Search results for isro2007

47 votes
9 answers
1
In an $SR$ latch made by cross-coupling two NAND gates, if both $S$ and $R$ inputs are set to $0$, then it will result in$Q = 0, Q' = 1$$Q = 1, Q' = 0$$Q = 1, Q' = 1$Inde...
9 votes
5 answers
4
When two numbers are added in excess-$3$ code and the sum is less than $9$, then in order to get the correct answer it is necessary tosubtract $0011$ from the sumadd $001...
42 votes
5 answers
6
A program consists of two modules executed sequentially. Let $f_1(t)$ and $f_2(t)$ respectively denote the probability density functions of time taken to execute the two ...
9 votes
3 answers
8
If the bandwidth of a signal is $5$ kHz and the lowest frequency is $52$ kHz, what is the highest frequency$5$ kHz$10$ kHz$47$ kHz$57$ kHz
5 votes
3 answers
10
10 votes
3 answers
11
The set of all Equivalence Classes of a set A of Cardinality Cis of cardinality $2^c$have the same cardinality as Aforms a partition of Ais of cardinality $C^2$
8 votes
2 answers
12
On a system using non-preemptive scheduling, processes with expected run times of 5, 18, 9 and 12 are in the ready queue. In what order should they be run to minimize wai...
11 votes
3 answers
13
If there are five routers and six networks in intranet using link state routing, how many routing tables are there?$1$$5$$6$$11$
9 votes
4 answers
14
Assume that each character code consists of $8$ bits. The number of characters that can be transmitted per second through a synchronous serial line at $2400$ baud rate, a...
4 votes
2 answers
15
BCNF is not used for cases where a relation hasTwo (or more) candidate keysTwo candidate keys and compositeThe candidate key overlapTwo mutually exclusive foreign keys
8 votes
4 answers
16
The principal of the locality of reference justifies the use ofvirtual memoryinterruptsmain memorycache memory
8 votes
5 answers
17
Range of IP Address from $224.0.0.0$ to $239.255.255.255$ areReserved for loopbackReserved for broadcastUsed for multicast packetsReserved for future addressing
8 votes
5 answers
18
Which operation is used to extract specified columns from a table?ProjectJoinExtractSubstitute
6 votes
2 answers
19
A read bit can be readand written by CPUand written by peripheralby peripheral and written by CPUby CPU and written by the peripheral
7 votes
5 answers
20
The Fibonacci sequence is the sequence of integers$1, 3, 5, 7, 9, 11, 13$$0, 1, 1, 2, 3, 5, 8, 13, 21, 34$$0, 1, 3, 4, 7, 11, 18, 29, 47$$0, 1, 3, 7, 15$