Exam Details
Subject | computer science | |
Paper | ||
Exam / Course | ||
Department | ||
Organization | indian space research organisation | |
Position | ||
Exam Date | 2008 | |
City, State | , |
Question Paper
COMPUTER SCIENCE 2008
1. Which of the following is an illegal array definition?
type COLOGNE: (LIME, PINE, MUSK,MENTHOL);
var a array [COLOGNE] of REAL;
var array [REAL] of REAL;
var array of REAL;
var a array [BOOLEAN] of REAL;
2. The term Phong is associated with
(a)Ray tracing
(b)shading
(c)Hiddenline removal
game
3. The subnet mask 255.255.255.192
extends the network portion to 16 bits
extends the network portion to 26 bits
extends the network portion to 36 bits
has no effect on the network portion of an IP address
4. On a LAN, where are IP datagrams transported?
In the LAN header.
In the Application field.
In the Information field of the LAN frame.
After the TCP header.
5. In Ethernet, the source address field in the MAC frame is
address.
original sender's physical
previous station's physical
next destination's physical
original sender's service port
SETE
6. Which of the following transmission media is not readily suitable to
CSMA operation?
Radio
Optical fibers
Coaxial cable
Twisted pair
ist'c
INDIAN SPACE RESEARCH ORGANISATION Page 1 of 16
COMPUTER SCIENCE 2008 SETE
7. Consider the grammar
Which of the following sentences can be derived by this grammar?
abc . aab
abcc abbc
8. The TCP sliding window
can be used to control the flow of information
always occurs when the field value is 0
always occurs when the field value is 1
occurs horizontally
9. What is the bandwidth of a signal that ranges from 40 kHz to 4 MHz?
36 MHz
360 kHz
3.96 MHz
396 kHz
10. Which Project 802 standard provides for a collision-free protocol?
802.2
802.3
802.5
802.6
11. The Boolean theorem AS A C BC AB A C corresponds to
• • B)·
AB A C BC =AB BC
AB A C BC B)· •
• • AB A C
INDIAN SPACE RESEARCH ORGANISATION Page 2 of 16
iSfi·i; "i5ro •
COMPUTER SCIENCE 2008
12.ln the given network of AND and OR gates f can be written as
SETE
x x x x x o I Z 3 n-I n
Xo X1 Xz ... Xn
Xo X1 X3 ... Xn XZX3+ Xs
Xn-1 Xn-1 Xn
.
13. If N2 (7601)g where N is a positive integer, then the value of N
is
(241)s
(143)6
(165)y
(39)16
14. Assume that each character code consists of 8 bits. The
number of characters that can be transmitted per second
through an synchronous serial line at 2400 baud rate, and
with two stop bits is
109
216
218
219
15. Four jobs to be executed on a single processor system arrive
at time 0 in the order D. There burst CPU time
requirements are time units respectively. The
completion time of A under robin round scheduling with time
slice of one time unit is
10
4
8
9
ist"o
INDIAN SPACE RESEARCH ORGANISATION Page 3 of 16
COMPUTER SCIENCE 2008 SETE
INDIAN SPACE RESEARCH ORGANISATION Page 4 of 16
.i5'rc
t
COMPUTER SCIENCE 2008 SETE
22. How many 2-input multiplexers are required to construct a
21°-input multiplexer?
1023
31
10
127
23. A computer uses 8 digit mantissa and 2 digit exponent. If a
0.052 and b =28E 11, the b a-b will
result in an overflow error
result in an underflow error
be 0
be 5.28E 11
24. The Boolean expression simplifies to
C +AB
C
None of these
25. In the expression A(A by writing the first term A as A the
expression is best simplified as
A AS
AS
A
A S
isrc
INDIAN SPACE RESEARCH ORGANISATION
Page 5 of 16
COMPUTER SCIENCE 2008
26. The logic operations oftwo combinational circui1s given in Figure-I and
Figure-II are
Figure .-1
Figure -II
entirely different
identical
complementary
dual
27. The output Y of the given circuit is
1
Zero
X
28. Which of the following is not a valid rule for XOR?
0 XOR 0
1 XOR 1 1
1 XOR 0 1
B XOR B 0
SETE
ist'c
INDIAN SPACE RESEARCH ORGANISATION Page 6 of 16
COMPUTER SCIENCE 2008
29. The number of distinct simple graphs with up to three nodes is
15
10
7
9
SETE
30. Maximum number of edges in a n-node undirected graph without
self loops is
n2
n-I
31. Ifthe two matrices i and iJ have the same
determinant, then the value of X is
(b)..J 2
±1/2
±1/..J 2
32. The network 198.78.41.0 is a
Class A network
Class 8 network
Class C network
Class D network
33. The join operation can be defined as
. a cartesian product of two relations followed by a selection
a cartesian product of two relations
a union of two relations followed by cartesian product of the two relations
a union of two relations
INDIAN SPACE RESEARCH ORGANISATION
Page 7 of 16
COMPUTER SCIENCE 2008
34. If a square matrix .A satisfies ATA then the matrix A is
Idempotent
Symmetric
Orthogonal
Hermitian
35. Embedded pointer provides
An inverted index
A secondary access path
A physical record key
A primary key
SETE
"
36. An interrupt in which the device supplies its address
as well as the interrupt requests is known as
vectored interrupt
maskable interrupt
non maskable interrupt
designated interrupt
37. The ability to temporarily halt the CPU and use this time to
send informationon buses is called
direct memory access
vectoring the interrupt
polling
cycle stealing
38. Relative to the program translated by a complier, the same
program when interpreted runs
faster
slower
at the same speed
may be faster or slower
39. Consider the following Assembly language program":
MVIA 30 H
ACI 30 H
XRA A
POP H
After the execution of the above program, the contents of the
accumulator will be
INDIAN SPACE RESEARCH ORGANISATION Page 8 of 16 ...-
1iSt"D
COMPUTER SCIENCE 2008
30 H
60 H
00 H
contents of stack
40. Consider the following C function:
int f(int
{static int i
if return
return
The value returned by is
5
6
7
8
SETE
41. In a resident as computer, which of the following systems
must reside in the main memory under all situations?
Assembler .
Linker
Loader
Compiler
42. Which of the following architecture is/are not suitable for
realising SIMD
Vector processor
Array processor
Von Neumann
All of the above
iSt"D
INDIAN SPACE RESEARCH ORGANISATION
Page 9 of 16
COMPUTER SCIENCE 2008
43. Consider the following code segment.
for (lnt k k 20 i k k
if 3
SETE
System.out.print(k n OJ
00
What is printed as a result of executing the code segment?
4 16
4 10 16
(c)061218
1 47 10 13 16 19
44.The device which is used to connect a peripheral to bus is known as
control register
interface
communication protocol
none of these
45.The TRAP is one of the interrupts available in INTEL 8085. Which one of
the following statements is true of TRAP?
It is level triggered
It is negative edge triggered
It is the +ve edge triggered
It is both +ve and -ve edges triggered
46. Raid configurations of disks are used to provide
fault-tolerance
high speed
high data density
none of these
4J:. Which of the following need not necessarily be saved on a
context switch between processes?
General purpose registers
Translation lookaside buffer
Program counter
All of these
isrc
INDIAN SPACE RESEARCH ORGANISATION Page 10 of 16
COMPUTER SCIENCE 2008 SET E
48. Which of the following is termed as minimum error code?
Binary code
Gray code
Excess 3 code
Octal code
49. The total time to prepare a disk drive mechanism for a block of
data to be read from it is
seek time
latency
latency plus seek time
transmission time
50. Feedback queues
are very simple to implement
dispatch tasks according to execution characteristics
are used to favour real-time tasks
require manual intervention to ir:nplement properly
51. With Round-Robin CPU scheduling in a time shared system
using very large time slices (quantas) degenerates into First-Come
First served (FCFS) algorithm.
using extremely small time slices improves performance
using very small time slices degenerates into Last-In First-Out
(LIFO) algorithm
using medium sized time slices leads to shortest Request time
First (SRTF) algorithm
52. Dynamic Address translation
is part of the operating system paging algorithm
is useless when swapping is used
is the hardware necessary to implementpaging
storage pages at a specific location on disk
53. Thrashing
always Occurs on large computers.
is a natural consequence of virtual memory systems.
can always be avoided by swapping.
can be caused by poor paging algorithms.
INDIAN SPACE RESEARCH ORGANISATION
ist'o
Page 11 of 16
COMPUTER SCIENCE 2008
54. What is the name of the operating system that reads and
reacts in terms of actual time?
Batch system
Quick response system
Real time system
Time sharing system
SETE
55. The memory Address Register
is a hardware memory device which denotes the location of the
current instruction being executed.
is a group of electrical ckt, that performs the intent of instructions
fetched from memory.
contains the address of the memory location that is to be read from
or stored into
contains a copy of the designated memory location specified by the
MAR after a "read" or the new contents of the memory prior to a
"write".
56. An example of spooled device is a
line printer used to print the output of a number of jobs.
terminal used to enter input data to a running program.
secondary storage device in a virtual memory system.
graphic display device.
57. Dirty bit for a page in a page table
helps avoid unnecessary writes on a paging device
helps maintain LRU information
allows only read on a page
none of these
58.Checkpointing a job
allows it to be completed successfully
allows it to continue executing later
prepares it for finishing
occurs only when there is an error in it
59. A public key encryption system
allows anyone to decode the transmissions
allows only the correct sender to decode the data
allows only the correct receiver to decode the data
does not encode the data before transmitting it
"
-...
isrc
INDIAN SPACE RESEARCH ORGANISATION Page 12 of 16
COMPUTER SCIENCE 2008
60. Overlaying
requires use of a loader
allows larger programs, but requires more effort
is most used on large computers
is transparent to the user
SETE
61. A critical section is a program segment
which should run in a certain specified amount of time
which avoids deadlock
where shared resources are accessed
which must be endorsed by a pair of semaphore operations, P &U
62. In which of the following four necessary conditions for
deadlock processes claim exclusive control of the resources
they require?
no preemption
mutual exclusion
circular wait
hold and wait
63.Fork is
the creation of a new job
the dispatching of a task
increasing the priority of a task
the creation of a new process
64. Which of the following need not necessarily be saved on a Context
Switch between processes?
General purpose register
Translation look aside buffer
Program Counter
Stack pointer
. 65. Consider a logical address space of 8 pages of.1024 words mapped
into memory of 32 frames. How many bits are there in the logical address?
13 bits
15 bits
14 bits
12 bits
iSt"D
INDIAN SPACE RESEARCH ORGANISATION
Page 13 of 16
COMPUTER SCIENCE 2008
66. The performance of Round Robin algorithm depends heavily on
size of the process
the I/O bursts of the process
the CPU bursts of the process
the size of the time quantum
SETE
67. The page replacement algorithm which gives the lowest
page fault rate is
LRU
FIFO
Optional page replacement
Second chance algorithm
68. Which of the following class of statement usually produces no
executable code
when compiled?
declaration
assignment statements
input and output statements
structural statements
69. What is the value of using the following procedure:
function F(k integer):
integer;
begin
then else
end;
5
6
7
8
70.Stack A has the entries c (with a on top). Stack 8 is empty':
An entry popped out of stack A can be printed immediately or
pushed to stack B. An entry popped out of the stack 8 can only
be printed. In this arrangement, which of the following
permutations of c are not possible?
INDIAN SPACE RESEARCH ORGANISATION J Page 14 of 16
isrc .
COMPUTER SCIENCE 2008
b a c
be a
cab
abc
SETE
71.The time required to search an element in a linked list of length
nis
0(log2n)
0
O(n
72. Which of the following operations is performed more efficiently
by doubly linked list than by linear linked list?
Deleting a node whose location is given
Searching an unsorted list for a given item
Inserting a node after the node with a given location
(d)Traversing the list to process each node.
73. We can make a class abstract by
Declaring it abstract using the virtual keyword
Making at least one member function as virtual function
Making at least one member function as pure virtual function
Making all member function const.
74. A Steiner patch is
Biquadratic Bezier patch
Bicubic patch
Circular patch only
Bilinear Bezier patch
75. A complete binary tree with the property that the value at each
node is at least as large as the values at its children is knowl,l
as .
binary search tree
AVL tree
Completely balanced tree
Heap
ist"c
INDIAN SPACE RESEARCH ORGANISATIQN Page 15 of 16
COMPUTER SCIENCE 2008 SETE
76.The minimum number of fields with each node of doubly linked
list is
1
2
3
4
77. How many comparisons are needed to sort an array of length
5 if a straight selection sort is used and array is already in
the opposite order?
1
10
15
20
78.Consider the graph shown in the figure below.
A B
Which of the following is a valid strong component?
d
d
d
c
79. Repeated execution of simple computation may cause
compounding of
round-off errors
syntax errors
run-time errors
logic errors
80. In what is the effect of a negative number in a field width
specifier?
the values arc displayed right justified
the values are displayed centered
the values are displayed left justified
the values are displayed as negative numbers
ist'o
INDIAN SPACE RESEARCH ORGANISATION Page 16 of 16
1. Which of the following is an illegal array definition?
type COLOGNE: (LIME, PINE, MUSK,MENTHOL);
var a array [COLOGNE] of REAL;
var array [REAL] of REAL;
var array of REAL;
var a array [BOOLEAN] of REAL;
2. The term Phong is associated with
(a)Ray tracing
(b)shading
(c)Hiddenline removal
game
3. The subnet mask 255.255.255.192
extends the network portion to 16 bits
extends the network portion to 26 bits
extends the network portion to 36 bits
has no effect on the network portion of an IP address
4. On a LAN, where are IP datagrams transported?
In the LAN header.
In the Application field.
In the Information field of the LAN frame.
After the TCP header.
5. In Ethernet, the source address field in the MAC frame is
address.
original sender's physical
previous station's physical
next destination's physical
original sender's service port
SETE
6. Which of the following transmission media is not readily suitable to
CSMA operation?
Radio
Optical fibers
Coaxial cable
Twisted pair
ist'c
INDIAN SPACE RESEARCH ORGANISATION Page 1 of 16
COMPUTER SCIENCE 2008 SETE
7. Consider the grammar
Which of the following sentences can be derived by this grammar?
abc . aab
abcc abbc
8. The TCP sliding window
can be used to control the flow of information
always occurs when the field value is 0
always occurs when the field value is 1
occurs horizontally
9. What is the bandwidth of a signal that ranges from 40 kHz to 4 MHz?
36 MHz
360 kHz
3.96 MHz
396 kHz
10. Which Project 802 standard provides for a collision-free protocol?
802.2
802.3
802.5
802.6
11. The Boolean theorem AS A C BC AB A C corresponds to
• • B)·
AB A C BC =AB BC
AB A C BC B)· •
• • AB A C
INDIAN SPACE RESEARCH ORGANISATION Page 2 of 16
iSfi·i; "i5ro •
COMPUTER SCIENCE 2008
12.ln the given network of AND and OR gates f can be written as
SETE
x x x x x o I Z 3 n-I n
Xo X1 Xz ... Xn
Xo X1 X3 ... Xn XZX3+ Xs
Xn-1 Xn-1 Xn
.
13. If N2 (7601)g where N is a positive integer, then the value of N
is
(241)s
(143)6
(165)y
(39)16
14. Assume that each character code consists of 8 bits. The
number of characters that can be transmitted per second
through an synchronous serial line at 2400 baud rate, and
with two stop bits is
109
216
218
219
15. Four jobs to be executed on a single processor system arrive
at time 0 in the order D. There burst CPU time
requirements are time units respectively. The
completion time of A under robin round scheduling with time
slice of one time unit is
10
4
8
9
ist"o
INDIAN SPACE RESEARCH ORGANISATION Page 3 of 16
COMPUTER SCIENCE 2008 SETE
INDIAN SPACE RESEARCH ORGANISATION Page 4 of 16
.i5'rc
t
COMPUTER SCIENCE 2008 SETE
22. How many 2-input multiplexers are required to construct a
21°-input multiplexer?
1023
31
10
127
23. A computer uses 8 digit mantissa and 2 digit exponent. If a
0.052 and b =28E 11, the b a-b will
result in an overflow error
result in an underflow error
be 0
be 5.28E 11
24. The Boolean expression simplifies to
C +AB
C
None of these
25. In the expression A(A by writing the first term A as A the
expression is best simplified as
A AS
AS
A
A S
isrc
INDIAN SPACE RESEARCH ORGANISATION
Page 5 of 16
COMPUTER SCIENCE 2008
26. The logic operations oftwo combinational circui1s given in Figure-I and
Figure-II are
Figure .-1
Figure -II
entirely different
identical
complementary
dual
27. The output Y of the given circuit is
1
Zero
X
28. Which of the following is not a valid rule for XOR?
0 XOR 0
1 XOR 1 1
1 XOR 0 1
B XOR B 0
SETE
ist'c
INDIAN SPACE RESEARCH ORGANISATION Page 6 of 16
COMPUTER SCIENCE 2008
29. The number of distinct simple graphs with up to three nodes is
15
10
7
9
SETE
30. Maximum number of edges in a n-node undirected graph without
self loops is
n2
n-I
31. Ifthe two matrices i and iJ have the same
determinant, then the value of X is
(b)..J 2
±1/2
±1/..J 2
32. The network 198.78.41.0 is a
Class A network
Class 8 network
Class C network
Class D network
33. The join operation can be defined as
. a cartesian product of two relations followed by a selection
a cartesian product of two relations
a union of two relations followed by cartesian product of the two relations
a union of two relations
INDIAN SPACE RESEARCH ORGANISATION
Page 7 of 16
COMPUTER SCIENCE 2008
34. If a square matrix .A satisfies ATA then the matrix A is
Idempotent
Symmetric
Orthogonal
Hermitian
35. Embedded pointer provides
An inverted index
A secondary access path
A physical record key
A primary key
SETE
"
36. An interrupt in which the device supplies its address
as well as the interrupt requests is known as
vectored interrupt
maskable interrupt
non maskable interrupt
designated interrupt
37. The ability to temporarily halt the CPU and use this time to
send informationon buses is called
direct memory access
vectoring the interrupt
polling
cycle stealing
38. Relative to the program translated by a complier, the same
program when interpreted runs
faster
slower
at the same speed
may be faster or slower
39. Consider the following Assembly language program":
MVIA 30 H
ACI 30 H
XRA A
POP H
After the execution of the above program, the contents of the
accumulator will be
INDIAN SPACE RESEARCH ORGANISATION Page 8 of 16 ...-
1iSt"D
COMPUTER SCIENCE 2008
30 H
60 H
00 H
contents of stack
40. Consider the following C function:
int f(int
{static int i
if return
return
The value returned by is
5
6
7
8
SETE
41. In a resident as computer, which of the following systems
must reside in the main memory under all situations?
Assembler .
Linker
Loader
Compiler
42. Which of the following architecture is/are not suitable for
realising SIMD
Vector processor
Array processor
Von Neumann
All of the above
iSt"D
INDIAN SPACE RESEARCH ORGANISATION
Page 9 of 16
COMPUTER SCIENCE 2008
43. Consider the following code segment.
for (lnt k k 20 i k k
if 3
SETE
System.out.print(k n OJ
00
What is printed as a result of executing the code segment?
4 16
4 10 16
(c)061218
1 47 10 13 16 19
44.The device which is used to connect a peripheral to bus is known as
control register
interface
communication protocol
none of these
45.The TRAP is one of the interrupts available in INTEL 8085. Which one of
the following statements is true of TRAP?
It is level triggered
It is negative edge triggered
It is the +ve edge triggered
It is both +ve and -ve edges triggered
46. Raid configurations of disks are used to provide
fault-tolerance
high speed
high data density
none of these
4J:. Which of the following need not necessarily be saved on a
context switch between processes?
General purpose registers
Translation lookaside buffer
Program counter
All of these
isrc
INDIAN SPACE RESEARCH ORGANISATION Page 10 of 16
COMPUTER SCIENCE 2008 SET E
48. Which of the following is termed as minimum error code?
Binary code
Gray code
Excess 3 code
Octal code
49. The total time to prepare a disk drive mechanism for a block of
data to be read from it is
seek time
latency
latency plus seek time
transmission time
50. Feedback queues
are very simple to implement
dispatch tasks according to execution characteristics
are used to favour real-time tasks
require manual intervention to ir:nplement properly
51. With Round-Robin CPU scheduling in a time shared system
using very large time slices (quantas) degenerates into First-Come
First served (FCFS) algorithm.
using extremely small time slices improves performance
using very small time slices degenerates into Last-In First-Out
(LIFO) algorithm
using medium sized time slices leads to shortest Request time
First (SRTF) algorithm
52. Dynamic Address translation
is part of the operating system paging algorithm
is useless when swapping is used
is the hardware necessary to implementpaging
storage pages at a specific location on disk
53. Thrashing
always Occurs on large computers.
is a natural consequence of virtual memory systems.
can always be avoided by swapping.
can be caused by poor paging algorithms.
INDIAN SPACE RESEARCH ORGANISATION
ist'o
Page 11 of 16
COMPUTER SCIENCE 2008
54. What is the name of the operating system that reads and
reacts in terms of actual time?
Batch system
Quick response system
Real time system
Time sharing system
SETE
55. The memory Address Register
is a hardware memory device which denotes the location of the
current instruction being executed.
is a group of electrical ckt, that performs the intent of instructions
fetched from memory.
contains the address of the memory location that is to be read from
or stored into
contains a copy of the designated memory location specified by the
MAR after a "read" or the new contents of the memory prior to a
"write".
56. An example of spooled device is a
line printer used to print the output of a number of jobs.
terminal used to enter input data to a running program.
secondary storage device in a virtual memory system.
graphic display device.
57. Dirty bit for a page in a page table
helps avoid unnecessary writes on a paging device
helps maintain LRU information
allows only read on a page
none of these
58.Checkpointing a job
allows it to be completed successfully
allows it to continue executing later
prepares it for finishing
occurs only when there is an error in it
59. A public key encryption system
allows anyone to decode the transmissions
allows only the correct sender to decode the data
allows only the correct receiver to decode the data
does not encode the data before transmitting it
"
-...
isrc
INDIAN SPACE RESEARCH ORGANISATION Page 12 of 16
COMPUTER SCIENCE 2008
60. Overlaying
requires use of a loader
allows larger programs, but requires more effort
is most used on large computers
is transparent to the user
SETE
61. A critical section is a program segment
which should run in a certain specified amount of time
which avoids deadlock
where shared resources are accessed
which must be endorsed by a pair of semaphore operations, P &U
62. In which of the following four necessary conditions for
deadlock processes claim exclusive control of the resources
they require?
no preemption
mutual exclusion
circular wait
hold and wait
63.Fork is
the creation of a new job
the dispatching of a task
increasing the priority of a task
the creation of a new process
64. Which of the following need not necessarily be saved on a Context
Switch between processes?
General purpose register
Translation look aside buffer
Program Counter
Stack pointer
. 65. Consider a logical address space of 8 pages of.1024 words mapped
into memory of 32 frames. How many bits are there in the logical address?
13 bits
15 bits
14 bits
12 bits
iSt"D
INDIAN SPACE RESEARCH ORGANISATION
Page 13 of 16
COMPUTER SCIENCE 2008
66. The performance of Round Robin algorithm depends heavily on
size of the process
the I/O bursts of the process
the CPU bursts of the process
the size of the time quantum
SETE
67. The page replacement algorithm which gives the lowest
page fault rate is
LRU
FIFO
Optional page replacement
Second chance algorithm
68. Which of the following class of statement usually produces no
executable code
when compiled?
declaration
assignment statements
input and output statements
structural statements
69. What is the value of using the following procedure:
function F(k integer):
integer;
begin
then else
end;
5
6
7
8
70.Stack A has the entries c (with a on top). Stack 8 is empty':
An entry popped out of stack A can be printed immediately or
pushed to stack B. An entry popped out of the stack 8 can only
be printed. In this arrangement, which of the following
permutations of c are not possible?
INDIAN SPACE RESEARCH ORGANISATION J Page 14 of 16
isrc .
COMPUTER SCIENCE 2008
b a c
be a
cab
abc
SETE
71.The time required to search an element in a linked list of length
nis
0(log2n)
0
O(n
72. Which of the following operations is performed more efficiently
by doubly linked list than by linear linked list?
Deleting a node whose location is given
Searching an unsorted list for a given item
Inserting a node after the node with a given location
(d)Traversing the list to process each node.
73. We can make a class abstract by
Declaring it abstract using the virtual keyword
Making at least one member function as virtual function
Making at least one member function as pure virtual function
Making all member function const.
74. A Steiner patch is
Biquadratic Bezier patch
Bicubic patch
Circular patch only
Bilinear Bezier patch
75. A complete binary tree with the property that the value at each
node is at least as large as the values at its children is knowl,l
as .
binary search tree
AVL tree
Completely balanced tree
Heap
ist"c
INDIAN SPACE RESEARCH ORGANISATIQN Page 15 of 16
COMPUTER SCIENCE 2008 SETE
76.The minimum number of fields with each node of doubly linked
list is
1
2
3
4
77. How many comparisons are needed to sort an array of length
5 if a straight selection sort is used and array is already in
the opposite order?
1
10
15
20
78.Consider the graph shown in the figure below.
A B
Which of the following is a valid strong component?
d
d
d
c
79. Repeated execution of simple computation may cause
compounding of
round-off errors
syntax errors
run-time errors
logic errors
80. In what is the effect of a negative number in a field width
specifier?
the values arc displayed right justified
the values are displayed centered
the values are displayed left justified
the values are displayed as negative numbers
ist'o
INDIAN SPACE RESEARCH ORGANISATION Page 16 of 16