ISRO Scientist or Engineer Computer Science 2018

Instructions

For the following questions answer them individually

Question 31

Which of the following comment about peep-hole optimization is true?

Video Solution
Question 32

A byte addressable computer has a memory capacity of $$2^m$$ KB( kbytes ) and can perform $$2^n$$ operations. An instruction involving 3 operands and one operator needs maximum of

Video Solution
Question 33

Any set of Boolean operatorsthat is sufficient to represent all Boolean expressions is said to be complete. Which ofthe following is not complete?

Video Solution
Question 34

Consider a singly linked list of the form where F is a pointer to the first element in the linked list and is the pointer to the last element in the list. The time of which of the following operations depends on the length of the list?

Video Solution
Question 35

A particular BNF definition for a โ€œwordโ€ is given by the following rules.
<word> :: = <letter> $$\mid$$ <letter><charpair> $$\mid$$ <letter><intpair>
<charpair> :: =<letter><letter> $$\mid$$ <charpair><letter><letter>
<intpair> :: = <integer><integer> $$\mid$$ <intpair><integer><integer>
<letter> :: = a $$\mid$$ b $$\mid$$ c $$\mid$$ .... $$\mid$$ y $$\mid$$ z
<integer> :: = 0 $$\mid$$ 1 $$\mid$$ 2 $$\mid$$ ....$$\mid$$ 9
Which of the following lexical entries can be derived from < word > ?
I. pick
II. picks
III. c44

Video Solution
Question 36

Avalanche effect in cryptography

Video Solution
Question 37

In neural network, the network capacity is defined as

Video Solution
Question 38

Cloaking is a search engine optimization (SEO) technique. During cloaking

Video Solution
Question 39

What is one advantage of setting up a DMZ(Demilitarized Zone) with two fire walls?

Video Solution
Question 40

Which one of the following algorithm is not used in asymmetric key cryptography?

Video Solution
cracku

Boost your Prep!

Download App