Home | Contact us | My Profile| Sign In| Member Login| Counseller Login
  Ranking | Exams | Online Test | Results | Blogs | Career Counselling | News Room | Study Abroad | Add Your Institute

 
Universities in India
Open Universities
Central Universities
Deemed Universities
Institution in India
Pvt./Govt./Atonomus
IIT/IIM/ITS etc.
Colleges in India
Medical
Engineering
Management
State/Alpha/Search
Courses in India
Regular
Part Time
Correspondence
High School
Statewise
ICSE
CBSE
Study Abroad
TOFFEL
ACT
GRE
GMAT
Question Bank
Solved Papers
Company Papers
Placement
Solved Paper
GATE Download Information Technology Question Papers
GATE Download Information Technology  Question Papers
Information Technology papers 03 Questions And Answers No. Question  
1  The availability of a complex software is 90%. Its Mean Time Between Failure (MTBF) is 200 days. Because of the critical nature of the usage, the organization deploying the software further enhanced it to obtain an availability of 95%. In the process, the Mean Time To Repair (MTTR) increased by 5 days.
What is the MTBF of the enhanced software  
Options  A) 205 days  B) 300 days  
C) 500 days  D) 700 days  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
2  A line L in a circuit is said to have a stuck-at-0 fault if the line permanently has a logic value 0. Similarly a line L in a circuit is said to have a stuck-at-1 fault if the line permanently has a logic value 1. A circuit is said to have a multiple stuck-at fault if one or more lines have stuck at faults. The total number of distinct multiple stuck-at faults possible in a circuit with N lines is  
Options  A) 3 N  B) 3 N -1  
C) 2 N -1  D) 2 N  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
3  Which of the following statements is TRUE about the regular expression 01*0?  
Options  A) It represents a finite set of finite strings.  B) It represents an infinite set of finite strings.  
C) It represents a finite set of infinite strings.  D) It represents an infinite set of infinite strings.  
 
Your Answer     ( Not Answered )  
Correct Answer  B  
 
4  In a population of N families, 50% of the families have three children, 30% of the families have two children and the remaining families have one child. What is the probability that a randomly picked child belongs to a family with two children?  
Options  A) 3  
23  
 B) 6  
23  
 
C) 3  
10  
 D) 3  
5  
 
 
Your Answer     ( Not Answered )  
Correct Answer  B  
 
5  We have two designs D1 and D2 for a synchronous pipeline processor. D1 has 5 pipeline stages with execution times of 3 nsec, 2 nsec, 4 nsec, 2 nsec and 3 nsec while the design D2 has 8 pipeline stages each with 2 nsec execution time. How much time can be saved using design D2 over design D1 for executing 100 instructions?  
Options  A) 214 nsec  B) 202 nsec  
C) 86 nsec  D) -200 nsec  
 
Your Answer     ( Not Answered )  
Correct Answer  A  
 
6  The numbers 1, 2,.... n are inserted in a binary search tree in some order. In the resulting tree, the right subtree of the root contains p nodes. The first number to be inserted in the tree must be  
Options  A) p  B) p + 1
 
C) n - p  D) n - p + 1  
 
Your Answer     ( Not Answered )  
Correct Answer  D  
 
7  In a computer system, four files of size 11050 bytes, 4990 bytes, 5170 bytes and 12640 bytes need to be stored. For storing these files on disk, we can use either 100 byte disk blocks or 200 byte disk blocks (but can't mix block sizes). For each block used to store a file, 4 bytes of bookkeeping information also needs to be stored on the disk. Thus, the total space used to store a file is the sum of the space taken to store the file and the space taken to store the bookkeeping information for the blocks allocated for storing the file. A disk block can store either book keeping information for a file or data from a file, but not both.
What is the total space required for storing the files using 100 byte disk blocks and 200 byte disk blocks respectively?  
Options  A) 35400 and 35800 bytes  B) 35800 and 35400 bytes  
C) 35600 and 35400 bytes  D) 35400 and 35600 bytes  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
8  Which of the following commands or sequences of commands will rename a file x to file y in a Unix system ?
I.   mv y, x
II.  mv x, y
III. cp y, x  (rm x)
IV. cp x, y (rm x)  
Options  A) II and III  B) II and IV  
C) I and III  D) II only  
 
Your Answer     ( Not Answered )  
Correct Answer  B  
 
9  Let n = p 2 q, where p and q are distinct, prime numbers. How many numbers m satisfy 1 £ m £ n and gcd (m, n) = 1? Note that gcd (m, n) is the greatest common divisor of m and n.  
Options  A) p(q - 1)  B) pq  
C) (p 2   - 1) (q - 1)  D) p(p - 1) (q - 1)  
 
Your Answer     ( Not Answered )  
Correct Answer  D  
 
10  Let A be a set with n elements. Let C be a collection of distinct subsets of A such that for any two subsets S 1 and S 2 in C, either S 1 Ì S 2 or S 2 Ì S 1 . What is the maximum cardinality of C?  
Options  A) n  B) n + 1
 
C) 2 n-1 + 1  D) n!
 
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
11  Consider two tables in a relational database with columns and rows as follows:
Table: Student                                   Table: Department
Roll_no     Name    Dept_id               Dept_id     Dept_name
1               ABC    1                          1               A
2               DEF     1                          2               B
3               GHI      2                          3               C
4               JKL      3
Roll_no is the primary key of the Student table, Dept_id is the primary hey of the Department table and Student. Dept_id is a foreign key from Department. Dept_id What will happen if we try to execute the following two SQL statements?

(i) update Student set Dept_id = Null where Roll_on = 1

(ii) update Department set Dept_id = Null where Dept_id = 1
 
Options  A) Both (i) and (ii) will fail
 B) (i) will fail but (ii) will succeed
 
C) (i) will succeed but (ii) will fail
 D) Both (i) and (ii) will succeed  
 
Your Answer     ( Not Answered )  
Correct Answer  B  
 
12  Let M = (K, å  , G , D , s, F) be a pushdown automaton, where
K = {s, f}, F = {f}, å = {a, b}, G = {a} and
D  = {((s, a, e ), (s, a)), ((s, b, e ), (s, a)), (( s, a, e ), (f, e )), ((f, a, a ), (f, e )), ((f, b, a), (f, e ))}
Which one of the following strings is not a member of L(M)?  
Options  A) aaa  B) aabab  
C) baaba  D) bab  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
13  Let P be a non-deterministic push-down automaton (NPDA) with exactly one state, q, and exactly one symbol, Z, in its stack alphabet. State q is both the starting as well as the accepting state of the PDA. The stack is initialized with one Z before the start of the operation of the PDA. Let the input alphabet of the PDA be å  . Let L(P) be the language accepted by the PDA by reading a string and reaching its accepting state. Let N(P) be the language accepted by the PDA by reading a string and emptying its stack.
Which of the following statements is TRUE?  
Options  A) L(P) is necessarily å  * but N(P) is not necessarily å *.  B) N(P) is necessarily å * but L(P) is not necessarily å *.  
C) Both L(P) and N(P) is necessarily å *.  D) Neither L(P) nor N(P) are necessarily å *.  
 
Your Answer     ( Not Answered )  
Correct Answer  D  
 
14  Let p, q, r and s be four primitive statements. Consider the following arguments:

P: [ ( Ø p Ú   q) Ù (r ® s) Ù (p Ú  r) ] ® ( Ø s ® q)

Q: [ ( Ø p Ú   q) Ù (q ®  (p ® r)) ] ® Ø r

R: [ ((q Ù   r) ® p) Ù ( Ø q  Ú p) ] ®  r

S: [ p Ù (p ®   r) Ù (q  Ú Ø r) ] ®  q

Which of the above arguments are valid?
 
Options  A) P and Q only  B) P and R only  
C) P and S only  D) P, Q, R and S  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
15  Assume that the delivered lines of code L of a software is related to the effort E in person months and duration t in calendar months by the relation L P* (E/B) 1/3  * t 4/3 , where P and B are two constants for the software process and skills factor. For a software project, the effort was estimated to be 20 person months and the duration was estimated to be 8 months. However, the customer asked the project team to complete the software project in 4 months. What would be the required effort in person months?  
Options  A) 10  B) 40  
C) 160  D) 320  
 
Your Answer     ( Not Answered )  
Correct Answer  D  
 
16  Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options represents the technique used by traceroute to identify these hosts  
Options  A) By progressively querying routers about the next router on the path to B using ICMP packets, starting with the first router  B) By requiring each router to append the address to the ICMP packet as it is forwarded to B. The list of all routers en-route to B is returned by B in an ICMP reply packet  
C) By ensuring that an ICMP reply packet is returned to A by each router en-route to B, in the ascending order of their hop distance from A  D) By locally computing the shortest path from A to B  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
17  Consider a list of recursive algorithms and a list of recurrence relations as shown below. Each recurrence relation corresponds to exactly one algorithm and is used to derive the time complexity of the alogrithm.

Recursive Algorithm  Recurrence Relation  
P. Binary search  I. T(n) = T(n-k) + T(k) + cn  
Q. Merge sort  II. T(n) = 2T(n -1) + 1  
R. Quick sort  III. T(n) = 2T(n/2) + cn  
S. Tower of Hanoi  IV. T(n) = T(n/2) + 1  


Which of the following is the correct match between the algorithms and their recurrence relations?
 
Options  A) P-II, Q-III, R-IV, S-I  B) P-IV, Q-III, R-I, S-II  
C) P-III, Q-II, R-IV, S-I  D) P-IV, Q-II, R-I, S-III  
 
Your Answer     ( Not Answered )  
Correct Answer  B  
 
18  A function f defined on stacks of integers satisfies the following properties.
f( f )= 0 and f(push(S, i)) = max (f(S),0) + i for all stacks S and integers i. If a stack S contains the integers 2, -3, 2, -1, 2 in order from, bottom to top, what is f(S)?  
Options  A) 6  B) 4
 
C) 3  D) 2  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
19  Consider the following C program which is supposed to compute the transpose of a given 4x4 matrix M. Note that, there is an X in the program which indicates some missing statements. Choose the correct option to replace X in the program.
#include
#define ROW 4
#defme COL 4
int M[ROW][COL] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16};
main( )
{
int i, j, t;
for (i=0; i<4; ++i)
           {
X
}
for (i=0; i<4; ++i) for (j=0; j<4; ++j)
printf("%d", M[i][j]);
}  
Options  A) for(j=0; j<4; ++j){
t = M[i][j];
M[i][j] = M[j][i];
M[j][i] = t;
}  B) for(j=0; j<4; ++j){
M[i][j] = t;
t = M[j][i];
M|j][i] = M[i][j];
}  
C) for(j=i; j<4; ++j){
t = M[j][i];
M[i][j] = M[j][i];
M[j][i] = t;
}  D) for(j=i; j<4; ++j]){
M[i][j] = t;
t = M[j][i];
M[j][i] = M[i][j];
}  
 
Your Answer     ( Not Answered )  
Correct Answer  C  
 
20  Consider the following program module:
int module1 (int x, int y)
while (x!=y) {
if(x > y)
x = x - y;
else y = y - x;
}
return x;
}  

What is Cyclomatic complexity of the above module?
 
Options  A) 1  B) 2  
C) 3  D) 4  
 
Your Answer     ( Not Answered )  
Correct Answer  C