ISRO 2007 Computer Science Questions with Solution

Recent questions tagged isro2007

13 votes
3 answers
1
Djikstra’s algorithm is used toCreate LSAsFlood an internet with informationCalculate the routing tablesCreate a link state database
5 votes
3 answers
2
Which of the following models used for software reliabilityWaterfallMusaCOCOMORayleigh
3 votes
3 answers
3
In UML diagram of a classstate of object cannot be representedstate is irrelevantstate is represented as an attributestate is represented as a result of an operation
4 votes
2 answers
4
A physical DFD specifieswhat processes will be usedwho generates data and who processes itwhat each person in an organization doeswhich data will be generated
6 votes
2 answers
5
Which of the following is not an approach to Software Process Assessment?SPICE(ISO/IEC15504)Standard CMMI Assessment Method for process improvementISO 9001:2000IEEE 2000:...
10 votes
5 answers
6
When a host on network A sends a message to a host on network B, which address does the router look at?PortIPPhysicalSubnet mask
5 votes
3 answers
7
$\textsf{IEEE 802.11}$ is standard forEthernetBluetoothBroadband WirelessWireless LANs
8 votes
5 answers
8
Range of IP Address from $224.0.0.0$ to $239.255.255.255$ areReserved for loopbackReserved for broadcastUsed for multicast packetsReserved for future addressing
8 votes
3 answers
9
An email contains a texual birthday greeting, a picture of a cake and a song. The order is not important. What is the content-type?Multipart/mixedMultipart/parallelMultip...
8 votes
2 answers
10
Hashed message is signed by a sender usinghis public keyhis private keyreceiver’s public keyreceiver’s private key
5 votes
1 answer
11
The standard for certificates used on internet is$\textsf{X.25}$$\textsf{X.301}$$\textsf{X.409}$$\textsf{X.509}$
5 votes
2 answers
13
SSL is not responsible forMutual authentication of client & serverSecret communicationData Integrity protectionError detection and correction
8 votes
1 answer
14
To execute all loops at their boundaries and within their operational bounds is an example ofBlack Box TestingAlpha TestingRecovery TestingWhite Box Testing
7 votes
2 answers
15
Silly Window Syndrome is related toError during transmissionFile transfer protocolDegrade in TCP performanceInterface problem
4 votes
1 answer
16
Which of the following is not a UML DIAGRAM?Use CaseClass DiagramAnalysis DiagramSwimlane Diagram
8 votes
3 answers
17
Feedback queuesare very simple to implementdispatch tasks according to execution characteristicsare used to favour real time tasksrequire manual intervention to implement...
6 votes
1 answer
18
Which of these is not a feature of $\textsf{WAP 2.0}$Push and Pull ModelInterface to a storage deviceMultimedia messagingHashing
7 votes
2 answers
19
Let $X$ be the adjacency matrix of a graph $G$ with no self loops. The entries along the principal diagonal of $X$ areall zerosall onesboth zeros and onesdifferent
7 votes
5 answers
20
The Fibonacci sequence is the sequence of integers$1, 3, 5, 7, 9, 11, 13$$0, 1, 1, 2, 3, 5, 8, 13, 21, 34$$0, 1, 3, 4, 7, 11, 18, 29, 47$$0, 1, 3, 7, 15$
5 votes
3 answers
21
Which of the following is correct with respect to Two phase commit protocol?Ensures serializabilityPrevents DeadlockDetects DeadlockRecover from Deadlock
10 votes
3 answers
22
The time taken by binary search algorithm to search a key in a sorted array of $n$ elements is$O\: (\log_2 \: n)$$O \: (n)$$O \: (n \: \log_2 \: n)$$O \: (n^2)$
7 votes
2 answers
23
The average case and worst case complexities for Merge sort algorithm are$O \: (n^2), O\: (n^2)$$O \: (n^2), O\: (n \log_2 n)$$ O\: (n \log_2 n), O \: (n^2)$$ O\: (n \lo...
5 votes
4 answers
24
Which of the following programming language(s) provides garbage collection automaticallyLispC++FortanC
7 votes
2 answers
25
Which of the following RAID level provides the highest Data Transfer Rate (Read/Write)RAID 1RAID 3RAID 4RAID 5
6 votes
3 answers
26
Selection sort algorithm design technique is an example ofGreedy methodDivide-and-conquerDynamic ProgrammingBacktracking
4 votes
2 answers
27
BCNF is not used for cases where a relation hasTwo (or more) candidate keysTwo candidate keys and compositeThe candidate key overlapTwo mutually exclusive foreign keys
8 votes
5 answers
29
Which operation is used to extract specified columns from a table?ProjectJoinExtractSubstitute
5 votes
2 answers
30
Armstrong’s inference rule doesnot determineReflexivityAugmentationTransitivityMutual dependency