Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by sh!va
1
votes
41
DFA Construction
Minimal dfa which accepts the substring 010 or 01000
Minimal dfa which accepts the substring 010 or 01000
397
views
answered
Dec 31, 2017
4
votes
42
output
What is the output of this C code? 1. #include <stdio.h> 2. int main() 3. { 4. int a = 10, b=20, c=30; 5. a<<2>>4; 6. b<<=2>>4; 7. if (a >> 1) 8. printf("%d %d %d\n", a, b, c<<2>>4); 9. } plz explain line number 5 & 6???
What is the output of this C code? 1. #include <stdio.h 2. int main() 3. { 4. int a = 10, b=20, c=30; 5. a<<2>>4; 6. b<<=2>>4; 7. if (a > 1) 8. printf("%d %d %d\n", a, b,...
300
views
answered
Dec 31, 2017
Programming in C
programming-in-c
+
–
0
votes
43
combinatory
From a group of 10 professors how many ways can a committee of 5 members can be formed so that atleast one of the professor A and professor B will be included ?
From a group of 10 professors how many ways can a committee of 5 members can be formed so that atleast one of the professor A and professor B will be included ?
1.6k
views
answered
Dec 31, 2017
1
votes
44
MadeEasy Test Series: Algorithms - Time Complexity
please explain answer given c
please explain answer given c
713
views
answered
Dec 31, 2017
Algorithms
made-easy-test-series
algorithms
time-complexity
+
–
4
votes
45
MadeEasy Test Series: CO & Architecture - Cache Memory
The statement " Direct mapped cache, may produce more misses if programs refers to memory words that occupy a same tag value." is true or false ?
The statement " Direct mapped cache, may produce more misses if programs refers to memory words that occupy a same tag value." is true or false ?
1.9k
views
answered
Dec 31, 2017
CO and Architecture
made-easy-test-series
co-and-architecture
direct-mapping
cache-memory
+
–
2
votes
46
MadeEasy Test Series 2017: Computer Networks - Serial Communication
In synchronous transmission, 5 eight bit characters are included in 30 eight bit information characters. If bit rate of sender is 4200 bits/sec, what is the bit rate of receiver (in bits per sec)?
In synchronous transmission, 5 eight bit characters are included in 30 eight bit information characters. If bit rate of sender is 4200 bits/sec, what is the bit rate of r...
896
views
answered
Dec 30, 2017
Computer Networks
made-easy-test-series
computer-networks
serial-communication
madeeasy-testseries-2017
+
–
1
votes
47
closure property
CFL over a single alphabet are always-> A. dcfl B. regular C. dcfl but not regular d. non regular
CFL over a single alphabet are always->A. dcflB. regularC. dcfl but not regulard. non regular
689
views
answered
Dec 30, 2017
Theory of Computation
theory-of-computation
context-free-language
closure-property
regular-language
+
–
4
votes
48
MadeEasy Test Series 2017: Computer Networks - Congestion Control
Let the size of congestion window of a TCP connection be 38 KB when a timeout occurs. The propagation time of the connection is 100 msec and the maximum segment size used is 2 KB. The time taken (in msec) by the TCP connection to get back to 36 KB congestion window is ________.
Let the size of congestion window of a TCP connection be 38 KB when a timeout occurs. The propagation time of the connection is 100 msec and the maximum segment size used...
813
views
answered
Dec 30, 2017
Computer Networks
made-easy-test-series
computer-networks
congestion-control
madeeasy-testseries-2017
+
–
5
votes
49
index
Every ________ index is Clustered a)primary b)secondary
Every ________ index is Clustereda)primaryb)secondary
996
views
answered
Dec 29, 2017
Databases
indexing
databases
+
–
3
votes
50
operating system
if file size is large and is to be accessed randomly then which allocation strategy is best? A. linked B. indexed c. contigous
if file size is large and is to be accessed randomly then which allocation strategy is best?A. linkedB. indexedc. contigous
3.1k
views
answered
Dec 29, 2017
Operating System
operating-system
+
–
3
votes
51
error control
In a data link protocol, the following character encoding is used: A → 01000111 B → 11100011 FLAG → 01111110 ESC → 11100000 Assuming that byte stuffing is employed for the four character frame A B ESC FLAG, transmitter sends it ... B 01111110 01000111 11100011 11100000 11100000 01111110 01111110 C 01111110 01000111 11100011 11100000 11100000 11100000 01111110 01111110 d none of these
In a data link protocol, the following character encoding is used:A → 01000111 B → 11100011 FLAG → 01111110 ESC → 11100000Assuming that byte stuffing is employed ...
621
views
answered
Dec 26, 2017
0
votes
52
SSC-IMD-2017-10
The two methods how LRU page replacement policy can be implemented in hardware are : 1) Counters 2) RAM & Registers 3) Stack & Counters 4) Registers
The two methods how LRU page replacement policy can be implemented in hardware are :1) Counters2) RAM & Registers3) Stack & Counters4) Registers
379
views
answered
Dec 7, 2017
Operating System
ssc-imd
operating-system
+
–
5
votes
53
Token Ring
If bandwidth of a token ring is 48Mbps and token holding time is 5ms then find the minimum and maximum payload in bytes?
If bandwidth of a token ring is 48Mbps and token holding time is 5ms then find theminimum and maximum payload in bytes?
2.7k
views
answered
Nov 22, 2017
Computer Networks
computer-networks
token-ring
+
–
0
votes
54
self doubt
what is the difference between baseband and broadband transmission/
what is the difference between baseband and broadband transmission/
228
views
answered
Nov 17, 2017
1
votes
55
UGC NET CSE | November 2017 | Part 2 | Question: 11
$\text{prtdata}$ is a pointer to a data type. The expression $^*\text{prtdata}++$ is evaluated as (in C++) $^*(\text{prtdata++})$ $(^*\text{prtdata})++$ $^*(\text{prtdata})++$ Depends on compiler
$\text{prtdata}$ is a pointer to a data type. The expression $^*\text{prtdata}++$ is evaluated as (in C++)$^*(\text{prtdata++})$$(^*\text{prtdata})++$$^*(\text{prtdata})+...
821
views
answered
Nov 6, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
56
UGC NET CSE | November 2017 | Part 2 | Question: 12
The associativity of which of the following operators is Left to Right, in C++? Unary Operator Logical not Array element access addressof
The associativity of which of the following operators is Left to Right, in C++?Unary OperatorLogical notArray element accessaddressof
1.1k
views
answered
Nov 6, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
1
votes
57
UGC NET CSE | November 2017 | Part 2 | Question: 2
Let $m=(313)_4$ and $n=(322)_4$. Find the base $4$ expansion of $m+n$. $(635)_4$ $(32312)_4$ $(21323)_4$ $(1301)_4$
Let $m=(313)_4$ and $n=(322)_4$. Find the base $4$ expansion of $m+n$.$(635)_4$$(32312)_4$$(21323)_4$$(1301)_4$
1.3k
views
answered
Nov 6, 2017
Unknown Category
ugcnetcse-nov2017-paper2
+
–
0
votes
58
UGC NET CSE | November 2017 | Part 2 | Question: 1
If the time is now $4$ O' clock, what will be the time $101$ hours from now? $9$ O' clock $8$ O' clock $5$ O' clock $4$ O' clock
If the time is now $4$ O' clock, what will be the time $101$ hours from now?$9$ O' clock$8$ O' clock$5$ O' clock$4$ O' clock
1.1k
views
answered
Nov 6, 2017
Quantitative Aptitude
ugcnetcse-nov2017-paper2
+
–
1
votes
59
TCP HEADER , FRAME SIZE
631
views
answered
Nov 6, 2017
Computer Networks
tcp
computer-networks
+
–
0
votes
60
madeeasy
STUDENT(SID(PK) , SNAME) with 100 tuples. ENROLL(SID CID (composite key) with 200 tuples. how many maximum tuples in STUDENT JOIN ENROLL ?? thanku
STUDENT(SID(PK) , SNAME) with 100 tuples.ENROLL(SID CID (composite key) with 200 tuples.how many maximum tuples inSTUDENT JOIN ENROLL ??thanku
379
views
answered
Nov 1, 2017
Databases
databases
+
–
3
votes
61
ace test series 2018
434
views
answered
Nov 1, 2017
Computer Networks
computer
network
cidr
+
–
1
votes
62
self doubt
how to decide maximum limit of virtual address space ? is it max disk space available?
how to decide maximum limit of virtual address space ? is it max disk space available?
230
views
answered
Nov 1, 2017
1
votes
63
UGC NET CSE | December 2005 | Part 2 | Question: 41
The testing of software against $\text{SRS}$ is called : Acceptance testing Integration testing Regression testing Series testing
The testing of software against $\text{SRS}$ is called :Acceptance testingIntegration testingRegression testingSeries testing
684
views
answered
Sep 30, 2017
Others
ugcnetcse-dec2005-paper2
+
–
2
votes
64
Doubt :Regular Language
L={ W(W^r) , W ∈ (a,b)* } W^r is reverse of W. Is it a regular language ? please Explain.
L={ W(W^r) , W ∈ (a,b)* }W^r is reverse of W.Is it a regular language ?please Explain.
401
views
answered
Sep 13, 2017
5
votes
65
Tokens and lexems
What is difference between lexems and tokens please explain with example
What is difference between lexems and tokens please explain with example
1.5k
views
answered
Sep 13, 2017
Compiler Design
compiler-design
compiler-tokenization
descriptive
+
–
5
votes
66
GATE CSE 2010 | Question: 21,ISRO2017-60
The cyclomatic complexity of each of the modules $\text{A}$ and $\text{B}$ shown below is $10.$ What is the cyclomatic complexity of the sequential integration shown on the right hand side? $19$ $21$ $20$ $10$
The cyclomatic complexity of each of the modules $\text{A}$ and $\text{B}$ shown below is $10.$ What is the cyclomatic complexity of the sequential integration shown on t...
12.6k
views
answered
May 8, 2017
IS&Software Engineering
gatecse-2010
is&software-engineering
cyclomatic-complexity
easy
isro2017
+
–
19
votes
67
GATE CSE 2007 | Question: 8, ISRO2011-31
How many $3$-to-$8$ line decoders with an enable input are needed to construct a $6$-to-$64$ line decoder without using any other logic gates? $7$ $8$ $9$ $10$
How many $3$-to-$8$ line decoders with an enable input are needed to construct a $6$-to-$64$ line decoder without using any other logic gates?$7$$8$$9$$10$
21.4k
views
answered
May 2, 2017
Digital Logic
gatecse-2007
digital-logic
normal
isro2011
decoder
+
–
19
votes
68
ISRO2008-23
A computer uses $8$ digit mantissa and $2$ digit exponent. If $a=0.052$ and $b=28E+11$ then $b+a-b$ will : result in an overflow error result in an underflow error be $0$ be $5.28E$+$11$
A computer uses $8$ digit mantissa and $2$ digit exponent. If $a=0.052$ and $b=28E+11$ then $b+a-b$ will :result in an overflow errorresult in an underflow errorbe $0$be ...
7.6k
views
answered
May 1, 2017
Digital Logic
isro2008
digital-logic
number-representation
floating-point-representation
+
–
1
votes
69
csma/cd
who generate JAM signal while collision?
who generate JAM signal while collision?
790
views
answered
Apr 30, 2017
Computer Networks
csma-cd
+
–
1
votes
70
ISRO2008-32
The network $198.78.41.0$ is a Class A network Class B network Class C network Class D network
The network $198.78.41.0$ is aClass A networkClass B networkClass C networkClass D network
6.8k
views
answered
Apr 29, 2017
Computer Networks
isro2008
computer-networks
ip-address
+
–
Page:
« prev
1
2
3
4
5
6
7
...
17
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register