81. The art of breaking of ciphers is called:
(a) Cryptanalysis
(b) Cryptography
(c) Cryptology
(d) Cipherology
(b) Cryptography
(c) Cryptology
(d) Cipherology
Answer: (a)
82. A digital signature is a mathematical technique used to check:
(a) The authenticity, integrity and nonrepudiation of a message
(b) The clarity of the messages
(c) The attacks from the viruses
(d) The handwritten signatures
(a) The authenticity, integrity and nonrepudiation of a message
(b) The clarity of the messages
(c) The attacks from the viruses
(d) The handwritten signatures
Answer: (a)
83. Which one of the following is a keyword in Java?
(a) True
(b) Static
(c) False
(d) Null
(a) True
(b) Static
(c) False
(d) Null
Answer: (b)
84. Which of the following are the integer types of Java?
(a) char, int, short, byte
(b) int, short, char, long
(c) byte, int, char, long
(d) int, short, byte, long
(a) char, int, short, byte
(b) int, short, char, long
(c) byte, int, char, long
(d) int, short, byte, long
Answer: (d)
85. Which one of the following is more efficient multiway branch approach in Java?
(a) switch
(b) if
(c) else if
(d) if-else-if
(a) switch
(b) if
(c) else if
(d) if-else-if
Answer: (a)
86. A technology which uses the hiding of the information in a picture is called:
(a) Steganography
(b) Image Rendering
(c) Bitmapping
(d) Root kits
(a) Steganography
(b) Image Rendering
(c) Bitmapping
(d) Root kits
Answer: (a)
87. The presentation quality and the size of image storage depend on:
(a) Resolution and color depth
(b) Color pallets
(c) Color models
(d) Color combinations
(a) Resolution and color depth
(b) Color pallets
(c) Color models
(d) Color combinations
Answer: (a)
88. The server Replication is a technique for improving the performance of server side is called:
(a) Caching
(b) Mirroring
(c) Flash crowds
(d) Proxy
(a) Caching
(b) Mirroring
(c) Flash crowds
(d) Proxy
Answer: (b)
89. Which one of the following is not belonging to the string class in Java?
(a) boolean equals (str)
(b) int indexOf (str)
(c) int void ( )
(d) char charAt(index)
(a) boolean equals (str)
(b) int indexOf (str)
(c) int void ( )
(d) char charAt(index)
Answer: (c)
90. Methods declared as ‘static’ have following restrictions:
1. They can directly call only other ‘static’ methods
2. They can directly access only ‘static’ data
3. They do not have a ‘this’ reference
1. They can directly call only other ‘static’ methods
2. They can directly access only ‘static’ data
3. They do not have a ‘this’ reference
Which of the above are correct?
(a) 1 and 2 only
(b) 1 and 3 only
(c) 2 and 3 only
(d) 1, 2 and 3
(a) 1 and 2 only
(b) 1 and 3 only
(c) 2 and 3 only
(d) 1, 2 and 3
Answer: (d)
0 Comments
Post a Comment