PSC HSST Computer Science SR for SC/ST Solved Paper 2016 – Part 1

Last Updated On: 30/04/2018

PSC HSST Computer Science SR for SC/ST Solved Paper 2016: Here are the previous year (2016) solved question paper for PSC Higher Secondary School Teacher Computer Science examination.

PSC HSST Computer Science SR for SC/ST Solved Paper 2016 – Part 1

Question Paper Code: 86/2016/OL
Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Date of Test: 29-12-2016
Alpha code: A

1. The buffer overflow attack is caused by
(A) Vulnerability in the design of a networking protocol
(B) Vulnerability in the implementation of a networking protocol
(C) Vulnerability in human behaviour
(D) Vulnerability in software
Answer: D

2. Which of the following is not valid IPv4 addresses?
(A) 192.10.14.3
(B) 201.172.275.33
(C) 65.90.11.00
(D) 193.20.250.10
Answer: B

3. Address resource records are associated with
(A) Routing tables in Internet routers
(B) ARP aches in LAN workstations
(C) DNS servers
(D) None of the above
Answer: C

4. Which of the following protocols is used in accessing web mail?
(A) HTTP
(B) SMTP
(C) POP3
(D) IMAP
Answer:-Question Cancelled

5. If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
(A) xy
(B) gcd(x, y)
(C) xy/gcd(x, y)
(D) None of these
Answer: D

6. Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following
(A) Caesar cipher
(B) Vigenere cipher
(C) Hill cipher
(D) One time pad
Answer: A

7. A product cipher is constructed using a combination of
(A) Symmetric and asymmetric ciphers
(B) Substitution and transposition ciphers
(C) Monoalphabetic and polyalphabetic ciphers
(D) Stream and block ciphers
Answer: B

8. Which of the following characteristics is most widely used in fingerprint recognition?
(A) Number and coordinates of arch patterns
(B) Number and coordinates of loop patterns
(C) Coordinates and orientations of fingerprint minutiae
(D) Number and coordinates of whorl patterns
Answer: C

9. During the initial stages of an attack by a new internet scanning worm, the number of infected machines increases
(A) Exponentially with time
(B) Logarithmically with time
(C) Polynomially with time
(D) At a constant rate
Answer: A

10. Use privileges in windows are stored in
(A) DACL
(B) ACE
(C) Access token
(D) SID
Answer: C

11. Probabilistic packet marking is technique used in support of
(A) DDoS prevention
(B) IP traceback
(C) DDoS detection
(D) Worm detection
Answer: B

12. The role of the payment gateway is
(A) A proxy to the merchant
(B) A financial service provider
(C) A government regulator
(D) A proxy to the bankcard network
Answer: D

13. What type of parameters are used in transcendental functions in Java?
(A) double
(B) long
(C) byte
(D) int
Answer: A

14. In what format is Java’s character set represented?
(A) 16 bits ASCII
(B) 16 bits unicode
(C) 16 bits EBC
(D) None of the above
Answer: B

15. Basic futures of structured programming
(A) Sequence
(B) Looping
(C) Branching
(D) All of the above
Answer: D

16. In which year Java was developed?
(A) 1989
(B) 1990
(C) 1991
(D) 1992
Answer: C

17. What feature of C++ was dropped in Java?
(A) Virtual function
(B) Abstract class
(C) Inheritance
(D) Pointers
Answer: D

18. What type of storage class is involved when we pass by value in function?
(A) External
(B) Automatic
(C) Static
(D) Register
Answer: B

19. What is Java equivalent of const in C++?
(A) const
(B) #define
(C) final
(D) All of the above
Answer: C

20. What is another name for semantic errors?
(A) Runtime errors
(B) Compile time errors
(C) Syntax errors
(D) None of the above
Answer: A

21. What are units of width and height specified in HTML tag?
(A) Pixels
(B) Bytes
(C) Bits
(D) All of the above
Answer: A

22. What will be the values of x, m and n after execution of the following statements?
int x, m, n;
m = 10;
n = 15;
x = ++m + n++;
(A) x = 25, m = 10, n = 15
(B) x = 27, m = 10, n = 15
(C) x = 26, m = 11, n = 16
(D) x = 27, m = 11, n = 16
Answer: C

23. What will be the result of the expression 13 and 25?
(A) 38
(B) 9
(C) 25
(D) 12
Answer: B

24. Which of the following will produce a value of 22 if x = 22.9?
(A) ceil(x)
(B) log(x)
(C) abs(x)
(D) floor(x)
Answer: D

25. Which is the legal ways to access a class data member using this pointer?
(A) this.x
(B) *this.x
(C) *(this.x)
(D) (*this).x
Answer: D

PSC HSST Computer Science SR for SC/ST Solved Paper 2016 – Part 1

PSC HSST Computer Science SR for SC/ST Solved Paper 2016 – Part 2

PSC HSST Computer Science SR for SC/ST Solved Paper 2016 – Part 3

PSC HSST Computer Science SR for SC/ST Solved Paper 2016 – Part 4

       
Subscribe
Notify of
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
JOIN
0
Would love your thoughts, please comment.x
()
x