# Tag Archives: GATE-CS-2009

Consider the data given in above question. What is the content of the array after two delete operations on the correct answer to the previous… Read More
Consider a binary max-heap implemented using an array. Which one of the following array represents a binary max-heap? (A) 25,12,16,13,10,8,14 (B) 25,14,13,16,10,8,12 (C) 25,14,16,13,10,8,12 (D)… Read More
Consider the data of previous question. Suppose that the sliding window protocol is used with the sender window size of 2^i where is the number… Read More
Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The propagation time is 25ms. Frames are to be transmitted… Read More
Consider the following relational schema: Suppliers(sid:integer, sname:string, city:string, street:string) Parts(pid:integer, pname:string, color:string) Catalog(sid:integer, pid:integer, cost:real) Assume that, in the suppliers relation above, each supplier and… Read More
Consider the following relational schema:   Suppliers(sid:integer, sname:string, city:string, street:string) Parts(pid:integer, pname:string, color:string) Catalog(sid:integer, pid:integer, cost:real) Consider the following relational query on the above database:   SELECT… Read More
Consider the data given in the previous question. The values of l(i, j) could be obtained by dynamic programming based on the correct recursive definition… Read More
A sub-sequence of a given sequence is just the given sequence with some elements (possibly none or all) left out. We are given two sequences… Read More
Consider the data given in previous question. The address of the 1039th sector is (A) (0, 15, 31) (B) (0, 16, 30) (C) (0, 16,… Read More
A hard disk has 63 sectors per track, 10 platters each with 2 recording surfaces and 1000 cylinders. The address of a sector is given… Read More
Consider the following statements about the cyclomatic complexity of the control flow graph of a program module. Which of these are TRUE? I. The cyclomatic… Read More
Which of the following statements are TRUE? I. The context diagram should depict the system as a single bubble. II. External entities should be identified… Read More
Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of… Read More
While opening a TCP connection, the initial sequence number is to be derived using a time-of-day(ToD) clock that keeps running even when the host is… Read More
In the RSA public key cryptosystem, the private and public keys are (e, n) and (d, n) respectively, where n = p*q and p and… Read More