The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent activity by radha gogia
User radha gogia
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
User radha gogia
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
0
answers
1
If function f and fog are oneone then how is function g also oneone ?
asked
Jan 3
in
Set Theory & Algebra

81
views
functions
0
answers
2
Significance of pseudoheader .
Please explain how can source and destination IP address be invlincl in a TCP Segment when IP address are to be dealt at network layer . Why do we have a different checksum in TCP Segment when we already have a one in IP header .
asked
Dec 3, 2018
in
Computer Networks

44
views
computernetworks
pseudoheader
0
answers
3
Output of column major order ques ?
I am getting 5554 =1 as output but answer mentioned is 10 .
asked
Nov 26, 2018
in
Programming

85
views
programminginc
1
answer
4
How to draw PDA For following language
commented
Nov 26, 2018
in
Theory of Computation

96
views
pushdownautomata
theoryofcomputation
1
answer
5
Back edge,tree edge,forward edges in BFS
Consider the following statements: 1. Let T be the DFS tree resulting from DFS traversal on a connected directed graph the root of the tree is an articulation point, iff it has at least two children. 2. When BFS is carried out on a directed ... back edge, or cross edge and not forward edge as in the case of DFS. Find TRUE or FALSE for both the statements
commented
Nov 22, 2018
in
DS

1.8k
views
algorithms
bfs
dfs
graphalgorithms
programminginc
datastructure
0
answers
6
Gatebook Test series ques
Answer given is Option A , but here we wil first sort the jobs in order of profit , for each value of deadline scan linearly in the array depending on the value of deadline , so it should take O(n^2) in worst case .
commented
Nov 17, 2018
in
Algorithms

58
views
0
answers
7
which of the following expressions are equivalent to below operation?
I am just confused between option 1 and 4 , according to me they both are same since a relational Model doesn't support duplicate tuples , so in every case natural join and intersect will give same result of tuples , but in answer given it states that both operations are different ?
commented
Nov 15, 2018
in
Databases

82
views
databases
1
answer
8
why is the conclusion incorrect for the below premises ?
I am getting the conclusion to be true by Proof by Contradiction , what's wrong in the approach ?
commented
Nov 14, 2018
in
Mathematical Logic

116
views
mathematicallogic
1
answer
9
How to find total no of integer solutions to the below equation ?
In X+y+z<=12 , X,y,z>=1 How to find total no of integral solutions ?If you are introducing any dummy variable for solving , please do explain the logic behind this .
answer selected
Nov 11, 2018
in
Combinatory

301
views
permutationandcombination
0
answers
10
What is the difference between Operand storage in Cpu and Operand location .
commented
Nov 11, 2018
in
CO and Architecture

61
views
coandarchitecture
1
answer
11
How to calculate propogation delay for a synchronous counter ?
commented
Nov 4, 2018
in
Digital Logic

180
views
1
answer
12
Why can't we form minterms for the SOP terms which give value 0 for the function ?
commented
Oct 16, 2018
in
Digital Logic

66
views
digitallogic
1
answer
13
Why does digital signature not provide confidentiality when it provides authentication ?
commented
Oct 7, 2018
in
Computer Networks

88
views
1
answer
14
Why 3NF is inadequate in below situations ?
Why 3NF is inadequate in situations where the relation: 1) has multiple candidates key 2) has candidate key that are composite 3) has overlapped candidate keys . Example needed , I could justify a bit for point 3 where there may be partial FD's present in case we have candidate key that are composite , but I am not sure
commented
Sep 25, 2018
in
Databases

172
views
databases
databasenormalization
2
answers
15
Er Diagram
Consider the following entity relation diagram If A has 50 entities,B has 20 entities and C has 200 entities. what is the maximum number of triples of entities that could be in the relationship Set R ? (A) 50 (B) 100 (C) 1000 (D) 10,000 ans is A,C(given) please explain how??
comment edited
Sep 24, 2018
in
Databases

1.2k
views
databases
erdiagram
testseries
gatebook_dbms
0
answers
16
ICMP Messages doubt ?
Please explain these points : No ICMP error message will be generated for a fragmented datagram that is not the first fragment . No ICMP error message will be generated for a datagram having a multicast address . No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0
commented
Sep 8, 2018
in
Computer Networks

152
views
computernetworks
icmp
0
answers
17
Why is composition of functions unequal in below question ?
Here Domain and coDomain is Integers. I am getting fog=gof , what's wrong in this approach ?
edited
Sep 7, 2018
in
Set Theory & Algebra

60
views
functions
1
answer
18
How to validate below proposition ?
(p>q) ^ (r>s) ~q OR ~s Conclusion is ~p OR ~r How to see if the conclusion is valid or not ?
answer selected
Sep 7, 2018
in
Mathematical Logic

45
views
mathematicallogic
0
answers
19
How to convert below ER Model into relational model ?
commented
Sep 6, 2018
in
Databases

51
views
databases
ertorelational
1
answer
20
How to draw ER model for the below scenario ?
Each employee is assigned to a project work at only one location for that project, but can be at a different location for a different project. At a given location, an employee works on only one project. At a particular location, there can be many employees assigned to a given project.
commented
Sep 6, 2018
in
Databases

261
views
databases
2
answers
21
How to solve below ques of hashing ?
I am getting answer as 0.6 My approach if in the next two insertions we require atleast one collision , so if in 2 insertions , we have just one collision then it is 30/50*20/50 , if we have 2 collisions in the next 2 insertions , we get 30/50*30/50 , adding them gives 0.6 . What's wrong in this method ?
asked
Aug 29, 2018
in
DS

31
views
probability
2
answers
22
How does the Next Fit algorithm work in below screenshot ?
commented
Aug 28, 2018
in
Operating System

108
views
operatingsystem
1
answer
23
How to derive conclusion of below premises ?
P>R Q>R How is the conclusion is (P^Q)>R ? I could only derive that both P and Q are true .
commented
Aug 26, 2018
in
Mathematical Logic

76
views
mathematicallogic
0
answers
24
What is the conclusion of below premises ?
asked
Aug 25, 2018
in
Mathematical Logic

44
views
mathematicallogic
2
answers
25
Why is bounded waiting not related to starvation ?
When BW isn't satisfied , it imply that process will wait for indefinite period of time , so obviously we will have starvation , so how come they both are not related to each other ?
commented
Aug 23, 2018
in
Operating System

137
views
boundedwaiting
operatingsystem
1
answer
26
How does below property hold for cross edge in a DFS Tree ?
If (u,v) is a cross edge then start[u] > start[v] end[u] > end[v]
edited
Aug 20, 2018
in
Algorithms

126
views
algorithms
1
answer
27
What is the state of the process when it has multiple threads ?
When we have a multiple threads in a system which may be have different states like running , blocked ,ready then can we define the overall state of the process ? Because we will have PCB corresponding to a process so what will be the state of the process in it ? I am taking into consideration multiprocessor system .
commented
Aug 10, 2018
in
Operating System

29
views
operatingsystem
2
answers
28
Who is responsible for changing the mode bit in CPU ?
When we switch from user mode to kernel mode , via an interrupt it is done , Now is this a privileged instruction or a nonpriviledged instruction which changes the mode bit . Also we say that while switching from kernel mode ... mode and change the mode bit . Also is it the kernel which triggers this unprivileged instruction to change its bit .
commented
Aug 9, 2018
in
Operating System

115
views
operatingsystem
2
answers
29
what is the expected number of comparisons made before the algorithm terminates ?
commented
Aug 8, 2018
in
Algorithms

83
views
2
answers
30
How do we access value inside a structure variable ?
For the structure variable x , what is the difference between x and &x ? Also why is &x.val is an error ? Isn't it the address of the structure to which x is pointing to ? struct node { int val; struct node * next; }x; int main() { x.val=3; &x.val=4; return 0; }
commented
Jul 27, 2018
in
Programming

73
views
programminginc
0
answers
31
How to print the row having maximum no of 1's in a bitarray ?
If we have a n*n BitArray in which we have only 1's and 0's filled . Constraint is that in every row , 0 comes before 1 , so how to find the index of the row which has maximum no of 1's
asked
Jul 26, 2018
in
Algorithms

35
views
algorithms
1
answer
32
What is the total number of distinct words that can be formed out of n letters using below operations with stack ?
commented
Jul 25, 2018
in
Programming

201
views
datastructure
stack
0
answers
33
What is the time complexity of Makeset function in kruskal algorithm ?
what is the timecomplexity in kruskal algorithm for the overall step 2 where for each vertex Makeset function is called ? How come overall time for this step is O(v log v) ? We are performing this Operation for all the ... right because after we come out of loop we have v sets of 1 vertex each . Please explain this clearly .
asked
Jul 22, 2018
in
Algorithms

115
views
algorithms
greedyalgorithm
10
answers
34
GATE2014142
Consider the following pseudo code. What is the total number of multiplications to be performed? D = 2 for i = 1 to n do for j = i to n do for k = j + 1 to n do D = D * 3 Half of the product of the $3$ consecutive integers. Onethird of the product of the $3$ consecutive integers. Onesixth of the product of the $3$ consecutive integers. None of the above.
commented
Jul 12, 2018
in
Algorithms

9.1k
views
gate20141
algorithms
timecomplexity
normal
0
answers
35
How to evaluate time complexity for below question ?
asked
Jul 11, 2018
in
Algorithms

133
views
algorithms
timecomplexity
1
answer
36
How does sizeof() operator work for multidimensional array ?
If I have an array : int a[2][3][4] ; How to evaluate below Outputs ? 1. sizeof(*a) 2.sizeof(**a) 3. sizeof(a) Please explain precisely .
answer selected
Jul 11, 2018
in
Programming

260
views
programminginc
sizeofoperator
2
answers
37
what is the time complexity of below code ?
foo(int n) { for(int i=0 ; i<n ;i++) for(int j=i ; j<=i*i ;j++) if(j%i==0) { for(int k=0;k<j;k++) printf("hii"); } } How to proceed here for analyzing the time complexity ?
answer selected
Jul 8, 2018
in
Algorithms

216
views
timecomplexity
algorithms
0
answers
38
How to calculate below sum series ?
commented
Jul 1, 2018
in
Mathematical Logic

59
views
algorithms
engineeringmathematics
2
answers
39
what is the time complexity for the below question ?
For the below code : foo() { for(i=1;i<=n;i++) { for(j=0;j<i;j++) { for(k=0;k<j;k++) c++; } } } Here k is executing j1 times and j is executing i times and i is executing n^2 times , so first ... getting order of n^8 .But this is getting too large , I checked with an example , it is not matching ,So please correct where I went wrong .
edited
Jun 29, 2018
in
Algorithms

195
views
algorithms
timecomplexity
asymptoticnotations
1
answer
40
what is the tightest bound for the below functions ?
n2 + O(n2) = Theta(n2) I am not getting how can we say that tightest bound is in terms of theta , because theta(n2 ) implicitly implies BigOmega(n2 ) and Big O(n2 ) , Now If we say the function f(n) is BigOmega(n2 ... will never get a function greater than n2 so how can we say the tightest bound to be BigOmega(n2 ) ? Please explain briefly .
answer selected
Jun 24, 2018
in
Algorithms

130
views
algorithms
asymptoticnotations
50,647
questions
56,508
answers
195,518
comments
100,947
users