GATE · Computer Science and Information Technology · 2023 Set 1Practice Mode
Score:0/100(0 attempted)

General Aptitude

Q1General Aptitude · 1 mark · MCQ

We reached the station late, and _______ missed the train.

Q2General Aptitude · 1 mark · MCQ

Kind : _______ : : Often : Frequently
(By word meaning)

Q3General Aptitude · 1 mark · MCQ

A series of natural numbers F1,F2,F3,F4,F5,F6,F7,F_1, F_2, F_3, F_4, F_5, F_6, F_7, \ldots obeys Fn+1=Fn+Fn1F_{n+1} = F_n + F_{n-1} for all integers n2n \geq 2. If F6=37F_6 = 37, and F7=60F_7 = 60, then what is F1F_1?

Q4General Aptitude · 1 mark · MCQ

A survey for a certain year found that 90% of pregnant women received medical care at least once before giving birth. Of these women, 60% received medical care from doctors, while 40% received medical care from other healthcare providers. Given this information, which one of the following statements can be inferred with certainty?

Q5General Aptitude · 1 mark · MCQ

Looking at the surface of a smooth 3-dimensional object from the outside, which one of the following options is TRUE?

Q6General Aptitude · 2 marks · MCQ

The country of Zombieland is in distress since more than 75% of its working population is suffering from serious health issues. Studies conducted by competent health experts concluded that a complete lack of physical exercise among its working population was one of the leading causes of their health issues. As one of the measures to address the problem, the Government of Zombieland has decided to provide monetary incentives to those who ride bicycles to work.

Based only on the information provided above, which one of the following statements can be logically inferred with certainty?

Q7General Aptitude · 2 marks · MCQ

Consider two functions of time (t)(t),
f(t)=0.01t2f(t) = 0.01 t^2
g(t)=4tg(t) = 4t
where 0<t<0 < t < \infty.
Now consider the following two statements:
(i) For some t>0t > 0, g(t)>f(t)g(t) > f(t).
(ii) There exists a TT, such that f(t)>g(t)f(t) > g(t) for all t>Tt > T.
Which one of the following options is TRUE?

Q8General Aptitude · 2 marks · MCQ

Which one of the following sentence sequences creates a coherent narrative?
(i) Once on the terrace, on her way to her small room in the corner, she notices the man right away.
(ii) She begins to pant by the time she has climbed all the stairs.
(iii) Mina has bought vegetables and rice at the market, so her bags are heavy.
(iv) He was leaning against the parapet, watching the traffic below.

Q9General Aptitude · 2 marks · MCQ

f(x)f(x) and g(y)g(y) are functions of xx and yy, respectively, and f(x)=g(y)f(x) = g(y) for all real values of xx and yy. Which one of the following options is necessarily TRUE for all xx and yy?

Q10General Aptitude · 2 marks · MCQ

Which one of the options best describes the transformation of the 2-dimensional figure P to Q, and then to R, as shown?

Question 10

Computer Science and Information Technology

Q11Computer Science and Information Technology · 1 mark · MCQ

Consider the following statements regarding the front-end and back-end of acompiler.
S1: The front-end includes phases that are independent of the target hardware.
S2: The back-end includes phases that are specific to the target hardware.
S3: The back-end includes phases that are specific to the programming language used in the source code.
Identify the CORRECT option.

Q12Computer Science and Information Technology · 1 mark · MCQ

Which one of the following sequences when stored in an array at locations A[1],,A[10]A[1], \ldots, A[10] forms a max-heap?

Q13Computer Science and Information Technology · 1 mark · MCQ

Let SLLdel be a function that deletes a node in a singly-linked list given a pointer to the node and a pointer to the head of the list. Similarly, let DLLdel be another function that deletes a node in a doubly-linked list given a pointer to the node and a pointer to the head of the list.
Let nn denote the number of nodes in each of the linked lists. Which one of the following choices is TRUE about the worst-case time complexity of SLLdel and DLLdel?

Q14Computer Science and Information Technology · 1 mark · MCQ

Consider the Deterministic Finite-state Automaton (DFA) AA shown below. The DFA runs on the alphabet {0,1}\{0, 1\}, and has the set of states {s,p,q,r}\{s, p, q, r\}, with ss being the start state and pp being the only final state.
Which one of the following regular expressions correctly describes the language accepted by AA?

Question 14
Q15Computer Science and Information Technology · 1 mark · MCQ

The Lucas sequence LnL_n is defined by the recurrence relation:
Ln=Ln1+Ln2L_n = L_{n-1} + L_{n-2}, for n3n \geq 3, with L1=1L_1 = 1 and L2=3L_2 = 3.
Which one of the options given is TRUE?

Q16Computer Science and Information Technology · 1 mark · MCQ

Which one of the options given below refers to the degree (or arity) of a relation in relational database systems?

Q17Computer Science and Information Technology · 1 mark · MCQ

Suppose two hosts are connected by a point-to-point link and they are configured to use Stop-and-Wait protocol for reliable data transfer. Identify in which one of the following scenarios, the utilization of the link is the lowest.

Q18Computer Science and Information Technology · 1 mark · MCQ

Let
A=[1234412334122341]A = \begin{bmatrix} 1 & 2 & 3 & 4 \\ 4 & 1 & 2 & 3 \\ 3 & 4 & 1 & 2 \\ 2 & 3 & 4 & 1 \end{bmatrix} and B=[3412412312342341]B = \begin{bmatrix} 3 & 4 & 1 & 2 \\ 4 & 1 & 2 & 3 \\ 1 & 2 & 3 & 4 \\ 2 & 3 & 4 & 1 \end{bmatrix}.
Let det(A)\det(A) and det(B)\det(B) denote the determinants of the matrices AA and BB, respectively.
Which one of the options given below is TRUE?

Q19Computer Science and Information Technology · 1 mark · MCQ

Consider the following definition of a lexical token id for an identifier in a programming language, using extended regular expressions:
letter \rightarrow [A-Za-z]
digit \rightarrow [0-9]
id \rightarrow letter (letter | digit)^*
Which one of the following Non-deterministic Finite-state Automata with ϵ\epsilon-transitions accepts the set of valid identifiers? (A double-circle denotes a final state)

Q20Computer Science and Information Technology · 1 mark · MCQ

An algorithm has to store several keys generated by an adversary in a hash table. The adversary is malicious who tries to maximize the number of collisions. Let kk be the number of keys, mm be the number of slots in the hash table, and k>mk > m.
Which one of the following is the best hashing strategy to counteract the adversary?

Q21Computer Science and Information Technology · 1 mark · MCQ

The output of a 2-input multiplexer is connected back to one of its inputs as shown in the figure.
Match the functional equivalence of this circuit to one of the following options.

Question 21
Q22Computer Science and Information Technology · 1 mark · MSQ

Which one or more of the following need to be saved on a context switch from one thread (T1) of a process to another thread (T2) of the same process?

Q23Computer Science and Information Technology · 1 mark · MSQ

Which one or more of the following options guarantee that a computer system will transition from user mode to kernel mode?

Q24Computer Science and Information Technology · 1 mark · MSQ

Which of the following statements is/are CORRECT?

Q25Computer Science and Information Technology · 1 mark · MSQ

Which of the following statements is/are INCORRECT about the OSPF (Open Shortest Path First) routing protocol used in the Internet?

Q26Computer Science and Information Technology · 1 mark · MSQ

Geetha has a conjecture about integers, which is of the form x(P(x)yQ(x,y))\forall x \left( P(x) \Rightarrow \exists y\, Q(x, y) \right), where PP is a statement about integers, and QQ is a statement about pairs of integers.
Which of the following (one or more) option(s) would imply Geetha's conjecture?

Q27Computer Science and Information Technology · 1 mark · MSQ

Which one or more of the following CPU scheduling algorithms can potentially cause starvation?

Q28Computer Science and Information Technology · 1 mark · MSQ

Let f(x)=x3+15x233x36f(x) = x^3 + 15x^2 - 33x - 36 be a real-valued function.
Which of the following statements is/are TRUE?

Q29Computer Science and Information Technology · 1 mark · MSQ

Let ff and gg be functions of natural numbers given by f(n)=nf(n) = n and g(n)=n2g(n) = n^2.
Which of the following statements is/are TRUE?

Q30Computer Science and Information Technology · 1 mark · NAT

Let AA be the adjacency matrix of the graph with vertices {1,2,3,4,5}\{1, 2, 3, 4, 5\}.
Let λ1,λ2,λ3,λ4\lambda_1, \lambda_2, \lambda_3, \lambda_4, and λ5\lambda_5 be the five eigenvalues of AA. Note that these eigenvalues need not be distinct.
The value of λ1+λ2+λ3+λ4+λ5=\lambda_1 + \lambda_2 + \lambda_3 + \lambda_4 + \lambda_5 = ___.

Question 30
Q31Computer Science and Information Technology · 1 mark · NAT

The value of the definite integral 332211(4x2yz3)dzdydx\int_{-3}^{3} \int_{-2}^{2} \int_{-1}^{1} \left(4x^2 y - z^3\right) dz\, dy\, dx is ___. (Rounded off to the nearest integer)

Q32Computer Science and Information Technology · 1 mark · NAT

A particular number is written as 132 in radix-4 representation. The same number in radix-5 representation is ___.

Q33Computer Science and Information Technology · 1 mark · NAT

Consider a 3-stage pipelined processor having a delay of 10 ns (nanoseconds), 20 ns, and 14 ns, for the first, second, and the third stages, respectively. Assume that there is no other delay and the processor does not suffer from any pipeline hazards. Also assume that one instruction is fetched every cycle.
The total execution time for executing 100 instructions on this processor is ___ ns.

Q34Computer Science and Information Technology · 1 mark · NAT

A keyboard connected to a computer is used at a rate of 1 keystroke per second. The computer system polls the keyboard every 10 ms (milli seconds) to check for a keystroke and consumes 100 μs (micro seconds) for each poll. If it is determined after polling that a key has been pressed, the system consumes an additional 200 μs to process the keystroke. Let T1T_1 denote the fraction of a second spent in polling and processing a keystroke.
In an alternative implementation, the system uses interrupts instead of polling. An interrupt is raised for every keystroke. It takes a total of 1 ms for servicing an interrupt and processing a keystroke. Let T2T_2 denote the fraction of a second spent in servicing the interrupt and processing a keystroke.
The ratio T1T2\frac{T_1}{T_2} is ___. (Rounded off to one decimal place)

Q35Computer Science and Information Technology · 1 mark · NAT

The integer value printed by the ANSI-C program given below is ___.

Question 35
Q36Computer Science and Information Technology · 2 marks · MCQ
Question 36
Q37Computer Science and Information Technology · 2 marks · MCQ

Consider the control flow graph shown.
Which one of the following choices correctly lists the set of live variables at the exit point of each basic block?

Question 37
Q38Computer Science and Information Technology · 2 marks · MCQ

Consider the two functions incr and decr shown below.

incr(){
    wait(s);
    X = X+1;
    signal(s);
}
decr(){
    wait(s);
    X = X-1;
    signal(s);
}

There are 5 threads each invoking incr once, and 3 threads each invoking decr once, on the same shared variable X. The initial value of X is 10.
Suppose there are two implementations of the semaphore s, as follows:
I-1: s is a binary semaphore initialized to 1.
I-2: s is a counting semaphore initialized to 2.
Let V1, V2 be the values of X at the end of execution of all the threads with implementations I-1, I-2, respectively.
Which one of the following choices corresponds to the minimum possible values of V1, V2, respectively?

Q39Computer Science and Information Technology · 2 marks · MCQ

Consider the context-free grammar GG below
SaSbXS \rightarrow aSb \mid X
XaXXbabX \rightarrow aX \mid Xb \mid a \mid b,
where SS and XX are non-terminals, and aa and bb are terminal symbols. The starting non-terminal is SS.
Which one of the following statements is CORRECT?

Q40Computer Science and Information Technology · 2 marks · MCQ

Consider the pushdown automaton (PDA) PP below, which runs on the input alphabet {a,b}\{a, b\}, has stack alphabet {,A}\{\bot, A\}, and has three states {s,p,q}\{s, p, q\}, with ss being the start state. A transition from state uu to state vv, labelled c/X/γc/X/\gamma, where cc is an input symbol or ϵ\epsilon, XX is a stack symbol, and γ\gamma is a string of stack symbols, represents the fact that in state uu, the PDA can read cc from the input, with XX on the top of its stack, pop XX from the stack, push in the string γ\gamma on the stack, and go to state vv. In the initial configuration, the stack has only the symbol \bot in it. The PDA accepts by empty stack.
Which one of the following options correctly describes the language accepted by PP?

Question 40
Q41Computer Science and Information Technology · 2 marks · MCQ

Consider the given C-code and its corresponding assembly code, with a few operands U1–U4 being unknown. Some useful information as well as the semantics of each unique assembly instruction is annotated as inline comments in the code. The memory is byte-addressable.

Question 41
Q42Computer Science and Information Technology · 2 marks · MCQ

A 4 kilobyte (KB) byte-addressable memory is realized using four 1 KB memory blocks. Two input address lines (IA4 and IA3) are connected to the chip select (CS) port of these memory blocks through a decoder as shown in the figure. The remaining ten input address lines from IA11–IA0 are connected to the address port of these blocks. The chip select (CS) is active high. The input memory addresses (IA11–IA0), in decimal, for the starting locations (Addr=0) of each block (indicated as X1, X2, X3, X4 in the figure) are among the options given below. Which one of the following options is CORRECT?

Question 42
Q43Computer Science and Information Technology · 2 marks · MCQ

Consider a sequential digital circuit consisting of T flip-flops and D flip-flops as shown in the figure. CLKIN is the clock input to the circuit. At the beginning, Q1, Q2 and Q3 have values 0, 1 and 1, respectively. Which one of the given values of (Q1, Q2, Q3) can NEVER be obtained with this digital circuit?

Question 43
Q44Computer Science and Information Technology · 2 marks · MCQ

A Boolean digital circuit is composed using two 4-input multiplexers (M1 and M2) and one 2-input multiplexer (M3) as shown in the figure. X0–X7 are the inputs of the multiplexers M1 and M2 and could be connected to either 0 or 1. The select lines of the multiplexers are connected to Boolean variables A, B and C as shown. Which one of the following set of values of (X0,X1,X2,X3,X4,X5,X6,X7)(X_0, X_1, X_2, X_3, X_4, X_5, X_6, X_7) will realise the Boolean function Aˉ+AˉCˉ+ABˉC\bar{A} + \bar{A} \cdot \bar{C} + A \cdot \bar{B}\cdot C?

Question 44
Q45Computer Science and Information Technology · 2 marks · MCQ

Consider the IEEE-754 single precision floating point numbers P=0xC1800000P = \texttt{0xC1800000} and Q=0x3F5C2EF4Q = \texttt{0x3F5C2EF4}. Which one of the following corresponds to the product of these numbers (i.e., P×QP \times Q), represented in the IEEE-754 single precision format?

Q46Computer Science and Information Technology · 2 marks · MCQ

Let AA be a priority queue for maintaining a set of elements. Suppose AA is implemented using a max-heap data structure. The operation Extract-Max(AA) extracts and deletes the maximum element from AA. The operation Insert(AA, key) inserts a new element key in AA. The properties of a max-heap are preserved at the end of each of these operations. When AA contains nn elements, which one of the following statements about the worst case running time of these two operations is TRUE?

Q47Computer Science and Information Technology · 2 marks · MCQ

Consider the C function foo and the binary tree shown.

Question 47
Q48Computer Science and Information Technology · 2 marks · MCQ

Let U={1,2,,n}U = \{1, 2, \ldots, n\}, where nn is a large positive integer greater than 1000. Let kk be a positive integer less than nn. Let AA, BB be subsets of UU with A=B=k|A| = |B| = k and AB=A \cap B = \emptyset. We say that a permutation of UU separates AA from BB if one of the following is true.

  • All members of AA appear in the permutation before any of the members of BB.
  • All members of BB appear in the permutation before any of the members of AA. How many permutations of UU separate AA from BB?
Q49Computer Science and Information Technology · 2 marks · MSQ

Let f:ABf : A \rightarrow B be an onto (or surjective) function, where AA and BB are nonempty sets. Define an equivalence relation \sim on the set AA as
a1a2a_1 \sim a_2 if f(a1)=f(a2)f(a_1) = f(a_2),
where a1,a2Aa_1, a_2 \in A. Let ϵ={[x]:xA}\epsilon = \{[x] : x \in A\} be the set of all the equivalence classes under \sim. Define a new mapping F:ϵBF : \epsilon \rightarrow B as
F([x])=f(x)F([x]) = f(x),
for all the equivalence classes [x][x] in ϵ\epsilon.
Which of the following statements is/are TRUE?

Q50Computer Science and Information Technology · 2 marks · MSQ

Suppose you are asked to design a new reliable byte-stream transport protocol like TCP. This protocol, named myTCP, runs over a 100 Mbps network with Round Trip Time of 150 milliseconds and the maximum segment lifetime of 2 minutes. Which of the following is/are valid lengths of the Sequence Number field in the myTCP header?

Q51Computer Science and Information Technology · 2 marks · MSQ

Let XX be a set and 2X2^X denote the powerset of XX. Define a binary operation Δ\Delta on 2X2^X as follows:
AΔB=(AB)(BA)A \Delta B = (A - B) \cup (B - A).
Let H=(2X,Δ)H = (2^X, \Delta). Which of the following statements about HH is/are correct?

Q52Computer Science and Information Technology · 2 marks · MSQ

Suppose in a web browser, you click on the www.gate-2023.in URL. The browser cache is empty. The IP address for this URL is not cached in your local host, so a DNS lookup is triggered (by the local DNS server deployed on your local host) over the 3-tier DNS hierarchy in an iterative mode. No resource records are cached anywhere across all DNS servers. Let RTT denote the round trip time between your local host and DNS servers in the DNS hierarchy. The round trip time between the local host and the web server hosting www.gate-2023.in is also equal to RTT. The HTML file associated with the URL is small enough to have negligible transmission time and negligible rendering time by your web browser, which references 10 equally small objects on the same web server. Which of the following statements is/are CORRECT about the minimum elapsed time between clicking on the URL and your browser fully rendering it?

Q53Computer Science and Information Technology · 2 marks · MSQ

Consider a random experiment where two fair coins are tossed. Let AA be the event that denotes HEAD on both the throws, BB be the event that denotes HEAD on the first throw, and CC be the event that denotes HEAD on the second throw. Which of the following statements is/are TRUE?

Q54Computer Science and Information Technology · 2 marks · MSQ

Consider functions Function 1 and Function 2 expressed in pseudocode as follows:

Function 1
while n > 1 do
    for i = 1 to n do
        x = x + 1;
    end for
    n = floor(n/2);
end while

Function 2
for i = 1 to 100*n do
    x = x + 1;
end for

Let f1(n)f_1(n) and f2(n)f_2(n) denote the number of times the statement "x = x + 1" is executed in Function 1 and Function 2, respectively. Which of the following statements is/are TRUE?

Q55Computer Science and Information Technology · 2 marks · MSQ

Let GG be a simple, finite, undirected graph with vertex set {v1,,vn}\{v_1,\ldots,v_n\}. Let Δ(G)\Delta(G) denote the maximum degree of GG, and let N={1,2,3,}\mathbb{N}=\{1,2,3,\ldots\} denote the set of available colors. Color the vertices of GG using the greedy strategy:

Question 55
Q56Computer Science and Information Technology · 2 marks · NAT

Let U={1,2,3}U = \{1, 2, 3\}. Let 2U2^U denote the powerset of UU. Consider an undirected graph GG whose vertex set is 2U2^U. For any A,B2UA, B \in 2^U, (A,B)(A, B) is an edge in GG if and only if (i) ABA \neq B, and (ii) either ABA \subsetneq B or BAB \subsetneq A. For any vertex AA in GG, the set of all possible orderings in which the vertices of GG can be visited in a Breadth First Search (BFS) starting from AA is denoted by B(A)B(A). If \emptyset denotes the empty set, then the cardinality of B()B(\emptyset) is ___.

Q57Computer Science and Information Technology · 2 marks · NAT

Consider the following two-dimensional array DD in the C programming language, which is stored in row-major order:

int D[128][128];

Demand paging is used for allocating memory and each physical page frame holds 512 elements of the array DD. The Least Recently Used (LRU) page-replacement policy is used by the operating system. A total of 30 physical page frames are allocated to a process which executes the following code snippet:

for (int i = 0; i < 128; i++)
    for (int j = 0; j < 128; j++)
        D[j][i] *= 10;

The number of page faults generated during the execution of this code snippet is ___.

Q58Computer Science and Information Technology · 2 marks · NAT

Consider a computer system with 57-bit virtual addressing using multi-level tree-structured page tables with LL levels for virtual to physical address translation. The page size is 4 KB (1 KB=1024 B1\text{ KB} = 1024\text{ B}) and a page table entry at any of the levels occupies 8 bytes. The value of LL is ___.

Q59Computer Science and Information Technology · 2 marks · NAT

Consider a sequence aa of elements a0=1,a1=5,a2=7,a3=8,a4=9a_0 = 1, a_1 = 5, a_2 = 7, a_3 = 8, a_4 = 9, and a5=2a_5 = 2. The following operations are performed on a stack SS and a queue QQ, both of which are initially empty.
I: push the elements of aa from a0a_0 to a5a_5 in that order into SS.
II: enqueue the elements of aa from a0a_0 to a5a_5 in that order into QQ.
III: pop an element from SS.
IV: dequeue an element from QQ.
V: pop an element from SS.
VI: dequeue an element from QQ.
VII: dequeue an element from QQ and push the same element into SS.
VIII: Repeat operation VII three times.
IX: pop an element from SS.
X: pop an element from SS.
The top element of SS after executing the above operations is ___.

Q60Computer Science and Information Technology · 2 marks · NAT

Consider the syntax directed translation given by the following grammar and semantic rules. Here NN, II, FF and BB are non-terminals. NN is the starting non-terminal, and #\#, 00 and 11 are lexical tokens corresponding to input letters "#", "0" and "1", respectively. X.valX.\text{val} denotes the synthesized attribute (a numeric value) associated with a non-terminal XX. I1I_1 and F1F_1 denote occurrences of II and FF on the right hand side of a production, respectively. For the tokens 00 and 11, 0.val=00.\text{val} = 0 and 1.val=11.\text{val} = 1.
NI#FN.val=I.val+F.valN \rightarrow I \# F \quad N.\text{val} = I.\text{val} + F.\text{val}
II1BI.val=(2I1.val)+B.valI \rightarrow I_1 B \quad I.\text{val} = (2 \cdot I_1.\text{val}) + B.\text{val}
IBI.val=B.valI \rightarrow B \quad I.\text{val} = B.\text{val}
FBF1F.val=12(B.val+F1.val)F \rightarrow B F_1 \quad F.\text{val} = \frac{1}{2}(B.\text{val} + F_1.\text{val})
FBF.val=12B.valF \rightarrow B \quad F.\text{val} = \frac{1}{2} B.\text{val}
B0B.val=0.valB \rightarrow 0 \quad B.\text{val} = 0.\text{val}
B1B.val=1.valB \rightarrow 1 \quad B.\text{val} = 1.\text{val}
The value computed by the translation scheme for the input string 10#01110\#011 is ___. (Rounded off to three decimal places)

Q61Computer Science and Information Technology · 2 marks · NAT

Consider the following table named Student in a relational database. The primary key of this table is rollNum.

Question 61
Q62Computer Science and Information Technology · 2 marks · NAT

Consider a database of fixed-length records, stored as an ordered file. The database has 25,000 records, with each record being 100 bytes, of which the primary key occupies 15 bytes. The data file is block-aligned in that each data record is fully contained within a block. The database is indexed by a primary index file, which is also stored as a block-aligned ordered file. The figure below depicts this indexing scheme
Suppose the block size of the file system is 1024 bytes, and a pointer to a block occupies 5 bytes. The system uses binary search on the index file to search for a record with a given key. You may assume that a binary search on an index file of bb blocks takes log2b\lceil \log_2 b \rceil block accesses in the worst case.
Given a key, the number of block accesses required to identify the block in the data file that may contain a record with the key, in the worst case, is ___.

Question 62
Q63Computer Science and Information Technology · 2 marks · NAT

Consider the language LL over the alphabet {0,1}\{0, 1\}, given below:
L={w{0,1}w does not contain three or more consecutive 1’s}L = \{w \in \{0,1\}^* \mid w \text{ does not contain three or more consecutive 1's}\}.
The minimum number of states in a Deterministic Finite-State Automaton (DFA) for LL is ___.

Q64Computer Science and Information Technology · 2 marks · NAT

An 8-way set associative cache of size 64 KB (1 KB=1024 bytes1\text{ KB} = 1024\text{ bytes}) is used in a system with 32-bit address. The address is sub-divided into TAG, INDEX, and BLOCK OFFSET. The number of bits in the TAG is ___.

Q65Computer Science and Information Technology · 2 marks · NAT

The forwarding table of a router is shown below.

Question 65