ISRO CS 2009
Question 1 |
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
172.57.88.62 and 172.56.87.23 | |
10.35.28.2 and 10.35.29.4 | |
191.203.31.87 and 191.234.31.88
| |
128.8.129.43 and 128.8.161.55 |
Discuss it
Question 1 Explanation:
Refer: GATE-CS-2003 | Question 90
Question 2 |
In networking, UTP stands for
Unshielded T-connector port | |
Unshielded twisted pair | |
Unshielded terminating pair | |
Unshielded transmission process |
Discuss it
Question 2 Explanation:
UTP stands for unshielded twisted pair. It consists of two insulated copper wires which have been twisted around one another which helps to control signal degradation due to interference.
So, option (C) is correct.
Question 3 |
The address resolution protocol (ARP) is used for
Finding the IP address from the DNS | |
Finding the IP address of the default gateway | |
Finding the IP address that corresponds to a MAC address | |
Finding the MAC address that corresponds to an IP address |
Discuss it
Question 3 Explanation:
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. It is a low-level network protocol for translating network layer addresses into link layer addresses.
So, option (D) is correct.
Question 4 |
Which of the following is a MAC address?
192.166.200.50 | |
00056A:01A01A5CCA7FF60 | |
568, Airport Road
| |
01:A5:BB:A7:FF:60 |
Discuss it
Question 4 Explanation:
The size of MAC address is 48 bits. It contains 12 hexadecimal numbers inside six groups, with each group containing two hexadecimal number each.
So,01:A5:BB:A7:FF:60 is the valid MAC address.
Question 5 |
What is the primary purpose of a VLAN?
Demonstrating the proper layout for a network | |
Simulating a network | |
To create a virtual private network | |
Segmenting a network inside a switch or device |
Discuss it
Question 6 |
SHA-1 is a
encryption algorithm | |
decryption algorithm | |
key exchange algorithm | |
message digest function |
Discuss it
Question 6 Explanation:
SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest which is 40 digits long.
So, it is a message digest function.
Option (D) is correct.
Question 7 |
Advanced Encryption Standard (AES) is based on
Asymmetric key algorithm | |
Symmetric key algorithm | |
Public key algorithm | |
Key exchange |
Discuss it
Question 7 Explanation:
AES is a symmetric key algorithm i.e. same key is used for encryption and decryption process.
The AES replaced the DES with new and updated features-
Block encryption implementation.
128-bit group encryption with 128, 192 and 256-bit key lengths.
Symmetric algorithm requiring only one encryption and decryption key.
AES design is based on a substitution-permutation network (SPN).
Data security for 20-30 years.
Easy overall implementation.
So, option (B) is correct.
Question 8 |
The primary purpose of an operating system is
To make most efficient use of the computer hardware | |
To allow people to use the computer | |
To keep systems programmers employed | |
To make computers easier to use |
Discuss it
Question 8 Explanation:
An operating system has three main functions:
(1) manage the computer's resources, such as the central processing unit, memory, and other input - output sources
(2) establish a user interface, and
(3) execute and provide services for applications software.
OS provides an interface between the user and the hardware and thus making the computer easy to use for the user but the primary function of OS is to manage the hardware in the most efficient way.
So, option (A) is correct.
Question 9 |
Which is the correct definition of a valid process transition in an operating system?
Wake up: ready → running | |
Dispatch: ready → running | |
Block: ready → running | |
Timer runout: ready → running |
Discuss it
Question 9 Explanation:
The state transition diagram of a process(preemptive scheduling):
Option 1: Wake up: ready → running
It is incorrect as when a process wakes up it is shifted from blocked state to ready state and not from ready to running.
Option 2: Dispatch: ready → running
It is correct as the dispatcher selectively assigns the CPU to one of the process in the ready queue based on a well defined algorithm.
Option 3: Block: ready → running
It is incorrect as a process is blocked when it is either pre-empted by some other process or due to some i/o operation. So when a process gets blocked it shifts from running state to blocked state.
Option 4: Timer runout: ready → running
When the time duration of execution of a process expires, the timer interrupts and the process shifts from the running state to ready queue.
So, option (B) is correct.

Question 10 |
The correct matching of the following pairs is
(A) Disk check (1) Roundrobin (B) Batch processing (2) Scan (C) Time sharing (3) LIFO (D) Stack operation (4) FIFO
A B C D 3 4 2 1 | |
A B C D 4 3 2 1 | |
A B C D 3 4 1 2 | |
A B C D 2 4 1 3 |
Discuss it
Question 10 Explanation:
Option (D) is correct:
A: Disk check- (2) Various scan algorithms are used for disc checking like FCFS, SSTF, SCAN, C-SCAN, LOOK, C-LOOK etc.
B: Batch Processing- In batch processing processes are strictly executed in FIFO order.
C: Time sharing- In Round Robin scheduling algorithm, the processes perform CPU execution in time sharing manner as there is a fixed time quanta associated with each process for execution.
D: Stack operation- stack operates in last in first out manner.
There are 80 questions to complete.