Answer:
d. Merge sort
Explanation:
Merge sort is example of an efficient sorting alogrithm. The Divide and conquer rule is used in this technique. This method breakdown the list into multiple sublists and each sublist contains a single element. This technique merged in the form of sorted lists. This technique uses external memory of the system while sorting.
Merge sort is used to sort the 10,000 items using only 1,000 slots available in the RAM.
Answer: This means that even though we believe the information is coming from a trusted source, it could still contract a virus due to someone else hacking it or the original sending not being aware of the virus.
Explanation: Just because information comes from a trusted/friendly source does not mean the information is clear of potential threats. Viruses are able to hide in information and the sending may not be aware that the virus is hiding in the information.
Try refreshing the page, if not restart your device check your internet etc.
Answer: c.)
Explanation:
The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.
It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".
The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.
If one process set the FIN bit to "1", this means that it has no more data to send.
Answer:
(c) UCA
Explanation:
mRNA is a type of RNA it is also called messenger RNA it has temporary copy of information which is found in DNA. If the particular triplet of bases in the coding sequence of DNA is AGT then corresponding codon for RNA will be UCA which is given in option
so from above discussion it is clear that (C)will be the correct answer