Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by AakS
5
answers
1
GATE CSE 2001 | Question: 2.25
Consider a relation geq which represents "greater than or equal to", that is, $(x,y) \in $ geq only if $y \geq x$. create table geq ( ib integer not null, ub integer not null, primary key ib, foreign key (ub) references geq on delete cascade ); Which ... (z,w) with z > x is deleted A tuple (z,w) with w < x is deleted The deletion of (x,y) is prohibited
Consider a relation geq which represents "greater than or equal to", that is, $(x,y) \in $ geq only if $y \geq x$.create table geq ( ib integer not null, ub integer not n...
10.7k
views
commented
Aug 27, 2021
Databases
gatecse-2001
databases
sql
normal
+
–
10
answers
2
GATE CSE 2004 | Question: 68
A hard disk with a transfer rate of $10$ Mbytes/second is constantly transferring data to memory using DMA. The processor runs at $600$ MHz, and takes $300$ and $900$ ... percentage of processor time consumed for the transfer operation? $5.0 \%$ $1.0\%$ $0.5\%$ $0.1\%$
A hard disk with a transfer rate of $10$ Mbytes/second is constantly transferring data to memory using DMA. The processor runs at $600$ MHz, and takes $300$ and $900$ clo...
27.2k
views
answered
Jan 27, 2018
CO and Architecture
gatecse-2004
dma
normal
co-and-architecture
+
–
15
answers
3
GATE CSE 2003 | Question: 78
A processor uses $2-level$ page tables for virtual to physical address translation. Page tables for both levels are stored in the main memory. Virtual and physical addresses are both $32$ bits wide. The memory is byte addressable. For virtual to physical address translation, the ... virtual address is approximately (to the nearest $0.5$ ns) $1.5$ ns $2$ ns $3$ ns $4$ ns
A processor uses $2-level$ page tables for virtual to physical address translation. Page tables for both levels are stored in the main memory. Virtual and physical addres...
50.0k
views
comment edited
Jan 15, 2018
Operating System
gatecse-2003
operating-system
normal
virtual-memory
+
–
9
answers
4
GATE IT 2005 | Question: 36
Let $P(x)$ and $Q(x)$ ...
Let $P(x)$ and $Q(x)$ be arbitrary predicates. Which of the following statements is always TRUE?$\left(\left(\forall x \left(P\left(x\right) \vee Q\left(x\right)\right)\r...
14.8k
views
commented
Jan 14, 2018
Mathematical Logic
gateit-2005
mathematical-logic
first-order-logic
normal
+
–
3
answers
5
CMI2011-A-08
In programming languages like C, C++, Python $\dots$ the memory used by a program is typically separated into two parts, the stack and the heap. Consider the following statements: A stack is efficient for managing nested function calls. Stack space is limited while heap space is not. ... $2$ is false. $2$ and $3$ are true but $1$ is false. All three statements are true.
In programming languages like C, C++, Python $\dots$ the memory used by a program is typically separated into two parts, the stack and the heap. Consider the following st...
1.7k
views
commented
Jan 7, 2018
Compiler Design
cmi2011
compiler-design
runtime-environment
+
–
9
answers
6
GATE CSE 2014 Set 1 | Question: 43
Consider a $6$-stage instruction pipeline, where all stages are perfectly balanced. Assume that there is no cycle-time overhead of pipelining. When an application is executing on this $6$-stage pipeline, the speedup achieved with respect to non-pipelined execution if $25$% of the instructions incur $2$ pipeline stall cycles is ____________
Consider a $6$-stage instruction pipeline, where all stages are perfectly balanced. Assume that there is no cycle-time overhead of pipelining. When an application is exec...
20.0k
views
answered
Jan 4, 2018
CO and Architecture
gatecse-2014-set1
co-and-architecture
pipelining
numerical-answers
normal
+
–
9
answers
7
GATE IT 2004 | Question: 40
Let $M = (K, Σ, Г, Δ, s, F)$ be a pushdown automaton, where $K = (s, f), F = \{f\}, \Sigma = \{a, b\}, Г = \{a\}$ and $Δ = \{((s, a, \epsilon), (s, a)), ((s, b, \epsilon), (s, a)), (( s, a, a), (f, \epsilon)), ((f, a, a), (f, \epsilon)), ((f, b, a), (f, \epsilon))\}$. Which one of the following strings is not a member of $L(M)$? $aaa$ $aabab$ $baaba$ $bab$
Let $M = (K, Σ, Г, Δ, s, F)$ be a pushdown automaton, where$K = (s, f), F = \{f\}, \Sigma = \{a, b\}, Г = \{a\}$ and$Δ = \{((s, a, \epsilon), (s, a)), ((s, b, \epsil...
42.5k
views
answered
Dec 28, 2017
Theory of Computation
gateit-2004
theory-of-computation
pushdown-automata
normal
+
–
2
answers
8
Timestamp Ordering Protocol
Assume basic timestamp ordering protocol and that time starts from $1$, each operation takes unit amount of time and start of transaction $T_i$ is denoted as $S_i$. The table of timestamp is given below: Find $rts(a), wts(a), rts(b)$ and $wts(b)$ at the end 1, 5, 2, 5 1, 7, 3, 3 3, 7, 3, 7 1, 7, 3, 7
Assume basic timestamp ordering protocol and that time starts from $1$, each operation takes unit amount of time and start of transaction $T_i$ is denoted as $S_i$. The t...
7.3k
views
answered
Dec 24, 2017
Databases
databases
transaction-and-concurrency
+
–
0
answers
9
Non-Deterministic PDA
I'm getting its equaltion {anbn | n > 0} U {a} U {b} But given is {anbn | n >= 0} U {a} U {b} Whether epsilon is accepted or not??
I'm getting its equaltion {anbn | n 0} U {a} U {b}But given is {anbn | n >= 0} U {a} U {b}Whether epsilon is accepted or not??
895
views
commented
Dec 24, 2017
Theory of Computation
pushdown-automata
npda
theory-of-computation
+
–
3
answers
10
GATE CSE 2001 | Question: 19
Two concurrent processes $P1$ and $P2$ want to use resources $R1$ and $R2$ in a mutually exclusive manner. Initially, $R1$ and $R2$ ... . Exchange the statements $Q1$ and $Q3$ and statements $Q2$ and $Q4$. Is mutual exclusion guaranteed now? Can deadlock occur?
Two concurrent processes $P1$ and $P2$ want to use resources $R1$ and $R2$ in a mutually exclusive manner. Initially, $R1$ and $R2$ are free. The programs executed by the...
5.5k
views
commented
Dec 24, 2017
Operating System
gatecse-2001
operating-system
resource-allocation
normal
descriptive
+
–
12
answers
11
GATE CSE 2010 | Question: 10
In a binary tree with $n$ nodes, every node has an odd number of descendants. Every node is considered to be its own descendant. What is the number of nodes in the tree that have exactly one child? $0$ $1$ $\frac{(n-1)}{2}$ $n-1$
In a binary tree with $n$ nodes, every node has an odd number of descendants. Every node is considered to be its own descendant. What is the number of nodes in the tree ...
16.3k
views
answered
Dec 23, 2017
DS
gatecse-2010
data-structures
binary-tree
normal
+
–
9
answers
12
GATE CSE 2007 | Question: 34
Suppose only one multiplexer and one inverter are allowed to be used to implement any Boolean function of $n$ variables. What is the minimum size of the multiplexer needed? $2^n$ line to $1$ line $2^{n+1}$ line to $1$line $2^{n-1}$ line to $1$line $2^{n-2}$ line to $1$line
Suppose only one multiplexer and one inverter are allowed to be used to implement any Boolean function of $n$ variables. What is the minimum size of the multiplexer neede...
31.6k
views
commented
Dec 19, 2017
Digital Logic
gatecse-2007
digital-logic
normal
multiplexer
+
–
5
answers
13
GATE CSE 1999 | Question: 1.3
The number of binary strings of $n$ zeros and $k$ ones in which no two ones are adjacent is $^{n-1}C_k$ $^nC_k$ $^nC_{k+1}$ None of the above
The number of binary strings of $n$ zeros and $k$ ones in which no two ones are adjacent is$^{n-1}C_k$$^nC_k$$^nC_{k+1}$None of the above
9.0k
views
commented
Dec 16, 2017
Combinatory
gate1999
combinatory
normal
+
–
5
answers
14
GATE CSE 2015 Set 1 | Question: 43
The graph shown below has $8$ edges with distinct integer edge weights. The minimum spanning tree (MST) is of weight $36$ and contains the edges: $\{(A, C), (B, C), (B, E), (E, F), (D, F)\}$. The edge weights of only ... which are in the MST are given in the figure shown below. The minimum possible sum of weights of all $8$ edges of this graph is_______________.
The graph shown below has $8$ edges with distinct integer edge weights. The minimum spanning tree (MST) is of weight $36$ and contains the edges: $\{(A, C), (B, C), (B, E...
17.7k
views
answer edited
Dec 12, 2017
Algorithms
gatecse-2015-set1
algorithms
spanning-tree
normal
numerical-answers
+
–
9
answers
15
GATE IT 2005 | Question: 52
Let $G$ be a weighted undirected graph and e be an edge with maximum weight in $G$. Suppose there is a minimum weight spanning tree in $G$ containing the edge $e$. Which of the following statements is always TRUE? There exists a cutset in $G$ having ... $e$ cannot be contained in a cycle. All edges in $G$ have the same weight.
Let $G$ be a weighted undirected graph and e be an edge with maximum weight in $G$. Suppose there is a minimum weight spanning tree in $G$ containing the edge $e$. Which ...
20.7k
views
answered
Dec 12, 2017
Algorithms
gateit-2005
algorithms
spanning-tree
normal
+
–
4
answers
16
ISI2011-PCB-CS-5b
Suppose we have a relation $R(A, B, C, D, E)$ with the functional dependencies: $A \rightarrow D, B \rightarrow C, D \rightarrow E, CE \rightarrow B$. If we project $R$ and therefore its functional dependencies onto the schema $ABC$, what will the key(s) for $ABC$ be?
Suppose we have a relation $R(A, B, C, D, E)$ with the functional dependencies:$A \rightarrow D, B \rightarrow C, D \rightarrow E, CE \rightarrow B$.If we project $R$ and...
2.1k
views
commented
Dec 7, 2017
Databases
descriptive
isi2011-pcb-cs
databases
database-normalization
+
–
2
answers
17
Test by Bikram | Databases | Test 2 | Question: 4
A relation $R(P,Q,R,S)$ has $\{PQ, QR, RS, PS\}$ as candidate keys. The total number of superkeys possible for relation $R$ is ______
A relation $R(P,Q,R,S)$ has $\{PQ, QR, RS, PS\}$ as candidate keys. The total number of superkeys possible for relation $R$ is ______
757
views
commented
Dec 2, 2017
Databases
tbb-dbms-2
numerical-answers
databases
candidate-key
+
–
6
answers
18
GATE CSE 1999 | Question: 20-a
A certain processor provides a 'test and set' instruction that is used as follows: TSET register, flag This instruction atomically copies flag to register and sets flag to $1$. Give pseudo-code for implementing the entry and exit code to a critical region using this instruction.
A certain processor provides a 'test and set' instruction that is used as follows:TSET register, flagThis instruction atomically copies flag to register and sets flag to ...
4.5k
views
commented
Nov 30, 2017
Operating System
gate1999
operating-system
process-synchronization
normal
descriptive
+
–
2
answers
19
GATE CSE 2001 | Question: 9
A CPU has $32-bit$ memory address and a $256 \ KB$ cache memory. The cache is organized as a $4-way$ set associative cache with cache block size of $16$ bytes. What is the number of sets in the cache? What is the size (in bits) of ... are required to find the byte offset within a cache block? What is the total amount of extra memory (in bytes) required for the tag bits?
A CPU has $32-bit$ memory address and a $256 \ KB$ cache memory. The cache is organized as a $4-way$ set associative cache with cache block size of $16$ bytes.What is the...
13.1k
views
commented
Nov 29, 2017
CO and Architecture
gatecse-2001
co-and-architecture
cache-memory
normal
descriptive
+
–
9
answers
20
GATE CSE 2006 | Question: 20, ISRO2015-17
Consider the following log sequence of two transactions on a bank account, with initial balance $12000,$ that transfer $2000$ to a mortgage payment and then apply a $5\%$ interest. T1 start T1 B old $=12000$ new $=10000$ ... $3$ because transaction T1 has committed We can apply redo and undo operations in arbitrary order because they are idempotent
Consider the following log sequence of two transactions on a bank account, with initial balance $12000,$ that transfer $2000$ to a mortgage payment and then apply a $5\%$...
27.9k
views
commented
Nov 29, 2017
Databases
gatecse-2006
databases
transaction-and-concurrency
normal
isro2015
+
–
5
answers
21
GATE CSE 2001 | Question: 2.22
Consider Peterson's algorithm for mutual exclusion between two concurrent processes i and j. The program executed by process is shown below. repeat flag[i] = true; turn = j; while (P) do no-op; Enter critical section, perform actions, then exit critical section Flag[i] = ... i flag[j] = true and turn = j flag[i] = true and turn = j flag[i] = true and turn = i
Consider Peterson's algorithm for mutual exclusion between two concurrent processes i and j. The program executed by process is shown below.repeat flag[i] = true; turn = ...
27.0k
views
answered
Nov 25, 2017
Operating System
gatecse-2001
operating-system
process-synchronization
normal
+
–
14
answers
22
GATE CSE 1997 | Question: 6.8
Each Process $P_i, i = 1\ldots 9$ is coded as follows repeat P(mutex) {Critical section} V(mutex) forever The code for $P_{10}$ is identical except it uses V(mutex) in place of P(mutex). What is the largest number of processes that can be inside the critical section at any moment? $1$ $2$ $3$ None
Each Process $P_i, i = 1\ldots 9$ is coded as followsrepeat P(mutex) {Critical section} V(mutex) foreverThe code for $P_{10}$ is identical except it uses V(mutex) in plac...
25.1k
views
commented
Nov 25, 2017
Operating System
gate1997
operating-system
process-synchronization
normal
+
–
6
answers
23
GATE CSE 2014 Set 2 | Question: 30
Consider a join (relation algebra) between relations $r(R)$ and $s(S)$ using the nested loop method. There are $3$ ... $s(S)$ is more than $0.5$. join selection factor between $r(R)$ and $s(S)$ is less than $0.5$.
Consider a join (relation algebra) between relations $r(R)$ and $s(S)$ using the nested loop method. There are $3$ buffers each of size equal to disk block size, out of w...
20.8k
views
commented
Nov 22, 2017
Databases
gatecse-2014-set2
databases
normal
joins
+
–
1
answer
24
TOC :Regular Languages
Which of the following is not a regular language? a) $\{ w ( w_r )^* \mid w \in \{0,1\}^* \}$ b) $\{w^n w^m \mid 0\leq n\leq m, w \in \{0,1\} \}$
Which of the following is not a regular language?a) $\{ w ( w_r )^* \mid w \in \{0,1\}^* \}$b) $\{w^n w^m \mid 0\leq n\leq m, w \in \{0,1\} \}$
837
views
commented
Nov 10, 2017
Theory of Computation
regular-language
identify-class-language
+
–
1
answer
25
Go Back N
Consider a network which has : Bandwidth (B) = 10 Mbps Distance between two hosts (d) 500 kilometers Average packet size(L) = 103 bits Propagation speed = 2 108 m/s It is designed a Go - Back N sliding window protocol for this network. ... . Assume that processing delays at nodes are negligible. Then the minimum window size has to be ___________. Correct Answer: 51 Status: unattempted
Consider a network which has :Bandwidth (B) = 10 MbpsDistance between two hosts (d) 500 kilometersAverage packet size(L) = 103 bitsPropagation speed = 2 × 108 m/sIt is d...
772
views
commented
Oct 22, 2017
Computer Networks
go-back-n
computer-networks
sliding-window
+
–
4
answers
26
Go back N (arq) protocol
Q. If maximum sequence number in Go back N ( arq) protocol is 'n' then window size (sender) is ? If your answer is 'n' or 'n'+1' then please design GBN for sender window 5 and 11 .
Q. If maximum sequence number in Go back N ( arq) protocol is 'n' then window size (sender) is ?If your answer is 'n' or 'n'+1' then please design GBN for sender windo...
12.8k
views
commented
Oct 22, 2017
Computer Networks
computer-networks
go-back-n
sliding-window
+
–
8
answers
27
GATE IT 2006 | Question: 68
On a wireless link, the probability of packet error is $0.2$. A stop-and-wait protocol is used to transfer data across the link. The channel condition is assumed to be independent of transmission to transmission. What is the average number of transmission attempts required to transfer $100$ packets? $100$ $125$ $150$ $200$
On a wireless link, the probability of packet error is $0.2$. A stop-and-wait protocol is used to transfer data across the link. The channel condition is assumed to be in...
13.4k
views
answered
Oct 21, 2017
Computer Networks
gateit-2006
computer-networks
sliding-window
stop-and-wait
normal
+
–
1
answer
28
GATE CSE 2016 Set 1 | Question: 34
The following function computes the maximum value contained in an integer array $P[ \ ]$ of size $n$ $(n>=1)$. int max (int *p,int n) { int a = 0, b=n-1; while (__________) { if (p[a]<= p[b]) {a = a+1;} else {b = b-1;} } return p[a]; } The missing loop condition is: $a\ \ != n$ $b\ \ != 0$ $b>(a+1)$ $b\ \ != a$
The following function computes the maximum value contained in an integer array $P[ \ ]$ of size $n$ $(n>=1)$. int max (int *p,int n) { int a = 0, b=n-1;...
11.2k
views
commented
Oct 17, 2017
Programming in C
gatecse-2016-set1
programming-in-c
normal
+
–
6
answers
29
GATE CSE 2010 | Question: 45
The following program consists of $3$ concurrent processes and $3$ binary semaphores. The semaphores are initialized as $S0=1, S1=0$ and $S2=0.$ ... $P0$ print '$0$'? At least twice Exactly twice Exactly thrice Exactly once
The following program consists of $3$ concurrent processes and $3$ binary semaphores. The semaphores are initialized as $S0=1, S1=0$ and $S2=0.$$$\begin{array}{|l|l|}\hli...
26.2k
views
commented
Oct 17, 2017
Operating System
gatecse-2010
operating-system
process-synchronization
normal
+
–
0
answers
30
Prefix property and DPDA
Construct the DPDA with empty stack and final state method for the language L = ${ a^n b^n / n>= 0}$.
Construct the DPDA with empty stack and final state method for the language L = ${ a^n b^n / n>= 0}$.
2.6k
views
commented
Oct 12, 2017
Theory of Computation
theory-of-computation
pushdown-automata
context-free-language
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register