PSC HSST Computer Science Model Questions and Answers – Part 5

Last Updated On: 30/04/2018

26. The UNIX shell :
(A) does not come with the rest of the system
(B) forms the interface between the user and the kernel
(C) does not give any scope for programming
(D) does not allow calling one program from with in another
Answer: B

27. The invalid file in UNIX from among the ones given below is:
(A) /bin/unix (B) etc/passwd
(C) etc/group (D) usr/bin/vi
Answer: A

28. The very first process created by the Kernel in UNIX is :
(A) init (B) getty
(C) fork (D) none among these
Answer: A

29. A software package that includes two or more applications, such as word processing and spreadsheets, providing for easy transfer of data between them is best defined as :
(A) software server (B) software set
(C) integrated software package (D) application set
Answer: C

30. Which of the following is a software selection criteria?
(A) Appropriateness (B) Efficiency
(C) Compatibility (D) All of the above
Answer: D

31. Which among the following set is the software that connects two disparate applications allowing them to communicate with each other and to exchange data?
(A) Intranet middleware (B) Software bridge
(C) Software server (D) Software agent
Answer: A

32. Which of the following is NOT a property of bitmap graphics?
(A) Fast hardware exists to move blocks of pixels efficiently
(B) Realistic lighting and shading can be done
(C) All line segments can be displayed as straight
(D) Polygons can be filled with solid colors and textures
Answer: B

33. Which of the following characteristics of a programming language is best specified using a context-free grammar?
(A) Identifier length (B) Maximum level of nesting
(C) Operator precedence (D) type compatibility
Answer: C

34. Which of the following comes closest to being a perfectly secure encryption scheme?
(A) The Caesar Cipher, a substitution cipher
(B) DES (Data Encryption Standard), a symmetric-key algorithm
(C) Enigma, a transposition cipher
(D) One-time pad
Answer: B

35. Which of the following is a Parameter passing method in C?
(A) Call by value (B) Call by result
(C) Call by value-result (D) Call by name
Answer: A

36. Prolog programs are
(A) facts and knowledge bases (B) horn clauses
(C) A set of functions (D) None of the above
Answer: B

37. Kerberos is:
(A) an operating system
(B) A networking file system protocol
(C) an encrypted file system
(D) a system that supports authentication in distributed systems
Answer: D

38. ACL stands for:
(A) Automatic Control Language (B) Access Control List
(C) Associate Cache Level (D) Amortized Circular Lists
Answer: B

39. A one-time password is
(A) one that changes every time it is used.
(B) one that is assigned once and not changed at all.
(C) one that can be used only at a particular time of the day
(D) one that is assigned for all session that starts at a particular time
Answer: A

40. A hostile applet is:
(A) a downloadable applet that can cause harm on a client’s system
(B) an applet that resides on a system infected with a virus
(C) a downloadable applet that attaches itself to an existing applet.
(D) an applet generated by another applet
Answer: A

41. The Page Rank algorithm is used by
(A) www.google.com (B) www.yahoo.com
(C) www.altavista.com (D) www.go.com
Answer: A

42. The recursive function defined by f(n)=1 if n=1 and f(n)=n+f(n-1) computes the value:
(A) n2 (B) n!
(C) n(n+1)/2 (D) 2n
Answer: B

43. Which of the following file formats have the largest compression ratio?
(A) JPG (B) PCX
(C) BMP (D) TIFF
Answer: A

44. The founder of Computer Graphics is:
(A) Blaise Pascal (B) Ivan Sutherland
(C) Dennis Ritchie (D) Gourard
Answer: B

45. The scientist credited with the evolution of JAVA programming language is:
(A) James Gosling (B) Scott McNealy
(C) Andy Grove (D) Linus Torvalds
Answer: A

46. The scientist who developed the idea of the WWW is:
(A) James Gosling (B) Tim Berns Lee
(C) Andrew Tannenbaum (D) Linus Torvalds
Answer: B

47. Discovery of hidden patterns in a very large database is called:
(A) Data warehousing (B) Data management
(C) Online Transaction Processing (D) Data mining
Answer: D

48. SQL is:
(A) Data Definition Language (B) Data Manipulation Language
(C) Both (A) and (B) (D) Neither (A) nor (B)
Answer: C

49. Which of the following terms is not related with ISDN?
(A) NT1 (B) ATM
(C) BRI (D) PRI
Answer: B

50. Which of the following commands can be executed by a user for knowing the number of users logged in a UNIX system?
(A) ps (B) telnet
(C) who (D) login
Answer: D

       
Subscribe
Notify of
2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Q34 Answer is one-time pad

Q42 Answer is (C)

JOIN
2
0
Would love your thoughts, please comment.x
()
x