Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by learncp
4
answers
1
GATE CSE 2018 | Question: 19
Let $G$ be a finite group on $84$ elements. The size of a largest possible proper subgroup of $G$ is _____
Let $G$ be a finite group on $84$ elements. The size of a largest possible proper subgroup of $G$ is _____
12.3k
views
commented
Nov 10, 2019
Set Theory & Algebra
gatecse-2018
group-theory
numerical-answers
set-theory&algebra
1-mark
+
–
4
answers
2
UGC NET CSE | December 2012 | Part 2 | Question: 4
The power set of the set $\{ \Phi \}$ is $\{ \Phi \}$ $\{ \Phi, \{ \Phi \} \}$ $\{ 0 \}$ $\{ 0, \Phi , \{ \Phi \} \}$
The power set of the set $\{ \Phi \}$ is$\{ \Phi \}$$\{ \Phi, \{ \Phi \} \}$$\{ 0 \}$$\{ 0, \Phi , \{ \Phi \} \}$
2.3k
views
commented
Oct 24, 2019
Set Theory & Algebra
ugcnetcse-dec2012-paper2
set-theory&algebra
set-theory
power-set
+
–
6
answers
3
GATE CSE 2010 | Question: 46
A system has $n$ resources $R_0, \dots,R_{n-1}$, and $k$ processes $P_0, \dots, P_{k-1}$. The implementation of the resource request logic of each process $P_i$ is as follows: $\text{if} (i\%2==0) \{$ $\quad\text{if} (i<n) \text{ request } R_i;$ ... which of the following situations is a deadlock possible? $n=40,\: k=26$ $n=21,\:k=12$ $n=20,\:k=10$ $n=41,\:k=19$
A system has $n$ resources $R_0, \dots,R_{n-1}$, and $k$ processes $P_0, \dots, P_{k-1}$. The implementation of the resource request logic of each process $P_i$ is as fol...
29.3k
views
commented
Nov 1, 2017
Operating System
gatecse-2010
operating-system
resource-allocation
normal
+
–
7
answers
4
GATE CSE 2014 Set 3 | Question: 24
A bit-stuffing based framing protocol uses an $\text{8-bit}$ delimiter pattern of $01111110.$ If the output bit-string after stuffing is $01111100101,$ then the input bit-string is: $0111110100$ $0111110101$ $0111111101$ $0111111111$
A bit-stuffing based framing protocol uses an $\text{8-bit}$ delimiter pattern of $01111110.$ If the output bit-string after stuffing is $01111100101,$ then the input bit...
22.5k
views
commented
Feb 1, 2016
Computer Networks
gatecse-2014-set3
computer-networks
error-detection
+
–
4
answers
5
GATE CSE 2013 | Question: 14
Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D. Network layer - $4$ times and Data link ... $4$ times and Data link layer - $6$ times Network layer - $2$ times and Data link layer - $6$ times
Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and t...
18.0k
views
commented
Jan 30, 2016
Computer Networks
gatecse-2013
computer-networks
network-layering
normal
+
–
3
answers
6
GATE CSE 2003 | Question: 20
Consider the following three claims: $(n+k)^m = \Theta(n^m)$ where $k$ and $m$ are constants $2^{n+1} = O(2^n)$ $2^{2n+1} = O(2^n)$ Which of the following claims are correct? I and II I and III II and III I, II, and III
Consider the following three claims:$(n+k)^m = \Theta(n^m)$ where $k$ and $m$ are constants$2^{n+1} = O(2^n)$$2^{2n+1} = O(2^n)$Which of the following claims are correct?...
18.7k
views
commented
Jan 29, 2016
Algorithms
gatecse-2003
algorithms
asymptotic-notation
normal
+
–
1
answer
7
Virtual Gate Test Series: Theory Of Computation - Decidable Language
$L$ is surely decidable if (A) both $L$ and its complement are not recognizable (B) $L \subseteq \{0\}^*$ (C) $L \leq_m \{0^n1^n\;\mid\;n\geq0\}$ (D) $L^R$ is decidable
$L$ is surely decidable if (A) both $L$ and its complement are not recognizable (B) $L \subseteq \{0\}^*$(C) $L \leq_m \{0^n1^n\;\mid\;n\geq0\}$(D) $L^R$ is decidable
832
views
asked
Jan 26, 2016
Theory of Computation
theory-of-computation
decidability
virtual-gate-test-series
+
–
1
answer
8
Virtual Gate Test Series: Databases - Aggregation
Which of the following is not true? Generalization is the result of taking the union of two or more disjoint entity sets to produce a higher level entity set. Specialization is an abstraction in which ... condition. The concurrency control management component of the database is responsible for handling the concurrency control policies.
Which of the following is not true?Generalization is the result of taking the union of two or more disjoint entity sets to produce a higher level entity set.Specializatio...
535
views
asked
Jan 26, 2016
Databases
databases
canonical-cover
database-normalization
virtual-gate-test-series
+
–
3
answers
9
Virtual Gate Test Series: Programming & DS - AVL Tree
Insert the given values in the order in initially empty $\text{AVL}$ tree. $\text{34,21,10,27,24,43,15,6}$ What is the value at the root of the tree$?$
Insert the given values in the order in initially empty $\text{AVL}$ tree.$\text{34,21,10,27,24,43,15,6}$What is the value at the root of the tree$?$
800
views
asked
Jan 26, 2016
DS
data-structures
tree
avl-tree
virtual-gate-test-series
+
–
3
answers
10
Virtual Gate Test Series: Discrete Mathematics - Graph Theory (Matching Number)
Find the matching number for the given graph-
Find the matching number for the given graph-
932
views
asked
Jan 26, 2016
Graph Theory
discrete-mathematics
graph-theory
graph-matching
virtual-gate-test-series
+
–
1
answer
11
Is there an easy way to check whether a given decomposition of a relation is lossless and dependency preserving ?
Given relation and the FDs applicable on it. How to check whether a given decomposition is lossless and dependency preserving?I know that for lossless we can easily chec...
804
views
asked
Jan 22, 2016
Databases
databases
dependency-preserving
+
–
2
answers
12
Calculating time compleity of recurrence relations.
I am having some problems in calculating time complexities for recurrence relations. In one of the books, I saw two questions- 1. A(n) { if(n<=1) return (n); else { return ( A(n/2)+ A(n/2)+ n); } } The recurrence for this is given as T(n)= T(n/2)+ ... )+T(n/2) +c if n>1 I think it should be T(n)= 2T(n/2)+6T(n/2) +n^2 What am I missing here ?
I am having some problems in calculating time complexities for recurrence relations. In one of the books, I saw two questions-1.A(n){if(n<=1) return (n);else{ return ( A(...
405
views
edited
Jan 17, 2016
Algorithms
algorithms
recurrence-relation
+
–
3
answers
13
GATE IT 2005 | Question: 5
Which of the following statements is TRUE about the regular expression $01^*0$? It represents a finite set of finite strings. It represents an infinite set of finite strings. It represents a finite set of infinite strings. It represents an infinite set of infinite strings.
Which of the following statements is TRUE about the regular expression $01^*0$?It represents a finite set of finite strings.It represents an infinite set of finite string...
9.8k
views
commented
Jan 16, 2016
Theory of Computation
gateit-2005
theory-of-computation
regular-expression
easy
+
–
5
answers
14
GATE CSE 2007 | Question: 21
How many different non-isomorphic Abelian groups of order $4$ are there? $2$ $3$ $4$ $5$
How many different non-isomorphic Abelian groups of order $4$ are there?$2$$3$$4$$5$
19.7k
views
commented
Jan 14, 2016
Set Theory & Algebra
gatecse-2007
group-theory
normal
+
–
6
answers
15
GATE CSE 2002 | Question: 2.17
The binary relation $S= \phi \text{(empty set)}$ on a set $A = \left \{ 1,2,3 \right \}$ is Neither reflexive nor symmetric Symmetric and reflexive Transitive and reflexive Transitive and symmetric
The binary relation $S= \phi \text{(empty set)}$ on a set $A = \left \{ 1,2,3 \right \}$ is Neither reflexive nor symmetricSymmetric and reflexiveTransitive and reflexive...
13.0k
views
commented
Jan 14, 2016
Set Theory & Algebra
gatecse-2002
set-theory&algebra
normal
relations
+
–
2
answers
16
GATE CSE 1999 | Question: 2.4
If $L1$ is context free language and $L2$ is a regular language which of the following is/are false? $L1-L2$ is not context free $L1 \cap L2$ is context free $\sim L1$ is context free $\sim L2$ is regular
If $L1$ is context free language and $L2$ is a regular language which of the following is/are false?$L1-L2$ is not context free$L1 \cap L2$ is context free$\sim L1$ is co...
11.6k
views
commented
Jan 14, 2016
Theory of Computation
gate1999
theory-of-computation
identify-class-language
normal
multiple-selects
+
–
2
answers
17
GATE CSE 2006 | Question: 33
Let $L_1$ be a regular language, $L_2$ be a deterministic context-free language and $L_3$ a recursively enumerable, but not recursive, language. Which one of the following statements is false? $L_1 \cap L_2$ is a deterministic CFL $L_3 \cap L_1$ is recursive $L_1 \cup L_2$ is context free $L_1 \cap L_2 \cap L_3$ is recursively enumerable
Let $L_1$ be a regular language, $L_2$ be a deterministic context-free language and $L_3$ a recursively enumerable, but not recursive, language. Which one of the followi...
12.6k
views
commented
Jan 12, 2016
Theory of Computation
gatecse-2006
theory-of-computation
normal
identify-class-language
+
–
4
answers
18
GATE CSE 2001 | Question: 2.5
Consider a DFA over $\Sigma=\{a,b\}$ accepting all strings which have number of a's divisible by $6$ and number of $b$'s divisible by $8$. What is the minimum number of states that the DFA will have? $8$ $14$ $15$ $48$
Consider a DFA over $\Sigma=\{a,b\}$ accepting all strings which have number of a's divisible by $6$ and number of $b$'s divisible by $8$. What is the minimum number of s...
18.6k
views
commented
Jan 12, 2016
Theory of Computation
gatecse-2001
theory-of-computation
finite-automata
minimal-state-automata
+
–
6
answers
19
GATE2012 CY: GA-5
Choose the most appropriate alternative from the options given below to complete the following sentence: If the tired soldier wanted to lie down, he ___ the mattress out on the balcony. should take shall take should have taken will have taken
Choose the most appropriate alternative from the options given below to complete the followingsentence:If the tired soldier wanted to lie down, he ___ the mattress out on...
4.3k
views
answered
Jan 2, 2016
Verbal Aptitude
gate2012-cy
most-appropriate-alternative
english-grammar
verbal-aptitude
+
–
6
answers
20
GATE IT 2006 | Question: 49
Which one of the choices given below would be printed when the following program is executed ? #include <stdio.h> struct test { int i; char *c; }st[] = {5, "become", 4, "better", 6, "jungle", 8, "ancestor", 7, " ... $\text{etter, u, 6, ungle}$ $\text{cetter, k, 6, jungle}$ $\text{etter, u, 8, ncestor}$
Which one of the choices given below would be printed when the following program is executed ?#include <stdio.h struct test { int i; char *c; }st[] = {5, "become", 4, "be...
27.2k
views
commented
Jan 2, 2016
Programming in C
gateit-2006
programming
programming-in-c
normal
structure
+
–
5
answers
21
GATE CSE 1992 | Question: 02,vii
A $2-3$ tree is such that All internal nodes have either $2$ or $3$ children All paths from root to the leaves have the same length The number of internal nodes of a $2-3$ tree having $9$ leaves could be $4$ $5$ $6$ $7$
A $2-3$ tree is such thatAll internal nodes have either $2$ or $3$ childrenAll paths from root to the leaves have the same lengthThe number of internal nodes of a $2-3$ t...
9.0k
views
commented
Dec 31, 2015
DS
gate1992
tree
data-structures
normal
multiple-selects
+
–
10
answers
22
GATE CSE 2003 | Question: 23
In a min-heap with $n$ elements with the smallest element at the root, the $7^{th}$ smallest element can be found in time $\Theta (n \log n)$ $\Theta (n)$ $\Theta(\log n)$ $\Theta(1)$
In a min-heap with $n$ elements with the smallest element at the root, the $7^{th}$ smallest element can be found in time$\Theta (n \log n)$$\Theta (n)$$\Theta(\log n)$$\...
32.1k
views
commented
Dec 30, 2015
DS
gatecse-2003
data-structures
binary-heap
+
–
5
answers
23
GATE CSE 2005 | Question: 1, ISRO2017-55
What does the following C-statement declare? int (*f) (int * ); A function that takes an integer pointer as argument and returns an integer A function that takes an integer as argument and returns an integer pointer A pointer ... pointer as argument and returns an integer A function that takes an integer pointer as argument and returns a function pointer
What does the following C-statement declare?int (*f) (int * );A function that takes an integer pointer as argument and returns an integerA function that takes an integer ...
20.8k
views
commented
Dec 30, 2015
Programming in C
gatecse-2005
programming
programming-in-c
pointers
easy
isro2017
+
–
3
answers
24
GATE CSE 2002 | Question: 2.18
The C language is: A context free language A context sensitive language A regular language Parsable fully only by a Turing machine
The C language is:A context free languageA context sensitive languageA regular languageParsable fully only by a Turing machine
10.3k
views
commented
Dec 30, 2015
Programming in C
gatecse-2002
programming
programming-in-c
normal
+
–
3
answers
25
GATE CSE 2014 Set 1 | Question: 40
Consider a hash table with $9$ slots. The hash function is $h(k)= k \mod 9$. The collisions are resolved by chaining. The following $9$ keys are inserted in the order: $5, 28, 19, 15, 20, 33, 12, 17, 10$. The maximum, minimum, and average chain lengths in the hash table, respectively, are $3, 0,$ and $1$ $3, 3,$ and $3$ $4, 0,$ and $1$ $3, 0,$ and $2$
Consider a hash table with $9$ slots. The hash function is $h(k)= k \mod 9$. The collisions are resolved by chaining. The following $9$ keys are inserted in the order: $5...
10.3k
views
commented
Dec 30, 2015
DS
gatecse-2014-set1
data-structures
hashing
normal
+
–
9
answers
26
GATE CSE 2011 | Question: 29
We are given a set of $n$ distinct elements and an unlabeled binary tree with $n$ nodes. In how many ways can we populate the tree with the given set so that it becomes a binary search tree? $0$ $1$ $n!$ $\frac{1} {n+1} .^{2n}C_n$
We are given a set of $n$ distinct elements and an unlabeled binary tree with $n$ nodes. In how many ways can we populate the tree with the given set so that it becomes a...
31.9k
views
commented
Dec 30, 2015
DS
gatecse-2011
binary-tree
normal
+
–
2
answers
27
GATE CSE 2012 | Question: 41
A file system with $300$ GByte disk uses a file descriptor with $8$ direct block addresses, $1$ indirect block address and $1$ doubly indirect block address. The size of each disk block is $128$ Bytes and the size of each disk block address is $8$ Bytes. ... file size in this file system is $3$ KBytes $35$ KBytes $280$ KBytes dependent on the size of the disk
A file system with $300$ GByte disk uses a file descriptor with $8$ direct block addresses, $1$ indirect block address and $1$ doubly indirect block address. The size of ...
21.1k
views
commented
Dec 26, 2015
Operating System
gatecse-2012
operating-system
disk
normal
+
–
4
answers
28
GATE CSE 1997 | Question: 3.8
When an interrupt occurs, an operating system ignores the interrupt always changes state of interrupted process after processing the interrupt always resumes execution of interrupted process after processing the interrupt may change state of interrupted process to ‘blocked’ and schedule another process.
When an interrupt occurs, an operating systemignores the interruptalways changes state of interrupted process after processing the interruptalways resumes execution of in...
13.9k
views
commented
Dec 25, 2015
Operating System
gate1997
operating-system
interrupts
normal
+
–
3
answers
29
GATE CSE 2006 | Question: 62, ISRO2016-50
A CPU generates $32$-bit virtual addresses. The page size is $4$ KB. The processor has a translation look-aside buffer (TLB) which can hold a total of $128$ page table entries and is $4$-way set associative. The minimum size of the TLB tag is: $\text{11 bits}$ $\text{13 bits}$ $\text{15 bits}$ $\text{20 bits}$
A CPU generates $32$-bit virtual addresses. The page size is $4$ KB. The processor has a translation look-aside buffer (TLB) which can hold a total of $128$ page table en...
25.9k
views
commented
Dec 24, 2015
Operating System
gatecse-2006
operating-system
virtual-memory
normal
isro2016
+
–
4
answers
30
GATE CSE 1999 | Question: 2.11
Which of the following is/are advantage(s) of virtual memory? Faster access to memory on an average. Processes can be given protected address spaces. Linker can assign addresses independent of where the program will be loaded in physical memory. Program larger than the physical memory size can be run.
Which of the following is/are advantage(s) of virtual memory?Faster access to memory on an average.Processes can be given protected address spaces.Linker can assign addre...
14.0k
views
commented
Dec 24, 2015
Operating System
gate1999
operating-system
virtual-memory
easy
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register