1
GATE CSE 2008
MCQ (Single Correct Answer)
+1
-0.3
Some code optimizations are carried out on the intermediate code because
A
They enhance the portability of the compiler to other target processors
B
Program analysis is more accurate on intermediate code than on machine code
C
The information from dataflow analysis cannot otherwise be used for optimization
D
The information from the front end cannot otherwise be used for optimization
2
GATE CSE 2008
MCQ (Single Correct Answer)
+2
-0.6
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are:
A
n(n - 1) and 2n
B
2n and $${{N(N - 1)} \over 2}$$
C
$${{N(N - 1)} \over 2}$$ and 2n
D
$${{N(N - 1)} \over 2}$$ and n
3
GATE CSE 2008
MCQ (Single Correct Answer)
+2
-0.6
A computer on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. It is initially filled to capacity with 16 Megabits. What is the maximum duration for which the computer can transmit at the full 10 Mbps?
A
1.6 seconds
B
2 seconds
C
5 seconds
D
8 seconds
4
GATE CSE 2008
MCQ (Single Correct Answer)
+2
-0.6
A client process P needs to make a TCP connection to a server process S. Consider the following situation: the server process S executes a socket( ), a bind( ) and a listen( ) system call in that order, following which it is preempted. Subsequently, the client process P executes a socket( ) system call followed by connect( ) system call to connect to the server process S. The server process has not executed any accept( ) system call. Which one of the following events could take place?
A
connect( ) system call returns successfully
B
connect( ) system call blocks
C
connect( ) system call returns an error
D
connect( ) system call results in a core dump
EXAM MAP