Home
About Us
Contact Us
Bookmark
Saved Bookmarks
Current Affairs
General Knowledge
Chemical Engineering
UPSEE
BSNL
ISRO
BITSAT
Amazon
ORACLE
Verbal Ability
→
Ugc Net
→
Nta Ugc Net 2019 June – Ii in Ugc Net
→
Encrypt the Message “HELLO MY DEARZ” using Transpo...
1.
Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with(A) HLLEO YM AEDRZ(B) EHOLL ZYM RAED(C) ELHL MDOY AZER(D) ELHL DOMY ZAER
Answer»
Show Answer
Discussion
No Comment Found
Post Comment
Related InterviewSolutions
What is the output of the following JAVA program ?class simple{public static void main(String[ ] args){simple obj = new simple( );obj.start( );}void start( ){long [ ] P= {3, 4, 5};long [ ] Q= method (P);System.out.print (P[0] + P[1] + P[2]+”:”);System.out.print (Q[0] + Q[1] + Q[2]);}long [ ] method (long [ ] R){R [1]=7;return R;}} //end of class(A) 12 : 15(B) 15 : 12(C) 12 : 12(D) 15 : 15
The hexadecimal equivalent of the binary integer number 110101101 is:(A) D24(B) 1BD(C) 1AE(D) 1AD
What does the following logic diagram represent?(A) Synchronous Counter(B) Ripple Counter(C) Combinational Circuit(D) Mod 2 Counter
In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal to 120 ns. The time required to access a page in primary memory is 15 ns. The average time required to access a page is ________.(A) 105(B) 68(C) 75(D) 78
In a multi-user operating system, 30 requests are made to use a particular resource per hour, on an average. The probability that no requests are made in 40 minutes, when arrival pattern is a poisson distribution, is _________.(A) e-15(B) 1 – e-15(C) 1 – e-20(D) e-20
At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and “x” V operations were performed on this semaphore. If the final value of semaphore is 7, x will be:(A) 8(B) 9(C) 10(D) 11
Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with memory mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with memory mapped I/O ?(A) I/O protection is ensured by operating system routines.(B) I/O protection is ensured by a hardware trap.(C) I/O protection is ensured during system configuration.(D) I/O protection is not possible.
Which UNIX/Linux command is used to make all files and sub-directories in the directory “progs” executable by all users ?(A) chmod− R a+x progs(B) chmod −R 222 progs(C) chmod−X a+x progs(D) chmod −X 222 progs
In Java, which of the following statements is/are True?S1 : The ‘final’ keyword applied to a class definition prevents the class from being extended through derivation.S2 : A class can only inherit one class but can implement multiple interfaces.S3 : Java permits a class to replace the implementation of a method that it has inherited. It is called method overloading.Code:(A) S1 and S2 only(B) S1 and S3 only(C) S2 and S3 only(D) All of S1, S2 and S3
Which of the following statements is/are True?P : C programming language has a weak type system with static types.Q : Java programming language has a strong type system with static types.Code:(A) P only(B) Q only(C) Both P and Q(D) Neither P nor Q
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies