GATE 2015 CSE & IT
159 questions across 3 sessions
Set 1
Given Set $$\,\,\,A = \left\{ {2,3,4,5} \right\}\,\,\,$$ and Set $$\,\,\,B = \left\{ {11,12,13,14,15} \right\},\,\,\,$$ two numbers are randomly selected, one from each set. What i...
In the LU decomposition of the matrix $$\left[ {\matrix{ 2 & 2 \cr 4 & 9 \cr } } \right]$$, if the diagonal elements of U are both 1, then the lower diagonal entry $${l_{22}}$$ of...
Consider a non-pipelined processor with a clock rate of 2.5 gigahertz and average cycles per instruction of four. The same processor is upgraded to a pipelined processor with five...
Consider the following relation: Student Roll_No Student_Name 1 Raj 2 Rohit 3 Raj Performance Roll_No Course Marks 1 Math 80 1 English 70 2 Math 75 3 English 80 2 Physics 65 3 Math...
Suppose two hosts use a TCP connection to transfer a large file. Which of the following statements is/are FALSE with respect to the TCP connection? I. If the sequence number of a s...
If $$g(x)=1-x$$ & $$h\left( x \right) = {x \over {x - 1}}\,\,$$ then $$\,\,{{g\left( {h\left( x \right)} \right)} \over {h\left( {g\left( x \right)} \right)}}\,\,\,$$ is
Suppose that the stop-and-wait protocol is used on a link with a bit rate of 64 kilobits per second and 20 milliseconds propagation delay. Assume that the transmission time for the...
The following two functions P1 and P2 that share a variable B with an initial value of 2 execute concurrently. P1( ) { C = B – 1; B = 2 * C; } P2( ) { D = 2 * B; B = D - 1; } The n...
What is the output of the following C code? Assume that the address of x is 2000 (in decimal) and an integer requires four bytes of memory. int main () { unsigned int x[4][3] = {{1...
Match the following: List I List II (P) Condition coverage (i) Black-box testing (Q) Equivalence class partitioning (ii) System testing (R) Volume testing (iii) White-box testing (...
A positive edge-triggered D flip-flop is connected to a positive edge-triggered JK flip-flop as follows. The Q output of the D flip-flop is connected to both the J and K inputs of...
A file is organized so that the ordering of data records is the same as or close to the ordering of data entries in some index. Then that index is called
The output of the following C program is__________. void f1(int a, int b) { int c; c=a; a=b; b=c; } void f2(int *a, int *b) { int c; c=*a; *a=*b; *b=c; } int main(){ int a=4, b=5,...
In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that?
Consider a LAN with four nodes S 1 , S 2 , S 3 and S 4 . Time is divided into fixed-size slots, and a node can begin its transmission only at the beginning of a slot. A collision i...
$$\,\int\limits_{1/\pi }^{2/\pi } {{{\cos \left( {1/x} \right)} \over {{x^2}}}dx = } $$ __________.
A file is organized so that the ordering of data records is the same as or close to the ordering of data entries in some index. Then that index is called
SELECT operation in SQL is equivalent to
The probabilities that a student passes in Mathematics, Physics and Chemistry are $$m, p$$ and $$c$$ respectively. Of these subjects, the student has $$75$$% chance of passing in a...
For a set A, the power set of A is denoted by 2 A . If A = {5, {6}, {7}}, which of the following options are TRUE? I. $$\phi \in {2^A}$$ II. $$\phi \subseteq {2^A}$$ III. $$\left\{...
Consider an Entity-Relationship (ER) model in which entity sets E 1 and E 2 are connected by an m : n relationship R 12 . E 1 and E 3 are connected by a 1 : n (1 on the side of E 1...
Which of the following combinations is incorrect?
The height of a tree is the length of the longest root-to-leaf path in it. The maximum and minimum number of nodes in a binary tree of height 5 are
Suppose that everyone in a group of N people wants to communicate secretly with the N - 1 others using symmetric key cryptographic system. The communication between any two persons...
Consider a uniprocessor system executing three tasks T 1 , T 2 and T 3 , each of which is composed of an infinite sequence of jobs (or instances) which arrive periodically at inter...
Select the alternative meaning of the underlined part of the sentence. The chain snatchers took to their heels when the police party arrived.
Consider a disk pack with a seek time of 4 milliseconds and rotational speed of 10000 rotations per minute (RPM). It has 600 sectors per track and each sector can store 512 bytes o...
The least number of temporary variables required to create a three-address code in static single assignment form for the expression $$q + r / 3 + s - t * 5 + u * v/w$$ is _________...
The probabilities that a student passes in Mathematics, Physics and Chemistry are m, p, and c respectively. Of these subjects, the student has 75% chance of passing in at least one...
Consider a 4-bit Johnson counter with an initial value of 0000. The counting sequence of this counter is
Consider a main memory with five page frames and the following sequence of page references: 3, 8, 2, 3, 9, 1, 6, 3, 8, 9, 3, 6, 2, 1, 3. Which one of the following is true with res...
Didn't you buy _________ when you went shopping?
Which one of the following fields of an IP header is NOT modified by a typical IP router?
Consider a max heap, represented by the array: 40, 30, 20, 10, 15, 16, 17, 8, 4. Array Index 1 2 3 4 5 6 7 8 9 Value 40 30 20 10 15 16 17 8 4 Now consider that a value 35 is insert...
Which one of the following is TRUE at any valid state in shift-reduce parsing?
Which one of the following is the recurrence equation for the worst case time complexity of the Quicksort algorithm for sorting n ( $$ \ge 2$$ ) numbers? In the recurrence equation...
Consider the following C function. int fun1 (int n) { int i, j, k, p, q = 0; for (i = 1; i < n; ++i) { p = 0; for (j = n; j > 1; j = j/2) ++p; for (k = 1; k < p; k = k * 2) ++q; }...
An algorithm performs $${\left( {\log N} \right)^{1/2}}$$ find operations, N insert operations, $${\left( {\log N} \right)^{1/2}}$$ delete operations, and $${\left( {\log N} \right...
Match the following: List 1 (P) Prim’s algorithm for minimum spanning tree (Q) Floyd-Warshall algorithm for all pairs shortest paths (R) Mergesort (S) Hamiltonian circuit List 2 (i...
Based on the given statements, select the most appropriate option to solve the given question. If two floors in a certain building are 9 feet apart, how many steps are there in a s...
Let $${a_n}$$ represent the number of bit strings of length n containing two consecutive 1s. What is the recurrence relation for $${a_n}$$?
$$\sum\limits_{x = 1}^{99} {{1 \over {x\left( {x + 1} \right)}}} $$ = _____________.
The binary operator $$ \ne $$ is defined by the following truth table. p q p$$ \ne $$q 0 0 0 0 1 1 1 0 1 1 1 0 Which one of the following is true about the binary operator $$ \ne $...
Let G be a connected planar graph with 10 vertices. If the number of edges on each face is three, then the number of edges in G is ___________.
The given statement is followed by some courses of action. Assuming the statement to be true, decide the correct option. Statement: There has been a significant drop in the water l...
Which of the following statements is/are FALSE? I. XML overcomes the limitations in HTML to support a structured way of organizing content. II. XML specification is not case sensit...
Suppose the following disk request sequence (track numbers) for a disk with 100 tracks is given: 45, 20, 90, 10, 50, 60, 80, 25, 70. Assume that the initial position of the R/W hea...
Let G = (V, E) be a simple undirected graph, and s be a particular vertex in it called the source. For $$x \in V$$, let d(x) denote the shortest distance in G from s to x. A breadt...
Given set A = {2, 3, 4, 5} and Set B = {11, 12, 13, 14, 15}, two numbers are randomly selected, one from each set. What is probability that the sum of the two numbers equals 16?
Consider the following pseudo code, where x and y are positive integers. begin q := 0 r := x while r ≥ y do begin r := r - y q := q + 1 end end The post condition that needs to be...
The number of students in a class who have answered correctly, wrongly, or not attempted each question in an exam, are listed in the table below. The marks for each question are al...
Consider a system with byte-addressable memory, 32-bit logical addresses, 4 kilobyte page size and page table entries of 4 bytes each. The size of the page table in the system in m...
Consider the operations $$f\left( {x,y,z} \right) = X'YZ + XY' + Y'Z'$$ and $$g\left( {x,y,z} \right) = X'YZ + X'YZ' + XY$$. Which one of the following is correct?
Consider the following C program segment. while(first <= last) { if (array[middle] < search) first = middle + 1; else if (array[middle] == search) found = TRUE; else last = middle...
What are the worst-case complexities of insertion and deletion of a key in a binary search tree?
$$\,\,\mathop {\lim }\limits_{x \to \infty } \,{x^{1/x}}\,\,$$ is
Which of the following is/are correct inorder traversal sequence(s) of binary search tree(s)? I. 3, 5, 7, 8, 15, 19, 25 II. 5, 8, 9, 12, 10, 15, 25 III. 2, 7, 10, 8, 14, 16, 20 IV....
Consider the following $$2 \times 2$$ matrix $$A$$ where two elements are unknown and are marked by $$a$$ and $$b.$$ The eigenvalues of this matrix ar $$-1$$ and $$7.$$ What are th...
Which of the following options is the closest in meaning to the sentence below? She enjoyed herself immensely at the party.
For computers based on three-address instruction formats, each address field can be used to specify which of the following: (S1) A memory operand (S2) A processor register (S3) An...
For any two languages L 1 and L 2 such that L 1 is context-free and L 2 is recursively enumerable but not recursive, which of the following is/are necessarily true? I. $${\overline...
Set 2
Consider a complete binary tree where the left and the right sub-trees of the root are max-heaps. The lower bound for the number of operations to convert the tree to a heap is
Consider the sequence of machine instructions given below: MUL R5, R0, R1 DIV R6, R2, R3 ADD R7, R5, R6 SUB R8, R7, R4 In the above sequence, $$R0$$ to $$R8$$ are general purpose r...
A system has 6 identical resources and N processes competing for them. Each process can request atmost 2 resources. Which one of the following values of N could lead to a deadlock?
Consider the following function written in the C programming language. void foo(char *a){ if ( *a && *a != ' '){ foo(a+1); putchar(*a); } } The output of the above function on inpu...
A half adder is implemented with $$XOR$$ and $$AND$$ gates. A full adder is implemented with two half adders and one $$OR$$ gate. The propagation delay of an $$XOR$$ gate is twice...
A software requirements specification $$(SRS)$$ document should avoid discussing which one of the following?
In the context of abstract-syntax-tree $$(AST)$$ and control-flow-graph $$(CFG),$$ which one of the following is TRUE?
Assume that the bandwidth for a TCP connection is 1048560 bits/sec. Let $$\alpha $$ be the value of RTT in milliseconds(rounded off to the nearest integer) after which the TCP wind...
Let $$\,\,f\left( x \right) = {x^{ - \left( {1/3} \right)}}\,\,$$ and $${\rm A}$$ denote the area of the region bounded by $$f(x)$$ and the $$X-$$axis, when $$x$$ varies from $$-1$...
Perform the following operations on the matrix $$\left[ {\matrix{ 3 & 4 & {45} \cr 7 & 9 & {105} \cr {13} & 2 & {195} \cr } } \right]$$ (i) Add the third row to the second row (ii)...
The number of onto functions (subjective functions) from set $$X = \left\{ {1,2,3,4} \right\}$$ to set $$Y = \left\{ {a,b,c} \right\}$$ is __________________.
Which one of the following well formed formulae is a tautology?
Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket APL
Consider two relations $${R_1}\left( {A,B} \right)$$ with the tuples $$(1,5), (3,7)$$ and $${R_2}\left( {A,C} \right) = \left( {1,7} \right),\left( {4,9} \right).$$ Assume that $$R...
A computer system implements $$8$$ kilobyte pages and a $$32$$-bit physical address space. Each page table entry contains a valid bit, a dirty bit, three permission bits, and the t...
Let $$𝑅$$ be the relation on the set of positive integers such that $$aRb$$ if and only if $$𝑎 $$ and $$𝑏$$ are distinct and have a common divisor other than $$1.$$ Which one of...
Which one of the following assertions concerning code inspection and code walk-through is true?
The larger of the two eigenvalues of the matrix $$\left[ {\matrix{ 4 & 5 \cr 2 & 1 \cr } } \right]$$ is ______.
Consider the intermediate code given below. (1) i = 1 (2) j = 1 (3) t1 = 5 ∗ i (4) t2 = t1 + j (5) t3 = 4 ∗ t2 (6) t4 = t3 (7) a[t4] = -1 (8) j = j + 1 (9) if j<=5 goto (3) (10) i=...
Two hosts are connected via a packet switch with 10 7 bits per second links. Each link has a propagation delay of 20 microseconds. The switch begins forwarding a packet 35 microsec...
Consider the following C function. int fun ( int n ) { int x = 1, k ; if ( n == 1) return x ; for( k = 1 ; k < n ; ++ k ) x = x + fun( k ) * fun( n - k ) ; return x ; } The return...
Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up to 1500 bytes (i.e. MTU = 1500 bytes). Size of UDP...
The number of min-terms after minimizing the following Boolean expression is _______________ . $$$\left[ {D' + AB' + A'C + AC'D + A'C'D} \right]'$$$
A binary tree $$T$$ has $$20$$ leaves. The number of nodes in $$T$$ having two children is _______________.
In a connected graph, bridge is an edge whose removal disconnects a graph. Which one of the following statements is true?
Consider the following two statements. $$S1:$$ If a candidate is known to be corrupt, then he will not be elected $$S2:$$ If a candidate is kind, he will be elected Which one of th...
Consider a simple checkpointing protocol and the following set of operations in the log. (start, $$T4$$); (write, $$T4, y, 2, 3$$); (start, $$T1$$); (commit, $$T4$$); (write, $$T1,...
Match the following: GROUP 1 GROUP 2 P. Lexical analysis 1. Graph coloring Q. Parsing 2. DFA minimization R. Register allocation 3. Post-order traversal S. Expression evaluation 4....
A graph is self-complementary if it is isomorphic to its complement. For all self-complementary graphs on $$n$$ vertices, $$n$$ is
Let $$X$$ and $$Y$$ denote the sets containing $$2$$ and $$20$$ distinct objects respectively and $$𝐹$$ denote the set of all possible functions defined from $$X$$ to $$Y$$. Let $...
A Young tableau is a $$2D$$ array of integers increasing from left to right and from top to bottom. Any unfilled entries are marked with $$\infty ,$$ and hence there cannot be any...
The minimum number of $$JK$$ flip-flops required to construct a synchronous counter with the count sequence $$\left( {0,0,1,1,2,2,3,3,0,0,...} \right)$$ is ____________.
Consider two decision problems $${Q_1},{Q_2}$$ such that $${Q_1}$$ reduces in polynomial time to $$3$$-$$SAT$$ and $$3$$-$$SAT$$ reduces in polynomial time to $${Q_2}.$$ Then which...
The cardinally of the power set of $$\left\{ {0,1,2,\,\,....,\,\,10} \right.\left. \, \right\}$$ is _____________.
An unordered list contains $$n$$ distinct elements. The number of comparisons to find an element in this list that is neither maximum nor minimum is
Consider the following transaction involving two bank accounts x and y. read (x) ; x: = x - 50; write (x); read (y); y: = y + 50; write (y) The constraint that the sum of the accou...
Given below are some algorithms, and some algorithm design paradigms. GROUP 1 GROUP 2 1. Dijkstra's Shortest Path i. Divide and Conquer 2. Floyd-Warshall algorithm to compute all p...
A computer system implements a $$40$$-bit virtual address, page size of $$8$$ kilobytes, and a $$128$$-entry translation look-aside buffer $$(TLB)$$ organized into $$32$$ sets each...
Consider a processor with byte-addressable memory. Assume that all registers, including Program Counter $$(PC)$$ and Program Status Word $$(PSW),$$ are of size $$2$$ bytes. A stack...
Consider the basic $$COCOMO$$ model where $$E$$ is the effort applied in person-months, $$D$$ is the development time in chronological months, $$KLOC$$ is the estimated number of d...
Consider six memory partitions of sizes $$200$$ $$KB,$$ $$400$$ $$KB,$$ $$600$$ $$KB,$$ $$500$$ $$KB,$$ $$300$$ $$KB$$ and $$250$$ $$KB,$$ where $$KB$$ refers to kilobyte. These pa...
Which one of the following statements is NOT correct about $$HTTP$$ cookies?
Consider the C program below. #include < stdio.h > int *A, stkTop; int stkFunc(int opcode, int val) { static int size=0, stkTop=0; switch (opcode) { case -1: size = val; break; cas...
A link has a transmission speed of 10 6 bits/sec. It uses data packets of size 1000 bytes each. Assume that the acknowledgement has negligible transmission delay, and that its prop...
The number of divisors of $$2100$$ is ___________.
Assume that for a certain processor, a read request takes $$50$$ nanoseconds on a cache miss and $$5$$ nanoseconds on a cache hit. Suppose while running a program, it was observed...
Which one of the following hash functions on integers will distribute keys most uniformly over $$10$$ buckets numbered $$0$$ to $$9$$ for $$𝑖$$ ranging from $$0$$ to $$2020$$?
Consider a typical disk that rotates at $$15000$$ rotations per minute $$(RPM)$$ and has a transfer rate of $$50 \times {10^6}\,\,\,bytes/\sec .$$ If the average seek time of the d...
Consider the alphabet $$\sum { = \left\{ {0,1} \right\},} $$ the null/empty string $$\lambda $$ and the sets of strings $${X_0},\,{X_1},$$ and $${X_2}$$ generated by the correspond...
The number of states in the minimal deterministic finite automaton corresponding to the regular expression $${\left( {0 + 1} \right)^{\,\, * }}\left( {10} \right)$$ is ____________...
Consider the following statements. $$\,\,\,$$ $${\rm I}.\,\,\,\,\,\,\,\,\,$$ The complement of every Turing decidable language is Turing decidable $$\,$$ $${\rm II}.\,\,\,\,\,\,\,\...
Which of the following languages is/are regular? $${L_1}:\left\{ {wx{w^R}|w,x\, \in \left\{ {a,b} \right\}{}^ * } \right.$$ and $$\left. {\left| w \right|,\left| x \right| > 0} \ri...
Suppose you are provided with the following function declaration in the C programming language. int partition(int a[], int n); The function treats the first element of a[ ] as a pi...
Set 3
In a web server, ten WebPages are stored with the URLs of the form http://www.yourname.com/$$var$$.html; where, $$var$$ is a different number from $$1$$ to $$10$$ for each Webpage....
Consider a network connected two systems located 8000 kilometers apart. The bandwidth of the network is 500 × 10 6 bits per second. The propagation speed of the media is 4 × 10 6 m...
Consider a software program that is artificially seeded with $$100$$ faults. While testing this program, $$159$$ faults are detected, out of which $$75$$ faults are from those arti...
Suppose $$𝑈$$ is the power set of the set $$S = \left\{ {1,2,3,4,5,6,} \right\}$$. For any $$T \in U,$$ let $$\left| T \right|$$ denote the number of elements in $$𝑇$$ and $$T'$$...
While inserting the elements $$71, 65, 84, 69, 67, 83$$ in an empty binary search tree $$(BST)$$ in the sequence shown, the element in the lowest level is
Consider the relation $$X\left( {P,Q,R,S,T,U} \right)$$ with the following set of functional dependencies $$\eqalign{ & F = \left\{ \, \right. \cr & \,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\...
Consider the following statements. I. TCP connections are full duplex II. TCP has no option for selective acknowledgment III. TCP connections are message streams
Suppose $${X_i}$$ for $$i=1,2,3$$ are independent and identically distributed random variables whose probability mass functions are $$\,\,\Pr \left[ {{X_i} = 0} \right] = \Pr \left...
If the following system has non - trivial solution $$$px+qy+rz=0$$$ $$$qx+ry+pz=0$$$ $$$rx+py+qz=0$$$ Then which one of the following Options is TRUE ?
Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (10 8 bits second) over a 1 km(kilometer) cable with no repeaters. If the minimum frame size required for this...
Consider the following code sequence having five instructions $${I_1}$$ to $${I_5}$$. Each of these instructions has the following format. $$\,\,\,\,\,\,\,\,\,\,\,\,\,\,OP\,\,Ri,\,...
Consider the following relation $$\,\,\,\,\,\,\,\,$$ Cinema(theater, address, capacity) Which of the following options will be needed at the end of the $$SQL$$ query $$\,\,\,\,\,\,...
Consider the equation $${\left( {43} \right)_x} = {\left( {y3} \right)_8}$$ where $$x$$ and $$y$$ are unknown. The number of possible solutions is ______________
Consider a B + tree in which the search key is 12 bytes long, block size is 1024 bytes, record pointer is 10 bytes long and block pointer is 8 bytes long. The maximum number of key...
Consider the following C program segment. #include < stdio.h > int main() { char s1[7] = "1234", *p; p = s1 + 2; *p = ‘0’; printf("%s", s1); } What will be printed by the program?
A function $$f(x)$$ is linear and has a value of $$29$$ at $$x=-2$$ and $$39$$ at $$x=3.$$ Find its value at $$x=5.$$
Let $$G$$ be a connected undirected graph of $$100$$ vertices and $$300$$ edges. The weight of a minimum spanning tree of $$G$$ is $$500.$$ When the weight of each edge of $$G$$ is...
The maximum number of processes that can be in $$Ready$$ state for a computer system with $$n$$ $$CPUs$$ is
In a room there are only two types of people, namely Type $$1$$ and Type $$2.$$ Type $$1$$ people always tell the truth and Type $$2$$ people always lie. You give a fair coin to a...
Consider a software project with the following information domain characteristics for calculation of function point metric. Number of external inputs $$\left( {\rm I} \right) = 30$...
In the given matrix $$\left[ {\matrix{ 1 & { - 1} & 2 \cr 0 & 1 & 0 \cr 1 & 2 & 1 \cr } } \right],$$ one of the eigenvalues is $$1.$$ The eigen vectors corresponding to the eigen v...
The number of $$4$$ digit numbers having their digits in non-decreasing order (from left to right) constructed by using the digits belonging to the set $${1, 2, 3}$$ is____________...
The value of $$\mathop {\lim }\limits_{x \to \alpha } {\left( {1 + {x^2}} \right)^{{e^{ - x}}}}\,\,$$ is
In the network 200.20.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________.
The total number of prime implicants of the function $$f\left( {w,x,y,z} \right) = \sum {\left( {0,2,4,5,6,10} \right)} $$ _________________.
Let $$f\left( n \right) = n$$ and $$g\left( n \right) = {n^{\left( {1 + \sin \,\,n} \right)}},$$ where $$n$$ is a positive integer. Which of the following statements is/are correct...
Consider the following array of elements. $$\,\,\,\,\,\,\,\,$$$$〈89, 19, 50, 17, 12, 15, 2, 5, 7, 11, 6, 9, 100〉$$ The minimum number of interchanges needed to convert it into a ma...
Consider the equality $$\sum\limits_{i = 0}^n {{i^3}} = X$$ and the following choices for $$X$$ $$\eqalign{ & \,\,\,\,\,\,\,{\rm I}.\,\,\,\,\,\,\Theta \left( {{n^4}} \right) \cr &...
Assume that a mergesort algorithm in the worst case takes $$30$$ seconds for an input of size $$64.$$ Which of the following most closely approximates the maximum input size of a p...
Consider a binary tree $$T$$ that has $$200$$ leaf nodes. Then, the number of nodes in $$T$$ that have exactly two children are ________.
Given the function $$F = P′ + QR,$$ where $$F$$ is a function in three Boolean variables $$P,Q$$ and $$R$$ and $$P'=!P,$$ consider the following statements. $$\eqalign{ & \,\,\,\,\...
Let $$ \ne $$ be a binary operator defined as $$X \ne Y = X' + Y'$$ where $$𝑋$$ and $$𝑌$$ are Boolean variables. Consider the following two statements. $$$\eqalign{ & \left( {S1}...
Two hosts are connected via a packet switch with $${10^7}$$ bits per second links. Each link has a propagation delay of $$20$$ micro-seconds. The switch begins forwarding a packet...
Let $$R$$ be a relation on the set of ordered pairs of positive integers such that $$\left( {\left( {p,q} \right),\left( {r,s} \right)} \right) \in R$$ if and only if $$p - s = q -...
Consider a machine with a byte addressable main memory of $${2^{20}}$$ bytes, block size of $$16$$ bytes and a direct mapped cache having $${2^{12}}$$ cache lines. Let the addresse...
Consider the following grammar $$G$$ $$\eqalign{ & \,\,\,\,\,\,\,S \to \,\,\,\,\,\,\,F|H \cr & \,\,\,\,\,\,F \to \,\,\,\,\,\,\,p|c \cr & \,\,\,\,\,\,H \to \,\,\,\,\,\,\,d|c \cr} $$...
Consider the following policies for preventing deadlock in a system with mutually exclusive resources. $$\,\,\,\,\,\,\,{\rm I}.$$ $$\,\,\,\,\,\,$$ Processes should acquire all thei...
Given a hash table $$𝑇$$ with $$25$$ slots that stores $$2000$$ elements, the load factor $$\alpha $$ for $$𝑇$$ is ____________ .
If for non-zero $$x,$$ $$af\left( x \right) + bf\left( {{1 \over x}} \right) = {1 \over x} - 25$$ where $$a \ne b$$ then $$\int\limits_1^2 {f\left( x \right)dx} \,$$ is
For the processes listed in the following table, which of the following scheduling schemes will give the lowest average turnaround time? Process Arrival Time Processing Time A 0 3...
The result evaluating the postfix expression $$10\,\,5\, + 60$$ $$\,\,6/\, * \,8\, - $$ is
Among simple $$LR (SLR) ,$$ canonical $$LR,$$ and look-ahead $$LR$$ $$(LALR),$$ which of the following pairs identify the method that is very easy to implement and the method that...
Language $${L_1}$$ is polynomial time reducible to language $${L_2}$$ . Language $${L_3}$$ is polynomial time reducible to $${L_2}$$ , which in turn is polynomial time reducible to...
Which of the following languages are context-free? $$$\eqalign{ & {L_1} = \left\{ {{a^m}{b^n}{a^n}{b^m}|m,n \ge 1} \right\} \cr & {L_2} = \left\{ {{a^m}{b^n}{a^m}{b^n}|m,n \ge 1} \...
Let $$L$$ be the language represented by the regular expression $$\sum {^ * 0011\sum {^ * } } $$ where $$\sum { = \left\{ {0,1} \right\}} .$$ What is the minimum number of states i...