1. What algorithm is used to calculate the shortest path between two vertices im a graph? Select the correct Options: A. Breadth First Search B. Depth First Search C. Dijkstra's shortest path algorithm D. All of the above 2. long foo (long n, P long r) if (n > 0):     return (n * r++ #2 == 0 ? foo(n / r + 1, r + 1) : foo(n * (r + 1), r)) else:     return 0 What is the r value in the 10th recursive call of function foo(123456, 2)? (Obviously r is 2 in the first call) a) 15

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

PLEASE SUBMIT THE CORRECT OPTION IF YOU DON'T KNOW THE CORRECT OPTION SKIP THE QUESTION, IF YOU GIVE THE INCORRECT SOLUTION I WILL DOWNVOTE IT AND GIVE SOLUTION TO ALL THE QUESTION DO NOT FORGET ANY QUESTION...THANKS!

1. What algorithm is used to calculate the shortest path between two vertices im a graph? Select the correct Options:

A. Breadth First Search

B. Depth First Search

C. Dijkstra's shortest path algorithm

D. All of the above

2. long foo (long n, P long r)

if (n > 0):
    return (n * r++ #2 == 0 ? foo(n / r + 1, r + 1) : foo(n * (r + 1), r))
else:
    return 0

What is the r value in the 10th recursive call of function foo(123456, 2)? (Obviously r is 2 in the first call)

a) 15

b) recursion ends before 15th recursive call

c)10

d)16

3. What is the cost-benefit analysis (CBA) of implementing a firewall that costs $5,000 and has a 90% effectiveness in mitigating a semi-annual threat, which results in an incident cost of $1,000 per occurrence? Select the correct options: A. 3200

B. -3200

C. 3210

D. None of the above

4. Which one of the following correct options:

A. Lifecycle methods will not run when a component is modified and altered.

B. Lifecycle methods in react JS is for the entire project rather than for each component.

C. React contained both controlled and uncontrolled components.

D. A and C.

5. Alice uses a digital signature(DS) to communicate with Bob for authentication and integrity. Bob claims to have received a message in clear text, "Transfer $1432 to Peter," with a valid digital signature from Alice. Alice denies sending the message. The digital signature proves that Alice must have created the message. Select the correct Option:

A. True

B. False

6. What will be the return value of function call foo (n, n) for the following recursive function foo ()? Assume that the variable n is initialized to 4 before function call.

int foo(int& p, int q) {
    int I = 9;
    I = g - 1;
    if (q == 0)
        return 1;
    p = p + 1;
    return foo(p, q) * p;
}

Select the correct option:

A. 44

B. 343

C. 24

D. 434

7. 

Determine the independent parameters which are required for this given network.
H
U
Select the correct options:
A. 4
B. 16
C. 8
D. 2
P
W
Transcribed Image Text:Determine the independent parameters which are required for this given network. H U Select the correct options: A. 4 B. 16 C. 8 D. 2 P W
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Approximation Algorithms
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education