Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by Jeetmoni saikia
1
votes
2
answers
1
Self doubt
#include<stdio.h> void dynamic(int s, ...) { printf("%d ", s); } int main() { dynamic(2, 4, 6, 8); dynamic(3, 6, 9); return 0; }
#include<stdio.h void dynamic(int s, ...) { printf("%d ", s); } int main() { dynamic(2, 4, 6, 8); dynamic(3, 6, 9); return 0; }
332
views
asked
Jun 20, 2023
0
votes
1
answer
2
Website
int main() { int a = 10; cout<<a++; return 0; } (A) 10 (B) 11 (C) 12 (D) Not defined
int main(){int a = 10;cout<<a++;return 0;} (A) 10(B) 11(C) 12(D) Not defined
799
views
asked
Apr 12, 2023
0
votes
1
answer
3
Get command is found in a) tcp/ip b) ftp c) mac d) asp
445
views
asked
Feb 17, 2023
Computer Networks
tcp
computer-networks
+
–
0
votes
1
answer
4
Choose the size of the below struct. Struct{ Int a; Char b; Float c; } 2 4 7 10
Choose the size of the below struct. Struct{ Int a; Char b; Float c; } 1)2 2)4 3)7 4)10
Choose the size of the below struct.Struct{ Int a; Char b; Float c; }1)22)43)74)10
3.0k
views
asked
Jan 11, 2023
Programming in C
programming-in-c
+
–
0
votes
0
answers
5
COA Doubt
What is the bandwidth of the memory , if access time and settling time of main memory are 45 ns and 5 ns respectively ? 20 Hz 20 KHz 20 MHz 50 MHZ
What is the bandwidth of the memory , if access time and settling time of main memory are 45 ns and 5 ns respectively ? 20 Hz20 KHz20 MHz50 MHZ
576
views
asked
Dec 7, 2022
CO and Architecture
co-and-architecture
+
–
0
votes
2
answers
6
Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 suddenly become ready at once, how many bit slots are needed to resolve the contention?
1.3k
views
asked
Dec 7, 2022
Computer Networks
computer-networks
network-protocols
+
–
0
votes
0
answers
7
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are: (A) n(n-1) and 2n (B) 2n and ((n(n – 1))/2) (C) ((n(n – 1))/2) and 2n (D) ((n(n – 1))/2) and n
485
views
asked
Nov 18, 2022
Computer Networks
computer-networks
network-security
normal
+
–
0
votes
1
answer
8
Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet? a) Destination address b) Source address c) Checksum d) Padding
653
views
asked
Nov 16, 2022
Computer Networks
computer-networks
ip-addressing
+
–
1
votes
2
answers
9
Which of the following is the broadcast address for a Class B network ID using the default subnetmask? (a) 172.16.10.255 (b) 255.255.255.255 (c) 172.16.255.255 (d) 172.255.255.255
1.8k
views
asked
Nov 14, 2022
Computer Networks
computer-networks
subnetting
normal
+
–
1
votes
1
answer
10
CN Doubt
The underlying Transport layer protocol used by SMTP is ________ (a) TCP (b) UDP (c) Either TCP or UDP
The underlying Transport layer protocol used by SMTP is ________(a) TCP(b) UDP(c) Either TCP or UDP
529
views
asked
Nov 4, 2022
Computer Networks
computer-networks
transport-layer
tcp
udp
+
–
0
votes
3
answers
11
The hamming distance between the octets of 0xAA and 0x55 is (A) 7 (B) 5 (C) 8 (D) 6
469
views
asked
Oct 22, 2022
Computer Networks
computer-networks
hamming-code
+
–
2
votes
1
answer
12
With segmentation, if there are 64 segments and maximum segment size is 512 words; the length of logical address is how many bits a) 12 b) 6 c) 15 d) 9
1.6k
views
asked
Oct 21, 2022
Operating System
operating-system
virtual-memory
segmentation
+
–
0
votes
1
answer
13
Which of the following describe the DHCP Discover message? 1) It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. I uses UDP as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a layer 2 destination address. [A]. 1 only [B]. 1 and 2 @ [C]. 3 and 4 [D]. 4 only
1.0k
views
asked
Oct 17, 2022
Computer Networks
udp
transport-layer
tcp
+
–
0
votes
0
answers
14
Class P { void f(int i) { print(i); } } Class Q subclass of P { void f(int i) { print(2*i); } } Now consider the following program fragment: P x = new Q(); Q y = new Q(); P z = new Q(); x.f(1); ((P)y).f(1); z.f(1); Here ((P)y) denotes a typecast of y to P. The output produced by executing the above program fragment will be (A) 1 2 1 (B) 2 1 1 (C) 2 1 2 (D) 2 2 2
304
views
asked
Oct 16, 2022
Programming in C
programming-in-c
output
normal
+
–
2
votes
1
answer
15
Packets of the same session may be routed through different paths in: 1)TCP, but not UDP 2)TCP and UDP 3)UDP, but not TCP 4) Neither TCP nor UDP
646
views
asked
Oct 15, 2022
Computer Networks
computer-networks
tcp
udp
easy
+
–
0
votes
1
answer
16
The number of address lines required to address 8 GB memory is a) 8 b) 1024 c) 32 d) 33 . Please help
970
views
asked
Oct 11, 2022
CO and Architecture
co-and-architecture
digital-logic
memory-interfacing
+
–
0
votes
0
answers
17
Consider the following class definitions in a hypothetical Object Oriented language that supports inheritance and uses dynamic binding. The language should not be assumed to be either Java or C++, though the syntax is similar. Class P { void f(int i) { print(i); } } Class Q subclass of P { void f(int i) { print(2*i); } } Now consider the following program fragment: P x = new Q(); Q y = new Q(); P z = new Q(); x.f(1); ((P)y).f(1); z.f(1); Here ((P)y) denotes a typecast of y to P. The output produced by executing the above program fragment will be (A) 1 2 1 (B) 2 1 1 (C) 2 1 2 (D) 2 2 2
599
views
asked
Oct 10, 2022
Programming in C
programming
object-oriented-programming
+
–
0
votes
1
answer
18
In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is (A) 158 (B) 255 (C) 222 (D) 223
763
views
asked
Oct 8, 2022
0
votes
4
answers
19
Subnetting/Supernetting
In class $B$ if subnet mask is $255.192.0.0$ then the total number of networks that can be joined is: $32$ $64$ $16$ None of the Above
In class $B$ if subnet mask is $255.192.0.0$ then the total number of networks that can be joined is: $32$ $64$ $16$ None of the Above
1.6k
views
asked
Sep 28, 2022
Computer Networks
subnetting
computer-networks
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register