Solved ISRO Scientist or Engineer Computer Science 2016 Paper With Solutions
Solved ISRO Scientist or Engineer Computer Science 2016 Paper With Solutions
Solved ISRO Scientist or Engineer Computer Science 2016 Paper With Solutions
All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, or stored in any
retrieval system of any nature without the permission of cracku.in, application for which shall be made
to [email protected]
Question 1
A 3+ 7= 10
B 3+ 7≤ 10
C 3+ 7< 10
D 3+ 7> 10
Answer: D
Question 2
3
A 1+x2
3
B (1+x2 )2
3
C (1−x2 )2
3
D (1−x2 )
Answer: C
Question 3
1+x− 1−x
limx→o x is given by
A 0
B -1
C 1
1
D 2
Answer: C
Question 4
a
If (G, -) is a group such that (ab)−1 = a −1 b−1 , ∀a, b ∈ G then G is an
B Abelian group
C Non-abelian group
D None of these
Question 5
A given connected graph G is a Euler Graphif and only if all vertices of G are of
A Same degree
B Even degree
C Odd degree
D Different degree
Answer: B
Question 6
A n2
n(n−1)
B 2
C n-1
n(n+1)
D 2
Answer: B
Question 7
The mimmum number of NAND gates required to implement the Boolean function ˉ + AB
A + AB ˉ C is equal to
A 0
B 1
C 4
D 7
Answer: A
Question 8
A AB+AC+BC
C A+B
D A+B+C
Answer: A
Question 9
For a binary half-subtractor having two inputs A and B, the correct set of logical expression for the outputs D (= A minus B) and X =
borrow) are
A D = AB + AB, X = AB
B D = AB + AB, X = AB
C D = AB + AB, X = AB
D D = AB + AB, X = AB
Answer: C
Question 10
A Gate No. 1
B Gate No. 2
C Gate No. 3
D Gate No. 4
Answer: B
Question 11
Answer: C
A Excess-3 code
B Gray code
C BCD code
D Hamming Code
Answer: B
Question 13
Answer: A
Question 14
A 224174
B 425174
C 6173
D 225174
Answer: D
B Weighted Code
C Self-Complementing Code
D Algebraic Code
Answer: C
Question 16
The simplified Sum of Product form of the following Boolean expression (P + Q + R)(P + Q + R)(P + Q + R)
A (P Q + R)
B (P + QR)
C (P Q + R)
D (P Q + R)
Answer: B
Question 17
Which of the following binary numberis the sameas its 2’s complement?
A 1010
B 0101
C 1000
D 1001
Answer: C
Question 18
Answer: C
Question 19
Which of the following binary numberis the sameas its 2’s complement?
A 1010
C 1000
D 1001
Answer: A
Question 20
A 555
B 5 5 junk
C § junk junk
Answer: A
Question 21
Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per track. 512 bytes of data are stored in a bit serial
fashion in a sector. The capacity of the disk pack and the numberofbits required to specify a particular sector in the disk respectively
D 64 GB, 28 bits
Answer: A
Question 22
Let the page fault service time be 10 ms in a computer with average memory access time being 20 ns. If one page fault is generated
for every 106 memory accesses, what is the effective access time for the memory?
A 21.4ns
B 29.9ns
C 23.5 ns
D 35.1ns
Answer: B
Question 23
Answer: C
Question 24
A SISD
B SIMD
C MIMD
D MISD
Answer: A
Question 25
What will be output of following program? Assume that you are running this program in little-endian processor.
#include<stdio.h>
int main() {
short a = 320;
char *ptr;
ptr = (char *)&a;
printf("%d"_,*ptr);
return 0;
}
A 1
B 320
C 64
D Compilation Error
Answer: C
Question 26
A [log2 n] ∗ n
B n
C [log2 n]
Question 27
The following postfix expression with single digit operands is evaluated using a stack
823^/23* 5 1*-
(Note that ^ is the exponential operator)
The top two elements of the stack after the first * operator is evaluated are
A 6,1
B 5,7
C 3,2
D 1,5
Answer: A
Question 28
Average number of comparison required for a successful search for sequential search on ‘n’ items is
n
A 2
(n−1)
B 2
(n+1)
C 2
Answer: C
Question 29
A Hash Function f is defined as f(key) = key mod 7. With linear probing, while inserting the keys 37, 38, 72, 48, 98, 11, 56 into a table
indexed from 0, in which location the key 11 will be stored (count table Index 0 as 0th location )?
A 3
B 4
C 5
D 6
Answer: C
Question 30
A log2 n nodes
B n+1 nodes
C 2n nodes
D 2n+1 nodes
Question 31
A Dynamic programming
B Backtracking
D Greedy Method
Answer: C
Question 32
An FSM (Finite State Machine) can be considered to be a Turning Machineof finite tape length
Answer: A
Question 33
Let L = {ωϵ(0 + 1) ∗ ∣ ω} has even number of 1s, i.e. L is the set of all bit strings with even number of 1s. Which one of the regular
expression below represents L?
A (0*10*1)*
B 0*(10*10*)*
C 0*(10*1*)*0*
D 0*1(10*1)*10*
Answer: B
Question 34
B T (n) = O(log n)
C T (n) = O( n)
D T (n) = O(n)
Answer: A
A I only
D I, II and III
Answer: D
Question 36
A Regular
B Context-free
C Context-sensitive
D Recursive
Answer: D
Question 37
S → aSa∣bSb∣a∣b
The language generated by the above grammar over the alphabets { a, b } is the set of
A All palindromes
Answer: B
Question 38
What is the highest type number that can be assigned to this following grammar : S → Aa, A → Ba, B → abc
A Type 0
B Type l
C Type 2
D Type 3
Answer: C
A Linearlist
B Search Tree
C Hash Table
D Self-organization list
Answer: B
Question 40
A Top-down parsers
B Bottom-up parsers
C Predictive parsers
D None of these
Answer: B
Question 41
A Rightmost derivation
C Leftmost derivation
Answer: C
Question 42
A Co-routines
B Position-independent code
C Sharable code
D Interrupt Handlers
Answer: B
Question 43
A simple two-pass assembler does which of the following in the first pass?
A Checksto seeif the instructions are legal in the current assembly mode
D Allof these
Answer: D
Question 44
A Loop optimization
B Local optimization
C Constant folding
Answer: B
Question 45
At a particular time of computation, the value of a counting semaphore is 7. Then 20 P operation and x V operations were completed
on this semaphore. If the final value of the semaphore is 5, x will be
A 18
B 22
C 15
D 13
Answer: A
Question 46
A If there are more than two processor competing for that resource
D None of these
Answer: D
Question 47
A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units, then
D None of these
Answer: A
Determine the numberof page faults whenreferences to pages occur in the following order: 1, 2, 4, 5, 2, 1, 2, 4 Assume that the main
memory can accommodate 3 pages and the main memory already has the pages 1 and 2, with page one having brought earlier than
page 2. (LRU page replacement algorithm is used)
A 3
B 5
C 4
D None of these
Answer: C
Question 49
A The set of k future references that the Operating System (OS) will make
B The set of future references that the OS will make in next t unit of time
D The k set of pages that have been referenced in the last t time units
Answer: D
Question 50
A CPU generates 32-bit virtual addresses. The page size is 4 KB. The processor has a translation look-aside buffer (TLB) which can
hold a total of 128 page table entries and is
4-way set associative. The minimum size of the TLB tag is
A 11 bits
B 13 bits
C 15 bits
D 20 bits
Answer: C
Question 51
The real-time operating system, which of the following is the most suitable scheduling scheme?
A Round robin
C Pre-emptive
D Random scheduling
Answer: C
Question 52
In which one of the following page replacementpolicies, Balady’s anomaly may occur?
B Optimal
C LRU
D MRU
Answer: A
Question 53
Consider Join of a relation R with a relation S. If R has m tuples and S has n tuples, then maximum and minimum sizes of the Join
respectively are
A m+n and 0
B mn and 0
D mn and m+n
Answer: B
Question 54
Let R(a, b,c)and S(d,e, f) be two relations in which d is the foreign key of S that refers to the primary key of R Consider the following
four operations in R and S
I.Insert into R
II.Insert into S
III.Deletion from R
IV.Deletion from S
Which of the following can cause violation of the relational integrity constraint above?
A Both I and IV
C All of these
D None of these
Answer: B
Question 55
The relation book (title, price) contains the titles and prices of different books. Assuming that no two books have the same price,
what does the following SQL query list?
[select title from book as B where (select count(*) from book as T where T.price > B.price) < 5]
Answer: D
D All of these
Answer: D
Question 57
Given the relations employee (name, salary, deptno) and department (depino, deptname, address)
Which of the following queries cannot be expressed using the basic relational algebra operations (U, −, x, π, σ, p)
Answer: C
Question 58
Trigger is
C The condition that the system tests for the validity of the database user
D Statement that is executed automatically by the system as a side effect of a modification to the database
Answer: D
Question 59
The orderofa leaf node in a B+ tree is the maximum numberof (value, data record pointer) pairs it can hold. Given that the block size is
1K bytes, data record pointer is 7 bytes long, the value field is 9 bytes long andablock pointeris 6 bytes long, what is the orderofthe
leaf node?
A 63
B 64
C 67
D 68
Answer: B
Question 60
Answer: A
Question 61
The Extent to which the software can continue to operate correctly despite the introduction of invalid inputs is called as
A Reality
B Robustness
C Fault tolerance
D Portability
Answer: B
Question 62
A Maintainability
B Portability
C Robustness
Answer: D
Question 63
Answer: B
A company needs to develop a strategy for software product development for which it has a choice of two programming languages L1
and L2. The number of lines of code (LOC) developed using L2 is estimated to be twice the LOC developed with L1. The product will
have to be maintained for five years. Various parameters for the company are given in the table below.
Total cost of the project includes cost of development and maintenance. What is the LOC for L1 for which the cost of the project
using L1 is equal to the cost of the project using L2 ?
A 10,000
B 5,000
C 7,500
D 75,000
Answer: B
Question 65
A company needs to develop digital signal processing software for one of its newest inventions. The software is expected to have
20000 lines of code. The company needs to
determine the effort in person-months needed to develop this software using the basic COCOMO model. The multiplicative factor for
this model is given as 2.2 for the software development on embedded systems, while the exponentiation factor is given as 1.5. What
is the estimated effort in person-months?
A 196.77
B 206.56
C 199.56
D 210.68
Answer: A
Question 66
In the spiral model of software development, the primary determinantin selecting activities in each iteration is
A Iteration size
B Cost
D Risk
Answer: D
Question 67
Answer: A
Question 68
Answer: D
Question 69
CSM A
In Ethernet CD , the special bit sequenee is transmitted by media access managementto handle collision is called
A Preamble
B Postamble
C Jam
D None of these
Answer: C
Question 70
Which network protocol Allows hosts to dynamically get a unique IP number on each bootup?
A DHCP
B BOOTP
C RARP
D ARP
Answer: A
Question 71
m
In a token ring network, the transmission speed is 107 bps and the propagation speed is 200 μs . Then 1 bit delay in this network is
equivalent to
A 500m of cable
B 200 m of cable
C 20 m of cable
Answer: C
Question 72
The address of a class B hostis to be split into subnets with a 6-bit subnet number. What is the maximum numberof subnets and the
maximum numberofhosts in each subnet?
Answer: C
Question 73
The message 11001001is to be transmitted using the CRC polynomial x3 +1 to protect it from errors. The message that should be
transmitted is
A 11001001000
B 11001001011
C 11001010
D 110010010011
Answer: B
Question 74
What is the maximum size of data that application layer can pass on to the TCP layer below?
A Any size
C 216 bytes
D 1500 bytes
Answer: A
Question 75
Framesof 1000 bits are sent over a 106 }bps duplex link between two hosts. The propagation time is 25 ms. Frames are to be
transmitted into this link to maximally pack them in transit (within the link).What is the minimum numberofbits (i) that will be required
to represent the sequence numbers distinctly? Assume that no time gap needs to be given between transmission of two frames.
A i=2
B i=3
C i=4
D i=5
Answer: D
Which of the following is TRUE only for XML, but not for HTML?
Answer: C
Question 77
Consider a system with 2 level caches. Access times of Level 1 cache, Level 2 cache and main memory are 1 ns, 10 ns, and 500 ns,
respectively. The hit rates of Level 1 and Level 2 caches are 0.8 and 0.9, respectively. What is the average access time of the system
ignoring the search time within the cache?
A 13.0 ns
B 12.8 ns
C 12.6 ns
D 12.4 ns
Answer: C
Question 78
If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C memberfunction can
access
Answer: D
Question 79
Which oneof the following is correct about the statements given below?
I, All function calls are resolved at compile-time in C language.
II. All function calls are resolved at compile-time in C++.
A Only II is correct
C Only I is correct
Answer: D
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
A DNS lookup
B DNS hijacking
C DNS spoofing
Answer: C