GATE | GATE-CS-2015 (Set 2) | Question 65
Which one of the following well formed formulae is a tautology? (A) A (B) B (C) C (D) D Answer: (C) Explanation: In logic,… Read More »
Which one of the following well formed formulae is a tautology? (A) A (B) B (C) C (D) D Answer: (C) Explanation: In logic,… Read More »
Let X and Y denote the sets containing 2 and 20 distinct objects respectively and F denote the set of all possible functions defined from… Read More »
The number of states in the minimal deterministic finite automaton corresponding to the regular expression (0 + 1)*(10) is ____________ (A) 2 (B) 3 (C)… Read More »
Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up… Read More »
Which of the following languages is/are regular? L1: {wxwR ⎪ w, x ∈ {a, b}* and ⎪w⎪, ⎪x⎪ >0} wR is the reverse of string… Read More »
In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one of the following statements is True? (A) A tree… Read More »
Consider a typical disk that rotates at 15000 rotations per minute (RPM) and has a transfer rate of 50 × 106 bytes/sec. If the average… Read More »
A half adder is implemented with XOR and AND gates. A full adder is implemented with two half adders and one OR gate. The propagation… Read More »
A Computer system implements 8 kilobyte pages and a 32-bit physical address space. Each page table entry contains a valid bit, a dirty bit three… Read More »
Consider a simple checkpointing protocol and the following set of operations in the log. (start, T4); (write, T4, y, 2, 3); (start, T1); (commit, T4);… Read More »
Suppose you are provided with the following function declaration in the C programming language. int partition (int a[], int n); The function treats the first… Read More »
Consider the sequence of machine instructions given below: MUL R5, R0, R1 DIV R6, R2, R3 ADD R7, R5, R6 SUB R8, R7, R4 In… Read More »
Which one of the following assertions concerning code inspection and code walkthrough is True? (A) Code inspection is carried out once the code has been… Read More »
Consider a processor with byte-addressable memory. Assume that all registers, including Program Counter (PC) and Program Status Word (PSW), are of size 2 bytes. A… Read More »
Consider the following routing table at an IP router For each IP address in Group-I identify the correct choice of the next hop from Group-II… Read More »