Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by Aboveallplayer
0
votes
151
Equivalency of diffetent automata
Write about the equivalency of different automata such as DFA, NFA, DPDA, NPDA, DTM, NTM. Which automata or machine can be converted to other machines and why? For example NFA can be converted to DFA, DPDA, NPDA, DTM, NTM.
Write about the equivalency of different automata such as DFA, NFA, DPDA, NPDA, DTM, NTM. Which automata or machine can be converted to other machines and why? For exampl...
537
views
answered
Nov 1, 2016
Theory of Computation
finite-automata
pushdown-automata
turing-machine
+
–
1
votes
152
Subset sum problem
Brute force algorithm time complexity for subset sum problem a) O(N logN) b)O(N^2) c) O(N^2 logN) d) O(2^N)
Brute force algorithm time complexity for subset sum problema) O(N logN) b)O(N^2) c) O(N^2 logN) d) O(2^N)
2.0k
views
answered
Nov 1, 2016
Algorithms
algorithms
time-complexity
+
–
5
votes
153
#self doubt
LRTF ( LONGEST REMAINING TIME FIRST ALGORITHM ) causes starvation or not. please explain.
LRTF ( LONGEST REMAINING TIME FIRST ALGORITHM ) causes starvation or not. please explain.
5.1k
views
answered
Oct 31, 2016
Operating System
process-scheduling
+
–
1
votes
154
Number of secondary indices that can be constructed
If a file consists of 5 attributes, then the number of secondary indices that can be constructed on that file is ______.
If a file consists of 5 attributes, then the number of secondary indices that can be constructed on that file is ______.
7.5k
views
answered
Oct 31, 2016
0
votes
155
The recursive sets are not closed under :
1.2k
views
answered
Oct 31, 2016
Theory of Computation
closure-property
+
–
1
votes
156
Process Synchronisation
Does every strict alteration method dissatisfy Progress condition?
Does every strict alteration method dissatisfy Progress condition?
204
views
answered
Oct 31, 2016
0
votes
157
Dependency preserving decomposition
Let R(X,Y,Z,W) be a relational schema with the following functional dependencies: $X\rightarrow Y, Y\rightarrow Z, Z\rightarrow W$ and $W\rightarrow Y$ The decomposition of R into (X,Y),(Y,Z),(Y,W) is a. ... preserving b. Lossless join, but is not dependency preserving c. Lossless join and dependency preserving d. Lossy join and not dependency preserving
Let R(X,Y,Z,W) be a relational schema with the following functional dependencies:$X\rightarrow Y, Y\rightarrow Z, Z\rightarrow W$ and $W\rightarrow Y$The decomposition of...
2.9k
views
answered
Oct 29, 2016
Databases
dependency-preserving
databases
database-normalization
+
–
0
votes
158
Solve using Master's theorem
Solve this recurrence equation using Master's theorem T(n) = 64 T(n/8) - n 2 log n
Solve this recurrence equation using Master's theoremT(n) = 64 T(n/8) - n 2 log n
2.6k
views
answered
Oct 29, 2016
Algorithms
algorithms
master-theorem
time-complexity
+
–
1
votes
159
#Algo
On which of the following recurrence relation Master Theorem cannot be applied? A. T(n)=2T(n/2)+nlogn B. T(n)=T(n/2)+1 C. T(n)=8T(n/2)+logn D. T(n)=7T(n/4)+n2 I think we can apply on all. But plz correct me with reason.Thanks
On which of the following recurrence relation Master Theorem cannot be applied?A. T(n)=2T(n/2)+nlognB. T(n)=T(n/2)+1C. T(n)=8T(n/2)+lognD. T(n)=7T(n/4)+n2I think we can a...
1.6k
views
answered
Oct 28, 2016
Algorithms
algorithms
recurrence-relation
master-theorem
+
–
2
votes
160
Probability
There are two sets of Alphabets $S_{1} = \{ a, c, f, d, e\}$ and $S_{2} = \{ a, c, g, d, b\}$. An alphabet is picked from the first set and then a second albhabet from the second set, randomly. What is the probability that the same alphbet is picked in both the pickings. a) 5/25 b)3/25 c) 4/25 d)6/25
There are two sets of Alphabets $S_{1} = \{ a, c, f, d, e\}$ and $S_{2} = \{ a, c, g, d, b\}$. An alphabet is picked from the first set and then a second albhabet from th...
540
views
answered
Oct 28, 2016
Probability
probability
engineering-mathematics
+
–
1
votes
161
#algorithm
Can Prim's and Kruskal's algorithm yield different minimum spanning trees? Explain why or why not.
Can Prim's and Kruskal's algorithm yield different minimum spanning trees? Explain why or why not.
1.6k
views
answered
Oct 28, 2016
Algorithms
minimum-spanning-tree
algorithms
kruskals-algorithm
prims-algorithm
+
–
0
votes
162
mathematics
240
views
answered
Oct 27, 2016
3
votes
163
Time complexity
414
views
answered
Oct 26, 2016
Unknown Category
algorithms
asymptotic-notation
time-complexity
+
–
0
votes
164
ER-Model
439
views
answered
Oct 26, 2016
1
votes
165
number of WAR dependencies
Consider the following instructions. $I_1:R_1=100$ $I_2:R_1=R_2+R_4$ $I_3:R_2=R_4+25$ $I_4:R_4=R_1+R_3$ $I_5:R_1=R_1+30$ Calculate sum of ($\text{WAR, RAW and WAW}$) dependencies the above instructions. $10$ $12$ $6$ $8$
Consider the following instructions.$I_1:R_1=100$$I_2:R_1=R_2+R_4$$I_3:R_2=R_4+25$$I_4:R_4=R_1+R_3$$I_5:R_1=R_1+30$Calculate sum of ($\text{WAR, RAW and WAW}$) dependenci...
6.7k
views
answered
Oct 26, 2016
CO and Architecture
co-and-architecture
data-dependency
+
–
0
votes
166
vgate
explain
explain
499
views
answered
Oct 26, 2016
0
votes
167
Memory-Control Unit
If size of MAR &MBR are $32$ bit and $16$ bit respectively then what is the main memory size. if memory is byte addressable .
If size of MAR &MBR are $32$ bit and $16$ bit respectively then what is the main memory size.if memory is byte addressable .
2.1k
views
answered
Oct 26, 2016
CO and Architecture
co-and-architecture
control-unit
+
–
1
votes
168
Doubt
Min number of registers required to evaluate below expression: x = ( a+b) * (c+d) I am getting 2 but answer is 3. Solution: 1) Load r1,a 2) Add r1, b 3) Load r2, c 4) Add r2,d 5) Mul r1,r2 6) store x, r1
Min number of registers required to evaluate below expression:x = ( a+b) * (c+d)I am getting 2 but answer is 3.Solution: 1) Load r1,a2) Add r1, b3) Load r2, c4) Add r2,d5...
291
views
answered
Oct 26, 2016
CO and Architecture
co-and-architecture
+
–
5
votes
169
Made Easy solve it.
onsider the evaluation of following expression tree on a machine in which memory can be accessed only through load and store instructions. The variable p, q, r, s, t, u and v are initially stored in memory. The binary operators used in the tree ... . What is the the minimum number of registers needed to evaluate the expression if, no intermediate results can be stored in memory?
onsider the evaluation of following expression tree on a machine in which memory can be accessed only through load and store instructions. The variable p, q, r, s, t, u a...
553
views
answered
Oct 26, 2016
0
votes
170
ace/practice
main() { int n=2; int i; for(i=0;i<n;i++) if(fork()==0) printf("hellow"); } how many times is "hellow " printed ?
main(){ int n=2;int i;for(i=0;i<n;i++)if(fork()==0)printf("hellow");}how many times is "hellow " printed ?
326
views
answered
Oct 19, 2016
1
votes
171
vgate_OS
Each user request generates 10 disk requests on average and has 10 msec service time. So, time required for disk I/O = 10 10 msec = 100 msec. Total time = computational time + disk I/O time = 80 + 100 msec = 180 msec. in 180msec-->1 user's rquests are ... --> 1000/180=5.5=5 users 1 user-->10 requests 5users-->50 requests. so answer shud be 50 requests answer given is 5
Each user request generates 10 disk requests on average and has 10 msec service time.So, time required for disk I/O = 10×10 msec = 100 msec.Total time = computational ti...
615
views
answered
Oct 19, 2016
1
votes
172
Graph
Is the topic "Planarity" there in GATE 2017 syllabus?
Is the topic "Planarity" there in GATE 2017 syllabus?
298
views
answered
Oct 18, 2016
3
votes
173
MadeEasy Test Series: Compiler Design - Viable Prefix
i think "(E+F*" is viable prefix but "E+F*" is not viable prefix. correct?
i think "(E+F*" is viable prefix but "E+F*" is not viable prefix. correct?
1.3k
views
answered
Oct 17, 2016
Compiler Design
made-easy-test-series
compiler-design
viable-prefix
+
–
1
votes
174
ADA
Arrange them in order of asymptotic growth rate N^2,n!/logn,(1+1/n)^n,(logn)^logn,N^(loglogn),3^log2
Arrange them in order of asymptotic growth rateN^2,n!/logn,(1+1/n)^n,(logn)^logn,N^(loglogn),3^log2
1.0k
views
answered
Sep 20, 2016
Algorithms
algorithms
asymptotic-notation
+
–
0
votes
175
B tree
What is degree in Btree and how it is diffrent from order of tree
What is degree in Btree and how it is diffrent from order of tree
1.0k
views
answered
Sep 19, 2016
Others
b-tree
+
–
3
votes
176
#aptitude
foreign bank have stopped ________ in india a. to open b. for opening c. opening d open
foreign bank have stopped ________ in indiaa. to openb. for openingc. openingd open
436
views
answered
Sep 2, 2016
Verbal Aptitude
verbal-aptitude
+
–
0
votes
177
#co
plz explain synonyms and homonyms problems in cache addressing and how to solve these problems ?? If possible by numerical example ??
plz explain synonyms and homonyms problems in cache addressing and how to solve these problems ??If possible by numerical example ??
317
views
answered
Sep 1, 2016
5
votes
178
MadeEasy Test Series: Computer Networks - Flow Control Methods
Station X needs to send a message consisting of 12 packets to station Y using a sliding window protocol (Window Size 4) and Go back n error control strategy. All packets are ready and immediately available for transmission. If every ... gets lost), then the number of packets that X will transmit for sending the message to Y are _____.
Station X needs to send a message consisting of 12 packets to station Y using a sliding window protocol (Window Size 4) and Go back n error control strategy. All packets ...
2.3k
views
answered
Aug 24, 2016
Computer Networks
made-easy-test-series
computer-networks
flow-control-methods
sliding-window
+
–
Page:
« prev
1
2
3
4
5
6
7
8
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register