search
Log In
all the questions of ISRO 2020 question paper

Recent questions tagged isro-2020

3 votes
2 answers
1
The following circuit compares two $2$-bit binary numbers, $X$ and $Y$ represented by $X_1X_0$ and $Y_1Y_0$ respectively. ($X_0$ and $Y_0$ represent Least Significant Bits) Under what conditions $Z$ will be $1$? $X>Y$ $X<Y$ $X=Y$ $X!=Y$
asked Jan 13 in Digital Logic Satbir 745 views
1 vote
1 answer
2
For the distributions given below : Which of the following is correct for the above distributions? Standard deviation of $A$ is significantly lower than standard deviation of $B$ Standard deviation of $A$ is slightly lower than standard deviation of $B$ Standard deviation of $A$ is same as standard deviation of $B$ Standard deviation of $A$ is significantly higher than standard deviation of $B$
asked Jan 13 in Probability Satbir 528 views
4 votes
3 answers
3
The hardware implementation which provides mutual exclusion is Semaphores Test and set instructions Both options None of the options
asked Jan 13 in Operating System Satbir 1.2k views
4 votes
6 answers
4
If $x+2y=30$, then $\left(\dfrac{2y}{5}+\dfrac{x}{3} \right) + \left (\dfrac{x}{5}+\dfrac{2y}{3} \right)$ will be equal to $8$ $16$ $18$ $20$
asked Jan 13 in Numerical Ability Satbir 738 views
1 vote
4 answers
5
Checksum field in TCP header is ones complement of sum of header and data in bytes ones complement of sum of header, data and pseudo header in $16$ bit words dropped from $\text{IPv6}$ header format better than $\text{md5}$ or $\text{sh1}$ methods
asked Jan 13 in Computer Networks Satbir 700 views
3 votes
5 answers
6
Consider a $2$-dimensional array $x$ with $10$ rows and $4$ columns, with each element storing a value equivalent to the product of row number and column number. The array is stored in row-major format. If the first element $x[0][0]$ occupies the memory location with ... location, which all locations (in decimal) will be holding a value of $10$? $1018,1019$ $1022,1041$ $1013,1014$ $1000,1399$
asked Jan 13 in DS Satbir 1.8k views
3 votes
3 answers
7
Which one indicates a technique of building cross compilers? Beta cross Canadian cross Mexican cross X-cross
asked Jan 13 in Compiler Design Satbir 627 views
3 votes
3 answers
8
A computer which issues instructions in order, has only $2$ registers and $3$ opcodes $\text{ADD, SUB}$ and $\text{MOV}$. Consider $2$ ... and by how many $\text{MOV}$ instructions? $\text{Case 2,2}$ $\text{Case 2,3}$ $\text{Case 1,2}$ $\text{Case 1,3}$
asked Jan 13 in CO and Architecture Satbir 829 views
2 votes
4 answers
9
A stack organized computer is characterised by instructions with indirect addressing direct addressing zero addressing index addressing
asked Jan 13 in CO and Architecture Satbir 940 views
4 votes
4 answers
10
What is the output of the code given below? # include<stdio.h> int main() { char name[]="satellites"; int len; int size; len= strlen(name); size = sizeof(name); printf("%d",len*size); return 0; } $100$ $110$ $40$ $44$
asked Jan 13 in Programming Satbir 739 views
1 vote
5 answers
11
A given grammar is called ambiguous if two or more productions have the same non-terminal on the left hand side a derivation tree has more than one associated sentence there is a sentence with more than one derivation tree corresponding to it brackets are not present in the grammar
asked Jan 13 in Compiler Design Satbir 2.5k views
2 votes
4 answers
12
Consider the following recursive C function that takes two arguments unsigned int rer(unsigned int n, unsigned int r){ if(n>0)return(n%r + rer(n/r,r)); else retturn 0; } What is the return value of the function $rer$ when it is called as $rer(513,2)$? $9$ $8$ $5$ $2$
asked Jan 13 in Programming Satbir 430 views
4 votes
4 answers
13
Remote Procedure Calls are used for communication between two processes remotely different from each other on the same system communication between two processes on the same system communication between two processes on the separate systems none of the above
asked Jan 13 in Computer Networks Satbir 583 views
2 votes
1 answer
14
Which of the following is a type of a out-of-order execution, with the reordering done by a compiler loop unrolling dead code elimination strength reduction software pipelining
asked Jan 13 in Compiler Design Satbir 581 views
5 votes
6 answers
15
Minimum number of states required in DFA accepting binary strings not ending in $”101”$ is $3$ $4$ $5$ $6$
asked Jan 13 in Theory of Computation Satbir 1.5k views
1 vote
2 answers
16
Which of the following classes of languages can validate an $\text{IPv4}$ address in dotted decimal format? It is to be ensured that the decimal values lie between $0$ and $255$. RE and higher CFG and higher CSG and higher Recursively enumerable language
asked Jan 13 in Theory of Computation Satbir 501 views
1 vote
4 answers
17
The language which is generated by the grammar $S \rightarrow aSa \mid bSb \mid a \mid b$ over the alphabet of $\{a,b\}$ is the set of Strings that begin and end with the same symbol All odd and even length palindromes All odd length palindromes All even length palindromes
asked Jan 13 in Theory of Computation Satbir 295 views
2 votes
3 answers
18
Which of the following is true? Every subset of a regular set is regular Every finite subset of non-regular set is regular The union of two non regular set is not regular Infinite union of finite set is regular
asked Jan 13 in Theory of Computation Satbir 349 views
1 vote
4 answers
19
Context free languages are closed under union, intersection union, kleene closure intersection, complement complement, kleene closure
asked Jan 13 in Theory of Computation Satbir 605 views
5 votes
1 answer
20
A non-pipelined CPU has $12$ general purpose registers $(R0,R1,R2, \dots ,R12)$. Following operations are supported $\begin{array}{ll} \text{ADD Ra, Rb, Rr} & \text{Add Ra to Rb and store the result in Rr} \end{array}$ ... $X,Y,Z$ are initially available in registers $R0,R1$ and $R2$ and contents of these registers must not be modified. $5$ $6$ $7$ $8$
asked Jan 13 in CO and Architecture Satbir 792 views
3 votes
3 answers
21
2 votes
4 answers
22
Properties of $\text{ DELETE'}$ and $\text{ TRUNCATE'}$ commands indicate that After the execution of $\text{ TRUNCATE'}$ operation, $\text{COMMIT}$, and $\text{ROLLBACK}$ statements cannot be performed to retrieve the lost data, while $\text{ DELETE'}$ allow it ... not allow it After the execution of $\text{ DELETE'}$ and $\text{ TRUNCATE'}$ operation no retrieval is possible for the lost data
asked Jan 13 in Databases Satbir 562 views
4 votes
2 answers
23
How many total bits are required for a direct-mapped cache with $128$ KB of data and $1$ word block size, assuming a $32$-bit address and $1$ word size of $4$ bytes? $2$ Mbits $1.7$ Mbits $2.5$ Mbits $1.5$ Mbits
asked Jan 13 in CO and Architecture Satbir 1.1k views
2 votes
2 answers
24
A magnetic disk has $100$ cylinders, each with $10$ tracks of $10$ sectors. If each sector contains $128$ bytes, what is the maximum capacity of the disk in kilobytes? $1,280,000$ $1280$ $1250$ $128,000$
asked Jan 13 in CO and Architecture Satbir 907 views
2 votes
2 answers
25
Avalanche effect in cryptography refers Large changes in cipher text when the keyword is changed minimally Large changes in cipher text when the plain text is changed Large Impact of keyword change to length of the cipher text None of the above
asked Jan 13 in Computer Networks Satbir 652 views
1 vote
2 answers
26
In a columnar transportation cipher, the plain text is the tomato is a plant in the night shade family , keyword is $\text{TOMATO}$ . The cipher text is $\text{ TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$ ... $\text{ EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$
asked Jan 13 in Computer Networks Satbir 740 views
2 votes
3 answers
27
Which of the following is an efficient method of cache updating? Snoopy writes Write through Write within Buffered write
asked Jan 13 in CO and Architecture Satbir 1k views
3 votes
3 answers
28
The persist timer is used in TCP to To detect crashes from the other end of the connection To enable retransmission To avoid deadlock condition To timeout FIN_Wait$1$ condition
asked Jan 13 in Computer Networks Satbir 613 views
1 vote
2 answers
29
To send same bit sequence, $\text{NRZ}$ encoding require Same clock frequency as Manchester encoding Half the clock frequency as Manchester encoding Twice the clock frequency as Manchester encoding A clock frequency which depend on number of zeroes and ones in the bit sequence
asked Jan 13 in Digital Logic Satbir 527 views
4 votes
4 answers
30
The SQL query SELECT columns FROM TableA RIGHT OUTER JOIN TableB ON A.columnName = B.columnName WHERE A.columnName IS NULL returns the following: All rows in Table $B$, which meets equality condition above and, none from Table $A$ which meets the condition. All rows ... condition. All rows in Table $B$, which meets the equality condition All rows in Table $A$, which meets the equality condition
asked Jan 13 in Databases Satbir 738 views
...