search
Log In

Recent activity by Kartavya Kothari

4 answers
1
Consider a non­pipelined processor design which has a cycle time of 10ns and average CPI of 1.4. The maximum speedup pipelined processor can get by pipelining it into 5 stages and each stage takes 2ns is
commented Nov 17, 2018 in CO and Architecture 438 views
2 answers
2
2 answers
3
Consider the sliding window protocol used at transport layer to transfer the segments, the receiver sends ACK K + 1 when it receives a packet with sequence number K and window size is denoted by W . Assume the sender's packets start with sequence number 1. Which ... packet with sequence number greater than W is sent by sender iff a new (previously unseen) ACK arrives. (D) None of the above
commented Jun 7, 2018 in Computer Networks 201 views
2 answers
5
A system has 16 bits instruction that support zero address, one address and two address instructions Assume each address field size is 5 bits it is designed for supporting ‘40’ number of two address instructions, ‘400' number of one address instructions. The maximum number of zero address instructions that can be formulated is
asked May 11, 2018 in CO and Architecture 308 views
1 answer
6
Is the statement true or false; "RISC type processor is designed with minimum number of processing registers" ?
asked May 11, 2018 in CO and Architecture 152 views
2 answers
7
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
commented Apr 30, 2018 in Computer Networks 285 views
2 answers
8
Consider the following statements, when a distance vector routing protocol finding minimum cost paths suffers from count to infinity problem: S1 : The count-to-infinity problem may arise in distance vector routing protocol, when network gets disconnected. S2 : The count to infinity problem may arise in ... the following is correct? (A) Only S1 AND S3 (B) Only S2 AND S3 (C) Only S2 (D) All of them
asked Apr 30, 2018 in Computer Networks 437 views
1 answer
9
Amongst the ACID properties of a transaction, the 'Durability' property requires that the changes made to the database by a successful transaction persist Except in case of an Operating System crash Except in case of a Disk crash Except in case of a power failure Always, even if there is a failure of any kind
commented Apr 24, 2018 in Databases 2.5k views
4 answers
10
A table has fields $Fl, F2, F3, F4, F5$ with the following functional dependencies $F1 → F3$ $F2→ F4$ $(F1 . F2) → F5$ In terms of Normalization, this table is in $1NF$ $2NF$ $3NF$ None of these
answered Apr 24, 2018 in Databases 2.6k views
5 answers
11
Which one of the following statements about normal forms is $\text{FALSE}?$ $\text{BCNF}$ is stricter than $3NF$ Lossless, dependency-preserving decomposition into $3NF$ is always possible Lossless, dependency-preserving decomposition into $\text{BCNF}$ is always possible Any relation with two attributes is in $\text{BCNF}$
answered Apr 24, 2018 in Databases 5.1k views
4 answers
12
$R(A,B,C,D)$ is a relation. Which of the following does not have a lossless join, dependency preserving $BCNF$ decomposition? $A \rightarrow B, B \rightarrow CD$ $A \rightarrow B, B \rightarrow C, C \rightarrow D$ $ AB \rightarrow C, C \rightarrow AD$ $A \rightarrow BCD$
commented Apr 24, 2018 in Databases 16.7k views
5 answers
13
Which level of locking provides the highest degree of concurrency in a relational database ? Page Table Row Page, table and row level locking allow the same degree of concurrency
commented Apr 24, 2018 in Databases 3.7k views
...