ISRO SAMPLE TEST PAPER JULY2011 AT DELHI 1.If sampling frequency doubles then a) Quantization noise decreases b) Quantization density decreases c) Quantization noise increases d) Quantization density increases 2. Two signals of 2GHz and 4GHz are frequency modulated on same carrier 10 GHz. Find the ratio of frequency deviation if band widths of both are equal. a) 1:2 b)2:1 c) 1:1 d) 1:4 3. Gray code of 111 is 4. 3X512+7X64+5X8+3 then value in binary form contains _______ number of 1’s. a) 7 b) 6 c) 9 d) none 5. The 2’s compliment of decimal number 19 in 8-bit system is a) 11101101 6) The high gain codes are a) Turbo codes b) BCH codes c) R-S codes 7) BCH codes are of the type________ a) Convolutional type b) c) 8) Time constant of LC circuit is a) L/R b) L/R2 c) RL 9) If R is doubled and C is halved then frequency of series RLC circuit is 10) The solution for the equation (D2+4) y=sin2x is 11) Laplace Tramsform of sin3x is 12) The Z-transform for the series is X [n] = { 7; n= -1 {5 n=0 { 1 n=1 {0 else 13) The magic Tee is a a) 4 port tee b) c) 14) The register which holds the address of the next instruction is a) Program counter b) c) 15) The antenna gain is given by...............? 16) The satellite is in 630km orbit and transmitting at a frequency 5 MHz, when satellite is on your head the Doppler shift is-------a) b) c) 0 d) 17) The impedance of a lossless transmission line is a) v(L/C) 18) A 50?line with load impedance 100? the VSWR is 19) In a waveguide measurement, the forward power is 10mW, the reverse power is 1mW then VSWR is _____________ 20) Transmitted power is 100W, gain of the transmitter antenna is 30 dB and the path loss is 50 dB then received power is 21) When transmitted power is 100mW and the path loss 100 dBm then received power is a) -80 dBm 22) When a em wave is incident normally on a perfect conductor then a) Totally reflected b) partially reflected c) Totally transmitted d) none. 23) Zsc =100? Zoc =1? then Zo is a) 1? b) 10? c)___d)__ 24) When the operating wavelength of line is ?/4<?<?/2, the impedance is a) Capacitive b) inductive c) ____ D) none 25) The value of L if source is 50V AC of 10 KHz frequency and current is 7.96 A. a) ____ 26) The resonant frequency is 50MHz bandwidth 100 KHz then Q factor is a) ______ b)_______ c)….. 27)The Q factor of a series RLC circuit is a)……b)…… 28) Q value of a parallel RLC circuit is ________ a)……b)…. 29) If the lines x+y+3=0, x-2y+7=0, 2x+ky+5=0 are required to be concurrent then the value of k is___ a) ___ b)….. 30) The vectors i-2j+k, 2i+3j-k,R are the complete, then r is given by ______ 31) If a satellite revolving with angular velocity w and the velocity is v then Curl v is _______ a) w b) 2w c) w 2 d) ….. 32) If each stage amplifier contains 10dB gain the figure of merit of 2-stages is Given by …… 33) The maximum rate possible in kbps if F=15 and bandwidth is 4 KHz is……. 34) The maximum time allowed for each flip flop for a ripple counter of mod-1024 , if clock given to it is 1MHz is …….. 35) The maximum time allowed time for each flip flop for a mod 10 synchronous counter if each flip flop delay is 25ns. a) 25 ns b) 50 ns c) 100 ns d) none 36) The high speed for CML gate is due to operating it in --------- region. a) non saturation 37)In a micro processor the wait states are inserted to a) make the processor to wait during DMA operation b) make the processor to wait during an interrupt processing c) make the processor wait during a power shutdown. d) interface the slow peripherals to the processor. 38) In a digital voltmeter the ADC’s used are of type 1. successive 2.flash type 3. Dual slope in ascending order of time is 1. a) 2,1,3 b) 1,2,3 c) 3,1,2 d) none 39) The number of NAND gates are required to implement A?B (XOR), assuming compliments not available …………. 40) The resolution for a DAC is given by 0.4% then no. of bits of DAC is a) 8- bits 41) The chip capacity is 256 bits, then the no. of chips required to build 1024 B memory Is………. 1. a) 32 b) 16 c) 15) 42) Which of the following are correct? 1. A flip-flop is used to store 1-bit of information 2. Race around condition occurs in JK flip flop when both the inputs are 1 3. Master slave flip flop is used to store 2 bits of information 4. A transparent latch consists of a D- flip flop a) 1, 2,3 b) 1,3,4 (ANS) c)1,2,4 d) 2,3,4 43) The bit rate of a QPSK compared to BPSK is a)half b) double c) same 44) There are 5 red balls and 5 black balls in a box. The probability to select 2 balls one after other without reputting is, a) 2/9 b) 1/90 c) 11/90 d) none 45) The rms voltage is obtained by multiplying peak by a factor a) 1/v2 46) H(s)=S/(S+a) is a transfer function of ______ a) LPF b) Notch c) BPF d) HPF 47) Resistance of a 2 parallel resistors is 12? and the effective resistance when one resistor broke is 18? then the value of resistance in another is_________ 48)The output of a phase modulator when input applied is integrating signal is a)FM b) AM c) PM d) none 49) For a transformer the losses which vary with load are a) core losses b) copper losses c) Hysterises losses d) none. 50) The waves which cannot be transmitted in waveguide are a) TE b) TEM c) TM d) none 51) Diplexer is a a) circulator only b)only transmitter filter c) only receiver filter d) both transmitter and receiver filter 52) d(t) represents impulse then ?( d(t) cos 2t )dt with limits 0 to infinity is a) 1, b) -1 c) infinity d ) 0 53) ?1/(xv(x2-a2)) dx is A)cosec2x ISRO Aptitude Paper April 2010 1) Special software to craete a job queue is called a) driver b) spooler c) interpreter d) linkage editer 2)When a process is rolled back as a result of deadlock the difficulty arises is a) Starvation b) System throughput c) low device utilization d) cycle stealing 3)On recieving an interrupt from an I/O device the CPU a) Halts for a predefined time. b) Branches off the interrupt service routine after completion off the current instruction. c) Branches off to the interrupt service routine immediately. d) hands over the control of address bus and data bus to the interrupting service. 4) Which of the following is true of the auto increment addressing mode? 1. It is useful in creating sef relocating code. 2)If it is induced in an instruction set architecture , than an additional ALU is required for effective address calculation. 3) The amount of increment depends on the size of the data item accessed. a) 1 only. b)2 only c) 3 only d) 2 and 3 only 5) Theprimary purpose of an operating system is a) To make the most efficient use of the computer hardware. b) to allow people to use the computer. c) To make the system programmers employed. d) to make computers easy to use. 6)consider the cpu intensive processes which require 10,20,30 time units and arrive at time 0,2,6 respectively.how many context switches are needed if the operating system impements a shortest remaining time first sceduling algorithm?Do not count the context switches at the time 0 and end. a) 1 b) 2 c) 3 d) 4 7) consider a system having n resources of the same type.These resources are shared by 3 processes A,B,C .These have peak demands of 3,4,6 respectively.For what value of n deadlock won't occour. a) 15 b) 9 c) 10 d) 13 8) In which addressing mode the effective address of the operand is computed by adding a constant value to the content of the register? a) absolute mode. b) indirect mode c) immediate mode d) index mode 9)the process of organizing the memory into two banks to allow 16 bit and 8 bit data operation is called a) bank switching b) indexed mapping c) two way memory interleaving d) memory segmentation 10)a one dimensional array A has indices 1-75.Each element is a string and takes up three memory words. The array is stored in location 1120 decimal. The starting address of A[49] is a) 1267 b) 1164 c) 1264 d) 1169 11) The microsystems stored in the control memory of a processor have a width of 26 bits. Each microinstruction is divided into three fields : a microoperation field of 13 bits, a next address field(X), and a MUX select field(Y). There are 8 status bits in the inputs of the MUX.How many bits are there in the X and Y fields and what is the size of the control memory in number of words? a) 10,3,1024 b) 8,5,256 c) 5,8,2048 d) 10,3,512 12)The use of multiple register windows with overlap causes a reduction in the number of memory accesses for 1.function locals and parameters 2. register saves and restores. 3. instruction fetches. a) 1 only b) 2 only c) 3 only d) 1,2,and 3 13)Which of the following about relative addressing mode is false? a) it enables reduced instruction size. b) it allows indexing of array element with same instruction. c) it enabkles easy relocation of data. d) it enables faster address calculation than absulute addressing. 14)Substitution of values for names (whose values are constants) is done in ' a) local optimization b) loop optimization c) constant folding d) strength reduction 15)A root a of eq f(x)=0 can be computed to any degree of accuracy if a good initial approximation x0 is chosen for which a) f(x0)>0 b) f(x0)f''(x0)>0 c) f(x0)f''(x0)<0 d) f''(x0)>0 16) consider the polynomial p(x)=a0+a1x+a2x*x+a3x*x*x. The mininum number of multipliations needed to evaluate p on an input x is a) 3 b) 4 c) 6 d) 9 17)Activities which ensure that the software that has been built , is tracable tocustomer is covered as part of a) verification b) validation c) maintainnace d) modeling 18) A testing method which is normally used as the acceptance test for a software system is a) regression testing b) integration testing c) unit testing d) system testing 19)A locked database file can be a) accessed by only one user b) modified by the users with the correct password. c) used to hide the sencitive information. d) updated by more than one user ISRO Technical Paper 1 SET 1: 1. The root directory of disk should be placed at___ 2. DNS is basically used to ____ 3. one more ques on DNS 4. abt TCP and UDP 5. TCP's which layer is there for the OSI's first three layers. 6. Multiprocessing models have--a)symmetric b)unsymmetric models c)none of the above d) both 7. BCDhave binary nos in a)bis b) bytes c)nibble 8. Top-down parser .... a) leftmost derivation b)rightmost derivation c)leftmost derivation in reverse d)rightmost derivation in reverse 9. Loop which avoids check at every iteration a) loop controlling b) loop jamming 10.one tree was given and some expressions were there and we have to find the correct postfix expression 11.abt logic gates 12.worst case of Shell sort 13.sine wave can be split into a)set of sine waves b)set of sine waves with phase zero 14.Full binary tree with n vertices has how many leaf nodes somethng like this... 15.Complete graph with n vertices and somethng 16.in a cyclic graph with n vertices how many minimum edges a)n b)n/2... SET 2: 1. The minimum number of edges in a connected cyclic graph on n vertices is a) n-1 b) n c) n+1 d)none of these 2. A full binary tree with n non leaf nodes contains a) n nodes b) log n nodes c)2n-1 nodes d)2n nodes 3. The time complexity of shell sort a) O(n) b) O(log n) c) O(n 1.2 ) d)O(n2) 4. The time taken to insert an element after an element pointed by some pointer a) O(1) b) O(log n) c) O(n) d) O(nlogn) 5. what is the name given to the first generation computer? a) Binary language b)Machine language c)Assembly language 6. The root directory of a disk should be placed a) at a fixed address in main memory b) at a fixed location on disk c) anywhere on disk. 7. A top down parser generates a) right most derivation b) left most derivation c) right most derivation in reverse d) left most derivation in reverse 8. what is the name of the OS that reads and reacts in terms of actual time? a)batch system b)time sharing c)real time 9. FDDI is a a)ring network b)star network c)mesh network 10.Computer memory consists of a)ROM b)PROM c)RAM d)all the above ISRO Technical Paper 2011 1) Moore model of DFF? 2) Which of the following filter has steep roll-off characteristics? (A) Butterworth filter (B) Chebyshev filter (C) Bessel filter (D)-ans: B 3)The architecture of DSP processor--------(A) Havard (B) Von neumann (C)...(D).. ans: A 4)If the input frequency to a 6 stage ripple counter is 1000MHz then output frequency at 6th stage_______ 5)Minimum number of 2 input NAND gates required to realise the fn. AB'+CD'+EF' ans: 6 6)What will exit() fn. in C will do? 7) go to command in C will cause the program to jump to---ans: Label 8)VSWR is given then asked to find out reflection coefficient 9)The relation between power in FM signal and modulation index-------10)If two signals are AM modulated with modulation indices of 0.3 and 0.4 what will be the modulation index of combined signal? ans: Calculate using 1/M=(1/m1)+(1/m2) 11)If n stage pipelining is used in a processor, then what will be the speed improvement over non pipelined processor? (A) same (B) n (C) n! (D) 2n 12) One circuit is given (That was a Voltage Doubler using op-amp) and asked to Identify that... 13) Which one of the following memory has fastest write time? (A) Flash (B) EEPROM (C) EPROM (D) None of these 14) In EEPROM data is stored in____ (A) Cross coupled Latch (B) Capacitor (C) floating gate transistor (D)-- 15) Which technology is faster? (A) Bipolar (B) MOS (C) CMOS (D) .. 16)Memory access time, cache access time , hit ratio are given, Asked to find out Average memory access time 17) If the probability of getting a job for A is 1/3 and the probability of getting a job for B is 1/4 then the probability of getting a job for A or B will be____? 18)One transfer fn As4 + Bs3 + Cs2 +D=0 (I don't remember the values of A,B,C,D ) is given, Asked to find out whether the system is____ (A) Stable (B) Unstable (C) Marginally Stable 19) For implementing D flip flop using RS flip flop, the extra component needed is____ (A) AND gate (B) OR gate (C) NOT gate (D) NOR gate 20)The output of an 8 bit DAC is 1Volt when the input is 00110010, then the full scale output of the same DAC will be____ ans: 5.1 V (Hint: 1/50*255) 21)Fastest ADC is___ (A) SAR (B) sigma- delta (C) flash (D)... 22)The operating point of Class-B amplifier will be at_____ (A) exactly at cut-off region (B) inside saturation region (C) inside cut-off region (D) middle of active region 23)For an N bit ADC , the number of comparators needed___ (A) N (B) 2N (C) 2N -1 (D) 2N-1 24)De-emphasis circuit is used for_______ ans: Attenuating high frequency components 25)The laplace transform of e-2t _____ Ans: 1/(s+2) 26)The magnitude of 1+cos x+j sin x____ Ans: 2 cos (x/2) 27) A circuit is given in which the capacitor (1uF) is initially charged to 12V , At t = 0, one switch is closed so that another capacitor of capacity 1.5uF comes in parallel with the first capacitor, then in steady state what will be the voltage across them? ( Visualize the circuit , as I can not draw the circuit since the editor is not supporting it) 28)Alpha of a transistor=0.99, Ico=1uA, Ie=1 mA, Ic=? 29)If the input given to an inductor is delta(t) (ie: =1 when t=0 and ,=0 otherwise) then the current will be___ (A) infinity (B) -infinity (C) 1 (D) 0 30) For implementing Band pass filter using High pass filter (Cutt off freq=Fh) and Low pass filter (cutt off freq= Fl)_____ (A)Fh=Fl (B) Fh>Fl (C) Fh<F1 (D).. Ans: Fh<Fl 31)In the Enhancement type MOSFET the gate to source voltage Vs drain current characteristics will be____ Ans: Drain current Increases as Vgs increases in active region 32)In a johnson counter, How many state have to be changed to increment the count from 0100 to 0111? 33)Odd parity generator is____ Ans: XNOR gate 34)A circuit using op-amp was given, the question was to calculate output offset voltage___ Ans: Vo(off)=Vin(off)*(1+Rf/R1) 35)Antialiasing filter is_____ (A) Digital filter (B) Analog filter (C) Can be Analog or digital (D) RC filter ISRO Technical Paper 2011 part -I 1 A full binary tree with n leaves contains? 2. The expression 1*2^3*4^5*6 will be evaluated as? 3 The feature in object oriented programming that follows he same operation to be carried out differently ,depending on the object, is? 4. icroistructions stored in the control mamory of a processor have a width of 26 bits. Each microinstructionsion. is divided into three fields: a microoperation field of 13 bits, a next address field(x), and a MUX select field(y).There are 8 status bits in the inputs of the MUX. How many bits are there in the X and Y fields, and what is the size of the control memory in number of words? 5. A cpu has 24-bit instructions. A program starts at address 300(in decimal).Which one of the following is a legal program counter (all values in decimal)? 6. Consider a disk pack with 16 surfaces,128 tracks per surface and 256 sectors per track.512 bytes of data are stores in a bit serial manner in a sector.The capacity of the disk and the number of bits required to specify a particular in the disk are respectively. 7. Consider a pipelined processor with the following four stages IF:Instruction Fetch ID:Instruction Decode and Operand Fetch EX:Execute WB:Write Back The IF,ID and WB stages take one clock cycle each to complete the operation.The ADD and SUB instructions need 1 clock cycle and the MUL instruction need 3 clock cycles in the EX stage.Operand forwarding is used in the pipelined processor.What is y the number of clock cycles taken to complete the following sequence of instructions? ADD R2,R1,R0 R2ßR1+R0 MUL R4,R3,R2 R4ßR3+R2 SUB R6,R5,R4 R6ßR5+R4 8. The use of multiple register windows with overlap causes a reduction in the number of memory accesses for 1.Function locals and parameters 2.Registers saves and restores 3.Instruction fetches 9. A processor that has carry, overflow and sign flag bits as part of its program status word(PSW) performs addition of the following two 2’s complement numbers 0100101 and 11101001.After the execution of this addition operation, the status of the carry, overflow and sign flags, respectively will be 10. The two numbers given below are multiplied using the Booth’s algorithm. Multiplicand:0101 1010 1110 1110 Multiplier:0111 0111 1011 1101 How many additions/Subtractions are required for the multiplication of the above two numbers? 11. The addition of 4-bit, two’s complement,binary numbers 1101 and 0100 results in 12. Which of the following statements about relative addressing mode is FALSE? 1.It enables reduced instruction size 2.It allows indexing of array element with same instruction 3.It enables easy relocation of data 4.It enables f asters address calculation than absolute addressing 13. Substitution of values for names(whose values are constants) is done? 14. A root alpha (symbol) of equation f(x) =0 can be computed to any degree of accuracy if a ‘good’ initial approximation x0 is chosen for which? 15. Which of the following statement is correct? Ans.delta(Uk Vk)=Uk+1 delta Vk+Vk+1 delta Uk 16. The shift operator E is defined as E[f(xi)]=f(xi+h) and E-1[f(xi)]=f(xi-h) Then delta(forward difference) in terms of E is ? 17. The formula (integration symbol) Sxnx0------------------Ans:Trapezoidal rule. 18. The cubic polynomial y(x) which takes the following values:y(0)=1,y(1)=0,y(2)=1 and y(3)=10 is x^3-2x^2+1. 19. x=a cos(t), y=b sin(t) is the parametric form of? 20. The value of x at which y is minimum for y=x^2-3x+1 is ans:3/2. 21. Some formula given from IT and Numerical Methods 22. If G is a graph with e edges and n vertices the sum of the degrees of all vertices in G is? 23. Let G be an arbitary graph with n nodes and k components.If a vertex is removed from G, the number of components in the resultant graph must necessarily lie between. 24. A graph in which all nodes are of equal degree, is known as 25. If in a graph G there is one and only one path between every pair of vertices then G is a 26. A simple graph (a graph without parallel edge or loops) with n vertices and k components can have at most. 27. Consider the polynomial p(x)=a0+a1x+a2x^2+a3x^3,where ai!=0,for all i. The minimum number of multiplications needed to evaluate p on an input x is 28. Consider the following code written in a pass-by-reference language like FORTRAN. Subroutine swap(ix,iy) it=ix L1:ix=iy L2:iy=it end ia=3 ib=8 call swap(ia,ib+5) print*,ia,ib end S1:The compiler will generate code to allocate a temporary nameless cell, initialize it to 13, and pass the address of the cell to swap S2:On execution the code will generate a runtime error on line L1 S3:On execution the code will generate a runtime error on line L2 S4:The program will print 13 and 8 S5:The program will print 13 and -2 Exactly the following set of statements is correct 29. A square matrix A is called orthogonal if A’A=? 30. If two adjacent rows of a determinant are interchanged, the value of the determinant? 31. If det((3,3)(x,5))=3 then the value of x is? 32. If A,B,C are any three matrices , then A’+B’+C’ is equal to? 33. problem to solve determinant of a 3x3 matrices? 34. Let f(x) be the continuous probability density function of a random variable x.The probability that a<x<=b, is? 35. If the mean of a normal frequency distribution of 1000 items is 25 and its standard deviation is 2.5, then its maximum ordinate is? 36. If the pdf of a poisson distribution is given by f(x)=(e^-2 *2^x)/x!, then its mean is? 37. Activities which ensure that the software that has been built, is traceable to ustomer requirement is covered as part of? 38. A testing method, which is normally used as the acceptance test for a software system, is? 39. The ‘Command’ used to change contents of one database using the contents of another database by linking them on a common key field is called? 40. A locked database file can be? 41. Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time? 42. Purpose of ‘Foreign Key’ in a table is to ensure? 43. Which of the following scenarios may lead to an irrecoverable error in a databse system? a.A transaction writes a data item after it is read by an uncommitted transaction. b.A transaction reads a data item after it is read by an uncommitted transaction. c .A transaction reads a data item after it is wriiten by a committed transaction. d.A transaction reads a data item after it is written by an un committed transaction. 44.Use of IPSEC in tunnel mode results in? 45.Special software to create a job queue is called a? 46.Process is? 47.When a process is rolled back as a result of dead lock the difficulty which arises is? 48.On receiving an interrupt from an I/O device, the CPU? 49.Compared to CISC processors,RISC processors contain? 50.Which of the following is/are true of the auto increment addressing mode? 1.It is useful in creating self relocating code 2.If it is included in an instruction set architecture, then an additional ALU is required for effective address calculation. 3.The amount of increment depends on the size of the data item accessed. 51.The subnet mask for a particular network is 255.255.31.0 Which of the following pairs of ip addresses could belong to this network? 1.172.57.88.62 and 172.56.87.23 2.10.35.28.2 and 10.35.29.4 3.191.203.31.87 and 191.234.31.88 4.128.8.129.43 and 128.8.161.55 52.In networking, UTP stands for? 53.The address resolution protocol(ARP) is used for? 54.Which of the following is a MAC address? 1.192.166.200.50 2.00056A:01A5CCA7FF60 3.568, Airport Road 4.01:A1:BB:A7:FF:60 55.what is the primary purpose of a VLAN? 56.SHA-1 is which algorithm? 57.Advanched Encryption Standard(AES) is based on which algorithm? 58.The primary purpose of an operating system is? 59.Find valid process transition in an operating system? a. Wake up: ready à running b. Dispatch: ready à running c. Block: ready à running d. Timer run out: à blocked 60.Match the following? A. Disk check 1.Round Robin B. Batch processing 2.Scan C. Time sharing 3.LIFO D.Stack operation 4. FIFO. 61.A page fault is? 62. Using larger block size in a fixed block size file system leads to? 63.Which of the following statement is not true? a. An ISR is invoked on completion of I/O in synchronous I/O but not in onasynchronous I/O b. In both synchronous and asynchronous I/O an ISR (Interrupt Service Routines)is invoked after completion of the I/O c.A process making a synchronous I/O call waits until I/O is complete,but a process making an asynchronous I/O call does not wait for completion of the I/O. d.In the case of synchronous I/O, the process waiting for the completion of I/O is woken up by the ISR that is invoked after the completion of I/O. 64.Consider three CPU-intensive processes,which require 10,20, and 30 time units and arrive at times 0,2, and 6, respectively. How many context switches are needed if the operating system implement a shortest remaining time first scheduling algorithm?Do not count the context switches at time zero and at the end. 65.The performance of Round Robin algorithm depends heavily on? 66.Consider a system having “n” resource of same type. These resources are shared by 3 processes A,B,C. These have peak demands of 3,4 and 6 respectively. For what value of ”n” deadlock won’t occur? 67.Consider a set of 5 processes whose arrival time, CPU time needed and the priority are given below Given some values………………………………….. (smaller the number, higher the priority) If the CPU scheduling policy is priority scheduling without pre-emption, the average waiting time will be? 68.The range of integers that can be represented by an n-bit 2’s complement number system is? 69.The switching expressions corresponding to f(A,B,C,D)=sigma(1,4,5,9,11,12) is? 70.Consider the following Boolean function of four variables f(w,x,y,z)=sigma(1,3,4,6,9,11,12,14), The function is? 71.In which addressing mode, the effectives address of the operand is generated by adding a constant value to the content of a register? a. Absolute mode b.Indirect mode c. Immediate mode d. Index mode 72.A certain microprocessor requires 4.5 microseconds to respond to an interrupt. Assuming that the three interrupts I1,I2 and I3 require the following execution time after the interrupt is recognized: i. I1 requires 25 micro seconds ii. I2 requires 35 micro seconds iii. I3 requires 20 microseconds I1 has the highest priority and I3 has the lowest. What is the possible range of time for I3 to be executed assuming that it may or may not occur simultaneously with other interrupts? 73. The process of organizing the memory into two banks to allow 8- and 16-bit data operation is called? 74. Suppose the numbers 7,5,1,8,3,6,0,9,4,2 are inserted in that order into an initially empty binary search tree. The binary search tree uses the usual ordering on natural numbers. What is the inorder traversal sequence of the resultant tree? 75. A data structure is required for storing a set of integers such that each of th following operations can be done in (log n) time, here n is the number of elements in the set. 1. Deletion of the smallest element. 2. Insertion of an element if it is not already present in the set. Which of the following data structures can be used for the prpose? a. A heap can be used but not a balanced binary search tree. b. A balanced binary search tree can be used but not a heap c. Both balanced binary search tree and heap can be used d. Neither balanced binary search tree nor heap can be used. 76. The following numbers are inserted into an empty binary search tree in the given order: 10,1,3,5,15,12,16.What is the height of the binary search tree(the height is the maximum distance of a leaf node from the root)? 77. Assume that the operators +,-,x are left associative and ^ is right associative. The order of precedence(from highest to lowest) is ^,x,+,-.The postfix expression corresponding to the infix expressions a+bxc-d^e^f is. 78. The infix expression A+(B-C)*D is correctly represented in prefix notation as? 79. A one dimensional array A has indices 1…75.Each element is a string and takes up three memory words. The array is stored at location 1120decimal. The starting address of A[49] is? 80. The five items:A,B,C,D and Eare pushed in a stack, one after the other starting from A.The stack is popped four times and each element is inserted in a queue.Then two elements are deleted from the queue and pushed back on the stack. Now one item is popped from the stack. The popped item is?
© Copyright 2024