Questions

Q:

The book " The Vijay Mallya Story " has been written by _____

A) Vijay Mallya B) Gopinath
C) Giriprakash D) Siddharth Mallya
 
Answer & Explanation Answer: C) Giriprakash

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Books and Authors
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Bank Clerk , Bank PO

9 3544
Q:

At which of the following places is the College of Defence Management located ?

A) Pune B) Secunderabad
C) Chennai D) Dehradun
 
Answer & Explanation Answer: B) Secunderabad

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: General Awareness
Exam Prep: Bank Exams , CAT
Job Role: Bank PO

3 3544
Q:

A hunter on the ground wishes to shoot a  bird on a tree at a distance with his rifle. He has to point the rifle

A) at the lower alevation than the bird B) at a higher alevation than the bird
C) In the same direction as the bird D) vertically upwards
 
Answer & Explanation Answer: B) at a higher alevation than the bird

Explanation:

The trajectory of the bullet is a parabola

Report Error

View Answer Report Error Discuss

Filed Under: Physics

4 3544
Q:

Cache memory is a form of ROM.

A) TRUE B) FALSE
Answer & Explanation Answer: B) FALSE

Explanation:

The given sentence Cache memory is a form of ROM is FALSE. Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).

Report Error

View Answer Workspace Report Error Discuss

1 3542
Q:

Data integrity constraints are used to

A) Ensure that duplicate records are not entered into the table B) Prevent users from changing the values stored in the table
C) Control who is allowed access to the data D) Improve the quality of data entered for a specific property like table column
 
Answer & Explanation Answer: D) Improve the quality of data entered for a specific property like table column

Explanation:

Integrity constraints are used to ensure accuracy and consistency of data in a relational database. Data integrity is handled in a relational database through the concept of referential integrity. Many types of integrity constraints play a role in referential integrity (RI).

 

Hence, Data integrity constraints are used to Improve the quality of data entered for a specific property i.e, table column.

Report Error

View Answer Report Error Discuss

27 3542
Q:

What are the different Adder circuits you studied?

Answer

Adders are generally of five types:


1.Ripple Carry Adder:


The Ripple carry adder(RCA) consists of a building block named Half Adder(HA) which is cascaded to form a Full Adder(FA). These buildingblocks HAs and FAs are also the building blocks of all types of adders.The n full adders are cascaded to form n bit RCA.


The full adder has three input pins(input Ai,input Bi,carryin Ci) and two output pins(Sum and Ci+1).Its equations are:


Sum=Ai^Bi^Ci


Ci+1=Ai.Bi+Bi.Ci+Ai.Ci


 


2. Carry Lookahead Adder:


The Carry Lookahead Adder(CLA) reduces the delay as that in RCA. Let Gi=Ai.Bi, and Pi=Ai^Bi, then Ci+1=Gi+Pi.Ci.


The expressions for Sum and Ci+1 is then defined completely in terms of input pins rather wait for input carry to appear.


 


3. Carry Select Adder:


The carry select adder uses duplicate modules for each combination of input carry(i.e. 1 and 0).The multiplexers then select the appropriate sum and carry output according to the carry output of the preceding stages.


 


4. Carry Skip Adder:


The carry skip adder are as fast as carry lookahead adders which are the fastest adders but its spped decreases to about 20-30% if input operands are 64-bit or more. In these adders we divide the input bit stream into various blocks and make use of two observations:


-if each element of the two bit streams are unequal,i.e. Ai!=Bi than the carry input of the block is equal to the carry input.


-if each element of the two bit streams are equal,i.e. Ai=Bi than the carry input of the block is opposite of the carry input.


 


5. Carry Save Adder:


The carry save adder reduces the addition of three elements into addition of two elements,i.e. if you want sum of nine numbers it reduces it into sum of six numbers. In first step the sum of three numbers is calculated without bothering for the carry.During the second step only carry is calculated which is then added to the generated sum to give the required sum. 

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

0 3541
Q:

Census of population in India is done after

A) 2 years B) 5 years
C) 7 years D) 10 years
 
Answer & Explanation Answer: D) 10 years

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian Economy

1 3541
Q:

Explain the meaning of mutex.

Answer

Mutex is the short form for ‘Mutual Exclusion object’. A mutex allows multiple threads for sharing the same resource. The resource can be file. A mutex with a unique name is created at the time of starting a program. A mutex must be locked from other threads, when any thread that needs the resource. When the data is no longer used / needed, the mutex is set to unlock.

Report Error

View answer Workspace Report Error Discuss

0 3540