Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
ISRO 2017 Computer Science Questions with Solution
Recent questions tagged isro2017
12
votes
9
answers
31
ISRO2017-22
Which one of the following Boolean expressions is NOT a tautology? $((a \rightarrow b) \wedge (b \rightarrow c)) \rightarrow (a \rightarrow c)$ $(a \leftrightarrow c) \rightarrow (\sim b\rightarrow (a\wedge c))$ $(a\wedge b \wedge c)\rightarrow (c \vee a)$ $a\rightarrow (b\rightarrow a)$
Which one of the following Boolean expressions is NOT a tautology?$((a \rightarrow b) \wedge (b \rightarrow c)) \rightarrow (a \rightarrow c)$$(a \leftrightarrow c) \rig...
sh!va
7.2k
views
sh!va
asked
May 7, 2017
Mathematical Logic
isro2017
mathematical-logic
propositional-logic
+
–
6
votes
2
answers
32
ISRO2017-47
Capability maturity Model (CMM) is the methodology to develop and refine an organization's software development process develop the software test the software All of the above
Capability maturity Model (CMM) is the methodology todevelop and refine an organization's software development processdevelop the softwaretest the softwareAll of the abov...
sh!va
4.6k
views
sh!va
asked
May 7, 2017
IS&Software Engineering
isro2017
is&software-engineering
non-gate
cmm-model
+
–
5
votes
2
answers
33
ISRO2017-46
SATA is the abbreviation of Serial Advanced Technology Attachment Serial Advanced Technology Architecture Serial Advanced Technology Adapter Serial Advanced Technology Array
SATA is the abbreviation ofSerial Advanced Technology AttachmentSerial Advanced Technology ArchitectureSerial Advanced Technology AdapterSerial Advanced Technology Array
sh!va
2.8k
views
sh!va
asked
May 7, 2017
Computer Peripherals
isro2017
computer-peripherals
non-gate
+
–
7
votes
2
answers
34
ISRO2017-45
Which of these is characteristic of $\textsf{RAID 5}?$ Dedicated parity Double parity Hamming code parity Distributed parity
Which of these is characteristic of $\textsf{RAID 5}?$Dedicated parityDouble parityHamming code parityDistributed parity
sh!va
4.5k
views
sh!va
asked
May 7, 2017
Databases
isro2017
databases
file-system
non-gate
+
–
5
votes
4
answers
35
ISRO2017-44
Which of the following is associated with objects? State Behavior Identity All of the above
Which of the following is associated with objects?StateBehaviorIdentityAll of the above
sh!va
4.5k
views
sh!va
asked
May 7, 2017
Object Oriented Programming
isro2017
object-oriented-programming
non-gate
+
–
5
votes
1
answer
36
ISRO2017-43
Which of the following UML 2.0 diagrams capture behavioral aspects of a system? Use case diagram, Object diagram, Activity diagram and state machine diagram Use case diagram, Activity diagram and state machine diagram Object diagram, Communication Diagram, Timing diagram and Interaction diagram Object diagram, Composite structure diagram, package diagram and Deployment diagram
Which of the following UML 2.0 diagrams capture behavioral aspects of a system?Use case diagram, Object diagram, Activity diagram and state machine diagramUse case diagra...
sh!va
6.6k
views
sh!va
asked
May 7, 2017
Object Oriented Programming
isro2017
object-oriented-programming
non-gate
+
–
7
votes
3
answers
37
ISRO2017-42
Which of the following operator(s) cannot be overloaded? .(member Access or Dot operator) ?: (ternary or Conditional Operator) :: ( Scope Resolution Operator) All of the above
Which of the following operator(s) cannot be overloaded?.(member Access or Dot operator)?: (ternary or Conditional Operator):: ( Scope Resolution Operator)All of the abov...
sh!va
4.7k
views
sh!va
asked
May 7, 2017
Object Oriented Programming
isro2017
operator-overloading
+
–
5
votes
1
answer
38
ISRO2017-40
XPath is used to navigate through elements and attributes in XSL document XML document XHTML document XQuery document
XPath is used to navigate through elements and attributes inXSL documentXML documentXHTML documentXQuery document
sh!va
3.4k
views
sh!va
asked
May 7, 2017
Web Technologies
isro2017
web-technologies
xml
non-gate
+
–
8
votes
1
answer
39
ISRO 2017-39
Estimation at software development effort for organic software in basic COCOMO is: E = 2.0 (KLOC) 1.05 PM E = 3.4 (KLOC) 1.06 PM E = 2.4 (KLOC) 1.05 PM E = 2.4 (KLOC) 1.07 PM
Estimation at software development effort for organic software in basic COCOMO is:E = 2.0 (KLOC) 1.05 PME = 3.4 (KLOC) 1.06 PME = 2.4 (KLOC) 1.05 PME = 2.4 (KLOC) 1.07...
sh!va
6.5k
views
sh!va
asked
May 7, 2017
IS&Software Engineering
isro2017
is&software-engineering
non-gate
+
–
4
votes
2
answers
40
ISRO2017-38
What is WPA? wired protected access wi-fi protected access wired process access wi-fi process access
What is WPA?wired protected accesswi-fi protected accesswired process accesswi-fi process access
sh!va
3.7k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
wifi
+
–
4
votes
3
answers
41
ISRO2017-37
Pretty Good Privacy (PGP) is used in: Browser security FTP security Email security None of the above
Pretty Good Privacy (PGP) is used in:Browser securityFTP securityEmail securityNone of the above
sh!va
8.5k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
+
–
5
votes
1
answer
42
ISRO2017-36
Which protocol suite designed by IETF to provide security for a packet at the Internet layer? IPSec NetSec PacketSec SSL
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?IPSecNetSecPacketSecSSL
sh!va
4.9k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
+
–
7
votes
2
answers
43
ISRO2017-34
Match with the suitable one : ... $\text{A-3, B-4, C-1, D-2}$ $\text{A-3, B-1, C-4, D-2}$
Match with the suitable one :$\begin{array} {clcl} & \textbf{List-1} & & \textbf{List-2} \\ \text{(A)} & \text{Multicast group membership }& \text{1.} & \text{Distance V...
sh!va
4.3k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
distance-vector-routing
+
–
6
votes
3
answers
44
ISRO2017-35
$\text{MD5}$ is a widely used hash function for producing hash value of $64$ bits $128$ bits $512$ bits $1024$ bits
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
sh!va
4.3k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
cryptography
+
–
5
votes
1
answer
45
ISRO2017-33
An Ethernet frame that is less than the $\textsf{IEEE 802.3}$ minimum length of $64$ octets is called Short frame Small frame Mini frame Runt frame
An Ethernet frame that is less than the $\textsf{IEEE 802.3}$ minimum length of $64$ octets is calledShort frameSmall frameMini frameRunt frame
sh!va
4.8k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
ethernet
+
–
11
votes
4
answers
46
ISRO2017-32
Which media access control protocol is used by $\textsf{IEEE 802.11}$ wireless LAN? CDMA CSMA/CA ALOHA None of the above
Which media access control protocol is used by $\textsf{IEEE 802.11}$ wireless LAN?CDMACSMA/CAALOHANone of the above
sh!va
5.1k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
mac-protocol
+
–
4
votes
4
answers
47
ISRO2017-31
Which of the following protocol is used for transferring electronic mail messages from one machine to another? TELNET FTP SNMP SMTP
Which of the following protocol is used for transferring electronic mail messages from one machine to another?TELNETFTPSNMPSMTP
sh!va
3.5k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-protocols
+
–
8
votes
4
answers
48
ISRO2017-30
If there are $n$ devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively $n(n-1)/2$, $n-1$ $n$, $n-1$ $n-1$, $n$ $n-1$, $n(n -1)/ 2$
If there are $n$ devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively$n(n-1)/2$, $n-1$$n$,...
sh!va
8.6k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-topologies
+
–
6
votes
5
answers
49
ISRO2017-29
The default subnet mask for a class B network can be $255.255.255.0$ $255.0.0.0$ $255.255.192.0$ $255.255.0.0$
The default subnet mask for a class B network can be$255.255.255.0$$255.0.0.0$$255.255.192.0$$255.255.0.0$
sh!va
3.0k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
subnetting
+
–
5
votes
4
answers
50
ISRO2017-28
In networking terminology UTP means Uniquitous teflon port Uniformly terminating port Unshielded twisted pair Unshielded T-connector port
In networking terminology UTP meansUniquitous teflon portUniformly terminating portUnshielded twisted pairUnshielded T-connector port
sh!va
2.7k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-layer
+
–
8
votes
3
answers
51
ISRO2017-27
Physical topology of FDDI is? Bus Ring Star None of the above
Physical topology of FDDI is?BusRingStarNone of the above
sh!va
6.4k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-topologies
+
–
4
votes
3
answers
52
ISRO2017-26
Advantage of synchronous sequential circuits over asynchronous one is : Lower hardware requirement Better noise immunity Faster operation All of the above
Advantage of synchronous sequential circuits over asynchronous one is :Lower hardware requirementBetter noise immunityFaster operationAll of the above
sh!va
10.6k
views
sh!va
asked
May 7, 2017
Digital Logic
isro2017
digital-logic
digital-circuits
bad-question
+
–
11
votes
4
answers
53
ISRO 2017-25
The 2-input XOR has a high output only when the input values are (a) low (b) high (c) same (d) different
The 2-input XOR has a high output only when the input values are(a) low(b) high(c) same(d) different
sh!va
2.9k
views
sh!va
asked
May 7, 2017
Digital Logic
isro2017
+
–
9
votes
4
answers
54
ISRO2017-24
When two $n$-bit binary numbers are added the sum will contain at the most $n$ bits $n + 2$ bits $n + 3$ bits $n + 1$ bits
When two $n$-bit binary numbers are added the sum will contain at the most$n$ bits$n + 2$ bits$n + 3$ bits$n + 1$ bits
sh!va
7.7k
views
sh!va
asked
May 7, 2017
Digital Logic
isro2017
digital-logic
adder
+
–
10
votes
3
answers
55
ISRO2017-21
A cache memory needs an access time of $30$ ns and main memory $150$ ns, what is average access time of CPU (assume hit ratio $= 80\%)?$ $60$ ns $30$ ns $150$ ns $70$ ns
A cache memory needs an access time of $30$ ns and main memory $150$ ns, what is average access time of CPU (assume hit ratio $= 80\%)?$$60$ ns$30$ ns$150$ ns$70$ ns
sh!va
13.2k
views
sh!va
asked
May 7, 2017
CO and Architecture
isro2017
co-and-architecture
cache-memory
+
–
9
votes
2
answers
56
ISRO2017-20
Which interrupt in $8085$ Microprocessor is unmaskable? $\textsf{RST 5.5}$ $\textsf{RST 7.5}$ $\textsf{TRAP}$ Both (a) and (b)
Which interrupt in $8085$ Microprocessor is unmaskable?$\textsf{RST 5.5}$$\textsf{RST 7.5}$$\textsf{TRAP}$Both (a) and (b)
sh!va
4.3k
views
sh!va
asked
May 7, 2017
CO and Architecture
isro2017
8085-microprocessor
non-gate
+
–
9
votes
2
answers
57
ISRO2017-19
The most appropriate matching for the following pairs : ... $\text{X-ii, Y-iii, Z-i}$ $\text{X-iii, Y-i, Z-ii}$ $\text{X-ii, Y-i, Z-iii}$
The most appropriate matching for the following pairs :$\begin{array}{clcl} \text{X.} & \text{Indirect Addressing} & \text{i.} & \text{Loop} \\ \text{Y.} & \text{Immedi...
sh!va
3.0k
views
sh!va
asked
May 7, 2017
CO and Architecture
isro2017
co-and-architecture
addressing-modes
match-the-following
easy
+
–
7
votes
6
answers
58
ISRO2017-41
What is the output of the C++ program? #include <iostream> using namespace std; void square(int *x){ *x = (*x)++ * (*x); } void square(int *x, int *y){ *x = (*x) * --(*y); } int main() { int number = 30; square(&number, &number); cout<<number; return 0; } 910 920 870 900
What is the output of the C++ program? #include <iostream using namespace std; void square(int *x){ *x = (*x)++ * (*x); } void square(int *x, int *y){ *x = (*x) * (*y); ...
kauray
7.0k
views
kauray
asked
May 7, 2017
Object Oriented Programming
isro2017
object-oriented-programming
+
–
11
votes
3
answers
59
ISRO2017-6
ACID properties of a transactions are Atomicity, consistency, isolation, database Atomicity, consistency, isolation, durability Atomicity, consistency, integrity, durability Atomicity, consistency, integrity, database
ACID properties of a transactions areAtomicity, consistency, isolation, databaseAtomicity, consistency, isolation, durabilityAtomicity, consistency, integrity, durability...
sh!va
4.7k
views
sh!va
asked
May 7, 2017
Databases
isro2017
databases
transaction-and-concurrency
+
–
5
votes
3
answers
60
ISRO 2017-5
Which of the following concurrency control protocol ensures both conflict and free from deadlock? , Time stamp ordering 2 Phase locking Both (a) and (b) None of the above
Which of the following concurrency control protocol ensures both conflict and free from deadlock? ,Time stamp ordering2 Phase lockingBoth (a) and (b)None of the above
sh!va
5.0k
views
sh!va
asked
May 7, 2017
Databases
isro2017
databases
transaction-and-concurrency
+
–
Page:
« prev
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register