CS and IT Gate 2015 Set-2 Questions with Answer

Ques 14 Gate 2015 Set-2


A link has a transmission speed of 106 bits/sec. It uses data packets of size 1000 bytes each. Assume that the acknowledgment has negligible transmission delay, and that its propagation delay is the same as the data propagation delay. Also assume that the processing delays at nodes are negligible. The efficiency of the stop-and-wait protocol in this setup is exactly 25%. The value of the one-way propagation delay (in milliseconds) is ___________.


(a) is the correct answer.

Ques 15 Gate 2015 Set-2


Which one of the following statements is NOT correct about HTTP cookies?

A

A cookies is a piece of code that has the potential to compromise the security of an Internet user.

B

A cookie gains entry to the user’s work area through an HTTP header.

C

A cookie has an expiry date and time.

D

Cookies can be used to track the browsing pattern of a user at a particular site.


(HTTP Protocal) is the correct answer.

Ques 16 GATE 2015 SET-2


Assume that for a certain processor, a read request takes 50 nanoseconds on a cache miss and 5 nanoseconds on a cache hit. Suppose while running a program, it was observed that 80% of the processor's read requests result in a cache hit. The average read access time in nanoseconds is _______.


(14) is the correct answer.

Ques 17 GATE 2015 SET-2


A computer system implements a 40-bit virtual address, page size of 8 kilobytes, and a 128-entry translation look-aside buffer (TLB) organized into 32 sets each having four ways. Assume that the TLB tag does not store any process id. The minimum length of the TLB tag in bits is _______.


(22) is the correct answer.

Ques 18 GATE 2015 SET-2


A computer system implements 8 kilobyte pages and a 32-bit physical address space. Each page table entry contains a valid bit, a dirty bit, three permission bits, and the translation. If the maximum size of the page table of a process is 24 megabytes, the length of the virtual address supported by the system is _______ bits.


(36) is the correct answer.

Ques 19 GATE 2015 SET-2


Consider the sequence of machine instructions given below:
MUL R5, R0, R1
DIV R6, R2, R3
ADD R7, R5, R6
SUB R8, R7, R4
In the above sequence, R0 to R8 are general purpose registers. In the instructions shown, the first register stores the result of the operation performed on the second and the third registers. This sequence of instructions is to be executed in a pipelined instruction processor with the following 4 stages: (1) Instruction Fetch and Decode (IF), (2) Operand Fetch (OF), (3) Perform Operation (PO) and (4) Write back the result (WB). The IF, OF and WB stages take 1 clock cycle each for any instruction. The PO stage takes 1 clock cycle for ADD or SUB instruction, 3 clock cycles for MUL instruction and 5 clock cycles for DIV instruction. The pipelined processor uses operand forwarding from the PO stage to the OF stage. The number of clock cycles taken for the execution of the above sequence of instructions is _______.


(13) is the correct answer.

Ques 20 GATE 2015 SET-2


Consider a processor with byte-addressable memory. Assume that all registers, including Program Counter (PC) and Program Status Word (PSW), are of size 2 bytes. A stack in the main memory is implemented from memory location (0100)16 and it grows upward. The stack pointer (SP) points to the top element of the stack. The current value of SP is (016E)16. The CALL instruction is of two words, the first word is the op-code and the second word is the starting address of the subroutine (one word = 2 bytes). The CALL instruction is implemented as follows:
•Store the current value of PC in the stack.
•Store the value of PSW register in the stack.
•Load the starting address of the subroutine in PC.
The content of PC just before the fetch of a CALL instruction is (5FA0)16. After execution of the CALL instruction, the value of the stack pointer is

A

(016A)16

B

(016C)16

C

(0170)16

D

(0172)16


(d) is the correct answer.

Ques 21 Gate 2015 Set-2


A binary tree T has 20 leaves. The number of nodes in T having two children is ________


(a) is the correct answer.

Ques 22 Gate 2015 Set-2


Consider a complete binary tree where the left and the right subtrees of the root are max-heaps. The lower bound for the number of operations to convert the tree to a heap is

A

Ω(logn)

B

Ω(n)

C

Ω(nlogn)

D

Ω(n2)


(Complexity) is the correct answer.

Ques 23 GATE 2015 SET-2


An unordered list contains n distinct elements. The number of comparisons to find an element in this list that is neither maximum nor minimum is

A

Θ(n log n)

B

Θ(n)

C

Θ(log n)

D

Θ(1)


(d) is the correct answer.

Ques 24 GATE 2015 SET-2


Given below are some algorithms, and some algorithm design paradigms.

Match the above algorithms on the left to the corresponding design paradigm they follow.

A

1-i, 2-iii, 3-i, 4-v

B

1-iii, 2-iii, 3-i, 4-v

C

1-iii, 2-ii, 3-i, 4-iv

D

1-iii, 2-ii, 3-i, 4-v


(c) is the correct answer.

Ques 25 GATE 2015 SET-2


A Young tableau is a 2D array of integers increasing from left to right and from top to bottom. Any unfilled entries are marked with ∞, and hence there cannot be any entry to the right of, or below a ∞. The following Young tableau consists of unique entries.

When an element is removed from a Young tableau, other elements should be moved into its place so that the resulting table is still a Young tableau (unfilled entries may be filled in with a ∞). The minimum number of entries (other than 1) to be shifted, to remove 1 from the given Young tableau is _______.


(5) is the correct answer.

Ques 26 GATE 2015 SET-2


Which one of the following hash functions on integers will distribute keys most uniformly over 10 buckets numbered 0 to 9 for i ranging from 0 to 2020?

A

h(i) = i2 mod 10

B

h(i) = i3 mod 10

C

h(i) = (11 * i2) mod 10

D

h(i) = (12 * i) mod 10


(b) is the correct answer.

Unique Visitor Count

Total Unique Visitors

Loading......