Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

17851.

Factors Influencing Law of Demand

Answer»

Hebwhwue8shsd9wh2hedoxhnhqowshzbhshex

17852.

What is the importance of Business Cycle and what are the different phases of Business Cycles?

Answer»

The important things for a BUSSINESS CYCLE
are : 1)entrepreneur 2)manager 3)techinican
The THREE different phases of bussiness are : 1)infancy stage 2)adolescence stage 3)maturity LEVEL & read this book - think and grow rich

17853.

What are the different managerial theories of Firm?

Answer»
MANAGERIAL THEORIES OF THE FIRM 

Managerial theories of the firm place emphasis on various incentive mechanisms in explaining the behaviour of managers and the implications of this conduct for their companies and the wider economy. 

According to traditional theories, the firm is controlled by its owners and thus wishes to maximise short run profits. The more contemporary managerial theories of the firm examine the possibility that the firm is controlled not by its owners, but by its managers, and THEREFORE does not aim to maximise profits. Although profit plays an important role in these theories as well, it is no longer seen as the sole or DOMINATING GOAL of the firm. The other possible AIMS might be sales revenue MAXIMISATION or growth.
17854.

State the type of that use in these items ,steel bowl,reflector of a torch,

Answer»

Steel- it is UNIVERSAL metal used for making pan,CAR,etc ANYWHERE you find you can SEE steel EVEN for making bowl
reflecter of torch - it is the covering that passes the light more than it capacity if the capacity of light is 1 the reflector will make it x2

17855.

What is the difference between UNIX and LINUX?

Answer»

Unix originally BEGAN as a PROPRIETY operating SYSTEM from Bell Laboratories, which LATER on spawned into different commercial versions. On the other hand,
Linux is free, open source and intended as a non-propriety operating system for the MASSES.

17856.

Properties of Iso-Quants(Iso-Product) Curves

Answer»

Properties of Iso-Quants(Iso-Product) Curves

Properties of Iso-quant Curve

 

The iso-quant curve is negatively sloped, which means, in order to have a same level of production, the more use of UNITS of one input factor is to be offset with the lesser units of another input factor. This COMPLIES with the principle of Marginal Rate of TECHNICAL Substitution (MRTP). For example, with more units of CAPITAL, the lesser units of LABOR are to be employed to have a same level of output.

17857.

Determine and define the h-parameters using a two port network model

Answer»

A two-port NETWORK is regarded as a black box with it's properties specified by a MATRIX of numbers.
this allows the response of the network to signals applied to the ports to be calculated easily, WITHOUT SOLVING the internal voltages and currents in the network. Examples of circuits analyzed as two ports are filters, matching networks, transmission lines, transformers, and small signals models for transistors such as hybrid-pi models. the analysis of passive two-port network is an outgrowth of RECIPROCITY theorems first drived by Lorentz.

17858.

Explain the construction and working of photodiode?

Answer»

A PHOTODIODE is one TYPE of light detector, used to convert the light into current or voltage based on the mode of operation of the device.


Working of Photodiode

The working principle of a photodiode is, when a photon of ample energy strikes the diode, it makes a couple of an electron-hole. This mechanism is also called as the inner photoelectric effect. If the absorption arises in the depletion region junction, then the carriers are removed from the junction by the inbuilt electric field of the depletion region. Therefore, holes in the region move TOWARD the anode, and ELECTRONS move toward the cathode, and a PHOTOCURRENT will be generated. The entire current through the diode is the sum of the absence of light and the photocurrent. So the absent current must be reduced to maximize the sensitivity of the device.

17859.

What is Fermi Dirac delta function. State its significance

Answer»

The FERMI-Dirac distribution applies to fermions, particles with half-integer spin which must OBEY the Pauli exclusion principle. Each TYPE of distribution function has a normalization term multiplying the exponential in the denominator which may be temperature DEPENDENT. The significance of the Fermi energy is most clearly seen by setting T=0. At absolute zero, the probability is =1 for energies less than the Fermi energy and zero for energies greater than the Fermi energy. We picture all the levels up to the Fermi energy as filled, but no particle has a greater energy. This is entirely consistent with the Pauli exclusion principle where each quantum state can have one but only one particle.


17860.

Explain the working principle of n-MOSFET

Answer»

MOSFET Working Principle. Theworking of MOSFET depends upon the metal oxide capacitor (MOS) that is the MAIN part of the MOSFET. The oxide layer presents among the source and drain TERMINAL. It can be set from p-type to n-type by applying positive or negative GATE voltages respectively.

17861.

Explain working principle of Photo transistor in brief

Answer»

A PHOTOTRANSISTOR is similar to a regular BJT except that the base current is produced and controlled by light instead of a voltage source. The phototransistor EFFECTIVELY converts light energy to an electrical signal.

In a phototransistor the base current is produced when light strikes the photosensitive semiconductor base region. The collector-base pn junction is EXPOSED to INCIDENT light through a lens opening in the transistor package. When there is no incident light, there is only a small thermally generated collector-to-emitter leakage current, ICEO; this dark cur- rent is typically in the nA range. When light strikes the collector-base pn junction, a base current, Iλ, is produced that is directly proportional to the light intensity. This action produces a collector current that increases with Iλ. Except for the way base current is generated, the phototransistor behaves as a conventional BJT. In many cases, there is no electrical connection to the base.

The relationship between the collector current and the light-generated base current in a phototransistor is

Ic = βDCTλ

Since the actual photo generation of base current occurs in the collector-base region, the larger the physical area of this region, the more base current is generated. Thus, a typical phototransistor is designed to offer a LARGE area to the incident light, as the simplified structure diagram in Below Figure illustrates.

A phototransistor can be either a two-lead or a three-lead device. In the three-lead configuration, the base lead is brought out so that the device can be used as a conventional BJT with or without the additional light-sensitivity feature. In the two-lead configuration, the base is not electrically available, and the device can be used only with light as the input. In many applications, the phototransistor is used in the two-lead version.

Below Figure shows a phototransistor with a biasing circuit and typical collector characteristic curves. Notice that each individual curve on the graph corresponds to a certain value of light intensity (in this case, the units are mW/cm 2) and that the collector current in creases with light intensity.

17862.

Define i) Ripple factor ii) % Regulation

Answer»

Ripple:-

The output of a RECTIFIER is consists of a DC component and an ac component. This ac component is undesirable and CAUSE for the pulsations in the rectifier output.

So the ac component present in the PULSATING output i.e. in the rectifier output is known as Ripple.

Ripple Factor:-

The ratio of r.m.s. value of a.c. component to the d.c. component in the rectifier output is known as ripple factor i.e.

Ripple factor = r.m.s. value of a.c component / value of d.c. component=Iac/IdcRipple:-


17863.

Classify metals using energy band diagrams

Answer»

Based on the ability of various materials to CONDUCT current, the materials are classified as conductors,

insulators and the semiconductors.

A metal which is very good carrier of electricity is called conductor. The copper and aluminium

are good examples of a conductor

A very poor conductor of electricity is termed as insulator. The glass, wood, mica, diamond are the

examples of an insulator.

A metal having conductivity which is between conductor and an insulator is

called semiconductor. The silicon and GERMANIUM are the examples of a

semiconductor. This does not conduct current at LOW temperatures but as temperature increases

these materials BEHAVE as good conductors..

17864.

List the benefits of h-parameters.

Answer»

Following are the advantages of h-parameters:-

  1. h-parameters are Real Numbers up to radio frequency
  2. They are easy to measure
  3. They can be DETERMINED from TRANSISTOR static CHARACTERISTIC curves
  4. They are convenient to USE in circuit analysis and design
  5. Easily convertible from ONE configuration to other
  6. Readily supplied by manufacturers
17865.

Explain about a charge density in a semiconductor

Answer»

CHARGE CARRIERS IN SEMICONDUCTORS

Objectives:

• Discovery of the nature of charge carriers in INTRINSIC and extrinsic

semiconductors

• Finding on what, how and why densities of charge carriers in semiconductors

depend

• Calculation methods of of charge carrier densities in semiconductors

Content:

Charge carriers in intrinsic semiconductors

Nature of charge carriers

Fermi level in an intrinsic semiconductor

Densities of carriers

Charge carriers in extrinsic semiconductors

n-type semiconductors

p-type semiconductors

Compensation doping

Excess carriers and lifetime

Carefully refined semiconductors are called intrinsic semiconductors. .

In a SILICON crystal each atom is surrounded by four NEIGHBOUR atoms. At 0 K

all valence electrons take PART in covalent bonding and none are free to move

through the crystal.

As the temperature increases, the lattice vibrations arise. Some of the energy

of the lattice vibrations is transferred to the valence electrons. If sufficient

energy is given to an electron, it leaves a BOND and becomes free.

The jump of an electron from the

valence band to the conduction

band corresponds to the release

of an electron from covalent

bonding. The minimum energy

required for that is equal to the

width of the forbidden band.

If the width of the forbidden band is less, electrons are released at lower

temperature.

When an electron is released, a positively charged vacancy appears. This

vacancy may be considered as a positive hole.

According to the energy band diagram an uncompleted allowed energy level in

the valence band corresponds to a hole.

Hope it helps..


17866.

Determine the operating point for a silicon transistor biased by fixed bias method with =100, RB=500 K , =2.5 K and =20 V and draw DC load line

Answer»

Frlkyxrly3lxvxcx.x3s.xrdxcy2xlxx4lb3.do.

17867.

A Full wave rectifier circuit is fed from a transformer having a center tapped secondary winding. The rms voltage from either end of secondary to center tap is 30 V, if diode forward resistance is 2Ω and half secondary resistance is 8 for a load of 1 K , Calculate, i).Power delivered to load ii).% regulation iii). Efficiency iv).Ripple factor

Answer»

I don't UNDERSTAND this QUESTION

17868.

For a silicon, =0.995 emitter current is 10mA & leakage current IC0=0.5A. Find IC ,IB ,, and ICEO

Answer»

Ķhcydkuftvtfufueudyzyvufy

17869.

Explain briefly drain characteristics of N-channel enhancement MOSFET

Answer»

Enhancement MOSFET, or eMOSFET, can be classed as normally-off (non-conducting) devices, that is they only conduct when a suitable gate-to-source positive voltage is applied, unlike Depletion TYPE mosfets which are normally-on devices conducting when the gate voltage is zero.

However, due to the construction and physics of an enhancement type mosfet, there is a minimum gate-to-source voltage, called the THRESHOLD voltage VTH that must be applied to the gate before it starts to conduct allowing drain current to flow.

In other words, an enhancement mosfet does not conduct when the gate-source voltage, VGS is less than the threshold voltage, VTHbut as the gates forward bias increases, the drain current, ID (also known as drain-source current IDS) will also increase, similar to a bipolar transistor, making the eMOSFET ideal for use in mosfet amplifier circuits.

The characteristics of the MOS conductive channel can be thought of as a variable resistor that is controlled by the gate. The AMOUNT of drain current that flows through this n-channel therefore depends on the gate-source voltage and one of the many measurements we can take using a mosfet is to plot a transfer characteristics graph to show the i-v relationship between the drain current and the gate voltage as shown.

N-channel eMOSFET I-V Characteristics



With a fixed VDS drain-source voltage connected across the eMOSFET we can plot the values of drain current, ID with varying values of VGS to obtain a graph of the mosfets forward DC characteristics. These characteristics give the transconductance, gmof the transistor.

This transconductance relates the output current to the input voltage REPRESENTING the gain of the transistor. The slope of the transconductance curve at any point along it is therefore given as: gm = ID/VGS for a constant value of VDS.

So for example, assume a MOS transistor passes a drain current of 2mA when VGS = 3v and a drain current of 14mA when VGS = 7v. Then:



This ratio is called the transistors static or DC transconductance which is short for “transfer conductance” and is given the unit of Siemens (S), as its amps per volt. Voltage gain of a mosfet amplifier is directly proportional to the transconductance and to the value of the drain resistor.

At VGS = 0, no current flows through the MOS transistors channel because the field effect around the gate is insufficient to create or “open” the n-type channel. Then the transistor is in its cut-off region acting as an open switch. In other words, with zero gate voltage applied the n-channel eMOSFET is said to be normally-off and this “OFF” condition is represented by the broken channel line in the eMOSFET symbol (unlike the depletion types that have a continuous channel line).

As we now gradually increase the positive gate-source voltage VGS , the field effect begins to enhance the channel regions conductivity and there becomes a point where the channel starts to to conduct. This point is known as the threshold voltage VTH. As we increase VGS more positive, the conductive channel becomes wider (less resistance) with the amount of drain current, ID increases as a RESULT. Remember that the gate never conducts any current as its electrical isolated from the channel giving a mosfet amplifier an extremely high input impedance.

Therefore the n-channel enhancement mosfet will be in its cut-off mode when the gate-source voltage, VGS is less than its threshold voltage level, VTH and its channel conducts or saturates when VGS is above this threshold level. When the eMOS transistor is operating in the saturation region the drain current, ID is given by:

eMOSFET Drain Current



Note that the values of k (conduction parameter) and VTH (threshold voltage) vary from one eMOSFET to the next and can not be physically changed. This is because they are specific specification relating to the material and device geometry which are in-built during the fabrication of the transistor.

The static transfer characteristics curve on the right is generally parabolic (square law) in shape and then linear. The increase in drain current, ID for a given increase in gate-source voltage, VGS determines the slope or gradient of the curve for constant values of VDS.

Then we can see that turning an enhancement MOS transistor “ON” is a gradual process and in order for us to use the MOSFET as an amplifier we must bias its gate terminal at some point above its threshold level.

There are many different ways we can do this from using two separate voltage supplies, to drain feedback biasing, to zener diode biasing, etc, etc. But whichever biasing method we use, we must make sure that the gate voltage is more positive than the source by an amount greater than VTH. In this mosfet amplifier tutorial we will use the now familiar universal voltage divider biasing circuit.

17870.

Find the concentration of holes & electrons in the P-type silicon at 3000K assuming its resistivity as 0.02-cm, p=475cm2 /vs , i=1.45×1010/ .

Answer»

Dff4xucytfofyugysyftsyeyeeust

17871.

Define the different stability factors.

Answer»

Answer:

In the question asked regarding the concept of stability factors, they refer to the degree of change in OPERATING point. This happens due to the variation in temperature and there are mainly 3 variables of concern which are temperature dependent.

Explanation:

FOLLOWING are the stability factors:-

#1: The Stability factor S' can be defined "as the rate of change of characters V B E , keeping I C O and β constant.

#2: The stability factor S'' can be defined as the rate of change keeping in  RESPECT to β. Also the condition is to keep I C O and V B E characters constant.

17872.

Tools can be used to determine the domain name system (dns) settings on a client computer

Answer»

Why are not REPLYING

17873.

What must a web server furnish the browser when it returns a document with a mime type?

Answer»

MIME stands for "Multipurpose Internet Mail Extensions. It's a way of identifying FILES on the Internet ACCORDING to their nature and FORMAT. For example, using the "Content-type" header value defined in a HTTP response, the BROWSER can open the file with the proper extension/plugin.

17874.

What are the standards supported by multi-standard wireless protocols?

Answer»

"

A wireless LAN provides a public internet connection though wi-fi a given location is HOTSPOT.  


WAP is a SPECIFICATION for the set of COMMUNICATIONS protocols to standardize the way that wireless device can be USED for the internet access to prevent an unauthorize access or damage USING the wireless network. "

17875.

What kind of software is photoshop

Answer»

Answer:

Adobe PHOTOSHOP is the PREDOMINANT photo EDITING and manipulation SOFTWARE on the market.

17876.

What are different errors encountered while compiling?

Answer»

Compile errors are those errors that occur at the time of compilation of the program. C compile errors may be further classified as:

Syntax Errors

When the rules of the c programming language are not FOLLOWED, the compiler will SHOW syntax errors.

For example, consider the statement,

1int a,b:

The above statement will PRODUCE syntax ERROR as the statement is terminated with : rather than ;

Semantic Errors

Semantic errors are reported by the compiler when the statements written in the c program are not meaningful to the compiler.

For example, consider the statement,

1

b+c=a;

In the above statement we are trying to assign VALUE of a in the value obtained by summation of b and c which has no meaning in c. The correct statement will be

1

a=b+c;

17877.

A system that can run multiple concurrent jobs on a single cpu have a process of choosing which taskhast to run when, and how to break them up, called "scheduling". the round-robin policy forscheduling runs each job for a fixed amount of time before switching to the next job. the waiting timefora job is the total time that it spends waiting to be run. each job arrives at particular time forscheduling and certain time to run, when a new job arrives, it is scheduled after existing jobs alreadywaiting for cpu timegiven list of job submission, calculate the average waiting time for all jobs using round-robin policy.the input to the function waitingtimerobin consist of two integer arrays containing job arrival and runtimes, an integer n representing number of jobs and am integer q representing the fixed amount oftime used by round-robin policy. the list of job arrival time and run time sorted in ascending order byarrival time. for jobs arriving at same time, process them in the order they are found in the arrival array.you can assume that jobs arrive in such a way that cpu is never idle.the function should return floating point value for the average waiting time which is calculated usinground robin policy.assume 0

Answer»

"The average WAITING TIME for all the jobs usingthe round-robin policy is as follows.The input to the function #include

int waitingtimerobin(int *job,int *run,int n,int tq)

{

int J,COUNT,time,remain,flag=0;

int wait_time=0,turnaround_time=0,rt[10];

remain=n;

for(count=0;count

{

rt[count]=run[count];

}

for(time=0,count=0;remain!=0;)

{

if(rt[count]<=tq && rt[count]>0)

{

time += rt[count];

rt[count]=0;

flag=1;

}

else if(rt[count]>0)

{

rt[count] -= time_quantum;

time += time_quantum;

}

if(rt[count]==0 && flag==1)

{

remain--;

wait_time += time-job[count]-run[count];

flag=0;

}

if(count==n-1)

count=0;

else if(job[count+1]<=time)

count++;

else

count=0;

}

printf(""waiting time %f"",wait_time*1.0/n);

return 0;

}


int main()

{

int ja[],at[];

int n,tq;

SCANF(""%d"",&n);

for(i=0;i

{

scanf(""%d%d"", &ja[i],&at[i]);

}

scanf(""%d"",&tq);

int *cellsptr=ja;

int *cellsptr1=at;

waitingtimerobin(cellsptr,cellsptr1,n,tq);

return 0;

}"

17878.

Pentium I computers are fourth generation of computer. Why?

Answer»

Pentium I is a MICROPROCESSOR and all microprocessor BASED COMPUTERS are CONSIDERED as the fourth generation. Let us see the other generations as well

:1)First generation — vacuum tubes .


2)Second generation — transistors.


3)Third generation — integrated circuits .


4)Fourth generation — microprocessors.


5)Fifth generation — artificial intelligence and quantum computing (research ONGOING)

17879.

Derive the CE h-parameters hre and hie in terms of the CB h-parameters

Answer»

This paper introduces a model for the computation of the regional cerebral metabolic rate of OXYGEN from the data of cerebral regional radioactivity collected after INHALATION of 15O2. A method was devised for the DIFFERENTIAL determination of the respective contribution of radiooxygen and of radiowater in the inflow and the outflow of radioactivity in the brain after or during such on inhalation. The results demonstrate the feasability of such a model and outline some of the methodological prerequisites to be taken into account in the NUMERICAL analysis of the data.

17880.

Prove that the conductivity of a semiconductor is given by = q( p p + n p)

Answer»

Tvctlvc4puc5c5l3c4l
cbtlucrc

17881.

Write a python function that takes two lists and returns true, if they have at least one common member.

Answer»

"Given below is the python FUNCTION that TAKES TWO lists and returns true, if they have at least ONE COMMON member you have asked for in the question. The codes should be entered as below

defcommon_data(list1, list2):

result = False

for x in list1:

for y in list2:

if x == y:

result = True

return result

print(common_data([1,2,3,4,5], [5,6,7,8,9]))

print(common_data([1,2,3,4,5], [6,7,8,9]))

"

17882.

We cannot run a query without saving it or not . Please answer will be sure

Answer»

Solution: We can even run the query WITHOUT saving it. QUERIES are generally saved in order to avoid accidental notifications that might ARISE.


However, if one wants to use it again, it is not necessary to save it each time. While closing the FILE, one can open to carry out further searches.

17883.

Which three statements represent the benefits of performing experiments using computer simulations

Answer»

ONE can do EXPERIMENTS with the HELP of computer simulations which if otherwise would have been required to be done, may have faced MANY bottlenecks.


Computer simulations of experiments help to get the COMPLETE assumptions, and one can model anything with them virtually; one can measure the performance of many non-existing systems.

17884.

Dentify the tools that are used for executing SQL commands from a programming language.

Answer»

Following are some of the tools for executing SQL commands.


They are as FOLLOWS:- SQL*PLUS a tool for the execution of the SQL and PL/SQL interactively, iSQL*plus is a tool based on WEB browser that is USED for the execution of the SQL commands.


Next important tool is the Oracle SQL Developer.

17885.

How is content presented by Drupal?

Answer»

Most content on a DRUPAL website is stored and treated as "nodes". A NODE is any PIECE of individual content, such as a PAGE, poll, article



❤❤❤♥❤❤❤

17886.

Which property is mostly used when there are several buttons in a form?

Answer»

The ValidationGroupproperty specifies which group ofcontrols is validated on validation. This PROPERTY is mostly used when there are SEVERAL buttons in a form. SET the ValidationGroup property of those CONTROLS to something unique.
PLEASE PLEASE PLEASE MARK ME BRAINILIST

17887.

Which symbol indicates the type of effect used for text and objects in slide

Answer»

In a powerpoint SLIDE, the symbol that is USED to ADD text is the text box.


Through power POINT, one can give a presentation of some PLANS or ideas on the computer.


One can add sound to the slides and can arrange the change of the slides in many styles making the presentation look good.

17888.

In cloud, service uptime is 50 minutes and downtime is 10 minutes in an hour. What is the availability of the service? (a) -4 (b) 0.2 (c) 5 (d) 0.8

Answer»

Uptime is a PC industry TERM for the time amid which a PC is OPERATIONAL. DOWNTIME is the time when it isn't operational. ...


For instance, one standard for uptime that is now and again talked about is an objective called FIVE 9s - that is, a PC that is operational 99.999 percent of the time.

17889.

Which is an item of storage medium in the form of circular plate ___?

Answer»

Disk is an item of storage medium in the form of circular plate and it allows storing LARGE amount of data with the SAFE manner.


on the other hand it is QUITE simple for the student to GET right ideas on it.


Hence this answer is supportive for the student to get right ideas of it.

17890.

Consider the following networks (n is large): (2DH): A 2D-mesh of n nodes having size n1/2 x n1/2 (3DM): A 3D-torus of n nodes having size n1/3 x n1/3 x n1/3 (HYP): A hypercube of n nodes (CLIQ): A complete network of n nodes The arrangement of the networks in increasing order of diameter is:

Answer»

The answer is 4. The omp_get_num_threads() function will be returning the number of threads present in the TEAM which is CURRENTLY running in the parallel region from which the particular thread was CALLED.


If the omp_get_num_threads() is called from a serial portion or nested parallel region in the PROGRAM which is SERIALIZED, 1 will be returned.

17891.

Obtain S and S' factors.

Answer»

Eeeedhdhdhiiwiwiwiejejehshsd

17892.

Draw and explain the small signal model of JFET.

Answer»

The junction gate field-effect transistor(JFET or JUGFET) is one of the simple type of field-effect transistor.[1] JFETs are three-terminal semiconductor devices that can be USED as electronically-controlled SWITCHES, amplifiers, or voltage-controlled resistors.
JFET

Electric current from source to drain in a p-channel JFET is restricted when a voltage is applied to the gate.

TypeActivePin configurationdrain, gate, sourceElectronic symbol 
Unlike bipolar transistors, JFETs are exclusively voltage-controlled in that they do not need a biasing current. Electric chargeflows through a semiconducting channel between source and drain terminals. By applying a reverse bias voltage to a gateterminal, the channel is "pinched", so that the electric current is impeded or switched off completely. A JFET is usually ON when there is no potential difference between its gate and source terminals. If a potential difference of the proper polarity is applied between its gate and source terminals, the JFET will be more RESISTIVE to current flow, which means less current would flow in the channel between the source and drain terminals. Thus, JFETs are sometimes REFERRED to as depletion-modedevices.

17893.

Find the concentration of holes and electrons in a p-type germanium at 3000K, if the conductivity is 100-cm. mobility of holes in germanium p = 1800 /Vsec.

Answer»

7yv6cyfec5vtvtrcrvglcrl
C RLC

17894.

1. In the code fragment below, start and end are integer values and gcd(x,y) is a function that computes the greatest common divisor of x and y. i := 0; j := 0; k := 0; for (m := start; m 2){ i := i + m; k := k + m; }else{ j := j + m; k := k + m; } } At the end of the loop which of the following expresses a valid relation between i, j and k? k == i - j k == j - i k == i + j The relationship depends on start and end

Answer»

Many PROGRAMMING issues (particularly on Brilliant) frequently inquire as to whether certain numbers have remarkable characteristics.


Knowing how to actualize this in the code is regularly a test and these CALCULATIONS come up MUCH of the time when managing harder programming issues.


By TAKING care of these issues, you build up a "munititions stockpile" of helpful calculations.

17895.

2 points A new algorithm MaxPack for optimally packing furniture in a transportation container claims to have worst case complexity O(n2 log n), where n is the number of items to be packed. From this, we can conclude that: For every sufficiently large n, for every input of size n, MaxPack requires time proportional to n2 log n. For some n, for every input of size n, MaxPack requires time proportional to n2 log n. For every sufficiently large n, every input of size n can be solved by MaxPack within time proportional to n2 log n. For every sufficiently large n, there is an input of size n for which MaxPack requires time proportional to n2 log n.

Answer»

For some n, for EVERY input of size n, MAXPACK requires time proportional to n2 log n and it is RIGHT answer for the given QUESTION.


On the given question you can find out the right ideas of it and it is applicable to read and find out best answer with no RISK and troubled of it.

17896.

In general if the size of the cache is increased, then the cache-hit-ratio will

Answer»

in general when the size of the CACHE is increased, the cache HIT ratio increases gradually.


It is higher for the most popular photos. Cache hit ratio is the ratio between cache hits and the sum of cache hits and cache misses.


It is then multiplied by 100. so we can SEE that the ratio generally increases when cache size increases.

17897.

Discuss different themes available in Word 2007?

Answer»

"Although the WORD application of 2007 has come conveniently, we are not getting the proper use of it.


We may STILL use the individual tools for our purposes. You should try the newest themes introduced here for its customers.


It is an excellent way to make our DOCUMENTS look professional and efficient. So you should not be hesitant to use these fantastic themes.

"

17898.

Identify the valid data types which can be used in sql to define the type of data

Answer»

"There are many DATA TYPES in SQL.


They are different from one to another. But all of them perform significant FUNCTIONS that are unique to each of them.


Some of the data types USED here are CHARACTER, VARCHAR, BOOLEAN, INT, SMALLINT, DECIMAL, NUMERIC.


These are the basic data types used COMMONLY. You should study the different aspects of these data types in the field.

"

17899.

In multifaceted plot, how many rows will be formed when facets is mentioned as facets=drv~.

Answer»

Plotting multiple groups with FACETS in ggplot2 ... This is a known as a facet plot and now you have to calculate in a 1 dimensional ribbon that can be wrapped to multiple rows.


And the values p <- ggplot(data = mpg, aes(x = displ, y = hwy, color = DRV)) + geom_point() p . Some of the SUBSETS may exhibit extreme bahavior of a variable causing other facets.

17900.

Consider a 1 GHz processor having a 32K cache with cache line size 16 bytes. If the memory latency (for 1 cache line) is 100 ns and cache latency is 1 ns per word (4 bytes), compute the FLOPS for performing the dot-product of two vectors of N elements comprising of 32 bit floating point numbers. You can assume that the madd operation takes 1 cycle to execute. Ignore the time to perform address increment operations and loop branching. Assume N is a large integer.

Answer»

There will be two matrices into the cache MEMORY which will be of 2k words. This will take up the time of 200µs (2000*100ns).


On MULTIPLYING both the nxn matrices, there will be 2n^3 OPERATIONS which means there will be 64k operations.


To PERFORM these operations, there will be 16k cycles needed which means 16µs. So, the total time for computation will be 200 + 16µs or computation RATE of 64K FLOP/216µs which is 303 MFLOPS.