The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register
|
I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged nptel-quiz
+1
vote
0
answers
1
NPTEL
Consider a relation R(a,b,c) ordered on a non-key attribute b, and an index is maintained on attribute c. To evaluate the following expression, which is a better order of operation? σ(b= abc′∧c=12)(R) 1.First filter tuples u sing index on c and then search ... search tuples for the given value of b and then use index on c 3.The order of operation does not matter 4.Insufficient data to answer
asked
Aug 25, 2017
in
Databases
by
gulsanchouhan
(
249
points)
|
265
views
nptel-quiz
databases
+3
votes
2
answers
2
NPTEL
Consider two relations R and S of size 600 and 500 bytes respectively.The size of a tuple in both relations is 20B. The block size of the system is 200B. How would many extra block transfers be required, in the worst case, if nested loop join is used instead of block nested loop join technique to compute R⋈S? 1. 78 2. 93 3. 66 4. 105
asked
Aug 25, 2017
in
Databases
by
gulsanchouhan
(
249
points)
|
509
views
databases
nptel-quiz
0
votes
1
answer
3
NPTEL
Which of the following relational operators is commutative? 1. Difference, Union 2. Full outer join and Left outer join 3. Full outer join and intersection 4. Right outer join and Union
asked
Aug 25, 2017
in
Databases
by
gulsanchouhan
(
249
points)
|
274
views
nptel-quiz
databases
0
votes
1
answer
4
NPTEL
In what kind of index does an index entry appear only for certain keys? 1. Dense 2. Sparse 3. Simple 4. Inner
asked
Aug 25, 2017
in
Databases
by
gulsanchouhan
(
249
points)
|
229
views
nptel-quiz
databases
0
votes
2
answers
5
NPTEL
Consider the simple nested-loop join of the following two relations r and s. Relation r s Tuples (n) 2400 1500 Blocks (b) 40 50 Assuming the worst case memory availability, i.e., the memory can hold only one block of each relation at a time, what is the number of ... 120040, seeks = 4800 2. Transfers = 4800, seeks = 120040 3. Transfers = 60050, seeks = 3000 4. Transfers = 3000, seeks = 60050
asked
Aug 25, 2017
in
Databases
by
gulsanchouhan
(
249
points)
|
263
views
nptel-quiz
databases
+1
vote
0
answers
6
NPTEL
In an external merge sort, where the number of blocks in the relation is 324, suppose we can put only 4 blocks at a time into the memory. In the worst case, how many totals seeks will happen? 1. ∼2400 2. ∼2700 3. ∼3000 4. ∼3300
asked
Aug 25, 2017
in
Databases
by
gulsanchouhan
(
249
points)
|
125
views
databases
nptel-quiz
0
votes
0
answers
7
NPTEL
In an external merge sort, where number of blocks in the relation is 324, suppose we can put only 4 blocks at a time into the memory. In the worst case, how many total block transfers will happen? 1. 2592 2. 3240 3. 3888 4. 4230
asked
Aug 25, 2017
in
Databases
by
gulsanchouhan
(
249
points)
|
220
views
databases
nptel-quiz
0
votes
1
answer
8
NPTEL
Which of the following does not interrupt a running process? 1. A device 2. Timer 3. Power Failure 4. None of the above
asked
Aug 23, 2017
in
Operating System
by
gulsanchouhan
(
249
points)
|
196
views
interrupts
nptel-quiz
+6
votes
1
answer
9
NPTEL
Let L be a language. We define another language L′ as follow L′={w∣w is binary equivalent of 2^x, where x∈L and consider x as a binary number} Which of the following is false? 1) If L is regular then L′ is also regular 2) If L is regular then L′ may not regular 3) L′ is always regular irrespective of L 4) L′ is always non-regular irrespective of L
asked
Aug 15, 2017
in
Theory of Computation
by
KOMURAVELLI PRASHANT
(
43
points)
|
242
views
nptel-quiz
theory-of-computation
finite-automata
regular-languages
0
votes
1
answer
10
#network security
1. What is the difference between message integrity and message authentication ? I have read in frozen : message integrity -: message digest (generated by applying hash function on message ) is being added with original message and by verification of this digest( ... verifying digest in both for assurance of not modified data. Explain it pls. I m not able to visualise it . Thanks
asked
Jun 15, 2017
in
Computer Networks
by
bharti
Active
(
3.2k
points)
|
123
views
nptel-quiz
+2
votes
1
answer
11
NPTEL DESIGN AND ANALYSIS OF ALGORITHMS
Suppose we have a graph with negative edge weights. We take the largest magnitude negative edge weight -k and reset each edge weight w to w+k+1. Which of the following is true? 1. Kruskal's algorithm will identify the same spanning tree ... . There are more minimum cost spanning trees in the modified graph than in the original graph. is the correct answer 3 ?
asked
Feb 20, 2017
in
DS
by
shivamsat
(
31
points)
|
610
views
nptel-quiz
+2
votes
0
answers
12
NPTEL
Voting in Siruseri Zonal Computing Olympiad 2010 Elections are on for the Siruseri Town Council. Elections in Siruseri work in a rather odd manner. Each candidate is assigned a unique identification number. The town is divided into five zones and each zone proposes a list of candidates, in some ... 162 5 14 162 92 387 7 748 14 5 12 387 17 952 12 92 398 849 14 5 92 12 387 Sample Output 5
asked
Feb 6, 2017
in
Algorithms
by
Madhan sai
(
17
points)
|
667
views
nptel-quiz
algorithms
0
votes
1
answer
13
NPTEL-Design and Analysis of Algorithms-Week2-Quiz-2-Q3
Suppose we want to sort an array in ascending order and we implement quicksort so that we always choose the last element in the array as the pivot element. Assume that the input is a permutation of {1, 2, , n}. Which of the following ... {1, 2, . . . , n} with all odd numbers in ascending order followed by all even numbers in random order.
asked
Feb 3, 2017
in
Algorithms
by
Dulqar
Active
(
2.5k
points)
|
1.7k
views
nptel-quiz
algorithms
0
votes
1
answer
14
NPTEL-Internetwork Security-Week2-Quiz-2-Q6
Q6. ___________Data Encryption Standard (DES) was designed to increase the size of the Data Encryption Standard (DES) key. (A) Double (B) Triple (C) Quadruple (D) none of these
asked
Feb 3, 2017
in
Computer Networks
by
Dulqar
Active
(
2.5k
points)
|
392
views
computer-networks
network-security
nptel-quiz
0
votes
2
answers
15
NPTEL-Internetwork Security-Week2-Quiz-2-Q3
Q3: What kind of ciphers Electronic Codebook (ECB) mode and Cipher Block Chaining (CBC) mode are (A) Block cipher (B) Stream cipher (C) Field cipher (D) both (A) and (B)
asked
Feb 3, 2017
in
Computer Networks
by
Dulqar
Active
(
2.5k
points)
|
266
views
nptel-quiz
network-security
0
votes
1
answer
16
NPTEL-Operating System-Week1-Quiz-2-Q14
State True or False . Please explain in 2 or 3 sentences Temporal locality states if a page is accessed, then there is a high chance that the nearby pages will be accessed.
asked
Feb 3, 2017
in
Operating System
by
Dulqar
Active
(
2.5k
points)
|
218
views
nptel-quiz
operating-system
0
votes
1
answer
17
NPTEL-Design and Analysis of Algorithms-Week1-Quiz-2-Q12
State true or false. When a user encounters a page fault, 1) The user application informs the OS, 2) User uses API calls to the hardware Memory Management unit, 3) Memory Management unit brings the page from hard disk to main memory. Is Statement 2 correct ?
asked
Feb 3, 2017
in
Operating System
by
Dulqar
Active
(
2.5k
points)
|
546
views
nptel-quiz
operating-system
0
votes
1
answer
18
NPTEL-Operating System,-Week2-Quiz-2-Q5
In the Contiguous allocation for disk blocks, files cannot grow dynamically because _______ The next block could be occupied by another file The scheme does not allow files to grow (by design itself) (No answer is correct because files can grow) The disk does not have enough space I think both 1 and 2 are correct . What do you say ?
asked
Feb 3, 2017
in
Operating System
by
Dulqar
Active
(
2.5k
points)
|
243
views
nptel-quiz
operating-system
0
votes
1
answer
19
NPTEL-Operating System-Week2-Quiz-Q9
Creating many threads is advisable than creating many processes. Which of the statements below do not support this claim? Threads can share the address space and global data. None of the options. Programmer should ensure that it is ok to share data between two threads. Context switching is faster for threads as compared to Processes
asked
Jan 30, 2017
in
Operating System
by
Dulqar
Active
(
2.5k
points)
|
159
views
nptel-quiz
0
votes
0
answers
20
NPTEL-Operating System,-Week2-Quiz-1-Q2
State true or false. With Reason In a Micro-Kernel based OS, different modules communicate with each other using message passing. This is a secure way to enable communication. In a Modular OS, kernel modules can directly call any other ... . In a Modular OS, kernel modules can directly call any other module. This, however, suffers from efficiency issues.
asked
Jan 30, 2017
in
Operating System
by
Dulqar
Active
(
2.5k
points)
|
359
views
nptel-quiz
0
votes
2
answers
21
NPTEL-Operating Syste,-Week2-Quiz-1-Q1
Which of the following statements about Softwares is false? System Softwares provide an API that can be accessed by the Application Softwares. DBMS, Compilers, Assemblers are examples of System Software. OS Interface is used by the System Softwares to interact with the hardware/OS. System Softwares can control and coordinate the use of hardware.
asked
Jan 30, 2017
in
Operating System
by
Dulqar
Active
(
2.5k
points)
|
383
views
nptel-quiz
operating-system
0
votes
1
answer
22
NPTEL-Design and Analysis of Algorithms-Week1-Quiz-1-Q6
if T(n) = n2 √ n then T(n) = O(n2) T(n) = O(n2 log n) T(n) = O(n3) None of the above Im getting option 2 is it correct ?
asked
Jan 24, 2017
in
Algorithms
by
Dulqar
Active
(
2.5k
points)
|
2.4k
views
nptel-quiz
algorithms
0
votes
2
answers
23
NPTEL-Design and Analysis of Algorithms-Week1-Quiz-1-Q3
An algorithm has two phases. The first phase, initialization, takes time O(n2 log n). The second phase, which is the main computation, takes time O(n3). What is the most accurate description of the complexity of the overall algorithm? O(n2 log n) O(n3) O(n3 log n) O(n3 + log n) Im getting option 2 , is it correct ?
asked
Jan 24, 2017
in
Algorithms
by
Dulqar
Active
(
2.5k
points)
|
2.2k
views
nptel-quiz
+2
votes
0
answers
24
NPTEL-Design and Analysis of Algorithms-Week1-Quiz 1
In the code fragment below, first and last are integer values and composite(x) is a function that returns true if x is not a prime number and false otherwise. i := 0; j := 0; k := 0; for (m := last; m >= first; m := m ... > i+j The relationship between i, j and k depends on the values of first and last im getting option 2 , is it correct ?
asked
Jan 24, 2017
in
Algorithms
by
Dulqar
Active
(
2.5k
points)
|
1.8k
views
algorithms
nptel-quiz
Page:
« prev
1
2
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
ECIL Interview Experience
Linear Algebra Important Points
GATE 2020
OFFICIAL GATE MOCK TEST RELEASED
IIITH: Winter Research Admissions 2019 (For Spring 2020)
Follow @csegate
Recent questions tagged nptel-quiz
Recent Blog Comments
Not really. It was excluding shipping I guess....
Ok sir. Actually pricing on Flipkart is 200 less...
NO.
Is this application open for 2020 graduates i.e....
@Ayush Upadhyaya sir any approximate idea...
50,645
questions
56,601
answers
195,852
comments
102,218
users