Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by STUDYGATE2019
2
votes
1
ISRO2020-52
To send same bit sequence, $\text{NRZ}$ encoding require Same clock frequency as Manchester encoding Half the clock frequency as Manchester encoding Twice the clock frequency as Manchester encoding A clock frequency which depend on number of zeroes and ones in the bit sequence
To send same bit sequence, $\text{NRZ}$ encoding requireSame clock frequency as Manchester encodingHalf the clock frequency as Manchester encodingTwice the clock frequenc...
2.5k
views
answered
Jan 14, 2020
Computer Networks
isro-2020
computer-networks
encoding
normal
+
–
1
votes
2
ISRO2020-35
Given the grammar $s \rightarrow T ^{\ast} S\ \mid T$ $T \rightarrow U+T\ \mid U$ $U \rightarrow a \mid b$ Which of the following statements is wrong? Grammar is not ambiguous Priority of $+$ over $^{\ast}$ is ensured Right to left evaluation of $^{\ast}$ and $+$ happens None of these
Given the grammar$s \rightarrow T ^{\ast} S\ \mid T$$T \rightarrow U+T\ \mid U$$U \rightarrow a \mid b$Which of the following statements is wrong?Grammar is not ambiguou...
3.8k
views
answered
Jan 13, 2020
Compiler Design
isro-2020
compiler-design
grammar
easy
+
–
0
votes
3
ISRO2020-44
In a columnar transportation cipher, the plain text is the tomato is a plant in the night shade family , keyword is $\text{TOMATO}$ . The cipher text is $\text{ TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$ ... $\text{ EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$
In a columnar transportation cipher, the plain text is “the tomato is a plant in the night shade family”, keyword is “$\text{TOMATO}$”. The cipher text is$\text{�...
3.5k
views
answered
Jan 13, 2020
Computer Networks
isro-2020
computer-networks
cryptography
normal
+
–
2
votes
4
ISRO2020-50
If every non-key attribute functionally dependent on the primary key, then the relation will be in First normal form Second normal form Third normal form Fourth Normal form
If every non-key attribute functionally dependent on the primary key, then the relation will be inFirst normal formSecond normal formThird normal formFourth Normal form
9.2k
views
answered
Jan 13, 2020
Databases
isro-2020
databases
database-normalization
easy
+
–
0
votes
5
ISRO2020-48
Properties of $\text{ DELETE'}$ and $\text{ TRUNCATE'}$ commands indicate that After the execution of $\text{ TRUNCATE'}$ operation, $\text{COMMIT}$, and $\text{ROLLBACK}$ statements cannot be performed to retrieve the lost data, while $\text{ DELETE'}$ ... allow it After the execution of $\text{ DELETE'}$ and $\text{ TRUNCATE'}$ operation no retrieval is possible for the lost data
Properties of $\text{‘DELETE’}$ and $\text{‘TRUNCATE’}$ commands indicate thatAfter the execution of $\text{‘TRUNCATE’}$ operation, $\text{COMMIT}$, and $\tex...
3.1k
views
answered
Jan 13, 2020
Databases
isro-2020
databases
sql
normal
+
–
6
votes
6
ISRO2020-31
Three CPU-bound tasks, with execution times of $15,12$ and $5$ time units respectively arrive at times $0,t$ and $8$, respectively. If the operating system implements a shortest remaining time first scheduling algorithm, what should be the value of $t$ to have $4$ context switches? Ignore the context switches at time $0$ and at the end. $0<t<3$ $t=0$ $t<=3$ $3<t<8$
Three CPU-bound tasks, with execution times of $15,12$ and $5$ time units respectively arrive at times $0,t$ and $8$, respectively. If the operating system implements a s...
4.2k
views
answered
Jan 13, 2020
Operating System
isro-2020
operating-system
process-scheduling
normal
+
–
1
votes
7
ISRO2020-68
What is the defect rate for Six sigma? $1.0$ defect per million lines of code $1.4$ defects per million lines of code $3.0$ defects per million lines of code $3.4$ defects per million lines of code
What is the defect rate for Six sigma?$1.0$ defect per million lines of code$1.4$ defects per million lines of code$3.0$ defects per million lines of code$3.4$ defects pe...
1.4k
views
answered
Jan 13, 2020
IS&Software Engineering
isro-2020
is&software-engineering
normal
+
–
6
votes
8
ISRO2020-23
The post-order traversal of binary tree is $\text{ACEDBHIGF}$. The pre-order traversal is $\text{A B C D E F G H I}$ $\text{F B A D C E G I H}$ $\text{F A B C D E G H I}$ $\text{A B D C E F G I H}$
The post-order traversal of binary tree is $\text{ACEDBHIGF}$. The pre-order traversal is$\text{A B C D E F G H I}$$\text{F B A D C E G I H}$$\text{F A B C D E G H I}$$\t...
18.7k
views
answered
Jan 13, 2020
DS
isro-2020
data-structures
binary-tree
tree-traversal
normal
+
–
2
votes
9
ISRO2020-25
What is compaction refers to a technique for overcoming internal fragmentation a paging technique a technique for overcoming external fragmentation a technique for compressing the data
What is compaction refers toa technique for overcoming internal fragmentationa paging techniquea technique for overcoming external fragmentationa technique for compressin...
4.3k
views
answered
Jan 13, 2020
Operating System
isro-2020
operating-system
memory-management
easy
+
–
2
votes
10
ISRO2020-67
What is the availability of the software with the following reliability figures Mean Time Between Failures (MTBF) is $20$ days Mean Time To Repair (MTTR) is $20$ hours $90\%$ $96\%$ $24\%$ $50\%$
What is the availability of the software with the following reliability figuresMean Time Between Failures (MTBF) is $20$ daysMean Time To Repair (MTTR) is $20$ hours$90\%...
3.8k
views
answered
Jan 13, 2020
IS&Software Engineering
isro-2020
is&software-engineering
normal
+
–
1
votes
11
ISI2014-DCG-16
The sum of the series $\dfrac{1}{1.2} + \dfrac{1}{2.3}+ \cdots + \dfrac{1}{n(n+1)} + \cdots $ is $1$ $1/2$ $0$ non-existent
The sum of the series $\dfrac{1}{1.2} + \dfrac{1}{2.3}+ \cdots + \dfrac{1}{n(n+1)} + \cdots $ is$1$$1/2$$0$non-existent
693
views
answered
Sep 27, 2019
Quantitative Aptitude
isi2014-dcg
quantitative-aptitude
summation
+
–
0
votes
12
ISI2014-DCG-18
$^nC_0+2^nC_1+3^nC_2+\cdots+(n+1)^nC_n$ equals $2^n+n2^{n-1}$ $2^n-n2^{n-1}$ $2^n$ none of these
$^nC_0+2^nC_1+3^nC_2+\cdots+(n+1)^nC_n$ equals$2^n+n2^{n-1}$$2^n-n2^{n-1}$$2^n$none of these
763
views
answered
Sep 27, 2019
Combinatory
isi2014-dcg
combinatory
binomial-theorem
+
–
0
votes
13
ISI2014-DCG-1
Let $(1+x)^n = C_0+C_1x+C_2x^2+ \dots + C_nx^n$, $n$ being a positive integer. The value of $\left( 1+\dfrac{C_0}{C_1} \right) \left( 1+\dfrac{C_1}{C_2} \right) \cdots \left( 1+\dfrac{C_{n-1}}{C_n} \right)$ is $\left( \frac{n+1}{n+2} \right) ^n$ $ \frac{n^n}{n!} $ $\left( \frac{n}{n+1} \right) ^n$ $ \frac{(n+1)^n}{n!} $
Let $(1+x)^n = C_0+C_1x+C_2x^2+ \dots + C_nx^n$, $n$ being a positive integer. The value of$$\left( 1+\dfrac{C_0}{C_1} \right) \left( 1+\dfrac{C_1}{C_2} \right) \cdots \l...
755
views
answered
Sep 27, 2019
Combinatory
isi2014-dcg
combinatory
binomial-theorem
+
–
3
votes
14
Closure Properties Table
https://gateoverflow.in/?qa=blob&qa_blobid=8929616163903734815
https://gateoverflow.in/?qa=blob&qa_blobid=8929616163903734815
8.6k
views
answered
Sep 3, 2019
Theory of Computation
closure-property
theory-of-computation
+
–
0
votes
15
Aptitude Doubt
The least number of five digits which is exactly divisible by 12,15 and 18 is: a)10080 b)10800 c)18000 d)81000
The least number of five digits which is exactly divisible by 12,15 and 18 is:a)10080 b)10800 c)18000 d)81000
640
views
answered
Aug 14, 2019
Quantitative Aptitude
quantitative-aptitude
general-aptitude
+
–
0
votes
16
Square Root Aptitude Doubt
Please help with this question:- $(\sqrt{243}+3)^x+(\sqrt{243}-3)^x=15^x$.
Please help with this question:-$(\sqrt{243}+3)^x+(\sqrt{243}-3)^x=15^x$.
982
views
answered
Aug 14, 2019
Quantitative Aptitude
general-aptitude
+
–
0
votes
17
OSI Model
Network layer is used when data is to be delivered across network. So, for delivering within a network, there is no need for network layer (Ref: Pg-49, Computer Networks, Forouzan, 2 Edition). So in that case will Transport layer directly communicate with Data Link layer ? Or will Network layer be in picture, but do nothing other than simply passing data to Transport layer ?
Network layer is used when data is to be delivered across network. So, for delivering within a network, there is no need for network layer (Ref: Pg-49, Computer Networks,...
1.3k
views
answered
Sep 17, 2018
Computer Networks
computer-networks
network-layering
osi-model
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register