Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge.
What are the three stages of building the hypotheses or …
The three stages of building a machine learning model are: Model Building Choose a suitable algorithm for the model and train it according to the requirement The six steps to building a machine learning model include: Contextualise machine learning in your organisation Explore the data andRead more
The three stages of building a machine learning model are:
Model Building
Choose a suitable algorithm for the model and train it according to the requirement
The six steps to building a machine learning model include:
Model Testing
In machine learning, model testing is referred to as the process where the performance of a fully trained model is evaluated on a testing set. The testing set consisting of a set of testing samples should be separated from the both training and validation sets, but it should follow the same probability distribution as the training set.
Applying the Model
Make the required changes after testing and use the final model for real-time projects
See lessDiscuss the functions of all general purpose registers of 8086.Explain …
General Purpose registers are used for temporary storage of data and memory access. Since the processor accesses register more quickly than memory. 8086 has four 16-bit general-purpose registers AX, BX, CX and DX. These are available to the programmer, for storing values during programs. Each of theRead more
General Purpose registers are used for temporary storage of data and memory access. Since the processor accesses register more quickly than memory. 8086 has four 16-bit general-purpose registers AX, BX, CX and DX. These are available to the programmer, for storing values during programs. Each of these can be divided into two 8-bit registers such as AH, AL; BH, BL; CL, CH and DL, DH. Beside their general use, these registers also have some specific functions.
Example:
MUL BL ; AX = (AL × BL)
MUL BX ; DX-AX = (AX × BX)
MUL BYTE PTR [BX] ; AX = (AL x DS:[BX])
Example:
MOV CL, [BX] ; Moves a byte from the address pointed by BX in Data Segment into CL. Physical Address calculated as DS * 10H + BX
MOV CH, [BX+6] ; Moves a byte from the address pointed by BX+6 in Data Segment to CH; Physical Address: DS * 10H + BX + 6H
MOV CL, [BX+SI] ; Moves a byte from the address pointed by BX+SI in Data Segment to CL. Physical Address: DS * 10H + BX + SI
Example:
MOV CX, 40H
BACK: MOV AL, BL
ADD AL, BL
. . MOV BL, AL
LOOP BACK
MOV CX, 40H BACK: MOV AL, BL ADD AL, BL . . MOV BL, AL LOOPZ BACK
Example:
MUL BX ; DX-AX = (AX × BX)
MOV DX, 2000H
IN AL, DX
See lessState the situations under which gateways are necessary in the …
Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have the same function of communication. The situation where gateways are necessary for different n/w like Ethernet, Token Ring, FDDI, etc. It can communicate if they are using the saRead more
Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have the same function of communication. The situation where gateways are necessary for different n/w like Ethernet, Token Ring, FDDI, etc. It can communicate if they are using the same protocol for communication like TCP/IP 08 Apple talk if they are using different protocols from gateway cash forward packets across different n/w s that may also use different protocols. Eg: if n/w A is a Token Ring network using TCP/IP & network B is a Novell Network, a gateway can relay frames between the two. This means that a gateway has not only had but also between different protocols. In certain situations, the only changes required are to the frame header. In other cases, the gateway must take the case of different frame sizes, data rates, formats, acknowledgment schemes, priority schemes, etc.
Features of Gateways
State the situations under which gateways are necessary in the …
Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have the same function of communication. The situation where gateways are necessary for different n/w like Ethernet, Token Ring, FDDI, etc. It can communicate if they are using the saRead more
Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have the same function of communication. The situation where gateways are necessary for different n/w like Ethernet, Token Ring, FDDI, etc. It can communicate if they are using the same protocol for communication like TCP/IP 08 Apple talk if they are using different protocols from gateway cash forward packets across different n/w s that may also use different protocols. Eg: if n/w A is a Token Ring network using TCP/IP & network B is a Novell Network, a gateway can relay frames between the two. This means that a gateway has not only had but also between different protocols. In certain situations, the only changes required are to the frame header. In other cases, the gateway must take the case of different frame sizes, data rates, formats, acknowledgment schemes, priority schemes, etc.
Features of Gateways
Create network to implement TCP/IP protocol
Follow The Below Link For the Answer: https://sikshapath.in/question/configuration-of-tcp-ip-protocols-using-cisco-packet-tracer/
Follow The Below Link For the Answer:
Elaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method.
Check Q4 of the given link: https://sikshapath.in/question/if-the-original-data-to-send-is-10011001-11100010-00100100-10000100-how-would-it-be-possible-to-detect-error-using-3/
Check Q4 of the given link:
See lessElaborate sliding window flow control mechanism with example. Also differentiate …
Check Q4 of the given link: https://sikshapath.in/question/if-the-original-data-to-send-is-10011001-11100010-00100100-10000100-how-would-it-be-possible-to-detect-error-using-3/
Check Q4 of the given link:
See lessThe 7-bit ASCII code for the character ‘G’ is: 1000111 …
Correct Answer: i. 10100110 iv. 11011011
Correct Answer:
i. 10100110
See lessiv. 11011011
A character representing a digit, n, is stored as an 8-bit ASCII code. It…
Answer: b. Subtract 00110000 from the ASCII code and add 1000 0000
Answer: b. Subtract 00110000 from the ASCII code and add 1000 0000
See lessWrite a Python class named Student with two attributes student_id, …
Search your first question on google and check out Sikshapath's link that appears there. Before asking any question search your question on google with the word 'Sikshapath' added at last.
Search your first question on google and check out Sikshapath’s link that appears there.
Before asking any question search your question on google with the word ‘Sikshapath’ added at last.
See less