Govt. Exams Sample Papers

ISRO CS Question Paper

Computer Science Questions

ISRO Computer Science 2007:

Ques. In UML diagram of a class
(a) state of object cannot be represented
(b) state is irrelevant
(c) state is represented as an attribute
(d) state is represented as a result of an operation

Ques. When two numbers are added in excess-3 code and the sum is less than 9, then in order to get the correct answer it is necessary to
(a) subtract 0011 from the sum
(b) acid 0011 to the sum
(c) subtract 0110 from the sum
(d) add 0110 to the sum

Ques. A graph with “n” vertices and n-1 edges that is not a tree, is
(a) Connected
(b) Disconnected
(c) Euler
(d) A circuit

Ques. IEEE 802.11 is standard for
(a) Ethernet
(b) Bluetooth
(c) Broadband Wireless
(d) Wireless LANs

Ques. If a graph requires k different colours for its proper colouring, then the chromatic number of the graph is
(a) 1
(b) k
(c) k-1
(d) k/2

Ques. A read bit can be read
(a) and written by CPU
(b) and written by peripheral
(c) by pheripheral and written by CPU
(d) by CPU and written by the peripheral

Ques. A physical DFD specifies
(a) what processes will be used
(b) who generates data and who processes it
(c) what each person in an organization does
(d) which data will be generated

Ques. SSL is not responsible for
(a) Mutual authentication of client & server
(b) Secret communication
(c) Data Integrity protection
(d) Error detection & correction

Ques. The term “aging” refers to
(a ) booting up the priority of a process in multi-level of queue without feedback.
(b) gradually increasing the priority of jobs that wait in the system for a long time to remedy infinite blocking.
(c) keeping track of the following a page has been in memory for the purpose of LRU replacement
(d) letting job reside in memory for a certain amount of time so that the number of pages required can be estimated accurately.

Related: ISRO ME Question Papers

Ques. Consider a set of n tasks with known runtimes r1s r2 …….    rn    to be run on a uniprocessor machine. Which of the following processor scheduling algorithms will result in the maximum throughput?
(a) Round Robin
(b) Shortest job first
(c) Highest response ratio next
(d) first cum first served

Ques. Silly Window Syndrome is related to
(a) Error during transmission
(b) File transfer protocol
(c) Degrade in TCP performance
(d) Interface problem

Ques. By using an eight bit optical encoder the degree of resolution that can be obtained is (approximately)
(a) 1.8°
(b) 3.4°
(c) 2.8 °
(d) 1.4°

Ques. The principal of locality of reference justifies the use of
(a) virtual memory
(b) interrupts
(c) main memory
(d) cache memory

Ques. The five items: A, B, C, D, and E are pushed in a stack, one after the other starting from A. The stack is popped four times and each element is inserted in a queue. Then two elements are deleted from the queue and pushed back on the stack. Now one item is popped from the stack. The popped item is
(a) A
(b) B
(c) C
(d) D

Ques. Round Robin scheduling is essentially the pre-emptive version of
(a) FIFO
(b) Shortest Job First
(c) Shortest remaining time
(d) Longest remaining time

Download Complete paper in PDF:

Previous Paper ISRO Scientist Computer Science (2008):

Ques. The term Phong is associated with
(a) Ray tracing
(b) shading
(c) Hiddenline removal
(d) a game

Ques. Repeated execution of simple computation may cause compounding of
(a) round-off errors
(b) syntax errors
(c) run-time errors
(d) logic errors

Ques. The subnet mask
(a)  extends the network portion to 16 bits
(b)  extends the network portion to 26 bits
(c)  extends the network portion to 36 bits
(d)  has no effect on the network portion of an IP address

Ques. A Steiner patch is
(a) Biquadratic Bezier patch
(b) Bicubic patch
(c) Circular patch only
(d) Bilinear Bezier patch

Ques. On a LAN, where are IP datagrams transported?
(a)  In the LAN header
(b)  In the Application field
(c)  In the Information field of the LAN frame
(d)  After the TCP header.

Ques. In Ethernet, the source address field in the MAC frame is the address.
(a)  original sender’s physical
(b)  previous station’s physical
(c)  next destination’s physical
(d)  original sender’s service port

Ques. We can make a class abstract by
(a) Declaring it abstract using the virtual keyword
(b) Making at least one member function as virtual function
(c) Making at least one member function as pure virtual function
(d) Making all member function const.

Ques. Which of the following transmission media is not readily suitable to CSMA operation?
(a) Radio
(b) Optical fibers
(c) Coaxial cable
(d) Twisted pair

Ques. The TCP sliding window
(a)  can be used to control the flow of information
(b)  always occurs when the field value is 0
(c)  always occurs when the field value is 1
(d)  occurs horizontally

Ques. What is the bandwidth of a signal that ranges from 40 kHz to 4 MHz?
(a) 36 MHz
(b) 360 kHz
(c) 3.96 MHz
(d) 396 kHz

Related: Best B. Tech / BE (Computer Science) Colleges in India

Ques. Which Project 802 standard provides for a collision-free protocol?
(a) 802.2
(b) 802.3
(c) 802.5
(d) 802.6

Ques. The performance of Round Robin algorithm depends heavily on
(a) size of the process
(b) the I/O bursts of the process
(c) the CPU bursts of the process
(d) the size of the time quantum

Ques. Assume that each character code consists of 8 bits. The number of characters that can be transmitted per second through an synchronous serial line at 2400 baud rate, and with two stop bits is
(a) 109
(b) 216
(c) 218
(d) 219

Ques. Four jobs to be executed on a single processor system arrive at time 0 in the order A, B, C, D. There burst CPU time requirements are 4,1, 8, 1, time units respectively. The completion time of A under robin round scheduling with time slice of one time unit is
(a) 10
(b) 4
(c) 8
(d) 9

Ques. A critical section is a program segment
(a) which should run in a certain specified amount of time
(b) which avoids deadlock
(c) where shared resources are accessed
(d) which must be endorsed by a pair of semaphore operations, P & U

Download 2008 year paper:

ISRO Computer Science (2009) Year Paper:

Ques. Substitution of values for names (whose values are constants) is done in
(a) Local optimization
(b) Loop optimization
(c) Constant folding
(d) Strength reduction

Ques. Which of the flowing statements about relative addressing mode is FALSE?
(a) It enables reduced instruction size
(b) It allows indexing of array element with same instruction
(c) It enables easy relocation of data
(d) It enables faster address caiculation than absolute addressing

Ques. A graph in which all nodes are of equal degree, is known as
(a) Multigraph
(b) Non regular graph
(c) Regular graph
(d) Complete graph

Ques. The subnet mask for a particular network is Which of the following pairs of IP addresses could belong to this network?
(a) and
(b) and
(c) and
(d) and     ,

Ques. In networking, DTP stands for
(a) Unshielded T-connector port
(b) Unshielded twisted pair
(c) Unshielded terminating pair
(d) Universal transmission process

Ques. The address resolution protocol (ARP) is used for
(a) Finding the IP address from the DNS
(b) Finding the IP address of the default gateway
(c) Finding the IP address that corresponds to a MAC address
(d) Finding the MAC address that corresponds to an IP address

Ques. Which of the following is a MAC address?
(b) 00056A:01A5CCA7FF60
(c) 568, Airport Road
(d) 01 :A5:BB:A7:FF:60

Ques. A Testing method, which is normally used as the acceptance test for a software system, is
(a) Regression Testing
(b) Integration Testing
(c) Unit Testing
(d) System Testing

Ques. What is the primary purpose of a VLAN?
(a) Demonstrating the proper layout for a network
(b) Simulating a network
(c) To create a virtual private network
(d) Segmenting a network inside a switch or device

Ques. SHA-1 is a
(a) Encryption algorithm
(b) Decryption algorithm
(c) Key exchange algorithm
(d) Message digest function.

Ques. Advanced Encryption Standard (AES) is based on
(a) Asymmetric key algorithm
(b) Symmetric key algorithm
(c) Public key algorithm
(d) Key exchange

Ques. The primary purpose of an operating system is
(a) To make the most efficient use of the computer hardware
(b) To allow people to use the computer
(c) To keep systems programmers employed
(d) To make computers easier to use

Ques. Process is
(a) A program in high level language kept on disk
(b) Contents of main memory
(c) A program in execution
(d) A job in secondary memory

Ques. A page fault
(a) Occurs when a program accesses an available page of memory
(b) Is an error in a specific page
(c) Is a reference to a page belonging to another program
(d) Occurs when a program accesses a page not currently in memory

Ques. Using larger block size in a fixed block size file system leads to
(a) Better disk throughput but poorer disk space utilization
(b) Better disk throughput and better disk space utilization
(c) Poorer disk throughput but better disk space utilization
(d) Poorer disk throughput and poorer disk space utilization

Ques. Compared to CISC processors, RISC processors contain
(a) more register and smaller instruction set
(b) larger instruction set and less registers
(c) less registers and smaller instruction set
(d) more transistor elements

Download ISRO CS 2009 Paper:

About the author

Vishal Arora

Leave a Comment

1 Comment