81. The art of breaking of ciphers is called:

(a) Cryptanalysis
(b) Cryptography
(c) Cryptology
(d) Cipherology

Answer: (a)

82. A digital signature is a mathematical technique used to check:
(a) The authenticity, integrity and nonrepudiation of a message
(b) The clarity of the messages
(c) The attacks from the viruses
(d) The handwritten signatures

Answer: (a)

83. Which one of the following is a keyword in Java?
(a) True
(b) Static
(c) False
(d) Null

Answer: (b)

84. Which of the following are the integer types of Java?
(a) char, int, short, byte
(b) int, short, char, long
(c) byte, int, char, long
(d) int, short, byte, long

Answer: (d)

85. Which one of the following is more efficient multiway branch approach in Java?
(a) switch
(b) if
(c) else if
(d) if-else-if

Answer: (a)

86. A technology which uses the hiding of the information in a picture is called:
(a) Steganography
(b) Image Rendering
(c) Bitmapping
(d) Root kits

Answer: (a)

87. The presentation quality and the size of image storage depend on:
(a) Resolution and color depth
(b) Color pallets
(c) Color models
(d) Color combinations

Answer: (a)

88. The server Replication is a technique for improving the performance of server side is called:
(a) Caching
(b) Mirroring
(c) Flash crowds
(d) Proxy

Answer: (b)

89. Which one of the following is not belonging to the string class in Java?
(a) boolean equals (str)
(b) int indexOf (str)
(c) int void ( )
(d) char charAt(index)

Answer: (c)

90. Methods declared as ‘static’ have following restrictions:
1. They can directly call only other ‘static’ methods
2. They can directly access only ‘static’ data
3. They do not have a ‘this’ reference

Which of the above are correct?
(a) 1 and 2 only
(b) 1 and 3 only
(c) 2 and 3 only
(d) 1, 2 and 3

Answer: (d)