1. Which of the following can be used for digital fingerprint of a file?

(a) Netstart
(b) Cryptcat
(c) Md5sum
(d) All of these

Answer: (c)

2. If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4 out of the 24 alphabet letters?

(a) 40 ℎ𝑟 approximately
(b) 46 ℎ𝑟 approximately
(c) 52 ℎ𝑟 approximately
(d) 58 ℎ𝑟 approximately

Answer: (b)

3. Trojan-Horse programs are

(a) Legitimate programs that allow unauthorized access
(b) Hacker programs that do not show up on the system
(c) Do not work
(d) Immediately discovered

Answer: (a)

4. Consider the following statements regarding the block encryption algorithms:
1. Columnar Transportation Cipher is an example of block Cipher
2. One Cipher text block may depend on several plaintext letters
3. An error in the encryption process affects only that character

Which of the above statements are correct?
(a) 1, 2 and 3
(b) 1 and 2 only
(c) 1 and 3 only
(d) 2 and 3 only

Answer: (b)

5. ATM (Asynchronous Transfer Mode) is fundamentally a:
1. Circuit switching
2. Packet switching
3. Narrow band

Which of the above is/are correct?
(a) 1 only
(b) 2 only
(c) 3 only
(d) 1, 2 and 3

Answer: (b)

6. In 𝐶 ++, a container is

(a) A data structure composed of objects
(b) A holder object that stores and manipulates a collection of objects
(c) An object that contains housekeeping information
(d) An interface for binary search tree implemented as a class

Answer: (b)

7. There are three classes A, B and C. An object of class B is passed as a parameter to a method in class A. An object of class C is created in class B as private member. The relation between A, B and C are:

(a) B aggregates A, and C aggregates B
(b) B aggregates A, and C composed of B
(c) A aggregates B, and B is composed of C
(d) A is composed of B, and B aggregates C

Answer: (c)

8. There are two variables A and B. Variable A is used by several functions of program. Variable B’s value is changed in successive calls of a single function, in which it is declared.
1. A is global and static
2. B is local and static
3. A is global and external
4. B is local and external

Which of the above statements are correct?
(a) 1 and 3
(b) 1 and 4
(c) 2 and 4
(d) 2 and 3

Answer: (d)

9. Consider the following statements:
1. A pointer to a base class can point to an object of its derived class
2. A pointer to a derived class can point to an object of the base class
3. A base class pointer can access extra added members in a derived class
4. A base pointer cast into a derived pointer can access it fully

Which of the above statements are correct?
(a) 1 and 3
(b) 2 and 3
(c) 1 and 4
(d) 2 and 4

Answer: (c)

10. Array is a structured data type in C programming language. It may be defined as, a finite:

(a) Collection of data items, not necessarily ordered, but of the same data type
(b) Collection of data items, not necessarily ordered, but of different data type
(c) Ordered collection of data items of different data type
(d) Ordered collection of data items of the same data type

Answer: (d)