Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by vijju
3
answers
1
GATE CSE 2003 | Question: 85
Consider the following functional dependencies in a database. ... is in second normal form but not in third normal form in third normal form but not in BCNF in BCNF in none of the above
Consider the following functional dependencies in a database.$$\begin{array}{|l|l|}\hline \text{Date_of_Birth } \to \text{Age} & \text{Age } \to \text{Eligibility} \\\hli...
15.0k
views
answered
Oct 6, 2016
Databases
gatecse-2003
databases
database-normalization
normal
+
–
11
answers
2
GATE CSE 1999 | Question: 2.7, UGCNET-June2014-III: 25
Consider the schema $R=(S,T, U, V)$ and the dependencies $S \rightarrow T, T \rightarrow U, U \rightarrow V$ and $V \rightarrow S$. Let $R = (R1\text{ and } R2)$ be a decomposition such that $R1 \cap R2 \neq \phi$. The decomposition ... but not $\textsf{3NF}$ in $\textsf{3NF}$ but not in $\textsf{2NF}$ in both $\textsf{2NF}$ and $\textsf{3NF}$
Consider the schema $R=(S,T, U, V)$ and the dependencies $S \rightarrow T, T \rightarrow U, U \rightarrow V$ and $V \rightarrow S$. Let $R = (R1\text{ and } R2)$ be a dec...
27.4k
views
answered
Oct 6, 2016
Databases
gate1999
databases
database-normalization
normal
ugcnetjune2014iii
+
–
4
answers
3
GATE CSE 1994 | Question: 3.6
State True or False with reason There is always a decomposition into Boyce-Codd normal form (BCNF) that is lossless and dependency preserving.
State True or False with reasonThere is always a decomposition into Boyce-Codd normal form (BCNF) that is lossless and dependency preserving.
6.6k
views
answered
Oct 6, 2016
Databases
gate1994
databases
database-normalization
easy
true-false
+
–
5
answers
4
GATE CSE 2013 | Question: 55
Relation $R$ has eight attributes $\text{ABCDEFGH}$. Fields of $R$ contain only atomic values. $F = \text{{CH $\rightarrow$ G, A $\rightarrow$ BC, B $\rightarrow$ CFH, E $\rightarrow$ A, F $\rightarrow$ EG}}$ is a set of functional dependencies $(FDs)$ ... in $\text{2NF}$, but not in $\text{3NF}$. in $\text{3NF}$, but not in $\text{BCNF}$. in $\text{BCNF}$.
Relation $R$ has eight attributes $\text{ABCDEFGH}$. Fields of $R$ contain only atomic values. $F = \text{{CH $\rightarrow$ G, A $\rightarrow$ BC, B $\rightarrow$ CFH, E ...
14.7k
views
answered
Oct 6, 2016
Databases
gatecse-2013
databases
database-normalization
normal
+
–
10
answers
5
GATE CSE 2012 | Question: 10
The protocol data unit (PDU) for the application layer in the Internet stack is: Segment Datagram Message Frame
The protocol data unit (PDU) for the application layer in the Internet stack is:SegmentDatagramMessageFrame
28.1k
views
answered
Sep 28, 2016
Computer Networks
gatecse-2012
computer-networks
application-layer-protocols
easy
+
–
2
answers
6
computer networks
Assume that "host1.mydomain.dom" has an IP address of 145.128.16.8. Which of the following options would be most appropriate as a subsequence of steps in performing the reverse lookup of 145.128.16.8? In the following options "NS" is an ... in-addr.arpa domains D Directly query a NS for 145.in-addr.arpa and then a NS for 128.145.in-addr.arpa domains
Assume that "host1.mydomain.dom" has an IP address of 145.128.16.8. Which of the following options would be most appropriate as a subsequence of steps in performing the r...
694
views
answered
Sep 28, 2016
Computer Networks
application
application-layer-protocols
+
–
3
answers
7
UGC NET CSE | December 2012 | Part 2 | Question: 9
If a packet arrive with M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is ____ fragement. First Middle Last All of the above
If a packet arrive with M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is ____ fragement.FirstMiddleLastAll of the above
7.5k
views
answered
Sep 28, 2016
Computer Networks
ugcnetcse-dec2012-paper2
computer-networks
ip-packet
+
–
6
answers
8
GATE IT 2004 | Question: 86
In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? Fragment Offset Source IP address Destination IP address Destination port number
In the TCP/IP protocol suite, which one of the following is NOT part of the IP header?Fragment OffsetSource IP addressDestination IP addressDestination port number
6.2k
views
answered
Sep 28, 2016
Computer Networks
gateit-2004
computer-networks
ip-packet
normal
+
–
3
answers
9
TCP & UDP
1.2k
views
answered
Sep 27, 2016
Computer Networks
computer-networks
tcp
+
–
4
answers
10
Question on congestion window and slow start of TCP
Given solution: I couldn't understand from reaching 1KB to 16KB why it took 50ms not 40ms. Please check
Given solution:I couldn't understand from reaching 1KB to 16KB why it took 50ms not 40ms. Please check
2.0k
views
answered
Sep 27, 2016
Computer Networks
computer-networks
congestion-control
tcp
+
–
4
answers
11
MadeEasy Test Series: Computer Networks - Congestion Control
Q).Suppose that TCP congestion window is set to $28 \text{KB}$ and time-out occurs.The window size after the next six successful transmission bursts (Assume maximum segment size is $2 \text{KB}$ and TCP uses congestion avoidance) is _______(in KB)
Q).Suppose that TCP congestion window is set to $28 \text{KB}$ and time-out occurs.The window size after the next six successful transmission bursts (Assume maximum segme...
2.7k
views
answered
Sep 27, 2016
Computer Networks
made-easy-test-series
computer-networks
congestion-control
+
–
5
answers
12
MadeEasy Test Series: Computer Networks - Congestion Control
Initially (as slow start ) full window 12MSS cwnd = 1MSS ssthresh = 6MSS 1MSS sent after 1st RTT -> cwnd = 2 , and so on subsequent RTT -> 4 , 5 ,6, 7, 8,9,10,11,12 so 11RTT so answer should be 110ms but none of the option matches
Initially (as slow start )full window 12MSScwnd = 1MSSssthresh = 6MSS1MSS sent after 1st RTT - cwnd = 2 ,and so on subsequent RTT - 4 , 5 ,6, 7, 8,9,10,11,12so 11RTTso an...
1.6k
views
answered
Sep 27, 2016
Computer Networks
made-easy-test-series
computer-networks
congestion-control
+
–
6
answers
13
Size of senders window ?
Consider a TCP connection using the slow start congestion control scheme with an initial threshold value of 64 kB and a Maximum Segment Size (MSS) of 2 kB. The receiver’s advertised window is initially 32 kB. The first transmission ... timeouts on attempt number 4. Which of the following represents size of sender’s congestion window at attempt number 10?
Consider a TCP connection using the slow start congestion control scheme with an initial threshold value of 64 kB and a Maximum Segment Size (MSS) of 2 kB. The receiver&r...
2.6k
views
answered
Sep 27, 2016
Computer Networks
tcp
computer-networks
+
–
6
answers
14
ISRO2008-8
The TCP sliding window can be used to control the flow of information always occurs when the field value is $0$ always occurs when the field value is $1$ occurs horizontally
The TCP sliding windowcan be used to control the flow of informationalways occurs when the field value is $0$always occurs when the field value is $1$occurs horizontally
4.5k
views
answered
Sep 27, 2016
Computer Networks
isro2008
computer-networks
tcp
sliding-window
+
–
6
answers
15
ISRO2015-50
How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communication with the host? $16$ bits $32$ bits $48$ bits $64$ bits
How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communication with the host?$16$ bits$32$ bits$48$ bits$64$ bits
4.7k
views
answered
Sep 27, 2016
Computer Networks
isro2015
computer-networks
tcp
+
–
3
answers
16
ISRO2014-60
Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? $\textsf{UDP, 80}$ $\textsf{TCP, 80}$ $\textsf{TCP, 25}$ $\textsf{UDP, 25}$
Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used?...
4.0k
views
answered
Sep 27, 2016
Computer Networks
isro2014
computer-networks
tcp
+
–
4
answers
17
UGC NET CSE | September 2013 | Part 3 | Question: 9
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged? TCP header length Window size Acknowledgement number Urgent pointer
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged?TCP header lengthWindow sizeAcknowledgement numberUrgent...
2.5k
views
answered
Sep 27, 2016
Computer Networks
ugcnetcse-sep2013-paper3
computer-networks
tcp
+
–
3
answers
18
Gateforum Correspondence Course ( Page# 181, Q# 31)
601
views
answered
Sep 27, 2016
Computer Networks
computer-networks
tcp
+
–
4
answers
19
Gateforum Correspondence Course ( Page# 179, Q# 19)
674
views
answered
Sep 27, 2016
Computer Networks
computer-networks
tcp
+
–
3
answers
20
Gateforum Correspondence Course ( Page# 183, Q# 11)
456
views
answered
Sep 27, 2016
Computer Networks
computer-networks
tcp
+
–
4
answers
21
Gateforum Correspondence Course ( Page# 187, Q# 01)
691
views
answered
Sep 27, 2016
Computer Networks
computer-networks
tcp
+
–
3
answers
22
what is congestion control ?
can anyone explain me what is congestion control with example ?
can anyone explain me what is congestion control with example ?
856
views
answered
Sep 27, 2016
Computer Networks
computer-networks
congestion-control
tcp
+
–
2
answers
23
CN-TCP
In a TCP connection, the value of congestion window Cnwd = 2500 and the value of receiver window Rwnd = 4500.The host has sent 2000 bytes which has not been acknowledge. How many more bytes can be sent? A) 2000 B) 500 C) 2500 D) none of these
In a TCP connection, the value of congestion window Cnwd = 2500 and the value of receiver window Rwnd = 4500.The host has sent 2000 bytes which has not been acknowledge. ...
5.3k
views
answered
Sep 27, 2016
Computer Networks
congestion-control
tcp
+
–
4
answers
24
GATE CSE 2016 Set 1 | Question: 51
Consider the following two phase locking protocol. Suppose a transaction $T$ accesses (for read or write operations), a certain set of objects $\{O_1,\ldots,O_k \}$. This is done in the following ... freedom guarantee neither serializability nor deadlock-freedom guarantee serializability but not deadlock-freedom guarantee deadlock-freedom but not serializability.
Consider the following two phase locking protocol. Suppose a transaction $T$ accesses (for read or write operations), a certain set of objects $\{O_1,\ldots,O_k \}$. This...
21.5k
views
commented
Sep 25, 2016
Databases
gatecse-2016-set1
databases
transaction-and-concurrency
normal
+
–
5
answers
25
GATE CSE 2007 | Question: 64
Consider the following schedules involving two transactions. Which one of the following statements is TRUE? $S_1 :r_1(X); r_1(Y); r_2(X); r_2(Y); w_2(Y); w_1(X)$ ... is not conflict serializable. $S_1$ is not conflict serializable and $S_2$ is conflict serializable. Both $S_1$ and $S_2$ are not conflict serializable.
Consider the following schedules involving two transactions. Which one of the following statements is TRUE?$S_1 :r_1(X); r_1(Y); r_2(X); r_2(Y); w_2(Y); w_1(X)$$S_2 :r_1(...
9.6k
views
answered
Sep 25, 2016
Databases
gatecse-2007
databases
transaction-and-concurrency
normal
+
–
6
answers
26
GATE CSE 2003 | Question: 87
Consider three data items $D1, D2,$ and $D3,$ and the following execution schedule of transactions $T1, T2,$ and $T3.$ In the diagram, $R(D)$ and $W(D)$ denote the actions reading and writing the data item $D$ ... $T2; T1; T3$ The schedule is serializable as $T3; T2; T1$ The schedule is not serializable
Consider three data items $D1, D2,$ and $D3,$ and the following execution schedule of transactions $T1, T2,$ and $T3.$ In the diagram, $R(D)$ and $W(D)$ denote the action...
11.3k
views
answered
Sep 25, 2016
Databases
gatecse-2003
databases
transaction-and-concurrency
normal
+
–
5
answers
27
GATE CSE 2003 | Question: 29, ISRO2009-73
Which of the following scenarios may lead to an irrecoverable error in a database system? A transaction writes a data item after it is read by an uncommitted transaction A transaction reads a data item after it is read by an ... it is written by a committed transaction A transaction reads a data item after it is written by an uncommitted transaction
Which of the following scenarios may lead to an irrecoverable error in a database system?A transaction writes a data item after it is read by an uncommitted transactionA ...
14.8k
views
commented
Sep 25, 2016
Databases
gatecse-2003
databases
transaction-and-concurrency
easy
isro2009
+
–
5
answers
28
GATE CSE 2015 Set 3 | Question: 29
Consider the partial Schedule $S$ involving two transactions $T1$ and $T2$. Only the $\textit{read}$ and the $\textit{write}$ operations have been shown. The $\textit{read}$ operation on data item $P$ ... re-started to ensure transaction atomicity Schedule $S$ is recoverable and can ensure transaction atomicity and nothing else needs to be done
Consider the partial Schedule $S$ involving two transactions $T1$ and $T2$. Only the $\textit{read}$ and the $\textit{write}$ operations have been shown. The $\textit{rea...
14.4k
views
commented
Sep 23, 2016
Databases
gatecse-2015-set3
databases
transaction-and-concurrency
normal
+
–
7
answers
29
PROBLEM ON VIEW SERIALIZABILITY
check whether it is view serializable or not? schedule S:R1(X),W2(X),W1(X)
check whether it is view serializable or not?schedule S:R1(X),W2(X),W1(X)
5.6k
views
answered
Sep 23, 2016
Databases
view-serializable
+
–
2
answers
30
GATE CSE 2016 Set 1 | Question: 22
Which one of the following is NOT a part of the ACID properties of database transactions? Atomicity Consistency Isolation Deadlock-freedom
Which one of the following is NOT a part of the ACID properties of database transactions?AtomicityConsistencyIsolationDeadlock-freedom
10.1k
views
commented
Sep 22, 2016
Databases
gatecse-2016-set1
databases
transaction-and-concurrency
easy
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register