Consider the AVL tree T in which left subtree contains half of the maximum number of nodes possible in the balanced AVL tree of height h and right subtree consists of one 3rd of the maximum number of nodes possible in AVL tree of height ‘h’. Assume that tree T may or may not be height balanced at present. What is the total maximum possible number of nodes in T.
Question 2
Consider a binary max-heap implemented using an array.What is the content of the array after two delete operations on the binary max heap (stored in array): 25,14,16,13,10,8,12
Question 3
How many passes does a Bubbles sort algorithm require for sorting a given list of ‘n’ items?
Question 4
Which of the following does not interrupt a running process?
Question 5
A 2km long broadcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2 ×108 m/s. What is the minimum packet size that can be used on this network?
Question 6
Two Half Adders are connected in cascade as shown in figure below. The output “S” and “C” are
Question 7
ln Ethernet, the source address field in the MAC frame is the address.
Question 8
The state of a process after it encounters an I/O instruction is
Question 9
Which of the following grammar is LL(1)?
Question 10
Consider the table employee(empId, name, department, salary) and the two queries Q1,Q2 below. Assuming that department 5 has more than one employee, and we want to find the employees who get higher salary than anyone in thedepartment 5, which one of the statements is TRUE for any arbitrary employee table? Q1: Select e.empId From employee e Where not exists (Select * From employee s where s.department = “5” and s.salary>=e.salary) Q2: Select e.empId From employee e Where e.salary>Any (Select distinct salary From employee s Where s.department = “5”)
Question 11
Which of the following problem is not decidable
Question 12
The directed broadcast address for IP network 172.16.0.0 with subnet mask 255.255.0.0 is
Question 13
The encoding technique used to transmit the signal in giga ethernet technology over fiber optic medium is
Question 14
Consider the following grammar: S → FR R → S | ε F → id .In the predictive parser table, M, of the grammar the entries M[S, id] and M[R, $] respectively.
Question 15
In delete operation of binary search tree, we need inorder successor (or predecessor) of a node when a node to be deleted where it has both left and right child. Which of the following is true about inorder successor needed in delete operation?
Question 16
An index is clustered, if
Question 17
What is sum of the minimum number of nodes in the AVL tree of height 5? (Assume root node is present at height zero).
Question 18
Consider the following statements: 1). Internal sorting is used if the number of items to be sorted is very large. 2). External sorting is used if the number of items to be sorted is very large. 3). External sorting needs auxiliary storage. 4). Internal sorting needs auxiliary storage. Which of the above statements are correct?
Question 19
Consider a 4-way set associative cache (initially empty) with total 16 cache blocks. The main memory consists of 256 blocks and the request for memory blocks is in the following order: 0, 255, 1, 4, 3, 8, 133, 159, 216, 129, 63, 8, 48, 32, 73, 92, 155 Which one of the following memory block will NOT be in cache if LRU replacement policy is used?
Question 20
The protocol data unit (PDU) for the application layer in the Internet stack is
Question 21
Consider the logic circuit given below. The min terms in f(A,B,C,D) are _____.
Question 22
When a host on network A sends a message to a host on network B, which address does the router look at?
Question 23
Which of the following need not necessarily be saved on a context switch between processes ?
Question 24
Find the ambiguous grammar.
Question 25
Database table by name Loan_Records is given below.
What is the output of the following SQL query? SELECT count(*) FROM ( (SELECT Borrower, Bank_Manager FROM Loan_Records) AS S NATURAL JOIN (SELECT Bank_Manager, Loan_Amount FROM Loan_Records) AS T);
Question 26
Find the grammar that generates an inherently ambiguous context free language.
Question 27
In which layer of network architecture, the secured socket layer (SSL) is used?
Question 28
Black Box software testing method focuses on the
Question 29
Consider the following augmented grammar. S’→S S→A | B A→fAi | n B→fBii | d Find the number of reduced entries corresponds to the production B→d in the LR(1) parsing table.
Question 30
Suppose an array implementation of stack with nine items are pushed into the stack stored at array [1] through array [9]. Where does the push operation place the new entry in the array?