7%
d) IsEmpty
Which type of queue allows elements to be inserted and removed from both ends?
Anonymous Quiz
6%
a) Priority Queue
19%
b) Circular Queue
68%
c) Deque (Double-Ended Queue)
6%
d) LIFO Queue
Which traversal visits the nodes of a binary tree in the order: left subtree, root, right subtree?
Anonymous Quiz
20%
a) Preorder traversal
69%
b) Inorder traversal
8%
c) Postorder traversal
3%
d) Level order traversal
Which data structure is commonly used to represent a graph efficiently?
Anonymous Quiz
69%
a) Adjacency matrix
11%
b) Array
11%
c) Stack
8%
d) Queue
Which of the following routing algorithms is based on the concept of finding the shortest path in a network?
Anonymous Quiz
53%
a) Distance Vector Routing
19%
b) Link State Routing
10%
c) Border Gateway Protocol (BGP)
19%
d) Spanning Tree Protocol (STP)
👍3
In the context of operating systems, which scheduling algorithm guarantees that every process gets an equal share of CPU time over a given period?
Anonymous Quiz
74%
a) Round Robin
14%
b) First-Come, First-Served (FCFS)
4%
c) Shortest Job Next (SJN)
9%
d) Priority Scheduling
👍1
Which of the following is an example of a symmetric key encryption algorithm?
Anonymous Quiz
44%
a) RSA
25%
b) AES
16%
c) Diffie-Hellman
15%
d) SHA-256
👍2
Which of the following network topologies offers the highest fault tolerance and redundancy?
Anonymous Quiz
21%
a) Bus
16%
b) Ring
18%
c) Star
45%
d) Mesh
Which of the following protocols is used to assign IP addresses dynamically to devices on a network?
Anonymous Quiz
45%
a) DNS
37%
b) DHCP
8%
c) ARP
10%
d) ICMP
In bubble sort algorithm, worst case time complexity is _____?
Anonymous Quiz
5%
O(1)
70%
O(n^2)
16%
O(n)
10%
O(nlogn)
Merge sort follows _____ approach in data structure.
Anonymous Quiz
86%
(A) divide and conquer strategy
7%
(B) back tracking approach
4%
(C) heuristic search
3%
(D) greedy
In data structure, the stack is a linear type of data structure in which data is stored and retrieved in a ____ manner.
Anonymous Quiz
5%
(A) No out only in
79%
(B) Last in First out
14%
(C) First in First out
2%
(D) Last out Last in
Which of the following is a supervised learning algorithm?
Anonymous Quiz
29%
a) K-means clustering
50%
b) Decision tree
8%
c) Apriori algorithm
13%
d) Reinforcement learning
What is the purpose of the "training" phase in machine learning?
Anonymous Quiz
42%
a) To evaluate the model's performance on unseen data
19%
b) To fine-tune the hyperparameters of the model
27%
c) To optimize the model's weights using a given dataset
11%
d) To interpret the prediction
Which of the following evaluation metrics is appropriate for a classification problem?
Anonymous Quiz
29%
a) Mean Absolute Error (MAE)
44%
b) Root Mean Squared Error (RMSE)
20%
c) Precision
6%
d) R-squared (R²)
What is the purpose of feature scaling in machine learning?
Anonymous Quiz
42%
a) To normalize the features to a specific range
20%
b) To remove irrelevant features from the dataset
24%
c) To reduce the dimensionality of the dataset
14%
d) To handle missing values in the dataset
👍1🔥1
Which of the following algorithms is commonly used for anomaly detection in machine learning?
Anonymous Quiz
35%
a) K-nearest neighbors (KNN)
19%
b) Random forest
24%
c) Support Vector Machines (SVM)
22%
d) Principal Component Analysis (PCA)
👍4