Options: a. Is dependent on the amount of text within the table b. Is determined by the presentation design but can be changed c. Is determined by the presentation design and cannot be changed d. a and c
Options: (A)A class of learning algorithms that try to derive a Prolog program from examples (B) A table with n independent attributes can be seen as an n- dimensional space (C) A prediction made using an extremely simple method, such as always predicting the same output. (D) None of these 6
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1
7.By principle of locality, in least recently used policy, in memory management
Options: (A)The page replaced in memory is least likely to be referenced in the near future. (B) The page replaced in memory is most likely to be referenced in the near future. (C) The pages replaced in memory in round-robin fashion. (D) None of these. 10
1.In multi processor scheduling; A: Gang scheduling, B: Dynamic scheduling, C: Dedicated processor management.; 1- The number of threads in a process can be altered during the course of execution. 2This provides implicit scheduling defined by the assignment of threads to processors, 3It is applied to the simultaneous scheduling of threads that make up a single process.
Options: (A)A â€“ 1, B â€“ 2, C â€“ 3 (B) A â€“ 2, B â€“ 1, C â€“ 3 (C) A â€“ 1, B â€“ 3, C â€“ 2 (D) A â€“ 3, B â€“ 1, C â€“ 1 | 69 8