Explore topic-wise InterviewSolutions in ISRO.

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your ISRO knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following comment about peep-hole optimization is true?(A) It is applied to small part of the code and applied repeatedly(B) It can be used to optimize intermediate code(C) It can be applied to a portion of the code that is not contiguous(D) It is applied in symbol table to optimize the memory requirements.

Answer»
2.

The time complexity of computing the transitive closure of binary relation on a set of n elements is known to be(A) O(n)(B) O(n log n)(C) O(n 3/2)(D) O(n 3)

Answer»
3.

In multi-programmed systems, it is advantageous if some programs such as editors and compilers can be shared by several users.Which of the following must be true of multi-programmed systems in order that a single copy of a program can be shared by several users?I. The program is a macroII. The program is recursiveIII. The program is reentrant(A) I only(B) II only(C) Ill only(D) I, II and III

Answer»
4.

In a file which contains 1 million records and the order of the tree is 100, then what is the maximum number of nodes to be accessed if B+ tree index is used?(A) 5(B) 4(C) 3(D) 10

Answer»
5.

Which of the following is application of Breath First Search on the graph?(A) Finding diameter of the graph(B) Finding bipartite graph(C) Both (a) and (b)(D) None of the above

Answer»
6.

A class of 30 students occupy a classroom containing 5 rows of seats, with 8 seats in each row. If the students seat themselves at random, the probability that the sixth seat in the fifth row will be empty is(A) 1/5(B) 1/3(C) 1/4(D) 2/5

Answer»
7.

( G, *) is an abelian group. Then(A) x = x -1, for any x belonging to G(B) x = x2, for any x belonging to G(C) (x * y )2 = x2 * y2, for any x, y belonging to G(D) G is of finite order

Answer»
8.

The domain of the function log( log sin(x) ) is(A) 0 < x < π(B) 2nπ < x < (2n + 1) π , for n in N(C) Empty set(D) None of the above

Answer»
9.

Consider the following C code segment:#include main(){ int i, j , x ; scanf("%d", &x); i = 1 ; j = 1; while ( i< 10 ) { j = j * i; i = i + 1; if (i == x) break ; } }For the program fragment above, which of the following statements about the variables i and j must be true after execution of this program? [!(exclamation) sign denotes factorial in the answer](A) ( j = (x - 1 )! ) ∧ (i >= x)(B) ( j = 9!) ∧ (i =10)(C) (( j = 10!) ∧ (i = 10 )) V (( j = (x - 1)!) ∧ (i = x ))(D) (( j = 9!) ∧ (i = 10)) V (( j = (x - 1)!) ∧ (i = x ))

Answer»
10.

The following paradigm can be used to find the solution of the problem in minimum time:Given a set of non-negative integer, and a value K, determine if there is a subset of the given set with sum equal to K:(A) Divide and Conquer(B) Dynamic Programming(C) Greedy Algorithm(D) Branch and Bound

Answer»
11.

Given two sorted list of size m and n respectively. The number of comparisons needed the worst case by the merge sort algorithm will be(A) m x n(B) maximum of m and n(C) minimum of m and n(D) m + n – 1

Answer»
12.

In unit testing of a module, it is found that for a set of test data, at the maximum 90% of the code alone were tested with the probability of success 0.9. The reliability of the module is(A) Greater than 0.9(B) Equal to 0.9(C) At most 0.81(D) At least 0.81

Answer»
13.

A computer uses ternary system instead of the traditional binary system. An n bit string in the binary system will occupy(A) 3 + n ternary digits(B) 2n / 3 ternary digits(C) n(log23) ternary digits(D) n(log32 ) ternary digits

Answer»
14.

Micro program is(A) the name of a source program in micro computers(B) set of micro instructions that defines the individual operations in response to a machine-language instruction(C) a primitive form of macros used in assembly language programming(D) a very small segment of machine code

Answer»
15.

Immunity of the external schemas (or application programs) to changes in the conceptual schema is referred to as:(A) Physical Data Independence(B) Logical Data Independence(C) Both (a) and (b)(D) None of the above

Answer»
16.

Choose the correct statement:(A) A = {an bn | n = 1, 2, 3, …. } is a regular language(B) The set B, consisting of all strings made up of only a’s and b’s having equal number of a’s and b’s defines a regular language(C) L(A * B) ∩ B gives the set A(D) None of the above

Answer»
17.

CFG (Context Free Grammar) is not closed under(A) Union(B) Complementation(C) Kleene star(D) Product

Answer»
18.

Consider the following table in a relational database Last Name Rank Room Shift Smith Manager 234 Morning Jones Custodian 33 Afternoon Smith Custodian 33 Evening Doe Clerical 222 MorningAccording to the data shown in the table, which of the following could be a candidate key of the table?(A) {Last Name}(B) {Room}(C) {Shift}(D) {Room, Shift}

Answer»
19.

A hash table with 10 buckets with one slot per bucket is depicted here. The symbols, S1 to 57 are initially entered using a hashing function with linear probing. The maximum number of comparisons needed in searching an item that is not present is(A) 4(B) 5(C) 6(D) 3

Answer»
20.

Cloaking is a search engine optimization (SEO) technique. During cloaking(A) Content presented to search engine spider is different from that presented to user’s browser(B) Content present to search engine spider and browser is same(C) Contents of user’s requested website are changed(D) None of the above

Answer»
21.

What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls?(A) You can control where traffic goes in the three networks(B) You can do stateful packet filtering(C) You can do load balancing(D) Improve network performance

Answer»
22.

Which one of the following algorithm is not used in asymmetric key cryptography?(A) RSA Algorithm(B) Diffie-Hellman Algorithm(C) Electronic Code Book Algorithm(D) None of the above

Answer»
23.

A doubly linked list is declared asstruct Node { int Value; struct Node *Fwd; struct Node *Bwd;);Where Fwd and Bwd represent forward and backward link to the adjacent elements of the list. Which of the following segments of code deletes the node pointed to by X from the doubly linked list, if it is assumed that X points to neither the first nor the last node of the list?(A) X->Bwd->Fwd = X->Fwd; X->Fwd->Bwd = X->Bwd ;(B) X->Bwd.Fwd = X->Fwd ; X.Fwd->Bwd = X->Bwd ;(C) X.Bwd->Fwd = X.Bwd ; X->Fwd.Bwd = X.Bwd ;(D) X->Bwd->Fwd = X->Bwd ; X->Fwd->Bwd = X->Fwd;

Answer»
24.

Consider a singly linked list of the form where F is a pointer to the first element in the linked list and L is the pointer to the last element in the list. The time of which of the following operations depends on the length of the list?(A) Delete the last element of the list(B) Delete the first element of the list(C) Add an element after the last element of the list(D) Interchange the first two elements of the list

Answer»
25.

In neural network, the network capacity is defined as(A) The traffic carry capacity of the network(B) The total number of nodes in the network(C) The number of patterns that can be stored and recalled in a network(D) None of the above

Answer»
26.

A particular BNF definition for a “word” is given by the following rules.Which of the following lexical entries can be derived from < word > ?I. pickII. picksIII. c44(A) I, II and III(B) I and II only(C) l and III only(D) lI and III only

Answer»
27.

Avalanche effect in cryptography(A) Is desirable property of cryptographic algorithm(B) Is undesirable property of cryptographic algorithm(C) Has no effect on encryption algorithm(D) None of the above

Answer»
28.

The difference between a named pipe and a regular file in Unix is that(A) Unlike a regular file, named pipe is a special file(B) The data in a pipe is transient, unlike the content of a regular file(C) Pipes forbid random accessing, while regular files do allow this.(D) All of the above

Answer»