When searching for the key value 60 in a binary search tree, nodes containing the key values 10, 20, 40, 50, 70 80, 90 are… Read More
Consider a hash function that distributes keys uniformly. The hash table size is 20. After hashing of how many keys will the probability that any… Read More
The function f is defined as follows:Attention reader! Don’t stop learning now.  Practice GATE exam well before the actual exam with the subject-wise and overall… Read More
Consider n jobs J1, J2,……Jn such that job Ji has execution time ti and a non-negative integer weight wi. The weighted mean completion time of… Read More
What is the largest integer m such that every simple connected graph with n vertices and n edges contains at least m different spanning trees?… Read More
A depth-first search is performed on a directed acyclic graph. Let d[u] denote the time at which vertex u is visited for the first time… Read More
A partial order P is defined on the set of natural numbers as follows. Here x/y denotes integer division. i. (0, 0) ∊ P. ii.… Read More
The trapezoidal method is used to evaluate the numerical value of . Consider the following values for the step size h. i. 10-2 ii. 10-3… Read More
Which one of these first-order logic formula is valid? (A) ∀x(P(x) => Q(x)) => (∀xP(x) => ∀xQ(x)) (B) ∃x(P(x) ∨ Q(x)) => (∃xP(x) => ∃xQ(x))… Read More
Comprehension passages are sure shot scoring questions. We are given a passage and some questions that follow the passage. The questions are to be answered… Read More
In C/C++ and Java, we can write empty function as following // An empty function in C/C++/Java void fun() { } In Python, if we… Read More
Consider the XML document fragment given below: Consider the XPath expression: *[not (self ) : : TOC] What would be the result of the given… Read More
Consider the XML document fragment given below: With reference to the HTML lines given above, consider the following statements. 1. Clicking on the point does… Read More
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However,… Read More
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications… Read More