ISRO 2009 Computer Science (CS) questions with solution

Recent questions tagged isro2009

6 votes
5 answers
31
A locked database file can beAccessed by only one userModified by users with the correct passwordUsed to hide sensitive informationUpdated by more than one user
10 votes
2 answers
32
$\begin{vmatrix} 265 && 240 && 219 \\ 240 && 225 && 198 \\ 219 && 198 && 181 \\ \end{vmatrix} = $$779$$679$$0$$256$
8 votes
1 answer
34
A root $\alpha$ of equation $f(x)=0$ can be computed to any degree of accuracy if a 'good' initial approximation $x_0$ is chosen for which$f(x_0) 0$$f (x_0) f''(x_0) 0$...
6 votes
1 answer
35
Substitution of values for names (whose values are constants) is done inLocal optimizationLoop optimizationConstant foldingStrength reduction
4 votes
3 answers
40
The expression $1 * 2 \wedge 3 * 4 \wedge 5 * 6$ will be evaluated as$32^{30}$$162^{30}$49152173458In original quetion 5 is not given.
6 votes
3 answers
41
A one dimensional array A has indices 1....75. Each element is a string and takes up three memory words. The array is stored at location 1120 decimal. The starting addres...
6 votes
2 answers
42
The process of organizing the memory into two banks to allow $8$-and $16$-bit data operation is calledBank switchingIndexed mappingTwo-way memory interleavingMemory segme...
7 votes
4 answers
44
6 votes
1 answer
45
The switching expression corresponding to $f(\text{A, B, C, D}) = \Sigma(1, 4, 5, 9, 11, 12)$ isBC'D' + A'C'D + AB'DABC' + ACD + B'C'DACD' + A'BC' + AC'D'A'BD + ACD' + BC...
7 votes
2 answers
46
4 votes
1 answer
47
5 votes
5 answers
48
What is the primary purpose of a VLAN?Demonstrating the proper layout for a networkSimulating a networkTo create a virtual private networkSegmenting a network inside a sw...
6 votes
2 answers
49
8 votes
3 answers
50
The primary purpose of an operating system isTo make most efficient use of the computer hardwareTo allow people to use the computerTo keep systems programmers employedTo ...
5 votes
2 answers
51
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
3 votes
1 answer
52
Special software to create a job queue is called aDriverSpoolerInterpreterLinkage editor
2 votes
4 answers
53
A testing method which is normally used as the acceptance test for a software system, isRegression TestingIntegration TestingUnit TestingSystem Testing
5 votes
2 answers
54
Purpose of 'Foreign Key' in a table is to ensureNull IntegrityReferential IntegrityDomain IntegrityNull and Domain Integrity
4 votes
4 answers
55
Use of IPSEC in tunnel mode results inIP packet with same headerIP packet with new headerIP packet without headerNo changes in IP packet
7 votes
2 answers
56
$\textsf{SHA-1}$ is aencryption algorithmdecryption algorithmkey exchange algorithmmessage digest function
4 votes
4 answers
57
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field?ReplaceJoinChangeUpdate
8 votes
4 answers
58
When a process is rolled back as a result of deadlock the difficulty which arises isStarvationSystem throughputLow device utilizationCycle stealing
6 votes
4 answers
60
Compared to CISC processors,RISC processors containMore register and smaller instruction setlarger instruction setless registers and smaller instruction setmore transisto...