Recent questions tagged isro-2024

1 votes
2 answers
2
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
0 votes
1 answer
3
McCabe’s cyclomatic complexity number of a program control graph ‘$G$’ with $e$edges, $n$ nodes and $p$ disconnected paths is defined as$n – e + 2p$$e – n + 2 +...
3 votes
2 answers
5
Which of the following heap memory allocation strategies is likely to exploit spatial locality of memory accesses in a program, the most?Best FitFirst FitNext FitLast Fit...
0 votes
1 answer
8
Maximum number of Simple graphs possible with $n$ vertices$2^{n(n-1)/2}$$2^{(n-1)/2}$$2^{n(n+1)/2}$$2^{n(n+1)}$
0 votes
1 answer
10
A truth table will need how many rows if there are $n$ variables.$2 * n$$n$$2^n$None of the above
0 votes
1 answer
11
1 votes
3 answers
12
In a priority queue, insertion and deletion can be done atFrontbackMiddleAny position
1 votes
2 answers
13
Pointer p to an array of integers (of size 2 Bytes) is initialized to 200. What is the value of p+3?206203212204
0 votes
1 answer
14
Which of the following is the cause of Ping of death issue related to ICMP packets?Buffer overflowDivide by ZEROMissing input sanitizationPrivilege escalation
0 votes
1 answer
15
State whether true or false:Virtualization facilitates multiple OS simultaneously on the same hardwareIn dual boot, multiple OS can run simultaneously(i) True (ii) False(...
0 votes
2 answers
17
The MCDC software testing technique stands forMultiple Conditions Decision CoverageMultiple coverage Decision conditionsModified Condition Decision CoverageNone of the ab...
1 votes
1 answer
18
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
3 votes
1 answer
19
Which of the following methods is used to detect double errors?Odd parityEven parityChecksum (CRC)Checksum (XOR)
0 votes
1 answer
20
An instruction pipeline can be implemented by means ofLIFO bufferFIFO bufferStackNone of the above
0 votes
0 answers
21
Which of the following clustering technique is used by K-Means algorithm:Hierarchical TechniquePartitional techniqueDivisiveAgglomerative
0 votes
1 answer
22
Worst case time complexity of heap sort for n elementsO(nlogn)O(logn)O^2O(n)
0 votes
1 answer
24
The time delay obtained through an 8-bit serial register with 400 MHz clock is:20 ns2.5 µs20 µs2.5 µs
0 votes
1 answer
25
Any attempt by a process to access memory allocated to OS or process of other results intoTrap to OSContext SwitchingPage faultInvocation to Scheduler Despatch
0 votes
2 answers
26
0 votes
2 answers
27
Entity Relationship model shows theStatic viewFunctional viewDynamic viewAll of the above
0 votes
2 answers
29
What is the maximum number of comparisons needed to sort 6 items using radix sort, if each number is a 3-digit decimal number?120180210360
0 votes
1 answer
30
If there are five faces and nine vertices in an undirected planar graph, then number of edges is14612None of the above