Kerala PSC HSST 341/2017(Higher Secondary Computer Science)


1. Honey pot is an example for:

  1. Security Auditing Software
  2. Encryption-decryption Software
  3. Instruction-detection Software
  4. Virus
 เดนเดฃി เดชോเตผเดŸ്เดŸ്  เดธെเด•്เดฏൂเดฐിเดฑ്เดฑി .
เดซเดฏเตผเดตാเตพ เด’เดฐു เดช്เดฐൊเดŸ്เดŸเด•്เดทเตป เดจเดฎ്เดฎുเดŸെ เดธെเตผเดตเตผ เดจു  เดคเดฐുเดจ്เดจเดŸ് เดชോเดฒെ.
 เด…เดฑ്เดฑാเด•്เด•เตผ เดซเดฏเตผเดตാเตพ เด•เดŸเดจ്เดจു เดจเดฎ്เดฎുเดŸെ เดธോเดซ്เดฑ്เดฑ്‌เดตെเดฏเตผ เด…เด•്เดธเดธ്เดธ് เดšെเดฏ്‌เดคാเตฝ เด’เดฐു เดฒോเด—ിเตป เด•ൊเดŸുเดค്เดคു เดจเดฎുเด•്เด•് เด…เดช്เดชോเตพ เดคเดจ്เดจേเดฏ് เด’เดฐു เด…เดฒെเตผเดŸ് honeypot เดจเตฝเด•ുเดจ്เดจു .
honeypot  เด’เดฐു เดŸ്เดฐാเดช് เด†เดฃ് hackers-เดจു  

Honey Port Security.
It's like a firewall giving our server protection.
If the attacker accesses our software through the firewall, it gives us a login to attacker and immediately gives us an alert.

2. Hibernate in Windows XP/Windows 7 means:
A.    Shutdown the computer without closing the running application.
B.     Shutdown the computer terminating all running applications
C.     Restart the computer
D.    Restart the computer in safe mode

to start hibernate go to cmd: powercfg space -h space on

3. The unix shell is
A.    A command line interpreter
B.     set of user commands
C.     A GUI interface
D.    All of the above 

 4. If every non key attribute is functionally depend on primary key, then the relation will be :

A.    First normal form
B.     Second normal form
C.     Third normal form
D.    Fourth normal form 

5.In tuple relation model, tuple is equivalent to :
A.    Record
B.     Table
C.     File
D.    Field
 
 6. An attribute of one table is matching the primary key of another table, is known as:
     


A.    Secondary Key
B.     Foreign Key 
C.     Candidate Key 
D.    Composite Key 

7.The maintenance activity to fin and fix error during operation of error is 


A.    adaptive maintenance
B.     Corrective maintenance
C.     Perfective  maintenance
D.    Preventive maintenance

8. Which method uses small increments with minimum planning and iteration are short time frames?
                                         

A.    Water fall Model
B.     Spiral Model
C.     Agile Model
D.    Prototype Model 
        9. Telnet is a 
               A Remote login
               B.Television  network
               C.Network of telephone
               D. None of the above

          10.   Trends to outsource IT functions t other countries is known as
A.    Outer outsourcing
B.     External outsourcing
C.     Foreign outsourcing
D.      Offshore outsourcing

         11.  Which of the following method of channelization are used for mobile data internet working?
                               
A.    Time division multiple access
B.     Frequency division Multiple access
C.     Code division Multiple access
D.    All of the above 


12 .PN G Stands for:
A.      Packet network graphics
B.      Portable network graphics
C.      Protocol for network graphics
D.      None of the above

13. Mutual exclusion problem occurs between
A.      Process that share resources
B.      Process use s not the same resources
C.      Two disjoint process that do not interact
D.      None of the above
14. Time for the disk, rotate to the start of the desired sector is known as:
A.      Seek time
B.      Transfer time
C.      Latency time
D.      Access time
15. Preemptive Scheduling is the strategy of temporally suspending a running process:
A. To avoid collision
B. When it request i/o
C. Before the CPU time slice expires
D. None of the above
16. Application like Banking and Reservation require which type of operating system
A. Hard real time
B. Soft real time
C. Real time
D. Time sharing
17. which testing method is normally used as the acceptance test for a software system?
A. unit testing
B. Integration testing
C. Functional testing
D. Regression testing
18. Which among the following is the risk driven process model?
A . Prototyping
B. Spiral Model
C. Component based development
D. Waterfall model
19. In cyclomatic complexity, if E is the number of edges and N is the number of nodes, V(G), for a flow graph is defined as:
A.E-N+2
B. E-N-1
C. E+N-2
D. E+N-1
20. Which among the following is the programmable DMA controller in 8086?
A.8259
B.8257
C.8251



     21. INT2 in 8086 is:
     A. Single step interrupt
     B. Non maskable interrupt
c   C. Division by zero interrupt
     D. Overflow interrupt
     22. Which among the following is the maximum mod signal in 8085?
    A. DT/R
    B. HOLD
    C. ALE
    D. LOCK
   23.

IN 8086 Microprocessor of the following has the highest priority among all the type of interrupt:
A.      NM 1
B.      type 255
C.      over flow
D.      Div 0

    24. the self complementing unweighted code is :
       A. 8421
       B. 2421
       C. Excess 3
       D. Gray code

     25.  AB+B((B+C')+B'C) can be simplified to 
       A. AB+BC
b     B. B+BC
       C. B+C
       D. None of the above
     26. DeMorgan's theorem says that a NOR gate is equivalent to -------------- gate.
            A. Bubbled XOR
            B. Bubbled AND
            C. NOR
            D. Bubbled NOR
      27. The 10'; complement of 13250 is :
        A. 86740
        B. 86750
        C. 97850
        D. 97859
        28. If an encoder has 2^n (or less) input files. Then output line is :
           A) n/2
           B) n
           C) 2^n
           D) n-1
       29. IN SR flip-flop, if S=R=1 then q(t+1) will be:
              A. Q(t)
              B. 0
              C. 1
              D. indeterminate state
      30. Managers salary details are hidden from employees. This is :

             A. Conceptual level of data hiding
             B. Physical level data hiding
             C. External level data hiding
             D. None of these

        31. For each attribute of a relation , there is a set of permitted values, called the ------------- of that attribute
            A. Domain
            B. Relation
            C. Set
            D. Schema
      32. The most commonly used operation in relational algebra for projecting a set of tuple from a relation is :
      A. Join
      B. Projection
      C. Select
      D. Union

    33. The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match?
      A.  Join
      B. Cartesian Product
      C. Intersection
      D. Set difference
    34. SCTP is a --------------------- layer protocol.
     A. Session Layer
     B. Application Layer
     C. DLL
     D. Transport Layer
     35. UDP is a :
    A. Connection unreliable protocol
    B. Reliable and connection oriented protocol
    C. Connectionless  reliable protocol
    D. Connection oriented unreliable protocol
     36. GSM is a digital cellular phone system using:
    A. TDMA and Packet switching
    B. CDMA and Packet switching
    C. TDMA and FDMA
    D. FDAM and CDMA

    37. An example  for cell switched network is :
     A. SONET
     B. ATM
     C. UPSR
     D. None of these

   38. The IEEE standard for Wifi is :
        A. 802.4
        B. 802.1
        C. 802.2
        D. 802.11

   39. one channel carries all transmissions simultaneously in
     A. TDMA
     B. CDMA
     C. FDMA
     D. PDMA
   40. Encryption is done at :
     A. Presentation Layer
     B. Application Layer
     C. Session Layer
     D. Transport Layer
      41. The service not provided by PPP is :

    A. network address configuration
    B. authentication
    C. Flow Control
    D. none of these
  
  42. The bit oriented protocol for communication over  point to point and multi point links is :
    A. HDLC
    B.  Stop and Wait Protocol
    C. PPP
    D. PAP

     43 . RG-59 category cables are used for:
      A. Telephone
      B. LAN
      C. Cable TV networks
      D. None of these

   44. The digital multiplexing technique for combining several low-rate channels into high rate one:
    A. TDM
    B. FDM
    C. CDM
    D. None of these

   45.  Eight channels each with a 100 -kHz bandwidth are to be




















c





Comments