Most viewed questions in Others

0 votes
1 answer
1141
0 votes
1 answer
1142
Part of a program where the shared memory is accessed and which should be executed indivisibly, is called:SemaphoresDirectoryCritical sectionMutual exclusion
0 votes
0 answers
1143
In software project planning, work Breakdown structure must be______.A graphA treeA Eular’s graphNone of the above
1 votes
0 answers
1144
in COA whenever I m doing any some in mock tests... where its given data like 30KB or 60MB which value to be considered? for K and M here??I mean when the answer is in ms...
0 votes
1 answer
1146
Which of the following techniques are used to control data flow?WindowingRouting$\text{RPCs}$Buffering $1,4$$2,3,4$$1,3,4$$1,2,3,4$
0 votes
0 answers
1147
In distributed computing, each processor has its own local memory.
0 votes
1 answer
1149
The maximum number of binary trees that can be formed with three unlabeled nodes is :$1$$5$$4$$3$
0 votes
1 answer
1151
Let $\text{C} (n, \; r) = \binom{n}{r}.$ The value of $ \displaystyle \sum_{k=0}^{20}(2k+1) \text{C} (41, 2k+1),$ is :$40 (2)^{40}$$40 (2)^{39}$$41 (2)^{40}$$41 (2)^{39}$...
0 votes
2 answers
1153
Function over loading done at :RuntimeCompile timeLinking timeSwitching from function to function
0 votes
0 answers
1157
Hi, Someone please explain which parameter is the criteria for getting calls for an interview either for M. Tech or Psu Jobs(Normalized marks/Rank/Score)
0 votes
0 answers
1159
Match the following: List – I 1. Data link layer 2. Network layer 3. Transport layer 4. Presentation layer List – II i. Encryption ii. Connection control iii. Routing...