## GATE | GATE CS 2018 | Question 53

Consider the unsigned 8-bit fixed point binary number representation, below, b7b6b5b4b3 ⋅ b2b1b0 where the position of the binary point is between b3 and b2… Read More »

## GATE | GATE CS 2018 | Question 52

Consider the following C program: filter_none edit close play_arrow link brightness_4 code #include <stdio.h> void fun1(char *s1, char *s2) {   char *temp;   temp = s1;… Read More »

## GATE | GATE CS 2018 | Question 51

Assume that multiplying a matrix G1 of dimension p×q with another matrix G2 of dimension q×r requires pqr scalar multiplications. Computing the product of n… Read More »

## GATE | GATE CS 2018 | Question 50

Consider the following problems. L(G) denotes the language generated by a grammar G. L(M) denotes the language accepted by a machine M. (I) For an… Read More »

## GATE | GATE CS 2018 | Question 49

Consider the following undirected graph G: Choose a value for x that will maximize the number of minimum weight spanning trees (MWSTs) of G. The… Read More »

## GATE | GATE CS 2018 | Question 48

Consider the minterm list form of a Boolean function F given below. F(P, Q, R, S) = Σm(0, 2, 5, 7, 9, 11) + d(3,… Read More »

## GATE | GATE CS 2018 | Question 47

Consider the following C code. Assume that unsigned long int type length is 64 bits. filter_none edit close play_arrow link brightness_4 code unsigned long int… Read More »

## GATE | GATE CS 2018 | Question 46

Consider the following languages: I. {ambncpdq ∣ m + p = n + q, where m, n, p, q ≥ 0} II. {ambncpdq ∣ m… Read More »

## GATE | GATE CS 2018 | Question 45

The size of the physical address space of a processor is 2P bytes. The word length is 2W bytes. The capacity of cache memory is… Read More »

## GATE | GATE CS 2018 | Question 44

Consider the following program written in pseudo-code. Assume that x and y are integers. Count (x, y) { if (y !=1 ) { if (x… Read More »

## Smallest expression to represent a number using single digit

Given a number N and a digit D, we have to form an expression or equation that contains only D and that expression evaluates to… Read More »

## MD5 hash in Python

Cryptographic hashes are used in day-day life like in digital signatures, message authentication codes, manipulation detection, fingerprints, checksums (message integrity check), hash tables, password storage… Read More »

## SHA in Python

SHA, ( Secure Hash Algorithms ) are set of cryptographic hash functions defined by the language to be used for various applications such as password… Read More »

## Row-wise vs column-wise traversal of matrix

Two common ways of traversing a matrix are row-major-order and column-major-order. Row Major Order : When matrix is accessed row by row. Column Major Order… Read More »

## Loop Invariant Condition with Examples of Sorting Algorithms

Loop Invariant Condition: Loop invariant condition is a condition about the relationship between the variables of our program which is definitely true immediately before and… Read More »