0

Computer Science (NET)

Attempted 0/20 Correct 0 Score 0

Which of the following modulation techniques is used specifically in instrument landing systems?

  1. AM

  2. FM

  3. PM

  4. SM

  5. QAM


Correct Option: D
Explanation:

Space modulation is a radio amplitude modulation technique used in instrument landing systems that incorporates the use of multiple antennas fed with various radio frequency powers and phases to create different depths of modulation within various volumes of three-dimensional airspace.

Which of the following is a software or a piece of computer hardware that can intercept and log traffic that passes over a digital network?

  1. FTP bounce attack

  2. Spoofing attack

  3. Packet analyser

  4. LAND

  5. Phishing


Correct Option: C
Explanation:

A packet analyser (also known as a network analyser, protocol analyser or packet sniffer—or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.

Which property of transactions ensure that a series of database operations either occur completely, or nothing occurs?

  1. Atomic

  2. Consistency

  3. Isolation

  4. Durability

  5. Data integrity


Correct Option: A
Explanation:

In an atomic transaction, a series of database operations either occur completely, or nothing occurs.

Which of these is an example of a data structure for external memory?

  1. B-trees

  2. Record

  3. Tagged union

  4. Object

  5. Set


Correct Option: A
Explanation:

B-trees are a good example of a data structure for external memory. It is commonly used in databases and filesystems.

Which of the following is a communications protocol for message-oriented middleware built on Extensible Markup Language?

  1. RTP

  2. SNMP

  3. SSH

  4. SIMPLE

  5. XMPP


Correct Option: E
Explanation:

Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for message-oriented middleware based on XML (Extensible Markup Language). It enables the near-real-time exchange of structured yet extensible data between any two or more network entities.

Which of the following may be used for conditional extraction of material from an HTML file?

  1. Flex

  2. OLE Automation

  3. ActiveX control

  4. Applet

  5. Macro processors


Correct Option: E
Explanation:

Macro processors have been used for language expansion (defining new language constructs that can be expressed in terms of existing language components), for systematic text replacements that require decision making, and for text reformatting (e.g. conditional extraction of material from an HTML file).

Which of these defines a generic, abbreviated syntax for expressing URLs?

  1. XML namespaces

  2. CURIE

  3. Web service

  4. EBML

  5. XHTML


Correct Option: B
Explanation:

A CURIE (or Compact URI) defines a generic, abbreviated syntax for expressing Uniform Resource Identifiers (URIs).

Which of the following is not specific to a particular database management product?

  1. Object-relational mapping

  2. Conceptual schema

  3. Logical schema

  4. Physical data model

  5. Semantic web


Correct Option: C
Explanation:

A logical schema is a data model of a specific problem domain expressed in terms of a particular data management technology.Without being specific to a particular database management product, it is in terms of either relational tables and columns, object-oriented classes, or XML tags. This is as opposed to a conceptual data model, which describes the semantics of an organisation without reference to technology, or a physical data model, which describes the particular physical mechanisms used to capture data in a storage medium.

Which of these refers to the problem of identification of items, events or observations which do not conform to an expected pattern in a data-set?

  1. Classification

  2. Cluster analysis

  3. Anomaly detection

  4. Association rule learning

  5. Reinforcement learning


Correct Option: C
Explanation:

In data mining, anomaly detection (or outlier detection) is the identification of items, events or observations, which do not conform to an expected pattern or other items in a dataset.

Which of the following methods uses multiple learning algorithms to obtain better predictive performance than may be obtained from any of the member-learning algorithms?

  1. Logistic regression

  2. Naive bayes classifiers

  3. K-nearest neighbours algorithm

  4. Decision tree learning

  5. Ensemble methods


Correct Option: E
Explanation:

In statistics and machine learning, ensemble methods use multiple learning algorithms to obtain better predictive performance than could be obtained from any of the constituent learning algorithms. Unlike a statistical ensemble in statistical mechanics, which is usually infinite, a machine learning ensemble refers only to a concrete finite set of alternative models, but typically allows for much more flexible structure to exist among those alternatives.

Which of the following is the full form of RSS?

  1. Rich Site Summary

  2. RDF Site Summary

  3. Really Simple Syndication

  4. All of the above

  5. None of these


Correct Option: D
Explanation:

This is the correct option as explained in the above mentioned options.

Through which of the following techniques is the website material made available to multiple other sites?

  1. Serialisation

  2. Article marketing

  3. Web syndication

  4. Web publishing

  5. Digital marketing


Correct Option: C
Explanation:

Web syndication is a form of syndication in which website material is made available to multiple other sites. Most commonly, web syndication refers to making web feeds available from a site in order to provide other people with a summary or update of the website's recently added content (For example, the latest news or forum posts).

Which of the following is not a design principle of the SOA architecture?

  1. Discoverability

  2. Loosely coupled

  3. Interoperability

  4. Abstraction

  5. Statefulness


Correct Option: E
Explanation:

SOA based services are stateless. Services minimise resource consumption by deferring the management of state information when necessary.

Which among the following defines the rules for communication between two systems when using web services?

  1. UDDI

  2. WSDL

  3. WebAPI

  4. RDF

  5. XML Schema


Correct Option: B
Explanation:

Rules for communication between different systems need to be defined, such as: How one system can request data from another system; which specific parameters are needed in the data request; what would be the structure of the data produced. Normally, data is exchanged in XML files, and the structure of the XML file is validated against an .xsd file; what error messages to display when a certain rule for communication is not observed, to make troubleshooting easier. All of these rules for communication are defined in a file called WSDL (Web Services Description Language), which has the extension wsdl.

Which of the following refers to an infrastructure which creates a virtualisation of one single address-space?

  1. N-tier architecture

  2. Highly coupled

  3. Peer-to-peer

  4. Space based

  5. Client-server


Correct Option: D
Explanation:

Space based: Refers to an infrastructure that creates the illusion (virtualisation) of one single address-space. Data are transparently replicated according to application needs. Decoupling in time, space and reference is achieved.

Grid computing characterises which of the following techniques?

  1. Eager evaluation

  2. Lazy evaluation

  3. Partial evaluation

  4. Remote evaluation

  5. Short-circuit evaluation


Correct Option: D
Explanation:

In computer science, remote evaluation is a general term for any technology that involves the transmission of executable software code from a client computer to a server computer for subsequent execution at the server. After the code has finished executing, the results of its execution are sent back to the client. Remote evaluation belongs to the family of mobile code, within the field of code mobility. An example for remote evaluation is grid computing: An executable task may be sent to a specific computer in the grid. After the execution has terminated, the result is sent back to the client. The client in turn may have to reassemble the different results of multiple concurrently calculated subtasks into one single result.

Which of the following data compression algorithms is typically lossy?

  1. Shannon coding

  2. Transform coding

  3. DEFLATE

  4. Delta encoding

  5. Unary coding


Correct Option: B
Explanation:

Transform coding is a type of data compression for natural data like audio signals or photographic images. The transformation is typically lossy, resulting in a lower quality copy of the original input.

Which of the following refers to the concept of uncovering patterns in data that can be presented as statistically significant?

  1. Boosting

  2. Association rule learning

  3. Random forests

  4. Machine learning

  5. Data dredging


Correct Option: E
Explanation:

Data dredging (also data fishing, data snooping, equation fitting and p-hacking) is the use of data mining to uncover patterns in data that can be presented as statistically significant, without first devising a specific hypothesis as to the underlying causality.

RSS is used for which of the following services/processes?

  1. Social networking service

  2. Tagging

  3. Rating

  4. Content curation

  5. Social bookmarking


Correct Option: D
Explanation:

Content curation is the process of collecting, organising and displaying information relevant to a particular topic or area of interest. Services or people that implement content curation are called curators. Curation services can be used by businesses as well as end users.

Which of the following types of 'Network Security Attacks' is passive in nature?

  1. SQL injection

  2. Port scanner

  3. Smurf attack

  4. Spoofing attack

  5. ARP spoofing


Correct Option: B
Explanation:

A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.

- Hide questions