Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by koushik.sinha
9
answers
1
IPv6
5.5k
views
answered
Jan 28, 2017
Computer Networks
ipv6
+
–
3
answers
2
probablity
666
views
commented
Dec 23, 2016
3
answers
3
computer network
round trip delay is 160ms and bottlenect BW is 256kbps.sender uses sliding window protocol to send 64bytes packet.optimal window size that sender should use is : (in packets) I am getting 81 but answer is 80 ..can someone explain please...
round trip delay is 160ms and bottlenect BW is 256kbps.sender uses sliding window protocol to send 64bytes packet.optimal window size that sender should use is : (in pack...
637
views
answered
Nov 18, 2016
2
answers
4
GATE Overflow | Data Structures | Test 1 | Question: 28
What would be an appropraite data structure to represent family hierarchy where each node is an individual and there in no requirement to keep "married to" relationship? Binary Tree n-ary Tree Graph Linked List
What would be an appropraite data structure to represent family hierarchy where each node is an individual and there in no requirement to keep "married to" relationship?B...
797
views
answer edited
Nov 9, 2016
DS
go-ds-1
data-structures
+
–
1
answer
5
TOC Grand Test 1 Question 3
907
views
commented
Nov 7, 2016
9
answers
6
GATE IT 2006 | Question: 69
A program on machine $X$ attempts to open a $UDP$ connection to port $5376$ on a machine $Y$, and a $TCP$ connection to port $8632$ on machine $Z$. However, there are no applications listening at the corresponding ports on $Y$ and $Z$. An $ICMP$ Port Unreachable error will be generated by $Y$ but not $Z$ $Z$ but not $Y$ Neither $Y$ nor $Z$ Both $Y$ and $Z$
A program on machine $X$ attempts to open a $UDP$ connection to port $5376$ on a machine $Y$, and a $TCP$ connection to port $8632$ on machine $Z$. However, there are no ...
14.2k
views
answered
Nov 7, 2016
Computer Networks
gateit-2006
computer-networks
tcp
udp
normal
+
–
0
answers
7
Compiler Errors
Can you give me an overall idea how to identify these type of errors when given a code snippet . Lexical Error Syntax Error Semantic Error I only know how to find Syntax error. ie like semicolon missing after statement , incorrect use of for loops etc ... ut , How to find other types of error ?
Can you give me an overall idea how to identify these type of errors when given a code snippet .Lexical ErrorSyntax ErrorSemantic ErrorI only know how to find Syntax erro...
664
views
commented
Nov 7, 2016
Compiler Design
compiler-design
+
–
3
answers
8
If m number of bits are used for representing a sequence number in selective-repeat ARQ
If m number of bits are used for representing a sequence number in selective-repeat ARQ,then the maximum size of sliding window is 2m-1 .Justify this statement using a boundary case example.What will happen if the size of sliding window exceeds 2m-1 ?
If m number of bits are used for representing a sequence number in selective-repeat ARQ,then the maximum size of sliding window is 2m-1 .Justify this statement using a bo...
8.6k
views
answered
Nov 7, 2016
Computer Networks
computer-networks
+
–
2
answers
9
operating system
Ans is d but according me it is wrong if we dispatch the process then it will resume the current running process..please correct me if i am wrong.
Ans is d but according me it is wrong if we dispatch the process then it will resume the current running process..please correct me if i am wrong.
4.5k
views
commented
Nov 6, 2016
Operating System
operating-system
+
–
1
answer
10
TestBook Test Series: Computer Networks - Flow Control Methods
Two station A and B are connected via a point to point Link.A sends a freame to B using Go back-n protocolwith window size 7 and sequence number is of 3 bit.A sends frame one by one but B's ack for frame 3 is not reached ... ACK4,but frame 5 is lost and not received by B..so now what will be the buffer frame of current window of A?
Two station A and B are connected via a point to point Link.A sends a freame to B using Go back-n protocolwith window size 7 and sequence number is of 3 bit.A sends frame...
845
views
commented
Nov 5, 2016
Computer Networks
testbook-test-series
computer-networks
flow-control-methods
go-back-n
+
–
2
answers
11
.........
239
views
answer edited
Nov 5, 2016
1
answer
12
..........
237
views
answered
Nov 5, 2016
1
answer
13
.........
180
views
answered
Nov 5, 2016
1
answer
14
many cpu sharing same memory
190
views
answered
Nov 4, 2016
1
answer
15
ethernet physical address
211
views
answered
Nov 4, 2016
2
answers
16
MADE EASY TEST SERIES
A simple network consist of two nodes X and Y. Each node has a single frame of F = 1500 bits (including all header and preambles) to send to each other. Both nodes attempt to transmit at t = 0'. In case that a node executes the exponential Back-off algorithm. In ... 1 and Y draws k = 2. The time taken by X's packet (from t = 0) to be completely delivered toY is ________ μs.
A simple network consist of two nodes X and Y. Each node has a single frame of F = 1500 bits (including all header and preambles) to send to each other. Both nodes attemp...
2.0k
views
answered
Nov 4, 2016
Computer Networks
back-off-delay
+
–
5
answers
17
SCHEDULING
i am getting answer as 6....to calculate waiting time i have removed CPU time used by the process (BT) from total time spend inside(TAT)....not included I/O time(i think I/O is also included in waiting time)..is it correct? Three processors P,Q,R are started at times 0 ,2 ,3 ... TC2 P 0 2 1 5 3 Q 2 3(L) 3 3 1 R 3 1(H) 2 3 1 What is the average waiting time (in milliseconds) ?
i am getting answer as 6....to calculate waiting time i have removed CPU time used by the process (BT) from total time spend inside(TAT)....not included I/O time(i think ...
5.2k
views
commented
Oct 19, 2016
7
answers
18
GATE CSE 2006 | Question: 68
Consider the relation enrolled (student, course) in which (student, course) is the primary key, and the relation paid (student, amount) where student is the primary key. Assume no null values and no foreign keys or integrity constraints. ... strictly fewer rows than Query$2$ There exist databases for which Query$4$ will encounter an integrity violation at runtime
Consider the relation enrolled (student, course) in which (student, course) is the primary key, and the relation paid (student, amount) where student is the primary key. ...
20.6k
views
commented
Oct 1, 2016
Databases
gatecse-2006
databases
sql
normal
+
–
2
answers
19
toc -recuresively ennumerable
Let L be a regular language, and R be a turing recognizable language but not acceptable language. Which of the following is possible? a) Set of strings common in L and R' can be in not RE(where ' is a complement operation) b)Set of strings common in L and R' can be recursive. 1) only a 2)only b 3) both 4) none
Let L be a regular language, and R be a turing recognizable language but not acceptable language. Which of the following is possible?a) Set of strings common in L and R' ...
1.0k
views
answer edited
Aug 5, 2016
Theory of Computation
recursive-and-recursively-enumerable-languages
theory-of-computation
+
–
2
answers
20
overhead of maintaining page-table
consider a system using 3-level page-table where it uses first 2 bit to index into first level page-table, 9 bit to index into second level page table , 9 bit to index into third level page-table. processor uses 36 bit physical address and 32 bit virtual address . each page-table entry is of size 4 bytes. calculate total overhead for the page-table ?
consider a system using 3-level page-table where it uses first 2 bit to index into first level page-table, 9 bit to index into second level page table , 9 bit to index in...
2.6k
views
commented
Aug 1, 2016
Operating System
memory-management
+
–
2
answers
21
UGC NET CSE | June 2013 | Part 3 | Question: 47
Match the following: a. Foreign keys i. Domain constraint b. Private key ii. Referential integrity c. Event control action model iii. Encryption d. Data security iv. Trigger a-iii, b-ii, c-i, d-iv a-ii, b-i, c-iv, d-iii a-iii, b-iv, c-i, d-ii a-i, b-ii, c-iii, d-iv
Match the following:a. Foreign keysi. Domain constraintb. Private keyii. Referential integrityc. Event control action modeliii. Encryptiond. Data securityiv. Triggera-iii...
1.9k
views
comment edited
Jul 17, 2016
Databases
ugcnetcse-june2013-paper3
databases
+
–
2
answers
22
UGC NET CSE | June 2013 | Part 3 | Question: 40
The statements s1 and s2 are given as: s1: Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism. s2: Context sensitive languages are closed under concatenation, substitution and homomorphism. Which of ... correct s2 is not correct s1 is not correct s2 is correct Both s1 and s2 are not correct
The statements s1 and s2 are given as:s1: Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism.s2: Context sens...
2.5k
views
answered
Jul 17, 2016
Theory of Computation
ugcnetcse-june2013-paper3
theory-of-computation
+
–
1
answer
23
Madeeasy
Suppose DMA is employed in two modes 1)Cycle Steaking Mode 2)Burst Mode Transfer of bus control from CPU to I/O or I/O to CPU takes 300ns. Assume the system in which bus cycle takes 700ns and one of the I/O device has a data transfer rate of 50KB/sec and employs DMA ... 1) & (2) (1)Cycle Stealing Mode Options a.100us b.110us c.120us d.130us (2)Burst Mode Options a.1msec b.2msec c.3msec
Suppose DMA is employed in two modes1)Cycle Steaking Mode2)Burst ModeTransfer of bus control from CPU to I/O or I/O to CPU takes 300ns. Assume the system in which bus cyc...
3.8k
views
commented
Jul 1, 2016
CO and Architecture
co-and-architecture
dma
io-organization
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register