ISRO Scientist or Engineer Computer Science 2011

Instructions

For the following questions answer them individually

ISRO Scientist or Engineer Computer Science 2011 - Question 11


How many distinct binary search trees can be created out of 4 distinct keys?

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 12


The network protocol which is used to get MAC address of a node by providing IP addressis

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 13


Which of the following statements about peephole optimizations is False?

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 14


Which one of-the following in place sorting algorithms needs the minimum numberof swaps?

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 15


What is the equivalent serial schedule for the following transactions?

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 16


Consider a direct mapped cache with 64 blocks and blocksize of 16 bytes. To what block numberdoes the byte address 1206 map to?

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 17


A context model of a software system can be shownby drawing a

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 18


An exampleof poly-alphabetic substitution is

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 19


If node A hasthree siblings and B is parent of A, what is the degree of A?

Video Solution

ISRO Scientist or Engineer Computer Science 2011 - Question 20


The IEEE standard for WiMax technologyis

Video Solution
cracku

Boost your Prep!

Download App