Tuesday, November 7, 2017

Kerala PSC HSST Computer science solved paper

Kerala PSC Higher secondary school teacher Computer science solved paper
Question Paper Code: 86/2016/OL
Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Date of Test 29-12-2016
Alphacode A

1:-The buffer overflow attack is caused by
A:-Vulnerability in the design of a networking protocol
B:-Vulnerability in the implementation of a networking protocol
C:-Vulnerability in human behaviour
D:-Vulnerability in software
Answer:- Option-D

2:-Which of the following is not valid IPv4 addresses ?
A:-192.10.14.3
B:-201.172.275.33
C:-65.90.11.00
D:-193.20.250.10
Answer:- Option-B

3:-Address resource records are associated with
A:-Routing tables in Internet routers
B:-ARP aches in LAN workstations
C:-DNS servers
D:-None of the above
Answer:- Option-C

4:-Which of the following protocols is used in accessing web mail ?
A:-HTTP
B:-SMTP
C:-POP3
D:-IMAP
Answer:-Question Cancelled

5:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
A:-xy
B:-gcd(x, y)
C:-xy/gcd(x, y)
D:-None of these
Answer:- Option-D

6:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following
A:-Caesar cipher
B:-Vigenere cipher
C:-Hill cipher
D:-One time pad
Answer:- Option-A

7:-A product cipher is constructed using a combination of
A:-Symmetric and asymmetric ciphers
B:-Substitution and transposition ciphers
C:-Monoalphabetic and polyalphabetic ciphers
D:-Stream and block ciphers
Answer:- Option-B

8:-Which of the following characteristics is most widely used in fingerprint recognition ?
A:-Number and coordinates of arch patterns
B:-Number and coordinates of loop patterns
C:-Coordinates and orientations of fingerprint minutiae
D:-Number and coordinates of whorl patterns
Answer:- Option-C

9:-During the initial stages of an attack by a new internet scanning worm, the number of infected machines increases
A:-Exponentially with time
B:-Logarithmically with time
C:-Polynomially with time
D:-At a constant rate
Answer:- Option-A

10:-Use privileges in windows are stored in
A:-DACL
B:-ACE
C:-Access token
D:-SID
Answer:- Option-C

11:-Probabilistic packet marking is technique used in support of
A:-DDoS prevention
B:-IP traceback
C:-DDoS detection
D:-Worm detection
Answer:- Option-B

12:-The role of the payment gateway is
A:-A proxy to the merchant
B:-A financial service provider
C:-A government regulator
D:-A proxy to the bankcard network
Correct Answer:- Option-D

13:-What type of parameters are used in transcendental functions in Java ?
A:-double
B:-long
C:-byte
D:-int
Answer:- Option-A

14:-In what format is Java's character set represented ?
A:-16 bits ASCII
B:-16 bits unicode
C:-16 bits EBC
D:-None of the above
Correct Answer:- Option-B

15:-Basic futures of structured programming
A:-Sequence
B:-Looping
C:-Branching
D:-All of the above
Answer:- Option-D

16:-In which year Java was developed ?
A:-1989
B:-1990
C:-1991
D:-1992
Answer:- Option-C

17:-What feature of C++ was dropped in Java ?
A:-Virtual function
B:-Abstract class
C:-Inheritance
D:-Pointers
Answer:- Option-D

18:-What type of storage class is involved when we pass by value in function ?
A:-External
B:-Automatic
C:-StaticD:-Register
Answer:- Option-B

19:-What is Java equivalent of const in C++ ?
A:-const
B:-#define
C:-final
D:-All of the above
Answer:- Option-C

20:-What is another name for semantic errors ?
A:-Runtime errors
B:-Compile time errors
C:-Syntax errors
D:-None of the above
Answer:- Option-A

21:-What are units of width and height specified in HTML tag ?
A:-Pixels
B:-Bytes
C:-Bits
D:-All of the above
Correct Answer:- Option-A

22:-What will be the values of x, m and n after execution of the following statements ?
int x, m, n; m = 10; n = 15; x = ++m + n++;
A:-x = 25, m = 10, n = 15
B:-x = 27, m = 10, n = 15
C:-x = 26, m = 11, n = 16
D:-x = 27, m = 11, n = 16
Answer:- Option-C

23:-What will be the result of the expression 13 and 25 ?
A:-38
B:-9
C:-25
D:-12
Answer:- Option-B

24:-Which of the following will produce a value of 22 if x = 22.9 ?
A:-ceil(x)
B:-log(x)
C:-abs(x)
D:-floor(x)
Answer:- Option-D

25:-Which is the legal ways to access a class data member using this pointer ?
A:-this.x
B:-*this.x
C:-*(this.x)
D:-(*this).x
Answer:- Option-D

0 comments

Post a Comment