Gblog Must Do Coding Questions for Product Based Companies
As the placement season is back, GeeksforGeeks is here to help you crack the interview. We have selected some most commonly asked and MUST DO… Read More
The number of states in the minimal deterministic finite automaton corresponding to the regular expression (0 + 1)*(10) is ____________ (A) 2 (B) 3 (C)… Read More
Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up… Read More
Which of the following languages is/are regular? L1: {wxwR ⎪ w, x ∈ {a, b}* and ⎪w⎪, ⎪x⎪ >0} wR is the reverse of string… Read More
In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one of the following statements is True? (A) A tree… Read More
Consider a typical disk that rotates at 15000 rotations per minute (RPM) and has a transfer rate of 50 × 106 bytes/sec. If the average… Read More
A half adder is implemented with XOR and AND gates. A full adder is implemented with two half adders and one OR gate. The propagation… Read More
A Computer system implements 8 kilobyte pages and a 32-bit physical address space. Each page table entry contains a valid bit, a dirty bit three… Read More
Consider a simple checkpointing protocol and the following set of operations in the log. (start, T4); (write, T4, y, 2, 3); (start, T1); (commit, T4);… Read More
Suppose you are provided with the following function declaration in the C programming language. int partition (int a[], int n); The function treats the first… Read More
Consider the sequence of machine instructions given below: MUL R5, R0, R1 DIV R6, R2, R3 ADD R7, R5, R6 SUB R8, R7, R4 In… Read More
Which one of the following assertions concerning code inspection and code walkthrough is True? (A) Code inspection is carried out once the code has been… Read More
Consider a processor with byte-addressable memory. Assume that all registers, including Program Counter (PC) and Program Status Word (PSW), are of size 2 bytes. A… Read More
Consider the following routing table at an IP router For each IP address in Group-I identify the correct choice of the next hop from Group-II… Read More
The number of onto functions (surjective functions) from set X = {1, 2, 3, 4} to set Y = {a, b, c} is ________________ (A)… Read More
The secant method is used to find the root of an equation f(x) = 0. It is started from two distinct estimates xa and xb… Read More