Professional Documents
Culture Documents
GATE CS Topic Wise Preparation Notes GeeksforGee+ - 1663310584807
GATE CS Topic Wise Preparation Notes GeeksforGee+ - 1663310584807
GATE CS Topic Wise Preparation Notes GeeksforGee+ - 1663310584807
https://www.geeksforgeeks.org/gate-cs-notes-gq/
This page contains GATE CS Preparation Notes / Tutorials on Mathematics, Digital Logic,
Computer Organization and Architecture, Programming and Data Structures,
Algorithms, Theory of Computation, Compiler Design, Operating Systems, Database
Management Systems (DBMS), and Computer Networks listed according to the GATE CS
2021 syllabus.
Section 3: Algorithms
1. Asymptotic Analysis 1. Asymptotic
Algorithms :
of Algorithms : Analysis of
Searching, sorting, Algorithms :
Analysis of
hashing Video –
Algorithms | Set Analysis of
Asymptotic worst GeeksforGeeks
1 (Asymptotic Algorithms
case time and space Videos
Analysis)
2. Recurrence
complexity Video – Lectures
Analysis of Relations :
Algorithm design by
Algorithms | Set
Analysis of Ravindrababu
techniques : 2 (Worst,
greedy, dynamic Algorithms Ravula
Average and Best
(Recurrences)
programming and Cases) MIT –
divide‐and‐conquer Practice Set for Introduction to
Analysis of
Recurrence Algorithms
Graph traversals, Algorithms | Set
Relations
minimum spanning 3 (Asymptotic Book – CLRS
trees, shortest paths Notations) 3. Divide and Solutions
Conquer : Manual
Analysis of
Algorithms | Set MergeSort Visual – Data
Structures and
4 (Analysis of Algorithms.
Divide and
Loops)
Conquer Notes – Big – O
Analysis of Notation
4. Greedy Techniques
Algorithm | Set 5
: Notes – Master
(Amortized
Theorem
Analysis Graph
Introduction) Minimum Notes –
Spanning Tree Extended Master
Analysis of
Theorem
algorithms | Graph Shortest
little o and little Paths Notes – Master
omega notations Theorem
Greedy
problems and
What does ‘Space Algorithms
answers
Complexity’ 5. Graph Based
mean? Algorithms :
Articles | Graph
Analysis of
Algorithms Graph
Traversals
2. Recurrence
Relations : 6. Dynamic
Programing :
Analysis of
Algorithm | Set 4 Dynamic
(Solving Programming
Recurrences) 7. Searching, Sorting
Different types of and Hashing :
recurrence Searching
relations and
Sorting
their solutions
Hashing
3. Divide and Conquer
: 8. Misc :
Divide and Misc
Conquer | Set 1 Commonly
(Introduction) Asked
Binary Search Algorithm
Interview
Why is Binary
Questions | Set
Search preferred
1
over Ternary
Search? Data Structures
and Algorithms
Merge Sort
| Set 1
Merge Sort for
Data Structures
Linked Lists
and Algorithms
Merge Sort for | Set 2
Doubly Linked
Data Structures
List
and Algorithms
How to make | Set 3
Mergesort to
Data Structures
perform O(n)
and Algorithms
comparisons in
| Set 4
best case?
Data Structures
QuickSort
and Algorithms
Iterative Quick | Set 5
Sort
Data Structures
QuickSort on and Algorithms
Singly Linked | Set 6
List
Data Structures
QuickSort on and Algorithms
Doubly Linked | Set 7
List
Data Structures
When does the and Algorithms
worst case of | Set 8
Quicksort occur?
Data Structures
Why Quick Sort and Algorithms
preferred for | Set 9
Arrays and
Data Structures
Merge Sort for
and Algorithms
Linked Lists?
| Set 10
Write a program
Data Structures
to calculate
and Algorithms
pow(x,n)
| Set 11
Median of two Data Structures
sorted arrays
and Algorithms
Count Inversions | Set 12
in an array | Set
Data Structures
1 (Using Merge
and Algorithms
Sort)
| Set 13
Divide and
Data Structures
Conquer | Set 2
and Algorithms
(Closest Pair of
| Set 14
Points)
Data Structures
Divide and
and Algorithms
Conquer | Set 5
| Set 15
(Strassen’s
Matrix Data Structures
Multiplication) and Algorithms
| Set 16
Sort a nearly
sorted (or K Data Structures
sorted) array and Algorithms
| Set 17
Search in an
almost sorted Data Structures
array and Algorithms
| Set 18
K-th Element of
Two Sorted Data Structures
Arrays and Algorithms
| Set 19
K’th
Smallest/Largest Data Structures
Element in and Algorithms
Unsorted Array | | Set 20
Set 2 (Expected Data Structures
Linear Time) and Algorithms
Searching and | Set 21
Sorting Data Structures
4. Greedy Techniques : and Algorithms
| Set 22
Greedy
Algorithms | Set Data Structures
1 (Activity and Algorithms
Selection | Set 23
Problem) Data Structures
Job Sequencing and Algorithms
Problem | Set 1 | Set 24
(Greedy Data Structures
Algorithm) and Algorithms
Greedy | Set 25
Algorithms | Set Data Structures
and Algorithms
3 (Huffman | Set 26
Coding)
Data Structures
Greedy and Algorithms
Algorithms | Set | Set 27
4 (Efficient
Data Structures
Huffman Coding
and Algorithms
for Sorted Input)
| Set 28
Greedy
Data Structures
Algorithms | Set and Algorithms
2 (Kruskal’s
| Set 29
Minimum
Spanning Tree Data Structures
Algorithm) and Algorithms
| Set 30
Greedy
Algorithms | Set Data Structures
5 (Prim’s and Algorithms
Minimum | Set 31
Spanning Tree Data Structures
(MST)) and Algorithms
Greedy | Set 32
Algorithms | Set Data Structures
6 (Prim’s MST for and Algorithms
Adjacency List | Set 33
Representation)
Data Structures
Applications of and Algorithms
Minimum | Set 34
Spanning Tree
Problem Data Structures
and Algorithms
Greedy | Set 35
Algorithms | Set
7 (Dijkstra’s
shortest path
algorithm)
Greedy
Algorithms | Set
8 (Dijkstra’s
Algorithm for
Adjacency List
Representation)
Greedy
Algorithm to find
Minimum
number of Coins
Strongly
Connected
Components
Greedy
Algorithms
5. Graph Based
Algorithms :
Graph and its
representations
Breadth First
Traversal or BFS
for a Graph
Depth First
Traversal or DFS
for a Graph
Applications of
Depth First
Search
Detect Cycle in a
Directed Graph
Disjoint Set (Or
Union-Find) | Set
1 (Detect Cycle in
an Undirected
Graph)
Detect cycle in
an undirected
graph
Topological
Sorting
Longest Path in a
Directed Acyclic
Graph
Biconnected
Components
Bellman–Ford
Algorithm
Floyd Warshall
Algorithm
Shortest Path in
Directed Acyclic
Graph
Some interesting
shortest path
questions | Set 1
Shortest path
with exactly k
edges in a
directed and
weighted graph
Biconnected
Components
Biconnected
graph
Articulation
Points (or Cut
Vertices) in a
Graph
Check if a graph
is strongly
connected | Set 1
(Kosaraju using
DFS)
Bridges in a
graph
Transitive
closure of a
graph
Graph
Algorithms | DFS
and BFS |
Minimum
Spanning Tree |
Shortest Paths |
Connectivity
6. Dynamic
Programing :
Dynamic
Programming |
Set 1
(Overlapping
Subproblems
Property)
Dynamic
Programming |
Set 2 (Optimal
Substructure
Property)
Dynamic
Programming |
Set 4 (Longest
Common
Subsequence)
Dynamic
Programming |
Set 8 (Matrix
Chain
Multiplication)
Dynamic
Programming |
Set 10 ( 0-1
Knapsack
Problem)
Dynamic
Programming |
Set 6 (Min Cost
Path)
Dynamic
Programming |
Set 25 (Subset
Sum Problem)
Dynamic
Programming |
Set 23 (Bellman–
Ford Algorithm)
Dynamic
Programming |
Set 16 (Floyd
Warshall
Algorithm)
Total number of
non-decreasing
numbers with n
digits
Vertex Cover
Problem | Set 2
(Dynamic
Programming
Solution for
Tree)
Smallest power
of 2 greater than
or equal to n
Travelling
Salesman
Problem | Set 1
(Naive and
Dynamic
Programming)
Travelling
Salesman
Problem | Set 2
(Approximate
using MST)
Dynamic
Programming
7. Searching, Sorting
and Hashing :
Linear Search
Linear Search vs
Binary Search
Selection Sort
Bubble Sort
Insertion Sort
Heap Sort
Radix Sort
Counting Sort
Hashing | Set 1
(Introduction)
Hashing | Set 2
(Separate
Chaining)
Hashing | Set 3
(Open
Addressing)
Hash Table vs
STL Map
Advantages of
BST over Hash
Table
8. Misc :
Find subarray
with given sum |
Set 2 (Handles
Negative
Numbers)
Largest subarray
with equal
number of 0s
and 1s
Find four
elements a, b, c
and d in an array
such that a+b =
c+d
Print all
subarrays with 0
sum
Given an array
A[] and a
number x, check
for pair in A[]
with sum as x
Union and
Intersection of
two Linked Lists
Find whether an
array is subset of
another array |
Added Method 3
Count pairs with
given sum
Top 20 Hashing
Technique based
Interview
Questions
CATEGORY
ARCHIVES:
ALGORITHMS
Last Minute
Notes –
Algorithms
Keys in Database
Relational Model Management
(Candidate, Systems | Set 1
Super, Primary, Database
Alternate and Management
Foreign) Systems | Set 2
Relational Database
Algebra-Basic Management
Operators Systems | Set 3
Relational Database
Algebra – Management
Systems | Set 4
Extended
Database
Operators
Management
Tupple Systems | Set 5
Relational
Database
Calculus
Management
DBMS | How to Systems | Set 6
solve Relational
Database
Algebra
Management
problems for
Systems | Set 7
GATE
Database
DBMS | Row
Management
oriented vs.
Systems | Set 8
column oriented
data stores Database
Management
3. Database design
Systems | Set 9
(integrity
constraints, normal Database
forms) : Management
Systems | Set 10
Database
Normalization | Database
Introduction Management
Systems | Set 11
Database
Normalization |
Normal Forms
Functional
Dependency and
Attribute Closure
Finding Attribute
Closure and
Candidate Keys
using Functional
Dependencies
Number of
possible
Superkeys
Lossless
Decomposition
Dependency
Preserving
Decomposition
Lossless Join and
Dependency
Preserving
Decomposition
DBMS | How to
find the highest
normal form of a
relation
DBMS |
Minimum
relations
satisfying 1NF
Equivalence of
Functional
Dependencies
Armstrong’s
Axioms in
Functional
Dependency
Canonical Cover
Denormalization
in Databases
Introduction of
4th and 5th
Normal form
4. Query languages
(SQL) :
Structured Query
Language (SQL)
Inner VS Outer
Join
Having Vs Where
Clause
Database Objects
Nested Queries
in SQL
Join operation Vs
nested query
Indexing in
Databases | Set 1
SQL queries on
clustered and
non-clustered
Indexes
SQL Tutorial
5. Transactions and
concurrency
control :
Concurrency
Control -
Introduction
Database
Recovery
Techniques
ACID Properties
in DBMS
Log based
recovery
DBMS | Why
recovery is
needed?
Transaction
Isolation Levels
in DBMS
Concurrency
Control | Types
of Schedules
DBMS | Types of
Recoverability of
Schedules and
easiest way to
test schedule
Conflict
Serializability
Precedence
Graph For
Testing Conflict
Serializability
How to test if
two schedules
are View Equal
or not ?
Recoverability of
Schedules
Deadlock in
DBMS
Starvation in
DBMS
Concurrency
Control Protocols
| Lock Based
Protocol
Concurrency
Control Protocol
| Two Phase
Locking (2-PL)-I
Concurrency
Control Protocol
| Two Phase
Locking (2-PL)-II
Concurrency
Control Protocol
| Two Phase
Locking (2-PL)-III
Concurrency
Control Protocol
| Thomas Write
Rule
Concurrency
Control Protocols
| Timestamp
Ordering
Protocols
Concurrency
Control Protocol
| Multiple
Granularity
Locking
Concurrency
Control Protocol
| Graph Based
Protocol
Introduction to
TimeStamp and
Deadlock
Prevention
Schemes
Implementation
of Locking in
DBMS
DBMS |
Challenges of
database
security
6. File structures
(sequential files,
indexing, B and B+
trees) :
Indexing in
Databases | Set 1
File Organization
– Set 1
File Organization
– Set 2 (Hashing
in DBMS)
File Organization
– Set 3
B-Tree | Set 1
(Introduction)
B-Tree | Set 2
(Insert)
B-Tree | Set 3
(Delete)
Database File
Indexing – B+
Tree
(Introduction)
RAID
Data
Warehousing
Data Mining
Data Replication
CATEGORY
ARCHIVES:
DBMS
Last Minute
Notes – DBMS
Section 8: Computer
1. Machine
Organization and Computer Computer
instructions and
Architecture Organization and Organization and
addressing modes :
Architecture : Architecture :
Von Neumann
Machine
architecture
instructions and Quiz on Video – NPTEL
addressing modes Basic Computer Microprocessors Lectures
Instructions
ALU, data‐path and Computer Book – Carl
control unit Instruction Organization and Hamacher
Formats (Zero, Architecture
Instruction Notes –
One, Two and
pipelining, pipeline Pipelining
Three Address
hazards Notes – Cache
Instruction)
Memory Memory
Stack based CPU
hierarchy: cache,
Organization
main memory and
General Register Notes – Cache
secondary storage
based CPU Associativity
I/O interface Organization
(Interrupt and DMA
Single
mode)
Accumulator
based CPU
organization
Problem Solving
on Instruction
Format
Addressing
Modes
Machine
Instructions
Difference
between CALL
and JUMP
instructions
Simplified
Instructional
Computer (SIC)
Hardware
architecture
(parallel
computing)
Flynn’s
taxonomy
Generations of
computer
Amdahl’s law
and its proof
2. ALU, data‐path and
control unit :
Control Unit and
design
Hardwired v/s
Micro-
programmed
Control Unit
Hardwired Vs
Micro-
programmed
Control unit | Set
2
Horizontal
micro-
programmed Vs
Vertical micro-
programmed
control unit
Synchronous
Data Transfer
3. Instruction
pipelining :
Pipelining | Set 1
(Execution,
Stages and
Throughput)
Pipelining | Set 2
(Dependencies
and Data
Hazard)
Pipelining | Set 3
(Types and
Stalling)
Different
Instruction
Cycles
Performance of
Computer
Micro-Operation
RISC and CISC
RISC and CISC |
Set 2
4. Cache Memory :
Memory
Hierarchy Design
and its
Characteristics
Cache Memory
Cache
Organization |
Introduction
Locality and
Cache friendly
code
What’s
difference
between CPU
Cache and TLB?
Read and Write
operations in
memory
Memory
Interleaving
Introduction to
memory and
memory units
2D and 2.5D
Memory
organization
Types of
computer
memory (RAM
and ROM)
Different Types
of RAM
RAM vs ROM
5. I/O interface
(Interrupt and DMA
mode) :
I/O Interface
(Interrupt and
DMA Mode)
Input-Output
Processor
Kernel I/O
Subsystem
Memory mapped
I/O and Isolated
I/O
BUS Arbitration
Priority
Interrupts | (S/W
Polling and Daisy
Chaining)
Asynchronous
input output
synchronization
Computer Ports
Clusters In
Computer
Organisation
Human –
Computer
interaction
through the ages
CATEGORY
ARCHIVES:
COMPUTER
ORGANIZATION
&
ARCHITECTURE
7. Previous year papers GATE CS, solutions and explanations year-wise and topic-
wise.
Please write comments if you find anything incorrect, or you want to share more
information about the topic discussed above!