ISRO Scientist or Engineer Computer Science 2018

Instructions

For the following questions answer them individually

ISRO Scientist or Engineer Computer Science 2018 - Question 31


Which of the following comment about peep-hole optimization is true?

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 32


A byte addressable computer has a memory capacity of $$2^m$$ KB( kbytes ) and can perform $$2^n$$ operations. An instruction involving 3 operands and one operator needs maximum of

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 33


Any set of Boolean operatorsthat is sufficient to represent all Boolean expressions is said to be complete. Which ofthe following is not complete?

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 34


Consider a singly linked list of the form where F is a pointer to the first element in the linked list and is the pointer to the last element in the list. The time of which of the following operations depends on the length of the list?

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 35


A particular BNF definition for a “word” is given by the following rules.
<word> :: = <letter> $$\mid$$ <letter><charpair> $$\mid$$ <letter><intpair>
<charpair> :: =<letter><letter> $$\mid$$ <charpair><letter><letter>
<intpair> :: = <integer><integer> $$\mid$$ <intpair><integer><integer>
<letter> :: = a $$\mid$$ b $$\mid$$ c $$\mid$$ .... $$\mid$$ y $$\mid$$ z
<integer> :: = 0 $$\mid$$ 1 $$\mid$$ 2 $$\mid$$ ....$$\mid$$ 9
Which of the following lexical entries can be derived from < word > ?
I. pick
II. picks
III. c44

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 36


Avalanche effect in cryptography

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 37


In neural network, the network capacity is defined as

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 38


Cloaking is a search engine optimization (SEO) technique. During cloaking

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 39


What is one advantage of setting up a DMZ(Demilitarized Zone) with two fire walls?

Video Solution

ISRO Scientist or Engineer Computer Science 2018 - Question 40


Which one of the following algorithm is not used in asymmetric key cryptography?

Video Solution
cracku

Boost your Prep!

Download App