ISRO CSE 2017
Q2.
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?Q3.
Which of the following protocol is used for transferring electronic mail messages from one machine to another?Q4.
The most appropriate matching for the following pairs:\begin{array}{|l|l|l|l|} \hline \text{X.} & \text{Indirect Addressing} & i. & \text{Loop} \\ \hline \text{Y.} & \text{Immediate Addressing} & ii. & \text{Pointers} \\ \hline \text{Z.} & \text{Auto Decrement Addressing} & iii. & \text{Constants} \\ \hline \end{array}Q6.
A cache memory needs an access time of 30 ns and main memory 150 ns, what is average access time of CPU (assume hit ratio = 80%)?Q7.
What does the following program do when the input is unsigned 16 bit integer? #include < stdio.h > main(){ unsigned int num; int i; scanf("%u", #); for(i=0;i<16;i++){ printf("%d", (num < < i&1 < < 15)?1:0); } }Q8.
If the post order traversal gives ab -cd * + then the label of the nodes 1,2,3.. will beQ9.
What will be the output of the following C code? #include < stdio.h > main() { int i; for(i=0;i<5;i++) { int i=10; printf("%d" , i); i++; } return 0; }