GATE CSE
For all GATE CSE Questions
Toggle navigation
GATE Overflow
Facebook Login
Google Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
All Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions.
Answers by Sanjay Sharma
User Sanjay Sharma
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
User Sanjay Sharma
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
+3
votes
1
Fuzzy Sets
answered
Mar 6
in
Set Theory & Algebra

34
views
fuzzysets
engineeringmathematics
settheory&algebra
+5
votes
2
consider the set and find corresponding
answered
Mar 5
in
Mathematical Logic

41
views
engineeringmathematics
+1
vote
3
8086 .exe and .com programs
(8086 .exe and .com programs) : Which of the following statements is false ? (A) An .exe program on disk starts with a 512byte header file, but not a .com program (B) A .com program uses separate segments for code, ... be converted to a .com program (D) Generally, a .com program is simpler than a .exe program with the same functionality
answered
Mar 5
in
Digital Logic

41
views
8086
#computerorganisationandarchitecture
co&architecture
+1
vote
4
8086 assembly language
In 8086 assembly language, which of the following is not in the category of reserved words ? (A) directive (B) predefined symbol (C) operator (D) label
answered
Mar 4
in
Digital Logic

40
views
8086
co&architecture
+1
vote
5
8086 instructions
In x86, which of the following is not executed by itself ? (A) cld (B) rep (C) std (D) nop
answered
Mar 4
in
CBSE/UGC NET

39
views
8086
co&architecture
0
votes
6
ISRO 2006 ECE Probability
A box contains 5 black and 5 red balls. Two balls are one after another from the box, without replacement. both balls being red is a) 1/90 b) 1/5 c) 19/90 d) 2/9
answered
Mar 4
in
Probability

30
views
isro
isroece
engineeringmathematics
0
votes
7
ISRO 2006ECE Twos complement
Given the decimal number 19 an eight bit two's complement representation is given by a) 11101110 b) 11101101 c) 11101100 d) none of these
answered
Mar 3
in
CO & Architecture

31
views
isro
isroece
co&architecture
+1
vote
8
ISRO 2008ECE Maths / Vectors
The value of c which makes the angle 45° between a = i + cj and b = i+ j is a) 1 b) 1/ √ 2 c) 1/ √ 2 d) 0
answered
Mar 3
in
Linear Algebra

27
views
isro
isroece
0
votes
9
ISRO 2009ECE : Computer Architecture
answered
Mar 2
in
CO & Architecture

22
views
isro
isroece
co&architecture
+1
vote
10
ISRO 2008 ECE Software Engineering
answered
Mar 2
in
Others

9
views
isro
isroece
is&softwareengg
0
votes
11
Teaching Recruitment Board, Tamilnadu
answered
Feb 27
in
Computer Networks

25
views
computernetworks
0
votes
12
UGCNETDec2014II50
Match the following : LISTI LISTII a. Call control protocol i. Interface between Base Transceiver Station (BTS) and Base Station Controller (BSC) b. Abis ii. Spread spectrum c. BSMAP iii. Connection management d. CDMA iv. Works between Mobile Switching Centre ( ... Subsystem (BSS) Codes : a b c d iii iv i ii iii i iv ii i ii iii iv iv iii ii i
answered
Feb 20
in
Others

49
views
ugcnetdec2014ii
0
votes
13
UGCNETDec2014II46
Consider the following statements $S1$ and $S2$ : $S1$ : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell. $S2$ : A soft handover is one in which ... true. $S1$ is not true and $S2$ is true. Both $S1$ and $S2$ are true. Both $S1$ and $S2$ are not true.
answered
Feb 20
in
Others

22
views
ugcnetdec2014ii
0
votes
14
UGCNETSep2013II36
Consider the following program segment: d=0; for(i=1; i<31, ++i) for (j=1; j < 31; ++j) for (k=1; k < 31; ++k) if((i+j+k%3)==0)) d=d+1; printf(“%d”, d); The output will be 9000 3000 90 2700
answered
Feb 20
in
Others

54
views
ugcnetsep2013ii
0
votes
15
GATE201712178751943
answered
Feb 15
in
Numerical Ability

116
views
+1
vote
16
GATE20171GA5
The probability that a $k$digit number does NOT contain the digits 0, 5, or 9 is (A) $0.3^{k}$ (B) $0.6^{k}$ (C) $0.7^{k}$ (D) $0.9^{k}$
answered
Feb 14
in
Numerical Ability

622
views
gate20171
numericalability
probability
easy
+4
votes
17
GATE2017226
P and Q are considering to apply for a job. The probability that P applies for the job is 1/4, the probability that P applies for the job given that Q applies for the job is 1/2., and the probability that Q applies for the job given that P ... probability that P does not apply for the job given that Q does not apply for this job is 4/5 5/6 7/8 11/12
answered
Feb 14
in
Probability

551
views
gate20172
probability
conditionalprobability
+3
votes
18
GATE2017105
Consider the following table: Algorithms Design Paradigms (P) Kruskal (i) Divide and Conquer (Q) Quicksort (ii) Greedy (R) FloydWarshall (iii) Dynamic Programming Match the algorithms to the design paradigms they are based on. (A) (P) $\leftrightarrow$ ... (iii) (D) (P) $\leftrightarrow$ (i), (Q) $\leftrightarrow$ (ii), (R) $\leftrightarrow$ (iii)
answered
Feb 14
in
Algorithms

567
views
gate20171
algorithms
+1
vote
19
NET jan 2017 paper3 q 59
answered
Feb 14
in
Mathematical Logic

60
views
+6
votes
20
GATE2017233
A system shares 9 tape drives. The current allocation and maximum requirement of tape drives for that processes are shown below: Process Current Allocation Maximum Requirement P1 3 7 P2 1 6 P3 3 5 Which of the following best describes current state of the system? Safe, Deadlocked Safe, Not Deadlocked Not Safe, Deadlocked Not Safe, Not Deadlocked
answered
Feb 14
in
Operating System

691
views
gate20172
operatingsystem
resourceallocation
+2
votes
21
UGCNETDEC2016II36
There are three processes P1, P2 and P3 sharing a semaphore for synchronising a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access the semaphore ... P2 exits critical section Pi exits critical section The final value of semaphore will be: 0 1 1 2
answered
Feb 11
in
CBSE/UGC NET

71
views
ugcnetdec2016ii
+3
votes
22
UGCNETDEC2016II6
In propositional logic, if $(P→Q)\wedge (R→S)$ and $(P\vee R)$ are two premises such that $Y$ is the premise: $\begin{array}{c}( P \rightarrow Q) \wedge ( R \rightarrow S) \\ P \vee R \\ \hline \\ Y \\ \hline \end{array}$ $P\vee R$ $P\vee S$ $Q\vee R$ $Q\vee S$
answered
Feb 10
in
CBSE/UGC NET

87
views
ugcnetdec2016ii
+1
vote
23
UGCNETDEC2016II8
A binary 3bit down counter uses JK flipflops, FFi with inputs Ji, Ki and outputs Qi, i=0,1,2 respectively. The minimized expression for the input from following is J0=K0=0 J0=K0=1 J1=K1=Q0 J1=K1=Q’0 J2=K2=Q1Q0 J2=K2=Q’1Q’0 I, III, V I, IV, VI Il, III, V Il, IV, Vl
answered
Feb 4
in
CBSE/UGC NET

66
views
ugcnetdec2016ii
+1
vote
24
UGCNETDEC2016II14
Which of the following operators cannot be overloaded in C/C++? Bitwise right shift assignment Address of Indirection Structure reference
answered
Feb 4
in
Others

12
views
ugcnetdec2016ii
+1
vote
25
UGCNETDEC2016II18
Let M and N be two entities in an ER diagram with simple single vale attributes. R1 and R2 are two relationships between M and N, whereas R1 is onetomany and R2 is manytomany. The minimum number of tables required to represent M, N, R1 and R2 in the relational model are _______ 4 6 7 3
answered
Feb 4
in
Others

41
views
ugcnetdec2016ii
+1
vote
26
UGCNETDEC2016III73
Which of the following neural networks uses supervised learning? Multilayer perceptron Self organizing feature map Hopfield network a only b only a and b only a and c only
answered
Feb 2
in
Computer Networks

39
views
computernetworks
+1
vote
27
UGCNETDEC2016III71
Let R and S be two fuzzy relations defined as: Then, the resulting relaiton T, which relates elements of universe x to the elements of universe z using maxmin composition is given by:
answered
Feb 1
in
Others

38
views
ugcnetdec2016iii
0
votes
28
UGCNETDEC2016III75
Match the following vi commands in Unix: ListI ListII a. :w i. saves the file and quits the editing mode b. :x ii. escapes unix shell c. :q iii. saves file and remains in editing mode d. :sh iv. quits editing mode and no changes are saved to the file aii; biii; ci; div aiv; biii; cii; di aiii; biv; ci; dii aiii; bi; civ; dii
answered
Feb 1
in
Others

53
views
ugcnetdec2016iii
+1
vote
29
UGCNETDEC2016III74
Unix command to change the case of first three lines of file "shortlist" from lower to upper $ \$ $ tr head3 shortlist '[AZ]' '[az]' $ \$ $ tr shortlist head3 '[az]' '[AZ]'
answered
Feb 1
in
Compiler Design

42
views
ugcnetdec2016iii
compilerdesign
+2
votes
30
UGCNETDEC2016III70
Consider the following LPP: $\begin{array}{ll} \text{Min. Z } = & x_1+x_2+x_3 \\ \text{Subject to } & 3x_1 + 4x_3 \leq 5 \\ & 5x_1 +x_2 +6x_3 =7 \\ & 8x_1 +9x_3 \geq 2, \\ & x_1, x_2, x_3 \geq 0 \end{array}$ The standard ... +x_2 +6x_3 +x_6 =7; \\ & 8x_1 +9x_3 x_5 +x_7= 2; \\ & x_1 \text{ to } x_7 \geq 0 \end{array}$
answered
Feb 1
in
Others

47
views
ugcnetdec2016iii
0
votes
31
Predict the result of SQL query
answered
Jan 30
in
Databases

52
views
databases
sql
+1
vote
32
UGCNETDEC2016III12
If following sequence of keys are inserted in a B+ tree with K(=3) pointers: 8, 5, 1, 7, 3, 12, 9, 6 Which of the following shall be correct B+ tree?
answered
Jan 30
in
Others

67
views
ugcnetdec2016iii
0
votes
33
UGCNETDEC2016III9
Let $pk(R)$ denotes primary key of the relation R. A many to one relationship that exists between two relations $R_1$ and $R_2$ can be expressed as follows: $pk(R_2) \rightarrow pk(R_1)$ $pk(R_1) \rightarrow pk(R_2)$ $pk(R_2) \rightarrow R_1 \cap R_2$ $pk(R_1) \rightarrow R_1 \cap R_2$
answered
Jan 29
in
Others

61
views
ugcnetdec2016iii
+2
votes
34
ugc net jan 2017 paper 3 q7
Consider following schedules involving two transactions: S1: r1(X); r1(Y); r2(X); r2(Y); w2(Y); w1(X) S2: r1(X); r2(X); r2(Y); w2(Y); r1(Y); w1(X) Which of the following statement is true? A. ... is not conflict serializable. C. S1 is not conflict serializable and S2 is conflict serializable. D. Both S1 and S2 are not conflict serializable.
answered
Jan 28
in
CBSE/UGC NET

75
views
0
votes
35
UGCNETDEC2016III14
A segment is any object described by GKS commands and data that start with CREATE SEGMENT and Terminates with CLOSE SEGMENT command. What functions can be performed on these segments? Translation and Rotation Planning and Zooming Scaling and Shearing Translation, Rotation, Panning and Zooming
answered
Jan 28
in
Others

42
views
ugcnetdec2016iii
+2
votes
36
UGCNETDEC2016III26
Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milliseconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is ______ 20 10 30 40
answered
Jan 28
in
Others

33
views
ugcnetdec2016iii
+1
vote
37
ugc net jan 2017 paper 3 q 17
Below are the few steps given for scanconverting a circle using Bresenham’s Algorithm. Which of the given steps is not correct? (1) Compute d = 3 – 2r (where r is radius) (2) Stop if x > y (3) If d<0, then d=4x+6 and x=x+1 (4) If d≥0,then d=4 *(xy)+10, x=x+1 and y=y+1
answered
Jan 28
in
CBSE/UGC NET

43
views
+2
votes
38
UGCNETDEC2016III24
A recursive function $h$, is defined as follows: $\begin{array}{rcl} h(m) & = & k, \text{ if } m=0 \\ & = & 1, \text{ if } m=1 \\ & = & 2h (m1) + 4h(m2), \text{ if } m \geq 2 \end{array}$ If the value of $h(4)$ is 88 then the value of $k$ is: 0 1 2 1
answered
Jan 28
in
Others

44
views
ugcnetdec2016iii
+1
vote
39
UGCNETDEC2016III27
Let G(x) be generator polynomial used for CRC checking. The condition that should eb satisfied by G(x) to correct odd numbered error bits, will be: (1+x) is factor of G(x) (1x) is factor of G(x) (1+x$^2$) is factor of G(x) x is factor of G(x)
answered
Jan 28
in
Others

30
views
ugcnetdec2016iii
+1
vote
40
ugc net jan 2017 paper 3 q 17
17. Which of the following is/are side effects of scan conversion? a. Aliasing b. Unequal intensity of diagonal lines c. Over striking in photographic applications d. Local or Global aliasing (1) a and b (2) a, b and c (3) a, c and d (4) a, b, c and d
answered
Jan 28
in
CBSE/UGC NET

59
views
Page:
1
2
3
4
5
6
...
20
next »
21,446
questions
26,759
answers
60,943
comments
22,955
users