Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
bts
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by bts
1
answer
1
What is co exact syllabus
What is co exact syllabus
What is co exact syllabus
196
views
closed
Sep 13, 2018
1
answer
2
Recurrence Relation
Solve the following recurrence relation :- N(h)=N(h−1)+N(h−2)+1
Solve the following recurrence relation :-N(h)=N(h−1)+N(h−2)+1
504
views
asked
Jul 27, 2018
Programming in C
recurrence-relation
time-complexity
algorithms
+
–
1
answer
3
Masters theorem
Solve by using master's theorem
Solve by using master's theorem
543
views
commented
Jul 17, 2018
Algorithms
time-complexity
master-theorem
algorithms
asymptotic-notation
recurrence-relation
+
–
1
answer
4
Syllabus Gate 2019
Is the chapter Complex functions part of gate 2019 maths syllabus? Previously questions about analytic functions have been asked a lot. Are they part of the syllabus?
Is the chapter Complex functions part of gate 2019 maths syllabus?Previously questions about analytic functions have been asked a lot. Are they part of the syllabus?
662
views
asked
Jul 3, 2018
Mathematical Logic
preparation
gate-2019
syllabus
engineering-mathematics
complex-number
+
–
1
answer
5
Two phase locking and time stamp
Which of the following is correct ? I.Two phase locking is an optimistic protocol. II. Two phase locking is pessimistic protocol III. Time stamping is an optimistic protocol. IV. Time stamping is pessimistic protocol. A I and III B II and IV C I and IV D II and III
Which of the following is correct ? I.Two phase locking is an optimistic protocol. II. Two phase locking is pessimistic protocol III. Time stamping is an optimistic proto...
1.2k
views
asked
Jun 30, 2018
Databases
two-phase-locking-protocol
databases
transaction-and-concurrency
+
–
0
answers
6
Differentiable
Why is a function not differentiable at x=k when f'(x) limits to infinity? Limit can be infinite too?
Why is a function not differentiable at x=k when f'(x) limits to infinity? Limit can be infinite too?
387
views
asked
Jun 25, 2018
Mathematical Logic
calculus
differentiation
continuity
engineering-mathematics
+
–
1
answer
7
Derivative
What is the derivative of the following function at x=0? F(x)= x ^(1/3)
What is the derivative of the following function at x=0?F(x)= x ^(1/3)
499
views
asked
Jun 25, 2018
Mathematical Logic
engineering-mathematics
calculus
+
–
1
answer
8
Rank of a matrix
Let A be a 4×3 real matrix with rank 2. Let B be transpose matrix of A. Which one of the following statement is TRUE? (a) Rank of BA is less than 2. (b) Rank of BA is equal to 2. (c) Rank of BA is greater than 2. (d) Rank of BA can be any number between 1 and 3.
Let A be a 4×3 real matrix with rank 2. Let B be transpose matrix of A. Which one of the following statement is TRUE?(a) Rank of BA is less than 2.(b) Rank of BA is equa...
1.8k
views
asked
Jun 21, 2018
Mathematical Logic
rank-of-matrix
engineering-mathematics
matrix
+
–
2
answers
9
TCP acknowledgement number
An ACK number of $1000$ in TCP always means that $999$ bytes have been successfully received $1000$ bytes have been successfully received $1001$ bytes have been successfully received None of the above
An ACK number of $1000$ in TCP always means that$999$ bytes have been successfully received$1000$ bytes have been successfully received$1001$ bytes have been successfully...
768
views
asked
Jun 18, 2018
Computer Networks
computer-networks
tcp
sequencenumber
+
–
1
answer
10
Ping icmp
Which statement is false? PING is a TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine being PINGED If the machine is connected and running a TCP/IP protocol stack, it should respond to the PING ... condition, an ICMP message is not returned PING display the time of the return response in milliseconds or one of several error message
Which statement is false?PING is a TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine being PINGEDIf the machine i...
644
views
asked
Jun 18, 2018
Computer Networks
computer-networks
icmp
+
–
2
answers
11
Subnet
The address of a class $B$ host is to be split into subnets with a $6-bit$ subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet? $62$ subnets and $262142$ hosts. $64$ subnets and $262142$ hosts. $62$ subnets and $1022$ hosts. $64$ subnets and $1024$ hosts
The address of a class $B$ host is to be split into subnets with a $6-bit$ subnet number. What is the maximum number of subnets and the maximum number of hosts in each su...
1.3k
views
asked
Jun 18, 2018
Computer Networks
computer-networks
subnetting
network-addressing
+
–
1
answer
12
IPV4 Header - GATE CS Mock 2018 | Set 2
Which of the following option is false regarding option field in the $IPv4$ header: The Value of "Type" in the Security option field of an IPv4 header is $131$. If the header length is greater than $5$ (i.e., it is from ... . Copied, Option Class, and Option Number are sometimes referred to as a single eight-bit field, the Option Type. None of these
Which of the following option is false regarding option field in the $IPv4$ header:The Value of "Type" in the Security option field of an IPv4 header is $131$.If the head...
1.3k
views
asked
Jun 18, 2018
Computer Networks
computer-networks
ip-addressing
+
–
1
answer
13
Bit Rate - Baud Rate
An analog signal has a bit rate of 8000 bps and a baud rate of 1000. Then analog signal has _____ signal elements and carry _____ data elements in each signal. (A) 256, 8 bits (B) 128, 4 bits (C) 256, 4 bits (D) 128, 8 bits
An analog signal has a bit rate of 8000 bps and a baud rate of 1000.Then analog signal has _____ signal elements and carry _____ data elements in each signal.(A) 256, 8 b...
3.3k
views
commented
Jun 15, 2018
Computer Networks
bits
baud
computer-networks
+
–
1
answer
14
Forwarding by router
Consider the following routing table of a router. Consider the following three IP addresses. How are the packets with above three destination IP addresses are forwarded? (A) 1->D, 2->B, 3->B (B) 1->D, 2->B, 3->D (C) 1->B, 2->D, 3->D (D) 1->D, 2->D, 3->D
Consider the following routing table of a router.Consider the following three IP addresses.How are the packets with above three destination IP addresses are forwarded?(A)...
2.0k
views
asked
Jun 15, 2018
Computer Networks
computer-networks
routing
forwa
+
–
1
answer
15
Error detection
Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. A t + 1 B t C t - 2 D t / 2
Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error.At + 1BtCt - 2Dt / 2
1.7k
views
asked
Jun 15, 2018
Computer Networks
computer-networks
error-detection
hamming-code
+
–
1
answer
16
Token Ring - ISRO | ISRO CS 2016
In a token ring network the transmission speed is $10^7$ bps and the propagation speed is 200 meters/ μs. The 1-bit delay in this network is equivalent to: (A) 500 meters of cable. (B) 200 meters of cable. (C) 20 meters of cable. (D) 50 meters of cable.
In a token ring network the transmission speed is $10^7$ bps and the propagation speed is 200 meters/ μs. The 1-bit delay in this network is equivalent to:(A) 500 meters...
1.3k
views
asked
Jun 15, 2018
Computer Networks
computer-networks
token-ring
+
–
1
answer
17
Computer Networks: efficiency - Gate 2018 mock set 2
Which of the following statement is False about the efficiency of the given channel ? A If we want to send big packets on the channel, then Stop and Wait is good choice. B If length of packet increases, efficiency of ... sender and receiver is directly proportional to efficiency of channel. D Efficient might be less if capacity of channel is high
Which of the following statement is False about the efficiency of the given channel ?AIf we want to send big packets on the channel, then Stop and Wait is good choice.BIf...
1.8k
views
asked
Jun 15, 2018
Computer Networks
computer-networks
+
–
2
answers
18
Time to live
When is TTL decreased? 1- only at routers? 2- any device having network layer (including hosts in between the path) : example: source subnet has ethernet and destination subnet has token ring : all hosts and routers that come in packets.s path will decrease TTL or only router will decrease TTL?
When is TTL decreased?1- only at routers?2- any device having network layer (including hosts in between the path) :example: source subnet has ethernet and destination sub...
875
views
commented
Jun 14, 2018
Computer Networks
routers-bridge-hubs-switches
computer-networks
+
–
3
answers
19
Time complexity , Recursion
Why is recursive equation of following code $T(n)=T(n/2)+O(1)$, not $T(n)=8*T(n/2)+O(1)$? int x=0; int A(n) { if(n==1) return 1; else { X+=8A(n/2)+n^3; } return X; }
Why is recursive equation of following code $T(n)=T(n/2)+O(1)$, not $T(n)=8*T(n/2)+O(1)$? int x=0; int A(n) { if(n==1) return 1; else { X+=8A(n/2)+n^3; } return X; }
1.8k
views
asked
May 29, 2018
Algorithms
recursion
time-complexity
algorithms
master-theorem
+
–
2
answers
20
Testbook
int x=0; int A(n) { statement //takes O(1) time if(n==1) return 1; else { $X+=8.A\left ( \frac{n}{2}\right )+n^3$; } return X; } What is the time complexity f the above code?
int x=0;int A(n){ statement //takes O(1) time if(n==1) return 1; else { $X+=8.A\left ( \frac{n}{2}\right )+n^3$; } return X;}What is the time com...
1.5k
views
commented
May 28, 2018
Algorithms
time-complexity
algorithms
testbook-test-series
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register