Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Recent
Hot!
Most votes
Most answers
Most views
Previous GATE
Featured
Hot questions
0
votes
1
answer
19421
Static Variable
Is it static declaration or static assignment? int main() { int x=20; static int y=x; if(x==y) printf("Equal"); else printf("Not Equal"); return 0; } What is output?and why?
Is it static declaration or static assignment?int main() { int x=20; static int y=x; if(x==y) printf("Equal"); else printf("Not Equal"); return 0; }What is output?and why...
srestha
1.3k
views
srestha
asked
Nov 18, 2018
Programming in C
programming-in-c
+
–
4
votes
1
answer
19422
Theads
True/False : 1)Several threads can share same physical address space. 2)Several threads can share same virtual address space.
True/False :1)Several threads can share same physical address space.2)Several threads can share same virtual address space.
VS
1.7k
views
VS
asked
Jan 16, 2018
Operating System
operating-system
threads
+
–
1
votes
1
answer
19423
DIGITAL LOGIC
Is this expression correct?
Is this expression correct?
Abhi Girin
206
views
Abhi Girin
asked
Jan 3, 2018
6
votes
2
answers
19424
GATE Overflow | Programming | Test 1 | Question: 14
void foo(int x) { int *p = &x; *p = x*x; } The above code is supposed to modify any input integer with its square. Which of the following statements regarding the above code is correct? The given code is wrong as ... not returning any value The given code is wrong as it is illegal to access the memory of a parameter variable inside a function
void foo(int x) { int *p = &x; *p = x*x; }The above code is supposed to modify any input integer with its square. Which of the following statements regarding the above co...
Arjun
939
views
Arjun
asked
Oct 18, 2016
Programming in C
go-programming-1
programming
programming-in-c
parameter-passing
+
–
1
votes
1
answer
19425
Internal and External fragmentation
Consider $6$ memory partitions of sizes $200$ $\text{KB}$, $400$ $\text{KB}$, $600$ $\text{KB}$, $500$ $\text{KB}$, $300$ $\text{KB}$and $250$ $\text{KB}$, where $\text{KB}$refers to $\text{kilobyte}$. ... be calculated when we have the information about free memory slots and the process size whose size must be greater than Max free slot size. Someone verify it.
Consider $6$ memory partitions of sizes $200$ $\text{KB}$, $400$ $\text{KB}$, $600$ $\text{KB}$, $500$ $\text{KB}$, $300$ $\text{KB}$and $250$ $\text{KB}$, where $\text{K...
Shubhanshu
3.2k
views
Shubhanshu
asked
Oct 31, 2018
Operating System
memory-management
operating-system
fragmentation
+
–
37
votes
3
answers
19426
GATE CSE 2001 | Question: 1.20
Where does the swap space reside? RAM Disk ROM On-chip cache
Where does the swap space reside?RAMDiskROMOn-chip cache
Kathleen
12.8k
views
Kathleen
asked
Sep 14, 2014
Operating System
gatecse-2001
operating-system
easy
virtual-memory
+
–
0
votes
0
answers
19427
Can someone provide me answers to made easy workbook 2018?
can someone please provide me answer keys to gate cse workbooks by made easy 2018?
can someone please provide me answer keys to gate cse workbooks by made easy 2018?
Pratyush
1.9k
views
Pratyush
asked
Dec 16, 2018
0
votes
2
answers
19428
MadeEasy Subject Test: Operating System - Page Replacement
Why S1 is false??
Why S1 is false??
Lucky sunda
450
views
Lucky sunda
asked
Jan 8, 2017
Operating System
made-easy-test-series
operating-system
page-replacement
+
–
0
votes
0
answers
19429
Finite Automata
For an DFA having exactly 2 a’s and more than 3 b’s what is the minimum number of states???
For an DFA having exactly 2 a’s and more than 3 b’s what is the minimum number of states???
Doraemon
845
views
Doraemon
asked
Apr 7, 2019
Theory of Computation
finite-automata
theory-of-computation
+
–
1
votes
0
answers
19430
DBMS Korth Edition 4 Exercise 16 Question 10 (Page No. 633)
Consider the following graph-based locking protocol that allows only exclusive lock modes, and that operates on data graphs that are in the form of a rooted directed acyclic graph. $ $ A transaction can lock any vertex first ... a lock on one of the parents of the vertex. Show that the protocol ensures serializability and deadlock freedom.
Consider the following graph-based locking protocol that allows only exclusive lock modes, and that operates on data graphs that are in the form of a rooted directed acyc...
akash.dinkar12
571
views
akash.dinkar12
asked
Apr 1, 2019
Databases
korth
databases
transaction-and-concurrency
descriptive
+
–
0
votes
1
answer
19431
GO pdf hard copy
Pre booking for GO pdf hardcopy available?
Pre booking for GO pdf hardcopy available?
Golam Murtuza
710
views
Golam Murtuza
asked
Apr 13, 2019
0
votes
0
answers
19432
sequential logic Morris Mano
design a counter with the following binary sequence:0,4,2,1,6 and repeat use JK flip-flop
design a counter with the following binary sequence:0,4,2,1,6 and repeat use JK flip-flop
altamash
298
views
altamash
asked
May 8, 2019
23
votes
3
answers
19433
GATE CSE 2010 | Question: 52
A hash table of length $10$ uses open addressing with hash function $h(k) = k \mod 10$, and linear probing. After inserting $6$ ... $34, 42, 23, 52, 33, 46$ $46, 34, 42, 23, 52, 33$ $42, 46, 33, 23, 34, 52$
A hash table of length $10$ uses open addressing with hash function $h(k) = k \mod 10$, and linear probing. After inserting $6$ values into an empty hash table, the table...
go_editor
6.7k
views
go_editor
asked
Sep 30, 2014
DS
gatecse-2010
data-structures
hashing
normal
+
–
0
votes
0
answers
19434
Morris Mano Edition 3 Exercise 6 Question 10 (Page No. 253)
A JN flip-flop has two inputs J and N, input J behaves like J input of the JK flipflop and input N behaves like the complement of K input of JK flip-flop.(that is N = k') Tabulate the characteristic table of the ... flop. Tabulate the Excitation table of the flip-flop. Show that by connecting two inputs together, one obtains a D flip-flop.
A JN flip-flop has two inputs J and N, input J behaves like J input of the JK flipflop and input N behaves like the complement of K input of JK flip-flop.(that is N = k�...
ajaysoni1924
883
views
ajaysoni1924
asked
Apr 4, 2019
Digital Logic
digital-logic
morris-mano
sequential-circuit
flip-flop
+
–
2
votes
3
answers
19435
Pipeline: Calculate average instruction execution time
An instruction pipeline has five stages with stage latencies 1 ns, 2ns, 5 ns, 2ns, and 0.5 ns, respectively. A program has 10% branch instructions which execute in the fourth stage and produce the next instruction pointer at the end of the fourth stage. Calculate the average instruction execution time:
An instruction pipeline has five stages with stage latencies 1 ns, 2ns, 5 ns, 2ns, and 0.5 ns, respectively. A program has 10% branch instructions which execute in the fo...
sh!va
6.0k
views
sh!va
asked
Jan 30, 2017
CO and Architecture
co-and-architecture
pipelining
+
–
1
votes
1
answer
19436
MadeEasy Full Length Test 2019: Operating System - Threads
Consider the following statements: S1 : Multiprogramming is used to increase CPU utilization, while time-sharing is used to increase CPU responsiveness in interacting with user. S2 : If a user-level thread is blocked for I/ ... to be assigned to different processors in a multi-processor computer system. Which of the following is true?
Consider the following statements:S1 : Multiprogramming is used to increase CPU utilization, while time-sharing is used to increase CPU responsiveness in interacting wit...
balraj_allam
1.8k
views
balraj_allam
asked
Dec 28, 2018
Operating System
operating-system
threads
made-easy-test-series
+
–
2
votes
2
answers
19437
Discrete Mathematics Thegatebook
how many positive integers between 50 and 100, (a) divisible by 7 (b) divisible by 11 (c) divisible by 7 and 11?
how many positive integers between 50 and 100,(a) divisible by 7(b) divisible by 11(c) divisible by 7 and 11?
Lakshman Bhaiya
717
views
Lakshman Bhaiya
asked
May 7, 2017
Combinatory
inclusion-exclusion
+
–
0
votes
0
answers
19438
DBMS Korth Edition 6 Exercise 3 Question 8 (Page No. 107)
Consider the bank database, where the primary keys are underlined. Construct the following SQL queries for this relational database. a. Find all customers of the bank who have an account but not a loan. b. Find the names ... (customer name, loan number) account (account number, branch name, balance ) depositor (customer name, account number)
Consider the bank database, where the primary keys are underlined.Construct the following SQL queries for this relational database.a. Find all customers of the bank who h...
ajaysoni1924
941
views
ajaysoni1924
asked
Mar 25, 2019
Databases
databases
korth-edition6
relational-model
sql
+
–
0
votes
1
answer
19439
ISRO 2009- ECE Computer Architecture
Consider the following program for 8085 XRA A LXI B, 0007H LOOP : DCX B JNZ LOOP The loop will be executed a) 8 times b) once c) 7 times d) infinite times
Consider the following program for 8085 XRA A LXI B, 0007HLOOP : DCX B JNZ LOOPThe loop will be executeda) 8 timesb) on...
sh!va
840
views
sh!va
asked
Feb 28, 2017
CO and Architecture
co-and-architecture
isro-ece
+
–
1
votes
0
answers
19440
admission_query
I scored 52.67 marks(Score 632)! Do I have any option? Is there any chance of admission in Bits or IIIT-B or IIIT-A?
I scored 52.67 marks(Score 632)! Do I have any option? Is there any chance of admission in Bits or IIIT-B or IIIT-A?
Shivam Kasat
1.5k
views
Shivam Kasat
asked
Feb 13, 2019
NITs
nit
admissions
bits
+
–
Page:
« prev
1
...
967
968
969
970
971
972
973
974
975
976
977
...
3229
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register