Question 1 2 Points Given f(x,y)= 8xy, when 0<=x<=1, 0<=y<=x and f(x,y)=0 elsewhere, find (i) Marginal density of x (ii) Marginal density of y (iii) Conditional density of x (iv) Conditional density of y Question 2 2 Points Calculate the regression coefficients from the following : x: 1 2 3 4 5 6 7 8 y: 3 7 10 12 14 17 20 24 Question 3 2 Points Compute the ...Read more
SIKSHAPATH Latest Questions
Q1.Consider the following code for Class Activation Maps. Which layer(s) of the model do we choose as outputs to draw out the class activation map ? Check all that apply. The layer which performs concatenation in the model The layer which feeds ...Read more
Write a short note on the following: a)Sizeoriented metrics and b)Functionoriented metrics How these two metrics are different from each other? Explain by captivating a suitable example.
Create a network that implement the FTP server
IF the system recovers from a crash, it constructs an undo-list and a redo-list. Explain why log records for transactions on the undo-list must be processed in reverse order while those log records for transactions on the redo-list are processed ...Read more
List and describe in detail any four power management tools that were developed by at least two manufacturers to prevent and/or reduce the damage of processors from the process of overclocking. Your answer must also include the manufacturers name(s)
Indicate and analyse the status of each flag when microprocessor perform the following operation:- i) 96H + FFH ii) C1 H + 33 H iii) D1 H + 32 H
“I think that tastes, odors, colors, and so on are no more than mere names so far as the object in which we locate them are concerned, and that they reside in consciousness. Hence if the living creature were removed, ...Read more
Which of the following were devised to test whether a machine is intelligent? Select the correct answers. A. Rorschach Test B. Loebner Prize C. Turing Test D. Winograd Schemas
Which of the following Metasploit module can be used for vulnerability scanning and brute force attack? a. Encoder b. Payload c. Exploit d. Auxiliary