Home
About Us
Contact Us
Bookmark
Saved Bookmarks
Current Affairs
General Knowledge
Chemical Engineering
UPSEE
BSNL
ISRO
BITSAT
Amazon
ORACLE
Verbal Ability
→
GATE
→
Cs 2022 in Gate
→
Which one of the following protocols is NOT used t...
1.
Which one of the following protocols is NOT used to resolve one form of address to another one?(A) DNS(B) ARP(C) DHCP(D) RARP
Answer»
Show Answer
Discussion
No Comment Found
Post Comment
Related InterviewSolutions
Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A?(A) A(B) B(C) C(D) D
Consider the following two phase locking protocol. Suppose a transaction T accesses (for read or write operations), a certain set of objects {O1,…,Ok}. This is done in the following manner:Step 1. T acquires exclusive locks to O1, . . . , Ok in increasing order of their addresses.Step 2. The required operations are performed.Step 3. All locks are released.This protocol will(A) guarantee serializability and deadlock-freedom(B) guarantee neither serializability nor deadlock-freedom(C) guarantee serializability but not deadlock-freedom(D) guarantee deadlock-freedom but not serializability
The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first stage (with delay 800 picoseconds) is replaced with a functionally equivalent design involving two stages with respective delays 600 and 350 picoseconds. The throughput increase of the pipeline is _______ percent.[This Question was originally a Fill-in-the-Blanks question](A) 33 or 34(B) 30 or 31(C) 38 or 39(D) 100
The size of the data count register of a DMA controller is 16 bits. The processor needs to transfer a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The minimum number of times the DMA controller needs to get the control of the system bus from the processor to transfer the file from the disk to main memory is _________Note : This question was asked as Numerical Answer Type.(A) 3644(B) 3645(C) 456(D) 1823
Consider the following C program.#include<stdio.h>void mystery(int *ptra, int *ptrb){int *temp;temp = ptrb;ptrb = ptra;ptra = temp;}int main(){int a=2016, b=0, c=4, d=42;mystery(&a, &b);if (a < c)mystery(&c, &a);mystery(&a, &d);printf("%d\n", a);}The output of the program _____________Note : This question was asked as Numerical Answer Type.(A) 2016(B) 0(C) 4(D) 8
Consider the two cascaded 2-to-1 multiplexers as shown in the figure.The minimal sum of products form of the output X is(A) A(B) B(C) C(D) D
Consider a carry lookahead adder for adding two n-bit integers, built using gates of fan-in at most two. The time to perform addition using this adder is(A) Θ(1)(B) Θ(Log (n))(C) Θ(√ n)(D) Θ(n)
Two eigenvalues of a 3 x 3 real matrix P are (2 + √ -1) and 3. The determinant of P is _____Note : This question was asked as Numerical Answer Type.(A) 0(B) 1(C) 15(D) -1
Which of the following is NOT a superkey in a relational schema with attributes V, W, X, Y, Z and primary key V Y ?(A) V X Y Z(B) V W X Z(C) V W X Y(D) V W X Y Z
A database of research articles in a journal uses the following schema.(VOLUME, NUMBER, STARTPGE, ENDPAGE, TITLE, YEAR, PRICE) The primary key is (VOLUME, NUMBER, STARTPAGE, ENDPAGE) and the following functional dependencies exist in the schema.(VOLUME, NUMBER, STARTPAGE, ENDPAGE) -> TITLE(VOLUME, NUMBER) -> YEAR(VOLUME, NUMBER, STARTPAGE, ENDPAGE) -> PRICE The database is redesigned to use the following schemas.(VOLUME, NUMBER, STARTPAGE, ENDPAGE, TITLE, PRICE)(VOLUME, NUMBER, YEAR) Which is the weakest normal form that the new database satisfies, but the old one does not?(A) 1NF(B) 2NF(C) 3NF(D) BCNF
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies