The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged iisccsaresearch2016
0
votes
0
answers
1
IISc Research Field
Can anybody please tell what INTERDISCIPLINARY PROGRAM  CYBER PHYSICAL SYSTEM is in IISc? It seems to be an interesting research area by whatever I have read but after seeing the cut off scores for this field it seems nobody is much interested in this field. What may be the reason for such less interest in this field?
asked
Mar 20, 2018
in
IISc/IITs
by
vishal chugh
Active
(
1.7k
points)

146
views
iisccsaresearch2016
+1
vote
4
answers
2
IISCCSAResearchTest10
A proper vertex colouring of a graph $G$ is a colouring of the vertices in $G$ in such a way that two vertices get different colours if they are adjacent. The minimum number of colours required for proper vertex colouring of $G$ is called the chromatic number of $G$. Then what is the chromatic number of the cycle graph on 149 vertices?
asked
Jun 8, 2016
in
Graph Theory
by
jothee
Veteran
(
105k
points)

277
views
iisccsaresearch2016
descriptive
graphtheory
graphcoloring
iiscinterview
0
votes
2
answers
3
IISCCSAResearchTest9
Which of the following statement(s) is(are) true? If $n$ is odd prime number then $2^{n1} \text{ mod } n =1$ If $2^{n1} \text{ mod } n =1$ for a number $n$ then $n$ is prime
asked
Jun 8, 2016
in
Numerical Ability
by
jothee
Veteran
(
105k
points)

147
views
iisccsaresearch2016
descriptive
numericalability
iiscinterview
+2
votes
1
answer
4
IISCCSAResearchTest8
Write the truth table for the connective: "If A then B"
asked
Jun 8, 2016
in
Mathematical Logic
by
jothee
Veteran
(
105k
points)

125
views
iisccsaresearch2016
descriptive
mathematicallogic
iiscinterview
0
votes
2
answers
5
IISCCSAResearchTest7
If we arrange the following according to increasing asymptotic complexity, which quantity comes in the second position; which one comes in the fourth position? $(\sqrt{2}^{\log n}, n^2, 2^{\sqrt{2 \log n} }, e^n, (\log n)!, n!$
asked
Jun 8, 2016
in
Algorithms
by
jothee
Veteran
(
105k
points)

174
views
iisccsaresearch2016
descriptive
algorithms
asymptoticnotations
iiscinterview
0
votes
3
answers
6
IISCCSAResearchTest6
Someone claims that Kruskal's algorithm for finding minimum spanning tree can return different spanning trees for the same input graph $G$. Do you agree with the claim? If so, why? If not, argue briefly why the claim is incorrect.
asked
Jun 8, 2016
in
Algorithms
by
jothee
Veteran
(
105k
points)

204
views
iisccsaresearch2016
descriptive
algorithms
graphalgorithms
minimumspanningtrees
iiscinterview
0
votes
1
answer
7
IISCCSAResearchTest5
A computer uses a 2way set associative cache of size 128 KBytes with block (line) size of 32 Bytes. The cache accepts 32 bit addresses of the form $b_{31}b_{30} \dots b_2b_1b_0$ where $b_{31}$ is the most significant address and $b_0$ is the least significant address bit. Which bits are used by the cache controller for indexing into the cache directory?
asked
Jun 8, 2016
in
CO and Architecture
by
jothee
Veteran
(
105k
points)

167
views
iisccsaresearch2016
descriptive
coandarchitecture
cachememory
iiscinterview
0
votes
1
answer
8
IISCCSAResearchTest4
What is the output of the following program? int main() { int i=0; do { if (i >=5) { i+=2; printf("%d \n", i); break; } else { printf("%d \n", ++i); continue; } } while (i<7); }
asked
Jun 8, 2016
in
Algorithms
by
jothee
Veteran
(
105k
points)

123
views
iisccsaresearch2016
descriptive
algorithms
identifyfunction
iiscinterview
0
votes
3
answers
9
IISCCSAResearchTest3
Hardware cache memories exploit spatial locality of reference by remembering which pieces of data have been accessed recently when data items are reaccessed frequently by remembering which cache blocks (lines) have been written to only if cache block (line) size is greater than 1 byte
asked
Jun 8, 2016
in
CO and Architecture
by
jothee
Veteran
(
105k
points)

269
views
iisccsaresearch2016
coandarchitecture
cachememory
iiscinterview
0
votes
1
answer
10
IISCCSAResearchTest2
Which of the following components of a compiler runs earlier in the flow of compilation?  the lexical analyser  the type checker
asked
Jun 8, 2016
in
Compiler Design
by
jothee
Veteran
(
105k
points)

103
views
iisccsaresearch2016
descriptive
compilerdesign
iiscinterview
0
votes
1
answer
11
IISCCSAResearchTest1
What is the determinant of the following matrix? $\begin{matrix} 76 && 18 && 34 \\ 14 && 12 && 6 \\ 90 && 30 && 40 \end{matrix}$
asked
Jun 8, 2016
in
Linear Algebra
by
jothee
Veteran
(
105k
points)

222
views
iisccsaresearch2016
descriptive
linearalgebra
matrices
To see more, click for the
full list of questions
or
popular tags
.
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
ISRO CSE 2020 PAPER ANALYSE
BARC OCES/DGFS 2020
ISI CMI PDF by GATE Overflow
Calculus Important Points
Management Trainee Recruitment COAL INDIA 2020
Follow @csegate
Recent questions tagged iisccsaresearch2016
Recent Blog Comments
Why are you saying 2 months? Its your hard work...
@commenter commenter I also thought the same and...
Because we can write a regular expression with 4...
IPv4 dotted decimal format how can one guess "RE"...
@Dumbest Kid This is so true. The questions...
50,737
questions
57,271
answers
198,144
comments
104,788
users