ISRO Scientist or Engineer Computer Science 2018

Instructions

For the following questions answer them individually

ISRO Scientist or Engineer Computer Science 2018 - Question 31


Which of the following comment about peep-hole optimization is true?

ISRO Scientist or Engineer Computer Science 2018 - Question 32


A byte addressable computer has a memory capacity of $$2^m$$ KB( kbytes ) and can perform $$2^n$$ operations. An instruction involving 3 operands and one operator needs maximum of

ISRO Scientist or Engineer Computer Science 2018 - Question 33


Any set of Boolean operatorsthat is sufficient to represent all Boolean expressions is said to be complete. Which ofthe following is not complete?

ISRO Scientist or Engineer Computer Science 2018 - Question 34


Consider a singly linked list of the form where F is a pointer to the first element in the linked list and is the pointer to the last element in the list. The time of which of the following operations depends on the length of the list?

ISRO Scientist or Engineer Computer Science 2018 - Question 35


A particular BNF definition for a “word” is given by the following rules.
<word> :: = <letter> $$\mid$$ <letter><charpair> $$\mid$$ <letter><intpair>
<charpair> :: =<letter><letter> $$\mid$$ <charpair><letter><letter>
<intpair> :: = <integer><integer> $$\mid$$ <intpair><integer><integer>
<letter> :: = a $$\mid$$ b $$\mid$$ c $$\mid$$ .... $$\mid$$ y $$\mid$$ z
<integer> :: = 0 $$\mid$$ 1 $$\mid$$ 2 $$\mid$$ ....$$\mid$$ 9
Which of the following lexical entries can be derived from < word > ?
I. pick
II. picks
III. c44

ISRO Scientist or Engineer Computer Science 2018 - Question 36


Avalanche effect in cryptography

ISRO Scientist or Engineer Computer Science 2018 - Question 37


In neural network, the network capacity is defined as

ISRO Scientist or Engineer Computer Science 2018 - Question 38


Cloaking is a search engine optimization (SEO) technique. During cloaking

ISRO Scientist or Engineer Computer Science 2018 - Question 39


What is one advantage of setting up a DMZ(Demilitarized Zone) with two fire walls?

ISRO Scientist or Engineer Computer Science 2018 - Question 40


Which one of the following algorithm is not used in asymmetric key cryptography?

cracku

Boost your Prep!

Download App