Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by ajit
11
votes
5
answers
1
ISRO2015-53
An ACK number of $1000$ in TCP always means that $999$ bytes have been successfully received $1000$ bytes have been successfully received $1001$ bytes have been successfully received None of the above
An ACK number of $1000$ in TCP always means that$999$ bytes have been successfully received$1000$ bytes have been successfully received$1001$ bytes have been successfully...
8.3k
views
asked
Oct 15, 2015
Computer Networks
isro2015
computer-networks
tcp
+
–
5
votes
2
answers
2
ISRO2015-46
The correct syntax to write "Hi there" in Javascript is jscript.write ("Hi There") response.write ("Hi There") print ("Hi There") print.jscript ("Hi There")
The correct syntax to write "Hi there" in Javascript isjscript.write ("Hi There")response.write ("Hi There")print ("Hi There")print.jscript ("Hi There")
3.5k
views
asked
Oct 15, 2015
Web Technologies
javascript
non-gate
isro2015
+
–
14
votes
11
answers
3
ISRO2015-30
Semaphores are used to solve the problem of Race Condition Process Synchronization Mutual Exclusion None of the above I and II II and III All of the above None of the above
Semaphores are used to solve the problem ofRace ConditionProcess SynchronizationMutual ExclusionNone of the aboveI and IIII and IIIAll of the aboveNone of the above
21.6k
views
asked
Oct 12, 2015
Operating System
semaphore
isro2015
process-synchronization
+
–
12
votes
3
answers
4
ISRO2015-4
A modulus -$12$ ring counter requires a minimum of $10$ flip-flops $12$ flip-flops $8$ flip-flops $6$ flip-flops
A modulus -$12$ ring counter requires a minimum of$10$ flip-flops$12$ flip-flops$8$ flip-flops$6$ flip-flops
10.4k
views
asked
Oct 12, 2015
Digital Logic
isro2015
digital-logic
digital-counter
+
–
9
votes
5
answers
5
ISRO2015-7
If half adders and full adders are implements using gates, then for the addition of two $17$ bit numbers (using minimum gates) the number of half adders and full adders required will be $0,17$ $16,1$ $1,16$ $8,8$
If half adders and full adders are implements using gates, then for the addition of two $17$ bit numbers (using minimum gates) the number of half adders and full adders r...
9.7k
views
asked
Oct 12, 2015
Digital Logic
isro2015
digital-logic
adder
+
–
11
votes
10
answers
6
ISRO2015-38
Suppose two jobs, each of which needs $10$ minutes of CPU time, start simultaneously. Assume $50\%$ I/O wait time. How long will it take for both to complete, if they run sequentially? 10 20 30 40
Suppose two jobs, each of which needs $10$ minutes of CPU time, start simultaneously. Assume $50\%$ I/O wait time. How long will it take for both to complete, if they run...
11.2k
views
asked
Oct 12, 2015
Operating System
process-scheduling
isro2015
+
–
9
votes
5
answers
7
ISRO2015-55
A certain population of ALOHA users manages to generate $70$ request/sec. If the time is slotted in units of $50$ msec, then channel load would be $4.25$ $3.5$ $450$ $350$
A certain population of ALOHA users manages to generate $70$ request/sec. If the time is slotted in units of $50$ msec, then channel load would be$4.25$$3.5$$450$$350$
7.0k
views
asked
Oct 12, 2015
Computer Networks
isro2015
computer-networks
slotted-aloha
+
–
7
votes
3
answers
8
ISRO2015-62
The minimum time delay between the initiation of two independent memory operations is called Access time Cycle time Rotational time Latency time
The minimum time delay between the initiation of two independent memory operations is calledAccess timeCycle timeRotational timeLatency time
6.8k
views
asked
Oct 12, 2015
CO and Architecture
isro2015
co-and-architecture
memory-management
+
–
7
votes
5
answers
9
ISRO2015-68
Consider the following program fragment if(a > b) if(b > c) s1; else s2; s2 will be executed if a <= b b > c b >= c and a <= b a > b and b <= c
Consider the following program fragment if(a b) if(b c) s1; else s2;s2 will be executed ifa <= bb cb >= c and a <= ba b and b <= c
5.8k
views
asked
Oct 12, 2015
Programming in C
isro2015
programming
programming-in-c
+
–
7
votes
3
answers
10
ISRO2015-72
Consider the following declaration: int a, *b=&a, **c=&b; The following program fragment a=4; **c=5; does not change the value of a assigns address of $c$ to $a$ assigns the value of $b$ to $a$ assigns $5$ to $a$
Consider the following declaration:int a, *b=&a, c=&b;The following program fragmenta=4; c=5;does not change the value of aassigns address of $c$ to $a$assigns the valu...
4.7k
views
asked
Oct 12, 2015
Programming in C
pointers
programming-in-c
isro2015
+
–
16
votes
3
answers
11
ISRO2015-18
Given a block can hold either $3$ records or $10$ key pointers. A database contains n records, then how many blocks do we need to hold the data file and the dense index $13n/30$ $n/3$ $n/10$ $n/30$
Given a block can hold either $3$ records or $10$ key pointers. A database contains n records, then how many blocks do we need to hold the data file and the dense index$1...
7.5k
views
asked
Oct 12, 2015
Databases
isro2015
databases
indexing
+
–
4
votes
4
answers
12
ISRO2009-69
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field? Replace Join Change Update
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field?ReplaceJoinChangeUpdate
4.6k
views
asked
Oct 5, 2015
Databases
isro2009
databases
bad-question
+
–
8
votes
4
answers
13
ISRO2009-77
When a process is rolled back as a result of deadlock the difficulty which arises is Starvation System throughput Low device utilization Cycle stealing
When a process is rolled back as a result of deadlock the difficulty which arises isStarvationSystem throughputLow device utilizationCycle stealing
7.2k
views
asked
Oct 5, 2015
Operating System
isro2009
deadlock-prevention-avoidance-detection
+
–
7
votes
3
answers
14
ISRO2009-78
On receiving an interrupt from an I/O device,the CPU Halts for a predetermined time Branches off to the interrupt service routine after completion of the current instruction Branches off to the interrupt service routine immediately Hands over control of address bus and data bus to the interrupting device
On receiving an interrupt from an I/O device,the CPUHalts for a predetermined timeBranches off to the interrupt service routine after completion of the current instructio...
7.0k
views
asked
Oct 5, 2015
CO and Architecture
isro2009
co-and-architecture
io-handling
+
–
6
votes
4
answers
15
ISRO2009-79
Compared to CISC processors,RISC processors contain More register and smaller instruction set larger instruction set less registers and smaller instruction set more transistor elements
Compared to CISC processors,RISC processors containMore register and smaller instruction setlarger instruction setless registers and smaller instruction setmore transisto...
4.0k
views
asked
Oct 5, 2015
CO and Architecture
isro2009
co-and-architecture
instruction-format
+
–
1
votes
1
answer
16
The process of organizing the memory into two banks to allow 8 and 16 bit data operation is called
The process of organizing the memory into two banks to allow 8 and 16 bit data operation is called a)Bank switching b)Indexed mapping c)Two-way memory interleaving d)Memory segmentation
The process of organizing the memory into two banks to allow 8 and 16 bit data operation is calleda)Bank switchingb)Indexed mappingc)Two-way memory interleavingd)Memory s...
1.3k
views
asked
Oct 5, 2015
2
votes
1
answer
17
Which is the correct definition of a valid process transition in an operating system?
Which is the correct definition of a valid process transition in an operating system? a)Wake up:ready->running b)Dispatch:ready->running c)Block:ready->running d)Timer runout:ready->blocked
Which is the correct definition of a valid process transition in an operating system?a)Wake up:ready->runningb)Dispatch:ready->runningc)Block:ready->runningd)Timer runout...
3.1k
views
asked
Oct 5, 2015
4
votes
2
answers
18
ISRO2011-69
Lightweight Directory Access protocol is used for Routing the packets Authentication obtaining IP address domain name resolving
Lightweight Directory Access protocol is used forRouting the packetsAuthenticationobtaining IP addressdomain name resolving
2.6k
views
asked
Oct 1, 2015
Computer Networks
isro2011
computer-networks
network-protocols
+
–
3
votes
2
answers
19
ISRO2011-70
Number of comparisons required for an unsuccessful search of an element in a sequential search organized, fixed length, symbol table of length L is L L/2 (L+1)/2 2L
Number of comparisons required for an unsuccessful search of an element in a sequential search organized, fixed length, symbol table of length L isLL/2(L+1)/22L
6.9k
views
asked
Oct 1, 2015
Algorithms
isro2011
algorithms
searching
+
–
6
votes
3
answers
20
ISRO2011-1
The encoding technique used to transmit the signal in giga ethernet technology over fiber optic medium is Differential Manchester encoding Non return to zero $\text{4B/5B}$ encoding $\text{8B/10B}$ encoding
The encoding technique used to transmit the signal in giga ethernet technology over fiber optic medium isDifferential Manchester encodingNon return to zero$\text{4B/5B}$...
5.4k
views
asked
Oct 1, 2015
Computer Networks
computer-networks
isro2011
communication
+
–
Page:
1
2
3
4
5
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register