search
Log In

Recent activity by shekhar chauhan

3 answers
1
Assume statements $S_1$ and $S_2$ defined as: $S_1$: $L_2 - L_1$ is recursive enumerable where $L_1$ and $L_2$ are recursive and recursive enumerable respectively. $S_2$: The set of all Turing machines is countable. Which of the following is true? $S_1$ is correct and $S_2$ ... correct Both $S_1$ and $S_2$ are correct Both $S_1$ and $S_2$ are not correct $S_1$ is not correct and $S_2$ is correct
commented Jul 23, 2016 in Theory of Computation 1.5k views
1 answer
2
Given the production rules of a grammar G1 as $S_1 \rightarrow AB \mid aaB$ $A \rightarrow a \mid Aa$ $B \rightarrow b$ and the production rules of a grammar G2 as $S_2 \rightarrow aS_2bS_2 \mid bS_2 aS_2 \mid \lambda$ Which of the following is correct ... is not ambiguous G1 is ambiguous and G2 is ambiguous G1 is not ambiguous and G2 is ambiguous G1 is not ambiguous and G2 is not ambiguous
answer selected Jul 23, 2016 in Compiler Design 1.4k views
3 answers
3
Given the following production of a grammar: $S \rightarrow aA \mid aBB$; $A \rightarrow aaA \mid \lambda$; $B \rightarrow bB \mid bbC$; $C \rightarrow B$ Which of the following is true? The language corresponding to the given grammar is a set of even number of a's ... by odd number of b's The language corresponding to the given grammar is a set of odd number of a's followed by even number of b's
commented Jul 23, 2016 in Theory of Computation 572 views
2 answers
4
A regular grammar for the language $L= \{a^nb^m \mid \text{ n is even and m is even } \}$ is given by $S \rightarrow aSb \mid S_1; S_1 \rightarrow bS_1a \mid \lambda$ $S \rightarrow aaS \mid S_1;S_1 \rightarrow bSb \mid \lambda$ $S \rightarrow aSb \mid S_1;S_1 \rightarrow S_1ab \mid \lambda$ $S \rightarrow aaS \mid S_1;S_1 \rightarrow bbS_1 \mid \lambda$
answered Jul 22, 2016 in Theory of Computation 1.2k views
1 answer
5
Which of the following conditions does not hold good for a solution to a critical section problem ? No assumptions may be made about speeds or the number of $CPU$'s. No two processes may be simultaneously inside their critical sections. Processes running outside its critical section may block other processes. Processes do not wait forever to enter its critical section.
answered Jul 22, 2016 in Operating System 892 views
1 answer
6
Consider the following justifications for commonly using the two-level $CPU$ scheduling: I. It is used when memory is too small to hold all the ready processes. II. Because its performance is same as that of the $FIFO$. III. Because it facilitates putting some set of processes into memory and a choice ... Which of the following is true ? $I, III$ and $IV$ $I$ and $II$ $III$ and $IV$ $I$ and $III$
answered Jul 22, 2016 in Operating System 306 views
6 answers
7
The following Context-Free Grammar (CFG) : $S \rightarrow aB | bA$ $A \rightarrow a | as | bAA$ $B \rightarrow b | bs | aBB$ will generate Odd numbers of $a's$ and odd numbers of $b's$ Even numbers of $a's$ and even numbers of $b's$ Equal numbers of $a's$ and $b's$ Different numbers of $a's$ and $b's$
answered Jul 22, 2016 in Theory of Computation 923 views
1 answer
8
Debugger is a program that Allows to examine and modify the contents of registers Does not allow execution of a segment of program Allows to set breakpoints, execute a segment of program and display contents of register All of the above
answered Jul 22, 2016 in Others 1.1k views
1 answer
9
In a two-pass assembler, symbol table is Generated in first pass Generated in second pass Not generated at all Generated and used only in second pass
answered Jul 22, 2016 in Compiler Design 1.4k views
1 answer
10
Which of the following is true ? Canonical $LR$ parser is $LR (1)$ parser with single look ahead terminal All $LR(K)$ parsers with $K > 1$ can be transformed into $LR(1)$ parsers. Both $(A)$ and $(B)$ None of the above
answered Jul 22, 2016 in Compiler Design 828 views
2 answers
12
Given the IP address 201.14.78.65 and the subset mask 255.255.255.224. What is the subset address? 201.14.78.32 201.14.78.64 201.14.78.65 201.14.78.224
answered Jul 22, 2016 in Computer Networks 3k views
3 answers
13
Match the following: ... a-iii, b-iv, c-ii, d-i a-iv, b-iii, c-ii, d-i a-iv, b-iii, c-i, d-ii a-iii, b-iv, c-i, d-ii
answered Jul 22, 2016 in Computer Networks 714 views
2 answers
14
a. Dangling pointer i. Buffer replacement policy b. Page fault ii. Variable-length records c. List representation iii. Object identifier d. Toss-immediate iv. Pointer-swizzling a-iii, b-iv, c-ii, d-i a-iv, b-iii, c-ii, d-i a-iv, b-iii, c-i, d-ii a-iii, b-iv, c-i, d-ii
answered Jul 22, 2016 in Operating System 571 views
4 answers
15
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged? TCP header length Window size Acknowledgement number Urgent pointer
commented Jul 22, 2016 in Computer Networks 1.2k views
2 answers
16
Which of the following is the size of Network bits and Host bits of Class A of IP address? Network bits 7, Host bits 24 Network bits 14, Host bits 16 Network bits 15, Host bits 16 Network bits 16, Host bits 16
answered Jul 22, 2016 in Computer Networks 2.1k views
2 answers
17
Convert the following infix expression into its equivalent post fix expression $ (A + B$^$ D) / (E – F) + G $ $ABD$^ $+EF – / G+$ $ABD + $^$EF – / G+$ $ABD +$ ^$EF / – G+$ $ABD$^ $+ EF / – G+$
commented Jul 21, 2016 in DS 2.5k views
2 answers
18
2 answers
19
The decision tree classifier is a widely used technique for Classification Association Partition Clustering
answered Jul 21, 2016 in Data Mining and Warehousing 658 views
2 answers
20
Cross_tab displays permit users to view ____ of multidimensional data at a time. One dimension Two dimensions Three dimensions Multidimensions
answered Jul 21, 2016 in Databases 680 views
2 answers
21
3 answers
22
Match the following: List-I Process state transition List-II Reason for transition a. Ready $\rightarrow$ Running i. Request made by the process is satisfied or an event for which it was waiting occurs b. Blocked $\rightarrow$ Ready ii. Process wishes to wait for some action by another process c. Running $\rightarrow$ ... d-iv a-iv, b-i, c-iii, d-ii a-iv, b-iii, c-i, d-ii a-iii, b-iv, c-ii, d-i
answered Jul 21, 2016 in Operating System 548 views
2 answers
23
The directory can be viewed as _______ that translates filenames into their directory entries. Symbol table Partition Swap space Cache
answered Jul 21, 2016 in Operating System 1.5k views
2 answers
24
A full binary tree with $n$ leaves contains $n$ nodes $\log_{2} n$ nodes $2n –1$ nodes $2^{n}$ nodes
answered Jul 21, 2016 in Algorithms 436 views
3 answers
25
Which of the following algorithms is not a broadcast routing algorithm ? Flooding Multidestination routing Reverse path forwarding All of the above
commented Jul 21, 2016 in Computer Networks 2.2k views
2 answers
26
In a classful addressing, first four bits in Class $A$ IP address is $1010$ $1100$ $1011$ $1110$
answered Jul 21, 2016 in Computer Networks 2.7k views
1 answer
28
(A) checksum (B) even parity mechanism (C) CRC (D) odd parity mechanism.
commented Jul 21, 2016 in Computer Networks 498 views
4 answers
29
What is the routing algorithm used by RIP and IGRP? OSPF Link-state Dynamic Dijikstra vector
commented Jul 21, 2016 in Computer Networks 2k views
1 answer
30
Consider an array has 100 elements and each element occupies 4 words .A 32 bit word cache is used and divided into a block of 8 words .What is the hit rate of this for(i=0; i<10; i++) for(j=0; j<10; j++); A[i][j] = A[i][j]+10; Column major is used here. How to improve Hit rate ?
answer selected Jul 21, 2016 in CO and Architecture 933 views
...