ISRO CS 2008


Question 1
Which of the following correctly declares an array?
A
int geeks[20];
B
int geeks;
C
geeks{20};
D
array geeks[20];
Array    ISRO CS 2008    
Discuss it


Question 1 Explanation: 
Option A is correct. Int is the data type used,geeks is the name of the array and [20] is the size of the array.
Question 2
The term Phong associated with
A
Ray tracing
B
shading
C
Hiddenline removal
D
a game
Computer Graphics    ISRO CS 2008    
Discuss it


Question 2 Explanation: 
Phong shading is a per-fragment color computation. The vertex shader provides the normal and position data as out variables to the fragment shader. The fragment shader then interpolates these variables and computes the color. So, option (B) is correct.
Question 3
The subnet mask 255.255.255.192
A
extends the network portion to 16 bits
B
extends the network portion to 26 bits
C
extends the network portion to 36 bits
D
has no effect on the network portion of an IP address
IP Addressing    ISRO CS 2008    
Discuss it


Question 3 Explanation: 
Default sub-net mask for Class C is 255.255.255.192 (192)10 = (11000000)2 Since, 192 is written as 11000000, it has 2 sub-nets and remaining all hosts. So, for first three octets, 24 bits are fixed and for last octet 2 bits are fixed, i.e. 24 + 2 = 26 bits Option (B) is correct.
Question 4
On a LAN ,where are IP datagrams transported?
A
In the LAN header
B
In the application field
C
In the information field of the LAN frame
D
After the TCP header
Network Layer    ISRO CS 2008    
Discuss it


Question 4 Explanation: 
IP datagram is encapsulated in the payload field of Ethernet frame, so we can say that it is transported in information field of frame. So, option (C) is correct.
Question 5
In Ethernet, the source address field in the MAC frame is the _______ address.
A
original sender's physical
B
previous station's physical
C
next destination's physical
D
original sender's service port
CN Data Link Layer    ISRO CS 2008    
Discuss it


Question 5 Explanation: 
While the IP address of source and the destination in a datagram is kept same at each hop, the source MAC address is replaced at each station while the frame is in transit. So for the current station, the source address field will contain the MAC address of the previous station. So, option (B) is correct.
Question 6
Which of the following transmission media is not readily suitable to CSMA operation?
A
Radio
B
Optical fibers
C
Coaxial cable
D
Twisted pair
CN Data Link Layer    ISRO CS 2008    
Discuss it


Question 6 Explanation: 
Wireless medium can't be used for CSMA operations as they are not suitable for collision detection methods. As radio already have a large number of users, it can't detect the collisions between the senders and the receivers. So, option (A) is correct.
Question 7
Consider the grammar
S → ABCc ∣ bc
BA → AB
Bb → bb
Ab → ab
Aa → aa
Which of the following sentences can be derived by this grammar?
A
abc
B
aab
C
abcc
D
abbc
ISRO CS 2008    
Discuss it


Question 8
The TCP sliding window
A
can be used to control the flow of information
B
always occurs when the field value is 0
C
always occurs when the field value is 1
D
occurs horizontally
Transport Layer    ISRO CS 2008    
Discuss it


Question 8 Explanation: 
TCP uses a Sliding Window mechanism for the flow control of data in transit on a network. In Sliding Window, the sending device can send all packets within the TCP window size without receiving an ACK. The receiving device should acknowledge each packet it received and after receiving the ACK from the receiving device, the sending device slides the window to right side. So, option (A) is correct.
Question 9
What is the bandwidth of the signal that ranges from 40 kHz to 4 MHz
A
36 MHz
B
360 kHz
C
3.96 MHz
D
396 kHz
Digital Logic & Number representation    ISRO CS 2008    Logic functions and Minimization    
Discuss it


Question 10
Which Project 802 standard provides for a collision-free protocol?
A
802.2
B
802.3
C
802.5
D
802.6
CN Data Link Layer    ISRO CS 2008    
Discuss it


Question 10 Explanation: 
Token ring is standardized with protocol IEEE 802.5. Token passing is the method of medium access, with only one token allowed to exist on the network at a time. Network devices must acquire the token to transmit data, and may only transmit a single frame before releasing the token to the next station on the ring. When a station has data to transmit, it acquires the token at the earliest opportunity, marks it as busy, and attaches the data and control information to the token to create a data frame, which is then transmitted to the next station on the ring. The frame will be relayed around the ring until it reaches the destination station, which reads the data, marks the frame as having been read, and sends it on around the ring. When the sender receives the acknowledged data frame, it generates a new token, marks it as being available for use, and sends it to the next station. IEEE 802.2 is the logical link control (LLC) as the upper portion of the data link layer of the OSI Model. IEEE 802.6 is a standard governed by the ANSI for Metropolitan Area Networks (MAN). IEEE 802.3 is a working group and a collection of Institute of Electrical and Electronics Engineers (IEEE) standards produced by the working group defining the physical layer and data link layer's media access control (MAC) of wired Ethernet. So, option (C) is correct.
There are 80 questions to complete.


My Personal Notes arrow_drop_up


Writing code in comment? Please use ide.geeksforgeeks.org, generate link and share the link here.