ISRO Scientist or Engineer Computer Science 2011

Instructions

For the following questions answer them individually

Question 11

How many distinct binary search trees can be created out of 4 distinct keys?

Video Solution


Question 12

The network protocol which is used to get MAC address of a node by providing IP addressis

Video Solution


Question 13

Which of the following statements about peephole optimizations is False?

Video Solution


Question 14

Which one of-the following in place sorting algorithms needs the minimum numberof swaps?

Video Solution


Question 15

What is the equivalent serial schedule for the following transactions?

Video Solution


Question 16

Consider a direct mapped cache with 64 blocks and blocksize of 16 bytes. To what block numberdoes the byte address 1206 map to?

Video Solution


Question 17

A context model of a software system can be shownby drawing a

Video Solution


Question 18

An exampleof poly-alphabetic substitution is

Video Solution


Question 19

If node A hasthree siblings and B is parent of A, what is the degree of A?

Video Solution


Question 20

The IEEE standard for WiMax technologyis

Video Solution


Register with

OR

Boost your Prep!

Download App