Technical Questions

Q:

What is cycle stealing?

Answer

We encounter cycle stealing in the context of Direct Memory Access (DMA). Either the DMA controller can use the data bus when the CPU does not need it, or it may force the CPU to temporarily suspend operation. The latter technique is called cycle stealing. Note that cycle stealing can be done only at specific break points in an instruction cycle.

Report Error

View answer Workspace Report Error Discuss

2 8456
Q:

Explain soundex() and metaphone() ?

Answer

soundex()
The soundex() function calculates the soundex key of a string. A soundex key is a four character long alphanumeric string that represent English pronunciation of a word. he soundex() function can be used for spelling applications.
< ?php
$str = "hello";
echo soundex($str);
? >


metaphone()
The metaphone() function calculates the metaphone key of a string. A metaphone key represents how a string sounds if said by an English speaking person. The metaphone() function can be used for spelling applications.
< ?php
echo metaphone("world");
? >

Report Error

View answer Workspace Report Error Discuss

42 8391
Q:

If the binary equivalent of 5.375 in normalised form is 0100 0000 1010 1100 0000 0000 0000 0000, what would be the output of the following program?

main()

{

    float a = 5.375 ;

    char *p;

    int i;

    p = ( char* ) &a ;

    for ( i = 0; i <= 3 ; i++ )

          printf ( " %02x ", (unsigned char ) p[i] );

}

Answer

00 00 AC 40

Report Error

View answer Workspace Report Error Discuss

Subject: Programming

7 8226
Q:

What is context switching?

Answer

Transferring the control from one process to other process requires saving the state of the old process and loading the saved state for new process. This task is known as context switching.

Report Error

View answer Workspace Report Error Discuss

1 8169
Q:

When designing the file structure for an operating system, what attributes are considered ?

Answer

Commonly, the different attributes for a file structure are naming,size, identifier, a level of protection, supported file types and location for the files.

Report Error

View answer Workspace Report Error Discuss

18 8137
Q:

 When three or more AND and OR conditions are combined, it is easier to use the SQL keyword(s):

A) LIKE only. B) IN only.
C) NOT IN only. D) Both IN and NOT IN.
 
Answer & Explanation Answer: D) Both IN and NOT IN.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

2 7883
Q:

What are local and global page replacements?

Answer

Local replacement means that an incoming page is brought in only to the relevant process address space. Global replacement policy allows any page frame from any process to be replaced. The latter is applicable to variable partitions model only.

Report Error

View answer Workspace Report Error Discuss

4 7847
Q:

Of the following tree structure, which is, efficient considering space and time complexities?

A) Incomplete Binary Tree B) Complete Binary Tree
C) Full Binary Tree D) None
 
Answer & Explanation Answer: B) Complete Binary Tree

Explanation:

Full binary tree loses its nature when operations of insertions and deletions are done. For incomplete binary trees, extra storage is required and overhead of NULL node checking takes place. So complete binary tree is the better one since the property of complete binary tree is maintained even after operations like additions and deletions are done on it.

Report Error

View Answer Report Error Discuss

Filed Under: Software Testing

6 7754