GATE CSE 2010

Exam Held on Thu Jan 01 1970 00:00:00 GMT+0000 (Coordinated Universal Time)
Click View All Questions to see questions one by one or you can choose a single question from below.

Algorithms

Two alternate packages A and B are available for processing a database having 10...
Consider a complete undirected graph with vertex set {0, 1, 2, 3, 4}. Entry W(ij...
Consider a complete undirected graph with vertex set {0, 1, 2, 3, 4}. Entry W(ij...

Compiler Design

Which data structure in a compiler is used for managing information about variab...
The grammar $$S \to aSa\,|\,\,bS\,|\,\,c$$ is
<p>The program below uses six temporary variables a, b, c, d, e, f.</p> <pre><co...
Which languages necessarily need heap allocation in the runtime environment?

Computer Networks

Which one of the following is not a client-server application?
One of the header fields in an IP datagram is the Time to Live (TTL) field. Whic...
Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respect...
<p>Consider a network with 6 routers R1 to R6 connected with links having weight...
<p>Consider a network with 6 routers R1 to R6 connected with links having weight...

Computer Organization

A main memory unit with a capacity of $$4$$ megabytes is built using $$1M \times...
A computer system has an $$L1$$ cache, an $$L2$$ cache, and a main memory unit c...
A computer system has an $$L1$$ cache, an $$L2$$ cache, and a main memory unit c...
A $$5$$-stage pipelined processor has Instruction Fetch $$(IF),$$ Instruction De...

Data Structures

The following C function takes a simply-linked list as input argument. It modifi...
Consider a complete undirected graph with vertex set {0,1,2,3,4}. Entry W<sub>ij...
Consider a complete undirected graph with vertex set {0,1,2,3,4}. Entry W<sub>ij...
A hash table of length 10 uses open addressing with hash function h(k)=k mod 10,...
A hash table of length 10 uses open addressing with hash function h(k)=k mod 10,...

Database Management System

<p>A relational schema for a train reservation database is given below:</p> <p>P...
The following functional dependencies hold for relations R(A, B, C) and S(B, D, ...
Which of the following concurrency control protocols ensure both conflict serial...
Consider the following schedule for transactions T1, T2 and T3: <img class="ques...
Consider a B<sup>+</sup>- tree in which the maximum number of keys in a node is ...

Digital Logic

$$P$$ is a $$16$$-bit signed integer. The $$2's$$ complement representtation of ...
The minters expansion of $$f\left( {P,Q,R} \right) = PQ + Q\overline R + P\over...
What is the Boolean expression for the output f of the combinational logic circu...
The Boolean expression for the output $$f$$ of the multiplexer shown below is <i...

Discrete Mathematics

What is the probability that divisor of $${10^{99}}$$ is a multiple of $${10^{96...
Suppose the predicate $$F(x,y,t)$$ is used to represent the statements that pers...
Consider a company that assembles computers. The probability of a faulty assembl...
What is the possible number of reflexive relations on a set $$5$$ elements?
Consider the set $$S = \left\{ {1,\,\omega ,\,{\omega ^2}} \right\},$$ where $$\...
Let $$G$$ $$\,\,\,\,\, = \,\,\,\left( {V,\,\,\,\,\,E} \right)$$ be a graph. Defi...
What is the value of $$\mathop {\lim }\limits_{n \to \infty } {\left[ {1 - {1 \o...
The degree sequence of a simple graph is the sequence of the degrees of the node...
Consider the following matrix $$A = \left[ {\matrix{ 2 & 3 \cr x & y \c...
Consider the following matrix $$A = \left[ {\matrix{ 2 & 3 \cr x & y \c...

Operating Systems

Which of the following statements are true? <br>$${\rm I}.$$ Shortest remaining ...
Consider the methods used by processes P1 and P2 for accessing their critical se...
The following program consists of 3 concurrent processes and 3 binary semaphores...
A system uses FIFO policy for page replacement. It has $$4$$ pages frames with n...
A system has n resources R<sub>0</sub>,.....,R<sub>n-1</sub>, and k processes P<...

Programming Languages

Which languages necessarily need heap allocation in the runtime environment?
What does the following program print? <pre><code>#include < stdio.h > void f (i...

Software Engineering

The Cyclomatic complexity of each of the module $$A$$ & $$B$$ shown below is $$1...
What is the appropriate pairing of items in the two columns using listing variou...
The following program is to be tested for statement coverage: <br>begin <br>if $...

Theory of Computation

Let $${L_1}$$ recursive language. Let $${L_2}$$ and $${L_3}$$ be languages that ...
Let $$L = \left\{ {w \in {{\left( {0 + 1} \right)}^ * }\left| {\,w} \right.} \ri...
Let $$w$$ be any string of length $$n$$ in $${\left\{ {0,1} \right\}^ * }$$. Let...
Consider the languages $$$\eqalign{ & {L_1} = \left\{ {{0^i}{1^j}\,\left| {i ...

EXAM MAP

Joint Entrance Examination

JEE Advanced JEE Main

Graduate Aptitude Test in Engineering

GATE CSE GATE EE GATE ECE GATE ME GATE CE GATE PI GATE IN