In an Ethernet local area network, which one of the following statements is TRUE?
A station stops to sense the channel once it starts transmitting a frame.
The purpose of the jamming signal is to pad the frames that are smaller than the
minimum frame size.
A station continues to transmit the packet even after the collision is detected.
The exponential backoff mechanism reduces the probability of collision on
retransmissions.
Computer Networks
gate 2016
Consider a processor with 64 registers and an instruction set of size twelve. Each instruction
has five distinct fields, namely, opcode, two source register identifiers, one destination register
identifier, and a twelve-bit immediate value. Each instruction must be stored in memory in
a byte-aligned fashion. If a program has 100 instructions, the amount of memory (in bytes)
consumed by the program text is ______________
computer organization
gate 2016
The width of the physical address on a machine is 40 bits. The width of the tag field in a 512
KB 8-way set associative cache is ______________ bits.
computer organization
gate 2016
computer organization
gate 2016
Algorithms
gate 2016
Time-Complexity
The number of ways in which the numbers 1, 2, 3, 4, 5, 6, 7 can be inserted in an empty binary
search tree, such that the resulting tree has height 6, is __________________
Note: The height of a tree with a single node is 0.
Data Structures
gate 2016
Data Structures
gate 2016
Graphs
computer organization
gate 2016
Computer Networks
gate 2016
Note: 802.11 MAC = Wifi
I. This is true, maximum 3 overlapping channels are possible in Wifi.
II. The RTS (Request To Send) and CTS(Clear To Send) are control frames which is used for collision avoidance, not in collision detection, (so, II is False)
III. Every frame in Wifi is Acked, because Wifi stations do not use collusion detection. (True)
Computer Networks
gate 2016
Computer Networks
gate 2016
Consider a TCP client and a TCP server running on two different machines. After completing data transfer, the TCP client calls close to terminate the connection and a FIN segment is sent to the TCP server. Server-side TCP responds by sending an ACK which is received by the client-side TCP. As per the TCP connection state diagram(RFC 793), in which state does the client side TCP connection wait for the FIN from the server-side TCP?
Computer Networks
GATE 2017 SET 1
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
(I) S can launch a birthday attack to replace m with a fraudulent message.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(III) R can launch a birthday attack to replace m with a fraudulent message.
Computer Networks
GATE 2017 SET 1
Let T be a binary search tree with 15 nodes. The minimum and maximum possible heights of T are:
Note: The height of a tree with a single node is 0.
Data Structures
GATE 2017 SET 1
Binary-Trees
Consider a database that has the relation schema EMP (EmpId, EmpName, and DeptName). An instance of the schema EMP and a SQL query on it are given below.
The output of executing the SQL query is _______. Note: This questions appeared as Numerical Answer Type.
GATE 2017 SET 1
Threads of a process share
global variables but not heap
heap but not global variables
neither global variables nor heap
both heap and global variables
operating systems
GATE 2017 SET 1
Consider a two-level cache hierarchy L1 and L2 caches. An application incurs 1.4 memory accesses per instruction on average. For this application, the miss rate of L1 cache 0.1, the L2 cache experience on average. 7 misses per 1000 instructions. The miss rate of L2 expressed correct to two decimal places is ______________.
computer organization
GATE 2017 SET 1
Consider the following functions from positives integers to real numbers 10, √n, n, log2n, 100/n. The CORRECT arrangement of the above functions in increasing order of asymptotic complexity is:
Algorithms
GATE 2017 SET 1