Previous Exams

HSST Computer Science(SR for SC/ST)-Online Exam-2016

 

Time Remaining :
1. The buffer overflow attack is caused by
Vulnerability in the design of a networking protocol

Vulnerability in the implementation of a networking protocol

Vulnerability in human behavior

Vulnerability in software
2. Which of the following is not valid IPv4 addresses?
192.10.14.3

201.172.275.33

65.90.11.00

193.20.250.10
3. Address resource records are associated with
Routing tables in Internet routers

ARP aches in LAN workstations

DNS servers

None of the above
4. Which of the following protocols is used in accessing web mail?
HTTP

SMTP

POP3

IMAP
5. If gcd(a,b)=x and gcd(b,c)=y,then gcd(a,c)is
xy

gcd(x,y)

xy/gcd(x,y)

None of these
6. Assuming the same key is used,two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following
Caesar cipher

Vigenere cipher

Hill cipher

One time pad
7. A product cipher is constructed using a combination of
Symmetric and asymmetric ciphers

Substitution and transposition ciphers

Monoalphabetic and polyalphabetic ciphers

Stream and block ciphers
8. Which of the following characteristics is most widely used in fingerprint recognition?
Number and coordinates of arch patterns

Number and coordinates of loop patterns

Coordinates and orientations of fingerprint minutiae

Number and coordinates of whorl patterns
9. During the initial stages of an attack by a new internet scanning worm,the number of infected machines increases
Exponentially with time

Logarithmically with time

Polynomially with time

At a constant rate
10. Use privileges in windows are stored in
DACL

ACE

Access token

SID
11. Probabilistic packet marking is technique used in support of
DDOS prevention

IP traceback

DDoS detection

Worm detection
12. The role of the payment gateway is
A proxy to the merchant

A financial service provider

A government regulator

A proxy to the bankcard network
13. What type of parameters are used in transcendental functions in Java?
Double

Long

Byte

Int
14. In what format is Java’s character set represented?
16 bits ASCII

16 bits Unicode

16 bits EBC

None of the above
15. Basic futures of structured programming
Sequence

Looping

Branching

All of the above
16. In which year Java was developed?
1989

1990

1991

1992
17. What feature of C++ was dropped in Java?
Virtual function

Abstract class

Inheritance

Pointers
18. What type of storage class is involved when we pass by value in function?
External

Automatic

Static

Register
19. What is Java equivalent of const in C++?
Const

Define

Final

All of the above
20. What is another name for semantic errors?
Runtime errors

Compile time errors

Syntax errors

None of the above
21. What are units of width and height specified in HTML tag?
Pixels

Bytes

Bits

All of the above
22. What will be the values of x,m and n after execution of the following statements? Int x,m,n; m=10; n=15; x=++m+n++;
x=25,m=10,n=15

x=27,m=10,n=15

x=26,m=11,n=16

x=27,m=11,n=16
23. What will be the result of the expression 13 and 25?
38

9

25

12
24. Which of the following will produce a value of 22 if x=22.9?
ceil(x)

log(x)

abs(x)

floor(x)
25. Which is the legal ways to access a class data member using the pointer?
this.x

*this.x

*(this.x)

(*this).x
26. Which is the legal ways to access a class data member using this pointer?
list

queue

map

string
27. Which one of the following is a sequence container?
stack

deque

queue

set
28. What does the acronym BCPL stands for?
Basic Combined Programming Language

Basic Compiler Programming Language

Beginners Combined Programming Language

None of the above
29. What was Ken Thompson's version of C called?
C++

B

P

None of the above
30. What does the fopen()function return?
Address

Pointer

File pointer

All of the above
31. Recursive algorithms are based on
Divide and conquer approach

Top-down approach

Bottom-up approach

Hierarchial approach
32. The Sorting method which is used for external sort is
Bubble sort

Quick sort

Merge sort

Radix sort
33. Worst case efficiency of binary search is
log-(2)n+r

n

’2^(n)’

Log n
34. What is the type of the algorithm used in solving the 8 Queens problem?
Dynamic

Backtracking

Branch and Bound

None of the above
36. How many nodes are there in a full state space tree with n=6?
65

64

63

32
37. Prims algorithm is based on ------method
Divide and conquer method

Greedy method

Dynamic programming

Branch and bound
38. Graph Colouring is which type of algorithm design strategy
Backtracking

Greedy

Branch and Bound

Dynamic programming
39. The asymptotic notation for defining the average time complexity is
Equivalence

Symmetric

Reflexive

All of the above
40. The complexity of merge sort algorithm is
O(n)

'O(n^(2))'

O(log n)

O(n log n)
41. Dijkstra's banking algorithm in an operating system,solves the problem of
Deadlock recovery

Mutual exclusion

Deadlock avoidance

None of these
42. Interval between the time of submission and completion of the job is called
Waiting time

Response time

Throughput

Turnaround time
43. The example of non-pre emptive scheduling is
First-Come-First-Served

Round Robin

Last-in-First-Out

Shortest-Job-First
44. ------is a process-to-process protocol that adds only port addresses,checksum,error control and length information to the data from the upper layer:
TCP

UDP

IP

None of the above
45. The RSA algorithm uses a ---------cryptography method
Public Key

Private Key

Symmetric Key

All the above
46. The ----------attack is related to confidentially
Fabrication

Interception

Modification

Interruption
47. The cryptography method in which the plaintext BBBB become the ciphertext BCDE.This is probably
Transposition cipher

Monoalphabetic substitution cipher

Polyalphabetic substation cipher

None of the above
48. The following service is not provided by digital signature
Integrity

Authentication

Non reputation

Confidentially
49. ----------is a technique of temporarily removing inactive programs from the memory of computer system
Swapping

Spooling

Semaphore

Scheduling
50. Fence register is used for
CPU protection

Memory protection

File protection

Processor protection
51. -------clause is used to list the attributes desired in the result of a query
Where

From

Select

Having
52. We express queries in QBE by
Datalog

Skeleton tables

Entitysets

SQL
53. ----------is a set of permitted values for each attribute
Domain

Entity

Constraints

Relationship
54. Minimal super keys are called
Primary key

Foreign key

Candidate key

Unique
55. A relation is in-----every non-key attribute is irreducibly dependent on the primary key
1NF

2NF

3NF

4NF
56. A statement that the system executes automatically when a database related event occurs
View

Alter

Assertion

Trigger
57. An index record appears for every search key value in the file
Dense Index

Sparse index

Hash index

Single-key index
58. In hashing,we use the term to denote a unit of storage that can store one or more records.
Field

Hash function

Index

Bucket
59. The number of transactions executed in a given amount of time is called
Response time

Waiting time

Throughput

Performance
60. ------------is a predicate expressing a condition that we wish the database always to satisfy
Autherization

Autherization

QBE

Assertion
61. A variation in the representation of the waterfall model is called
Classic life cycle

V-Model

Incremental process model

Spiral model
62. The most common manifestation of separation of software into separately named and addressable components is called
Concern

Pattern

Modularity

Independence
63. ----------is an indication of the relative interdependence among modules
Coupling

Cohesion

Hiding

Refactoring
64. The diagram which help you to determine the functionality and features of the software from the user's perspective
Class diagram

Deployment diagram

Sequence diagram

Use-case diagram
65. -------testing is focuses on the functional requirements of the software.
White-box testing

Black-box testing

Condition testing

Unit testing
66. The software metric that provides a quantitative measure of the logical complexity of a program
Cylcomatic complexity

Defect removal efficiency

Object-oriented metrics

LOC
67. ----is the most widely used strategy for statistical quality assurance in industry
Pareto principle

CMM

Six Sigma

IEEE
68. ----------is an agile software development approach
Extreme programming

Quality function deployment

PSPEC

Unified process
69. ---------provides a notation that translates actions and conditions described in a use case into a tabular form
Decision tree

Pattern

Linear structures

Decision tables
70. ----------is a project scheduling method
PERT

Scrum model

UML

RAD
71. The bus carries bits between
Microprocess and Memory

Microprocessor and I/Os

Memory and I/Os

Microprocessor,Memory and I/Os
72. The Gray code for the binary number'(101110)-(2)'is
111101

111001

111011

111010
73. Simplify the expression AB+A(B+C)+B(B+C)using Boolean algebra techniques is
C+AC

A+AC

B+AC

B+AB
74. How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number?
One

Two

Three

Four
75. The binary equivalent for the BCD number 10000101 is
'(1010100)-(2)'

'(1000100)-(2)'

'(1110100)-(2)'

'(1010101)-(2)'
76. How many states are there in an eight-bit Johnson counter sequence?
4

8

16

32
77. How many clock pulses are required to serially enter a byte of data into an eight-bit shift register?
8

16

32

64
78. How many address bits are required for a 2048-bit memory?
10 bits

11 bits

12 bits

13 bits
79. How many tracks are there on a typical 5Square root of 2'inch floppy disk?
64

67

77

87
80. Visual cryptography is mainly used for
Text encryption

Video encryption

Audio encryption

Image encryption
81. Whose words are these”No Caste.No Religio.No God for Human being"?
Shree Narayana Guru

K.Ayyappan

Swami Vivekananda

Pandit Karuppan
82. Which Article of Constitution provide uniform civil code for the citizens?
Article 47

Article 39

Article 44

Article 48
83. Which agitation in Kerala is known as the 'Maru Marakkal Samaram'?
Channar Revolt

Attingal Revolt

Revolt of 1857

Kurichiyar Revolt
84. Who is known as 'Kalidasa of Kerala'?
Kerala Varma Valiya Koil Thampuran

Kumaranasan

Azuthachan

Ulloor S Parameswaran Ayyar
85. Who acted the role of Shree Narayana Guru in the film'Yugapurusham'?
Mammooty

Thalaivasal Vijay

R.Sukumaran

Mohanlal
86. Which among the following '8^(th)'Schedule languages of the Constitution are spoken by minority polulation?
Konkani

Dogri

Sanskrit

Manipuri
87. The birth place of Chattampi Swamikal
Kannammoola

Venganoor

Sasthamkovil

Chempazani
88. How many numbers of days lasted the Vaikom Satyagraha?
603 days

618 days

630 days

512 days
90. The Jnanapit Award recipient of 2015 Raghuveer Chaudhari is famous for his writings in----language
Bengali

Kannada

Hindi

Gujarati
91. In which year the European Union was awarded the Nobel Prize for peace?
2014

2013

2012

2015
92. Which movie won the best picture award for the 2016 Oscar?
The Revenant

Bridge of Species

Spot Light

Brooklyn
93. Which Iranian film maker who won the 'Palme d' or passed away recently?
Majid Majidi

Abbas Kiarostami

Mohsen Makhmalbaf

Jafar Panali
94. Which country is the last member State of UNO?
Bahamas

Azerbijan

South Sudan

Zimbabwe
95. Whose work is “Keralam Malayalikalude Mathrubhumi”?
George Varghese

B.Rajeevan

Dr.D.Babu Paul

E.M.S
96. Which literary work received the Vayalor Award of 2015?
Manushyanu Oru Aamukham

Arachaar

Shyama Madhavam

Anthimahakalam
97. Who is the Human Resource Development Minister of Union Cabinet?
Smriti Irani

Prakash Javadekar

Kabilsibel

M.Venkaiah Naidu
98. Which Article of the Constitution was names by Dr.B.R.Ambedkar as the Jewel Part?
Article 32

Article 19

Article 29

Article 31
99. Who won the 2016 COPA America?
Argenteena

USA

Chili

Columbia
100. Full form of NSG
Nuclear Suppliers Group

National Security Group

National Savings Group

Nuclear Sanctioned Group