Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by pranjalgennext
0
votes
1
madeeasy_Mock2
.....
.....
265
views
answered
Jan 26, 2017
12
votes
2
column major in 3d array
Consider 3 dimensional Array A[90] [30] [40] stored in linear array in column major order. If the base address starts at 10. The location of A[20] [20] [30] is __________ . [Assume the first element is stored at A[1][1][1] and each element take 1 B].
Consider 3 dimensional Array A[90] [30] [40] stored in linear array in column major order. If the base address starts at 10. The location of A[20] [20] [30] is __________...
15.9k
views
answered
Jan 26, 2017
Programming in C
array
programming-in-c
data-structures
+
–
0
votes
3
MadeEasy Subject Test: Programming & DS - Programming in C
320
views
answered
Jan 20, 2017
Programming in C
made-easy-test-series
programming-in-c
programming
+
–
2
votes
4
MadeEasy Subject Test: Theory of Computation - Identify Class Language
Consider the following language, $L= \big\{ xy \mid x, \ y \in \big\{0,1\big\}^{*} \ where \ x \neq y \ but \ |x| = |y| \big\}$ The language is ___________. Regular CFL but not regular CSL but not CFL Recursive but not CSL
Consider the following language,$L= \big\{ xy \mid x, \ y \in \big\{0,1\big\}^{*} \ where \ x \neq y \ but \ |x| = |y| \big\}$The language is ___________.RegularCFL ...
4.1k
views
answered
Jan 19, 2017
Theory of Computation
made-easy-test-series
theory-of-computation
identify-class-language
+
–
4
votes
5
Pipeline
An instruction pipeline has stages as given in diagram A program consistsing of 9 instruction I1,I2....I9 is executed in this pipeline processor.instruction I3 is the only conditional branch instruction and its branch target is I7,If the branch taken after EI state,the time needed to complete the program is?
An instruction pipeline has stages as given in diagramA program consistsing of 9 instruction I1,I2....I9 is executed in this pipeline processor.instruction I3 is the only...
916
views
answered
Jan 14, 2017
CO and Architecture
co-and-architecture
pipelining
+
–
1
votes
6
Testbook Question
264
views
answered
Dec 23, 2016
Algorithms
algorithms
asymptotic-notation
testbook-test-series
+
–
4
votes
7
TIFR CSE 2017 | Part B | Question: 3
We have an implementation that supports the following operations on a stack (in the instructions below, $\mathsf{s}$ is the name of the stack). $\mathsf{isempty(s)}$ : returns $\mathsf{True}$ if $\mathsf{s}$ is empty, and $\mathsf{False}$ otherwise. $\mathsf{top(s)}$ : returns the top ... ()((())((((") is executed? $(((($ $))) \ (((($ $)))$ $(((()))$ $()()$
We have an implementation that supports the following operations on a stack (in the instructions below, $\mathsf{s}$ is the name of the stack).$\mathsf{isempty(s)}$ : ret...
3.0k
views
answered
Dec 23, 2016
DS
tifr2017
data-structures
stack
+
–
4
votes
8
TIFR CSE 2017 | Part B | Question: 5
Consider the following psuedocode fragment, where $y$ is an integer that has been initialized. int i=1 int j=1 while (i<10): j=j*i i=i+1 if (i==y): break end if end while Consider the following statements: $(i==10)$ or $(i==y)$ If ... the end of the while loop? Choose from the following options. i only iii only ii and iii only i, ii, and iii None of the above
Consider the following psuedocode fragment, where $y$ is an integer that has been initialized.int i=1 int j=1 while (i<10): j=j*i i=i+1 if (i==y): break end if end whileC...
3.1k
views
answered
Dec 23, 2016
Programming in C
tifr2017
programming
loop-invariants
+
–
0
votes
9
Algorithm ADA made easy
consider the following keys that are hashed into table in the order using giving hash function h(i)=(2i+5)mod11 12,44,13,88,23,94,11,39,20,16,5 Assume hash tables has locations from 0to 10.If hash table uses chaining to handle the collisions what is the probability of new elements'x' fit inside hash table without any collision I am getting answer 0.5
consider the following keys that are hashed into table in the order using giving hash function h(i)=(2i+5)mod1112,44,13,88,23,94,11,39,20,16,5 Assume hash tables has loca...
805
views
answered
Dec 22, 2016
Algorithms
hashing
numerical-answers
made-easy-test-series
+
–
0
votes
10
Complexity2
Consider a stack is implemented using an array. What is the worst case time complexity of push operation? (A) O(N) (B) O(log N) (C) O(N log N) (D) O(1)
Consider a stack is implemented using an array. What is the worst case time complexity of push operation?(A) O(N)(B) O(log N)(C) O(N log N)(D) O(1)
491
views
answered
Aug 4, 2016
5
votes
11
UGC NET CSE | December 2014 | Part 2 | Question: 04
A computer program selects an integer in the set $\left\{k:1\leq k \leq 10,00,000\right\}$ at random and prints out the result. This process is repeated 1 million times. What is the probability that the value k = 1 appears in the printout atleast once ? $0.5$ $0.704$ $0.632121$ $0.68$
A computer program selects an integer in the set $\left\{k:1\leq k \leq 10,00,000\right\}$ at random and prints out the result. This process is repeated 1 million times. ...
2.6k
views
answered
Jul 16, 2016
Quantitative Aptitude
ugcnetcse-dec2014-paper2
quantitative-aptitude
+
–
1
votes
12
Modified UGC NET 2012 Memory allocation scheme
Which among the following is (are) able to modify previously allocated space I. calloc() II. free() III. realloc() A. Both II and III B. I , II and III C. III only D. II only
Which among the following is (are) able to modify previously allocated spaceI. calloc() II. free() III. realloc() A. Both II and IIIB...
467
views
answered
Jul 12, 2016
Programming in C
programming-in-c
+
–
0
votes
13
UGC NET CSE | June 2014 | Part 3 | Question: 52
Match the following interfaces of Java. Servlet package $:$ ... $\text{a-ii, b-iii, c-iv, d-i}$ $\text{a-iv, b-i, c-ii, d-iii}$
Match the following interfaces of Java. Servlet package $:$$\begin{array}{clcl} & \textbf{List – I} && \textbf{List – II}\\ \text{a.}& \text{Servlet config} & \text{i...
1.9k
views
answered
Jul 11, 2016
Java
ugcnetjune2014iii
java
servlet
+
–
4
votes
14
Eigen values
To find out the Eigen values we put the |A-⋋I | =0 why we put the determinant =0 . Is there any specific reason For this
To find out the Eigen values we put the |A-⋋I | =0 why we put the determinant =0 .Is there any specific reason For this
1.8k
views
answered
Jul 10, 2016
Linear Algebra
eigen-value
+
–
4
votes
15
recurrence ,please tell me which method should i apply? is geometric expansion ??
find solution to the recurrence equation $T(2^k) = 3 T(2^{k-1}) + 1, T (1) = 1$,
find solution to the recurrence equation $T(2^k) = 3 T(2^{k-1}) + 1, T (1) = 1$,
744
views
answered
Jul 10, 2016
Algorithms
recurrence-relation
+
–
0
votes
16
Which is true about constructor and destructor?
Which of the statements below are true ? default constructor does not accept a parameter constructor can accept a reference to its own class as parameter copy constructor is known as copy initialization destructor accepts any type of value as parameter i and iii i, ii and iii ii and iii All of the above
Which of the statements below are true ?default constructor does not accept a parameterconstructor can accept a reference to its own class as parametercopy constructor is...
1.5k
views
answered
Jul 10, 2016
Programming in C
programming-in-c
+
–
0
votes
17
(Polling versus interrupts) Which of the statements below is correct ?
(Polling versus interrupts) Which of the statements below is correct ? Polling is done periodically by the CPU Polling requires less hardware in peripherals than interrupts Polling makes more demands on CPU resources than interrupts Polling is harder to implement than interrupts i only ii and iv i and iii i, ii. iii and iv
(Polling versus interrupts) Which of the statements below is correct ?Polling is done periodically by the CPUPolling requires less hardware in peripherals than interrupts...
431
views
answered
Jul 10, 2016
Operating System
operating-system
+
–
0
votes
18
select the drawback of waterfall model:
select the drawback of waterfall model: (A) Customer gets opportunity to review the product very late (B) It does not help the project manager for proper planning (C) Partial product is built in the initial stages (D) Poor documentation
select the drawback of waterfall model:(A) Customer gets opportunity to review the product very late(B) It does not help the project manager for proper planning(C) Partia...
553
views
answered
Jul 10, 2016
Unknown Category
is&software-engineering
+
–
0
votes
19
permutations with repititions
In how many ways 10 different letters can be posed in 6 post boxes so that at most 4 boxes may be empty?
In how many ways 10 different letters can be posed in 6 post boxes so that at most 4 boxes may be empty?
566
views
answered
Jul 10, 2016
Combinatory
combinatory
engineering-mathematics
+
–
1
votes
20
LR(1)grammar
Is there any short method to check whether the given grammar in is LR(1)?. If yes please share.
Is there any short method to check whether the given grammar in is LR(1)?. If yes please share.
1.4k
views
answered
Jul 10, 2016
0
votes
21
Can i expect any computer subject in IAS ? Guidee please ?
Which subjects are required for IPS/IAS exam? Can i adopt any computer subject in it ?
Which subjects are required for IPS/IAS exam?Can i adopt any computer subject in it ?
423
views
answered
Jul 10, 2016
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register