11 votes
5 answers
1
An ACK number of $1000$ in TCP always means that$999$ bytes have been successfully received$1000$ bytes have been successfully received$1001$ bytes have been successfully...
5 votes
2 answers
2
The correct syntax to write "Hi there" in Javascript isjscript.write ("Hi There")response.write ("Hi There")print ("Hi There")print.jscript ("Hi There")
14 votes
11 answers
3
Semaphores are used to solve the problem ofRace ConditionProcess SynchronizationMutual ExclusionNone of the aboveI and IIII and IIIAll of the aboveNone of the above
12 votes
3 answers
4
A modulus -$12$ ring counter requires a minimum of$10$ flip-flops$12$ flip-flops$8$ flip-flops$6$ flip-flops
9 votes
5 answers
5
If half adders and full adders are implements using gates, then for the addition of two $17$ bit numbers (using minimum gates) the number of half adders and full adders r...
11 votes
10 answers
6
Suppose two jobs, each of which needs $10$ minutes of CPU time, start simultaneously. Assume $50\%$ I/O wait time. How long will it take for both to complete, if they run...
9 votes
5 answers
7
A certain population of ALOHA users manages to generate $70$ request/sec. If the time is slotted in units of $50$ msec, then channel load would be$4.25$$3.5$$450$$350$
7 votes
3 answers
8
The minimum time delay between the initiation of two independent memory operations is calledAccess timeCycle timeRotational timeLatency time
7 votes
5 answers
9
Consider the following program fragment if(a b) if(b c) s1; else s2;s2 will be executed ifa <= bb cb >= c and a <= ba b and b <= c
7 votes
3 answers
10
Consider the following declaration:int a, *b=&a, c=&b;The following program fragmenta=4; c=5;does not change the value of aassigns address of $c$ to $a$assigns the valu...
16 votes
3 answers
11
Given a block can hold either $3$ records or $10$ key pointers. A database contains n records, then how many blocks do we need to hold the data file and the dense index$1...
4 votes
4 answers
12
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field?ReplaceJoinChangeUpdate
8 votes
4 answers
13
When a process is rolled back as a result of deadlock the difficulty which arises isStarvationSystem throughputLow device utilizationCycle stealing
6 votes
4 answers
15
Compared to CISC processors,RISC processors containMore register and smaller instruction setlarger instruction setless registers and smaller instruction setmore transisto...
1 votes
1 answer
16
The process of organizing the memory into two banks to allow 8 and 16 bit data operation is calleda)Bank switchingb)Indexed mappingc)Two-way memory interleavingd)Memory s...
2 votes
1 answer
17
Which is the correct definition of a valid process transition in an operating system?a)Wake up:ready->runningb)Dispatch:ready->runningc)Block:ready->runningd)Timer runout...
4 votes
2 answers
18
Lightweight Directory Access protocol is used forRouting the packetsAuthenticationobtaining IP addressdomain name resolving
3 votes
2 answers
19
Number of comparisons required for an unsuccessful search of an element in a sequential search organized, fixed length, symbol table of length L isLL/2(L+1)/22L
6 votes
3 answers
20
The encoding technique used to transmit the signal in giga ethernet technology over fiber optic medium isDifferential Manchester encodingNon return to zero$\text{4B/5B}$...