0% found this document useful (0 votes)
61 views12 pages

HSST Computer Science SR For SCST

Uploaded by

rahul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views12 pages

HSST Computer Science SR For SCST

Uploaded by

rahul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

PROVISIONAL ANSWER KEY

Question Paper Code: 86/2016/OL


Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Medium of Question: English
Date of Test 29-12-2016
Alphacode A
Question1:-The buffer overflow attack is caused by
A:-Vulnerability in the design of a networking protocol
B:-Vulnerability in the implementation of a networking protocol
C:-Vulnerability in human behaviour
D:-Vulnerability in software
Correct Answer:- Option-D
Question2:-Which of the following is not valid IPv4 addresses ?
A:-192.10.14.3
B:-201.172.275.33
C:-65.90.11.00
D:-193.20.250.10
Correct Answer:- Option-B
Question3:-Address resource records are associated with
A:-Routing tables in Internet routers
B:-ARP aches in LAN workstations
C:-DNS servers
D:-None of the above
Correct Answer:- Option-C
Question4:-Which of the following protocols is used in accessing web mail ?
A:-HTTP
B:-SMTP
C:-POP3
D:-IMAP
Correct Answer:- Option-A
Question5:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
A:-xy
B:-gcd(x, y)
C:-xy/gcd(x, y)
D:-None of these
Correct Answer:- Option-D
Question6:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical
output symbols in which of the following
A:-Caesar cipher
B:-Vigenere cipher
C:-Hill cipher
D:-One time pad
Correct Answer:- Option-A
Question7:-A product cipher is constructed using a combination of
A:-Symmetric and asymmetric ciphers
B:-Substitution and transposition ciphers
C:-Monoalphabetic and polyalphabetic ciphers
D:-Stream and block ciphers
Correct Answer:- Option-B
Question8:-Which of the following characteristics is most widely used in fingerprint recognition ?
A:-Number and coordinates of arch patterns
B:-Number and coordinates of loop patterns
C:-Coordinates and orientations of fingerprint minutiae
D:-Number and coordinates of whorl patterns
Correct Answer:- Option-C
Question9:-During the initial stages of an attack by a new internet scanning worm, the number of infected machines
increases
A:-Exponentially with time
B:-Logarithmically with time
C:-Polynomially with time
D:-At a constant rate
Correct Answer:- Option-A
Question10:-Use privileges in windows are stored in
A:-DACL
B:-ACE
C:-Access token
D:-SID
Correct Answer:- Option-C
Question11:-Probabilistic packet marking is technique used in support of
A:-DDoS prevention
B:-IP traceback
C:-DDoS detection
D:-Worm detection
Correct Answer:- Option-B
Question12:-The role of the payment gateway is
A:-A proxy to the merchant
B:-A financial service provider
C:-A government regulator
D:-A proxy to the bankcard network
Correct Answer:- Option-D
Question13:-What type of parameters are used in transcendental functions in Java ?
A:-double
B:-long
C:-byte
D:-int
Correct Answer:- Option-A
Question14:-In what format is Java's character set represented ?
A:-16 bits ASCII
B:-16 bits unicode
C:-16 bits EBC
D:-None of the above
Correct Answer:- Option-B
Question15:-Basic futures of structured programming
A:-Sequence
B:-Looping
C:-Branching
D:-All of the above
Correct Answer:- Option-D
Question16:-In which year Java was developed ?
A:-1989
B:-1990
C:-1991
D:-1992
Correct Answer:- Option-C
Question17:-What feature of C++ was dropped in Java ?
A:-Virtual function
B:-Abstract class
C:-Inheritance
D:-Pointers
Correct Answer:- Option-D
Question18:-What type of storage class is involved when we pass by value in function ?
A:-External
B:-Automatic
C:-Static
D:-Register
Correct Answer:- Option-B
Question19:-What is Java equivalent of const in C++ ?
A:-const
B:-#define
C:-final
D:-All of the above
Correct Answer:- Option-C
Question20:-What is another name for semantic errors ?
A:-Runtime errors
B:-Compile time errors
C:-Syntax errors
D:-None of the above
Correct Answer:- Option-A
Question21:-What are units of width and height specified in HTML tag ?
A:-Pixels
B:-Bytes
C:-Bits
D:-All of the above
Correct Answer:- Option-A
Question22:-What will be the values of x, m and n after execution of the following statements ?
int x, m, n;
m = 10;
n = 15;
x = ++m + n++;
A:-x = 25, m = 10, n = 15
B:-x = 27, m = 10, n = 15
C:-x = 26, m = 11, n = 16
D:-x = 27, m = 11, n = 16
Correct Answer:- Option-C
Question23:-What will be the result of the expression 13 and 25 ?
A:-38
B:-9
C:-25
D:-12
Correct Answer:- Option-B
Question24:-Which of the following will produce a value of 22 if x = 22.9 ?
A:-ceil(x)
B:-log(x)
C:-abs(x)
D:-floor(x)
Correct Answer:- Option-D
Question25:-Which is the legal ways to access a class data member using this pointer ?
A:-this.x
B:-*this.x
C:-*(this.x)
D:-(*this).x
Correct Answer:- Option-D
Question26:-Which one of the following is an associative container ?
A:-list
B:-queue
C:-map
D:-string
Correct Answer:- Option-C
Question27:-Which one of the following is a sequence container ?
A:-stack
B:-deque
C:-queue
D:-set
Correct Answer:- Option-B
Question28:-What does the acronym BCPL stands for ?
A:-Basic Combined Programming Language
B:-Basic Compiler Programming Language
C:-Beginners Combined Programming Language
D:-None of the above
Correct Answer:- Option-A
Question29:-What was Ken Thompson's version of C called ?
A:-C++
B:-B
C:-P
D:-None of the above
Correct Answer:- Option-B
Question30:-What does the fopen() function return ?
A:-address
B:-pointer
C:-file pointer
D:-all of the above
Correct Answer:- Option-C
Question31:-Recursive algorithms are based on
A:-Divide and conquer approach
B:-Top-down approach
C:-Bottom-up approach
D:-Hierarchical approach
Correct Answer:- Option-C
Question32:-The Sorting method which is used for external sort is
A:-Bubble sort
B:-Quick sort
C:-Merge sort
D:-Radix sort
Correct Answer:- Option-D
Question33:-Worst case efficiency of binary search is
A:-`log_(2) n + 1`
B:-n
C:-`2^(n)`
D:-log n
Correct Answer:- Option-A
Question34:-What is the type of the algorithm used in solving the 8 Queens problem ?
A:-Dynamic
B:-Backtracking
C:-Branch and Bound
D:-None of the above
Correct Answer:- Option-B
Question35:-The time taken by NP-class sorting algorithm is
A:-O(1)
B:-O(log n)
C:-`O(n^(2))`
D:-O(n)
Correct Answer:- Option-D
Question36:-How many nodes are there in a full state space tree with n = 6 ?
A:-65
B:-64
C:-63
D:-32
Correct Answer:- Option-C
Question37:-Prims algorithm is based on __________ method.
A:-Divide and conquer method
B:-Greedy method
C:-Dynamic programming
D:-Branch and bound
Correct Answer:- Option-B
Question38:-Graph Colouring is which type of algorithm design stratergy
A:-Backtracking
B:-Greedy
C:-Branch and Bound
D:-Dynamic programming
Correct Answer:- Option-A
Question39:-The asymptotic notation for defining the average time complexity is
A:-Equivalence
B:-Symmetric
C:-Reflexive
D:-All of the above
Correct Answer:- Option-A
Question40:-The complexity of merge sort algorithm is
A:-O(n)
B:-`O(n^(2))`
C:-O(log n)
D:-O(n log n)
Correct Answer:- Option-D
Question41:-Dijkstra's banking algorithm in an operating system, solves the problem of
A:-Deadlock recovery
B:-Mutual exclusion
C:-Deadlock avoidance
D:-None of these
Correct Answer:- Option-C
Question42:-Interval between the time of submission and completion of the job is called
A:-Waiting time
B:-Response time
C:-Throughput
D:-Turnaround time
Correct Answer:- Option-D
Question43:-The example of non-preemptive scheduling is
A:-First-Come-First-Served
B:-Round Robin
C:-Last-In-First-Out
D:-Shortest-Job-First
Correct Answer:- Option-A
Question44:-__________ is a process-to-process protocol that adds only port addresses, checksum, error control and length
information to the data from the upper layer.
A:-TCP
B:-UDP
C:-IP
D:-None of the above
Correct Answer:- Option-B
Question45:-The RSA algorithm uses a ___________ cryptography method.
A:-Public Key
B:-Private Key
C:-Symmetric Key
D:-All the above
Correct Answer:- Option-A
Question46:-The __________ attack is related to confidentiality.
A:-Fabrication
B:-Interception
C:-Modification
D:-Interruption
Correct Answer:- Option-B
Question47:-The cryptography method in which the plaintext BBBB becomes the ciphertext BCDE. This is probably
A:-Transposition cipher
B:-Monoalphabetic substitution cipher
C:-Polyalphabetic substation cipher
D:-None of the above
Correct Answer:- Option-C
Question48:-The following service is not provided by digital signature
A:-Integrity
B:-Authentication
C:-Nonrepudiation
D:-Confidentiality
Correct Answer:- Option-D
Question49:-_________ is a technique of temporarily removing inactive programs from the memory of computer system.
A:-Swapping
B:-Spooling
C:-Semaphore
D:-Scheduling
Correct Answer:- Option-A
Question50:-Fence register is used for
A:-CPU protection
B:-Memory protection
C:-File protection
D:-Processor protection
Correct Answer:- Option-B
Question51:-The __________ clause is used to list the attributes desired in the result of a query.
A:-where
B:-from
C:-select
D:-having
Correct Answer:- Option-C
Question52:-We express queries in QBE by
A:-Datalog
B:-Skeleton tables
C:-Entity sets
D:-SQL
Correct Answer:- Option-B
Question53:-_________ is a set of permitted values for each attribute.
A:-Domain
B:-Entity
C:-Constraints
D:-Relationship
Correct Answer:- Option-A
Question54:-Minimal super keys are called
A:-Primary key
B:-Foreign key
C:-Candidate key
D:-Unique
Correct Answer:- Option-C
Question55:-A relation is in __________, every non-key attribute is irreducibly dependent on the primary key.
A:-1NF
B:-2NF
C:-3NF
D:-4NF
Correct Answer:- Option-B
Question56:-A statement that the system executes automatically when a database related event occurs.
A:-View
B:-Alter
C:-Assertion
D:-Trigger
Correct Answer:- Option-D
Question57:-An index record appears for every Search key value in the file
A:-Dense index
B:-Sparse index
C:-Hash index
D:-Single-key index
Correct Answer:- Option-A
Question58:-In hashing, we use the term to denote a unit of storage that can store one or more records.
A:-Field
B:-Hash function
C:-Index
D:-Bucket
Correct Answer:- Option-D
Question59:-The number of transactions executed in a given amount of time is called
A:-Response time
B:-Waiting time
C:-Throughput
D:-Performance
Correct Answer:- Option-C
Question60:-_________ is a predicate expressing a condition that we wish the database always to satisfy.
A:-Authorization
B:-Deadlock
C:-QBE
D:-Assertion
Correct Answer:- Option-D
Question61:-A variation in the representation of the waterfall model is called
A:-Classic life cycle
B:-V-model
C:-Incremental process model
D:-Spiral model
Correct Answer:- Option-B
Question62:-The most common manifestation of separation of software into separately named and addressable components
is called
A:-Concern
B:-Pattern
C:-Modularity
D:-Independence
Correct Answer:- Option-C
Question63:-________ is an indication of the relative interdependence among modules.
A:-Coupling
B:-Cohesion
C:-Hiding
D:-Refactoring
Correct Answer:- Option-A
Question64:-The diagram which help you to determine the functionality and features of the software from the user's
perspective.
A:-Class diagram
B:-Deployment diagram
C:-Sequence diagram
D:-Use-case diagram
Correct Answer:- Option-D
Question65:-__________ testing is focuses on the functional requirements of the software.
A:-White-box testing
B:-Black-box testing
C:-Condition testing
D:-Unit testing
Correct Answer:- Option-B
Question66:-The software metric that provides a quantitative measure of the logical complexity of a program.
A:-Cylcomatic complexity
B:-Defect removal efficiency
C:-Object-oriented metrics
D:-LOC
Correct Answer:- Option-A
Question67:-________ is the most widely used strategy for statistical quality assurance in industry.
A:-Pareto principle
B:-CMM
C:-Six Sigma
D:-IEEE
Correct Answer:- Option-C
Question68:-__________ is an agile software development approach.
A:-Extreme programming
B:-Quality function deployment
C:-PSPEC
D:-Unified process
Correct Answer:- Option-A
Question69:-________ provide a notation that translates actions and conditions described in a use case into a tabular form.
A:-Decision tree
B:-Pattern
C:-Linear structures
D:-Decision tables
Correct Answer:- Option-D
Question70:-________ is a project scheduling method.
A:-PERT
B:-Scrum model
C:-UML
D:-RAD
Correct Answer:- Option-A
Question71:-The bus carries bits between
A:-Microprocessor and Memory
B:-Microprocessor and I/Os
C:-Memory and I/Os
D:-Microprocessor, Memory and I/Os
Correct Answer:- Option-D
Question72:-The Gray code for the binary number `(101110)_(2)` is
A:-111101
B:-111001
C:-111011
D:-111010
Correct Answer:- Option-B
Question73:-Simplify the expression AB + A(B + C) + B(B + C) using Boolean algebra techniques is
A:-C + AC
B:-A + AC
C:-B + AC
D:-B + AB
Correct Answer:- Option-C
Question74:-How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number ?
A:-One
B:-Two
C:-Three
D:-Four
Correct Answer:- Option-B
Question75:-The binary equivalent for the BCD number 10000101 is
A:-`(1010100)_(2)`
B:-`(1000100)_(2)`
C:-`(1110100)_(2)`
D:-`(1010101)_(2)`
Correct Answer:- Option-D
Question76:-How many states are there in an eight-bit Johnson counter sequence ?
A:-4
B:-8
C:-16
D:-32
Correct Answer:- Option-C
Question77:-How many clock pulses are required to serially enter a byte of data into an eight-bit shift register ?
A:-8
B:-16
C:-32
D:-64
Correct Answer:- Option-A
Question78:-How many address bits are required for a 2048-bit memory ?
A:-10 bits
B:-11 bits
C:-12 bits
D:-13 bits
Correct Answer:- Option-B
Question79:-How many tracks are there on a typical 5`1/2` inch floppy disk ?
A:-64
B:-67
C:-77
D:-87
Correct Answer:- Option-C
Question80:-Visual cryptography is mainly used for
A:-Text encryption
B:-Video encryption
C:-Audio encryption
D:-Image encryption
Correct Answer:- Option-D
Question81:-Whose words are these "No Caste, No Religion, No God for Human being" ?
A:-Shree Narayana Guru
B:-K. Ayyappan
C:-Swami Vivekananda
D:-Pandit Karuppan
Correct Answer:- Option-B
Question82:-Which Article of Constitution provide uniform civil code for the citizens ?
A:-Article 47
B:-Article 39
C:-Article 44
D:-Article 48
Correct Answer:- Option-C
Question83:-Which agitation in Kerala is known as the "Maru Marakkal Samaram" ?
A:-Channar Revolt
B:-Attingal Revolt
C:-Revolt of 1857
D:-Kurichiyar Revolt
Correct Answer:- Option-A
Question84:-Who is known as 'Kalidasa of Kerala' ?
A:-Kerala Varma Valiya Koil Thampuran
B:-Kumaranasan
C:-Azuthachan
D:-Ulloor S. Parameswaran Ayyar
Correct Answer:- Option-A
Question85:-Who acted the role of Shree Narayana Guru in the film "Yugapurusham" ?
A:-Mammooty
B:-Thalaivasal Vijay
C:-R. Sukumaran
D:-Mohanlal
Correct Answer:- Option-B
Question86:-Which among the following `8^(th)` Schedule languages of the Constitution are spoken by minority polulation ?
A:-Konkani
B:-Dogri
C:-Sanskrit
D:-Manipuri
Correct Answer:- Option-C
Question87:-The birth place of Chattampi Swamikal
A:-Kannammoola
B:-Venganoor
C:-Sasthamkovil
D:-Chempazani
Correct Answer:- Option-A
Question88:-How many numbers of days lasted the Vaikom Satyagraha ?
A:-603 days
B:-618 days
C:-630 days
D:-512 days
Correct Answer:- Option-A
Question89:-Which social reformer is known as the "Lincoln of Kerala" ?
A:-Chattampi Swamikal
B:-Pandit Karuppan
C:-K. Ayyappan
D:-Shree Narayana Guru
Correct Answer:- Option-B
Question90:-The Jnanapit Award recipient of 2015 Raghuveer Chaudhari is famous for his writings in ________ language.
A:-Bengali
B:-Kannada
C:-Hindi
D:-Gujarati
Correct Answer:- Option-D
Question91:-In which year the European Union was awarded the Nobel Prize for peace ?
A:-2014
B:-2013
C:-2012
D:-2015
Correct Answer:- Option-C
Question92:-Which movie won the best picture award for the 2016 Oscar ?
A:-The Revenant
B:-Bridge of Species
C:-Spot Light
D:-Brooklyn
Correct Answer:- Option-B
Question93:-Which Iranian film maker who won the "Palme d′ or’ passed away recently ?
A:-Majid Majidi
B:-Abbas Kiarostami
C:-Mohsen Makhmalbaf
D:-Jafar Panali
Correct Answer:- Option-B
Question94:-Which country is the last member State of UNO ?
A:-Bahamas
B:-Azerbaijan
C:-South Sudan
D:-Zimbabwe
Correct Answer:- Option-C
Question95:-Whose work is "Keralam Malayalikalude Mathrubhumi" ?
A:-George Varghese
B:-B. Rajeevan
C:-Dr. D. Babu Paul
D:-E.M.S.
Correct Answer:- Option-D
Question96:-Which literary work received the Vayalor Award of 2015 ?
A:-Manushyanu Oru Aamukham
B:-Arachaar
C:-Shyama Madhavam
D:-Anthimahakalam
Correct Answer:- Option-A
Question97:-Who is the Human Resource Development Minister of Union Cabinet ?
A:-Smriti Irani
B:-Prakash Javadekar
C:-Kabilsibel
D:-M. Venkaiah Naidu
Correct Answer:- Option-B
Question98:-Which Article of the Constitution was names by Dr. B. R. Ambedkar as the Jewel Part ?
A:-Article 32
B:-Article 19
C:-Article 29
D:-Article 31
Correct Answer:- Option-A
Question99:-Who won the 2016 COPA America ?
A:-Argenteena
B:-USA
C:-Chili
D:-Columbia
Correct Answer:- Option-C
Question100:-Full form of NSG
A:-Nuclear Suppliers Group
B:-National Security Group
C:-National Savings Group
D:-Nuclear Sanctioned Group
Correct Answer:- Option-A
RPSC Programmer व
कम्प्यट
ू र अनद
ु े शक भर्ती के
लिए हस्र्तलिखिर्त नोट्स के
लिए जड
ु े टे िीग्राम चैनि लििंक
पर क्लिक करें 👇
https://t.me/ComputerMap29

https://t.me/ComputerMap29
ओल्ड पेपर उपलब्ध कम्प्यूटर ववषय सम्पबंधधत ओल
इंडडया GATE, UGC NET, ISRO, NIELIT सभी
प्रकार के

You might also like