1 votes
5
Does anyone has any online resource that contains good lectures on Basics of Wi-Fi and Network security? Thanks in advance .
0 votes
10
0 votes
11
0 votes
12
In a context sensitive grammer,1).number of grammar symbols on the left-hand side of a productioncan’t be greater than the number of non-terminals on the right-hand sid...
0 votes
13
An organization is granted the block 164.76.0.0/16. the admin wants to create 2048 subnets using 11 bits. What are the first and the last addresses in subnet 2048 ?
1 votes
14
What is the problem with discontinous mask?
0 votes
17
$A$ is a $2\times 2$ matrix with eigenvalues $2$ and $-3$. The eigenvalues of the matrix $A^2$ are?4,-9 2,-3 4,9 can not be determined from given d...
0 votes
18
Assume that array A and B are sorted, each contain 'N' element . What is the worst case time complexity to find the median of A ∪ B?a) O(log(N))b)O(N)c)O(Nlog(N))d)O(N2...
0 votes
23
0 votes
25
How many functions are there from the set {1, 2, . . . , n}, where n is a positive integer, to the set {0, 1}a) that assign 1 to exactly one of the positive integers les...