Explore topic-wise InterviewSolutions in ISRO.

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your ISRO knowledge and support exam preparation. Choose a topic below to get started.

1.

The microinstructions stored in the control memory of a processor have a width of 26 bits. Each microinstruction is divided into three fields. a micro operation field of 13 bits, a next address field (X), and a MUX select field (Y). There are 8 status bits in the inputs of the MUX. How many bits are there in the X and Y fields, and what is the size of the control memory in number of words(A) 10, 3, 1024(B) 8, 5, 256(C) 5, 8, 2048(D) 10, 3, 512

Answer»
2.

(A) 779(B) 679(C) 0(D) 256

Answer»
3.

If the mean of a normal frequency distribution of 1000 items is 25 and its standard deviation is 2.5, then its maximum ordinate is(A) (1000/√2π).e-25(B) 1000/√2π(C) (1000/√2π ).e-2.5(D) 400/√2π

Answer»
4.

A full binary tree with n leaves contains:(A) n nodes(B) log2 n nodes(C) 2n-1(D) 2n

Answer»
5.

The cubic polynomial y(x) which takes the following values:y(0) = 1, y(1) = 0, y(2) = 1 y(3) = 10 is(A) (B) (C) (D)

Answer» None
6.

Which is the correct definition of a valid process transition in an operating system?(A) Wake up: ready → running(B) Dispatch: ready → running(C) Block: ready → running(D) Timer runout: ready → running

Answer»
7.

The performance of Round Robin algorithm depends heavily on(A) size of the process(B) the I/O bursts of the process(C) the CPU bursts of the process(D) the size of the time quantum

Answer»
8.

The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?(A) 172.57.88.62 and 172.56.87.23(B) 10.35.28.2 and 10.35.29.4(C) 191.203.31.87 and 191.234.31.88(D) 128.8.129.43 and 128.8.161.55

Answer»
9.

If A, B, C are any three matrices, then A’+ B’+ C’ is equal to(A) a null matrix(B) A+B+C(C) (A+B+C)’(D) -(A+B+C)

Answer»
10.

then, find the value of x(A) 2(B) 3(C) 4(D) 5

Answer»
11.

The range of integers that can be represented by n bit 2’s complement number system is:(A) -2n-1 to (2n-1 – 1)(B) -(2n-1 – 1)to (2n-1 – 1)(C) -2n-1 to (2n-1 )(D) -(2n-1 + 1)to (2n-1 – 1)

Answer»
12.

Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time?(A) Transaction log(B) Query language(C) Report writer(D) Data manipulation language

Answer»
13.

A one dimensional array A has indices 1….75. Each element is a string and takes up three memory words. The array is stored at location 1120 decimal. The starting address of A[49] is(A) 1267(B) 1164(C) 1264(D) 1169

Answer»
14.

Advanced Encryption Standard (AES) is based on(A) Asymmetric key algorithm(B) Symmetric key algorithm(C) Public key algorithm(D) Key exchange

Answer»
15.

SHA-1 is a(A) encryption algorithm(B) decryption algorithm(C) key exchange algorithm(D) message digest function

Answer»
16.

Let G be an arbitrary graph with n nodes and k components. If a vertex is removed from G, the number of components in the resultant graph must necessarily lie down between(A) k and n(B) k-1 and k+1(C) k-1 and n-1(D) k+1 and n-k

Answer»
17.

The value of x at which y is minimum for y = x2 − 3x + 1 is(A) -3/2(B) 3/2(C) 0(D) -5/4

Answer»
18.

x = a cos(t), y = b sin(t) is the parametric form of(A) Ellipse(B) Hyperbola(C) Circle(D) Parabola

Answer»