Previous GATE Paper With Answer Keys and Solutions - Computer Science Cs/it
Previous GATE Paper With Answer Keys and Solutions - Computer Science Cs/it
Previous GATE Paper With Answer Keys and Solutions - Computer Science Cs/it
GATE
2015
2016
COMPUTER SCIENCE / IT
GATE papers with answer
keys and Solution
www.gateinstructors.in
Contents
Topic
Page No.
1 - 16
17 - 18
19 - 31
32 - 34
35 - 50
51 - 52
53 - 69
70 - 71
72 - 87
88 - 89
http://gateinstructors.in
http://gateinstructors.in/test_series_registration.php
www.gateinstructors.in
2012
Q.2
;
{
(Choice A\ n) ;
s.
char inChar = A
switch ( inChar )
case A : printf
case B :
case C : printf
case D :
case E :
default : printf
in
(Choice B) ;
( No Choice ) ; }
st
ru
(A) No Choice
(B) Choice A
(C) Choice A
ct
or
Q.3
Choice B No Choice
te
Q.4
in
(A) (n log n)
w.
The worst case running time to search for an element in a balanced binary search tree with n2n
elements is
ww
Q.5
(B) NP-complete P =
(D) P = NP-complete
ga
(A) NP-complete = NP
(C) NP-hard = NP
(B) (n2n)
(C) (n)
www.gateinstructors.in
(D) (log n)
2012
Q.6
Y
0
1
0
1
f (X, Y)
0
0
1
1
(C) X Y
(B) X + Y
(D) Y
The decimal value 0.5 in IEEE single precision floating point representation has
(A) fraction bits of 000000 and exponent value of 0
(B) fraction bits of 000000 and exponent value of 1
(C) fraction bits of 100000 and exponent value of 0
(D) no exact representation
Q.8
Q.9
(B) 4
(C) 7
Consider the function f(x) = sin(x) in the interval x [/4, 7/4]. The number and location(s) of the
local minima of this function are
s.
(B) Datagram
(C) Message
(D) Frame
ru
Let A be the 2 2 matrix with elements a11 = a12 = a21 = +1 and a22 = 1. Then the eigenvalues of
the matrix A19 are
(B) 10242 and 10242
(D) 5122 and 5122
in
st
ga
te
What is the complement of the language accepted by the NFA shown below?
Assume = {a} and is the empty string.
w.
ww
Q.12
ct
or
The protocol data unit (PDU) for the application layer in the Internet stack is
(A) Segment
Q.11
in
(A) One, at /2
(B) One, at 3/2
(C) Two, at /2 and 3/2
(D) Two, at /4 and 3/2
Q.10
(D) 8
(A)
(C) a*
(B) {}
www.gateinstructors.in
(D) {a , }
2012
Q.13
What is the correct translation of the following statement into mathematical logic?
Some real numbers are rational
(A) x (real(x) rational(x))
(B) x (real(x) rational(x))
(C) x (real(x) rational(x))
(D) x (rational(x) real(x))
Q.14
Given the basic ER and relational models, which of the following is INCORRECT?
(A) An attribute of an entity can have more than one value
(B) An attribute of an entity can be composite
(C) In a row of a relational table, an attribute can have more than one value
(D) In a row of a relational table, an attribute can have exactly one value or a NULL value
Q.15
(C) Q and R
The recurrence relation capturing the optimal execution time of the Towers of Hanoi problem with
n discs is
Let G be a simple undirected planar graph on 10 vertices with 15 edges. If G is a connected graph,
then the number of bounded faces in any embedding of G on the plane is equal to
(B) 4
(C) 5
ct
or
(A) 3
Q.18
in
st
ru
(C) 1 Kbits
in
(A) 64 bits
(D) 2 Kbits
te
Q.20
(D) 6
Let W(n) and A(n) denote respectively, the worst case and average case running time of an
algorithm executed on an input of size n. Which of the following is ALWAYS TRUE?
(A) A(n) = (W(n))
(C) A(n) = O (W(n))
Q.19
(D) Q and S
s.
Q.16
(B) P and S
Consider a random variable X that takes values +1 and 1 with probability 0.5 each. The values of
the cumulative distribution function F(x) at x = 1 and +1 are
ww
Q.21
w.
ga
(B) 0 and 1
www.gateinstructors.in
2012
Q.22
Which of the following transport layer protocols is used to support electronic mail?
(A) SMTP
Q.23
(B) IP
(B) 27
(C) 221
(D) 224
(A) 1, 2, 3, 4
(B) 1, 2
(C) 2, 3, 4
(D) 3, 4
Given the language L = {ab, aa, baa}, which of the following strings are in L*?
1)
2)
3)
4)
abaabaaabaa
aaaabaaaa
baaaaabaaaab
baaaaabaa
(B) 2, 3 and 4
(D) 1, 3 and 4
w.
ga
te
in
st
ru
ct
or
s.
in
(A) 1, 2 and 3
(C) 1, 2 and 4
ww
Q.25
(D) UDP
In the IPv4 addressing format, the number of networks allowed under Class C addresses is
(A) 214
Q.24
(C) TCP
www.gateinstructors.in
2012
(B)
(C)
(D)
in
(A)
read (Q);
if P = 0 then Q := Q + 1 ;
write (Q).
T2 : read (Q);
read (P);
if Q = 0 then P := P + 1 ;
write (P).
s.
Consider the following transactions with data items P and Q initialized to zero:
T1 :read (P);
ct
or
Q.27
ru
Q.26
st
in
te
ga
(A) 1
(B) 3
(C) 5
(D) 7
Let G be a weighted graph with edge weights greater than one and G be the graph constructed by
squaring the weights of edges in G. Let T and T be the minimum spanning trees of G and G,
respectively, with total weights t and t. Which of the following statements is TRUE?
w.
Q.29
ww
Q.28
www.gateinstructors.in
2012
Q.30
What is the minimal form of the Karnaugh map shown below? Assume that X denotes a dont care
term.
ab
00
01
11
10
cd
00
01
11
10
Q.31
(C) b d ab c d
(B) b d b c
(A) b d
(D) b d b c c d
Arrival
time
0
1
3
Time Units
Required
5
7
4
The completion order of the 3 processes under the policies FCFS and RR2 (round robin scheduling
with CPU quantum of 2 time units) are
s.
Q.32
in
te
This implementation
ga
ReleaseLock(L){
L = 0;
}
in
st
ru
AcquireLock(L){
while (Fetch_And_Add(L,1))
L = 1;
}
ct
or
memory location X, increments it by the value i, and returns the old value of X. It is used in the
pseudocode shown below to implement a busy-wait lock. L is an unsigned integer shared variable
initialized to 0. The value of 0 corresponds to lock being available, while any non-zero value
corresponds to the lock being not available.
Q.33
ww
w.
(B) 5/12
(C) 2/3
www.gateinstructors.in
(D) 1/6
2012
Q.34
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available
with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A,
and a quarter to Organization B, while retaining the remaining with itself. Which of the following is
a valid allocation of addresses to A and B?
(A) 245.248.136.0/21 and 245.248.128.0/22
(B) 245.248.128.0/21 and 245.248.128.0/22
(C) 245.248.132.0/22 and 245.248.132.0/21
(D) 245.248.136.0/24 and 245.248.132.0/21
Suppose a circular queue of capacity (n 1) elements is implemented with an array of n elements.
Assume that the insertion and deletion operations are carried out using REAR and FRONT as array
index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full
and queue empty are
(B) full: (REAR+1) mod n == FRONT
empty: (FRONT+1) mod n == REAR
w.
ga
te
in
st
ru
ct
or
s.
in
ww
Q.35
www.gateinstructors.in
2012
Consider the program given below, in a block-structured pseudo-language with lexical scoping and
nesting of procedures permitted.
Program main;
Var ...
Procedure A1;
Var ...
Call A2;
End A1
Procedure A2;
Var ...
Procedure A21;
Var ...
Call A1;
End A21
Call A21;
End A2
Call A1;
End main.
A1
A1
A2
ct
or
A2
A21
A21
ACCESS
LINKS
FRAME
POINTER
A1
ACCESS
LINKS
st
ru
A1
FRAME
POINTER
in
Main
s.
(A)
(D)
in
(C)
A1
A1
ga
FRAME
POINTER
Main
te
Main
A2
w.
A2
A21
ww
Q.36
A21
ACCESS
LINKS
FRAME
POINTER
A1
www.gateinstructors.in
ACCESS
LINKS
2012
Q.37
How many onto (or surjective) functions are there from an n-element (n 2) set to a 2-element set?
Q.38
(A) 2n
(B) 2n 1
(C) 2n 2
(D) 2(2n 2)
Let G be a complete undirected graph on 6 vertices. If vertices of G are labeled, then the number of
distinct cycles of length 4 in G is equal to
Q.39
(A) 15
(B) 30
(C) 90
(D) 360
A list of n strings, each of length n, is sorted into lexicographic order using the merge-sort
algorithm. The worst case running time of this computation is
Q.40
(A) O (n log n)
(B) O (n2 log n)
(C) O (n2 + log n)
(D) O (n2)
Consider the directed graph shown in the figure below. There are multiple shortest paths between
vertices S and T. Which one will be reported by Dijkstras shortest path algorithm? Assume that, in
any iteration, the shortest path to a vertex v is updated only when a strictly shorter path to v is
discovered.
2
C
A
E
D
1
3
D
4
3
F
s.
in
Q.42
(A) 3 KBytes
(B) 35 KBytes
(C) 280 KBytes
(D) dependent on the size of the disk
Consider the virtual page reference string
1, 2, 3, 2, 4, 1, 3, 2, 4, 1
on a demand paged virtual memory system running on a computer system that has main memory
size of 3 page frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number
of page faults under the corresponding page replacement policy. Then
te
in
st
ru
ct
or
Q.41
(A) SDT
(B) SBDT
(C) SACDT
(D) SACET
A file system with 300 GByte disk uses a file descriptor with 8 direct block addresses, 1 indirect
block address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and the
size of each disk block address is 8 Bytes. The maximum possible file size in this file system is
w.
Suppose R1(A, B) and R2(C, D) are two relation schemas. Let r1 and r2 be the corresponding
relation instances. B is a foreign key that refers to C in R2. If data in r1 and r2 satisfy referential
integrity constraints, which of the following is ALWAYS TRUE?
(A)
(B)
(C)
(D)
ww
Q.43
ga
B(r1) C(r2) =
C(r2) B(r1) =
B(r1) = C(r2)
B(r1) C(r2)
www.gateinstructors.in
2012
(A) 1005 ms
(B) 1010 ms
(C) 3000 ms
(D) 3003 ms
Consider an instance of TCPs Additive Increase Multiplicative Decrease (AIMD) algorithm where
the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first
transmission is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find the
congestion window size at the end of the tenth transmission.
(A) 8 MSS
(C) 7 MSS
(D) 12 MSS
Consider the set of strings on {0,1} in which, every substring of 3 symbols has at most two zeros.
For example, 001110 and 011001 are in the language, but 100010 is not. All strings of length less
than 3 are also in the language. A partially completed DFA that accepts this language is shown
below.
00
0
1
01
10
11
1
st
11
ga
01
1
1
10
00
00
01
10
11
00
(B)
(C)
00
01
10
11
01
0
te
00
1
w.
00
01
10
11
0, 1
s.
ct
or
in
ww
Q.46
(B) 14 MSS
ru
Q.45
Consider a source computer (S) transmitting a file of size 106 bits to a destination computer (D)
over a network of two routers (R1 and R2) and three links (L1, L2, and L3). L1 connects S to R1; L2
connects R1 to R2; and L3 connects R2 to D. Let each link be of length 100 km. Assume signals
travel over each link at a speed of 108 meters per second. Assume that the link bandwidth on each
link is 1Mbps. Let the file be broken down into 1000 packets each of size 1000 bits. Find the total
sum of transmission and propagation delays in transmitting the file from S to D?
in
Q.44
01
0
1
10
11
q
1
0
0
(D)
11
q
0
0
0
00
00
01
10
11
01
1
10
11
1
10
www.gateinstructors.in
q
0
2012
The height of a tree is defined as the number of edges on the longest path in the tree. The function
shown in the pseudocode below is invoked as height(root) to compute the height of a binary
tree rooted at the tree pointer root.
int height (treeptr n)
{ if (n == NULL) return -1;
if (n left == NULL)
if (n right == NULL) return 0;
else return
B1
// Box 1
return
B2
// Box 2
}
}
w.
ga
te
in
st
ru
ct
or
s.
in
ww
Q.47
11
www.gateinstructors.in
2012
/*
Line 1 */
}
void prtFun(void)
{
static int a = 2;
int b = 1;
a += ++b;
printf( \n %d %d , a, b);
/*
Line 2 */
2
1
1
4
6
2
2
2
0
in
4
6
6
(D)
3
5
5
1
2
2
4
6
6
2
1
1
4
6
2
(D)
2
2
0
ga
te
1
1
2
(C)
w.
3
4
4
(B)
st
(A)
ru
ww
Q.49
1
1
2
(C)
s.
3
4
4
(B)
ct
or
(A)
in
Q.48
12
www.gateinstructors.in
4
4
2
2
2
0
2012
Id
12
15
99
Q.50
A
Name
Arun
Shreya
Rohit
Age
60
24
11
Id
15
25
98
99
B
Name
Shreya
Hari
Rohit
Rohit
Age
24
40
20
11
Id
10
99
Area
02
01
How many tuples does the result of the following relational algebra expression contain? Assume
that the schema of AB is the same as that of A.
(AB)
(A)
(B) 4
(C) 5
(D) 9
How many tuples does the result of the following SQL query contain?
(B) 3
(C) 0
(D) 1
w.
ga
te
in
st
ru
ct
or
s.
(A) 4
in
SELECT A.Id
FROM A
WHERE A.Age > ALL (SELECT B.Age
FROM B
WHERE B.Name = Arun)
ww
Q.51
C
Phone
2200
2100
13
www.gateinstructors.in
2012
S
A
B
$
S
error
E3
The FIRST and FOLLOW sets for the non-terminals A and B are
(B) FIRST(A) = {a, b, $}
FIRST(B) = {a, b, }
FOLLOW(A) = {a, b}
FOLLOW(B) = {$}
in
(D) E1: A S, S
E2: B S, S
E3: B S
s.
ct
or
Q.53
b
E2
AS
BS
st
ru
Q.52
a
E1
AS
BS
ga
Q.54
te
in
A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32 Bytes. The
processor sends 32 bit addresses to the cache controller. Each cache tag directory entry contains, in
addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit.
(C) 16
(D) 27
(C) 40 Kbits
(D) 32 Kbits
ww
Q.55
(B) 14
w.
(A) 11
14
www.gateinstructors.in
2012
(B) 10
(C) 15
(D) 25
Q.57 Choose the most appropriate alternative from the options given below to complete the following
sentence:
Despite several the mission succeeded in its attempt to resolve the conflict.
(A) attempts
(B) setbacks
(C) meetings
(D) delegations
Q.58 Which one of the following options is the closest in meaning to the word given below?
Mitigate
(A) Diminish
(B) Divulge
(C) Dedicate
(D) Denote
in
(A) They gave us the money back less the service charges of Three Hundred rupees.
(B) This countrys expenditure is not less than that of Bangladesh.
(C) The committee initially asked for a funding of Fifty Lakh rupees, but later settled for a lesser
sum.
(D) This countrys expenditure on educational reforms is very less.
ct
or
s.
Q.60 Choose the most appropriate alternative from the options given below to complete the following
sentence:
Sureshs dog is the one was hurt in the stampede.
(B) which
(C) who
(D) whom
ru
(A) that
st
in
Q.61 Wanted Temporary, Part-time persons for the post of Field Interviewer to conduct personal
interviews to collect and collate economic data. Requirements: High School-pass, must be
available for Day, Evening and Saturday work. Transportation paid, expenses reimbursed.
te
Which one of the following is the best inference from the above advertisement?
w.
ga
(A) Gender-discriminatory
(B) Xenophobic
(C) Not designed to make the post attractive
(D) Not gender-discriminatory
ww
Q.62 A political party orders an arch for the entrance to the ground in which the annual convention is
being held. The profile of the arch follows the equation y = 2x 0.1x2 where y is the height of the
arch in meters. The maximum possible height of the arch is
(A) 8 meters
(B) 10 meters
(C) 12 meters
15
www.gateinstructors.in
(D) 14 meters
2012
Q.63 An automobile plant contracted to buy shock absorbers from two suppliers X and Y. X supplies
60% and Y supplies 40% of the shock absorbers. All shock absorbers are subjected to a quality test.
The ones that pass the quality test are considered reliable. Of Xs shock absorbers, 96% are reliable.
Of Ys shock absorbers, 72% are reliable.
The probability that a randomly chosen shock absorber, which is found to be reliable, is made by Y
is
(A) 0.288
(B) 0.334
(C) 0.667
(D) 0.720
(B) Q, R
(C) P, R
(D) R, S
(B) OW
(C) PV
(D) PW
ww
w.
ga
te
in
st
ru
ct
or
s.
in
16
www.gateinstructors.in
ga
w.
ww
s.
ct
or
B
C
Marks to All
B
C
A
B
C
D
C
D
B
C
C
C
D
D
C
D
C
C
C
C
D
C
B
B
B
Marks to All
B
C
B
B
A
A
D
C
Marks to All
Marks to All
D
in
st
ru
Question no.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
te
Paper
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
in
17
www.gateinstructors.in
s.
B
B
A
A
Marks to All
D
A
C
D
A
B
A
C
C
A
A
B
A
D
Marks to All
D
B
B
C
A
or
Question no.
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
ww
w.
ga
te
in
st
ru
ct
Paper
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
in
18
www.gateinstructors.in
2013
Suppose p is the number of cars per minute passing through a certain road junction between 5 PM
and 6 PM, and p has a Poisson distribution with mean 3. What is the probability of observing fewer
than 3 cars during any given minute in this interval?
(A) 8/(2e3)
Q.3
(B) 9/(2e3)
(C) 17/(2e3)
1 x
x ( x + 1) x + 1
(A)
(C)
1 y ( y + 1)
y +1
z +1
z ( z + 1)
0 x y
x2 y2
yz
y2 z2
z2
1 x +1 x2 + 1
(B)
(D)
1 y +1 y2 +1
1 z +1 z2 +1
2 x+ y
x2 + y2
y+z
z
y2 + z2
z2
2
1
in
The smallest integer that can be represented by an 8-bit number in 2s complement form is
(A) -256
(B) -128
(C) -127
(D) 0
ct
Outputs
D3 X0 X1 V
0
x
x
0
0
0
0
1
0
0
1
1
0
1
0
1
1
1
1
1
in
st
Inputs
D0 D1 D2
0
0
0
1
0
0
x
1
0
x
x
1
x
x
x
What function does the truth table represent?
or
ru
Q.5
x2
Q.4
(D) 26/(2e3)
s.
Q.1
ga
(A) O(log n)
(B) O(n)
(D) O(n2)
Which one of the following is the tightest upper bound that represents the time complexity of
inserting an object into a binary search tree of n nodes?
ww
Q.7
(B) Decoder
(D) Demultiplexer
Which one of the following is the tightest upper bound that represents the number of swaps
required to sort n numbers using selection sort?
w.
Q.6
te
(A) O(1)
(B) O(log n)
(C) O(n)
19
www.gateinstructors.in
2013
Q.8
(A) {}
Q.9
(D) {, a}
What is the maximum number of reduce moves that can be taken by a bottom-up parser for a
grammar with no epsilon- and unit-production (i.e., of type A and A a) to parse a string
with n tokens?
(A) n/2
Q.10
(C) a*
(B) n-1
(D) 2n
(C) 2n-1
A scheduling algorithm assigns priority proportional to the waiting time of a process. Every process
starts with priority zero (the lowest priority). The scheduler re-evaluates the process priorities every
T time units and decides the next process to schedule. Which one of the following is TRUE if the
processes have no I/O operations and all arrive at time zero?
(A) This algorithm is equivalent to the first-come-first-serve algorithm.
(B) This algorithm is equivalent to the round-robin algorithm.
(C) This algorithm is equivalent to the shortest-job-first algorithm.
(D) This algorithm is equivalent to the shortest-remaining-time-first algorithm.
Match the problem domains in GROUP I with the solution technologies in GROUP II.
GROUP I
GROUP II
or
The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are
ct
Q.12
st
ru
te
in
Using public key cryptography, X adds a digital signature to message M, encrypts <M, >, and
sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the
operations?
w.
ga
(A) Encryption: Xs private key followed by Ys private key; Decryption: Xs public key followed
by Ys public key
(B) Encryption: Xs private key followed by Ys public key; Decryption: Xs public key followed
by Ys private key
(C) Encryption: Xs public key followed by Ys private key; Decryption: Ys public key followed
by Xs private key
(D) Encryption: Xs private key followed by Ys public key; Decryption: Ys private key followed
by Xs public key
ww
Q.13
Interoperability
BPMN
Publish-find-bind
XML
s.
(1)
(2)
(3)
(4)
in
Q.11
20
www.gateinstructors.in
2013
Q.14
Assume that source S and destination D are connected through two intermediate routers labeled R.
Determine how many times each packet has to visit the network layer and the data link layer during
a transmission from S to D.
Q.15
An index is clustered, if
(A) it is on a set of fields that form a candidate key.
(B) it is on a set of fields that include the primary key.
(C) the data records of the file are organized in the same order as the data entries of the index.
(D) the data records of the file are organized not in the same order as the data entries of the index.
Q.17
Y: P(b)P(c)P(d)
Y: P(b)P(c)P(d)
Y: P(c)P(b)P(d)
Y: P(c)P(b)P(d)
Z: P(c)P(d)P(a)
Z: P(a)P(c)P(d)
Z: P(a)P(c)P(d)
Z: P(c)P(d)P(a)
s.
X: P(a)P(b)P(c)
X: P(b)P(a)P(c)
X: P(b)P(a)P(c)
X: P(a)P(b)P(c)
or
(A)
(B)
(C)
(D)
in
Three concurrent processes X, Y, and Z execute three different code segments that access and
update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores
a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes the
P operation on semaphores c, d, and a before entering the respective code segments. After
completing the execution of its code segment, each process invokes the V operation (i.e., signal) on
its three semaphores. All semaphores are binary semaphores initialized to one. Which one of the
following represents a deadlock-free order of invoking the P operations by the processes?
ct
Q.16
in
st
ru
(D) 3 only
(A) 1, 2 and 3
w.
ga
ww
Q.18
te
21
www.gateinstructors.in
2013
What is the time complexity of Bellman-Ford single-source shortest path algorithm on a complete
graph of n vertices?
(A) (n2)
Q.20
(B) (n2log n)
(C) (n3)
In a k-way set associative cache, the cache is divided into v sets, each of which consists of k lines.
The lines of a set are placed in sequence one after another. The lines in set s are sequenced before
the lines in set (s+1). The main memory blocks are numbered 0 onwards. The main memory block
numbered j must be mapped to any one of the cache lines from
(A) (j mod v) * k to (j mod v) * k + (k-1)
(C) (j mod k) to (j mod k) + (v-1)
Q.21
Which one of the following expressions does NOT represent exclusive NOR of x and y?
(A) xy + x y
Q.22
(B) x y
(C) x y
1
x 3 27
x 3
if
in
(D) f ( x ) =
x =3
x3
if
if
0.6
0.36
f (x ) dx
3
1.2
1.44
1.5
2.25
1.8
3.24
2.1
4.41
2.4
5.76
2.7
7.29
3.0
9.00
(B) 9.003
(C) 9.017
(D) 9.045
ru
(A) 8.983
0.9
0.81
or
0.3
0.09
ct
0
0
The value of
st
Consider an undirected random graph of eight vertices. The probability that there is an edge
between a pair of vertices is 1/2. What is the expected number of unordered cycles of length three?
(B) 1
(C) 7
(D) 8
in
(A) 1/8
te
w.
ga
(A) P only
ww
Q.25
4,
8 x
(B) f ( x ) =
x
f(x)
Q.24
(D) x y
2,
if x = 3
(A) f ( x ) = x 1, if x > 3
x +3
, if
x<3
3
if
x3
x + 3,
(C) f ( x ) =
if
x>3
x 4
Q.23
(D) (n3log n)
s.
Q.19
22
www.gateinstructors.in
2013
(A) P only
(C) R only
Q.27
in
Q.28
(B) x ( F (x ) P (x ))
(D) x (F ( x ) P ( x ))
or
s.
MBR PC
MAR X
PC Y
Memory MBR
ct
st
Consider a hard disk with 16 recording surfaces (0-15) having 16384 cylinders (0-16383) and each
cylinder contains 64 sectors (0-63). Data storage capacity in each sector is 512 bytes. Data are
organized cylinder-wise and the addressing format is <cylinder no., surface no., sector no.>. A file
of size 42797 KB is stored in the disk and the starting disk location of the file is <1200, 9, 40>.
What is the cylinder number of the last sector of the file, if it is stored in a contiguous manner?
te
in
Q.29
ru
(C) 1283
(D) 1284
(A) (1)
w.
The number of elements that can be sorted in (log n) time using heap sort is
(B) ( log n )
log n
log log n
(C)
(D) (log n)
ww
Q.30
(B) 1282
ga
(A) 1281
23
www.gateinstructors.in
2013
Q.31
Q.32
(B) (n2log n)
(C) (n3)
(D) (n3logn)
{
}
p q r
L2 = {0 1 0 | p, q, r 0, p r }
L1 = 0 p 1q 0 r | p, q, r 0
ru
ct
or
s.
in
Q.33
L2 is context-free.
L1 L2 is context-free.
Complement of L2 is recursive.
Complement of L1 is context-free but not regular.
in
te
1.
2.
3.
4.
st
w.
ga
ww
Q.34
(A) 2
(B) 1
(C) 1
(D) 2
24
www.gateinstructors.in
2013
Q.35
(A) 1
(B) 2
(C) 2.5
(D) 5
In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and
the fragment offset value is 300. The position of the datagram, the sequence numbers of the first
and the last bytes of the payload, respectively are
s.
Q.37
Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in
an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be
2,00,000 km/s.
in
Q.36
ru
st
in
te
ga
w.
ww
Q.38
ct
or
25
www.gateinstructors.in
2013
Q.39
A certain computation generates two arrays a and b such that a[i]=f(i)for 0 i < n and
b[i] = g (a[i] )for 0 i < n. Suppose this computation is decomposed into two concurrent processes
X and Y such that X computes the array a and Y computes the array b. The processes employ two
binary semaphores R and S, both initialized to zero. The array a is shared by the two processes. The
structures of the processes are shown below.
Process X:
private i;
for (i=0; i<n; i++) {
a[i] = f(i);
ExitX(R, S);
}
Process Y:
private i;
for (i=0; i<n; i++) {
EntryY(R, S);
b[i] = g(a[i]);
}
Which one of the following represents the CORRECT implementations of ExitX and EntryY?
ExitX(R, S) {
(B)
ExitX(R, S) {
P(R);
V(R);
V(S);
V(S);
}
}
EntryY(R, S) {
EntryY(R, S) {
P(S);
P(R);
V(R);
P(S);
}
}
(C)
ExitX(R, S) {
(D)
ExitX(R, S) {
P(S);
V(R);
V(R);
P(S);
}
}
EntryY(R, S) {
EntryY(R, S) {
V(S);
V(S);
P(R);
P(R);
}
}
Consider the following two sets of LR(1) items of an LR(1) grammar.
X c.X, $
X .cX, $
X .d, $
ru
X c.X, c/d
X .cX, c/d
X .d, c/d
ct
Q.40
or
s.
in
(A)
1.
2.
3.
4.
in
(D) 1, 2, 3 and 4
w.
ga
(A) 1 only
(B) 2 only
Which of the following is/are undecidable?
G is a CFG. Is L(G) = ?
G is a CFG. Is L(G) = *?
M is a Turing machine. Is L(M) regular?
A is a DFA and N is an NFA. Is L(A) = L(N)?
ww
Q.41
te
1.
2.
3.
4.
st
Which of the following statements related to merging of the two sets in the corresponding LALR
parser is/are FALSE?
(A) 3 only
26
www.gateinstructors.in
2013
Q.42
What is the return value of f(p,p), if the value of p is initialized to 5 before the call? Note that
the first parameter is passed by reference, whereas the second parameter is passed by value.
int f (int &x, int c) {
c = c - 1;
if (c==0) return 1;
x = x + 1;
return f(x,c) * x;
}
(A) 3024
Q.43
(B) 6561
(C) 55440
The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42. Which
one of the following is the postorder traversal sequence of the same tree?
(A) 10, 20, 15, 23, 25, 35, 42, 39, 30
(C) 15, 20, 10, 23, 25, 42, 35, 39, 30
Q.44
(D) 161051
Consider the following operation along with Enqueue and Dequeue operations on queues, where
k is a global parameter.
(C) (nk)
(D) (n2)
Consider an instruction pipeline with five stages without any branch prediction: Fetch Instruction
(FI), Decode Instruction (DI), Fetch Operand (FO), Execute Instruction (EI) and Write Operand
(WO). The stage delays for FI, DI, FO, EI and WO are 5 ns, 7 ns, 10 ns, 8 ns and 6 ns, respectively.
There are intermediate storage buffers after each stage and the delay of each buffer is 1 ns. A
program consisting of 12 instructions I1, I2, I3, , I12 is executed in this pipelined processor.
Instruction I4 is the only branch instruction and its branch target is I9. If the branch is taken during
the execution of this program, the time (in ns) needed to complete the program is
(B) 5
ga
(A) 4
(D) 328
(C) 6
(D) 7
w.
ww
Q.47
(C) 176
A RAM chip has a capacity of 1024 words of 8 bits each (1K 8). The number of 2 4 decoders
with enable line needed to construct a 16K 16 RAM from 1K 8 RAM is
te
Q.46
(B) 165
in
(A) 132
st
ru
ct
Q.45
(B) (n + k)
or
(A) (n)
s.
in
MultiDequeue(Q){
m = k
while (Q is not empty) and (m > 0) {
Dequeue(Q)
m = m 1
}
}
What is the worst case time complexity of a sequence of n queue operations on an initially empty
queue?
(B) x ( z ( ) y ( ))
(D) x ( y ( ) z ( ))
27
www.gateinstructors.in
2013
Q.49
d;
e;
Suppose the instruction set architecture of the processor has only two registers. The only allowed
compiler optimization is code motion, which moves statements from one place to another while
preserving correctness. What is the minimum number of spills to memory in the compiled code?
(A) 0
(B) 1
(C) 2
(D) 3
What is the minimum number of registers needed in the instruction set architecture of the processor
to compile this code segment without any spill to memory? Do not apply any optimization other
than optimizing register allocation.
(A) 3
(B) 4
in
Q.48
{
a;
(C) 5
(D) 6
st
ru
ct
or
s.
in
The tester now tests the program on all input strings of length five consisting of characters a,
b, c, d and e with duplicates allowed. If the tester carries out this testing with the four
test cases given above, how many test cases will be able to capture the flaw?
(A) Only one
(B) Only two
(C) Only three
(D) All four
If array A is made to hold the string abcde, which of the above four test cases will be successful
in exposing the flaw in this procedure?
(A) None
(B) 2 only
(C) 3 and 4 only
(D) 4 only
ww
Q.51
w.
ga
Q.50
te
28
www.gateinstructors.in
2013
(A) 2
Q.53
(B) 4
(C) 8
(D) 16
What is the minimum number of page colours needed to guarantee that no two synonyms map to
different sets in the processor cache of this computer?
(A) 2
(B) 4
(C) 8
(D) 16
(C) 5
(D) 6
The relation R is
(A) in 1NF, but not in 2NF.
(C) in 3NF, but not in BCNF.
ct
ru
st
in
te
ga
w.
ww
Q.55
(B) 4
s.
(A) 3
in
or
Q.54
29
www.gateinstructors.in
2013
Which one of the following options is the closest in meaning to the word given below?
Nadir
(A) Highest
Q.57
(B) Lowest
(B) neutrality
(B) 504
(D) adaptation
(C) 506
(D) 500
Q.60
(C) generality
Q.59
(D) Integration
Q.58
(C) Medium
s.
in
Q.61
or
ru
ct
1
1
1
1
+
+
+ .......... ..... +
1+ 2
2+ 3
3+ 4
80 + 81
(B) 12/90
(C) 78/90
(D) 77/90
w.
ga
te
(A) 13/90
in
Out of all the 2-digit integers between 1 and 100, a 2-digit number has to be selected at random.
What is the probability that the selected number is not divisible by 7?
ww
Q.62
(B) 8
(D) 10
st
(A) 7
(C) 9
30
www.gateinstructors.in
2013
Q.63
After several defeats in wars, Robert Bruce went in exile and wanted to commit suicide. Just before
committing suicide, he came across a spider attempting tirelessly to have its net. Time and again,
the spider failed but that did not deter it to refrain from making attempts. Such attempts by the
spider made Bruce curious. Thus, Bruce started observing the near-impossible goal of the spider to
have the net. Ultimately, the spider succeeded in having its net despite several failures. Such act of
the spider encouraged Bruce not to commit suicide. And then, Bruce went back again and won
many a battle, and the rest is history.
Which one of the following assertions is best supported by the above information?
(A) Failure is the pillar of success.
(B) Honesty is the best policy.
(C) Life begins and ends with adventures.
(D) No adversity justifies giving up hope.
A tourist covers half of his journey by train at 60 km/h, half of the remainder by bus at 30 km/h and
the rest by cycle at 10 km/h. The average speed of the tourist in km/h during his entire journey is
(A) 36
(C) 24
(D) 18
The current erection cost of a structure is Rs. 13,200. If the labour wages per day increase by 1/5 of
the current wages and the working hours decrease by 1/24 of the current period, then the new cost
of erection in Rs. is
(A) 16,500
(B) 15,180
(C) 11,000
(D) 10,120
w.
ga
te
in
st
ru
ct
or
s.
ww
Q.65
(B) 30
in
Q.64
31
www.gateinstructors.in
GATE 2013 : Answer keys for CS - Computer Science and Information Technology
CS
CS
CS
CS
CS
CS
CS
CS
CS
10
CS
11
CS
12
CS
13
CS
14
CS
15
CS
16
CS
17
CS
18
CS
19
CS
20
CS
21
CS
22
CS
23
CS
24
CS
25
CS
26
CS
CS
CS
st
ru
C
C
27
28
29
CS
30
CS
31
CS
32
CS
33
CS
34
CS
35
te
in
s.
ct
or
CS
ga
w.
ww
Key(s)/Value(s)
in
Paper Q.No
32
www.gateinstructors.in
GATE 2013 : Answer keys for CS - Computer Science and Information Technology
36
CS
37
CS
38
CS
39
CS
40
CS
41
CS
42
Marks to All
CS
43
CS
44
CS
45
CS
46
CS
47
Marks to All
CS
48
CS
49
CS
50
CS
51
CS
52
CS
53
CS
54
CS
55
CS
56
CS
57
CS
58
CS
59
CS
60
CS
61
CS
62
ru
in
st
B
D
63
CS
64
CS
65
ww
w.
ga
te
CS
ct
or
CS
in
Key(s)/Value(s)
s.
Paper Q.No
33
www.gateinstructors.in
ww
w.
ga
te
in
st
ru
ct
or
s.
in
34
www.gateinstructors.in
GATE 2014
Which of the following options is the closest in meaning to the phrase underlined in the sentence
below?
It is fascinating to see life forms cope with varied environmental conditions.
(A) adopt to
Q.2
(B) adapt to
(C) adept in
Choose the most appropriate word from the options given below to complete the following
sentence.
He could not understand the judges awarding her the first prize, because he thought that her
performance was quite __________.
(A) superb
(C) mediocre
In a press meet on the recent scam, the minister said, "The buck stops here". What did the minister
convey by the statement?
(A) He wants all the money
(C) He will assume final responsibility
Q.4
Q.5
The roots of 2 + + = 0 are real and positive. a, b and c are real. Then 2 + || + = 0
has
(B) 2 real roots
(D) 4 real roots
s.
(A) no roots
(C) 3 real roots
ct
or
in
st
ru
The Palghat Gap (or Palakkad Gap), a region about 30 km wide in the southern part of the Western
Ghats in India, is lower than the hilly terrain to its north and south. The exact reasons for the
formation of this gap are not clear. It results in the neighbouring regions of Tamil Nadu getting
more rainfall from the South West monsoon and the neighbouring regions of Kerala having higher
summer temperatures.
te
w.
ga
(A) The Palghat gap is caused by high rainfall and high temperatures in southern Tamil Nadu and
Kerala
(B) The regions in Tamil Nadu and Kerala that are near the Palghat Gap are low-lying
(C) The low terrain of the Palghat Gap has a significant impact on weather patterns in neighbouring
parts of Tamil Nadu and Kerala
(D) Higher summer temperatures result in higher rainfall near the Palghat Gap area
ww
Q.6
(D) exhilarating
in
Q.3
(B) medium
35
www.gateinstructors.in
GATE 2014
Q.7
Geneticists say that they are very close to confirming the genetic roots of psychiatric illnesses such
as depression and schizophrenia, and consequently, that doctors will be able to eradicate these
diseases through early identification and gene therapy.
On which of the following assumptions does the statement above rely?
(A) Strategies are now available for eliminating psychiatric illnesses
(B) Certain psychiatric illnesses have a genetic basis
(C) All human diseases can be traced back to genes and how they are expressed
(D) In the future, genetics will become the only relevant field for identifying psychiatric illnesses
Q.8
Round-trip tickets to a tourist destination are eligible for a discount of 10% on the total fare. In
addition, groups of 4 or more get a discount of 5% on the total fare. If the one way single person
fare is Rs 100, a group of 5 tourists purchasing round-trip tickets will be charged Rs _________.
Q.9
In a survey, 300 respondents were asked whether they own a vehicle or not. If yes, they were
further asked to mention whether they own a car or scooter or both. Their responses are tabulated
below. What percent of respondents do not own a scooter?
Own vehicle
Car
Scooter
Both
Women
34
20
46
20
50
ct
or
s.
in
When a point inside of a tetrahedron (a solid with four triangular surfaces) is connected by straight
lines to its corners, how many (new) internal planes are created with these lines? _____________
w.
ga
te
in
st
ru
ww
Q.10
Men
40
30
60
36
www.gateinstructors.in
GATE 2014
COMPUTER CS
( )
(B) :
( )
(C) :
( )
(D) :
( )
( )
( )
( )
( )
Q.2
Suppose you break a stick of unit length at a point chosen uniformly at random. Then the expected
length of the shorter stick is ________ .
Q.3
Let G=(V,E) be a directed graph where V is the set of vertices and E the set of edges. Then which
one of the following graphs has the same strongly connected components as G ?
) where
= {( , )|( , ) }
(B)
=( ,
) where
= {( , )|( , ) }
(C)
=( ,
) where
= {( , )|
(D)
= ( , ) where
s.
in
=( ,
or
Q.4
(A)
ru
ct
3x + 2y = 1
4x + 7z = 1
x + y + z = 3
x 2y + 7z = 0
w.
ga
te
in
The value of the dot product of the eigenvectors corresponding to any pair of different eigenvalues
of a 4-by-4 symmetric positive definite matrix is _____________________.
ww
Q.5
st
37
www.gateinstructors.in
GATE 2014
Q.6
COMPUTER CS
cos
cos( 6)
cos( 3)
Q.7
(I)
There exists
( , ) such that ( ) = 0.
(II)
There exists
( , ) such that ( ) 0.
(A) I only
(B) II only
tan
tan( 6)
tan( 3)
(B)
(C)
(D)
The base (or radix) of the number system such that the following equation holds is____________.
in
312
= 13.1
20
A machine has a 32-bit architecture, with 1-word long instructions. It has 64 registers, each of
which is 32 bits long. It needs to support 45 instructions, which have an immediate operand in
addition to two register operands. Assuming that the immediate operand is an unsigned integer, the
maximum value of the immediate operand is ____________.
Q.10
ru
ct
or
s.
Q.9
st
#include <stdio.h>
te
in
main()
{
int i;
int *pi = &i;
w.
ga
scanf(%d,pi);
printf(%d\n, i+5);
}
ww
38
www.gateinstructors.in
GATE
G
2014
Q.11
COMPUT
TER CS
(B) ( +
(C) (
(D) (
Q.12
Conssider a rooted
d node binarry tree repressented using pointers.
p
Thee best upper bound
b
on the time
requiired to determ
mine the num
mber of subtreees having exxactly 4 nodees is ( logg ). Thenn the
valuee of + 10 is ________
___.
Q.13
T
Whicch one of the following is TRUE?
(C)
(D)
or
s.
in
(B)
(C)
>
(B)
<
ru
=5
(D)
(A) The
T language
={
(B) The
T language
={
(C) The
T language
={ |
(D) The
T language
={
0} is reegular.
te
ga
in
st
(A)
ct
ment as the
Let be a quicksoort program to sort numbers in ascendinng order usingg the first elem
pivott. Let and
be the num
mber of compparisons madee by for the inputs [1 2 3 4 5] and
[4 1 5 3 2] respectively. Whiich one of thee following ho
olds?
} iss regular.
3 +1
= { , }} is regular.
w.
Q.15
ww
Q.14
(A)
39
www.gateinstructors.in
GATE 2014
Q.16
COMPUTER CS
0,1
1
0,1
0,1
What is the set of reachable states for the input string 0011?
(A) { ,
(B) { ,
(C) { ,
(D) { }
Q.17
ru
ct
1) Waterfall model
st
2) Evolutionary model
4) Spiral development
te
w.
ga
in
ww
Q.18
or
s.
(D)
in
(C) Live variable analysis can be used for dead code elimination.
40
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.19
Suppose a disk has 201 cylinders, numbered from 0 to 200. At some time the disk arm is at cylinder
100, and there is a queue of disk access requests for cylinders 30, 85, 90, 100, 105, 110, 135 and
145. If Shortest-Seek Time First (SSTF) is being used for scheduling the disk access, the request for
cylinder 90 is serviced after servicing ____________ number of requests.
Q.20
Q.21
(B) { , , }
(C) { , , , , }
(D) { }
ct
or
s.
in
S2: Given the table R(a,b,c) where a and b together form the primary key,
the following is a valid table definition.
CREATE TABLE S (
a INTEGER,
d INTEGER,
e INTEGER,
PRIMARY KEY (d),
FOREIGN KEY (a) references R)
ru
ww
w.
ga
te
in
st
41
www.gateinstructors.in
GATE 2014
Q.23
COMPUTER CS
Consider the following three statements about link state and distance vector routing protocols, for a
large network with 500 network nodes and 4000 links.
[S1] The computational overhead in link state protocols is higher than in distance vector protocols.
[S2] A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link
state protocol.
[S3] After a topology change, a link state protocol will converge faster than a distance vector
protocol.
Which one of the following is correct about S1, S2, and S3 ?
Q.24
Which of the following are used to generate a message digest by the network security protocols?
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
Q.25 Identify the correct order in which the following actions take place in an interaction between a web
browser and a web server.
in
(C) 4,1,2,3
(D) 2,4,1,3
ct
or
(A) 4,2,1,3
s.
1.
2.
3.
4.
st
ru
Consider a token ring network with a length of 2 km having 10 stations including a monitoring
station. The propagation speed of the signal is 2 10 m/s and the token transmission time is
ignored. If each station is allowed to hold the token for 2 sec, the minimum time for which the
monitoring station should wait (in sec)before assuming that the token is lost is _______.
Q.27
Let the size of congestion window of a TCP connection be 32 KB when a timeout occurs. The round
trip time of the connection is 100 msec and the maximum segment size used is 2 KB. The time taken
(in msec) by the TCP connection to get back to 32 KB congestion window is _________.
Q.28
Consider a selective repeat sliding window protocol that uses a frame size of 1 KB to send data on a
1.5 Mbps link with a one-way latency of 50 msec. To achieve a link utilization of 60%, the
minimum number of bits required to represent the sequence number field is ________.
ww
w.
ga
te
in
Q.26
42
www.gateinstructors.in
GATE 2014
Q.29
COMPUTER CS
Consider the following four schedules due to three transactions (indicated by the subscript) using
read and write on a data item x, denoted by r(x) and w(x) respectively. Which one of them is
conflict serializable?
(A) r1(x); r2(x); w1(x); r3(x); w2(x)
(B) r2(x);r1(x);w2(x);r3(x);w1(x)
(C) r3(x);r2(x);r1(x);w2(x);w1(x)
(D) r2(x);w2(x);r3(x);r1(x);w1(x)
in
w.
ga
te
in
st
ru
ct
or
s.
ww
Q.30
43
www.gateinstructors.in
GATE 2014
Q.31
COMPUTER CS
An operating system uses the Bankers algorithm for deadlock avoidance when managing the
allocation of three resource types X, Y, and Z to three processes P0, P1, and P2. The table given
below presents the current system state. Here, the Allocation matrix shows the current number of
resources of each type allocated to each process and the Max matrix shows the maximum number
of resources of each type required by each process during its execution.
Allocation
X
Y
Z
P0 0
0
1
P1 3
2
0
P2 2
1
1
X
8
6
3
Max
Y
Z
4
3
2
0
3
3
There are 3 units of type X, 2 units of type Y and 2 units of type Z still available. The system is
currently in a safe state. Consider the following independent requests for additional resources in the
current state:
REQ1: P0 requests 0 units of X, 0 units of Y and 2 units of Z
REQ2: P1 requests 2 units of X, 0 units of Y and 0 units of Z
Which one of the following is TRUE?
Only REQ1 can be permitted.
(B)
(C)
(D)
s.
in
Consider the following set of processes that need to be scheduled on a single CPU. All the times are
given in milliseconds.
Arrival Time
Execution Time
A
B
C
D
E
0
3
5
7
10
6
2
4
6
3
ct
or
Process Name
ru
Q.32
(A)
in
st
Using the shortest remaining time first scheduling algorithm, the average process turnaround time
(in msec) is ____________________.
Assume that there are 3 page frames which are initially empty. If the page reference string is 1, 2, 3,
4, 2, 1, 5, 3, 2, 4, 6, the number of page faults using the optimal replacement policy is__________.
Q.34
ga
te
Q.33
w.
.>
.
ww
44
www.gateinstructors.in
GATE 2014
Q.35
Q.36
COMPUTER CS
nor
(B) One of
and
(C) Both
and
(D) Both
and
are recursive.
Which of the regular expressions given below represent the following DFA?
0
1
I) 0*1(1+00*1)*
II) 0*1*1+11*0*1
III) (0+1)*1
(B) I and III only
w.
ga
te
in
st
ru
ct
or
s.
in
There are 5 bags labeled 1 to 5. All the coins in a given bag have the same weight. Some bags
have coins of weight 10 gm, others have coins of weight 11 gm. I pick 1, 2, 4, 8, 16 coins
respectively from bags 1 to 5. Their total weight comes out to 323 gm. Then the product of the
labels of the bags having 11 gm coins is ___.
ww
Q.37
45
www.gateinstructors.in
GATE 2014
Q.38
COMPUTER CS
Suppose a polynomial time algorithm is discovered that correctly computes the largest clique in a
given graph. In this scenario, which one of the following represents the correct Venn diagram of the
complexity classes P, NP and NP Complete (NPC)?
(A)
(B)
NP
NP
NPC
NPC
(C)
(D)
P=NP=NPC
P=NP
NPC
The minimum number of comparisons required to find the minimum and the maximum of 100
numbers is _________________.
Q.40
(C)
4, 0, and 1
(D)
3, 0, and 2
or
3, 3, and 3
ct
(B)
ru
3, 0, and 1
ww
w.
ga
te
in
st
(A)
s.
in
Q.39
46
www.gateinstructors.in
GATE 2014
Q.41
COMPUTER CS
Consider the following C function in which size is the number of elements in the array E:
int MyX(int *E, unsigned int size)
{
int Y = 0;
int Z;
int i, j, k;
for(i = 0; i < size; i++)
Y = Y + E[i];
for(i = 0; i <
for(j = i;
{
Z = 0;
for(k =
Z =
if (Z >
Y =
}
return Y;
size; i++)
j < size; j++)
i; k <= j; k++)
Z + E[k];
Y)
Z;
}
The value returned by the function MyX is the
(A) maximum possible sum of elements in any sub-array of array E.
(B) maximum element in any sub-array of array E.
(C) sum of the maximum elements in all possible sub-arrays of array E.
st
D = 2
for i = 1 to n do
for j = i to n do
for k = j + 1 to n do
D = D * 3
ct
Consider the following pseudo code. What is the total number of multiplications to be performed?
ru
Q.42
or
s.
in
in
w.
Consider a 6-stage instruction pipeline, where all stages are perfectly balanced.Assume that there is
no cycle-time overhead of pipelining. When an application is executing on this 6-stage pipeline, the
speedup achieved with respect to non-pipelined execution if 25% of the instructions incur 2
pipeline stall cycles is ______________________.
ww
Q.43
ga
te
47
www.gateinstructors.in
GATE
G
2014
Q.44
COMPUT
TER CS
An access
a
sequennce of cache block
b
addressees is of lengthh N and contaains n uniquee block addressses.
The number
n
of unnique block ad
ddresses betw
ween two conssecutive accesses to the saame block adddress
is boounded abovee by k. What is the miss raatio if the acccess sequencee is passed thhrough a cachhe of
assocciativity A k exercising least-recently
l
y-used replaceement policy??
(A) n/N
n
Q.45
(B) 1/N
N
(D) k/n
(C) 1/A
given bbelow.
a
and
m
sum-of-products form of the B
Boolean expreession for the output F of th
he multiplexeer is
The minimal
(B)
(C)
+
+
in
s.
(A)
or
(D)
Q.46
( )=
The function
f
valuee of is ______.
Q.47
A fun
nction ( ) is continuous in the intervaal 0,2 . It is known
k
that ((0) = (2) = 1 and
(1) = 1. Which one of the following statem
ments must be
b true?
( ) + ( ) + co
os
= 0. The
in
n the interval (0,1), ( ) = (2 )
te
F every
(B) For
in
st
ru
ct
ww
Q.48
w.
ga
(C) The
T maximum
m value of thee function in the interval (0,2) is 1
48
www.gateinstructors.in
12
296.
GATE 2014
COMPUTER CS
Q.49
Q.50
Q.51
Consider an undirected graph where self-loops are not allowed. The vertex set of is {( , ): 1
12, 1 12}. There is an edge between ( , ) and ( , ) if | | 1 and | | 1.
The number of edges in this graph is __________.
Q.52
(B) (2, 2, 2, 2, 2, 2)
(C) (3, 3, 3, 1, 0, 0)
(D) (3, 2, 1, 1, 1, 0)
Which one of the following propositional logic formulas is TRUE when exactly two of , , and
are TRUE?
(
(B) ( ( ) ) (
(
in
(C) ( )
)
)
)
w.
ga
te
in
st
ru
ct
or
(D) ( ( ) ) (
s.
(A) ( )
ww
Q.53
49
www.gateinstructors.in
GATE 2014
Q.54
COMPUTER CS
st
ru
ct
or
s.
w.
ga
te
in
ww
Q.55
in
(D) It generates an error because the GROUP BY clause cannot be used with table joins in a subquery.
50
www.gateinstructors.in
GATE2014
AnswerKeysforCSComputerScienceandInformationTechnology
in
Key/Range
C
A
28to30
1100to1300
5to5
D
A
B
7.2to7.2
7to7
D
C
B
12to12
D
147.1to148.1
A
A
C
4to4
A
A
2to2
A
10to10
88.9to89.1
16to16
506to506
C
B
B
1.6to1.6
s.
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
or
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
ru
in
st
Marks
1
1
1
1
1
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
te
ga
w.
1
2
3
4
5
6
7
8
9
10
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Key/Range
B
C
C
96to96
D
C
B
850to850
48to48
6to6
D
0.24to0.27
B
1to1
0to0
C
A
5to5
16383to16383
D
C
1to1
C
C
C
A
D
B
3to3
D
B
D
D
ww
GA
GA
GA
GA
GA
GA
GA
GA
GA
GA
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
Section Q.No.
ct
Section Q.No.
51
www.gateinstructors.in
Marks
1
1
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
ru
ct
or
s.
in
5. The computer allotted to you at the examination center runs specialized software that permits only one
answer to be selected for multiple-choice questions using a mouse and to enter a suitable number for
the numerical answer type questions using the virtual keyboard and mouse.
6. Your answers shall be updated and saved on a server periodically and also at the end of the
examination. The examination will stop automatically at the end of 180 minutes.
7. In each paper a candidate can answer a total of 65 questions carrying 100 marks.
8. The question paper may consist of questions of multiple choice type (MCQ) and numerical answer
type.
9. Multiple choice type questions will have four choices against A, B, C, D, out of which only ONE is the
correct answer. The candidate has to choose the correct answer by clicking on the bubble () placed
before the choice.
10. For numerical answer type questions, each question will have a numerical answer and there will not be
any choices. For these questions, the answer should be enteredby using the virtual keyboard that
appears on the monitor and the mouse.
11. All questions that are not attempted will result in zero marks. However, wrong answers for multiple
choice type questions (MCQ) will result in NEGATIVE marks. For all MCQ questions a wrong
answer will result in deduction of marks for a 1-mark question and marks for a 2-mark question.
12. There is NO NEGATIVE MARKING for questions of NUMERICAL ANSWER TYPE.
te
in
st
13. Non-programmable type Calculator is allowed. Charts, graph sheets, and mathematical tables are NOT
allowed in the Examination Hall. You must use the Scribble pad provided to you at the examination
centre for all your rough work. The Scribble Pad has to be returned at the end of the examination.
ww
w.
ga
I have read and understood all the above instructions. I have also read and understood clearly the
instructions given on the admit card and shall follow the same. I also understand that in case I am found to
violate any of these instructions, my candidature is liable to be cancelled. I also confirm that at the start of
the examination all the computer hardware allotted to me are in proper working condition.
52
www.gateinstructors.in
GATE 2014
Choose the most appropriate phrase from the options given below to complete the following
sentence.
India is a post-colonial country because
(A) it was a former British colony
(B) Indian Information Technology professionals have colonized the world
(C) India does not follow any colonial practices
(D) India has helped other countries gain freedom
Who ___________ was coming to see us this evening?
(A) you said
(C) did you say that
Match the columns.
Column 1
1) eradicate
2) distort
3) saturate
4) utilize
Column 2
P) misrepresent
Q) soak completely
R) use
S) destroy utterly
Q.5
(B) 100
(C) 110
The value of 12 + 12 + 12 + is
(A) 3.464
(B) 3.932
(D) 4.444
st
te
in
The old city of Koenigsberg, which had a German majority population before World War 2, is now
called Kaliningrad. After the events of the war, Kaliningrad is now a Russian territory and has a
predominantly Russian population. It is bordered by the Baltic Sea on the north and the countries of
Poland to the south and west and Lithuania to the east respectively. Which of the statements below
can be inferred from this passage?
w.
ga
ww
Q.6
(C) 4.000
ru
(D) 120
s.
Q.4
ct
or
Q.3
in
Q.2
53
www.gateinstructors.in
GATE 2014
Q.7
The number of people diagnosed with dengue fever (contracted from the bite of a mosquito) in
north India is twice the number diagnosed last year. Municipal authorities have concluded that
measures to control the mosquito population have failed in this region.
Which one of the following statements, if true, does not contradict this conclusion?
(A) A high proportion of the affected population has returned from neighbouring countries where
dengue is prevalent
(B) More cases of dengue are now reported because of an increase in the Municipal Offices
administrative efficiency
(C) Many more cases of dengue are being diagnosed this year since the introduction of a new and
effective diagnostic test
(D) The number of people with malarial fever (also contracted from mosquito bites) has increased
this year
Q.8
(A) 2, 4
(B) 2, 14
(C) 4, 52
(D) 14, 52
The ratio of male to female students in a college for five years is plotted in the following line graph.
If the number of female students doubled in 2009, by what percent did the number of male students
increase in 2009?
Q.10
At what time between 6 . . and 7 . . will the minute hand and hour hand of a clock make an
angle closest to 60?
in
st
ru
ct
or
s.
in
Q.9
(B) 6: 27 . .
(D) 6: 45 . .
w.
ga
te
(A) 6: 22 . .
(C) 6: 38 . .
ww
54
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.1
The security system at an IT office is composed of 10 computers of which exactly four are
working. To check whether the system is functional, the officials inspect four of the computers
picked at random (without replacement). The system is deemed functional if at least three of the
four computers inspected are working. Let the probability that the system is deemed functional be
denoted by . Then 100 = _____________.
Q.2
Each of the nine words in the sentence The quick brown fox jumps over the lazy
dog is written on a separate piece of paper. These nine pieces of paper are kept in a box. One of
the pieces is drawn at random from the box. The expected length of the word drawn is
_____________. (The answer should be rounded to one decimal place.)
Q.3
Q.4
If the matrix
= 1,
= 2 and
ru
ct
or
is equal to ______.
9 5
s.
2
= 4 1
7
in
is such that
st
(D) (0) +
(4) < 0
te
(4) > 0
ww
Q.6
w.
ga
(C) (0) +
in
(A) 2
(B) 2
(C) 2
55
www.gateinstructors.in
GATE 2014
Q.7
COMPUTER CS
(B)
(C)
(D)
Q.8
Consider the equation (123)5 = (x8)y with x and y as unknown. The number of possible solutions is
_____ .
Q.9
A 4-way set-associative cache memory unit with a capacity of 16 KB is built using a block size of 8
words. The word length is 32 bits. The size of the physical address space is 4 GB. The number of
bits for the TAG field is _____
Q.10
te
in
Suppose n and p are unsigned int variables in a C program. We wish to set p to nC3.
If n is large, which one of the following statements is most likely to set p correctly?
p = n * (n-1) * (n-2) / 6;
(B)
p = n * (n-1) / 2 * (n-2) / 3;
(C)
p = n * (n-1) / 3 * (n-2) / 2;
(D)
w.
ga
(A)
ww
Q.11
st
ru
ct
or
s.
in
56
www.gateinstructors.in
GATE 2014
(A) 10, 8, 7, 3, 2, 1, 5
(B) 10, 8, 7, 2, 3, 1, 5
(C) 10, 8, 7, 1, 2, 3, 5
(D) 10, 8, 7, 5, 3, 2, 1
Which one of the following correctly determines the solution of the recurrence relation with
T(1) = 1?
( )=2
+ log
(A) ( )
Q.14
Q.15
(B) ( log )
(C) (
(D) (log )
Consider the tree arcs of a BFS traversal from a source node W in an unweighted, connected,
undirected graph. The tree T formed by the tree arcs is a data structure for computing
(A)
(B)
(C)
the shortest paths from W to only those nodes that are leaves of T.
(D)
If L1 = {
0} and L2= {
in
Q.13
0}, consider
s.
Q.12
COMPUTER CS
or
ru
ct
w.
Let
(B) If
(C) If
(D) If
ww
Q.16
ga
te
in
st
57
www.gateinstructors.in
GATE 2014
Q.17
COMPUTER CS
Consider the grammar defined by the following production rules, with two operators and +
|
+ |
Q.18
Q.19
(B)
Type checking
(C)
(D)
Inline expansion
in
(A) The requirements document also describes how the requirements that are listed in the document
are implemented efficiently.
s.
(B) Consistency and completeness of functional requirements are always achieved in practice.
or
ct
(D) Requirements review is carried out to find the errors in system design.
A FAT (file allocation table) based file system is being used and the total overhead of each entry in
the FAT is 4 bytes in size. Given a 100 x 106 bytes disk on which the file system is stored and data
block size is 103 bytes, the maximum size of a file that can be stored on this disk in units of 106
bytes is ____________.
Q.21
The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key is
_____.
ww
w.
ga
te
in
st
ru
Q.20
58
www.gateinstructors.in
GATE 20144
Q.22
CO
OMPUTER CS
Studen
ntName
Shankkar
Swati
Shankkar
Swati
Ganesh
StudentEm
mail
shankar@m
math
swati@ee
shankar@ccse
swati@meech
ganesh@civil
Stu
udentAge
X
19
19
18
19
CPI
9.4
9.5
9.4
9.3
8.7
Name, Studen
ntAge) to be a key for this instance, thhe value X shhould NOT be
b
Foor (StudentNa
equual to _________________.
Q.23
Q.24
in
(B)) bind
s.
(C)) listen
w.
ga
te
in
st
ru
ct
In the
t diagram shown below
w, L1 is an Ethernet
E
LAN
N and L2 is a Token-Rinng LAN. An
n IP packet
origginates from
m sender S annd traverses to R, as sho
own. The linnks within eeach ISP and
d across the
twoo ISPs, are all point-to--point opticaal links. Th
he initial vaalue of the T
TTL field is 32. The
maxximum possiible value off the TTL fieeld when R reeceives the datagram
d
is ____________
__.
ww
Q.25
or
(D)) accept
59
www.gateinstructors.in
Consider the store and forward packet switched network given below. Assume that the bandwidth
of each link is 106 bytes / sec. A user on host A sends a file of size 103 bytes to host B through
routers R1 and R2 in three different ways. In the first case a single packet containing the complete
file is transmitted from A to B. In the second case, the file is split into 10 equal parts, and these
packets are transmitted from A to B. In the third case, the file is split into 20 equal parts and these
packets are sent from A to B. Each packet contains 100 bytes of header information along with the
user data. Consider only transmission time and ignore processing, queuing and propagation delays.
Also assume that there are no errors during transmission. Let T1, T2 and T3 be the times taken to
transmit the file in the first, second and third case respectively. Which one of the following is
CORRECT?
A
R1
R2
s.
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3.
or
QR1R2R3H
in
st
ru
ct
H acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer
encryption is used, with DES as the shared key encryption protocol. Consider the following four
pieces of information:
ga
w.
te
Which of I1, I2, I3, and I4 can an intruder learn through sniffing at R2 alone?
ww
Q.27
in
60
www.gateinstructors.in
GATE 2014
Q.28
COMPUTER CS
A graphical HTML browser resident at a network client machine Q accesses a static HTML
webpage from a HTTP server S. The static HTML page has exactly one static embedded image
which is also at S. Assuming no caching, which one of the following is correct about the HTML
webpage loading (including the embedded image)?
(A) Q needs to send at least 2 HTTP requests to S, each necessarily in a separate TCP
connection to server S
(B) Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is
sufficient
(C) A single HTTP request from Q to S is sufficient, and a single TCP connection between Q
and S is necessary for this
(D) A single HTTP request from Q to S is sufficient, and this is possible without any TCP
connection between Q and S
T2
Reads(X)
T3
T4
Writes(X)
Commit
in
Writes(X)
Commit
Reads(X)
Reads(Y)
Commit
st
ru
ct
or
s.
Writes(Y)
Reads(Z)
Commit
in
te
ga
w.
ww
Q.29
61
www.gateinstructors.in
GATE 2014
Q.30
COMPUTER CS
Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop method.
There are 3 buffers each of size equal to disk block size, out of which one buffer is reserved for
intermediate results. Assuming size(r(R))<size(s(S)), the join will have fewer number of
disk block accesses if
(A) relation r(R) is in the outer loop.
(B) relation s(S) is in the outer loop.
(C) join selection factor between r(R) and s(S) is more than 0.5.
(D) join selection factor between r(R) and s(S) is less than 0.5.
Consider the procedure below for the Producer-Consumer problem which uses semaphores:
semaphore n = 0;
semaphore s = 1;
void producer()
{
while(true)
{
produce();
semWait(s);
addToBuffer();
semSignal(s);
semSignal(n);
}
}
void consumer()
{
while(true)
{
semWait(s);
semWait(n);
removeFromBuffer();
semSignal(s);
consume();
}
}
s.
in
The producer will be able to add an item to the buffer, but the consumer can never
consume it.
(B)
The consumer will remove no more than one item from the buffer.
(C)
Deadlock occurs if the consumer succeeds in acquiring semaphore s when the buffer is
empty.
(D)
The starting value for the semaphore n must be 1 and not 0 for deadlock-free operation.
w.
ga
te
in
st
ru
ct
or
(A)
ww
Q.31
62
www.gateinstructors.in
GATE 2014
Q.32
COMPUTER CS
Three processes A, B and C each execute a loop of 100 iterations. In each iteration of the loop, a
process performs a single computation that requires tc CPU milliseconds and then initiates a single
I/O operation that lasts for tio milliseconds. It is assumed that the computer where the processes
execute has sufficient number of I/O devices and the OS of the computer assigns different I/O
devices to each process. Also, the scheduling overhead of the OS is negligible. The processes have
the following characteristics:
Process id
A
B
C
tc
100 ms
350 ms
200 ms
tio
500 ms
500 ms
500 ms
The processes A, B, and C are started at times 0, 5 and 10 milliseconds respectively, in a pure time
sharing system (round robin scheduling) that uses a time slice of 50 milliseconds. The time in
milliseconds at which process C would complete its first I/O operation is ___________.
A computer has twenty physical page frames which contain pages numbered 101 through 120.
Now a program accesses the pages numbered 1, 2, , 100 in that order, and repeats the access
sequence THRICE. Which one of the following page replacement policies experiences the same
number of page faults as the optimal page replacement policy for this program?
(A) Least-recently-used
(B) First-in-first-out
(C) Last-in-first-out
(D) Most-recently-used
ru
ct
i 1024
j 32
k 4
t1 + t0
t3 + t2
X[t4]
st
=
=
=
=
=
=
in
t0
t1
t2
t3
t4
t5
or
te
Which one of the following statements about the source code for the C program is CORRECT?
X is declared as int X[32][32][8].
(B)
(C)
(D)
w.
ga
(A)
ww
Q.34
s.
in
Q.33
63
www.gateinstructors.in
GATE 2014
Q.35
COMPUTER CS
Let
<
={<
2014 }. Then, is
Q.36
= { {0,1} |
has at least as many occurrences of (110)s as (011)s}. Let
|
{
=
{0,1}
has at least as many occurrences of (000)s as (111)s}. Which one of the
following is TRUE?
Let
( )
(B)
(C) Both
nor
are regular
in
(D) Neither
are regular
Q.38
Suppose P, Q, R, S, T are sorted sequences having lengths 20, 24, 30, 35, 50 respectively. They are
to be merged into a single sequence by merging together two sequences at a time. The number of
comparisons that will be needed in the worst case by the optimal algorithm for doing this is ____.
ww
w.
ga
te
in
st
ru
ct
or
s.
Q.37
64
www.gateinstructors.in
GATE 2014
Q.39
COMPUTER CS
Consider the expression tree shown. Each leaf represents a numerical value, which can either be 0
or 1. Over all possible choices of the values at the leaves, the maximum possible value of the
expression represented by the tree is ___.
+
0/1
0/1
0/1
0/1
0/1
0/1
0/1
in
0/1
ct
s.
or
Q.40
te
Suppose a stack implementation supports an instruction REVERSE, which reverses the order of
elements on the stack, in addition to the PUSH and POP instructions. Which one of the following
statements is TRUE with respect to this modified stack?
ga
w.
(B) A queue can be implemented where ENQUEUE takes a single instruction and DEQUEUE takes
a sequence of two instructions.
ww
Q.41
in
st
ru
Give a value q (to 2 decimals) such that f(q) will return q:_____.
(C) A queue can be implemented where ENQUEUE takes a sequence of three instructions and
DEQUEUE takes a single instruction.
(D) A queue can be implemented where both ENQUEUE and DEQUEUE take a single instruction
each.
65
www.gateinstructors.in
GATE 2014
Q.42
COMPUTER CS
int f(int j)
{
static int i = 50;
int k;
if (i == j)
{
printf(something);
k = f(i);
return 0;
}
else return 0;
}
Which one of the following is TRUE?
The function returns 0 for all values of j.
(B)
(C)
(D)
The function will exhaust the runtime stack or run into an infinite loop when j = 50.
In designing a computers cache system, the cache block (or cache line) size is an important
parameter. Which one of the following statements is correct in this context?
in
Q.43
(A)
s.
(B) A smaller block size implies a smaller cache tag and hence lower cache tag overhead
If the associativity of a processor cache is doubled while keeping the capacity and block size
unchanged, which one of the following is guaranteed to be NOT affected?
te
in
Q.44
st
ru
ct
or
(C) A smaller block size implies a larger cache tag and hence lower cache hit time
w.
The value of a float type variable is represented using the single-precision 32-bit floating point
format of IEEE-754 standard that uses 1 bit for sign, 8 bits for biased exponent and 23 bits for
mantissa. A float type variable X is assigned the decimal value of 14.25. The representation of X
in hexadecimal notation is
ww
Q.45
ga
(A) C1640000H
(B) 416C0000H
(C) 41640000H
66
www.gateinstructors.in
(D) C16C0000H
GATE 2014
Q.46
COMPUTER CS
Q.47
(B) Only II
0
1
1
1
0
0
1
1
1
0
0
1
1
1
0
1
0
0
0
1
is ______.
The probability that a given positive integer lying between 1 and 100 (both inclusive) is NOT
divisible by 2, 3 or 5 is ______ .
Q.49
Q.50
Consider the following relation on subsets of the set of integers between 1 and 2014. For two
distinct subsets and of we say < if the minimum element in the symmetric difference of
the two sets is in .
te
1: There is a subset of
2: There is a subset of
in
st
ru
ct
or
s.
in
Q.48
ga
w.
ww
1 nor 2 is true
67
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.51
A cycle on
Q.52
The number of distinct minimum spanning trees for the weighted graph below is _____
Q.53
or
)( )
( )
ga
te
SQL allows duplicate tuples in relations, and correspondingly defines the multiplicity of tuples in
the result of joins. Which one of the following queries always gives the same answer as the nested
query shown below:
w.
ww
Q.54
in
st
ru
(D)
( ))
ct
(C) (
s.
(A) (( ) ( )) ( )
(B) ( ) (
is _____.
in
68
www.gateinstructors.in
GATE 2014
COMPUTER CS
Consider a main memory system that consists of 8 memory modules attached to the system bus,
which is one word wide. When a write request is made, the bus is occupied for 100 nanoseconds
(ns) by the data, address, and control signals. During the same 100 ns, and for 500 ns thereafter, the
addressed memory module executes one cycle accepting and storing the data. The (internal)
operation of different memory modules may overlap in time, but only one request can be on the bus
at any time. The maximum number of stores (of one word each) that can be initiated in 1
millisecond is ____________
w.
ga
te
in
st
ru
ct
or
s.
in
ww
Q.55
SET-2
69
www.gateinstructors.in
GATE2014
AnswerKeysforCSComputerScienceandInformationTechnology
st
te
in
Key/Range
C
26to26
D
C
B
C
A
C
1000to1000
D
A
B
A
34to34
358to358
6to6
1.72to1.74
C
D
D
D
A
A
6to6
0.259to0.261
8to8
A
5to5
6to6
B
C
10000to10000
s.
or
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
ct
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
in
Marks
1
1
1
1
1
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
ga
w.
1
2
3
4
5
6
7
8
9
10
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Key/Range
A
B
A
B
C
B
D
D
140to140
A
11.85to11.95
3.8to3.9
36to36
0to0
A
D
C
3to3
20to20
9to9
B
A
A
B
A
D
B
A
C
99.55to99.65
8to8
19to19
A
ww
GA
GA
GA
GA
GA
GA
GA
GA
GA
GA
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
SSection Q.No.
ru
SSection Q.No.
70
www.gateinstructors.in
Marks
1
1
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
ru
ct
or
s.
in
5. The computer allotted to you at the examination center runs specialized software that permits only one
answer to be selected for multiple-choice questions using a mouse and to enter a suitable number for
the numerical answer type questions using the virtual keyboard and mouse.
6. Your answers shall be updated and saved on a server periodically and also at the end of the
examination. The examination will stop automatically at the end of 180 minutes.
7. In each paper a candidate can answer a total of 65 questions carrying 100 marks.
8. The question paper may consist of questions of multiple choice type (MCQ) and numerical answer
type.
9. Multiple choice type questions will have four choices against A, B, C, D, out of which only ONE is the
correct answer. The candidate has to choose the correct answer by clicking on the bubble () placed
before the choice.
10. For numerical answer type questions, each question will have a numerical answer and there will not be
any choices. For these questions, the answer should be enteredby using the virtual keyboard that
appears on the monitor and the mouse.
11. All questions that are not attempted will result in zero marks. However, wrong answers for multiple
choice type questions (MCQ) will result in NEGATIVE marks. For all MCQ questions a wrong
answer will result in deduction of marks for a 1-mark question and marks for a 2-mark question.
12. There is NO NEGATIVE MARKING for questions of NUMERICAL ANSWER TYPE.
te
in
st
13. Non-programmable type Calculator is allowed. Charts, graph sheets, and mathematical tables are NOT
allowed in the Examination Hall. You must use the Scribble pad provided to you at the examination
centre for all your rough work. The Scribble Pad has to be returned at the end of the examination.
ww
w.
ga
I have read and understood all the above instructions. I have also read and understood clearly the
instructions given on the admit card and shall follow the same. I also understand that in case I am found to
violate any of these instructions, my candidature is liable to be cancelled. I also confirm that at the start of
the examination all the computer hardware allotted to me are in proper working condition.
71
www.gateinstructors.in
GATE 2014
(C) III
If she _______________ how to calibrate the instrument, she _______________ done the
experiment.
(A) knows, will have
(C) had known, could have
Q.3
(B) well-connected
(C) rambling
(D) friendly
Q.5
Q.4
(D) IV
(B) 37
(C) 64
(D) 26
The table below has question-wise data on the performance of students in an examination. The
marks for each question are also listed. There is no negative or partial marking in the examination.
Q No.
Marks
1
2
3
2
3
2
Answered
Correctly
21
15
23
Answered
Wrongly
17
27
18
Not
Attempted
6
2
3
in
Q.2
(B) II
s.
Q.1
(A) 1.34
ct
or
What is the average of the marks obtained by the class in the examination?
(B) 1.74
(C) 3.02
st
te
in
A dance programme is scheduled for 10.00 a.m. Some students are participating in the programme
and they need to come an hour earlier than the start of the event. These students should be
accompanied by a parent. Other students and parents should come in time for the programme. The
instruction you think that is appropriate for this is
w.
ga
(A) Students should come at 9.00 a.m. and parents should come at 10.00 a.m.
(B) Participating students should come at 9.00 a.m. accompanied by a parent, and other parents
and students should come by 10.00 a.m.
(C) Students who are not participating should come by 10.00 a.m. and they should not bring their
parents. Participating students should come at 9.00 a.m.
(D) Participating students should come before 9.00 a.m. Parents who accompany them should
come at 9.00 a.m. All others should come at 10.00 a.m.
ww
Q.6
ru
(D) 3.91
72
www.gateinstructors.in
GATE 2014
Q.7
By the beginning of the 20 century, several hypotheses were being proposed, suggesting a
paradigm shift in our understanding of the universe. However, the clinching evidence was provided
by experimental measurements of the position of a star which was directly behind our sun.
Which of the following inference(s) may be drawn from the above passage?
(i) Our understanding of the universe changes based on the positions of stars
(ii) Paradigm shifts usually occur at the beginning of centuries
(iii) Stars are important objects in the universe
(iv) Experimental evidence was important in confirming this paradigm shift
(A) (i), (ii) and (iv)
Q.8
The Gross Domestic Product (GDP) in Rupees grew at 7% during 2012-2013. For international
comparison, the GDP is compared in US Dollars (USD) after conversion based on the market
exchange rate. During the period 2012-2013 the exchange rate for the USD increased from
Rs. 50/ USD to Rs. 60/ USD. Indias GDP in USD during the period 2012-2013
(A) increased by 5 %
(C) decreased by 20%
The ratio of male to female students in a college for five years is plotted in the following line graph.
If the number of female students in 2011 and 2012 is equal, what is the ratio of male students in
2012 to male students in 2011?
(C) 1.5:1
(D) 2.5:1
ga
Consider the equation: (7526)8 (Y)8 = (4364)8 , where (X)N stands for X to the base N. Find Y.
(B) 1737
(C) 3142
w.
(A) 1634
ww
Q.10
(B) 2:1
te
(A) 1:1
in
st
ru
ct
or
s.
in
Q.9
73
www.gateinstructors.in
(D) 3162
GATE 2014
COMPUTER CS
and
of , | ( )| = | ( )| + | ( )|
and
of , ( ) = ( ) ( )
and
and
of ,
( )=
( )
in
Let and
TRUE?
( )
s.
Q.2
Q.4
st
ru
ct
or
Q.3
te
in
(A) If the trace of the matrix is positive and the determinant of the matrix is negative, at least one
ga
(B) If the trace of the matrix is positive, all its eigenvalues are positive.
(C) If the determinant of the matrix is positive, all its eigenvalues are positive.
ww
positive.
w.
(D) If the product of the trace and determinant of the matrix is positive, all its eigenvalues are
74
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.5
If V1 and V2 are 4-dimensional subspaces of a 6-dimensional vector space V, then the smallest
possible dimension of V1 V2 is ______.
Q.6
If
Q.7
| sin |
is equal to ______ .
( , , , )=
0, 2, 5, 7, 8, 10, 13, 15
The minterms 2, 7, 8 and 13 are do not care terms. The minimal sum-of-products form for F is
Q.8
(A)
(B)
(C)
(D)
Consider the following combinational function block involving four Boolean variables x, y, a,
b where x, a, b are inputs and y is the output.
s.
in
f (x, y, a, b)
{
if (x is 1) y = a;
else y = b;
}
(C) Multiplexor
(D) Flip-flop
ru
Consider the following processors (ns stands for nanoseconds). Assume that the pipeline registers
have zero latency.
te
in
st
P1: Four-stage pipeline with stage latencies 1 ns, 2 ns, 2 ns, 1 ns.
P2: Four-stage pipeline with stage latencies 1 ns, 1.5 ns, 1.5 ns, 1.5 ns.
P3: Five-stage pipeline with stage latencies 0.5 ns, 1 ns, 1 ns, 0.6 ns, 1 ns.
P4: Five-stage pipeline with stage latencies 0.5 ns, 0.5 ns, 1 ns, 1 ns, 1.1 ns.
ga
(C) P3
w.
(A) P1
ww
Q.9
ct
or
Which one of the following digital logic blocks is the most suitable for implementing this function?
75
www.gateinstructors.in
(D) P4
GATE 20144
Q.10
CO
OMPUTER CS
. Consider th
he followingg pseudocodee. What is th
he expected
C = 10
00;
for i = 1 to n do
for j = 1 to
o n do
{
T
Temp
= A[
[i][j] + C;
A[j][i];
A
A[i][j]=
A
A[j][i]
= Temp C;
}
for i = 1 to n do
o n do
for j = 1 to
o
output
(A
A[i][j]);
(A)) The matrixx A itself
(B)) Transpose of the matrixx A
(C)) Adding 1000 to the uppeer diagonal elements
e
and subtracting 100 from low
wer diagonall elements
of A
(D)) None of the above
Thee minimum
m number of arithmettic operatio
ons requiredd to evaluuate
the polynomial
( )=
+4
+ 6 + 5 for a given
g
value of
, usinng only one temporary variable is
_______.
Q.12
Connsider the following rootted tree with the vertex laabeled P as thhe root:
ga
te
in
st
ru
ct
or
s.
in
Q.11
ww
w.
76
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.13 Suppose depth first search is executed on the graph below starting at some unknown vertex.
Assume that a recursive call to visit a vertex is made only after first checking that the vertex
has not been visited earlier. Then the maximum possible recursion depth (including the
initial call) is _________.
Q.14
You have an array of n elements. Suppose you implement quicksort by always choosing the central
element of the array as the pivot. Then the tightest upper bound for the worst case performance is
(A) (
Q.15
(B) ( log )
(C) ( log )
(D)
The length of the shortest string NOT in the language (over = { , }) of the following regular
expression is ______________.
)
st
ru
in
te
ga
(C) increase the chances of reusing the machine-independent code optimizer in other compilers.
w.
ww
Q.17
or
ct
Q.16
s.
in
77
www.gateinstructors.in
GATE 2014
Q.18
COMPUTER CS
Q.19
In the context of modular software design, which one of the following combinations is desirable?
(A) High cohesion and high coupling
(B) High cohesion and low coupling
(C) Low cohesion and high coupling
(D) Low cohesion and low coupling
A system uses 3 page frames for storing process pages in main memory. It uses the Least Recently
Used (LRU) page replacement policy. Assume that all the page frames are initially empty. What is
the total number of page faults that will occur while processing the page reference string given
below?
4, 7, 6, 1, 7, 6, 1, 2, 7, 2
Q.21
(B)
)(
))
(C)
)(
))
(D)
)(
))
s.
)(
or
ct
ru
te
in
st
(A)
(B)
(C)
in a foreign key of
(D)
w.
ga
(A)
ww
Q.22
in
Q.20
78
www.gateinstructors.in
GATE 2014
Q.23
COMPUTER CS
In the following pairs of OSI protocol layer/sub-layer and its functionality, the INCORRECT pair
is
(A) Network layer and Routing
(B) Data Link Layer and Bit synchronization
(C) Transport layer and End-to-end process communication
(D) Medium Access Control sub-layer and Channel sharing
Q.24
Q.25
A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output
bit-string after stuffing is 01111100101, then the input bit-string is
(A)
0111110100
(B)
0111110101
(C)
0111111101
(D)
0111111111
Host A (on TCP/IP v4 network A) sends an IP datagram D to host B (also on TCP/IP v4 network
B). Assume that no error occurred during the transmission of D. When D reaches B, which of the
following IP header field(s) may be different from that of the original datagram D?
(i) TTL
(ii) Checksum
in
s.
ct
or
st
in
An IP router implementing Classless Inter-domain Routing (CIDR) receives a packet with address
131.23.151.76. The routers routing table has the following entries:
Output Interface
Identifier
3
5
2
1
te
Prefix
w.
ga
131.16.0.0/ 12
131.28.0.0/ 14
131.19.0.0/ 16
131.22.0.0/ 15
ww
Q.26
ru
The identifier of the output interface on which this packet will be forwarded is ______.
79
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.27
Every host in an IPv4 network has a 1-second resolution real-time clock with battery backup. Each
host needs to generate up to 1000 unique identifiers per second. Assume that each host has a
globally unique IPv4 address. Design a 50-bit globally unique ID for this purpose. After what
period (in seconds) will the identifiers generated by a host wrap around?
Q.28
An IP router with a Maximum Transmission Unit (MTU) of 1500 bytes has received an IP packet
of size 4404 bytes with an IP header of length 20 bytes. The values of the relevant fields in the
header of the third IP fragment generated by the router for this packet are
(A) MF bit: 0, Datagram Length: 1444; Offset: 370
(B) MF bit: 1, Datagram Length: 1424; Offset: 185
(C) MF bit: 1, Datagram Length: 1500; Offset: 370
(D) MF bit: 0, Datagram Length: 1424; Offset: 2960
Q.29
Consider the transactions T1, T2, and T3 and the schedules S1 and S2 given below.
T1: r1(X); r1(Z); w1(X); w1(Z)
T2: r2(Y); r2(Z); w2(Z)
T3: r3(Y); r3(X); w3(Y)
S1: r1(X); r3(Y); r3(X); r2(Y); r2(Z); w3(Y); w2(Z); r1(Z); w1(X); w1(Z)
S2: r1(X); r3(Y); r2(Y); r3(X); r1(Z); r2(Z); w3(Y); w1(X); w2(Z); w1(Z)
Only S2 is conflict-serializable.
(C)
(D)
s.
(B)
or
Only S1 is conflict-serializable.
ct
(A)
st
ru
Consider the relational schema given below, where eId of the relation dependent is a foreign
key referring to empId of the relation employee. Assume that every employee has at least one
associated dependent in the dependent relation.
in
te
w.
ga
The above query evaluates to the set of empIds of employees whose age is greater than that of
(A)
some dependent.
(B)
all dependents.
(C)
(D)
ww
Q.30
in
80
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.31 A system contains three programs and each requires three tape units for its operation. The
minimum number of tape units which the system must have such that deadlocks never arise
is _________.
Q.32
An operating system uses shortest remaining time first scheduling algorithm for pre-emptive
scheduling of processes. Consider the following set of processes with their arrival times and CPU
burst times (in milliseconds):
Process
P1
P2
P3
P4
Arrival Time
0
2
3
8
Burst Time
12
4
6
5
Q.33
Consider a paging hardware with a TLB. Assume that the entire page table and all the pages are in
the physical memory. It takes 10 milliseconds to search the TLB and 80 milliseconds to access the
physical memory. If the TLB hit ratio is 0.6, the effective memory access time (in milliseconds) is
_________.
b
a
b
d
e
+
+
+
+
c
d
c
b
b
s.
=
=
=
=
=
ct
a
c
d
e
a
in
or
Q.34
st
(C) 9 and 12
(D) 4 and 4
te
ga
w.
ww
Q.35
(B) 8 and 10
in
(A) 6 and 6
ru
The minimum number of nodes and edges present in the DAG representation of the above basic
block respectively are
81
www.gateinstructors.in
GATE 2014
Q.36
COMPUTER CS
(B)
Only
(C)
Only
(D)
and
Suppose you want to move from 0 to 100 on the number line. In each step, you either
move right by a unit distance or you take a shortcut. A shortcut is simply a pre-specified
pair of integers , with < . Given a shortcut , if you are at position on the number
line, you may directly move to . Suppose ( ) denotes the smallest number of steps
needed to move from to 100. Suppose further that there is at most 1 shortcut involving
any number, and in particular from 9 there is a shortcut to 15. Let y and z be such that
(9) = 1 + min( ( ), ( )). Then the value of the product
is _____.
Q.38
is a satis iable propositional formula in CNF with at most two literals per clause }
For example,
= (
)(
)(
ct
s.
or
in
Q.37
ru
(A) NP-Complete.
st
w.
ga
Suppose we have a balanced binary search tree holding numbers. We are given two
numbers and
and wish to sum up all the numbers in that lie between
and .
Suppose there are
such numbers in . If the tightest upper bound on the time to
compute the sum is ( log
+
log ), the value of + 10 + 100 + 1000 is
____.
ww
Q.39
te
in
82
www.gateinstructors.in
GATE 2014
Consider the pseudocode given below. The function DoSomething() takes as argument a
pointer to the root of an arbitrary tree represented by the leftMostChild-rightSibling representation.
Each node of the tree is of type treeNode.
typedef struct treeNode* treeptr;
struct treeNode
{
treeptr leftMostChild, rightSibling;
};
in
or
s.
When the pointer to the root of a tree is passed as the argument to DoSomething, the value
returned by the function corresponds to the
ct
st
ga
te
in
ru
w.
Q.41
Consider a hash table with 100 slots. Collisions are resolved using chaining. Assuming simple
uniform hashing, what is the probability that the first 3 slots are unfilled after the first 3 insertions?
ww
Q.40
COMPUTER CS
83
www.gateinstructors.in
GATE 2014
Q.42
COMPUTER CS
Consider the C function given below. Assume that the array listA contains n (> 0) elements,
sorted in ascending order.
int ProcessArray(int *listA, int x, int n)
{
int i, j, k;
i = 0;
j = n-1;
do {
k = (i+j)/2;
if (x <= listA[k])
j = k-1;
if (listA[k] <= x)
i = k+1;
}while (i <= j);
if (listA[k] == x)
return(k);
else
return -1;
}
Which one of the following statements about the function ProcessArray is CORRECT?
(A) It will run into an infinite loop when x is not in listA.
(B) It is an implementation of binary search.
(C) It will always find the maximum element in listA.
s.
in
An instruction pipeline has five stages, namely, instruction fetch (IF), instruction decode and
register fetch (ID/RF), instruction execution (EX), memory access (MEM), and register writeback
(WB) with stage latencies 1 ns, 2.2 ns, 2 ns, 1 ns, and 0.75 ns, respectively (ns stands for
nanoseconds). To gain in terms of frequency, the designers have decided to split the ID/RF stage
into three stages (ID, RF1, RF2) each of latency 2.2/3 ns. Also, the EX stage is split into two stages
(EX1, EX2) each of latency 1 ns. The new design has a total of eight pipeline stages. A program
has 20% branch instructions which execute in the EX stage and produce the next instruction pointer
at the end of the EX stage in the old design and at the end of the EX2 stage in the new design. The
IF stage stalls after fetching a branch instruction until the next instruction pointer is computed. All
instructions other than the branch instruction have an average CPI of one in both the designs. The
execution times of this program on the old and the new design are P and Q nanoseconds,
respectively. The value of P/Q is __________.
Q.44
The memory access time is 1 nanosecond for a read operation with a hit in cache, 5 nanoseconds
for a read operation with a miss in cache, 2 nanoseconds for a write operation with a hit in cache
and 10 nanoseconds for a write operation with a miss in cache. Execution of a sequence of
instructions involves 100 instruction fetch operations, 60 memory operand read operations and 40
memory operand write operations. The cache hit-ratio is 0.9. The average memory access time (in
nanoseconds) in executing the sequence of instructions is __________.
ww
w.
ga
te
in
st
ru
ct
or
Q.43
84
www.gateinstructors.in
GATE 20144
CO
OMPUTER CS
Q.45
are
in
and
Thee value of obtained usiing the trapezoidal rule iss always greater than or equal
e
to the
exaact value of the
t definite inntegral.
Thee value of obtained using the Simp
psons rule iss always equual to the exaact value of
the definite inteegral.
(B) II only
(A)) I only
(D) Neither I no
or II
ct
II)
or
s.
I)
st
Q.47
, where
ru
Q.46
(B)
(C)
(D) 2
w.
mple space annd two mutuually exclusiive events and be suuch that
= . If
Lett be a sam
() denotes thhe probabilityy of the evennt, the maxim
( ) ( ) is _______
mum value of
o
____.
ww
Q.48
ga
te
(A)) 2
in
coss
85
www.gateinstructors.in
GATE 2014
COMPUTER CS
Q.49 Consider the set of all functions : {0,1, ,2014} {0,1, ,2014} such that
for all 0 2014. Consider the following statements:
() = ,
. For each such function it must be the case that for every , ( ) = .
. For each such function it must be the case that for some , ( ) = .
. Each such function must be onto.
Which one of the following is CORRECT?
(A)
Q.50
and
are true
(B) Only
and
are true
(C) Only
and
are true
(D) Only
is true
There are two elements , in a group ( ,) such that every element in the group can be
written as a product of some number of x's and 's in some order. It is known that
(B)
(D)
have?
+1
in
st
Let denote the minimum degree of a vertex in a graph. For all planar graphs on
3, which one of the following is TRUE?
In any planar embedding, the number of faces is at least
(B)
(C)
(D)
+2
+2
ga
te
(A)
w.
Q.52
vertices and
ru
(A)
is a forest with
ct
If
ww
Q.51
or
s.
in
where is the identity element. The maximum number of elements in such a group is
__________.
86
www.gateinstructors.in
+2
vertices with
GATE 2014
Q.53
COMPUTER CS
The CORRECT formula for the sentence, not all rainy days are cold is
(A) d (Rainy(d) Cold(d))
(B) d (Rainy(d) Cold(d))
(C) d (Rainy(d) Cold(d))
(D) d (Rainy(d) Cold(d))
Q.54
(B)
Names of all the employees with at most one of their customers having a GOOD rating.
(C)
Names of all the employees with none of their customers having a GOOD rating.
(D)
Names of all the employees with all their customers having a GOOD rating.
s.
in
Names of all the employees with at least one of their customers having a GOOD rating.
ct
or
Let denote the Exclusive OR (XOR) operation. Let 1 and 0 denote the binary constants.
Consider the following Boolean expression for F over two variables P and Q:
( , ) = (1 )( ) (( )( 0))
st
(B)
(C)
te
in
ga
w.
(A)
ru
ww
Q.55
(A)
87
www.gateinstructors.in
(D)
GATE2014
AnswerKeysforCSComputerScienceandInformationTechnology
Section Q.No.
in
Key/Range Marks
B
1
D
1
1to1
2
256to256
2
A
2
A
2
D
2
7to7
2
5.5to5.5
2
122to122
2
A
2
A
2
C
2
150to150
2
B
2
110to110
2
A
2
D
2
B
2
1.50to1.60
2
1.68to1.68
2
C
2
C
2
A
2
0.25to0.25
2
B
2
4to4
2
C
2
A
2
D
2
D
2
D
2
s.
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
or
ct
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
ru
st
in
te
ga
w.
1
2
3
4
5
6
7
8
9
10
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Section Q.No.
ww
GA
GA
GA
GA
GA
GA
GA
GA
GA
GA
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
CS
Key/Range Marks
D
1
C
1
C
1
C
1
C
1
B
2
D
2
D
2
C
2
C
2
D
1
D
1
5to5
1
A
1
2to2
1
4to4
1
B
1
C
1
C
1
A
1
7to7
1
A
1
19to19
1
A
1
3to3
1
C
1
C
1
D
1
B
1
6to6
1
A
1
B
1
B
1
88
www.gateinstructors.in
GATE INSTRUCTORS
GATE
2015
2016
COMPUTER SCIENCE / IT
GATE papers with answer
keys and Solution
www.gateinstructors.in
Contents
Topic
Page No.
1 - 16
17 - 18
19 - 31
32 - 34
35 - 50
51 - 52
53 - 69
70 - 71
72 - 87
88 - 89
http://gateinstructors.in
http://gateinstructors.in/test_series_registration.php
www.gateinstructors.in
Gate ECE Answer Key 2015 Download- 31 Jan Morning Session EC Solutions
Gate EC/ECE Answer Key 2015 Download -31 January Morning Session EC Solutions Electronics and
Communication Engg Exam Analysis Cut Off
GATE 31st Jan Electronics and Communication Engineering (ECE) Answer Key 2015
Gate 2015 Electronics and Communication Engineering (ECE) 31st Jan Review
Gate 2015 ECE 31st January Forenoon/Morning Session Analysis
Gate 2015 Electronics and Communication Engineering (ECE) Cutoff Marks
How to Download GATE 2015 ECE Answer Key Online
GATE 2015 Answer Key 2015, GATE CS & IT 2015 Answer Sheet 2015 Download, EE Electrical
Engineering GATE 2015 Branch-Wise Paper Solution 2015
GATE 2015 ECE Answer Key- Question Paper-Cut off mark
GATE 2015 Answer Key for ECE Download pdf
GATE 2015 Answer Key-31 Jan,1 Feb, 7 Feb, 8 Feb 2015
31 Jan,1 Feb, 7 Feb, 8 Feb 2015
GATE 2015 Answer Key ,GATE Answer Key 2015,Download Gate Answer key PDF, GATE 2015 Answer
Key For all Sets, GATE 2015 Answer Key subject wise, GATE 2015 Answer Key Branch wise, IIT GATE
Answer Key and Solution 2015
GATE 2015 Answer Key for Agricultural Engineering (AG) Answer Key 2015
GATE Architecture and Planning (AR) Answer Key 2015
GATE Biotechnology (BT) Answer Key 2015
GATE Chemical Engineering (CH) Answer Key 2015
GATE Chemistry (CY) Answer Key 2015
GATE Ecology and Evolution (EY) Answer Key 2015
GATE Electronic and Communication Engineering (EC) Answer Key 2015
GATE Engineering Science (XE) Answer Key 2015
GATE Life Science (XL) Answer Key 2015
GATE Mechanical Engineering (ME) Answer Key 2015
GATE Electronic and Communication Engineering (EC) Answer Key 2015
GATE Mechanical Engineering (ME) Answer Key 2015
GATE Aerospace Engineering (AE) Answer Key 2015