ISRO CS 2016-Watermark - pdf-80

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

www.gradeup.

co

1. Which of the following is true? Which one of the following gates is


A. √3 + √7 = √10 redundant?
B. √3 + √7 ≤ √10 A. Gate No. 1 B. Gate No. 2
C. √3 + √7 < √10 C. Gate No. 3 D. Gate No. 4
D. √3 + √7 > √10 11. The dynamic hazard problem occur in:
2. What is the sum of infinity of the series, A. Combinational circuit alone
3+6x2+9x4+12x6+….given |x|<1? B. Sequential Circuit only
A. 3/(1+x2) B. 3/(1+x2)2 C. Both (A) and (B)
C. 3/(1-x )
2 2
D. 3/(1-x2) D. None of these
3. limx->0 ( √1+x - √1-x ) / x is given by 12. The logic circuit given below converts a binary
A. 0 B. -1 code y1, y2, y3 into
C. 1 D. 1/2
4. If (G, -) is a group such that (ab)-1 = a-1b-1,
Va, b ε G, then G is an
A. Commutative semi group
B. Abelian group
C. non Abelian group
D. none of these
5. A given connected graph G is a Euler Graph if
and only if all vertices of G are of:
A. Same degree B. Even degree
C. odd degree D. different degree
6. The maximum number of edges in a n-node
undirected graph without self loops is A. Excess-3 code. B. Gray code.
A. n2 B. n(n-1)/2 C. BCD code. D. Hamming code.
C. n-1 D. n(n+1)/2 13. The circuit shown in figure below
7. The minimum number of NAND gates required
to implement the Boolean Function A + AB' +
AB'C
A. 0 (Zero) B. 1
C. 4 D. 7
8. The minimum Boolean expression for the A. is an oscillating circuit and its output is a
following circuit square wave
B. is one whose output remains stable in ' 1 '
state
C. is one having output remains stable ' 0 '
state
D. having a single pulse of 3 times
propagation delay
14. If 12A7C16 = X8, then the value of X is:
A. 224174 B. 425174
C. 6173 D. 225174
A. AB+AC+BC B. A+BC
15. The excess-3 Code is also called
C. A+B D. A+B+C
A. cyclic redundancy code
9. For a binary half subtractor having two inputs
B. weighted code
A and b, the correct set of logical outputs
C. self complementing code
DD(=AA minus BB) and XX(=borrow) are
D. algebraic code
A. D=AB+A’B, X=A’B
16. The simplified sum of product form of the
B. D=A’B+AB’, X=AB’
following Boolean expression
C. D=A’B+AB’, X=A’B
(P + Q’ + R’) * (P + Q’+ R) * (P + Q + R’) =
D. D=AB+A’B, X=AB’
π(3,2,1)
10. Consider the following gate network
A. (P’.Q + R’) B. (P + Q’.R’)
C. (P’.Q + R) D. (P.Q + R)
17. Which of the following binary number is the
same as its 2’s compliment?
A. 1010 B. 0101
C. 1000 D. 1001

1|Page
www.gradeup.co

18. The functional difference between SR flip flop 25. What will be the output of the following
and JK flip flop is that: program? Assume that you are running this
A. JK flip-flop is faster than SR flip-flop program in little-ending processor.
B. JK flip-flop has a feed back path #include<stdio.h>
C. JK flip-flop accepts both inputs 1 int main()
D. None of above {
19. Consider a non-pipelined processor with a short a=320;
clock rate of 2.5 gigahertz and average cycles char *ptr;
per instruction of four. The same processor is
ptr=(char *)&a;
upgraded to a pipelined processor with five
stages; but due to the internal pipeline delay, printf("%d",*ptr);
the clock speed is reduced to 2 gigahertz. return 0;
Assume that there are no stalls in the }
pipeline. The speed up achieved in this A. 1
pipelined processor is: B. 320
A. 3.2 B. 3.0 C. 64
C. 2.2 D. 2.0 D. Compilation error
20. What is the output of this C code? 26. Consider the following segment of C code
#include<stdio.h> int j,n
void main() j=1;
{ while (j<=n)
int k=5; j = j*2;
int *p=&k; The number of comparisons made in the
int **m=&p; execution of the loop for any n>0 is:
printf("%d %d %d",k,*p,**m); A. (log2n) * n B. n
} C. (log2n) D. (log2n) + 1
A. 555 B. 55junk 27. The following postfix expression with single
C. 5 junk junk D. Compile time error digit operands is evaluated using a stack 8 2 3
21. Consider a disk pack with 16 surfaces, 128 ^ / 2 3 * + 5 1 * -. Note that ^ is the
tracks per surface and 256 sectors per track. exponentiation operator. The top two
512 bytes of data are stored in a bit serial elements of the stack after the first * is
manner in a sector. The capacity of the disk evaluated are:
pack and the number of bits required to A. 6, 1 B. 5, 7
specify a particular sector in the disk are C. 3, 2 D. 1, 5
respectively:
28. Average number of comparison required
A. 256 Mbyte, 19 bits B. 256 Mbyte, 28 bits
search for sequential search on ‘n’ items is:
C. 512 Mbyte, 20 bits D. 64 Gbyte, 28 bit
A. n/2 B. n-1/2
22. Let the page fault service time be 10ms in a
C. n+1/2 D. None of the above
computer with average memory access time
being 20ns. If one page fault is generated for 29. A Hash Function f is defined as f(key)=key
every 10^6 memory accesses, what is the mod 7. With linear probing, is used to insert
effective access time for the memory? the keys 37,38,72,48,98,11,56, into a table
A. 21.4ns B. 29.9ns indexed from 0> In which location the key 11
C. 23.5ns D. 35.1ns will be stored.
23. Register renaming is done in pipelined A. 3 B. 4
processors C. 5 D. 6
A. as an alternative to register allocation at 30. A complete binary tree with n non leaf nodes
compile time contains:
B. for efficient access to function parameters A. log2n nodes B. n+1 nodes
and local variables C. 2n nodes D. 2n+1 nodes
C. to handle certain kinds of hazards 31. Algorithm design technique used in quick sort
D. as part of address translation algorithm is
24. In which class of Flynns Taxonomy, von A. Dynamic programming
Neumann architecture belongs to? B. Backtracking
A. SISD B. SIMD C. Divide-and-conquer
C. MIMD D. MISD D. Greedy method

2|Page
www.gradeup.co

32. An FSM (Finite State Machine) can be 40. Recursive descent parsing is an example of
considered to be a TM (Turing Machine) of A. Top-down parsers B. Bottom-up parsers
finite tape length C. Predictive parsers D. None of the above
A. without rewinding capability and 41. A top down parser generates
unidirectional tape movement. A. Rightmost Derivation
B. rewinding capacity, and unidirectional tape B. Rightmost derivation in reverse
movement C. Leftmost derivation
C. without rewinding capability and D. Leftmost derivation in reverse
bidirectional tape movement 42. Relative mode of addressing is most relevant
D. rewinding capability and bidirectional tape to writing
movement A. Co-routines
33. Let L={w \in (0 + 1)*|w has even number of B. Position independent code
1s}, i.e. L is the set of all bit strings with even C. Shareable code
number of 1s. Which one of the regular D. Interrupt handler
expression below represents L? 43. A simple two pass assembler does which of
A. (0*10*1)* B. 0*(10*10*)* the following in the first pass?
C. 0*(10*1*)*0* D. 0*1(10*1)*10* A. Checks to see if the instructions are legal in
34. Consider the following recurrence the current assembly mode
T(n) = 2T(√n)+1 B. It allocates space for the literals.
T(1) = 1 C. It builds the symbol table for the symbols
Which one of the following is true? and their values.
A. T(n)=Θ(loglogn) B. T(n)=O(logn) D. All of these
C. T(n)=Θ(√n) D. T(n)=Θ(n) 44. Peephole optimization is a form of
35. G = {S →SS, S → ab, S →ba, S → Ε} A. Loop optimization B. Local optimization
I. G is ambiguous C. Constant folding D. Data flow analysis
II. G produces all strings with equal number 45. At a particular time of computation the value
of a’s and b’s of a counting semaphore is 7. Then 20 P
III. G can be accepted by a deterministic operations and x V operations were completed
PDA. on this semaphore. If the final value of
Which combination below expresses all the semaphore is 5, x will be:
true statements about G? A. 18 B. 22
A. I only B. I and III only C. 15 D. 13
C. II and III only D. I, II and III 46. With a single resource, deadlock occurs
36. If L and L’ are recursively enumerable, then L A. if there are more than two processes
is competing for single resource
A. regular B. context-free B. if there are only two processes competing
C. context-sensitive D. recursive for that resource
37. S –> aSa| bSb| a| b ; The language C. if there is a single process competing for
generated by the above grammar over the that resource
alphabet {a, b} is the set of D. none of these
A. All palindromes. 47. A system has 3 processes sharing 4
B. All odd length palindromes. resources. If each process needs a maximum
C. Strings that begin and end with the same of 2 units then:
symbol A. deadlock can never occur
D. All even length palindromes. B. deadlock may occur
38. What is the best suitable type that can be C. deadlock has to occur
assigned to this following grammar: D. None of these
S→Aa, A→Ba, B→abc 48. Determine the number of page faults when
A. Type 0 B. Type 1 references to pages occur in following order:
C. Type 2 D. Type 3 1,2,4,5,2,1,2,4. Assume that the main
39. Access time of the symbol table will be memory can accommodate 3 pages and the
logarithmic if it is implemented by main memory already has the pages 1 and 2,
A. Linear list with page 1 having been brought earlier than
B. Search tree page 2. (LRU algorithm is used)
C. Hash table A. 3 B. 5
D. Self Organization list C. 4 D. none of these

3|Page
www.gradeup.co

49. Working set (t,k) at an instant of time t is A. Titles of the four most expensive books
A. The set of k future references that the B. Title of the fifth most inexpensive book
operating system will make C. Title of the fifth most expensive book
B. The set of future references that the D. Titles of the five most expensive books
operating system will make in the next ‘k’ 56. Goals for the design of the logical schema
time units include
C. The set of k reference with high frequency A. avoiding data inconsistency
D. The set of pages that have been referenced B. being able to construct queries easily
in the last k time units C. being able to access data efficiently
50. A CPU generates 32-bit virtual addresses. The D. all of above
page size is 4KB. The processor has a 57. Given the relations
translation look-aside buffer (TLB) which can Employee (name, salary, deptno) and
hold a total of 128 page table entries and is 4- Department (deptno, deptname, address)
way set associative. The minimum size of the Which of the following queries cannot be
TLB tag is: expressed using the basic relational algebra
A. 11 bits B. 13 bits operations (U, -, x, π, σ, p)?
C. 15 bits D. 20 bits A. Department address of every employee
51. The real time operating system, which of the B. Employees whose name is the same as
following is the most suitable scheduling their department name
scheme? C. The sum of all employees’ salaries
A. Round robin D. All employees of given department
B. First come first serve 58. Trigger is
C. Pre-emptive A. Statement that enables to start any DBMS
D. Random scheduling B. statement that is executed by the user
52. In which of the following page replacement when debugging an application program
policies, Baladys anomaly may occur? C. The condition that the system tests for the
A. FIFO B. Optimal validity of the database user
C. LRU D. MRU D. statement that is executed automatically
53. Consider Join of a relation R with a relation S. by the system as a side effect of modification
If R has m tuples and S has n tuples, then to the database
maximum and minimum sizes of the Join 59. The order of a leaf node in a B+ tree is the
respectively are maximum number of (value, data record
pointer) pairs it can hold. Given that the block
A. m + n and 0 B. mn and 0
size is 1K bytes, data record pointer is 7 bytes
C. m + n and |m - n| D. mn and m + n
long, the value field is 9 bytes long and a
54. Let R(a,b,c) and S(d,e,f) be two relations in
block pointer is 6 bytes long, what is the
which d is the foreign key of S that refers to
order of the leaf node?
the primary key of R. Consider the following
A. 63 B. 64
four operations R and S
C. 67 D. 68
Insert into R
60. A clustering index is defined on the fields
1. Insert into S
which are of type _______
2. Delete from R
A. non-key and ordering
3. Delete from S
B. non-key and non-ordering
Which of the following can cause a violation of C. key and ordering
the referential integrity constraint above? D. key and non-ordering
A. Both I and IV B. Both II and III 61. The extent to which the software can continue
C. All of above D. None of these to operate correctly despite the introduction
55. The relation book (title, price) contains the of invalid inputs is called as
titles and prices of different books. Assuming A. Reliability B. Robustness
that no two books have the same price, what C. Fault tolerance D. Portability
does the following SQL query list?
62. Which of the following is a functional
select title requirement?
from book as B
A. Maintainability
where (select count(*)
B. Portability
from book as T
C. Robustness
where T.price > B.price) < 5
D. None of the mentioned

4|Page
www.gradeup.co

63. Configuration management is not concerned 68. Dynamic routing protocol enables routers to:
with A. Dynamically discover and maintain routes
A. controlling changes to the source code B. Distribute routing updates to other routers
B. choice of hardware configuration for an C. Reach agreement with other routers about
application the network topology
C. controlling documentation changes D. All of the above
D. maintaining versions of software 69. In Ethernet CSMA/CD, the special bit
64. A company needs to develop a strategy for sequence is transmitted by media access
software product development for which it has management collision handling is called
a choice of two programming languages L1 A. Preamble B. Postamble
and L2. The number of lines of code (LOC) C. Jam D. None of these
developed using L2 is estimated to be twice 70. Which network protocol allows hosts to
the LOC developed with Ll. The product will dynamically get a unique IP number on each
have to be maintained for five years. Various bootup?
parameters for the company are given in the A. DHCP B. BOOTP
table below. C. RARP D. ARP
71. In a token ring network, the transmission
speed is 107 bps and the propagation speed is
200 metres/micro second. The 1-bit delay in
this network is equivalent to:
A. 500 metres of cable.
B. 200 metres of cable.
Total cost of the project includes cost of C. 20 metres of cable.
development and maintenance. What is the D. 50 metres of cable.
LOC for L1 for which the cost of the project 72. The address of a class B host is to be split into
using L1 is equal to the cost of the project subnet with a 6 bit subnet number. What is
using L2? the maximum number of subnets and the
A. 10,000 B. 5000 maximum number of hosts in each subnet?
C. 7500 D. 75000 A. 62 subnets and 262142 hosts.
65. A company needs to develop digital signal B. 64 subnets and 262142 hosts.
processing software for one of its newest C. 62 subnets and 1022 hosts.
inventions. The software is expected to have D. 64 subnets and 1024 hosts.
20000 lines of code. The company needs to 73. The message 11001001 is to be transmitted
determine the effort in person-months needed using the CRC polynomial x3+1 to protect it
to develop this software using the basic from errors. The message that should be
COCOMO model. The multiplicative factor for transmitted is:
this model is given as 2.2 for this software A. 11001001000 B. 11001001011
development on embedded systems, while the C. 11001010 D. 110010010011
exponentiation factor is given as 1.5. What is 74. What is the maximum size of data that
the estimation effort in person-months? application layer can pass on to the TCP layer
A. 196.77 B. 206.56 below?
C. 199.56 D. 210.68 A. Any size
66. In the spiral modal of software development, B. 216 bytes-size of TCP header
the primary determinant in selecting activities C. 216 bytes
in each iteration is D. 1500 bytes
A. Iteration size 75. Frames of 1000 bits are sent over a 10 6 bps
B. Cost duplex link between two hosts. The
C. Adopted process such as Rational Unified propagation time is 25ms. Frames are to be
Process or Extreme Programming transmitted into this link to maximally pack
D. Risk them in transit (within the link).
67. Bit stuffing refers to What is the minimum number of bits (i) that
A. inserting a '0' in user stream to will be required to represent the sequence
differentiate it with a flag numbers distinctly? Assume that no time gap
B. inserting a '0' in flag stream to avoid needs to be given between transmission of
ambiguity two frames.
C. appending a nibble to the flag sequence A. i=2 B. i=3
D. appending a nibble to the user data C. i=4 D. i=5
stream
5|Page
www.gradeup.co

76. Which of the following is true only for XML, C. All data of C and private data in A and B
but not for HTML? D. Public and protected data of A and B and
A. It is derived from SGML all data of C
B. It describes content and layout 79. Which one of the following is correct about the
C. It allows user defined tags statements given below?
D. It is restricted only to be used with web I All function calls are resolved at compile-
browsers time in C language
77. Consider a system with 2 level caches. Access II All function calls are resolved at compile
times of level 1 chache, level 2 cache and time in C++
main memory are 1 ns, 10ns, and 500 ns, A. Only II is correct
respectively. The hit rates of Level 1 and B. Both I and II are correct
Level 2 caches are 0.8 and 0.9, respectively. C. Only I is correct
What is the average access time of the D. Both I and II are incorrect
system ignoring the search time within the
80. When a DNS server accepts and uses
cache?
incorrect information from a host that has no
A. 13.0 ns B. 12.8 ns authority giving that information, then it is
C. 12.6 ns D. 12.4 ns called
78. If a class C is derived from class B, which is A. DNS lookup
derived from class A, all through public
B. DNS hijacking
inheritance, then a class C member function
C. DNS spoofing
can access
D. none of the mentioned
A. Only protected and public data of C and B
B. Only protected and public data of C

***

6|Page

You might also like