Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by sh!va
5
votes
4
answers
61
ISRO2017-44
Which of the following is associated with objects? State Behavior Identity All of the above
Which of the following is associated with objects?StateBehaviorIdentityAll of the above
4.6k
views
asked
May 7, 2017
Object Oriented Programming
isro2017
object-oriented-programming
non-gate
+
–
5
votes
1
answer
62
ISRO2017-43
Which of the following UML 2.0 diagrams capture behavioral aspects of a system? Use case diagram, Object diagram, Activity diagram and state machine diagram Use case diagram, Activity diagram and state machine diagram Object diagram, Communication Diagram, Timing diagram and Interaction diagram Object diagram, Composite structure diagram, package diagram and Deployment diagram
Which of the following UML 2.0 diagrams capture behavioral aspects of a system?Use case diagram, Object diagram, Activity diagram and state machine diagramUse case diagra...
6.7k
views
asked
May 7, 2017
Object Oriented Programming
isro2017
object-oriented-programming
non-gate
+
–
7
votes
3
answers
63
ISRO2017-42
Which of the following operator(s) cannot be overloaded? .(member Access or Dot operator) ?: (ternary or Conditional Operator) :: ( Scope Resolution Operator) All of the above
Which of the following operator(s) cannot be overloaded?.(member Access or Dot operator)?: (ternary or Conditional Operator):: ( Scope Resolution Operator)All of the abov...
4.7k
views
asked
May 7, 2017
Object Oriented Programming
isro2017
operator-overloading
+
–
5
votes
1
answer
64
ISRO2017-40
XPath is used to navigate through elements and attributes in XSL document XML document XHTML document XQuery document
XPath is used to navigate through elements and attributes inXSL documentXML documentXHTML documentXQuery document
3.4k
views
asked
May 7, 2017
Web Technologies
isro2017
web-technologies
xml
non-gate
+
–
8
votes
1
answer
65
ISRO 2017-39
Estimation at software development effort for organic software in basic COCOMO is: E = 2.0 (KLOC) 1.05 PM E = 3.4 (KLOC) 1.06 PM E = 2.4 (KLOC) 1.05 PM E = 2.4 (KLOC) 1.07 PM
Estimation at software development effort for organic software in basic COCOMO is:E = 2.0 (KLOC) 1.05 PME = 3.4 (KLOC) 1.06 PME = 2.4 (KLOC) 1.05 PME = 2.4 (KLOC) 1.07...
6.5k
views
asked
May 7, 2017
IS&Software Engineering
isro2017
is&software-engineering
non-gate
+
–
4
votes
2
answers
66
ISRO2017-38
What is WPA? wired protected access wi-fi protected access wired process access wi-fi process access
What is WPA?wired protected accesswi-fi protected accesswired process accesswi-fi process access
3.7k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
wifi
+
–
4
votes
3
answers
67
ISRO2017-37
Pretty Good Privacy (PGP) is used in: Browser security FTP security Email security None of the above
Pretty Good Privacy (PGP) is used in:Browser securityFTP securityEmail securityNone of the above
8.5k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
+
–
5
votes
1
answer
68
ISRO2017-36
Which protocol suite designed by IETF to provide security for a packet at the Internet layer? IPSec NetSec PacketSec SSL
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?IPSecNetSecPacketSecSSL
4.9k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
+
–
7
votes
2
answers
69
ISRO2017-34
Match with the suitable one : ... $\text{A-3, B-4, C-1, D-2}$ $\text{A-3, B-1, C-4, D-2}$
Match with the suitable one :$\begin{array} {clcl} & \textbf{List-1} & & \textbf{List-2} \\ \text{(A)} & \text{Multicast group membership }& \text{1.} & \text{Distance V...
4.4k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
distance-vector-routing
+
–
6
votes
3
answers
70
ISRO2017-35
$\text{MD5}$ is a widely used hash function for producing hash value of $64$ bits $128$ bits $512$ bits $1024$ bits
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
4.4k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
cryptography
+
–
5
votes
1
answer
71
ISRO2017-33
An Ethernet frame that is less than the $\textsf{IEEE 802.3}$ minimum length of $64$ octets is called Short frame Small frame Mini frame Runt frame
An Ethernet frame that is less than the $\textsf{IEEE 802.3}$ minimum length of $64$ octets is calledShort frameSmall frameMini frameRunt frame
4.8k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
ethernet
+
–
11
votes
4
answers
72
ISRO2017-32
Which media access control protocol is used by $\textsf{IEEE 802.11}$ wireless LAN? CDMA CSMA/CA ALOHA None of the above
Which media access control protocol is used by $\textsf{IEEE 802.11}$ wireless LAN?CDMACSMA/CAALOHANone of the above
5.2k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
mac-protocol
+
–
4
votes
4
answers
73
ISRO2017-31
Which of the following protocol is used for transferring electronic mail messages from one machine to another? TELNET FTP SNMP SMTP
Which of the following protocol is used for transferring electronic mail messages from one machine to another?TELNETFTPSNMPSMTP
3.6k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-protocols
+
–
8
votes
4
answers
74
ISRO2017-30
If there are $n$ devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively $n(n-1)/2$, $n-1$ $n$, $n-1$ $n-1$, $n$ $n-1$, $n(n -1)/ 2$
If there are $n$ devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively$n(n-1)/2$, $n-1$$n$,...
8.8k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-topologies
+
–
6
votes
5
answers
75
ISRO2017-29
The default subnet mask for a class B network can be $255.255.255.0$ $255.0.0.0$ $255.255.192.0$ $255.255.0.0$
The default subnet mask for a class B network can be$255.255.255.0$$255.0.0.0$$255.255.192.0$$255.255.0.0$
3.1k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
subnetting
+
–
5
votes
4
answers
76
ISRO2017-28
In networking terminology UTP means Uniquitous teflon port Uniformly terminating port Unshielded twisted pair Unshielded T-connector port
In networking terminology UTP meansUniquitous teflon portUniformly terminating portUnshielded twisted pairUnshielded T-connector port
2.8k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-layer
+
–
8
votes
3
answers
77
ISRO2017-27
Physical topology of FDDI is? Bus Ring Star None of the above
Physical topology of FDDI is?BusRingStarNone of the above
6.5k
views
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-topologies
+
–
4
votes
3
answers
78
ISRO2017-26
Advantage of synchronous sequential circuits over asynchronous one is : Lower hardware requirement Better noise immunity Faster operation All of the above
Advantage of synchronous sequential circuits over asynchronous one is :Lower hardware requirementBetter noise immunityFaster operationAll of the above
10.8k
views
asked
May 7, 2017
Digital Logic
isro2017
digital-logic
digital-circuits
bad-question
+
–
11
votes
4
answers
79
ISRO 2017-25
The 2-input XOR has a high output only when the input values are (a) low (b) high (c) same (d) different
The 2-input XOR has a high output only when the input values are(a) low(b) high(c) same(d) different
2.9k
views
asked
May 7, 2017
Digital Logic
isro2017
+
–
9
votes
4
answers
80
ISRO2017-24
When two $n$-bit binary numbers are added the sum will contain at the most $n$ bits $n + 2$ bits $n + 3$ bits $n + 1$ bits
When two $n$-bit binary numbers are added the sum will contain at the most$n$ bits$n + 2$ bits$n + 3$ bits$n + 1$ bits
7.8k
views
asked
May 7, 2017
Digital Logic
isro2017
digital-logic
adder
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
...
31
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register