Previous Exams

HSST Computer Science(SR for SC/ST)-Online Exam-2016

 

Time Remaining :
0. The cryptography method in which the plaintext BBBB become the ciphertext BCDE.This is probably
Transposition cipher
Monoalphabetic substitution cipher
Polyalphabetic substation cipher
None of the above
1. The buffer overflow attack is caused by
Vulnerability in the design of a networking protocol
Vulnerability in the implementation of a networking protocol
Vulnerability in human behavior
Vulnerability in software
2. Which of the following is not valid IPv4 addresses?
192.10.14.3
201.172.275.33
65.90.11.00
193.20.250.10
3. Address resource records are associated with
Routing tables in Internet routers
ARP aches in LAN workstations
DNS servers
None of the above
4. Which of the following protocols is used in accessing web mail?
HTTP
SMTP
POP3
IMAP
5. If gcd(a,b)=x and gcd(b,c)=y,then gcd(a,c)is
xy
gcd(x,y)
xy/gcd(x,y)
None of these
6. Assuming the same key is used,two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following
Caesar cipher
Vigenere cipher
Hill cipher
One time pad
7. A product cipher is constructed using a combination of
Symmetric and asymmetric ciphers
Substitution and transposition ciphers
Monoalphabetic and polyalphabetic ciphers
Stream and block ciphers
8. Which of the following characteristics is most widely used in fingerprint recognition?
Number and coordinates of arch patterns
Number and coordinates of loop patterns
Coordinates and orientations of fingerprint minutiae
Number and coordinates of whorl patterns
9. During the initial stages of an attack by a new internet scanning worm,the number of infected machines increases
Exponentially with time
Logarithmically with time
Polynomially with time
At a constant rate
10. Use privileges in windows are stored in
DACL
ACE
Access token
SID
11. Probabilistic packet marking is technique used in support of
DDOS prevention
IP traceback
DDoS detection
Worm detection
12. The role of the payment gateway is
A proxy to the merchant
A financial service provider
A government regulator
A proxy to the bankcard network
13. What type of parameters are used in transcendental functions in Java?
Double
Long
Byte
Int
14. In what format is Java’s character set represented?
16 bits ASCII
16 bits Unicode
16 bits EBC
None of the above
15. Basic futures of structured programming
Sequence
Looping
Branching
All of the above
16. In which year Java was developed?
1989
1990
1991
1992
17. What feature of C++ was dropped in Java?
Virtual function
Abstract class
Inheritance
Pointers
18. What type of storage class is involved when we pass by value in function?
External
Automatic
Static
Register
19. What is Java equivalent of const in C++?
Const
Define
Final
All of the above
20. What is another name for semantic errors?
Runtime errors
Compile time errors
Syntax errors
None of the above
21. What are units of width and height specified in HTML tag?
Pixels
Bytes
Bits
All of the above
22. What will be the values of x,m and n after execution of the following statements? Int x,m,n; m=10; n=15; x=++m+n++;
x=25,m=10,n=15
x=27,m=10,n=15
x=26,m=11,n=16
x=27,m=11,n=16
23. What will be the result of the expression 13 and 25?
38
9
25
12
24. Which of the following will produce a value of 22 if x=22.9?
ceil(x)
log(x)
abs(x)
floor(x)
25. Which is the legal ways to access a class data member using the pointer?
this.x
*this.x
*(this.x)
(*this).x
26. Which is the legal ways to access a class data member using this pointer?
list
queue
map
string
27. Which one of the following is a sequence container?
stack
deque
queue
set
28. What does the acronym BCPL stands for?
Basic Combined Programming Language
Basic Compiler Programming Language
Beginners Combined Programming Language
None of the above
29. What was Ken Thompson's version of C called?
C++
B
P
None of the above
30. What does the fopen()function return?
Address
Pointer
File pointer
All of the above
31. Recursive algorithms are based on
Divide and conquer approach
Top-down approach
Bottom-up approach
Hierarchial approach
32. The Sorting method which is used for external sort is
Bubble sort
Quick sort
Merge sort
Radix sort
33. Worst case efficiency of binary search is
log-(2)n+r
n
’2^(n)’
Log n
34. What is the type of the algorithm used in solving the 8 Queens problem?
Dynamic
Backtracking
Branch and Bound
None of the above
36. How many nodes are there in a full state space tree with n=6?
65
64
63
32
37. Prims algorithm is based on ------method
Divide and conquer method
Greedy method
Dynamic programming
Branch and bound
38. Graph Colouring is which type of algorithm design strategy
Backtracking
Greedy
Branch and Bound
Dynamic programming
39. The asymptotic notation for defining the average time complexity is
Equivalence
Symmetric
Reflexive
All of the above
40. The complexity of merge sort algorithm is
O(n)
'O(n^(2))'
O(log n)
O(n log n)
41. Dijkstra's banking algorithm in an operating system,solves the problem of
Deadlock recovery
Mutual exclusion
Deadlock avoidance
None of these
42. Interval between the time of submission and completion of the job is called
Waiting time
Response time
Throughput
Turnaround time
43. The example of non-pre emptive scheduling is
First-Come-First-Served
Round Robin
Last-in-First-Out
Shortest-Job-First
44. ------is a process-to-process protocol that adds only port addresses,checksum,error control and length information to the data from the upper layer:
TCP
UDP
IP
None of the above
45. The RSA algorithm uses a ---------cryptography method
Public Key
Private Key
Symmetric Key
All the above
46. The ----------attack is related to confidentially
Fabrication
Interception
Modification
Interruption
48. The following service is not provided by digital signature
Integrity
Authentication
Non reputation
Confidentially
49. ----------is a technique of temporarily removing inactive programs from the memory of computer system
Swapping
Spooling
Semaphore
Scheduling
50. Fence register is used for
CPU protection
Memory protection
File protection
Processor protection
51. -------clause is used to list the attributes desired in the result of a query
Where
From
Select
Having
52. We express queries in QBE by
Datalog
Skeleton tables
Entitysets
SQL
53. ----------is a set of permitted values for each attribute
Domain
Entity
Constraints
Relationship
54. Minimal super keys are called
Primary key
Foreign key
Candidate key
Unique
55. A relation is in-----every non-key attribute is irreducibly dependent on the primary key
1NF
2NF
3NF
4NF
56. A statement that the system executes automatically when a database related event occurs
View
Alter
Assertion
Trigger
57. An index record appears for every search key value in the file
Dense Index
Sparse index
Hash index
Single-key index
58. In hashing,we use the term to denote a unit of storage that can store one or more records.
Field
Hash function
Index
Bucket
59. The number of transactions executed in a given amount of time is called
Response time
Waiting time
Throughput
Performance
60. ------------is a predicate expressing a condition that we wish the database always to satisfy
Autherization
Autherization
QBE
Assertion
61. A variation in the representation of the waterfall model is called
Classic life cycle
V-Model
Incremental process model
Spiral model
62. The most common manifestation of separation of software into separately named and addressable components is called
Concern
Pattern
Modularity
Independence
63. ----------is an indication of the relative interdependence among modules
Coupling
Cohesion
Hiding
Refactoring
64. The diagram which help you to determine the functionality and features of the software from the user's perspective
Class diagram
Deployment diagram
Sequence diagram
Use-case diagram
65. -------testing is focuses on the functional requirements of the software.
White-box testing
Black-box testing
Condition testing
Unit testing
66. The software metric that provides a quantitative measure of the logical complexity of a program
Cylcomatic complexity
Defect removal efficiency
Object-oriented metrics
LOC
67. ----is the most widely used strategy for statistical quality assurance in industry
Pareto principle
CMM
Six Sigma
IEEE
68. ----------is an agile software development approach
Extreme programming
Quality function deployment
PSPEC
Unified process
69. ---------provides a notation that translates actions and conditions described in a use case into a tabular form
Decision tree
Pattern
Linear structures
Decision tables
70. ----------is a project scheduling method
PERT
Scrum model
UML
RAD
71. The bus carries bits between
Microprocess and Memory
Microprocessor and I/Os
Memory and I/Os
Microprocessor,Memory and I/Os
72. The Gray code for the binary number'(101110)-(2)'is
111101
111001
111011
111010
73. Simplify the expression AB+A(B+C)+B(B+C)using Boolean algebra techniques is
C+AC
A+AC
B+AC
B+AB
74. How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number?
One
Two
Three
Four
75. The binary equivalent for the BCD number 10000101 is
'(1010100)-(2)'
'(1000100)-(2)'
'(1110100)-(2)'
'(1010101)-(2)'
76. How many states are there in an eight-bit Johnson counter sequence?
4
8
16
32
77. How many clock pulses are required to serially enter a byte of data into an eight-bit shift register?
8
16
32
64
78. How many address bits are required for a 2048-bit memory?
10 bits
11 bits
12 bits
13 bits
79. How many tracks are there on a typical 5Square root of 2'inch floppy disk?
64
67
77
87
80. Visual cryptography is mainly used for
Text encryption
Video encryption
Audio encryption
Image encryption
81. Whose words are these”No Caste.No Religio.No God for Human being"?
Shree Narayana Guru
K.Ayyappan
Swami Vivekananda
Pandit Karuppan
82. Which Article of Constitution provide uniform civil code for the citizens?
Article 47
Article 39
Article 44
Article 48
83. Which agitation in Kerala is known as the 'Maru Marakkal Samaram'?
Channar Revolt
Attingal Revolt
Revolt of 1857
Kurichiyar Revolt
84. Who is known as 'Kalidasa of Kerala'?
Kerala Varma Valiya Koil Thampuran
Kumaranasan
Azuthachan
Ulloor S Parameswaran Ayyar
85. Who acted the role of Shree Narayana Guru in the film'Yugapurusham'?
Mammooty
Thalaivasal Vijay
R.Sukumaran
Mohanlal