Govt. Exams Sample Papers

ISRO CS Question Paper

Computer Science Questions
Share with your Friends...
Share on Facebook
Tweet about this on Twitter
Share on LinkedIn
Pin on Pinterest
Print this page

ISRO Computer Science 2007:

Q 1. When two numbers are added in excess-3 code and the sum is less than 9, then in order to get the correct answer it is necessary to
(a) subtract 0011 from the sum
(b) acid 0011 to the sum
(c) subtract 0110 from the sum
(d) add 0110 to the sum

Q 2. A graph with “n” vertices and n-1 edges that is not a tree, is
(a) Connected
(b) Disconnected
(c) Euler
(d) A circuit

Q 3. If a graph requires k different colours for its proper colouring, then the chromatic number of the graph is
(a) 1
(b) k
(c) k-1
(d) k/2

Q 4. A read bit can be read
(a) and written by CPU
(b) and written by peripheral
(c) by pheripheral and written by CPU
(d) by CPU and written by the peripheral

Q 5. The term “aging” refers to
(a ) booting up the priority of a process in multi-level of queue without feedback.
(b) gradually increasing the priority of jobs that wait in the system for a long time to remedy infinite blocking.
(c) keeping track of the following a page has been in memory for the purpose of LRU replacement
(d) letting job reside in memory for a certain amount of time so that the number of pages required can be estimated accurately.

Related: ISRO ME Question Papers

Q 6. Consider a set of n tasks with known runtimes r1s r2 …….    rn    to be run on a uniprocessor machine. Which of the following processor scheduling algorithms will result in the maximum throughput?
(a) Round Robin
(b) Shortest job first
(c) Highest response ratio next
(d) first cum first served

Q 7. By using an eight bit optical encoder the degree of resolution that can be obtained is (approximately)
(a) 1.8°
(b) 3.4°
(c) 2.8 °
(d) 1.4°

Q 8. The principal of locality of reference justifies the use of
(a) virtual memory
(b) interrupts
(c) main memory
(d) cache memory

Q 9. The five items: A, B, C, D, and E are pushed in a stack, one after the other starting from A. The stack is popped four times and each element is inserted in a queue. Then two elements are deleted from the queue and pushed back on the stack. Now one item is popped from the stack. The popped item is
(a) A
(b) B
(c) C
(d) D

Q 10. Round Robin scheduling is essentially the pre-emptive version of
(a) FIFO
(b) Shortest Job First
(c) Shortest remaining time
(d) Longest remaining time

Download Complete paper in PDF:

Previous Paper ISRO Scientist Computer Science (2008):

Q 1. The term Phong is associated with
(a) Ray tracing
(b) shading
(c) Hiddenline removal
(d) a game

Q 2. The subnet mask
(a)  extends the network portion to 16 bits
(b)  extends the network portion to 26 bits
(c)  extends the network portion to 36 bits
(d)  has no effect on the network portion of an IP address

Q 3. On a LAN, where are IP datagrams transported?
(a)  In the LAN header
(b)  In the Application field
(c)  In the Information field of the LAN frame
(d)  After the TCP header.

Q 4. In Ethernet, the source address field in the MAC frame is the address.
(a)  original sender’s physical
(b)  previous station’s physical
(c)  next destination’s physical
(d)  original sender’s service port

Q 5. Which of the following transmission media is not readily suitable to CSMA operation?

(a) Radio
(b) Optical fibers
(c) Coaxial cable
(d) Twisted pair

Q 6. The TCP sliding window
(a)  can be used to control the flow of information
(b)  always occurs when the field value is 0
(c)  always occurs when the field value is 1
(d)  occurs horizontally

Q 7. What is the bandwidth of a signal that ranges from 40 kHz to 4 MHz?
(a) 36 MHz
(b) 360 kHz
(c) 3.96 MHz
(d) 396 kHz

Related: Best B. Tech / BE (Computer Science) Colleges in India

Q 8. Which Project 802 standard provides for a collision-free protocol?
(a) 802.2
(b) 802.3
(c) 802.5
(d) 802.6

Q 9. Assume that each character code consists of 8 bits. The number of characters that can be transmitted per second through an synchronous serial line at 2400 baud rate, and with two stop bits is
(a) 109
(b) 216
(c) 218
(d) 219

Q 10. Four jobs to be executed on a single processor system arrive at time 0 in the order A, B, C, D. There burst CPU time requirements are 4,1, 8, 1, time units respectively. The completion time of A under robin round scheduling with time slice of one time unit is
(a) 10
(b) 4
(c) 8
(d) 9

Download 2008 year paper:

ISRO Computer Science (2009) Year Paper:

Q 1. The subnet mask for a particular network is Which of the following pairs of IP addresses could belong to this network?
(a) and
(b) and
(c) and
(d) and     ,

Q 2. In networking, DTP stands for
(a) Unshielded T-connector port
(b) Unshielded twisted pair
(c) Unshielded terminating pair
(d) Universal transmission process

Q 3. The address resolution protocol (ARP) is used for
(a) Finding the IP address from the DNS
(b) Finding the IP address of the default gateway
(c) Finding the IP address that corresponds to a MAC address
(d) Finding the MAC address that corresponds to an IP address

Q 4. Which of the following is a MAC address?
(b) 00056A:01A5CCA7FF60
(c) 568, Airport Road
(d) 01 :A5:BB:A7:FF:60

Q 5. What is the primary purpose of a VLAN?
(a) Demonstrating the proper layout for a network
(b) Simulating a network
(c) To create a virtual private network
(d) Segmenting a network inside a switch or device

Q 6. SHA-1 is a
(a) Encryption algorithm
(b) Decryption algorithm
(c) Key exchange algorithm
(d) Message digest function.

Q 7. Advanced Encryption Standard (AES) is based on
(a) Asymmetric key algorithm
(b) Symmetric key algorithm
(c) Public key algorithm
(d) Key exchange

Q 8. The primary purpose of an operating system is
(a) To make the most efficient use of the computer hardware
(b) To allow people to use the computer
(c) To keep systems programmers employed
(d) To make computers easier to use

Q 9. A page fault
(a) Occurs when a program accesses an available page of memory
(b) Is an error in a specific page
(c) Is a reference to a page belonging to another program
(d) Occurs when a program accesses a page not currently in memory

Q 10. Using larger block size in a fixed block size file system leads to
(a) Better disk throughput but poorer disk space utilization
(b) Better disk throughput and better disk space utilization
(c) Poorer disk throughput but better disk space utilization
(d) Poorer disk throughput and poorer disk space utilization

Download ISRO CS 2009 Paper:

Share with your Friends...
Share on Facebook
Tweet about this on Twitter
Share on LinkedIn
Pin on Pinterest
Print this page

About the author

Vishal Arora

Leave a Comment