Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by vamsi2376
2
votes
1
Error control in data link layer
Is there any restriction on CRC value like can it be equal to 0?
Is there any restriction on CRC value like can it be equal to 0?
358
views
answered
Jul 11, 2017
4
votes
2
miss penalty
what is difference between miss rate and miss penalty.?? how to get both numerically?
what is difference between miss rate and miss penalty.??how to get both numerically?
686
views
answered
Jul 11, 2017
0
votes
3
Csma/Cd
We know that transmission time Tx=L/B where L is the frame size and B is the bandwidth. In Csma/Cd, in order to find out the min frame size L, we equate it with the bandwidth delay product and obtain the formula L=BR(R is the round trip time). R=L/B R=2Tp ... 2B) How is this possible that the Tx and R has the same formula and Tp becomes the function of L and B? Please clear me this thing .
We know that transmission time Tx=L/B where L is the frame size and B is the bandwidth.In Csma/Cd, in order to find out the min frame size L, we equate it with the bandwi...
1.8k
views
answered
Jul 11, 2017
1
votes
4
regular expression
The length of the shortest string NOT in the language (over Σ = {a, b}) of the following regular expression is ______________. a*b*(ba)*a* A 2 B 3 C 4 D 5
The length of the shortest string NOT in the language (over Σ = {a, b}) of the following regular expression is ______________.a*b*(ba)*a*A2B3C4D5
683
views
answered
Jun 26, 2017
Theory of Computation
theory-of-computation
+
–
3
votes
5
Subnetting concept and Masking
How many subnets & hosts per subnet are possible if m bits are borrowed from host ID (HID). a) 2^m,2^(HID-m)-2 b)2^m,2^(HID-m) c)2^m-2,2^(HID-m)-2 d)2^m-2,2^(HID-m). The number of subnets will be 2^m but confused with number of hosts per subnet why.
How many subnets & hosts per subnet are possible if m bits are borrowed from host ID (HID).a) 2^m,2^(HID-m)-2b)2^m,2^(HID-m)c)2^m-2,2^(HID-m)-2d)2^m-2,2^(HID-m).The numbe...
839
views
answered
Jan 28, 2017
Computer Networks
subnetting
+
–
1
votes
6
MadeEasy Subject Test: Theory of Computation - Regular Languages
Why (a) is not a regular language?
Why (a) is not a regular language?
442
views
answered
Jan 6, 2017
Theory of Computation
made-easy-test-series
theory-of-computation
regular-language
+
–
0
votes
7
Operating System
512
views
answered
Nov 24, 2016
15
votes
8
GATE CSE 1990 | Question: 4-i
State whether the following statements are TRUE or FALSE with reason: RAM is a combinational circuit and PLA is a sequential circuit.
State whether the following statements are TRUE or FALSE with reason:RAM is a combinational circuit and PLA is a sequential circuit.
5.7k
views
answered
Nov 23, 2016
Digital Logic
gate1990
true-false
digital-logic
ram
pla
+
–
1
votes
9
#virtual gate
Q.How many possible finite automata are ther with two states x and y , where x is always initial state with alphabet a and b, that accept everthing?? plz explain??
Q.How many possible finite automata are ther with two states x and y , where x is always initial state with alphabet a and b, that accept everthing?? plz explain??
490
views
answered
Nov 23, 2016
0
votes
10
Ace Test Series: Computer Networks - Tcp
1st seq number is 1093, 2ns seq is 1094, ... 1460th seq number will be 2552. So the ack number sent by the reciever will be 2552+1=2553. Is this right? Answer in solution given is 2554.
1st seq number is 1093,2ns seq is 1094,... 1460th seq number will be 2552. So the ack number sent by the reciever will be 2552+1=2553.Is this right?Answer in solution giv...
676
views
answered
Nov 23, 2016
Computer Networks
ace-test-series
computer-networks
tcp
+
–
1
votes
11
Heapsort
Suppose we are sorting an array of eight integers using heapsort, and we have just finished some heapify (either maxheapify or minheapify) operations. The array now looks like this: 16 14 15 10 12 27 28 How many heapify operations have been performed on root of heap?
Suppose we are sorting an array of eight integers using heapsort, and we have just finished some heapify (either maxheapify or minheapify) operations. The array now looks...
4.2k
views
answered
Nov 23, 2016
DS
heap-sort
+
–
2
votes
12
CMI2015-A-03
Suppose each edge of an undirected graph is coloured using one of three colours - red, blue or green. Consider the following property of such graphs: if any vertex is the endpoint of a red coloured edge, then it is either an endpoint of a blue coloured edge or not ... endpoint of any blue coloured edge but is an endpoint of a green coloured edge and a red coloured edge. (A) and (C).
Suppose each edge of an undirected graph is coloured using one of three colours — red, blue or green. Consider the following property of such graphs: if any vertex is t...
594
views
answered
Nov 14, 2016
Graph Theory
cmi2015
graph-theory
graph-coloring
+
–
1
votes
13
Find the no of hits and misses in a 4-blocked cache For the LIFO policy
, if the sequence of blocks refered by cpu is given as 1,3,5,6,7,1,5,4.
, if the sequence of blocks refered by cpu is given as 1,3,5,6,7,1,5,4.
792
views
answered
Nov 10, 2016
CO and Architecture
co-and-architecture
+
–
1
votes
14
In a two level hierarchy if the top level has an access time of 8ns and the bottom level has an access time of 60 ns.
In a two level hierarchy if the top level has an access time of 8ns and the bottom level has an access time of 60 ns. What is the hit ratio in top level required to give ...
3.0k
views
answered
Nov 10, 2016
CO and Architecture
co-and-architecture
cache-memory
hit-ratio
+
–
0
votes
15
CD Doubt:
Please Provide valid explanation in support of your answer.
Please Provide valid explanation in support of your answer.
696
views
answered
Nov 9, 2016
Compiler Design
compiler-design
syntax-directed-translation
descriptive
test-series
+
–
0
votes
16
MADE EASY TEST SERIES
Consider a clocked sequential circuit as shown in the figure below. Assuming initial state to be Q1 Q0 = 00 For an input sequence X = 1010, the respective output sequence will be _______.
Consider a clocked sequential circuit as shown in the figure below. Assuming initial state to be Q1 Q0 = 00For an input sequence X = 1010, the respective output sequence ...
2.3k
views
answered
Nov 8, 2016
1
votes
17
ISRO2016-70
Which network protocol allows hosts to dynamically get a unique IP number on each bootup DHCP BOOTP RARP ARP
Which network protocol allows hosts to dynamically get a unique IP number on each bootupDHCPBOOTPRARPARP
4.6k
views
answered
Jul 3, 2016
Computer Networks
isro2016
computer-networks
network-protocols
+
–
14
votes
18
ISRO2011-38
A fast wide SCSI-II disk drive spins at 7200 RPM, has a sector size of 512 bytes, and holds 160 sectors per track. Estimate the sustained transfer rate of this drive 576000 Kilobytes / sec 9600 Kilobytes / sec 4800 Kilobytes / sec 19200 Kilobytes / sec
A fast wide SCSI-II disk drive spins at 7200 RPM, has a sector size of 512 bytes, and holds 160 sectors per track. Estimate the sustained transfer rate of this drive57600...
4.7k
views
answered
Jun 27, 2016
Operating System
isro2011
operating-system
disk
+
–
–2
votes
19
GATE CSE 1991 | Question: 17,b
Let $L$ be the language of all binary strings in which the third symbol from the right is a $1$. Give a non-deterministic finite automaton that recognizes $L$. How many states does the minimized equivalent deterministic finite automaton have? Justify your answer briefly?
Let $L$ be the language of all binary strings in which the third symbol from the right is a $1$. Give a non-deterministic finite automaton that recognizes $L$. How many s...
13.6k
views
answered
Jun 22, 2016
Theory of Computation
gate1991
theory-of-computation
finite-automata
normal
descriptive
+
–
0
votes
20
ISRO2011-32
In which layer of network architecture, the secured socket layer (SSL) is used? physical layer session layer application layer presentation layer
In which layer of network architecture, the secured socket layer (SSL) is used?physical layersession layerapplication layerpresentation layer
6.5k
views
answered
Jun 17, 2016
Computer Networks
isro2011
computer-networks
network-security
network-layering
+
–
0
votes
21
isro 2015 set c
Q An ACK number of 1000 in TCP always means that option a) 999 bytes have been successfully received. b) 1000 bytes have been successfully received. c) 1001 bytes have been successfully received. d) none of the above
Q An ACK number of 1000 in TCP always means thatoption a) 999 bytes have been successfully received.b) 1000 bytes have been successfully received.c) 1001 bytes have be...
478
views
answered
Jun 17, 2016
1
votes
22
Peterson Davie 3.23
Suppose a bridge has two of its ports on the same network. How might the bridge detect and correct this?
Suppose a bridge has two of its ports on the same network. How might the bridge detect and correct this?
971
views
answered
Jun 14, 2016
Computer Networks
peterson-davie
descriptive
+
–
0
votes
23
Peterson Davie 2.35b
Suppose that we run the sliding window algorithm with $SWS = 5$ and $RWS = 3$, and no out-of-order arrivals. (b) Give an example showing that MaxSeqNum -$1$ is not sufficient.
Suppose that we run the sliding window algorithm with $SWS = 5$ and $RWS = 3$, and no out-of-order arrivals.(b) Give an example showing that MaxSeqNum -$1$ is not suffici...
374
views
answered
Jun 14, 2016
Computer Networks
peterson-davie
descriptive
+
–
0
votes
24
Peterson Davie 2.37
Suppose $A$ is connected to $B$ via an intermediate router $R$, as in the previous problem. The $A - R$ link is instantaneous, but the $R - B$ link transmits only one packet each second, one at a time (so two packets take $2$ seconds). Assume $A$ sends to $B$ ... Time = $0,1,2,3,4$, state what packets arrive at and are sent from A and B. How large does the queue at $R$ grow?
Suppose $A$ is connected to $B$ via an intermediate router $R$, as in the previous problem. The $A - R$ link is instantaneous, but the $R - B$ link transmits only one pac...
568
views
answered
Jun 14, 2016
Computer Networks
peterson-davie
+
–
1
votes
25
Peterson Davie 2.39
What kind of problems can arise when two hosts on the same Ethernet share the same hardware address? Describe what happens and why that behavior is a problem.
What kind of problems can arise when two hosts on the same Ethernet share the same hardware address? Describe what happens and why that behavior is a problem.
2.6k
views
answered
Jun 14, 2016
Computer Networks
peterson-davie
descriptive
+
–
0
votes
26
Let bandwidth of a token ring is 4 Mbps
Let bandwidth of a token ring is 4 Mbps and THT be 15ms. What is the maximum frame size and maximum payload size
Let bandwidth of a token ring is 4 Mbps and THT be 15ms. What is the maximum frame sizeand maximum payload size
3.2k
views
answered
Jun 13, 2016
Computer Networks
computer-networks
+
–
0
votes
27
Peterson Davie 3.25
Cell switching methods (like $ATM$) essentially always use virtual circuit switching rather than datagram forwarding. Give a specific argument why this is so (consider the preceding question).
Cell switching methods (like $ATM$) essentially always use virtual circuit switching rather than datagram forwarding. Give a specific argument why this is so (consider th...
333
views
answered
Jun 13, 2016
Computer Networks
peterson-davie
descriptive
+
–
0
votes
28
Peterson Davie 3.26
Suppose a workstation has an $I/O$ bus speed of $800$ Mbps and memory bandwidth of $2$ Gbps. Assuming direct memory access (DMA) is used to move data in and out of main memory, how many interfaces to $100$-Mbps Ethernet links could a switch based on this workstation handle?
Suppose a workstation has an $I/O$ bus speed of $800$ Mbps and memory bandwidth of $2$ Gbps. Assuming direct memory access (DMA) is used to move data in and out of main m...
1.2k
views
answered
Jun 13, 2016
Computer Networks
peterson-davie
descriptive
+
–
0
votes
29
Peterson Davie 3.32b
Suppose a $10$-Mbps Ethernet hub (repeater) is replaced by a $10$-Mbps switch, in an environment where all traffic is between a single server and $N$ "clients." Because all traffic must still traverse the server-switch link, nominally there is no improvement in bandwidth. (b) What other advantages and drawbacks might a switch offer versus a hub?
Suppose a $10$-Mbps Ethernet hub (repeater) is replaced by a $10$-Mbps switch, in an environment where all traffic is between a single server and $N$ "clients." Because a...
945
views
answered
Jun 13, 2016
Computer Networks
peterson-davie
descriptive
+
–
8
votes
30
ISRO-2013-18
How many check bits are required for $16$ bit data word to detect $2$ bit errors and single bit correction using hamming code? $5$ $6$ $7$ $8$
How many check bits are required for $16$ bit data word to detect $2$ bit errors and single bit correction using hamming code?$5$$6$$7$$8$
9.9k
views
answered
Jun 13, 2016
Computer Networks
isro2013
error-detection
+
–
Page:
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register