GATE CSE
For all GATE CSE Questions
Toggle navigation
GATE Overflow
Facebook Login
Google Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
All Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions.
Answers by Sanjay Sharma
User Sanjay Sharma
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
User Sanjay Sharma
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
+1
vote
1
UGCNETJan2017II32
Consider the following assembly language instructions : mov al, 15 mov ah, 15 xor al, al mov cl, 3 shr ax, cl add al, 90H adc ah, 0 What is the value in ax register after execution of above instructions ? (1) 0270H (2) 0170H (3) 01E0H (4) 0370H
answered
Oct 12
in
CO & Architecture

57
views
0
votes
2
UGCNETDEC2016III54
Which statement is not correct about “init” process in Unix? It is generally the parent of the login shell It has PID 1 It is the first process in the system Init forks and execs a ‘getty’ process at every port connected to a terminal
answered
Sep 29
in
Others

274
views
ugcnetdec2016iii
+1
vote
3
UGCNETJune2014III57
Consider a code with five valid code words of length ten : $0000000000, 0000011111, 1111100000, 1110000011, 1111111111$ Hamming distance of the code is $5$ $10$ $8$ $9$
answered
Sep 16
in
Others

386
views
ugcnetjune2014iii
+1
vote
4
UGC Net 2016 August
Suppose that the virtual Address space has eight pages and physical memory with four page frames. If LRU page replacement algorithm is used, _____ number of page faults occur with the reference string. 0 2 1 3 5 4 6 3 7 4 7 3 3 5 5 3 1 1 1 7 2 3 4 1 (1) 11 (2) 12 (3) 10 (4) 9
answered
Aug 29
in
Operating System

113
views
netexam
+2
votes
5
UGCNETDec2015III13
In a classful addressing the IP address with 0(zero) as network number: refers to the current network refers to broadcast on the local network refers to the broadcast on a distant network refers to loopback testing
answered
Aug 3
in
Computer Networks

586
views
computernetworks
networkaddressing
ugcnetdec2015iii
+1
vote
6
UGCNETJune2015III70
Consider the two class classification task that consists of the following points: Class $C_1$ : [1 1.5] [1 1.5] Class $C_2$ : [2 2.5] [2 2.5] The decision boundary between the two classes using single perceptron is given by: $x_1+x_2+1.5=0$ $x_1+x_21.5=0$ $x_1+1.5=0$ $x_11.5=0$
answered
Jun 14
in
Others

559
views
ugcnetjune2015iii
+1
vote
7
UGCNETJune2013III73
A fuzzy set A on R is ______ iff $A(\lambda x_1 + (1 \lambda)x_2) \geq min [A(x_1), A(x_2)]$ for all $x_1, x_2 \in R$ and all $\lambda \in [0,1]$ where minimum denotes the minimum operator. Support $\alpha$  cut Convex Concave
answered
May 10
in
Others

195
views
ugcnetjune2013iii
0
votes
8
UGCNETJune2014III16
Software testing is the process of establishing that errors are not present the process of establishing confidence that a program does what it is supposed to do the process of executing a program to show that it is working as per specifications the process of executing a program with the intent of finding errors
answered
Apr 22
in
Others

124
views
ugcnetjune2014iii
0
votes
9
UGCNETJune2016III62
Consider the following statements: Revised simplex method requires lesser computations than the simplex methods Revised simplex method automatically generates the inverse of the current basis matrix Less number of entries are needed in each table of the revised simplex ... statements is true? a and b only a and c only b and c only a, b, and c
answered
Apr 22
in
Others

210
views
ugcnetjune2016iii
+2
votes
10
UGCNETJune2016III63
The following transportation problem A B C Supply I 50 30 220 1 II 90 45 170 3 III 250 200 50 4 Demand 4 2 2 0 Has a solution A B C I 1 II 3 0 III 2 2 The above solution of a given transportation problem is Infeasible solution optimum solution nonoptimum solution unbounded solution
answered
Apr 21
in
Others

373
views
ugcnetjune2016iii
+1
vote
11
Probability
in a game of bridge the entire deck of 52 cards is dealt out to 4 players.What is the probability that i)one of the players receive all 13 spades ii )each player receives one ace?
answered
Apr 16
in
Probability

129
views
probability
engineeringmathematics
+1
vote
12
#ugc2016 #question 56
Let L = {0n1n  n≥0} be a context free language. Which of the following is correct? (A) L' is context free and Lk is not context free for any k≥1 (B) L' is not context free and Lk is context free for any k≥1 (C) Both L' and Lk ... D) Both L' and Lk is for any k≥1 are not context free. Official answer given by UGC is C . according to me answer is B
answered
Apr 13
in
Theory of Computation

148
views
theoryofcomputation
ugcnetjul2016iii
+6
votes
13
Fuzzy Sets
answered
Mar 6
in
Set Theory & Algebra

122
views
fuzzysets
engineeringmathematics
settheory&algebra
+6
votes
14
consider the set and find corresponding
answered
Mar 5
in
Mathematical Logic

73
views
engineeringmathematics
+2
votes
15
8086 .exe and .com programs
(8086 .exe and .com programs) : Which of the following statements is false ? (A) An .exe program on disk starts with a 512byte header file, but not a .com program (B) A .com program uses separate segments for code, ... be converted to a .com program (D) Generally, a .com program is simpler than a .exe program with the same functionality
answered
Mar 5
in
Digital Logic

138
views
8086
co&architecture
+2
votes
16
8086 assembly language
In 8086 assembly language, which of the following is not in the category of reserved words ? (A) directive (B) predefined symbol (C) operator (D) label
answered
Mar 4
in
Digital Logic

145
views
8086
co&architecture
+3
votes
17
8086 instructions
In x86, which of the following is not executed by itself ? (A) cld (B) rep (C) std (D) nop
answered
Mar 4
in
CBSE/UGC NET

154
views
8086
co&architecture
+1
vote
18
ISRO 2006 ECE Probability
A box contains 5 black and 5 red balls. Two balls are one after another from the box, without replacement. both balls being red is a) 1/90 b) 1/5 c) 19/90 d) 2/9
answered
Mar 4
in
Probability

66
views
isro
isroece
engineeringmathematics
+1
vote
19
ISRO 2006ECE Twos complement
Given the decimal number 19 an eight bit two's complement representation is given by a) 11101110 b) 11101101 c) 11101100 d) none of these
answered
Mar 3
in
CO & Architecture

113
views
isro
isroece
co&architecture
+1
vote
20
ISRO 2008ECE Maths / Vectors
The value of c which makes the angle 45° between a = i + cj and b = i+ j is a) 1 b) 1/ √ 2 c) 1/ √ 2 d) 0
answered
Mar 3
in
Linear Algebra

80
views
isro
isroece
0
votes
21
ISRO 2009ECE : Computer Architecture
answered
Mar 2
in
CO & Architecture

44
views
isro
isroece
co&architecture
+1
vote
22
ISRO 2008 ECE Software Engineering
answered
Mar 2
in
Others

58
views
isro
isroece
is&softwareengg
0
votes
23
Teaching Recruitment Board, Tamilnadu
answered
Feb 27
in
Computer Networks

144
views
computernetworks
0
votes
24
UGCNETDec2014II50
Match the following : LISTI LISTII a. Call control protocol i. Interface between Base Transceiver Station (BTS) and Base Station Controller (BSC) b. Abis ii. Spread spectrum c. BSMAP iii. Connection management d. CDMA iv. Works between Mobile Switching Centre ( ... Subsystem (BSS) Codes : a b c d iii iv i ii iii i iv ii i ii iii iv iv iii ii i
answered
Feb 20
in
Others

190
views
ugcnetdec2014ii
0
votes
25
UGCNETDec2014II46
Consider the following statements $S1$ and $S2$ : $S1$ : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell. $S2$ : A soft handover is one in which ... true. $S1$ is not true and $S2$ is true. Both $S1$ and $S2$ are true. Both $S1$ and $S2$ are not true.
answered
Feb 20
in
Others

105
views
ugcnetdec2014ii
0
votes
26
UGCNETSep2013II36
Consider the following program segment: d=0; for(i=1; i<31, ++i) for (j=1; j < 31; ++j) for (k=1; k < 31; ++k) if((i+j+k%3)==0)) d=d+1; printf(“%d”, d); The output will be 9000 3000 90 2700
answered
Feb 20
in
Others

194
views
ugcnetsep2013ii
0
votes
27
GATE201712178751943
answered
Feb 15
in
Numerical Ability

158
views
+3
votes
28
GATE20171GA5
The probability that a $k$digit number does NOT contain the digits 0, 5, or 9 is (A) $0.3^{k}$ (B) $0.6^{k}$ (C) $0.7^{k}$ (D) $0.9^{k}$
answered
Feb 14
in
Numerical Ability

1.1k
views
gate20171
numericalability
probability
easy
+6
votes
29
GATE2017226
P and Q are considering to apply for a job. The probability that P applies for the job is 1/4, the probability that P applies for the job given that Q applies for the job is 1/2., and the probability that Q applies for the job given that P ... probability that P does not apply for the job given that Q does not apply for this job is 4/5 5/6 7/8 11/12
answered
Feb 14
in
Probability

1.3k
views
gate20172
probability
conditionalprobability
+4
votes
30
GATE2017105
Consider the following table: Algorithms Design Paradigms (P) Kruskal (i) Divide and Conquer (Q) Quicksort (ii) Greedy (R) FloydWarshall (iii) Dynamic Programming Match the algorithms to the design paradigms they are based on. (A) (P) $\leftrightarrow$ ... (iii) (D) (P) $\leftrightarrow$ (i), (Q) $\leftrightarrow$ (ii), (R) $\leftrightarrow$ (iii)
answered
Feb 14
in
Algorithms

1.1k
views
gate20171
algorithms
algorithmdesigntechniques
+1
vote
31
NET jan 2017 paper3 q 59
answered
Feb 14
in
Mathematical Logic

152
views
+6
votes
32
GATE2017233
A system shares 9 tape drives. The current allocation and maximum requirement of tape drives for that processes are shown below: Process Current Allocation Maximum Requirement P1 3 7 P2 1 6 P3 3 5 Which of the following best describes current state of the system? Safe, Deadlocked Safe, Not Deadlocked Not Safe, Deadlocked Not Safe, Not Deadlocked
answered
Feb 14
in
Operating System

1.3k
views
gate20172
operatingsystem
resourceallocation
+3
votes
33
UGCNETDEC2016II36
There are three processes P1, P2 and P3 sharing a semaphore for synchronising a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access the semaphore ... P2 exits critical section Pi exits critical section The final value of semaphore will be: 0 1 1 2
answered
Feb 11
in
CBSE/UGC NET

532
views
ugcnetdec2016ii
+3
votes
34
UGCNETDEC2016II6
In propositional logic, if $(P→Q)\wedge (R→S)$ and $(P\vee R)$ are two premises such that $Y$ is the premise: $\begin{array}{c}( P \rightarrow Q) \wedge ( R \rightarrow S) \\ P \vee R \\ \hline \\ Y \\ \hline \end{array}$ $P\vee R$ $P\vee S$ $Q\vee R$ $Q\vee S$
answered
Feb 10
in
CBSE/UGC NET

676
views
ugcnetdec2016ii
+2
votes
35
UGCNETDEC2016II8
A binary 3bit down counter uses JK flipflops, FFi with inputs Ji, Ki and outputs Qi, i=0,1,2 respectively. The minimized expression for the input from following is J0=K0=0 J0=K0=1 J1=K1=Q0 J1=K1=Q’0 J2=K2=Q1Q0 J2=K2=Q’1Q’0 I, III, V I, IV, VI Il, III, V Il, IV, Vl
answered
Feb 4
in
CBSE/UGC NET

639
views
ugcnetdec2016ii
+2
votes
36
UGCNETDEC2016II14
Which of the following operators cannot be overloaded in C/C++? Bitwise right shift assignment Address of Indirection Structure reference
answered
Feb 4
in
Others

157
views
ugcnetdec2016ii
+2
votes
37
UGCNETDEC2016II18
Let M and N be two entities in an ER diagram with simple single vale attributes. R1 and R2 are two relationships between M and N, whereas R1 is onetomany and R2 is manytomany. The minimum number of tables required to represent M, N, R1 and R2 in the relational model are _______ 4 6 7 3
answered
Feb 4
in
Others

183
views
ugcnetdec2016ii
+1
vote
38
UGCNETDEC2016III73
Which of the following neural networks uses supervised learning? Multilayer perceptron Self organizing feature map Hopfield network a only b only a and b only a and c only
answered
Feb 2
in
Computer Networks

300
views
computernetworks
+2
votes
39
UGCNETDEC2016III71
Let R and S be two fuzzy relations defined as: Then, the resulting relaiton T, which relates elements of universe x to the elements of universe z using maxmin composition is given by:
answered
Feb 1
in
Others

369
views
ugcnetdec2016iii
0
votes
40
UGCNETDEC2016III75
Match the following vi commands in Unix: ListI ListII a. :w i. saves the file and quits the editing mode b. :x ii. escapes unix shell c. :q iii. saves file and remains in editing mode d. :sh iv. quits editing mode and no changes are saved to the file aii; biii; ci; div aiv; biii; cii; di aiii; biv; ci; dii aiii; bi; civ; dii
answered
Feb 1
in
Others

294
views
ugcnetdec2016iii
Page:
1
2
3
4
5
6
...
20
next »
27,421
questions
35,271
answers
84,572
comments
33,506
users