Question
Which of the following makes C $ E or Y % E definitely
true? In the following questions, the symbols @, #, %, $ and © are used with the following meaning as illustrated below: ‘A @ B’ means ‘A is neither smaller than nor equal to B’. ‘A # B’ means ‘A is neither greater than nor equal to B’. ‘A % B’ means ‘A is not greater than B’. ‘A $ B’ means ‘A is not smaller than B’. ‘A © B’ means ‘A is neither smaller than nor greater than B’.Solution
a - X © Y $ C @ D % E # G → X = Y ≥ C > D ≤ E < G, in this C $ E = C ≥ E and Y % E = Y ≤ E, it is not true. b - X # Y % C $ D @ E # G → X < Y ≤ C ≥ D > E < G, in this C $ E = C ≥ E not follows and Y % E = Y ≤ E, not follows. c - X # Y © C % D % E $ G → X < Y = C ≤ D ≤ E ≥ G, in this C $ E = C ≥ E, not follows and Y % E = Y ≤ E, follows. d- X @ Y % C © D # E @ G → X > Y ≤ C = D < E > G, in this C $ E = C ≥ E, not follows and Y % E = Y ≤ E, not follows.
For Dijkstra’s algorithm on a graph with non-negative weights, which data structure yields the best time complexity for dense graphs?
Which of the following data structures is best suited for implementing a LIFO (Last In, First Out) mechanism?
Which of the following accurately describes the role of virtual memory in modern operating systems?
Which of the following techniques is primarily used to address overfitting in machine learning models?
Which of the following is a key principle of the SOLID design principles that focuses on ensuring a class has only one reason to change?
Which of the following is the primary reason why polymorphism is useful in Object-Oriented Programming (OOP)?
Which of the following is the most effective method to ensure data confidentiality when transmitting sensitive information over a public network?
Which of the following is an example of an emerging technology that is most likely to impact the future of computing?
Which type of AI is primarily used for adaptive mobile applications like virtual assistants?
Suffix Trees are useful for: