Kerala PSC Previous Years Question Paper & Answer

Title : HSST COMPUTER SCIENCE KHSE
Question Code : A

Page:11


Below are the scanned copy of Kerala Public Service Commission (KPSC) Question Paper with answer keys of Exam Name 'HSST COMPUTER SCIENCE KHSE' And exam conducted in the year 2018. And Question paper code was '016/2018'. Medium of question paper was in Malayalam or English . Booklet Alphacode was 'A'. Answer keys are given at the bottom, but we suggest you to try answering the questions yourself and compare the key along wih to check your performance. Because we would like you to do and practice by yourself.

page: 11 out of 16
Excerpt of Question Code: 016/2018

67.

68.

69,

70.

71.

72.

73.

74,

75,

Time for the disk, rotate to the start of the desired sector 85 known as :
(5) Seek time (8) Transfer time (ಲ) Latency time (D) Access time

Mutual exclusion problem occurs between :
(ಹ) Process that share resources

(8) Process use not the same resources

(ಲ) Two disjoint process that do not interact
(D) None of the above

PNG stands for :
(5) Packet network graphics (8) Portable network graphics
(<) Protocol for network graphic (D) None of the above

The maintenance activity to find and fix error during operation of error is :
(ಹಿ) adaptive maintenance (8 corrective maintenance
(~) perfective maintenance (D) preventive maintenance

Which method uses small increments with minimum planning and iterations are short time
frames ?

(^) Water fall model (8) Spiral model

(ಲ) Agile model (D) Prototype model
Telnetisa :

(ಹ) Remote login (B) Television network
(ಲ) Network of telephone (D) None of the above

Trends to outsource IT functions t other countries is known as :
(^) Outer outsourcing (8) External outsourcing
(ಲ) Foreign outsourcing (D) Offshore outsourcing

Which of the following method of channelization are used for mobile data internet
working ?

(^) Time division multiple access (B) Frequency division multiple access

(ಲ) Code division multiple access (D) All of the above

Honey pot is an example for :
(A) Security auditing software (8) Encryption—decryption software
(C) Intrusion-—detection software (D) Virus

11 016/2018
{P.T.O}

Similar Question Papers

Ask Question

(Press Ctrl+g to toggle between English and the chosen language)


Questions & Answers

HSST COMPUTER SCIENCE KHSE : Video