Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Filter
No answer
No selected answer
No upvoted answer
Previous GATE
Featured
Recent questions without answers
0
votes
0
answers
271
UGC NET CSE | June 2008 | Part 2 | Question: 11
What is the effect of the following $\text{C}$ code? for(int i=1 ; i ≤ 5 ; i = i + 1/2) printf(" % d,", i); It prints $1, 1.5, 2, 2.5, 3, 3.5, 4, 4.5, 5$, and stops It prints $1, 2, 3, 4, 5$, and stops It prints $1, 2, 3, 4, 5$, and repeats forever It prints $1, 1, 1, 1, 1$, and repeats forever
admin
asked
in
Others
Jan 6
by
admin
50
views
ugcnetcse-june2008-paper2
0
votes
0
answers
272
UGC NET CSE | June 2008 | Part 2 | Question: 16
A superkey for an entity consists of : one attribute only at least two attributes at most two attributes one or more attributes
admin
asked
in
Others
Jan 6
by
admin
60
views
ugcnetcse-june2008-paper2
0
votes
0
answers
273
UGC NET CSE | June 2008 | Part 2 | Question: 18
If a relation is in $2 \mathrm{NF}$ then : every candidate key is a primary key every non-prime attribute is fully functionally dependent on each relation key every attribute is functionally independent every relational key is a primary key
admin
asked
in
Others
Jan 6
by
admin
38
views
ugcnetcse-june2008-paper2
0
votes
0
answers
274
UGC NET CSE | June 2008 | Part 2 | Question: 22
Which of the following can be the sequence of nodes examined in a binary search tree while searching for key $98$? $100, 50, 75, 60, 98$ $100,120,90,95,98$ $200, 70, 100, 95, 98$ $75,150,90,80,98$
admin
asked
in
Others
Jan 6
by
admin
45
views
ugcnetcse-june2008-paper2
0
votes
0
answers
275
UGC NET CSE | June 2008 | Part 2 | Question: 25
An example of a possible file attribute is: minimum size permanent flag archive flag EBCDIC flag
admin
asked
in
Others
Jan 6
by
admin
37
views
ugcnetcse-june2008-paper2
0
votes
0
answers
276
UGC NET CSE | June 2008 | Part 2 | Question: 26
The $\text{ATM}$ cells are __________ bytes long. $48$ $53$ $64$ $69$
admin
asked
in
Others
Jan 6
by
admin
40
views
ugcnetcse-june2008-paper2
0
votes
0
answers
277
UGC NET CSE | June 2008 | Part 2 | Question: 27
For slotted ALOHA, the maximum channel utilization is : $100 \%$ $50 \%$ $36 \%$ $18 \%$
admin
asked
in
Others
Jan 6
by
admin
50
views
ugcnetcse-june2008-paper2
0
votes
0
answers
278
UGC NET CSE | June 2008 | Part 2 | Question: 30
With reference to hierarchical routing, the optimum number of levels for an $m$ router subnet is: $m^{2}$ $m$ $\ln m$ $\sqrt{m}$
admin
asked
in
Others
Jan 6
by
admin
76
views
ugcnetcse-june2008-paper2
0
votes
0
answers
279
UGC NET CSE | June 2008 | Part 2 | Question: 32
In the indirect addressing scheme, the second part of an instruction contains : the operand in decimal form the address of the location where the value of the operand is stored the address of the location where the address of the operand is stored the operand in an encoded form
admin
asked
in
Others
Jan 6
by
admin
44
views
ugcnetcse-june2008-paper2
0
votes
0
answers
280
UGC NET CSE | June 2008 | Part 2 | Question: 34
Dead-code elimination in machine code optimization refers to : removal of all labels. removal of values that never get used. removal of function which are not involved. removal of a module after its use.
admin
asked
in
Others
Jan 6
by
admin
53
views
ugcnetcse-june2008-paper2
0
votes
0
answers
281
UGC NET CSE | June 2008 | Part 2 | Question: 35
A parse tree is an annotated parse tree if : it shows attribute values at each node. there are no inherited attributes. it has synthesized nodes as terminal nodes. every non-terminal nodes is an inherited attribute.
admin
asked
in
Others
Jan 6
by
admin
54
views
ugcnetcse-june2008-paper2
0
votes
0
answers
282
UGC NET CSE | June 2008 | Part 2 | Question: 36
An example of a non-preemptive $\text{CPU}$ scheduling algorithm is : Shortest job first scheduling. Round robin scheduling. Priority scheduling. Fair share scheduling.
admin
asked
in
Others
Jan 6
by
admin
48
views
ugcnetcse-june2008-paper2
0
votes
0
answers
283
UGC NET CSE | June 2008 | Part 2 | Question: 37
There are ' $n$ ' processes in memory. A process spends a fraction ' $p$ ' of its time waiting for $\mathrm{I} / \mathrm{O}$ to complete. The CPU utilization is given by : $p^{n}$ $1-p^{n}$ $(1-p)^{n}$ $1-n p$
admin
asked
in
Others
Jan 6
by
admin
43
views
ugcnetcse-june2008-paper2
0
votes
0
answers
284
UGC NET CSE | June 2008 | Part 2 | Question: 38
An example of a memory management system call in $\text{UNIX}$ is : fork. mmap. sigaction. execve.
admin
asked
in
Others
Jan 6
by
admin
47
views
ugcnetcse-june2008-paper2
0
votes
0
answers
285
UGC NET CSE | June 2008 | Part 2 | Question: 39
With $64$ bit virtual addresses, a $4 \mathrm{~KB}$ page and $256 \mathrm{MB}$ of RAM, an inverted page table requires : $8192$ entries. $16384$ entries. $32768$ entries. $65536$ entries.
admin
asked
in
Others
Jan 6
by
admin
48
views
ugcnetcse-june2008-paper2
0
votes
0
answers
286
UGC NET CSE | June 2008 | Part 2 | Question: 40
A computer has $6$ tape drives with ' $n$ ' processes competing for them. Each process may need two drives. For which values of ' $n$ ' is the system deadlock free? $1$ $2$ $3$ $6$
admin
asked
in
Others
Jan 6
by
admin
58
views
ugcnetcse-june2008-paper2
deadlock-prevention-avoidance-detection
0
votes
0
answers
287
UGC NET CSE | June 2008 | Part 2 | Question: 41
Water fall model for software development is : a top down approach. a bottom up approach. a sequential approach. a consequential approach.
admin
asked
in
Others
Jan 6
by
admin
44
views
ugcnetcse-june2008-paper2
0
votes
0
answers
288
UGC NET CSE | June 2008 | Part 2 | Question: 43
While designing the user interface, one should : use as many short cuts as possible. use as many defaults as possible. use as many visual layouts as possible. reduce the demand on short-term memory.
admin
asked
in
Others
Jan 6
by
admin
62
views
ugcnetcse-june2008-paper2
0
votes
0
answers
289
UGC NET CSE | June 2008 | Part 2 | Question: 44
In software cost estimation, base estimation is related to : cost of similar projects already completed. cost of the base model of the present project. cost of the project with the base minimum profit. cost of the project under ideal situations.
admin
asked
in
Others
Jan 6
by
admin
47
views
ugcnetcse-june2008-paper2
0
votes
0
answers
290
UGC NET CSE | June 2008 | Part 2 | Question: 45
In clean room software engineering : only eco-friendly hardware is used. only hired facilities are used for development. correctness of the code is verified before testing. implementation is done only after ensuring correctness.
admin
asked
in
Others
Jan 6
by
admin
45
views
ugcnetcse-june2008-paper2
0
votes
0
answers
291
UGC NET CSE | June 2008 | Part 2 | Question: 46
Amdahl's law states that the maximum speedup $\text{S}$ achievable by a parallel computer with ' $\mathrm{p}$ ' processors is given by : $\mathrm{S} \leq \mathrm{f}+(1-\mathrm{f}) / \mathrm{p}$ ... $\mathrm{S} \leq 1 /[1-\mathrm{f}+\mathrm{f} / \mathrm{p}]$
admin
asked
in
CO and Architecture
Jan 6
by
admin
74
views
ugcnetcse-june2008-paper2
computer-architecture
amdahls-law
speedup
0
votes
0
answers
292
UGC NET CSE | June 2008 | Part 2 | Question: 47
With reference to cluster analysis in data mining, a distance measure that is NOT used is : Euclidean distance. Manhattan distance. Chebychev's distance. Lee distance.
admin
asked
in
Others
Jan 6
by
admin
52
views
ugcnetcse-june2008-paper2
0
votes
0
answers
293
UGC NET CSE | June 2008 | Part 2 | Question: 48
In a mobile communication system, a geographic region is divided into cells. For each frequency set, there is a buffer _________ wide where that frequency is not used. one-cell two-cells three-cells four-cells
admin
asked
in
Others
Jan 6
by
admin
55
views
ugcnetcse-june2008-paper2
0
votes
0
answers
294
UGC NET CSE | June 2008 | Part 2 | Question: 49
Identify the incorrect statement : The overall strategy drives the e-commerce data warehousing strategy. Data warehousing in an e-commerce environment should be done in a classical manner. E-commerce opens up an entirely new world of web servers. E-commerce security threats can be grouped into three major categories.
admin
asked
in
Others
Jan 6
by
admin
36
views
ugcnetcse-june2008-paper2
0
votes
0
answers
295
UGC NET CSE | June 2008 | Part 2 | Question: 50
Identify the incorrect statement : The $\text{ATM}$ adaptation layer is not service dependent. Logical connections in $\text{ATM}$ are referred to as virtual channel connections. $\text{ATM}$ is a streamlined protocol with minimal error and flow control capabilities. $\text{ATM}$ is also known as cell relay.
admin
asked
in
Others
Jan 6
by
admin
60
views
ugcnetcse-june2008-paper2
0
votes
0
answers
296
Computer JE exam Consider a disk space with the following specifications: 16 surfaces, 128 tracks/surface, 256 sectors/track and 512 bytes/sectors. Let the diameter of the innermost track is 21 cm. Using a read-write head, the disk is rotating at 6000 RPM. The data transfer rate is mbps. a) 8 b)10 c)13 d)17
Mukesh_Kumar
asked
in
CO and Architecture
Jan 6
by
Mukesh_Kumar
117
views
disk
0
votes
0
answers
297
#self doubt
Are these topics in the Gate 2024 syllabus? clocks, simple interest, time work, profit loss, and some other quantitative aptitude topics I found it in some mock tests.
Dknights
asked
in
Quantitative Aptitude
Jan 6
by
Dknights
82
views
quantitative-aptitude
0
votes
0
answers
298
Made easy test series
Consider a strongly connected directed graph G(V, F), where |V| = 101. The minimum possible value of IEl is
abhishekbhingarde
asked
in
Graph Theory
Jan 6
by
abhishekbhingarde
98
views
0
votes
0
answers
299
How is the next-hop IP information passed down from Network layer to DLL
Let's say my device wants to send a packet to far way device many networks away. Once my router receives the packet, it doesn't know much about this destination IP and chooses to send it to the next hop router. ... layer and change the port number can they also interfere in the DLL and do all operations by itself in reality?
phaniphani
asked
in
Computer Networks
Jan 6
by
phaniphani
100
views
self-doubt
general-topic-doubt
computer-networks
routing
0
votes
0
answers
300
Give a regular expression to represent salaries as they might appear in employment advertising. Consider that salaries might be given on a per hour, week, month or year basis. They may or may not appear with a dollar sign or ... classified ads in a newspaper, or on-line jobs listings to get an idea of what patterns might be useful.
shahabazeem
asked
in
Theory of Computation
Jan 5
by
shahabazeem
55
views
Page:
« prev
1
...
5
6
7
8
9
10
11
12
13
14
15
...
591
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
Engineering Mathematics
Digital Logic
Programming and DS
Algorithms
Theory of Computation
Compiler Design
Operating System
Databases
CO and Architecture
Computer Networks
Artificial Intelligence
Machine Learning
Data Mining and Warehousing
Non GATE
Others
Admissions
Exam Queries
Tier 1 Placement Questions
Job Queries
Projects
Unknown Category
64.3k
questions
77.9k
answers
244k
comments
80.0k
users
Recent questions without answers
Recent Blog Comments
category ?
Hi @Arjun sir, I have obtained a score of 591 in ...
download here
Can you please tell about IIT-H mtech CSE self...
Please add your admission queries here:...