search
Log In

Recent questions tagged nielit2017dec-assistanta

1 vote
2 answers
1
Correct expression tor UDP user datagram length is length of UDP = length of IP- length of IP header's length of UDP= length of UDP-length of UDP header's length of UDP = length of IP+length of IP header's length of UDP = length of UDP+length of UDP header's
asked Mar 31, 2020 in Computer Networks Lakshman Patel RJIT 564 views
0 votes
2 answers
2
1 vote
4 answers
3
0 votes
3 answers
4
0 votes
2 answers
6
Which of the following statements is true ? Melay and Moore machines are language acceptors. Finite State automata is language translator. NPDA is more powerful than DPDA. Melay machine is more powerful than Moore machine.
asked Mar 31, 2020 in Theory of Computation Lakshman Patel RJIT 273 views
1 vote
4 answers
7
If file size is large and if it is to be accessed randomly then which of the following allocation strategy should be best to use in a system? Linked allocation Indexed allocation Contiguous allocation None of the options
asked Mar 31, 2020 in Operating System Lakshman Patel RJIT 402 views
0 votes
3 answers
8
0 votes
1 answer
10
The function $f\left ( x \right )=\dfrac{x^{2}-1}{x-1}$ at $x=1$ is : Continuous and differentiable Continuous but not differentiable Differentiable but not continuous Neither continuous nor differentiable
asked Mar 31, 2020 in Calculus Lakshman Patel RJIT 236 views
1 vote
1 answer
11
Closed - Loop control mechanism try to : Remove congestion after it occurs Remove congestion after sometime Prevent congestion before it occurs Prevent congestion before sending packets
asked Mar 31, 2020 in Computer Networks Lakshman Patel RJIT 330 views
0 votes
1 answer
13
Which multiple access technique is used by $\text{IEEE } 802.11$ standard for wireless $\text{LAN}$ ? $\text{CDMA}$ $\text{CSMA/CA}$ $\text{ALOHA}$ None of the options
asked Mar 31, 2020 in Computer Networks Lakshman Patel RJIT 281 views
0 votes
2 answers
14
$PGP$ encrypts data by using a block cipher called : international data encryption algorithm private data encryption algorithm internet data encryption algorithm none of the options
asked Mar 31, 2020 in Computer Networks Lakshman Patel RJIT 819 views
1 vote
3 answers
16
1 vote
2 answers
17
0 votes
2 answers
18
0 votes
1 answer
19
Let $P, Q, R$ be a regular expression over $\Sigma$. If $P$ does not contain null string, then $R=Q+RP$ has a unique solution ___________ . $Q^{*}P$ $QP^{*}$ $Q^{*}P^{*}$ $\left ( P^{*}O^{*} \right)^{*}$
asked Mar 31, 2020 in Theory of Computation Lakshman Patel RJIT 316 views
3 votes
3 answers
20
2 votes
1 answer
21
The $2-3-4$ tree is a self-balancing data structure, which is also called : $2-4$ tree $B+$ tree $B-$ tree None of the options
asked Mar 31, 2020 in Databases Lakshman Patel RJIT 282 views
1 vote
1 answer
22
1 vote
2 answers
23
0 votes
1 answer
25
What is the value of acknowledgement field in a segment Number of previous bytes to receive Total number of bytes to receive Number of next bytes to receive Sequence of zero's and one's
asked Mar 31, 2020 in Computer Networks Lakshman Patel RJIT 226 views
0 votes
2 answers
26
1 vote
1 answer
28
There is a need to create a network that has $5$ subnets, each with at least $16$ hosts. Which one is used as classful subnet mask ? $255.255.255.192$ $255.255.255.248$ $255.255.255.240$ $255.255.255.224$
asked Mar 31, 2020 in Computer Networks Lakshman Patel RJIT 384 views
1 vote
1 answer
29
What is Compaction ? a technique for overcoming internal fragmentation a paging technique a technique for overcoming external fragmentation a technique for overcoming fatal error
asked Mar 31, 2020 in Operating System Lakshman Patel RJIT 414 views
...