• Courses
  • Tutorials
  • Jobs
  • Practice
  • Contests

ISRO CS 2009

Question 51

A testing method which is normally used as the acceptance test for a software system, is
  • Regression Testing
  • Integration Testing
  • Unit Testing
  • System Testing

Question 52

The \'command\' used to change contents of one database using the contents of another database by linking them on a common key field?
  • Replace
  • Join
  • Change
  • Update

Question 53

A locked database file can be
  • Accessed by only one user
  • Modified by users with the correct password
  • Used to hide sensitive information
  • Updated by more than one user

Question 54

Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time?
  • Transaction log
  • Query language
  • Report writer
  • Data manipulation language

Question 55

Purpose of \'Foreign Key\' in a table is to ensure
  • Null Integrity
  • Referential Integrity
  • Domain Integrity
  • Null and Domain Integrity

Question 56

Which of the following scenarios may lead to an irrecoverable error in a database system?
  • A transaction writes a data item after it is read by an uncommitted transaction
  • A transaction reads a data item after it is read by an uncommitted transaction
  • A transaction reads a data item after it is written by a committed transaction
  • A transaction reads a data item after it is written by an uncommitted transaction

Question 57

Use of IPSEC in tunnel mode results in
  • IP packet with same header
  • IP packet with new header
  • IP packet without header
  • No changes in IP packet

Question 58

Special software to create a job queue is called a
  • Driver
  • Spooler
  • Interpreter
  • Linkage editor

Question 59

Process is:
  • A program in high level language kept on disk
  • Contents of main memory
  • A program in execution
  • A job in secondary memory

Question 60

When a process is rolled back as a result of deadlock the difficulty which arises is
  • Starvation
  • System throughput
  • Low device utilization
  • Cycle stealing

There are 80 questions to complete.

Last Updated :
Take a part in the ongoing discussion