GATE
Consider the following grammar and the semantic actions to support the inherited type declaration attributes. Let 𝑋1, 𝑋2, 𝑋3, 𝑋4, 𝑋5, and 𝑋6 be the placeholders

Q. Consider the following grammar and the semantic actions to support the inherited type declaration attributes. Let 𝑋1, 𝑋2, 𝑋3, 𝑋4, 𝑋5, and 𝑋6 be the placeholders for the non- terminals D, T, L or L1 in the following table: Production ruleSemantic actionD β†’ T L𝑋1.type = 𝑋2.typeT β†’ intT.type = ...

READ MORE +
Consider the first order predicate formula πœ‘ βˆ€π‘₯ [(βˆ€π‘§ 𝑧|π‘₯ β‡’ ((𝑧 = π‘₯) ∨ (𝑧 = 1))) β‡’

Q. Consider the first order predicate formula πœ‘: βˆ€π‘₯ Here β€˜π‘Ž|𝑏’ denotes that β€˜π‘Ž divides 𝑏’, where π‘Ž and 𝑏 are integers. Consider the following sets: S1.Β Β Β Β Β Β  {1,2,3, … , 100} S2.Β Β Β Β Β Β  Set of all positive integers S3.Β Β Β Β Β Β  Set of all integers Which of the above sets satisfy πœ‘?(A) S1 and S2(B) S1 ...

READ MORE +
Let the set of functional dependencies F = {QR β†’ S, R β†’ P, S β†’ Q} hold on a relation schema X = (PQRS). X is not in BCNF. Suppose X is decomposed into two schemas Y and Z

Q. Let the set of functional dependencies F = {QR β†’ S, R β†’ P, S β†’ Q} hold on a relation schema X = (PQRS). X is not in BCNF. Suppose X is decomposed into two schemas Y and Z, where Y = (PR) and Z = (QRS). Consider the two statements given below. Both Y and Z are in BCNF Decomposition of ...

READ MORE +
Which one of the following languages over Ξ£ = {π‘Ž, 𝑏} is NOT context-free?

Q. Which one of the following languages over Ξ£ = {π‘Ž, 𝑏} is NOT context-free?(A) {𝑀𝑀𝑅 |𝑀 ∈ {π‘Ž, 𝑏}βˆ—}(B) {π‘€π‘Žπ‘›π‘π‘›π‘€π‘… |𝑀 ∈ {π‘Ž, 𝑏}βˆ—, 𝑛 β‰₯ 0}(C) {π‘€π‘Žπ‘›π‘€π‘…π‘π‘› |𝑀 ∈ {π‘Ž, 𝑏}βˆ—, 𝑛 β‰₯ 0}(D) {π‘Žπ‘›π‘π‘– | 𝑖 ∈ {𝑛, 3𝑛, 5𝑛}, 𝑛 β‰₯ 0}Ans: {wanwRbn ⏐ w ∈ {a, b}*, nβ‰₯ 0}

READ MORE +
Suppose that in an IP-over-Ethernet network, a machine X wishes to find the MAC address of another machine Y in its subnet. Which one of the following techniques can be used for this?

Q. Suppose that in an IP-over-Ethernet network, a machine X wishes to find the MAC address of another machine Y in its subnet. Which one of the following techniques can be used for this? A. X sends an ARP request packet to the local gateway’s IP address which then finds the MAC address of Y and ...

READ MORE +
Two numbers are chosen independently and uniformly at random from the set {1, 2 , . . . , 13}. The probability (rounded off to 3 decimal places) that their 4-bit (unsigned) binary representations

Q. Two numbers are chosen independently and uniformly at random from the set {1, 2 , . . . , 13}. The probability (rounded off to 3 decimal places) that their 4-bit (unsigned) binary representations have the same most significant bit is Solution: The 4-bit binary representation of numbers ...

READ MORE +
The value of 351 mod 5 isΒ Β 

Q. The value of 351 mod 5 isΒ Β Β Β  . Solution: = 351 mod 5 = (33)17 mod 5 = (27)17 mod 5= {(22)8*21} mod 5= {(4)8*(2)} mod 5= {(-1)8*(2)} mod 5= {(1*2)} mod 5= {(2)} mod 5= 2

READ MORE +
Gkseries.com
Logo
Register New Account