Skip to content

Category Archives: GATE CS

In this article, we are going to cover the performance of paging and will also cover the expression for evaluating paging performance. Let’s discuss one… Read More
Ring Topology may be a network configuration where device connections create a circular data path. In this each device is connected to with its exactly… Read More
Payload During the transmission of the data with the Internet Protocol from the sender to receiver. Data is sent in terms of packets and individual… Read More
In it’s life span a process executes in user mode and kernel mode. The User mode is normal mode where the process has limited access.… Read More
1. First Normal Form (1NF) : An entity that does not have any repeating columns or data groups can be termed as the First Norm.… Read More
Combinational logic is the concept in which two or more input state define one or more output state. Encoder and Decoder are the combinational logic… Read More
The limited broadcast address is defined as which sends or broadcast packet to all hosts connected to its own or home network. In limited broadcast… Read More
Set of all those attributes which can be functionally determined from an attribute set is called closure of the attribute set and the closure of… Read More
Prerequisite – Permutation and Combination Formula’s Used : 1. P(n, r) = n! / (n-r)! 2. P(n, n) = n! Example-1 : How many 4-letter… Read More
1. Half Adder : Half Adder is a combinational logic circuit which is designed by connecting one EX-OR gate and one AND gate. The half… Read More
Shift micro-operations are those micro-operations that are used for serial transfer of information. These are also used in conjunction with arithmetic micro-operation, logic micro-operation, and… Read More
Longitudinal Redundancy Check (LRC) is also known as 2-D parity check. In this method, data which the user want to send is organised into tables… Read More
In this article, we’ll try to establish the relation between Round Robin and Preemptive Priority Scheduling Algorithm. Let’s discuss the algorithms one by one first… Read More
Why do we need Checkpoints ? Whenever transaction logs are created in a real-time environment, it eats up lots of storage space. Also keeping track… Read More
Pre-requisites : TCP/IP model, and OSI Model In the establishment of TCP connection, Maximum Segment Size (MSS) is vital. MSS refers to field in TCP… Read More

Start Your Coding Journey Now!