Saturday, 29 October 2016

HSST Computer Science Solved Paper - Question Paper Code: 348/2005 - Part 2

21.       Which of the following is (are) true about virtual memory systems that use pages?
(i) The virtual address space can be larger than the amount of physical memory
(ii) Programs must be resident in main memory throughout their execution
(iii) Pages correspond to semantic characteristics of the program.
(A) (i) only                     (B) (ii) only    
(C) (i) and (ii)                (D) (i) and (iii)
Answer: A
22.       Which among the following will not lead to a deadlock?
(A) Mutual exclusion  (B) Hold and Wait
(C) Preemption                        (D) Circular wait
Answer: C
23.       Which level of security is implemented in Windows NT?
(A) A1                (B) C1
(C) B2                (D) C2
Answer: D
24.       A method of executing two or more programs concurrently using the same computer describe:
(A) multi processing                (B) multiprogramming
(C) virtual processing             (D) time sharing
Answer: B
25.       Windows is a .............. bit operating system.
(A) 8                   (B) 16
(C) 32                 (D) 64
Answer: C
26.       The UNIX shell :
(A) does not come with the rest of the system
(B) forms the interface between the user and the kernel
(C) does not give any scope for programming
(D) does not allow calling one program from with in another
Answer: B
27.       The invalid file in UNIX from among the ones given below is:
(A) /bin/unix                  (B) etc/passwd
(C) etc/group                (D) usr/bin/vi
Answer: A
28.       The very first process created by the Kernel in UNIX is :
(A) init                (B) getty
(C) fork              (D) none among these
Answer: A
29.       A software package that includes two or more applications, such as word processing and spreadsheets, providing for easy transfer of data between them is best defined as :
(A) software server                              (B) software set
(C) integrated software package       (D) application set
Answer: C
30.    Which of the following is a software selection criteria?
(A) Appropriateness    (B) Efficiency
(C) Compatibility          (D) All of the above
Answer: D

31.    Which among the following set is the software that connects two disparate applications allowing them to communicate with each other and to exchange data?
(A) Intranet middleware          (B) Software bridge
(C) Software server                 (D) Software agent
Answer: A
32.    Which of the following is NOT a property of bitmap graphics?
(A) Fast hardware exists to move blocks of pixels efficiently
(B) Realistic lighting and shading can be done
(C) All line segments can be displayed as straight
(D) Polygons can be filled with solid colors and textures
Answer: B
33.    Which of the following characteristics of a programming language is best specified using a context-free grammar?
(A) Identifier length                             (B) Maximum level of nesting
(C) Operator precedence                   (D) type compatibility
Answer: C
34.    Which of the following comes closest to being a perfectly secure encryption scheme?
(A) The Caesar Cipher, a substitution cipher
(B) DES (Data Encryption Standard), a symmetric-key algorithm
(C) Enigma, a transposition cipher
(D) One-time pad
Answer: B
35.    Which of the following is a Parameter passing method in C?
(A) Call by value                      (B) Call by result
(C) Call by value-result          (D) Call by name
Answer: A
36.    Prolog programs are
(A) facts and knowledge bases        (B) horn clauses
(C) A set of functions                          (D) None of the above
Answer: B
37.    Kerberos is:
(A) an operating system                    
(B) A networking file system protocol
(C) an encrypted file system 
(D) a system that supports authentication in distributed systems
Answer: D
38.    ACL stands for:
(A) Automatic Control Language      (B) Access Control List
(C) Associate Cache Level                (D) Amortized Circular Lists
Answer: B
39.    A one-time password is
(A) one that changes every time it is used.
(B) one that is assigned once and not changed at all.
(C) one that can be used only at a particular time of the day
(D) one that is assigned for all session that starts at a particular time
Answer: A
40.    A hostile applet is:
(A) a downloadable applet that can cause harm on a client’s system
(B) an applet that resides on a system infected with a virus
(C) a downloadable applet that attaches itself to an existing applet.
(D) an applet generated by another applet
Answer: A

Pages   2   3   4   5 


Post a Comment