Continue with your mobile number
● Statement 1 incorrect: Net Domestic Product (NDP) is the GDP calculated after adjusting the weight of the value of ‘depreciation’. This is, basically, the net form of the GDP, i.e., GDP minus the total value of the ‘wear and tear’ (depreciation) that happened in the assets while the goods and services were being produced. o Thus, NDP = GDP - Depreciation. Statement 2 incorrect: The NDP of an economy has to be always lower than its GDP for the same year, since there is no way to cut the depreciation to zero. But mankind has achieved too much in this area through developments, such as ‘ballbearing’, ‘lubricants’, etc., all innovated to minimise the levels of depreciation. ● Statement 3 correct: NDP has following usage: For domestic use: to understand the historical situation of the loss due to depreciation to the economy. To understand and analyse the sectoral situation of depreciation in industry and trade in comparative periods. To show the achievements of the economy in the area of research and development, which have tried cutting the levels of depreciation in a historical time period. NDP is not used for the comparative economies since the rate of depreciation is different for different countries. In India NDP is announced by the Ministry of Commerce and Industry.
Consider the following sorting algorithms.
I. Quicksort II. Heapsort III. Mergesort
Which of them perform in least time in the worst case?
How many dimensions are selected in dice operation?
Which scheduling policy guarantees that every job will be executed in a finite amount of time?
What does a "Shared Lock" in a DBMS locking protocol allow?
State true/false
A SQL query will not work if there are no indexes on the relations
Which PHP function is used for connecting to a MySQL database?
In the context of sorting algorithms, which one of the following is not a comparison-based sorting algorithm?
Which of the following is a primary source of energy for most power plants?
Which of the following is an example of narrow or weak AI?
What is a common method of authentication in cybersecurity?