search
Log In

Questions by Kartavya Kothari

1 vote
4 answers
1
Consider a non­pipelined processor design which has a cycle time of 10ns and average CPI of 1.4. The maximum speedup pipelined processor can get by pipelining it into 5 stages and each stage takes 2ns is
asked Nov 17, 2018 in CO and Architecture 520 views
0 votes
2 answers
2
A ____ can be used to prevent a user program from never returning control to the operating system.
asked Aug 27, 2018 in Operating System 104 views
0 votes
1 answer
3
1 vote
2 answers
4
A system has 16 bits instruction that support zero address, one address and two address instructions Assume each address field size is 5 bits it is designed for supporting ‘40’ number of two address instructions, ‘400' number of one address instructions. The maximum number of zero address instructions that can be formulated is
asked May 11, 2018 in CO and Architecture 369 views
0 votes
1 answer
5
Is the statement true or false; "RISC type processor is designed with minimum number of processing registers" ?
asked May 11, 2018 in CO and Architecture 160 views
1 vote
2 answers
6
Consider the sliding window protocol used at transport layer to transfer the segments, the receiver sends ACK K + 1 when it receives a packet with sequence number K and window size is denoted by W . Assume the sender's packets start with sequence number 1. Which ... packet with sequence number greater than W is sent by sender iff a new (previously unseen) ACK arrives. (D) None of the above
asked Apr 30, 2018 in Computer Networks 228 views
1 vote
3 answers
7
Consider the following statements, when a distance vector routing protocol finding minimum cost paths suffers from count to infinity problem: S1 : The count-to-infinity problem may arise in distance vector routing protocol, when network gets disconnected. S2 : The count to infinity problem may arise in ... the following is correct? (A) Only S1 AND S3 (B) Only S2 AND S3 (C) Only S2 (D) All of them
asked Apr 30, 2018 in Computer Networks 610 views
0 votes
2 answers
8
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
asked Apr 30, 2018 in Computer Networks 328 views
...