HSST COMPUTER SCIENCE – SR FOR SC/ST – KHSE

PROVISIONAL ANSWER KEY
Question Paper Code: 86/2016/OL
Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Medium of Question: English
Date of Test 29-12-2016
Alphacode A
Question1:-The buffer overflow attack is caused by
A:-Vulnerability in the design of a networking protocol
B:-Vulnerability in the implementation of a networking protocol
C:-Vulnerability in human behaviour
D:-Vulnerability in software
Correct Answer:- Option-D
Question2:-Which of the following is not valid IPv4 addresses ?
A:-192.10.14.3
B:-201.172.275.33
C:-65.90.11.00
D:-193.20.250.10
Correct Answer:- Option-B
Question3:-Address resource records are associated with
A:-Routing tables in Internet routers
B:-ARP aches in LAN workstations
C:-DNS servers
D:-None of the above
Correct Answer:- Option-C
Question4:-Which of the following protocols is used in accessing web mail ?
A:-HTTP
B:-SMTP
C:-POP3
D:-IMAP
Correct Answer:- Option-A
Question5:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
A:-xy
B:-gcd(x, y)
C:-xy/gcd(x, y)
D:-None of these
Correct Answer:- Option-D
Question6:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical
output symbols in which of the following
A:-Caesar cipher
B:-Vigenere cipher
C:-Hill cipher
D:-One time pad
Correct Answer:- Option-A
Question7:-A product cipher is constructed using a combination of
A:-Symmetric and asymmetric ciphers
B:-Substitution and transposition ciphers
C:-Monoalphabetic and polyalphabetic ciphers
D:-Stream and block ciphers
Correct Answer:- Option-B
Question8:-Which of the following characteristics is most widely used in fingerprint recognition ?
A:-Number and coordinates of arch patterns
B:-Number and coordinates of loop patterns
C:-Coordinates and orientations of fingerprint minutiae
D:-Number and coordinates of whorl patterns
Correct Answer:- Option-C
Question9:-During the initial stages of an attack by a new internet scanning worm, the number of infected machines
increases
A:-Exponentially with time
B:-Logarithmically with time
C:-Polynomially with time
D:-At a constant rate
Correct Answer:- Option-A
Question10:-Use privileges in windows are stored in
A:-DACL
B:-ACE
C:-Access token
D:-SID
Correct Answer:- Option-C
Question11:-Probabilistic packet marking is technique used in support of
A:-DDoS prevention
B:-IP traceback
C:-DDoS detection
D:-Worm detection
Correct Answer:- Option-B
Question12:-The role of the payment gateway is
A:-A proxy to the merchant
B:-A financial service provider
C:-A government regulator
D:-A proxy to the bankcard network
Correct Answer:- Option-D
Question13:-What type of parameters are used in transcendental functions in Java ?
A:-double
B:-long
C:-byte
D:-int
Correct Answer:- Option-A
Question14:-In what format is Java’s character set represented ?
A:-16 bits ASCII
B:-16 bits unicode
C:-16 bits EBC
D:-None of the above
Correct Answer:- Option-B
Question15:-Basic futures of structured programming
A:-Sequence
B:-Looping
C:-Branching
D:-All of the above
Correct Answer:- Option-D
Question16:-In which year Java was developed ?
A:-1989
B:-1990
C:-1991
D:-1992
Correct Answer:- Option-C
Question17:-What feature of C++ was dropped in Java ?
A:-Virtual function
B:-Abstract class
C:-Inheritance
D:-Pointers
Correct Answer:- Option-D
Question18:-What type of storage class is involved when we pass by value in function ?
A:-External
B:-Automatic
C:-Static
D:-Register
Correct Answer:- Option-B
Question19:-What is Java equivalent of const in C++ ?
A:-const
B:-#define
C:-final
D:-All of the above
Correct Answer:- Option-C
Question20:-What is another name for semantic errors ?
A:-Runtime errors
B:-Compile time errors
C:-Syntax errors
D:-None of the above
Correct Answer:- Option-A
Question21:-What are units of width and height specified in HTML tag ?
A:-Pixels
B:-Bytes
C:-Bits
D:-All of the above
Correct Answer:- Option-A
Question22:-What will be the values of x, m and n after execution of the following statements ?
int x, m, n;
m = 10;
n = 15;
x = ++m + n++;
A:-x = 25, m = 10, n = 15
B:-x = 27, m = 10, n = 15
C:-x = 26, m = 11, n = 16
D:-x = 27, m = 11, n = 16
Correct Answer:- Option-C
Question23:-What will be the result of the expression 13 and 25 ?
A:-38
B:-9
C:-25
D:-12
Correct Answer:- Option-B
Question24:-Which of the following will produce a value of 22 if x = 22.9 ?
A:-ceil(x)
B:-log(x)
C:-abs(x)
D:-floor(x)
Correct Answer:- Option-D
Question25:-Which is the legal ways to access a class data member using this pointer ?
A:-this.x
B:-*this.x
C:-*(this.x)
D:-(*this).x
Correct Answer:- Option-D
Question26:-Which one of the following is an associative container ?
A:-list
B:-queue
C:-map
D:-string
Correct Answer:- Option-C
Question27:-Which one of the following is a sequence container ?
A:-stack
B:-deque
C:-queue
D:-set
Correct Answer:- Option-B
Question28:-What does the acronym BCPL stands for ?
A:-Basic Combined Programming Language
B:-Basic Compiler Programming Language
C:-Beginners Combined Programming Language
D:-None of the above
Correct Answer:- Option-A
Question29:-What was Ken Thompson’s version of C called ?
A:-C++
B:-B
C:-P
D:-None of the above
Correct Answer:- Option-B
Question30:-What does the fopen() function return ?
A:-address
B:-pointer
C:-file pointer
D:-all of the above
Correct Answer:- Option-C
Question31:-Recursive algorithms are based on
A:-Divide and conquer approach
B:-Top-down approach
C:-Bottom-up approach
D:-Hierarchical approach
Correct Answer:- Option-C
Question32:-The Sorting method which is used for external sort is
A:-Bubble sort
B:-Quick sort
C:-Merge sort
D:-Radix sort
Correct Answer:- Option-D
Question33:-Worst case efficiency of binary search is
A:-`log_(2) n + 1`
B:-n
C:-`2^(n)`
D:-log n
Correct Answer:- Option-A
Question34:-What is the type of the algorithm used in solving the 8 Queens problem ?
A:-Dynamic
B:-Backtracking
C:-Branch and Bound
D:-None of the above
Correct Answer:- Option-B
Question35:-The time taken by NP-class sorting algorithm is
A:-O(1)
B:-O(log n)
C:-`O(n^(2))`
D:-O(n)
Correct Answer:- Option-D
Question36:-How many nodes are there in a full state space tree with n = 6 ?
A:-65
B:-64
C:-63
D:-32
Correct Answer:- Option-C
Question37:-Prims algorithm is based on __________ method.
A:-Divide and conquer method
B:-Greedy method
C:-Dynamic programming
D:-Branch and bound
Correct Answer:- Option-B
Question38:-Graph Colouring is which type of algorithm design stratergy
A:-Backtracking
B:-Greedy
C:-Branch and Bound
D:-Dynamic programming
Correct Answer:- Option-A
Question39:-The asymptotic notation for defining the average time complexity is
A:-Equivalence
B:-Symmetric
C:-Reflexive
D:-All of the above
Correct Answer:- Option-A
Question40:-The complexity of merge sort algorithm is
A:-O(n)
B:-`O(n^(2))`
C:-O(log n)
D:-O(n log n)
Correct Answer:- Option-D
Question41:-Dijkstra’s banking algorithm in an operating system, solves the problem of
A:-Deadlock recovery
B:-Mutual exclusion
C:-Deadlock avoidance
D:-None of these
Correct Answer:- Option-C
Question42:-Interval between the time of submission and completion of the job is called
A:-Waiting time
B:-Response time
C:-Throughput
D:-Turnaround time
Correct Answer:- Option-D
Question43:-The example of non-preemptive scheduling is
A:-First-Come-First-Served
B:-Round Robin
C:-Last-In-First-Out
D:-Shortest-Job-First
Correct Answer:- Option-A
Question44:-__________ is a process-to-process protocol that adds only port addresses, checksum, error control and length
information to the data from the upper layer.
A:-TCP
B:-UDP
C:-IP
D:-None of the above
Correct Answer:- Option-B
Question45:-The RSA algorithm uses a ___________ cryptography method.
A:-Public Key
B:-Private Key
C:-Symmetric Key
D:-All the above
Correct Answer:- Option-A
Question46:-The __________ attack is related to confidentiality.
A:-Fabrication
B:-Interception
C:-Modification
D:-Interruption
Correct Answer:- Option-B
Question47:-The cryptography method in which the plaintext BBBB becomes the ciphertext BCDE. This is probably
A:-Transposition cipher
B:-Monoalphabetic substitution cipher
C:-Polyalphabetic substation cipher
D:-None of the above
Correct Answer:- Option-C
Question48:-The following service is not provided by digital signature
A:-Integrity
B:-Authentication
C:-Nonrepudiation
D:-Confidentiality
Correct Answer:- Option-D
Question49:-_________ is a technique of temporarily removing inactive programs from the memory of computer system.
A:-Swapping
B:-Spooling
C:-Semaphore
D:-Scheduling
Correct Answer:- Option-A
Question50:-Fence register is used for
A:-CPU protection
B:-Memory protection
C:-File protection
D:-Processor protection
Correct Answer:- Option-B
Question51:-The __________ clause is used to list the attributes desired in the result of a query.
A:-where
B:-from
C:-select
D:-having
Correct Answer:- Option-C
Question52:-We express queries in QBE by
A:-Datalog
B:-Skeleton tables
C:-Entity sets
D:-SQL
Correct Answer:- Option-B
Question53:-_________ is a set of permitted values for each attribute.
A:-Domain
B:-Entity
C:-Constraints
D:-Relationship
Correct Answer:- Option-A
Question54:-Minimal super keys are called
A:-Primary key
B:-Foreign key
C:-Candidate key
D:-Unique
Correct Answer:- Option-C
Question55:-A relation is in __________, every non-key attribute is irreducibly dependent on the primary key.
A:-1NF
B:-2NF
C:-3NF
D:-4NF
Correct Answer:- Option-B
Question56:-A statement that the system executes automatically when a database related event occurs.
A:-View
B:-Alter
C:-Assertion
D:-Trigger
Correct Answer:- Option-D
Question57:-An index record appears for every Search key value in the file
A:-Dense index
B:-Sparse index
C:-Hash index
D:-Single-key index
Correct Answer:- Option-A
Question58:-In hashing, we use the term to denote a unit of storage that can store one or more records.
A:-Field
B:-Hash function
C:-Index
D:-Bucket
Correct Answer:- Option-D
Question59:-The number of transactions executed in a given amount of time is called
A:-Response time
B:-Waiting time
C:-Throughput
D:-Performance
Correct Answer:- Option-C
Question60:-_________ is a predicate expressing a condition that we wish the database always to satisfy.
A:-Authorization
B:-Deadlock
C:-QBE
D:-Assertion
Correct Answer:- Option-D
Question61:-A variation in the representation of the waterfall model is called
A:-Classic life cycle
B:-V-model
C:-Incremental process model
D:-Spiral model
Correct Answer:- Option-B
Question62:-The most common manifestation of separation of software into separately named and addressable components
is called
A:-Concern
B:-Pattern
C:-Modularity
D:-Independence
Correct Answer:- Option-C
Question63:-________ is an indication of the relative interdependence among modules.
A:-Coupling
B:-Cohesion
C:-Hiding
D:-Refactoring
Correct Answer:- Option-A
Question64:-The diagram which help you to determine the functionality and features of the software from the user’s
perspective.
A:-Class diagram
B:-Deployment diagram
C:-Sequence diagram
D:-Use-case diagram
Correct Answer:- Option-D
Question65:-__________ testing is focuses on the functional requirements of the software.
A:-White-box testing
B:-Black-box testing
C:-Condition testing
D:-Unit testing
Correct Answer:- Option-B
Question66:-The software metric that provides a quantitative measure of the logical complexity of a program.
A:-Cylcomatic complexity
B:-Defect removal efficiency
C:-Object-oriented metrics
D:-LOC
Correct Answer:- Option-A
Question67:-________ is the most widely used strategy for statistical quality assurance in industry.
A:-Pareto principle
B:-CMM
C:-Six Sigma
D:-IEEE
Correct Answer:- Option-C
Question68:-__________ is an agile software development approach.
A:-Extreme programming
B:-Quality function deployment
C:-PSPEC
D:-Unified process
Correct Answer:- Option-A
Question69:-________ provide a notation that translates actions and conditions described in a use case into a tabular form.
A:-Decision tree
B:-Pattern
C:-Linear structures
D:-Decision tables
Correct Answer:- Option-D
Question70:-________ is a project scheduling method.
A:-PERT
B:-Scrum model
C:-UML
D:-RAD
Correct Answer:- Option-A
Question71:-The bus carries bits between
A:-Microprocessor and Memory
B:-Microprocessor and I/Os
C:-Memory and I/Os
D:-Microprocessor, Memory and I/Os
Correct Answer:- Option-D
Question72:-The Gray code for the binary number `(101110)_(2)` is
A:-111101
B:-111001
C:-111011
D:-111010
Correct Answer:- Option-B
Question73:-Simplify the expression AB + A(B + C) + B(B + C) using Boolean algebra techniques is
A:-C + AC
B:-A + AC
C:-B + AC
D:-B + AB
Correct Answer:- Option-C
Question74:-How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number ?
A:-One
B:-Two
C:-Three
D:-Four
Correct Answer:- Option-B
Question75:-The binary equivalent for the BCD number 10000101 is
A:-`(1010100)_(2)`
B:-`(1000100)_(2)`
C:-`(1110100)_(2)`
D:-`(1010101)_(2)`
Correct Answer:- Option-D
Question76:-How many states are there in an eight-bit Johnson counter sequence ?
A:-4
B:-8
C:-16
D:-32
Correct Answer:- Option-C
Question77:-How many clock pulses are required to serially enter a byte of data into an eight-bit shift register ?
A:-8
B:-16
C:-32
D:-64
Correct Answer:- Option-A
Question78:-How many address bits are required for a 2048-bit memory ?
A:-10 bits
B:-11 bits
C:-12 bits
D:-13 bits
Correct Answer:- Option-B
Question79:-How many tracks are there on a typical 5`1/2` inch floppy disk ?
A:-64
B:-67
C:-77
D:-87
Correct Answer:- Option-C
Question80:-Visual cryptography is mainly used for
A:-Text encryption
B:-Video encryption
C:-Audio encryption
D:-Image encryption
Correct Answer:- Option-D
Question81:-Whose words are these “No Caste, No Religion, No God for Human being” ?
A:-Shree Narayana Guru
B:-K. Ayyappan
C:-Swami Vivekananda
D:-Pandit Karuppan
Correct Answer:- Option-B
Question82:-Which Article of Constitution provide uniform civil code for the citizens ?
A:-Article 47
B:-Article 39
C:-Article 44
D:-Article 48
Correct Answer:- Option-C
Question83:-Which agitation in Kerala is known as the “Maru Marakkal Samaram” ?
A:-Channar Revolt
B:-Attingal Revolt
C:-Revolt of 1857
D:-Kurichiyar Revolt
Correct Answer:- Option-A
Question84:-Who is known as ‘Kalidasa of Kerala’ ?
A:-Kerala Varma Valiya Koil Thampuran
B:-Kumaranasan
C:-Azuthachan
D:-Ulloor S. Parameswaran Ayyar
Correct Answer:- Option-A
Question85:-Who acted the role of Shree Narayana Guru in the film “Yugapurusham” ?
A:-Mammooty
B:-Thalaivasal Vijay
C:-R. Sukumaran
D:-Mohanlal
Correct Answer:- Option-B
Question86:-Which among the following `8^(th)` Schedule languages of the Constitution are spoken by minority polulation ?
A:-Konkani
B:-Dogri
C:-Sanskrit
D:-Manipuri
Correct Answer:- Option-C
Question87:-The birth place of Chattampi Swamikal
A:-Kannammoola
B:-Venganoor
C:-Sasthamkovil
D:-Chempazani
Correct Answer:- Option-A
Question88:-How many numbers of days lasted the Vaikom Satyagraha ?
A:-603 days
B:-618 days
C:-630 days
D:-512 days
Correct Answer:- Option-A
Question89:-Which social reformer is known as the “Lincoln of Kerala” ?
A:-Chattampi Swamikal
B:-Pandit Karuppan
C:-K. Ayyappan
D:-Shree Narayana Guru
Correct Answer:- Option-B
Question90:-The Jnanapit Award recipient of 2015 Raghuveer Chaudhari is famous for his writings in ________ language.
A:-Bengali
B:-Kannada
C:-Hindi
D:-Gujarati
Correct Answer:- Option-D
Question91:-In which year the European Union was awarded the Nobel Prize for peace ?
A:-2014
B:-2013
C:-2012
D:-2015
Correct Answer:- Option-C
Question92:-Which movie won the best picture award for the 2016 Oscar ?
A:-The Revenant
B:-Bridge of Species
C:-Spot Light
D:-Brooklyn
Correct Answer:- Option-B
Question93:-Which Iranian film maker who won the “Palme d′ or’ passed away recently ?
A:-Majid Majidi
B:-Abbas Kiarostami
C:-Mohsen Makhmalbaf
D:-Jafar Panali
Correct Answer:- Option-B
Question94:-Which country is the last member State of UNO ?
A:-Bahamas
B:-Azerbaijan
C:-South Sudan
D:-Zimbabwe
Correct Answer:- Option-C
Question95:-Whose work is “Keralam Malayalikalude Mathrubhumi” ?
A:-George Varghese
B:-B. Rajeevan
C:-Dr. D. Babu Paul
D:-E.M.S.
Correct Answer:- Option-D
Question96:-Which literary work received the Vayalor Award of 2015 ?
A:-Manushyanu Oru Aamukham
B:-Arachaar
C:-Shyama Madhavam
D:-Anthimahakalam
Correct Answer:- Option-A
Question97:-Who is the Human Resource Development Minister of Union Cabinet ?
A:-Smriti Irani
B:-Prakash Javadekar
C:-Kabilsibel
D:-M. Venkaiah Naidu
Correct Answer:- Option-B
Question98:-Which Article of the Constitution was names by Dr. B. R. Ambedkar as the Jewel Part ?
A:-Article 32
B:-Article 19
C:-Article 29
D:-Article 31
Correct Answer:- Option-A
Question99:-Who won the 2016 COPA America ?
A:-Argenteena
B:-USA
C:-Chili
D:-Columbia
Correct Answer:- Option-C
Question100:-Full form of NSG
A:-Nuclear Suppliers Group
B:-National Security Group
C:-National Savings Group
D:-Nuclear Sanctioned Group
Correct Answer:- Option-A

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *