ISRO CSE 2017


Q2.

Which protocol suite designed by IETF to provide security for a packet at the Internet layer?
GateOverflow

Q3.

Which of the following protocol is used for transferring electronic mail messages from one machine to another?
GateOverflow

Q4.

The most appropriate matching for the following pairs:\begin{array}{|l|l|l|l|} \hline \text{X.} & \text{Indirect Addressing} & i. & \text{Loop} \\ \hline \text{Y.} & \text{Immediate Addressing} & ii. & \text{Pointers} \\ \hline \text{Z.} & \text{Auto Decrement Addressing} & iii. & \text{Constants} \\ \hline \end{array}
GateOverflow

Q5.

We use malloc and calloc for:
GateOverflow

Q6.

A cache memory needs an access time of 30 ns and main memory 150 ns, what is average access time of CPU (assume hit ratio = 80%)?
GateOverflow

Q7.

What does the following program do when the input is unsigned 16 bit integer? #include < stdio.h > main(){ unsigned int num; int i; scanf("%u", #); for(i=0;i<16;i++){ printf("%d", (num < < i&1 < < 15)?1:0); } }
GateOverflow

Q8.

If the post order traversal gives ab -cd * + then the label of the nodes 1,2,3.. will be
GateOverflow

Q9.

What will be the output of the following C code? #include < stdio.h > main() { int i; for(i=0;i<5;i++) { int i=10; printf("%d" , i); i++; } return 0; }
GateOverflow

Q10.

Which media access control protocol is used by IEEE 802.11 wireless LAN?
GateOverflow