GATE 2010 CSE Computer Science and information technology

[Q1 – Q25 carry ONE mark each ]

Q1➡ | Engineering Mathematics
Let G = (V,E) be a graph. Define ξ(G) = , where id is the number of vertices of degree d in G. If S and T are two different trees with ξ(S) = ξ(T),then
i ➥ |S| = 2|T|
ii ➥ |S| = |T| – 1
iii ➥ |S| = |T|
iv ➥ |S| = |T| + 1

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Graph Theory Help-Line

Q2➡ | Engineering Mathematics
Newton-Raphson method is used to compute a root of the equation x2 – 13 = 0 with 3.5 as the initial value. The approximation after one iteration is
i ➥ 3.575
ii ➥ 3.676
iii ➥ 3.667
iv ➥ 3.607

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube Newton-Raphson methodHelp-Line

Q3➡ | Engineering Mathematics
What is the possible number of reflexive relations on a set of 5 elements?
i ➥ 210
ii ➥ 215
iii ➥ 220
iv ➥ 225

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Set Theory Help-Line

Q4➡ | Engineering Mathematics
Consider the set S = {1, ω, ω2}, where ω and ω2 are cube roots of unity. If * denotes the multiplication operation, the structure (S,*) forms
i ➥ A group
ii ➥ A ring
iii ➥ An integral domain
iv ➥ A field

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Set Theory Help-Line

Q5➡ | Engineering-Mathematics
What is the value of
i ➥ 0
ii ➥ e-2
iii ➥ e-1/2
iv ➥ 1

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Calculus Help-Line

Q6➡ | Digital Logic Design
The minterm expansion of f(P,Q,R) = PQ +QR’ +PR’ is.
i ➥ m2+m4+m6+m7
ii ➥ m0+m1+m3+m5
iii ➥ m0+m1+m6+m7
iv ➥ m2+m3+m4+m5

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Boolean AlgebraHelp-Line

Q7➡ | Digital Logic Design
A main memory unit with a capacity of 4 megabytes is built using 1M 1-bit DRAM chips. Each DRAM chip has 1K rows of cells with 1K cells in each row. The time taken for a single refresh operation is 100 nanoseconds. The time required to perform one refresh operation on all the cells in the memory unit is
i ➥ 100 nanoseconds
ii ➥ 100*210 nanoseconds
iii ➥ 100*220 nanoseconds
iv ➥ 3200*220 nanoseconds

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Main MemoryHelp-Line

Q8➡ | Digital Logic Design
P is a 16-bit signed integer. The 2’s complement representation of P is (F87B)16. The 2’s complement representation of 8*P is
i ➥ (C3D8)16
ii ➥ (187B)16
iii ➥ (F878)16
iv ➥ (987B)16

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Number SystemHelp-Line

Q9➡ | Digital Logic Design
The Boolean expression for the output ‘f’ of the multiplexer shown below.
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube MultiplexerHelp-Line

Q10➡ | Data Structures
In a binary tree with n nodes, every node has an odd number of descendants. Every node is considered to be its own descendant. What is the number of nodes in the tree that have exactly one child?
i ➥ 0
ii ➥ 1
iii ➥ (n-1)/2
iv ➥ n-1

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More Discussion Explanation On YouTubeBinary TreesHelp-Line

Q11➡ | Programming
What does the following program print?
i ➥ 2 2
ii ➥ 2 1
iii ➥ 0 1
iv ➥ 0 2

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More Discussion Explanation On YouTube ProgramHelp-Line

Q12➡ | Algorithms
Two alternative packages A and B are available for processing a database having 10k records. Package A requires 0.0001n2 time units and package B requires 10nlog10n time units to process n records.What is the smallest value of k for which package B will be preferred over A?
i ➥ 12
ii ➥ 10
iii ➥ 6
iv ➥ 5

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More Discussion Explanation On YouTube Time ComplexityHelp-Line

Q13➡ | Compiler Design
Which data structure in a compiler is used for managing information about variables and their attributes?
i ➥ Abstract syntax tree
ii ➥ Symbol table
iii ➥ Semantic stack
iv ➥ Parse Table

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More Discussion Explanation On YouTubeData StructureHelp-Line

Q14➡ | Compiler Design
Which languages necessarily need heap allocation in the runtime environment?
i ➥ Those that support recursion
ii ➥ Those that use dynamic scoping
iii ➥ Those that allow dynamic data structures
iv ➥ Those that use global variables

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Heap allocation Help-Line

Q15➡ | Computer Network
Which one of the following is not a client server application?
i ➥ Internet chat
ii ➥ Web browsing
iii ➥ E-mail
iv ➥ ping

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube client server applicationHelp-Line

Q16➡ | Computer Network
One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field?
i ➥ It can be used to prioritize packets
ii ➥ It can be used to reduce delays
iii ➥ It can be used to optimize throughput
iv ➥ It can be used to prevent packet looping

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeIP Packet Help-Line

Q17➡ | Theory-of-Computation
Let L1 be a recursive language. Let L2 and L3 be languages that are recursively enumerable but not recursive. Which of the following statements is not necessarily true?
i ➥ L2 – L1 is recursively enumerable
ii ➥ L1 – L3 is recursively enumerable
iii ➥ L2 ∩ L1 is recursively enumerable
iv ➥ L2 ∪ L1 is recursively enumerable

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube recursively enumerable Help-Line

Q18➡ | Database Management System
Consider a B+-tree in which the maximum number of keys in a node is 5. What is the minimum number of keys in any non-root node?
i ➥ 1
ii ➥ 2
iii ➥ 3
iv ➥ 4

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube B+-Tree Help-Line

Q19➡ | Database Management System
A relational schema for a train reservation database is given below. Passenger (pid, pname, age) Reservation (pid, class, tid)

What pids are returned by the following SQL query for the above instance of the tables?
SLECT pid
FROM Reservation ,
WHERE class ‘AC’ AND
EXISTS (SELECT * FROM Passenger WHERE age > 65 AND Passenger. pid = Reservation.pid)
i ➥ 1,0
ii ➥ 1,2
iii ➥ 1,3
iv ➥ 1,5

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSQLHelp-Line

Q20➡ | Database Management System
Which of the following concurrency control protocols ensure both conflict serializability and freedom from deadlock?
I. 2-phase locking
II. TIme-stamp ordering
i ➥ I only
ii ➥ II only
iii ➥ Both I and II
iv ➥ Neither I nor II

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransactionsHelp-Line

Q21➡ | Software Engineering
The cyclomatic complexity of each of the modules A and B shown below is 10. What is the cyclomatic complexity of the sequential integration shown on the right hand using
i ➥ 19
ii ➥ 21
iii ➥ 20
iv ➥ 10

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube cyclomatic complexity Help-Line

Q22➡ | Software Engineering
What is the appropriate pairing of items in the two columns listing various activities encountered in a software life cycle?
i ➥ P-3, Q-2, R-4, S-1
ii ➥ P-2, Q-3, R-1, S-4
iii ➥ P-3, Q-2, R-1, S-4
iv ➥ P-2, Q-3, R-4, S-1

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubesoftware life cycle Help-Line

Q23➡ | Operating Systems
Consider the methods used by processes P1 and P2 for accessing their critical sections whenever needed, as given below. The initial values of shared boolean variables S1 and S2 are randomly assigned.

Which one of the following statements describes the properties achieved?
i ➥ Mutual exclusion but not progress
ii ➥ Progress but not mutual exclusion
iii ➥ Neither mutual exclusion nor progress
iv ➥ Both mutual exclusion and progress

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProcess SynchronizationHelp-Line

Q24➡ | Operating Systems
A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded to begin with. The system first accesses 100 distinct pages in some order and then accesses the same 100 pages but now in the reverse order. How many page faults will occur?
i ➥ 196
ii ➥ 192
iii ➥ 197
iv ➥ 195

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Page ReplacementHelp-Line

Q25➡ | Operating-Systems
Which of the following statements are true?
I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time
i ➥ I only
ii ➥ I and III only
iii ➥ II and III only
iv ➥ I, II and III

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Process-SchedulingHelp-Line

[Q26 – Q55 carry TWO mark each ]

Q26➡ | Engineering Mathematics
Consider a company that assembles computers. The probability of a faulty assembly of any computer is p. The company therefore subjects each computer to a testing process. This testing process gives the correct result for any computer with a probability of q. What is the probability of a computer being declared faulty?
i ➥ pq + (1 – p)(1 – q)
ii ➥ (1 – q)p
iii ➥ (1 – p)q
iv ➥ pq

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube ProbabilityHelp-Line

Q27➡ | Engineering Mathematics
What is the probability that divisor of 1099 is a multiple of 1096?
i ➥ 1/625
ii ➥ 4/625
iii ➥ 12/625
iv ➥ 16/625

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube ProbabilityHelp-Line

Q28➡ | Engineering Mathematics
The degree sequence of a simple graph is the sequence of the degrees of the nodes in the graph in decreasing order. Which of the following sequences can not be the degree sequence of any graph?
(I) 7, 6, 5, 4, 4, 3, 2, 1
(II) 6, 6, 6, 6, 3, 3, 2, 2
(III) 7, 6, 6, 4, 4, 3, 2, 2
(IV) 8, 7, 7, 6, 4, 2, 1, 1
i ➥ I and II
ii ➥ III and IV
iii ➥ IV only
iv ➥ II and IV

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraph TheoryHelp-Line

Q29➡ | Engineering Mathematics
Consider the following matrix If the eigenvalues of A are 4 and 8, then
i ➥ x=4, y=10
ii ➥ x=5, y=8
iii ➥ x=-3, y=9
iv ➥ x=-4, y=10

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLinear AlgebraHelp-Line

Q30➡ | Engineering Mathematics
Suppose the predicate F(x, y, t) is used to represent the statement that person x can fool person y at time t. Which one of the statements below expresses best the meaning of the formula ∀x∃y∃t(¬F(x, y, t))?
i ➥ Everyone can fool some person at some time
ii ➥ No one can fool everyone all the time
iii ➥ Everyone cannot fool some person all the time
iv ➥ No one can fool some person at some time

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Propositional Logic Help-Line

Q31➡ | Digital Logic Design
What is the Boolean expression for the output f of the combinational logic circuit of NOR gates given below?
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Logic GatesHelp-Line

Q32➡ | Digital Logic Design
In the sequential circuit shown below,if the initial value of the output Q1Q0 is 00,what are the next four values of Q1Q0?
i ➥ 11, 10, 01, 00
ii ➥ 10, 11, 01, 00
iii ➥ 10, 00, 01, 11
iv ➥ 11, 10, 00, 01

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSequential CircuitsHelp-Line

Q33➡ | Computer Organization
A 5-stage pipelined processor has Instruction Fetch(IF),Instruction Decode(ID),Operand Fetch(OF),Perform Operation(PO)and Write Operand(WO)stages.The IF,ID,OF and WO stages take 1 clock cycle each for any instruction.The PO stage takes 1 clock cycle for ADD and SUB instructions,3 clock cycles for MUL instruction,and 6 clock cycles for DIV instruction respectively.Operand forwarding is used in the pipeline.What is the number of clock cycles needed to execute the following sequence of instructions?
i ➥ 13
ii ➥ 15
iii ➥ 17
iv ➥ 19

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubePipe liningHelp-Line

Q34➡ | Algorithms
The weight of a sequence a0, a1, …, an-1 of real numbers is defined as a0+a1/2+…+ an-1/2n-1. A sub-sequence of a sequence is obtained by deleting some elements from the sequence, keeping the order of the remaining elements the same. Let X denote the maximum possible weight of a sub-sequence of a0, a1, …,an-1 and Y the maximum possible weight of a sub-sequence of a1, a2, …, an-1. Then X is equal to
i ➥ max(Y, a0+Y)
ii ➥ max(Y, a0 +Y/2)
iii ➥ max(Y, a0 +2Y)
iv ➥ a0 +Y/2

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Dynamic Programming Help-Line

Q35➡ | Programming
What is the value printed by the following c program
i ➥ -9
ii ➥ 5
iii ➥ 15
iv ➥ 19

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube C programHelp-Line

Q36➡ | Data Structure
The following C function takes a simply-linked list as input argument. It modifies the list by moving the last element to the front of the list and returns the modified list. Some part of the code is left blank.
i ➥ q = NULL; p→next = head; head = p;
ii ➥ q→next = NULL; head = p; p→next = head;
iii ➥ head = p; p→next = q; q→next = NULL;
iv ➥ q→next = NULL; p→next = head; head = p;

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube LinedlistHelp-Line

Q37➡ | Computer Organization
The program below uses six temporary variables a, b, c, d, e, f.
a = 1
b = 10
c = 20
d = a+b
e = c+d
f = c+e
b = c+e
e = b+f
d = 5+e
return d+f
Assuming that all operations take their operands from registers, what is the minimum number of registers needed to execute this program without spilling?
i ➥ 2
ii ➥ 3
iii ➥ 4
iv ➥ 6

Show Answer With Best Explanation

Answer:
Explanation: Upload Soon

More DiscussionExplanation On YouTube Register AllocationHelp-Line

Q38➡ | Compiler Design
The grammar S → aSa|bS|c is
i ➥ LL(1) but not LR(1)
ii ➥ LR(1) but not LR(1)
iii ➥ Both LL(1) and LR(1)
iv ➥ Neither LL(1) nor LR(1)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeParsersHelp-Line

Q39➡ | Theory of Computation
Let L = {w ∈ (0 + 1)* | w has even number of 1s}, i.e. L is the set of all bit strings with even number of 1s. Which one of the regular expression below represents L?
i ➥ (0 * 10 * 1)*
ii ➥ 0 * (10 * 10*)*
iii ➥ 0*(10 * 1*)*0*
iv ➥ 0 * 1(10 * 1)*10*

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRegular ExpressionsHelp-Line

Q40➡ | Theory of Computation
Consider the languages L1 = {0i1j | i != j}. L2 = {0i1j | i = j}. L3 = {0i1j | i = 2j+1}. L4 = {0i1j | i != 2j}. Which one of the following statements is true?
i ➥ Only L2 is context free
ii ➥ Only L2 and L3 are context free
iii ➥ Only L1 and L2 are context free
iv ➥ All are context free

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeContext Free LanguageHelp-Line

Q41➡ | Theory of Computation
Let w be any string of length n is {0, 1}*. Let L be the set of all sub-strings of w. What is the minimum number of states in a non-deterministic finite automaton that accepts L?
i ➥ n-1
ii ➥ n
iii ➥ n+1
iv ➥ 2n-1

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFinite AutomataHelp-Line

Q42➡ | Database Management System
Consider the following schedule for transactions T1, T2 and T3:

Which one of the schedules below is the correct serialization of the above?
i ➥ T1 → T3 → T2
ii ➥ T2 → T1 → T3
iii ➥ T2 → T3 → T1
iv ➥ T3 → T1 → T2

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransactionsHelp-Line

Q43➡ | Database Management System
Which of the following functional dependencies hold for relations R(A, B, C) and S(B, D, E):
B -> A
A -> C

The relation R contains 200 tuples and the relation S contains 100 tuples. What is the maximum number of tuples possible in the natural join (R⋈S) ?
i ➥ 100
ii ➥ 200
iii ➥ 300
iv ➥ 2000

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRelational AlgebraHelp-Line

Q44➡ | Programming
The following program is to be tested for statement coverage:
begin
if (a== b) {S1; exit;}
else if (c== d) {S2;]
else {S3; exit;}
S4;
end
The test cases T1, T2, T3 and T4 given below are expressed in terms of the properties satisfied by the values of variables a, b, c and d. The exact values are not given.
T1 : a, b, c and d are all equal
T2 : a, b, c and d are all distinct
T3 : a = b and c != d
T4 : a != b and c = d
Which of the test suites given below ensures coverage of statements S1, S2, S3 and S4?
i ➥ T1, T2, T3
ii ➥ T2, T4
iii ➥ T3, T4
iv ➥ T1, T2, T4

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProgramming ConceptsHelp-Line

Q45➡ | Operating Systems
The following program consists of 3 concurrent processes and 3 binary semaphores.The semaphores are initialized as S0 = 1, S1 = 0, S2 = 0.

How many times will process P0 print ‘0’?
i ➥ At least twice
ii ➥ Exactly twice
iii ➥ Exactly thrice
iv ➥ Exactly once

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Process SynchronizationHelp-Line

Q46➡ | Operating Systems
A system has n resources R0,…,Rn-1,and k processes P0,….Pk-1.The implementation of the resource request logic of each process Pi is as follows:
if (i % 2 == 0)
{
if (i < n) request Ri
if (i+2 < n) request Ri+2
}
else
{
if (i < n) request Rn-i
if (i+2 < n) request Rn-i-2
}
In which one of the following situations is a deadlock possible?
i ➥ n = 40, k = 26
ii ➥ n = 21, k = 12
iii ➥ n = 20, k = 10
iv ➥ n = 41, k = 19

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDeadlockHelp-Line

Q47➡ | Computer Network
Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same net mask N. Which of the values of N given below should not be used if A and B should belong to the same network?
i ➥ 255.255.255.0
ii ➥ 255.255.255.128
iii ➥ 255.255.255.192
iv ➥ 255.255.255.224

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeIP AddressHelp-Line

Q48➡ | Computer Organization
A computer system has an L1 cache, aL2 cache, and a main memory unit connected as shown below. The block size in L1 caches is 4 words. The size in L2 cache is 16 words. The memory access times are 2 nanoseconds. 20 nanoseconds and 200 nanoseconds for L1 cache, L2 cache and main memory unit respectively.

When there is a miss in L1 caches and a hit in L2 cache, a block is transferred from L2 cache to L1 cache, what is the time taken for this transfer ?
i ➥ 2 nanoseconds
ii ➥ 20 nanoseconds
iii ➥ 22 nanoseconds
iv ➥ 88 nanoseconds

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMemory HierarchyHelp-Line

Q49➡ | Computer Organization
A computer system has an L1 cache, aL2 cache, and a main memory unit connected as shown below. The block size in L1 caches is 4 words. The size in L2 cache is 16 words. The memory access times are 2 nanoseconds. 20 nanoseconds and 200 nanoseconds for L1 cache, L2 cache and main memory unit respectively.

When there is a miss in L1 cache and a hit in L2 cache, a block is transferred from L2 cache to L1 cache. What is the time taken for these transfer?
i ➥ 222 nanoseconds
ii ➥ 888 nanoseconds
iii ➥ 902 nanoseconds
iv ➥ 968 nanoseconds

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMemory HierarchyHelp-Line

Q50➡ | Algorithms
Consider a compelete undirected graph with vertex set {0,1,2,3,4} entry Wij in the matrix W below is the weight of the edge{i, j}

What is the minimum possible weight of a spanning tree T in this graph such that vertex O is leaf node in the tree T?
i ➥ 7
ii ➥ 8
iii ➥ 9
iv ➥ 10

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSpaning TreeHelp-Line

Q51➡ | Algorithms
Consider a complete undirected graph with vertex set {0, 1, 2, 3, 4}. Entry Wij in the matrix W below is
the weight of the edge {i, j}.

What is the minimum possible weight of a spanning tree T in this graph such that vertex 0 is a leaf node in the tree T?
i ➥ 7
ii ➥ 8
iii ➥ 9
iv ➥ 10

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSpanning TreeHelp-Line

Q52➡ | Data Structures
A hash table of length 10 uses open addressing with hash function h(k)=k mod 10, and linear probing.
After inserting 6 values into an empty hash table, the table is as shown below.

How many different insertion sequences of the key values using the same hash function and linear probing will result in the hash table shown above?
i ➥ 10
ii ➥ 20
iii ➥ 30
iv ➥ 40

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Hashing Help-Line

Q53➡ | Data Strucuture
A hash table of length 10 uses open addressing with hash function h(k)=k mod 10, and linear probing.
After inserting 6 values into an empty hash table, the table is as shown below.

Which one of the following choice gives a possible order in which the key values could have been inserted in the table?
i ➥ 46, 42, 34, 52, 23, 33
ii ➥ 34, 42, 23, 52, 33, 46
iii ➥ 46, 34, 42, 23, 52, 33
iv ➥ 42, 46, 33, 23, 34, 52

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube HashingHelp-Line

Q54➡ | Computer Network
Consider a network with 6 routers R1 to R6 connected with links having weights as shown in the following diagram:


All the routers use the distance vector based routing algorithm to update their routing tables. Each router starts with its routing table initialized to contain an entry for each neighbor with the weight of the respective connecting link. After all the routing tables stabilize, how many links in the network will never be used for carrying any data?
i ➥ 4
ii ➥ 3
iii ➥ 2
iv ➥ 1

Show Answer With Best Explanation

Answer:
Explanation: Upload Soon

More DiscussionExplanation On YouTube RoutingHelp-Line

Q55➡ | Computer Network
Consider a network with 6 routers R1 to R6 connected with links having weights as shown in the following diagram:


Suppose the weights of all unused links are changed to 2 and the distance vector algorithm is used again until all routing tables stabilize. How many links will now remain unused?
i ➥ 0
ii ➥ 1
iii ➥ 2
iv ➥ 3

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube RoutingHelp-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?