Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by Ollie
3
answers
1
NIELIT 2017 DEC Scientific Assistant A - Section B: 57
Starvation can be avoided by which of the following statements: By using shortest job first resource allocation policy . By using first come first serve resources allocation policy. (i) only (i) and (ii) only (ii) only None of the options
Starvation can be avoided by which of the following statements:By using shortest job first resource allocation policy .By using first come first serve resources allocatio...
2.3k
views
answer edited
May 28, 2021
Operating System
nielit2017dec-assistanta
operating-system
process-scheduling
+
–
7
answers
2
GATE CSE 2018 | Question: 26
Consider a matrix P whose only eigenvectors are the multiples of $\begin{bmatrix} 1 \\ 4 \end{bmatrix}$. Consider the following statements. P does not have an inverse P has a repeated eigenvalue P cannot be diagonalized Which one of the ... III are necessarily true Only II is necessarily true Only I and II are necessarily true Only II and III are necessarily true
Consider a matrix P whose only eigenvectors are the multiples of $\begin{bmatrix} 1 \\ 4 \end{bmatrix}$.Consider the following statements.P does not have an inverseP has ...
27.8k
views
comment edited
Aug 13, 2020
Linear Algebra
gatecse-2018
linear-algebra
matrix
eigen-value
normal
2-marks
+
–
9
answers
3
GATE CSE 2003 | Question: 34
$m$ identical balls are to be placed in $n$ distinct bags. You are given that $m \geq kn$, where $k$ is a natural number $\geq 1$. In how many ways can the balls be placed in the bags if each bag must contain at least $k$ ... $\left( \begin{array}{c} m - kn + n + k - 2 \\ n - k \end{array} \right)$
$m$ identical balls are to be placed in $n$ distinct bags. You are given that $m \geq kn$, where $k$ is a natural number $\geq 1$. In how many ways can the balls be place...
11.5k
views
comment edited
Aug 7, 2020
Combinatory
gatecse-2003
combinatory
balls-in-bins
normal
+
–
4
answers
4
GATE CSE 1998 | Question: 10b
Let $R$ be a binary relation on $A = \{a, b, c, d, e, f, g, h\}$ represented by the following two component digraph. Find the smallest integers $m$ and $n$ such that $m < n$ and $R^m = R^n$.
Let $R$ be a binary relation on $A = \{a, b, c, d, e, f, g, h\}$ represented by the following two component digraph. Find the smallest integers $m$ and $n$ such that $m <...
4.4k
views
commented
Aug 5, 2020
Set Theory & Algebra
gate1998
descriptive
set-theory&algebra
relations
+
–
1
answer
5
ISRO-2013-67
Which of the following types of coupling has the weakest coupling? Pathological coupling Control coupling Data coupling Message coupling
Which of the following types of coupling has the weakest coupling?Pathological couplingControl couplingData couplingMessage coupling
4.2k
views
commented
Jul 15, 2020
IS&Software Engineering
isro2013
is&software-engineering
software-coupling
non-gate
+
–
5
answers
6
ISRO-2013-18
How many check bits are required for $16$ bit data word to detect $2$ bit errors and single bit correction using hamming code? $5$ $6$ $7$ $8$
How many check bits are required for $16$ bit data word to detect $2$ bit errors and single bit correction using hamming code?$5$$6$$7$$8$
10.0k
views
commented
Jul 14, 2020
Computer Networks
isro2013
error-detection
+
–
1
answer
7
ISRO-DEC2017-76
Which of the following set of components is sufficient to implement any arbitrary Boolean function? $XOR$ gates, $NOT$ gates $AND$ gates, $XOR$ gates and $1$ $2$ to $1$ multiplexer Three input gates that output $(A.B)+C$ for the inputs $A, B, C$
Which of the following set of components is sufficient to implement any arbitrary Boolean function?$XOR$ gates, $NOT$ gates$AND$ gates, $XOR$ gates and $1$$2$ to $1$ mult...
2.4k
views
commented
Jul 5, 2020
Digital Logic
isrodec2017
functional-completeness
digital-logic
+
–
2
answers
8
ISRO2018-73
For a multi-processor architecture, in which protocol a write transaction is forwarded to only those processors that are known to possess a copy of newly altered cache line? Snoopy bus protocol Cache coherency protocol Directory based protocol None of the above
For a multi-processor architecture, in which protocol a write transaction is forwarded to only those processors that are known to possess a copy of newly altered cache li...
4.2k
views
commented
Jul 3, 2020
CO and Architecture
isro2018
cache-memory
+
–
2
answers
9
ISRO2018-1
Consider the following program { int x=1; printf("%d",(*char(char*)&x)); } Assuming required header files are included and if the machine in which this program is executed is little endian, then the output will be 0 99999999 1 unpredictable
Consider the following program{ int x=1; printf("%d",(*char(char*)&x)); }Assuming required header files are included and if the machine in which this program is executed ...
8.6k
views
commented
Jul 2, 2020
Programming in C
isro2018
programming
output
+
–
2
answers
10
NIELIT 2017 DEC Scientist B - Section B: 31
Consider a complete binary tree where the left and the right sub trees of the root are max-heaps. The lower bound for the number of operations to convert the tree to a heap is: $\Omega(\log n)$ $\Omega(n\log n)$ $\Omega(n)$ $\Omega(n^2)$
Consider a complete binary tree where the left and the right sub trees of the root are max-heaps. The lower bound for the number of operations to convert the tree to a he...
1.1k
views
commented
Jun 15, 2020
DS
nielit2017dec-scientistb
data-structures
binary-tree
binary-heap
+
–
3
answers
11
NIELIT 2017 DEC Scientist B - Section B: 28
A RAM chip has $7$ address lines, $8$ data lines and $2$ chips select lines. Then the number of memory locations is __________ $2^{12}$ $2^{10}$ $2^{19}$ $2^{13}$
A RAM chip has $7$ address lines, $8$ data lines and $2$ chips select lines. Then the number of memory locations is __________$2^{12}$$2^{10}$$2^{19}$$2^{13}$
1.9k
views
commented
Jun 15, 2020
CO and Architecture
nielit2017dec-scientistb
co-and-architecture
memory-interfacing
+
–
3
answers
12
NIELIT 2017 DEC Scientist B - Section B: 14
We have $10$-stage pipeline, where the branch target conditions are resolved at stage $5$. How many stalls are there for an incorrectly predicted branch? $5$ $6$ $7$ $4$
We have $10$-stage pipeline, where the branch target conditions are resolved at stage $5$. How many stalls are there for an incorrectly predicted branch?$5$$6$$7$$4$
2.0k
views
commented
Jun 15, 2020
CO and Architecture
nielit2017dec-scientistb
co-and-architecture
pipelining
+
–
3
answers
13
NIELIT 2017 DEC Scientist B - Section B: 8
Let $A$ be an array of $31$ numbers consisting of a sequence of $0$’s followed by a sequence of $1$’s. The problem is to find the smallest index $i$ such that $A[i]$ is $1$ by probing the minimum number of locations in $A$. The worst case number of probes performed by an optimal algorithm is $2$ $4$ $3$ $5$
Let $A$ be an array of $31$ numbers consisting of a sequence of $0$’s followed by a sequence of $1$’s. The problem is to find the smallest index $i$ such that $A[i]$ ...
1.1k
views
commented
Jun 15, 2020
Algorithms
nielit2017dec-scientistb
algorithms
searching
array
+
–
1
answer
14
NIELIT 2017 July Scientist B (CS) - Section B: 50
Match the problem domains in $\text{GROUP I}$ with the solution technologies in $\text{GROUP II}$ ... $P-3,Q-4,R-2,S-1$ $P-3,Q-1,R-4,S-2$ $P-4,Q-3,R-2,S-1$
Match the problem domains in $\text{GROUP I}$ with the solution technologies in $\text{GROUP II}$$$\begin{array}{llll} & \textbf{GROUP I}& {}& \textbf{GROUP II}\\ \text{(...
967
views
commented
Jun 15, 2020
Web Technologies
nielit2017july-scientistb-cs
non-gate
web-technologies
+
–
2
answers
15
NIELIT 2017 July Scientist B (IT) - Section B: 40
Give the output #include<iostream> using namespace std; class Base1{ public: ~Base1() {cout<<"Base1's destructor"<<endl;} }; class Base2 { public: ~Base2(){cout<<"Base2's ... 's Destructor Derived's Destructor Base$2$'s destructor Base$1$'s destructor Derived's Destructor Compiler Dependent
Give the output #include<iostream using namespace std; class Base1{ public: ~Base1() {cout<<"Base1's destructor"<<endl;} }; class Base2 { public: ~Base2(){cout<<"Base2's ...
1.8k
views
commented
Jun 10, 2020
Object Oriented Programming
nielit2017july-scientistb-it
non-gate
object-oriented-programming
+
–
1
answer
16
NIELIT 2017 July Scientist B (IT) - Section B: 36
Assume that size of an integer is $32$ bit. What is the output of following ANSI C program? #include<stdio.h> struct st { int x; static int y; }; int main() { printf(%d",sizeof(struct st)); return 0; } $4$ $8$ Compiler Error Runtime Error
Assume that size of an integer is $32$ bit. What is the output of following ANSI C program? #include<stdio.h struct st { int x; static int y; }; int main() { printf(%d",s...
2.2k
views
comment edited
Jun 10, 2020
Programming in C
nielit2017july-scientistb-it
programming-in-c
output
+
–
3
answers
17
NIELIT 2016 DEC Scientist B (CS) - Section B: 6
Which of the following is wrong? Turing machine is a simple mathematical model of general purpose computer Turing machine is more powerful than finite automata Turing Machine can be simulated by a general purpose computer All of these
Which of the following is wrong?Turing machine is a simple mathematical model of general purpose computerTuring machine is more powerful than finite automataTuring Machin...
9.7k
views
comment edited
Jun 10, 2020
Theory of Computation
nielit2016dec-scientistb-cs
theory-of-computation
turing-machine
+
–
1
answer
18
NIELIT 2017 July Scientist B (IT) - Section B: 30
Consider the HTML table definition given below: <table border=1> <tr> <td rowspan=2>ab</td> <td colspan=2>cd</td> </tr> <tr> <td>ef</td> <td rowspan=2>gh</td> </tr> <tr><td colspan=2>ik</ ... $(2,2,3)$ $(2,3,2)$ and $(2,3,2)$ $(2,3,2)$ and $(2,2,3)$
Consider the HTML table definition given below:<table border=1 <tr <td rowspan=2>ab</td <td colspan=2>cd</td </tr <tr <td>ef</td <td rowspan=2>gh</td </tr <tr><td colspan...
874
views
answered
Jun 10, 2020
Web Technologies
nielit2017july-scientistb-it
non-gate
web-technologies
+
–
2
answers
19
NIELIT 2017 July Scientist B (IT) - Section B: 29
HTML(Hypertext Markup language) has language elements which permit certain actions other than describing the structure of the web document. Which of the following actions is NOT supported by pure HTML(without any server or client side ... interval. Automatically redirect to another page upon download. Display the client time as part of the page.
HTML(Hypertext Markup language) has language elements which permit certain actions other than describing the structure of the web document. Which of the following actions...
1.2k
views
answered
Jun 10, 2020
Web Technologies
nielit2017july-scientistb-it
non-gate
web-technologies
+
–
1
answer
20
NIELIT 2017 July Scientist B (IT) - Section B: 27
The Function Points(FP) calculated for software projects are often used to obtain an estimate of Lines of Code(LOC) required for that project. Which of the following statements is FALSE in this context? The relationship between FP and LOC depends ... 1.6 times the functionality of a single LOC of FORTRAN. FP and LOC are not related to each other.
The Function Points(FP) calculated for software projects are often used to obtain an estimate of Lines of Code(LOC) required for that project. Which of the following stat...
1.1k
views
answered
Jun 10, 2020
IS&Software Engineering
nielit2017july-scientistb-it
non-gate
is&software-engineering
function-point-metric
+
–
1
answer
21
NIELIT 2017 July Scientist B (IT) - Section B: 25
Which of the following statements are TRUE? The context diagram should depict the system as a single bubble. External entities should be identified clearly at all levels of DFDs. Control information should not be represented in a DFD. A data store can be ... to another data store or to an external entity. II and IV II and III I and III I,II and III
Which of the following statements are TRUE? The context diagram should depict the system as a single bubble.External entities should be identified clearly at all levels o...
985
views
answered
Jun 10, 2020
IS&Software Engineering
nielit2017july-scientistb-it
non-gate
is&software-engineering
+
–
1
answer
22
NIELIT 2016 DEC Scientist B (CS) - Section B: 60
The sequence of operation in which PCM is done is Sampling, quantizing, encoding Quantizing, sampling, encoding Quantizing, encoding, sampling None of the above
The sequence of operation in which PCM is done is Sampling, quantizing, encodingQuantizing, sampling, encodingQuantizing, encoding, samplingNone of the above
5.3k
views
answered
Jun 10, 2020
Digital Signal Processing
nielit2016dec-scientistb-cs
non-gate
+
–
2
answers
23
NIELIT 2016 DEC Scientist B (CS) - Section B: 52
The concept of order Big O is important because It can be used to decide the best algorithm that solves a given problem It is the lower bound of the growth rate of algorithm It determines the maximum size of a problem that can be solved in a given amount of time Both (A) and (B)
The concept of order Big O is important becauseIt can be used to decide the best algorithm that solves a given problemIt is the lower bound of the growth rate of algorith...
2.0k
views
answered
Jun 10, 2020
Algorithms
nielit2016dec-scientistb-cs
algorithms
time-complexity
+
–
1
answer
24
NIELIT 2016 DEC Scientist B (CS) - Section B: 41
The IETF standard documents are called: RFC RCF ID none of the above
The IETF standard documents are called:RFCRCFIDnone of the above
450
views
answered
Jun 10, 2020
Digital Signal Processing
nielit2016dec-scientistb-cs
non-gate
+
–
1
answer
25
NIELIT 2016 DEC Scientist B (CS) - Section B: 36
The graph that shows basic blocks and their successor relationship is called: DAG Control graph Flow graph Hamiltonian graph
The graph that shows basic blocks and their successor relationship is called:DAGControl graphFlow graphHamiltonian graph
1.7k
views
answered
Jun 10, 2020
Compiler Design
nielit2016dec-scientistb-cs
compiler-design
directed-acyclic-graph
+
–
1
answer
26
NIELIT 2016 DEC Scientist B (CS) - Section B: 30
The IOS class member function used for formatting IO is width(), precision(), read() width(), precision(), setf() getch(), width(), Io() unsetf() ,setf(), write()
The IOS class member function used for formatting IO iswidth(), precision(), read()width(), precision(), setf()getch(), width(), Io()unsetf() ,setf(), write()
1.4k
views
answered
Jun 10, 2020
Object Oriented Programming
nielit2016dec-scientistb-cs
non-gate
object-oriented-programming
+
–
2
answers
27
NIELIT 2016 MAR Scientist B - Section B: 1
The number of ways to cut a six sided convex polygon whose vertices are labeled into four triangles using diagonal lines that do not cross is $13$ $14$ $12$ $11$
The number of ways to cut a six sided convex polygon whose vertices are labeled into four triangles using diagonal lines that do not cross is$13$$14$$12$$11$
2.1k
views
answered
Jun 9, 2020
Graph Theory
nielit2016mar-scientistb
discrete-mathematics
graph-theory
+
–
1
answer
28
NIELIT 2016 MAR Scientist B - Section C: 52
Which of the following is possible in a token passing bus network? in-service expansion. unlimited number of stations. both (A) and (B). unlimited distance.
Which of the following is possible in a token passing bus network?in-service expansion.unlimited number of stations.both (A) and (B).unlimited distance.
645
views
answered
Jun 8, 2020
Information Theory
nielit2016mar-scientistb
non-gate
+
–
1
answer
29
NIELIT 2016 MAR Scientist B - Section C: 49
The extent to which the software can control to operate correctly despite the introduction of invalid input is called as reliability robustness fault tolerance portability
The extent to which the software can control to operate correctly despite the introduction of invalid input is called asreliabilityrobustnessfault toleranceportability
876
views
answered
Jun 8, 2020
IS&Software Engineering
nielit2016mar-scientistb
non-gate
is&software-engineering
+
–
1
answer
30
NIELIT 2016 MAR Scientist B - Section C: 48
The shell accepts command from the user maintains directories of files translates the keyboard’s character codes none of these
The shellaccepts command from the usermaintains directories of filestranslates the keyboard’s character codesnone of these
597
views
answered
Jun 8, 2020
Computer Peripherals
nielit2016mar-scientistb
non-gate
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register