Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by psb
3
votes
1
Network IP Addressing
IP : 199. 166.15.119 SubNet Mask: 255. 255. 255. 240 Then Find the (i) SubNet ID ? (ii) SubNet No. ? (iii) First host of the SubNet ? (iv) Last host of the SubNet? (v) third host of the first SubNet? I found ambiguity in ans person to person .
IP : 199. 166.15.119SubNet Mask: 255. 255. 255. 240Then Find the (i) SubNet ID ?(ii) SubNet No. ?(iii) First host of the SubNet ?(iv) Last host of the SubNet?(v) third ho...
1.1k
views
answered
Mar 22, 2018
Computer Networks
network-addressing
ip-addressing
computer-networks
ip
+
–
2
votes
2
Test Series
Delete the key sequence [6,5,4] from the below AVL tree. How many rotations are needed to make it balanced AVL tree again?
Delete the key sequence [6,5,4] from the below AVL tree. How many rotations are needed to make it balanced AVL tree again?
938
views
answered
Mar 21, 2018
DS
data-structures
avl-tree
+
–
1
votes
3
Test by Bikram | Computer Networks | Test 1 | Question: 8
The message $11011011$ should be transmitted using CRC polynomial $x3+x+1$, to protect it from errors that message will be transmitted as ________
The message $11011011$ should be transmitted using CRC polynomial $x3+x+1$, to protect it from errors that message will be transmitted as ________
893
views
answered
Sep 12, 2017
Computer Networks
tbb-cn-1
numerical-answers
+
–
1
votes
4
Testbook Test Series: Theory Of Computation - Grammar
423
views
answered
Aug 1, 2017
Theory of Computation
testbook-test-series
test-series
grammar
theory-of-computation
+
–
0
votes
5
Lattices | hasse-diagram
Why the following Hasse Diagram is not a lattice ...?
Why the following Hasse Diagram is not a lattice ...?
1.6k
views
answered
Jul 31, 2017
Set Theory & Algebra
hasse-diagram
+
–
1
votes
6
Test by Bikram | Theory of Computation | Test 1 | Question: 14
Consider the grammar given below : $S \rightarrow AB \mid DA$ $B \rightarrow BCD \mid ABD \mid CC \mid b$ $A \rightarrow a \mid BC$ $C \rightarrow aBD \mid a$ $C \rightarrow aBCAD \mid DaB$ $A \rightarrow aBCAD \mid Da$ ... following non terminal is useless in the grammar (as non terminal strings can be derived from it): $D$ $C$ $B$ $A$
Consider the grammar given below :$S \rightarrow AB \mid DA$$B \rightarrow BCD \mid ABD \mid CC \mid b$$A \rightarrow a \mid BC$$C \rightarrow aBD \mid a$$C \rightarrow a...
438
views
answered
Jan 11, 2017
Theory of Computation
tbb-toc-1
grammar
+
–
24
votes
7
GATE CSE 1988 | Question: 2xv
What is printed by following program, assuming call-by reference method of passing parameters for all variables in the parameter list of procedure P? program Main(inout, output); var a, b:integer; procedure P(x, y, z:integer); begin y:=y+1 z:=x+x end P; begin a:=2; b:=3; p(a+b, a, a); Write(a) end.
What is printed by following program, assuming call-by reference method of passing parameters for all variables in the parameter list of procedure P?program Main(inout, o...
2.3k
views
answered
Dec 28, 2016
Compiler Design
gate1988
descriptive
compiler-design
runtime-environment
parameter-passing
numerical-answers
+
–
2
votes
8
For a class C network if IP address of a computer is 200.99.39.112 and subnet mask is 255.255.255.224
For a class C network if IP address of a computer is 200.99.39.112 and subnet mask is 255.255.255.224 the first host of first subnet (represent last octet) is ________. M...
4.2k
views
answered
May 21, 2016
Computer Networks
computer-networks
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register