Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Answers by kvkumar
1
votes
61
ISRO2011-68
Which of the following sentences can be generated by S -> aS $\mid$ bA A -> d $\mid$ cA bccdd abbcca abcabc abcd
Which of the following sentences can be generated by S - aS $\mid$ bAA - d $\mid$ cAbccddabbccaabcabcabcd
5.1k
views
answered
Jun 26, 2016
Theory of Computation
isro2011
theory-of-computation
context-free-language
grammar
+
–
2
votes
62
ISRO2011-72
Find the output of the following Java code line System.out.printIn(math.floor(-7.4)) -7 -8 -7.4 -7.0
Find the output of the following Java code line System.out.printIn(math.floor(-7.4))-7-8-7.4-7.0
3.8k
views
answered
Jun 26, 2016
Java
isro2011
non-gate
java
+
–
2
votes
63
ISRO2011-73
Belady's anomaly means Page fault rate is constant even on increasing the number of allocated frames Page fault rate may increase on increasing the number of allocated frames Page fault rate may increase on decreasing the number of allocated frames Page fault rate may decrease on increasing the number of allocated frames
Belady's anomaly meansPage fault rate is constant even on increasing the number of allocated framesPage fault rate may increase on increasing the number of allocated fram...
2.7k
views
answered
Jun 26, 2016
Operating System
isro2011
operating-system
page-replacement
page-fault
+
–
1
votes
64
ISRO2011-79
A problem whose language is recursion is called? Unified problem Boolean function Recursive problem Decidable
A problem whose language is recursion is called?Unified problemBoolean functionRecursive problemDecidable
4.4k
views
answered
Jun 26, 2016
Theory of Computation
isro2011
theory-of-computation
recursive-and-recursively-enumerable-languages
+
–
2
votes
65
ISRO2011-80
Logic family popular for low power dissipation CMOS ECL TTL DTL
Logic family popular for low power dissipationCMOSECLTTLDTL
3.7k
views
answered
Jun 26, 2016
Integrated Circuits
isro2011
non-gate
integrated-circuits
+
–
37
votes
66
GATE CSE 2003 | Question: 25, ISRO2009-12
Using a larger block size in a fixed block size file system leads to better disk throughput but poorer disk space utilization better disk throughput and better disk space utilization poorer disk throughput but better disk space utilization poorer disk throughput and poorer disk space utilization
Using a larger block size in a fixed block size file system leads tobetter disk throughput but poorer disk space utilizationbetter disk throughput and better disk space u...
15.0k
views
answered
Jun 26, 2016
Operating System
gatecse-2003
operating-system
disk
normal
isro2009
+
–
9
votes
67
GATE CSE 2004 | Question: 4, ISRO2009-26
The following numbers are inserted into an empty binary search tree in the given order: $10, 1, 3, 5, 15, 12, 16$. What is the height of the binary search tree (the height is the maximum distance of a leaf node from the root)? $2$ $3$ $4$ $6$
The following numbers are inserted into an empty binary search tree in the given order: $10, 1, 3, 5, 15, 12, 16$. What is the height of the binary search tree (the heigh...
22.6k
views
answered
Jun 26, 2016
DS
gatecse-2004
data-structures
binary-search-tree
easy
isro2009
+
–
25
votes
68
GATE CSE 2005 | Question: 16, ISRO2009-18, ISRO2015-2
The range of integers that can be represented by an $n$ bit $2’s$ complement number system is: $-2^{n-1} \text{ to } (2^{n-1} -1)$ $-(2^{n-1} -1) \text{ to } (2^{n-1} -1)$ $-2^{n-1} \text{ to } 2^{n-1}$ $-(2^{n-1} +1) \text{ to } (2^{n-1} -1)$
The range of integers that can be represented by an $n$ bit $2’s$ complement number system is:$-2^{n-1} \text{ to } (2^{n-1} -1)$$-(2^{n-1} -1) \text{ to } (2^{n-1} -1)...
9.7k
views
answered
Jun 26, 2016
Digital Logic
gatecse-2005
digital-logic
number-representation
easy
isro2009
isro2015
+
–
1
votes
69
GATE IT 2006 | Question: 7, ISRO2009-41
The addition of $4-bit$, two's complement, binary numbers $1101$ and $0100$ results in $0001$ and an overflow $1001$ and no overflow $0001$ and no overflow $1001$ and an overflow
The addition of $4-bit$, two's complement, binary numbers $1101$ and $0100$ results in$0001$ and an overflow$1001$ and no overflow$0001$ and no overflow$1001$ and an over...
14.4k
views
answered
Jun 26, 2016
Digital Logic
gateit-2006
digital-logic
number-representation
normal
isro2009
+
–
4
votes
70
ISRO2009-78
On receiving an interrupt from an I/O device,the CPU Halts for a predetermined time Branches off to the interrupt service routine after completion of the current instruction Branches off to the interrupt service routine immediately Hands over control of address bus and data bus to the interrupting device
On receiving an interrupt from an I/O device,the CPUHalts for a predetermined timeBranches off to the interrupt service routine after completion of the current instructio...
7.0k
views
answered
Jun 26, 2016
CO and Architecture
isro2009
co-and-architecture
io-handling
+
–
3
votes
71
ISRO2009-79
Compared to CISC processors,RISC processors contain More register and smaller instruction set larger instruction set less registers and smaller instruction set more transistor elements
Compared to CISC processors,RISC processors containMore register and smaller instruction setlarger instruction setless registers and smaller instruction setmore transisto...
4.0k
views
answered
Jun 26, 2016
CO and Architecture
isro2009
co-and-architecture
instruction-format
+
–
3
votes
72
ISRO2009-69
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field? Replace Join Change Update
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field?ReplaceJoinChangeUpdate
4.6k
views
answered
Jun 26, 2016
Databases
isro2009
databases
bad-question
+
–
0
votes
73
ISRO2009-6
$\textsf{SHA-1}$ is a encryption algorithm decryption algorithm key exchange algorithm message digest function
$\textsf{SHA-1}$ is aencryption algorithmdecryption algorithmkey exchange algorithmmessage digest function
2.3k
views
answered
Jun 26, 2016
Computer Networks
isro2009
computer-networks
network-security
+
–
0
votes
74
ISRO2009-74
Use of IPSEC in tunnel mode results in IP packet with same header IP packet with new header IP packet without header No changes in IP packet
Use of IPSEC in tunnel mode results inIP packet with same headerIP packet with new headerIP packet without headerNo changes in IP packet
3.4k
views
answered
Jun 26, 2016
Computer Networks
isro2009
computer-networks
ip-packet
+
–
1
votes
75
ISRO2009-72
Purpose of 'Foreign Key' in a table is to ensure Null Integrity Referential Integrity Domain Integrity Null and Domain Integrity
Purpose of 'Foreign Key' in a table is to ensureNull IntegrityReferential IntegrityDomain IntegrityNull and Domain Integrity
3.9k
views
answered
Jun 26, 2016
Databases
isro2009
databases
referential-integrity
+
–
1
votes
76
ISRO2009-4
Which of the following is a MAC address? $\textsf{192.166.200.50}$ $\textsf{00056A:01A01A5CCA7FF60}$ $\textsf{568, Airport Road}$ $\textsf{01:A5:BB:A7:FF:60}$
Which of the following is a MAC address?$\textsf{192.166.200.50}$$\textsf{00056A:01A01A5CCA7FF60}$$\textsf{568, Airport Road}$$\textsf{01:A5:BB:A7:FF:60}$
4.6k
views
answered
Jun 25, 2016
Computer Networks
isro2009
computer-networks
mac-protocol
+
–
3
votes
77
ISRO2009-11
A page fault Occurs when a program accesses an available page on memory is an error in a specific page is a reference to a page belonging to another program occurs when a program accesses a page not currently in memory
A page faultOccurs when a program accesses an available page on memoryis an error in a specific pageis a reference to a page belonging to another programoccurs when a pro...
3.5k
views
answered
Jun 25, 2016
Operating System
isro2009
operating-system
page-fault
+
–
1
votes
78
ISRO2009-31
A full binary tree with $n$ leaves contains $n$ nodes $\log_2 n$ nodes $2n-1$ $2^n$ nodes
A full binary tree with $n$ leaves contains$n$ nodes$\log_2 n$ nodes$2n-1$$2^n$ nodes
5.8k
views
answered
Jun 25, 2016
DS
isro2009
data-structures
binary-tree
+
–
3
votes
79
ISRO2009-55
In a graph $\text{G}$ there is one and only one path between every pair of vertices then $\text{G}$ is a Path Walk Tree Circuit
In a graph $\text{G}$ there is one and only one path between every pair of vertices then $\text{G}$ is aPathWalkTreeCircuit
5.4k
views
answered
Jun 25, 2016
Graph Theory
isro2009
graph-theory
graph-connectivity
+
–
2
votes
80
ISRO2009-59
A square matrix $\text{A}$ is called orthogonal if $\text{A}'\text{A}=$ $\text{I}$ $\text{A}$ $-\text{A}$ $-\text{I}$
A square matrix $\text{A}$ is called orthogonal if $\text{A}'\text{A}=$$\text{I}$$\text{A}$$-\text{A}$$-\text{I}$
2.8k
views
answered
Jun 25, 2016
Linear Algebra
isro2009
linear-algebra
matrix
+
–
1
votes
81
ISRO2009-67
Activities which ensure that the software that has been built, is traceable to customer requirement is covered as part of Verification Validation Maintenance Modeling
Activities which ensure that the software that has been built, is traceable to customer requirement is covered as part ofVerificationValidationMaintenanceModeling
4.5k
views
answered
Jun 25, 2016
IS&Software Engineering
isro2009
is&software-engineering
software-testing
+
–
2
votes
82
ISRO2009-71
Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time? Transaction log Query language Report writer Data manipulation language
Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time?Transaction logQuery languageRepo...
5.7k
views
answered
Jun 25, 2016
Databases
isro2009
databases
transaction-and-concurrency
+
–
3
votes
83
ISRO2009-76
Process is A program in high level language kept on disk Contents of main memory A program in execution A job in secondary memory
Process isA program in high level language kept on diskContents of main memoryA program in executionA job in secondary memory
2.8k
views
answered
Jun 25, 2016
Operating System
isro2009
operating-system
process
+
–
0
votes
84
ISRO2009-32
The expression $1 * 2 \wedge 3 * 4 \wedge 5 * 6$ will be evaluated as $32^{30}$ $162^{30}$ 49152 173458 In original quetion 5 is not given.
The expression $1 * 2 \wedge 3 * 4 \wedge 5 * 6$ will be evaluated as$32^{30}$$162^{30}$49152173458In original quetion 5 is not given.
3.0k
views
answered
Jun 25, 2016
Compiler Design
isro2009
compiler-design
expression-evaluation
+
–
2
votes
85
ISRO2009-3
The address resolution protocol (ARP) is used for Finding the IP address from the DNS Finding the IP address of the default gateway Finding the IP address that corresponds to a MAC address Finding the MAC address that corresponds to an IP address
The address resolution protocol (ARP) is used forFinding the IP address from the DNSFinding the IP address of the default gatewayFinding the IP address that corresponds t...
2.2k
views
answered
Jun 7, 2016
Computer Networks
isro2009
computer-networks
network-protocols
+
–
0
votes
86
ISRO2009-40 , GATE2008-IT_42
The two numbers given below are multiplied using the Booth's algorithm Multiplicand $: 0101\; 1010 \;1110 \;1110$ Multiplier $: 0111\; 0111\; 1011\; 1101$ How many additions/subtractions are required for the multiplication of the above two numbers? $6$ $8$ $10$ $12$
The two numbers given below are multiplied using the Booth's algorithmMultiplicand $: 0101\; 1010 \;1110 \;1110$Multiplier $: 0111\; 0111\; 1011\; 1101$How many additions...
3.5k
views
answered
Jun 4, 2016
Digital Logic
isro2009
digital-logic
booths-algorithm
+
–
4
votes
87
ISRO2009-21, UGCNET-Dec2012-II: 12
In which addressing mode, the effectives address of the operand is generated by adding a constant value to the content of a register? Absolute mode Indirect mode Immediate mode Index mode
In which addressing mode, the effectives address of the operand is generated by adding a constant value to the content of a register?Absolute modeIndirect modeImmediate m...
6.2k
views
answered
Jun 4, 2016
CO and Architecture
isro2009
co-and-architecture
ugcnetcse-dec2012-paper2
addressing-modes
+
–
1
votes
88
ISRO2009-70
A locked database file can be Accessed by only one user Modified by users with the correct password Used to hide sensitive information Updated by more than one user
A locked database file can beAccessed by only one userModified by users with the correct passwordUsed to hide sensitive informationUpdated by more than one user
4.4k
views
answered
Jun 4, 2016
Databases
isro2009
databases
file-system
+
–
0
votes
89
Number of flip flops required?
For the counting sequence 100, 200, 300 , 400 , 100 (repeat), the number of flip flops required are ?
For the counting sequence 100, 200, 300 , 400 , 100 (repeat), the number of flip flops required are ?
989
views
answered
Jun 2, 2016
Digital Logic
digital-logic
flip-flop
+
–
1
votes
90
flip flops
Which of the following flip-flops is free from race condition ? (A) T flip-flop (B) SR flip-flop (C) Master-slave JK flip-flop (D) None of the above
Which of the following flip-flops is free from race condition ?(A) T flip-flop(B) SR flip-flop(C) Master-slave JK flip-flop(D) None of the above
6.1k
views
answered
Jun 2, 2016
Digital Logic
flip-flop
digital-logic
+
–
Page:
« prev
1
2
3
4
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register