Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
__
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by __
0
votes
1
Test by Bikram | Databases | Test 2 | Question: 30
Consider the following set of relations: EMP (eno, ename , dno) DEPT (dno, dname) Primary key columns are underlined and dno in EMP is a foreign key referring primary key of DEPT table. Now, consider the following queries: QUERY: $1$ SELECT ... Query:1 and Query:2 returns different number of columns. I, II only III, IV only II, III only I, IV only
Consider the following set of relations: EMP (eno, ename , dno) DEPT (dno, dname)Primary key columns are underlined and dno in EMP is a foreign key referrin...
519
views
answered
Sep 6, 2017
Databases
tbb-dbms-2
databases
sql
+
–
–2
votes
2
GATE CSE 2017 Set 1 | Question: 22
Consider the language $L$ given by the regular expression $(a+b)^{*} b (a+b)$ over the alphabet $\{a,b\}$. The smallest number of states needed in a deterministic finite-state automaton (DFA) accepting $L$ is ___________ .
Consider the language $L$ given by the regular expression $(a+b)^{*} b (a+b)$ over the alphabet $\{a,b\}$. The smallest number of states needed in a deterministic finite-...
28.9k
views
answered
Feb 13, 2017
Theory of Computation
gatecse-2017-set1
theory-of-computation
finite-automata
numerical-answers
minimal-state-automata
+
–
0
votes
3
Network media
Shiva is working as a network engineer and recently he got an assignment to design a reliable but cheaper Ethernet connection between two offices. The Details are like this. Two buildings are just 150 meters apart. There can be frequent problems with volatge potential differences between two offices. ... STP b. coaxial c. Fiber optic I. a , b or c II. b or c III. b only IV. c only
Shiva is working as a network engineer and recently he got an assignment to design a reliable but cheaper Ethernet connection between two offices. The Details are like t...
333
views
answered
Sep 8, 2016
Computer Networks
computer-networks
+
–
–1
votes
4
MadeEasy Test Series 2017: Computer Networks - Congestion Control
Consider the effect of using slow start on a line with 10 msec round trip time. The receiver window and the size of congestion window are set to 38 KB and 36 KB respectively. Sender side threshold is set to 18 KB. After 8 ... to send first full window of 18 KB is______ Assume window size at the start of slow start phase is 2 KB.
Consider the effect of using slow start on a line with 10 msec round trip time. The receiver window and the size of congestion window are set to 38 KB and 36 KB respectiv...
2.2k
views
answered
Sep 8, 2016
Computer Networks
made-easy-test-series
computer-networks
congestion-control
+
–
1
votes
5
Lectures for Basics of Wi-Fi and Network security
Does anyone has any online resource that contains good lectures on Basics of Wi-Fi and Network security? Thanks in advance .
Does anyone has any online resource that contains good lectures on Basics of Wi-Fi and Network security? Thanks in advance .
363
views
answered
Sep 7, 2016
Computer Networks
computer-networks
+
–
0
votes
6
gate
A 1Mbps satellite link connects two ground stations. The altitude of the satellite is 6000 km and speed of the signal is 3 × 10^8 m/s. What should be the packet size for a channel utilization of 50% for a satellite link using go-back-63 sliding window protocol? Assume that the acknowledgment packets are negligible in size and that there are no errors during communication.
A 1Mbps satellite link connects two ground stations. The altitude of the satellite is 6000 km and speed of the signal is 3 × 10^8 m/s. What should be the packet size for...
883
views
answered
Sep 7, 2016
2
votes
7
Network Security
Consider the scenarios. 1. A wifi connection without encryption. 2. Presence of malicious virus 3. Authentication with weak password. In network security paradigm given scenarios can be classified as: (A). 1. Threat 2. Threat 3. Vulnearability (B). 1. ... Threat 3. Threat (C). 1. Threat 2. Vulnearability 3. Vulnearability (D). 1. Vulnearability 2. Threat 3. Vulnearability
Consider the scenarios.1. A wifi connection without encryption.2. Presence of malicious virus3. Authentication with weak password.In network security paradigm given scen...
1.5k
views
answered
Sep 7, 2016
Computer Networks
computer-networks
network-security
+
–
0
votes
8
I don't understand this question can I use a multiplexer
An industrial control circuit has four inputs (A, B, C & D) which activate a single output (F) under the following operating conditions: C & A can never be High (1) at the same time. If D is high (1) and ... 1), the output is active. All other input combinations cause the output to be low (0). Design and implement this control.
An industrial control circuit has four inputs (A, B, C & D) which activate a single output (F) under the following operating conditions:• C & A can never be High (1) at...
435
views
answered
Sep 7, 2016
0
votes
9
Ravindrababu_SQL
Consider the above table A. How many tuples does the result of the following SQL queries contain ? Q1: select Location from A where AreaCode in (101, 103); Q2: Select Location from A where AreaCode = 101 UNION Select Location from A where AreaCode = ... ) NULL value is counted as many times it occur. please guide me how deal with NULL values in diferent occassions.THANKS in ADVANCE
Consider the above table A. How many tuples does the result of the following SQL queries contain ?Q1: select Location from A where AreaCode in (101, 103);Q2: Select Locat...
405
views
answered
Sep 5, 2016
0
votes
10
transition diagram for the given regular language
L={wxwr∣ w,x∈(a,b)*} Is this language regular language? Plz give transition diagram or table?
L={wxwr∣ w,x∈(a,b)*}Is this language regular language?Plz give transition diagram or table?
524
views
answered
Sep 4, 2016
Theory of Computation
theory-of-computation
regular-language
+
–
0
votes
11
Evaluate the following definite integral ?
Evaluate the following definite integral : $\int \limits_0^1 \log \left(\frac{1}{x} - 1 \right)$
Evaluate the following definite integral :$\int \limits_0^1 \log \left(\frac{1}{x} - 1 \right)$
1.2k
views
answered
Sep 4, 2016
Calculus
integration
calculus
engineering-mathematics
integrals
+
–
0
votes
12
context sensitive grammer
In a context sensitive grammer, 1).number of grammar symbols on the left-hand side of a production can’t be greater than the number of non-terminals on the right-hand side is this true or false ?
In a context sensitive grammer,1).number of grammar symbols on the left-hand side of a productioncan’t be greater than the number of non-terminals on the right-hand sid...
928
views
answered
Sep 1, 2016
0
votes
13
Subnetting
An organization is granted the block 164.76.0.0/16. the admin wants to create 2048 subnets using 11 bits. What are the first and the last addresses in subnet 2048 ?
An organization is granted the block 164.76.0.0/16. the admin wants to create 2048 subnets using 11 bits. What are the first and the last addresses in subnet 2048 ?
2.9k
views
answered
Sep 1, 2016
Computer Networks
subnetting
computer-networks
+
–
1
votes
14
Subnetting
What is the problem with discontinous mask?
What is the problem with discontinous mask?
336
views
answered
Sep 1, 2016
0
votes
15
pointers
void fun(int *p) { int q = 10; p = &q; printf("%d",p);//prints 1948738932 printf("\n"); printf("%d q= ",&q);//prints 1948738932 printf("\n"); printf(" value of p %d" ,*p);//rints 10 printf("\n"); ... q,so it should print value at q i.e 10?? In line 3,what is passed in the function?is it the address of p or something else?
void fun(int *p) { int q = 10; p = &q; printf("%d",p);//prints 1948738932 printf("\n"); printf("%d q= ",&q);//prints 1948738932 printf("\n"); printf(" value of p %d" ,*p)...
839
views
answered
Sep 1, 2016
0
votes
16
GATE Overflow | Mathematics | Test 1 | Question: 4
Let $Ax = b$ be a system of linear equations where $A$ is a $m \times n$ matrix and $b$ is a $m \times 1$ column vector and $X$ is a $n \times 1$ column vector of unknows. Which of the following is false? The system has a ... unique solution. The system will have only a trivial solution when $m = n,$ $b$ is the zero vector and $rank (A) = n$.
Let $Ax = b$ be a system of linear equations where $A$ is a $m \times n$ matrix and $b$ is a $m \times 1$ column vector and $X$ is a $n \times 1$ ...
447
views
answered
Aug 23, 2016
Linear Algebra
go-mathematics-1
linear-algebra
system-of-equations
+
–
0
votes
17
GATE Overflow | Mathematics | Test 1 | Question: 3
$A$ is a $2\times 2$ matrix with eigenvalues $2$ and $-3$. The eigenvalues of the matrix $A^2$ are? 4,-9 2,-3 4,9 can not be determined from given data
$A$ is a $2\times 2$ matrix with eigenvalues $2$ and $-3$. The eigenvalues of the matrix $A^2$ are?4,-9 2,-3 4,9 can not be determined from given d...
405
views
answered
Aug 23, 2016
Linear Algebra
go-mathematics-1
linear-algebra
eigen-value
+
–
0
votes
18
complexity
Assume that array A and B are sorted, each contain 'N' element . What is the worst case time complexity to find the median of A ∪ B? a) O(log(N)) b)O(N) c)O(Nlog(N)) d)O(N2)
Assume that array A and B are sorted, each contain 'N' element . What is the worst case time complexity to find the median of A ∪ B?a) O(log(N))b)O(N)c)O(Nlog(N))d)O(N2...
451
views
answered
Aug 12, 2016
Algorithms
algorithms
sorting
time-complexity
+
–
1
votes
19
UGC NET CSE | December 2012 | Part 2 | Question: 5 UGCNET-June2013-II: 47
If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98. 37, 14, 124, 65, 67. 239 310 321 325
If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98. 37, 14, 124, 65, 67.2393103...
3.6k
views
answered
Jul 14, 2016
Operating System
ugcnetcse-dec2012-paper2
operating-system
disk-scheduling
ugcnetcse-june2013-paper2
+
–
1
votes
20
UGC NET CSE | June 2013 | Part 2 | Question: 42
A Boolean operator $\ominus$ is defined as follows: 1 $\ominus$ 1 =1, 1 $\ominus$ 0 = 0, 0 $\ominus$ 1 = 0 and 0 $\ominus$ 0 =1 What will be the truth value of the expression (x $\ominus$ y ) $\ominus$ z = x $\ominus$ (y $\ominus$ z)? Always true Always false Sometimes true True when x,y, z are all true
A Boolean operator $\ominus$ is defined as follows:1 $\ominus$ 1 =1, 1 $\ominus$ 0 = 0, 0 $\ominus$ 1 = 0 and 0 $\ominus$ 0 =1What will be the truth value of the expressi...
2.4k
views
answered
Jul 14, 2016
Others
ugcnetcse-june2013-paper2
+
–
0
votes
21
UGC NET CSE | June 2013 | Part 2 | Question: 41
How many different Boolean functions of degree 4 are there? $2^4$ $2^8$ $2^{12}$ $2^{16}$
How many different Boolean functions of degree 4 are there?$2^4$$2^8$$2^{12}$$2^{16}$
6.9k
views
answered
Jul 14, 2016
Digital Logic
ugcnetcse-june2013-paper2
digital-logic
boolean-algebra
+
–
1
votes
22
Find the weight of minimum spanning tree
Consider a graph whose vertices are points in the plane with integer coordinates (x, y) such that 1<=x <= n and 1 <= y <= n, where n >= 2 is an integer. Two vertices (x1, y1) and (x2, Y2) are adjacent iff |x1 -x2| <= 1 and ly1 - ... (y1 - y2)2). What is the weight of a minimum weight-spanning tree in the graph? a) n-1 b) n+1 c) n d) log n
Consider a graph whose vertices are points in the plane with integer coordinates (x, y) such that 1<=x <= n and 1 <= y <= n, where n >= 2 is an integer. Two vertices (x1,...
698
views
answered
Jul 13, 2016
Programming in C
graph-theory
algorithms
+
–
0
votes
23
Cache Hit Ratio
A processor refers to the cache memory 1000 times. Out of which 150 references are resulting in misses due to conflicts, 100 of them are due to capacity limitations and 100 of them are due to compulsory page faults. Calculate the hit ratio for direct mapping and associative mapping.
A processor refers to the cache memory 1000 times. Out of which 150 references are resulting in misses due to conflicts, 100 of them are due to capacity limitations and 1...
1.2k
views
answered
Jul 12, 2016
0
votes
24
Multilevel Cache
A system is employing 3 level cache memory. The access time of L1, L2, L3 memories is 100 ns/word, 150 ns/word, 500 ns/word. The L2 and L3 memories are divided into a block of 5 words. When a page fault occurs in L1 or L2, the processor must read from L3 memory only. The hit ratio H1, H2 are 80%, 90%. What is Tavg?
A system is employing 3 level cache memory. The access time of L1, L2, L3 memories is 100 ns/word, 150 ns/word, 500 ns/word. The L2 and L3 memories are divided into a blo...
1.3k
views
answered
Jul 12, 2016
0
votes
25
number of function
How many functions are there from the set {1, 2, . . . , n}, where n is a positive integer, to the set {0, 1} a) that assign 1 to exactly one of the positive integers less than n?
How many functions are there from the set {1, 2, . . . , n}, where n is a positive integer, to the set {0, 1}a) that assign 1 to exactly one of the positive integers les...
3.8k
views
answered
Jun 26, 2016
Combinatory
counting
functions
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register