ISRO Computer-Science-Engineering-CS |   13578

ISRO Computer-Science-Engineering-CS

                      ISRO Question Paper-Scientists Computer Science (IT)

1. Which of the following features usually applies to data in a data warehouse?
(a) Data are often deleted
(b) Most applications consists of transactions
(c) Data are rarely deleted
(d) Relatively few records are processed by applications
(e) None of these

2. Which of the following is a transaction?
(a) A group of SQL statements consisting of one read and one write operation
(b) A group of SQL statements consisting only of ready operations.
(c) A group of SQL statements defining a user-oriented task
(d) A group of SQL statements consisting only of write operations.
(e) None of these

3. There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall?
(a) Proxy server
(b) Intrusion- detection system
(c) Terminal server
(d) Web server
(e) None of these

4. The effect of the ROLLBACK command in a transaction is the following……
(a) Undo all changes to the data- base resulting from the execution of the transaction
(b) Undo the effects of the last UPDATE command
(c) Restore the content of the database to its state at the end of the previous day
(d) Make sure that all changes to the database are in effect
(e) None of these

5. A client / server network ……….
(a) has clients that provide functions such as application control and shared computation.
(b) uses client computers to provide copies of software to the server to allow server processing.
(c) provides a company with the capability to downsize from lager computer systems and move away from legacy systems.
(d) has server computers that perform all processing, clients are’ dumb’ input/ output devices only.
(e) None of these.

6. An applet is ……. Document application program.
(a) a static
(b) a dynamic
(c) an active
(d) a passive
(e) None of these

7. The local antenna for satellite connections is called a ……..
(a) modem
(b) terminal
(c) VSAT
(d) DTA
(e) None of these

8. What are the four basis connecting hardware devices?
(a) Repeater, bridge, router and gateway
(b) Repeater, bridge, router and dell
(c) Repeater, connector, router and gateway
(d) Amplifier, bridge, router and gateway
(e) None of these

9. Which type of processing speed measurement is used primarily with supercomputers?
(a) Flops
(b) Fractions of second
(c) Gigahertz
(d) MIPS
(e) None of these

10. This type of software is designed for users who want to customize the programs they use.
(a) Shareware
(b) Open-source software
(c) Freeware
(d) Macros
(e) None of these

11. What is the term associated with the second part of an e-mail address?
(a) Local address
(b) Eight characters long
(c) User name
(d) Domain name
(e) None of these

12. A port that allows 8 bits at a time to be transmitted simultaneously is a (n) …..
(a) dedicated port
(b) parallel port
(c) SCSI port
(d) USB port
(e) None of these

13. In order for computers to communicate across a network, they must be connected through a(n)…..
(a) TCP/IP
(b) Topology
(c) Ethernet
(d) Thin client
(e) None of these

14. What is a specialized software program that allows input and output devices to communicate with the rest of the computer system?
(a) Utility driver
(b) Utility program
(c) Data compression utility
(d) Device driver
(e) None of these

15. Single party disk relying on the disk controller for finding out which disk has failed is used by-
(a) RAID level 5
(b) RAID level 2
(c) RAID level 4
(d) RAID level 3
(e) RAID level 1

16. Which of these terms refers to the feature of an OS that allows a single computer to process the tasks of several users at different stations, in round-robin fashion?
(a) Multiprocessing
(b) Multiprogramming
(c) Multitasking
(d) Time processing
(e) Time-sharing

17. Which of the following statements is not true about two-tier client-server database architecture?
(a) SQL statements are processed on the server
(b) SQL statements may be processed on some of the clients
(c) Business logic is mostly processed on clients
(d) Business logic may be processed on the server
(e) None of these

18. A Relational operator that yields all values from selected attributes is known as a –
(a) difference
(b) product
(c) select
(d) project
(e) join

19. Normalization is:
(a) the process of creating small stable data structures from complex groups of data when designing a relational database
(b) a methodology for documenting database illustrating the relationship between various entities in the database
(c) an approach to data management that stores both data and the procedures acting on the data as object that can be automatically retrieved and shared
(d) a representation of data as they would appear to an application programmer or user
(e) a representation of data as they actually would be organized on physical storage media

20. The process of building a model that demonstrate the features of a proposed product, service or system is called a –
(a) JAD
(b) RAD
(c) templating
(d) prototyping
(e) TAD

21. Which of the following is mandatory component of a URL?
(a) Resource Path
(b) Protocol
(c) Port Number
(d) Domain Name
(e) None of these

22. DBMS allows you to extrapolate information from your data by using a-
(a) query language
(b) table generator
(c) report generator
(d) wizard
(e) None of these

23. A subschema is –
(a) a description of the physical and logical structure of data and the relationship among the data
(b) a file that identifies the subset of data that a group of users can access
(c) a detailed description of all data contained in the database
(d) a description of the types of modifications that users can make to a database
(e) Either (c) or (d)

24. Which of the following is not a type of hub?
(a) Passive hub
(b) Inactive hub
(c) Switching hub
(d) Intelligent hub
(e) None of these

25. The ……….. lists the location of files on the disk
(a) FAT
(b) boot sector
(c) root folder
(d) data area
(e) None of these

feedback