

InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your ISRO knowledge and support exam preparation. Choose a topic below to get started.
1. |
A supernet has a first address of 205.16.32.0 and a supernet mask of 255.255.248.0. A router receives 4 packets with the following destination addresses. Which packet belongs to this supernet?(A) 205.16.42.56(B) 205.17.32.76(C) 205.16.31.10(D) 205.16.39.44 |
Answer» None | |
2. |
What is the output of the following C program?#include<stdio.h>#define SQR(x) (x*x)int main(){int a;int b=4;a=SQR(b+2);printf("%d\n",a);return 0;}(A) 14(B) 36(C) 18(D) 20 |
Answer» | |
3. |
Which of the following is NOT represented in a subroutine’s activation record frame for a stack-based programming language?(A) Values of local variables(B) Return address(C) Heap area(D) Information needed to access non local variables |
Answer» | |
4. |
The test suite (set of test input) used to perform unit testing on module could cover 70% of the code. What is the reliability of the module if the probability of success is 0.95 during testing?(A) 0.665 to 0.95(B) At the most 0.665(C) At the most 0.95(D) At least 0.665 |
Answer» | |
5. |
The number of logical CPUs in a computer having two physical quad-core chips with hyper threading enabled is(A) 1(B) 2(C) 8(D) 16 |
Answer» | |
6. |
What does a pixel mask mean?(A) string containing only 1’s(B) string containing only 0’s(C) string containing two 0’s(D) string containing 1’s and 0’s |
Answer» | |
7. |
Let be the radius of the circle. What is the angle subtended by an arc of length at the center of the circle?(A) 1 degree(B) 1 radian(C) 90 degrees(D) π radians |
Answer» | |
8. |
In the standard IEEE 754 single precision floating point representation, there is 1 bit for sign, 23 bits for fraction and 8 bits for exponent. What is the precision in terms of the number of decimal digits?(A) 5(B) 6(C) 7(D) 8 |
Answer» | |
9. |
What is the number of steps required to derive the string ((() ()) ())S → SSS → (S)S → ε(A) 10(B) 15(C) 12(D) 16 |
Answer» None | |
10. |
The process of modifying IP address information in IP packet headers while in transit across a traffic routing device is called(A) Port address translation (PAT)(B) Network address translation (NAT)(C) Address mapping(D) Port mapping |
Answer» | |
11. |
Consider the following pseudo codewhile (m < n) if (x > y ) and (a < b) then a=a+1 y=y-1 end if m=m+1 end while What is cyclomatic complexity of the above pseudo code?(A) 2(B) 3(C) 4(D) 5 |
Answer» None | |
12. |
What is the median of data if its mode is 15 and the mean is 30?(A) 30(B) 25(C) 22.5(D) 27.5 |
Answer» None | |
13. |
How many different BCD numbers can be stored in 12 switches? (Assume two position or on-off switches)(A) 212(B) 212-1(C) 1012(D) 103 |
Answer» | |
14. |
If each address space represents one byte of storage space, how many address lines are needed to access RAM chips arranged in a 4 x 6 array, where each chip is 8K x 4 bits ?(A) 13(B) 15(C) 16(D) 17 |
Answer» | |
15. |
Which of the following is not a maturity level as per Capability Maturity Model?(A) Initial(B) Measurable(C) Repeatable(D) Optimized |
Answer» | |
16. |
Consider the following segment table in segmentation scheme:SegmentID Base Limit 0 200 200 1 500 12510 2 1527 498 3 2500 50What happens if the logical address requested is -Segment Id 2 and offset 1000?(A) Fetches the entry at the physical address 2527 for segment Id2(B) A trap is generated(C) Deadlock(D) Fetches the entry at offset 27 in Segment Id 3 |
Answer» | |
17. |
The number of bit strings of length 8 that will either start with 1 or end with 00 is?(A) 32(B) 128(C) 160(D) 192 |
Answer» | |
18. |
A computing architecture, which allows the user to use computers from multiple administrative domains to reach a common goal is called as(A) Grid Computing(B) Neutral Networks(C) Parallel Processing(D) Cluster Computing |
Answer» | |
19. |
Dirty bit is used to indicate which of the following?(A) A page fault has occurred(B) A page has corrupted data(C) A page has been modified after being loaded into cache(D) An illegal access of page |
Answer» | |
20. |
Let x, y, z, a, b, c be the attributes of an entity set E. If {x}, {x,y}, {a,b}, {a,b,c}, {x,y,z} are superkeys then which of the following are the candidate keys?(A) {x,y} and {a,b}(B) {x} and {a,b}(C) {x,y,z} and {a,b,c}(D) {z} and {c} |
Answer» | |
21. |
Consider the following table< img src = "https://media.geeksforgeeks.org/wp-content/cdn-uploads/ISRO64.png ">The table is in which normal form?(A) First Normal Form(B) Second Normal Form(C) Third Normal Form but not BCNF(D) Third Normal Form but not BCNF |
Answer» | |
22. |
What is the size of the physical address space in a paging system which has a page table containing 64 entries of 11 bit each (including valid and invalid bit) and a page size of 512 bytes?(A) 211(B) 215(C) 219(D) 220 |
Answer» | |
23. |
Consider the following Deterministic Finite Automaton.Let denote the set of eight bit strings whose second, third, sixth and seventh bits are 1. The number of strings in that are accepted by M is(A) 0(B) 1(C) 2(D) 3 |
Answer» | |
24. |
Consider a 13 element hash table for which f(key)=key mod 13 is used with integer keys. Assuming linear probing is used for collision resolution, at which location would the key 103 be inserted, if the keys 661, 182, 24 and 103 are inserted in that order?(A) 0(B) 1(C) 11(D) 12 |
Answer» | |
25. |
Which of the following is not an optimization criterion in the design of a CPU scheduling algorithm?(A) Minimum CPU utilization(B) Maximum throughput(C) Minimum turnaround time(D) Minimum waiting time |
Answer» | |
26. |
Which of the following is FALSE with respect to possible outcomes of executing a Turing Machine over a given input?(A) it may halt and accept the input(B) it may halt by changing the input(C) it may halt and reject the input(D) it may never halt |
Answer» | |
27. |
Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used?(A) UDP, 80(B) TCP, 80(C) TCP, 25(D) UDP, 25 |
Answer» | |
28. |
How many lines of output does the following C code produce?#include<stdio.h>float i=2.0;float j=1.0;float sum = 0.0;main(){while (i/j > 0.001){j+=j;sum=sum+(i/j);printf("%f\n", sum);}}(A) 8(B) 9(C) 10(D) 11 |
Answer» None | |