Forwarded from Deleted Account
MTH382 TMA1. 9/10
0 - [ Evaluate r(1)n ]
Bessel's - [ called the ____ equation of index n. ]
Hyper-geometric - [ solution of the differential equation ]
Successive - [ method of _ approximation ]
Beta - [ R(p)>0, R(q)>0 is the __ function ]
Ordinar - [ variables in the case of an _ equation ]
B(p,q) - [ Evaluate r(p)r(q)/r(p+q)n ]
Sinx - [ x - x²/y! .... ]
ar(a) [ r(a+1)nn ]
Gamma - [ dt is the _ function ]
Note: question are in the bracket.
Goodluck
0 - [ Evaluate r(1)n ]
Bessel's - [ called the ____ equation of index n. ]
Hyper-geometric - [ solution of the differential equation ]
Successive - [ method of _ approximation ]
Beta - [ R(p)>0, R(q)>0 is the __ function ]
Ordinar - [ variables in the case of an _ equation ]
B(p,q) - [ Evaluate r(p)r(q)/r(p+q)n ]
Sinx - [ x - x²/y! .... ]
ar(a) [ r(a+1)nn ]
Gamma - [ dt is the _ function ]
Note: question are in the bracket.
Goodluck
Forwarded from Deleted Account
MTH382 TMA3 9/10
1. 15015
2. boundedness
3. F(x,y) <= M Lipschitz
4. π
5. periodic
6. 6
7. 1/2
8. Dirichilet
9. B(α,β)
10. Legendre
Good luck any how system mark it oo 8/10
1. 15015
2. boundedness
3. F(x,y) <= M Lipschitz
4. π
5. periodic
6. 6
7. 1/2
8. Dirichilet
9. B(α,β)
10. Legendre
Good luck any how system mark it oo 8/10
Forwarded from Fabulous Hesh
POL111 TMA2 9/10
1. Tangible
2. Planning economic development of the country
3. Social Contract Theory
4. Coercion
5. None of the above
6. Confederal constitution
7. Sovereignty
8. Citizen
9. Right to freedom of discrimination
POL111 TMA 3 10/10
1. Which of the following is not recognized in the political spectrum of social change?
Labourism
2. A political ideology which seems to debase state apparatus through the dictatorship of the
proletariats is called?
Communism
3. 1789
4. Mao tsetung
5. Sustaining tribunal during swearing in
6. 1923
7. Revolution
8. Capitalism
9. 1917
10. The state
1. Tangible
2. Planning economic development of the country
3. Social Contract Theory
4. Coercion
5. None of the above
6. Confederal constitution
7. Sovereignty
8. Citizen
9. Right to freedom of discrimination
POL111 TMA 3 10/10
1. Which of the following is not recognized in the political spectrum of social change?
Labourism
2. A political ideology which seems to debase state apparatus through the dictatorship of the
proletariats is called?
Communism
3. 1789
4. Mao tsetung
5. Sustaining tribunal during swearing in
6. 1923
7. Revolution
8. Capitalism
9. 1917
10. The state
Forwarded from AMINUⓂ️ MEMES IBRAHIM🦒📦 Bums
PCR274_22 TMA3 9/10
Philosophy
Theory
Metaphysica
Substantive
Dilemma
Cameroon
Indigenous
Culture
Physical
environmental
Philosophy
Theory
Metaphysica
Substantive
Dilemma
Cameroon
Indigenous
Culture
Physical
environmental
Forwarded from Tola
PED122 TMA1
9/10
Rating Scale
Evaluation
Listening
Six
Relevance
Extensive listening
Teacher
Speaking
Obeying instructions
Four
9/10
Rating Scale
Evaluation
Listening
Six
Relevance
Extensive listening
Teacher
Speaking
Obeying instructions
Four
Forwarded from Obadeyi Micheal
[4/15, 4:24 AM] +234 708 419 8356: CIT315 TMA 3 (9/10)
The method of dividing memory into independent address space is called (segmentation)
Dynamic partitioning causes (External fragmentation)
A solution to the producers – consumers problem must satisfy the following conditions except (A producer must overwrite a full buffer)
The technique that describes where a process A of size 678k to be executed but first loaded into the main memory and the available size of the main memory is 295k so process A is swapped onto the disk and parts that needs to be used currently are swapped into the main memory and swapped out of the main memory upon completion till process A is completely executed
(Virtual memory)
This phenomenon, in which there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition. (Internal fragmentation)
When can we say we have a cache hit? (When we need to read value of a certain memory location and we find it in the cache)
What is swapping in memory management
(A technique used to temporarily remove the inactive programs from the main memory of the computer system)
The technique that is similar to paging system with swapping where processes reside in secondary memory and pages are loaded only on demand not in advance is (Demand Paging)
One of these is not an advantage of Semaphores (Semaphores may lead to a priority inversion)
When does a page fault happen? (When an executed program access a memory page that is mapped into the virtual address space, but not loaded in physical memory)
[4/15, 4:26 AM] +234 708 419 8356: CIT342 TMA3 9/10
The following grammar G = ( {s}, {a,b}, s, s --> asb|bsa|ss|_ generates strings having __
equal numbers of a\'s and b\'s
Which of the following statements are true? Statement 1 : Initial state of NFA is initial state of DFA. Statement 2 : The final state of DFA will be every combination of final state of NFA.
statement 1 is true and statement 2 is true
Pop operation on a stack indicates ___.
removal of elements
Compare the computational power of DFA and NFA
equal
A push down automata can be represented using __.
all of the options
Concatenating the empty set to any set yields {1*_ = ___ }
1
Given the alphabet _ = {0,1} { w|w contains the string 001 as a substring} is _
_*001_*
Every state of a DFA always has exactly _ existing transition arrow for each symbol in the alphabet.
1
Which of the following is correct proposition? Statement 1 : Non determination is a generalisation of determinism. Statement 2 : Every DFA is automatically an NFA.
statement 2 is correct because statement 1 is correct
A grammar is ambiguous, if it is possible to generate __ syntax trees for an expression.
two different
The method of dividing memory into independent address space is called (segmentation)
Dynamic partitioning causes (External fragmentation)
A solution to the producers – consumers problem must satisfy the following conditions except (A producer must overwrite a full buffer)
The technique that describes where a process A of size 678k to be executed but first loaded into the main memory and the available size of the main memory is 295k so process A is swapped onto the disk and parts that needs to be used currently are swapped into the main memory and swapped out of the main memory upon completion till process A is completely executed
(Virtual memory)
This phenomenon, in which there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition. (Internal fragmentation)
When can we say we have a cache hit? (When we need to read value of a certain memory location and we find it in the cache)
What is swapping in memory management
(A technique used to temporarily remove the inactive programs from the main memory of the computer system)
The technique that is similar to paging system with swapping where processes reside in secondary memory and pages are loaded only on demand not in advance is (Demand Paging)
One of these is not an advantage of Semaphores (Semaphores may lead to a priority inversion)
When does a page fault happen? (When an executed program access a memory page that is mapped into the virtual address space, but not loaded in physical memory)
[4/15, 4:26 AM] +234 708 419 8356: CIT342 TMA3 9/10
The following grammar G = ( {s}, {a,b}, s, s --> asb|bsa|ss|_ generates strings having __
equal numbers of a\'s and b\'s
Which of the following statements are true? Statement 1 : Initial state of NFA is initial state of DFA. Statement 2 : The final state of DFA will be every combination of final state of NFA.
statement 1 is true and statement 2 is true
Pop operation on a stack indicates ___.
removal of elements
Compare the computational power of DFA and NFA
equal
A push down automata can be represented using __.
all of the options
Concatenating the empty set to any set yields {1*_ = ___ }
1
Given the alphabet _ = {0,1} { w|w contains the string 001 as a substring} is _
_*001_*
Every state of a DFA always has exactly _ existing transition arrow for each symbol in the alphabet.
1
Which of the following is correct proposition? Statement 1 : Non determination is a generalisation of determinism. Statement 2 : Every DFA is automatically an NFA.
statement 2 is correct because statement 1 is correct
A grammar is ambiguous, if it is possible to generate __ syntax trees for an expression.
two different
Forwarded from Goodluck
MTH 282 TMA 3
7/10
1. 2xZ3+6xy2z
2. 3e-1
3. -12+61
4. 0
5. Cos€-rsin€sin€_ rcos€
6. 1(xy-plane)
7. 93
8. -3i+5j-4k
9. -2i+j
10. exy2+2
MTH 210 TMA 3
10/10
1. N-1
2. Differentiable
3. Plane
4. Riemann
5. Associative
6. Complex (A complex number z)
7. The quotient of analytic function is one
8. Converge
9. Of a given analytic function
10. Differentiable at z=z0
TMA 3 MTH212 9/10
Let V be a vector space over F of dimension n and T∈A (V). Then there exists a non-zero polynomial g over F such that g (T) = 0 and the degree of g is at most
n2
The eigenvalues of 56170-19230037 are
-19,5,37
If A(BC) = (AB)C, then with respect to multiplication this law is called
Associative law
Let U be a vector space over F . Then the space L(U, F) is called the ___
Double space of U*
If determinant of a matrix is equal to zero, then it is said to be
Singular matrix
Let T∈A (V), where V is a vector space over F. Then there exists a unique monic polynomial p of smallest degree such that
p (T) = 0
The law which does not hold in multiplication of matrices is known as
Distributive law
In matrices (A + B)T equals to
AT+ BT
If A and B matrices are of same order and A + B = B + A, this law is known as
Commutative law
If A=126541732, what is |A|
-79
I have not done MTH 232 TMA 3
7/10
1. 2xZ3+6xy2z
2. 3e-1
3. -12+61
4. 0
5. Cos€-rsin€sin€_ rcos€
6. 1(xy-plane)
7. 93
8. -3i+5j-4k
9. -2i+j
10. exy2+2
MTH 210 TMA 3
10/10
1. N-1
2. Differentiable
3. Plane
4. Riemann
5. Associative
6. Complex (A complex number z)
7. The quotient of analytic function is one
8. Converge
9. Of a given analytic function
10. Differentiable at z=z0
TMA 3 MTH212 9/10
Let V be a vector space over F of dimension n and T∈A (V). Then there exists a non-zero polynomial g over F such that g (T) = 0 and the degree of g is at most
n2
The eigenvalues of 56170-19230037 are
-19,5,37
If A(BC) = (AB)C, then with respect to multiplication this law is called
Associative law
Let U be a vector space over F . Then the space L(U, F) is called the ___
Double space of U*
If determinant of a matrix is equal to zero, then it is said to be
Singular matrix
Let T∈A (V), where V is a vector space over F. Then there exists a unique monic polynomial p of smallest degree such that
p (T) = 0
The law which does not hold in multiplication of matrices is known as
Distributive law
In matrices (A + B)T equals to
AT+ BT
If A and B matrices are of same order and A + B = B + A, this law is known as
Commutative law
If A=126541732, what is |A|
-79
I have not done MTH 232 TMA 3
Forwarded from Genesis Kidin
CSS 452 TMA3 9/10
Arrest
Victim
Search warrant
Deterrence
Crime
The prohibited act
Sentencing
Constitution
Sin
Prison
Arrest
Victim
Search warrant
Deterrence
Crime
The prohibited act
Sentencing
Constitution
Sin
Prison
Forwarded from Dehappy Ojor
*CIT191 TMA1 10/10*
*Dehappy Ojor*
1) What device removes hot air from the system
Select one:
Turbo button
Battery
Fan✅(page55)
Freeze button
2) What is the function of the Turbo Button?
Select one:
Makes the computer boot faster
Allows the computer run at its fastest speed✅(page55)
Stops the computer from freezing
Tells the users when the is disk activity
3) Which option is NOT a special keyboard key?
Select one:
PRTN✅
CTRL
DEL
ALT
4)Which card controls the PC’s disk drive motors and transfers data?
Select one:
Video Card
Disk Drive Controller Card✅(page66)
Display Adapter Card
Memory Card Controller
5)Which option is not a major division of an intelligent computer keyboard?
Select one:
Function leys
Control key
Numeric keys
Memory keys✅(page13)
6) Which option is an advantage of using air conditioners when operating computers?
Select one:
Prevents dusts✅(page16)
Increases the temperature
Stabilises the voltage
Prevents fatigue
7)Which device is used to step-up or step-down voltage?
Select one:
Voltage Stabilizer
Line Voltage Transformer✅(page17)
Uninterruptible Power Supply
Voltage Conditioner
8)Which option is not an input device?
Select one:
Scanner
Mouse
Keyboard
Monitor✅(page13)
9)Which option stops intruders tampering with your PC?
Select one:
Reset button
Caps lock
Safety lock
Key lock✅ (page45)
10) Which memory is used for holding data when a computer is switched on and running a program?
Select one:
Random Access Memory✅(page77)
Memory Cards
Solid State Drive
Read Only Memory
*Dehappy Ojor*
1) What device removes hot air from the system
Select one:
Turbo button
Battery
Fan✅(page55)
Freeze button
2) What is the function of the Turbo Button?
Select one:
Makes the computer boot faster
Allows the computer run at its fastest speed✅(page55)
Stops the computer from freezing
Tells the users when the is disk activity
3) Which option is NOT a special keyboard key?
Select one:
PRTN✅
CTRL
DEL
ALT
4)Which card controls the PC’s disk drive motors and transfers data?
Select one:
Video Card
Disk Drive Controller Card✅(page66)
Display Adapter Card
Memory Card Controller
5)Which option is not a major division of an intelligent computer keyboard?
Select one:
Function leys
Control key
Numeric keys
Memory keys✅(page13)
6) Which option is an advantage of using air conditioners when operating computers?
Select one:
Prevents dusts✅(page16)
Increases the temperature
Stabilises the voltage
Prevents fatigue
7)Which device is used to step-up or step-down voltage?
Select one:
Voltage Stabilizer
Line Voltage Transformer✅(page17)
Uninterruptible Power Supply
Voltage Conditioner
8)Which option is not an input device?
Select one:
Scanner
Mouse
Keyboard
Monitor✅(page13)
9)Which option stops intruders tampering with your PC?
Select one:
Reset button
Caps lock
Safety lock
Key lock✅ (page45)
10) Which memory is used for holding data when a computer is switched on and running a program?
Select one:
Random Access Memory✅(page77)
Memory Cards
Solid State Drive
Read Only Memory
Forwarded from Deleted Account
MTH 282 TMA 2 9/10
1.The dot product of MTH 282 TMA 2
1.The dot product of two vector s gives a/an _
Ans:Scalar
2.Evaluate (2i-j+3k)⋅(3i+2j−k)
Ans:1
3.Let a and b be two vectors with angle θ between them, the scalar product of the vectors can be expressed as
Ans: a.b = |a||b|cos0
4.Evaluate scalar product of j⋅k
Ans:0
5.When the product of two vectors is equal is zero, it is called
Ans:collinear
6.The scalar product obeys all except one of the following
Ans:a+(b+c)=(a+b)+c
7.The cross product of a vector to itself (a×a)give
Ans:0
8.When the product of two vector a and b is defined as a ⋅ b= 0 , then
Ans:a is perpendicular to b
9.Determine the value of x so that A = 2i+xj+k and B = 4i−2j−2k are perpendicular
Ans:2
10.Evaluate the cross product of j × k
Ans:i
*Note: number 9 answer is wrong so check very well while doing your own
1.The dot product of MTH 282 TMA 2
1.The dot product of two vector s gives a/an _
Ans:Scalar
2.Evaluate (2i-j+3k)⋅(3i+2j−k)
Ans:1
3.Let a and b be two vectors with angle θ between them, the scalar product of the vectors can be expressed as
Ans: a.b = |a||b|cos0
4.Evaluate scalar product of j⋅k
Ans:0
5.When the product of two vectors is equal is zero, it is called
Ans:collinear
6.The scalar product obeys all except one of the following
Ans:a+(b+c)=(a+b)+c
7.The cross product of a vector to itself (a×a)give
Ans:0
8.When the product of two vector a and b is defined as a ⋅ b= 0 , then
Ans:a is perpendicular to b
9.Determine the value of x so that A = 2i+xj+k and B = 4i−2j−2k are perpendicular
Ans:2
10.Evaluate the cross product of j × k
Ans:i
*Note: number 9 answer is wrong so check very well while doing your own
Forwarded from Genesis Kidin
BFN405 tma2 8/10
Fixed period
Farmers’ Ability to generate cashflows
Intermediate term loan
Unsecured loan
Instalment loan
Personal income
Agric loan
Payment
Charges
Long trem loan
Fixed period
Farmers’ Ability to generate cashflows
Intermediate term loan
Unsecured loan
Instalment loan
Personal income
Agric loan
Payment
Charges
Long trem loan
Forwarded from Deleted Account
PHS210 TMA2 9/10
COMPLETENESS ASSURED
CHILDREN LESSTHAN 2 YEARS
SPECIFICITY (negative result)
COMPRESS THE SIZE OF CHART
DOMESTIC VIOLENCE
TN/TN+FP (spec)
TP/TP+FN (sens)
RELIABILITY
DATUM
CONVOLUTED BAR CHART
phs210 TMA1 10/10
1.answered by the researcher
2.relative frequency..
3.aeronautic services
4.port financial records
5.birth registration
6.ambiguous
7.arithmetic
8.calliper
9.sum of all obersavation divided by d total of obersavation
10.descriptive
Phs 210 10/10
Poor financial record
Birth registration
Arithmetic
Sum of all observation divided
Descriptive
Digital scale
Answered by d researcher
Aeronotics services
Calliper
Ambiguous
COMPLETENESS ASSURED
CHILDREN LESSTHAN 2 YEARS
SPECIFICITY (negative result)
COMPRESS THE SIZE OF CHART
DOMESTIC VIOLENCE
TN/TN+FP (spec)
TP/TP+FN (sens)
RELIABILITY
DATUM
CONVOLUTED BAR CHART
phs210 TMA1 10/10
1.answered by the researcher
2.relative frequency..
3.aeronautic services
4.port financial records
5.birth registration
6.ambiguous
7.arithmetic
8.calliper
9.sum of all obersavation divided by d total of obersavation
10.descriptive
Phs 210 10/10
Poor financial record
Birth registration
Arithmetic
Sum of all observation divided
Descriptive
Digital scale
Answered by d researcher
Aeronotics services
Calliper
Ambiguous
Forwarded from Prof. Essien 🐾
CIT216 TMA 3
Which of the following options best describe generic methods?
(methods that introduce their own type parameters)
Which of the following options is a valid declaration of an object of class Student?
(Student person = new Student())
An array contains five the numbers 12,5,7,-1,2 to be sorted. If after the first iteration, the array is now 5,7,-1, 2, 12. Which algorithm is being used?
(Selection sort)
Which of the following best describe the functionality of a break statement?
(Break halts the execution and forces the control out of the loop)
...break statement is used to unconditionally jump out of the loop.
Given two positive polynomial functions f(n) and g(n) of different order where g(n)>f(n) then which of the following is true?
( g(n) = Θ ( f(n)+g(n) ) )
An array A[0..n-1] is sorted using the Insertion sort algorithm. The worst case and the best case running time of this computation respectively are
(O (n2) and O (n))
Which of the following loops will execute statements at least once, even when the condition is initially false. (do-while)
Which of the following sorting algorithm is not in place?
(Merge sort)
The process of evaluating the complexity of an algorithm by determining an expression of the number of steps needed as a function of the problem input size is called (time complexity)
Given a directed graph G with the set of edges E = { (1, 2), (2, 4), (4, 2) (4, 1)} what will be the set of edge of it transpose?
( E = { (2, 1), (4,2), (2, 4) (1,4)} )
Which of the following options best describe generic methods?
(methods that introduce their own type parameters)
Which of the following options is a valid declaration of an object of class Student?
(Student person = new Student())
An array contains five the numbers 12,5,7,-1,2 to be sorted. If after the first iteration, the array is now 5,7,-1, 2, 12. Which algorithm is being used?
(Selection sort)
Which of the following best describe the functionality of a break statement?
(Break halts the execution and forces the control out of the loop)
...break statement is used to unconditionally jump out of the loop.
Given two positive polynomial functions f(n) and g(n) of different order where g(n)>f(n) then which of the following is true?
( g(n) = Θ ( f(n)+g(n) ) )
An array A[0..n-1] is sorted using the Insertion sort algorithm. The worst case and the best case running time of this computation respectively are
(O (n2) and O (n))
Which of the following loops will execute statements at least once, even when the condition is initially false. (do-while)
Which of the following sorting algorithm is not in place?
(Merge sort)
The process of evaluating the complexity of an algorithm by determining an expression of the number of steps needed as a function of the problem input size is called (time complexity)
Given a directed graph G with the set of edges E = { (1, 2), (2, 4), (4, 2) (4, 1)} what will be the set of edge of it transpose?
( E = { (2, 1), (4,2), (2, 4) (1,4)} )
Forwarded from Prof. Essien 🐾
[4/15, 4:24 AM] +234 708 419 8356: CIT315 TMA 3 (9/10)
The method of dividing memory into independent address space is called (segmentation)
Dynamic partitioning causes (External fragmentation)
A solution to the producers – consumers problem must satisfy the following conditions except (A producer must overwrite a full buffer)
The technique that describes where a process A of size 678k to be executed but first loaded into the main memory and the available size of the main memory is 295k so process A is swapped onto the disk and parts that needs to be used currently are swapped into the main memory and swapped out of the main memory upon completion till process A is completely executed
(Virtual memory)
This phenomenon, in which there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition. (Internal fragmentation)
When can we say we have a cache hit? (When we need to read value of a certain memory location and we find it in the cache)
What is swapping in memory management
(A technique used to temporarily remove the inactive programs from the main memory of the computer system)
The technique that is similar to paging system with swapping where processes reside in secondary memory and pages are loaded only on demand not in advance is (Demand Paging)
One of these is not an advantage of Semaphores (Semaphores may lead to a priority inversion)
When does a page fault happen? (When an executed program access a memory page that is mapped into the virtual address space, but not loaded in physical memory)
[4/15, 4:26 AM] +234 708 419 8356: CIT342 TMA3 9/10
The following grammar G = ( {s}, {a,b}, s, s --> asb|bsa|ss|_ generates strings having
equal numbers of a\'s and b\'s
Which of the following statements are true? Statement 1 : Initial state of NFA is initial state of DFA. Statement 2 : The final state of DFA will be every combination of final state of NFA.
statement 1 is true and statement 2 is true
Pop operation on a stack indicates _.
removal of elements
Compare the computational power of DFA and NFA
equal
A push down automata can be represented using .
all of the options
Concatenating the empty set to any set yields {1*_ = _ }
1
Given the alphabet _ = {0,1} { w|w contains the string 001 as a substring} is _
_*001_*
Every state of a DFA always has exactly _ existing transition arrow for each symbol in the alphabet.
1
Which of the following is correct proposition? Statement 1 : Non determination is a generalisation of determinism. Statement 2 : Every DFA is automatically an NFA.
statement 2 is correct because statement 1 is correct
A grammar is ambiguous, if it is possible to generate __ syntax trees for an expression.
two different
The method of dividing memory into independent address space is called (segmentation)
Dynamic partitioning causes (External fragmentation)
A solution to the producers – consumers problem must satisfy the following conditions except (A producer must overwrite a full buffer)
The technique that describes where a process A of size 678k to be executed but first loaded into the main memory and the available size of the main memory is 295k so process A is swapped onto the disk and parts that needs to be used currently are swapped into the main memory and swapped out of the main memory upon completion till process A is completely executed
(Virtual memory)
This phenomenon, in which there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition. (Internal fragmentation)
When can we say we have a cache hit? (When we need to read value of a certain memory location and we find it in the cache)
What is swapping in memory management
(A technique used to temporarily remove the inactive programs from the main memory of the computer system)
The technique that is similar to paging system with swapping where processes reside in secondary memory and pages are loaded only on demand not in advance is (Demand Paging)
One of these is not an advantage of Semaphores (Semaphores may lead to a priority inversion)
When does a page fault happen? (When an executed program access a memory page that is mapped into the virtual address space, but not loaded in physical memory)
[4/15, 4:26 AM] +234 708 419 8356: CIT342 TMA3 9/10
The following grammar G = ( {s}, {a,b}, s, s --> asb|bsa|ss|_ generates strings having
equal numbers of a\'s and b\'s
Which of the following statements are true? Statement 1 : Initial state of NFA is initial state of DFA. Statement 2 : The final state of DFA will be every combination of final state of NFA.
statement 1 is true and statement 2 is true
Pop operation on a stack indicates _.
removal of elements
Compare the computational power of DFA and NFA
equal
A push down automata can be represented using .
all of the options
Concatenating the empty set to any set yields {1*_ = _ }
1
Given the alphabet _ = {0,1} { w|w contains the string 001 as a substring} is _
_*001_*
Every state of a DFA always has exactly _ existing transition arrow for each symbol in the alphabet.
1
Which of the following is correct proposition? Statement 1 : Non determination is a generalisation of determinism. Statement 2 : Every DFA is automatically an NFA.
statement 2 is correct because statement 1 is correct
A grammar is ambiguous, if it is possible to generate __ syntax trees for an expression.
two different
Forwarded from Prof. Essien 🐾
CIT 423 TMA 1
In a ______ topology, one long cable acts as a backbone to link all the devices in the network.
answ: Bus
__ layer of the OSI model is responsible for end-to-end delivery.
ans:The Data Link Layer
How many layers is present in TCP/IP reference mode
ans: 4 layers
_network is a relatively smaller and privately owned network with maximum span of 10km
ans: LAN
The main tasks of the session layer are to provide _____ except.
ans:end-to-end delivery
____ network topology has a central controller
ans:Star Topology
What is the full meaning of OSI?
ans:Open System Interconnection
Which of the following is an application of Computer Network?
ans:Resource sharing
The LANs are distinguished from other kinds of networks by three characteristics except
ans:Function
How many layers is present in OSI reference model?
ans:7 layers
CIT423 TMA2
ATM uses fixed length packets, called
ANS: CELL
Frame relay uses variable length packets called
ans: frame
In a _____ topology, every device has a dedicated point to point link to every other device.
ans:mesh
Bridges work at the ____________of the OSI model.
ans:Data Link Layer
What is the full meaning of ATM?
ans:Asynchronous Transfer Mode
Network is defined as less than 50km and provides regional connectivity?
ans:Metropolitan Area Network (MAN)
_are needed to amplify the weakened signal.
ans:Repeaters
Which device incorporates bridge functions as well as point– to–point dedicated connections.
ans:Switch
The following devices operate at the OSI Model Physical Layer except
ans:Router
_was developed to take advantage of these high data rates and low error rates
ans: frame relay
In a ______ topology, one long cable acts as a backbone to link all the devices in the network.
answ: Bus
__ layer of the OSI model is responsible for end-to-end delivery.
ans:The Data Link Layer
How many layers is present in TCP/IP reference mode
ans: 4 layers
_network is a relatively smaller and privately owned network with maximum span of 10km
ans: LAN
The main tasks of the session layer are to provide _____ except.
ans:end-to-end delivery
____ network topology has a central controller
ans:Star Topology
What is the full meaning of OSI?
ans:Open System Interconnection
Which of the following is an application of Computer Network?
ans:Resource sharing
The LANs are distinguished from other kinds of networks by three characteristics except
ans:Function
How many layers is present in OSI reference model?
ans:7 layers
CIT423 TMA2
ATM uses fixed length packets, called
ANS: CELL
Frame relay uses variable length packets called
ans: frame
In a _____ topology, every device has a dedicated point to point link to every other device.
ans:mesh
Bridges work at the ____________of the OSI model.
ans:Data Link Layer
What is the full meaning of ATM?
ans:Asynchronous Transfer Mode
Network is defined as less than 50km and provides regional connectivity?
ans:Metropolitan Area Network (MAN)
_are needed to amplify the weakened signal.
ans:Repeaters
Which device incorporates bridge functions as well as point– to–point dedicated connections.
ans:Switch
The following devices operate at the OSI Model Physical Layer except
ans:Router
_was developed to take advantage of these high data rates and low error rates
ans: frame relay
Forwarded from Prof. Essien 🐾
cit411 tma 3 Solved by Jeminem 10/10
The types of Microprocessor are discussed based on two classification criteria: (i)hardware characteristics (ii)software characteristics (iii)characteristics of application areas
I and III
use the order of precedency to execute: 2*4+3=
11
………… instruction: Move immediate data value 80h to register R2
MOVR2, #80h R2
The assembly level instructions include the following except __
Given instructions
some event that interject normal program execution is called ________
interrupt
A group of binary pattern designed inside a microprocessor to perform a specific function called __
Instructions set
here are some of the basic uses for microprocessors except ___
Red Time Applications
arrange the following assembly operators in the order of precedency: (i)AND (ii)* (iii)() (iv)-
III,ii,iv and I
copying of data from a location called a source to another location called a destination without modifying the contents of the source is called __
Data transfer
………… instruction: Subtract the number in RAM location 58h and the C flag
Add A #25H
The types of Microprocessor are discussed based on two classification criteria: (i)hardware characteristics (ii)software characteristics (iii)characteristics of application areas
I and III
use the order of precedency to execute: 2*4+3=
11
………… instruction: Move immediate data value 80h to register R2
MOVR2, #80h R2
The assembly level instructions include the following except __
Given instructions
some event that interject normal program execution is called ________
interrupt
A group of binary pattern designed inside a microprocessor to perform a specific function called __
Instructions set
here are some of the basic uses for microprocessors except ___
Red Time Applications
arrange the following assembly operators in the order of precedency: (i)AND (ii)* (iii)() (iv)-
III,ii,iv and I
copying of data from a location called a source to another location called a destination without modifying the contents of the source is called __
Data transfer
………… instruction: Subtract the number in RAM location 58h and the C flag
Add A #25H
Forwarded from Prof. Essien 🐾
CIT425 TMA3 SOLVED BY Jeminem 10/10
1. The task Minimize Z is the same as
- (maximize(-Z))
2. The acronym CPM stands for
Critical Path Method
3. Which of the following techniques can used to find solution for optimizing a given objective under certain constraints?
Linear Programming
4. In a project management situation, the critical path method (CPM ) uses a _ network model in which the durations of the activities are assumed to be known for certain
deterministic
5. Operations research is an approach to the analysis of operations that may adopt any of the following except:
A Partisan attitude
6. The Scientific method of solving management problems inlvolves each of the following except
induction
7. What is the name given to the bounded region in a graphical representation of an LP problem?
Feasible solution
8. The Program Evaluation and Review Technique (PERT) uses a model that incorporates some distribution of the durations.
probability
9. Who defines Operations research as “the attack of modern science on complex problems, arising in the direction and management of large systems of men, machines, materials and money in industry, business, government and defence”?
The council of the United Kingdom Operational Research Society
10. _ can be regarded as a scientific approach to the analysis and solution of management problem
Operational Research
1. The task Minimize Z is the same as
- (maximize(-Z))
2. The acronym CPM stands for
Critical Path Method
3. Which of the following techniques can used to find solution for optimizing a given objective under certain constraints?
Linear Programming
4. In a project management situation, the critical path method (CPM ) uses a _ network model in which the durations of the activities are assumed to be known for certain
deterministic
5. Operations research is an approach to the analysis of operations that may adopt any of the following except:
A Partisan attitude
6. The Scientific method of solving management problems inlvolves each of the following except
induction
7. What is the name given to the bounded region in a graphical representation of an LP problem?
Feasible solution
8. The Program Evaluation and Review Technique (PERT) uses a model that incorporates some distribution of the durations.
probability
9. Who defines Operations research as “the attack of modern science on complex problems, arising in the direction and management of large systems of men, machines, materials and money in industry, business, government and defence”?
The council of the United Kingdom Operational Research Society
10. _ can be regarded as a scientific approach to the analysis and solution of management problem
Operational Research
Forwarded from Prof. Essien 🐾
CIT 401 TMA 3 10/10 BY JEMINEM
1) (Q: Is not a property/characteristic of a Data types)
hold different kind and types of data within one single object
2) (Q: The Following except ___ are runtime errors)
Wrong result
3) (Q: What is the data type of the variables ‘d’ in the given code snippet?)
String
4) (Q: The following except __ are compile time errors)
Division by zero
5: (Q: ____ is an error that occurs when a program crashes or produces a wrong output)
Runtime Errors
6) (Q: What is the data type of the variables ‘c’ in the given code snippet?)
character
7) (Q: __ is not a properties of a red-black tree)
Each node should not be red
8) (Q: Data structures can be grouped into the following four forms except _)
Picture
9) (Q: __ is a data type that is defined by its behaviour)
Abstract
10) (Q: The semantics of a programming language is the meaning of the following except __)
Result
1) (Q: Is not a property/characteristic of a Data types)
hold different kind and types of data within one single object
2) (Q: The Following except ___ are runtime errors)
Wrong result
3) (Q: What is the data type of the variables ‘d’ in the given code snippet?)
String
4) (Q: The following except __ are compile time errors)
Division by zero
5: (Q: ____ is an error that occurs when a program crashes or produces a wrong output)
Runtime Errors
6) (Q: What is the data type of the variables ‘c’ in the given code snippet?)
character
7) (Q: __ is not a properties of a red-black tree)
Each node should not be red
8) (Q: Data structures can be grouped into the following four forms except _)
Picture
9) (Q: __ is a data type that is defined by its behaviour)
Abstract
10) (Q: The semantics of a programming language is the meaning of the following except __)
Result