Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by Kapil
10
votes
41
REVERSE = { M | M is a TM with the property: for all w, M(w) accepts iff M(wR) accepts}.
REVERSE = { M | M is a TM with the property: for all w, M(w) accepts iff M(wR) accepts}. decidable/REL??
REVERSE = { M | M is a TM with the property: for all w, M(w) accepts iff M(wR) accepts}.decidable/REL??
1.1k
views
answered
Dec 31, 2016
Theory of Computation
theory-of-computation
decidability
+
–
32
votes
42
TIFR CSE 2016 | Part A | Question: 15
In a tournament with $7$ teams, each team plays one match with every other team. For each match, the team earns two points if it wins, one point if it ties, and no points if it loses. At the end of all matches, the teams are ordered in the descending ... of points a team must earn in order to be guaranteed a place in the next round? $13$ $12$ $11$ $10$ $9$
In a tournament with $7$ teams, each team plays one match with every other team. For each match, the team earns two points if it wins, one point if it ties, and no points...
5.9k
views
answered
Dec 28, 2016
Combinatory
tifr2016
combinatory
pigeonhole-principle
normal
+
–
3
votes
43
TIFR CSE 2016 | Part B | Question: 5
Consider the recursive function $\mathsf{mc91}$ ... $\{ n: 0 \leq n \leq 110 \}$ $\{ n: 0 \leq n \leq 111 \}$ $\{ n: 0 \leq n < + \infty \}$
Consider the recursive function $\mathsf{mc91}$.int mc91(int n) { print n if (n 100) { return n-10; } else { return mc91(mc91(n+11)); } }Let $\mathsf{Out}=\{n : \text{ t...
656
views
answered
Dec 28, 2016
Programming in C
tifr2016
programming-in-c
recursion
+
–
4
votes
44
how many stall cycles in this system on cache miss ?
Directly coming to the question...(its a linked data type qstn) A pipelined processor with separate instruction and data cache has 5 stages with a cycle time of 30 ns. It is used with copy-back data cache with block size of 1 word. ... answer given is different. And based on 1st qstn only you are able to solve second one. Where am I going wrong??
Directly coming to the question...(its a linked data type qstn)A pipelined processor with separate instruction and data cache has 5 stages with a cycle time of 30 ns. It ...
1.3k
views
answered
Dec 27, 2016
CO and Architecture
co-and-architecture
cache-memory
pipelining
+
–
44
votes
45
TIFR CSE 2017 | Part B | Question: 1
A vertex colouring with three colours of a graph $G=(V, E)$ is a mapping $c: V \rightarrow \{R, G, B\}$ so that adjacent vertices receive distinct colours. Consider the following undirected graph. How many vertex colouring with three colours does this graph have? $3^9$ $6^3$ $3 \times 2^8$ $27$ $24$
A vertex colouring with three colours of a graph $G=(V, E)$ is a mapping $c: V \rightarrow \{R, G, B\}$ so that adjacent vertices receive distinct colours. Consider the f...
4.9k
views
answered
Dec 23, 2016
Graph Theory
tifr2017
graph-theory
graph-coloring
+
–
9
votes
46
C programming
int func(int n) { if(n<3) return 1; else return func(n-1)+func(n-3)+1; } How many invocations for calculating func(func(5))
int func(int n) { if(n<3) return 1; else return func(n-1)+func(n-3)+1; } How many invocations for calculating func(func(5))
860
views
answered
Dec 23, 2016
Programming in C
programming-in-c
recursion
+
–
6
votes
47
toc dfa
Minimum Number of states required by a DFA to accept the String (a+b) * a(a+b)(a+b) ?
Minimum Number of states required by a DFA to accept the String (a+b) * a(a+b)(a+b) ?
210
views
answered
Dec 22, 2016
Theory of Computation
theory-of-computation
+
–
7
votes
48
DAG compilers
How to find unnecessary production while optimising DAG. for ex- a = b * c d = b e = d * c b = e f = b + c g = f + d How many production need to be removed and how to find them . ?
How to find unnecessary production while optimising DAG. for ex-a = b * c d = b e = d * c b = e f = b + c g = f + dHow many production need to be removed and how to find ...
3.0k
views
answered
Dec 21, 2016
Compiler Design
compiler-design
code-optimization
directed-acyclic-graph
+
–
33
votes
49
TIFR CSE 2017 | Part A | Question: 4
Which of the following functions asymptotically grows the fastest as $n$ goes to infinity? $(\log \: \log \: n)!$ $(\log \: \log \: n)^ {\log \: n}$ $(\log \: \log \: n)^{\log \: \log \: \log \: n}$ $(\log \: n)^{\log \: \log \: n}$ $2^{\sqrt{\log \: \log \: n}}$
Which of the following functions asymptotically grows the fastest as $n$ goes to infinity?$(\log \: \log \: n)!$$(\log \: \log \: n)^ {\log \: n}$$(\log \: \log \: n)^{\l...
4.0k
views
answered
Dec 21, 2016
Algorithms
tifr2017
algorithms
asymptotic-notation
+
–
4
votes
50
Cache memory
Cache memory with a line size of $\large\color{maroon}{\text{32}}$B. In a cache miss situation block of words are loaded from Main memory to cache and then accessed from the cache. $A$ ... should get on average before being replaced such that write back policy becomes more effective than write-through?
Cache memory with a line size of $\large\color{maroon}{\text{32}}$B. In a cache miss situation block of words are loaded from Main memory to cache and then accessed from ...
622
views
answered
Dec 19, 2016
CO and Architecture
co-and-architecture
cache-memory
+
–
7
votes
51
Convert the given Three Address Code (TAC) into Static Single Assignment (SSA) ?
$x=5$ $x=x-3$ $\textbf{if } x<3$ $\quad y=x*2$ $\quad w=y$ $\textbf{else}$ $\quad y=x-3$ $w=x-y$ $z=x+y$ Give Equivalent SSA.
$x=5$$x=x-3$$\textbf{if } x<3$$\quad y=x*2$$\quad w=y$$\textbf{else}$$\quad y=x-3$$w=x-y$$z=x+y$Give Equivalent SSA.
2.0k
views
answered
Dec 17, 2016
Compiler Design
compiler-design
static-single-assignment
+
–
17
votes
52
DMA Cycle Stealing Mode Transfer
A DMA controller transfers $16$-bit word to memory using cycle stealing. The words are assembled from a device that transmits characters at a rate of $2400$ characters per second. The CPU is fetching and executing instructions at an average rate ... ASCII? How much more percent the CPU slows down when $32$ -bits words are transferred to memory using cycle stealing?
A DMA controller transfers $16$-bit word to memory using cycle stealing. The words are assembled from a device that transmits characters at a rate of $2400$ characters pe...
10.9k
views
answered
Dec 17, 2016
CO and Architecture
dma
co-and-architecture
+
–
6
votes
53
Time complexity and output
#include <stdio.h> #define N 3 int main() { int array[N] = {1,2,3}; int i,j; for ( i=1; i<(1<<N); i++) { for( j=0; j<N; j++) { if((1<<j)&i) { printf("%d", array[j]); } } printf("\n"); } return 0 ... $N = n \;\; , n \; \text{ is a positive integer }$ ? B. What is the output? C. What will be the complexity when $N$ is large.
#include <stdio.h #define N 3 int main() { int array[N] = {1,2,3}; int i,j; for ( i=1; i<(1<<N); i++) { for( j=0; j<N; j++) { if((1<<j)&i) { printf("%d", array[j]); } } p...
1.8k
views
answered
Dec 17, 2016
Programming in C
time-complexity
bitwise
programming-in-c
combinatory
summation
sub-set
binomial-theorem
+
–
4
votes
54
#Hashing
Consider a hash table with m slots that uses open addressing with linear probing. The table is initially empty. A key k1 is inserted into the table, followed by keyk2, and then keyk3.What is the probability that the total number of probes while inserting these keys is at least 4?
Consider a hash table with m slots that uses open addressing with linear probing. The table is initially empty. A key k1 is inserted into the table, followed by keyk2, an...
752
views
answered
Dec 16, 2016
15
votes
55
L= {<TM> | TM halts on every input}
$L=\left \{ <TM> | TM\ halts\ on\ every\ input\ \right \}$ is above language Recursively enumerable or non recursively enumerable??
$L=\left \{ <TM | TM\ halts\ on\ every\ input\ \right \}$is above language Recursively enumerable or non recursively enumerable??
4.9k
views
answered
Dec 16, 2016
Theory of Computation
theory-of-computation
decidability
rice-theorem
+
–
12
votes
56
#compiler
given Grammar E → E + E E → E * E E → ( E ) E → id Find set of handles and viable prefixes for the input string id1 + id2 * id3
given GrammarE → E + EE → E * EE → ( E )E → idFind set of handles and viable prefixes for the input string id1 + id2 * id3
4.3k
views
answered
Dec 13, 2016
Compiler Design
compiler-design
viable-prefix
+
–
22
votes
57
Tokenization in lexical analysis
Consider the following C program: int main (void) { in/*this is an example*/z; double/*is it an error?*/y; print( “This is simple” ); return 0; } - How many Different tokens are there in the above code.
Consider the following C program: int main (void) { in/*this is an example*/z; double/*is it an error?*/y; print( “This is simple” ); return 0; }- How many Different ...
3.4k
views
answered
Dec 13, 2016
Compiler Design
compiler-design
compiler-tokenization
lexical-analysis
+
–
4
votes
58
Graph
graph of 100 edges and 25 vertices..size of minimum vertex cover is 8..what is the size of maximum independence set?
graph of 100 edges and 25 vertices..size of minimum vertex cover is 8..what is the size of maximum independence set?
524
views
answered
Dec 10, 2016
12
votes
59
TOC- DFA
Number of states in DFA which accepts the binary strings divisible by 4 or 5. answer?
Number of states in DFA which accepts the binary strings divisible by 4 or 5.answer?
5.1k
views
answered
Dec 10, 2016
Theory of Computation
theory-of-computation
minimal-state-automata
+
–
17
votes
60
CSMA/CD
1)Suppose nodes A and B are on 10Mbps Ethernet segment and the propagation delay between the two nodes is 225 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K say for A (k=0) ... ? 2) Assume A has started before B and B detects collision as soon as it started transmitting, Then reransmissions of A and B collide ?
1)Suppose nodes A and B are on 10Mbps Ethernet segment and the propagation delay between the two nodes is 225 bit times. Suppose A and B send frames at the same time, the...
9.7k
views
answered
Dec 9, 2016
Computer Networks
computer-networks
ethernet
csma-cd
+
–
7
votes
61
dpda || Linz 7.3-2
DPDA for $L = \left \{ a^nb^m|m\geq n+2 \right \}$
DPDA for $L = \left \{ a^nb^m|m\geq n+2 \right \}$
487
views
answered
Dec 7, 2016
Theory of Computation
theory-of-computation
pushdown-automata
+
–
12
votes
62
shortest path
Let P be a shortest path from some vertex s to some other vertex t in a directed graph. If the weight of each edge in the graph is increased by one, P will still be a shortest path from s to t. T/F
Let P be a shortest path from some vertex s to some other vertex t in a directed graph. If the weight of each edge in the graph is increased by one, P will still be a sho...
2.7k
views
answered
Dec 6, 2016
Algorithms
graph-algorithms
shortest-path
graph-theory
+
–
8
votes
63
Given the disk capacity of 50 MB has block size 256 bytes and block/cluster is 8
Given the disk capacity of 50 MB has block size 256 bytes and block/cluster is 8, the number of entries require in the FAT (File Allocation Table) is? 50*212 50*210 50*224 50*22
Given the disk capacity of 50 MB has block size 256 bytes and block/cluster is 8, the number of entries require in the FAT (File Allocation Table) is? 50*212 50*210 50...
886
views
answered
Dec 4, 2016
Operating System
operating-system
+
–
9
votes
64
Made-easy
$T(N) = 2T\sqrt{N} + Log\sqrt{N}$ what is the solution of recurrence relation
$T(N) = 2T\sqrt{N} + Log\sqrt{N}$what is the solution of recurrence relation
476
views
answered
Dec 4, 2016
Algorithms
algorithms
recurrence-relation
made-easy-test-series
+
–
16
votes
65
Consider two processes, P and Q, each need three records,
Consider two processes, P and Q, each need three records, R1, R2. and R3, in a database. If P asks for them in any order R1, R2, R3, and Q asks for them in any order, What fraction of all the combinations are guaranteed to be deadlock free? $\frac{1}{3}$ $\frac{2}{3}$ $\frac{1}{6}$
Consider two processes, P and Q, each need three records, R1, R2. and R3, in a database. If P asks for them in any order R1, R2, R3, and Q asks for them in any order, Wha...
4.5k
views
answered
Dec 4, 2016
Operating System
deadlock-prevention-avoidance-detection
operating-system
+
–
5
votes
66
Doubt regarding minimum FF's required?
In previous two year's a question has been asked for finding number of flip flop's for counting sequence $\color{navy}{0-1-0-2-0-3}$ in 2016 and $\color{navy}{0-0-1-1-2-2-3-3-0-0}$ in 2015. But still, the approach discussed in these questions hasn't arrived at Common answer ( ... $2). 0-1-0-2-0-2-0-3-0-2-...$ $3). 1-2-3-0-0-1-0-2-2-...$
In previous two year's a question has been asked for finding number of flip flop's for counting sequence $\color{navy}{0-1-0-2-0-3}$ in 2016 and $\color{navy}{0-0-1-1-2-2...
2.6k
views
answered
Dec 2, 2016
Digital Logic
digital-logic
digital-counter
+
–
29
votes
67
Hamacher-DMA
The average seek time and rotational delay in a disk system are 6ms and 3ms, respectively. The rate of data transfer to or from the disk is 30 Mbytes/sec and all disk accesses are for 8 Kbytes of data. Disk DMA controller, the processor and the main ... stolen by a disk unit, on average over a long period of time during which a sequence of independent 8K-byte transfers takes place?
The average seek time and rotational delay in a disk system are 6ms and 3ms, respectively. The rate of data transfer to or from the disk is 30 Mbytes/sec and all disk ac...
5.4k
views
answered
Nov 24, 2016
CO and Architecture
co-and-architecture
dma
+
–
5
votes
68
ME FLT-1 q29
please explain this anyone
please explain this anyone
742
views
answered
Nov 19, 2016
9
votes
69
What is the difference ??
Please explain clearly?
Please explain clearly?
1.1k
views
answered
Nov 19, 2016
Theory of Computation
turing-machine
decidability
+
–
Page:
« prev
1
2
3
4
5
6
7
...
11
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register