Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Ritwik
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by Ritwik
3
answers
1
MadeEasy Test Series: Operating System - Memory Management
Consider a machine with byte addressable memory 32 bits virtual addresses, 32 bits physical addresses and 4 KB page size. If a two-level page table system is used where each page table occupies one page and page table entries of 4 B each, then the memory overhead for this machine is ________ KB please explain.
Consider a machine with byte addressable memory 32 bits virtual addresses, 32 bits physical addresses and 4 KB page size. If a two-level page table system is used where e...
2.4k
views
answer edited
Jan 12, 2020
Operating System
made-easy-test-series
operating-system
memory-management
+
–
1
answer
2
UGC NET CSE | December 2012 | Part 2 | Question: 11
In compiler design ‘reducing the strength’ refers to reducing the range of values of input variables code optimization using cheaper machine instructions reducing efficiency of program none of the above
In compiler design ‘reducing the strength’ refers toreducing the range of values of input variablescode optimization using cheaper machine instructionsreducin...
4.1k
views
commented
Jun 22, 2017
Compiler Design
code-optimization
ugcnetcse-dec2012-paper2
compiler-design
+
–
1
answer
3
UGC NET CSE | December 2012 | Part 2 | Question: 6
Component level design is concerned with Flow oriented analysis Class based analysis Both of the above None of the above
Component level design is concerned withFlow oriented analysisClass based analysisBoth of the aboveNone of the above
5.7k
views
answered
Jun 22, 2017
IS&Software Engineering
ugcnetcse-dec2012-paper2
non-gate
is&software-engineering
+
–
2
answers
4
UGC NET CSE | June 2013 | Part 2 | Question: 26
Given an open address hash table with load factor $\alpha <1$, the expected number of probes in a successful search is Atmost $\frac{1}{\alpha}$ In $( \frac{1-\alpha}{\alpha})$ Atmost $\frac{1}{\alpha}$ In $( \frac{1 }{1-\alpha})$ Atleast $\frac{1}{\alpha}$ In $( \frac{1 }{1-\alpha})$ Atleast $\frac{1}{\alpha}$ In $( \frac{\alpha }{1-\alpha})$
Given an open address hash table with load factor $\alpha <1$, the expected number of probes in a successful search isAtmost $\frac{1}{\alpha}$ In $( \frac{1-\alpha}{\alp...
2.6k
views
answered
Jun 21, 2017
Others
ugcnetcse-june2013-paper2
+
–
3
answers
5
UGC NET CSE | June 2013 | Part 2 | Question: 24
Given a Non-deterministic Finite Automaton (NFA) with states $\text{p}$ and $\text{r}$ as initial and final states respectively and transition table as given below $:$ ... $5$ $4$ $3$ $2$
Given a Non-deterministic Finite Automaton (NFA) with states $\text{p}$ and $\text{r}$ as initial and final states respectively and transition table as given below $:$$$\...
7.7k
views
answer edited
Jun 20, 2017
Theory of Computation
ugcnetcse-june2013-paper2
theory-of-computation
+
–
2
answers
6
UGC NET CSE | June 2013 | Part 2 | Question: 3
While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one of the following? Length of code Size of software Functionality of software None of the above
While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one of the following?Length of codeSize of softwareFunctiona...
6.4k
views
answer edited
Jun 20, 2017
IS&Software Engineering
is&software-engineering
ugcnetcse-june2013-paper2
+
–
2
answers
7
UGC NET CSE | December 2013 | Part 2 | Question: 27
The context free grammar for the language: $L=\{a^n b^m \mid n \leq m + 3, n \geq 0, m \geq 0 \}$ is $S \rightarrow aaa \quad A; A \rightarrow aAb \mid B, B \rightarrow Bb \mid \lambda$ ... $S \rightarrow aaaA \mid aa \quad A \mid aA \mid \lambda, A \rightarrow aAb \mid B, B \rightarrow Bb \mid \lambda$
The context free grammar for the language:$L=\{a^n b^m \mid n \leq m + 3, n \geq 0, m \geq 0 \}$ is$S \rightarrow aaa \quad A; A \rightarrow aAb \mid B, B \rightarrow Bb ...
3.6k
views
answer edited
Jun 18, 2017
Theory of Computation
ugcnetcse-dec2013-paper2
theory-of-computation
context-free-grammar
+
–
3
answers
8
UGC NET CSE | June 2014 | Part 2 | Question: 08
A shift reduce parser suffers from Shift reduce conflict only Reduce reduce conflict only Both shift reduce conflict and reduce reduce conflict Shift handle and reduce handle conflicts
A shift reduce parser suffers from Shift reduce conflict only Reduce reduce conflict only Both shift reduce conflict and reduce reduce conflict Shift handle and reduce ha...
4.6k
views
answer edited
Jun 17, 2017
Compiler Design
ugcnetcse-june2014-paper2
compiler-design
parsing
+
–
4
answers
9
UGC NET CSE | June 2014 | Part 2 | Question: 33
Consider a system with five processes $P_{0}$ through $P_{4}$ and three resource types $R_{1}$, $R_{2}$ and $R_{3}$ . Resource type $R_{1}$ has $10$ instances, $R_{2}$ has $5$ instances and $R_{3}$ has ... $R_{3}$. The state resulting after this allocation will be Ready state Safe state Blocked state Unsafe state
Consider a system with five processes $P_{0}$ through $P_{4}$ and three resource types $R_{1}$, $R_{2}$ and $R_{3}$ . Resource type $R_{1}$ has $10$ instances, $R_{2}$ ha...
6.8k
views
commented
Jun 17, 2017
Operating System
ugcnetcse-june2014-paper2
operating-system
resource-allocation
+
–
2
answers
10
UGC NET CSE | December 2014 | Part 2 | Question: 44
Which one of the following set of attributes should not be encompassed by effective software metrics ? Simple and computable Consistent and objective Consistent in the use of units and dimensions Programming language dependent
Which one of the following set of attributes should not be encompassed by effective software metrics ? Simple and computableConsistent and objectiveConsistent in the use ...
2.4k
views
answered
Jun 17, 2017
IS&Software Engineering
ugcnetcse-dec2014-paper2
is&software-engineering
software-metrics
+
–
2
answers
11
UGC NET CSE | December 2014 | Part 2 | Question: 41
_________ are applied throughout the software process. Framework activities Umbrella activities Planning activities Construction activities
_________ are applied throughout the software process.Framework activitiesUmbrella activitiesPlanning activities Construction activities
3.3k
views
answer edited
Jun 17, 2017
IS&Software Engineering
ugcnetcse-dec2014-paper2
is&software-engineering
software-process
+
–
4
answers
12
UGC NET CSE | December 2014 | Part 2 | Question: 37
A specific editor has $200 K$ of program text, $15 K$ of initial stack, $50 K$ of initialized data, and $70 K$ of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used? $1135 K$ $335 K$ $1065 K$ $320 K$
A specific editor has $200 K$ of program text, $15 K$ of initial stack, $50 K$ of initialized data, and $70 K$ of bootstrap code. If five editors are started simultaneous...
1.6k
views
answered
Jun 17, 2017
Operating System
ugcnetcse-dec2014-paper2
operating-system
process
+
–
2
answers
13
UGC NET CSE | December 2014 | Part 2 | Question: 27
In a classful addressing, first four bits in Class $A$ IP address is $1010$ $1100$ $1011$ $1110$
In a classful addressing, first four bits in Class $A$ IP address is$1010$ $1100$ $1011$ $1110$
6.5k
views
comment edited
Jun 16, 2017
Computer Networks
ugcnetcse-dec2014-paper2
computer-networks
classful-addressing
+
–
1
answer
14
UGC NET CSE | December 2014 | Part 2 | Question: 33
In a two-pass assembler, symbol table is Generated in first pass Generated in second pass Not generated at all Generated and used only in second pass
In a two-pass assembler, symbol table is Generated in first pass Generated in second pass Not generated at all Generated and used only in second pass
3.7k
views
commented
Jun 15, 2017
Compiler Design
ugcnetcse-dec2014-paper2
two-pass-assembler
+
–
2
answers
15
UGC NET CSE | December 2014 | Part 2 | Question: 10
The size of the $ROM$ required to build an 8-bit adder / subtractor with mode control, carry input, carry output and two's complement overflow output is given as $2^{16} \times 8$ $2^{18} \times 10$ $2^{16} \times 10$ $2^{18} \times 8$
The size of the $ROM$ required to build an 8-bit adder / subtractor with mode control, carry input, carry output and two's complement overflow output is given as $2^{16} ...
3.7k
views
commented
Jun 15, 2017
Digital Logic
ugcnetcse-dec2014-paper2
digital-logic
rom
+
–
4
answers
16
UGC NET CSE | December 2014 | Part 2 | Question: 08
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine $(A ∗ B) + (C ∗ D/E)$? $4$ PUSH and $3$ POP instructions $5$ PUSH and $4$ POP instructions $6$ PUSH and $2$ POP instructions $5$ PUSH and $3$ POP instructions
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine $(A ∗ B) + (C ∗ D/E)$? $4$ PUSH and...
6.5k
views
commented
Jun 14, 2017
DS
ugcnetcse-dec2014-paper2
data-structures
stack
+
–
2
answers
17
UGC NET CSE | June 2011 | Part 2 | Question: 39
How many states can a process be in ? $3$ $4$ $2$ $5$
How many states can a process be in ?$3$$4$$2$ $5$
2.3k
views
commented
Jun 14, 2017
Others
ugcnetcse-june2011-paper2
operating-system
process-scheduling
+
–
1
answer
18
UGC NET CSE | June 2007 | Part 2 | Question: 47
Wireless interconnection to the $\text{PSTN}$ are also known as: Localities $\text{CLECs}$ $\text{POPs}$ $\text{IXCs}$
Wireless interconnection to the $\text{PSTN}$ are also known as:Localities$\text{CLECs}$$\text{POPs}$$\text{IXCs}$
322
views
answered
Jun 12, 2017
Others
ugcnetcse-june2007-paper2
+
–
1
answer
19
Process scheduling
Determine True/ False for the following statement ? 1. prefetching is a method of overlapping the I/o of a job with that jon own computation 2.With spooling scheme , where the CPU overlaps the input of one job with the computation and output of other jobs 3.Spooling is handled transparently by system 4.Spooling is much more effective way of overlapping I/O and CPu operation
Determine True/ False for the following statement ?1. prefetching is a method of overlapping the I/o of a job with that jon own computation 2.With spooling scheme , where...
580
views
answer edited
Jun 2, 2017
Operating System
process-scheduling
operating-system
+
–
2
answers
20
#Pondicherry University Entrance - 2011 #Qn 68 #M.Tech C.S.E #DS
Qn. 68 Which of the data structure is suitable for implementing a buffer to file? (A) File (B) Linked List (C) Array (D) All of the above (E) None of the above
Qn. 68 Which of the data structure is suitable for implementing a buffer to file?(A) File(B) Linked List(C) Array(D) All of the above(E) None of the above
298
views
answered
May 23, 2017
2
answers
21
UGC NET CSE | June 2012 | Part 2 | Question: 3
The branch logic that provides decision making capabilities in the control unit is known as Controlled transfer Conditional transfer Unconditional transfer None of the above
The branch logic that provides decision making capabilities in the control unit is known asControlled transferConditional transferUnconditional transferNone of the above
4.6k
views
answered
May 21, 2017
CO and Architecture
ugcnetcse-june2012-paper2
co-and-architecture
+
–
1
answer
22
#Pondicherry University Entrance - 2011 #Qn 69 #M.Tech C.S.E #Web Technology #DS
Q 69. Which data structure is used to implement a request handler in a web server? (A) Stack (B) Queue (C) Arrays (D) All of the above (E) None of the above
Q 69. Which data structure is used to implement a request handler in a web server?(A) Stack(B) Queue(C) Arrays(D) All of the above(E) None of the above
449
views
answered
May 18, 2017
1
answer
23
#Pondicherry University Entrance - 2011 #Qn 70 #M.Tech C.S.E #DS-PL
Qn 70. Which of the data structure is not suitable for building a cache? (A) File (B) Linked List (C) Arrays (D) All of the above (E) None of the above
Qn 70. Which of the data structure is not suitable for building a cache?(A) File(B) Linked List(C) Arrays(D) All of the above(E) None of the above
267
views
edited
May 18, 2017
3
answers
24
UGC NET CSE | December 2011 | Part 2 | Question: 23
Data security threats include Privacy invasion Hardware failure Fraudulent manipulation of data Encryption and decryption
Data security threats includePrivacy invasionHardware failureFraudulent manipulation of dataEncryption and decryption
2.5k
views
answered
May 14, 2017
Databases
ugcnetcse-dec2011-paper2
databases
+
–
3
answers
25
UGC NET CSE | June 2011 | Part 2 | Question: 30
Which of the following switching techniques is most suitable for interactive traffic ? Circuit switching Message switching Packet switching All of the above
Which of the following switching techniques is most suitable for interactive traffic ?Circuit switchingMessage switchingPacket switchingAll of the above
2.6k
views
answered
May 12, 2017
Others
ugcnetcse-june2011-paper2
computer-networks
network-switching
+
–
1
answer
26
UGC NET CSE | December 2010 | Part 2 | Question: 48
E-Choupal refers to Calling meeting of Surpanches electronically. Conducting Panchayat meeting using latest electronic gadgets. Providing window of information to villagers and farmers in NIC network. None of the above
E-Choupal refers toCalling meeting of Surpanches electronically.Conducting Panchayat meeting using latest electronic gadgets.Providing window of information to villagers ...
2.4k
views
commented
May 12, 2017
Others
ugcnetcse-dec2010-paper2
e-technologies
+
–
2
answers
27
UGC NET CSE | June 2013 | Part 3 | Question: 22
What is the baud rate of standard 10 Mbps Ethernet? 10 megabaud 20 megabaud 30 megabaud 40 megabaud
What is the baud rate of standard 10 Mbps Ethernet?10 megabaud20 megabaud30 megabaud40 megabaud
6.0k
views
comment edited
May 12, 2017
Computer Networks
ugcnetcse-june2013-paper3
computer-networks
ethernet
+
–
2
answers
28
ISRO2015-29
Which statement is true? LALR parser is more powerful and costly as compare to other parsers All CFG's are LP and not all grammars are uniquely defined Every SLR grammar is unambiguous but not every unambiguous grammar is SLR $\text{LR(K)}$ is the most general back tracking shift reduce parsing method
Which statement is true?LALR parser is more powerful and costly as compare to other parsersAll CFG's are LP and not all grammars are uniquely definedEvery SLR grammar is ...
5.6k
views
comment edited
May 3, 2017
Compiler Design
isro2015
compiler-design
parsing
+
–
4
answers
29
ISRO2015-22
Consider the following relational query on the above database: SELECT S.name FROM Suppliers S Where S.sid NOT IN (SELECT C.sid FROM Catalog C WHERE C.pid NOT IN (SELECT P.pid FROM Parts P WHERE P.color <>'blue')) Find the names of ... names of all suppliers who have supplied only non-blue parts Find the names of all suppliers who have not supplied only non-blue part.
Consider the following relational query on the above database:SELECT S.name FROM Suppliers S Where S.sid NOT IN (SELECT C.sid FROM Catalog C WHERE C.pid NOT IN (SELECT P....
5.0k
views
commented
May 3, 2017
Databases
isro2015
databases
sql
ambiguous
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register