The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged gate20152
+25
votes
7
answers
1
GATE2015226
Let $f(x)=x^{\left(\frac{1}{3}\right)}$ and $A$ denote the area of region bounded by $f(x)$ and the Xaxis, when $x$ varies from $1$ to $1$. Which of the following statements is/are TRUE? $f$ is continuous in $[1, 1]$ $f$ is not bounded in $[1, 1]$ $A$ is nonzero and finite II only III only II and III only I, II and III
asked
Feb 12, 2015
in
Calculus
by
jothee
Veteran
(
105k
points)

4.8k
views
gate20152
continuity
functions
normal
+28
votes
4
answers
2
GATE2015225
A computer system implements a $40bit$ virtual address, page size of $8$ $\text{kilobytes}$, and a $128entry$ translation lookaside buffer ($TLB$) organized into $32$ sets each having $4$ ways. Assume that the $TLB$ tag does not store any process id. The minimum length of the $TLB$ tag in bits is ____.
asked
Feb 12, 2015
in
Operating System
by
jothee
Veteran
(
105k
points)

5.3k
views
gate20152
operatingsystem
virtualmemory
easy
numericalanswers
+15
votes
3
answers
3
GATE2015224
Assume that for a certain processor, a read request takes $50$ $nanoseconds$ on a cache miss and $5$ $nanoseconds$ on a cache hit. Suppose while running a program, it was observed that $80$% of the processor's read requests result in a cache hit. The average read access time in nanoseconds is _____.
asked
Feb 12, 2015
in
CO and Architecture
by
jothee
Veteran
(
105k
points)

3.9k
views
gate20152
coandarchitecture
cachememory
easy
numericalanswers
+26
votes
7
answers
4
GATE2015223
A system has $6$ identical resources and $N$ processes competing for them. Each process can request at most $2$ requests. Which one of the following values of $N$ could lead to a deadlock? $1$ $2$ $3$ $4$
asked
Feb 12, 2015
in
Operating System
by
jothee
Veteran
(
105k
points)

8.1k
views
gate20152
operatingsystem
resourceallocation
easy
+35
votes
6
answers
5
GATE2015222
An unordered list contains $n$ distinct elements. The number of comparisons to find an element in this list that is neither maximum nor minimum is $\Theta(n \log n)$ $\Theta(n)$ $\Theta(\log n)$ $\Theta(1)$
asked
Feb 12, 2015
in
Algorithms
by
jothee
Veteran
(
105k
points)

5k
views
gate20152
algorithms
timecomplexity
easy
+30
votes
5
answers
6
GATE2015221
Consider the following statements. The complement of every Turing decidable language is Turing decidable There exists some language which is in NP but is not Turing decidable If L is a language in NP, L is Turing decidable Which of the above statements is/are true? Only II Only III Only I and II Only I and III
asked
Feb 12, 2015
in
Theory of Computation
by
jothee
Veteran
(
105k
points)

3.5k
views
gate20152
theoryofcomputation
decidability
easy
+19
votes
3
answers
7
GATE2015220
Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket API. listen, accept, bind, recv bind, listen, accept, recv bind, accept, listen, recv accept, listen, bind, recv
asked
Feb 12, 2015
in
Computer Networks
by
jothee
Veteran
(
105k
points)

2.7k
views
gate20152
computernetworks
sockets
easy
+24
votes
3
answers
8
GATE2015219
Match the following: ... $\text{P2, Q4, R1, S3}$ $\text{P2, Q3, R4, S1}$
asked
Feb 12, 2015
in
Compiler Design
by
jothee
Veteran
(
105k
points)

2.3k
views
gate20152
compilerdesign
normal
compilationphases
+16
votes
3
answers
9
GATE2015218
The cardinality of the power set of $\{0, 1, 2, \dots , 10\}$ is _______
asked
Feb 12, 2015
in
Set Theory & Algebra
by
jothee
Veteran
(
105k
points)

1.6k
views
gate20152
settheory&algebra
sets
easy
numericalanswers
+31
votes
3
answers
10
GATE2015217
Consider a complete binary tree where the left and right subtrees of the root are maxheaps. The lower bound for the number of operations to convert the tree to a heap is $\Omega(\log n)$ $\Omega(n)$ $\Omega(n \log n)$ $\Omega(n^2)$
asked
Feb 12, 2015
in
DS
by
jothee
Veteran
(
105k
points)

4.1k
views
gate20152
datastructure
heap
normal
+22
votes
2
answers
11
GATE2015216
Let $R$ be the relation on the set of positive integers such that $aRb$ and only if $a$ and $b$ are distinct and let have a common divisor other than 1. Which one of the following statements about $R$ is true? $R$ is symmetric and ... reflexive but not symmetric not transitive $R$ is transitive but not reflexive and not symmetric $R$ is symmetric but not reflexive and not transitive
asked
Feb 12, 2015
in
Set Theory & Algebra
by
jothee
Veteran
(
105k
points)

2.4k
views
gate20152
settheory&algebra
relations
normal
+16
votes
4
answers
12
GATE2015215
Consider the following function written in the C programming langauge : void foo(char *a) { if (*a && *a != ' ') { foo(a+1); putchar(*a); } } The output of the above function on input "$ABCD \ EFGH$" is $ABCD \ EFGH$ $ABCD$ $HGFE \ DCBA$ $DCBA$
asked
Feb 12, 2015
in
Programming
by
jothee
Veteran
(
105k
points)

3.7k
views
gate20152
programming
programminginc
normal
+26
votes
2
answers
13
GATE2015214
In the context of abstractsyntaxtree (AST) and controlflowgraph (CFG), which one of the following is TRUE? In both AST and CFG, let node $N_2$ be the successor of node $N_1$. In the input program, the code corresponding to $N_2$ is present after ... in an AST and a CFG depends on the input program Each node in AST and CFG corresponds to at most one statement in the input program
asked
Feb 12, 2015
in
Compiler Design
by
jothee
Veteran
(
105k
points)

3k
views
gate20152
compilerdesign
easy
abstractsyntaxtree
+7
votes
5
answers
14
GATE2015213
Which of the following statements is NOT correct about HTTP cookies? A cookie is a piece of code that has the potential to compromise the security of an Internet user A cookie gains entry to the user's work area through an HTTP header A cookie has an expiry date and time Cookies can be used to track the browsing pattern of a user at a particular site
asked
Feb 12, 2015
in
Web Technologies
by
jothee
Veteran
(
105k
points)

2k
views
gate20152
webtechnologies
easy
+3
votes
3
answers
15
GATE2015212
Consider the basic COCOMO model where $E$ is the effort applied in personmonths, $D$ is the development time in chronological months, $KLOC$ is the estimated number of delivered lines of code (in thousands) and $a_b, b_b, c_b, d_b$ have their useful meanings. The basic COCOMO equations are ... $E=a_b exp(b_b), D=c_b (KLOC) exp(d_b)$ $E=a_b exp(d_b), D=c_b (KLOC) exp(b_b)$
asked
Feb 12, 2015
in
IS&Software Engineering
by
jothee
Veteran
(
105k
points)

1.1k
views
gate20152
is&softwareengineering
cocomomodel
normal
nongate
+35
votes
11
answers
16
GATE2015211
Consider the following C function. int fun(int n) { int x=1, k; if (n==1) return x; for (k=1; k<n; ++k) x = x + fun(k) * fun (nk); return x; } The return value of $fun(5)$ is ______.
asked
Feb 12, 2015
in
Algorithms
by
jothee
Veteran
(
105k
points)

5.7k
views
gate20152
algorithms
identifyfunction
recurrence
normal
numericalanswers
+18
votes
10
answers
17
GATE2015210
A binary tree T has $20$ leaves. The number of nodes in T having two children is ______.
asked
Feb 12, 2015
in
DS
by
jothee
Veteran
(
105k
points)

4.5k
views
gate20152
datastructure
binarytree
normal
numericalanswers
+13
votes
2
answers
18
GATE201529
The number of divisors of $2100$ is ____.
asked
Feb 12, 2015
in
Set Theory & Algebra
by
jothee
Veteran
(
105k
points)

3.2k
views
gate20152
settheory&algebra
numbertheory
easy
numericalanswers
+20
votes
5
answers
19
GATE201528
A link has transmission speed of $10^6$ bits/sec. It uses data packets of size $1000$ $\text{bytes}$ each. Assume that the acknowledgment has negligible transmission delay and that its propagation delay is the same as the data propagation delay. Also, assume ... $\text{%}$. The value of the one way propagation delay (in milliseconds) is_____.
asked
Feb 12, 2015
in
Computer Networks
by
jothee
Veteran
(
105k
points)

3.8k
views
gate20152
computernetworks
macprotocol
stopandwait
normal
numericalanswers
+50
votes
9
answers
20
GATE201527
The minimum number of JK flipflops required to construct a synchronous counter with the count sequence (0, 0, 1, 1, 2, 2, 3, 3, 0, 0, ...) is _______.
asked
Feb 12, 2015
in
Digital Logic
by
jothee
Veteran
(
105k
points)

13k
views
gate20152
digitallogic
digitalcounter
normal
numericalanswers
+25
votes
3
answers
21
GATE201526
With reference to the B+ tree index of order $1$ shown below, the minimum number of nodes (including the Root node) that must be fetched in order to satisfy the following query. "Get all records with a search key greater than or equal to $7$ and less than $15$ " is ______.
asked
Feb 12, 2015
in
Databases
by
jothee
Veteran
(
105k
points)

3.6k
views
gate20152
databases
btree
normal
numericalanswers
+12
votes
3
answers
22
GATE201525
The larger of the two eigenvalues of the matrix $\begin{bmatrix} 4 & 5 \\ 2 & 1 \end{bmatrix}$ is _______.
asked
Feb 12, 2015
in
Linear Algebra
by
jothee
Veteran
(
105k
points)

1.7k
views
gate20152
linearalgebra
eigenvalue
easy
numericalanswers
+4
votes
1
answer
23
GATE201524
A software requirements specification (SRS) document should avoid discussing which one of the following? User interface issues Nonfunctional requirements Design specification Interfaces with third party software
asked
Feb 12, 2015
in
IS&Software Engineering
by
jothee
Veteran
(
105k
points)

890
views
gate20152
is&softwareengineering
normal
nongate
+18
votes
4
answers
24
GATE201523
Consider the following two statements. $S_1$: If a candidate is known to be corrupt, then he will not be elected $S_2$: If a candidate is kind, he will be elected Which one of the following statements follows from $S_1$ and $S_2$ as per sound inference rules of logic? ... not kind If a person is kind, he is not known to be corrupt If a person is not kind, he is not known to be corrupt
asked
Feb 12, 2015
in
Mathematical Logic
by
jothee
Veteran
(
105k
points)

2.4k
views
gate20152
mathematicallogic
normal
logicalreasoning
+11
votes
2
answers
25
GATE201522
Consider two decision problems $Q_1, Q_2$ such that $Q_1$ reduces in polynomial time to 3SAT and 3SAT reduces in polynomial time to $Q_2$. Then which one of the following is consistent with the above statement? $Q_1$ is in NP, $Q_2$ is NP hard. $Q_2$ is in NP, $Q_1$ is NP hard. Both $Q_1$ and $Q_2$ are in NP. Both $Q_1$ and $Q_2$ are in NP hard.
asked
Feb 12, 2015
in
Theory of Computation
by
jothee
Veteran
(
105k
points)

1.9k
views
gate20152
algorithms
pnpnpcnph
easy
outofsyllabusnow
+26
votes
4
answers
26
GATE201521
Consider the following transaction involving two bank accounts $x$ and $y$. read(x); x:=x50; write (x); read(y); y:=y+50; write(y) The constraint that the sum of the accounts $x$ and $y$ should remain constant is that of Atomicity Consistency Isolation Durability
asked
Feb 12, 2015
in
Databases
by
jothee
Veteran
(
105k
points)

2.9k
views
gate20152
databases
transactions
easy
+11
votes
6
answers
27
GATE20152GA10
Out of the following 4 sentences, select the most suitable sentence with respect to grammar and usage: Since the report lacked needed information, it was of no use to them. The report was useless to them because there were no needed information in it. ... information, it was not real useful to them. Since the report lacked needed information, it would not had been useful to them.
asked
Feb 12, 2015
in
Verbal Ability
by
jothee
Veteran
(
105k
points)

974
views
gate20152
verbalability
normal
englishgrammar
grammaticalsentence
+22
votes
1
answer
28
GATE20152GA9
If p, q, r, s are distinct integers such that: $f (p, q, r, s) = \text{ max } (p, q, r, s)$ $g (p, q, r, s) = \text{ min } (p, q, r, s)$ ... the same operations are valid with two variable functions of the form $f(p, q)$ What is the value of $fg \left(h \left(2, 5, 7, 3\right), 4, 6, 8\right)$?
asked
Feb 12, 2015
in
Set Theory & Algebra
by
jothee
Veteran
(
105k
points)

1.8k
views
gate20152
settheory&algebra
functions
normal
numericalanswers
+14
votes
3
answers
29
GATE20152GA8
In a triangle $PQR, PS$ is the angle bisector of $\angle QPR \text{ and } \angle QPS =60^\circ$. What is the length of $PS$ ? $\left(\dfrac{(q+r)} {qr}\right)$ $\left(\dfrac {qr} {q+r}\right)$ $\large \sqrt {(q^2 + r^2)}$ $\left(\dfrac{(q+r)^2} {qr}\right)$
asked
Feb 12, 2015
in
Numerical Ability
by
jothee
Veteran
(
105k
points)

4.2k
views
gate20152
numericalability
geometry
difficult
+13
votes
4
answers
30
GATE20152GA7
Four branches of a company are located at $M$, $N$, $O$ and $P$. $M$ is north of $N$ at a distance of $4 km$; $P$ is south of $O$ at a distance of $2$ $km$; $N$ is southeast of O by $1 km$. What is the distance between $M$ and $P$ in $km$? $5.34$ $6.74$ $28.5$ $45.49$
asked
Feb 12, 2015
in
Numerical Ability
by
jothee
Veteran
(
105k
points)

4.4k
views
gate20152
numericalability
normal
directionsense
Page:
« prev
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
ECIL Interview Experience
Linear Algebra Important Points
GATE 2020
OFFICIAL GATE MOCK TEST RELEASED
IIITH: Winter Research Admissions 2019 (For Spring 2020)
Follow @csegate
Recent questions tagged gate20152
Recent Blog Comments
@Ayush Upadhyaya Thank you so much! ^_^
@JashanAroraNo No. Don't directly say no.Think a...
@jeetYes, I am sorry for that.I saw ECIL Advt...
Congratulations man! A little question, please?...
Is IT eligible to apply in ECIL because they only...
50,645
questions
56,585
answers
195,786
comments
101,834
users