COMPUTER SCIENCE - PAGE 7
1. A software metric that is a measure of the average length of words and sentences in documents is caused
1) Fanin
2) Fanout
3) Cyclomatic Complexity
4) Fog Index
Ans: 4
2. Which of the following software process model gives explicit recognition of risk ?
1) Waterfall Model
2) Incremental Development Model
3) Spiral Model
4) Prototyping Model
Ans: 3
3. In software project risk management, accessing the likelihood and consequences of identified risks is called
1) Risk Identification
2) Risk analysis
3) Risk Planning
4) Risk Monitoring
Ans: 2
4. COCOMO model stands for ?
1) Common Cost Model
2) Constructive Cost Model
3) Cost Constructive Comprehensive Model
4) Comprehensive Cost Model
Ans: 2
5. In context of software testing, which of the following is not a type of user testing ?
1) Performance Testing
2) Alpha Testing
3) Beta Testing
4) Acceptance Testing
Ans: 1
6. Which model in system modeling indicate " how software will respond to external event" ?
1) Context Model
2) Data Model
3) Behavior Model
4) Object Model
Ans: 3
7. Which of the following is a functional requirement ?
1) Maintainability
2) Portability
3) Robustness
4) None of these
Ans: 4
8. Which of these is not an element of requirement model ?
1) Behavior element
2) Usage based element
3) Flow oriented element
4) All of these
Ans: 2
9. Which model of software development is best suited if requirements are frequently changing ?
1) Incremental Model
2) Spiral Model
3) Prototype Model
4) RAD Model
Ans: 3
10. Which of the following is not a category of maintenance ?
1) Corrective
2) Effective
3) Adaptive
4) Perfective
Ans: 2
11. Which of the following is the method of black box testing ?
1) Boundary value analysis
2) Basic path testing
3) Code path testing
4) None of these
Ans: 1
12. RAD Model is not suitable when
1) Technical risks are high
2) Testing is not needed
3) Technical risks are high and testing is not needed
4) None of these
Ans: 1
13. Which of the following is fault base technique?
1) Unit Testing
2) Beta Testing
3) Stress Testing
4) Mutation Testing
Ans: 4
14. Which one is not a system testing ?
1) Deployment testing
2) Stress testing
3) Safety Testing
4) Security Testing
Ans: 3
15. Which of the following is not a decomposition method of software project estimation ?
1) COCOMO model estimation
2) LOC estimation
3) FP estimation
4) All of these
Ans: 1
16. Which one is not a part of software quality attribute FURPS developed by HewlettPackard ?
1) Functionality
2) Portability
3) Reliability
4) Supportability
Ans: 2
17. Which of the following activities is not involved in configuration management of a software system product ?
1) Change Management
2) Version Management
3) Release Management
4) Quality Management
Ans: 4
18. UML stands for ?
1) Uniform Modeling Language
2) Unified Modeling Language
3) Universal Modeling Language
4) None of these
Ans: 2
19. A data store in DFD represents ?
1) Sequential file
2) Disk store
3) Repository of data
4) Random access memory
Ans: 3
20. Data flow in DFD must have : A ) An arrow showing direction of flow of data. B ) A meaningful name. C ) A
label such as : xyz D ) no arrow as they are confusing
1) A and B
2) A and C
3) B and D
4) C and D
Ans: 1
21. Statement 1 : Corrective maintenance is universally used to refer to maintenance for fault repair.
Statement 2 : Perfective Maintenance sometimes means perfecting the software by implementing new requirement.
Which of the following is correct ?
1) Statement 1 is true and Statement 2 is false
2) Statement 1 is false and Statement 2 is true
3) Statement 1 is true and Statement 2 is true
4) Statement 1 is false and Statement 2 is false
Ans: 3
22. Software feasibility study is based on :
1) Business and resource constraint only
2) Scope , business constraint only
3) Scope, technology, time constraint only
4) Technology, finance, time , resource constraint only
Ans: 4
23. The degree of interaction between two modules is known as :
1) Cohesion
2) Coupling
3) Strength
4) All of these
Ans: 2
24. Which is not a size metric ?
1) Program Length
2) Cyclomatic Complexity
3) LOC ( Line of Code )
4) FP ( Function Point )
Ans: 2
25. Effort is measured in terms of :
1) Person-months
2) Persons
3) Rupees
4) Months
Ans: 1
26:-Which one of the following is an associative container ?
A:-list
B:-queue
C:-map
D:-string
Ans: C
27:-Which one of the following is a sequence container ?
A:-stack
B:-deque
C:-queue
D:-set
Ans: B
28:-What does the acronym BCPL stands for ?
A:-Basic Combined Programming Language
B:-Basic Compiler Programming Language
C:-Beginners Combined Programming Language
D:-None of the above
Ans: A
29:-What was Ken Thompson's version of C called ?
A:-C++
B:-B
C:-P
D:-None of the above
Ans: B
30:-What does the fopen() function return ?
A:-address
B:-pointer
C:-file pointer
D:-all of the above
Ans: C
31:-Recursive algorithms are based on
A:-Divide and conquer approach
B:-Top-down approach
C:-Bottom-up approach
D:-Hierarchical approach
Ans: C
32:-The Sorting method which is used for external sort is
A:-Bubble sort
B:-Quick sort
C:-Merge sort
D:-Radix sort
Ans: C
33:-Worst case efficiency of binary search is
A:-`log_(2) n + 1`
B:-n
C:-`2^(n)`
D:-log n
Ans: D
34:-What is the type of the algorithm used in solving the 8 Queens problem ?
A:-Dynamic
B:-Backtracking
C:-Branch and Bound
D:-None of the above
Ans: B
35:-The time taken by NP-class sorting algorithm is
A:-O(1)
B:-O(log n)
C:-`O(n^(2))`
D:-O(n)
Ans: D
36:-How many nodes are there in a full state space tree with n = 6 ?
A:-65
B:-64
C:-63
D:-32
Ans: C
37:-Prims algorithm is based on __________ method.
A:-Divide and conquer method
B:-Greedy method
C:-Dynamic programming
D:-Branch and bound
Ans: B
38:-Graph Colouring is which type of algorithm design stratergy
A:-Backtracking
B:-Greedy
C:-Branch and Bound
D:-Dynamic programming
Ans: A
39:-The asymptotic notation for defining the average time complexity is
A:-Equivalence
B:-Symmetric
C:-Reflexive
D:-All of the above
Ans: A
40:-The complexity of merge sort algorithm is
A:-O(n)
B:-`O(n^(2))`
C:-O(log n)
D:-O(n log n)
Ans: D
1) Fanin
2) Fanout
3) Cyclomatic Complexity
4) Fog Index
Ans: 4
2. Which of the following software process model gives explicit recognition of risk ?
1) Waterfall Model
2) Incremental Development Model
3) Spiral Model
4) Prototyping Model
Ans: 3
3. In software project risk management, accessing the likelihood and consequences of identified risks is called
1) Risk Identification
2) Risk analysis
3) Risk Planning
4) Risk Monitoring
Ans: 2
4. COCOMO model stands for ?
1) Common Cost Model
2) Constructive Cost Model
3) Cost Constructive Comprehensive Model
4) Comprehensive Cost Model
Ans: 2
5. In context of software testing, which of the following is not a type of user testing ?
1) Performance Testing
2) Alpha Testing
3) Beta Testing
4) Acceptance Testing
Ans: 1
6. Which model in system modeling indicate " how software will respond to external event" ?
1) Context Model
2) Data Model
3) Behavior Model
4) Object Model
Ans: 3
7. Which of the following is a functional requirement ?
1) Maintainability
2) Portability
3) Robustness
4) None of these
Ans: 4
8. Which of these is not an element of requirement model ?
1) Behavior element
2) Usage based element
3) Flow oriented element
4) All of these
Ans: 2
9. Which model of software development is best suited if requirements are frequently changing ?
1) Incremental Model
2) Spiral Model
3) Prototype Model
4) RAD Model
Ans: 3
10. Which of the following is not a category of maintenance ?
1) Corrective
2) Effective
3) Adaptive
4) Perfective
Ans: 2
11. Which of the following is the method of black box testing ?
1) Boundary value analysis
2) Basic path testing
3) Code path testing
4) None of these
Ans: 1
12. RAD Model is not suitable when
1) Technical risks are high
2) Testing is not needed
3) Technical risks are high and testing is not needed
4) None of these
Ans: 1
13. Which of the following is fault base technique?
1) Unit Testing
2) Beta Testing
3) Stress Testing
4) Mutation Testing
Ans: 4
14. Which one is not a system testing ?
1) Deployment testing
2) Stress testing
3) Safety Testing
4) Security Testing
Ans: 3
15. Which of the following is not a decomposition method of software project estimation ?
1) COCOMO model estimation
2) LOC estimation
3) FP estimation
4) All of these
Ans: 1
16. Which one is not a part of software quality attribute FURPS developed by HewlettPackard ?
1) Functionality
2) Portability
3) Reliability
4) Supportability
Ans: 2
17. Which of the following activities is not involved in configuration management of a software system product ?
1) Change Management
2) Version Management
3) Release Management
4) Quality Management
Ans: 4
18. UML stands for ?
1) Uniform Modeling Language
2) Unified Modeling Language
3) Universal Modeling Language
4) None of these
Ans: 2
19. A data store in DFD represents ?
1) Sequential file
2) Disk store
3) Repository of data
4) Random access memory
Ans: 3
20. Data flow in DFD must have : A ) An arrow showing direction of flow of data. B ) A meaningful name. C ) A
label such as : xyz D ) no arrow as they are confusing
1) A and B
2) A and C
3) B and D
4) C and D
Ans: 1
21. Statement 1 : Corrective maintenance is universally used to refer to maintenance for fault repair.
Statement 2 : Perfective Maintenance sometimes means perfecting the software by implementing new requirement.
Which of the following is correct ?
1) Statement 1 is true and Statement 2 is false
2) Statement 1 is false and Statement 2 is true
3) Statement 1 is true and Statement 2 is true
4) Statement 1 is false and Statement 2 is false
Ans: 3
22. Software feasibility study is based on :
1) Business and resource constraint only
2) Scope , business constraint only
3) Scope, technology, time constraint only
4) Technology, finance, time , resource constraint only
Ans: 4
23. The degree of interaction between two modules is known as :
1) Cohesion
2) Coupling
3) Strength
4) All of these
Ans: 2
24. Which is not a size metric ?
1) Program Length
2) Cyclomatic Complexity
3) LOC ( Line of Code )
4) FP ( Function Point )
Ans: 2
25. Effort is measured in terms of :
1) Person-months
2) Persons
3) Rupees
4) Months
Ans: 1
26:-Which one of the following is an associative container ?
A:-list
B:-queue
C:-map
D:-string
Ans: C
27:-Which one of the following is a sequence container ?
A:-stack
B:-deque
C:-queue
D:-set
Ans: B
28:-What does the acronym BCPL stands for ?
A:-Basic Combined Programming Language
B:-Basic Compiler Programming Language
C:-Beginners Combined Programming Language
D:-None of the above
Ans: A
29:-What was Ken Thompson's version of C called ?
A:-C++
B:-B
C:-P
D:-None of the above
Ans: B
30:-What does the fopen() function return ?
A:-address
B:-pointer
C:-file pointer
D:-all of the above
Ans: C
31:-Recursive algorithms are based on
A:-Divide and conquer approach
B:-Top-down approach
C:-Bottom-up approach
D:-Hierarchical approach
Ans: C
32:-The Sorting method which is used for external sort is
A:-Bubble sort
B:-Quick sort
C:-Merge sort
D:-Radix sort
Ans: C
33:-Worst case efficiency of binary search is
A:-`log_(2) n + 1`
B:-n
C:-`2^(n)`
D:-log n
Ans: D
34:-What is the type of the algorithm used in solving the 8 Queens problem ?
A:-Dynamic
B:-Backtracking
C:-Branch and Bound
D:-None of the above
Ans: B
35:-The time taken by NP-class sorting algorithm is
A:-O(1)
B:-O(log n)
C:-`O(n^(2))`
D:-O(n)
Ans: D
36:-How many nodes are there in a full state space tree with n = 6 ?
A:-65
B:-64
C:-63
D:-32
Ans: C
37:-Prims algorithm is based on __________ method.
A:-Divide and conquer method
B:-Greedy method
C:-Dynamic programming
D:-Branch and bound
Ans: B
38:-Graph Colouring is which type of algorithm design stratergy
A:-Backtracking
B:-Greedy
C:-Branch and Bound
D:-Dynamic programming
Ans: A
39:-The asymptotic notation for defining the average time complexity is
A:-Equivalence
B:-Symmetric
C:-Reflexive
D:-All of the above
Ans: A
40:-The complexity of merge sort algorithm is
A:-O(n)
B:-`O(n^(2))`
C:-O(log n)
D:-O(n log n)
Ans: D
41:-Dijkstra's banking algorithm in an operating system, solves the problem of
A:-Deadlock recovery
B:-Mutual exclusion
C:-Deadlock avoidance
D:-None of these
Ans: C
42:-Interval between the time of submission and completion of the job is called
A:-Waiting time
B:-Response time
C:-Throughput
D:-Turnaround time
Ans: D
43:-The example of non-preemptive scheduling is
A:-First-Come-First-Served
B:-Round Robin
C:-Last-In-First-Out
D:-Shortest-Job-First
Ans: A
44:-__________ is a process-to-process protocol that adds only port addresses, checksum, error control and length information to the data from the upper layer.
A:-TCP
B:-UDP
C:-IP
D:-None of the above
Ans: B
45:-The RSA algorithm uses a ___________ cryptography method.
A:-Public Key
B:-Private Key
C:-Symmetric Key
D:-All the above
Ans: A
46:-The __________ attack is related to confidentiality.
A:-Fabrication
B:-Interception
C:-Modification
D:-Interruption
Ans: B
47:-The cryptography method in which the plaintext BBBB becomes the ciphertext BCDE. This is probably
A:-Transposition cipher
B:-Monoalphabetic substitution cipher
C:-Polyalphabetic substation cipher
D:-None of the above
Ans: C
48:-The following service is not provided by digital signature
A:-Integrity
B:-Authentication
C:-Nonrepudiation
D:-Confidentiality
Ans: D
49:-_________ is a technique of temporarily removing inactive programs from the memory of computer system.
A:-Swapping
B:-Spooling
C:-Semaphore
D:-Scheduling
Ans: A
50:-Fence register is used for
A:-CPU protection
B:-Memory protection
C:-File protection
D:-Processor protection
Ans: B
51:-The __________ clause is used to list the attributes desired in the result of a query.
A:-where
B:-from
C:-select
D:-having
Ans: C
52:-We express queries in QBE by
A:-Datalog
B:-Skeleton tables
C:-Entity sets
D:-SQL
Ans: B
53:-_________ is a set of permitted values for each attribute.
A:-Domain
B:-Entity
C:-Constraints
D:-Relationship
Ans: A
54:-Minimal super keys are called
A:-Primary key
B:-Foreign key
C:-Candidate key
D:-Unique
Ans: C
55:-A relation is in __________, every non-key attribute is irreducibly dependent on the primary key.
A:-1NF
B:-2NF
C:-3NF
D:-4NF
Ans: B
56:-A statement that the system executes automatically when a database related event occurs.
A:-View
B:-Alter
C:-Assertion
D:-Trigger
Ans: D
57:-An index record appears for every Search key value in the file
A:-Dense index
B:-Sparse index
C:-Hash index
D:-Single-key index
Ans: A
58:-In hashing, we use the term to denote a unit of storage that can store one or more records.
A:-Field
B:-Hash function
C:-Index
D:-Bucket
Ans: D
59:-The number of transactions executed in a given amount of time is called
A:-Response time
B:-Waiting time
C:-Throughput
D:-Performance
Ans: C
60:-_________ is a predicate expressing a condition that we wish the database always to satisfy.
A:-Authorization
B:-Deadlock
C:-QBE
D:-Assertion
Ans: D
61:-A variation in the representation of the waterfall model is called
A:-Classic life cycle
B:-V-model
C:-Incremental process model
D:-Spiral model
Ans: B
62:-The most common manifestation of separation of software into separately named and addressable components is called
A:-Concern
B:-Pattern
C:-Modularity
D:-Independence
Ans: C
63:-________ is an indication of the relative interdependence among modules.
A:-Coupling
B:-Cohesion
C:-Hiding
D:-Refactoring
Ans: A
64:-The diagram which help you to determine the functionality and features of the software from the user's perspective.
A:-Class diagram
B:-Deployment diagram
C:-Sequence diagram
D:-Use-case diagram
Ans: D
65:-__________ testing is focuses on the functional requirements of the software.
A:-White-box testing
B:-Black-box testing
C:-Condition testing
D:-Unit testing
Ans: B
66:-The software metric that provides a quantitative measure of the logical complexity of a program.
A:-Cylcomatic complexity
B:-Defect removal efficiency
C:-Object-oriented metrics
D:-LOC
Ans: A
67:-________ is the most widely used strategy for statistical quality assurance in industry.
A:-Pareto principle
B:-CMM
C:-Six Sigma
D:-IEEE
Ans: C
68:-__________ is an agile software development approach.
A:-Extreme programming
B:-Quality function deployment
C:-PSPEC
D:-Unified process
Ans: A
69:-________ provide a notation that translates actions and conditions described in a use case into a tabular form.
A:-Decision tree
B:-Pattern
C:-Linear structures
D:-Decision tables
Ans: D
70:-________ is a project scheduling method.
A:-PERT
B:-Scrum model
C:-UML
D:-RAD
Ans: A
71:-The bus carries bits between
A:-Microprocessor and Memory
B:-Microprocessor and I/Os
C:-Memory and I/Os
D:-Microprocessor, Memory and I/Os
Ans: D
72:-The Gray code for the binary number `(101110)_(2)` is
A:-111101
B:-111001
C:-111011
D:-111010
Ans: B
73:-Simplify the expression AB + A(B + C) + B(B + C) using Boolean algebra techniques is
A:-C + AC
B:-A + AC
C:-B + AC
D:-B + AB
Ans: C
74:-How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number ?
A:-One
B:-Two
C:-Three
D:-Four
Ans: B
75:-The binary equivalent for the BCD number 10000101 is
A:-`(1010100)_(2)`
B:-`(1000100)_(2)`
C:-`(1110100)_(2)`
D:-`(1010101)_(2)`
Ans: D
76:-How many states are there in an eight-bit Johnson counter sequence ?
A:-4
B:-8
C:-16
D:-32
Ans: C
77:-How many clock pulses are required to serially enter a byte of data into an eight-bit shift register ?
A:-8
B:-16
C:-32
D:-64
Ans: A
78:-How many address bits are required for a 2048-bit memory ?
A:-10 bits
B:-11 bits
C:-12 bits
D:-13 bits
Ans: B
79:-How many tracks are there on a typical 5`1/2` inch floppy disk ?
A:-64
B:-67
C:-77
D:-87
Ans: C
80:-Visual cryptography is mainly used for
A:-Text encryption
B:-Video encryption
C:-Audio encryption
D:-Image encryption
Ans: D
A:-Deadlock recovery
B:-Mutual exclusion
C:-Deadlock avoidance
D:-None of these
Ans: C
42:-Interval between the time of submission and completion of the job is called
A:-Waiting time
B:-Response time
C:-Throughput
D:-Turnaround time
Ans: D
43:-The example of non-preemptive scheduling is
A:-First-Come-First-Served
B:-Round Robin
C:-Last-In-First-Out
D:-Shortest-Job-First
Ans: A
44:-__________ is a process-to-process protocol that adds only port addresses, checksum, error control and length information to the data from the upper layer.
A:-TCP
B:-UDP
C:-IP
D:-None of the above
Ans: B
45:-The RSA algorithm uses a ___________ cryptography method.
A:-Public Key
B:-Private Key
C:-Symmetric Key
D:-All the above
Ans: A
46:-The __________ attack is related to confidentiality.
A:-Fabrication
B:-Interception
C:-Modification
D:-Interruption
Ans: B
47:-The cryptography method in which the plaintext BBBB becomes the ciphertext BCDE. This is probably
A:-Transposition cipher
B:-Monoalphabetic substitution cipher
C:-Polyalphabetic substation cipher
D:-None of the above
Ans: C
48:-The following service is not provided by digital signature
A:-Integrity
B:-Authentication
C:-Nonrepudiation
D:-Confidentiality
Ans: D
49:-_________ is a technique of temporarily removing inactive programs from the memory of computer system.
A:-Swapping
B:-Spooling
C:-Semaphore
D:-Scheduling
Ans: A
50:-Fence register is used for
A:-CPU protection
B:-Memory protection
C:-File protection
D:-Processor protection
Ans: B
51:-The __________ clause is used to list the attributes desired in the result of a query.
A:-where
B:-from
C:-select
D:-having
Ans: C
52:-We express queries in QBE by
A:-Datalog
B:-Skeleton tables
C:-Entity sets
D:-SQL
Ans: B
53:-_________ is a set of permitted values for each attribute.
A:-Domain
B:-Entity
C:-Constraints
D:-Relationship
Ans: A
54:-Minimal super keys are called
A:-Primary key
B:-Foreign key
C:-Candidate key
D:-Unique
Ans: C
55:-A relation is in __________, every non-key attribute is irreducibly dependent on the primary key.
A:-1NF
B:-2NF
C:-3NF
D:-4NF
Ans: B
56:-A statement that the system executes automatically when a database related event occurs.
A:-View
B:-Alter
C:-Assertion
D:-Trigger
Ans: D
57:-An index record appears for every Search key value in the file
A:-Dense index
B:-Sparse index
C:-Hash index
D:-Single-key index
Ans: A
58:-In hashing, we use the term to denote a unit of storage that can store one or more records.
A:-Field
B:-Hash function
C:-Index
D:-Bucket
Ans: D
59:-The number of transactions executed in a given amount of time is called
A:-Response time
B:-Waiting time
C:-Throughput
D:-Performance
Ans: C
60:-_________ is a predicate expressing a condition that we wish the database always to satisfy.
A:-Authorization
B:-Deadlock
C:-QBE
D:-Assertion
Ans: D
61:-A variation in the representation of the waterfall model is called
A:-Classic life cycle
B:-V-model
C:-Incremental process model
D:-Spiral model
Ans: B
62:-The most common manifestation of separation of software into separately named and addressable components is called
A:-Concern
B:-Pattern
C:-Modularity
D:-Independence
Ans: C
63:-________ is an indication of the relative interdependence among modules.
A:-Coupling
B:-Cohesion
C:-Hiding
D:-Refactoring
Ans: A
64:-The diagram which help you to determine the functionality and features of the software from the user's perspective.
A:-Class diagram
B:-Deployment diagram
C:-Sequence diagram
D:-Use-case diagram
Ans: D
65:-__________ testing is focuses on the functional requirements of the software.
A:-White-box testing
B:-Black-box testing
C:-Condition testing
D:-Unit testing
Ans: B
66:-The software metric that provides a quantitative measure of the logical complexity of a program.
A:-Cylcomatic complexity
B:-Defect removal efficiency
C:-Object-oriented metrics
D:-LOC
Ans: A
67:-________ is the most widely used strategy for statistical quality assurance in industry.
A:-Pareto principle
B:-CMM
C:-Six Sigma
D:-IEEE
Ans: C
68:-__________ is an agile software development approach.
A:-Extreme programming
B:-Quality function deployment
C:-PSPEC
D:-Unified process
Ans: A
69:-________ provide a notation that translates actions and conditions described in a use case into a tabular form.
A:-Decision tree
B:-Pattern
C:-Linear structures
D:-Decision tables
Ans: D
70:-________ is a project scheduling method.
A:-PERT
B:-Scrum model
C:-UML
D:-RAD
Ans: A
71:-The bus carries bits between
A:-Microprocessor and Memory
B:-Microprocessor and I/Os
C:-Memory and I/Os
D:-Microprocessor, Memory and I/Os
Ans: D
72:-The Gray code for the binary number `(101110)_(2)` is
A:-111101
B:-111001
C:-111011
D:-111010
Ans: B
73:-Simplify the expression AB + A(B + C) + B(B + C) using Boolean algebra techniques is
A:-C + AC
B:-A + AC
C:-B + AC
D:-B + AB
Ans: C
74:-How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number ?
A:-One
B:-Two
C:-Three
D:-Four
Ans: B
75:-The binary equivalent for the BCD number 10000101 is
A:-`(1010100)_(2)`
B:-`(1000100)_(2)`
C:-`(1110100)_(2)`
D:-`(1010101)_(2)`
Ans: D
76:-How many states are there in an eight-bit Johnson counter sequence ?
A:-4
B:-8
C:-16
D:-32
Ans: C
77:-How many clock pulses are required to serially enter a byte of data into an eight-bit shift register ?
A:-8
B:-16
C:-32
D:-64
Ans: A
78:-How many address bits are required for a 2048-bit memory ?
A:-10 bits
B:-11 bits
C:-12 bits
D:-13 bits
Ans: B
79:-How many tracks are there on a typical 5`1/2` inch floppy disk ?
A:-64
B:-67
C:-77
D:-87
Ans: C
80:-Visual cryptography is mainly used for
A:-Text encryption
B:-Video encryption
C:-Audio encryption
D:-Image encryption
Ans: D
81:-The buffer overflow attack is caused by
A:-Vulnerability in the design of a networking protocol
B:-Vulnerability in the implementation of a networking protocol
C:-Vulnerability in human behaviour
D:-Vulnerability in software
Ans: D
82:-Which of the following is not valid IPv4 addresses ?
A:-192.10.14.3
B:-201.172.275.33
C:-65.90.11.00
D:-193.20.250.10
Ans: B
83:-Address resource records are associated with
A:-Routing tables in Internet routers
B:-ARP aches in LAN workstations
C:-DNS servers
D:-None of the above
Ans: C
84:-Which is the legal ways to access a class data member using this pointer ?
A:-this.x
B:-*this.x
C:-*(this.x)
D:-(*this).x
Ans: D
85:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
A:-xy
B:-gcd(x, y)
C:-xy/gcd(x, y)
D:-None of these
Ans: D
86:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following
A:-Caesar cipher
B:-Vigenere cipher
C:-Hill cipher
D:-One time pad
Ans: A
87:-A product cipher is constructed using a combination of
A:-Symmetric and asymmetric ciphers
B:-Substitution and transposition ciphers
C:-Monoalphabetic and polyalphabetic ciphers
D:-Stream and block ciphers
Ans: B
88:-Which of the following characteristics is most widely used in fingerprint recognition ?
A:-Number and coordinates of arch patterns
B:-Number and coordinates of loop patterns
C:-Coordinates and orientations of fingerprint minutiae
D:-Number and coordinates of whorl patterns
Ans: C
89:-During the initial stages of an attack by a new internet scanning worm, the number of infected machines increases
A:-Exponentially with time
B:-Logarithmically with time
C:-Polynomially with time
D:-At a constant rate
Ans: A
90:-Use privileges in windows are stored in
A:-DACL
B:-ACE
C:-Access token
D:-SID
Ans: C
91:-Probabilistic packet marking is technique used in support of
A:-DDoS prevention
B:-IP traceback
C:-DDoS detection
D:-Worm detection
Ans: B
92:-The role of the payment gateway is
A:-A proxy to the merchant
B:-A financial service provider
C:-A government regulator
D:-A proxy to the bankcard network
Ans: D
93:-What type of parameters are used in transcendental functions in Java ?
A:-double
B:-long
C:-byte
D:-int
Ans: A
94:-In what format is Java's character set represented ?
A:-16 bits ASCII
B:-16 bits unicode
C:-16 bits EBC
D:-None of the above
Ans: B
95:-Basic futures of structured programming
A:-Sequence
B:-Looping
C:-Branching
D:-All of the above
Ans: D
96:-In which year Java was developed ?
A:-1989
B:-1990
C:-1991
D:-1992
Ans: C
97:-What feature of C++ was dropped in Java ?
A:-Virtual function
B:-Abstract class
C:-Inheritance
D:-Pointers
Ans: D
98:-What type of storage class is involved when we pass by value in function ?
A:-External
B:-Automatic
C:-Static
D:-Register
Ans: B
99:-What is Java equivalent of const in C++ ?
A:-const
B:-#define
C:-final
D:-All of the above
Ans: C
100:-What is another name for semantic errors ?
A:-Runtime errors
B:-Compile time errors
C:-Syntax errors
D:-None of the above
Ans: A
A:-Vulnerability in the design of a networking protocol
B:-Vulnerability in the implementation of a networking protocol
C:-Vulnerability in human behaviour
D:-Vulnerability in software
Ans: D
82:-Which of the following is not valid IPv4 addresses ?
A:-192.10.14.3
B:-201.172.275.33
C:-65.90.11.00
D:-193.20.250.10
Ans: B
83:-Address resource records are associated with
A:-Routing tables in Internet routers
B:-ARP aches in LAN workstations
C:-DNS servers
D:-None of the above
Ans: C
84:-Which is the legal ways to access a class data member using this pointer ?
A:-this.x
B:-*this.x
C:-*(this.x)
D:-(*this).x
Ans: D
85:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
A:-xy
B:-gcd(x, y)
C:-xy/gcd(x, y)
D:-None of these
Ans: D
86:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following
A:-Caesar cipher
B:-Vigenere cipher
C:-Hill cipher
D:-One time pad
Ans: A
87:-A product cipher is constructed using a combination of
A:-Symmetric and asymmetric ciphers
B:-Substitution and transposition ciphers
C:-Monoalphabetic and polyalphabetic ciphers
D:-Stream and block ciphers
Ans: B
88:-Which of the following characteristics is most widely used in fingerprint recognition ?
A:-Number and coordinates of arch patterns
B:-Number and coordinates of loop patterns
C:-Coordinates and orientations of fingerprint minutiae
D:-Number and coordinates of whorl patterns
Ans: C
89:-During the initial stages of an attack by a new internet scanning worm, the number of infected machines increases
A:-Exponentially with time
B:-Logarithmically with time
C:-Polynomially with time
D:-At a constant rate
Ans: A
90:-Use privileges in windows are stored in
A:-DACL
B:-ACE
C:-Access token
D:-SID
Ans: C
91:-Probabilistic packet marking is technique used in support of
A:-DDoS prevention
B:-IP traceback
C:-DDoS detection
D:-Worm detection
Ans: B
92:-The role of the payment gateway is
A:-A proxy to the merchant
B:-A financial service provider
C:-A government regulator
D:-A proxy to the bankcard network
Ans: D
93:-What type of parameters are used in transcendental functions in Java ?
A:-double
B:-long
C:-byte
D:-int
Ans: A
94:-In what format is Java's character set represented ?
A:-16 bits ASCII
B:-16 bits unicode
C:-16 bits EBC
D:-None of the above
Ans: B
95:-Basic futures of structured programming
A:-Sequence
B:-Looping
C:-Branching
D:-All of the above
Ans: D
96:-In which year Java was developed ?
A:-1989
B:-1990
C:-1991
D:-1992
Ans: C
97:-What feature of C++ was dropped in Java ?
A:-Virtual function
B:-Abstract class
C:-Inheritance
D:-Pointers
Ans: D
98:-What type of storage class is involved when we pass by value in function ?
A:-External
B:-Automatic
C:-Static
D:-Register
Ans: B
99:-What is Java equivalent of const in C++ ?
A:-const
B:-#define
C:-final
D:-All of the above
Ans: C
100:-What is another name for semantic errors ?
A:-Runtime errors
B:-Compile time errors
C:-Syntax errors
D:-None of the above
Ans: A
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15