

InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your ISRO knowledge and support exam preparation. Choose a topic below to get started.
1. |
The microinstructions stored in the control memory of a processor have a width of 26 bits. Each microinstruction is divided into three fields. a micro operation field of 13 bits, a next address field (X), and a MUX select field (Y). There are 8 status bits in the inputs of the MUX. How many bits are there in the X and Y fields, and what is the size of the control memory in number of words(A) 10, 3, 1024(B) 8, 5, 256(C) 5, 8, 2048(D) 10, 3, 512 |
Answer» | |
2. |
(A) 779(B) 679(C) 0(D) 256 |
Answer» | |
3. |
If the mean of a normal frequency distribution of 1000 items is 25 and its standard deviation is 2.5, then its maximum ordinate is(A) (1000/√2π).e-25(B) 1000/√2π(C) (1000/√2π ).e-2.5(D) 400/√2π |
Answer» | |
4. |
A full binary tree with n leaves contains:(A) n nodes(B) log2 n nodes(C) 2n-1(D) 2n |
Answer» | |
5. |
The cubic polynomial y(x) which takes the following values:y(0) = 1, y(1) = 0, y(2) = 1 y(3) = 10 is(A) (B) (C) (D) |
Answer» None | |
6. |
Which is the correct definition of a valid process transition in an operating system?(A) Wake up: ready → running(B) Dispatch: ready → running(C) Block: ready → running(D) Timer runout: ready → running |
Answer» | |
7. |
The performance of Round Robin algorithm depends heavily on(A) size of the process(B) the I/O bursts of the process(C) the CPU bursts of the process(D) the size of the time quantum |
Answer» | |
8. |
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?(A) 172.57.88.62 and 172.56.87.23(B) 10.35.28.2 and 10.35.29.4(C) 191.203.31.87 and 191.234.31.88(D) 128.8.129.43 and 128.8.161.55 |
Answer» | |
9. |
If A, B, C are any three matrices, then A’+ B’+ C’ is equal to(A) a null matrix(B) A+B+C(C) (A+B+C)’(D) -(A+B+C) |
Answer» | |
10. |
then, find the value of x(A) 2(B) 3(C) 4(D) 5 |
Answer» | |
11. |
The range of integers that can be represented by n bit 2’s complement number system is:(A) -2n-1 to (2n-1 – 1)(B) -(2n-1 – 1)to (2n-1 – 1)(C) -2n-1 to (2n-1 )(D) -(2n-1 + 1)to (2n-1 – 1) |
Answer» | |
12. |
Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time?(A) Transaction log(B) Query language(C) Report writer(D) Data manipulation language |
Answer» | |
13. |
A one dimensional array A has indices 1….75. Each element is a string and takes up three memory words. The array is stored at location 1120 decimal. The starting address of A[49] is(A) 1267(B) 1164(C) 1264(D) 1169 |
Answer» | |
14. |
Advanced Encryption Standard (AES) is based on(A) Asymmetric key algorithm(B) Symmetric key algorithm(C) Public key algorithm(D) Key exchange |
Answer» | |
15. |
SHA-1 is a(A) encryption algorithm(B) decryption algorithm(C) key exchange algorithm(D) message digest function |
Answer» | |
16. |
Let G be an arbitrary graph with n nodes and k components. If a vertex is removed from G, the number of components in the resultant graph must necessarily lie down between(A) k and n(B) k-1 and k+1(C) k-1 and n-1(D) k+1 and n-k |
Answer» | |
17. |
The value of x at which y is minimum for y = x2 − 3x + 1 is(A) -3/2(B) 3/2(C) 0(D) -5/4 |
Answer» | |
18. |
x = a cos(t), y = b sin(t) is the parametric form of(A) Ellipse(B) Hyperbola(C) Circle(D) Parabola |
Answer» | |