Recent questions tagged descriptive

185
views
2 answers
0 votes
S -> A BA -> f S fA -> b b B dB -> ƐB -> cFirst(S) =First(A) =First(B) =Follow(S) =Follow(A) =Follow(B) =
409
views
1 answers
0 votes
The types of questions asked in TIFR are way too different than GATE and I find the TIFR ones difficult. Can TIFR type of questions come in GATE?Besides How to solve the TIFR type of questions??
472
views
2 answers
2 votes
Let $A=\{0,1,2,3\}$ and $R$ a relation over $A$ :$R=\{(0,0),(0,1),(0,3),(1,1),(1,0),(2,3),(3,3)\}$Draw the ... Give a counterexample in each case in which the relation does not satisfy one of the properties of being an equivalence relation.
335
views
1 answers
2 votes
444
views
2 answers
1 votes
The following table describes a binary relation. Find the set of ordered pairs that is this relation, as in the definition of a binary relation. ...
380
views
1 answers
1 votes
Let $A$ be any set. Subset Relation on $\mathrm{P}(\mathrm{A})$ is Anti-symmetric?
540
views
1 answers
1 votes
Define $\mathcal{R}$ the binary relation on $\mathbb{N} \times \mathbb{N}$ to mean $(a, b) \mathcal{R}(c, d)$ iff $b \mid d$ and $a \mid c$
629
views
0 answers
0 votes
Prove or disprove the following statements:(i) L1 = {0^i1^j | i, j ∈ N} is a regular language.(ii) L2 = {0^n1^n | n ∈ N} is a regular language.(iii) For x ... 1}* | x = R (C (x))} is a regular language.How to solve this in subjective way..
517
views
1 answers
1 votes
Consider rolling of a dice experiment. Let $\text{A}$ be the event of getting an even number and $\mathrm{B}$ be the event of getting a prime number. Write the sets representing the following events.$\mathrm{A}$ and $\mathrm{B}$
294
views
1 answers
1 votes
Consider rolling of a dice experiment. Let $\text{A}$ be the event of getting an even number and $\mathrm{B}$ be the event of getting a prime number. Write the sets representing the following events.not $\text{B}$
827
views
2 answers
1 votes
What is the minimum number of nodes required in a DAG (Directed Acyclic Graph) for the following block?\[\begin{aligned}U=Z & =V+W \\X=Y & =U+1 \\A & =X+Y\end{aligned}\]
430
views
2 answers
1 votes
What is the size of the physical address space in a paging system, which has a page table containing $64$ entries of $11$ bit each (including valid and invalid bit) and a page size of $256$ bytes.
512
views
1 answers
1 votes
The execution of a program occurs on a $250 \mathrm{~GHz}$ processor that executes millions of instructions. Type, $\text{CPI}$ (cycles per instruction) and ... and $\text{MIPS}$ (millions of instructions per second) rate of the processor.
394
views
1 answers
1 votes
A system $\mathrm{X}$ with $2 \mathrm{~GHz}$ clock speed runs a program in $10$ seconds. We want to build a system $\mathrm{Y}$ to run the same program in ... system $\mathrm{X}$. What should be the clock speed of the system $\mathrm{Y}?$
435
views
1 answers
1 votes
The figure shown below indicates a thread's movement between $3$ states (i.e., run, ready, and blocked). Explain what causes each arrow? Say $\text{N/A}$ if it doesn't happen.
582
views
1 answers
2 votes
Compute the hit rate and miss/fault rate in least recently used page replacement algorithm for the given reference string with $4$ page frames. String: $7 \; 0 \; 1 \; 2 \; 0 \; 3 \; 4 \; 2 \; 3 \; 0 \; 3 \; 2 \; 1 \; 2 \; 0 \; 1$
656
views
1 answers
2 votes
If the disk head is initially located at track $32,$ find the number of disk moves required with First Come First Serve $\text{(FCFS)}$ ... blocks requests are: $90 \; 77 \; 24 \; 104 \; 55 \; 87.$
397
views
1 answers
1 votes
Assume that in a certain computer, the virtual addresses are $64$-bit long, the physical addresses are $48$-bit long, and the memory is word-addressable. ... many distinct virtual addresses can be translated without any $\text{TLB}$ miss?
499
views
1 answers
1 votes
Construct a Deterministic Finite Automaton $\text{(DFA)}$ with $5$ states that accepts all strings with $0101$ as a substring.
299
views
0 answers
1 votes
A context-free grammar is in Chomsky Normal Form if every rule is of the form\[\begin{array}{l}A \longrightarrow B C \\A \longrightarrow a\end{array}\]where ... A \longrightarrow B \mid S \\B \longrightarrow b \mid \varepsilon\end{array}\]
328
views
0 answers
1 votes
Let $L_{1}$ and $L_{2}$ be two languages decidable by Non-deterministic Turing machines $M_{1}$ and $M_{2}$. Using $M_{1}$ and $M_{2}$, construct a Non-deterministic Turing machine for the following languages.$L_{1} \cup L_{2}$
433
views
1 answers
1 votes
A relational database contains two tables movie, and genre, in which movie table has columns movie_no, movie_name, and genre_id, while genre table has columns ... will be retrieved by the following SQL statement?Select * from movie, genre
563
views
1 answers
1 votes
Suppose the $\text{IP}$ addresses of $\text{A}$ and $\text{B}$ are $10.105.1.113$ and $10.105.1.91,$ respectively. They both use the same netmask $\mathrm{N}$. ... $255.255 .255 .128$255.255 .255 .192$255.255 .255 .224$
572
views
1 answers
1 votes
$1020$ bytes long packet must be routed through an interface with $\text{MTU}$ of $256$ bytes. Asssuming the smallest possible $\text{IPv4}$ header size, ... decimal), and Total Length field (in decimal) of $\text{IPv4}$ header.
697
views
1 answers
1 votes
For the following two $16$-bit messages, find the Internet checksum:$0001 \; 1000 \; 0001 \; 0010$1011 \; 1000 \; 1011 \; 0011$
690
views
1 answers
1 votes
Both the payload and $2\text{D}$ (even) parity bits are shown below. Some of these bit(s) have been flipped. Indicate the row and column of the flipped bit(s) in format ... \overline{0110 \;0111\; 0101\; 1001 \text { | } 1} \\\end{array}\]
1.1k
views
1 answers
2 votes
An organization is granted the $\text{IPv4}$ address block $130.56.0.0/16.$ The network administrator wants to create $1024$ subnets. Find the first and last addresses in the third subnet.
474
views
0 answers
1 votes
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the ... the one critical security protocol/tool that enables you to connect to your server securely?
599
views
1 answers
3 votes
A hash table contains $10$ buckets and uses linear probing to resolve collisions. The key values are intergers and the hash function used is $\text{Key}\%10.$ ... $152$ be inserted?
371
views
1 answers
1 votes
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ ... A: Block all traffic to any server on the local network. Write as Rule $1.$