Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by ManojK
1
answer
1
ISRO2018-74
Avalanche effect in cryptography Is desirable property of cryptographic algorithm Is undesirable property of cryptographic algorithm Has no effect on encryption algorithm None of the above
Avalanche effect in cryptographyIs desirable property of cryptographic algorithmIs undesirable property of cryptographic algorithmHas no effect on encryption algorithmNon...
2.4k
views
answer selected
Apr 24, 2018
Computer Networks
isro2018
computer-networks
network-security
+
–
3
answers
2
ISRO2018-63
Consider a singly linked list of the form where $F$ is a pointer to the first element in the linked list and $L$ is the pointer to the last element in the list. The time of which of the following operations depends on the length of the list? ... list Delete the first element of the list Add an element after the last element of the list Interchange the first two elements of the list
Consider a singly linked list of the form where $F$ is a pointer to the first element in the linked list and $L$ is the pointer to the last element in the list. The time ...
3.9k
views
answer selected
Apr 24, 2018
DS
isro2018
linked-list
data-structures
+
–
2
answers
3
ISRO2018-66
Of the following sorting algorithms, which has a running time that is least dependent on the initial ordering of the input? Mege Sort Insertion Sort Selection Sort Quick Sort
Of the following sorting algorithms, which has a running time that is least dependent on the initial ordering of the input?Mege SortInsertion SortSelection SortQuick Sort...
5.6k
views
answer selected
Apr 24, 2018
Algorithms
isro2018
algorithms
sorting
+
–
1
answer
4
ISRO2018-28
Incremental-Compiler is a compiler: which is written in a language that is different from the source language compiles the whole source code to generate object code afresh compiles only those portion of source code that have been modified that runs on one machine but produces object code for another machine
Incremental-Compiler is a compiler:which is written in a language that is different from the source languagecompiles the whole source code to generate object code afreshc...
2.5k
views
answer selected
Apr 24, 2018
Compiler Design
isro2018
compiler-design
intermediate-code
+
–
2
answers
5
ISRO2018-79
A doubly linked list is declared as: struct Node { int Value; struct Node *Fwd; struct Node *Bwd; }; Where Fwd and Bwd represent forward and backward link to the adjacent elements of the list. Which of the following segment of code deletes the node pointed to by ... Bwd = X.Bwd; X$\rightarrow$Bwd$\rightarrow$Fwd = X$\rightarrow$Bwd; X$\rightarrow$Fwd$\rightarrow$Bwd = X$\rightarrow$Fwd;
A doubly linked list is declared as:struct Node { int Value; struct Node *Fwd; struct Node *Bwd; };Where Fwd and Bwd represent forward and backward link to the adjacent e...
28.7k
views
answer selected
Apr 24, 2018
DS
isro2018
linked-list
data-structures
+
–
3
answers
6
ISRO2018-32
A computer uses ternary system instead of the traditional systen, An $n$ bit string in the binary system will occupy $3+n$ ternary digits $2n/3$ ternary digits $n$\log_{2}3$ ternary digits $n$\log_{3}2$ ternary digits
A computer uses ternary system instead of the traditional systen, An $n$ bit string in the binary system will occupy$3+n$ ternary digits$2n/3$ ternary digits$n$$\log_{2}3...
4.3k
views
answer selected
Apr 24, 2018
Digital Logic
isro2018
digital-logic
number-representation
+
–
3
answers
7
ISRO2018-64
A particular BNF definition for a "word is given by the following rules. <word> :: = <letter> I <letter> <charpair> I <letter> <intpair> <charpair> :: = <letter> <letter> I <charpair> <letter> <letter> < ... $\textsf{c44}$ I, II and III I and II only I and III only II and III only
A particular BNF definition for a "word is given by the following rules.<word :: = <letter I <letter <charpair I <letter <intpair <charpair :: = <letter <letter I <charpa...
5.7k
views
answer selected
Apr 24, 2018
Compiler Design
isro2018
compiler-design
grammar
context-free-grammar
+
–
3
answers
8
ISRO2018-38
The number of edges in a regular graph of degree: $d$ and $n$ vertices is: maximum of $n$ and $d$ $n +d$ $nd$ $nd/2$
The number of edges in a regular graph of degree: $d$ and $n$ vertices is:maximum of $n$ and $d$ $n +d$$nd$$nd/2$
14.0k
views
answer selected
Apr 24, 2018
Graph Theory
isro2018
graph-theory
graph-connectivity
+
–
4
answers
9
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
14.3k
views
answer selected
Apr 24, 2018
Computer Networks
isro2018
computer-networks
network-security
cryptography
+
–
1
answer
10
ISRO2018-69
Let $P$ be a procedure that for some inputs calls itself (i.e. is recursive). If $P$ is guaranteed to terminate, which of the following statement(s) must be true? $P$ has a local variable $P$ has an execution path where it does not call itself $P$ either refers to a global variable or has at least one parameter I only II only III only II and III only
Let $P$ be a procedure that for some inputs calls itself (i.e. is recursive). If $P$ is guaranteed to terminate, which of the following statement(s) must be true?$P$ has ...
1.8k
views
answer selected
Apr 23, 2018
Programming in C
isro2018
programming
recursion
+
–
2
answers
11
ISRO2018-62
Any set of Boolean operation that is sufficient to represent all Boolean expression is said to be complete. Which of the following is not complete ? $\text{{AND, OR}}$ $\text{{AND, NOT}}$ $\text{{NOT, OR}}$ $\text{{NOR}}$
Any set of Boolean operation that is sufficient to represent all Boolean expression is said to be complete. Which of the following is not complete ?$\text{{AND, OR}}$$\te...
1.9k
views
answer selected
Apr 23, 2018
Digital Logic
isro2018
digital-logic
boolean-algebra
+
–
6
answers
12
ISRO2018-60
What is the output of tho following program? main(){ int x=2, y=5; if(x<y) return (x=x+y); else printf("z1"); printf("z2"); } $z2$ $z1z2$ Compilation error None of these
What is the output of tho following program?main(){ int x=2, y=5; if(x<y) return (x=x+y); else printf("z1"); printf("z2"); }$z2$$z1z2$Compilation errorNone of these
10.0k
views
answer selected
Apr 23, 2018
Programming in C
isro2018
programming
output
+
–
2
answers
13
ISRO2018-59
The lower degree of cohesion is kind of: Logical Cohesion Coincidental Cohesion Procedural Cohesion Communicational Cohesion
The lower degree of cohesion is kind of:Logical CohesionCoincidental CohesionProcedural CohesionCommunicational Cohesion
10.7k
views
answer selected
Apr 23, 2018
IS&Software Engineering
isro2018
is&software-engineering
+
–
2
answers
14
ISRO2018-58
The Functions Point (FP) metric is Calculated from user requirement Calculated from lines of code Calculated from software complexity assessment None of the above
The Functions Point (FP) metric isCalculated from user requirementCalculated from lines of codeCalculated from software complexity assessmentNone of the above
5.3k
views
answer selected
Apr 23, 2018
IS&Software Engineering
isro2018
software-metrics
is&software-engineering
non-gate
+
–
3
answers
15
ISRO2018-54
The set of attributes $X$ will be fully functionally dependent on the set of attributes $Y$ if the following conditions are satisfied. $X$ is functionally dependent on $Y$ $X$ is not functionally dependent on any subset of $Y$ Both (a) and (b) None of these
The set of attributes $X$ will be fully functionally dependent on the set of attributes $Y$ if the following conditions are satisfied.$X$ is functionally dependent on $Y$...
3.8k
views
answer selected
Apr 23, 2018
Databases
isro2018
databases
database-normalization
+
–
2
answers
16
ISRO2018-51
Which of the following is dense index? Primary index Clustered index Secondary index Secondary non-key index
Which of the following is dense index?Primary indexClustered indexSecondary indexSecondary non-key index
10.2k
views
answer selected
Apr 23, 2018
Databases
isro2018
indexing
+
–
2
answers
17
ISRO2018-36
A hash table with $10$ buckets with one slot pet per bucket is depicted here. The symbols, $S1$ to $S7$ ... $4$ $5$ $6$ $3$
A hash table with $10$ buckets with one slot pet per bucket is depicted here. The symbols, $S1$ to $S7$ are initially entered using a hashing function with linear probing...
2.5k
views
answer selected
Apr 23, 2018
Algorithms
isro2018
algorithms
hashing
linear-probing
+
–
1
answer
18
ISRO2018-35
Given two sorted list of size $m$ and $n$ respectively. The number of comparisons needed the worst case by the merge sort algorithm will be: $m \times n$ maximum of $m$ and $n$ minimum of $m$ and $n$ $m+n-1$
Given two sorted list of size $m$ and $n$ respectively. The number of comparisons needed the worst case by the merge sort algorithm will be:$m \times n$maximum of $m$ and...
2.5k
views
answer selected
Apr 23, 2018
Algorithms
isro2018
algorithms
merge-sort
+
–
5
answers
19
ISRO2018-23
Disk requests come to a disk driver for cylinders in the order $10$, $22$, $20$, $2$, $40$, $6$ and $38$ at a time when the disk drive is reading from cylinder $20$. The seek time is $6$ ms/cylinder. The total seek time, if the disk arm scheduling algorithms is first-come-first-served is $360$ $850$ $900$ None of the above
Disk requests come to a disk driver for cylinders in the order $10$, $22$, $20$, $2$, $40$, $6$ and $38$ at a time when the disk drive is reading from cylinder $20$. The ...
3.8k
views
answer selected
Apr 23, 2018
Operating System
isro2018
disk
operating-system
+
–
3
answers
20
ISRO2018-22
A computer has $1000K$ of main memory. The jobs arrive and finish in the following sequence. Job $1$ requiring $200$ $K$ arrives Job $2$ requiring $350$ $K$ arrives Job $3$ requiring $300$ $K$ arrives Job $1$ finishes Job $4$ requiring $120$ ... $K$ arrives Among best fit and first fit, which performs better for this sequence? First fit Best fit Both perform the same None of the above
A computer has $1000K$ of main memory. The jobs arrive and finish in the following sequence. Job $1$ requiring $200$ $K$ arrives Job $2$ requiring $350$ $...
2.7k
views
answer selected
Apr 23, 2018
Operating System
isro2018
memory-management
fragmentation
operating-system
+
–
5
answers
21
ISRO2018-21
Consider a system having $m$ resources of the same type. These resources are shared by $3$ processes $A, B, C,$ which have peak time demands of $3, 4, 6$ respectively. The minimum value of $m$ that ensures that deadlock will never occur is: $11$ $12$ $13$ $14$
Consider a system having $m$ resources of the same type. These resources are shared by $3$ processes $A, B, C,$ which have peak time demands of $3, 4, 6$ respectively. Th...
5.0k
views
answer selected
Apr 23, 2018
Operating System
isro2018
deadlock-prevention-avoidance-detection
operating-system
+
–
2
answers
22
ISRO2018-20
Determine the number of page faults when references to pages occur in the order - $1, 2, 4, 5, 2, 1, 2, 4$. Assume that the main memory can accommodate $3$ pages and the main memory already has the pages $1$ and $2$, with page $1$ having brought earlier than page $2$. (assume LRU i.e. Least-Recently-Used algorithm is applied) $3$ $4$ $5$ None of the above
Determine the number of page faults when references to pages occur in the order - $1, 2, 4, 5, 2, 1, 2, 4$. Assume that the main memory can accommodate $3$ pages and the ...
1.1k
views
answer selected
Apr 23, 2018
Operating System
isro2018
operating-system
page-fault
+
–
3
answers
23
ISRO2018-19
Given $\sqrt{224_{r}}$= $13$_{r}$ the value of radix $r$ is $10$ $8$ $6$ $5$
Given $\sqrt{224_{r}}$= $13$$_{r}$ the value of radix $r$ is$10$$8$$6$$5$
3.9k
views
answer selected
Apr 23, 2018
Digital Logic
isro2018
number-representation
digital-logic
+
–
1
answer
24
ISRO2018-18
Consider the following C code segment: #include <stdio.h> main() { int i, j, x; scanf("%d", &x); i=1; j=1; while (i<10) { j =j*i; i= i+1; if(i==x) break; } } For the program fragment above, which of the following statements about the variables i and j must be true ... $\wedge$ $(i=x))$ $(j=9!)$ $\wedge$ (i\geqslant$10$)) $\vee$ $((j=(x-1)!) $\wedge$ (i=x))$
Consider the following C code segment:#include <stdio.h main() { int i, j, x; scanf("%d", &x); i=1; j=1; while (i<10) { j =j*i; i= i+1; if(i==x) break; } }For the program...
4.4k
views
answer selected
Apr 23, 2018
Programming in C
isro2018
programming-in-c
programming
+
–
1
answer
25
ISRO2018-16
The following paradigm can be used to find the solution of the problem in minimum time: Given a set of non-negative integer and a value $K$, determine if there is a subset of the given set with sum equal to $K$: Divide and Conquer Dynamic Programming Greedy Algorithm Branch and Bound
The following paradigm can be used to find the solution of the problem in minimum time:Given a set of non-negative integer and a value $K$, determine if there is a subset...
5.1k
views
answer selected
Apr 23, 2018
Algorithms
isro2018
algorithm-design-technique
algorithms
+
–
1
answer
26
ISRO2018-50
A particular disk unit uses a bit string to record the occupancy or vacancy of its tracks, with $0$ denoting vacant and $1$ for occupied. A $32$-$bit$ segment of this string has hexadecimal value D4FE2003. The percentage of occupied tracks for the corresponding part of the disk, to the nearest percentage is: $12$ $25$ $38$ $44$
A particular disk unit uses a bit string to record the occupancy or vacancy of its tracks, with $0$ denoting vacant and $1$ for occupied. A $32$-$bit$ segment of this str...
2.7k
views
answer selected
Apr 23, 2018
Operating System
isro2018
disk
operating-system
+
–
3
answers
27
ISRO2018-4
The following $C$ program: { fork(); fork(); printf("yes"); } If we execute this core segment, how many times the string yes will be printed? Only once 2 times 4 times 8 times
The following $C$ program:{ fork(); fork(); printf("yes"); }If we execute this core segment, how many times the string yes will be printed?Only once2 times4 times8 times
10.9k
views
answer selected
Apr 23, 2018
Operating System
isro2018
fork-system-call
operating-system
+
–
2
answers
28
ISRO2018-8
A language with string manipulation facilities uses the following operations. head$(s)$- returns the first character of the string $s$ tails$(s)$- returns all but the first character of the string $s$ concat$(s1, s2)$- concatenates string $s1$ with $s2.$ The output of concat(head$(s)$, head(tail(tail$(s)$))), where s is $acbc$ is: ab ba ac aa
A language with string manipulation facilities uses the following operations.head$(s)$- returns the first character of the string $s$tails$(s)$- returns all but the first...
2.7k
views
answer selected
Apr 23, 2018
Programming in C
isro2018
programming
output
+
–
2
answers
29
DIfference between Static and Global variables.
What are the differences between static and global variables?
What are the differences between static and global variables?
1.9k
views
commented
Oct 1, 2017
2
answers
30
Data Type
#include<stdio.h> int main() { char c = 125; c = c+10; printf("%d", c); return 0; } what will be the output , explain with logic(size of char 1 byte)
#include<stdio.h int main() { char c = 125; c = c+10; printf("%d", c); return 0; }what will be the output , explain with logic(size of char 1 byte)
1.4k
views
commented
Jul 26, 2017
Programming in C
programming-in-c
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register