Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Neeraj7375
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by Neeraj7375
1
answer
1
data link layer
is fragmentation possible in data link layer??
is fragmentation possible in data link layer??
299
views
answered
May 17, 2018
3
answers
2
DBMS :- Referential integrity constraints
select the correct statement from the following on referential integrity Select one: a. referential integrity constraints check whether the primary key, values are unique b. referential integrity constraints check whether an ... two relations in a schema d. referential integrity constraints are specified between entities having recursive relationship
select the correct statement from the following on referential integritySelect one:a. referential integrity constraints check whether the primary key, values are uniqueb....
9.5k
views
answered
May 17, 2018
Databases
databases
referential-integrity
relations
+
–
1
answer
3
Virtual gate
A B+ tree of order d is a tree in which each internal node has between d and 2d keys values. The root has between 1 and 2d values. What is the maximum number of internal nodes in a B+ tree of order 4 with 52 leaves.
A B+ tree of order d is a tree in which each internal node has between d and 2d keys values. The root has between 1 and 2d values. What is the maximum number of internal ...
227
views
answered
Jan 19, 2018
1
answer
4
UGC NET CSE | June 2014 | Part 3 | Question: 01
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used in rasterscan ... method. IV. Shadow-mask method is better than beam-penetration method. I and II II and III III only IV only
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ?I. The beam-penetration is used...
6.1k
views
commented
Dec 5, 2017
Computer Graphics
ugcnetjune2014iii
non-gate
computer-graphics
+
–
1
answer
5
UGC NET CSE | January 2017 | Part 3 | Question: 65
A t-error correcting q-nary linear code satisfy : $M\sum_{i=0}^{t}(\frac{n}{i})(q-1)^{i}\leq X$ Where M is the number of code words and X is $q^{n}$ $q ^{t}$ $q^{-n}$ $q^{-t}$
A t-error correcting q-nary linear code satisfy :$M\sum_{i=0}^{t}(\frac{n}{i})(q-1)^{i}\leq X$Where M is the number of code words and X is$q^{n}$$q ^{t}$$q^{-n}$$q^{-t}$
404
views
answered
Nov 1, 2017
Others
ugcnetcse-jan2017-paper3
binary-codes
+
–
2
answers
6
UGC NET CSE | June 2014 | Part 3 | Question: 40
The advantage of _______ is that it can reference memory without paying the price of having a full memory address in the instruction. Direct addressing Indexed addressing Register addressing Register Indirect addressing
The advantage of _______ is that it can reference memory without paying the price of having a full memory address in the instruction. Direct addressingIndexed addressingR...
2.1k
views
answered
Oct 10, 2017
CO and Architecture
ugcnetjune2014iii
co-and-architecture
addressing-modes
+
–
1
answer
7
GATE CSE 1989 | Question: 4-xiv
For secondary key processing which of the following file organizations is preferred? Give a one line justification: Indexed sequential file organization. Two-way linked list. Inverted file organization. Sequential file organization.
For secondary key processing which of the following file organizations is preferred? Give a one line justification:Indexed sequential file organization.Two-way linked lis...
7.1k
views
answered
Oct 4, 2017
Databases
gate1989
normal
databases
indexing
descriptive
+
–
4
answers
8
GATE IT 2005 | Question: 21
Consider the entities 'hotel room', and 'person' with a many to many relationship 'lodging' as shown below: If we wish to store information about the rent payment to be made by person (s) occupying different hotel rooms, then this information should appear as an attribute of Person Hotel Room Lodging None of these
Consider the entities 'hotel room', and 'person' with a many to many relationship 'lodging' as shown below:If we wish to store information about the rent payment to be ma...
10.5k
views
answered
Sep 26, 2017
Databases
gateit-2005
databases
er-diagram
easy
+
–
1
answer
9
UGC NET CSE | August 2016 | Part 3 | Question: 19
Match the following with reference to Functional programming history : ... $\text{a-iii, b-ii, c-iv, d-i}$ $\text{a-ii, b-i, c-iv, d-iii}$
Match the following with reference to Functional programming history :$\begin{array}{clcl} \text{a.} & \text{Lambda calculus} & \text{i.} & \text{Church, 1932} \\ \text{...
567
views
answered
Sep 15, 2017
Programming in C
ugcnetcse-aug2016-paper3
programming
+
–
1
answer
10
GATE CSE 1988 | Question: 1iv
If the total number of states in the fetching and execution phases of an $8085$ instruction is known to be $7,$ number of states in these machine cycles is divided as ________
If the total number of states in the fetching and execution phases of an $8085$ instruction is known to be $7,$ number of states in these machine cycles is divided as ___...
765
views
answered
Aug 30, 2017
Others
gate1988
8085-microprocessor
microprocessors
numerical-answers
out-of-gate-syllabus
+
–
2
answers
11
UGC NET CSE | January 2017 | Part 3 | Question: 57
In Artificial Intelligence(AI), what is present in the planning graph? Sequence of levels Literals Variables Heuristic estimates
In Artificial Intelligence(AI), what is present in the planning graph?Sequence of levels LiteralsVariablesHeuristic estimates
1.1k
views
answered
Jul 25, 2017
Others
ugcnetcse-jan2017-paper3
non-gate
+
–
0
answers
12
Wireless LAN
A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for sending data that originally required a 20-MHz bandwidth
A wireless LAN using DSSS with _______-bit chip code needs 320 MHz for sending data that originally required a 20-MHz bandwidth
223
views
asked
Jul 20, 2017
Computer Networks
wireless-lan
+
–
0
answers
13
Wireless LAN
A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending data that originally required a _______-MHz bandwidth.
A wireless LAN using DSSS with a 4-bit chip code needs 10 MHz for sending data that originally required a _______-MHz bandwidth.
259
views
asked
Jul 20, 2017
Computer Networks
wireless-lan
+
–
0
answers
14
Wireless LAN
A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz.
A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz, the spread spectrum is _______ MHz.
131
views
asked
Jul 20, 2017
Computer Networks
computer-networks
+
–
1
answer
15
Wireless LAN
An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the original signal is 250 MHz, and there are ______ hops per cycle
An FHSS wireless LAN has a spread spectrum of 1 GHz. The bandwidth of the original signal is 250 MHz, and there are ______ hops per cycle
266
views
asked
Jul 20, 2017
Computer Networks
computer-networks
+
–
1
answer
16
Wireless LAN
A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequency of the system is _______ GHz A) 1.0 B) 2.0 C) 2.1 D) 3.0
A wireless LAN using FHSS hops 10 times per cycle. If the bandwidth of the original signal is 10 MHz and 2 GHz is the lowest frequency, the highest frequency of the syste...
453
views
asked
Jul 20, 2017
2
answers
17
UGC NET CSE | December 2014 | Part 3 | Question: 02
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate Internal interrupts External interrupts Software interrupts None of the above
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriateInternal interruptsExternal interruptsSoftware interruptsNone of ...
2.2k
views
answered
Jul 11, 2017
Operating System
ugcnetcse-dec2014-paper3
operating-system
interrupts
+
–
3
answers
18
Non vectored interrupts
http://superuser.com/questions/414290/when-a-non-vectored-interrupt-occurs-does-the-processor-ever-look-up-the-vector In a non-vectored interrupt, the peripheral itself provides the address of the interrupt service routine directly to the processor. This ... since the address must be retrieved from the interrupting device every time the interrupt is triggered. S ans is B??
http://superuser.com/questions/414290/when-a-non-vectored-interrupt-occurs-does-the-processor-ever-look-up-the-vectorIn a non-vectored interrupt, the peripheral itself pr...
3.8k
views
answered
Jul 11, 2017
Operating System
operating-system
test-series
+
–
1
answer
19
Ace Test Series: Algorithms - Sorting
707
views
answered
Jul 11, 2017
Algorithms
ace-test-series
algorithms
sorting
+
–
2
answers
20
Ace Test Series: Databases - B Tree
When would you want to use a B-tree instead of B+ Tree? 1. When sequential access to key values is never required. 2. When sequential access to key values is required. 3. When both Direct and sequential access is required. 4. When Direct access is required without sequential access.
When would you want to use a B-tree instead of B+ Tree?1. When sequential access to key values is never required.2. When sequential access to key values is required.3. Wh...
2.8k
views
answered
Jul 10, 2017
Databases
ace-test-series
databases
b-tree
+
–
1
answer
21
computer networks
Station A needs to send a message consisting of 10 packets to station B using a sliding window of size 4. All packets are ready and can be transferred immediately. Selective repeat and GBN are used at 2 different times and every 5th packet get lost for both protocols. (ACK's from B never ... ensure safe delivery to B. Then x+y = ? Ans given=31...........but i got 38(x=12 and y=26)
Station A needs to send a message consisting of 10 packets to station B using a sliding window of size 4. All packets are ready and can be transferred immediately. Select...
607
views
commented
Jul 7, 2017
1
answer
22
Local Area Network
1.1k
views
answered
Jul 6, 2017
Computer Networks
computer-networks
lan-technologies
+
–
3
answers
23
UGC NET CSE | January 2017 | Part 3 | Question: 18
Consider a line $AB$ with $A=(0,0)$ and $B=(8,4)$. Apply a simple $DDA$ algorithm and compute the first four plots on this line. $[(0,0),(1,1),(2,1),(3,2)]$ $[(0,0),(1,1.5),(2,2),(3,3)]$ $[(0,0),(1,1),(2,2.5),(3,3)]$ $[(0,0),(1,2),(2,2),(3,2)]$
Consider a line $AB$ with $A=(0,0)$ and $B=(8,4)$. Apply a simple $DDA$ algorithm and compute the first four plots on this line.$[(0,0),(1,1),(2,1),(3,2)]$$[(0,0),(1,1.5)...
2.7k
views
answered
Jul 5, 2017
Computer Graphics
ugcnetcse-jan2017-paper3
non-gate
computer-graphics
+
–
3
answers
24
UGC NET CSE | June 2012 | Part 2 | Question: 16
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM? Space division Time division Virtual Packet
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM?Space divisionTime divisionVirtualPacket
4.3k
views
answered
Jun 30, 2017
Computer Networks
ugcnetcse-june2012-paper2
computer-networks
network-switching
+
–
4
answers
25
GATE CSE 2006 | Question: 5
For which one of the following reasons does internet protocol(IP) use the time-to-live(TTL) field in IP datagram header? Ensure packets reach destination within that time Discard packets that reach later than that time Prevent packets from looping indefinitely Limit the time for which a packet gets queued in intermediate routers
For which one of the following reasons does internet protocol(IP) use the time-to-live(TTL) field in IP datagram header?Ensure packets reach destination within that timeD...
11.3k
views
answered
Jun 17, 2017
Computer Networks
gatecse-2006
computer-networks
ip-addressing
ip-packet
easy
+
–
1
answer
26
How much bandwidth is required to send 132 voice-grade channels by FDM on an international satellite system
How much bandwidth is required to send 132 voice-grade channels by FDM on an international satellite system?500 MHz10 MHz1320 MHz50 MHz
2.3k
views
answered
Jun 13, 2017
2
answers
27
UGC NET CSE | December 2010 | Part 2 | Question: 26
Frequency shift keying is used mostly in Radio transmission Telegraphy Telephone None of the above
Frequency shift keying is used mostly inRadio transmissionTelegraphyTelephoneNone of the above
2.3k
views
answered
Jun 12, 2017
Computer Networks
ugcnetcse-dec2010-paper2
computer-networks
transmission-media
+
–
5
answers
28
GATE IT 2004 | Question: 81
In a sliding window $ARQ$ scheme, the transmitter's window size is $N$ and the receiver's window size is $M$. The minimum number of distinct sequence numbers required to ensure correct operation of the $ARQ$ scheme is $\min (M, N)$ $\max (M, N)$ $M + N$ $MN$
In a sliding window $ARQ$ scheme, the transmitter's window size is $N$ and the receiver's window size is $M$. The minimum number of distinct sequence numbers required to ...
10.4k
views
commented
Jun 5, 2017
Computer Networks
gateit-2004
computer-networks
sliding-window
normal
+
–
1
answer
29
Kurose Ross 6th Edition PN 746 R32
R32. Why must an application gateway work in conjunction with a router filter to be effective?
R32. Why must an application gateway work in conjunction with a router filter to be effective?
530
views
answered
Jun 2, 2017
Computer Networks
network-security
computer-networks
+
–
6
answers
30
GATE CSE 2003 | Question: 83
A $2$ $km$ long broadcast LAN has $10^7$ bps bandwidth and uses CSMA/CD. The signal travels along the wire at $2 \times 10^8$ m/s. What is the minimum packet size that can be used on this network? $50$ $\text{bytes}$ $100$ $\text{bytes}$ $200$ $\text{bytes}$ None of the above
A $2$ $km$ long broadcast LAN has $10^7$ bps bandwidth and uses CSMA/CD. The signal travels along the wire at $2 \times 10^8$ m/s. What is the minimum packet size that ca...
13.4k
views
answered
Jun 1, 2017
Computer Networks
gatecse-2003
computer-networks
lan-technologies
normal
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register