Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by gshivam63
2
votes
1
File Indexing
Choose the false statement. a) Internal hashing is implemented through the use of an array of records. b) Multiple hsahing uses two or more hash functions. c) Static hashing provides slow searching of records. d) Extendible hashing provides good performance as file grows
Choose the false statement.a) Internal hashing is implemented through the use of an array of records.b) Multiple hsahing uses two or more hash functions.c) Static hashing...
522
views
answered
Nov 5, 2016
1
votes
2
File Structure and Indexing
A data dictionary doesn't provide iformation about a)where data is located b)the siz of disk storage c)who owns the data d) how data is used
A data dictionary doesn't provide iformation abouta)where data is locatedb)the siz of disk storagec)who owns the datad) how data is used
259
views
answered
Nov 5, 2016
0
votes
3
predict the output
603
views
answered
Jul 8, 2016
Programming in C
programming-in-c
+
–
1
votes
4
KERALA_PSC Predict content of PC and SP
At present the contents of SP and PC of a 8085 microprocessor are F000h and 2400h respectively. What will be the content after CALL E000h?
At present the contents of SP and PC of a 8085 microprocessor are F000h and 2400h respectively.What will be the content after CALL E000h?
1.7k
views
answered
Jul 8, 2016
2
votes
5
KERALA_PSC Predict the accumulator content
Predict the accumulator content after following instructions: XRA A MVI B, F0H SUB B a. F0 H b. 0FH c.01 H d. 10H
Predict the accumulator content after following instructions:XRA AMVI B, F0HSUB B a. F0 Hb. 0FHc.01 Hd. 10H
2.6k
views
answered
Jul 8, 2016
Unknown Category
microprogramming
kerala-psc
+
–
0
votes
6
Asymptotic Notation
If f(n) = big_omega(n), g(n) = O(n) and h(n) = ⊙(n) then what is f(n).g(n) + h(n) ?
If f(n) = big_omega(n), g(n) = O(n) and h(n) = ⊙(n) then what is f(n).g(n) + h(n) ?
730
views
answered
Jul 6, 2016
Algorithms
algorithms
asymptotic-notation
+
–
0
votes
7
Imp doubt
Can any one tell ? How should i prepare programs for Linked list addind nodes their deletion. I used to learn the programs its not that i dint understand but still i had to learn. But now there are so many subjects so it is not possible to learn each ... Structure program like of trees graph DFS BFS etc and many other . How to overcome this Difficulty . Somebody please help and guide me ?
Can any one tell ? How should i prepare programs for Linked list addind nodes their deletion.I used to learn the programs its not that i dint understand but still i had t...
398
views
answered
Jul 6, 2016
1
votes
8
UGC NET CSE | June 2012 | Part 3 | Question: 16
Given the following statements: The power of deterministic finite state machine and non- deterministic finite state machine are same. The power of deterministic pushdown automaton and non- deterministic pushdown automaton are same. Which of the above is the correct statement(s)? Both I and II Only I Only II Neither I nor II
Given the following statements:The power of deterministic finite state machine and non- deterministic finite state machine are same.The power of deterministic pushdown au...
3.2k
views
answered
Jul 6, 2016
Theory of Computation
ugcnetcse-june2012-paper3
theory-of-computation
finite-automata
+
–
0
votes
9
UGC NET CSE | June 2012 | Part 3 | Question: 1
Consider the following Pseudo-code segment: k:=0 for $i_1$:=1 to n for $i_2$ := 1 to $i_1$ : : : for $i_m$:=1 to $i_{m-1}$ k:=k+1 The value of k after the execution of this code shall be $C(n+m-1, m)$ $C(n-m+1, m)$ $C(n+m-1, n)$ $C(n-m+1, n)$
Consider the following Pseudo-code segment:k:=0for $i_1$:=1 to nfor $i_2$ := 1 to $i_1$:::for $i_m$:=1 to $i_{m-1}$k:=k+1The value of k after the execution of this code s...
2.3k
views
answered
Jul 6, 2016
Programming in C
ugcnetcse-june2012-paper3
programming
algorithms
+
–
1
votes
10
UGC NET CSE | June 2012 | Part 3 | Question: 3
The concept of pipelining is a most effective in improving performance in the tasks being performed in different stages: require different amount of time require about the same amount of time require different amount of time ... between any two tasks being same require different amount with time difference between any two tasks being different
The concept of pipelining is a most effective in improving performance in the tasks being performed in different stages:require different amount of timerequire about the ...
9.2k
views
answered
Jul 6, 2016
CO and Architecture
ugcnetcse-june2012-paper3
co-and-architecture
pipelining
+
–
3
votes
11
sliding window protocol
pleas help me in this problem
pleas help me in this problem
1.2k
views
answered
Jul 6, 2016
0
votes
12
Regarding Regular Expression
Please somebody tell from where to study Regular Expression in detail with full-length explanation of it.
Please somebody tell from where to study Regular Expression in detail with full-length explanation of it.
582
views
answered
Jul 6, 2016
–2
votes
13
If the packet size is 1200 byte and speed is 70% of speed of light find throughput in stop and wat protocol for a. 12km
2.7k
views
answered
Jul 5, 2016
Computer Networks
stop-and-wait
+
–
2
votes
14
Time complexity
What is time complexity for given recurrence relation T(n) = √nT(√n) + √n T(2)= 1
What is time complexity for given recurrence relationT(n) = √nT(√n) + √nT(2)= 1
843
views
answered
Jul 5, 2016
Algorithms
recurrence-relation
time-complexity
+
–
5
votes
15
can some1 plz tell about sender utilization,efficiency,link utilization,throughput, BW utilization..in network
1.5k
views
answered
Jul 5, 2016
0
votes
16
ISRO2016-19
Consider a non-pipelined processor with a clock rate of $2.5$ gigahertz and average cycles per instruction of four. The same processor is upgraded to a pipelined processor with five stages; but due to the internal pipeline delay, the clock speed is reduced to $2$ gigahertz. Assume ... no stalls in the pipeline. The speedup achieved in this pipelined processor is $3.2$ $3.0$ $2.2$ $2.0$
Consider a non-pipelined processor with a clock rate of $2.5$ gigahertz and average cycles per instruction of four. The same processor is upgraded to a pipelined processo...
6.1k
views
answered
Jul 4, 2016
CO and Architecture
co-and-architecture
pipelining
isro2016
+
–
1
votes
17
General doubt
What is the difference between CPU frequency and Clock Cycle? What is the relation between them?
What is the difference between CPU frequency and Clock Cycle? What is the relation between them?
318
views
answered
Jul 4, 2016
0
votes
18
if list is almost sorted and largest element is wrongly placed
A list of integers is almost sorted with only the largest number being out of place. If this information is not known to the algorithm, then which of the following algorithms can sort the list the fastest? Bubble sort Selection sort Insertion sort Shell sort
A list of integers is almost sorted with only the largest number being out of place. If this information is not known to the algorithm, then which of the following algori...
1.3k
views
answered
Jul 2, 2016
Algorithms
algorithms
sorting
+
–
2
votes
19
The Depth First and Breadth First Traversal algorithms visit the nodes
The Depth First and Breadth First Traversal algorithms visit the nodes in exactly the same order in which the following types of graphs Binary tree Linear chain Complete graph None of the above
The Depth First and Breadth First Traversal algorithms visit the nodes in exactly the same order in which the following types of graphsBinary treeLinear chainComplete gra...
1.0k
views
answered
Jul 2, 2016
2
votes
20
Average access time, Made Easy- Psus Book
Two level memory contains cache and main memory. Cache access time is 20ns and main memory access time is 120ns/word.The size of block is 4 words. Main memory is referred 20% of times.What is the average access time: a) 120ns. b) 20ns c) 116ns d) 150ns
Two level memory contains cache and main memory. Cache access time is 20ns and main memory access time is 120ns/word.The size of block is 4 words. Main memory is referred...
4.3k
views
answered
Jul 2, 2016
CO and Architecture
co-and-architecture
psu
+
–
4
votes
21
network 200.20.11.144/27 , Which of the following languages are context free
In the network 200.20.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is____ Which of the following languages are context free? $L_1=\{a^mb^na^nb^m \mid m,n \geq 1\}$ $L_2=\{a^mb^na^mb^m \mid m,n \geq 1\}$ $L_3=\{a^mb^n \mid m= 2n+1\}$
In the network 200.20.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is____Which of the following language...
999
views
answered
Jul 2, 2016
Theory of Computation
context-free-language
+
–
2
votes
22
network 200.20.11.144/27 , Which of the following languages are context free
In the network 200.20.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is____ Which of the following languages are context free? $L_1=\{a^mb^na^nb^m \mid m,n \geq 1\}$ $L_2=\{a^mb^na^mb^m \mid m,n \geq 1\}$ $L_3=\{a^mb^n \mid m= 2n+1\}$
In the network 200.20.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is____Which of the following language...
999
views
answered
Jul 2, 2016
Theory of Computation
context-free-language
+
–
0
votes
23
c programming
long fun(char *s) { long r=0; for(; *s; r=(r<<1)|(*s++ - '0')); return r; } what does fun("000001010") return??
long fun(char *s) {long r=0;for(; *s; r=(r<<1)|(*s++ - '0'));return r;}what does fun("000001010") return??
461
views
answered
Jul 1, 2016
0
votes
24
some1 plz explain why the time complexity of Prims algorithm using arrays is O(v^2+2E)...thanks in advance
678
views
answered
Jul 1, 2016
Algorithms
prims-algorithm
time-complexity
+
–
0
votes
25
mov[BX], AL is which kind of addressing mode
1.8k
views
answered
Jul 1, 2016
0
votes
26
C programming
main() { int a,b,c,d; a=3,b=5; c=a,b; d=(a,b); printf("%d %d",c,d); } Output???
main() {int a,b,c,d;a=3,b=5;c=a,b;d=(a,b);printf("%d %d",c,d);}Output???
3.1k
views
answered
Jul 1, 2016
1
votes
27
What is the highest address in 48 K memory?
What is the highest address in 48 K memory? (in decimal) a. 49151 b. 49152 c. 64386 d. 64387
What is the highest address in 48 K memory? (in decimal)a. 49151b. 49152c. 64386d. 64387
2.1k
views
answered
Jul 1, 2016
18
votes
28
ISRO2014-67
What is the time complexity for the following C module? Assume that $n>0$. int module(int n) { if (n == 1) return 1; else return (n + module(n-1)); } $O(n)$ $O(\log n)$ $O(n^2)$ $O(n!)$
What is the time complexity for the following C module? Assume that $n>0$.int module(int n) { if (n == 1) return 1; else return (n + module(n-1)); }$O(n)$$O(\log n)$$O(n^...
5.0k
views
answered
Jul 1, 2016
Algorithms
isro2014
algorithms
time-complexity
+
–
10
votes
29
ISRO-2013-14
A processor is fetching instructions at the rate of $1$ MIPS. A DMA module is used to transfer characters to RAM from a device transmitting at $9600$ bps. How much time will the processor be slowed down due to DMA activity? $9.6$ms $4.8$ms $2.4$ms $1.2$ms
A processor is fetching instructions at the rate of $1$ MIPS. A DMA module is used to transfer characters to RAM from a device transmitting at $9600$ bps. How much time w...
7.3k
views
answered
Jul 1, 2016
CO and Architecture
isro2013
dma
+
–
16
votes
30
ISRO2014-49
Consider a single linked list where $F$ and $L$ are pointers to the first and last elements respectively of the linked list. The time for performing which of the given operations depends on the length of the linked list? Delete the first element of the list Interchange the first two elements of the list Delete the last element of the list Add an element at the end of the list
Consider a single linked list where $F$ and $L$ are pointers to the first and last elements respectively of the linked list. The time for performing which of the given op...
16.0k
views
answered
Jul 1, 2016
DS
isro2014
data-structures
linked-list
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register