Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by Neeraj7375
0
votes
1
data link layer
is fragmentation possible in data link layer??
is fragmentation possible in data link layer??
313
views
answered
May 17, 2018
1
votes
2
DBMS :- Referential integrity constraints
select the correct statement from the following on referential integrity Select one: a. referential integrity constraints check whether the primary key, values are unique b. referential integrity constraints check whether an ... two relations in a schema d. referential integrity constraints are specified between entities having recursive relationship
select the correct statement from the following on referential integritySelect one:a. referential integrity constraints check whether the primary key, values are uniqueb....
9.6k
views
answered
May 17, 2018
Databases
databases
referential-integrity
relations
+
–
1
votes
3
Virtual gate
A B+ tree of order d is a tree in which each internal node has between d and 2d keys values. The root has between 1 and 2d values. What is the maximum number of internal nodes in a B+ tree of order 4 with 52 leaves.
A B+ tree of order d is a tree in which each internal node has between d and 2d keys values. The root has between 1 and 2d values. What is the maximum number of internal ...
245
views
answered
Jan 19, 2018
0
votes
4
UGC NET CSE | January 2017 | Part 3 | Question: 65
A t-error correcting q-nary linear code satisfy : $M\sum_{i=0}^{t}(\frac{n}{i})(q-1)^{i}\leq X$ Where M is the number of code words and X is $q^{n}$ $q ^{t}$ $q^{-n}$ $q^{-t}$
A t-error correcting q-nary linear code satisfy :$M\sum_{i=0}^{t}(\frac{n}{i})(q-1)^{i}\leq X$Where M is the number of code words and X is$q^{n}$$q ^{t}$$q^{-n}$$q^{-t}$
439
views
answered
Nov 1, 2017
Others
ugcnetcse-jan2017-paper3
binary-codes
+
–
0
votes
5
UGC NET CSE | June 2014 | Part 3 | Question: 40
The advantage of _______ is that it can reference memory without paying the price of having a full memory address in the instruction. Direct addressing Indexed addressing Register addressing Register Indirect addressing
The advantage of _______ is that it can reference memory without paying the price of having a full memory address in the instruction. Direct addressingIndexed addressingR...
2.2k
views
answered
Oct 10, 2017
CO and Architecture
ugcnetjune2014iii
co-and-architecture
addressing-modes
+
–
4
votes
6
GATE CSE 1989 | Question: 4-xiv
For secondary key processing which of the following file organizations is preferred? Give a one line justification: Indexed sequential file organization. Two-way linked list. Inverted file organization. Sequential file organization.
For secondary key processing which of the following file organizations is preferred? Give a one line justification:Indexed sequential file organization.Two-way linked lis...
7.3k
views
answered
Oct 4, 2017
Databases
gate1989
normal
databases
indexing
descriptive
+
–
35
votes
7
GATE IT 2005 | Question: 21
Consider the entities 'hotel room', and 'person' with a many to many relationship 'lodging' as shown below: If we wish to store information about the rent payment to be made by person (s) occupying different hotel rooms, then this information should appear as an attribute of Person Hotel Room Lodging None of these
Consider the entities 'hotel room', and 'person' with a many to many relationship 'lodging' as shown below:If we wish to store information about the rent payment to be ma...
10.7k
views
answered
Sep 26, 2017
Databases
gateit-2005
databases
er-diagram
easy
+
–
0
votes
8
UGC NET CSE | August 2016 | Part 3 | Question: 19
Match the following with reference to Functional programming history : ... $\text{a-iii, b-ii, c-iv, d-i}$ $\text{a-ii, b-i, c-iv, d-iii}$
Match the following with reference to Functional programming history :$\begin{array}{clcl} \text{a.} & \text{Lambda calculus} & \text{i.} & \text{Church, 1932} \\ \text{...
581
views
answered
Sep 15, 2017
Programming in C
ugcnetcse-aug2016-paper3
programming
+
–
0
votes
9
GATE CSE 1988 | Question: 1iv
If the total number of states in the fetching and execution phases of an $8085$ instruction is known to be $7,$ number of states in these machine cycles is divided as ________
If the total number of states in the fetching and execution phases of an $8085$ instruction is known to be $7,$ number of states in these machine cycles is divided as ___...
787
views
answered
Aug 30, 2017
Others
gate1988
8085-microprocessor
microprocessors
numerical-answers
out-of-gate-syllabus
+
–
2
votes
10
UGC NET CSE | January 2017 | Part 3 | Question: 57
In Artificial Intelligence(AI), what is present in the planning graph? Sequence of levels Literals Variables Heuristic estimates
In Artificial Intelligence(AI), what is present in the planning graph?Sequence of levels LiteralsVariablesHeuristic estimates
1.2k
views
answered
Jul 25, 2017
Others
ugcnetcse-jan2017-paper3
non-gate
+
–
0
votes
11
UGC NET CSE | December 2014 | Part 3 | Question: 02
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate Internal interrupts External interrupts Software interrupts None of the above
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriateInternal interruptsExternal interruptsSoftware interruptsNone of ...
2.2k
views
answered
Jul 11, 2017
Operating System
ugcnetcse-dec2014-paper3
operating-system
interrupts
+
–
0
votes
12
Non vectored interrupts
http://superuser.com/questions/414290/when-a-non-vectored-interrupt-occurs-does-the-processor-ever-look-up-the-vector In a non-vectored interrupt, the peripheral itself provides the address of the interrupt service routine directly to the processor. This ... since the address must be retrieved from the interrupting device every time the interrupt is triggered. S ans is B??
http://superuser.com/questions/414290/when-a-non-vectored-interrupt-occurs-does-the-processor-ever-look-up-the-vectorIn a non-vectored interrupt, the peripheral itself pr...
3.9k
views
answered
Jul 11, 2017
Operating System
operating-system
test-series
+
–
0
votes
13
Ace Test Series: Algorithms - Sorting
731
views
answered
Jul 11, 2017
Algorithms
ace-test-series
algorithms
sorting
+
–
5
votes
14
Ace Test Series: Databases - B Tree
When would you want to use a B-tree instead of B+ Tree? 1. When sequential access to key values is never required. 2. When sequential access to key values is required. 3. When both Direct and sequential access is required. 4. When Direct access is required without sequential access.
When would you want to use a B-tree instead of B+ Tree?1. When sequential access to key values is never required.2. When sequential access to key values is required.3. Wh...
2.9k
views
answered
Jul 10, 2017
Databases
ace-test-series
databases
b-tree
+
–
2
votes
15
Local Area Network
1.1k
views
answered
Jul 6, 2017
Computer Networks
computer-networks
lan-technologies
+
–
3
votes
16
UGC NET CSE | January 2017 | Part 3 | Question: 18
Consider a line $AB$ with $A=(0,0)$ and $B=(8,4)$. Apply a simple $DDA$ algorithm and compute the first four plots on this line. $[(0,0),(1,1),(2,1),(3,2)]$ $[(0,0),(1,1.5),(2,2),(3,3)]$ $[(0,0),(1,1),(2,2.5),(3,3)]$ $[(0,0),(1,2),(2,2),(3,2)]$
Consider a line $AB$ with $A=(0,0)$ and $B=(8,4)$. Apply a simple $DDA$ algorithm and compute the first four plots on this line.$[(0,0),(1,1),(2,1),(3,2)]$$[(0,0),(1,1.5)...
2.8k
views
answered
Jul 5, 2017
Computer Graphics
ugcnetcse-jan2017-paper3
non-gate
computer-graphics
+
–
1
votes
17
UGC NET CSE | June 2012 | Part 2 | Question: 16
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM? Space division Time division Virtual Packet
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM?Space divisionTime divisionVirtualPacket
4.4k
views
answered
Jun 30, 2017
Computer Networks
ugcnetcse-june2012-paper2
computer-networks
network-switching
+
–
7
votes
18
GATE CSE 2006 | Question: 5
For which one of the following reasons does internet protocol(IP) use the time-to-live(TTL) field in IP datagram header? Ensure packets reach destination within that time Discard packets that reach later than that time Prevent packets from looping indefinitely Limit the time for which a packet gets queued in intermediate routers
For which one of the following reasons does internet protocol(IP) use the time-to-live(TTL) field in IP datagram header?Ensure packets reach destination within that timeD...
11.4k
views
answered
Jun 17, 2017
Computer Networks
gatecse-2006
computer-networks
ip-addressing
ip-packet
easy
+
–
1
votes
19
How much bandwidth is required to send 132 voice-grade channels by FDM on an international satellite system
How much bandwidth is required to send 132 voice-grade channels by FDM on an international satellite system?500 MHz10 MHz1320 MHz50 MHz
2.4k
views
answered
Jun 13, 2017
0
votes
20
UGC NET CSE | December 2010 | Part 2 | Question: 26
Frequency shift keying is used mostly in Radio transmission Telegraphy Telephone None of the above
Frequency shift keying is used mostly inRadio transmissionTelegraphyTelephoneNone of the above
2.3k
views
answered
Jun 12, 2017
Computer Networks
ugcnetcse-dec2010-paper2
computer-networks
transmission-media
+
–
0
votes
21
Kurose Ross 6th Edition PN 746 R32
R32. Why must an application gateway work in conjunction with a router filter to be effective?
R32. Why must an application gateway work in conjunction with a router filter to be effective?
544
views
answered
Jun 2, 2017
Computer Networks
network-security
computer-networks
+
–
6
votes
22
GATE CSE 2003 | Question: 83
A $2$ $km$ long broadcast LAN has $10^7$ bps bandwidth and uses CSMA/CD. The signal travels along the wire at $2 \times 10^8$ m/s. What is the minimum packet size that can be used on this network? $50$ $\text{bytes}$ $100$ $\text{bytes}$ $200$ $\text{bytes}$ None of the above
A $2$ $km$ long broadcast LAN has $10^7$ bps bandwidth and uses CSMA/CD. The signal travels along the wire at $2 \times 10^8$ m/s. What is the minimum packet size that ca...
13.8k
views
answered
Jun 1, 2017
Computer Networks
gatecse-2003
computer-networks
lan-technologies
normal
+
–
4
votes
23
GATE CSE 2003 | Question: 28
Which of the following functionality must be implemented by a transport protocol over and above the network protocol? Recovery from packet losses Detection of duplicate packets Packet delivery in the correct order End to end connectivity
Which of the following functionality must be implemented by a transport protocol over and above the network protocol?Recovery from packet lossesDetection of duplicate pac...
14.3k
views
answered
Jun 1, 2017
Computer Networks
gatecse-2003
computer-networks
network-layering
easy
+
–
0
votes
24
computer networks
A high quality speech signal has a bandwidth of 8khz.suppose that the speech signal is to quantized and then transmitted over a 28.8kbps modem. What is the signal to noise ratio(in DB) of the received signal? what modem sped is needed if we require an SNR of 40 db?
A high quality speech signal has a bandwidth of 8khz.suppose that the speech signal is to quantized and then transmitted over a 28.8kbps modem. What is the signal to nois...
1.4k
views
answered
May 12, 2017
0
votes
25
DBMS-Normalisation-Lossless Join Decomposition
1.2k
views
answered
Apr 15, 2017
Databases
databases
decomposition
database-normalization
lossless-join
+
–
0
votes
26
UGC NET CSE | January 2017 | Part 3 | Question: 3
The general configuration of the microprogrammed control unit is given below: What are blocks B and C in the diagram respectively? Block address register and cache memory Control address register and control memory Branch register and cache memory Control address register and random access memory
The general configuration of the microprogrammed control unit is given below:What are blocks B and C in the diagram respectively?Block address register and cache memoryC...
1.6k
views
answered
Mar 26, 2017
CO and Architecture
ugcnetcse-jan2017-paper3
co-and-architecture
control-unit
+
–
0
votes
27
Ace Test Series: Theory Of Computation - Closure Property
Match the following
Match the following
386
views
answered
Mar 4, 2017
Theory of Computation
ace-test-series
test-series
theory-of-computation
closure-property
+
–
0
votes
28
regular grammar
Consider the following regular expressions i) (a/b)* ii) (a*/b*)* iii) ((ε / a)b*)* Which of the following equal?
Consider the following regular expressionsi) (a/b)*ii) (a*/b*)*iii) ((ε / a)b*)*Which of the following equal?
315
views
answered
Mar 3, 2017
Theory of Computation
regular-language
theory-of-computation
+
–
1
votes
29
Broadcast address
Suppose a host with ip address 15.121.201.123 wants to send a packet to all hosts in the same network. What will be the destination address that it uses? (A) 15.255.255.255 (B) 15.0.0.0 (C) 15.1.1.1 (D) 255.255.255.255
Suppose a host with ip address 15.121.201.123 wants to send a packet to all hosts in the same network. What will be the destination address that it uses?(A) 15.255.255.25...
1.4k
views
answered
Jan 29, 2017
CO and Architecture
computer-networks
address
subnetting
+
–
1
votes
30
ACE test series
____________ uses entire capacity of link. (a)circuit switching (b)packet switching (c)both (d)none
____________ uses entire capacity of link.(a)circuit switching (b)packet switching(c)both (d)none
1.2k
views
answered
Jan 23, 2017
Computer Networks
ace-test-series
computer-networks
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register