Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by manisha11
1
votes
1
answer
1
B TRees DBMS Self doubt
In case of B Trees we split a node on insertion in case of overflow, is there any possible case in which this may lead to underflow also? as a key is promoted to parent the children formed may have subtrees, which may be broken such that we get underflow somewhere? just a thought
In case of B Trees we split a node on insertion in case of overflow,is there any possible case in which this may lead to underflow also? as a key is promoted to parent th...
465
views
asked
Jun 7, 2019
Databases
b-tree
+
–
4
votes
4
answers
2
C Program Output and Explaination
void fun(int *p) { int q = 10; p = &q; z } int main() { int r = 20; int *p = &r; fun(p); printf("%d", *p); return 0; }
void fun(int *p) { int q = 10; p = &q; z } int main() { int r = 20; int *p = &r; fun(p); printf("%d", *p); return 0; }
1.6k
views
asked
May 30, 2019
Programming in C
programming-in-c
+
–
1
votes
1
answer
3
pda self doubt
The language accepted by a DPDA with a final state is more compared to the DPDA with empty stack. DPDA with empty stack accepts LR(0) grammar. Can someone explain in depth/or give good reference links?
The language accepted by a DPDA with a final state is more compared to the DPDA with empty stack.DPDA with empty stack accepts LR(0) grammar.Can someone explain in depth/...
625
views
asked
May 13, 2019
Theory of Computation
pushdown-automata
pushdown-automata
+
–
0
votes
1
answer
4
self doubt dfa
Given an algorithm to tell whether a regular language L contains at least 100 strings
Given an algorithm to tell whether a regular languageL contains at least 100 strings
413
views
asked
May 12, 2019
Theory of Computation
theory-of-computation
+
–
0
votes
0
answers
5
Operating system swapping process
Please help me explaining this in simpler words: If we were to swap out process P1 and swap in process P2, the I/O operation might then attempt to use memory that now belongs to process P2. There are two main solutions to this ... system buffers and process memory then occur only when the process is swapped in. Note that this double buffering itself adds overhead.
Please help me explaining this in simpler words:If we were to swap out process P1 and swap in process P2, theI/O operation might then attempt to use memory that now belon...
808
views
asked
May 9, 2019
Operating System
operating-system
process-scheduling
+
–
0
votes
3
answers
6
Self Doubt CPU
In Multi-processing Operating Systems: (a) Maximum utilization of CPU can be achieved (b) Maximum throughput is achieved (c) Maximum security can be achieved (d) Not suitable for Real time Applications
In Multi-processing Operating Systems:(a) Maximum utilization of CPU can be achieved(b) Maximum throughput is achieved(c) Maximum security can be achieved(d) Not suitable...
1.3k
views
asked
May 7, 2019
Operating System
process-scheduling
operating-system
+
–
0
votes
0
answers
7
turing machine self doubt a+b=c
Turing machine, language A = {a+b=c | a, b, c are sequences of 1's; |c| = |a| + |b|; |a| >= 0 and |b| > 0}.
Turing machine,language A = {a+b=c | a, b, c are sequences of 1's; |c| = |a| + |b|; |a| >= 0 and |b| 0}.
270
views
asked
Apr 27, 2019
Theory of Computation
theory-of-computation
self-doubt
+
–
0
votes
0
answers
8
selfdoubt
Show how to do the following statement c = a[2] + b[0] a) using register direct, imm, register indirect b) using register direct, imm, absolute addressing c) using register direct, imm, register indirect with displacement
Show how to do the following statement c = a + b[0]a) using register direct, imm, register indirectb) using register direct, imm, absolute addressingc) using register di...
323
views
asked
Mar 12, 2019
CO and Architecture
co-and-architecture
addressing-modes
register-allocation
+
–
0
votes
0
answers
9
selfdoubt
Show this by following ways : c = a[2] + b[0] a) using register direct, imm, register indirect b) using register direct, imm, absolute addressing c) using register direct, imm, register indirect with displacement
Show this by following ways : c = a + b[0]a) using register direct, imm, register indirectb) using register direct, imm, absolute addressingc) using register direct, imm...
63
views
asked
Mar 12, 2019
CO and Architecture
gb2019-gt-coa
+
–
0
votes
0
answers
10
Computer Network
(Public Key Notation) Alice and Bob are spouses and each making their own wills. They want to send a copy to their attorney Charlie that only Charlie can read and that shows Alice’s will signed by Alice and seen by Bob and Bob’s will signed by Bob and seen by Alice. Using the notation in the slides. What would be the notation of a message that accomplishes this task?
(Public Key Notation) Alice and Bob are spouses and each making their own wills. They want to send a copy to their attorney Charlie that only Charlie can read and that sh...
545
views
asked
Feb 23, 2019
Computer Networks
computer-networks
+
–
1
votes
0
answers
11
computer network
A Go-Back-5 ARQ scheme is employed on a 200 meters cable between two nodes A and B to send frames of size 10,000 bits with bit rate 1 Mbps and bit error probability of 10$^{-5}$. Headers and acknowledgements are 20 bytes each. The Speed of ... (except for the cable length), what is the maximum distance between the two nodes for which S&W will be as efficient as a GBN.
A Go-Back-5 ARQ scheme is employed on a 200 meters cable between two nodes A and B to send frames of size 10,000 bits with bit rate 1 Mbps and bit error probability of 10...
905
views
asked
Feb 23, 2019
Computer Networks
computer-networks
sliding-window
go-back-n
+
–
0
votes
1
answer
12
Computer Networks
Assume a 10Mbps Ethernet has two nodes, A and B, connected by a 360m cable with three repeaters in between, and they each have one frame of 1,024 bits to send to each other. Further assume that the signal propagation speed across the cable is 2*10^8 m ... an 8-bit processing delay in addition to a store-and-forward delay. At what time, in seconds, is A's packet delivered at B
Assume a 10Mbps Ethernet has two nodes, A and B, connected by a 360m cable with three repeaters in between, and they each have one frame of 1,024 bits to send to each oth...
1.6k
views
asked
Feb 23, 2019
Computer Networks
computer-networks
+
–
0
votes
0
answers
13
Digital
229
views
asked
Feb 22, 2019
Digital Logic
digital-logic
+
–
0
votes
0
answers
14
DLD cse
397
views
asked
Feb 22, 2019
Digital Logic
digital-logic
+
–
0
votes
1
answer
15
Computer Network
20 Gbps link each user using 5Gbps when active<20% time the user is active> Max. users that the network can be used by? Using circuit switching?
20 Gbps link each user using 5Gbps when active<20% time the user is active>Max. users that the network can be used by?Using circuit switching?
615
views
asked
Feb 20, 2019
Computer Networks
computer-networks
+
–
0
votes
0
answers
16
gate 2019
Value of Z, for SRTF ques? So that WT avg is 1ms?
Value of Z, for SRTF ques?So that WT avg is 1ms?
725
views
asked
Feb 4, 2019
Operating System
usergate2019
usermod
+
–
0
votes
0
answers
17
Self Doubt
What does additional memory for tags refer to in Direct Mapping, Associative Mapping and Set- Associative Mapping?
What does additional memory for tags refer to in Direct Mapping, Associative Mapping and Set- Associative Mapping?
215
views
asked
Jan 5, 2019
CO and Architecture
co-and-architecture
cache-memory
direct-mapping
+
–
0
votes
1
answer
18
self doubt
$\lim_{x\rightarrow \frac{\pi }{2}}cosx^{cosx}$ can we straight away say $0^{0}=0$ ?
$\lim_{x\rightarrow \frac{\pi }{2}}cosx^{cosx}$can we straight away say $0^{0}=0$ ?
390
views
asked
Jan 5, 2019
Calculus
calculus
+
–
0
votes
0
answers
19
self doubt
If A = {1,2,3 …. n} then how many multisets of size 4 are possible ,such that atleast of the elements appears twice.
If A = {1,2,3 …. n}then how many multisets of size 4 are possible ,such that atleast of the elements appears twice.
314
views
asked
Jan 2, 2019
Mathematical Logic
graph-theory
+
–
0
votes
0
answers
20
self doubt
In an undirected graph a self loop counts to how many edges? I read somewhere that in case of undirected graph we consider self loop to have 2 edges?
In an undirected graph a self loop counts to how many edges?I read somewhere that in case of undirected graph we consider self loop to have 2 edges?
275
views
asked
Jan 2, 2019
Mathematical Logic
maths
+
–
Page:
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register