Skip to content

Tag Archives: Gate IT 2005

Let f be a function from a set A to a set B, g a function from B to C, and h a function from… Read More
A HTML form is to be designed to enable purchase of office stationery. Required items are to be selected (checked). Credit card details are to… Read More
Count to infinity is a problem associated with (A) link state routing protocol. (B) distance vector routing protocol (C) DNS while resolving host name. (D)… Read More
Which of the following statements is TRUE about CSMA/CD   (A) IEEE 802.11 wireless LAN runs CSMA/CD protocol (B) Ethernet is not based on CSMA/CD… Read More
Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options… Read More
Consider the three commands : PROMPT, HEAD and RCPT. Which of the following options indicate a correct association of these commands with protocols where these… Read More
Amongst the ACID properties of a transaction, the ‘Durability’ property requires that the changes made to the database by a successful transaction persist   (A)… Read More
A B-Tree used as an index for a large database table has four levels including the root node. If a new key is inserted in… Read More
A table has fields Fl, F2, F3, F4, F5 with the following functional dependencies   F1 → F3   F2→ F4   (F1 . F2)… Read More
Consider the entities ‘hotel room’, and ‘person’ with a many to many relationship ‘lodging’ as shown below: If we wish to store information about the… Read More
The Function Point (FP) calculated for a software project are often used to obtain an estimate of Lines of Code (LOC) required for that project.… Read More
A user level process in Unix traps the signal sent on a Ctrl-C input, and has a signal handling routine that saves appropriate files before… Read More
The shell command find -name passwd -print is executed in /etc directory of a computer system running Unix. Which of the following shell commands will… Read More
A student wishes to create symbolic links in a computer system running Unix. Three text files named “file 1”, “file 2” and “file 3” exist… Read More
A hash table contains 10 buckets and uses linear probing to resolve collisions. The key values are integers and the hash function used is key… Read More

Start Your Coding Journey Now!