Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
ISRO 2009 Computer Science (CS) questions with solution
Recent questions tagged isro2009
6
votes
5
answers
31
ISRO2009-70
A locked database file can be Accessed by only one user Modified by users with the correct password Used to hide sensitive information Updated by more than one user
A locked database file can beAccessed by only one userModified by users with the correct passwordUsed to hide sensitive informationUpdated by more than one user
Desert_Warrior
4.3k
views
Desert_Warrior
asked
Jun 3, 2016
Databases
isro2009
databases
file-system
+
–
10
votes
2
answers
32
ISRO2009-63
$\begin{vmatrix} 265 && 240 && 219 \\ 240 && 225 && 198 \\ 219 && 198 && 181 \\ \end{vmatrix} = $ $779$ $679$ $0$ $256$
$\begin{vmatrix} 265 && 240 && 219 \\ 240 && 225 && 198 \\ 219 && 198 && 181 \\ \end{vmatrix} = $$779$$679$$0$$256$
Desert_Warrior
3.5k
views
Desert_Warrior
asked
Jun 3, 2016
Linear Algebra
isro2009
linear-algebra
matrix
determinant
+
–
3
votes
1
answer
33
ISRO2009- 45
Which of the following statement is correct $\triangle (U_k V_k) = U_k \triangle V_k + V_k \triangle U_k$ $\triangle (U_k V_k) = U_{k+1} \triangle V_k + V_{k+1} \triangle U_k$ $\triangle (U_k V_k) = V_{k+1} \triangle U_k + U_k \triangle V_k$ $\triangle (U_k V_k) = U_{k+1} \triangle V_k + V_k \triangle U_k$
Which of the following statement is correct$\triangle (U_k V_k) = U_k \triangle V_k + V_k \triangle U_k$$\triangle (U_k V_k) = U_{k+1} \triangle V_k + V_{k+1} \triangle ...
Desert_Warrior
2.0k
views
Desert_Warrior
asked
Jun 3, 2016
Calculus
isro2009
calculus
vector-calculus
non-gate
+
–
8
votes
1
answer
34
ISRO2009-44
A root $\alpha$ of equation $f(x)=0$ can be computed to any degree of accuracy if a 'good' initial approximation $x_0$ is chosen for which $f(x_0) > 0$ $f (x_0) f''(x_0) > 0$ $f(x_0) f'' (x_0) < 0$ $f''(x_0) >0$
A root $\alpha$ of equation $f(x)=0$ can be computed to any degree of accuracy if a 'good' initial approximation $x_0$ is chosen for which$f(x_0) 0$$f (x_0) f''(x_0) 0$...
Desert_Warrior
2.9k
views
Desert_Warrior
asked
Jun 3, 2016
Numerical Methods
isro2009
numerical-methods
+
–
6
votes
1
answer
35
ISRO2009-43
Substitution of values for names (whose values are constants) is done in Local optimization Loop optimization Constant folding Strength reduction
Substitution of values for names (whose values are constants) is done inLocal optimizationLoop optimizationConstant foldingStrength reduction
Desert_Warrior
6.5k
views
Desert_Warrior
asked
Jun 3, 2016
Compiler Design
isro2009
compiler-design
code-optimization
+
–
8
votes
3
answers
36
ISRO2009-40 , GATE2008-IT_42
The two numbers given below are multiplied using the Booth's algorithm Multiplicand $: 0101\; 1010 \;1110 \;1110$ Multiplier $: 0111\; 0111\; 1011\; 1101$ How many additions/subtractions are required for the multiplication of the above two numbers? $6$ $8$ $10$ $12$
The two numbers given below are multiplied using the Booth's algorithmMultiplicand $: 0101\; 1010 \;1110 \;1110$Multiplier $: 0111\; 0111\; 1011\; 1101$How many additions...
Desert_Warrior
3.5k
views
Desert_Warrior
asked
Jun 3, 2016
Digital Logic
isro2009
digital-logic
booths-algorithm
+
–
10
votes
1
answer
37
ISRO2009-39 , GATE2008-IT_15
A processor that has carry, overflow and sign flag bits as part of its program status word (PSW) performs addition of the following two $2’s$ complement numbers $01001101$ and $11101001.$ After the execution of this addition operation, the status of the carry, overflow and sign flags, respectively will be $1, 1, 0$ $1, 0, 0$ $0, 1, 0$ $1, 0, 1$
A processor that has carry, overflow and sign flag bits as part of its program status word (PSW) performs addition of the following two $2’s$ complement numbers $010011...
Desert_Warrior
3.1k
views
Desert_Warrior
asked
Jun 3, 2016
Digital Logic
isro2009
number-representation
digital-logic
+
–
4
votes
3
answers
38
ISRO2009-36
Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per track. 512 bytes of data are stores in a bit serial manner in a sector. The capacity of the disk pack and the number of bits required to specify a particular sector in the disk are respectively 256 Mbyte, 19 bits 256 Mbute, 28 bits 512 Mbyte, 20 bits 64 Gbyte, 28 bits
Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per track. 512 bytes of data are stores in a bit serial manner in a sector. The capacity of ...
Desert_Warrior
8.3k
views
Desert_Warrior
asked
Jun 3, 2016
Operating System
isro2009
operating-system
disk
+
–
4
votes
2
answers
39
ISRO2009-34
The microinstructions stored in the control memory of a processor have a width of $26$ bits. Each microinstruction is divided into three fields. a micro operation field of $13$ bits, a next address field $\text{(X)},$ and a MUX select field $\text{(Y)}.$ There are $8$ status bits ... the size of the control memory in number of words? $10, 3, 1024$ $8, 5, 256$ $5, 8, 2048$ $10, 3, 512$
The microinstructions stored in the control memory of a processor have a width of $26$ bits. Each microinstruction is divided into three fields. a micro operation field o...
Desert_Warrior
2.7k
views
Desert_Warrior
asked
Jun 3, 2016
CO and Architecture
isro2009
co-and-architecture
control-unit
+
–
4
votes
3
answers
40
ISRO2009-32
The expression $1 * 2 \wedge 3 * 4 \wedge 5 * 6$ will be evaluated as $32^{30}$ $162^{30}$ 49152 173458 In original quetion 5 is not given.
The expression $1 * 2 \wedge 3 * 4 \wedge 5 * 6$ will be evaluated as$32^{30}$$162^{30}$49152173458In original quetion 5 is not given.
Desert_Warrior
2.9k
views
Desert_Warrior
asked
Jun 3, 2016
Compiler Design
isro2009
compiler-design
expression-evaluation
+
–
6
votes
3
answers
41
ISRO2009-29
A one dimensional array A has indices 1....75. Each element is a string and takes up three memory words. The array is stored at location 1120 decimal. The starting address of A[49] is 1267 1164 1264 1169
A one dimensional array A has indices 1....75. Each element is a string and takes up three memory words. The array is stored at location 1120 decimal. The starting addres...
Desert_Warrior
15.7k
views
Desert_Warrior
asked
Jun 3, 2016
Programming in C
isro2009
array
programming
+
–
6
votes
2
answers
42
ISRO2009-23
The process of organizing the memory into two banks to allow $8$-and $16$-bit data operation is called Bank switching Indexed mapping Two-way memory interleaving Memory segmentation
The process of organizing the memory into two banks to allow $8$-and $16$-bit data operation is calledBank switchingIndexed mappingTwo-way memory interleavingMemory segme...
Desert_Warrior
3.3k
views
Desert_Warrior
asked
Jun 3, 2016
CO and Architecture
isro2009
co-and-architecture
memory-interfacing
+
–
11
votes
3
answers
43
ISRO2009-22
A certain microprocessor requires $4.5$ microseconds to respond to an interrupt. Assuming that the three interrupts $\text{I}_1, \text{I}_2$ and $\text{I}_3$ require the following execution time after the interrupt is recognized: $\text{I}_1$ requires $25$ ... $24.5$ microseconds to $93.5$ microseconds $4.5$ microseconds to $24.5$ microseconds $29.5$ microseconds $93.5$ microseconds
A certain microprocessor requires $4.5$ microseconds to respond to an interrupt. Assuming that the three interrupts $\text{I}_1, \text{I}_2$ and $\text{I}_3$ require the ...
Desert_Warrior
4.5k
views
Desert_Warrior
asked
Jun 3, 2016
CO and Architecture
isro2009
co-and-architecture
interrupts
+
–
7
votes
4
answers
44
ISRO2009-21, UGCNET-Dec2012-II: 12
In which addressing mode, the effectives address of the operand is generated by adding a constant value to the content of a register? Absolute mode Indirect mode Immediate mode Index mode
In which addressing mode, the effectives address of the operand is generated by adding a constant value to the content of a register?Absolute modeIndirect modeImmediate m...
Desert_Warrior
6.1k
views
Desert_Warrior
asked
Jun 3, 2016
CO and Architecture
isro2009
co-and-architecture
ugcnetcse-dec2012-paper2
addressing-modes
+
–
6
votes
1
answer
45
ISRO2009-19
The switching expression corresponding to $f(\text{A, B, C, D}) = \Sigma(1, 4, 5, 9, 11, 12)$ is BC'D' + A'C'D + AB'D ABC' + ACD + B'C'D ACD' + A'BC' + AC'D' A'BD + ACD' + BCD'
The switching expression corresponding to $f(\text{A, B, C, D}) = \Sigma(1, 4, 5, 9, 11, 12)$ isBC'D' + A'C'D + AB'DABC' + ACD + B'C'DACD' + A'BC' + AC'D'A'BD + ACD' + BC...
Desert_Warrior
2.6k
views
Desert_Warrior
asked
Jun 3, 2016
Digital Logic
isro2009
digital-logic
boolean-algebra
+
–
7
votes
2
answers
46
ISRO2009-16
Consider a system having "n" resources of same type. These resources are shared by 3 processes, A, B, C. These have peak demands of 3, 4, and 6 respectively. For what value of "n" deadlock won't occur 15 9 10 13
Consider a system having "n" resources of same type. These resources are shared by 3 processes, A, B, C. These have peak demands of 3, 4, and 6 respectively. For what val...
Desert_Warrior
5.2k
views
Desert_Warrior
asked
Jun 3, 2016
Operating System
isro2009
operating-system
resource-allocation
deadlock-prevention-avoidance-detection
+
–
4
votes
1
answer
47
ISRO2009-9
Which is the correct definition of a valid process transition in an operating system? Wake up: ready $\rightarrow$ running Dispatch: ready $\rightarrow$ running Block: ready $\rightarrow$ running Timer runout: $\rightarrow$ ready $\rightarrow$ running
Which is the correct definition of a valid process transition in an operating system?Wake up: ready $\rightarrow$ runningDispatch: ready $\rightarrow$ runningBlock: ready...
Desert_Warrior
4.7k
views
Desert_Warrior
asked
Jun 3, 2016
Operating System
isro2009
operating-system
process
+
–
5
votes
5
answers
48
ISRO2009-5
What is the primary purpose of a VLAN? Demonstrating the proper layout for a network Simulating a network To create a virtual private network Segmenting a network inside a switch or device
What is the primary purpose of a VLAN?Demonstrating the proper layout for a networkSimulating a networkTo create a virtual private networkSegmenting a network inside a sw...
Desert_Warrior
6.1k
views
Desert_Warrior
asked
Jun 3, 2016
Computer Networks
isro2009
computer-networks
+
–
6
votes
2
answers
49
ISRO2009-3
The address resolution protocol (ARP) is used for Finding the IP address from the DNS Finding the IP address of the default gateway Finding the IP address that corresponds to a MAC address Finding the MAC address that corresponds to an IP address
The address resolution protocol (ARP) is used forFinding the IP address from the DNSFinding the IP address of the default gatewayFinding the IP address that corresponds t...
Desert_Warrior
2.1k
views
Desert_Warrior
asked
Jun 3, 2016
Computer Networks
isro2009
computer-networks
network-protocols
+
–
8
votes
3
answers
50
ISRO2009-8
The primary purpose of an operating system is To make most efficient use of the computer hardware To allow people to use the computer To keep systems programmers employed To make computers easier to use
The primary purpose of an operating system isTo make most efficient use of the computer hardwareTo allow people to use the computerTo keep systems programmers employedTo ...
Desert_Warrior
3.7k
views
Desert_Warrior
asked
Jun 3, 2016
Operating System
isro2009
operating-system
+
–
5
votes
2
answers
51
ISRO2009-7
Advanced Encryption Standard (AES) is based on Asymmetric key algorithm Symmetric key algorithm Public key algorithm Key exchange
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
jaiganeshcse94
3.8k
views
jaiganeshcse94
asked
Jun 2, 2016
Computer Networks
isro2009
computer-networks
cryptography
network-security
+
–
3
votes
1
answer
52
ISRO2009-75
Special software to create a job queue is called a Driver Spooler Interpreter Linkage editor
Special software to create a job queue is called aDriverSpoolerInterpreterLinkage editor
Kanimozhi
4.3k
views
Kanimozhi
asked
Jun 1, 2016
Operating System
isro2009
operating-system
process
+
–
2
votes
4
answers
53
ISRO2009-68
A testing method which is normally used as the acceptance test for a software system, is Regression Testing Integration Testing Unit Testing System Testing
A testing method which is normally used as the acceptance test for a software system, isRegression TestingIntegration TestingUnit TestingSystem Testing
Anuanu
6.4k
views
Anuanu
asked
May 30, 2016
IS&Software Engineering
isro2009
is&software-engineering
software-testing
+
–
5
votes
2
answers
54
ISRO2009-72
Purpose of 'Foreign Key' in a table is to ensure Null Integrity Referential Integrity Domain Integrity Null and Domain Integrity
Purpose of 'Foreign Key' in a table is to ensureNull IntegrityReferential IntegrityDomain IntegrityNull and Domain Integrity
Anuanu
3.9k
views
Anuanu
asked
May 30, 2016
Databases
isro2009
databases
referential-integrity
+
–
4
votes
4
answers
55
ISRO2009-74
Use of IPSEC in tunnel mode results in IP packet with same header IP packet with new header IP packet without header No changes in IP packet
Use of IPSEC in tunnel mode results inIP packet with same headerIP packet with new headerIP packet without headerNo changes in IP packet
Anuanu
3.3k
views
Anuanu
asked
May 30, 2016
Computer Networks
isro2009
computer-networks
ip-packet
+
–
7
votes
2
answers
56
ISRO2009-6
$\textsf{SHA-1}$ is a encryption algorithm decryption algorithm key exchange algorithm message digest function
$\textsf{SHA-1}$ is aencryption algorithmdecryption algorithmkey exchange algorithmmessage digest function
suryaji
2.2k
views
suryaji
asked
May 13, 2016
Computer Networks
isro2009
computer-networks
network-security
+
–
4
votes
4
answers
57
ISRO2009-69
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field? Replace Join Change Update
The 'command' used to change contents of one database using the contents of another database by linking them on a common key field?ReplaceJoinChangeUpdate
ajit
4.5k
views
ajit
asked
Oct 5, 2015
Databases
isro2009
databases
bad-question
+
–
8
votes
4
answers
58
ISRO2009-77
When a process is rolled back as a result of deadlock the difficulty which arises is Starvation System throughput Low device utilization Cycle stealing
When a process is rolled back as a result of deadlock the difficulty which arises isStarvationSystem throughputLow device utilizationCycle stealing
ajit
6.8k
views
ajit
asked
Oct 5, 2015
Operating System
isro2009
deadlock-prevention-avoidance-detection
+
–
7
votes
3
answers
59
ISRO2009-78
On receiving an interrupt from an I/O device,the CPU Halts for a predetermined time Branches off to the interrupt service routine after completion of the current instruction Branches off to the interrupt service routine immediately Hands over control of address bus and data bus to the interrupting device
On receiving an interrupt from an I/O device,the CPUHalts for a predetermined timeBranches off to the interrupt service routine after completion of the current instructio...
ajit
7.0k
views
ajit
asked
Oct 5, 2015
CO and Architecture
isro2009
co-and-architecture
io-handling
+
–
6
votes
4
answers
60
ISRO2009-79
Compared to CISC processors,RISC processors contain More register and smaller instruction set larger instruction set less registers and smaller instruction set more transistor elements
Compared to CISC processors,RISC processors containMore register and smaller instruction setlarger instruction setless registers and smaller instruction setmore transisto...
ajit
3.9k
views
ajit
asked
Oct 5, 2015
CO and Architecture
isro2009
co-and-architecture
instruction-format
+
–
Page:
« prev
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register