ISRO CSE 2018
Q42.
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton)WELCOME TO NETWORK SECURITY!Q43.
A computer uses ternary system instead of the traditional systen, An n bit string in the binary system will occupyQ45.
If a variable can take only integral values from 0 to n, where n is an integer, then the variable can be represented as a bit-field whose width is (the log in the answer are to the base 2, and \lceil\log n\rceil means the floor of \log_{}{n} )Q46.
For a database relation R(a,b,c,d) where the domain of a,b,c and d include only atomic value, only the following functions dependencies and those that can be inferred from them holda\rightarrowcb\rightarrowdThe relation is in:Q47.
The set of attributes X will be fully functionally dependent on the set of attributes Y if the following conditions are satisfied.Q48.
A data driven machine is one that executes an instruction if the needed data is available. The physical ordering of the code listing does not dictate the course of execution. Consider the following pseudo-code:A. Multiply E by 0.5 to get FB. Add A and B to get E C. Add B with 0.5 to get D D. Add E and F to get G E. Add A with 10.5 to get CAssume A,B,C are already assigned values and the desired output is G. Which of the following sequence of execution is valid?Q49.
A byte addressable computer has a memory capacity of 2^{m} K B(k \text { bytes }) and can perform 2^{n} operations. An instruction involving 3 operands and one operator needs maximum of:Q50.
A particular parallel program computation requires 100 sec when executed on a single processor, if 40% of this computation is inherently sequential (i.e. will not benefit from additional processors), then theoretically best possible elapsed times of this program running with 2 and 4 processors, respectively, are: