61.
Match the following Secret Key Algorithms (List
I) with Corresponding Key Lengths (List II) and choose the correct answer from
the code given below:
List I List
II
(a) Blowfish (i) 128 – 256 bits
(b) DES (ii) 128 bits
(c) IDEA (iii) 1 - 448 bits
(d) RC5 (iv)
56 bits
Code:
(1) (a)–(iv),
(b)-(iii), (c)-(ii) , d-(i)
(2) (a)–(iii),
(b)-(iv), (c)-(i) , d-(ii)
(3) (a)–(iii),
(b)-(iv), (c)-(ii) , d-(i)
(4) (a)–(ii),
(b)-(iii), (c)-(iv) , d-(i)
Answer: 3
62. The
four byte IP address consists of
(1) Network
Address
(2) Host
Address
(3) Both
Network and Host Addresses
(4) Neither
Network nor Host Addresses
Answer: 3
63. Consider
ISO-OSI network architecture reference model. Session layer of this model
offers dialog control, token management and .................. as services.
(1) Synchronization
(2) Asynchronization
(3) Flow
control
(4) Errors
Answer: 1
64. Suppose
a cloud contains software stack such as Operating systems, Application
softwares, etc. This model is referred as ............ model.
(1) SaaS
(2) PaaS
(3) IaaS
(4) MaaS
Answer: 1
65. The
Third Generation mobile phones are digital and based on
(1) AMPS
(2) D-AMPS
(3) CDMA
(4) Broadband
CDMA
Answer: 4
66. Which
of the following statement/s is/are true?
(i) Firewalls
can screen traffic going into or out of an organization.
(ii) Virtual
private networks can stimulate an old leased network to provide certain
desirable properties.
Choose the
correct answer from the code given below:
Code:
(1) (i) only
(2) (ii)
only
(3) Both (i)
and (ii)
(4) Neither
(i) nor (ii)
Answer: 3
67. Which
of the following statements/s is/are true?
(i) Windows
XP supports both peer-peer and client-server networks.
(ii) Windows
XP implements Transport protocols as drivers that can be loaded and unloaded
from the system dynamically
Choose the
correct answer from the code given below:
Code:
(1) (i) only
(2) (ii)
only
(3) Neither
(i) nor (ii)
(4) Both (i)
and (ii)
Answer: 4
68. In
Linux operating system environment ............... command is used to print a
file.
(1) print
(2) ptr
(3) pr
(4) lpr
Answer: 4
69. To
overcome difficulties in Readers-Writers problem, which of the following
statement/s is/are true?
(i) Writers
are given exclusive access to shared objects
(ii) Readers
are given exclusive access to shared objects
(iii) Both
Readers and Writers are given exclusive access to shared objects
Choose the
correct answer from the code given below:
Code:
(1) (i) only
(2) (ii)
only
(3) (iii)
only
(4) Both
(ii) and (iii)
Answer: 1
70. Suppose
a system has 12 instances of some resource with n processes competing for that
resource. Each process may require 4 instances of the resource. The maximum
value of n for which the system never enters into deadlock is
(1) 3
(2) 4
(3) 5
(4) 6
Answer: 1
71. Dirty
bit is used to show the
(1) wrong
page
(2) page
with corrupted data
(3) page
with low frequency occurrence
(4) page
that is modified after being loaded into cache memory
Answer: 4
72. Suppose
for a process P, reference to pages in order are 1,2,4,5,2,1,2,4. Assume that
main memory can accommodate 3 pages and the main memory has already 1 and 2 in
the order 1 – first, 2 – second. At this moment, assume FIFO Page Replacement
Algorithm is used then the number of page faults that occur to complete the
execution of process P is
(1) 4
(2) 3
(3) 5
(4) 6
Answer: 3
73. Consider
the following set of processes and the length of CPU burst time given in
milliseconds:
Assume that
processes being scheduled with Round-Robin Scheduling Algorithm with time
quantum 4 ms. The the waiting time for P4 is .............. ms.
(1) 0
(2) 4
(3) 12
(4) 6
Answer: 3
74. Suppose
P, Q and R are co-operating processes satisfying Mutual Exclusion condition.
Then, if the process Q is executing in its critical section then
(1) Both ‘P’
and ‘R’ execute in critical section
(2) Neither
‘P’ nor ‘R’ executes in their critical section
(3) ‘P’
executes in critical section
(4) ‘R’
executes in critical section
Answer: 2
75. A
process residing in Main Memory and Ready and Waiting for execution, is kept on
(1) Execution
Queue
(2) Job
Queue
(3) Ready
Queue
(4) Wait
Queue
Answer: 3
76. ..............
system call creates new process in Unix.
(1) create
(2) create
new
(3) fork
(4) fork new
Answer: 3
77. An
attribute A of datatype varchar(20) has the value ‘xyz’, and the attribute B of
datatype char(20) has the value “lmnop”, then the attribute A has ...............
spaces and attribute B has ............... spaces.
(1) 3,5
(2) 20,20
(3) 3,20
(4) 20,5
Answer: 3
78. Data
warehouse contains ............... data that is never found in operational
environment.
(1) Summary
(2) Encoded
(3) Encrypted
(4) Scripted
Answer: 1
79. ..................
command is used to remove a relation from SQL database.
(1) Drop
table
(2) Delete
table
(3) Remove
table
(4) Update
table
Answer: 1
80. Which
of the following statement/s is/are true?
(i) Facebook
has the world’s largest Hadoop Cluster.
(ii) Hadoop
2.0 allows live stream processing of Real time data.
Choose the
correct answer from the code given below:
Code:
(1) (i) only
(2) (ii)
only
(3) Both (i)
and (ii)
(4) Neither
(i) nor (ii)
Answer: 3
0 Comments