Searching for "st"

Q:

loan of $15 000 is taken out. If the interest rate on the loan is 7%, how much interest is due and what is the amount repaid if the loan was taken out on April 7 and is due in seven months

A) 13615.52 B) 14615.52
C) 15615.52 D) 16615.52
 
Answer & Explanation Answer: C) 15615.52

Explanation:

I = prt = [15000 × 0.07 × (214/365) ]=615.52

Future value, S = P + I = $15 000 + $615.52 = $15 615.52

Report Error

View Answer Report Error Discuss

Filed Under: Simple Interest
Exam Prep: Bank Exams
Job Role: Bank PO

Q:

A loan of $15 000 is taken out. If the interest rate on the loan is 7%, how much interest is due and what is the amount repaid if the loan is due in seven months

A) 15612.50 B) 14612.50
C) 13612.50 D) 17612.50
 
Answer & Explanation Answer: A) 15612.50

Explanation:

We have P = 15 000, r = 0.07 and since the actual date the loan was taken out
is not given, we use t =7/12

I = Prt=$15 000* 0.07* 7/12 = $612.50

Amount repaid = Future or accumulated value,

S = P + I = $15 000 + $612.50 = $15 612.50

Report Error

View Answer Report Error Discuss

Filed Under: Simple Interest
Exam Prep: Bank Exams
Job Role: Bank PO

Q:

If P(A)=4/9;then the odd against the event A is:

A) 4:9 B) 4:5
C) 5:4 D) 4:14
 
Answer & Explanation Answer: C) 5:4

Explanation:

Here,P(A)=4/9=p/(p+q)

P(odd against event A)=q/p=5/4

Report Error

View Answer Report Error Discuss

Filed Under: Probability

Q:

What is time-stamping?

Answer

It is a technique proposed by Lamport, used to order events in a distributed system without the use of clocks. This scheme is intended to order events consisting of the transmission of messages. Each system 'i' in the network maintains a counter Ci. Every time a system transmits a message, it increments its counter by 1 and attaches the time-stamp Ti to the message. When a message is received, the receiving system 'j' sets its counter Cj to 1 more than the maximum of its current value and the incoming time-stamp Ti. At each site, the ordering of messages is determined by the following rules: For messages x from site i and y from site j, x precedes y if one of the following conditions holds....(a) if Ti

Report Error

View answer Workspace Report Error Discuss

Q:

Describe the Buddy system of memory allocation.

Answer

Free memory is maintained in linked lists, each of equal sized blocks. Any such block is of size 2^k. When some memory is required by a process, the block size of next higher order is chosen, and broken into two. Note that the two such pieces differ in address only in their kth bit. Such pieces are called buddies. When any used block is freed, the OS checks to see if its buddy is also free. If so, it is rejoined, and put into the original free-block linked-list.

Report Error

View answer Workspace Report Error Discuss

Q:

Explain the popular multiprocessor thread-scheduling strategies.

Answer

  1. Load Sharing: Processes are not assigned to a particular processor. A global queue of threads is maintained. Each processor, when idle, selects a thread from this queue. Note that load balancing refers to a scheme where work is allocated to processors on a more permanent basis.

  2. Gang Scheduling: A set of related threads is scheduled to run on a set of processors at the same time, on a 1-to-1 basis. Closely related threads / processes may be scheduled this way to reduce synchronization blocking, and minimize process switching. Group scheduling predated this strategy.

  3. Dedicated processor assignment: Provides implicit scheduling defined by assignment of threads to processors. For the duration of program execution, each program is allocated a set of processors equal in number to the number of threads in the program. Processors are chosen from the available pool.

  4. Dynamic scheduling: The number of thread in a program can be altered during the course of execution.

Report Error

View answer Workspace Report Error Discuss

Q:

What are the stipulations of C2 level security?

Answer

C2 level security provides for:


 


1.Discretionary Access Control


2.Identification and Authentication


3.Auditing


4.Resource reuse

Report Error

View answer Workspace Report Error Discuss

Q:

What is cycle stealing?

Answer

We encounter cycle stealing in the context of Direct Memory Access (DMA). Either the DMA controller can use the data bus when the CPU does not need it, or it may force the CPU to temporarily suspend operation. The latter technique is called cycle stealing. Note that cycle stealing can be done only at specific break points in an instruction cycle.

Report Error

View answer Workspace Report Error Discuss