ISRO 2017 Computer Science Questions with Solution

Recent questions tagged isro2017

6 votes
2 answers
32
Capability maturity Model (CMM) is the methodology todevelop and refine an organization's software development processdevelop the softwaretest the softwareAll of the abov...
5 votes
2 answers
33
SATA is the abbreviation ofSerial Advanced Technology AttachmentSerial Advanced Technology ArchitectureSerial Advanced Technology AdapterSerial Advanced Technology Array
7 votes
2 answers
34
Which of these is characteristic of $\textsf{RAID 5}?$Dedicated parityDouble parityHamming code parityDistributed parity
5 votes
4 answers
35
Which of the following is associated with objects?StateBehaviorIdentityAll of the above
7 votes
3 answers
37
Which of the following operator(s) cannot be overloaded?.(member Access or Dot operator)?: (ternary or Conditional Operator):: ( Scope Resolution Operator)All of the abov...
5 votes
1 answer
38
XPath is used to navigate through elements and attributes inXSL documentXML documentXHTML documentXQuery document
8 votes
1 answer
39
Estimation at software development effort for organic software in basic COCOMO is:E = 2.0 (KLOC) 1.05 PME = 3.4 (KLOC) 1.06 PME = 2.4 (KLOC) 1.05 PME = 2.4 (KLOC) 1.07...
4 votes
2 answers
40
What is WPA?wired protected accesswi-fi protected accesswired process accesswi-fi process access
4 votes
3 answers
41
Pretty Good Privacy (PGP) is used in:Browser securityFTP securityEmail securityNone of the above
5 votes
1 answer
42
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?IPSecNetSecPacketSecSSL
7 votes
2 answers
43
Match with the suitable one :$\begin{array} {clcl} & \textbf{List-1} & & \textbf{List-2} \\ \text{(A)} & \text{Multicast group membership }& \text{1.} & \text{Distance V...
6 votes
3 answers
44
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
5 votes
1 answer
45
An Ethernet frame that is less than the $\textsf{IEEE 802.3}$ minimum length of $64$ octets is calledShort frameSmall frameMini frameRunt frame
11 votes
4 answers
46
Which media access control protocol is used by $\textsf{IEEE 802.11}$ wireless LAN?CDMACSMA/CAALOHANone of the above
4 votes
4 answers
47
Which of the following protocol is used for transferring electronic mail messages from one machine to another?TELNETFTPSNMPSMTP
8 votes
4 answers
48
If there are $n$ devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively$n(n-1)/2$, $n-1$$n$,...
6 votes
5 answers
49
The default subnet mask for a class B network can be$255.255.255.0$$255.0.0.0$$255.255.192.0$$255.255.0.0$
5 votes
4 answers
50
In networking terminology UTP meansUniquitous teflon portUniformly terminating portUnshielded twisted pairUnshielded T-connector port
8 votes
3 answers
51
Physical topology of FDDI is?BusRingStarNone of the above
4 votes
3 answers
52
Advantage of synchronous sequential circuits over asynchronous one is :Lower hardware requirementBetter noise immunityFaster operationAll of the above
11 votes
4 answers
53
The 2-input XOR has a high output only when the input values are(a) low(b) high(c) same(d) different
9 votes
4 answers
54
When two $n$-bit binary numbers are added the sum will contain at the most$n$ bits$n + 2$ bits$n + 3$ bits$n + 1$ bits
10 votes
3 answers
55
A cache memory needs an access time of $30$ ns and main memory $150$ ns, what is average access time of CPU (assume hit ratio $= 80\%)?$$60$ ns$30$ ns$150$ ns$70$ ns
9 votes
2 answers
56
Which interrupt in $8085$ Microprocessor is unmaskable?$\textsf{RST 5.5}$$\textsf{RST 7.5}$$\textsf{TRAP}$Both (a) and (b)
9 votes
2 answers
57
The most appropriate matching for the following pairs :$\begin{array}{clcl} \text{X.} & \text{Indirect Addressing} & \text{i.} & \text{Loop} \\ \text{Y.} & \text{Immedi...
11 votes
3 answers
59
ACID properties of a transactions areAtomicity, consistency, isolation, databaseAtomicity, consistency, isolation, durabilityAtomicity, consistency, integrity, durability...
5 votes
3 answers
60
Which of the following concurrency control protocol ensures both conflict and free from deadlock? ,Time stamp ordering2 Phase lockingBoth (a) and (b)None of the above