M.C.a. Computer Applications 2017
M.C.a. Computer Applications 2017
M.C.a. Computer Applications 2017
MCA
1 Which term will replace the question mark in the series: ABD,DGK,HMS,MTB,SBL, ?
Alt1 ZKU
Alt2 ZKW
Alt3 ZAB
Alt4 XKW
2 Choose word from the given options which bears the same relationship to the third word, as the first two bears:
Illiteracy: Education:: Flood:?
Alt1 Rain
Alt2 Bridge
Alt3 Dam
Alt4 River
3 Select the lettered pair that has the same relationship as the original pair of words:
Sip :
Gulp
Alt1 Touch: Push
Alt2 Cup: Class
Alt3 Tent: Hut
Alt4 Soup: Water
4 Select the lettered pair that has the same relationship as the original pair of words:
Low : Cattle
Alt1 Sheep: Beef
Alt2 Gaggle: Chicken
Alt3 Grunt: Hogs
Alt4 Flock: Goat
5 Find out the number that has the same relationship as the numbers of the given pair:
8 : 81 : : 64 : ?
Alt1 125
Alt2 137
Alt3 525
Alt4 625
11 In a village there are 1000 persons. Out of which 800 are literates. Out of 1000,700 are criminals. There are 550
literate criminals in that village. How many Illiterate non criminals are there?
Alt1 150
Alt2 250
Alt3 50
Alt4 200
13 Which of the following cannot be the Median of the three positive Integers X,Y & Z ?
Alt1 X
Alt2 Z
Alt3 X+Z
Alt4 (X+Z)/3
15 A,B,C,D work on a project. Together A,B &C can complete in 100 days; Together B,C &D can complete in 101
days; Together C,D & A can complete in 102 days; together D,A & B can complete in 103 days . Rank them from
the best to the worst performer.
Alt1 C>B>A>D
Alt2 C>A>B>D
Alt3 D>B>A>C
Alt4 D>A>B>C
16 22 Students are evenly spaced on the circumference of a big circle. They are numbered 1to 22. which number is
opposite to 17?
Alt1 8
Alt2 5
Alt3 7
Alt4 6
17 The fare of a luxury cab is Rs. X for the first five Kilometres and Rs,13/- per Kilometre thereafter. If a
passenger pays Rs.2402/- for a journey of 187 kilometres, what is the value of X ?
Alt1 Rs.29
Alt2 Rs.39
Alt3 Rs.36
Alt4 Rs.31
18 An HR Company employs 4800 people out of which 45 per cent are males and 60 per cent of males are either
25 years or older. How many males are employed in that company who are younger than 25 years ?
Alt1 2640
Alt2 2160
Alt3 1296
Alt4 864
19 A person buys a shirt with marked price Rs.400/- at 20% discount. In order to make a profit of 20% the person
should sell the shirt for
Alt1 Rs.400/-
Alt2 Rs.384/-
Alt3 Rs.320/-
Alt4 Rs.480/-
20 The following information is given:(i) Five friends P, Q, R. S and T travelled to five different cities of Chennai,
Calcutta, Delhi, Bangalore and Hyderabad by five different modes of transport of Bus, Train,
Aeroplane, Car and Boat from Mumbai. (ii) The person who travelled to Delhi did not travel by boat.
(iii) R went to Bangalore by car and Q went to Calcutta by aeroplane.(iv) S travelled by boat whereas T travelled
by train.
(v) Mumbai is not connected by bus to Delhi and Chennai. Which of the following combinations of place and
mode is not correct ?
Alt1 Delhi — Bus
Alt2 Calcutta — Aeroplane
Alt3 Bangalore — Car
Alt4 Chennai — Boat
21 A pineapple costs Rs. 7 each. A watermelon costs Rs. 5 each. X spends Rs. 38 on these fruits . The number of
pineapples purchased is:-
Alt1 4
Alt2 2
Alt3 3
Alt4 Data inadequate
22 To resolve the problem of transmission of clear text passwords, we can first encrypt the password on the user's
computer and then send it to the server for authentication. This means that we must provide for some sort of
cryptographic functionality on the user's computer. In fact, this functionality is needed even in the approach of
encrypting the random number with the message digest of the user's password. This is not a problem in the case
of client-server applications, where the client is capable of performing computations anyway. However, in the
case of Internet applications, where the client is a Web browser, which does not have any special programming
capabilities, this can be a problem. Consequently, we must resort to technologies such as Secure Socket Layer
(SSL). That is, a secure SSL connection must be established between the client and the server, which would
involve the step wherein the client verifies the server's authenticity based on the server's digital certificate. After
this, all the communication between the client and the server will be encrypted using SSL, so the password need
not have any application-level protection mechanisms now. SSL would perform the required encryption
operations.
Based on the passage, we understand that SSL is needed only:-
Alt1 In client server communication
Alt2 When password for transmission needs to be encrypted
Alt3 When the client has to communicate securely with the server through a web browser
Alt4 When the client does not have any special programming capabilities
23 Enigma machine is a mechanical tool used by the Germans in World War II to scramble messages and prevent
the enemy from understanding them. Enigma was based on revolving wheels, or rotors, that were wired
together and connected to a typewriter keyboard. There were so many ways to encrypt a message that even if
1,000 analysts tried four different ways each minute, all day, every day, it would have taken the team 1.8 billion
years to test them all.
So, how did the Allies break the encryption? First, they made use of the likely chatter over the wires about each
day's events. By guessing that the Germans would be discussing certain places or issues, the Allies found sections
of scrambled text that they could relate to the original messages, or cleartext. Next, they concentrated on
Luftwaffe messages. Counting on the likelihood that the Luftwaffe signalmen were not as well trained as those in
the Army or Navy, the Allies watched for slip-ups that increased the odds of understanding the encrypted
messages. For instance, Luftwaffe signalment often used 'a girlfriend's name for a key setting or beginning a
second message with the same setting as that left at the ending of the first'. Such knowledge enabled the Allies
to determine some of the Luftwaffe's plans during the Battle of Britain. Thus, sophisticated technology can be
trumped when control protocols are not followed carefully and completely.
Which of the following is true about Enigma with reference to the passage above?
Alt1 Enigma is an electro-mechanical tool because it has revolving wheels which are wired to a typewriter keyboard
Alt2 Enigma is a mechatronic tool because it has revolving wheels which are wired to a typewriter keyboard
Alt3 Enigma is only a mechanical tool
Alt4 Enigma is a computer-supported mechanical tool because it has revolving wheels which are wired to a typewriter keyboard
25 Two numbers are in the ratio 2 : 3. If their L.C.M. is 48. What is sum of the numbers?
Alt1 28
Alt2 40
Alt3 42
Alt4 68
27 There is a group of seven persons in a family, A, B, C, D, E, F and G. They all appeared in an I.Q. test to test their
intelligence. There are two married couples in the family and three females in total. G, a female, is the most
intelligent. B, the father of E, is more intelligent than his son. C has one son and one daughter. She is more
intelligent than her husband. The father of B is more intelligent than B himself. E, the grandson of F, is the least
intelligent. F, the grandfather, is the second most intelligent in the family. The mother of B is less intelligent than
B. None among the married topped the I.Q. test. The grandmother of G has two sons, one of whom is D, who is
more intelligent than her brother but less intelligent than his wife. Nobody is a widow or a widower in the family
Alt1 AF
Alt2 AC
Alt3 AE
Alt4 AD
28 What is the least number which when divided by 5, 6, 7 and 8 leaves a remainder 3, but when divided by 9 leaves
no remainder?
Alt1 1683
Alt2 3363
Alt3 1453
Alt4 1324
29 Four girls are sitting on a bench to be photographed. Shikha is to the left of Reena. Manju is to the right of
Reena. Rita is between Reena and Manju. Who would be second from the left in the photograph?
Alt1 Rita
Alt2 Reena
Alt3 Manju
Alt4 Shikha
31 The sum of the incomes of A and B is more than that of C and D taken together. The sum of the incomes of A and
C is the same as that of B and D taken together. Moreover, A earns half as much as the sum of the incomes of B
and D.
If A's income be Rs. 80,000 per annum and the difference between the incomes of B and D be the same as A's
income, B's income is:-
32 To resolve the problem of transmission of clear text passwords, we can first encrypt the password on the user's
computer and then send it to the server for authentication. This means that we must provide for some sort of
cryptographic functionality on the user's computer. In fact, this functionality is needed even in the approach of
encrypting the random number with the message digest of the user's password. This is not a problem in the case
of client-server applications, where the client is capable of performing computations anyway. However, in the
case of Internet applications, where the client is a Web browser, which does not have any special programming
capabilities, this can be a problem. Consequently, we must resort to technologies such as Secure Socket Layer
(SSL). That is, a secure SSL connection must be established between the client and the server, which would
involve the step wherein the client verifies the server's authenticity based on the server's digital certificate. After
this, all the communication between the client and the server will be encrypted using SSL, so the password need
not have any application-level protection mechanisms now. SSL would perform the required encryption
operations.
33 If you are facing North-East and move 10 m forward, turn left and move 7.5 m, then you are:-
Alt1 South of your initial position
Alt2 East of your initial position
Alt3 North of your initial position
Alt4 12m from your initial position
Alt1 i, ii
Alt2 i, iv
Alt3 iii, iv
Alt4 ii, iii
35 At a game of billiards, A can give B 15 points in 60 and A can give C 20 points in 60. How many points can B give C
in a game of 90?
Alt1 12 points
Alt2 22 points
Alt3 10 points
Alt4 20 points
36 The product of two numbers is 9375 and the quotient, when the larger one is divided by the smaller, is 15. The
sum of the numbers is:-
Alt1 385
Alt2 380
Alt3 425
Alt4 400
Alt1 41235
Alt2 12345
Alt3 42153
Alt4 23415
41 The product of two numbers is 120 and the sum of their squares is 289. The sum of the number is:-
Alt1 189
Alt2 169
Alt3 23
Alt4 20
43 In the following sentence suggest the suitable alternative for the italicised phrase. In case no improvement is
needed mark "no improvement"
Whenever the two sisters go out for shopping, they take their pet dog with them.
Alt1 go out shopping
Alt2 go out to shopping
Alt3 go out on shopping
Alt4 no improvement
44 In order to help the company attain its goal of enhancing profit, all the employees_________.
Alt1 voluntarily offered to render additional services in lieu of nothing
Alt2 voluntarily offered to work overtime with lucrative compensation
Alt3 appealed the management to implement new welfare schemes
Alt4 urged the management to grant paid leave
45 What is the least perfect square which is divisible by each of 21, 36 and 66?
Alt1 214434
Alt2 231444
Alt3 213444
Alt4 214344
48 The difference between a two-digit number and the number obtained by interchanging the positions of its digits
is 36. What is the difference between the two digits of that number?
Alt1 4
Alt2 6
Alt3 5
Alt4 3
51 There is a group of seven persons in a family, A, B, C, D, E, F and G. They all appeared in an I.Q. test to test their
intelligence. There are two married couples in the family and three females in total. G, a female, is the most
intelligent. B, the father of E, is more intelligent than his son. C has one son and one daughter. She is more
intelligent than her husband. The father of B is more intelligent than B himself. E, the grandson of F, is the least
intelligent. F, the grandfather, is the second most intelligent in the family. The mother of B is less intelligent than
B. None among the married topped the I.Q. test. The grandmother of G has two sons, one of whom is D, who is
more intelligent than her brother but less intelligent than his wife. Nobody is a widow or a widower in the family
Alt1 A
Alt2 B
Alt3 C
Alt4 D
52 Convoy:Ships ::Deputation:?
Alt1 Politicians
Alt2 Writers
Alt3 Representatives
Alt4 Voters
53 Cube is related to square in the same way as square is related to:-
Alt1 Point
Alt2 Triangle
Alt3 Plane
Alt4 Line
59 Pick out the most effective word from the options for the following:
We shall not be able to use your ability in court unless we can find someone to ________ to statements.
Alt1 avouch
Alt2 corroborate
Alt3 approve
Alt4 verify
60 Find the correctly spelt word.
Alt1 Hinderence
Alt2 Hindrence
Alt3 Hindrance
Alt4 Hinderance
63 Spot the erroneous part of the sentence "An Indian ship laden with merchandise got drowned in the Pacific":-
64 The sum of the squares of three numbers is 138, while the sum of their products taken two at a time is 131.
Their sum is:-
Alt1 30
Alt2 40
Alt3 50
Alt4 20
65 Find a positive number which when increased by 17 is equal to 60 times the reciprocal of the number.
Alt1 17
Alt2 20
Alt3 3
Alt4 10
Alt1 Passwords are only sent from user's computer to the server
Alt2 Passwords must be used only for server authentication
Alt3 Password must be encrypted before transmission to server for authentication
Alt4 Only encrypted Password must be used for authentication with the server
69 To resolve the problem of transmission of clear text passwords, we can first encrypt the password on the user's
computer and then send it to the server for authentication. This means that we must provide for some sort of
cryptographic functionality on the user's computer. In fact, this functionality is needed even in the approach of
encrypting the random number with the message digest of the user's password. This is not a problem in the case
of client-server applications, where the client is capable of performing computations anyway. However, in the
case of Internet applications, where the client is a Web browser, which does not have any special programming
capabilities, this can be a problem. Consequently, we must resort to technologies such as Secure Socket Layer
(SSL). That is, a secure SSL connection must be established between the client and the server, which would
involve the step wherein the client verifies the server's authenticity based on the server's digital certificate. After
this, all the communication between the client and the server will be encrypted using SSL, so the password need
not have any application-level protection mechanisms now. SSL would perform the required encryption
operations.
Alt1 Cryptographic functionalities are required in the user's computer only when we use a Web browser
Alt2 Cryptographic functionalities are not required if we use client-server applications
Alt3 Cryptographic functionalities are required for encrypting user passwords
Alt4 Cryptographic functionalities are required in the user's computer
70 Two cards are drawn together from a pack of 52 cards. The probability that one is a spade and one is a heart, is
Alt1 13/102
Alt2 29/34
Alt3 3/20
Alt4 47/102
71 A man is 24 years older than his son. In two years, his age will be twice the age of his son. What is the present
age of his son?
Alt1 23 years
Alt2 25 years
Alt3 24 years
Alt4 22 years
72 Two dice are thrown together .What is the probability that the sum of the number on the two faces is divisible
by 4 or 6?
Alt1 8/18
Alt2 4/18
Alt3 7/18
Alt4 5/18
75 Timing attacks relate to public-key algorithm. However, the issue may also be relevant for symmetric ciphers. In
essence, a timing attack is one which information about the key or the plaintext is obtained by observing how
long it takes a given implementation to perform decryptions on various cipher texts. A timing attack exploits the
fact that an encryption or decryption algorithm often takes slightly different amounts of time on different inputs.
This is a long way from knowing the actual key, but it is an intriguing first step. Data Encryption Standard (DES)
algorithm appears fairly resistant to a successful timing attack but some avenues could be explored. Although
this is an interesting line of attack, it so far appears unlikely that this technique will ever be successful against
DES or more powerful symmetric ciphers such as triple DES and the Advanced Encryption Standard algorithm
Which is most relevant understanding about Timing Attack from the last line of the text?
77 There is a group of seven persons in a family, A, B, C, D, E, F and G. They all appeared in an I.Q. test to test their
intelligence. There are two married couples in the family and three females in total. G, a female, is the most
intelligent. B, the father of E, is more intelligent than his son. C has one son and one daughter. She is more
intelligent than her husband. The father of B is more intelligent than B himself. E, the grandson of F, is the least
intelligent. F, the grandfather, is the second most intelligent in the family. The mother of B is less intelligent than
B. None among the married topped the I.Q. test. The grandmother of G has two sons, one of whom is D, who is
more intelligent than her brother but less intelligent than his wife. Nobody is a widow or a widower in the family
How is G related to D?
Alt1 Daughter
Alt2 Daughter - in- law
Alt3 Niece
Alt4 Cousin
78 Enigma machine is a mechanical tool used by the Germans in World War II to scramble messages and prevent
the enemy from understanding them. Enigma was based on revolving wheels, or rotors, that were wired
together and connected to a typewriter keyboard. There were so many ways to encrypt a message that even if
1,000 analysts tried four different ways each minute, all day, every day, it would have taken the team 1.8 billion
years to test them all.
So, how did the Allies break the encryption? First, they made use of the likely chatter over the wires about each
day's events. By guessing that the Germans would be discussing certain places or issues, the Allies found sections
of scrambled text that they could relate to the original messages, or cleartext. Next, they concentrated on
Luftwaffe messages. Counting on the likelihood that the Luftwaffe signalmen were not as well trained as those in
the Army or Navy, the Allies watched for slip-ups that increased the odds of understanding the encrypted
messages. For instance, Luftwaffe signalment often used 'a girlfriend's name for a key setting or beginning a
second message with the same setting as that left at the ending of the first'. Such knowledge enabled the Allies
to determine some of the Luftwaffe's plans during the Battle of Britain. Thus, sophisticated technology can be
trumped when control protocols are not followed carefully and completely.
80 Timing attacks relate to public-key algorithm. However, the issue may also be relevant for symmetric ciphers. In
essence, a timing attack is one which information about the key or the plaintext is obtained by observing how
long it takes a given implementation to perform decryptions on various cipher texts. A timing attack exploits the
fact that an encryption or decryption algorithm often takes slightly different amounts of time on different inputs.
This is a long way from knowing the actual key, but it is an intriguing first step. Data Encryption Standard (DES)
algorithm appears fairly resistant to a successful timing attack but some avenues could be explored. Although
this is an interesting line of attack, it so far appears unlikely that this technique will ever be successful against
DES or more powerful symmetric ciphers such as triple DES and the Advanced Encryption Standard algorithm
Alt1 Timing attack relates to both symmetric ciphers and public-key algorithms
Alt2 Timing attack is directly relevant to public-key algorithms but indirectly relevant to symmetric ciphers
Alt3 Timing attack relates to public-key algorithms only
Alt4 Public Key ciphers and Symmetric ciphers can be subject to timing attacks
81 Enigma machine is a mechanical tool used by the Germans in World War II to scramble messages and prevent
the enemy from understanding them. Enigma was based on revolving wheels, or rotors, that were wired
together and connected to a typewriter keyboard. There were so many ways to encrypt a message that even if
1,000 analysts tried four different ways each minute, all day, every day, it would have taken the team 1.8 billion
years to test them all.
So, how did the Allies break the encryption? First, they made use of the likely chatter over the wires about each
day's events. By guessing that the Germans would be discussing certain places or issues, the Allies found sections
of scrambled text that they could relate to the original messages, or cleartext. Next, they concentrated on
Luftwaffe messages. Counting on the likelihood that the Luftwaffe signalmen were not as well trained as those in
the Army or Navy, the Allies watched for slip-ups that increased the odds of understanding the encrypted
messages. For instance, Luftwaffe signalment often used 'a girlfriend's name for a key setting or beginning a
second message with the same setting as that left at the ending of the first'. Such knowledge enabled the Allies
to determine some of the Luftwaffe's plans during the Battle of Britain. Thus, sophisticated technology can be
trumped when control protocols are not followed carefully and completely.
Alt1 Even 1000 analysts cannot test all the possible encryptions
Alt2 It would have taken 1000 analysts to find all the possible encryptions for a message
Alt3 It would have taken 1000 analysts 1.8 billion years to break the encryption
Alt4 Even if 1000 analysts tried four different ways each minute, all day, every day, they cannot break the encryption
83 The calendar for the year 2007 will be the same for the year:-
Alt1 2016
Alt2 2018
Alt3 2014
Alt4 2017
86 Timing attacks relate to public-key algorithm. However, the issue may also be relevant for symmetric ciphers. In
essence, a timing attack is one which information about the key or the plaintext is obtained by observing how
long it takes a given implementation to perform decryptions on various cipher texts. A timing attack exploits the
fact that an encryption or decryption algorithm often takes slightly different amounts of time on different inputs.
This is a long way from knowing the actual key, but it is an intriguing first step. Data Encryption Standard (DES)
algorithm appears fairly resistant to a successful timing attack but some avenues could be explored. Although
this is an interesting line of attack, it so far appears unlikely that this technique will ever be successful against
DES or more powerful symmetric ciphers such as triple DES and the Advanced Encryption Standard algorithm
88 If a number is multiplied by 22 and the same number is added to it then we get a number that is half the square
of that number. Find the number.
Alt1 40
Alt2 35
Alt3 30
Alt4 46
89 Timing attacks relate to public-key algorithm. However, the issue may also be relevant for symmetric ciphers. In
essence, a timing attack is one which information about the key or the plaintext is obtained by observing how
long it takes a given implementation to perform decryptions on various cipher texts. A timing attack exploits the
fact that an encryption or decryption algorithm often takes slightly different amounts of time on different inputs.
This is a long way from knowing the actual key, but it is an intriguing first step. Data Encryption Standard (DES)
algorithm appears fairly resistant to a successful timing attack but some avenues could be explored. Although
this is an interesting line of attack, it so far appears unlikely that this technique will ever be successful against
DES or more powerful symmetric ciphers such as triple DES and the Advanced Encryption Standard algorithm
Alt1 There are multiple types of timing attacks having multiple variants
Alt2 There are multiple types of timing attacks
Alt3 A single type of attack having multiple variants
Alt4 A single type of attack
90 Find the minimum number of straight lines required to make the given figure.
Alt1 14
Alt2 19
Alt3 17
Alt4 15
93 Enigma machine is a mechanical tool used by the Germans in World War II to scramble messages and prevent
the enemy from understanding them. Enigma was based on revolving wheels, or rotors, that were wired
together and connected to a typewriter keyboard. There were so many ways to encrypt a message that even if
1,000 analysts tried four different ways each minute, all day, every day, it would have taken the team 1.8 billion
years to test them all.
So, how did the Allies break the encryption? First, they made use of the likely chatter over the wires about each
day's events. By guessing that the Germans would be discussing certain places or issues, the Allies found sections
of scrambled text that they could relate to the original messages, or cleartext. Next, they concentrated on
Luftwaffe messages. Counting on the likelihood that the Luftwaffe signalmen were not as well trained as those in
the Army or Navy, the Allies watched for slip-ups that increased the odds of understanding the encrypted
messages. For instance, Luftwaffe signalment often used 'a girlfriend's name for a key setting or beginning a
second message with the same setting as that left at the ending of the first'. Such knowledge enabled the Allies
to determine some of the Luftwaffe's plans during the Battle of Britain. Thus, sophisticated technology can be
trumped when control protocols are not followed carefully and completely.
97 Android is a:-
Alt1 Mobile Operating System
Alt2 Framework
Alt3 Package
Alt4 Programming Language
100 What is the number of triangles that can be formed whose vertices are the vertices of an octagon but have only
one side common with that of octagon?
Alt1 32
Alt2 16
Alt3 24
Alt4 64