• Courses
  • Tutorials
  • Jobs
  • Practice
  • Contests

ISRO CS 2020

Question 31

How many total bits are required for a direct-mapped cache with 128 KB of data and 1 word block size, assuming a 32-bit address and 1 word size of 4 bytes ?
  • 2 Mbits
  • 1.7 Mbits
  • 2.5 Mbits
  • 1.5 Mbits

Question 32

Properties of ‘DELETE’ and ‘TRUNCATE’ commands indicate that
  • After the execution of ‘TRUNCATE’ operation, COMMIT and ROLLBACK statements cannot be performed to retrieve the lost data, while ‘DELETE’ allow it.
  • After the execution of ‘DELETE’ and ‘TRUNCATE’ operation retrieval is easily possible for the lost data.
  • After the execution of ‘DELETE’ operation, COMMIT and ROLLBACK statements can be performed to retrieve the lost data, while TRUNCATE do not allow it.
  • After the execution of ‘DELETE’ and ‘TRUNCATE’ operation no retrieval is possible for the lost data.

Question 33

Remote Procedure Calls are used for
  • communication between two processes remotely different from each other on the same system.
  • communication between two processes on the same system.
  • communication between two processes on separate system.
  • None of the above.

Question 34

Consider the following recursive C function that takes two arguments
unsigned int rer (unsigned int n, unsigned int r) {
  if (n > 0) return (n% r + rer(n/r, r));
  else return 0;
 } 
What is the return value of the function rer when it is called as rer (513, 2) ?
  • 9
  • 8
  • 5
  • 2

Question 35

A given grammar is called ambiguous if
  • two or more productions have the same non-terminal on the left hand side
  • a derivation tree has more than one associated sentence
  • there is a sentence with more than one derivation tree corresponding to it
  • brackets are not present in the grammar

Question 36

What is the output of the code given below?
C
#include <stdio.h>
int main( )
 {
   char name[ ]=satellites;
   int len;
   int size;
   len = strlen(name);
   size = sizeof(name);
   printf(%d, len * size);
   return 0;
 }
  • 100
  • 110
  • 40
  • 44

Question 37

Checksum field in TCP header is
  • ones complement of sum of header and data in bytes
  • ones complement of sum of header, data and pseudo header in 16 bit words
  • dropped from IPv6 header format
  • better than md5 or sh1 methods

Question 38

If x + 2y = 30, then (2y/5 + x/3) + (x/5 + 2y/3) will be equal to
  • 8
  • 16
  • 18
  • 20

Question 39

For the distributions given below : Which of the following is correct for the above distributions ?
  • Standard deviation of A is significantly lower than standard deviation of B
  • Standard deviation of A is slightly lower than standard deviation of B
  • Standard deviation of A is same as standard deviation of B
  • Standard deviation of A is significantly higher than standard deviation of B

Question 40

The hardware implementation which provides mutual exclusion is
  • Semaphores
  • Test and set instruction
  • Both options
  • None of the options

There are 80 questions to complete.

Last Updated :
Take a part in the ongoing discussion