menu
Login
Register
search
Log In
account_circle
Log In
Email or Username
Password
Remember
Log In
Register
I forgot my password
Register
Username
Email
Password
Register
add
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
User Kartavya Kothari
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Barc Interview Experience 2020- CSE stream
JEST 2021 registrations are open
TIFR GS-2021 Online Application portal
IIT Jodhpur Mtech AI - Interview Expierence (Summer Admission)
Interview experience at IIT Tirupati for MS program winter admission
Subjects
All categories
General Aptitude
(2.1k)
Engineering Mathematics
(8.5k)
Digital Logic
(3k)
Programming and DS
(5.1k)
Algorithms
(4.5k)
Theory of Computation
(6.3k)
Compiler Design
(2.2k)
Operating System
(4.7k)
Databases
(4.3k)
CO and Architecture
(3.5k)
Computer Networks
(4.3k)
Non GATE
(1.2k)
Others
(1.3k)
Admissions
(595)
Exam Queries
(838)
Tier 1 Placement Questions
(16)
Job Queries
(71)
Projects
(19)
Unknown Category
(1.1k)
Recent Blog Comments
hi this pdf have gate prevoius year questions or...
Thanks, dude for sharing your experience !! It...
Congratulations, at least you made it to the...
seems like you really enjoyed the process.......
I wrote an email to IISC regarding JEST 2021 but...
Network Sites
GO Mechanical
GO Electrical
GO Electronics
GO Civil
CSE Doubts
Questions by Kartavya Kothari
1
vote
4
answers
1
Ace Test Series: CO & Architecture - SpeedUp In Pipeline
Consider a nonpipelined processor design which has a cycle time of 10ns and average CPI of 1.4. The maximum speedup pipelined processor can get by pipelining it into 5 stages and each stage takes 2ns is
Consider a nonpipelined processor design which has a cycle time of 10ns and average CPI of 1.4. The maximum speedup pipelined processor can get by pipelining it into 5 stages and each stage takes 2ns is
asked
Nov 17, 2018
in
CO and Architecture
520
views
pipelining
co-and-architecture
speedup
ace-test-series
0
votes
2
answers
2
Ace Test Series: Operating System - General Concept
A ____ can be used to prevent a user program from never returning control to the operating system.
A ____ can be used to prevent a user program from never returning control to the operating system.
asked
Aug 27, 2018
in
Operating System
104
views
ace-test-series
operating-system
0
votes
1
answer
3
Ace Test Series: CO & Architecture - Hardwired Control
Is Hardwire control system used for real time systems?
Is Hardwire control system used for real time systems?
asked
May 11, 2018
in
CO and Architecture
117
views
ace-test-series
co-and-architecture
1
vote
2
answers
4
Ace Test Series 2019: CO & Architecture - Number Of Zero Address Instructions
A system has 16 bits instruction that support zero address, one address and two address instructions Assume each address field size is 5 bits it is designed for supporting 40' number of two address ... ' number of one address instructions. The maximum number of zero address instructions that can be formulated is
A system has 16 bits instruction that support zero address, one address and two address instructions Assume each address field size is 5 bits it is designed for supporting ‘40’ number of two address instructions, ‘400' number of one address instructions. The maximum number of zero address instructions that can be formulated is
asked
May 11, 2018
in
CO and Architecture
369
views
ace-test-series
co-and-architecture
addressing-modes
0
votes
1
answer
5
Ace Test Series: CO & Architecture - RISC Properties
Is the statement true or false; "RISC type processor is designed with minimum number of processing registers" ?
Is the statement true or false; "RISC type processor is designed with minimum number of processing registers" ?
asked
May 11, 2018
in
CO and Architecture
160
views
ace-test-series
co-and-architecture
1
vote
2
answers
6
MadeEasy Test Series 2017: Computer Networks - Sliding Window
Consider the sliding window protocol used at transport layer to transfer the segments, the receiver sends ACK K + 1 when it receives a packet with sequence number K and window size is denoted by W . Assume the sender's packets ... greater than W is sent by sender iff a new (previously unseen) ACK arrives. (D) None of the above
Consider the sliding window protocol used at transport layer to transfer the segments, the receiver sends ACK K + 1 when it receives a packet with sequence number K and window size is denoted by W . Assume the sender's packets start with sequence number 1. Which ... packet with sequence number greater than W is sent by sender iff a new (previously unseen) ACK arrives. (D) None of the above
asked
Apr 30, 2018
in
Computer Networks
228
views
made-easy-test-series
computer-networks
sliding-window
1
vote
3
answers
7
MadeEasy Test Series 2017: Computer Networks - Distance Vector Routing
Consider the following statements, when a distance vector routing protocol finding minimum cost paths suffers from count to infinity problem: S1 : The count-to-infinity problem may arise in distance vector routing protocol, when network gets disconnected. S2 : ... (A) Only S1 AND S3 (B) Only S2 AND S3 (C) Only S2 (D) All of them
Consider the following statements, when a distance vector routing protocol finding minimum cost paths suffers from count to infinity problem: S1 : The count-to-infinity problem may arise in distance vector routing protocol, when network gets disconnected. S2 : The count to infinity problem may arise in ... the following is correct? (A) Only S1 AND S3 (B) Only S2 AND S3 (C) Only S2 (D) All of them
asked
Apr 30, 2018
in
Computer Networks
610
views
made-easy-test-series
computer-networks
distance-vector-routing
0
votes
2
answers
8
MadeEasy Test Series 2018: Computer Networks - Network Security
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
asked
Apr 30, 2018
in
Computer Networks
328
views
made-easy-test-series
computer-networks
network-security
...