1 answer
2
which formula should we use for calculating LEAF node in B+ tree?I. n*(K+r)+b<=block sizewhere n=no of keysk=key size,r=record pointer,b=block pointerII. (n-1)(K+r)+b<=bl...
4 answers
3
Every table with two single-valued attributes is in 1NF, 2NF, 3NF and BCNF. ????plz define clearly??is it true for all the table having more than two attribute??#refr...
6 answers
8
How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communication with the host?$16$ bits$32$ bits$48$ bits$64$ bits
3 answers
10
Which layers of the OSI reference model are host-to-host layers?Transport, session, presentation, applicationSession, presentation, applicationDatalink, transport, presen...
3 answers
12
The functional difference between $SR$ flip-flop and $J$-$K$ flip-flop is that :$J$-$K$ flip-flop is faster than $SR$ flip-flop$J$-$K$ flip-flop has a feedback path$J$-$K...
7 answers
13
Which of the following fields of an IP header is NOT modified by a typical IP router?Check sumSource addressTime to Live (TTL)Length
2 answers
15
The solution to the recurrence equation $T(2^k) = 3T(2^{k-1})+1, T(1) =1$ is$2^k$$\frac{(3^{k+1}-1)}{2}$$3^{\log_2 k}$$2^{\log_3 k}$
2 answers
16
Which of the following requires a device driver?RegisterCacheMain memoryDisk
6 answers
17
2 answers
22
Four bits are used for packed sequence numbering in a slinding window protocol used in a computer network. What is the maximum window size?481516
3 answers
24
Find minimal states in DFA accepting {w1aw2, |w1| = 2, |w2| >=3, w1,w2 $\in$ $(a+b)^*$}?Is it $7$ or $8$?
1 answer
26
Explain Internal And External fragmentation clearly??
2 answers
27
When a strict routing has been specified by the source but can’t be followed by the intermediate routers, such events will be reported by ICMP???
2 answers
28
in case of shortest remaining time first(SRTF) .we always consider pre-emptive scheduling??