Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
anchitjindal07
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by anchitjindal07
2
answers
1
ISRO2020-62
What is output of the following ‘C’ code assuming it runs on a byte addressed little endian machine? #include<stdio.h> int main() { int x; char *ptr; x=622,100,101; printf("%d",(*(char *)&x)*(x%3)); return 0; } $622$ $311$ $22$ $110$
What is output of the following ‘C’ code assuming it runs on a byte addressed little endian machine?#include<stdio.h int main() { int x; char *ptr; x=622,100,101; pri...
5.6k
views
commented
Jan 27, 2020
Programming in C
isro-2020
programming
programming-in-c
normal
pointers
+
–
2
answers
2
ISRO2014-65
A cube of side $1$ unit is placed in such a way that the origin coincides with one of its top vertices and the three axes along three of its edges. What are the co-ordinates of the vertex which is diagonally opposite to the vertex whose co-ordinates are $(1, 0, 1)?$ $(0, 0, 0)$ $(0, -1, 0)$ $(0, 1, 0)$ $(1, 1, 1)$
A cube of side $1$ unit is placed in such a way that the origin coincides with one of its top vertices and the three axes along three of its edges. What are the co-ordina...
6.9k
views
commented
Jan 4, 2020
Geometry
isro2014
geometry
non-gate
+
–
1
answer
3
UGC NET CSE | December 2013 | Part 2 | Question: 13
An E-R model includes An ER diagram portraying entity types. Attributes for each entity type. Relationships among entity types. Semantic integrity constrains that reflects the business rules about data not captured in the ER diagram I, II, III and IV I and IV I, II and IV I and III
An E-R model includesAn ER diagram portraying entity types.Attributes for each entity type.Relationships among entity types.Semantic integrity constrains that reflects th...
2.6k
views
commented
Jan 3, 2020
Databases
ugcnetcse-dec2013-paper2
databases
er-diagram
+
–
1
answer
4
UGC NET CSE | December 2013 | Part 2 | Question: 14
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. Entity Constraints Rules Keys
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual ...
2.9k
views
commented
Jan 3, 2020
Databases
ugcnetcse-dec2013-paper2
databases
cardinality-ratio
+
–
2
answers
5
UGC NET CSE | September 2013 | Part 3 | Question: 41
Given a binary search trees for a set of $n=5$ keys with the following probabilities $:$ ... $2.65$ $2.70$ $2.75$ $2.80$
Given a binary search trees for a set of $n=5$ keys with the following probabilities $:$$\begin{array}{|l|l|l|l|l|l|l|}\hline \text{i} & \text{0} & \text{1} & \text{2} &...
4.7k
views
commented
Jan 2, 2020
DS
ugcnetcse-sep2013-paper3
data-structures
binary-search-tree
+
–
1
answer
6
UGC NET CSE | September 2013 | Part 3 | Question: 60
A diametric projection is said to be trimetric projection when two of the three foreshortening factors are equal and third is arbitrary all of the three foreshortening factors are equal all of the three foreshortening factors are arbitrary Which of the above is true? I and II II and III I only III only
A diametric projection is said to be trimetric projection whentwo of the three foreshortening factors are equal and third is arbitraryall of the three foreshortening fact...
2.1k
views
commented
Jan 2, 2020
Computer Graphics
ugcnetcse-sep2013-paper3
computer-graphics
projection
+
–
1
answer
7
UGC NET CSE | June 2013 | Part 2 | Question: 33
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE BUTAEEZ SUZANNE XYZABCD ABCDXYZ
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNEBUTAEEZSUZANNEXYZABCDABCDXYZ
10.9k
views
commented
Jan 1, 2020
Computer Networks
computer-networks
network-security
rsa
ugcnetcse-june2013-paper2
+
–
3
answers
8
GATE IT 2005 | Question: 79
Suppose that two parties $A$ and $B$ wish to setup a common secret key (D-H key) between themselves using the Diffie-Hellman key exchange technique. They agree on $7$ as the modulus and $3$ as the primitive root. Party $A$ chooses $2$ and party $B$ chooses $5$ as their respective secrets. Their D-H key is $3$ $4$ $5$ $6$
Suppose that two parties $A$ and $B$ wish to setup a common secret key (D-H key) between themselves using the Diffie-Hellman key exchange technique. They agree on $7$ as ...
6.9k
views
commented
Dec 16, 2019
Computer Networks
gateit-2005
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
2
answers
9
GATE CSE 2001 | Question: 21-a
Consider a relation examinee (regno, name, score), where regno is the primary key to score is a real number. Write a relational algebra using $( \Pi, \sigma, \rho, \times)$ to find the list of names which appear more than once in examinee.
Consider a relation examinee (regno, name, score), where regno is the primary key to score is a real number.Write a relational algebra using $( \Pi, \sigma, \rho, \times)...
3.7k
views
commented
Dec 15, 2019
Databases
gatecse-2001
databases
sql
normal
descriptive
+
–
3
answers
10
GATE CSE 1988 | Question: 9i
The following program fragment was written in an assembly language for a single address computer with one accumulator register: LOAD B MULT C STORE T1 ADD A STORE T2 MULT T2 ADD T1 STORE Z Give the arithmetic expression implemented by the fragment.
The following program fragment was written in an assembly language for a single address computer with one accumulator register:LOAD B MULT C STORE T1 ADD A STORE T2 MULT ...
1.7k
views
commented
Dec 3, 2019
CO and Architecture
gate1988
normal
descriptive
co-and-architecture
machine-instruction
+
–
4
answers
11
GATE IT 2005 | Question: 26
Traceroute reports a possible route that is taken by packets moving from some host $A$ to some other host $B$. Which of the following options represents the technique used by traceroute to identify these hosts: By progressively querying routers about the next ... in the ascending order of their hop distance from $A$ By locally computing the shortest path from $A$ to $B$
Traceroute reports a possible route that is taken by packets moving from some host $A$ to some other host $B$. Which of the following options represents the technique use...
14.3k
views
commented
Nov 30, 2019
Computer Networks
gateit-2005
computer-networks
icmp
application-layer-protocols
normal
+
–
5
answers
12
GATE CSE 2005 | Question: 30
Let r be a relation instance with schema R = (A, B, C, D). We define $r_1 = \pi_{A, B, C} (R)$ and $r_2=\pi_{A, D} (r)$. Let $s =r_1 \: * \: r_2$ where $*$ denotes natural join. Given that the decomposition of $r$ into $r_1$ and $r_2$ is lossy, which one of the following is TRUE? $s \subset r$ $r \cup s =r$ $r \subset s$ $r*s=s$
Let r be a relation instance with schema R = (A, B, C, D). We define $r_1 = \pi_{A, B, C} (R)$ and $r_2=\pi_{A, D} (r)$. Let $s =r_1 \: * \: r_2$ where $*$ denotes natura...
16.1k
views
commented
Nov 25, 2019
Databases
gatecse-2005
databases
relational-algebra
natural-join
normal
+
–
5
answers
13
GATE CSE 2002 | Question: 15
A university placement center maintains a relational database of companies that interview students on campus and make job offers to those successful in the interview. The schema of the database is given below: ... students were offered jobs, the name of the degree and the average offered salary of students in this degree program.
A university placement center maintains a relational database of companies that interview students on campus and make job offers to those successful in the interview. The...
5.4k
views
commented
Nov 25, 2019
Databases
gatecse-2002
databases
normal
descriptive
relational-algebra
sql
+
–
4
answers
14
GATE CSE 2013 | Question: 33
Consider the DFA $A$ given below. Which of the following are FALSE? Complement of $L(A)$ is context-free. $L(A) = L((11^*0+0)(0 + 1)^*0^*1^*) $ For the language accepted by $A, A$ is the minimal DFA. $A$ accepts all strings over $\{0, 1\}$ of length at least $2$. 1 and 3 only 2 and 4 only 2 and 3 only 3 and 4 only
Consider the DFA $A$ given below. Which of the following are FALSE?Complement of $L(A)$ is context-free.$L(A) = L((11^*0+0)(0 + 1)^*0^*1^*) $For the language accepted by ...
16.2k
views
commented
Nov 23, 2019
Theory of Computation
gatecse-2013
theory-of-computation
finite-automata
normal
+
–
3
answers
15
TIFR CSE 2013 | Part B | Question: 19
In a relational database there are three relations: $Customers = C\textsf{(CName)}$, $Shops = S \textsf{(SName)}$, $Buys = B\textsf{(CName, SName)}$ ... $S - \Pi _{\textsf{SName}}((C \times S) - B)$ None of the above
In a relational database there are three relations:$Customers = C\textsf{(CName)}$,$Shops = S \textsf{(SName)}$,$Buys = B\textsf{(CName, SName)}$.Which of the following r...
3.2k
views
commented
Nov 17, 2019
Databases
tifr2013
databases
relational-algebra
+
–
3
answers
16
GATE IT 2007 | Question: 67
Consider the following implications relating to functional and multivalued dependencies given below, which may or may not be correct. if $A \rightarrow \rightarrow B$ and $A \rightarrow \rightarrow C$ then $A \rightarrow BC$ if $A \rightarrow B$ ... then $A \rightarrow \rightarrow C$ Exactly how many of the above implications are valid? $0$ $1$ $2$ $3$
Consider the following implications relating to functional and multivalued dependencies given below, which may or may not be correct.if $A \rightarrow \rightarrow B$ and ...
12.8k
views
commented
Nov 17, 2019
Databases
gateit-2007
databases
database-normalization
multivalued-dependency-4nf
normal
+
–
5
answers
17
GATE CSE 2008 | Question: 70
Consider a file of $16384$ records. Each record is $32\;\text{bytes}$ long and its key field is of size $6\;\text{bytes}$ ... -level blocks in the multi-level index are respectively $8$ and $0$ $128$ and $6$ $256$ and $4$ $512$ and $5$
Consider a file of $16384$ records. Each record is $32\;\text{bytes}$ long and its key field is of size $6\;\text{bytes}$. The file is ordered on a non-key field, and the...
23.5k
views
commented
Nov 17, 2019
Databases
gatecse-2008
databases
indexing
normal
+
–
1
answer
18
GATE CSE 2014 Set 1 | Question: 17
Which one of the following is FALSE? A basic block is a sequence of instructions where control enters the sequence at the beginning and exits at the end. Available expression analysis can be used for common subexpression elimination. Live variable ... be used for dead code elimination. $x=4*5 \Rightarrow x=20$ is an example of common subexpression elimination.
Which one of the following is FALSE?A basic block is a sequence of instructions where control enters the sequence at the beginning and exits at the end. Available express...
11.6k
views
commented
Nov 9, 2019
Compiler Design
gatecse-2014-set1
compiler-design
code-optimization
normal
+
–
4
answers
19
GATE CSE 2019 | Question: 42
The index node (inode) of a Unix -like file system has $12$ direct, one single-indirect and one double-indirect pointers. The disk block size is $4$ kB, and the disk block address is $32$-bits long. The maximum possible file size is (rounded off to $1$ decimal place) ____ GB
The index node (inode) of a Unix -like file system has $12$ direct, one single-indirect and one double-indirect pointers. The disk block size is $4$ kB, and the disk bloc...
22.7k
views
commented
Jun 27, 2019
Operating System
gatecse-2019
numerical-answers
operating-system
file-system
2-marks
+
–
4
answers
20
GATE CSE 2019 | Question: 47
Suppose $Y$ is distributed uniformly in the open interval $(1,6)$. The probability that the polynomial $3x^2 +6xY+3Y+6$ has only real roots is (rounded off to $1$ decimal place) _______
Suppose $Y$ is distributed uniformly in the open interval $(1,6)$. The probability that the polynomial $3x^2 +6xY+3Y+6$ has only real roots is (rounded off to $1$ decimal...
16.1k
views
commented
Jun 27, 2019
Probability
gatecse-2019
numerical-answers
engineering-mathematics
probability
uniform-distribution
2-marks
+
–
1
answer
21
GATE IT 2006 | Question: 59
Consider the following structure chart diagram. The boxes have function names embedded in them, while the variables are indicated along the arcs. Given below are a set of statements relevant to the above diagram. F3 and F6 can be in the same module. F4 and F6 ... a control variable. Which combination of these statements is TRUE? III and IV I and IV II and IV I, II and IV
Consider the following structure chart diagram. The boxes have function names embedded in them, while the variables are indicated along the arcs.Given below are a set of ...
952
views
commented
Mar 25, 2019
IS&Software Engineering
gateit-2006
is&software-engineering
normal
non-gate
+
–
2
answers
22
GATE IT 2005 | Question: 65
Tb carry out white box testing of a program, its flow chart representation is obtained as shown in the figure below: For basis path based testing of this program, its cyclomatic complexity is $5$ $4$ $3$ $2$
Tb carry out white box testing of a program, its flow chart representation is obtained as shown in the figure below:For basis path based testing of this program, its cycl...
2.8k
views
commented
Feb 15, 2019
IS&Software Engineering
gateit-2005
is&software-engineering
cyclomatic-complexity
normal
+
–
3
answers
23
GATE CSE 2005 | Question: 85-a
Consider the following floating-point format. Mantissa is a pure fraction in sign-magnitude form. The decimal number $0.239 \times 2^{13}$ has the following hexadecimal representation (without normalization and rounding off): $\text{0D 24}$ $\text{0D 4D}$ $\text{4D 0D}$ $\text{4D 3D}$
Consider the following floating-point format.Mantissa is a pure fraction in sign-magnitude form.The decimal number $0.239 \times 2^{13}$ has the following hexadecimal rep...
18.4k
views
commented
Feb 11, 2019
Digital Logic
gatecse-2005
digital-logic
number-representation
floating-point-representation
normal
+
–
3
answers
24
GATE CSE 2019 | Question: GA-7
In the given diagram, teachers are represented in the triangle, researchers in the circle and administrators in the rectangle. Out of the total number of the people, the percentage of administrators shall be in the range of _______ $0$ to $15$ $16$ to $30$ $31$ to $45$ $46$ to $60$
In the given diagram, teachers are represented in the triangle, researchers in the circle and administrators in the rectangle. Out of the total number of the people, the ...
10.0k
views
commented
Feb 8, 2019
Quantitative Aptitude
gatecse-2019
general-aptitude
quantitative-aptitude
venn-diagram
2-marks
+
–
9
answers
25
GATE CSE 2007 | Question: 34
Suppose only one multiplexer and one inverter are allowed to be used to implement any Boolean function of $n$ variables. What is the minimum size of the multiplexer needed? $2^n$ line to $1$ line $2^{n+1}$ line to $1$line $2^{n-1}$ line to $1$line $2^{n-2}$ line to $1$line
Suppose only one multiplexer and one inverter are allowed to be used to implement any Boolean function of $n$ variables. What is the minimum size of the multiplexer neede...
31.3k
views
commented
Feb 4, 2019
Digital Logic
gatecse-2007
digital-logic
normal
multiplexer
+
–
1
answer
26
Combinatorics
How to approach such questions. Please explain in detail if possible, Thank you !
How to approach such questions. Please explain in detail if possible, Thank you !
657
views
commented
Jan 30, 2019
5
answers
27
GATE CSE 1997 | Question: 4.7
A priority queue $Q$ is used to implement a stack that stores characters. PUSH (C) is implemented as INSERT $(Q, C, K)$ where $K$ is an appropriate integer key chosen by the implementation. POP is implemented as ... For a sequence of operations, the keys chosen are in non-increasing order non-decreasing order strictly increasing order strictly decreasing order
A priority queue $Q$ is used to implement a stack that stores characters. PUSH (C) is implemented as INSERT $(Q, C, K)$ where $K$ is an appropriate integer key chosen by ...
24.1k
views
commented
Jan 27, 2019
DS
gate1997
data-structures
stack
normal
priority-queue
+
–
2
answers
28
GATE IT 2004 | Question: 24
Which one of the following statements is FALSE? HTTP runs over TCP HTTP describes the structure of web pages HTTP allows information to be stored in a URL HTTP can be used to test the validity of a hypertext link
Which one of the following statements is FALSE?HTTP runs over TCPHTTP describes the structure of web pagesHTTP allows information to be stored in a URLHTTP can be used to...
11.5k
views
commented
Jan 25, 2019
Web Technologies
gateit-2004
web-technologies
normal
+
–
3
answers
29
GATE CSE 2004 | Question: 56
Consider three IP networks $A, B$ and $C$. Host $H_A$ in network $A$ sends messages each containing $180$ bytes of application data to a host $H_C$ in network $C$. The $\text{TCP}$ layer prefixes $20$ byte header to the message. This passes ... $200$ $220$ $240$ $260$
Consider three IP networks $A, B$ and $C$. Host $H_A$ in network $A$ sends messages each containing $180$ bytes of application data to a host $H_C$ in network $C$. The $\...
22.8k
views
commented
Jan 24, 2019
Computer Networks
gatecse-2004
computer-networks
ip-addressing
tcp
normal
+
–
3
answers
30
GATE IT 2007 | Question: 16
The minimum positive integer $p$ such that $3^{p} \pmod {17} = 1$ is $5$ $8$ $12$ $16$
The minimum positive integer $p$ such that $3^{p} \pmod {17} = 1$ is$5$$8$$12$$16$
7.3k
views
commented
Jan 22, 2019
Set Theory & Algebra
gateit-2007
set-theory&algebra
normal
number-theory
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register