A processor can support a maximum memory of 4 GB, where the memory is word-addressable
(a word consists of two bytes). The size of the address bus of the processor is at least ___________ bits.
computer organization
gate 2016 set 1
A queue is implemented using an array such that ENQUEUE and DEQUEUE operations are
performed efficiently. Which one of the following statements is CORRECT (n refers to the
number of items in the queue)?
Both operations can be performed in O(1) time
At most one operation can be performed in O(1) time but the worst case time for
the other operation will be Ω(n)
The worst case time complexity for both operations will be Ω(n)
Worst case time complexity for both operations will be Ω(logn)
Data Structures
gate 2016 set 1
Data Structures
gate 2016 set 1
The worst case running times of Insertion sort, Merge sort and Quick sort, respectively, are:
Algorithms
gate 2016 set 1
Sorting
Let G be a weighted connected undirected graph with distinct positive edge weights. If every
edge weight is increased by the same value, then which of the following statements is/are
TRUE?
P: Minimum spanning tree of G does not change
Q: Shortest path between any pair of vertices does not change
Data Structures
gate 2016 set 1
Graphs
The size of the data count register of a DMA controller is 16 bits. The processor needs to
transfer a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable.
The minimum number of times the DMA controller needs to get the control of the system bus
from the processor to transfer the file from the disk to main memory is _____________
computer organization
gate 2016 set 1
The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first
stage (with delay 800 picoseconds) is replaced with a functionally equivalent design involving
two stages with respective delays 600 and 350 picoseconds. The throughput increase of the
pipeline is percent ______________
computer organization
gate 2016 set 1
An operator delete(i) for a binary heap data structure is to be designed to delete the item in
the i-th node. Assume that the heap is implemented in an array and i refers to the i-th index
of the array. If the heap tree has depth d (number of edges on the path from the root to the
farthest leaf), then what is the time complexity to re-fix the heap efficiently after the removal
of the element?
Data Structures
gate 2016 set 1
Data Structures
gate 2016 set 1
Graphs
Algorithms
gate 2016 set 1
Minimum-Spanning-Tree
Data Structures
gate 2016 set 1
An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on
a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP
header is 20 bytes.
The number of fragments that the IP datagram will be divided into for transmission is______________
Computer Networks
gate 2016 set 1
For a host machine that uses the token bucket algorithm for congestion control, the token
bucket has a capacity of 1 megabyte and the maximum output rate is 20 megabytes per second.
Tokens arrive at a rate to sustain output at a rate of 10 megabytes per second. The token bucket
is currently full and the machine needs to send 12 megabytes of data. The minimum time
required to transmit the data is ______________ seconds.
Computer Networks
gate 2016 set 1
A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames
are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000
bits/second). Size of an acknowledgement is 100 bytes and the transmission rate at the receiver
is 8 Kbps. The one-way propagation delay is 100 milliseconds.
Assuming no frame is lost, the sender throughput is _______________ bytes/second.
Computer Networks
gate 2016 set 1
A processor has 40 distinct instructions and 24 general purpose registers. A 32-bit instruction
word has an opcode, two register operands and an immediate operand. The number of bits
available for the immediate operand field is ______________
computer organization
gate 2016
Breadth First Search (BFS) is started on a binary tree beginning from the root vertex. There is
a vertex t at a distance four from the root. If t is the n-th vertex in this BFS traversal, then the
maximum possible value of n is _____________
Data Structures
gate 2016
Algorithms
gate 2016
Sorting
The Floyd-Warshall algorithm for all-pair shortest paths computation is based on
Divide-and-Conquer paradigm.
Dynamic Programming paradigm.
neither Greedy nor Divide-and-Conquer nor Dynamic Programming paradigm.
Algorithms
gate 2016
Data Structures
gate 2016
Linked-List
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim
requires
Computer Networks
gate 2016