Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by VS
2
votes
0
answers
21
Asymptotic-notations
Let f(n)=O(n),g(n)=O(n) and h(n)=Ѳ(n). Then [f(n).g(n)]+h(n) is: Ω (n) O (n) Ѳ (n) None of these
Let f(n)=O(n),g(n)=O(n) and h(n)=Ѳ(n). Then [f(n).g(n)]+h(n)is:Ω (n)O (n)Ѳ (n)None of these
291
views
asked
Jan 3, 2018
Algorithms
asymptotic-notation
+
–
2
votes
1
answer
22
Flooding
Flooding always guaranteed to send packet from source to destination with minimum number of hops. (True / False)
Flooding always guaranteed to send packet from source to destination with minimum number of hops. (True / False)
1.3k
views
asked
Dec 31, 2017
Computer Networks
computer-networks
+
–
10
votes
4
answers
23
Hashing (Test Series)
Consider an initially empty hash table of length 10. Following set of keys are inserted using open addressing with hash function h(k) = k mod 10 and linear probing. 0 1 91 2 2 3 13 4 24 5 12 6 62 7 77 8 82 9 The number of different insertion sequence of the key values using the given hash function and linear probing will result in the hash table shown in above __________.
Consider an initially empty hash table of length 10. Following set of keys are inserted using open addressing with hash function h(k) = k mod 10 and linear probing.0 1912...
3.4k
views
asked
Dec 31, 2017
DS
data-structures
hashing
+
–
2
votes
0
answers
24
Identify class of language
L={ (anbn)* | n>0 }
L={ (anbn)* | n>0 }
599
views
asked
Dec 28, 2017
Theory of Computation
theory-of-computation
identify-class-language
+
–
1
votes
1
answer
25
Distributed Lattice
Is the following lattice distributed ?
Is the following lattice distributed ?
1.4k
views
asked
Dec 28, 2017
Set Theory & Algebra
lattice
set-theory&algebra
+
–
2
votes
0
answers
26
Stack
Consider a stack and we wish to perform an operation StackDelete() in which we wish to delete all the elements of the stack .What is the worst case time complexity of doing this if stack is implemented: 1) Using an array 2)Using a Linked list
Consider a stack and we wish to perform an operation StackDelete() in which we wish to delete all the elements of the stack .What is the worst case time complexity of doi...
764
views
asked
Dec 26, 2017
Programming in C
data-structures
stack
+
–
3
votes
2
answers
27
DCFG grammar
Can a DCFG grammar be Ambiguous? If so please provide an example.
Can a DCFG grammar be Ambiguous? If so please provide an example.
2.4k
views
asked
Dec 24, 2017
Theory of Computation
theory-of-computation
grammar
+
–
2
votes
0
answers
28
LL(k)
I know that LL(1) grammar can have No left factoring ,No Left recursion and No Ambiguity. Is same thing true for LL(k) as well i.e. LL(k) which is reading k symbols at a time from input string. Does LL(k) grammar can have No left factoring ,No Left recursion and No Ambiguity ?
I know that LL(1) grammar can have No left factoring ,No Left recursion and No Ambiguity.Is same thing true for LL(k) as well i.e. LL(k) which is reading k symbols at a...
4.1k
views
asked
Dec 23, 2017
Compiler Design
compiler-design
grammar
+
–
2
votes
1
answer
29
Go back n
Consider a network connecting two systems, ‘A’ and ‘B’ located 6000 km apart. The propagation speed of media is 2 × 106 mps. It is needed to design a Go-Back-7 sliding window protocol for this network. The average packet size is 107 bits. If network used as its full capacity, then the bandwidth of network is__________ Mbps
Consider a network connecting two systems, ‘A’ and ‘B’ located 6000 km apart. The propagation speed of media is 2 × 106 mps. It is needed to design a Go-Back-7 s...
975
views
asked
Dec 23, 2017
Computer Networks
computer-networks
go-back-n
sliding-window
+
–
0
votes
1
answer
30
Probability Density function
1.0k
views
asked
Dec 22, 2017
Probability
engineering-mathematics
probability
+
–
1
votes
0
answers
31
Deadlock Prevention
If a process releases all its resources before requesting a new resource, then deadlock is possible.(True/False)
If a process releases all its resources before requesting a new resource, then deadlock is possible.(True/False)
288
views
asked
Dec 20, 2017
Operating System
deadlock-prevention-avoidance-detection
+
–
0
votes
1
answer
32
C-output
996
views
asked
Dec 14, 2017
Programming in C
programming-in-c
bad-question
+
–
2
votes
1
answer
33
B+ tree 2
Suppose size of block 1000 bytes search key of 12 bytes, pointer size 8 bytes. How many maximum records in DB file which can index by dense B+ tree of 2 levels?
Suppose size of block 1000 bytes search key of 12 bytes, pointer size 8 bytes. How many maximum records in DB file which can index by dense B+ tree of 2 levels?
2.4k
views
asked
Dec 10, 2017
Databases
databases
bplustrees
indexing
+
–
2
votes
2
answers
34
B+ tree
The minimum number of elements (keys) that need to be inserted into a B+ tree with the order of internal node 3 [maximum child pointers per node] and leaf node 2 [maximum keys per node], to make it to reach 3-levels are __________.
The minimum number of elements (keys) that need to be inserted into a B+ tree with the order of internal node 3 [maximum child pointers per node] and leaf node 2 [maximum...
2.0k
views
asked
Dec 10, 2017
Databases
databases
bplustrees
+
–
7
votes
0
answers
35
Access link vs Control Link
Access Link : 1) An access link from record A points to the record of the closest enclosing block in the program. 2) The chain of access links traces the static structure (think: scopes) of the program. 3) Refers to non-local data in other ... execution of the program. 3) Refers to non-local data in other activation record. (NOT CLEAR) Can anyone explain this line ?
Access Link :1) An access link from record A points to the record of the closest enclosing block in the program.2) The chain of access links traces the static structure (...
9.6k
views
asked
Dec 9, 2017
Compiler Design
compiler-design
+
–
0
votes
2
answers
36
Minimum Spanning Tree
Multiplying all edge weights by a positive number(>1) will always change the cost of minimum spanning tree. True/False
Multiplying all edge weights by a positive number(>1) will always change the cost of minimum spanning tree.True/False
3.8k
views
asked
Dec 8, 2017
Algorithms
algorithms
minimum-spanning-tree
+
–
3
votes
2
answers
37
Binary Search
Suppose we have the following sorted list: [3, 5, 6, 8, 11, 12, 14, 15, 17, 18] and array data structure is used. We are using recursive binary search algorithm to search an element 8. Which of the following group of number correctly shown the sequence of comparison used to find element 8? (Assume array index starting with 0). a) 11,5,6,8 b) 12,6,11,8
Suppose we have the following sorted list:[3, 5, 6, 8, 11, 12, 14, 15, 17, 18]and array data structure is used. We are using recursive binary search algorithm to search a...
3.9k
views
asked
Dec 8, 2017
Algorithms
binary-search
+
–
1
votes
0
answers
38
Balanced Binary Tree vs Complete Tree
Balanced Binary Tree vs Complete Tree Insertion and Deletion is faster in which of the above 2 structures?
Balanced Binary Tree vs Complete TreeInsertion and Deletion is faster in which of the above 2 structures?
544
views
asked
Dec 8, 2017
Algorithms
self-doubt
data-structures
binary-tree
+
–
0
votes
1
answer
39
Identify valid conclusion
In this question, 2 statements, S1 and S2, are given and these 2 statements are followed by 2 conclusions C1 and C2. Read the conclusions and then decide as to which of the conclusions logically follow based on the given statements. Statements: S1: ... girls. S2: All girls are beautiful. Conclusions: C1: All ballet dancers are beautiful. C2: Some girls are ballet dancers.
In this question, 2 statements, S1 and S2, are given and these 2 statements are followed by 2 conclusions C1 and C2. Read the conclusions and then decide as to which of t...
1.3k
views
asked
Dec 6, 2017
Quantitative Aptitude
analytical-aptitude
logical-reasoning
statements-follow
+
–
0
votes
1
answer
40
toc-identify class of a language
843
views
asked
Nov 26, 2017
Theory of Computation
theory-of-computation
+
–
Page:
« prev
1
2
3
4
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register