Unix And Shell Programming

Unix and Shell Programming
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)
Q1. Discuss the features of UNIX operating system that have made them such phenomenally successful Operating systems
Q2. What is shell programming? Write a shell program toprint all the contents of an existing text file in uppercase
Q3. Describe what the grep command does? Illustrate its use with an original example.
Q4Write a shell program to generate the first “n” terms of the following sequence without using multiplication
Q5. What are filters? Give some examples of commands that can be used as filters
Q6. What are the different kinds of file systems available to UNIX operating system.
Q7. Write shell programs for the following:
i.To find second largest number among the 5 numbers given.
ii. To find sum of all the alternate digits in a given 7 digit number.
iii. To count number of vowels in a given string.
iv. To take 2 strings as input, concatenate them and display the length of the resultant string.
v. To display the reverse of a given number.

Q8. Write the UNIX commands for the following
i) To display the sizes and names of the six largest files in /bin, listed in descending order of their size.
ii) To display the number of words in the last 250 lines of any file.
iii) To display the name of the oldest file (and only the oldest file) in the current working directory.
iv) To show the number of all files and directories (including hidden ones, but not. or.) in the directory /bin.
v) Use the ps command, and the grep command, in a pipeline to find all the processes owned by you.

Assignment B
Q1.What is an i-node and what information is contained in it? Describe how named files are mapped to i-nodes.
Q2How is the information associating disc blocks with i-nodes represented?
Q3 What restrictions are placed on name to i-node links to simplify file system recovery?

1. UNIX uses ls to list files in a directory. The corresponding command in MS environment is—
2. A file with extension .txt—
3. What is POSIX?
4. Which of the following files in the current directory are identified by the regular
expression a?b*.
5. For some file the access permissions are modified to 764. Which of the following interpretation are valid?
6. The file’s properties in Windows environment include which amongst the following?
7. Which of the following information is contained in inode structure?
8. What are utilities?
9. Which directory under the root contains the information on devices?
10. What is the command ‘mv’ used for in Unix?
11. What is the result of typing the command pwd?
12. Which unix command will display all files starting with an a?
13. Unix Operating System is—
14. The program is known as _________ that interacts with the inner part of called kernel.
15. Identify the odd thing in the services of operating system—
16. Dead lock handling in ______ OS, the response time is very critical.
17. Software is a program that directs the overall operation of the computer facilitates its use and interacts with the user. What are the different types of such software?
18. PCB stands for—
19. The primary job of the operating system of a computer is to—
20. Super computers typically employ—
21. Which one of the following statements correctly describes the relationship between the processes and programs in a computer system at any given moment?
22. Multiprogramming systems –
23. Multiprocessing
24. Which is not the state of the process?
The operating system of a computer serves as a software interface between the user and the-
25. A process is—
26. The kernel of the operating system remains in the primary memory because—
27. Which of the following statement is not true?
28. The term “Operating System ” means—
29. What is a shell?
30. The operating system manages—
31. chown means—
32. The process which terminates before the parent process exits, is called as—
33. Identify the point(s) that is not true w.r.t. signals—
34. ———Works as a command interpretor.
35. An important task that the operating system performs is____, which keeps track of the files stored on a PC so that they can be retrieved when needed
36. The means by which an operating system or any other program interacts with the user is called–
———- was originally developed at AT&T Bell Labs as an operating system
37. For multiprogramming systems, most UNIX operating systems use—
38. What are the tasks of an Operating System?
39. For multiprogramming systems, most UNIX operating systems use—
40. What are the tasks of an Operating System?
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Data and File Structure using C

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Q1. A two-dimensional array defined as a [4…7, -1 …….3] requires 2 bytes of storage space for each element. If the array is stored in row-major form, then calculate the address of element at location a[6,2]. Give the base address is 100.
Q2. Write a C program to implement bubble sort.
Q3. Write a program in C to show PUSH and POP operations in a stack.
Q4. Write the algorithms for the insertion and deletion operations performed on the circular queue.
Q5. What is double linked list? What are the advantage and disadvantage of double linked list ?
Q6. What is a binary search tree? Construct a binary search tree from these numbers – 50, 30, 60, 22, 38, 55, 34.
Q7. Explain the Dijkastra’s Algorithm.
Q8. What do you mean by the Hashing? Explain different method of hashing.

Q1. If you are using C language to implement the heterogeneous linked list, what pointer type will you use?
Q2. What is the binary tree? What are threaded and properties of binary trees?
Q3. What is directed graph? Explain the various types of graph and traversal of directed graph.

1. The memory address of the first element of an array is called
2. memory address of fifth element of an array can be calculated by the formula
3. Which of the following data structures are indexed structures?
4. Which of the following is not the required condition for binary search algorithm?
5. Which of the following is not a limitation of binary search algorithm?
6. Two dimensional arrays are also called
7. A variable P is called pointer if
8. Which of the following data structure can’t store the non-homogeneous data elements?
9. Which of the following data structure store the homogeneous data elements?
10. Each data item in a record may be a group item composed of sub-items; those items which are indecomposable are called
11. The difference between linear array and a record is
12. Which of the following statement is false?
13. Binary search algorithm can not be applied to

14. When new data are to be inserted into a data structure, but there is no available space; this situation is usually called
15. The situation when in a linked list START=NULL is
16. Which of the following is two way lists?
17. Which of the following name does not relate to stacks?
18. The term “push” and “pop” is related to the
19. A data structure where elements can be added or removed at either end but not in the middle
20. When in order traversing a tree resulted E A C K F H D B G; the preorder traversal would return
21. Value of the first linked list index is________
22. A linked list index is ____ that represents the position of a node in a linked list
23. Why is the constructor of the Queue Linked List class empty?
24. _______ form of access is used to add and remove nodes from a queue
25. ______ form of access is used to add and remove nodes from a stack
26. New nodes are added to the _____ of the queue.
27. A _______ is a data structure that organizes data similar to a line in the supermarket, where the first one in line is the first one out.
28. In an array queue, data is stored in an _____ element
29. The pop () member function determines if the stack is empty by calling the _____ member function
30. What happens when you push a new node onto a stack?
31. Which of the following algorithm solves the all – pair shortest path problem?
32. The operation of processing each element in the list is known as
33. To delete a dynamically allocated array named `a`, the correct statement is
34. The memory address of the first element of an array is called
35. Which of the following data structure store the homogeneous data elements?
36. The number of possible binary trees with 4 nodes is
37. Which of the following data structure is not linear data structure?
38. Finding the location of the element with a given value is:
39. Preorder is same as
40. Which of the following is the feature of stack?

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Software Engineering

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Software Engineering

Q1. Explain the Spiral Model of software development. What are the limitations of such a model?
Q2. Is it possible to estimate software size before coding? Justify your answer with suitable examples
Q3. Explain the concepts of Function Points. Why FPs is becoming acceptable in industry?
Q4. The effort distribution for a 420 KLOC Semi-detached mode software development project is: product design 10%, detailed design 14%, code & unit test 26%, integrate and test 30%. How would the following change, from low to high, affect the phase distribution of effort and the total effort: analyst Capability, virtual machine experience, Programmer capability, and required language experience?
Q5 What do you understand by the term Software Development Life Cycle? Why is it important to adhere to a life cycle model while developing a large software system?
Q 6 List the five desirable characteristics of good SRS document
Q7. Enumerate the different types of coupling that might exist between two modules.
Q8.

Q.1) Consider a project to develop a full screen editor. The major components identified are screen edit, command language interpreter, file input and output, cursor movement, screen movement. The sizes for these are estimated to be 4K, 2K, 1K, 2K and 3K delivered source lines. Use COCOMO Model to determine:
a) Overall cost and schedule estimates.
b) Cost and schedules for different phases.

Q2: Explain why a design with low coupling helps maintainability
Q3 Discuss the significance and use of requirement engineering. What are the problems in the formulation of requirements?
1. The development is supposed is supposed to be processed linearly through the phases
2. The DFD depicts
3. The most desirable form of coupling is
4. If failure intensity is 0,005 failures/hour during 10 hours of operation of software, its reliability can be expressed as
5. Regression testing is primarily related to
6. Which one is not a step of requirement engineering?
7. Which one is not a requirement elicitation technique?
8. Level-O DFD is similar to
9. The DFD depicts
10. Which one is not a size measure for software?
11. Estimation of size for a project dependent on
12. COCOMO-II was developed at
13. How many stages are in COCOMO-II?
14. Which one is not a risk Management Activity?
15. The worst type of cohesion is
16. Which one is not a strategy for design?
17. A system that does not interact with external environment is called
18. The extent to which different modules are dependent upon each other is called
19. Which one is not a category of software metrics?
20. Which one is not a measure of software science theory?
21. Minimal implementation of any algorithm was given the following name by Hallstead:
22. Which one is the International standard for size measure?
23. Fault is
24. As the reliability increases, failure intensity
25. Software Quality is
26. How many product quality factors have been proposed in McCall quality model?
27. Which one is not a software quality model?
28. NHPP stands for
29. Total numbers of maturing levels in CMM are
30. CMM is developed by
31. Software reliability is defined with respect to
32. Software mistakes during coding are known as:
33. For a function of two variables, how many test cases robustness testing will generate?
34. Beta testing is carried out by:
35. Acceptance testing is done by:
36. Cyclomatic Complexity is equal to
37. Alpha & Beta testing techniques are related to
38. Integration testing techniques are
39. Functionality of software is tested by
40. Thread testing is used for testing
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Digital Electronics & Computer Oraganisation

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)
Q1. What are flip flop circuits in digital electronics? Discuss race around condition in J-K Flip Flop.
Q2. What is virtual memory? How address mapping is done in cache memory? Elaborate your answer with examples.
Q3. Design 8:1 Mux for a given function, f=Σ (0, 1,5,7,9, 13)
Q4. How branching takes place in Instruction pipeline. Explain with suitable examples
Q5. Write short notes on any three of the following.
a) Microprocessor
b) Modes of data transfer.
c) I/O processor
d) Associative memory
e) Software and Hardware interrupt
Q6. Design a mod-15 counter. Explain the various steps in designing the counter
Q7. What are shift registers? Design a 8 bit shift register with features like PISO, SISO, SIPO and PIPO.
Q8. Compare RISC & CISC architecture.
Case Study
Q1. Give the organization of Micro programmed control unit and explain its operation. Explain the role of address sequencer in detail. If you convert your control unit to hardwired unit, what are the changes you will observe?
Q2. Explain in details the block diagram of timing and control unit.

1. Where does a computer add and compare data?
2. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
Question 3: A complete microcomputer system consists of

Question 4: CPU does not perform the operation
Question 5: Pipelining strategy is called implement
Question 6: A stack is
Question 7: A stack pointer is
Question 8: The branch logic that provides decision making capabilities in the control unit is known as
Question 9: Interrupts which are initiated by an instruction are
Question 10: A time sharing system imply
11. Processors of all computers, whether micro, mini or mainframe must have
Question 12: What is the control unit’s function in the CPU?
Question 13: What is meant by a dedicated computer?
Question 14: The most common addressing techiniques employed by a CPU is
Question 15: Pipeline implement
Question 16: Which of the following code is used in present day computing was developed by IBM corporation?
Question 17: When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the
Question 18: A microprogram written as string of 0’s and 1’s is a
Question 19: Memory access in RISC architecture is limited to instructions
20. A collection of 8 bits is called
Question 21: An AND gate generates a high output when–
Question 22: How many address lines are needed to address each memory locations in a 2048 x 4 memory chip?
23. A computer program that converts an entire program into machine language at one time is called a/an
Question 24: In immediate addressing the operand is placed
Question 25: Microprocessor 8085 can address location upto
Question 26: The ALU and control unit of most of the microcomputers are combined and manufacture on a single silicon chip. What is it called?
Question 27: When the RET instruction at the end of subroutine is executed,
Question 28: A microporgram is sequencer perform the operation
Question 29: Interrupts which are initiated by an I/O drive are
30. A 32-bit processor has
31. Clock speed is measured in—
32. A parity bit is—
33. On-chip cache has—
34. The system bus is made up of—
35. Modern processor chips may be classified as—
36. A nanosecond is—
37. The clock speed of a modern PC is of the order of—
38. An OR gate generates a low output when—
39. The ascending order or a data Hierarchy is—
40. A conditional jump instruction–
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Introduction to Computer and Programming Concept

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Q1. Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.
Q2. Write the importance of operating system. Describe the working methodology of online and real-time operating system with the help of two examples of each.
Q3. Write a ‘C’ program to accept any 3 digit integer number from the keyboard and display the word equivalent representation of the given number.
Q4. Write a ‘C’ functions to arrange the elements of an integer array in such a way that all the negative elements are before the positive elements. The array is passed to it as an argument.
Q5. Write a ‘C’ function to generate the following figure for n = 7.
1
1 3
1 3 5
1 3 5 7
1 3 5
1 3
1
The value of n is passed to the function as an argument. Print the triangle only if n is odd otherwise print an error message.

Q1. How is communication between computers established in Internet. What characteristics need to be defined in a communication protocol? Explain the physical and logical paths in a computer communication network also.
Q2. Define a structure to store roll no, name and marks of a student. Using the structure of above write a ‘C’ program to create a file “student.dat”. There must be one record for every student in the file. Accept the data from the user.
Q3. Using the “student.dat” of above write a ‘C’ program to search for the details of the student whose name is entered by the user.
1. In General purpose OS user cannot change which state of process?
2. Which addressing scheme is not common for 8085 & 8086 ?
3. A software that allows a personal computer to pretend is as a terminal is—
4. Which one of the following always resides in the memory?
5. 8085 is –
6. The process of loading the operating system from the secondary memory to primary memory is called as-
7. Which of the following allows devices on one network to communicate with devices on another network?
8. p++ executes faster than p+1 because—
9. main()
{
int *p ;
p=(int *)malloc(-10);
}
10. Which addressing scheme is not common for 8085 & 8086?
11. The number of address lines required to address 4k of memory are—
12. Where is CMOS setup stored?
13. main ( ){
char *a=”Hello”;
*a++ = h ;
printf(“%s\n”,a);
}
14. main()
{
for( printf(“a”) ; printf(“b”) ; printf(“c”) ) ;
}
15. The ……………….variable is not destroyed on exit from the function; instead its value is presented and becomes available again, when the function is next called. These variables are declared as …………………
16. Output of the printf(“%-2.3f\n”,17.23478) will be—
17. Suppose that ‘i’ is an integer variable whose value is 7 and ‘f ‘is floating point variable whose value is 8.5. Evaluate the expression: ( i + f)%4
18. What will be the output of the following?
#include
main ( )
{
int *i, *j, a=12, b=2,c;
c = (a=a+b, b=a/b, a=a*b, b=a-b);
i = &c;
printf(“%d”,–(*i));
}
19. The conversion characters for data input means that the data item is—
20. What is max data capacity for optical fiber cable?
21. In C, a Union is–
22. If you want to exchange two rows in a two dimensional array, the fastest way is to-
23. Study the following C program.
#include

}
What will be the value of n after the execution of the above program?
24. Study the following C program.
#include
main()
{
..
}
What will be the value of n after the execution of the above program?
25. Which of these is not a layer in OSI model?
26. The part of machine level instruction, which tells the central processor what was to be done is—
27. Which of the following holds the ROM, CPU, RAM and expansion cards?
28. The term ‘baud’ is a measure of the—
29. Subtracting (1010)2 from (1101)2 using 1st complement—
30. Using 2’s Complement, substraction, of (1010)2 from (0011)2 is—
31. The chief reason why digital computers use complemented subtraction is that, it—
32. In ______ OS, the response time is very critical.
33. The primary job of the operating system of a computer is to ________.
34. A program at the time of executing is called ________.
35. Multiprogramming systems ________.
36. The number of processes completed per unit time is known as __________.
37. Which of the following allows devices on one network to communicate with devices on another network?
38. Which of the following memories needs refresh?
39. FDDI is a—
40. What is the central device in star topology?
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Amity MBA online solve assignment for Numerical & Statistical Computations

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: solvedstudymaterial@gmail.com
Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)

Amity MBA online solve assignment for Numerical & Statistical Computations

1.Find the negative root of the equation x3 – 21x + 3500 = 0 correct to two decimal places by Newton Raphson Method.
2.Solve the following set of linear equations by Gauss Seidal method 1.2x + 2.1y + 4.2z = 9.9 5.3x + 6.1y + 4.7z = 21.6 9.2x + 8.3y + z = 15.2
3.Define Interpolation with the help of suitable example.
4.Derive the relation between divided differences and ordinary differences.
5.Integrate the function x³ + 2x +1 with respect to x from 0 to 1 by using Trapezoidal. Divide the interval into eight equal intervals
6.. Fit a straight line trend by the method of least square to the following data. Year 1991 1992 1993 1994 1995 Production 240 255 225 260 280 Estimate the likely product for the year 2000.
7. Solve the following differential equation by using RungaKutta fourth order method to find out y(1). y’ = x2 – y2 Given that y(0) = 1, h =0.5 Findf’ (3) and f” (3) from the following table using Newton’s forward formula. x 3 3.2 3.4 3.6 3.8 4.0 y -14 -10.032 -5.296 0.256 6.672 14 8
8..Discuss the three available methods (Bi-Section, Regula Falsi and Newton Raphson Method) and explain the merits and demerits of each method.
Assignment B
1. Compare and contrast Trapezoidal, Simpson’s 1/3 and Simpson’s 3/8 rule of integration.
2.Find the value of f(x) at 3.1 and 3.9 for the following data by using the appropriate formula. x 3 3.2 3.4 3.6 3.8 4.0 y -14 -10.032 -5.296 0.256 6.672 14
3.Define Interpolation. Prove that E-?=1, where E is the shift operator. (b)?4y0=y4-4y3+6y2-4y1+y0
Assignment C
1.Which one is a method for getting solution to non linear algebraic equation? Options RungaKutta Method Newton Raphson Method Jacobi Method Divided Difference Formula
2.y=mx+c is the equation of a– Options Polygon Circle Line None
3.Which one of the following is not a method for finding the root of an algebraic equation? Options Newton Raphson Method Bi-Section Method Gregory’s Method Regula Falsi Method
4.The formula for Newton Raphson method is Options
5.For x3 – 5x +3 =0, the root lies in between Options [0, 1] [4, 5] [3, 4] [0, -1]
6.The value of Δ f(x) is Options f(x1) + f(x0) f(x1) – f(x0) f(x1) None of these
7.Which one is not a method for numerical integration Options Trapezoidal Rule Gauss Method Simpson’s 1/3 Rule Simpson’s 3/8 Rule
8.The Formula for Bi-section method is Options (x1+x2)/2 (x1-x2)/2 (x1x2)/2 None of these
9.The value of f(x) is Options y3-3y2+3y1-y0 y3+3y2+3y1+y0 y0-3y1+3y2-y3 None of these
10.In forward difference formula ‘h’ is Options The difference between two consecutive y. The difference between two consecutive x The difference between first and last x values The difference between first and last y values
11.In line fitting method, the general equation of a line is Options y = a + bx y2 = a + bx y = a + bx2 None of these
12.For Trapezoidal rule the Generalized Quadrature formula uses Options n=1 n=2 n=3 None of these
13.Gauss elimination method is used to solve the set of linear algebraic equations Options True False
14.For f(a) and f(b)are of same sign then equation f(x)=0 has at least one root with in [a,b]. Options True False
15.C (n, r) or nCr. = n! / (n+r)! r! Options True False
16.In Gauss Elimination method, coefficient matrix A is reduced to upper triangle matrix by using the elementary row operations Options True False
17.Modified Euler is a modified version of Euler Method. Options True False
18.Gauss Elimination method reduces the system of equations to an equivalent upper triangular matrix. Options True False
19.Regula Falsi Method converges fastest among Bi-section, Regula Falsi and Newton Raphson Method. Options True False
20.The number of distinguishable words that can be formed from the letters of MISSISSIPPI is 34650. Options True False
21.The set of linear algebraic equations can be arranged in matrix for AX=B, where A is the coefficient matrix, X is the variable matrix. Options True False
22.Numerical methods give always-exact solutions to the problems Options True False
23.Simpson’s method is used to interpolate the value of the function at some given point. Options True False
24.The set of equation 3x+2y = 0 and 2x+7y = 9 can be solved by using Bi-Section method. Options True False
25.In solving simultaneous equation by Gauss- Jordan method , the coefficient matrix is reduced to ————- matrix Options Null Unit Skew Diagonal
26.The order of convergence in Newton Raphson method is Options 2 3 0 None of these
27.Which of the following is a step by step method Options Taylor`s Adams-Bashforth Picard`s Euler`s
28.In the case of Bisection method , the convergence is Options LINEAR Quadratic Very slow None
29.Solutions of simultaneous non- linear equations can be obtained using Options Method of iteration Newton-Raphson method Bisection method None
30.Bessel`s formula is most appropriate when p lies between Options -0.25 and 0.25 25 and 0.75 75 and 1 None of the above
31.The order of the matrix [473] is. Options 3*1 1*3 3*3 1*1
32.If B is square matrix and BT = – B, then B is called Options Symmetric Skew symmetric Singular Non Singular
33.Find the coefficient of x³ in the Taylor series about x = 0 for f(x) =sin2x ? Options -2/3 -4/3 4/3 2/3
34.The bisection method of finding roots of nonlinear equations falls under the category of a (an) —————- method. Options Open Bracketing Random Graphical
35.A unique polynomial of degree —————–passes through n+1 data points. Options n+1 n n or less n+1 or less
36.Interpolation is the technique to find the value of dependent variable for the given value of independent variable Options True False
37.By increasing the iterations of any Numerical methods, we increase the correctness of the solution. Options True False
38.Lagrange’s Interpolation method can be used only for equal interval problems. Options True 2.False
39.Trapezoidal Integration Method is derived by putting Options n =0 n=1 n=2 n=4
40.If f(x) is a real continuous function in [a,b], and f(a)f(b)<0, then for f(x),there is (are).............in the domain [a,b]. Options One root An undeterminable number of roots No root 4.At least on root We Also Provide SYNOPSIS AND PROJECT. Contact www.kimsharma.co.in for best and lowest cost solution or Email: solvedstudymaterial@gmail.com Call: +91 82907-72200 (Call/WhatsApp) or +91 88003-52777 (WhatsApp Only)