Log In

Recent posts tagged preparation-advise

Link Utilization $=\dfrac{\text{Amount of data sent}}{\text{Max. amount of data that could be sent}}$ Let $x$ ... $L=40\times 64\ bits=40\times \dfrac{64}{8}\ bytes=40\times 8\ bytes=320\text{ bytes (answer)}$
posted Jul 9, 2019 in Preparation Advice Manu Thakur 2,426 views
Answer - B. Degree of generator polynomial is $3$ hence $3-bits$ are appended before performing division After performing division using $2$'$s$ complement arithmetic remainder is $011$ The remainder is appended to original data bits and we get $M' = 11001001\bf{011}$ from $M = 11001001.$ Courtesy, Anurag Pandey
posted Mar 16, 2019 in Preparation Experience Parth Shah 2,597 views
Instead of finding a function 'f' for the first MUX (in terms of z,x and y) and the second MUX (in terms of f , x and y), we can logically find out the answer.We can put in 4 values of A and B and analyse the output C. We can get the values appropriate values of x and y by drawing and comparing with a 2x1 MUX when A and B are given as inputs respectively.
posted May 4, 2018 in Preparation Advice Shikha Mallick 1,127 views
Let $G$ be a weighted undirected graph and e be an edge with maximum weight in $G$. Suppose there is a minimum weight spanning tree in $G$ containing the edge $e$. Which of the following statements is always TRUE? There exists a cutset in $G$ having all edges of maximum ... in $G$ having all edges of maximum weight. Edge $e$ cannot be contained in a cycle. All edges in $G$ have the same weight.
posted Mar 18, 2018 in 2018 Rishabh Gupta 2 37,026 views
answer - D AB + C = ((AB + C)')' = ((AB)'C')' = ((A' + B')C')' = (A' + B')' + C two NOR gates for complementing A and B one for computing (A' + B')' one to compute ((A' + B')' + C)' one to negate the last result
posted Feb 4, 2018 in Preparation Advice Sahil1994 821 views
The formula used to compute an approximation for the second derivative of a function $f$ at a point $X_0$ is $\dfrac{f(x_0 +h) + f(x_0 – h)}{2}$ $\dfrac{f(x_0 +h) - f(x_0 – h)}{2h}$ $\dfrac{f(x_0 +h) + 2f(x_0) + f(x_0 – h)}{h^2}$ $\dfrac{f(x_0 +h) - 2f(x_0) + f(x_0 – h)}{h^2}$
posted Jan 24, 2018 in Preparation Advice Arjun 4,124 views
Consider the following program segment for concurrent processing using semaphore operators $P$ and $V$ for synchronization. Draw the precedence graph for the statements $S_1$ to $S_9$. var a,b,c,d,e,f,g,h,i,j,k : semaphore; begin cobegin begin S1; V(a); V(b) end; begin P(a); S2; V(c); V(d) end; ... end; begin P(g); S6; V(i) end; begin P(h); P(i); S8; V(j) end; begin P(j); P(k); S9 end; coend end;
posted Jan 16, 2018 in Preparation Advice Ashish Subscription 2,246 views
2011 is the answer. In C, there is a rule that whatever character code be used by the compiler, codes of all alphabets and digits must be in order. So, if character code of '$A$' is $x$, then for '$B$' it must be $x+1$. Now %s means printf takes ... gives the same result as first argument to printf is a character pointer and only if we want to pass more arguments we need to use a format string.
posted Dec 31, 2017 in Preparation Advice AskHerOut 1,285 views
In order traversal of $b$ binary search tree returns the element in sorted order - ascending (inorder is left parent then right. in a bst left is less than parent and right is greater than parent). In this option $A$ is the only sorted list. hence it is the only possibility.
posted Dec 11, 2017 in Preparation Experience Ashish Subscription 1,866 views
One of the header fields in an IP datagram is the Time-to-Live (TTL) field. Which of the following statements best explains the need for this field? It can be used to prioritize packets. It can be used to reduce delays. It can be used to optimize throughput. It can be used to prevent packet looping.
posted Jul 20, 2017 in Preparation Experience Ritwik Mishra 1 2,285 views
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: $$. The ISP wants to give half of this chunk of addresses to Organization $A$, and a quarter to Organization $B$, while retaining the remaining with itself. Which of the ... $ \text{ and }$
posted Apr 29, 2017 in Preparation Advice Arjun 19,183 views
A $5$ stage pipelined CPU has the following sequence of stages: IF - instruction fetch from instruction memory RD - Instruction decode and register read EX - Execute: ALU operation for data and address computation MA - Data memory access - for write access, the register read ... clock cycles taken to complete the above sequence of instructions starting from the fetch of $I_1$? $8$ $10$ $12$ $15$
posted Mar 9, 2017 in Others Dhawal Gajwe 1,457 views
Consider the binary relation: $S= \left\{\left(x, y\right) \mid y=x+1 \text{ and } x, y \in \left\{0, 1, 2\right\} \right\}$ The reflexive transitive closure is $S$ is $\left\{\left(x, y\right) \mid y >x \text{ and } x, y \in \left\{0, 1, 2\right\} \right\}$ ... $\left\{\left(x, y\right) \mid y \leq x \text{ and } x, y \in \left\{0, 1, 2\right\} \right\}$
posted Feb 12, 2017 in Preparation Advice Arjun 2,313 views
A computer uses $46-bit$ virtual address, $32-bit$ physical address, and a three-level paged page table organization. The page table base register stores the base address of the first-level table $(T1)$, which occupies exactly one page. Each entry of $T1$ stores the base address of a page of ... cache block size is $64$ bytes. What is the size of a page in $KB$ in this computer? $2$ $4$ $8$ $16$
posted Nov 17, 2016 in Preparation Advice Arjun 2,686 views