Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by stblue
4
votes
1
MadeEasy Subject Test: Engineering Mathematics - Functions
The number of ways possible to form injective function from set A to set B where |A| = 3 and |B| = 5, such that pth element of set A cannot match with pth element of set B are _________. can someone explain this question to me
The number of ways possible to form injective function from set A to set B where |A| = 3 and |B| = 5, such that pth element of set A cannot match with pth element of set ...
745
views
answered
Feb 3, 2018
Set Theory & Algebra
made-easy-test-series
discrete-mathematics
set-theory&algebra
functions
+
–
1
votes
2
made easy test
Consider a machine with a byte addressable main memory of 224 bytes, block size is 32 bytes and 4 way set associative cache having 215 cache blocks. Block size of cache is 32 byte then what is the set and tag address of memory (E4201F)16 in hexadecimal? A) 0100, 39 B) 0010, 37 C) 0110, 39 D) 0100, 36
Consider a machine with a byte addressable main memory of 224 bytes, block size is 32 bytes and 4 way set associative cache having 215 cache blocks. Block size of cache i...
727
views
answered
Jan 28, 2018
4
votes
3
RSA Public key Cryptosystem
Plz tell me how to solve this .I am feeling problem o calculate -- 10 = p^5 mod 35 . How to solve this type of question quickly.
Plz tell me how to solve this .I am feeling problem o calculate 10 = p^5 mod 35 . How to solve this type of question quickly.
1.9k
views
answered
Jan 16, 2018
Computer Networks
computer-networks
network-security
rsa-security-networks
+
–
0
votes
4
NIELIT 2017 DEC Scientist B - Section B: 50
Let $n$ is the length of string to test for membership, then the number of table entry in CYK algorithm is $n(n+1)$ $n^2+1$ $n^2-1$ $n(n+1)/2$
Let $n$ is the length of string to test for membership, then the number of table entry in CYK algorithm is$n(n+1)$$n^2+1$$n^2-1$$n(n+1)/2$
1.7k
views
answered
Dec 18, 2017
Theory of Computation
nielit2017dec-scientistb
theory-of-computation
cyk-algorithm
+
–
3
votes
5
Number of Essential prime implicants
Find the number of Essential prime implicants present in the K Map of the function f=Σ(2,3,5,7,8,12,13).Here the answer is 2,can anybody explain why it is 2?
Find the number of Essential prime implicants present in the K Map of the functionf=Σ(2,3,5,7,8,12,13).Here the answer is 2,can anybody explain why it is 2?
1.3k
views
answered
Oct 15, 2017
Digital Logic
digital-logic
prime-implicants
k-map
minimization
+
–
2
votes
6
set associative
Computer has 256KB 8 way set associative cache memory.The number of tag bits in its physical address format is 6 bits then size of the physical memory is __________mega bye
Computer has 256KB 8 way set associative cache memory.The number of tag bits in its physical address format is 6 bits then size of the physical memory is __________mega b...
1.1k
views
answered
Oct 14, 2017
0
votes
7
Modified Binary Search
Suppose the first step in binary search algorithm is changed to M = (9L+R)/10, we know that the complexity of binary search is log(n). What will be the complexity of modified search? a) log(n) b) n c) n$\log 9/10(n)$ d) 2nlog(n)
Suppose the first step in binary search algorithm is changed to M = (9L+R)/10, we know that the complexity of binary search is log(n). What will be the complexity of modi...
1.5k
views
answered
Oct 10, 2017
DS
time-complexity
binary-search
+
–
1
votes
8
Complement
State True or False 1. -128 can be represented in 1's complement 8 bit number 2. -128 can be represented in 2's complement 8 bit number
State True or False1. -128 can be represented in 1's complement 8 bit number2. -128 can be represented in 2's complement 8 bit number
374
views
answered
Oct 9, 2017
CO and Architecture
co-and-architecture
+
–
2
votes
9
made easy test series
493
views
answered
Oct 2, 2017
Operating System
operating-system
+
–
1
votes
10
Ace Test Series: Databases - Database Normalization
1.2k
views
answered
Oct 2, 2017
Databases
bcnf-decomposition
ace-test-series
databases
database-normalization
+
–
24
votes
11
GATE IT 2005 | Question: 61
Consider a $2$-way set associative cache memory with $4$ sets and total $8$ cache blocks $(0-7)$ and a main memory with $128$ blocks $(0-127)$. What memory blocks will be present in the cache after the following sequence of memory block references if LRU policy is used for cache block replacement. ... $9$ $16$ $55$ $0$ $5$ $7$ $9$ $16$ $55$ $3$ $5$ $7$ $9$ $16$ $55$
Consider a $2$-way set associative cache memory with $4$ sets and total $8$ cache blocks $(0-7)$ and a main memory with $128$ blocks $(0-127)$. What memory blocks will be...
9.0k
views
answered
Oct 2, 2017
CO and Architecture
gateit-2005
co-and-architecture
cache-memory
normal
+
–
1
votes
12
Depth first Search
What should be the answer?? Key is given as opttion B. . !! I was getting D) None
What should be the answer?? Key is given as opttion B. . !! I was getting D) None
1.4k
views
answered
Sep 30, 2017
1
votes
13
MadeEasy Subject Test: Operating System - Resource Allocation
842
views
answered
Sep 30, 2017
Operating System
made-easy-test-series
operating-system
resource-allocation
deadlock-prevention-avoidance-detection
bankers-algorithm
+
–
4
votes
14
MadeEasy Subject Test: Operating System - Process Synchronization
542
views
answered
Sep 30, 2017
Operating System
made-easy-test-series
operating-system
process-synchronization
+
–
3
votes
15
Parsing_LR(1)Items
425
views
answered
Sep 29, 2017
Compiler Design
parsing
ace-test-series
+
–
0
votes
16
Gate 2008
512
views
answered
Sep 29, 2017
1
votes
17
gate overflow
A DMA module is transferring bytes to memory using cycle stealing mode from a device transmitting at 16 KB/s. The processor is fetching instructions at the rate of 1 MB/s. The percentage by which the processor will be slowed down due to the DMA activity is ______
A DMA module is transferring bytes to memory using cycle stealing mode from a device transmitting at 16 KB/s. The processor is fetching instructions at the rate of 1 MB/s...
912
views
answered
Sep 29, 2017
0
votes
18
gateoverflow test
Q-Consider the following two types of Cache Designs : Cache 1 : It is a direct-mapped cache with eight 1-word cache lines. The miss penalty is 8 clock cycles. Cache 2 : It is a two-way associative cache with 1-word cache lines. It can store the same ... 80 cycles C. Cache 1 spends 56 cycles and Cache 2 spends 60 cycles D. Cache 1 spends 56 cycles and Cache 2 spends 70 cycles
Q-Consider the following two types of Cache Designs : Cache 1 : It is a direct-mapped cache with eight 1-word cache lines. The miss penalty is 8 clock cycles.Cache 2 : It...
465
views
answered
Sep 29, 2017
2
votes
19
UGC NET CSE | June 2007 | Part 2 | Question: 11
The following loop in $’C’$: int i=0; while (i++<0)i--; will terminate will go into an infinite loop will give compilation error will never be executed
The following loop in $’C’$:int i=0; while (i++<0)i ;will terminatewill go into an infinite loopwill give compilation errorwill never be executed
542
views
answered
Sep 28, 2017
Others
ugcnetcse-june2007-paper2
+
–
4
votes
20
test-series
L,L3 is which type of language ?are L3,L CFL ?????
L,L3 is which type of language ?are L3,L CFL ?????
602
views
answered
Sep 28, 2017
4
votes
21
MadeEasy Subject Test: Theory of Computation - Identify Class Language
645
views
answered
Sep 28, 2017
Theory of Computation
made-easy-test-series
theory-of-computation
identify-class-language
+
–
0
votes
22
UGC NET CSE | June 2008 | Part 2 | Question: 14
Function overloading is a concept in which : a function is used to implement lots of tasks at the same time. a function is called too many number of times by another function. a function provides common interface to the user to carry out possibly different functions in each call. a function is computationally too expensive for the system to handle.
Function overloading is a concept in which :a function is used to implement lots of tasks at the same time.a function is called too many number of times by another functi...
86
views
answered
Sep 27, 2017
Others
ugcnetcse-june2008-paper2
+
–
4
votes
23
Size of Tag directory
Consider a machine with 4way set associative data cache of size 32 Kbytes and block size 8 byte. The cache is managed using 32 bit virtual addressed and page size is 5 Kbytes. What is the total size of the tags in the cache directory is _________ (in K bits). Given answer is 76 I am getting 19.
Consider a machine with 4way set associative data cache of size 32 Kbytes and block size 8 byte. The cache is managed using 32 bit virtual addressed and page size is 5 ...
6.1k
views
answered
Sep 27, 2017
CO and Architecture
co-and-architecture
cache-memory
memory-interfacing
+
–
2
votes
24
Semaphores
s = 0 initially A : down(s) B : down(s) CS CS up(s) up(s) C : down(s) D : up(s) CS CS up(s) down(s) E : up(s) F : up(s) CS CS down(s) down(s) What is the maximum value of s? Doubt : I think max value of s should be 1 as P and V are atomic operations. Also nowhere the value of s is stored in memory here. But the answer given is 3. What concept am I missing?
s = 0 initiallyA : down(s) B : down(s) CS CS up(s) up(s)C : down(s) D : up(s) CS...
292
views
answered
Sep 27, 2017
Operating System
operating-system
semaphore
+
–
2
votes
25
UGC NET CSE | December 2008 | Part 2 | Question: 32
Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and R2 form a decomposition of R. Then the decomposition is a lossless join decomposition of R provided that: R1∩R2→R1 is in F+ ... in F+ both R1∩R2→R1 and R1∩R2→R2 functional dependencies are in F+ at least one from R1∩R2→R1 and R1∩R2→R2 is in F+
Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and R2 form a decomposition of R. Then the decomposition is a lossless ...
1.7k
views
answered
Sep 26, 2017
Databases
ugcnetcse-dec2008-paper2
databases
database-normalization
+
–
0
votes
26
digital logic
606
views
answered
Sep 26, 2017
1
votes
27
digital logic
F = w'xz + w'yz + x'yz' + wxy'z d = wyz The minimum no of nand and nor gate required to implement the above function respectively are :
F = w'xz + w'yz + x'yz' + wxy'zd = wyzThe minimum no of nand and nor gate required to implement the above function respectively are :
2.9k
views
answered
Sep 26, 2017
2
votes
28
test-series
254
views
answered
Sep 26, 2017
0
votes
29
UGC NET CSE | December 2008 | Part 2 | Question: 14
The characteristics equation of $D$ flip-flop is : $Q$=$1$ $Q$=$0$ $Q$=$\bar{D}$ $Q$=$D$
The characteristics equation of $D$ flip-flop is :$Q$=$1$$Q$=$0$$Q$=$\bar{D}$$Q$=$D$
659
views
answered
Sep 25, 2017
Digital Logic
ugcnetcse-dec2008-paper2
digital-logic
flip-flop
+
–
0
votes
30
UGC NET CSE | December 2008 | Part 2 | Question: 2
The graph K3,4 has: $3$ edges $4$ edges $7$ edges $12$ edges
The graph K3,4 has:$3$ edges $4$ edges $7$ edges $12$ edges
952
views
answered
Sep 25, 2017
Graph Theory
ugcnetcse-dec2008-paper2
graph-theory
+
–
Page:
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register