What are some things you realised when you got mature?
Don’t mind on what others thinking about you. It just wastes your time, not theirs.
Updating skill is more important than your degrees.
Dealing with people has a major role in your success along with your technical knowledge.
Making the best of current situation is necessary.
We can start afresh at any time without wasting time on thinking what happened in past.
We think ourselves as smarter compared to others. But, there are a lot of people smarter than us. Just we have not met them yet.
Forgive others and yourself for the mistakes that happened in the past.
If you are success today, there is a greater probability that you will be failure next day. Similarly, if you are failure today, there is a higher chance, you will be successful next time. Life is full of challenges and one day we are going to die, so embrace all challenges with a happy smile.
We are in denial of bad/unfortunate events that had already happened to others/your neighbours. So, be compassionate to them as one day you may find yourself in that situation.
A person should not judged by their behaviour as different person’s upbringings are different. Each person’s history, experience shape their behaviour.
It is okay to seek help from others since it is not possible to become expert on every domain. But you should try your own multiple times before seeking help.
Both
hostname and IP address are used for identification of Internet hosts.
Just like a human being is identified by a name in birth certificate and
driving license number. Within a given context, one identification may
be more appropriate than another. Host names are mnemonic and therefore,
we can remember it easily. But it has some disadvantages: (i) We can
not infer accurately the location of the host in the Internet (ii) Since
a hostname consists of variable length alphanumeric characters, they
would be difficult to process by routers. Due to this it is better to
identify a host by IP address.
and IP address is: 127.7.106.83. An IP address is hierarchical. As we
scan an IP address from left to right, we obtain more and more specific
information about where the host is located in the Internet. It is
analogous to a postal address, where scanning a postal address from
bottom to top, we get specific information about where the address is
located.
1. Difference
between network security and cyber security? 2. What is degree of
multiprogramming? 3. Difference bandwidth and throughput? 4. What is
context switching? 5. What is multihoming? 6. What is inside a router?
If
the application developer chooses UDP as transport layer protocol, then
there is no handshaking between sending and receiving transport layer
entities before sending a segment.
IPSec
is a standard set of protocol for network layer used by both IPv4 and
IPv6. It is used to provide (i) confidentiality: (ii) authentication and
integrity: (iii) replay attack protection: It is a collection of
protocols: (i) Encapsulating Security Payload (ESP) protocol : Provides
encryption and secu…
First
we have to understand the concept of layers. Suppose you doing an
online transaction through SBI net banking in your mobile. There are
different types of functions running in your mobile and SBI server to
make the transaction work. For easy understanding/visualisation, we
group those functions…
First
we have to understand the concept of layers. Suppose you are doing an
online transaction through SBI net banking in your mobile. There are
different types of functions running in your mobile and SBI server to
make the transaction work. For easy understanding/visualisation, we
group those funct…
Why is machine learning being given so much importance?
What
is Machine Learning? Algorithms that learn from data are the focus of
the field of machine learning. The goal of machine learning is to teach
computers to make forecasts, judgments, and advancements on their own
without human input. Artificial intelligence (AI) in the form of machine
learning (ML…
When should structs be used instead of classes in C++?
There are two answers to this question
1. Struct and class are pretty much the same, except that the members of
a struct are public by default, while the members of a class are
private by default. So you’d pick whichever one made the coding task
easy. 2. You should only use a struct for a simple data record…
In
non-persistent HTTP, a brand new TCP connection must be established and
maintained for each requested object. When a user requests a Web page
(for example clicks on a hyperlink). Suppose the web page consists of a
base HTML file and 10 JPEG images. So in case of non-persistent HTTP, 11
TCP connec…
Mathematics
is a subject in which concepts are chained in sequences of
dependencies. When you have long chains, there are very few starting
points, very few things to memorize. In mathematics, you have very few
things to memorize and the rest you deduce as you go through. The chain
of deductions is…
IP
is not a reliable protocol. IP’s service model is best-effort delivery
service. It means IP makes its best effort to deliver packets between
communicating hosts, but it makes no guarantees. In particular, IP does
not guarantee (i) packet delivery (ii) orderly delivery of packets (iii)
integrity i…
Classes
are a way to group data and functionality together. For example, you
can think of a computer game where we need the representation of a
player. So, what are the things we need to represent a player. We
definitely want some kind of data for example, the position of a player,
some attributes o…
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)Oct 28
Removal
of date in document in latex \documentclass{article}
\usepackage{xcolor} \title{Suggested List of Potential Referees}
\date{\vspace{-5ex}} \begin{document} … \end{document}
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)Oct 28
Reduce
the font size of a table in latex \begin{table*}[h!] \caption{State
Transitions of PIT} \begin{center} \fontsize{8pt}{8.25pt}\selectfont
\begin{tabular}{ |p{5cm}|c|c|c| } … \end{tabular} \end{center}
\end{table*}
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)Oct 26
How
to refer a figure as a table in latex? \begin{figure}[htb] \centering
\captionof{table}[foo]{Table Name}
\includegraphics[width=1.0\linewidth]{tableA.png} \label{img:foobar}
\end{figure}
What is it that really matters the most in our life?
First picture: Ratan Tata 25 years
2nd picture: Ratan Tata 84 years When Indian billionaire Ratanji Tata
was asked by a radio presenter in a telephone interview: "Sir, what do
you remember when you found happiness in life"? Ratanji Tata said: "I
have gone through four stages of happiness in life, and…
(more)
Access this answer and support the author as a Quora+ subscriber
Access all answers reserved by
Rohit Virmani
for Quora+ subscribers
Access exclusive answers from thousands more participating creators in Quora+
Figure: Inside view of a router There are four router components: (i)
Input port: A lookup function is performed at input port. The forwarding
table is consulted to determine the router output port to which an
arriving packet will be forwarded via Switching fabric. Control packets
(for example, the pa…
What is the difference between Nash Equilibrium and Pareto Optimality?
Nash
equilibrium is an outcome in which every player is doing the best he
possibly can given other players’ choices. So, no player can benefit
from unilaterally changing his choice. Pareto optimal is an outcome from
which any attempt to benefit someone by deviating to some other outcome
will necessar…
What is the difference between throughput and goodput?
Throughput
is how the rate of raw data you can stuff down a transmission medium
without error. Goodput is the rate of ”good data” absorbed and processed
by applications, essentially meaning the throughput minus the rate of
useless junk arriving. “Useless junk” includes superfluous
retransmissions, pa…
What is a good way to write abstract of a research paper?
Why
a compelling abstract is essential? Because an abstract is one of the
most read sections of a paper. Many researchers decide if they want to
continue reading based on the abstract. An abstract is where you state
the idea, and give reasons on why your research is compelling enough.
The purpose of a…
Ransomware
is a type of malware that restricts access to the computer system and
demands the user to pay a ransom to the malware operators to remove the
restriction. Email is the most common delivery mechanism for
ransomeware, Users fall prey to phishing email or clicking a malicious
web link.…
DNS
is an application layer protocol since (1) It runs between
communication end systems using the client-server paradigm. (2) It
relies on an underlying end-to-end transport protocol to transfer DNS
messages between communicating end systems.…
‘internet
’ refers to any network of interconnected networks. ‘Internet’ (with
capital I) refers to the global system of interconnected networks that
we use in our day-to-day lives.
If
we go by the definition provided by Wikipedia, it states the following:
“In computer programming, an application programming interface (API) is
a set of subroutine definitions, protocols, and tools for building
application software. In general terms, it is a set of clearly defined
methods of commu…
Wireless
communication allows the transfer of information between a transmitter
and a receiver, without a physical medium. The same device typically
acts as both a transmitter and a receiver, by using antennas. The
communication link uses radio frequency signals to transfer information.…
First
download Eclipse from Eclipse downloads - Select a mirror | The Eclipse
Foundation Commands: tar -xvzf eclipse-inst-jre-linux64.tar.gz cd
eclipse-installer/ ./eclipse-inst Reference: HOWTO configure Eclipse
with ns-3
serialization is the process of translating a data structure or object
state into a format that can be stored (for example, in a file or memory
data buffer) or transmitted (for example, over a computer network) and
reconstructed later. As you can see in the first Figure, there is some
object state in…
No
one knows whether or not efficient algorithms exist for NP-complete
problems. The set of NP-complete problems has the remarkable property
that if an efficient algorithm exists for any one of them, then
efficient algorithms exists for all of them.…
Some tips:
1. You need to be good at C++. Have to understand the basic concepts
such as smart pointer, class, object, struct. Have to know how to create
classes so that later we can design your own custom class and extend…
a[i]=
Base adress + (i-LB)*S S= Size of an array element LB= Lower bound PS:
for a[0…5], lower bound is 0 and for a[1..4], lower bound is 1 for
a[-3…4], lower bound is -3
A
data structure is a particular way of organising data in a computer so
that it can be used efficiently. See Data Structure and Algorithms (DSA)
Tutorial for further information.
Machine
learning is about abstracting and extracting knowledge from data and
then applying that data algorithmically to make inference and to make
decisions right.
Suppose, in a network as shown above, Harry wants to send a message to
Ron. If we use Hub, the same message will be transferred to all the
devices connected to hub. That means, the message that was sent to Ron
will be seen by Hermione and Malfoy as well. If we use switch, the message is not sent to a…
I
am 23 years (will turn 24 this March) old Software Engineer (SDE1 -
Mobile) in Bangalore. I started my career as an intern in May 2019 where
I used to get 15K in hand every month for up to 6 months. After that, I
used to get 22k per month for another 6 months. I worked for a total of
1 year as an…
(more)
Access this answer and support the author as a Quora+ subscriber
Access all answers reserved by
Rittik Kumar
for Quora+ subscribers
Access exclusive answers from thousands more participating creators in Quora+
Recursion
is for an algorithm and starts at a finite value N and goes back to a
base value (say 1). Induction starts at 1, and then starting at N shows
you how to go to N+1, and uses a “leap” to conclude something for all
natural numbers.
What is the difference between a walk and a path in graph theory?
All of these are sequences of vertices and edges. They have the following properties :
1. Walk : Vertices may repeat. Edges may repeat (Closed or Open)
2. Trail : Vertices may repeat. Edges cannot repeat (Open) 3. Circuit :
Vertices may repeat. Edges cannot repeat (Closed) 4. Path : Vertices
cannot repeat. Edges ca…
Relations
are more general than functions. In a function, each element of the
domain has exactly one associated element in the range. In a relation,
there may be several such elements in the range. PS: f: S1->S2 If f
is a function, then the first set is called the domain of f and the
second set is its…
What is the difference between computer organisation and computer architecture in detail?
The
short answer is that they are loose terms with their differences
largely lost now. The long answer follows. In the past, computer
architecture vs organization is somewhat similar to architecture vs
civil engineering. The former is about the design of the system and the
latter the implementation o…
Cryptocurrency
is a type of digital asset which can be used to exchange value between
parties. It uses cryptography to secure how it is transferred and to
control the creation of new units of that currency.
Hashing
is one way function. We can generate a hash from a text but there is no
way to get back the original text from the hash. This is different from
encryption. When we encrypt a message using a key, we can use the same
key for decryption and get the original. A hash generates a unique
fingerprin…
A
cryptographic hash is basically a digest or digital fingerprint of a
certain amount of data. You can use the following link to get a hash of a
particular message you want and you will observe for each new character
added, there is always a new hash. https://demoblockchain.org/hash
SHA256 Hash in the…
What are the pros and cons of representing a graph in an adjacency list, an adjacency matrix, and objects/classes?
There
are 2 big differences between adjacency list and matrix. One is space
requirement, and the other is access time. Space Needed Recall that
adjacency matrix is a N by N array, either filled with true/false (if
unweighted), or the weight of the edge. This requires O(N^2) space
complexity. This is…
Mathematics
is the science and study of quality, structure, space, and change.
Mathematicians seek out patterns, formulate new conjectures, and
establish truth by rigorous deduction from appropriately chosen axioms
and definitions. Who defined this?
You
asked who defined mathematics that way. Lots of people have
characterized mathematics with words like that, and that
characterization is a pretty good one. Google finds the first use of the
precise wording of your first sentence “Mathematics is the science and
study of quality, structure, space,…
Definitely yes.
* Type annotations improve the code readability, which is Python’s key
advantage. * It also helps us to create a more correct and meaningful
code. * In most cases, type annotations are just enough for API doc Let’s look at the following code. The getImageList() method is intended to return a li…
GoLang
is short form of Go Programming Language. It is crazy fast, it has so
much concurrency (ability to do multiple things at once). It gives the
same expressiveness the python does, but the same power and core
functionality that c or C++, some of those lower languages do. It can
cross compile and…
Python
is a scripting language which means it is interpreted. That means there
is another kind of program waiting in the background reading your code
as if it were a script to act out on stage and then performing those
actions and going and doing those things.…
* Find
the research area you are Interested in by discussing with peers and
PhD Guide. * Start reading survey papers and white papers published by
some organisation related to the topic : Good survey paper in CS is:
IEEE Communications Surveys and Tutorials. For example, white paper for
D2D communication…
We
can use a password for each transaction, which should be used once and
discarded. Thus, we encryption and decryption can help protecting
against replay attacks.
Simply,
“break” helps to jump outside of the current loop. “continue” means
stop this particular iteration right here and execute the next
iteration. In real life also, we use break and continue while reading a
book/novel. Suppose, you are reading a book. for
(pag_number=0;page_number<=100;page_number+…
Now-a-days,
we use Internet for services like net banking, e-health (your health
record in hospital database), military (secret talk among high level
officials). These services use sensitive information. To secure us from
malicious persons, we use cryptography in Internet communication so that
no on…
In
a network, a router can not quickly process packets if the rate of
incoming packets is more than outgoing packets. So, to avoid packet
loss, packets are inserted in a queue. As a network designer, you can
make different designs of the queue. The most simple design is drop tail
where a packet will…
Tezpur
university Computer Science (if you are interested in CSE). In CSE, you
should always keen to learn new things/technologies, otherwise you can
not excel.
These
refer to how long it takes a program to run. Problems in class P can
be solved with algorithms that run in polynomial time. Say you have an
algorithm that finds the smallest integer in an array. One way to do
this is by iterating over all the integers of the array and keeping
track of the sma…
Following flag bits in the TCP header are used for TCP connection management.
* SYN: we use this for the initial three-way handshake and it’s used to
set the initial sequence number. * FIN: this finish bit is used to end
the TCP connection. TCP is full-duplex so both parties will have to use
the FIN bit t…
I
am going to explain your question from real life: We normally say the
person has a good network. That means he is in connection to many other
people through different means like phone, email, etc. Similarly, a
networking device such as a laptop, router, your smartwatch (which we
generally term as ho…
A
bitcoin is a type of digital asset that can be bought, sold or
transferred between parties securely over the Internet. Because of this,
bitcoin can be used to store value, much like buying gold, silver and
other types of investments. But unlike those other types of investments,
Bitcoin also serves…
A
blockchain is a constantly growing ledger that keeps a permanent record
of all transactions that have taken place, in a secure, chronological
and immutable way.
Some
tips for writing a good research paper (from my own experience) 1. Try
to develop a curiosity to read your paper. Like in a movie, we want to
know what will happen next. 2. State clearly what is the problem you are
going to solve. 3. State the challenges you face to solve this problem.
4. State how…
Suppose
you are given a pipe through which 10-litre water flows. Now, in
context to network, suppose your computer (laptop) downloads a video
from YouTube server. There are many links between your laptop and
Youtube server, which are connected through routers. Each link has its
own capacity to carry…
In
a circuit-switched network, to provide communication between the end
systems, the resources that are required along the path are reserved for
the duration of the communication session. The example of resources are
buffers and link transmission rate. PS: It is analogous to reserving
the table befor…
The
purpose of 3-way handshaking is to validate the authenticity of each
party (client and server) and to establish the encryption key and
options that will secure subsequent communications. Suppose you want
some help from a unknown person. So before asking help, you will say a
“Hi” and you will wait…
If
we consider a single queue, there may be a possibility that a packet
with a very less delay requirement may be inserted in the queue already
having a large number of packets in it. Thus waiting in a queue will
significantly affect the delay constrained applications like VOIP,
VIDEO. To address th…
Don’t mind on what others thinking about you. It just wastes your time, not theirs.
Updating skill is more important than your degrees.
Dealing with people has a major role in your success along with your technical knowledge.
Making the best of current situation is necessary.
We can start afresh at any time without wasting time on thinking what happened in past.
We think ourselves as smarter compared to others. But, there are a lot of people smarter than us. Just we have not met them yet.
Forgive others and yourself for the mistakes that happened in the past.
If you are success today, there is a greater probability that you will be failure next day. Similarly, if you are failure today, there is a higher chance, you will be successful next time. Life is full of challenges and one day we are going to die, so embrace all challenges with a happy smile.
We are in denial of bad/unfortunate events that had already happened to others/your neighbors. So, be compassionate to them as one day you may find yourself in that situation.
A person should not judged by their behavior as different person’s upbringings are different. Each person’s history, experience shape their behavior.
Both
hostname and IP address are used for identification of Internet hosts.
Just like a human being is identified by a name in birth certificate and
driving license number. Within a given context, one identification may
be more appropriate than another. Host names are mnemonic and therefore,
we can remember it easily. But it has some disadvantages: (i) We can
not infer accurately the location of the host in the Internet (ii) Since
a hostname consists of variable length alphanumeric characters, they
would be difficult to process by routers. Due to this it is better to
identify a host by IP address.
and IP address is: 127.7.106.83. An IP address is hierarchical. As we
scan an IP address from left to right, we obtain more and more specific
information about where the host is located in the Internet. It is
analogous to a postal address, where scanning a postal address from
bottom to top, we get specific information about where the address is
located.
1. Difference
between network security and cyber security? 2. What is degree of
multiprogramming? 3. Difference bandwidth and throughput? 4. What is
context switching? 5. What is multihoming? 6. What is inside a router?
If
the application developer chooses UDP as transport layer protocol, then
there is no handshaking between sending and receiving transport layer
entities before sending a segment.
IPSec
is a standard set of protocol for network layer used by both IPv4 and
IPv6. It is used to provide (i) confidentiality: (ii) authentication and
integrity: (iii) replay attack protection: It is a collection of
protocols: (i) Encapsulating Security Payload (ESP) protocol : Provides
encryption and secu…
First
we have to understand the concept of layers. Suppose you doing an
online transaction through SBI net banking in your mobile. There are
different types of functions running in your mobile and SBI server to
make the transaction work. For easy understanding/visualisation, we
group those functions…
First
we have to understand the concept of layers. Suppose you are doing an
online transaction through SBI net banking in your mobile. There are
different types of functions running in your mobile and SBI server to
make the transaction work. For easy understanding/visualisation, we
group those funct…
Why is machine learning being given so much importance?
What
is Machine Learning? Algorithms that learn from data are the focus of
the field of machine learning. The goal of machine learning is to teach
computers to make forecasts, judgments, and advancements on their own
without human input. Artificial intelligence (AI) in the form of machine
learning (ML…
When should structs be used instead of classes in C++?
There are two answers to this question
1. Struct and class are pretty much the same, except that the members of
a struct are public by default, while the members of a class are
private by default. So you’d pick whichever one made the coding task
easy. 2. You should only use a struct for a simple data record…
In
non-persistent HTTP, a brand new TCP connection must be established and
maintained for each requested object. When a user requests a Web page
(for example clicks on a hyperlink). Suppose the web page consists of a
base HTML file and 10 JPEG images. So in case of non-persistent HTTP, 11
TCP connec…
Mathematics
is a subject in which concepts are chained in sequences of
dependencies. When you have long chains, there are very few starting
points, very few things to memorize. In mathematics, you have very few
things to memorize and the rest you deduce as you go through. The chain
of deductions is…
IP
is not a reliable protocol. IP’s service model is best-effort delivery
service. It means IP makes its best effort to deliver packets between
communicating hosts, but it makes no guarantees. In particular, IP does
not guarantee (i) packet delivery (ii) orderly delivery of packets (iii)
integrity i…
Classes
are a way to group data and functionality together. For example, you
can think of a computer game where we need the representation of a
player. So, what are the things we need to represent a player. We
definitely want some kind of data for example, the position of a player,
some attributes o…
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)Oct 28
Removal
of date in document in latex \documentclass{article}
\usepackage{xcolor} \title{Suggested List of Potential Referees}
\date{\vspace{-5ex}} \begin{document} … \end{document}
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)Oct 28
Reduce
the font size of a table in latex \begin{table*}[h!] \caption{State
Transitions of PIT} \begin{center} \fontsize{8pt}{8.25pt}\selectfont
\begin{tabular}{ |p{5cm}|c|c|c| } … \end{tabular} \end{center}
\end{table*}
PhD in Computer Science and Engineering (2022) at Indian Institute of Technology, Guwahati (IITG)Oct 26
How
to refer a figure as a table in latex? \begin{figure}[htb] \centering
\captionof{table}[foo]{Table Name}
\includegraphics[width=1.0\linewidth]{tableA.png} \label{img:foobar}
\end{figure}
What is it that really matters the most in our life?
First picture: Ratan Tata 25 years
2nd picture: Ratan Tata 84 years When Indian billionaire Ratanji Tata
was asked by a radio presenter in a telephone interview: "Sir, what do
you remember when you found happiness in life"? Ratanji Tata said: "I
have gone through four stages of happiness in life, and…
(more)
Access this answer and support the author as a Quora+ subscriber
Access all answers reserved by
Rohit Virmani
for Quora+ subscribers
Access exclusive answers from thousands more participating creators in Quora+
Figure: Inside view of a router There are four router components: (i)
Input port: A lookup function is performed at input port. The forwarding
table is consulted to determine the router output port to which an
arriving packet will be forwarded via Switching fabric. Control packets
(for example, the pa…
What is the difference between Nash Equilibrium and Pareto Optimality?
Nash
equilibrium is an outcome in which every player is doing the best he
possibly can given other players’ choices. So, no player can benefit
from unilaterally changing his choice. Pareto optimal is an outcome from
which any attempt to benefit someone by deviating to some other outcome
will necessar…
What is the difference between throughput and goodput?
Throughput
is how the rate of raw data you can stuff down a transmission medium
without error. Goodput is the rate of ”good data” absorbed and processed
by applications, essentially meaning the throughput minus the rate of
useless junk arriving. “Useless junk” includes superfluous
retransmissions, pa…
What is a good way to write abstract of a research paper?
Why
a compelling abstract is essential? Because an abstract is one of the
most read sections of a paper. Many researchers decide if they want to
continue reading based on the abstract. An abstract is where you state
the idea, and give reasons on why your research is compelling enough.
The purpose of a…
Ransomware
is a type of malware that restricts access to the computer system and
demands the user to pay a ransom to the malware operators to remove the
restriction. Email is the most common delivery mechanism for
ransomeware, Users fall prey to phishing email or clicking a malicious
web link.…
DNS
is an application layer protocol since (1) It runs between
communication end systems using the client-server paradigm. (2) It
relies on an underlying end-to-end transport protocol to transfer DNS
messages between communicating end systems.…
‘internet
’ refers to any network of interconnected networks. ‘Internet’ (with
capital I) refers to the global system of interconnected networks that
we use in our day-to-day lives.
If
we go by the definition provided by Wikipedia, it states the following:
“In computer programming, an application programming interface (API) is
a set of subroutine definitions, protocols, and tools for building
application software. In general terms, it is a set of clearly defined
methods of commu…
Wireless
communication allows the transfer of information between a transmitter
and a receiver, without a physical medium. The same device typically
acts as both a transmitter and a receiver, by using antennas. The
communication link uses radio frequency signals to transfer information.…
First
download Eclipse from Eclipse downloads - Select a mirror | The Eclipse
Foundation Commands: tar -xvzf eclipse-inst-jre-linux64.tar.gz cd
eclipse-installer/ ./eclipse-inst Reference: HOWTO configure Eclipse
with ns-3
serialization is the process of translating a data structure or object
state into a format that can be stored (for example, in a file or memory
data buffer) or transmitted (for example, over a computer network) and
reconstructed later. As you can see in the first Figure, there is some
object state in…
No
one knows whether or not efficient algorithms exist for NP-complete
problems. The set of NP-complete problems has the remarkable property
that if an efficient algorithm exists for any one of them, then
efficient algorithms exists for all of them.…
Some tips:
1. You need to be good at C++. Have to understand the basic concepts
such as smart pointer, class, object, struct. Have to know how to create
classes so that later we can design your own custom class and extend…
a[i]=
Base adress + (i-LB)*S S= Size of an array element LB= Lower bound PS:
for a[0…5], lower bound is 0 and for a[1..4], lower bound is 1 for
a[-3…4], lower bound is -3
A
data structure is a particular way of organising data in a computer so
that it can be used efficiently. See Data Structure and Algorithms (DSA)
Tutorial for further information.
Machine
learning is about abstracting and extracting knowledge from data and
then applying that data algorithmically to make inference and to make
decisions right.
Suppose, in a network as shown above, Harry wants to send a message to
Ron. If we use Hub, the same message will be transferred to all the
devices connected to hub. That means, the message that was sent to Ron
will be seen by Hermione and Malfoy as well. If we use switch, the message is not sent to a…
I
am 23 years (will turn 24 this March) old Software Engineer (SDE1 -
Mobile) in Bangalore. I started my career as an intern in May 2019 where
I used to get 15K in hand every month for up to 6 months. After that, I
used to get 22k per month for another 6 months. I worked for a total of
1 year as an…
(more)
Access this answer and support the author as a Quora+ subscriber
Access all answers reserved by
Rittik Kumar
for Quora+ subscribers
Access exclusive answers from thousands more participating creators in Quora+
Recursion
is for an algorithm and starts at a finite value N and goes back to a
base value (say 1). Induction starts at 1, and then starting at N shows
you how to go to N+1, and uses a “leap” to conclude something for all
natural numbers.
What is the difference between a walk and a path in graph theory?
All of these are sequences of vertices and edges. They have the following properties :
1. Walk : Vertices may repeat. Edges may repeat (Closed or Open)
2. Trail : Vertices may repeat. Edges cannot repeat (Open) 3. Circuit :
Vertices may repeat. Edges cannot repeat (Closed) 4. Path : Vertices
cannot repeat. Edges ca…
Relations
are more general than functions. In a function, each element of the
domain has exactly one associated element in the range. In a relation,
there may be several such elements in the range. PS: f: S1->S2 If f
is a function, then the first set is called the domain of f and the
second set is its…
What is the difference between computer organisation and computer architecture in detail?
The
short answer is that they are loose terms with their differences
largely lost now. The long answer follows. In the past, computer
architecture vs organization is somewhat similar to architecture vs
civil engineering. The former is about the design of the system and the
latter the implementation o…
Cryptocurrency
is a type of digital asset which can be used to exchange value between
parties. It uses cryptography to secure how it is transferred and to
control the creation of new units of that currency.
Hashing
is one way function. We can generate a hash from a text but there is no
way to get back the original text from the hash. This is different from
encryption. When we encrypt a message using a key, we can use the same
key for decryption and get the original. A hash generates a unique
fingerprin…
A
cryptographic hash is basically a digest or digital fingerprint of a
certain amount of data. You can use the following link to get a hash of a
particular message you want and you will observe for each new character
added, there is always a new hash. https://demoblockchain.org/hash
SHA256 Hash in the…
What are the pros and cons of representing a graph in an adjacency list, an adjacency matrix, and objects/classes?
There
are 2 big differences between adjacency list and matrix. One is space
requirement, and the other is access time. Space Needed Recall that
adjacency matrix is a N by N array, either filled with true/false (if
unweighted), or the weight of the edge. This requires O(N^2) space
complexity. This is…
Mathematics
is the science and study of quality, structure, space, and change.
Mathematicians seek out patterns, formulate new conjectures, and
establish truth by rigorous deduction from appropriately chosen axioms
and definitions. Who defined this?
You
asked who defined mathematics that way. Lots of people have
characterized mathematics with words like that, and that
characterization is a pretty good one. Google finds the first use of the
precise wording of your first sentence “Mathematics is the science and
study of quality, structure, space,…
Definitely yes.
* Type annotations improve the code readability, which is Python’s key
advantage. * It also helps us to create a more correct and meaningful
code. * In most cases, type annotations are just enough for API doc Let’s look at the following code. The getImageList() method is intended to return a li…
GoLang
is short form of Go Programming Language. It is crazy fast, it has so
much concurrency (ability to do multiple things at once). It gives the
same expressiveness the python does, but the same power and core
functionality that c or C++, some of those lower languages do. It can
cross compile and…
Python
is a scripting language which means it is interpreted. That means there
is another kind of program waiting in the background reading your code
as if it were a script to act out on stage and then performing those
actions and going and doing those things.…
* Find
the research area you are Interested in by discussing with peers and
PhD Guide. * Start reading survey papers and white papers published by
some organisation related to the topic : Good survey paper in CS is:
IEEE Communications Surveys and Tutorials. For example, white paper for
D2D communication…
We
can use a password for each transaction, which should be used once and
discarded. Thus, we encryption and decryption can help protecting
against replay attacks.
Simply,
“break” helps to jump outside of the current loop. “continue” means
stop this particular iteration right here and execute the next
iteration. In real life also, we use break and continue while reading a
book/novel. Suppose, you are reading a book. for
(pag_number=0;page_number<=100;page_number+…
Now-a-days,
we use Internet for services like net banking, e-health (your health
record in hospital database), military (secret talk among high level
officials). These services use sensitive information. To secure us from
malicious persons, we use cryptography in Internet communication so that
no on…
In
a network, a router can not quickly process packets if the rate of
incoming packets is more than outgoing packets. So, to avoid packet
loss, packets are inserted in a queue. As a network designer, you can
make different designs of the queue. The most simple design is drop tail
where a packet will…
Tezpur
university Computer Science (if you are interested in CSE). In CSE, you
should always keen to learn new things/technologies, otherwise you can
not excel.
These
refer to how long it takes a program to run. Problems in class P can
be solved with algorithms that run in polynomial time. Say you have an
algorithm that finds the smallest integer in an array. One way to do
this is by iterating over all the integers of the array and keeping
track of the sma…
Following flag bits in the TCP header are used for TCP connection management.
* SYN: we use this for the initial three-way handshake and it’s used to
set the initial sequence number. * FIN: this finish bit is used to end
the TCP connection. TCP is full-duplex so both parties will have to use
the FIN bit t…
I
am going to explain your question from real life: We normally say the
person has a good network. That means he is in connection to many other
people through different means like phone, email, etc. Similarly, a
networking device such as a laptop, router, your smartwatch (which we
generally term as ho…
A
bitcoin is a type of digital asset that can be bought, sold or
transferred between parties securely over the Internet. Because of this,
bitcoin can be used to store value, much like buying gold, silver and
other types of investments. But unlike those other types of investments,
Bitcoin also serves…
A
blockchain is a constantly growing ledger that keeps a permanent record
of all transactions that have taken place, in a secure, chronological
and immutable way.
Some
tips for writing a good research paper (from my own experience) 1. Try
to develop a curiosity to read your paper. Like in a movie, we want to
know what will happen next. 2. State clearly what is the problem you are
going to solve. 3. State the challenges you face to solve this problem.
4. State how…
Suppose
you are given a pipe through which 10-litre water flows. Now, in
context to network, suppose your computer (laptop) downloads a video
from YouTube server. There are many links between your laptop and
Youtube server, which are connected through routers. Each link has its
own capacity to carry…
In
a circuit-switched network, to provide communication between the end
systems, the resources that are required along the path are reserved for
the duration of the communication session. The example of resources are
buffers and link transmission rate. PS: It is analogous to reserving
the table befor…
The
purpose of 3-way handshaking is to validate the authenticity of each
party (client and server) and to establish the encryption key and
options that will secure subsequent communications. Suppose you want
some help from a unknown person. So before asking help, you will say a
“Hi” and you will wait…
If
we consider a single queue, there may be a possibility that a packet
with a very less delay requirement may be inserted in the queue already
having a large number of packets in it. Thus waiting in a queue will
significantly affect the delay constrained applications like VOIP,
VIDEO. To address th…
No comments:
Post a Comment