Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Filter
User VS
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by VS
3
answers
1
ISRO2018-24
Choose the correct statement - $A=\{a^nb^n \mid n= 1, 2, 3, \ldots\}$ is a regular language The set $B$, consisting of all strings made up of only $a's$ and $b's$ having equal number of $a's$ and $bs$ defines a regular language $L(A^*B)\cap B$ gives the set $A$ None of the above
answer edited
in
Theory of Computation
May 3, 2018
8.0k
views
isro2018
theory-of-computation
regular-language
3
answers
2
ISRO2018-77
What is one advantage of setting up a $\text{DMZ}$ (Demilitarized Zone) with two firewalls? You can control where traffic goes in the three networks You can do statefull packet filtering You can do load balancing Improve network performance
answered
in
Computer Networks
May 1, 2018
4.0k
views
isro2018
computer-networks
network-security
firewall
3
answers
3
ISRO2018-75
ln neural network, the network capacity is defined as: The traffic (tarry capacity of the network The total number of nodes in the network The number of patterns that can be stored and recalled in a network None of the above
commented
in
Artificial Intelligence
Apr 30, 2018
2.6k
views
isro2018
non-gate
neural-network
2
answers
4
ISRO2018-73
For a multi-processor architecture, in which protocol a write transaction is forwarded to only those processors that are known to possess a copy of newly altered cache line? Snoopy bus protocol Cache coherency protocol Directory based protocol None of the above
commented
in
CO and Architecture
Apr 30, 2018
4.1k
views
isro2018
cache-memory
4
answers
5
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
commented
in
Computer Networks
Apr 30, 2018
14.2k
views
isro2018
computer-networks
network-security
cryptography
2
answers
6
ISRO2018-67
In multi-programmed systems, it is advantageous if some programs such as editors anf compilers can be shared by several users. Which of the following must be true of multi-programmed systems in order that a single copy of a program can be shared by several users? The program is a macro The program is recursive The program is reentrant I only II only III only I, II and III
answered
in
Operating System
Apr 30, 2018
3.2k
views
isro2018
operating-system
macros
6
answers
7
ISRO2018-60
What is the output of tho following program? main(){ int x=2, y=5; if(x<y) return (x=x+y); else printf("z1"); printf("z2"); } $z2$ $z1z2$ Compilation error None of these
commented
in
Programming in C
Apr 30, 2018
9.8k
views
isro2018
programming
output
3
answers
8
ISRO2018-49
in a file which contains $1$ million records and the order of the tree is $100$, then what is the maximum number of nodes to be accessed if $B$+ tree index is used? $5$ $4$ $3$ $10$
answered
in
Databases
Apr 26, 2018
10.0k
views
isro2018
databases
b-tree
3
answers
9
ISRO2018-46
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton) $\text{WELCOME TO NETWORK SECURITY!}$ $\text{WMEKREETSILTWETCOOCYONRU!}$ $\text{EETSICOOCYWMEKRONRU!LTWET}$ $\text{LTWETONRU!WMEKRCOOCYEETSI}$ $\text{ONRU!COOCYLTWETEETSIWMEKR}$
answered
in
Computer Networks
Apr 26, 2018
7.6k
views
isro2018
computer-networks
network-security
3
answers
10
ISRO2018-15
The domain of the function $\log (\log \sin(x))$ is: $0<x<$\pi$ $2n$\pi$<$x$<$(2n+1)$\pi$, for $n$ in $N$ Empty set None of the above
answer edited
in
Calculus
Apr 26, 2018
5.4k
views
isro2018
calculus
functions
3
answers
11
ISRO2018-32
A computer uses ternary system instead of the traditional systen, An $n$ bit string in the binary system will occupy $3+n$ ternary digits $2n/3$ ternary digits $n$\log_{2}3$ ternary digits $n$\log_{3}2$ ternary digits
answered
in
Digital Logic
Apr 24, 2018
4.2k
views
isro2018
digital-logic
number-representation
2
answers
12
ISRO2018-30
Which of the following comment about peep-hole optimization is true? It is applied to small part of the code and applied repeatedly It can be used to optimize intermediate code It can be applied to a portion of the code that is not contiguous It is applied in symbol table to optimize the memory requirements.
answered
in
Compiler Design
Apr 24, 2018
4.2k
views
isro2018
compiler-design
code-optimization
2
answers
13
ISRO2018-1
Consider the following program { int x=1; printf("%d",(*char(char*)&x)); } Assuming required header files are included and if the machine in which this program is executed is little endian, then the output will be 0 99999999 1 unpredictable
commented
in
Programming in C
Apr 23, 2018
8.4k
views
isro2018
programming
output
2
answers
14
ISRO2018-26
The $FSM$ (Finite State Machine) machine pictured in the figure above Complements a given bit pattern Finds $2's$ complement of a given bit pattern Increments a given bit pattern by $1$ Changes the sign bit
answered
in
Theory of Computation
Apr 23, 2018
7.0k
views
isro2018
finite-automata
theory-of-computation
2
answers
15
ISRO2018-13
The difference between a named pipe and a regular file in Unix is that Unlike a regular file, named pipe is a special file The data in a pipe is transient, unlike the content of a regular file Pipes forbid random accessing, while regular files do allow this. All of the above
answered
in
Operating System
Apr 23, 2018
3.7k
views
isro2018
operating-system
pipes
non-gate
1
answer
16
ISRO2018-10
Which of the following comparisons between static and dynamic type checking incorrect? Dynamic type checking slows down the execution Dynamic type checking offers more flexibility to the programmers In contrast to Static type checking, dynamic type checking may cause failure in runtime due to type errors Unlike static type checking dynamic type checking is done during compilation
commented
in
Programming in C
Apr 23, 2018
3.9k
views
isro2018
programming
semantic-analysis
3
answers
17
ISRO-DEC2017-71
A $32$-$bit$ adder is formed by cascading $4$-$bit$ CLA adder.The gate delays (latency) for getting the sum bits is $16$ $18$ $17$ $19$
commented
in
Digital Logic
Apr 20, 2018
6.9k
views
isrodec2017
1
answer
18
ISRO-DEC2017-37
A two-way set associative cache memory unit with a capacity of $16\, KB$ is built using a block size of $8\, words.$ The word length is $32-bits.$ The physical address space is $4\, GB.$ The number of bits in the TAG, SET fields are $20,7$ $19,8$ $20,8$ $21,9$
commented
in
CO and Architecture
Apr 20, 2018
2.3k
views
isrodec2017
cache-memory
4
answers
19
ISRO-DEC2017-15
Consider the following table: $\text{Faculty(facName, dept, office, rank, dateHired)}$ facName dept office rank dateHired Ravi Art A101 Professor 1975 Murali Math M201 Assistant 2000 Narayanan Art A101 Associate 1992 Lakshmi Math M201 Professor 1982 Mohan CSC C101 Professor 1980 Sreeni ... $Faculty$ is Not in 3NF,in BCNF In 3NF,not in BCNF In 3NF, in BCNF Not in 3NF, not in BCNF
commented
in
Databases
Apr 19, 2018
5.1k
views
isrodec2017
6
answers
20
ISRO-DEC2017-6
The proposition $(P\Rightarrow Q)\wedge (Q\Rightarrow P)$ is a Tautology Contradiction Contingency Absurdity
commented
in
Mathematical Logic
Apr 19, 2018
2.3k
views
isrodec2017
2
answers
21
ISRO-DEC2017-2
Consider the set of integers $I.$ Let $D$ denote "divides with an integer quotient" (e.g. $4D8$ but not $4D7$). Then $D$ is Reflexive, Not Symmetric, Transitive Not Reflexive, Not Anti-symmetric, Transitive Reflexive, Anti-symmetric, Transitive Not Reflexive, Not Anti-symmetric, Not Transitive
commented
in
Set Theory & Algebra
Apr 19, 2018
4.3k
views
isrodec2017
set-theory&algebra
relations
15
answers
22
GATE CSE 2007 | Question: 15, ISRO2016-26
Consider the following segment of C-code: int j, n; j = 1; while (j <= n) j = j * 2; The number of comparisons made in the execution of the loop for any $n > 0$ is: $\lceil \log_2n \rceil +1$ $n$ $\lceil \log_2n \rceil$ $\lfloor \log_2n \rfloor +1$
comment edited
in
Algorithms
Apr 18, 2018
36.7k
views
gatecse-2007
algorithms
time-complexity
normal
isro2016
2
answers
23
GATE IT 2004 | Question: 11, ISRO2011-33
What is the bit rate of a video terminal unit with $80$ characters/line, $8$ $\text{bits/character}$ and horizontal sweep time of $100$ $\text{µs}$ (including $20$ $\text{µs}$ of retrace time)? $8$ $\text{Mbps}$ $6.4$ $\text{Mbps}$ $0.8$ $\text{Mbps}$ $0.64$ $\text{Mbps}$
comment edited
in
Operating System
Apr 13, 2018
7.8k
views
gateit-2004
operating-system
io-handling
easy
isro2011
3
answers
24
How many DFA's exist with three states over the input alphabet {0,1}
Is there any procedure to generalize these types of problems ? Thanks in advance
commented
in
Theory of Computation
Mar 27, 2018
16.3k
views
theory-of-computation
combinatory
finite-automata
number-of-dfa
1
answer
25
Peterlinz question
Please write grammar for it and explain with example. $L=\{w \: : n_a(w) > n_b(w) \}$
answered
in
Theory of Computation
Mar 4, 2018
415
views
grammar
theory-of-computation
4
answers
26
GATE CSE 2018 | Question: 42
Consider the following four relational schemas. For each schema , all non-trivial functional dependencies are listed, The bolded attributes are the respective primary keys. $\text{Schema I:}$ Registration(rollno, courses) Field courses' is a set-valued attribute containing the ... $\text{Schema I}$ $\text{Schema II}$ $\text{Schema III}$ $\text{Schema IV}$
commented
in
Databases
Feb 25, 2018
11.6k
views
gatecse-2018
databases
database-normalization
normal
2-marks
3
answers
27
GATE CSE 2018 | Question: 39
In a system, there are three types of resources: $E, F$ and $G$. Four processes $P_0$, $P_1$, $P_2$ and $P_3$ execute concurrently. At the outset, the processes have declared their maximum resource requirements using a matrix named Max as given below. ... $safe$ state, but would be $safe$ if one more instance of $G$ were available
commented
in
Operating System
Feb 23, 2018
11.6k
views
gatecse-2018
operating-system
deadlock-prevention-avoidance-detection
normal
2-marks
9
answers
28
GATE CSE 2018 | Question: 22
Consider the sequential circuit shown in the figure, where both flip-flops used are positive edge-triggered $\text{D}$ flip-flops. The number of states in the state transition diagram of this circuit that have a transition back to the same state on some value of "in" is ____
commented
in
Digital Logic
Feb 22, 2018
22.9k
views
gatecse-2018
digital-logic
flip-flop
numerical-answers
normal
1-mark
1
answer
29
ISRO2009-49
$x=a \cos(t), y=b \sin(t)$ is the parametric form of Ellipse Hyperbola Circle Parabola
commented
in
Calculus
Feb 11, 2018
2.1k
views
isro2009
calculus
3
answers
30
ISRO2007-09
Eigen vectors of $\begin{bmatrix} 1 && \cos \theta \\ \cos \theta && 1 \end{bmatrix}$ are $\begin{bmatrix} a^n && 1 \\ 0 && a^n \end{bmatrix}$ $\begin{bmatrix} a^n && n \\ 0 && a^n \end{bmatrix}$ ... $\begin{bmatrix} a^n && na^{n-1} \\ -n && a^n \end{bmatrix}$
commented
in
Linear Algebra
Feb 8, 2018
4.0k
views
isro2007
linear-algebra
matrix
eigen-value
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
(3.5k)
Engineering Mathematics
(10.4k)
Digital Logic
(3.6k)
Programming and DS
(6.2k)
Algorithms
(4.8k)
Theory of Computation
(6.9k)
Compiler Design
(2.5k)
Operating System
(5.2k)
Databases
(4.8k)
CO and Architecture
(4.0k)
Computer Networks
(4.9k)
Artificial Intelligence
(79)
Machine Learning
(48)
Data Mining and Warehousing
(25)
Non GATE
(1.4k)
Others
(2.7k)
Admissions
(684)
Exam Queries
(1.6k)
Tier 1 Placement Questions
(17)
Job Queries
(80)
Projects
(11)
Unknown Category
(870)
64.3k
questions
77.9k
answers
244k
comments
80.0k
users
Recent Blog Comments
category ?
Hi @Arjun sir, I have obtained a score of 591 in ...
download here
Can you please tell about IIT-H mtech CSE self...
Please add your admission queries here:...