ISRO CSE 2016


Q31.

Let R(a,b,c) and S(d,e,f) be two relations in which d is the foreign key of S that refers to the primary key of R. Consider the following four operations R and S I. Insert into R II. Insert into S III. Delete from R IV. Delete from S Which of the following can cause violation of the referential integrity constraint above?
GateOverflow

Q32.

The circuit given in the figure below is
GateOverflow

Q33.

The logic circuit given below converts a binary code y1, y2, y3 into
GateOverflow

Q34.

Peephole optimization is form of
GateOverflow

Q35.

Determine the number of page faults when references to pages occur in the following order: 1, 2, 4, 5, 2, 1, 2, 4 Assume that the main memory can accommodate 3 pages and the main memory already has the pages 1 and 2, with page one having brought earlier than page 2. (LRU page replacement algorithm is used)
GateOverflow

Q36.

A CPU generates 32-bit virtual addresses. The page size is 4 KB. The processor has a translation look-aside buffer (TLB) which can hold a total of 128 page table entries and is 4-way set associative. The minimum size of the TLB tag is:
GateOverflow

Q37.

Let the page fault service time be 10 ms in a computer with average memory access time being 20 ns. If one page fault is generated for every 10^6 memory accesses, what is the effective access time for the memory?
GateOverflow

Q38.

An FSM(finite state machine) can be considered to be a turing machine of finite tape length
GateOverflow

Q39.

If a class C is derived from class B, which is derived form class A, all through public inheritance, then a class C member function can access
GateOverflow

Q40.

If (12A7C)_{16} = (X)_8 then the value of X is
GateOverflow