GATE 2016 Set-1 CS Computer Science and information technology

[Q1 – Q25 carry ONE mark each ]

Q1➡ | Compiler Design
Let p,q,r,s represent the following propositions.
• p: x ∈ {8,9,10,11,12}
• q: x is a composite number
• r: x is a perfect square
• s: x is a prime number
The integer x≥2 which satisfies ¬((p ⇒ q) ∧ (¬r ∨ ¬s)) is ________.

Show Answer With Best Explanation

Answer: 11
Explanation: Upload Soon

More DiscussionExplanation On YouTube Compiler phase Help-Line

Q2➡ | Engineering Mathematics
Let an be the number of n-bit strings that do NOT contain two consecutive 1s. Which one of the following is the recurrence relation for an?
i ➥ an = 2an-1 + 2an-2
ii ➥ an = 2an-1 + an-2
iii ➥ an = an-1 + an-2
iv ➥ an = an-1 + 2an-2

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRecurrence Relation Help-Line

Q3➡ | Engineering Mathematics

Show Answer With Best Explanation

Answer: 1
Explanation: Upload Soon

More DiscussionExplanation On YouTube Calculus Help-Line

Q4➡ | Engineering Mathematics
A probability density function on the interval [a,1] is given by 1/x2 and outside this interval the value of the function is zero. The value of a is _________.

Show Answer With Best Explanation

Answer: 0.5
Explanation: Upload Soon

More DiscussionExplanation On YouTube Probability Help-Line

Q5➡ | Engineering Mathematics
Two eigenvalues of a 3 × 3 real matrix P are (2 + √-1) and 3. The determinant of P is __________.

Show Answer With Best Explanation

Answer: 15
Explanation: Upload Soon

More DiscussionExplanation On YouTube Linear Algebra Help-Line

Q6➡ | Digital Logic Design
Consider the Boolean operator with the following properties:
x # 0 = x , x # 1 = x’ , x # x = 0 , x # x’ = 1
Then x#y is equivalent to
i ➥ xy’ + x’y
ii ➥ xy’ + x’y’
iii ➥ x’y + xy
iv ➥ (xy + x’y’)’

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Boolean Algebra Help-Line

Q7➡ | Digital Logic Design
The 16-bit 2’s complement representation of an integer is 1111 1111 1111 0101; its decimal representation is ___________.

Show Answer With Best Explanation

Answer: -11
Explanation: Upload Soon

More DiscussionExplanation On YouTube Number Systems Help-Line

Q8➡ | Digital Logic Design
We want to design a synchronous counter that counts the sequence 0-1-0-2-0-3 and then repeats. The minimum number of J-K flip-flops required to implement this counter is _________.

Show Answer With Best Explanation

Answer: 4
Explanation: Upload Soon

More DiscussionExplanation On YouTube Sequential Circuits Help-Line

Q9➡ | Computer Organization
A processor can support a maximum memory of 4GB, where the memory is word-addressable (a word consists of two bytes). The size of the address bus of the processor is at least ________ bits.

Show Answer With Best Explanation

Answer: 31
Explanation: Upload Soon

More DiscussionExplanation On YouTube Memory Interfacing Help-Line

Q10➡ | Data Structure
A queue is implemented using an array such that ENQUEUE and DEQUEUE operations are performed efficiently. Which one of the following statements is CORRECT (n refers to the number of items in the queue)?
i ➥ Both operations can be performed in O(1) time
ii ➥ At most one operation can be performed in O(1) time but the worst case time for the other operation will be Ω(n)
iii ➥ The worst case time complexity for both operations will be Ω(n)
iv ➥ Worst case time complexity for both operations will be Ω(logn)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More Discussion Explanation On YouTube Queue Help-Line

Q11➡ | Data Structure
Consider the following directed graph:

The number of different topological orderings of the vertices of the graph is ___________.

Show Answer With Best Explanation

Answer: 6
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTopological Ordering Help-Line

Q12➡ | Programming
Consider the following C program:

Which one of the following expressions, when placed in the blank above, will NOT result in a type checking error?
i ➥ f(i, *p)
ii ➥ f(i, *s)
iii ➥ i = f(i, s)
iv ➥ f(s, *s)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProgram Help-Line

Q13➡ | Algorithms
The worst case running times of Insertion sort, Merge sort and Quick sort, respectively, are:
i ➥ Θ(nlogn), Θ(nlogn), and Θ(n2)
ii ➥ Θ(n2 ), Θ(n2 ), and Θ(nlogn)
iii ➥ Θ(n2), Θ(nlogn), and Θ(nlogn)
iv ➥ Θ(n2), Θ(nlogn), and Θ(n2)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSorting Help-Line

Q14➡ | Data Structure
Let G be a weighted connected undirected graph with distinct positive edge weights. If every edge weight is increased by the same value, then which of the following statements is/are TRUE?
• P: Minimum spanning tree of G does not change
• Q: Shortest path between any pair of vertices does not change
i ➥ Both P and Q
ii ➥ Neither P nor Q
iii ➥ Q only
iv ➥ P only

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraph Help-Line

Q15➡ | Programming
Consider the following C program.

The output of the program is ________.

Show Answer With Best Explanation

Answer: 2016
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProgram Help-Line

Q16➡ | Theory of Computation
Which of the following languages is generated by the given grammar?
S→ aS|bS|ε
i ➥ {a,b}*
ii ➥ {an |n ≥ 0} U {bn |n ≥ 0} U {an bn|n ≥ 0}
iii ➥ {w ∈ {a,b}* | w has equal number of a’s and b’s}
iv ➥ {anbm |n,m ≥ 0}

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLanguage Help-Line

Q17➡ | Theory of Computation
Which of the following decision problems are undecidable?
• I. Given NFAs N1 and N2, is L(N1)∩L(N2)= Φ?
• II. Given a CFG G = (N,Σ,P,S) and a string x ∈ Σ*, does x ∈ L(G)?
• III. Given CFGs G1 and G2, is L(G1) = L(G2)?
• IV. Given a TM M, is L(M) = Φ?
i ➥ II and IV only
ii ➥ III and IV only
iii ➥ II and III only
iv ➥ I and IV only

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDecidability and Undecidability Help-Line

Q18➡ | Theory of Computation
Which one of the following regular expressions represents the language: the set of all binary strings having two consecutive 0s and two consecutive 1s?
i ➥ 00(0 + 1)* 11 + 11(0 + 1)* 00
ii ➥ (0 + 1)* 00(0 + 1)* + (0 + 1)* 11(0 + 1)*
iii ➥ (0 + 1)* (00(0 + 1)* 11 + 11(0 + 1)* 00)(0 + 1)*
iv ➥ (0 + 1)* 0011(0 + 1)* + (0 + 1)* 1100(0 + 1)*

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRegular Expressions Help-Line

Q19➡ | Compiler Design
Consider the following code segment.
• x = u – t;
• y = x * v;
• x = y + w;
• y = t – z;
• y = x * y;
The minimum number of variables required to convert the above code segment to static single assignment form is _________.

Show Answer With Best Explanation

Answer: 10
Explanation: Upload Soon

More DiscussionExplanation On YouTubeStatic Single AssignmentHelp-Line

Q20➡ | Operating System
Consider an arbitrary set of CPU-bound processes with unequal CPU burst lengths submitted at the same time to a computer system. Which one of the following process scheduling algorithms would minimize the average waiting time in the ready queue?
i ➥ Highest priority first with priority proportional to CPU burst length
ii ➥ Uniform random
iii ➥ Round-robin with time quantum less than the shortest CPU burst
iv ➥ Shortest remaining time first

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube Process Scheduling Help-Line

Q21➡ | Database Management System
Which of the following is NOT a superkey in a relational schema with attributes V, W, X, Y, Z and primary key VY?
i ➥ VWXYZ
ii ➥ VWXY
iii ➥ VWXZ
iv ➥ VXYZ

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNormalization Help-Line

Q22➡ | Database Management System
Which of the following is NOT a part of the ACID properties of database transactions?
i ➥ Deadlock-freedom
ii ➥ Isolation
iii ➥ Consistency
iv ➥ Atomicity

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransaction ManagemntHelp-Line

Q23➡ | Database Management System
A database of research articles in a journal uses the following schema.
(VOLUME, NUMBER, STARTPAGE, ENDPAGE, TITLE, YEAR, PRICE)

The primary key is (VOLUME, NUMBER, STARTPAGE, ENDPAGE) and the following functional dependencies exist in the schema.
• (VOLUME, NUMBER, STARTPAGE, ENDPAGE) → TITLE
• (VOLUME, NUMBER) → YEAR
• (VOLUME, NUMBER, STARTPAGE, ENDPAGE) → PRICE
The database is redesigned to use the following schemas.
• (VOLUME, NUMBER, STARTPAGE, ENDPAGE, TITLE, PRICE)
(VOLUME, NUMBER, YEAR)

Which is the weakest normal form that the new database satisfies, but the old one does not?
i ➥ BCNF
ii ➥ 3NF
iii ➥ 2NF
iv ➥ 1NF

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Normalization Help-Line

Q24➡ | Computer Network
Which one of the following protocols is NOT used to resolve one form of address to another one?
i ➥ RARP
ii ➥ DHCP
iii ➥ ARP
iv ➥ DNS

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProtocols Help-Line

Q25➡ | Computer Network
Which of the following is/are example(s) of stateful application layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
i ➥ (iv) only
ii ➥ (ii) and (iv) only
iii ➥ (ii) and (iii) only
iv ➥ (i) and (ii) only

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeApplication Layer ProtocolsHelp-Line

[Q1 – Q25 carry TWO mark each ]

Q26➡ | Engineering Mathematics
The coefficient of x12 in (x3 + x4 + x5 + x6 + …)3 is ____________.

Show Answer With Best Explanation

Answer: 10
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCombinatorics Help-Line

Q27➡ | Engineering Mathematics
Consider the recurrence relation a1 = 8, an = 6n2 + 2n + an-1. Let a99 = K × 104. The value of K is _.

Show Answer With Best Explanation

Answer: 198
Explanation: Upload Soon

More DiscussionExplanation On YouTube Combinatorics Help-Line

Q28➡ | Engineering Mathematics
A function f:N+ → N+, defined on the set of positive integers N+, satisfies the following properties:
f(n) = f(n/2) if n is even
f(n) = f(n+5) if n is odd
Let R = {i|∃j : f(j)=i} be the set of distinct values that f takes. The maximum possible size of R is ________.

Show Answer With Best Explanation

Answer: 2
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSet Theory Help-Line

Q29➡ | Engineering Mathematics
Consider the following experiment.
Step1: Flip a fair coin twice.
Step2: If the outcomes are (TAILS, HEADS) then output Y and stop.
Step3: If the outcomes are either (HEADS, HEADS) or (HEADS, TAILS), then output N and stop.
Step4: If the outcomes are (TAILS, TAILS), then go to Step 1.
The probability that the output of the experiment is Y is (up to two decimal places) __________.

Show Answer With Best Explanation

Answer: 0.33 to 0.34
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProbability Help-Line

Q30➡ | Digital Logic Design
Consider the two cascaded 2-to-1 multiplexers as shown in the figure.

The minimal sum of products form of the output X is
i ➥ P’Q’ + PQR
ii ➥ P’Q + QR
iii ➥ PQ + P’Q’R
iv ➥ Q’R’ + PQR

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCombinational Circuits Help-Line

Q31➡ | Computer Organization
The size of the data count register of a DMA controller is 16 bits. The processor needs to transfer a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The minimum number of times the DMA controller needs to get the control of the system bus from the processor to transfer the file from the disk to main memory is ___________.

Show Answer With Best Explanation

Answer: 456
Explanation: Upload Soon

More DiscussionExplanation On YouTube DMA Help-Line

Q32➡ | Computer Organization
The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first stage (with delay 800 picoseconds) is replaced with a functionally equivalent design involving two stages with respective delays 600 and 350 picoseconds. The throughput increase of the pipeline
is __________percent.

Show Answer With Best Explanation

Answer: 33 to 34
Explanation: Upload Soon

More DiscussionExplanation On YouTube Pipelining Help-Line

Q33➡ | Digital Logic Design
Consider a carry lookahead adder for adding two n-bit integers, built using gates of fan-in at most two. The time to perform addition using this adder is __________.
i ➥ Θ(1)
ii ➥ Θ(log(n))
iii ➥ Θ(√n)
iv ➥ Θ(n)

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCombinational Circuits Help-Line

Q34➡ | Programming
The following function computes the maximum value contained in an integer array p[] of size n (n >= 1).

The missing loop condition is
i ➥ a != n
ii ➥ b != 0
iii ➥ b > (a + 1)
iv ➥ b != a

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProgram Help-Line

Q35➡ | Programming
What will be the output of the following C program?
i ➥ 3 1 2 2 1 3 4 4 4
ii ➥ 3 1 2 1 1 1 2 2 2
iii ➥ 3 1 2 2 1 3 4
iv ➥ 3 1 2 1 1 1 2

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTube Program Help-Line

Q36➡ | Programming
What will be the output of the following pseudo-code when parameters are passed by reference and dynamic scoping is assumed?
i ➥ 6, 2
ii ➥ 6, 6
iii ➥ 4, 2
iv ➥ 4, 4

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube Program Help-Line

Q37➡ | Data Structure
An operator delete(i) for a binary heap data structure is to be designed to delete the item in the i-th node. Assume that the heap is implemented in an array and i refers to the i-th index of the array. If the heap tree has depth d (number of edges on the path from the root to the farthest leaf), then what is the time complexity to re-fix the heap efficiently after the removal of the element?
i ➥ O(1)
ii ➥ O(d) but not O(1)
iii ➥ O(2d) but not O(d)
iii ➥ O(d 2d) but not O(2d)

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeBinary Heap Help-Line

Q38➡ | Data Structure
Consider the weighted undirected graph with 4 vertices, where the weight of edge {i,j} is given by the entry Wij in the matrix W.

The largest possible integer value of x, for which at least one shortest path between some pair of vertices will contain the edge
with weight x is ________.

Show Answer With Best Explanation

Answer: 12
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraph Help-Line

Q39➡ | Algorithms
Let G be a complete undirected graph on 4 vertices, having 6 edges with weights being 1, 2, 3, 4, 5, and 6. The maximum possible weight that a minimum weight spanning tree of G can have is _______.

Show Answer With Best Explanation

Answer: 7
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMinimum Spanning Tree Help-Line

Q40➡ | Algorithms
G = (V,E) is an undirected simple graph in which each edge has a distinct weight, and e is a particular edge of G. Which of the following statements about the minimum spanning trees (MSTs) of G is/are TRUE?
• I. If e is the lightest edge of some cycle in G , then every MST of G includes e
• II. If e is the heaviest edge of some cycle in G, then every MST of G excludes e
i ➥ neither I nor II
ii ➥ both I and II
iii ➥ II only
iv ➥ I only

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMinimum Spanning TreeHelp-Line

Q41➡ | Data Structure
Let Q denote a queue containing sixteen numbers and S be an empty stack. Head(Q) returns the element at the head of the queue Q
without removing it from Q. Similarly Top(S) returns the element at the top of S without removing it from S. Consider the algorithm given
below.

The maximum possible number of iterations of the while loop in the algorithm is ___________.

Show Answer With Best Explanation

Answer: 256
Explanation: Upload Soon

More DiscussionExplanation On YouTubeQueue and Stack Help-Line

Q42➡ | Theory of Computation
Consider the following context-free grammars:
G1: S → aS|B, B → b|bB
G2: S → aA|bB, A → aA|B|ε, B → bB|ε
Which one of the following pairs of languages is generated by G1 and G2, respectively?
i ➥ {am bn│m > 0 or n > 0} and {am bn |m > 0 and n > 0}
ii ➥ {am bn│m > 0 and n > 0} and {am bn |m > 0 or n≥0}
iii ➥ {am bn│m≥0 or n > 0} and {am bn |m > 0 and n > 0}
iv ➥ {am bn│m≥0 and n > 0} and {am bn |m > 0 or n > 0}

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeContext Free LanguageHelp-Line

Q43➡ | Theory of Computation
Consider the transition diagram of a PDA given below with input alphabet Σ = {a,b} and stack alphabet Γ = {X,Z}. Z is the initial stack symbol. Let L denote the language accepted by the PDA.

Which one of the following is TRUE?
i ➥ L = {an bn│n ≥ 0} and is not accepted by any finite automata
ii ➥ L = {an |n≥0} ∪ {anbn|n ≥ 0} and is not accepted by any deterministic PDA
iii ➥ L is not accepted by any Turing machine that halts on every input
iv ➥ L = {an |n ≥ 0} ∪ {an bn |n ≥ 0} and is deterministic context-free

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubePush Down Automata Help-Line

Q44➡ | Data Structure
Let X be a recursive language and Y be a recursively enumerable but not recursive language. Let W and Z be two languages such that Y’ reduces to W, and Z reduces to X’ (reduction means the standard many-one reduction).
Which one of the following statements is TRUE?
i ➥ W can be recursively enumerable and Z is recursive.
ii ➥ W can be recursive and Z is recursively enumerable.
iii ➥ W is not recursively enumerable and Z is recursive.
iv ➥ W is not recursively enumerable and Z is not recursive.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeBinary Trees Help-Line

Q45➡ | Compiler Design
The attributes of three arithmetic operators in some programming language are given below.

The value of the expression 2 – 5 + 1 – 7 * 3 in this language is ________.

Show Answer With Best Explanation

Answer: 9
Explanation: Upload Soon

More DiscussionExplanation On YouTubeAssociativity and precedenceHelp-Line

Q46➡ | Compiler Design
Consider the following Syntax Directed Translation Scheme (SDTS), with non-terminals {S, A} and terminals {a,b}.
S → aA { print 1 }
S → a { print 2 }
A → Sb { print 3 }
Using the above SDTS, the output printed by a bottom-up parser, for the input aab is:
i ➥ 1 3 2
ii ➥ 2 2 3
iii ➥ 2 3 1
iv ➥ syntax error

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSyntax Directed TranslationHelp-Line

Q47➡ | Operating Systems
Consider a computer system with 40-bit virtual addressing and page size of sixteen kilobytes. If the computer system has a one-level page table per process and each page table entry requires 48 bits, then the size of the per-process page table is _________megabytes.

Show Answer With Best Explanation

Answer: 384
Explanation: Upload Soon

More DiscussionExplanation On YouTubePaging Help-Line

Q48➡ | Operating Systems
Consider a disk queue with requests for I/O to blocks on cylinders 47, 38, 121, 191, 87, 11, 92, 10. The C-LOOK scheduling algorithm is used. The head is initially at cylinder number 63, moving towards larger cylinder numbers on its servicing pass. The cylinders are numbered from 0 to 199.
The total head movement (in number of cylinders) incurred while servicing these requests is __________.

Show Answer With Best Explanation

Answer: 346
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDisk Scheduling Help-Line

Q49➡ | Operating Systems
Consider a computer system with ten physical page frames. The system is provided with an access sequence (a1,a2,…,a20,a1,a2,…,a20), where each ai
is a distinct virtual page number. The difference in the number of page faults between the last-in-first-out page replacement policy and the optimal page replacement policy is ____________.

Show Answer With Best Explanation

Answer: 1
Explanation: Upload Soon

More DiscussionExplanation On YouTubePage Replacement AlgorithmHelp-Line

Q50➡ | Operating Systems
Consider the following proposed solution for the critical section problem. There are n processes: P0…P(n-1). In the code, function pmax returns an integer not smaller than any of its arguments. For all i, t[i] is initialized to zero.
Code for Pi:

Which one of the following is TRUE about the above solution?
i ➥ At most one process can be in the critical section at any time
ii ➥ The bounded wait condition is satisfied
iii ➥ The progress condition is satisfied
iv ➥ It cannot cause a deadlock

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProcess Scheduling Help-Line

Q51➡ | Database Management System
Consider the following two phase locking protocol. Suppose a transaction T accesses (for read or write operations), a certain set of objects{O1,…,Ok}. This is done in the following manner:
Step1: T acquires exclusive locks to O1,…,Ok in increasing order of their addresses.
Step2: The required operations are performed.
Step3: All locks are released.
This protocol will
i ➥ guarantee serializability and deadlock-freedom
ii ➥ guarantee neither serializability nor deadlock-freedom
iii ➥ guarantee serializability but not deadlock-freedom
iv ➥ guarantee deadlock-freedom but not serializability

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransaction ManagementHelp-Line

Q52➡ | Computer Network
Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by Kx and Kx+ for x = A,B, respectively. Let Kx(m) represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A?
i ➥ {m , KB+ (H(m)) }
ii ➥ {m , KB (H(m)) }
iii ➥ {m , KA (H(m)) }
iv ➥ {m , KA+ (H(m)) }

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q53➡ | Computer Network
An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes.
The number of fragments that the IP datagram will be divided into for transmission is __________.

Show Answer With Best Explanation

Answer: 13
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFragmentation Help-Line

Q54➡ | Computer Network
For a host machine that uses the token bucket algorithm for congestion control, the token bucket has a capacity of 1 megabyte and the maximum output rate is 20 megabytes per second. Tokens arrive at a rate to sustain output at a rate of 10 megabytes per second. The token bucket is currently full and the machine needs to send 12 megabytes of data. The minimum time required to transmit the data is seconds ________.

Show Answer With Best Explanation

Answer: 1.1
Explanation: Upload Soon

More DiscussionExplanation On YouTubeToken Bucket Help-Line

Q55➡ | Computer Network
A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of an acknowledgement is 100 bytes and the transmission rate at the receiver is 8 Kbps. The one-way propagation delay is 100 milliseconds.
Assuming no frame is lost, the sender throughput is ___________ bytes/second.

Show Answer With Best Explanation

Answer: 2500
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFlow Control Help-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?
Exit mobile version