ISRO CSE 2014
Q41.
In a system an RSA algorithm with p=5 and q=11, is implemented for data security. What is the value of the decryption key if the value of the encryption key is 27?Q42.
In the standard IEEE 754 single precision floating point representation, there is 1 bit for sign, 23 bits for fraction and 8 bits for exponent. What is the precision in terms of the number of decimal digits?Q43.
How many different BCD numbers can be stored in 12 switches ? (Assume two position or on-off switches).Q44.
Every time the attribute A appears, it is matched with the same value of attribute B but not the same value of attribute C. Which of the following is true?Q45.
Consider the schema R(A,B,C,D) and the functional dependencies A \rightarrow B and C \rightarrow D. If the decomposition is made as R_{1}(A, B) and R_{2}(C, D), then which of the following is TRUE?Q47.
Assume that 16-bit CPU is trying to access a double word stating at an odd address. How many memory operations are required to access the data?Q48.
Consider a 50 kbps satellite channel with a 500 milliseconds round trip propagation delay. If the sender wants to transmit 1000 bit frames, how much time will it take for the receiver to receive the frame?Q49.
Consider the following grammar.\mathrm{S} \rightarrow \mathrm{AB}\mathrm{A} \rightarrow \mathrm{a}\mathrm{A} \rightarrow \mathrm{BaB}\mathrm{B} \rightarrow \mathrm{bbA}Which of the following statements is FALSE?Q50.
What is the number of steps required to derive the string ((() ()) ()) for the following grammar? S \rightarrow S SS \rightarrow(S)S \rightarrow \varepsilon