Recent questions without answers

197
views
0 answers
0 votes
A 2-way set associative write back cache with true LRU replacement requires 15 * 29 bits to implement its tag store per set(including bits for valid, dirty and ... . What is the maximum size of the data store of the cache in bytes?
280
views
0 answers
1 votes
In a box, 10 coins are drawn at random out of 50 coins numbered from 1 to 50. What is the expected value of the sum of numbers on the drawn coins?answer is given 250 i am getting 255??
484
views
0 answers
0 votes
if i neglect T2 then its conflict sserilizable but if i dont neglect T2 then its not conflict serilizable ???
471
views
0 answers
1 votes
461
views
0 answers
0 votes
Statement 1 : For every DCFL there exits a LR(0) or a LR(1) grammer.Statement 2 : For every DCFL there exits a LR(1) grammer.Which is true??
440
views
0 answers
0 votes
what is the o/p?int main() { char inchar = 'A'; switch (inchar) { case 'A' : printf ("choice A \n") ; case 'B' : { printf ("choice B") ; break; } case 'C ... 'D' : case 'E' : default: printf ("No Choice") ; } }my guess is -choice Achoice B
313
views
0 answers
0 votes
If A and B are independent, then A and Bc are also independentIs it true or false?
297
views
0 answers
0 votes
An employee X is collecting donation for a social cause from his co employees at work. More than half of the donations that X received have been in ... could be relation between Mean, Mode , Median regarding the distribution of donations?
912
views
0 answers
0 votes
A unix-style I-node has the following specifications:The maximum possible file size is ___________ GB. plz explain??
197
views
0 answers
0 votes
Can someone mathematically derive this equation?P(A/B)>P(A)
640
views
0 answers
1 votes
How many relations are there which are reflexive antisymmetric and symmetric?
770
views
0 answers
0 votes
Consider a small 2-way set associative cache memory, consisting of 4 blocks. For choosing the block to be replaced, use LRU scheme. Consider that block address 4 and 2 are ... sequence of block addresses 4, 6, 8, 16, 2, 2, 4 are ______.
310
views
0 answers
0 votes
important topics to prepare gate aptitude for cs
313
views
0 answers
0 votes
Indicate how the recovery schema works on single user environment if system failsi) After the transaction starts and before read.ii) After the read and before write.iii) After the write and before commit.AnswerRequest▾
1.1k
views
0 answers
0 votes
Sir it is given everywhere that time complexity of infix to postfix is O(1) but according to algorithm for some operators we have to traverse back the stack until ... than this so is it always O(1 ) even if we do amortized analysis
890
views
0 answers
2 votes
Consider a stack and we wish to perform an operation StackDelete() in which we wish to delete all the elements of the stack .What is the worst case time complexity of doing this if stack is implemented:1) Using an array2)Using a Linked list
222
views
0 answers
0 votes
The number of ways possible to form injective function from set A set B where |A| = 3 and |B| = 5 such that pth element of set A cannot match with pth element of set B are ??
742
views
0 answers
0 votes
How(In S3: statement) phi is a subset of P(S) ?? It must be {phi} . Right??
513
views
0 answers
2 votes
Consider the effect of using slow start on a line with 10 msec round trip time. The receiver window and the size of congestion window are set to 38 KB and 36 KB ... (in msec). Assume window size at the start of slow start phase is 2 KB.
338
views
0 answers
0 votes
A)LL(k) grammar has one to one correspondence to DCFLB)LR(k) grammar has one to one correspondence to CFLWhich one is true?
202
views
0 answers
0 votes
Among NCFL, CSL and Recursive languagesanyone is LL(k) or LR(k)Give some reason
517
views
0 answers
0 votes
Consider station A send data to station B . Data frame contain MAC address, IP address and port address. Which of the ... change on intermediate router.Destination IP addressDestination MAC addressSource MAC addressSource IP address
562
views
0 answers
0 votes
Consider an array defined as M[0 ..10][0 ..20]. When we refer an array element M[P][Q], we wish to check that this is a valid access to an array element. Consider ... II II and III I and III Any two will not be enough. We need I, II, III.
375
views
0 answers
0 votes
Assume that p and q are pointers. What will be the output after performing following sets of operations on a given linked list ?struct node{char data; ... q→next;IV. printf("%c", p→next→next→next→next→data); e f dSegmentation fault
297
views
0 answers
0 votes
Hello I am into permanent job in government organization . Presently i am 30 years old . This year i am giving gate 2018. If i get admission in Some iits' ... or they will not allow to sit in placement , Can someone say anything about this,
346
views
0 answers
0 votes
124
views
0 answers
0 votes
please give me idea/ formulae MIN/MAX leaf node ,internal node in B and B+ tree
358
views
0 answers
0 votes
Let $L_1$ and $L_2$ are two languages and both of them are accepted by DPDA. If $L=L_1-L_2$ is any languange , then what is the smallest language family $L'$ belongs to?
1.3k
views
0 answers
1 votes
Is 1's/2's complement valid only for negative numbers? If 2's complement of a number is 1111111111110101, then the number should be 0000000000001011. Then the decimal representation should be +11. But the answer is -11.