Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by Bhagirathi
0
votes
41
INDEXING DATABASE
Clustering index is always sparse?? comment with explanation...??
Clustering index is always sparse?? comment with explanation...??
403
views
answered
Jun 24, 2015
0
votes
42
why do we not apply Binary search for insertion in the heap ?
however number of comparisions in binary search=O(loglogn) and in linear search it is O(logn), time complexity in case of binary search- O(logn) and in case of linear it is also O(logn)
however number of comparisions in binary search=O(loglogn) and in linear search it is O(logn),time complexity in case of binary search- O(logn) and in case of linear it i...
915
views
answered
Jun 21, 2015
DS
data-structures
algorithms
+
–
3
votes
43
CO 2001
A processor needs software interrupt to (a) test the interrupt system of the processor (b) implement co routines (c) obtain system services which need execution of priviledge instructions (d) return from subroutine
A processor needs software interrupt to(a) test the interrupt system of the processor(b) implement co routines(c) obtain system services which need execution of priviledg...
804
views
answered
Jun 6, 2015
37
votes
44
GATE CSE 2001 | Question: 1.22
Which of the following requires a device driver? Register Cache Main memory Disk
Which of the following requires a device driver?RegisterCacheMain memoryDisk
10.5k
views
answered
Jun 6, 2015
Operating System
gatecse-2001
operating-system
disk
easy
+
–
2
votes
45
Code for Merging for an array
There are two arrays A and B having N/2 elements. The elements are stored in ascending order already . Merge these arrays and create a new array C of size N . A code fragement is given. fill the missing part in it. the index variables have initial value as zero if(...........) C[] =.......... ; else C[]=...........;
There are two arrays A and B having N/2 elements. The elements are stored in ascending order already . Merge these arrays and create a new array C of size N . A code fra...
318
views
answered
Jun 6, 2015
2
votes
46
Sir I am having doubt in understanding MVD and 4NF. No books helps me easily. Please help.
804
views
answered
Jun 6, 2015
Databases
multivalued-dependency-4nf
+
–
0
votes
47
What Happens when Cartesian Product is applied to Relations with same attribute name?
1.2k
views
answered
Jun 4, 2015
0
votes
48
The process of assigning similar objects/entities to object/entity type known as
The process of assigning similar objects/entities to object/entity type known as a)Classification b)Instantiation c)Specialization d)Generalization
The process of assigning similar objects/entities to object/entity type known asa)Classification b)Instantiationc)Specializationd)Generalization
802
views
answered
Jun 4, 2015
0
votes
49
how many distinct 4-digits integers one can make from the digits 1,3,3,7,7,8 ? Is there and method or we have to go by enumerating the possibilites ?
4.8k
views
answered
Jun 4, 2015
Combinatory
combinatory
+
–
0
votes
50
Segmentation
Segmentation may contain a) Internal fragmentation b) External fragmentation c) Both d) None Also please explain the answer...
Segmentation may contain a) Internal fragmentationb) External fragmentationc) Both d) NoneAlso please explain the answer...
23.7k
views
answered
Jun 2, 2015
1
votes
51
only size is sufficient for checking valid address range of process?
543
views
answered
Jun 2, 2015
Operating System
operating-system
+
–
19
votes
52
GATE CSE 2015 Set 3 | Question: 6
Consider a CSMA/CD network that transmits data at a rate of $100\;\textsf{Mbps}\; (10^8\;\text{bits}$ per second) over a $1\;\textsf{km}$ (kilometre) cable with no repeaters. If the minimum frame size required for this network is $1250\;\text{bytes},$ What is the signal speed $\textsf{(km/sec)}$ in the cable? $8000$ $10000$ $16000$ $20000$
Consider a CSMA/CD network that transmits data at a rate of $100\;\textsf{Mbps}\; (10^8\;\text{bits}$ per second) over a $1\;\textsf{km}$ (kilometre) cable with no repeat...
14.1k
views
answered
May 30, 2015
Computer Networks
gatecse-2015-set3
computer-networks
congestion-control
csma-cd
normal
+
–
0
votes
53
SQL
Consider the Following Collection of relational schema Professor( profname , deptname) Department (deptname, building) Committee(commname, Profname) Which of following query finds all the professors who have not offices in any of those buildings that professor Piper has offices in ... d1, professor p1 Where P1.Profname=’Piper’ and p1.deptname=D1.deptname ) D) None of these
Consider the Following Collection of relational schemaProfessor( profname , deptname)Department (deptname, building)Committee(commname, Profname)Which of following query ...
1.1k
views
answered
May 28, 2015
Databases
sql
+
–
3
votes
54
simple uniform hashing
why in a hash table in which collisions are resolved by a chaining , a successful search takes average- case time ⊖(1+load factor) ,under the assumption of simple uniform hashing ?
why in a hash table in which collisions are resolved by a chaining , a successful search takes average- case time ⊖(1+load factor) ,under the assumption of simple unifo...
1.3k
views
answered
May 28, 2015
DS
hashing
chaining
+
–
3
votes
55
process state
When parent process executes fork system call process moves into a) created state b)ready state c)running state d)zombie state
When parent process executes fork system call process moves into a) created state b)ready state c)running state d)zombie state
1.1k
views
answered
May 28, 2015
0
votes
56
Asymptotic Notation
Describe a Θ(nlgn)-time algorithm that, given a set S of n integers and another integer x, determines whether or not there exists two elements of S whose sum is exactly x.
Describe a Θ(nlgn)-time algorithm that, given a set S of n integers and another integer x, determines whether or not there exists two elements of S whose sum is exactly ...
2.2k
views
answered
May 27, 2015
Algorithms
asymptotic-notation
algorithms
+
–
5
votes
57
hashing
In a separate chaining hash table with load factor =0.8, what is the average length of a list ? a) 0.8 b) 1.0 c) 1.25 d) there is not enough information e) there is enough information, but none of the above are correct
In a separate chaining hash table with load factor =0.8, what is the average length of a list ?a) 0.8 b) 1.0 c) 1.25d) there is not enough informatione) there is enough i...
2.0k
views
answered
May 25, 2015
DS
hashing
+
–
4
votes
58
linear probing
How are elements deleted in linear probing ? (a) Deletion is not allowed (b) they are changed to zero (c) they are marked deleted (d) unchecked deallocation (e) None of the above
How are elements deleted in linear probing ?(a) Deletion is not allowed(b) they are changed to zero(c) they are marked deleted(d) unchecked deallocation(e) None of the ab...
935
views
answered
May 23, 2015
DS
hashing
+
–
0
votes
59
DBMS general
Decompose a relation into 3NF , BCNF, 2NF , How to get it?
Decompose a relation into 3NF , BCNF, 2NF , How to get it?
346
views
answered
May 23, 2015
0
votes
60
DFA to accept a binary number divisible by 2
Sorry for the bad quality picture. Which of these is correct? (1 or 2)
Sorry for the bad quality picture. Which of these is correct? (1 or 2)
16.6k
views
answered
May 8, 2015
Theory of Computation
finite-automata
+
–
5
votes
61
GATE CSE 2007 | Question: 59
Information about a collection of students is given by the relation $\text{studInfo(}\underline{\text{studId}},\text{ name, sex)}$. The relation $\text{enroll(}{\text{studId}},{\text{ courseId}})$ gives which student has enrolled for ... Courses in which a proper subset of female students are enrolled. Courses in which only male students are enrolled. None of the above
Information about a collection of students is given by the relation $\text{studInfo(}\underline{\text{studId}},\text{ name, sex)}$. The relation $\text{enroll(}{\text{stu...
20.8k
views
answered
Jan 22, 2015
Databases
gatecse-2007
databases
relational-algebra
normal
+
–
1
votes
62
consider relation R1(A,B) and R2(C,D) ,where R1 contain 'm' tuples and R2 contain 'n' tuples and R1,R2 contain no common attribute and attribute B have NULL values then what is the number of tuples in cartesian product of R1 and R2?
890
views
answered
Jan 16, 2015
Databases
cartesian-product
+
–
0
votes
63
GATE IT 2006 | Question: 15
Which of the following relational query languages have the same expressive power? Relational algebra Tuple relational calculus restricted to safe expressions Domain relational calculus restricted to safe expressions II and III only I and II only I and III only I, II and III
Which of the following relational query languages have the same expressive power?Relational algebraTuple relational calculus restricted to safe expressionsDomain relation...
9.1k
views
answered
Jan 15, 2015
Databases
gateit-2006
databases
relational-algebra
relational-calculus
easy
+
–
1
votes
64
State true or false with explanation.Larger time quantum gives more efficiency than smaller time quantum used in RR scheduling
604
views
answered
Jan 13, 2015
6
votes
65
GATE IT 2006 | Question: 32
Let $L$ be a context-free language and $M$ a regular language. Then the language $L ∩ M$ is always regular never regular always a deterministic context-free language always a context-free language
Let $L$ be a context-free language and $M$ a regular language. Then the language $L ∩ M$ isalways regularnever regularalways a deterministic context-free languagealways...
9.9k
views
answered
Dec 2, 2014
Theory of Computation
gateit-2006
theory-of-computation
closure-property
easy
+
–
0
votes
66
is it context free?
is it cfl L = { a^n b^n c^m | n>=1 , m=2n } ? i did like for stack push and pop " a & b " are coverd and later we are having stack empty? can we write this language as a^n b^n c^2n ?
is it cfl L = { a^n b^n c^m | n>=1 , m=2n } ?i did like for stack push and pop " a & b " are coverd and later we are having stack empty? can we write this language ...
4.5k
views
answered
Dec 1, 2014
Theory of Computation
theory-of-computation
context-free-language
+
–
3
votes
67
How many 2K x 8 RAM chips are needed?
We want to build a memory with 4-byte words and a capacity of 221 bits. How many 2K x 8 RAM chips are needed? How many address lines are needed for the memory? How many of these address lines are connected to the address inputs of the RAM chips? How many of these address lines ... to 32 256, 16, 11, 5, 5 to 32 128, 16, 10, 6, 6 to 64 512, 15, 10, 5, 5 to 32
We want to build a memory with 4-byte words and a capacity of 221 bits. How many 2K x 8 RAM chips are needed? How many address lines are needed for the memory? How many o...
20.0k
views
answered
Dec 1, 2014
CO and Architecture
memory-interfacing
ram
+
–
11
votes
68
TIFR CSE 2014 | Part B | Question: 3
Consider the following directed graph. Suppose a depth-first traversal of this graph is performed, assuming that whenever there is a choice, the vertex earlier in the alphabetical order is to be chosen. Suppose the number of tree edges is $T$, the number of back edges is $B$ and the number of ... $B = 1$, $C = 2$, and $T = 3$. $B = 2$, $C = 2$, and $T = 1$.
Consider the following directed graph.Suppose a depth-first traversal of this graph is performed, assuming that whenever there is a choice, the vertex earlier in the alph...
5.3k
views
answered
Dec 1, 2014
Algorithms
tifr2014
algorithms
graph-algorithms
+
–
0
votes
69
Matching in graph theory
Can anone please explain what is a perfect matching in graph theory?
Can anone please explain what is a perfect matching in graph theory?
1.2k
views
answered
Dec 1, 2014
–1
votes
70
Omega notation
Is sqrt(n)+ log n = omega(log n)? If yes then please explain why...?
Is sqrt(n)+ log n = omega(log n)? If yes then please explain why...?
417
views
answered
Nov 26, 2014
Algorithms
algorithms
recurrence-relation
+
–
Page:
« prev
1
2
3
4
5
6
7
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register