GATE 2012 CSE Computer Science and information technology

[Q1 – Q25 carry ONE mark each ]

Q1➡ | Engineering Mathematics
Consider the following logical inferences.
I1:
If it rains then the cricket match will not be played.
The cricket match was played.
Inference: There was no rain.

I2:
If it rains then the cricket match will not be played.
It did not rain.
Inference: The cricket match was played.

Which of the following is TRUE?
i ➥ Both I1 and I2 are correct inferences
ii ➥ I1 is correct but I2 is not a correct inference
iii ➥ I1 is not correct but I2 is a correct inference
iv ➥ Both I1 and I2 are not correct inferences

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Propositional Logic Help-Line

Q2➡ | Database Management System
Which of the following is TRUE?
i ➥ Every relation in 3NF is also in BCNF
ii ➥ A relation R is in 3NF if every non-prime attribute of R is fully functionally dependent on every key of R
iii ➥ Every relation in BCNF is also in 3NF
iv ➥ No relation can be in both BCNF and 3NF

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Normalization Help-Line

Q3➡ | Programming
What will be the output of the following C program segment?
char inchar = 'A';
switch (inchar)
{
case 'A' :
printf ("choice A n") ;
case 'B' :
printf ("choice B ") ;
case 'C' :
case 'D' :
case 'E' :
default:
printf ("No Choice") ;
}
i ➥ No Choice
ii ➥ Choice A
iii ➥ Choice A
Choice B No Choice
iv ➥ Program gives no output as it is erroneous

Show Answer With Best Explanation

Answer: Marks to All
Explanation: Upload Soon

More DiscussionExplanation On YouTube Switch Statement Help-Line

Q4➡ | Algorithms
Assuming P ≠ NP, which of the following is TRUE?
i ➥ NP-complete = NP
ii ➥ NP-complete ∩ P = ∅
iii ➥ NP-hard = NP
iv ➥ P = NP-complete

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Complexity Class Help-Line

Q5➡ | Data Structures
The worst case running time to search for an element in a balanced binary search tree with n2n elements is
i ➥ Θ (n log n)
ii ➥ Θ (n2n)
iii ➥ Θ (n)
iv ➥ Θ (log n)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Tree Help-Line

Q6➡ | Digital Logic Design
The truth table

represents the Boolean function
i ➥ X
ii ➥ X + Y
iii ➥ X ⊕ Y
iv ➥ Y

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Boolean Algebra Help-Line

Q7➡ | Digital Logic Design
The decimal value 0.5 in IEEE single precision floating point representation has
i ➥ fraction bits of 000…000 and exponent value of 0
ii ➥ fraction bits of 000…000 and exponent value of −1
iii ➥ fraction bits of 100…000 and exponent value of 0
iv ➥ no exact representation

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Number System Help-Line

Q8➡ | Operating Systems
A process executes the code
fork();
fork();
fork();
The total number of child processes created is
i ➥ 3
ii ➥ 4
iii ➥ 7
iv ➥ 8

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube fork System call Help-Line

Q9➡ | Engineering Mathematics
Consider the function f(x) = sin(x) in the interval x ∈ [π/4, 7π/4]. The number and location(s) of the local minima of this function are
i ➥ One, at π/2
ii ➥ One, at 3π/2
iii ➥ Two, at π/2 and 3π/2
iv ➥ Two, at π/4 and 3π/2

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube Calculus Help-Line

Q10➡ | Computer Network
The protocol data unit (PDU) for the application layer in the Internet stack is
i ➥ Segment
ii ➥ Datagram
iii ➥ Message
iv ➥ Frame

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More Discussion Explanation On YouTube Application Layer Help-Line

Q11➡ | Engineering Mathematics
Let A be the 2×2 matrix with elements a11 = a12 = a21 = +1 and a22 = -1. Then the eigenvalues of the matrix A19 are
i ➥ 1024 and -1024
ii ➥ 1024√2 and -1024√2
iii ➥ 4√2 and -4√2
iv ➥ 512√2 and -512√2

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More Discussion Explanation On YouTube Linear Algebra Help-Line

Q12➡ | Theory of Computation
What is the complement of the language accepted by the NFA shown below?
Assume Σ={a} and ε is the empty string.
i ➥
ii ➥ {ε}
iii ➥ a*
iv ➥ {a ,ε}

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More Discussion Explanation On YouTube Finite Automata Help-Line

Q13➡ | Engineering Mathematics
What is the correct translation of the following statement into mathematical logic?
“Some real numbers are rational”
i ➥ ∃x (real(x) ∨ rational(x))
ii ➥ ∀x (real(x) → rational(x))
iii ➥ ∃x (real(x) ∧ rational(x))
iv ➥ ∃x (rational(x) → real(x))

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More Discussion Explanation On YouTube Propositional Logic Help-Line

Q14➡ | Database Management System
Given the basic ER and relational models, which of the following is INCORRECT?
i ➥ An attribute of an entity can have more than one value
ii ➥ An attribute of an entity can be composite
iii ➥ In a row of a relational table, an attribute can have more than one value
iv ➥ In a row of a relational table, an attribute can have exactly one value or a NULL value

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRelational Model Help-Line

Q15➡ | Database Management System
Which of the following statements are TRUE about an SQL query?
P:An SQL query can contain a HAVING clause even if it does not have a GROUP BY clause.
Q:An SQL query can contain a HAVING clause even if it has a GROUP BY clause.
R: All attributes used in the GROUP BY clause must appear in the SELECT clause.
S: Not all attributes used in the GROUP BY clause need to appear in the SELECT clause
i ➥ P and R
ii ➥ P and S
iii ➥ Q and R
iv ➥ Q and S

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSQL Help-Line

Q16➡ | Algorithm
The recurrence relation capturing the optimal execution time of the Towers of Hanoi problem with n discs is
i ➥ T(n) = 2T(n – 2) + 2
ii ➥ T(n) = 2T(n – 1) + n
iii ➥ T(n) = 2T(n/2) + 1
iv ➥ T(n) = 2T(n – 1) + 1

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRecursion Help-Line

Q17➡ | Engineering Mathematics
Let G be a simple undirected planar graph on 10 vertices with 15 edges. If G is a connected graph, then the number of bounded faces in any embedding of G on the plane is equal to
i ➥ 3
ii ➥ 4
iii ➥ 5
iv ➥ 6

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraph Theory Help-Line

Q18➡ | Algorithms
Let W(n) and A(n) denote respectively, the worst case and average case running time of an algorithm executed on an input of size n. Which of the following is ALWAYS TRUE?
i ➥ A(n) = Ω (W(n))
ii ➥ A(n) = Θ (W(n))
iii ➥ A(n) = O (W(n))
iv ➥ A(n) = o (W(n))

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTime Complexity Help-Line

Q19➡ | Digital Logic Design
The amount of ROM needed to implement a 4 bit multiplier is
i ➥ 64 bits
ii ➥ 128 bits
iii ➥ 1 Kbits
iv ➥ 2 Kbits

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCombinational Circuits Help-Line

Q20➡ | Computer Organization
Register renaming is done in pipelined processors
i ➥ as an alternative to register allocation at compile time
ii ➥ for efficient access to function parameters and local variables
iii ➥ to handle certain kinds of hazards
iv ➥ as part of address translation

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubePipelining Help-Line

Q21➡ | Engineering Mathematics
Consider a random variable X that takes values +1 and −1 with probability 0.5 each. The values of the cumulative distribution function F(x) at x = −1 and +1 are
i ➥ 0 and 0.5
ii ➥ 0 and 1
iii ➥ 0.5 and 1
iv ➥ 0.25 and 0.75

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProbability Help-Line

Q22➡ | Computer Network
Which of the following transport layer protocols is used to support electronic mail?
i ➥ SMTP
ii ➥ IP
iii ➥ TCP
iv ➥ UDP

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransport Layer Protocols Help-Line

Q23➡ | Computer Network
In the IPv4 addressing format, the number of networks allowed under Class C addresses is
i ➥ 214
ii ➥ 27
iii ➥ 221
iv ➥ 224

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeIP Address Help-Line

Q24➡ | Theory of Computation
Which of the following problems are decidable?
1) Does a given program ever produce an output?
2) If L is a context-free language, then, is L’ also context-free?
3) If L is a regular language, then, is L’ also regular?
4) If L is a recursive language, then, is L’ also recursive?
i ➥ 1, 2, 3, 4
ii ➥ 1, 2
iii ➥ 2, 3, 4
iv ➥ 3, 4

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube Decidability Help-Line

Q25➡ | Theory of Computation
Given the language L ={ab,aa,baa}, which of the following strings are in L* ?
1) abaabaaabaa
2) aaaabaaaa
3) baaaaabaaaab
4) baaaaabaa
i ➥ 1, 2 and 3
ii ➥ 2, 3 and 4
iii ➥ 1, 2 and 4
iv ➥ 1, 3 and 4

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Regular Language Help-Line

[Q26 – Q55 carry TWO mark each ]

Q26➡ | Engineering Mathematics
Which of the following graphs is isomorphic to
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Graph Theory Help-Line

Q27➡ | Database Management System
Consider the following transactions with data items P and Q initialized to zero:
T1:
read (P) ;
read (Q) ;
if P = 0 then Q : = Q + 1 ;
write (Q) ;

T2: read (Q) ;
read (P) ;
if Q = 0 then P : = P + 1 ;
write (P) ;

Any non-serial interleaving of T1 and T2 for concurrent execution leads to
i ➥ a serializable schedule
ii ➥ a schedule that is not conflict serializable
iii ➥ a conflict serializable schedule
iv ➥ a schedule for which a precedence graph cannot be drawn

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Transaction ManagementHelp-Line

Q28➡ | Computer Organization
The bisection method is applied to compute a zero of the function f(x) = x4 – x3 – x2 – 4 in the interval [1,9]. The method converges to a solution after ______ iterations.
i ➥ 1
ii ➥ 3
iii ➥ 5
iv ➥ 7

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNumerical Method Help-Line

Q29➡ | Algorithms
Let G be a weighted graph with edge weights greater than one and G’ be the graph constructed by squaring the weights of edges in G. Let T and T’ be the minimum spanning trees of G and G’, respectively, with total weights t and t’. Which of the following statements is TRUE?
i ➥ T’ = T with total weight t’ = t2
ii ➥ T’ = T with total weight t'<t2
iii ➥ T’ ≠ T but total weight t’ = t2
iv ➥ None of the above

Show Answer With Best Explanation

Answer: Marks to All
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMinimum Spanning Tree Help-Line

Q30➡ | Digital Logic Design
What is the minimal form of the karnaugh map shown below? Assume that X denotes a don’t care term
i ➥ b’d’
ii ➥ b’d’+b’c’
iii ➥ b’d’+ab’c’d
iv ➥ b’d’+b’c’+c’d’

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTube Boolean Algebra Help-Line

Q31➡ | Operating System
Consider the 3 processes, P1, P2 and P3 shown in the table.

The completion order of the 3 processes under the policies FCFS and RR2 (round robin scheduling with CPU quantum of 2 time units) are
i ➥ FCFS: P1, P2, P3 RR2: P1, P2, P3
ii ➥ FCFS: P1, P3, P2 RR2: P1, P3, P2
iii ➥ FCFS: P1, P2, P3 RR2: P1, P3, P2
iv ➥ FCFS: P1, P3, P2 RR2: P1, P2, P3

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Process Scheduling Help-Line

Q32➡ | Operating System
Fetch_And_Add(X,i) is an atomic Read-Modify-Write instruction that reads the value of memory location X, increments it by the value i, and returns the old value of X. It is used in the pseudocode shown below to implement a busy-wait lock. L is an unsigned integer shared variable initialized to 0. The value of 0 corresponds to lock being available, while any non-zero value corresponds to the lock being not available.

This implementation
i ➥ fails as L can overflow
ii ➥ fails as L can take on a non-zero value when the lock is actually available
iii ➥ works correctly but may starve some processes
iv ➥ works correctly without starvation

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProcess SynchronizationHelp-Line

Q33➡ | Engineering Mathematics
Suppose a fair six-sided die is rolled once. If the value on the die is 1, 2, or 3, the die is rolled a second time. What is the probability that the sum total of values that turn up is at least 6?
i ➥ 10/21
ii ➥ 5/12
iii ➥ 2/3
iv ➥ 1/6

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProbability Help-Line

Q34➡ | Computer Network
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
i ➥ 245.248.136.0/21 and 245.248.128.0/22
ii ➥ 245.248.128.0/21 and 245.248.128.0/22
iii ➥ 245.248.132.0/22 and 245.248.132.0/21
iv ➥ 245.248.136.0/24 and 245.248.132.0/21

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube IP Address Help-Line

Q35➡ | Data Structure
Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements. Assume that the insertion and deletion operations are carried out using REAR and FRONT as array index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full and queue empty are
i ➥
full: (REAR+1)mod n == FRONT
empty: REAR == FRONT
ii ➥
full: (REAR+1)mod n == FRONT
empty: (FRONT+1) mod n == REAR
iii ➥
full: REAR == FRONT
empty: (REAR+1) mod n == FRONT
iv ➥
full: (FRONT+1)mod n == REAR
empty: REAR == FRONT

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Queue Help-Line

Q36➡ | Compiler Design
Consider the program given below, in a block-structured pseudo-language with lexical scoping and nesting of procedures permitted.

Consider the calling chain : Main->A1->A2->A21->A1 The correct set of activation records along with their access links is given by:
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube Run Time EnvironmentHelp-Line

Q37➡ | Engineering Mathematics
How many onto (or surjective) functions are there from an n-element (n ≥ 2) set to a 2-element set?
i ➥ 2n
ii ➥ 2n-1
iii ➥ 2n-2
iv ➥ 2(2n– 2)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Function Help-Line

Q38➡ | Engineering Mathematics
Let G be a complete undirected graph on 6 vertices. If vertices of G are labeled, then the number of distinct cycles of length 4 in G is equal to
i ➥ 15
ii ➥ 30
iii ➥ 45
iv ➥ 360

Show Answer With Best Explanation

Answer: Marks to All
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraph Theory Help-Line

Q39➡ | Algorithms
A list of n strings, each of length n, is sorted into lexicographic order using the merge-sort algorithm. The worst case running time of this computation is
i ➥ O (n log n)
ii ➥ O (n2 log n)
iii ➥ O (n2 + log n)
iv ➥ O (n2)

Show Answer With Best Explanation

Answer: Marks to All
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSorting Help-Line

Q40➡ | Algorithms
Consider the directed graph shown in the figure below. There are multiple shortest paths between vertices S and T. Which one will be reported by Dijkstra’s shortest path algorithm? Assume that, in any iteration, the shortest path to a vertex v is updated only when a strictly shorter path to v is discovered.
i ➥ SDT
ii ➥ SBDT
iii ➥ SACDT
iv ➥ SACET

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDijkastra’s Algorithm Help-Line

Q41➡ | Operating System
A file system with 300 GByte disk uses a file descriptor with 8 direct block addresses, 1 indirect block address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and the size of each disk block address is 8 Bytes. The maximum possible file size in this file system is
i ➥ 3 KBytes
ii ➥ 35 KBytes
iii ➥ 280 KBytes
iv ➥ dependent on the size of the disk

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFile System Help-Line

Q42➡ | Operating System
Consider the virtual page reference string
1, 2, 3, 2, 4, 1, 3, 2, 4, 1
On a demand paged virtual memory system running on a computer system that main memory size of 3 pages frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number of page faults under the corresponding page replacements policy. Then
i ➥ OPTIMAL < LRU < FIFO
ii ➥ OPTIMAL < FIFO < LRU
iii ➥ OPTIMAL = LRU
iv ➥ OPTIMAL = FIFO

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubePage Replacement AlgorithmHelp-Line

Q43➡ | Database Management System
Suppose R1(A, B) and R2(C, D) are two relation schemas. Let r1 and r2 be the corresponding relation instances. B is a foreign key that refers to C in R2. If data in r1 and r2 satisfy referential integrity constraints, which of the following is ALWAYS TRUE?
i ➥ B (r1) – ∏C (r2) = ∅
ii ➥ C (r2) – ∏B (r1) = ∅
iii ➥ B (r1) = ∏C (r2)
iv ➥ B (r1) – ∏C (r2) ≠ ∅

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRelational AlgebraHelp-Line

Q44➡ | Computer Network
Consider a source computer (S) transmitting a file of size 106 bits to a destination computer (D) over a network of two routers (R1 and R2) and three links (L1, L2 and L3). L1 connects S to R1; L2 connects R1 to R2; and L3 connects R2 to D. Let each link be of length 100 km. Assume signals travel over each link at a speed of 108 meters per second. Assume that the link bandwidth on each link is 1Mbps. Let the file be broken down into 1000 packets each of size 1000 bits. Find the total sum of transmission and propagation delays in transmitting the file from S to D?
i ➥ 1005 ms
ii ➥ 1010 ms
iii ➥ 3000 ms
iv ➥ 3003 ms

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSwitching Help-Line

Q45➡ | Computer Network
Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find the congestion window size at the end of the tenth transmission.
i ➥ 8 MSS
ii ➥ 14 MSS
iii ➥ 7 MSS
iv ➥ 12 MSS

Show Answer With Best Explanation

Answer: Marks to All
Explanation: Upload Soon

More DiscussionExplanation On YouTube Congestion Control Help-Line

Q46➡ | Theory of Computation
Consider the set of strings on {0,1} in which, every substring of 3 symbols has at most two zeros. For example, 001110 and 011001 are in the language, but 100010 is not. All strings of length less than 3 are also in the language. A partially completed DFA that accepts this language is
shown below.

The missing arcs in the DFA are
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFinite Automata Help-Line

Q47➡ | Data Structure
The height of a tree is defined as the number of edges on the longest path in the tree. The function shown in the pseudocode below is invoked as height (root) to compute the height of a binary tree rooted at the tree pointer root.

The appropriate expression for the two boxes B1 and B2 are
i ➥
B1: (1+height(n→right))
B2: (1+max(h1,h2))
ii ➥
B1: (height(n→right))
B2: (1+max(h1,h2))
iii ➥
B1: height(n→right)
B2: max(h1,h2)
iv ➥
B1: (1+ height(n→right))
B2: max(h1,h2)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeBinary Tree Help-Line

Q48➡ | Programming
Common Data for Questions 48 and 49 :
Consider the following C program

What output will be generated by the given code segment?
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProgram Help-Line

Q49➡ | Programming
Common Data for Questions 48 and 49 :
Consider the following C program

What output will be generated by the given code segment if:
Line 1 is replaced by auto int a = 1;
Line 2 is replaced by register int a = 2;
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProgram Help-Line

Q50➡ | Database Management System
Common Data for Questions 50 and 51:
Consider the following relations A, B, C:

How many tuples does the result of the following relational algebra expression contain? Assume that the schema of AUB is the same as that of A.
(AUB) ⋈ A.Id>40∨C.Id<15 C
i ➥ 7
ii ➥ 4
iii ➥ 5
iv ➥ 9

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRelational Algebra Help-Line

Q51➡ | Database Management System
Common Data for Questions 50 and 51:
Consider the following relations A, B, C.

How many tuples does the result of the following SQL query contain?

SELECT A.id FROM A
WHERE A.age > ALL (SELECT B.age
FROM B
WHERE B. name = “arun”)
i ➥ 4
ii ➥ 3
iii ➥ 0
iv ➥ 1

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRelational Algebra Help-Line

Q52➡ | Compiler Design
Statement for Linked Answer Questions 52 and 53:

For the grammar below, a partial LL(1) parsing table is also presented along with the grammar. Entries that need to be filled are indicated as E1, E2, and E3. ε is the empty string, $ indicates end of input, and, | separates alternate right hand sides of productions.
S → aAbB | bAaB | ε
A → S
B → S


The FIRST and FOLLOW sets for the non-terminals A and B are
i ➥
FIRST(A) = {a,b,ε} = FIRST(B)
FOLLOW(A) = {a,b}
FOLLOW(B) = {a,b,$}
ii ➥
FIRST(A) = {a,b,$}
FIRST(B) = {a,b,ε}
FOLLOW(A) = {a,b}
FOLLOW(B) = {$}
iii ➥
FIRST(A) = {a,b,ε} = FIRST(B)
FOLLOW(A) = {a,b}
FOLLOW(B) = ∅
iv ➥
FIRST(A) = {a,b} = FIRST(B)
FOLLOW(A) = {a,b}
FOLLOW(B) = {a,b}

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Parsers Help-Line

Q53➡ | Compiler Design
Statement for Linked Answer Questions 52 and 53:


For the grammar below, a partial LL(1) parsing table is also presented along with the grammar. Entries that need to be filled are indicated as E1, E2, and E3. ε is the empty string, $ indicates end of input, and, | separates alternate right hand sides of productions.
S → aAbB | bAaB | ε
A → S
B → S

The appropriate entries for E1, E2, and E3 are
i ➥
E1: S → aAbB,A → S
E2: S → bAaB,B→S
E3: B → S
ii ➥
E1: S → aAbB,S→ ε
E2: S → bAaB,S → ε
E3: S → ε
iii ➥
E1: S → aAbB,S → ε
E2: S → bAaB,S→ε
E3: B → S
iv ➥
E1: A → S,S →ε
E2: B → S,S → ε
E3: B →S

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Parsers Help-Line

Q54➡ | Computer Organization
Statement for Linked Answer Questions 54 and 55:

A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32 Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit.

The number of bits in the tag field of an address is
i ➥ 11
ii ➥ 14
iii ➥ 16
iv ➥ 27

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Cache Mapping Help-Line

Q55➡ | Computer Organization
Statement for Linked Answer Questions 54 and 55:

A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32 Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit.

The size of the cache tag directory is
i ➥ 160 Kbits
ii ➥ 136 Kbits
iii ➥ 40 Kbits
iv ➥ 32 Kbits

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Cache Mapping Help-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?