Professional Documents
Culture Documents
CST 308-Comprehensive Course Work Question Bank.docx[1]
CST 308-Comprehensive Course Work Question Bank.docx[1]
Question Bank
3 let X and Y be the sets.Then the set (X-Y) union (Y-X) union (X
intersection Y) is equal to
A)X union Y A)X union Y
B)Xc union Yc
C)X intersection Y
D)Xc intersection Yc
4 Pushing an element into stack already having 5 elements and stack Overflow
size of 5,then stack becomes
a) Overflow
b) Crash
c) underflow
d) user flow
5 If X and Y be the sets. Then the set ( X - Y) union (Y- X) union (X A) X union Y
intersection Y ) is equal to?
A) X union Y
B) Xc union Yc
C) X intersection Y
D) Xc intersection Yc
11
a) (S, ∗) is a semigroup
b) * is distributive over +.
c) Both
d) None of the above
16 Let A and B be any two arbitrary events then which one of the
following is true ?
P( A intersection B) = P(A). P(B)
P(A union B) = P(A) + P(B)
P(AB) = P(A intersection B). P(B)
P(A union B) >= P(A) + P(B)
Answer = D
21 The set O of odd positive integers less than 10 can be expressed by B)Odd numbers less
_____________ than 10 is {1, 3, 5, 7, 9}.
a) {1, 2, 3}
b) {1, 3, 5, 7, 9}
c) {1, 2, 5, 9}
d) {1, 5, 7, 9, 11}
28 Let R be a symmetric and transitive relation on a set A. Then, d) None of the above
30 c) Infinite set
If x is a set and the set contains the real number between 1 and 2,
then the set is ________. Explanation: X is an
infinite set as there are
infinitely many real
a. Empty set
numbers between 1 and
2
b. Finite set
c. Infinite set
34 Probability that two randomly selected cards from a set of two red
and two black cards are of same color is ?
1/2
1/3
2/3
None of these
35 Which among the following can be taken as the discrete object? d) All of the
A)People mentioned
b) Rational numbers
c) Integers
d) All of the mentioned
37 The binary relation {(1,1), (2,1), (2,2), (2,3), (2,4), (3,1), (3,2)} on the C
set {1, 2, 3} is __________
a) reflective, symmetric and transitive
b) irreflexive, symmetric and transitive
c) neither reflective, nor irreflexive but transitive
d) irreflexive and antisymmetric
40
A) 3
B) 6
C) 8
D)12
A) One
B) Two
C) Zero
D) Three
48 Let P: This is a great website, Q: You should not come back here. Answer:
Then ‘This is a great website and you should come back here.’ is b
best represented by?
a) ~P V ~Q
b) P ∧ ~Q
c) P V Q
d) P ∧ Q
49
50 Let N be the set of natural numbers. Consider the following sets. Answer:
P: Set of Rational numbers (positive and negative) D
Q: Set of functions from {0, 1} to N
R: Set of functions from N to {0, 1}
S: Set of finite subsets of N.
Which of the sets above are countable?
(A) Q and S only (B) P and S only (C) P and R only (D) P, Q and S
only
1.(R1 ∩ R2) → R1 or R1 ∩ R2 → R2
2.R1 ∩ R2 → R1
3.R1 ∩ R2 → R1
4.R1 ∩ R2 → R1 and R1 ∩ R2 → R2
(A) Relation
(B) Function
(C) Set
(D) Proposition
54 What is the cardinality of the set of odd positive integers less than (B)5
10?
a) 10
b) 5
c) 3
d) 20
56 The set of positive integers under the operation of ordinary D.an Abelian group
multiplication is:
A.not a monoid
B.not a group
C.a group
D.an Abelian group
57 What is the Cardinality of the Power set of the set {0, 1, 2}? 8
a) 8
b) 6
c) 7
d) 9
Sub: 2. Data Structures
2 Which data structure is required to convert the infix to prefix notation? A) Stack
A) Stack B) linked list C) binary tree D) queue
5 One can convert a binary tree to its mirror image by traversing it in C) postorder
A) Inorder
B) Preorder
C) Postorder
D) None of the above
6 Visiting root node after visiting left and right sub-trees is called C) post order
traversal
A - In-order Traversal Explanation:
In Post-order
B - Pre-order Traversal traversal method,
the root node is
C - Post-order Traveral visited last, hence the
name.
10 1. Merge sort uses which of the following technique to implement c) divide and
sorting? conquer
a) backtracking
b) greedy algorithm
c) divide and conquer
d) dynamic programming
11 Consider the following C code. Assume that unsigned long int type (B)
length is 64 bits.
unsigned long int fun(unsigned long int n)
{ unsigned long int i, j = 0, sum = 0;
for (i = n; i > 1; i = i/2)
j++;
for ( ; j > 1; j = j/2)
sum++;
return(sum); }
The value returned when we call fun with the input 2 40 is (A) 4 (B) 5
(C) 6 (D) 40
14 Using division method, in a given hash table of size 157, the key of value c) 15
172 be placed at position
a) 19 Using formula
b) 72 H(k)= k mod m
c) 15 H(k)= 172 mod 157
d) 17 H(k)= 15
a) O(n logn)
b) On3
c) On
d) On2
A - Insertion Sort
B - Merge Sort
C - Shell Sort
D - Heap Sort
Answer : B
17 ______ is a pile in which items are added at one end and removed from B)Queue
the other.
A) List
B) Queue
C) Stack
D) Array
18 A linear collection of data elements where the linear node is given a) Linked list
by means of pointer is called?
a) Linked list
b) Node list
c) Primitive list
d) Unordered list
a) AB+CD+∗F/D+E∗
b) ABCD+∗F/DE∗++
c) A∗B+CD/F∗DE++
d) A+∗BCD/F∗DE++
21 If the size of the stack is 10 and we try to add the 11th element in the C
stack then the condition is known as___
A)Underflow
B)Garbage collection
C)Overflow
D)None of the above
22 Out of the following tree structure which is efficient considering space b)Complete binary
and time complexities. tree
a)Incomplete binary tree
b)Complete binary tree
c)Full binary tree
23 Minimum number of fields in each node of a doubly linked list is ____ b)3
(A) 2
(B) 3
(C) 4
24 If the array is already sorted, which of these algorithms will exhibit the B
best performance
Explanation:
A - Merge Sort Insertion sort, as it
should then work in
B - Insertion Sort linear way.
C - Quick Sort
D - Heap Sort
26 D
What is the value of postfix expression 6324+-* Something between
A)Something between - 5 and 15 15 and 100
B)Something between 5 and - 5
C)Something between 5 and 15
D)Something between 15 and 100
27 The answer is (a)
What is the output of the below code? because the
indexing in an
#include <stdio.h> array starts from
int main() 0, so it starts
{ from arr[0] to
int arr[5]={10,20,30,40,50}; arr[4]. If we try
printf("%d", arr[5]); to access arr[5]
then the garbage
return 0; value will be
} printed.
a. Garbage value
b. 10
c. 50
d. None of the above
28 Which of the following is not the operation that can be performed on d) Traversal
queue?
a) Insertion
b) Deletion
c) Retrieval
d) Traversal
29 One can convert a binary tree to its mirror image by traversing it in C) postorder
E) Inorder
F) Preorder
G) Postorder
H) None of the above
30 Which is the type of data structure where each node can have at most a) Binary Tree
two children ?
a) Binary Tree
b) Graph
c) Linked List
d) Array
31 Which of the following is not true about comparison based sorting D)Heap Sort is not a
algorithms? comparison based
A)The minimum possible time complexity of a comparison based sorting algorithm
sorting algorithm is O(nLogn) for a random input array
B)Any comparison based sorting algorithm can be made stable by
using position as a criteria when two elements are compared
C)Counting Sort is not a comparison based sorting algortihm
D)Heap Sort is not a comparison based sorting algorithm
33 Which data structure is mainly used for implementing the recursive E) stack
algorithm?
A) Queue
B) stack
C) binary tree
D) Linked list
a)O(1)
b) O(n)
c) O(logn)
d) O(nlogn)
36 Which one of the below mentioned is linear data D) All of the above
structure −
A - Queue
B - Stack
C - Arrays
37 D
Which of the following is false about a doubly linked list?
a) We can navigate in both the directions
b) It requires more space than a singly linked list
c) The insertion and deletion of a node take a bit longer
d) Implementing a doubly linked list is easier than singly linked list
38 Time required to concatenate two doubly linked list is o(n) as we cannot
find the last element
in the time o(1)
40
43 The postfix form of the expression (A+ B)*(C*D- E)*F / G is? C)AB + CD* E – *F
*G /
A)AB+ CD*E – FG /**
B)AB + CD* E – F **G /
C)AB + CD* E – *F *G /
D)AB + CDE * – * F *G /
A) Bubble sort
B) Quick sort
C) Merge sort
D) Insertion sort
45 Which method can find if two vertices x & y have path between them? C)Both A and B
By using both BFS
A - Depth First Search and DFS, a path
between two vertices
B - Breadth First Search of a connected graph
can be determined.
C - Both A & B
D - None A or B
48 Which of the following that determines the need for the Circular
Queue? A
49
50 You have an array of n elements. Suppose you implement a quick sort Answer:
by always choosing the central element of the array as the pivot. Then A
the tightest upper bound for the worst case performance is
(A) 0(n^2) (B) 0(n log n) (C) θ(n log n) (D) θ(n^2 )
A-5
B-4
C-3
D-2
54 (C)Sorted list
Q 1 - In order traversal of binary search tree will
produce −
A - unsorted list
B - reverse of input
C - sorted list
55 What is the worst case run-time complexity of binary search algorithm? D) Ο(n)
A - Ο(n2)
B - Ο(nlog n)
C - Ο(n3)
D - Ο(n)
57 What is the time complexity of pop() operation when the stack is O(1)
implemented using an array?
a) O(1)
b) O(n)
c) O(logn)
d) O(nlogn)
2 The circuit used to store one bit of data is known as? b)Flip-Flop
A) Encoder
B) Flip flop
C) Or gate
D) Decoder
4 The technique where the controller is given complete access to main d) Burst mode
memory is __________
a) Cycle stealing
b) Memory stealing
c) Memory Con
d) Burst mode
5 The addressing mode used in an instruction of the form ADD X Y is: B) index
A) Absolute
B) Index
C) Indirect
D) None of these
6 The program written and before being compiled or assembled is called C) source program
A. Start Program Explanation: The
B. Intermediate program program written
C. Source Program and before being
D. Natural Program compiled or
assembled is called
Source Program.
11 The following are some events that occur after a device controller (A)
issues an interrupt while process L is under execution.
(P) The processor pushes the process status of L onto the control stack.
(Q)The processor finishes the execution of the current instruction.
(R) The processor executes the interrupt service routine.
(S) The processor pops the process status of L from the control stack.
(T) The processor loads the new PC value based on the interrupt.
Which one of the following is the correct order in which the events
above occur? (A) QPTRS (B) PTRSQ (C) TRPQS (D) QTPRS
A. Registers
B. ALU
C. Flip-Flop
D. Multiplexer
14 In DMA transfers, the required signals and addresses are given by the c) DMA
a) Processor Controllers: acts
b) Device Drivers as a processor for
c) DMA Controllers DMA transfers
d) The program itself and overlooks the
entire process
15 Consider the control function a) x=0 and T1
=1
x`T1 : A ← B
A. BCH
B. BCD
C. Binary
D. Decimal
Ans B
17 The address mapping is done, when the program is initially loaded is D) Static
called: Relocation
A) Dynamic Relocation
B) Relocation
C) Dynamic as well as Static Relocation
D) Static Relocation
19 The technique where the controller is given complete access to d) Burst mode
main memory is __________
a) Cycle stealing
b) Memory stealing
c) Memory Con
d) Burst mode
26 The addressing mode where you directly specify the operand value is A
A) Immediate Immediate
B)Direct
C)Definite
D)Relative
28 The average time required to reach a storage location in memory and c) Access time
obtain it's contents is called
a) Seek time
b) Turnaround time
c) Access time
d) Transfer time
29 The program written and before being compiled or assembled is called C) source program
A. Start Program Explanation: The
B. Intermediate program program written
C. Source Program and before being
D. Natural Program compiled or
assembled is called
Source Program.
33 When a subroutine is called, the address of the instruction following the D) stack
CALL instructions stored in the?
A) Stack pointer
B) accumulator
C) program counter
D) stack
38 The main memory location which contains the effective address of the pointer
operand is
a) cache
Registers
b) registers
c) magnetic disk
d) main memory
40
A) encoder
B) OR gate
C) flip flop
D) decoder
A. BCH
B. BCD
C. Binary
D. Decimal
50 In the following indexed addressing mode instruction, MOV 5(R1), LOC Answer:
the effective address is ______ D
a) EA = 5+R1
b) EA = R1
c) EA = [R1]
d) EA = 5+[R1]
52 Which bus is used to connect the monitor to the CPU? B. SCSI Bus
A. Single Bus
B. SCSI Bus
C. Multiple Bus
D. Rambus
53 The addresing modes which uses the PC instead of a general purpose (B)Relative
register is
(A) Indexed With offset
(B) Relative
(C) Direct
(D) Both indexed with offset and direct
55 The I/O devices are connected to the CPU via __________. D:BUS
A. SDRAM's
B. Control circuits
C. Signals
D. BUS
56 The input devices use _______ to store the data received C: Buffer
A. Primary Memory
B. Secondary Memory
C. Buffer
D. External Memory
4 In a time sharing operating system, when the time slot given to a process is Ready state
completed, the process goes from running state to
A)Blocked state
B)Ready state
C) Suspended state
D)Terminated state
A) Mutual exclusion
B) Hold and wait
C) No preemption
D) All of these
7 When a process creates a new process using the fork() operation,which of the D.Shared
following states is shared between the parent process and the child process? memory
A.Stack segment
B.Heap
C.Shared memory segments
D.NONE of the above
9 The size of the virtual memory is based on which of the following C)address
a) CPU. b) RAM c). Address bus. d). Data bus bus
10 1. A Process Control Block(PCB) does not contain which of the following? c) Bootstrap
a) Code program
b) Stack
c) Bootstrap program
d) Data
11 Consider a system with 3 processes that share 4 instances of the same resource 2 to 2
type. Each process can request a maximum of 𝐾 instances. Resource instances
can be requested and released only one at a time. The largest value of 𝐾 that will
always avoid deadlock is ____.
12 Which of the following memory unit the processor can access rapidly: C) Cache
A)Main memory memory
B) Virtual memory
C) Cache memory
D) Read Only memory
Windows
Linux
Oracle
DOS
19 The child process completes execution, but the parent keeps executing, b) Zombie
then the child process is known as __________
a) Orphan
b) Zombie
c) Body
d) Dead
21 If the page size increases, the internal fragmentation is also?..? (b) Increases
A)Decreases
B)Increases
C)Remains constant
D)None of these
25
Who provides the interface to access the services of the
operating system?
System call
a. API
b. System call
c. Library
d. Assembly instruction
26 In a time sharing operating system, when the time slot given to a process is B
completed, the process goes from running state to Ready state
A)Blocked state
B)Ready state
C) Suspended state
D)Terminated state
27
Where are placed the list of processes that are prepared to be Ready
executed and waiting? queue
The ready
a. Job queue queue is a
b. Ready queue set of all
c. Execution queue the
processes
d. Process queue that
processes
are ready
to execute
and wait.
a) RAM
b) ROM
c) The CPU
d) Memory Cache
29 The size of the virtual memory is based on which of the following C)address
b) CPU. b) RAM c). Address bus. d). Data bus bus
31 Which of the following is the major part of time taken when accessing data C)Seek time
on the disk?
A)Settle time
B)Rotational latency
C)Seek time
D)Waiting time
33 Where are placed the list of processes that are prepared to be executed and B) ready
waiting? queue
A) Job queue
B) Ready queue
C) Execution queue
D) Process queue
35 Which of the following does not interrupt the running process? d) Scheduler
process
a)Timer interrupt
b) Device
c) Power failure
d) Scheduler process
37 The interval from the time of submission of a process to the time of completion is B
termed as ____________
a) waiting time
b) turnaround time
c) response time
d) throughput
38 Data blocks of very large file in the unix system are allocated using 4.extension of
1.contigious allocation indexed
2.linked allocation allocation
3.indexed allocation
4. An extension of indexed allocation
40
42 (c) Oracle
Which of the following is not an operating system?
a. Windows
b. Linux
c. Oracle
d. DOS
43 Piece of code that only one thread can execute at a time is called b) Critical
Section
a) Mutual Exclusion
b) Critical Section
c) Synchronization
d) All of them
44 Logical memory is broken into blocks of the same size called B) Pages
A) frames
B) pages
C) backing store
D) none of the mentioned
46 If a page number is not found in the translation lookaside buffer, then it is known A
as a?
47 When the entries in the segment tables of two different processes point to the c
same physical location _______
a) the segments are invalid
b) the processes get blocked
c) segments are shared
d) all of the mentioned
48 The processes that are residing in main memory and are ready and waiting to
execute are kept on a list called _____________ b
a) job queue
b) ready queue
c) execution queue
d) process queue
50 A system contains three programs and each requires three tape units for its Answer:
operation. The minimum number of tape units which the system must have such C
that deadlocks never arise is _________.
(A)5 (B)8 (C)7 (D)10
53 (D)The
The degree of multi programming is number of
(A) The number of process executed per unit time process in
(B) The number of process in the ready queue memory
(C) The number of process in the I/O queue
(D) The number of process in memory
54 (C) 8
What is the maximum length of the filename in DOS?
a. 4
b. 5
c. 8
d. 12
Cold boot
Cold hot boot
Cold hot strap
Hot boot
56 Which program runs first after booting the computer and loading the GUI? D:Authentica
tion
A:Desktop Manager
B:File Manager
C:Windows Explorer
D:Authentication
2
3 Architecture of the database can be viewed as
A)Two levels
B)Four levels C)Three levels
C)Three levels
D)One levels
6
1) Which of the following is generally used for performing tasks like Answer: D
creating the structure of the relations, deleting relation?
Explanation: The
a. DML(Data Manipulation Language) term "DDL" stands
for Data Definition
b. Query Language, used to
perform all other
c. Relational Schema essential tasks
such as deleting
d. DDL(Data Definition Language) relation and related
schemas in
defining the
structure relation.
9 The problem of being unable to represent some iinformation, can be B)null value
solved by iintroducing. A)pointers b) null values. C) 0 values. D) null
pointer
11 Consider the following four relational schemas. For each schema, all (B)
non-trivial functional dependencies are listed. The underlined
attributes are the respective primary keys.
Schema I: Registration (rollno, courses) Field ‘courses’ is a
set-valued attribute containing the set of courses a student has
registered for. Non-trivial functional dependency: rollno courses
Schema II: Registration (rollno, courseid, email) Non-trivial
functional dependencies: rollno, courseid email email rollno
Schema III: Registration (rollno, courseid, marks, grade) Non-trivial
functional dependencies: rollno, courseid marks, grade marks
grade
Schema IV: Registration (rollno, courseid, credit) Non-trivial
functional dependencies: rollno, courseid credit courseid credit
Which one of the relational schemas above is in 3NF but not in
BCNF? (A) Schema I (B) Schema II (C) Schema III (D) Schema IV
Answer: d
17 Which of the following creates a temporary relation for the query on A) With
which it is defined?
A) With
B) From
C) Where
D) Select
18 Which of the join operations do not preserve non matched c) Inner join
tuples?
a) Left outer join
b) Right outer join
c) Inner join
d) Natural join
27 The designer can review the schema to ensure it meets all the Conceptual design
functional requirements, at the stage
A. Conceptual design
B. Execution design
C. Controlling design
D. Initial planning
a) Ellipse
b) Dashed ellipse
c) Rectangle
d) Diamond
29 The problem of being unable to represent some iinformation, can be B)null value
solved by iintroducing. A)pointers b) null values. C) 0 values. D) null
pointer
30 Which relationship relates one record of any object to one record of a) One-to-one
another object?
a) One-to-one
b) One-to-many
c) Many-to-many
31 Who is more concerned about the conceptual level of the DBMS a)DBA
a)DBA
b)The end user
c)The Systems programmer
d)Client
A)Data Management
B)Data Mining
C)Data Warehouse
D)Both B and C
35 Which of the following can be considered as the maximum size that b) 4GB
is supported by FAT?
a)8GB
b) 4GB
c) 4TB
d) None of the above
36 SELECT * FROM employee WHERE dept_name="Comp Sci"; c) “Comp Sci”
In the SQL given above there is an error . Identify the error. For any string
a) Dept_name operations single
b) Employee quoted(‘) must be
c) “Comp Sci” used to enclose.
d) From
40
43 The file organization that provides very fast access to any arbitrary C)Hashed file
record of a file is
A)Ordered file
B)Unordered file
C)Hashed file
D)B tree
A) delete
B) remove
C) truncate
D ) both A & B
A)&
B)_
C)%
D)$
A) Aggregation
B) Generalization
C) Specialization
D) All of the above
49
50 Consider the relations r(A, B) and s(B, C), where s.B is a primary Answer:
key and r.B is a foreign key referencing s.B. Consider the query C
Q: r ⋈ (σB<5(s))
Let LOJ denote the natural left outer-join operation. Assume that r
and s contain no null values.
Which one of the following queries is NOT equivalent to Q?
(A) σB<5(r ⋈ s) (B) σB<5(r LOJ s)
(C) r LOJ (σB<5(s)) (D) σB<5(r) LOJ s
51 Views are useful for _____ unwanted information, and for collecting Answer: 1.Hiding
together information from more than one relation into a single view.
1.Hiding
2.Deleting
3.Highliting
4. All of the above
53 (C)3NF
Relations produced from an E-R model will always be in
a) 1NF
b) 2NF
c) 3NF
d) 4NF
e) Other
A:Conceptual Level
B:Physical Level
C:File Level
D:Logical Level
3 All the regular languages can have one or more of the following
descriptions:
i) DFA ii) NFA iii) e-NFA iv) Regular Expressions
Which of the following are correct? D) i, ii, iii, iv
A) i, ii, iv
B) i, ii, iii
C) i, iv
D) i, ii, iii, iv
6 If all the production rules have single non - terminal symbol on the left A)
side, the grammar defined is : context free
a. grammar
context free grammar
b.
context sensitive grammar
c.
unrestricted grammar
d.
phrase grammar
9 A pushdown automata behaves like a Turing machine when the number D)2 or more
of auxiliary memory is
A)0. B)1. C)1 or more D)2 or more
15 Consider the following languages over the alphabet Σ = {0,1,c} c)Only L1 and L2
Answer: (b).
Right linear grammar
21 A
If f : {a, b}* —> (a, b}* be given by f (n) = ax for every
value of n ∈ (a, b}, then f is
23 If L1′ and L2′ are regular languages, then L1.L2 will be (a) regular
a) regular
b) non regular
c) may be regular
d) none of the mentioned
a) aabb
b) abab
c) aababb
d) aaabb
29 A pushdown automata behaves like a Turing machine when the number D)2 or more
of auxiliary memory is
A)0. B)1. C)1 or more D)2 or more
30 There exists an initial state, 17 transition states, 7 final states and a)226
one dumping state, Predict the maximum number of states in its Explanation: The
equivalent DFA? maximum
a) 226 number of states
b) 224 an equivalent
c) 225 DFA can
d) 223 comprise for its
respective NFA
with k states will
be 2k.
31 Given the language L = {ab, aa, baa}, which of the following strings are 3)1, 2 and 4
in L*?
A) abaabaaabaa
B) aaaabaaaa
C) baaaaabaaaab
D) baaaaabaa
3
2)2, 3 and 4
3)1, 2 and 4
4)1, 3 and 4
A.
S --> Sa | b
B.
S --> aSb | ab
C.
S --> abX, X --> cY, Y --> d | aX
D.
None of these
35 Which one of the following is true for this automaton? (B) b*a(a+b)*
(A) b*ab*ab*ab*
(B) b*a(a+b)*
(C) b*ab*ab*
(D) (a+b)*
40
a)(a+b)*bbb
b)abbb(a+b)*
c)(a+b)*(bbb)(a+b)*
d)(a+b)(bbb)(a+b)*
A) Type 0
B) Type 1
C) Type 2
D) Type 3
A)3
B)4
C)5
D)6
47
50 Consider the following problems. L(G) denotes the language generated Answer:
by a grammar G. L(M) denotes the language accepted by a machine M. D
(I) For an unrestricted grammar G and a string w,
whether w ∈ L(G)
(II) Given a Turing machine M, whether L(M) is regular
(III) Given two grammars G1 and G2, whether L(G1) = L(G2)
(IV) Given an NFA N, whether there is a deterministic PDA P such that
N and P accept the same language.
1.True
2.False
52 Which of the following pairs have different expressive power? Answer: (c).
a. Deterministic push
Single-tape-turing machine and multi-dimensional turing machine down automata
b. and
Multi-tape turing machine and multi-dimensional turing machine non-deterministic
c. pushdown
Deterministic push down automata and non-deterministic pushdown automata
automata
d.
Deterministic finite automata and Non-deterministic finite automata
54 Two finite state machines are said to be equivalent if they: (C)Recognize the
(A)Have the same number of edges same set of tokens
(B)Have the same number of states
(C)Recognize the same set of tokens
(D)Have the same number of states and edges