all questions of ISRO 2011 question paper

Recent questions tagged isro2011

3 votes
2 answers
1
Logic family popular for low power dissipationCMOSECLTTLDTL
6 votes
4 answers
2
7 votes
3 answers
3
A symbol table of length $152$ is processing $25$ entries at any instant. What is occupation density?$0.164$$127$$8.06$$6.08$
6 votes
1 answer
4
In a system using single processor, a new process arrives at the rate of six processes per minute and each such process requires seven seconds of service time. What is th...
7 votes
2 answers
5
In HTML, which of the following can be considered a container?<SELECT><Value><INPUT><BODY>
6 votes
3 answers
6
In an $RS$ flip-flop, if the $S$ line (Set line) is set high ($1$) and the $R$ line (Reset line) is set low ($0$), then the state of the flip-flop is :Set to $1$Set to $0...
7 votes
2 answers
8
Find the output of the following Java code line System.out.printIn(math.floor(-7.4))-7-8-7.4-7.0
7 votes
1 answer
9
One SAN switch has $24$ ports. All $24$ supports $8$ Gbps Fiber Channel technology. What is the aggregate bandwidth of that SAN switch?$96$ Gbps$192$ Mbps$512$ Gbps$192$ ...
7 votes
4 answers
10
Which of the following sentences can be generated by S - aS $\mid$ bAA - d $\mid$ cAbccddabbccaabcabcabcd
5 votes
3 answers
11
7 votes
2 answers
12
Which of the following algorithm design technique is used in merge sort?Greedy methodBacktrackingDynamic programmingDivide and Conquer
5 votes
2 answers
13
What is the output of the following C code?#include <stdio.h int main() { int index; for(index=1; index<=5; index++) { printf("%d", index); if (index==3) continue; } }124...
9 votes
3 answers
14
The average depth of a binary search tree is$O(n^{0.5})$$O(n)$$O(\log n)$$O(n \log n)$
6 votes
4 answers
15
Three coins are tossed simultaneously. The probability that they will fall two heads and one tail is$5/8$$1/8$$2/3$$3/8$
5 votes
1 answer
17
$n$-th derivative of $x^n$ is$nx^{n-1}$$n^n.n!$$nx^n!$$n!$
4 votes
5 answers
18
In DMA transfer scheme, the transfer scheme other than burst mode iscycle techniquestealing techniquecycle stealing techniquecycle bypass technique
4 votes
4 answers
19
Which of the following UNIX command allows scheduling a program to be executed at the specifies time?cronnicedate and timeschedule
7 votes
3 answers
20
Number of chips $(128 \times 8 \;\text{RAM})$ needed to provide a memory capacity of $2048$ bytes$2$$4$$8$$16$
4 votes
2 answers
21
GivenX:01016Y:61628The interpolated value X=4 using piecewise linear interpolation is1142210
6 votes
2 answers
22
Warnier Diagram enables the analyst to representClass structureInformation HierarchyData FlowState Transition
7 votes
4 answers
23
5 votes
4 answers
24
Which $\textsf{RAID}$ level gives block level striping with double distributed parity?$\textsf{RAID 10}$$\textsf{RAID 2}$$\textsf{RAID 6}$$\textsf{RAID 5}$
6 votes
3 answers
25
The output expression of the following gate network is$\text{X.Y} + \overline{\text{X}} . \overline{\text{Y}}$$\text{X.Y + X.Y}$$\text{X.Y}$$\text{X + Y}$
5 votes
3 answers
26
In Java, after executing the following code what are the values of x, y and z?int x,y=10; z=12;x=y++ + z++;x=22, y=10, z=12x=24, y=10, z=12x=24, y=11, z=13x=22, y=11, z=1...
5 votes
5 answers
27
Consider the following pseudocodex:=1; i:=1; while ( x <= 500) begin x:=2^x; i:=i+1; endWhat is the value of $\textsf{i}$ at the end of the pseudocode?$4$$5$$6$$7$
11 votes
4 answers
28
Two control signals in microprocessor which are related to Direct Memory Access (DMA) are$\textsf{INTR & INTA}$$\textsf{RD & WR}$$\textsf{S0 & S1}$$\textsf{HOLD & HLDA}$
5 votes
5 answers
29
6 votes
2 answers
30