Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by anupamsworld
2
votes
2
answers
1
Engineering Math | Probability
A cricket club has 15 members of whom only 5 can bowl. If the names of 15 members are put into a box and 11 are drawn at random. Then the probability of obtaining an eleven containing at least 3 bowlers Is how much? $\frac{7}{13}$ $\frac{6}{13}$ $\frac{11}{15}$ $\frac{12}{13}$ None of these
A cricket club has 15 members of whom only 5 can bowl. If the names of 15 members are put into a box and 11 are drawn at random. Then the probability of obtaining an elev...
540
views
asked
Jun 15, 2023
Probability
engineering-mathematics
probability
+
–
1
votes
1
answer
2
CN | ACE Test Series
Which of the following is/are TRUE? In virtual circuit switching, the scope of VCI(Virtual Circuit Identifier) is not the entire network. In datagram switching, packets are traveled in different paths. In Internet, we use virtual circuit switching technique. In circuit switching, the message is not break down into small pieces. MSQ
Which of the following is/are TRUE?In virtual circuit switching, the scope of VCI(Virtual Circuit Identifier) is not the entire network.In datagram switching, packets are...
629
views
asked
Dec 20, 2022
Computer Networks
computer-networks
test-series
ace-test-series
+
–
1
votes
1
answer
3
CN | ACE Practice Book | Q47
Host A (on TCP/ IPv4 network A) sends an IP datagram to host B (also on TCP/IPV4 network B). Assume that, no error occurred during the transmission of D. When D reaches B, which of the following IP header field(s) may be different from that of the original datagram D? TTL Checksum Fragment offset HLEN (Header length)
Host A (on TCP/ IPv4 network A) sends an IP datagram to host B (also on TCP/IPV4 network B). Assume that, no error occurred during the transmission of D. When D reaches B...
522
views
asked
Dec 8, 2022
Computer Networks
computer-networks
tcp
ace-booklet
+
–
0
votes
0
answers
4
OS Doubt
What is/are the difference(s) between System Program, Control Program, Kernel Program in Operating System. What is the relation between System Call and those?
What is/are the difference(s) between System Program, Control Program, Kernel Program in Operating System.What is the relation between System Call and those?
230
views
asked
Oct 27, 2022
Operating System
operating-system
+
–
0
votes
1
answer
5
Digital Logic | Doubt
Hamming Distance: We can calculate how much Hamming Distance should be there so that we can correct any wrong bit Hamming Code: By Hamming Code we can correct any wrong bit. Questions: 1] Are they both different techniques or there is relation ... Hamming Distance in any two numbers). 2] Why should anybody use Hamming Code where we can correct error by Hamming Distance?
Hamming Distance: We can calculate how much Hamming Distance should be there so that we can correct any wrong bitHamming Code: By Hamming Code we can correct any wrong bi...
340
views
asked
Sep 18, 2022
Digital Logic
digital-logic
hamming-code
+
–
0
votes
0
answers
6
PDA | TOC | Practice Question
Identify the type of the given language and draw the corresponding automata for the language. $L=\left \{a^{i}b^{j}c^{k} \space\ | \space\ j=max(i,k) \right \}$ A] Regular B] DCFL C] CFL but not DCFL D] Non-CFL Please describe your selection.
Identify the type of the given language and draw the corresponding automata for the language.$L=\left \{a^{i}b^{j}c^{k} \space\ | \space\ j=max(i,k) \right \}$A] RegularB...
537
views
asked
Sep 2, 2022
Theory of Computation
regular-grammar
context-free-grammar
npda
dpda
theory-of-computation
+
–
0
votes
0
answers
7
PDA | TOC | Practice Question | Unacademy Class
Construct PDA using empty stack method for the given language. $L=\left \{ x \space\ | \space\ x\in \left \{ a,b \right \}^{*} ; n_{a}(x) >= n_{b}(x) \right \}$ //number of a’s is greater than or equal to number of b’s
Construct PDA using empty stack method for the given language.$L=\left \{ x \space\ | \space\ x\in \left \{ a,b \right \}^{*} ; n_{a}(x) >= n_{b}(x) \right \}$//number of...
269
views
asked
Sep 1, 2022
Theory of Computation
npda
dpda
theory-of-computation
+
–
0
votes
2
answers
8
Identification of Regular Language | TOC | Practice Question | Unacademy Class
Which of the following is/are Regular? A] $\left \{ XWYW^{R} \space\ | \space\ W,X,Y \in \left \{ a,b \right \}^{+} \right \}$ ... D] None R => Reverse Please describe your answer.
Which of the following is/are Regular?A] $\left \{ XWYW^{R} \space\ | \space\ W,X,Y \in \left \{ a,b \right \}^{+} \right \}$B] $\left \{ WXW^{R}Y \space\ | \space\ W,X,Y...
609
views
asked
Aug 29, 2022
Theory of Computation
theory-of-computation
regular-language
+
–
1
votes
2
answers
9
Properties of regular expression | TOC | Doubt
1] ∅^* = ? 2] ∅^+ = ? 3] ∅ . ∈ = ? please describe your answers.
1] ∅^* = ?2] ∅^+ = ?3] ∅ . ∈ = ?please describe your answers.
677
views
asked
Aug 22, 2022
Theory of Computation
theory-of-computation
regular-expression
+
–
0
votes
1
answer
10
DBMS Join | Test Series | MadeEasy
In relational databases, the natural join of two tables: Can be equivalent to cartesian product of these two tables Is combination of union and filtered cartesian product Is combination of selection and filtered cartesian product Is combination of projection and filtered cartesian product MSQ Please describe your choice(s).
In relational databases, the natural join of two tables:Can be equivalent to cartesian product of these two tablesIs combination of union and filtered cartesian productIs...
405
views
asked
Aug 7, 2022
Databases
rdbms
databases
natural-join
joins
+
–
1
votes
0
answers
11
Finding Candidate Keys | Class Practice | Unacademy
Find the candidate key(s) of the relation R(UVWXYZ) with FD set F={UV-->W, XW-->Y, U-->XZ, Y-->U} XW UV, YV, WXV YUV, XV, WV None of these
Find the candidate key(s) of the relation R(UVWXYZ) with FD set F={UV >W, XW >Y, U >XZ, Y >U}XWUV, YV, WXVYUV, XV, WVNone of these
547
views
asked
Jul 29, 2022
Databases
candidate-key
rdbms
databases
+
–
0
votes
1
answer
12
Class Practice Question | Thomas Write Rule | Basic Time Stamp | Unacademy
Which of the following time stamp ordering protocol(s) allow(s) the following schedule? S: W1(A), W2(A), W3(A), R2(A), R4(A); Time Stamps: T1:5, T2:10, T3:15, T4:20 Tomas Write Rule Basic Time Stamp Only 1 Only 2 Both 1 and 2 Neither 1 nor 2 Please describe your answer.
Which of the following time stamp ordering protocol(s) allow(s) the following schedule?S: W1(A), W2(A), W3(A), R2(A), R4(A);Time Stamps: T1:5, T2:10, T3:15, T4:20Tomas Wr...
258
views
asked
Jul 26, 2022
Databases
databases
+
–
0
votes
0
answers
13
Doubt
Does Conservative 2 Phase Locking Protocol ensures no Deadlock? Please describe your answer.
Does Conservative 2 Phase Locking Protocol ensures no Deadlock?Please describe your answer.
406
views
asked
Jul 26, 2022
Databases
databases
two-phase-locking-protocol
+
–
2
votes
0
answers
14
Practice Question | Unacademy
$\log _{2} x \times \log _{x/64}2 = \log _{x/16}2$ x=? Please provide elaborative answer.
$\log _{2} x \times \log _{x/64}2 = \log _{x/16}2$x=?Please provide elaborative answer.
406
views
asked
Jul 25, 2022
Quantitative Aptitude
logarithms
+
–
3
votes
1
answer
15
General Aptitude | Practice Question | Unacademy
In a car race, car X beats car Y by 36 km, car Y beats car Z by 72 km, and car X beats car Z by 90 km. The distance (in m) over which the race has been conducted is: 88000 108000 56000 144000 Please explain your answer.
In a car race, car X beats car Y by 36 km, car Y beats car Z by 72 km, and car X beats car Z by 90 km. The distance (in m) over which the race has been conducted is:88000...
991
views
asked
Jul 25, 2022
Quantitative Aptitude
general-aptitude
quantitative-aptitude
+
–
0
votes
2
answers
16
MadeEasy Test Series
There are 15 vertices and 15 edges in some graph. Now, these edges are arranged in such a way that maximum number of connected components are created in the graph. Find the connected components created. (A) 8 (B) 9 (C) 10 (D) 11 Please explain your answer.
There are 15 vertices and 15 edges in some graph. Now, these edges are arranged in such a way that maximum number of connected components are created in the graph. Find t...
904
views
asked
Jul 8, 2022
DS
made-easy-test-series
data-structures
graph-theory
graph-connectivity
+
–
1
votes
1
answer
17
Practice Question | Unacademy
Consider the following statements (I) The two main function of data link layer are data link control and media access control (II) DLL guarantees reliable delivery of packets, hence no acknowledgements required. [A] Only I is true [B] Only II is true [C] Both are true [D] None Please explain your choice.
Consider the following statements(I) The two main function of data link layer are data link control and media access control(II) DLL guarantees reliable delivery of packe...
381
views
asked
Jun 12, 2022
Computer Networks
test-series
computer-networks
data-link-layer
+
–
0
votes
1
answer
18
Operating System | Process Scheduling | Round Robin
Lets consider one situation where, OS is scheduling processes(P1,P2,P3...Pn) with Round Robin method and current running process is P1 and next scheduled process in queue is also P1 (this case is possible in Round Robin). ... take place in Round Robin scheduling method with quantum=3unit for the given data below. AT=Arrival Time, BT=Burst Time
Lets consider one situation where,OS is scheduling processes(P1,P2,P3...Pn) with Round Robin method and current running process is P1 and next scheduled process in queue ...
1.4k
views
asked
Jun 6, 2022
Operating System
operating-system
process-scheduling
round-robin-scheduling
context-switch
+
–
1
votes
1
answer
19
ISI Kolkata | MMA | 2022 --- A lie detector determines correctly ....
Picture of question
Picture of question
549
views
asked
Jun 6, 2022
Probability
isi
probability
engineering-mathematics
+
–
0
votes
1
answer
20
Networking supernet | CIDR
Can these following networks be aggregated to one network? If no then why? If yes then what would be the supernet mask? Network1: 1.2.0.5/24 Network2: 1.2.1.7/24 Network3: 1.2.2.9/24 Please provide descriptive solution.
Can these following networks be aggregated to one network? If no then why? If yes then what would be the supernet mask?Network1: 1.2.0.5/24Network2: 1.2.1.7/24Network3: 1...
471
views
asked
Jun 6, 2022
Computer Networks
computer-networks
ip-addressing
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register