GATE logo
GATE 2024 CSE Question Paper Slot 1 PDF- Download Here
Paras Jain logo

Paras Jain

| Updated On - Oct 14, 2024

GATE 2024 CSE Question Paper PDF is available here. IISc Banglore conducted GATE 2024 CSE exam on February 10 in the Forenoon Session from 9:30 AM to 12:30 PM. Students had to answer 65 questions in GATE 2024 CSE Question Paper carrying a total weightage of 100 marks. 10 questions are from the General Aptitude section and 55 questions are from Engineering Mathematics and Core Discipline.

GATE 2024 CSE Question Paper with Answer Key PDF

GATE 2024 CSE Question Paper PDF GATE 2024 CSE Answer Key PDF
Download PDF Download PDF

GATE CSE SET 1

S.No Questions Answers Detailed Solution
1 What is the time complexity of binary search on a sorted array of size n? O(logn) Explanation: Binary search works by repeatedly dividing the search space in half. Initially, it compares the target element with the middle element of the array. Based on whether the target is larger or smaller, it eliminates half of the remaining elements from consideration
2 In a graph, if all nodes are reachable from any node, what property does this graph exhibit? Strongly Connected Explanation: A strongly connected graph is one where, for every pair of nodes u and v, there is a path from u to v and also a path from v to u. In other words, it is possible to travel between any two nodes in both directions.
3 Consider a function that takes a string as input and reverses it recursively. What is the time complexity of this function for an input string of length n? O(n) Explanation: Recursively reversing a string involves swapping the first and last characters, then recursively reversing the remaining substring (excluding the first and last characters).
4 What is dynamic programming, and how does it optimize the solution of problems? Dynamic Programming (DP) is a technique used to solve complex problems by breaking them down into simpler subproblems, solving each subproblem once, and storing its result. In dynamic programming, problems that exhibit the property of overlapping subproblems (i.e., subproblems that are solved multiple times) and optimal substructure (i.e., an optimal solution to a problem can be composed of optimal solutions to its subproblems) can be efficiently solved by remembering the results of already-solved subproblems.
5 Window dressing is a practice To manipulate accounts to show a better picture of the financial position than the actual one Explanation: Window Dressing refers to manipulation of accounts for presenting the financial statements in a way to show good position than the actual.
6 In a directed graph, what does it mean for the graph to be strongly connected? Every vertex is reachable from every other vertex. Explanation A directed graph is considered strongly connected if, for every pair of vertices u and v, there exists a directed path from u to v and a path from v to u. This property ensures that you can traverse the graph in both directions between any two vertices.
7 What is the difference between a process and a thread? A process is an independent program in execution, while a thread is a smaller unit of a process that can run concurrently. Explanation: Processes are separate entities with their own memory space and system resources. They communicate via inter-process communication (IPC) mechanisms. Threads, on the other hand, share the same memory space within a process and are more lightweight, allowing for easier and faster context switching
8 What is a deadlock in operating systems? A situation where two or more processes are unable to proceed because each is waiting for the other to release a resource. Explanation: Deadlocks can be prevented or avoided using strategies like resource allocation graphs or timeout mechanisms.
9 Explain the concept of cache memory. A small-sized type of volatile computer memory that provides high-speed data access to the CPU Explanation: Cache stores frequently accessed data and instructions, improving overall system performance by reducing access time.
10 What is a database transaction? A sequence of operations performed as a single logical unit of work. Explanation: Transactions must be atomic, consistent, isolated, and durable (ACID properties).
11 What is a stack? A data structure that follows the Last In First Out (LIFO) principle. Explanation: Operations like push (adding an item) and pop (removing the top item) are performed at one end of the stack
12 Explain the difference between TCP and UDP. TCP is a connection-oriented protocol, while UDP is connectionless. Explanation: TCP ensures reliable transmission with error-checking, while UDP provides faster but less reliable communication.
13 What is the function of an operating system's kernel? To manage system resources and allow software to communicate with hardware. Explanation: The kernel is the core component of an OS, handling memory management, process scheduling, and hardware interaction.
14 Explain the term "asymptotic analysis. A method of describing the behavior of a function as its argument approaches a limit, often infinity. Explanation: Asymptotic analysis helps in comparing the efficiency of algorithms.
15 Explain the difference between supervised and unsupervised learning. Supervised learning uses labeled data to train models, while unsupervised learning works with unlabeled data. Explanation: Supervised learning aims to predict outcomes, while unsupervised learning identifies patterns or groupings within the data.
16 What is a software development life cycle (SDLC)? A process for planning, creating, testing, and deploying software. Explanation: The SDLC consists of several phases, including requirements analysis, design, implementation, testing, and maintenance.
17 What is an operating system's scheduler? A component that manages the execution of processes. Explanation: The scheduler allocates CPU time to various processes and ensures fair resource distribution
18 What is the difference between symmetric and asymmetric encryption? Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a pair of keys. Symmetric encryption is faster and suitable for large data volumes, while asymmetric encryption is more secure for key exchange.
19 What is cloud computing? The delivery of computing services over the internet. Cloud computing enables on-demand access to shared resources, including servers, storage, and applications.
20 What is a SQL injection attack? A code injection technique that exploits vulnerabilities in an application's software by inserting malicious SQL statements. SQL injection can lead to unauthorized access to sensitive data and should be mitigated through input validation and parameterized queries.


Also Check:

GATE Previous Year Question Papers

Other PG Exam Question Papers

GATE Questions

1.
What are the number of numbers possible divisible by 3 if we choose 4 numbers from the set S = {4,5,7,8,9}

      2.
      “I have not yet decided what I will do this evening; I ______ visit a friend.”

        • mite

        •  would

        •  might

        •  didn’t

        3.
        Eject : Insert : : Advance : _______ (By word meaning)

          • Advent
          • Progress
          • Retreat
          • Loan

          Comments



          No Comments To Show