CS and IT GATE 2016 Set-2 Questions with Answer

Ques 27 Computer Network


In an Ethernet local area network, which one of the following statements is TRUE ?

A

A station stops to sense the channel once it starts transmitting a frame.

B

The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size.

C

A station continues to transmit the packet even after the collision is detected.

D

The exponential backoff mechanism reduces the probability of collision on retransmissions



Ques 28 Computer Network


Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires

A

Anarkali’s public key.

B

Salim’s public key.

C

Salim’s private key.

D

Anarkali’s private key.



Ques 29 Data Structure


The number of ways in which the numbers 1, 2, 3, 4, 5, 6, 7 can be inserted in an empty binary search tree, such that the resulting tree has height 6, is _____________.
Note: The height of a tree with a single node is 0.


a is the correct answer.


Ques 30 Data Structure


A complete binary min-heap is made by including each integer in [1, 1023] exactly once. The depth of a node in the heap is the length of the path from the root of the heap to that node. Thus, the root is at depth 0. The maximum depth at which integer 9 can appear is _____________


a is the correct answer.


Ques 31 Data Structure


In an adjacency list representation of an undirected simple graph G = (V, E), each edge (u, v) has two adjacency list entries: [v] in the adjacency list of u, and [u] in the adjacency list of v. These are called twins of each other. A twin pointer is a pointer from an adjacency list entry to its twin. If |E| = m and |V| = n, and the memory size is not a constraint, what is the time complexity of the most efficient algorithm to set the twin pointer in each entry in each adjacency list?

A

Θ(n2)

B

Θ(m+n)

C

Θ(m2)

D

Θ(n4)



Ques 32 Data Structure


Consider the following New-order strategy for traversing a binary tree:

Visit the root;
Visit the right subtree using New-order
Visit the left subtree using New-order

The New-order traversal of the expression tree corresponding to the reverse polish expression 3 4 * 5 - 2 ˆ 6 7 * 1 + - is given by:

A

+ - 1 6 7 * 2 ˆ 5 - 3 4 *

B

- + 1 * 6 7 ˆ 2 - 5 * 3 4

C

- + 1 * 7 6 ˆ 2 - 5 * 4 3

D

1 7 6 * + 2 5 4 3 * - ˆ -



Ques 33 Data Structure


B+ Trees are considered BALANCED because

A

the lengths of the paths from the root to all leaf nodes are all equal.

B

the lengths of the paths from the root to all leaf nodes differ from each other by at most 1.

C

the number of children of any two non-leaf sibling nodes differ by at most 1.

D

the number of records in any two leaf nodes differ by at most 1.



Ques 34 DBMS


Consider the following database schedule with two transactions, T1 and T2.

S = r2(X); r1(X); r2(Y); w1(X); r1(Y); w2(X); a1; a2;

where ri(Z) denotes a read operation by transaction Ti on a variable Z, wi(Z) denotes a write operation by Ti on a variable Z and ai denotes an abort by transaction Ti . Which one of the following statements about the above schedule is TRUE?

A

S is non-recoverable

B

S is recoverable, but has a cascading abort

C

S does not have a cascading abort

D

S is strict



Ques 35 DBMS


Suppose a database schedule S involves transactions T1, ....Tn. Construct the precedence graph of S with vertices representing the transactions and edges representing the conflicts. If S is serializable, which one of the following orderings of the vertices of the precedence graph is guaranteed to yield a serial schedule?

A

Topological order

B

Depth-first order

C

Breadth-first order

D

Ascending order of transaction indices



Ques 36 Design Algorithm Analysis


Let A1, A2, A3, and A4 be four matrices of dimensions 10 x 5, 5 x 20, 20 x 10, and 10 x 5, respectively. The minimum number of scalar multiplications required to find the product A1 A2A3A4 using the basic matrix multiplication method is______________.


a is the correct answer.


Ques 37 Design Algorithm Analysis


Breadth First Search (BFS) is started on a binary tree beginning from the root vertex. There is a vertex t at a distance four from the root. If t is the n-th vertex in this BFS traversal, then the maximum possible value of n is ________


a is the correct answer.


Ques 38 Design Algorithm Analysis


N items are stored in a sorted doubly linked list. For a delete operation, a pointer is provided to the record to be deleted. For a decrease-key operation, a pointer is provided to the record on which the operation is to be performed.

An algorithm performs the following operations on the list in this order: Θ(N) delete, O(log N) insert, O(log N) find, and Θ(N) decrease-key What is the time complexity of all these operations put together

A

O(Log2N)

B

O(N)

C

O(N2)

D

Θ(N2 Log N)



Ques 39 Design Algorithm Analysis


The Floyd-Warshall algorithm for all-pair shortest paths computation is based on

A

Greedy paradigm.

B

Divide-and-Conquer paradigm.

C

Dynamic Programming paradigm.

D

neither Greedy nor Divide-and-Conquer nor Dynamic Programming paradigm.



Unique Visitor Count

Total Unique Visitors

Loading......