ISRO SAMPLE TEST PAPER JULY2011 AT DELHI

ISRO SAMPLE TEST PAPER JULY2011 AT DELHI
1.If sampling frequency doubles then
a) Quantization noise decreases
b) Quantization density decreases
c) Quantization noise increases
d) Quantization density increases
2. Two signals of 2GHz and 4GHz are frequency modulated on same carrier 10 GHz.
Find the ratio of
frequency deviation if band widths of both are equal.
a) 1:2 b)2:1 c) 1:1 d) 1:4
3. Gray code of 111 is
4. 3X512+7X64+5X8+3 then value in binary form contains _______ number of 1’s.
a) 7 b) 6 c) 9 d) none
5. The 2’s compliment of decimal number 19 in 8-bit system is
a) 11101101
6) The high gain codes are
a) Turbo codes b) BCH codes c) R-S codes
7) BCH codes are of the type________
a) Convolutional type b) c)
8) Time constant of LC circuit is
a) L/R b) L/R2 c) RL
9) If R is doubled and C is halved then frequency of series RLC circuit is
10) The solution for the equation (D2+4) y=sin2x is
11) Laplace Tramsform of sin3x is
12) The Z-transform for the series is
X [n] = { 7; n= -1
{5 n=0
{ 1 n=1
{0 else
13) The magic Tee is a
a) 4 port tee b) c)
14) The register which holds the address of the next instruction is
a) Program counter b) c)
15) The antenna gain is given by...............?
16) The satellite is in 630km orbit and transmitting at a frequency 5 MHz, when
satellite is on your
head the Doppler shift is-------a) b) c) 0 d)
17) The impedance of a lossless transmission line is
a) v(L/C)
18) A 50?line with load impedance 100? the VSWR is
19) In a waveguide measurement, the forward power is 10mW, the reverse power
is 1mW then VSWR
is _____________
20) Transmitted power is 100W, gain of the transmitter antenna is 30 dB and the
path loss is 50 dB
then received power is
21) When transmitted power is 100mW and the path loss 100 dBm then received
power is
a) -80 dBm
22) When a em wave is incident normally on a perfect conductor then
a) Totally reflected
b) partially reflected
c) Totally transmitted
d) none.
23) Zsc =100? Zoc =1? then Zo is
a) 1? b) 10? c)___d)__
24) When the operating wavelength of line is ?/4<?<?/2, the impedance is
a) Capacitive b) inductive c) ____ D) none
25) The value of L if source is 50V AC of 10 KHz frequency and current is 7.96 A.
a) ____
26) The resonant frequency is 50MHz bandwidth 100 KHz then Q factor is
a) ______ b)_______ c)…..
27)The Q factor of a series RLC circuit is
a)……b)……
28) Q value of a parallel RLC circuit is ________
a)……b)….
29) If the lines x+y+3=0, x-2y+7=0, 2x+ky+5=0 are required to be concurrent
then the value of k is___
a) ___ b)…..
30) The vectors i-2j+k, 2i+3j-k,R are the complete, then r is given by ______
31) If a satellite revolving with angular velocity w and the velocity is v then
Curl v is _______
a) w b) 2w c) w 2 d) …..
32) If each stage amplifier contains 10dB gain the figure of merit of 2-stages is
Given by ……
33) The maximum rate possible in kbps if F=15 and bandwidth is 4 KHz is…….
34) The maximum time allowed for each flip flop for a ripple counter of mod-1024 ,
if clock given to it
is 1MHz is ……..
35) The maximum time allowed time for each flip flop for a mod 10 synchronous
counter if each flip
flop delay is 25ns.
a) 25 ns b) 50 ns c) 100 ns d) none
36) The high speed for CML gate is due to operating it in --------- region.
a) non saturation
37)In a micro processor the wait states are inserted to
a) make the processor to wait during DMA operation
b) make the processor to wait during an interrupt processing
c) make the processor wait during a power shutdown.
d) interface the slow peripherals to the processor.
38) In a digital voltmeter the ADC’s used are of type
1. successive 2.flash type 3. Dual slope
in ascending order of time is
1. a) 2,1,3 b) 1,2,3 c) 3,1,2 d) none
39) The number of NAND gates are required to implement A?B (XOR), assuming
compliments
not available ………….
40) The resolution for a DAC is given by 0.4% then no. of bits of DAC is
a) 8- bits
41) The chip capacity is 256 bits, then the no.
of chips required to build 1024 B memory
Is……….
1. a) 32 b) 16 c) 15)
42) Which of the following are correct?
1. A flip-flop is used to store 1-bit of information
2. Race around condition occurs in JK flip flop when both the inputs are 1
3. Master slave flip flop is used to store 2 bits of information
4. A transparent latch consists of a D- flip flop
a) 1, 2,3 b) 1,3,4 (ANS) c)1,2,4 d) 2,3,4
43) The bit rate of a QPSK compared to BPSK is
a)half b) double c) same
44) There are 5 red balls and 5 black balls in a box. The probability to select 2 balls
one after other
without reputting is,
a) 2/9 b) 1/90 c) 11/90 d) none
45) The rms voltage is obtained by multiplying peak by a factor
a) 1/v2
46) H(s)=S/(S+a) is a transfer function of ______
a) LPF b) Notch c) BPF d) HPF
47) Resistance of a 2 parallel resistors is 12? and the effective resistance when one
resistor broke is
18? then the value of resistance in another is_________
48)The output of a phase modulator when input applied is integrating signal is
a)FM b) AM c) PM d) none
49) For a transformer the losses which vary with load are
a) core losses b) copper losses c) Hysterises losses d) none.
50) The waves which cannot be transmitted in waveguide are
a) TE b) TEM c) TM d) none
51) Diplexer is a
a) circulator only
b)only transmitter filter
c) only receiver filter
d) both transmitter and receiver filter
52) d(t) represents impulse then ?( d(t) cos 2t )dt with limits 0 to infinity is
a) 1, b) -1 c) infinity d ) 0
53) ?1/(xv(x2-a2)) dx is
A)cosec2x
ISRO Aptitude Paper April 2010
1) Special software to craete a job queue is called
a) driver
b) spooler
c) interpreter
d) linkage editer
2)When a process is rolled back as a result of deadlock the difficulty arises is
a) Starvation
b) System throughput
c) low device utilization
d) cycle stealing
3)On recieving an interrupt from an I/O device the CPU
a) Halts for a predefined time.
b) Branches off the interrupt service routine after completion off the current
instruction.
c) Branches off to the interrupt service routine immediately.
d) hands over the control of address bus and data bus to the interrupting service.
4) Which of the following is true of the auto increment addressing mode?
1. It is useful in creating sef relocating code.
2)If it is induced in an instruction set architecture , than an additional ALU is
required for effective
address calculation.
3) The amount of increment depends on the size of the data item accessed.
a) 1 only.
b)2 only
c) 3 only
d) 2 and 3 only
5) Theprimary purpose of an operating system is
a) To make the most efficient use of the computer hardware.
b) to allow people to use the computer.
c) To make the system programmers employed.
d) to make computers easy to use.
6)consider the cpu intensive processes which require 10,20,30 time units and arrive
at time 0,2,6
respectively.how many context switches are needed if the operating system
impements a shortest
remaining time first sceduling algorithm?Do not count the context switches at the
time 0 and end.
a) 1
b) 2
c) 3
d) 4
7) consider a system having n resources of the same type.These resources are
shared by 3 processes
A,B,C .These have peak demands of 3,4,6 respectively.For what value of n deadlock
won't occour.
a) 15
b) 9
c) 10
d) 13
8) In which addressing mode the effective address of the operand is computed by
adding a constant
value to the content of the register?
a) absolute mode.
b) indirect mode
c) immediate mode
d) index mode
9)the process of organizing the memory into two banks to allow 16 bit and 8 bit
data operation is called
a) bank switching
b) indexed mapping
c) two way memory interleaving
d) memory segmentation
10)a one dimensional array A has indices 1-75.Each element is a string and takes
up three memory
words. The array is stored in location 1120 decimal. The starting address of A[49]
is
a) 1267
b) 1164
c) 1264
d) 1169
11) The microsystems stored in the control memory of a processor have a width of
26 bits. Each
microinstruction is divided into three fields : a microoperation field of 13 bits, a
next address field(X),
and a MUX select field(Y). There are 8 status bits in the inputs of the MUX.How
many bits are there in
the X and Y fields and what is the size of the control memory in number of words?
a) 10,3,1024
b) 8,5,256
c) 5,8,2048
d) 10,3,512
12)The use of multiple register windows with overlap causes a reduction in
the number of memory
accesses for
1.function locals and parameters
2. register saves and restores.
3. instruction fetches.
a) 1 only
b) 2 only
c) 3 only
d) 1,2,and 3
13)Which of the following about relative addressing mode is false?
a) it enables reduced instruction size.
b) it allows indexing of array element with same instruction.
c) it enabkles easy relocation of data.
d) it enables faster address calculation than absulute addressing.
14)Substitution of values for names (whose values are constants) is done in '
a) local optimization
b) loop optimization
c) constant folding
d) strength reduction
15)A root a of eq f(x)=0 can be computed to any degree of accuracy if a good initial
approximation x0
is chosen for which
a) f(x0)>0
b) f(x0)f''(x0)>0
c) f(x0)f''(x0)<0
d) f''(x0)>0
16) consider the polynomial p(x)=a0+a1x+a2x*x+a3x*x*x. The
mininum number of multipliations
needed to evaluate p on an input x is
a) 3
b) 4
c) 6
d) 9
17)Activities which ensure that the software that has been built , is tracable
tocustomer is covered as
part of
a) verification
b) validation
c) maintainnace
d) modeling
18) A testing method which is normally used as the acceptance test for a software
system is
a) regression testing
b) integration testing
c) unit testing
d) system testing
19)A locked database file can be
a) accessed by only one user
b) modified by the users with the correct password.
c) used to hide the sencitive information.
d) updated by more than one user
ISRO Technical Paper 1
SET 1:
1. The root directory of disk should be placed at___
2. DNS is basically used to ____
3. one more ques on DNS
4. abt TCP and UDP
5. TCP's which layer is there for the OSI's first three layers.
6. Multiprocessing models have--a)symmetric
b)unsymmetric models
c)none of the above
d) both
7. BCDhave binary nos in
a)bis
b) bytes
c)nibble
8. Top-down parser ....
a) leftmost derivation
b)rightmost derivation
c)leftmost derivation in reverse
d)rightmost derivation in reverse
9. Loop which avoids check at every iteration
a) loop controlling
b) loop jamming
10.one tree was given and some expressions were there and we have to find the
correct postfix
expression
11.abt logic gates
12.worst case of Shell sort
13.sine wave can be split into
a)set of sine waves
b)set of sine waves with phase zero
14.Full binary tree with n vertices has how many leaf nodes somethng like this...
15.Complete graph with n vertices and somethng
16.in a cyclic graph with n vertices how many minimum edges
a)n
b)n/2...
SET 2:
1. The minimum number of edges in a connected cyclic graph on n vertices is
a) n-1 b) n c) n+1 d)none of these
2. A full binary tree with n non leaf nodes contains
a) n nodes b) log n nodes c)2n-1 nodes d)2n nodes
3. The time complexity of shell sort
a) O(n) b) O(log n) c) O(n 1.2 ) d)O(n2)
4. The time taken to insert an element after an element pointed by some pointer
a) O(1) b) O(log n) c) O(n) d) O(nlogn)
5. what is the name given to the first generation computer?
a) Binary language b)Machine language c)Assembly language
6. The root directory of a disk should be placed
a) at a fixed address in main memory
b) at a fixed location on disk
c) anywhere on disk.
7. A top down parser generates
a) right most derivation
b) left most derivation
c) right most derivation in reverse
d) left most derivation in reverse
8. what is the name of the OS that reads and reacts in terms of actual time?
a)batch system
b)time sharing
c)real time
9. FDDI is a
a)ring network
b)star network
c)mesh network
10.Computer memory consists of
a)ROM
b)PROM
c)RAM
d)all the above
ISRO Technical Paper 2011
1) Moore model of DFF?
2) Which of the following filter has steep roll-off characteristics?
(A) Butterworth filter (B) Chebyshev filter (C) Bessel filter (D)-ans: B
3)The architecture of DSP processor--------(A) Havard (B) Von neumann (C)...(D)..
ans: A
4)If the input frequency to a 6 stage ripple counter is 1000MHz then
output frequency at 6th
stage_______
5)Minimum number of 2 input NAND gates required to realise the fn. AB'+CD'+EF'
ans: 6
6)What will exit() fn. in C will do?
7) go to command in C will cause the program to jump to---ans: Label
8)VSWR is given then asked to find out reflection coefficient
9)The relation between power in FM signal and modulation index-------10)If two signals are AM modulated with modulation indices of 0.3 and 0.4 what will
be the
modulation index of combined signal?
ans: Calculate using 1/M=(1/m1)+(1/m2)
11)If n stage pipelining is used in a processor, then what will be the
speed improvement over non
pipelined processor?
(A) same (B) n (C) n! (D) 2n
12) One circuit is given (That was a Voltage Doubler using op-amp) and asked to
Identify that...
13) Which one of the following memory has fastest write time?
(A) Flash (B) EEPROM (C) EPROM (D) None of these
14) In EEPROM data is stored in____
(A) Cross coupled Latch (B) Capacitor (C) floating gate transistor (D)--
15) Which technology is faster?
(A) Bipolar (B) MOS (C) CMOS (D) ..
16)Memory access time, cache access time , hit ratio are given, Asked to find out
Average memory
access time
17) If the probability of getting a job for A is 1/3 and the probability of getting a
job for B is 1/4 then
the probability of getting a job for A or B will be____?
18)One transfer fn As4 + Bs3 + Cs2 +D=0 (I don't remember the values of A,B,C,D
) is given, Asked
to find out whether the system is____
(A) Stable (B) Unstable (C) Marginally Stable
19) For implementing D flip flop using RS flip flop, the extra component needed
is____
(A) AND gate (B) OR gate (C) NOT gate (D) NOR gate
20)The output of an 8 bit DAC is 1Volt when the input is 00110010, then the full
scale output of the
same DAC will be____
ans: 5.1 V (Hint: 1/50*255)
21)Fastest ADC is___
(A) SAR (B) sigma- delta (C) flash (D)...
22)The operating point of Class-B amplifier will be at_____
(A) exactly at cut-off region (B) inside saturation region (C) inside cut-off region
(D) middle of active
region
23)For an N bit ADC , the number of comparators needed___
(A) N (B) 2N (C) 2N -1 (D) 2N-1
24)De-emphasis circuit is used for_______
ans: Attenuating high frequency components
25)The laplace transform of e-2t _____
Ans: 1/(s+2)
26)The magnitude of 1+cos x+j sin x____
Ans: 2 cos (x/2)
27) A circuit is given in which the capacitor (1uF) is initially charged to 12V , At t =
0, one switch is
closed so that another capacitor of capacity 1.5uF comes in parallel with the first
capacitor, then in
steady state what will be the voltage across them? ( Visualize the circuit , as I can
not draw the
circuit since the editor is not supporting it)
28)Alpha of a transistor=0.99, Ico=1uA, Ie=1 mA, Ic=?
29)If the input given to an inductor is delta(t) (ie: =1 when t=0 and ,=0 otherwise)
then the current will
be___
(A) infinity (B) -infinity (C) 1 (D) 0
30) For implementing Band pass filter using High pass filter (Cutt off freq=Fh) and
Low pass filter
(cutt off freq= Fl)_____
(A)Fh=Fl (B) Fh>Fl (C) Fh<F1 (D)..
Ans: Fh<Fl
31)In the Enhancement type MOSFET the gate to source voltage Vs drain current
characteristics will
be____
Ans: Drain current Increases as Vgs increases in active region
32)In a johnson counter, How many state have to be changed to increment the
count from 0100 to
0111?
33)Odd parity generator is____
Ans: XNOR gate
34)A circuit using op-amp was given, the question was to calculate output offset
voltage___
Ans: Vo(off)=Vin(off)*(1+Rf/R1)
35)Antialiasing filter is_____
(A) Digital filter (B) Analog filter (C) Can be Analog or digital (D) RC filter
ISRO Technical Paper 2011 part -I
1 A full binary tree with n leaves contains?
2. The expression 1*2^3*4^5*6 will be evaluated as?
3 The feature in object oriented programming that follows he same operation to be
carried out
differently ,depending on the object, is?
4. icroistructions stored in the control mamory of a processor have a width of 26
bits. Each
microinstructionsion. is divided into three fields: a microoperation field of 13 bits, a
next address
field(x), and a MUX select field(y).There are 8 status bits in the inputs of the MUX.
How many bits are
there in the X and Y fields, and what is the size of the control memory in number of
words?
5. A cpu has 24-bit instructions. A program starts at address 300(in decimal).Which
one of
the following is a legal program counter (all values in decimal)?
6. Consider a disk pack with 16 surfaces,128 tracks per surface and 256 sectors per
track.512
bytes of data are stores in a bit serial manner in a sector.The capacity of the disk
and the number of bits
required to specify a particular in the disk are respectively.
7. Consider a pipelined processor with the following four stages IF:Instruction
Fetch ID:Instruction Decode and Operand
Fetch EX:Execute WB:Write Back The IF,ID and WB stages take one clock cycle
each to
complete the operation.The ADD and SUB instructions need 1 clock cycle and the
MUL instruction
need 3 clock cycles in the EX stage.Operand forwarding is used in the pipelined
processor.What is y
the number of clock cycles taken to complete the following sequence of
instructions? ADD R2,R1,R0 R2ßR1+R0
MUL R4,R3,R2 R4ßR3+R2
SUB R6,R5,R4 R6ßR5+R4
8. The use of multiple register windows with overlap causes a reduction in
the number of
memory accesses for 1.Function locals and
parameters 2.Registers saves and
restores 3.Instruction fetches
9. A processor that has carry, overflow and sign flag bits as part of its program
status
word(PSW) performs addition of the following two 2’s
complement numbers 0100101 and
11101001.After the execution of this addition operation, the status of the carry,
overflow and sign
flags, respectively will be
10. The two numbers given below are multiplied using the Booth’s algorithm.
Multiplicand:0101 1010 1110 1110 Multiplier:0111 0111
1011 1101 How many additions/Subtractions are
required for the multiplication of the above two numbers?
11. The addition of 4-bit, two’s complement,binary numbers 1101 and 0100 results
in
12. Which of the following statements about relative addressing mode is FALSE?
1.It
enables reduced instruction size 2.It allows indexing of
array element with same instruction 3.It enables easy relocation of
data 4.It enables f asters address calculation than
absolute addressing
13. Substitution of values for names(whose values are constants) is done?
14. A root alpha (symbol) of equation f(x) =0 can be computed to any degree of
accuracy if a
‘good’ initial approximation x0 is chosen for which?
15. Which of the following statement is correct? Ans.delta(Uk Vk)=Uk+1 delta
Vk+Vk+1
delta Uk
16. The shift operator E is defined as E[f(xi)]=f(xi+h) and E-1[f(xi)]=f(xi-h) Then
delta(forward difference) in terms of E is ?
17. The formula (integration symbol) Sxnx0------------------Ans:Trapezoidal rule.
18. The cubic polynomial y(x) which takes the following
values:y(0)=1,y(1)=0,y(2)=1 and
y(3)=10 is x^3-2x^2+1.
19. x=a cos(t), y=b sin(t) is the parametric form of?
20. The value of x at which y is minimum for y=x^2-3x+1 is ans:3/2.
21. Some formula given from IT and Numerical Methods
22. If G is a graph with e edges and n vertices the sum of the degrees of all
vertices in G is?
23. Let G be an arbitary graph with n nodes and k components.If a vertex is
removed from G,
the number of components in the resultant graph must necessarily lie between.
24. A graph in which all nodes are of equal degree, is known as
25. If in a graph G there is one and only one path between every pair of vertices
then G is a
26. A simple graph (a graph without parallel edge or loops) with n vertices and k
components
can have at most.
27. Consider the polynomial p(x)=a0+a1x+a2x^2+a3x^3,where ai!=0,for all i. The
minimum number of multiplications needed to evaluate p on an input x is
28. Consider the following code written in a pass-by-reference language like
FORTRAN. Subroutine
swap(ix,iy) it=ix
L1:ix=iy
L2:iy=it
end
ia=3
ib=8
call swap(ia,ib+5)
print*,ia,ib
end
S1:The compiler will generate code to allocate a temporary nameless cell, initialize
it to 13, and pass
the address of the cell to swap
S2:On execution the code will generate a runtime error on line L1
S3:On execution the code will generate a runtime error on line L2
S4:The program will print 13 and 8
S5:The program will print 13 and -2
Exactly the following set of statements is correct
29. A square matrix A is called orthogonal if A’A=?
30. If two adjacent rows of a determinant are interchanged, the value of the
determinant?
31. If det((3,3)(x,5))=3 then the value of x is?
32. If A,B,C are any three matrices , then A’+B’+C’ is equal to?
33. problem to solve determinant of a 3x3 matrices?
34. Let f(x) be the continuous probability density function of a random variable
x.The
probability that a<x<=b, is?
35. If the mean of a normal frequency distribution of 1000 items is 25 and its
standard
deviation is 2.5, then its maximum ordinate is?
36. If the pdf of a poisson distribution is given by f(x)=(e^-2 *2^x)/x!, then its
mean is?
37. Activities which ensure that the software that has been built, is traceable to
ustomer
requirement is covered as part of?
38. A testing method, which is normally used as the acceptance test for a software
system, is?
39. The ‘Command’ used to change contents of one database using the contents of
another
database by linking them on a common key field is called?
40. A locked database file can be?
41. Which of the following contains complete record of all activity that affected the
contents of
a database during a certain period of time?
42. Purpose of ‘Foreign Key’ in a table is to ensure?
43. Which of the following scenarios may lead to an irrecoverable error in a databse
system?
a.A transaction writes a data item after it is read by an uncommitted transaction.
b.A transaction reads a data item after it is read by an uncommitted transaction.
c .A transaction reads a data item after it is wriiten by a committed transaction.
d.A transaction reads a data item after it is written by an un committed transaction.
44.Use of IPSEC in tunnel mode results in?
45.Special software to create a job queue is called a?
46.Process is?
47.When a process is rolled back as a result of dead lock the difficulty which arises
is?
48.On receiving an interrupt from an I/O device, the CPU?
49.Compared to CISC processors,RISC processors contain?
50.Which of the following is/are true of the auto increment addressing mode?
1.It is useful in creating self relocating code
2.If it is included in an instruction set architecture, then an additional ALU is
required for effective
address calculation.
3.The amount of increment depends on the size of the data item accessed.
51.The subnet mask for a particular network is 255.255.31.0 Which of the following
pairs of ip
addresses could belong to this network?
1.172.57.88.62 and 172.56.87.23
2.10.35.28.2 and 10.35.29.4
3.191.203.31.87 and 191.234.31.88
4.128.8.129.43 and 128.8.161.55
52.In networking, UTP stands for?
53.The address resolution protocol(ARP) is used for?
54.Which of the following is a MAC address?
1.192.166.200.50
2.00056A:01A5CCA7FF60
3.568, Airport Road
4.01:A1:BB:A7:FF:60
55.what is the primary purpose of a VLAN?
56.SHA-1 is which algorithm?
57.Advanched Encryption Standard(AES) is based on which algorithm?
58.The primary purpose of an operating system is?
59.Find valid process transition in an operating system?
a. Wake up: ready à running
b. Dispatch: ready à running
c. Block: ready à running
d. Timer run out: à blocked
60.Match the following?
A. Disk check 1.Round Robin
B. Batch processing 2.Scan
C. Time sharing 3.LIFO
D.Stack operation 4. FIFO.
61.A page fault is?
62. Using larger block size in a fixed block size file system leads to?
63.Which of the following statement is not true?
a. An ISR is invoked on completion of I/O in synchronous I/O but not in
onasynchronous I/O
b. In both synchronous and asynchronous I/O an ISR (Interrupt Service Routines)is
invoked
after completion of the I/O
c.A process making a synchronous I/O call waits until I/O is complete,but a process
making an
asynchronous I/O call does not wait for completion of the I/O.
d.In the case of synchronous I/O, the process waiting for the completion of I/O is
woken up by
the ISR that is invoked after the completion of I/O.
64.Consider three CPU-intensive processes,which require 10,20, and 30 time units
and arrive at
times 0,2, and 6, respectively. How many context switches are needed if the
operating system
implement a shortest remaining time first scheduling algorithm?Do not count the
context switches at
time zero and at the end.
65.The performance of Round Robin algorithm depends heavily on?
66.Consider a system having “n” resource of same type. These resources are
shared by 3 processes
A,B,C. These have peak demands of 3,4 and 6 respectively. For what value of ”n”
deadlock won’t
occur?
67.Consider a set of 5 processes whose arrival time, CPU time needed and the
priority are given
below
Given some values…………………………………..
(smaller the number, higher the priority)
If the CPU scheduling policy is priority scheduling without pre-emption, the average
waiting time
will be?
68.The range of integers that can be represented by an n-bit 2’s
complement number system is?
69.The switching expressions corresponding to f(A,B,C,D)=sigma(1,4,5,9,11,12) is?
70.Consider the following Boolean function of four variables
f(w,x,y,z)=sigma(1,3,4,6,9,11,12,14),
The function is?
71.In which addressing mode, the effectives address of the operand is generated by
adding a constant
value to the content of a register?
a. Absolute mode
b.Indirect mode
c. Immediate mode
d. Index mode
72.A certain microprocessor requires 4.5 microseconds to respond to an interrupt.
Assuming that the
three interrupts I1,I2 and I3 require the following execution time after the interrupt
is recognized:
i. I1 requires 25 micro seconds
ii. I2 requires 35 micro seconds
iii. I3 requires 20 microseconds
I1 has the highest priority and I3 has the lowest. What is the possible range of time
for I3 to be
executed assuming that it may or may not occur simultaneously with other
interrupts?
73. The process of organizing the memory into two banks to allow 8- and 16-bit
data operation is
called?
74. Suppose the numbers 7,5,1,8,3,6,0,9,4,2 are inserted in that order into an
initially empty binary
search tree. The binary search tree uses the usual ordering on natural numbers.
What is the inorder
traversal sequence of the resultant tree?
75. A data structure is required for storing a set of integers such that each of th
following operations
can be done in (log n) time, here n is the number of elements in the set.
1. Deletion of the smallest element.
2. Insertion of an element if it is not already present in the set.
Which of the following data structures can be used for the prpose?
a. A heap can be used but not a balanced binary search tree.
b. A balanced binary search tree can be used but not a heap
c. Both balanced binary search tree and heap can be used
d. Neither balanced binary search tree nor heap can be used.
76. The following numbers are inserted into an empty binary search tree in the
given order:
10,1,3,5,15,12,16.What is the height of the binary search tree(the height is the
maximum distance of a
leaf node from the root)?
77. Assume that the operators +,-,x are left associative and ^ is right associative.
The order of
precedence(from highest to lowest) is ^,x,+,-.The postfix expression corresponding
to the infix
expressions a+bxc-d^e^f is.
78. The infix expression A+(B-C)*D is correctly represented in prefix notation as?
79. A one dimensional array A has indices 1…75.Each element is a string and takes
up three memory
words. The array is stored at location 1120decimal. The starting address of A[49]
is?
80. The five items:A,B,C,D and Eare pushed in a stack, one after the other starting
from A.The stack is
popped four times and each element is inserted in a queue.Then two elements are
deleted from the
queue and pushed back on the stack. Now one item is popped from the stack. The
popped item is?