Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

SIKSHAPATH

SIKSHAPATH Logo SIKSHAPATH Logo

SIKSHAPATH Navigation

  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Home/Comments/Page 8
  1. Asked: October 23, 2022In: Data Structure

    Analyse the algorithm (in terms of both time and space) …

    58n25709
    58n25709
    Added an answer on January 30, 2023 at 10:11 am

    The time complexity of the subset sum problem using dynamic programming technique is O(nW), where n is the number of items and W is the target sum. The space complexity is O(nW). The most time-consuming part of the algorithm is the bottom-up dynamic programming loop, where each cell in the n x W matRead more

    The time complexity of the subset sum problem using dynamic programming technique is O(nW), where n is the number of items and W is the target sum. The space complexity is O(nW).

    The most time-consuming part of the algorithm is the bottom-up dynamic programming loop, where each cell in the n x W matrix is filled in. This loop takes O(nW) time in total.

    The most space-consuming part of the algorithm is the n x W matrix itself, which requires O(nW) space to store the results of the dynamic programming.

    Overall, both the time and space complexity are directly proportional to the size of the n x W matrix, making the dynamic programming solution to the subset sum problem an exponential-time algorithm.

    See less
      • 0
    • Share
      Share
      • Share on WhatsApp
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
  2. Asked: October 23, 2022In: Data Structure

    A networking company uses a compression technique to encode the …

    58n25709
    58n25709
    Added an answer on January 30, 2023 at 10:09 am
    This answer was edited.

    Total number of characters in the message = 100. Each character takes 1 byte. So total number of bits needed = 800. After Huffman Coding, the characters can be represented with: f: 0 c: 100 d: 101 a: 1100 b: 1101 e: 111 Total number of bits needed = 224 Hence, number of bits saved = 800 - 224 = 576Read more

    Total number of characters in the message = 100. 
    Each character takes 1 byte. So total number of bits needed = 800.
    
    After Huffman Coding, the characters can be represented with:
    f: 0
    c: 100
    d: 101
    a: 1100
    b: 1101
    e: 111
    Total number of bits needed = 224
    Hence, number of bits saved = 800 - 224 = 576
    
    Huffman Coding | Greedy Algo-3 - GeeksforGeeks
    See less
      • 0
    • Share
      Share
      • Share on WhatsApp
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
  3. Asked: June 1, 2023In: C language

    What is a set of instructions used to perform some tasks?

    ADMIN 2
    Best Answer
    ADMIN 2
    Added an answer on January 20, 2023 at 2:34 am
    This answer was edited.

    The set of instructions that are used to perform a specific task is referred to as program, or software program. A program can be created using various programming languages, such as C, Java, Python, etc. A program contains statements that specify the logic and data of the task. Before a program canRead more

    The set of instructions that are used to perform a specific task is referred to as program, or software program.

    A program can be created using various programming languages, such as C, Java, Python, etc.

    A program contains statements that specify the logic and data of the task.

    Before a program can run on a computer, it has to be either compiled or interpreted.

    A program can also communicate with other programs and hardware devices using input and output operations.

    See less
      • 0
    • Share
      Share
      • Share on WhatsApp
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
  4. Asked: January 8, 2023In: DBMS

    DBMS QUESTION LATEST 2023

    I'M ADMIN
    I'M ADMIN
    Added an answer on January 8, 2023 at 4:00 pm

    1.What is a database? a) Organized collection of information that cannot be accessed, updated, and managed b) Collection of data or information without organizing c) Organized collection of data or information that can be accessed, updated, and managed d) Organized collection of data that cannot beRead more

    1.What is a database?
    a) Organized collection of information that cannot be accessed, updated, and managed
    b) Collection of data or information without organizing
    c) Organized collection of data or information that can be accessed, updated, and managed
    d) Organized collection of data that cannot be updated

     

    2.What is DBMS?
    a) DBMS is a collection of queries
    b) DBMS is a high-level language
    c) DBMS is a programming language
    d) DBMS stores, modifies and retrieves data

     

    3.Who created the first DBMS?
    a) Edgar Frank Codd
    b) Charles Bachman
    c) Charles Babbage
    d) Sharon B. Codd

     

    4.Which type of data can be stored in the database?
    a) Image oriented data
    b) Text, files containing data
    c) Data in the form of audio or video
    d) All of the above

     

     

    5.Which of the following is not a type of database?
    a) Hierarchical
    b) Network
    c) Distributed
    d) Decentralized

     

    6.Which of the following is not an example of DBMS?
    a) MySQL
    b) Microsoft Acess
    c) IBM DB2
    d) Google

     

    7.Which of the following is a feature of DBMS?
    a) Minimum Duplication and Redundancy of Data
    b) High Level of Security
    c) Single-user Access only
    d) Support ACID Property

     

    8.Which of the following is known as a set of entities of the same type that share same properties, or attributes?
    a) Relation set
    b) Tuples
    c) Entity set
    d) Entity Relation model

     

    9.What is information about data called?
    a) Hyper data
    b) Tera data
    c) Meta data
    d) Relations

     

    10.What does an RDBMS consist of?
    a) Collection of Records
    b) Collection of Keys
    c) Collection of Tables
    d) Collection of Fields

     

     11.The values appearing in given attributes of any tuple in the referencing relation must likewise occur in specified attributes of at least one tuple in the referenced relation, according to _____________________ integrity constraint.
    a) Referential
    b) Primary
    c) Referencing
    d) Specific

     

     

    12._____________ is a hardware component that is most important for the operation of a database management system.
    a) Microphone
    b) High speed, large capacity disk to store data
    c) High-resolution video display
    d) Printer

     

     

    13.The DBMS acts as an interface between ________________ and ________________ of an enterprise-class system.
    a) Data and the DBMS
    b) Application and SQL
    c) Database application and the database
    d) The user and the software

     

    14.______________ is a set of one or more attributes taken collectively to uniquely identify a record.
    a) Primary Key
    b) Foreign key
    c) Super key
    d) Candidate key

     

    15.Which of the following set should be associated with weak entity set for weak entity to be meaningful?
    a) Neighbour set
    b) Strong entity set
    c) Owner set
    d) Identifying set

     

    16.Which forms have a relation that contains information about a single entity?
    a) 4NF
    b) 2NF
    c) 5NF
    d) 3NF

     

    17.The top level of the hierarchy consists of ______ each of which can contain _____.
    a) Schemas, Catalogs
    b) Schemas, Environment
    c) Environment, Schemas
    d) Catalogs, Schemas

     

    18._______ indicates the maximum number of entities that can be involved in a relationship.
    a) Greater Entity Count
    b) Minimum cardinality
    c) Maximum cardinality
    d) ERD

     

    19.The user IDs can be added or removed using which of the following fixed roles?
    a) db_sysadmin
    b) db_accessadmin
    c) db_securityadmin
    d) db_setupadmin

     

     

    20.Why the following statement is erroneous?

    SELECTdept_name, ID,avg(salary)

    FROM instructor

    GROUPBYdept_name;

    1. a) Dept_id should not be used in group by clause
      b) Group by clause is not valid in this query
      c) Avg(salary) should not be selected
      d) None

     

    21.Which of the following is not the utility of DBMS?
    i) Backup ii) Loading iii) Process Organization iv) File organization
    a) i, ii, and iv only
    b) i, ii and iii only
    c) i, iii and iv only
    d) All i, ii, iii, and iv

     

    22.What is the function of the following command?

    Delete from r where P;

    1. a) Clears entries from relation
      b) Deletes relation
      c) Deletes particular tuple from relation
      d) All of the mentioned

     

    23.Which of the following is popular for applications such as storage of log files in a database management system since it offers the best write performance?
    a) RAID level 0
    b) RAID level 1
    c) RAID level 2
    d) RAID level 3

     

    24.Which of the following represents a query in the tuple relational calculus?
    a) { }{P(t) | t }
    b) {t | P(t)}
    c) t | P() | t
    d) All of the mentioned

     

     

    25.Evaluate the statements issued by the DBA in the given sequence if OE and SCOTT are the users and the ORDERS table is owned by OE.

    CREATEROLE r1;GRANTSELECT,INSERTONoe. orders TO r1;GRANT r1 TOscott;GRANTSELECTONoe. orders TOscott;REVOKESELECTONoe.ordersFROMscott;

    What would be the outcome after executing the statements?
    a) The REVOKE statement would give an error because the SELECT privilege has been granted to the role R1
    b) The REVOKE statement would remove the SELECT privilege from SCOTT as well as from the role R1
    c) SCOTT would be able to query the OE.ORDERS table
    d) SCOTT would not be able to query the OE.ORDERS table

    See less
      • 1
    • Share
      Share
      • Share on WhatsApp
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
  5. Asked: November 12, 2022In: University

    Web and Mobile  Security worksheet All worksheet 1 to 10

    JonSnow07
    JonSnow07
    Added an answer on November 12, 2022 at 1:24 pm
    This answer was edited.

    Click on the below drive link to download the file: https://drive.google.com/uc?export=download&id=1OlrSLOJhdFXHicWRrHQELoaa-Sf0Cu97

    Click on the below drive link to download the file:

    https://drive.google.com/uc?export=download&id=1OlrSLOJhdFXHicWRrHQELoaa-Sf0Cu97

    See less
      • 0
    • Share
      Share
      • Share on WhatsApp
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
  6. Asked: November 9, 2022In: Java

    Create a student class object array of size four having …

    I'M ADMIN
    I'M ADMIN
    Added an answer on November 10, 2022 at 7:18 pm

    Follow the below link for answer:   https://sikshapath.in/question/create-a-student-class-object-array-of-size-four-having-attributes-name-java-programming-language/

    Follow the below link for answer:

     

    Create a student class object array of size four having attributes name-Java programming language

    See less
      • 0
    • Share
      Share
      • Share on WhatsApp
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
1 … 6 7 8 9 10 … 194

Sidebar

store ads

Stats

  • Questions 1k
  • Answers 1k
  • Posts 149
  • Best Answers 89
  • This Free AI Tool Translates Entire Books in Minute !
  • AI News: 🎬 Hollywood’s AI Studios, 🎓 OpenAI’s Latest Gift to Educators, 🚚 Class8 Bags $22M, 🧠 Google Gemini’s Memory Upgrade
  • AI NEWS: Legal Action Against OpenAI, $16M Paid, & Elon Musk’s Praise from Investor 🤖💰📑 | AI Boosts Cloud Seeding for Water Security 🌱💧
  • AI News: 🎬AI Video Tool Scam Exposed🤯, 🛰️ AI-Powered Drones to Ukraine 😱, Google’s $20M AI Push, Sam Altman Joins SF’s Leadership Team
  • AI News: 🤝 Biden Meets Xi on AI Talks, 💡 Xavier Niel’s Advice for Europe, ♻️ Hong Kong’s Smart Bin Revolution, 🚀 AI x Huawei

Explore

  • Recent Questions
  • Questions For You
  • Answers With Time
  • Most Visited
  • New Questions
  • Recent Questions With Time

Footer

SIKSHAPATH

Helpful Links

  • Contact
  • Disclaimer
  • Privacy Policy Notice
  • TERMS OF USE
  • FAQs
  • Refund/Cancellation Policy
  • Delivery Policy for Sikshapath

Follow Us

© 2021-24 Sikshapath. All Rights Reserved