GATE CSE
For all GATE CSE Questions
Toggle navigation
GATE Overflow
Facebook Login
Google Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
All Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions.
Recent activity by sh!va
User sh!va
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
User sh!va
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
1
answer
1
Datagram switching and Virtual circuit
asked
18 hours
ago
in
Computer Networks

19
views
computernetworks
4
answers
2
ISRO201432
What is the output of the following C program? #include<stdio.h> void main(void){ int shifty; shifty=0570; shifty=shifty>>4; shifty=shifty<<6; printf("The value of shifty is %o \n",shifty); } The value of shifty is 15c0 The value of shifty is 4300 The value of shifty is 5700 The value of shifty is 2700
answer selected
1 day
ago
in
Programming

824
views
programminginc
isro2014
2
answers
3
UGCNETDEC2016III39
Consider the following JAVA program: public class First { public static int CBSE (int x) { if (x<100) x = CBSE(x+10); return(x1); } public static void main (String[] args) { System.out.print(First.CBSE(60)); } } What does this program print? 59 95 69 99
commented
1 day
ago
in
Java

36
views
ugcnetdec2016iii
java
programming
recursion
3
answers
4
GATE2017147
The number of integers between 1 and 500 (both inclusive) that are divisible by 3 or 5 or 7 is ____________ .
answered
3 days
ago
in
Set Theory & Algebra

516
views
gate20171
settheory&algebra
normal
numericalanswers
2
answers
5
GATE2017132
answer selected
3 days
ago
in
Computer Networks

456
views
gate20171
computernetworks
crcpolynomial
normal
0
answers
6
Gate201711
closed
5 days
ago
in
Digital Logic

424
views
2
answers
7
GATE2017144
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate here public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
answer selected
5 days
ago
in
Computer Networks

384
views
gate20171
networksecurity
computernetworks
rsasecuritynetworks
numericalanswers
normal
2
answers
8
best case complexity
Which of the following sorting algorithms has/have minimum running time complexity in best case? I. Selection Sort II. Insertion Sort a. I b. II c. Both have same minimum running time complexity
asked
5 days
ago
in
Algorithms

49
views
algorithms
2
answers
9
GATE20171GA10
answered
6 days
ago
in
Verbal Ability

536
views
gate20171
0
answers
10
GATE_2015_ECE Matrices
.
asked
6 days
ago
in
Mathematical Logic

24
views
matrices
3
answers
11
Gate 2017
L1={wstarts with a and ends with b} L2={wstarts with b and ends with a} then L1 ⋂ L2 will be: 1. Finite 2.CFL but not regular 3.none of the above.
answered
Feb 11
in
Theory of Computation

284
views
3
answers
12
[TOC] Check given set is countable
answered
Feb 10
in
Theory of Computation

51
views
theoryofcomputation
1
answer
13
PREDICT SERIALIZABILITY OF GIVEN SCHEDULE
asked
Feb 10
in
Databases

59
views
databases
view_serializable
2
answers
14
How many tuples are returned by SQL Query
asked
Feb 8
in
Databases

56
views
databases
sql
1
answer
15
Predict the number of tuples in SQL result
commented
Feb 8
in
Databases

29
views
databases
sql
1
answer
16
number of cycles in given graph:
asked
Feb 7
in
Algorithms

53
views
datastructure
3
answers
17
GATE2012_37
How many onto (or surjective) functions are there from an $n$element $(n ≥ 2)$ set to a $2$element set? (A) $ 2^{n}$ (B) $2^{n} – 1$ (C) $2^{n} – 2$ (D) $2(2^{n} – 2)$
answer selected
Feb 7
in
Set Theory & Algebra

459
views
gate2012
settheory&algebra
functions
normal
1
answer
18
GATE2012_36
Consider the program given below, in a blockstructured pseudolanguage with lexical scoping and nesting of procedures permitted. Program main; Var ... Procedure A1; Var ... Call A2; End A1 Procedure A2; Var ... Procedure A21; Var ... Call A1; ... ; A1 > A2 > A21 > A1 The correct set of activation records along with their access links is given by
answer edited
Feb 7
in
Programming

888
views
gate2012
programming
activationrecords
normal
3
answers
19
GATE2012_34
An Internet Service Provider (ISP) has the following chunk of CIDRbased IP addresses available with it: $245.248.128.0/20$. The ISP wants to give half of this chunk of addresses to Organization $A$, and a quarter to Organization $B$, while retaining the remaining with ... \text{ and } 245.248.132.0/21$ (D) $245.248.136.0/24 \text{ and } 245.248.132.0/21$
answer edited
Feb 7
in
Computer Networks

1.3k
views
gate2012
computernetworks
subnetting
normal
1
answer
20
Predict serializability of given schedule
commented
Feb 7
in
Databases

34
views
databases
view_serializable
1
answer
21
Choose the correct statement about HEAP
commented
Feb 7
in
Algorithms

69
views
datastructure
4
answers
22
GATE2014227
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. $QR1R2R3H$ H acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer encryption is used, with DES as the shared ... , I3, and I4 can an intruder learn through sniffing at R2 alone? Only I1 and I2 Only I1 Only I2 and I3 Only I3 and I4
answer edited
Feb 6
in
Computer Networks

1.4k
views
gate20142
computernetworks
networksecurity
normal
5
answers
23
GATE2013_12
The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are (A) TCP, UDP, UDP and TCP (B) UDP, TCP, TCP and UDP (C) UDP, TCP, UDP and TCP (D) TCP, UDP, TCP and UDP
answer edited
Feb 4
in
Computer Networks

698
views
gate2013
computernetworks
tcp
udp
easy
1
answer
24
Find the essential prime implicants
commented
Feb 4
in
Digital Logic

38
views
digitallogic
1
answer
25
calculate packet transmission time
asked
Feb 4
in
Computer Networks

25
views
computernetworks
7
answers
26
GATE 2016240
The number of ways in which the numbers $1, 2, 3, 4, 5, 6, 7$ can be inserted in an empty binary search tree, such that the resulting tree has height $6$, is _________. Note: The height of a tree with a single node is $0$.
answer selected
Feb 2
in
DS

2.7k
views
gate20162
datastructure
binarytree
binarysearch
normal
numericalanswers
0
answers
27
MEMock Test
Which of the following is true ? B Tree index nodes less than or equal B+ Tree index nodes for n keys. B+ Tree index nodes less than or equal B Tree index nodes for n keys. I/O cost of B+ Tree index less than or equal I/O cost of B Tree index for n keys. Levels of B+ Tree index less than or equal to levels of B Tree index for n keys
commented
Feb 2
in
Databases

23
views
madeeasy_testseriesbtreesb
trees
1
answer
28
Minimum spanning tree
In given graph G if only AC and BC belong to its minimum spanning tree, then what can be the minimum sum of weights of all edges in the graph G? A. 13 B. 14 C. 20 D. 21
asked
Feb 2
in
Algorithms

30
views
minimumspanningtrees
algorithms
1
answer
29
Choose the regular langauge
L1:{wwR∣w,x∈{a,b}∗ and w>0},wR is the reverse of string w L2:{wxwR∣w,x∈{a,b}∗ and w,x>0},wR is the reverse of string w L1 is regular but not L2 L2 is regular but not L1 Both L1 and L2 are regular Neither L1 nor L2 is regular
asked
Feb 1
in
Theory of Computation

23
views
theoryofcomputation
1
answer
30
Intersection and concatenation in CFG
answer selected
Feb 1
in
Compiler Design

31
views
theoryofcomputation
1
answer
31
ME test
Consider the following schedule S : R2(A), R1(A), W1(C), R3(C), W1(B), R4(B), W3(A), R4(C), W2(D), R2(B), W4(A), W4(B) What is the number of Serial Schedules which are equal to Schedule S but not conflict equivalent to Schedule S? A) 0 B) 1 C) 2 D) 3
answered
Feb 1
in
Databases

27
views
2
answers
32
UGCNETDEC2016III9
Let $pk(R)$ denotes primary key of the relation R. A many to one relationship that exists between two relations $R_1$ and $R_2$ can be expressed as follows: $pk(R_2) \rightarrow pk(R_1)$ $pk(R_1) \rightarrow pk(R_2)$ $pk(R_2) \rightarrow R_1 \cap R_2$ $pk(R_1) \rightarrow R_1 \cap R_2$
answered
Feb 1
in
Others

28
views
ugcnetdec2016iii
2
answers
33
UGCNETDEC2016III11
Consider the following relation: Works(emp_name, company_name, salary) Here, emp_name is primary key. Consider the following SQL query: Select emp_name From works T where salary>(select avg (salary) from works S where T.company_name ... all the companies Find all employees who earn more than the average salary of all employees of their company
answered
Feb 1
in
Others

20
views
ugcnetdec2016iii
2
answers
34
UGCNETDEC2016III24
A recursive function $h$, is defined as follows: $\begin{array}{rcl} h(m) & = & k, \text{ if } m=0 \\ & = & 1, \text{ if } m=1 \\ & = & 2h (m1) + 4h(m2), \text{ if } m \geq 2 \end{array}$ If the value of $h(4)$ is 88 then the value of $k$ is: 0 1 2 1
answered
Feb 1
in
Others

19
views
ugcnetdec2016iii
2
answers
35
UGCNETDEC2016III40
Which of the following statement(s) with regard to an abstract class in JAVA is/are TRUE? An abstract class is one that is not used to create objects An abstract class is designed only to act as a base class to be inherited by other classes Only I Only II Neither I nor II Both I and II
answered
Feb 1
in
Others

17
views
ugcnetdec2016iii
2
answers
36
UGCNETDEC2016III43
Which of the following statement(s) is/are TRUE with regard to software testing? Regression testing technique ensures that the software product runs correctly after the changes during maintenance Equivalence partitioning is a whitebox testing technique that ... data from which test cases can be derived Only I Only II Both I and II Neither I nor II
answered
Feb 1
in
Others

14
views
ugcnetdec2016iii
2
answers
37
UGCNETDEC2016III47
Complete each of the following sentences in ListI on the left hand side by filling in the word or phrase from the List II on the right hand side that best completes the sentence: ListI ListII I. Determining whether you have built the right system is called ____ A. Software ... B, IID, IIIC, IVA ID, IIB, IIIC, IVA ID, IIB, IIIA, IVC
answered
Feb 1
in
Others

19
views
ugcnetdec2016iii
1
answer
38
ACE Mock Test
answered
Feb 1
in
Databases

18
views
1
answer
39
TOC test ACE
What is the concatenation of (a+b)*.a^nb^n?Shouldnt this be context free?
answered
Jan 31
in
Theory of Computation

33
views
theoryofcomputation
cfl
3
answers
40
madeeasy test series
Two gate aspirants talking to each other use the RSA algorithm to encrypt their messages. They encrypt the message character by character. The value of p, q and d are 5, 17 and 13 respectively, where p, q and d are their ... 3,..., respectively).The sum of integers in cipher text for corresponding characters in plain text: IIT _________ .
commented
Jan 31
in
Computer Networks

50
views
20,793
questions
25,951
answers
59,558
comments
21,976
users