Questions

Q:

What is MESI?

Answer

The MESI protocol is also known as illinois protocol due to its development the University of illinois at Urbana-Champaign and MESI is a widely used cache coherency and memory coherence protocol.


MESI is the most common which supports write-back cache. its use in personal computers became widespread with the introduction of intel's pentium processor to "support the more efficient write-back cache in addition to the write-through cache previously used by the Intel 486 processor"/

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

21 12571
Q:

Iodine test is used to detect

A) Carbohydrate B) Fat
C) Protein D) Cholesterol
 
Answer & Explanation Answer: A) Carbohydrate

Explanation:

The iodine test is used to test for the presence of starch i.e, Carbohydrate.

Report Error

View Answer Report Error Discuss

Filed Under: General Science
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO

30 12560
Q:

Impact analysis helps to decide

A) How many more test cases need to written. B) How much regression testing should be done.
C) Different Tools to perform Regression Testing D) Exit Criteria
 
Answer & Explanation Answer: B) How much regression testing should be done.

Explanation:

Impact Analysis is used in software testing to define all the risks associated with any kind of changes in a product being tested.

Impact Analysis is nothing but analyzing the impact of changes in the deployed product or application. It gives the information about the areas of the system that may be affected due to the change in the particular section or features of the application.

 

Why Impact Analysis is done :


1. It is done to understand the possible outcome of implementing the change. Inducing too much functionality into a product can reduce the overall performance of the product.

2. To identify all the files, documents and models that might have to be modified if team decides to implement the change in product

3. To estimate the effort needed behind implementing the change

4. To identify the task required to implement the change

5. It will list the dependencies on a specific element

 

The impact is analyzed on Requirements, Design & Architecture, impact on Test and impact on schedule.

Report Error

View Answer Report Error Discuss

0 12559
Q:

The most important feature of the Indian Parliament is  that:

A) it is the Union Legislature in India B) it also comprises of the president
C) it is bicameral in nature D) the upper House of the Parliament is never dissolved
 
Answer & Explanation Answer: B) it also comprises of the president

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Inventions

26 12555
Q:

Who is the present Attorney General of India?

A) K.K. Venugopal B) Mukul Rohatgi
C) Ranjit Kumar D) P. P. Malhotra
 
Answer & Explanation Answer: A) K.K. Venugopal

Explanation:

K.K. Venugopal is the new Attorney General of India since 2017.

Kottayan Katankot Venugopal, known generally to us as K. K. Venugopal is an eminent Indian constitutional lawyer and a senior advocate in the Supreme Court of India.

He was preceded by Mukul Rohatgi.

Report Error

View Answer Report Error Discuss

Filed Under: Indian Politics
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO

12 12553
Q:

When mapping a supertype/subtype relationship which of the following is true?

A) The supertype primary key is assigned to each subtype. B) The subtype primary key is assigned to each supertype.
C) There is no link between the supertype/subtype entities. D) There is no primary key/foreign key relationship between a supertype/subtype.
 
Answer & Explanation Answer: A) The supertype primary key is assigned to each subtype.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

4 12549
Q:

The common name for the crime of stealing passwords is

A) Spoofing B) Surfing
C) Identity Theft D) Speeling
 
Answer & Explanation Answer: A) Spoofing

Explanation:

A spoofing attack is a situation in which one individual or program effectively disguises or mask as another by falsifying information and thereby gaining up an ill-conceived advantage. It may use for stealing password or IP addresses.

Report Error

View Answer Report Error Discuss

18 12525
Q:

Which revenue system among the following is also known as the bandobast system?

A) Dahsala B) Nasaq
C) Kankut D) Zabti
 
Answer & Explanation Answer: D) Zabti

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian History

16 12522