Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged gateit-2004
0
votes
2
answers
61
GATE IT 2004 | Question: 30
Consider the following statements: telnet, ftp and http are application layer protocols. EJB (Enterprise Java Beans) components can be deployed in a J2EE (Java2 Enterprise Edition) application server. If two languages conform to the Common Language Specification (CLS) of the ... other. Which statements are true? I and II only II and III only I and III only I, II and III
Consider the following statements:telnet, ftp and http are application layer protocols.EJB (Enterprise Java Beans) components can be deployed in a J2EE (Java2 Enterprise ...
Ishrat Jahan
1.8k
views
Ishrat Jahan
asked
Nov 2, 2014
Web Technologies
gateit-2004
out-of-syllabus-now
normal
+
–
1
votes
2
answers
62
GATE IT 2004 | Question: 29
Which of the following objects can be used in expressions and scriplets in JSP (Java Server Pages) without explicitly declaring them? session and request only request and response only response and session only session, request and response
Which of the following objects can be used in expressions and scriplets in JSP (Java Server Pages) without explicitly declaring them?session and request onlyrequest and r...
Ishrat Jahan
3.1k
views
Ishrat Jahan
asked
Nov 2, 2014
Web Technologies
gateit-2004
web-technologies
normal
out-of-syllabus-now
+
–
26
votes
7
answers
63
GATE IT 2004 | Question: 28
In TCP, a unique sequence number is assigned to each byte word segment message
In TCP, a unique sequence number is assigned to eachbytewordsegmentmessage
Ishrat Jahan
11.2k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
tcp
normal
+
–
34
votes
5
answers
64
GATE IT 2004 | Question: 27
A host is connected to a Department network which is part of a University network. The University network, in turn, is part of the Internet. The largest network in which the Ethernet address of the host is unique is the subnet to which the host belongs the Department network the University network the Internet
A host is connected to a Department network which is part of a University network. The University network, in turn, is part of the Internet. The largest network in which ...
Ishrat Jahan
13.6k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
lan-technologies
ethernet
normal
+
–
21
votes
4
answers
65
GATE IT 2004 | Question: 26
A subnet has been assigned a subnet mask of $255.255.255.192$. What is the maximum number of hosts that can belong to this subnet? $14$ $30$ $62$ $126$
A subnet has been assigned a subnet mask of $255.255.255.192$. What is the maximum number of hosts that can belong to this subnet?$14$$30$$62$$126$
Ishrat Jahan
8.6k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
subnetting
normal
+
–
29
votes
5
answers
66
GATE IT 2004 | Question: 25
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE? Sender encrypts using receiver's public key Sender encrypts using his own public key Receiver decrypts using sender's public key Receiver decrypts using his own public key
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?Sender encrypts using receiver's publi...
Ishrat Jahan
13.4k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
4
votes
2
answers
67
GATE IT 2004 | Question: 24
Which one of the following statements is FALSE? HTTP runs over TCP HTTP describes the structure of web pages HTTP allows information to be stored in a URL HTTP can be used to test the validity of a hypertext link
Which one of the following statements is FALSE?HTTP runs over TCPHTTP describes the structure of web pagesHTTP allows information to be stored in a URLHTTP can be used to...
Ishrat Jahan
11.6k
views
Ishrat Jahan
asked
Nov 2, 2014
Web Technologies
gateit-2004
web-technologies
normal
+
–
24
votes
3
answers
68
GATE IT 2004 | Question: 23
Which one of the following statements is FALSE? TCP guarantees a minimum communication rate TCP ensures in-order delivery TCP reacts to congestion by reducing sender window size TCP employs retransmission to compensate for packet loss
Which one of the following statements is FALSE?TCP guarantees a minimum communication rateTCP ensures in-order deliveryTCP reacts to congestion by reducing sender window ...
Ishrat Jahan
11.0k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
tcp
normal
+
–
25
votes
5
answers
69
GATE IT 2004 | Question: 22
Which one of the following statements is FALSE? Packet switching leads to better utilization of bandwidth resources than circuit switching Packet switching results in less variation in delay than circuit switching Packet switching requires more per-packet processing than circuit switching Packet switching can lead to reordering unlike in circuit switching
Which one of the following statements is FALSE?Packet switching leads to better utilization of bandwidth resources than circuit switchingPacket switching results in less ...
Ishrat Jahan
13.2k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-switching
normal
+
–
34
votes
5
answers
70
GATE IT 2004 | Question: 21
Which level of locking provides the highest degree of concurrency in a relational database ? Page Table Row Page, table and row level locking allow the same degree of concurrency
Which level of locking provides the highest degree of concurrency in a relational database ?PageTableRowPage, table and row level locking allow the same degree of concurr...
Ishrat Jahan
18.7k
views
Ishrat Jahan
asked
Nov 2, 2014
Databases
gateit-2004
databases
normal
transaction-and-concurrency
+
–
0
votes
2
answers
71
GATE IT 2004 | Question: 20
A software configuration management tool helps in keeping track of the schedule based on the milestones reached maintaining different versions of the configurable items managing manpower distribution by changing the project structure all of the above
A software configuration management tool helps inkeeping track of the schedule based on the milestones reachedmaintaining different versions of the configurable itemsmana...
Ishrat Jahan
1.7k
views
Ishrat Jahan
asked
Nov 2, 2014
IS&Software Engineering
gateit-2004
is&software-engineering
normal
non-gate
+
–
2
votes
2
answers
72
GATE IT 2004 | Question: 19
A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technology Change Management in order to achieve Level 5? Defect Detection Defect Prevention Defect Isolation Defect Propagation
A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technolog...
Ishrat Jahan
2.6k
views
Ishrat Jahan
asked
Nov 1, 2014
IS&Software Engineering
gateit-2004
is&software-engineering
cmm-levels
normal
non-gate
+
–
0
votes
1
answer
73
GATE IT 2004 | Question: 18
The diagram that helps in understanding and representing user requirements for a software project using UML (Unified Modeling Language) is Entity Relationship Diagram Deployment Diagram Data Flow Diagram Use Case Diagram
The diagram that helps in understanding and representing user requirements for a software project using UML (Unified Modeling Language) isEntity Relationship DiagramDeplo...
Ishrat Jahan
3.3k
views
Ishrat Jahan
asked
Nov 1, 2014
IS&Software Engineering
gateit-2004
is&software-engineering
uml
normal
non-gate
+
–
1
votes
1
answer
74
GATE IT 2004 | Question: 17
In a software project, COCOMO (Constructive Cost Model) is used to estimate effort and duration based on the size of the software size and duration based on the effort of the software effort and cost based on the duration of the software size, effort and duration based on the cost of the software
In a software project, COCOMO (Constructive Cost Model) is used to estimateeffort and duration based on the size of the softwaresize and duration based on the effort of t...
Ishrat Jahan
3.5k
views
Ishrat Jahan
asked
Nov 1, 2014
IS&Software Engineering
gateit-2004
is&software-engineering
cocomo-model
normal
+
–
2
votes
2
answers
75
GATE IT 2004 | Question: 16
Which of the following commands or sequences of commands will rename a file x to file y in a Unix system ? mv y, x mv x, y cp y, x (rm x) cp x, y (rm x) II and III II and IV I and III II only
Which of the following commands or sequences of commands will rename a file x to file y in a Unix system ?mv y, xmv x, ycp y, x (rm x)cp x, y (rm x)II and IIIII and IVI a...
Ishrat Jahan
4.0k
views
Ishrat Jahan
asked
Nov 1, 2014
Operating System
gateit-2004
operating-system
unix
out-of-syllabus-now
+
–
29
votes
3
answers
76
GATE IT 2004 | Question: 15
Let $x$ be an integer which can take a value of $0$ or $1$. The statement if (x == 0) x = 1; else x = 0; is equivalent to which one of the following ? $x = 1 + x;$ $x = 1 - x;$ $x = x - 1;$ $x = 1\% x;$
Let $x$ be an integer which can take a value of $0$ or $1$. The statementif (x == 0) x = 1; else x = 0;is equivalent to which one of the following ?$x = 1 + x;$$x = 1 - ...
Ishrat Jahan
9.7k
views
Ishrat Jahan
asked
Nov 1, 2014
Programming in C
gateit-2004
programming
easy
identify-function
+
–
27
votes
4
answers
77
GATE IT 2004 | Question: 14
Which one of the following is NOT shared by the threads of the same process ? Stack Address Space File Descriptor Table Message Queue
Which one of the following is NOT shared by the threads of the same process ?StackAddress SpaceFile Descriptor TableMessage Queue
Ishrat Jahan
13.9k
views
Ishrat Jahan
asked
Nov 1, 2014
Operating System
gateit-2004
operating-system
easy
threads
+
–
65
votes
9
answers
78
GATE IT 2004 | Question: 13
Let $P$ be a singly linked list. Let $Q$ be the pointer to an intermediate node $x$ in the list. What is the worst-case time complexity of the best-known algorithm to delete the node $x$ from the list ? $O(n)$ $O(\log^2 n)$ $O(\log n)$ $O(1)$
Let $P$ be a singly linked list. Let $Q$ be the pointer to an intermediate node $x$ in the list. What is the worst-case time complexity of the best-known algorithm to del...
Ishrat Jahan
24.8k
views
Ishrat Jahan
asked
Nov 1, 2014
DS
gateit-2004
data-structures
linked-list
normal
ambiguous
+
–
53
votes
8
answers
79
GATE IT 2004 | Question: 12, ISRO2016-77
Consider a system with $2$ level cache. Access times of Level $1$ cache, Level $2$ cache and main memory are $1$ $ns$, $10$ $ns$, and $500$ $ns$ respectively. The hit rates of Level $1$ and Level $2$ caches are $0.8$ and $0.9$, respectively. What is the average access time of the system ignoring the search time within the cache? $13.0$ $12.8$ $12.6$ $12.4$
Consider a system with $2$ level cache. Access times of Level $1$ cache, Level $2$ cache and main memory are $1$ $ns$, $10$ $ns$, and $500$ $ns$ respectively. The hit rat...
Ishrat Jahan
29.5k
views
Ishrat Jahan
asked
Nov 1, 2014
CO and Architecture
gateit-2004
co-and-architecture
cache-memory
normal
isro2016
+
–
15
votes
2
answers
80
GATE IT 2004 | Question: 11, ISRO2011-33
What is the bit rate of a video terminal unit with $80$ characters/line, $8$ $\text{bits/character}$ and horizontal sweep time of $100$ $\text{µs}$ (including $20$ $\text{µs}$ of retrace time)? $8$ $\text{Mbps}$ $6.4$ $\text{Mbps}$ $0.8$ $\text{Mbps}$ $0.64$ $\text{Mbps}$
What is the bit rate of a video terminal unit with $80$ characters/line, $8$ $\text{bits/character}$ and horizontal sweep time of $100$ $\text{µs}$ (including $20$ $\tex...
Ishrat Jahan
7.9k
views
Ishrat Jahan
asked
Nov 1, 2014
Operating System
gateit-2004
operating-system
io-handling
easy
isro2011
+
–
20
votes
2
answers
81
GATE IT 2004 | Question: 10
What is the minimum size of ROM required to store the complete truth table of an $8-bit \times 8-bit$ multiplier? $32 K \times 16$ bits $64 K \times 16$ bits $16 K \times 32$ bits $64 K \times 32$ bits
What is the minimum size of ROM required to store the complete truth table of an $8-bit \times 8-bit$ multiplier?$32 K \times 16$ bits$64 K \times 16$ bits$16 K \times 32...
Ishrat Jahan
6.5k
views
Ishrat Jahan
asked
Nov 1, 2014
Digital Logic
gateit-2004
digital-logic
normal
rom
+
–
26
votes
1
answer
82
GATE IT 2004 | Question: 9
Which one of the following statements is FALSE? There exist context-free languages such that all the context-free grammars generating them are ambiguous An unambiguous context-free grammar always has a unique parse tree for each string of the ... automata always accept the same set of languages A finite set of string from some alphabet is always a regular language
Which one of the following statements is FALSE?There exist context-free languages such that all the context-free grammars generating them are ambiguousAn unambiguous cont...
Ishrat Jahan
6.5k
views
Ishrat Jahan
asked
Nov 1, 2014
Theory of Computation
gateit-2004
theory-of-computation
easy
non-determinism
+
–
29
votes
5
answers
83
GATE IT 2004 | Question: 8
What is the minimum number of $\text{NAND}$ gates required to implement a $2\text{-input EXCLUSIVE-OR}$ function without using any other logic gate? $2$ $4$ $5$ $6$
What is the minimum number of $\text{NAND}$ gates required to implement a $2\text{-input EXCLUSIVE-OR}$ function without using any other logic gate?$2$$4$$5$$6$
Ishrat Jahan
11.3k
views
Ishrat Jahan
asked
Nov 1, 2014
Digital Logic
gateit-2004
digital-logic
min-no-gates
normal
+
–
28
votes
5
answers
84
GATE IT 2004 | Question: 7
Which one of the following regular expressions is NOT equivalent to the regular expression $(a + b + c)^*$? $(a^* + b^* + c^*)^*$ $(a^*b^*c^*)^*$ $((ab)^* + c^*)^*$ $(a^*b^* + c^*)^*$
Which one of the following regular expressions is NOT equivalent to the regular expression $(a + b + c)^*$?$(a^* + b^* + c^*)^*$$(a^*b^*c^*)^*$$((ab)^* + c^*)^*$$(a^*b^* ...
Ishrat Jahan
8.9k
views
Ishrat Jahan
asked
Nov 1, 2014
Theory of Computation
gateit-2004
theory-of-computation
regular-expression
normal
+
–
17
votes
5
answers
85
GATE IT 2004 | Question: 6
What values of x, y and z satisfy the following system of linear equations? $\begin{bmatrix} 1 &2 &3 \\ 1& 3 &4 \\ 2& 2 &3 \end{bmatrix} \begin{bmatrix} x\\y \\ z \end{bmatrix} = \begin{bmatrix} 6\\8 \\ 12 \end{bmatrix}$ $x = 6$, $y = 3$, $z = 2$ $x = 12$, $y = 3$, $z = - 4$ $x = 6$, $y = 6$, $z = - 4$ $x = 12$, $y = - 3$, $z = 0$
What values of x, y and z satisfy the following system of linear equations?$$\begin{bmatrix} 1 &2 &3 \\ 1& 3 &4 \\ 2& 2 &3 \end{bmatrix} \begin{bmatrix} x\\y \\ z \end{bm...
Ishrat Jahan
6.5k
views
Ishrat Jahan
asked
Nov 1, 2014
Linear Algebra
gateit-2004
linear-algebra
system-of-equations
easy
+
–
25
votes
8
answers
86
GATE IT 2004 | Question: 5
What is the maximum number of edges in an acyclic undirected graph with $n$ vertices? $n-1$ $n$ $n+1$ $2n-1$
What is the maximum number of edges in an acyclic undirected graph with $n$ vertices?$n-1$$n$$n+1$$2n-1$
Ishrat Jahan
7.0k
views
Ishrat Jahan
asked
Nov 1, 2014
Graph Theory
gateit-2004
graph-theory
graph-connectivity
normal
+
–
39
votes
3
answers
87
GATE IT 2004 | Question: 4
Let $R_{1}$ be a relation from $A = \left \{ 1,3,5,7 \right \}$ to $B = \left \{ 2,4,6,8 \right \}$ and $R_{2}$ be another relation from $B$ to $C = \{1, 2, 3, 4\}$ as defined below: An element $x$ in $A$ is related to an element $y$ in $B$ (under $R_{1}$) if $x + y$ is ... $R_{1}R_{2} = \{(3, 2), (3, 4), (5, 1), (5, 3), (7, 1)\} $
Let $R_{1}$ be a relation from $A = \left \{ 1,3,5,7 \right \}$ to $B = \left \{ 2,4,6,8 \right \}$ and $R_{2}$ be another relation from $B$ to $C = \{1, 2, 3, 4\}$ as de...
Ishrat Jahan
10.2k
views
Ishrat Jahan
asked
Nov 1, 2014
Set Theory & Algebra
gateit-2004
set-theory&algebra
relations
normal
+
–
28
votes
2
answers
88
GATE IT 2004 | Question: 3
Let $a(x, y), b(x, y,)$ and $c(x, y)$ be three statements with variables $x$ and $y$ chosen from some universe. Consider the following statement: $\qquad(\exists x)(\forall y)[(a(x, y) \wedge b(x, y)) \wedge \neg c(x, y)]$ ... $\neg (\forall x)(\exists y)[(a(x, y) \vee b(x, y)) \to c(x, y)]$
Let $a(x, y), b(x, y,)$ and $c(x, y)$ be three statements with variables $x$ and $y$ chosen from some universe. Consider the following statement:$\qquad(\exists x)(\foral...
Ishrat Jahan
6.3k
views
Ishrat Jahan
asked
Nov 1, 2014
Mathematical Logic
gateit-2004
mathematical-logic
normal
discrete-mathematics
first-order-logic
+
–
22
votes
3
answers
89
GATE IT 2004 | Question: 2
In a class of $200$ students, $125$ students have taken Programming Language course, $85$ students have taken Data Structures course, $65$ students have taken Computer Organization course; $50$ students have taken both Programming Language and Data Structures, $35$ ... all the three courses. How many students have not taken any of the three courses? $15$ $20$ $25$ $30$
In a class of $200$ students, $125$ students have taken Programming Language course, $85$ students have taken Data Structures course, $65$ students have taken Computer Or...
Ishrat Jahan
5.4k
views
Ishrat Jahan
asked
Nov 1, 2014
Set Theory & Algebra
gateit-2004
set-theory&algebra
easy
set-theory
+
–
27
votes
2
answers
90
GATE IT 2004 | Question: 1
In a population of $N$ families, $50 \%$ of the families have three children, $30 \%$ of the families have two children and the remaining families have one child. What is the probability that a randomly picked child belongs to a family with two children? $\left(\dfrac{3}{23}\right)$ $\left(\dfrac{6}{23}\right)$ $\left(\dfrac{3}{10}\right)$ $\left(\dfrac{3}{5}\right)$
In a population of $N$ families, $50 \%$ of the families have three children, $30 \%$ of the families have two children and the remaining families have one child. What is...
Ishrat Jahan
10.5k
views
Ishrat Jahan
asked
Nov 1, 2014
Probability
gateit-2004
probability
normal
+
–
Page:
« prev
1
2
3
4
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register