[go: up one dir, main page]

0% found this document useful (0 votes)
59 views24 pages

Sem6 Quiz2

The document contains a series of multiple choice questions related to distributed data systems, software architectures, artificial intelligence, and other technical topics. It tests knowledge on concepts like RAID levels, database schemas, access controls, architectural patterns, machine learning algorithms, and reinforcement learning. The questions cover terms, definitions, applications and comparisons of different techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views24 pages

Sem6 Quiz2

The document contains a series of multiple choice questions related to distributed data systems, software architectures, artificial intelligence, and other technical topics. It tests knowledge on concepts like RAID levels, database schemas, access controls, architectural patterns, machine learning algorithms, and reinforcement learning. The questions cover terms, definitions, applications and comparisons of different techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Distributed Data Systems (S1-

22_SSWTZG554)(Flipped)
RAID 10 is preferred over RAID 01.
Select one:

a. False

b. True

____________ is responsible for making sure that the local database remains consistent even
when failures occur
Select one:

a. The local recovery manager

b. None of the above

c. The local query optimizer

d. The run-time support processor

Component database schemas are translated to a common intermediate canonical


representation during
Select one:

a. Schema Matching

b. Schema integration

c. Schema Mapping

d. Schema translation

__________ access control defines access rights based on the users, restricting access to
classified data to cleared users.
Select one:

a. Discretionary

b. Encryption

c. Multilevel

d. Data protection
The execution of update queries cause trouble as the system must ensure that all the copies of
the data are updated properly
Select one:

a. True

b. False

Previous page

___________ access control improves security by defining different security levels for both
subjects and data objects
Select one:

a. Data protection

b. Discretionary

c. Multilevel

d. Encryption

Functional analysis is concerned with determining the entities, their attributes, and the
relationships among them.
Select one:

a. False

b. True

In a disk subsystem all connected servers share the storage capacity and each server can be
assigned free storage more flexibly as required
Select one:

a. True

b. False
Which of the following is NOT a limitation of Server - centric IT architecture.
Select one:

a. Computer cannot access storage devices that are connected to a different computer.

b. Length of SCSI cables.

c. To increase fault tolerance, storage devices are connected to two servers.

d. Free disk space of one computer cannot be utilized by other computers.


Autonomy local systems in the context of distributes database management system, refers to the
distribution of control, not of data.
Select one:

a. True

b. False

_________ trigger the execution of application programs.


Select one:

a. Operations

b. Subject

c. Rules

d. Object

“A subject at a given security level can only read objects at the same or lower security levels” is
Select one:

a. no read up

b. no write down

c. no read down

d. no write up

Reasons for replication


Select one:

a. reliability and efficiency of read-only queries

b. efficiency of read and read queries only

c. reliability and efficiency of write-only queries

d. reliability and efficiency of read and read queries

__________ access control defines access rights based on the users, restricting access to
classified data to cleared users.
Select one:
a. Discretionary

b. Encryption

c. Multilevel

d. Data protection

The RAID level in which mirroring is done along with stripping is


Select one:

a. RAID 4

b. RAID 10

c. RAID 0

d. RAID 5

In peer-to-peer systems data fragmentation and replication, the logical organization of data at
each site needs to be handled at
Select one:

a. GCS

b. LIS

c. GIS

d. LCS

In top-down design methodology the process by which the enterprise is examined to determine
entity types and relationships among these entities
Select one:

a. local conceptual design

b. view design

c. conceptual design

d. global conceptual design

________ distributed database design, is suitable for tightly integrated, homogeneous distributed
DBMSs.
Select one:

a. Bottom-up

b. Horizontal
c. Top-down

d. Vertical

Which of the following is NOT a definition of distributes database or distributes database


management system
Select one:

a. Refer jointly to the distributed database and the distributed DBMS.

b. Collection of multiple, logically interrelated databases distributed over a computer network.

c. Centralized environment to server users individually by received requests from the clients.

d. The software system that permits the management of the distributed database and makes the
distribution transparent to the users.

_____________ is generally provided by file system.


Select one:

a. Username

b. Data protection

c. Access control

d. Password

Software Architectures (S1-


22_SSWTZG653)(Flipped)

Which of the following is NOT a responsibility of the ‘bridge’ in a broker architecture.


Select one:

a. Conversion of message to common protocol

b. Communicating with the Client

c. Communicating with other brokers

d. Marshalling and unmarshalling of parameters

In service oriented architectural pattern the service providers and consumers enter into a request
–response communication using -------------- protocol
Select one:

a. HTTP

b. SOAP

c. REST

d. SMTP

In P2P network ,peers connect to each other using


Select one:

a. Client side proxy

b. Server side proxy

c. None of the above

d. Request /Reply Connector

The components in publish subscribe communicate with each other using


Select one:

a. Request –Reply connector

b. Controller

c. Event Bus

d. Proxy

For a highly interactive system ----------------- type of architectural pattern is not a good choice
Select one:

a. Pipe and filter

b. Shared data

c. Service oriented

d. Publish subscribe

The static structure and dynamic behavior of the pattern represents?


Select one:

a. Name

b. Application
c. Consequences

d. Form

Which is a key-value database system based on the BigTable database system developed by
Google?
Select one:

a. Hbase

b. MongoDB

c. NoSql

d. None of the options

Which one of the following cloud concepts is related to sharing and pooling the resources?
Select one:

a. None of the mentioned

b. Abstraction

c. Virtualization

d. Polymorphism

The HTTP method used for adding a new Instagram Reel is…
Select one:

a. DELETE

b. POST

c. PUT

d. GET

In service oriented architectural pattern the service providers and consumers enter into a request
–response communication using -------------- protocol
Select one:

a. HTTP

b. SMTP

c. SOAP
d. REST

Which of the following patterns corresponds to design-time elements


Select one:

a. Client Server

b. All of the above

c. Broker

d. Layers

Which one of the following refers to the non-functional requirements like disaster recovery,
security, reliability, etc.
Select one:

a. Quality of service

b. Plan Development

c. Technical Service

d. Service Development

Cloud computing is a kind of abstraction which is based on the notion of combining physical
resources and represents them as _______resources to users.
Select one:

a. Virtual

b. Cloud

c. Real

d. none of the mentioned

Which type of clouds have the advantage of keeping in house the core business operations by
relying on the existing IT infrastructure and reducing the burden of maintaining it once the cloud
has been set up.
Select one:

a. Public

b. Hybrid

c. Community

d. Private
Which type of service provider supports selected middleware, such as a database, web
application server, etc.?
Select one:

a. None of the options

b. SAAS

c. IAAS

d. PAAS

In hard real time environment (systems with strict time constraints) publish –subscribe type of
architectural pattern is not advisable because
Select one:

a. Latency and Uncertainty in transmission

b. Data Consistency

c. All of the above

d. Security issues

In case of performance issues the SOA pattern is similar to


Select one:

a. Client –Server

b. Peer to Peer

c. Broker

d. Model-View-Controller

Which among the following implement the map-reduce pattern?


Select one:

a. Apache Hive

b. Apache Spark
c. Apache Hadoop

d. All of the above

Which one of the following refers to the non-functional requirements like disaster recovery,
security, reliability, etc.
Select one:

a. Technical Service

b. Service Development

c. Quality of service

d. Plan Development

design patterns movement focuses on?


Select one:

a. Programming Idioms

b. Mid-Level Design Patterns

c. Architectural Styles

d. Data Structures and Algorithms

Artificial Intelligence (S1-22_SSWTZC444)


(Flipped)
A _______________is a type of artificial neural network which uses sequential data or time
series data.
Select one:

a. Convolutional Neural Networks

b. Conventional neural networks

c. Recurrent neural network (RNN)

d. Recurring natural networks

Which of the following is not the example of the Toy problem


Select one:

a. Peak Point Identification


b. Searching

c. Vacuum world

d. 8 Queens Problem

_________ is used when a marketing company is trying to find out which customers are likely to
churn
Select one:

a. Supervised Learning

b. UnSupervised Learning

c. Reinforcement

d. None

Graph colouring CSP is an example of ___________


Select one:

a. NP – Complete

b. NP – Hard

c. P

d. NP

Previous page

“while a Sale person searching randomly for business, however a sale team in the group can
share their discovery and help the entire group get the best business hunt” known as
Select one:

a. Beam search

b. Particle Swarm Optimization

c. business Optimization search

d. breadth-first search

Previous page

Each episode consists of the agent perceiving and then performing a single action.
Select one:

a. True

b. False
Hill Climbing method algorithm searches
Select one:

a. moves in the direction which optimizes the search

b. moves in the direction which optimizes the cost

c. moves in the direction which optimizes the space

d. moves in the direction which optimizes the contraints

Which of the following is not a common task of typical AI problem.


Select one:

a. Communicating

b. Recognizing people, objects

c. Navigating around obstacles on the streets

d. Computation of mathematical functions

Sometimes, we need to have the contextual information to be able to perform Machine Learning
predictions
Select one:

a. False

b. True

Agent can get percepts from ________________


Select one:

a. Environment

b. Problem Statement

c. Actuators

d. Actions

________ is used to train descriptive models where no target is set and no single feature is
important than the other.
Select one:

a. Supervised learning

b. Statistical model
c. Descriptive model

d. Reinforcement learning

In a test an examinee either guesses or copies or knows the answer to a multiple choice
question with 4 choices. The probability that he makes a guess is 1/3 and the probability that he
copies the answer is 1/6 . The probability that his answer is correct, given that he copied it, is
1/8 . Find the probability that he knew the answer to the question given that he correctly
answered it.
Select one:

a. 11/29

b. 18/29

c. 15/29

d. 24/29

Architecture + programs =
Select one:

a. Agent

b. Environment

c. Actuator

d. Component

In Vacuum Cleaner working process, [A, Clean][A, Clean] [A, Dirty] will give the output as---------
Select one:

a. Up/Down

b. Suck

c. Left

d. Right

The first-order definite clauses + no functions =


Select one:

a. Query Processing
b. Datalog

c. Log Register

d. Catalog

Graph colouring CSP is an example of ___________


Select one:

a. NP – Hard

b. NP

c. NP – Complete

d. P

Architecture + programs =
Select one:

a. Component

b. Agent

c. Environment

d. Actuator

Among the following which search method will expand the node that is closest to the goal
relatively others?
Select one:

a. A* search

b. Best-first search

c. None of the mentioned

d. Greedy best-first search

“ An investor randomly invest on POC opportunities , and investment evaporates(spent) over a


period . Then investor replenish with additional money till customers satisfy with Poc and give
bigger projects. The cost optimized model
Select one:

a. business Optimization search

b. Ant Colony Optimization

c. Beam search

d. Particle Swarm Optimization

Previous page

The algorithm assumes the environment for problem solving is not a_____
Select one:

a. Dynamic

b. Discrete

c. Deterministic

d. Static

Cryptography (S1-22_SSWTZC463)
(Flipped)
Which of them is a Prime Number
Select one:

a. 33

b. 109

c. 93

d. 111

In RSA message always encoded to a value


Select one:

a. = modulus

b. none of the above

c. > modulus

d. < modulus
In AES, for a key 25D5 and PT input A479 what is the output we obtain after the “add round key”
function?
Select one:

a. 327D

b. F34D

c. 81AC

d. 79DF

In AES, the MixColumns transformation on a single column of State can be expressed as s′0, j =
(2 . s0, j) ⊕ (3 . s1, j) ⊕ s2, j ⊕ s3, j. If s00=F2, s10=4C, s20= E7, s30=8C, what is s′00?
Select one:

a. 3A

b. 47

c. D4

d. BC

Which one of the below is NOT a public key system


Select one:

a. RSA

b. RC5

c. DSA

d. Elliptic Curve Systems

Till when was the RC4 algorithm kept a secret?


Select one:

a. 1990

b. 1996

c. 1992

d. 1994

Public-key cryptography provides authentication using which key at sender side?


Select one:

a. private key of receiver


b. public key of receiver

c. private key of sender

d. public key of sender

ᶲ(35)=
Select one:

a. 25

b. 22

c. 18

d. 24

Find 5-1 mod 12


Select one:

a. 3

b. 4

c. 5

d. 6

Previous page

Which is better out of the following?


Select one:

a. None of the mentioned

b. DES

c. RSA

d. AES

Highest common factor between two prime numbers a and b is


Select one:

a. None

b. 2

c. 1

d. 3
Previous page

A5/1 is used in
Select one:

a. India

b. Ireland

c. USA

d. germany

Previous page

Mathematical operation performed in RC4 is


Select one:

a. NOT

b. Logical OR

c. XOR

d. Logical AND

Which Algorithm does NOT use Feistel Structure


Select one:

a. AES

b. RC 5

c. Triple DES

d. DES

The ElGamal cypher system is a ______.


Select one:

a. None of these

b. Public-key cryptography

c. Private-key cryptography

d. Both Public & Private-key cryptography

Multiplicative inverse of 9 in Z10 is


Select one:
a. 3

b. 6

c. 2

d. 9

Eulers Totient of 15 is
Select one:

a. 14

b. 8

c. 5

d. 3

Choose the mode of operation that is not an RC5 mode.


Select one:

a. RC5-CBC

b. RC5-Cipher Padding

c. RC5 is a block cypher

d. RC5-Cipher Text Stealing

Previous page

In a public key scheme which key is known only to the owner


Select one:

a. master key

b. private key

c. public key

d. shared key

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the
property of ‘p’ and ‘q’?
Select one:

a. p/q should give no remainder

b. p and q should be co-prime

c. p and q should be prime


d. p and q should be divisible by Ф(n)

How many shift registers does A5/1 algorithm use


Select one:

a. 8

b. 3

c. 1

d. 2

In a public key offers only confidentiality, which key is used for encryption
Select one:

a. private key

b. master key

c. shared key

d. public key

4-1 mod 5 is
Select one:

a. 4

b. 3

c. 6

d. 1
Public-key cryptography is also known as ?
Select one:

a. asymmetric cryptography

b. Both asymmetric& symmetric cryptography

c. None of the above

d. symmetric cryptography
In AES, the MixColumns transformation on a single column of State can be expressed as s′0, j =
(2 . s0, j) ⊕ (3 . s1, j) ⊕ s2, j ⊕ s3, j. If s00=F2, s10=4C, s20= E7, s30=8C, what is s′00?
Select one:

a. D4

b. BC

c. 3A

d. 47

Previous page

n is prime if and only if n divides (2n – 2).


Select one:

a. True

b. False

DSA stands for


Select one:

a. Dual Signature Algorithm

b. Digital Signature Algorithm

c. Double Signature Algorithm

d. Data Signature Algorithm

Previous page

AES uses a ____________ bit block size and a key size of __________ bits.
Select one:

a. 64; 128 or 192

b. 128; 128, 192, or 256

c. 128; 128 or 256

d. 256; 128, 192, or 256

Fermat's theorem states that


Select one:

a. ap-1 (mod p) = 1
b. ap+1(modp) = 1

c. a-1 (mod p) = 1

d. ap+1(mod p) = 1

What is 11 mod 7 and -11 mod 7?


Select one:

a. 4 and -4

b. 5 and 3

c. 4 and 5

d. 4 and 4

Which Theorem is used to test whether the given number is prime or NOT
Select one:

a. Fermats Theorem

b. RSA

c. Miller Rabin

d. Eulers Theorem
Find 5-1 mod 12
Select one:

a. 5

b. 4

c. 3

d. 6
How large is AES-192's key size after expansion?
Select one:

a. 36 words

b. 52 words

c. 34 words

d. 46 words

Previous page
In RC4, if K = 256 bytes then K is transferred to T. If K ≠ 256, then T = ?
Select one:

a. T[i] = K[i mod keylen]

b. T[i] = K[256 mod i]

c. T[i] = K[i mod 256]

d. T[i] = K[256 mod keylen]

When was the last time the RC4 algorithm was kept under wraps?
Select one:

a. 1990

b. 1996

c. 1992

d. 1994

Which among the following operation executed 3rd in AES decryption process
Select one:

a. Shift rows

b. Substitute bytes

c. Mix column

d. addround key

Keys of size __________ are generated from the 4 x 4 bytes matrix key used in AES.
Select one:

a. 54 words

b. 44 words

c. 64 words

d. 34 words

Previous page

Which one is NOT true in case of RC 5 algorithm


Select one:

a. Consumes Less Memory

b. Asymmetric Algorithm
c. Symmetric Algorithm

d. Block Ciphering Technique


Till when was the RC4 algorithm kept a secret?
Select one:

a. 1994

b. 1992

c. 1996

d. 1990

In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also is
known that φ(n) = 2880, where φ( ) denotes Euler’s Totient Function, then the prime factors of n
which is greater than 50 is _________ .
Select one:

a. 91

b. 37

c. 31

d. 97

Previous page

You might also like