Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by Kaluti
0
votes
2
answers
21
discrete maths
How many ordered pair of integers (a, b) are needed to guarantee that there are two ordered pairs (a1, b1) and (a2, b1) such that a1 mod 5 = a2 mod 5 and b1 mod 5 = b2 mod 5? should not answer be 25 here
How many ordered pair of integers (a, b) are needed to guarantee that there are two ordered pairs (a1, b1) and (a2, b1) such that a1 mod 5 = a2 mod 5 and b1 mod 5 = b2 mo...
2.1k
views
asked
Feb 1, 2018
0
votes
1
answer
22
discrete maths
What is the coefficient of $x^{12}$ in the power series of $\dfrac{x^3}{(1+2x)^2}?$
What is the coefficient of $x^{12}$ in the power series of $\dfrac{x^3}{(1+2x)^2}?$
635
views
asked
Feb 1, 2018
Set Theory & Algebra
generating-functions
+
–
0
votes
1
answer
23
discrete maths
Consider the following statements: S1: Every cyclic group is Abelian group. S2: Every Abelian group is cyclic group. S3: Cyclic group of order 10 have 4 generators. Which of the following is true?
Consider the following statements:S1: Every cyclic group is Abelian group.S2: Every Abelian group is cyclic group.S3: Cyclic group of order 10 have 4 generators.Which of ...
1.3k
views
asked
Feb 1, 2018
1
votes
0
answers
24
discrete mathmatics
Consider two sets A and B such that: AUB $\subseteq$ A $\cap$ B Then, which of the following is incorrect? A A = { } and B={} ALWAYS B |A| = |B| C A=B D none of these
Consider two sets A and B such that: AUB $\subseteq$ A $\cap$ BThen, which of the following is incorrect?A A = { } and B={} ALWAYSB |A| = |B|C A=BD none of these
372
views
asked
Jan 31, 2018
0
votes
0
answers
25
computer organization
A DMA is transferring characters to processor from a device transmitting at 8000 bits per sec. Assume DMA using cycle stealing mode. If processor needs access to main memory once every micro second. The percentage processor be slow down due to DMA activity is ______ (in %).
A DMA is transferring characters to processor from a device transmitting at 8000 bits per sec. Assume DMA using cycle stealing mode. If processor needs access to main mem...
376
views
asked
Jan 31, 2018
0
votes
1
answer
26
computer organization
A CPU has 24 bit instructions and we have to calculate the sum of n number by using below code: The value of X, if target address of branch is loop, when instruction is uses PC relative addressing mode is ________. (Assume memory is byte addressable)
A CPU has 24 bit instructions and we have to calculate the sum of n number by using below code:The value of X, if target address of branch is loop, when instruction is us...
777
views
asked
Jan 31, 2018
2
votes
2
answers
27
computer organization
suppose that in 1000 memory reference there are 40 misses in the first level cache and 20 misses in the second level cache. Assume miss penalty from the L2 cache to memory is 100 cycles the hit time of the L2 cache is 10 clock cycles.the hit time of the L1 cache is 1 clock cycle. what is average memory access time?
suppose that in 1000 memory reference there are 40 misses in the first level cache and 20 misses in the second level cache. Assume miss penalty from the L2 cache to memor...
1.4k
views
asked
Jan 31, 2018
0
votes
0
answers
28
computer organization
A computer has a cache, main memory and a disk used for virtual memory. If reference word is in cache $15\hspace{0.1cm} ns$ are required to access it. If it is in main memory but not in cache, $50\hspace{0.1cm} nsec$ are needed to load it into cache and ... on this system will be____________. (in μsec) is this correct equation .$90*15 + .10*(.50*(50+15)+.50*(10000000+50))$
A computer has a cache, main memory and a disk used for virtual memory. If reference word is in cache $15\hspace{0.1cm} ns$ are required to access it. If it is in main me...
210
views
asked
Jan 30, 2018
CO and Architecture
co-and-architecture
+
–
0
votes
0
answers
29
computer organization
Consider the following statements : S1 : Delayed control transfer involve starting the execution of the instruction after a branch or control instruction regardless of whether the branch is taken. S2 : A way to implement branch prediction is to store the ... hazards can be avoided completely if at least N' registers are available. Which of the above statements are true ?
Consider the following statements :S1 : Delayed control transfer involve starting the execution of the instruction after a branch or control instruction regardless of whe...
419
views
asked
Jan 30, 2018
0
votes
0
answers
30
computer organization
Assume that we have a two dimensional array of 60 × 60. Each element is of 4 bytes and array is stored in row major order. RAM is 2 MB and cache is 8 KB with each block of 16 bytes. In case of direct mapped cache, the number of cache misses are _______ (Assume that cache is empty initially). i am getting answer as 1290 however answer given as 1288
Assume that we have a two dimensional array of 60 × 60. Each element is of 4 bytes and array is stored in row major order. RAM is 2 MB and cache is 8 KB with each block ...
264
views
asked
Jan 30, 2018
0
votes
0
answers
31
computer organization
Consider a 16 bit processor in which the following one address instruction is loaded into main memory : The effective address using PC-relative addressing mode when processor is executing an instruction at location 100 is __________ (Assume memory is of Byte addressable).
Consider a 16 bit processor in which the following one address instruction is loaded into main memory :The effective address using PC-relative addressing mode when proces...
1.8k
views
asked
Jan 30, 2018
0
votes
0
answers
32
computer organization
Consider the following statements about addressing mode : S1 : Computer using addressing modes to reduce number of bits in the addressing field of instruction. S2 : It specifies rules for modifying or interpreting address field of the instruction. S3 ... versatility to user by providing facilities as pointers to memory counter for loop control. Which of the following is true?
Consider the following statements about addressing mode :S1 : Computer using addressing modes to reduce number of bits in the addressing field of instruction.S2 : It spec...
950
views
asked
Jan 30, 2018
1
votes
0
answers
33
computer organization
Consider a 4-way set associative Cache (initially empty) with total 16 cache blocks. The main memory consist of 512 blocks and the request for memory blocks in the order which is given as: 0, 31, 17, 45, 67, 85, 213, 167, 302, 17, 31, 67, ... 39, 41, 17, 7, 31 What is the number of misses in the cache when least recently policy and least frequently policy is used respectively?
Consider a 4-way set associative Cache (initially empty) with total 16 cache blocks. The main memory consist of 512 blocks and the request for memory blocks in the order ...
478
views
asked
Jan 28, 2018
1
votes
0
answers
34
computer organization
Consider an instruction of indirect addressing mode. What are the number of memory reference by th eprocessor when instruction is a computation that requires a single operand and when it is a branch instruction respectively? according to me answer should be 2,2
Consider an instruction of indirect addressing mode. What are the number of memory reference by th eprocessor when instruction is a computation that requires a single op...
255
views
asked
Jan 27, 2018
2
votes
1
answer
35
computer networks
Asymmetric key cryptrography and digital signature both use the private and public keys of the sender. explain is it true or false
Asymmetric key cryptrography and digital signature both use the private and public keys of the sender. explain is it true or false
256
views
asked
Jan 27, 2018
1
votes
0
answers
36
computer networks
Consider the following statements: S1 : Token bucket shapes bursty traffic into fixed-rate traffic by averaging the data rate. S2 : Leaky buckets are more restrictive compared to token bucket. S3 : A choke packet is a congestion-control mechanism in which a packet is sent by a node to the source to inform it of congestion. Which of the given statements are false?
Consider the following statements:S1 : Token bucket shapes bursty traffic into fixed-rate traffic by averaging the data rate.S2 : Leaky buckets are more restrictive compa...
292
views
asked
Jan 26, 2018
1
votes
0
answers
37
computer networks
Consider the sliding window protocol used at transport layer to transfer the segments, the receiver sends ACK K + 1 when it receives a packet with sequence number K and window size is denoted by W . Assume the sender's packets start with sequence number ... with sequence number greater than W is sent by sender iff a new (previously unseen) ACK arrives. 4)None of the above
Consider the sliding window protocol used at transport layer to transfer the segments, the receiver sends “ACK K + 1” when it receives a packet with sequence number �...
494
views
asked
Jan 26, 2018
1
votes
1
answer
38
computer networks
onsider the following statements with respect to TCP sliding window: S1: Silly window syndrome is a problem caused by heavy congestion in the network. S2: Nagle's algorithm is used when silly window syndrome problem is created by the sender. S3: Clark ... the sender can not send any type of segment. Which of the above statement are correct? can anybody explain sily window syndrome
onsider the following statements with respect to TCP sliding window:S1: Silly window syndrome is a problem caused by heavy congestion in the network.S2: Nagle’s algorit...
1.3k
views
asked
Jan 24, 2018
1
votes
0
answers
39
computer networks
Consider a network system consisting of three networks connected with two routers. Network-A has MTU of 1500 bytes, Network-B has MTU of 620 bytes, Network-C has MTU of 1500 bytes (MTU includes header size). Station-1 needs to send a segment of1380 bytes. The Total size of the packets received at Network-C is _________ bytes if the header size is 20 B.
Consider a network system consisting of three networks connected with two routers. Network-A has MTU of 1500 bytes, Network-B has MTU of 620 bytes, Network-C has MTU of 1...
229
views
asked
Jan 24, 2018
1
votes
1
answer
40
theory of computation
(o^(n))^(m)|n<m;n,m>=1 is it regular
(o^(n))^(m)|n<m;n,m>=1is it regular
242
views
asked
Jan 24, 2018
Page:
« prev
1
2
3
4
5
6
7
8
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register