1 votes
3
In which segment of memory layout the information about dynamic linked libraries is stored?
3 votes
6
Hash a list of $3$ keys into hash table with $20$ locations. What will be the probability of the event $A$ in which hashing the three keys causes a collision?$0.123$$0.14...
2 votes
8
A and B are two sets. If |A| = 5 , |B| = 3 , then, the number of onto functions from A to B are ___ ?(A) 35(B) 150(C) 29(D) 27
0 votes
9
L ={$a^nb^k$ | n$\leq$k$\leq$2n} CFL or not??L ={$a^ib^jc^k$ | (i$\leq$j) or (j$\leq$i), j=k} CFL or not??
0 votes
10
Implement Longest Increasing Subsequence with the help of 1-D array for dynamic programming. (Hint : MaxTill 1-D array)
0 votes
11
In almost every chapter of Moris Mano, I come across this hdl(hardware description language). Is it in the syllabus for 2017?Also, chapter 6 of Moris Mano 6th edition is ...
1 votes
12
if initially given that sender send 2mssThen how slow start will it be2mss,4mss,8mss,........And conestion avoidence will be increament by +2 each time or +1.Please sugge...
0 votes
13
what is true about binary semaphore?1)Binary semaphore has drawback called busy wait or spin lock.2)Binary semaphore is applicable only for two processes3)Binary semaphor...
0 votes
14
Up(Semaphore S) { if (Suspended list() is empty) S.value=1; else { Select a process from the suspended list and WakeUp() } }
1 votes
15
A ternary searh searches an ordered list for given element by sucessively dividing the list into third and determining in which third the element must be lie.the compexit...
1 votes
16
Which of the following is true about $z$-buffer algorithm?It is a depth sort algorithmNo limitation on total number of objectsComparisons of objects is done$z$-buffer is ...
0 votes
17
What is the primary purpose of a VLAN?Demonstrating the proper layout for a networkSimulating a networkTo create a virtual private networkSegmenting a network inside a sw...
0 votes
18
There are three processes in the ready queue. When the currently running process requests for I/O how many process switches take place?1234
0 votes
20
Assume that $16$-bit CPU is trying to access a double word stating at an odd address. How many memory operations are required to access the data?$1$$2$$3$$4$
0 votes
22
Semaphores are used to solve the problem ofRace ConditionProcess SynchronizationMutual ExclusionNone of the aboveI and IIII and IIIAll of the aboveNone of the above
7 votes
23
Round Robin schedule is essentially the pre-emptive version ofFIFOShortest job firstShortest remaining timeLongest remaining time
1 votes
25
Please explain why bounded waiting is not satisfied...?