Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by Jeetmoni saikia
340
views
2
answers
1
votes
Self doubt
#include<stdio.h void dynamic(int s, ...) { printf("%d ", s); } int main() { dynamic(2, 4, 6, 8); dynamic(3, 6, 9); return 0; }
340
views
asked
Jun 20, 2023
849
views
1
answers
0
votes
Website
int main(){int a = 10;cout<<a++;return 0;} (A) 10(B) 11(C) 12(D) Not defined
849
views
asked
Apr 12, 2023
461
views
1
answers
0
votes
Get command is found in a) tcp/ip b) ftp c) mac d) asp
461
views
asked
Feb 17, 2023
Computer Networks
tcp
computer-networks
+
–
3.2k
views
1
answers
0
votes
Choose the size of the below struct. Struct{ Int a; Char b; Float c; } 2 4 7 10
Choose the size of the below struct.Struct{ Int a; Char b; Float c; }1)22)43)74)10
3.2k
views
asked
Jan 11, 2023
Programming in C
programming-in-c
+
–
600
views
0
answers
0
votes
COA Doubt
What is the bandwidth of the memory , if access time and settling time of main memory are 45 ns and 5 ns respectively ? 20 Hz20 KHz20 MHz50 MHZ
600
views
asked
Dec 7, 2022
CO and Architecture
co-and-architecture
+
–
1.4k
views
2
answers
0
votes
Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 suddenly become ready at once, how many bit slots are needed to resolve the contention?
1.4k
views
asked
Dec 7, 2022
Computer Networks
computer-networks
network-protocols
+
–
509
views
0
answers
0
votes
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are: (A) n(n-1) and 2n (B) 2n and ((n(n – 1))/2) (C) ((n(n – 1))/2) and 2n (D) ((n(n – 1))/2) and n
509
views
asked
Nov 18, 2022
Computer Networks
computer-networks
network-security
normal
+
–
674
views
1
answers
0
votes
Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet? a) Destination address b) Source address c) Checksum d) Padding
674
views
asked
Nov 16, 2022
Computer Networks
computer-networks
ip-addressing
+
–
1.9k
views
2
answers
1
votes
Which of the following is the broadcast address for a Class B network ID using the default subnetmask? (a) 172.16.10.255 (b) 255.255.255.255 (c) 172.16.255.255 (d) 172.255.255.255
1.9k
views
asked
Nov 14, 2022
Computer Networks
computer-networks
subnetting
normal
+
–
549
views
1
answers
1
votes
CN Doubt
The underlying Transport layer protocol used by SMTP is ________(a) TCP(b) UDP(c) Either TCP or UDP
549
views
asked
Nov 4, 2022
Computer Networks
computer-networks
transport-layer
tcp
udp
+
–
512
views
3
answers
0
votes
The hamming distance between the octets of 0xAA and 0x55 is (A) 7 (B) 5 (C) 8 (D) 6
512
views
asked
Oct 22, 2022
Computer Networks
computer-networks
hamming-code
+
–
1.7k
views
1
answers
2
votes
With segmentation, if there are 64 segments and maximum segment size is 512 words; the length of logical address is how many bits a) 12 b) 6 c) 15 d) 9
1.7k
views
asked
Oct 21, 2022
Operating System
operating-system
virtual-memory
segmentation
+
–
1.1k
views
1
answers
0
votes
Which of the following describe the DHCP Discover message? 1) It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. I uses UDP as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a layer 2 destination address. [A]. 1 only [B]. 1 and 2 @ [C]. 3 and 4 [D]. 4 only
1.1k
views
asked
Oct 17, 2022
Computer Networks
udp
transport-layer
tcp
+
–
321
views
0
answers
0
votes
Class P { void f(int i) { print(i); } } Class Q subclass of P { void f(int i) { print(2*i); } } Now consider the following program fragment: P x = new Q(); Q y = new Q(); P z = new Q(); x.f(1); ((P)y).f(1); z.f(1); Here ((P)y) denotes a typecast of y to P. The output produced by executing the above program fragment will be (A) 1 2 1 (B) 2 1 1 (C) 2 1 2 (D) 2 2 2
321
views
asked
Oct 16, 2022
Programming in C
programming-in-c
output
normal
+
–
665
views
1
answers
2
votes
Packets of the same session may be routed through different paths in: 1)TCP, but not UDP 2)TCP and UDP 3)UDP, but not TCP 4) Neither TCP nor UDP
665
views
asked
Oct 15, 2022
Computer Networks
computer-networks
tcp
udp
easy
+
–
1.0k
views
1
answers
0
votes
The number of address lines required to address 8 GB memory is a) 8 b) 1024 c) 32 d) 33 . Please help
1.0k
views
asked
Oct 11, 2022
CO and Architecture
co-and-architecture
digital-logic
memory-interfacing
+
–
618
views
0
answers
0
votes
Consider the following class definitions in a hypothetical Object Oriented language that supports inheritance and uses dynamic binding. The language should not be assumed to be either Java or C++, though the syntax is similar. Class P { void f(int i) { print(i); } } Class Q subclass of P { void f(int i) { print(2*i); } } Now consider the following program fragment: P x = new Q(); Q y = new Q(); P z = new Q(); x.f(1); ((P)y).f(1); z.f(1); Here ((P)y) denotes a typecast of y to P. The output produced by executing the above program fragment will be (A) 1 2 1 (B) 2 1 1 (C) 2 1 2 (D) 2 2 2
618
views
asked
Oct 10, 2022
Programming in C
programming
object-oriented-programming
+
–
824
views
1
answers
0
votes
In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is (A) 158 (B) 255 (C) 222 (D) 223
824
views
asked
Oct 8, 2022
1.7k
views
4
answers
0
votes
Subnetting/Supernetting
In class $B$ if subnet mask is $255.192.0.0$ then the total number of networks that can be joined is: $32$ $64$ $16$ None of the Above
1.7k
views
asked
Sep 28, 2022
Computer Networks
subnetting
computer-networks
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register