Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Filter
User Desert_Warrior
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by Desert_Warrior
1
vote
1
answer
1
DS\Hashing
Consider a hash table of size seven, with starting index zero, and a hash function (3x + 4) mod 7. Assuming the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Note that denotes an empty location in the ... 8, 10, -, -, -, 3 (C) 1, -, -, -, -, -, 3 (D) 1, 10, 8, -, -, -, 3
asked
in
DS
Oct 9, 2016
2.6k
views
data-structures
hashing
5
votes
3
answers
2
ISRO2016-61
The extent to which the s/w can continue to operate correctly despite the introduction of invalid inputs is called as Reliability Robustness Fault tolerance Portability
asked
in
IS&Software Engineering
Jul 3, 2016
4.8k
views
is&software-engineering
isro2016
2
votes
2
answers
3
ISRO2016-62
Which one of the following is a functional requirement ? Maintainability Portability Robustness None of the mentioned
asked
in
IS&Software Engineering
Jul 3, 2016
13.7k
views
is&software-engineering
isro2016
6
votes
2
answers
4
ISRO2016-49
Working Set $(t,k)$ at an instant of time $t$ is the set of $k$ future references that the OS will make the set of future references that the OS will make in next $t$ unit of time the set of $k$ references with high frequency the $k$ set of pages that have been referenced in the last $t$ time units
asked
in
Operating System
Jul 3, 2016
6.3k
views
operating-system
page-replacement
isro2016
5
votes
2
answers
5
ISRO2016-39
Access time of the symbolic table will be logarithmic if it is implemented by Linear list Search tree Hash table Self organization list
asked
in
Algorithms
Jul 3, 2016
3.2k
views
isro2016
algorithms
symbol-table
10
votes
1
answer
6
ISRO2016-33
Let $L=\{w \in (0+1)^* \mid w \text{ has even number of 1's}\}$, i.e. $L$ is the set of all bit strings with even number of 1's. Which one of the regular expression below represents $L$? $(0^*10^*1)^*$ $0^*(10^*10^*)^*$ $0^*(10^*1^*)^*0^*$ $0^*1(10^*1)^*10^*$
asked
in
Theory of Computation
Jul 3, 2016
5.0k
views
theory-of-computation
regular-expression
isro2016
8
votes
2
answers
7
ISRO2016-32
AN FSM(finite state machine) can be considered to be a turing machine of finite tape length without rewinding capability and unidirectional tape movement rewinding capability and unidirectional tape movement without rewinding capability and bidirectional tape movement rewinding capability and bidirectional tape movement
asked
in
Theory of Computation
Jul 3, 2016
8.3k
views
theory-of-computation
isro2016
turing-machine
11
votes
4
answers
8
ISRO2016-11
The dynamic hazard problem occurs in combinational circuit alone sequential circuit only Both (a) and (b) None of the above
asked
in
Digital Logic
Jul 3, 2016
11.6k
views
isro2016
digital-logic
digital-circuits
hazards
5
votes
2
answers
9
ISRO2016-80
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called DNS lookup DNS hijacking DNS spoofing None of the mentioned
asked
in
Computer Networks
Jul 3, 2016
6.4k
views
isro2016
computer-networks
dns
5
votes
2
answers
10
ISRO2016-79
Which one of the following is correct about the statements given below? All function calls are resolved at compile time in C lang All function calls are resolved at compile time in C++ lang Only II is correct Both I and II are correct Only I is correct Both I and II are incorrect
asked
in
Programming in C
Jul 3, 2016
6.5k
views
isro2016
programming-in-c
4
votes
2
answers
11
ISRO2016-78
If a class $C$ is derived from class $B$, which is derived form class $A$, all through public inheritance, then a class $C$ member function can access only protected and public data of $C$ and $B$ Only protected and public data of $C$ all data of $C$ and private data of $A$ and $B$ public and protected data of $A$ and $B$ and all data of $C$
asked
in
Object Oriented Programming
Jul 3, 2016
7.1k
views
non-gate
object-oriented-programming
isro2016
5
votes
3
answers
12
ISRO2016-70
Which network protocol allows hosts to dynamically get a unique IP number on each bootup DHCP BOOTP RARP ARP
asked
in
Computer Networks
Jul 3, 2016
4.6k
views
isro2016
computer-networks
network-protocols
6
votes
2
answers
13
ISRO2016-69
In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called Preamble Postamble Jam None of these
asked
in
Computer Networks
Jul 3, 2016
5.2k
views
computer-networks
csma-cd
isro2016
6
votes
4
answers
14
ISRO2016-68
Dynamic routing protocol enable routers to Dynamically discover and maintain routes Distribute routing updates to other routers Reach agreement with other routers about the network topology All of the above
asked
in
Computer Networks
Jul 3, 2016
4.3k
views
isro2016
computer-networks
routing
1
vote
2
answers
15
ToC \ Reg Expression
Give a regular expression for L = {set of all strings in which number of a's are multiples of 3} ∑={a,b,c}
asked
in
Unknown Category
Jun 23, 2016
3.1k
views
theory-of-computation
regular-expression
0
votes
1
answer
16
C programming
"a healthy mind resides in a healthy body"
asked
in
Programming in C
Jun 17, 2016
655
views
programming-in-c
output
2
votes
2
answers
17
OS \ CPU sched
In which of the following scheduling policies does context switching never take place? A) Round-robin B) Shortest job first C) Pre-emptive D) All of the above
asked
in
Operating System
Jun 15, 2016
4.8k
views
operating-system
process-scheduling
1
vote
1
answer
18
Aptitude \ Profit and loss
By selling an article for 816, a shopkeeper incurs a loss of 20%. At what price should he sell the article so as to gain 10%? 1020 1122 1120
asked
in
Quantitative Aptitude
Jun 15, 2016
2.0k
views
quantitative-aptitude
0
votes
1
answer
19
Aptitude
asked
in
Quantitative Aptitude
Jun 14, 2016
314
views
quantitative-aptitude
1
vote
1
answer
20
Aptitude
If a patient does not receive treatment for a certain injury within 2 hours after injury, the patient’s chance of survival starts decreasing by 15% each hour. If no treatment has been given within 4 hours after injury, roughly, what chance of survival will the patient have? 77% 70% 75% 72%
asked
in
Quantitative Aptitude
Jun 14, 2016
333
views
quantitative-aptitude
Page:
1
2
3
4
5
6
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
(3.5k)
Engineering Mathematics
(10.4k)
Digital Logic
(3.6k)
Programming and DS
(6.2k)
Algorithms
(4.8k)
Theory of Computation
(6.9k)
Compiler Design
(2.5k)
Operating System
(5.2k)
Databases
(4.8k)
CO and Architecture
(4.0k)
Computer Networks
(4.9k)
Artificial Intelligence
(79)
Machine Learning
(48)
Data Mining and Warehousing
(25)
Non GATE
(1.4k)
Others
(2.7k)
Admissions
(684)
Exam Queries
(1.6k)
Tier 1 Placement Questions
(17)
Job Queries
(80)
Projects
(11)
Unknown Category
(870)
64.3k
questions
77.9k
answers
244k
comments
80.0k
users
Recent Blog Comments
category ?
Hi @Arjun sir, I have obtained a score of 591 in ...
download here
Can you please tell about IIT-H mtech CSE self...
Please add your admission queries here:...