Tuesday, 3 October 2017

HSST CS QP 188/2006 PART 5

81.       Overloading without explicit arguments are called
(A) Binary operator overloading      
(B) Unary operator overloading
(C) Arithmetic operator overloading
(D) Logical operator overloading
Answer: B
82.       Procedural programming language is
(A) COBOL                   (B) BASIC
(C) C++                          (D) Pascal
Answer: D
83.       A friend function is .................. member of the class that declared to be a fiend
(A) a private                  (B) a public
(C) the main                 (D) not a
Answer: D
84.       In C++, a function contained within a class is called
(A) An operator                                    (B) A member function
(C) A class function                (D) A method
Answer: B
85.       Pipelining offers
(A) Spatial parallelism                                                (B) Temporal parallelism
(C) High speed processor connectivity       (D) All of the above
Answer: D
86.       Which of the following is not a data dependent pipeline hazard?
(A) Write after read      (B) Read after write
(C) Write after write     (D) Read after read
Answer: D
87.       Iiliac IV is an example of
(A) Pipeline processor                        (B) SIMD array processor
(C) MIMD processor                (D) Data flow machine
Answer: B
88.       Architectural models for a multiprocessor are
(A) Tightly coupled and loosely coupled
(B) Arithmetic and instruction
(C) Static and dynamic
(D) Uni function and multi function
Answer: A
89.       Transmission scheme used with radio wireless LANs
(A) Direct sequence spread spectrum
(B) Frequency hopping spread spectrum
(C) Single/multi sub carrier spread spectrum
(D) All of the above
Answer: D
90.    FDDI LAN standard
(A) Developed by ANSI        
(B) Based on ring topology
(C) Operates at a data rate of 100 mbps
(D) All of the above
Answer: D
91.    GPRS is
(A) General Packet radio service
(B) Gateway protocol route service
(C) Gateway protocol radio service
(D) Group packet radio service
Answer: A
92.    A wireless network without Infrastructure is
(A) Single hope network        (B) Ad-hoc network
(C) Access point network       (D) None of the above
Answer: B
93.    Which of the following is not an identified risk of e-business?
(A) Strategic risk          (B) Financial risk
(C) Customer risk        (D) Operational risk
Answer: C
94.    A ................. is responsible for the design and control of a company’s database.
(A) DBA                         (B) DBM
(C) EDP editor              (D) Monitor
Answer: A
95.    What is the name for Symmetric key encryption?
(A) Private key encryption      (B) Public key encryption
(C) Digital signature                (D) None of the above
Answer: B
96.    Which of the following is not the benefit of an ATM LAN?
(A) Better performance concerning with delays
(B) Very high aggregate throughput
(C) Interconnecting existing LANs
(D) Simpler control and network management
Answer: A
97.    Which of the following is an example of denial of service attack?
(A) Virus attack                        (B) Worm attack
(C) SYN flooding         (D) Sniffing
Answer: C
98.    Honey pot is
(A) A LAN technology                         (B) A wireless technology
(C) Intrusion detection technology   (D) None of the above
Answer: C
99.    A sniffer is
(A) A computer that configured to capture all traffic on the network
(B) A DNS server
(C) A virus scanner
(D) Hardware lock
Answer: A
100.    A network worm uses some sort of network vehicle for replication such as
(A) E-mail                                  (B) Remote login
(C) Remote execution                        (D) All of the above
Answer: A

No comments:

Post a Comment