Sem6 Quiz2
Sem6 Quiz2
22_SSWTZG554)(Flipped)
RAID 10 is preferred over RAID 01.
Select one:
a. False
b. True
____________ is responsible for making sure that the local database remains consistent even
when failures occur
Select one:
a. Schema Matching
b. Schema integration
c. Schema Mapping
d. Schema translation
__________ access control defines access rights based on the users, restricting access to
classified data to cleared users.
Select one:
a. Discretionary
b. Encryption
c. Multilevel
d. Data protection
The execution of update queries cause trouble as the system must ensure that all the copies of
the data are updated properly
Select one:
a. True
b. False
Previous page
___________ access control improves security by defining different security levels for both
subjects and data objects
Select one:
a. Data protection
b. Discretionary
c. Multilevel
d. Encryption
Functional analysis is concerned with determining the entities, their attributes, and the
relationships among them.
Select one:
a. False
b. True
In a disk subsystem all connected servers share the storage capacity and each server can be
assigned free storage more flexibly as required
Select one:
a. True
b. False
Which of the following is NOT a limitation of Server - centric IT architecture.
Select one:
a. Computer cannot access storage devices that are connected to a different computer.
a. True
b. False
a. Operations
b. Subject
c. Rules
d. Object
“A subject at a given security level can only read objects at the same or lower security levels” is
Select one:
a. no read up
b. no write down
c. no read down
d. no write up
__________ access control defines access rights based on the users, restricting access to
classified data to cleared users.
Select one:
a. Discretionary
b. Encryption
c. Multilevel
d. Data protection
a. RAID 4
b. RAID 10
c. RAID 0
d. RAID 5
In peer-to-peer systems data fragmentation and replication, the logical organization of data at
each site needs to be handled at
Select one:
a. GCS
b. LIS
c. GIS
d. LCS
In top-down design methodology the process by which the enterprise is examined to determine
entity types and relationships among these entities
Select one:
b. view design
c. conceptual design
________ distributed database design, is suitable for tightly integrated, homogeneous distributed
DBMSs.
Select one:
a. Bottom-up
b. Horizontal
c. Top-down
d. Vertical
c. Centralized environment to server users individually by received requests from the clients.
d. The software system that permits the management of the distributed database and makes the
distribution transparent to the users.
a. Username
b. Data protection
c. Access control
d. Password
In service oriented architectural pattern the service providers and consumers enter into a request
–response communication using -------------- protocol
Select one:
a. HTTP
b. SOAP
c. REST
d. SMTP
b. Controller
c. Event Bus
d. Proxy
For a highly interactive system ----------------- type of architectural pattern is not a good choice
Select one:
b. Shared data
c. Service oriented
d. Publish subscribe
a. Name
b. Application
c. Consequences
d. Form
Which is a key-value database system based on the BigTable database system developed by
Google?
Select one:
a. Hbase
b. MongoDB
c. NoSql
Which one of the following cloud concepts is related to sharing and pooling the resources?
Select one:
b. Abstraction
c. Virtualization
d. Polymorphism
The HTTP method used for adding a new Instagram Reel is…
Select one:
a. DELETE
b. POST
c. PUT
d. GET
In service oriented architectural pattern the service providers and consumers enter into a request
–response communication using -------------- protocol
Select one:
a. HTTP
b. SMTP
c. SOAP
d. REST
a. Client Server
c. Broker
d. Layers
Which one of the following refers to the non-functional requirements like disaster recovery,
security, reliability, etc.
Select one:
a. Quality of service
b. Plan Development
c. Technical Service
d. Service Development
Cloud computing is a kind of abstraction which is based on the notion of combining physical
resources and represents them as _______resources to users.
Select one:
a. Virtual
b. Cloud
c. Real
Which type of clouds have the advantage of keeping in house the core business operations by
relying on the existing IT infrastructure and reducing the burden of maintaining it once the cloud
has been set up.
Select one:
a. Public
b. Hybrid
c. Community
d. Private
Which type of service provider supports selected middleware, such as a database, web
application server, etc.?
Select one:
b. SAAS
c. IAAS
d. PAAS
In hard real time environment (systems with strict time constraints) publish –subscribe type of
architectural pattern is not advisable because
Select one:
b. Data Consistency
d. Security issues
a. Client –Server
b. Peer to Peer
c. Broker
d. Model-View-Controller
a. Apache Hive
b. Apache Spark
c. Apache Hadoop
Which one of the following refers to the non-functional requirements like disaster recovery,
security, reliability, etc.
Select one:
a. Technical Service
b. Service Development
c. Quality of service
d. Plan Development
a. Programming Idioms
c. Architectural Styles
c. Vacuum world
d. 8 Queens Problem
_________ is used when a marketing company is trying to find out which customers are likely to
churn
Select one:
a. Supervised Learning
b. UnSupervised Learning
c. Reinforcement
d. None
a. NP – Complete
b. NP – Hard
c. P
d. NP
Previous page
“while a Sale person searching randomly for business, however a sale team in the group can
share their discovery and help the entire group get the best business hunt” known as
Select one:
a. Beam search
d. breadth-first search
Previous page
Each episode consists of the agent perceiving and then performing a single action.
Select one:
a. True
b. False
Hill Climbing method algorithm searches
Select one:
a. Communicating
Sometimes, we need to have the contextual information to be able to perform Machine Learning
predictions
Select one:
a. False
b. True
a. Environment
b. Problem Statement
c. Actuators
d. Actions
________ is used to train descriptive models where no target is set and no single feature is
important than the other.
Select one:
a. Supervised learning
b. Statistical model
c. Descriptive model
d. Reinforcement learning
In a test an examinee either guesses or copies or knows the answer to a multiple choice
question with 4 choices. The probability that he makes a guess is 1/3 and the probability that he
copies the answer is 1/6 . The probability that his answer is correct, given that he copied it, is
1/8 . Find the probability that he knew the answer to the question given that he correctly
answered it.
Select one:
a. 11/29
b. 18/29
c. 15/29
d. 24/29
Architecture + programs =
Select one:
a. Agent
b. Environment
c. Actuator
d. Component
In Vacuum Cleaner working process, [A, Clean][A, Clean] [A, Dirty] will give the output as---------
Select one:
a. Up/Down
b. Suck
c. Left
d. Right
a. Query Processing
b. Datalog
c. Log Register
d. Catalog
a. NP – Hard
b. NP
c. NP – Complete
d. P
Architecture + programs =
Select one:
a. Component
b. Agent
c. Environment
d. Actuator
Among the following which search method will expand the node that is closest to the goal
relatively others?
Select one:
a. A* search
b. Best-first search
c. Beam search
Previous page
The algorithm assumes the environment for problem solving is not a_____
Select one:
a. Dynamic
b. Discrete
c. Deterministic
d. Static
Cryptography (S1-22_SSWTZC463)
(Flipped)
Which of them is a Prime Number
Select one:
a. 33
b. 109
c. 93
d. 111
a. = modulus
c. > modulus
d. < modulus
In AES, for a key 25D5 and PT input A479 what is the output we obtain after the “add round key”
function?
Select one:
a. 327D
b. F34D
c. 81AC
d. 79DF
In AES, the MixColumns transformation on a single column of State can be expressed as s′0, j =
(2 . s0, j) ⊕ (3 . s1, j) ⊕ s2, j ⊕ s3, j. If s00=F2, s10=4C, s20= E7, s30=8C, what is s′00?
Select one:
a. 3A
b. 47
c. D4
d. BC
a. RSA
b. RC5
c. DSA
a. 1990
b. 1996
c. 1992
d. 1994
ᶲ(35)=
Select one:
a. 25
b. 22
c. 18
d. 24
a. 3
b. 4
c. 5
d. 6
Previous page
b. DES
c. RSA
d. AES
a. None
b. 2
c. 1
d. 3
Previous page
A5/1 is used in
Select one:
a. India
b. Ireland
c. USA
d. germany
Previous page
a. NOT
b. Logical OR
c. XOR
d. Logical AND
a. AES
b. RC 5
c. Triple DES
d. DES
a. None of these
b. Public-key cryptography
c. Private-key cryptography
b. 6
c. 2
d. 9
Eulers Totient of 15 is
Select one:
a. 14
b. 8
c. 5
d. 3
a. RC5-CBC
b. RC5-Cipher Padding
Previous page
a. master key
b. private key
c. public key
d. shared key
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the
property of ‘p’ and ‘q’?
Select one:
a. 8
b. 3
c. 1
d. 2
In a public key offers only confidentiality, which key is used for encryption
Select one:
a. private key
b. master key
c. shared key
d. public key
4-1 mod 5 is
Select one:
a. 4
b. 3
c. 6
d. 1
Public-key cryptography is also known as ?
Select one:
a. asymmetric cryptography
d. symmetric cryptography
In AES, the MixColumns transformation on a single column of State can be expressed as s′0, j =
(2 . s0, j) ⊕ (3 . s1, j) ⊕ s2, j ⊕ s3, j. If s00=F2, s10=4C, s20= E7, s30=8C, what is s′00?
Select one:
a. D4
b. BC
c. 3A
d. 47
Previous page
a. True
b. False
Previous page
AES uses a ____________ bit block size and a key size of __________ bits.
Select one:
a. ap-1 (mod p) = 1
b. ap+1(modp) = 1
c. a-1 (mod p) = 1
d. ap+1(mod p) = 1
a. 4 and -4
b. 5 and 3
c. 4 and 5
d. 4 and 4
Which Theorem is used to test whether the given number is prime or NOT
Select one:
a. Fermats Theorem
b. RSA
c. Miller Rabin
d. Eulers Theorem
Find 5-1 mod 12
Select one:
a. 5
b. 4
c. 3
d. 6
How large is AES-192's key size after expansion?
Select one:
a. 36 words
b. 52 words
c. 34 words
d. 46 words
Previous page
In RC4, if K = 256 bytes then K is transferred to T. If K ≠ 256, then T = ?
Select one:
When was the last time the RC4 algorithm was kept under wraps?
Select one:
a. 1990
b. 1996
c. 1992
d. 1994
Which among the following operation executed 3rd in AES decryption process
Select one:
a. Shift rows
b. Substitute bytes
c. Mix column
d. addround key
Keys of size __________ are generated from the 4 x 4 bytes matrix key used in AES.
Select one:
a. 54 words
b. 44 words
c. 64 words
d. 34 words
Previous page
b. Asymmetric Algorithm
c. Symmetric Algorithm
a. 1994
b. 1992
c. 1996
d. 1990
In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also is
known that φ(n) = 2880, where φ( ) denotes Euler’s Totient Function, then the prime factors of n
which is greater than 50 is _________ .
Select one:
a. 91
b. 37
c. 31
d. 97
Previous page