Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by Aghori
2
votes
1
Gate 2018
What is the ans of last question if no is divided then reminder is 7
What is the ans of last question if no is divided then reminder is 7
947
views
answered
Feb 4, 2018
0
votes
2
GATE CSE 2014 Set 1 | Question: 49
A pennant is a sequence of numbers, each number being $1$ or $2$. An $n-$pennant is a sequence of numbers with sum equal to $n$. For example, $(1,1,2)$ is a $4-$pennant. The set of all possible $1-$pennants is ${(1)}$, the set of all possible ... $(1,2)$ is not the same as the pennant $(2,1)$. The number of $10-$pennants is________
A pennant is a sequence of numbers, each number being $1$ or $2$. An $n-$pennant is a sequence of numbers with sum equal to $n$. For example, $(1,1,2)$ is a $4-$pennant. ...
11.5k
views
answered
Jan 29, 2018
Combinatory
gatecse-2014-set1
combinatory
numerical-answers
normal
+
–
2
votes
3
Generalized permutation and combination
How many positive integers less than 1,000,000 have the sum of their digits equal to 19? (using generating function)
How many positive integers less than 1,000,000 have the sum of their digits equal to 19? (using generating function)
2.9k
views
answered
Jan 27, 2018
Combinatory
combinatory
generating-functions
+
–
2
votes
4
GATE CSE 2014 Set 2 | Question: 7
Let $k=2^n$. A circuit is built by giving the output of an $n$-bit binary counter as input to an $n\text{-to-}2^n$ bit decoder. This circuit is equivalent to a $k$-bit binary up counter. $k$-bit binary down counter. $k$--bit ring counter. $k$-bit Johnson counter.
Let $k=2^n$. A circuit is built by giving the output of an $n$-bit binary counter as input to an $n\text{-to-}2^n$ bit decoder. This circuit is equivalent to a $k$-bit bi...
19.7k
views
answered
Jan 26, 2018
Digital Logic
gatecse-2014-set2
digital-logic
normal
digital-counter
+
–
0
votes
5
stack underflow
A stack of size (1 to N) and the initial position of top pointer is 0. Get (i, S) is a routine to get ith element from stack ‘S’ with respect to top. Then, what is the underflow condition on stack to perform get() operation. top – i < N top – i + 1 ≤ N top – i ≤ 0 top – i + 1 ≤ 0
A stack of size (1 to N) and the initial position of top pointer is 0.Get (i, S) is a routine to get ith element from stack ‘S’ with respect to top.Then, what is the ...
1.8k
views
answered
Dec 21, 2017
DS
stack
data-structures
+
–
0
votes
6
TIFR CSE 2018 | Part A | Question: 8
A crime has been committed with four people at the scene of the crime. You are responsible for finding out who did it. You have recorded the following statements from the four witnesses, and you know one of them has committed the crime. ... $\text{Desmond}$ $\text{Either Anuj or Binky; the information is insufficient to pinpoint the criminal}$
A crime has been committed with four people at the scene of the crime. You are responsible for finding out who did it. You have recorded the following statements from the...
1.6k
views
answered
Dec 11, 2017
Analytical Aptitude
tifr2018
analytical-aptitude
logical-reasoning
+
–
0
votes
7
Synchronous transmission
In synchronous transmission, 5 eight bit characters are included in 30 eight bit information characters. If bit rate of sender is 4200 bps, what is the bit rate of receiver ?
In synchronous transmission, 5 eight bit characters are included in 30 eight bit information characters. If bit rate of sender is 4200 bps, what is the bit rate of receiv...
1.7k
views
answered
Oct 20, 2017
Computer Networks
synchronous-data
+
–
0
votes
8
Why given C code of Binary Search Tree is errorneous.
Here is my code to create & traverse BST but it has got some problems possibly run time - No output being shown. Can anyone figure out problem? #include <stdio.h> #include <stdlib.h> struct Node{ int item; struct Node* left; ... NULL; insert(root,50); insert(root,30); insert(root,10); insert(root,40); inorder(root); return 0; }
Here is my code to create & traverse BST but it has got some problems possibly run time - No output being shown. Can anyone figure out problem?#include <stdio.h #include ...
655
views
answered
Aug 23, 2017
Programming in C
binary-search-tree
programming-in-c
data-structures
+
–
6
votes
9
Self-doubt
Which of the following is exact recurrence relation for binary search (in terms of number of comparisons) ? 1. T(n) = 2T(n/2) + 1 2. T(n) = 2T(n/2) + 2 Please specify relevant reasons.
Which of the following is exact recurrence relation for binary search (in terms of number of comparisons) ?1. T(n) = 2T(n/2) + 12. T(n) = 2T(n/2) + 2Please specify releva...
1.3k
views
answered
Aug 22, 2017
Algorithms
algorithms
binary-search
+
–
0
votes
10
decidability
INFINITEPDA = {<M> | M is a PDA and L(M) is an infinite language } . Then - a) INFINITEPDA is undecidable. b) INFINITEPDA is decidable. c) INFINITEPDA is recursive enumerable. d) INFINITEPDA is Turing co-recognizable.
INFINITEPDA = {<M | M is a PDA and L(M) is an infinite language } . Then -a) INFINITEPDA is undecidable.b) INFINITEPDA is decidable.c) INFINITEPDA is recursive enumerable...
879
views
answered
Aug 20, 2017
Theory of Computation
decidability
theory-of-computation
recursive-and-recursively-enumerable-languages
+
–
6
votes
11
GATE CSE 2016 Set 2 | Question: 30
Suppose the functions $F$ and $G$ can be computed in $5$ and $3$ nanoseconds by functional units $U_{F}$ and $U_{G}$, respectively. Given two instances of $U_{F}$ and two instances of $U_{G}$, it is required to implement ... $1 \leq i \leq 10$. Ignoring all other delays, the minimum time required to complete this computation is ____________ nanoseconds.
Suppose the functions $F$ and $G$ can be computed in $5$ and $3$ nanoseconds by functional units $U_{F}$ and $U_{G}$, respectively. Given two instances of $U_{F}$ and two...
22.6k
views
answered
Aug 20, 2017
CO and Architecture
gatecse-2016-set2
co-and-architecture
data-path
normal
numerical-answers
+
–
10
votes
12
GATE CSE 2016 Set 2 | Question: 29
The value of the expression $13^{99}\pmod{17}$ in the range $0$ to $16$, is ________.
The value of the expression $13^{99}\pmod{17}$ in the range $0$ to $16$, is ________.
17.9k
views
answered
Aug 20, 2017
Combinatory
gatecse-2016-set2
modular-arithmetic
normal
numerical-answers
+
–
1
votes
13
Fragmentation
Suppose a network:- Suppose a TCP message contains 492 B of data and TCP header is of size 20B then deliver it to IP. IP header is 20 B. Assume link A-R1 has the maximum frame size of 700 B including a frame size of 14 B, link R1-R2 can support a ... of 256 B including a 12 B frame header. Then calculate the no of fragments at each link and show the format of fragments in each link.
Suppose a network:-Suppose a TCP message contains 492 B of data and TCP header is of size 20B then deliver it to IP. IP header is 20 B.Assume link A-R1 has the maximum fr...
2.4k
views
answered
Aug 19, 2017
Computer Networks
fragmentation
computer-networks
network-layering
tcp
+
–
1
votes
14
Time Complexity
Is the answer D ?
Is the answer D ?
653
views
answered
Aug 19, 2017
Algorithms
algorithms
time-complexity
test-series
+
–
1
votes
15
Find Regular Expression of this DFA
Whenever there are 2 final states, I don't get how to solve it, kindly explain once and for all in a detailed manner! I'll owe you a lot.
Whenever there are 2 final states, I don't get how to solve it, kindly explain once and for all in a detailed manner! I'll owe you a lot.
3.4k
views
answered
Aug 18, 2017
Theory of Computation
regular-expression
theory-of-computation
finite-automata
+
–
0
votes
16
doubt in time complexity
Given a 2-D array A with n rows and k columns initialized to -1 . what is the Time complexity of f(A,m,m)? int f(int **a, int n, int k) { if((n<=k)|| (k<=1)) return 1; if(a[n][k]==-1) a[n][k]=f(a,n-1,k)+f(a,n-1,k-1); return a[n][k]; } how to write recurrence relation for this
Given a 2-D array A with n rows and k columns initialized to -1 . what is the Time complexity of f(A,m,m)?int f(int a, int n, int k){if((n<=k)|| (k<=1)) return 1;if(a[n]...
247
views
answered
Aug 18, 2017
0
votes
17
master theorem
explain complexity for this
explain complexity for this
4.1k
views
answered
Aug 17, 2017
Algorithms
algorithms
master-theorem
time-complexity
+
–
2
votes
18
Doubt: Coreman: Relative Asymptotic growths: Que 01
f(n) = $n*2^{n}$ g(n) = $e^n$ What is the relation b/w the asymptotic time complexities of f(n) and g(n)?
f(n) = $n*2^{n}$g(n) = $e^n$What is the relation b/w the asymptotic time complexities of f(n) and g(n)?
860
views
answered
Aug 15, 2017
Algorithms
algorithms
asymptotic-notation
time-complexity
+
–
0
votes
19
parsing
what is the difference between Handle and Viable prefix??
what is the difference between Handle and Viable prefix??
951
views
answered
Aug 14, 2017
Compiler Design
compiler-design
viable-prefix
descriptive
+
–
0
votes
20
Time complexity
Find the time complexity of the below function: function(int n){ for(int i=0;i<n;i++) for(int j=1; j<i*i; j++) if(j%i==0){ for(int k=0;k<j;k++) printf("*"); } }
Find the time complexity of the below function:function(int n){for(int i=0;i<n;i++) for(int j=1; j<i*i; j++) if(j%i==0){ for(int k=0;k<j;k++) ...
575
views
answered
Aug 13, 2017
Algorithms
time-complexity
+
–
5
votes
21
Minimum number of tables to represent ER-Diagram
The minimum number of tables to represent ER-Diagram such that the relational database satisfies 1NF.
The minimum number of tables to represent ER-Diagram such that the relational database satisfies 1NF.
11.7k
views
answered
Aug 11, 2017
Databases
er-diagram
databases
er-to-relational
relational
+
–
1
votes
22
Stack
In a stack,(size of 1 to n) the command to access ith element from top of the stack S will be known as peep(S,i).what is the condition to check for underflow on peep?? A.S[top-i]<=0 B.S[top+i]<=0 C.S[top-i+1]<=0 D.none
In a stack,(size of 1 to n) the command to access ith element from top of the stack S will be known as peep(S,i).what is the condition to check for underflow on peep??A.S...
3.6k
views
answered
Aug 10, 2017
1
votes
23
Pipeline hazards
If, a multicycle,pipelined processor has ‘N’ pipeline stages, then structural hazards can be avoided completely if at least ‘N’ registers are available. Is this true or false?
If, a multicycle,pipelined processor has ‘N’ pipeline stages, then structural hazards can be avoided completely if atleast ‘N’ registers are available. Is this tr...
1.5k
views
answered
Jul 17, 2017
CO and Architecture
pipelining
co-and-architecture
data-hazards
+
–
0
votes
24
virtual memory
The minimum number of page frames that must be allocated to a running process in a virtual memory environment is determined by instruction set architecture .How? pls explain this concept.
The minimum number of page frames that must be allocated to a running process in a virtual memory environment is determined by instruction set architecture .How? pls expl...
577
views
answered
Jul 14, 2017
Operating System
operating-system
virtual-memory
+
–
0
votes
25
Probability
A fair (unbiased) coin was tosssed four times in succession and resulted in the following outcomes: i)Head , ii) Head, iii) Head iv)Head. The probability of obtaining a "Tail" when a coin is tossed again is A) 0 B) 1/2 C) 4/5 D) 1/5
A fair (unbiased) coin was tosssed four times in succession and resulted in the following outcomes:i)Head , ii) Head, iii) Head iv)Head. The probability of obtaining...
570
views
answered
Jul 14, 2017
Mathematical Logic
probability
engineering-mathematics
discrete-mathematics
+
–
1
votes
26
Probability # Distribution
A traffic office imposes on an average 5 number of penalities daily on traffic violators.Assume that the number of the penalties on different days is independent and follows a Poisson distribution.The probability that there will be less than 4 penalties in a day is _______________ ?
A traffic office imposes on an average 5 number of penalities daily on traffic violators.Assume that the number of the penalties on different days is independent and foll...
1.3k
views
answered
Jul 14, 2017
Mathematical Logic
probability
engineering-mathematics
discrete-mathematics
+
–
23
votes
27
TIFR CSE 2017 | Part B | Question: 12
An undirected graph is complete if there is an edge between every pair of vertices. Given a complete undirected graph on $n$ vertices, in how many ways can you choose a direction for the edges so that there are no directed cycles? $n$ $\frac{n(n-1)}{2}$ $n!$ $2^n$ $2^m, \: \text{ where } m=\frac{n(n-1)}{2}$
An undirected graph is complete if there is an edge between every pair of vertices. Given a complete undirected graph on $n$ vertices, in how many ways can you choose a d...
6.6k
views
answered
Jul 10, 2017
Graph Theory
tifr2017
graph-theory
graph-connectivity
+
–
4
votes
28
GATE CSE 2010 | Question: 37
The program below uses six temporary variables $a, b, c, d, e, f$. a = 1 b = 10 c = 20 d = a + b e = c + d f = c + e b = c + e e = b + f d = 5 + e return d + f Assuming that all operations take their operands from registers, what is the minimum number of registers needed to execute this program without spilling? $2$ $3$ $4$ $6$
The program below uses six temporary variables $a, b, c, d, e, f$.a = 1 b = 10 c = 20 d = a + b e = c + d f = c + e b = c + e e = b + f d = 5 + e return d + fAssuming tha...
21.8k
views
answered
Jul 5, 2017
Compiler Design
gatecse-2010
compiler-design
target-code-generation
register-allocation
normal
+
–
0
votes
29
Syllabus Related
Are 'Longest Common Palindromic Subsequence' and 'Longest monotonically Increasing Subsequence' in Gate syllabus??
Are 'Longest Common Palindromic Subsequence' and 'Longest monotonically Increasing Subsequence' in Gate syllabus??
290
views
answered
Jun 22, 2017
Algorithms
dynamic-programming
+
–
Page:
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register