Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged nielit-scb-2020
1
vote
1
answer
61
NIELIT Scientist B 2020 November: 81
Debugger is a program that: Allows to examine and modify the contents of registers Allows to set breakpoints, execute a segment of program and display contents of register Does not allow execution of a segment of program All the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
292
views
nielit-scb-2020
1
vote
3
answers
62
NIELIT Scientist B 2020 November: 82
Which of the following techniques deals with sorting the data stored in the computer’s memory? Distribution sort Internal sort External sort Radix sort
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
639
views
nielit-scb-2020
0
votes
1
answer
63
NIELIT Scientist B 2020 November: 83
_____________ possible labels are allowed in the first level of generic domain. $10$ $12$ $16$ none of the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
348
views
nielit-scb-2020
6
votes
1
answer
64
NIELIT Scientist B 2020 November: 84
Given the truth table of a Binary Operation \$ as follows: $ ... hline \end{array}$ Identify the matching Boolean Expression. $X \$ \neg Y$ $\neg X \$ Y$ $\neg X \$ \neg Y$ none of the options
gatecse
asked
in
Mathematical Logic
Dec 9, 2020
by
gatecse
667
views
nielit-scb-2020
mathematical-logic
propositional-logic
discrete-mathematics
1
vote
1
answer
65
NIELIT Scientist B 2020 November: 85
If main memory access time is $400\;\mu s$, $TLB$ access time $50\;\mu s$, considering $TLB$ hit $90\%$, what wil be the overall access time? $800\;\mu s$ $490 \;\mu s$ $485\;\mu s$ $450\;\mu s$
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
366
views
nielit-scb-2020
2
votes
1
answer
66
NIELIT Scientist B 2020 November: 86
In an operating system, processes that are terminated but, for some reason must have its task structure in the process table are referred as __________. Zombies Orphans Parent Process Child Process
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
376
views
nielit-scb-2020
0
votes
1
answer
67
NIELIT Scientist B 2020 November: 87
Point out the wrong statement : Non-Relational databases require that schemas be defined before you can add data No SQL databases are built to allow the insertion of data without a predefined schema New SQL databases are built to allow the insertion of data without a predefined schema All of the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
2.7k
views
nielit-scb-2020
1
vote
1
answer
68
NIELIT Scientist B 2020 November: 88
In which modulation discrete values of carrier frequencies is used to transmit binary data? Phase Shift Keying Amplitude Shift Keying Frequency Shift Keying Disk Shift Keying
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
392
views
nielit-scb-2020
1
vote
1
answer
69
NIELIT Scientist B 2020 November: 89
$PI$ in $XML$ specification stands for ___________. priceless instruction processing instruction polymorphic inheritance primary instruction
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
300
views
nielit-scb-2020
1
vote
1
answer
70
NIELIT Scientist B 2020 November: 90
Which type of linked list stores the address of the header node in the next field of the last node? Singly linked list Circular linked list Doubly linked list Hashed list
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
633
views
nielit-scb-2020
0
votes
1
answer
71
NIELIT Scientist B 2020 November: 91
What is the advantage of bubble sort over other sorting techniques? It is faster Consumes less memory Detects whether the input is already sorted All of the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
439
views
nielit-scb-2020
0
votes
1
answer
72
NIELIT Scientist B 2020 November: 92
Match the following: ... $\text{1-d, 2-b, 3-a, 4-c}$ $\text{1-c, 2-a, 3-b, 4-d}$
gatecse
asked
in
IS&Software Engineering
Dec 9, 2020
by
gatecse
336
views
nielit-scb-2020
is&software-engineering
match-the-following
non-gate
0
votes
1
answer
73
NIELIT Scientist B 2020 November: 93
$\text{58000 LOC}$ gaming software is developed with effort of $3$ person-year. What is the productivity of person-month? $\text{1.9 KLOC}$ $\text{1.6 KLOC}$ $\text{4.8 KLOC}$ $\text{4.2 KLOC}$
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
877
views
nielit-scb-2020
0
votes
1
answer
74
NIELIT Scientist B 2020 November: 94
Which of the following tag is used intended for navigation in $HTML5?$ nav footer section navigation tag
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
302
views
nielit-scb-2020
0
votes
1
answer
75
NIELIT Scientist B 2020 November: 95
Which of the following is correct Content-Type header that a server side script should send for $SSE$ in $HTML5?$ Content-Type: text/event-stream Content-Type: text/application-stream Content-Type: text/data-stream None of the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
323
views
nielit-scb-2020
1
vote
4
answers
76
NIELIT Scientist B 2020 November: 96
An instance of relational schema $R(A,B,C)$ has distinct values of $A$ including $NULL$ values. Which one of the following is true? $A$ is a candidate key $A$ is not a candidate key $A$ is a primary key Both “$A$ is a candidate key” and “$A$ is a primary key”
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
635
views
nielit-scb-2020
1
vote
1
answer
77
NIELIT Scientist B 2020 November: 97
If $x, y, z$ are Boolean variable then $(x+\overline y)(x \cdot \overline y+x\cdot z)(\overline x\cdot \overline z+\overline y)$ is equal to : $x\cdot\overline y$ $x\cdot\overline y+z$ $x\cdot \overline z$ none of the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
322
views
nielit-scb-2020
0
votes
1
answer
78
NIELIT Scientist B 2020 November: 98
In the congestion avoidance algorithm, the size of the congestion window increases _________ until congestion is detected. Exponentially Additively Multiplicatively Suddenly
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
436
views
nielit-scb-2020
0
votes
1
answer
79
NIELIT Scientist B 2020 November: 99
Limitations of the $XML$ Data Type are: It cannot be compared or sorted. This means an $XML$ data type cannot be used in a $\text{GROUP BY}$ statement It cannot be used as a key column in an index The value() method of the $XML$ data type returns a scalar value, so it can be specified anywhere where scalar values are allowed All of the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
334
views
nielit-scb-2020
1
vote
1
answer
80
NIELIT Scientist B 2020 November: 100
Consider the algorithm that solves problems of size $n$ by recursively solving two sub problems of size $n-1$ and then combining the solutions in constant time. Then the running time of the algorithm would be: $O(n)$ $O(\log n)$ $O(n\log n)$ $O(n^2)$
gatecse
asked
in
Algorithms
Dec 9, 2020
by
gatecse
1.2k
views
nielit-scb-2020
time-complexity
1
vote
2
answers
81
NIELIT Scientist B 2020 November: 101
The program written for binary search, calculates the midpoint of the span as $\text{mid : =(Low+High)/2}$. The program works well if the number of elements in the list is small (about $32,000$) but it behaves abnormally when the number of elements is large. This can be ... $\text{mid :=(High-Low+1)/2}$ $\text{mid :=(High-Low)/2}$ $\text{mid :=(High+Low)/2}$
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
510
views
nielit-scb-2020
0
votes
2
answers
82
NIELIT Scientist B 2020 November: 102
_____________ has a feature of remote access through which a customer can access the data from anywhere and at any time with the help of internet connection. IaaS PaaS NaaS SaaS
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
418
views
nielit-scb-2020
0
votes
1
answer
83
NIELIT Scientist B 2020 November: 103
The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is: B-Tree File Hashed File Indexed File Sequential File
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
308
views
nielit-scb-2020
2
votes
1
answer
84
NIELIT Scientist B 2020 November: 104
Which table is used in $\text{MS DOS}$ for linked list allocation? $TLB$ Page Table $FAT$ Index Table
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
417
views
nielit-scb-2020
0
votes
1
answer
85
NIELIT Scientist B 2020 November: 105
Consider the basic $COCOMO$ model where $E$ is the effort applied in person-months, $D$ is the development time in chronological months, $KLOC$ is the estimated number of delivered lines of code (in thousands) and $a_b, b_b, c_b,d_b$ ... $E=a_b\; exp(d_b), D=c_b(KLOC) \;exp(b_b)$
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
325
views
nielit-scb-2020
0
votes
2
answers
86
NIELIT Scientist B 2020 November: 106
Suppose we have to insert the following sequence of keys into an empty binary search tree: $\text{5, 7, 45, 60, 50, 23, 15, 54}$ What would be the height of binary search tree? $3$ $4$ $5$ $6$
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
710
views
nielit-scb-2020
0
votes
1
answer
87
NIELIT Scientist B 2020 November: 107
Most NoSQL databases support automatic ___________ meaning that you get high availability and disaster recovery. Processing Scalability Replication All of the options
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
823
views
nielit-scb-2020
0
votes
1
answer
88
NIELIT Scientist B 2020 November: 108
___________ tells a firewall about how to reassemble a data stream that has been divided into packets. The source routing feature The number in the header’s identification field The destination $IP$ address The header checksum field in the packet header
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
479
views
nielit-scb-2020
0
votes
1
answer
89
NIELIT Scientist B 2020 November: 109
Consider a software project with the following information domain characteristic for calculation of function point metric. Number of external inputs $(I)=30$ Number of external output$(O)=60$ Number of external inquiries $(E)=23$ Number of files $(F)=08$ ... $4$. The computed value of function point metric is __________ $612.06$ $212.05$ $305.09$ $806.9$
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
407
views
nielit-scb-2020
1
vote
1
answer
90
NIELIT Scientist B 2020 November: 110
An attribute(s) that is used to look up for records in a file is called a: Function key Catalog key Access key Search key
gatecse
asked
in
Unknown Category
Dec 9, 2020
by
gatecse
340
views
nielit-scb-2020
Page:
« prev
1
2
3
4
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
(3.5k)
Engineering Mathematics
(10.4k)
Digital Logic
(3.6k)
Programming and DS
(6.2k)
Algorithms
(4.8k)
Theory of Computation
(6.9k)
Compiler Design
(2.5k)
Operating System
(5.2k)
Databases
(4.8k)
CO and Architecture
(4.0k)
Computer Networks
(4.9k)
Artificial Intelligence
(79)
Machine Learning
(48)
Data Mining and Warehousing
(25)
Non GATE
(1.4k)
Others
(2.7k)
Admissions
(684)
Exam Queries
(1.6k)
Tier 1 Placement Questions
(17)
Job Queries
(80)
Projects
(11)
Unknown Category
(870)
64.3k
questions
77.9k
answers
244k
comments
80.0k
users
Recent questions tagged nielit-scb-2020
Recent Blog Comments
category ?
Hi @Arjun sir, I have obtained a score of 591 in ...
download here
Can you please tell about IIT-H mtech CSE self...
Please add your admission queries here:...