Someone dials in to the UO modem pool using Windows 98. They get the "Connected" window. After this they try using a Web browser but cannot access any web pages. What would you check to try and find out what the problem is?
Does direct memory manipulation is an unsafe operations, if yes, how?
Complete structure of hashmap, very detail description, along with the basic coding of the hashmap internal implementation.
Describe Recovery from Deadlock?
How you can detect deadlock condition?
Tell something about deadlock and how can we prevent dead lock?
What are the deadlock avoidance schemes?
Explain the concept of deadlocks? Why they are used?
Traverse the given tree using Inorder, Preorder and Postorder traversals. Inorder : D H B E A F C I G J Preorder: A B D H E C F G I J Postorder: H D E B F I J G C A
Draw the B-tree of order 3 created by inserting the following data arriving in sequence – 92 24 6 7 11 8 22 4 5 16 19 20 78
Which is the simplest file structure? (a) Sequential (b) Indexed (c) Random (a) Sequential
Draw a binary Tree for the expression : A * B - (C + D) * (P / Q)
For the following COBOL code, draw the Binary tree? 01 STUDENT_REC. 02 NAME. 03 FIRST_NAME PIC X(10). 03 LAST_NAME PIC X(10). 02 YEAR_OF_STUDY. 03 FIRST_SEM PIC XX. 03 SECOND_SEM PIC XX.
What is Jagged Arrays?
Construct a doubly linked list using a single pointer in each node?