Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Recent
Hot!
Most votes
Most answers
Most views
Previous GATE
Featured
Recent questions in Unknown Category
1
votes
1
answer
81
NIELIT Scientist B 2020 November: 70
On computers where there are multiple operating system, the decision to load a particular one is done by ________. $PCB$ Inode File Control Block Boot Loader
On computers where there are multiple operating system, the decision to load a particular one is done by ________.$PCB$InodeFile Control BlockBoot Loader
gatecse
357
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
0
answers
82
NIELIT Scientist B 2020 November: 71
The resistance to be connected across terminal $a, b$ for maximum power transfer to it is: $40\; \Omega$ $5\; \Omega$ $2.5 \;\Omega$ $10\; \Omega$
The resistance to be connected across terminal $a, b$ for maximum power transfer to it is:$40\; \Omega$$5\; \Omega$$2.5 \;\Omega$$10\; \Omega$
gatecse
367
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
electronic-circuit
non-gate
+
–
1
votes
1
answer
83
NIELIT Scientist B 2020 November: 72
One disk queue with requests for $I/O$ to blocks on cylinders. The Request are in the following manner: $\text{98 183 37 122 14 124 65 67}$ Considering $SSTF$ (shortest seek time first) scheduling, the total number of head movements is, if the disk head is initially at $53$ is: $236$ $246$ $220$ $240$
One disk queue with requests for $I/O$ to blocks on cylinders. The Request are in the following manner:$\text{98 183 37 122 14 124 65 67}$Considering $SSTF$ (shortest see...
gatecse
311
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
84
NIELIT Scientist B 2020 November: 73
Which open addressing technique is free from Clustering problems? Linear probing Quadratic probing Double hashing Rehashing
Which open addressing technique is free from Clustering problems?Linear probingQuadratic probingDouble hashingRehashing
gatecse
1.1k
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
85
NIELIT Scientist B 2020 November: 74
In classful addressing, a large part of the available addresses are __________. Dispersed Blocked Wasted Reserved
In classful addressing, a large part of the available addresses are __________.DispersedBlockedWastedReserved
gatecse
331
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
86
NIELIT Scientist B 2020 November: 75
What is the basis of $KVL$? Conservation of charge Conservation of energy Conservation of power All of the options
What is the basis of $KVL$?Conservation of chargeConservation of energyConservation of powerAll of the options
gatecse
343
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
87
NIELIT Scientist B 2020 November: 76
In ____________ $VMs$ do not simulate the underlying hardware. Para Virtualization Full Virtualization Hardware-Assisted Virtualization Network Virtualization
In ____________ $VMs$ do not simulate the underlying hardware.Para VirtualizationFull VirtualizationHardware-Assisted VirtualizationNetwork Virtualization
gatecse
307
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
88
NIELIT Scientist B 2020 November: 77
The recurrence relation $T(n)=7T(n/7)+n$ has the solution: $O(n)$ $O(logn)$ $O(nlog(n))$ $O(n^2)$
The recurrence relation $T(n)=7T(n/7)+n$ has the solution:$O(n)$$O(logn)$$O(nlog(n))$$O(n^2)$
gatecse
318
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
89
NIELIT Scientist B 2020 November: 78
____________ uses pretty good privacy algorithm. Electronic mails File encryption Both Electronic mails and File encryption None of the options
____________ uses pretty good privacy algorithm.Electronic mailsFile encryptionBoth Electronic mails and File encryptionNone of the options
gatecse
352
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
90
NIELIT Scientist B 2020 November: 79
Which of the following property is related to a cryptographic hash functions? One way Function Inversible Non-Deterministic All of the options
Which of the following property is related to a cryptographic hash functions?One way FunctionInversibleNon-DeterministicAll of the options
gatecse
775
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
91
NIELIT Scientist B 2020 November: 80
Consider a Simple Checkpointing Protocol and the following set of operations in the log. $(start, T_4);(write, T_4,y,2,3);(start,T_1);$ $(commit,T_4);(write,T_1,z,5,7);$ $(Checkpoint);$ $(start,T_2);(write,T_2,x,1,9);$ ... $Undo : T_3,T_1;Redo\;T_2,T_4$ $Undo : none; \;Redo\;T_2, T_4, T_3, T_1$ $Undo : T_3,T_1,T_4; \;Redo\;T_2$
Consider a Simple Checkpointing Protocol and the following set of operations in the log.$(start, T_4);(write, T_4,y,2,3);(start,T_1);$$(commit,T_4);(write,T_1,z,5,7);$$(C...
gatecse
363
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
92
NIELIT Scientist B 2020 November: 81
Debugger is a program that: Allows to examine and modify the contents of registers Allows to set breakpoints, execute a segment of program and display contents of register Does not allow execution of a segment of program All the options
Debugger is a program that:Allows to examine and modify the contents of registersAllows to set breakpoints, execute a segment of program and display contents of registerD...
gatecse
293
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
3
answers
93
NIELIT Scientist B 2020 November: 82
Which of the following techniques deals with sorting the data stored in the computer’s memory? Distribution sort Internal sort External sort Radix sort
Which of the following techniques deals with sorting the data stored in the computer’s memory?Distribution sortInternal sortExternal sortRadix sort
gatecse
652
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
94
NIELIT Scientist B 2020 November: 83
_____________ possible labels are allowed in the first level of generic domain. $10$ $12$ $16$ none of the options
_____________ possible labels are allowed in the first level of generic domain.$10$$12$$16$none of the options
gatecse
356
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
95
NIELIT Scientist B 2020 November: 85
If main memory access time is $400\;\mu s$, $TLB$ access time $50\;\mu s$, considering $TLB$ hit $90\%$, what wil be the overall access time? $800\;\mu s$ $490 \;\mu s$ $485\;\mu s$ $450\;\mu s$
If main memory access time is $400\;\mu s$, $TLB$ access time $50\;\mu s$, considering $TLB$ hit $90\%$, what wil be the overall access time?$800\;\mu s$$490 \;\mu s$$485...
gatecse
373
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
2
votes
1
answer
96
NIELIT Scientist B 2020 November: 86
In an operating system, processes that are terminated but, for some reason must have its task structure in the process table are referred as __________. Zombies Orphans Parent Process Child Process
In an operating system, processes that are terminated but, for some reason must have its task structure in the process table are referred as __________.ZombiesOrphansPare...
gatecse
382
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
0
votes
1
answer
97
NIELIT Scientist B 2020 November: 87
Point out the wrong statement : Non-Relational databases require that schemas be defined before you can add data No SQL databases are built to allow the insertion of data without a predefined schema New SQL databases are built to allow the insertion of data without a predefined schema All of the options
Point out the wrong statement :Non-Relational databases require that schemas be defined before you can add dataNo SQL databases are built to allow the insertion of data w...
gatecse
2.8k
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
98
NIELIT Scientist B 2020 November: 88
In which modulation discrete values of carrier frequencies is used to transmit binary data? Phase Shift Keying Amplitude Shift Keying Frequency Shift Keying Disk Shift Keying
In which modulation discrete values of carrier frequencies is used to transmit binary data?Phase Shift KeyingAmplitude Shift KeyingFrequency Shift KeyingDisk Shift Keying...
gatecse
396
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
99
NIELIT Scientist B 2020 November: 89
$PI$ in $XML$ specification stands for ___________. priceless instruction processing instruction polymorphic inheritance primary instruction
$PI$ in $XML$ specification stands for ___________.priceless instructionprocessing instructionpolymorphic inheritanceprimary instruction
gatecse
299
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
1
votes
1
answer
100
NIELIT Scientist B 2020 November: 90
Which type of linked list stores the address of the header node in the next field of the last node? Singly linked list Circular linked list Doubly linked list Hashed list
Which type of linked list stores the address of the header node in the next field of the last node?Singly linked listCircular linked listDoubly linked listHashed list
gatecse
650
views
gatecse
asked
Dec 9, 2020
Unknown Category
nielit-scb-2020
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
10
...
44
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register