1. What is used for deciding priority to allocate CPU time to a process?

What is used for deciding priority to allocate CPU time to a process?

Linker
Scheduler
Loader
Debugger
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is B.
In an operating system, the Scheduler (specifically, the CPU scheduler) is responsible for deciding which process among the ready processes should be allocated the CPU. Scheduling algorithms often use priority as a key factor in making this decision, giving higher priority processes preferential access to the CPU. Linkers, loaders, and debuggers are software tools involved in the development and execution lifecycle but are not primarily responsible for runtime CPU allocation priority.
The CPU scheduler implements various scheduling algorithms like First-Come, First-Served (FCFS), Shortest Job Next (SJN), Priority Scheduling, Round Robin, etc. Priority scheduling uses a priority value associated with each process to select the next process to run.

2. In MS-Excel 2007, STDEV[numberl, number 2, …] is a statistical funct

In MS-Excel 2007, STDEV[numberl, number 2, …] is a statistical function that

estimates standard deviation based on a sample by ignoring logical values and text in the sample
estimates standard deviation based on a sample by including logical values and text in the sample
calculates standard deviation based on the entire population by ignoring logical values and text
calculates standard deviation based on the entire population by including logical values and text
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is A.
In MS-Excel 2007 (and later versions with STDEV.S), the STDEV function (or STDEV.S) calculates the standard deviation based on a *sample*. It measures the dispersion or spread of data points around the mean. Importantly, the standard STDEV function in Excel ignores logical values (TRUE/FALSE) and text within the range of numbers provided as arguments when calculating the standard deviation.
Excel has other standard deviation functions: STDEVP (STDEV.P) for calculating the standard deviation of an *entire population*, which also ignores text and logical values; STDEVA for sample standard deviation that *includes* text (counted as 0) and logical values; and STDEVPA for population standard deviation that *includes* text and logical values. The question specifically asks about `STDEV`.

3. In MS-Excel 2007, NPV(rate, value1, [value 2], …) is a financial fun

In MS-Excel 2007, NPV(rate, value1, [value 2], …) is a financial function that returns

the net present value of an investment based on discount rate and series of future payments and income
the number of periods for an investment based on periodic, constant payments and constant interest rate
the future value of an investment based on periodic, constant payments and constant interest rate
the future value of an initial principal after applying a series of compound interest rates
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is A.
In MS-Excel, the NPV (Net Present Value) function calculates the present value of a series of cash flows based on a specified discount rate. It is used to evaluate the profitability of an investment or project by bringing all future cash flows (both positive and negative) back to their present-day value. Option A accurately describes this function: “the net present value of an investment based on discount rate and series of future payments and income”.
The NPV function assumes that cash flows occur at the end of each period. If cash flows occur at the beginning of the period, the NPV calculation needs adjustment, often by using the XNPV function for uneven dates or a combination of NPV and the initial investment outside the function.

4. Which one of the following communication media uses light pulses for c

Which one of the following communication media uses light pulses for carrying information?

Coaxial cable
Optic fibre
Microwave
Satellite
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is B.
Communication media carry information in various forms. Coaxial cables use electrical signals transmitted through copper wires. Microwave and satellite communication use electromagnetic waves (radio waves) transmitted through the air or space. Optic fibre cables, however, use light pulses transmitted through thin strands of glass or plastic. This method allows for very high bandwidth and long-distance transmission with minimal signal loss.
Optical fibre communication has revolutionized telecommunications and data networking due to its speed, capacity, and immunity to electromagnetic interference compared to traditional copper-based media.

5. In the context of computer graphics, which one of the following is not

In the context of computer graphics, which one of the following is not a raster image format?

JPEG
TIFF
SVG
GIF
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is C.
Raster image formats represent images as a grid of pixels (Picture Elements), where each pixel has a color value. Examples include JPEG, TIFF, GIF, PNG, and BMP. Vector image formats, however, represent images using mathematical equations to define lines, curves, and shapes. They are resolution-independent and can be scaled without loss of quality. SVG (Scalable Vector Graphics) is a prominent example of a vector image format.
Raster images are suitable for photographs and complex images with gradients and subtle color variations but can become pixelated when scaled up significantly. Vector images are ideal for logos, illustrations, and graphics that require scalability, such as for printing at different sizes.

6. In the context of computer networks, which one of the following is not

In the context of computer networks, which one of the following is not an application layer protocol?

SMTP
FTP
HTTP
TCP
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is D.
In the context of computer networks using the TCP/IP model, the Application Layer is the highest layer, which interacts directly with software applications. Protocols at this layer provide specific services to applications. SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol), and HTTP (Hypertext Transfer Protocol) are all well-known application layer protocols used for email, file transfer, and web browsing, respectively. TCP (Transmission Control Protocol), on the other hand, is a Transport Layer protocol. It provides reliable, connection-oriented data transmission services to the application layer, ensuring data integrity and flow control.
The TCP/IP model consists of four layers: Network Interface Layer, Internet Layer, Transport Layer, and Application Layer. The Transport Layer is responsible for end-to-end data transfer between processes. Other common Transport Layer protocols include UDP (User Datagram Protocol).

7. Central Industrial Security Force was created

Central Industrial Security Force was created

under an Act of the Parliament
as per a Resolution of the Cabinet
as per an Executive order issued by the Ministry of Defence
as per an Executive order issued by the Ministry of Home Affairs
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is A.
The Central Industrial Security Force (CISF) was established under an Act of the Parliament of India. The Central Industrial Security Force Act, 1968, provided for the constitution and regulation of an armed force of the Union for the better protection and security of industrial undertakings owned by the Central Government. Over time, its mandate has expanded to include other types of establishments and critical infrastructure.
CISF is one of the Central Armed Police Forces (CAPFs) of India, under the Ministry of Home Affairs. Its primary role was initially focused on public sector undertakings but has expanded significantly to cover airports, seaports, power plants, government buildings, cultural heritage sites, Delhi Metro, etc.

8. Which of the following does not fall within the scope of technical con

Which of the following does not fall within the scope of technical consultancy services rendered by the Central Industrial Security Force?

Study of the industrial security and fire protection related problems and suggesting appropriate solutions
Preparing disaster management and contingency plan and conducting rehearsals for such plans
Planning and designing of communication network and preparation of related operations instructions
Procurement of security equipment for the establishment to which it has to provide security
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is D.
The Central Industrial Security Force (CISF) provides technical consultancy services related to security and fire protection. Their scope includes assessing problems, suggesting solutions, planning security systems, preparing disaster/contingency plans, and designing communication networks. However, the actual procurement of security equipment is typically the responsibility of the establishment seeking the security services, based on the recommendations provided by CISF. CISF acts as a consultant, not a purchasing agent for the client organization.
CISF provides consultancy services to various industrial undertakings and other establishments in the public and private sectors to improve their security posture. These services aim to help organizations identify vulnerabilities and implement effective security measures.

9. The National Industrial Security Academy is located at

The National Industrial Security Academy is located at

Hyderabad
Arakkonam
Mundali
Bhilai
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is A) Hyderabad.
The National Industrial Security Academy (NISA) is the premier training institution for the Central Industrial Security Force (CISF). It is located in Hakimpet, Hyderabad, Telangana.
CISF has several training centres across India for basic and in-service training, but NISA in Hyderabad is designated as the apex training institute responsible for training officers and specialized personnel, as well as developing training modules.

10. Which of the following statements is not correct? According to the Cen

Which of the following statements is not correct?
According to the Central Industrial Security Force Rules

a member of the Central Industrial Security Force may use all means necessary to effect an arrest as long as such Force is minimum required in that particular situation
the member of the Force making an arrest may also search the person so arrested but only if that person volunteers to be searched so as to prevent allegations of violation of the human rights
if a search is carried out, a copy of the inventory of the items taken in possession after the search is required to be prepared and given to the person so arrested
an inventory is required to be prepared even if nothing is seized after search
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct option is B) the member of the Force making an arrest may also search the person so arrested but only if that person volunteers to be searched so as to prevent allegations of violation of the human rights.
This statement is incorrect. Standard legal procedures for arrest in India (e.g., under the Code of Criminal Procedure, which generally applies unless specific rules override it) permit a police officer (and similarly, security forces with arrest powers) to search the person arrested to prevent concealment of weapons, evidence, etc. There is no requirement for the arrested person to “volunteer” for the search. Lawful search upon arrest is a permissible procedure under the law and does not depend on the suspect’s consent; consent is generally required for searches *without* lawful authority or warrant under other circumstances.
Options A, C, and D reflect standard practices or legal requirements generally applicable to law enforcement/security forces making arrests and conducting searches. Use of minimum force is a principle of necessity and proportionality. Preparing an inventory of seized articles and providing a copy is a requirement for transparency and accountability during a search. Documenting that a search was conducted even if nothing was found is also a prudent procedural step.

Exit mobile version