Explore topic-wise InterviewSolutions in ISRO.

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your ISRO knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following strategy is employed for overcoming the priority inversion problem?(A) Temporarily raise the priority of lower priority level process(B) Have a fixed priority level scheme(C) Implement kernel pre-emption scheme(D) Allow lower priority process to complete its job

Answer»
2.

The state of a process after it encounters an I/O instruction is(A) ready(B) blocked(C) idle(D) running

Answer»
3.

How many check bits are required for 16 bit data word to detect 2 bit errors and single bit correction using hamming code?(A) 5(B) 6(C) 7(D) 8

Answer»
4.

Two eight bit bytes 1100 0011 and 0100 1100 are added. What are the values of the overflow, carry and zero flags respectively, if the arithmetic unit of the CPU uses 2’s complement form?(A) 0, 1, 1(B) 1, 1, 0(C) 1, 0, 1(D) 0, 1, 0

Answer» None
5.

Opportunistic reasoning is addressed by which of the following knowledge representation(A) Script(B) Blackboard(C) Production Rules(D) Fuzzy Logic

Answer»
6.

The number 1102 in base 3 is equivalent to 123 in which base system?(A) 4(B) 5(C) 6(D) 8

Answer»
7.

Consider the following psuedocode: x : integer := 1 y : integer := 2 procedure add x := x + y procedure second (P: procedure) x : integer := 2 P() procedure first y : integer := 3 second(add) first() write_integer (x)What does it print if the language uses dynamic scoping with deepbinding?(A) 2(B) 3(C) 4(D) 5

Answer»
8.

Which logic gate is used to detect overflow in 2’s complement arithmetic?(A) OR gate(B) AND gate(C) NAND gate(D) XOR gate

Answer»
9.

Any set of boolean operators that is sufficient to represent all boolean expressions is said to be complete. Which of the following is not complete?(A) {NOT, OR}(B) {NOR}(C) {AND, OR}(D) {AND, NOT}

Answer»
10.

Which of the following is the highest isolation level in transaction management?(A) Serializable(B) Repeated Read(C) Committed Read(D) Uncommitted Read

Answer»
11.

If the frame buffer has 8 bits per pixel and 8 bits are allocated for each of the R, G, B components, what would be the size of the lookup table?(A) 24 bytes(B) 1024 bytes(C) 768 bytes(D) 256 bytes

Answer»
12.

What will be the cipher text produced by the following cipher function for the plain text ISRO with key k =7. [Consider ‘A’ = 0, ‘B’ = 1, …….’Z’ = 25]. Ck(M) = (kM + 13) mod 26(A) RJCH(B) QIBG(C) GQPM(D) XPIN

Answer» None
13.

Let A(1:8, -5:5, -10:5) be a three dimensional array. How many elements are there in the array A?(A) 1200(B) 1408(C) 33(D) 1050

Answer»
14.

In an array of 2N elements that is both 2-ordered and 3-ordered, what is the maximum number of positions that an element can be from its position if the array were 1-ordered?(A) 1(B) 2(C) N/2(D) 2N-1

Answer»
15.

Consider a logical address space of 8 pages of 1024 words each, mapped onto a physical memory of 32 frames. How many bits are there in the physical address and logical address respectively?(A) 5, 3(B) 10, 10(C) 15, 13(D) 15, 15

Answer»
16.

Which of the following productions eliminate left recursion in theproductions given below:S → Aa | bA → Ac | Sd | ε(A) S → Aa | bA → bdA’A’ → A’c | A’ba | A | ε(B) S → Aa | bA → A’ | bdA’,A’ → cA’ | adA’ | ε(C) S → Aa | bA → A’c | A’dA’ → bdA’ | cA | ε(D) S → Aa | bA → cA’ | adA’ | bdA’A’ → A | ε

Answer» None
17.

Shift reduce parsing belongs to a class of(A) bottom up parsing(B) top down parsing(C) recursive parsing(D) predictive parsing

Answer»
18.

The protocol data unit for the transport layer in the internet stack is(A) segment(B) message(C) datagram(D) frame

Answer»
19.

If a program P calls two subprograms P1 and P2 and P1 can fail 50% of the time and P2 can fail 40% of the time, what is the failure rate of program P(A) 50%(B) 60%(C) 70%(D) 10%

Answer»
20.

Which of the following testing methods uses fault simulation technique?(A) unit testing(B) beta testing(C) stress testing(D) mutation testing

Answer»
21.

What is the cyclomatic complexity of a module which has seventeen edges and thirteen nodes?(A) 4(B) 5(C) 6(D) 7

Answer»
22.

Which of the following types of coupling has the weakest coupling?(A) Pathological coupling(B) Control coupling(C) Data coupling(D) Message coupling

Answer» None
23.

Embedded pointer provides(A) a secondary access path(B) a physical record key(C) an inverted index(D) a prime key

Answer»
24.

The physical location of a record determined by a formula that transforms a file key into a record location is(A) Hashed file(B) B-Tree file(C) Indexed file(D) Sequential file

Answer»