19 January 2017

// // Leave a Comment

HSST COMPUTER SCIENCE (SR FOR SC/ST)(ONLINE EXAM) 29-12-2016

HSST COMPUTER SCIENCE (SR FOR SC/ST)(ONLINE EXAM)
EXAM DATE:29-12-2016
PDF FILE DOWNLOAD     DOC FILE DOWNLOAD

1.The buffer overflow attack is caused by
A.Vulnerability in the design of a networking protocol
B.Vulnerability in the implementation of a networking protocol
C.Vulnerability in human behavior
D.Vulnerability in software*
Ans:D

2.Which of the following is not valid IPv4 addresses?
A.192.10.14.3
B.201.172.275.33*
C.65.90.11.00
D.193.20.250.10
Ans:B
3.Address resource records are associated with
A.Routing tables in Internet routers
B.ARP aches in LAN workstations
C.DNS servers*
D.None of the above
Ans:C
4.Which of the following protocols is used in accessing web mail?
A.HTTP*
B.SMTP
C.POP3
D.IMAP
Ans:A
5.If gcd(a,b)=x and gcd(b,c)=y,then gcd(a,c)is
A.xy
B.gcd(x,y)
C.xy/gcd(x,y)
D.None of these*
Ans:D
6.Assuming the same key is used,two occurrences of the same plaintext  characters are encrypted as identical output symbols in which of the following
A.Caesar cipher*
B.Vigenere cipher
C.Hill cipher
D.One time pad
Ans:A
7.A product cipher is constructed using a combination of
A.Symmetric and asymmetric ciphers
B.Substitution and transposition ciphers*
C.Monoalphabetic and polyalphabetic ciphers
D.Stream and block ciphers
Ans:B
8.Which of the following characteristics is most widely used in fingerprint recognition?
A.Number and coordinates of arch patterns
B.Number and coordinates of loop patterns
C.Coordinates and orientations of fingerprint minutiae*
D.Number and coordinates of whorl patterns
Ans:C
9.During the initial stages of an attack by a new internet scanning worm,the number of infected machines increases
A.Exponentially with time*
B.Logarithmically with time
C.Polynomially with time
D.At a constant rate
Ans:A
10.Use privileges in windows are stored in
A.DACL
B.ACE
C.Access token*
D.SID
Ans:C
11.Probabilistic packet marking is technique used in support of
A.DDOS prevention
B.IP traceback*
C.DDoS detection
D.Worm detection
Ans:B
12.The role of the payment gateway is
A.A proxy to the merchant
B.A financial service provider
C.A government regulator
D.A proxy to the bankcard network*
Ans:D
13.What type of parameters are used in transcendental functions in Java?
A.Double*
B.Long
C.Byte
D.Int
Ans:A
14.In what format is Java’s character set represented?
A.16 bits ASCII
B.16 bits Unicode*
C.16 bits EBC
D.None of the above
Ans:B
15.Basic futures of structured programming
A.Sequence
B.Looping
C.Branching
D.All of the above*
Ans:D
16.In which year Java was developed?
A.1989
B.1990
C.1991*
D.1992
Ans:C
17.What feature of C++ was dropped in Java?
A.Virtual function
B.Abstract class
C.Inheritance
D.Pointers*
Ans:D
18.What type of storage class is involved when we pass by value in function?
A.External
B.Automatic*
C.Static
D.Register
Ans:B
19.What is Java equivalent of const in C++?
A.Const
B.Define
C.Final*
D.All of the above
Ans:C
20.What is another name for semantic errors?
A.Runtime errors*
B.Compile time errors
C.Syntax errors
D.None of the above
Ans:A
21.What are units of width and height specified in HTML tag?
A.Pixels*
B.Bytes
C.Bits
D.All of the above
Ans:A
22.What will be the values of x,m and n after execution of the following statements?
Int x,m,n;
m=10;
n=15;
x=++m+n++;
A.x=25,m=10,n=15
B.x=27,m=10,n=15
C.x=26,m=11,n=16*
D.x=27,m=11,n=16
Ans:C
23.What will be the result of the expression 13 and 25?
A.38
B.9*
C.25
D.12
Ans:B
24.Which of the following will produce a value of 22 if x=22.9?
A.ceil(x)
B.log(x)
C.abs(x)
D.floor(x)*
Ans:D
25.Which is the legal ways to access a class data member using the pointer?
A.this.x
B.*this.x
C.*(this.x)
D.(*this).x*
Ans:D
26.Which is the legal ways to access a class data member using this pointer?
A.list
B.queue
C.map*
D.string
Ans:C
27.Which one of the following is a sequence container?
A.stack
B.deque*
C.queue
D.set
Ans:B
28.What does the acronym BCPL stands for?
A.Basic Combined Programming Language*
B.Basic Compiler Programming Language
C.Beginners Combined Programming Language
D.None of the above
Ans:A
29.What was Ken Thompson’s version of C called?
A.C++
B.B*
C.P
D.None of the above
Ans:B
30.What does the fopen()function return?
A.Address
B.Pointer
C.File pointer*
D.All of the above
Ans:C
31.Recursive algorithms are based on
A.Divide and conquer approach
B.Top-down approach
C.Bottom-up approach*
D.Hierarchial approach
Ans:C
32.The Sorting method which is used for external sort is
A.Bubble sort
B.Quick sort
C.Merge sort
D.Radix sort*
Ans:D
33.Worst case efficiency of binary search is
A.’log-(2)n+r*
B.n
C.’2^(n)’
D.Log n
Ans:A
34.What is the type of the algorithm used in solving the 8 Queens problem?
A.Dynamic
B.Backtracking*
C.Branch and Bound
D.None of the above
Ans:B
35.The time taken by NP-class sorting algorithm is
A.O(1)
B.O(log n)
C.’O(n^(2))’
D.O(n)*
Ans:D
36.How many nodes are there in a full state space tree with n=6?
A.65
B.64
C.63*
D.32
Ans:C
37.Prims algorithm is based on ------method
A.Divide and conquer method
B.Greedy method*
C.Dynamic programming
D.Branch and bound
Ans:B
38.Graph Colouring is which type of algorithm design strategy
A.Backtracking*
B.Greedy
C.Branch and Bound
D.Dynamic programming
Ans:A
39.The asymptotic notation for defining the average time complexity is
A.Equivalence*
B.Symmetric
C.Reflexive
D.All of the above
Ans:A
40.The complexity of merge sort algorithm is
A.O(n)
B.’O(n^(2))’
C.O(log n)
D.O(n log n)*
Ans:D
41.Dijkstra’s banking algorithm in an operating system,solves the problem of
A.Deadlock recovery
B.Mutual exclusion
C.Deadlock avoidance*
D.None of these
Ans:C
42.Interval between the time of submission and completion of the job is called
A.Waiting time
B.Response time
C.Throughput
D.Turnaround time*
Ans:D
43.The example of non-pre emptive scheduling is
A.First-Come-First-Served*
B.Round Robin
C.Last-in-First-Out
D.Shortest-Job-First
Ans:A
44.------is a process-to-process protocol that adds only port addresses,checksum,error control and length information to the data from the upper layer:
A.TCP
B.UDP*
C.IP
D.None of the above
Ans:B
45.The RSA algorithm uses a ---------cryptography method
A.Public Key*
B.Private Key
C.Symmetric Key
D.All the above
Ans:A
46.The ----------attack is related to confidentially
A.Fabrication
B.Interception*
C.Modification
D.Interruption
Ans:B
47.The cryptography method in which the plaintext BBBB become the ciphertext BCDE.This is probably
A.Transposition cipher
B.Monoalphabetic substitution cipher
C.Polyalphabetic substation cipher*
D.None of the above
Ans:C
48.The following service is not provided by digital signature
A.Integrity
B.Authentication
C.Non reputation
D.Confidentially*
Ans:D
49.----------is a technique of temporarily removing inactive programs from the memory of computer system
A.Swapping*
B.Spooling
C.Semaphore
D.Scheduling
Ans:A
50.Fence register is used for
A.CPU protection
B.Memory protection*
C.File protection
D.Processor protection
Ans:B
51.The -------clause is used to list the attributes desired in the result of a query
A.Where
B.From
C.Select*
D.Having
Ans:C
52.We express queries in QBE by
A.Datalog
B.Skeleton tables*
C.Entitysets
D.SQL
Ans:B
53.----------is a set of permitted values for each attribute
A.Domain*
B.Entity
C.Constraints
D.Relationship
Ans:A
54.Minimal super keys are called
A.Primary key
B.Foreign key
C.Candidate key*
D.Unique
Ans:C
55.A relation is in-----every non-key attribute is irreducibly dependent on the primary key
A.1NF
B.2NF*
C.3NF
D.4NF
Ans:B
56.A statement that the system executes automatically when a database related event occurs
A.View
B.Alter
C.Assertion
D.Trigger*
Ans:D
57.An  index record appears for every search key value in the file
A.Dense Index*
B.Sparse index
C.Hash index
D.Single-key index
Ans:A
58.In hashing,we use the term to denote a unit of storage that can store one or more records.
A.Field
B.Hash function
C.Index
D.Bucket*
Ans:D
59.The number of transactions executed in a given amount of time is called
A.Response time
B.Waiting time
C.Throughput*
D.Performance
Ans:C
60.------------is a predicate expressing a condition that we wish the database always to satisfy
A.Autherization
B.Deadlock
C.QBE
D.Assertion*
Ans:D
61.A variation in the representation of the waterfall model is called
A.Classic life cycle
B.V-Model*
C.Incremental process model
D.Spiral model
Ans:B
62.The most common manifestation of separation of software into separately named and addressable components is called
A.Concern
B.Pattern
C.Modularity*
D.Independence
Ans:C
63.----------is an indication of the relative interdependence among modules
A.Coupling*
B.Cohesion
C.Hiding
D.Refactoring
Ans:A
64.The diagram which help you to determine the functionality and features of the software from the user’s perspective
A.Class diagram
B.Deployment diagram
C.Sequence diagram
D.Use-case diagram*
Ans:D
65.-------testing is focuses on the functional requirements of the software.
A.White-box testing
B.Black-box testing*
C.Condition testing
D.Unit testing
Ans:B
66.The software metric that provides a quantitative measure of the logical complexity of a program
A.Cylcomatic complexity*
B.Defect removal efficiency
C.Object-oriented metrics
D.LOC
Ans:A
67.----is the most widely used strategy for statistical quality assurance in industry
A.Pareto principle
B.CMM
C.Six Sigma*
D.IEEE
Ans:C
68.----------is an agile software development approach
A.Extreme programming*
B.Quality function deployment
C.PSPEC
D.Unified process
Ans:A
69.---------provides a notation that translates actions and conditions described in a use case into a tabular form
A.Decision tree
B.Pattern
C.Linear structures
D.Decision tables*
Ans:D
70.----------is a project scheduling method
A.PERT*
B.Scrum model
C.UML
D.RAD
Ans:A
71.The bus carries bits between
A.Microprocess and Memory
B.Microprocessor and I/Os
C.Memory and I/Os
D.Microprocessor,Memory and I/Os*
Ans:D
72.The Gray code for the binary number’(101110)-(2)’is
A.111101
B.111001*
C.111011
D.111010
Ans:B
73.Simplify the expression AB+A(B+C)+B(B+C)using Boolean algebra techniques is
A.C+AC
B.A+AC
C.B+AC*
D.B+AB
Ans:C
74.How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number?
A.One
B.Two*
C.Three
D.Four
Ans:B
75.The binary equivalent for the BCD number 10000101 is
A.’(1010100)-(2)’
B.’(1000100)-(2)’
C.’(1110100)-(2)’
D.’(1010101)-(2)’*
Ans:D
76.How many states are there in an eight-bit Johnson counter sequence?
A.4
B.8
C.16*
D.32
Ans:C
77.How many clock pulses are required to serially enter a byte of data into an eight-bit shift register?
A.8*
B.16
C.32
D.64
Ans:A
78.How many address bits are required for a 2048-bit memory?
A.10 bits
B.11 bits*
C.12 bits
D.13 bits
Ans:B
79.How many tracks are there on a typical 5Square root of 2’inch floppy disk?
A.64
B.67
C.77*
D.87
Ans:C
80.Visual cryptography is mainly used for
A.Text encryption
B.Video encryption
C.Audio encryption
D.Image encryption*
Ans:D
81.Whose words are these”No Caste.No Religio.No God for Human being’?
A.Shree Narayana Guru
B.K.Ayyappan*
C.Swami Vivekananda
D.Pandit Karuppan
Ans:B
82.Which Article of Constitution provide uniform civil code for the citizens?
A.Article 47
B.Article 39
C.Article 44*
D.Article 48
Ans:C
83.Which agitation in Kerala is known as the ‘Maru Marakkal Samaram’?
A.Channar Revolt*
B.Attingal Revolt
C.Revolt of 1857
D.Kurichiyar Revolt
Ans:A
84.Who is known as ‘Kalidasa of Kerala’?
A.Kerala Varma Valiya Koil Thampuran*
B.KUmaranasan
C.Azuthachan
D.Ulloor S Parameswaran Ayyar
Ans:A
85.Who acted the role of Shree Narayana Guru in the film’Yugapurusham’?
A.Mammooty
B.Thalaivasal Vijay*
C.R.Sukumaran
D.Mohanlal
Ans:B
86.Which among the following ‘8^(th)’Schedule languages of the Constitution are spoken by minority polulation?
A.Konkani
B.Dogri
C.Sanskrit*
D.Manipuri
Ans:C
87.The birth place of Chattampi Swamikal
A.Kannammoola*
B.Venganoor
C.Sasthamkovil
D.Chempazani
Ans:A
88.How many numbers of days lasted the Vaikom Satyagraha?
A.603 days*
B.618 days
C.630 days
D.512 days
Ans:A
89.Which social reformer is known as the ‘Lincoln of Kerala’?
A.Chattampi Swamikal
B.Pandit Karuppan*
C.K.Ayyappan
D.Shree Narayana Guru
Ans:B
90.The Jnanapit Award recipient of 2015 Raghuveer Chaudhari is famous for his writings in----language
A.Bengali
B.Kannada
C.Hindi
D.Gujarati*
Ans:D
91.In which year the European Union was awarded the Nobel Prize for peace?
A.2014
B.2013
C.2012*
D.2015
Ans:C
92.Which movie won the best picture award for the 2016 Oscar?
A.The Revenant
B.Bridge of Species*
C.Spot Light
D.Brooklyn
Ans:B
93.Which Iranian film maker who won the ‘Palme d’ or’ passed away recently?
A.Majid Majidi
B.Abbas Kiarostami*
C.Mohsen Makhmalbaf
D.Jafar Panali
Ans:B
94.Which country is the last member State of UNO?
A.Bahamas
B.Azerbijan
C.South Sudan*
D.Zimbabwe
Ans:C
95.Whose work is “Keralam Malayalikalude Mathrubhumi”?
A.George Varghese
B.B.Rajeevan
C.Dr.D.Babu Paul
D.E.M.S*
Ans:D
96.Which literary work received the Vayalor Award of 2015?
A.Manushyanu Oru Aamukham*
B.Arachaar
C.Shyama Madhavam
D.Anthimahakalam
Ans:A
97.Who is the Human Resource Development Minister of Union Cabinet?
A.Smriti Irani
B.Prakash Javadekar*
C.Kabilsibel
D.M.Venkaiah Naidu
Ans:B
98.Which Article of the Constitution was names by Dr.B.R.Ambedkar as the Jewel Part?
A.Article 32*
B.Article 19
C.Article 29
D.Article 31
Ans:A
99.Who won the 2016 COPA America?
A.Argenteena
B.USA
C.Chili*
D.Columbia
Ans:C
100.Full form of NSG
A.Nuclear Suppliers Group*
B.National Security Group
C.National Savings Group
D.Nuclear Sanctioned Group
Ans:A


Please Give Us Your 1 Minute In Sharing This Post!
SOCIALIZE IT →
FOLLOW US →
SHARE IT →
Powered By: BloggerYard.Com

0 comments:

Post a Comment

Thanks for Visiting!!Especially Thanks for join our online exam services.We value your feedback,so please write to your experience share with us that will help to future programs.
Kindly please share your question papers that will help everyone,You can also Email to EXAMCHOICES@GMAIL.COM."ATTENTION PLEASE:IF YOU FIND ANY WRONG ANSWER IN THIS WEBSITE,PLEASE INFORM COMMENT BELOW EACH QUESTION PAPER POST,THAT WILL HELP TO OTHERS.FINAL ANSWERS YOU CHECK OFFICIAL WEBSITES"
You have to dream before your dreams can true-Dr.A.P.J.Abdul Kalam
Hope this has helped.Please do Like and Subscribe
Your Support means a lot to us:)
Always standing by you and Working for your success.

WELCOMES YOU EXAMCHOICES.IN:WAY TO LEARN AND WIN

Follow by Email