Saturday 18 June 2016

ISRO 2007 Answer Key and Solutions Computer Science Scientist Engineer

The ISRO Computer Science (CS) Scientist Engineer test held on April 22, 2007 (Sunday). Total questions were 80 and test duration were 90 Minutes. Here is the solution of paper according to me of set A.
  • The Answer Key 2007 for Set A Non-Official by Me: Click here (By ISRO not available)
  • For complete preparation for ISRO Computer Science visit my this article: Click Here 
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2016Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2015Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2014Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2013Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2011Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2009Click here
  • For ISRO Answer Key and Solutions Computer Science Scientist Engineer 2008Click here

47. Which commands are used to control access over objects in relational databases?
(a) CASCADE & MVD
(b) GRANT & REVOKE
(c) QUE & QUIST
(d) None of these

Correct Answer: (b)
Explanation: The Data Control Language (DCL) is a subset of the SQL that allows database administrators to configure security access to relational databases. It consists of only three commands: GRANT, REVOKE, and DENY.
Reference: http://databases.about.com/od/Advanced-SQL-Topics/a/Data-Control-Language-Dcl.htm

48. Which of the following is aggregate function in SQL?
(a) Avg
(b) Select
(c) Ordered by
(d) distinct

Correct Answer: (a)
Explanation: SQL aggregate functions return a single value, calculated from values in a column. Useful aggregate functions: AVG() - Returns the average value. COUNT() - Returns the number of rows.
Reference: SQL Functions - W3Schools

50. A view of a database that appears to an application program is known as
(a) Schema
(b) Subschema
(c) Virtual table
(d) None of these

Correct Answer: (b)
Explanation: The external level is the user’s view of the database and closest to the users.This level describes that part of the database that is relevant to the user.

  • Most of the users of database are not concerned with all the information contained in the database. Instead, they need only a part of  the database relevant to them.
  • An subschema describes each external view. The subschema consists of the definition of the logical records and the relationships in the external view.
The sub-schemas appears to application program to perform the operations. 
Reference: http://gateoverflow.in/51119/view-of-database-that-appears-to-an-application-programmer

51. Armstrong's inference rule doesn't determine
(a) Reflexivity
(b) Augmentation
(c) Transivity
(d) Mutual dependency

Correct Answer: (d)
Explanation: We can derive additional functional dependencies from the initial set using inference rules. Armstrongs's Axioms are most basic inference rules. These are 3 rules:
  • Reflexivity: If Y is a subset of X, then X → Y
  • Augmentation: If X → Y, then XZ → YZ
  • Transitivity: If X → Y and Y → Z, then X → Z
Additionally there are secondary rules derived from above 3 rules:
  • Union: If X → Y and X → Z, then X → YZ
  • Decomposition: If X → YZ, then X → Y and X → Z
  • Pseudotransitivity: If X → Y and WY → Z, then WX → Z
  • Composition: If X → Y and Z → W, then XZ → YW

52. Which operation is used to extract specified columns from a table?
(a) Project
(b) Join
(c) Extract
(d) Substitute

Correct Answer: (a)
Explanation: Project operation (∏) is used to select (extract) columns from a table that satisfy a given conditions.
Reference: http://www.tutorialspoint.com/dbms/relational_algebra.htm

54. BCNF is not used for cases where a relation has
(a) Two (or more) candidate keys
(b) Two candidate keys and composite
(c) The candidate key overlap
(d) Two mutually exclusive foreign keys

Correct Answer: __
Explanation: To figure out correct option, following points require our attention:
  1. When a key is composed of more than one column, it is known as a composite key.
  2. A candidate key is a column (Simple Candidate Key), or set of columns (Composite Candidate Key), in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys.
  3. BCNF asks "are all attributes to the left of the arrows candidate keys?", if yes then its BCNF.
  4. Mutually Exclusive means can't happen at the same time.
And now check options one by one: 
  • Option (a) is a case for BCNF by seeing point 3 above.
  • Option (c) is a case for BCNF because there is candidate keys are overlapping (e.g. AB, AC, AD) and it is okay for BCNF.
Reference: https://www.gatementor.com/viewtopic.php?f=268&t=8444

60. Which of the following is correct with respect to Two phase commit protocol?
(a) Ensures serializability
(b) Prevents Deadlock
(c) Detects Deadlock
(d) Recover from Deadlock

Correct Answer: None of These
Explanation: Two-phase commit (2PC) protocol should not be confused with the two-phase locking (2PL) protocol, a concurrency control protocol. 2PL is a concurrency control method that guarantees serializability. 2PC is a distributed algorithm that coordinates all the processes that participate in a distributed atomic transaction.
Reference: https://en.wikipedia.org/wiki/Two-phase_commit_protocol

69. A rule in a limited entry decision table is a
(a) row of the table consisting of condition entries
(b) row of the table consisting of action entries
(c) column of the table consisting of condition entries and the corresponding action entries
(d) columns of the table consisting of conditions of the stub

Correct Answer: (c)
Explanation: The limited-entry decision table is the simplest to describe. The condition alternatives are simple Boolean values, and the action entries are check-marks, representing which of the actions in a given column are to be performed.
Reference: https://en.wikipedia.org/wiki/Decision_table


2 comments:

  1. Thank you for sharing, I really enjoyed the article. Read this article to find out more Click Per Second Test . You can get better at clicking the mouse faster by taking a Click Per Second test.

    ReplyDelete