Kerala PSC Previous Years Question Paper & Answer

Title : HSST COMPUTER SCIENCE SR FOR SC/ST HIGHER SECONDARY EDUCATION
Question Code : A

Page:5


Below are the scanned copy of Kerala Public Service Commission (KPSC) Question Paper with answer keys of Exam Name 'HSST COMPUTER SCIENCE SR FOR SC/ST HIGHER SECONDARY EDUCATION' And exam conducted in the year 2016. And Question paper code was '086/2016/OL'. Medium of question paper was in Malayalam or English . Booklet Alphacode was 'A'. Answer keys are given at the bottom, but we suggest you to try answering the questions yourself and compare the key along wih to check your performance. Because we would like you to do and practice by yourself.

page: 5 out of 11
Excerpt of Question Code: 086/2016/OL

Correct Answer:- Option-B
Question38:-Graph Colouring is which type of algorithm design stratergy
A:-Backtracking
B:-Greedy
C:-Branch and Bound
D:-Dynamic programming
Correct Answer:- Option-A
Question39:-The asymptotic notation for defining the average time complexity is
A:-Equivalence
B:-Symmetric
C:-Reflexive
D:-All of the above
Correct Answer:- Option-A
Question40:-The complexity of merge sort algorithm is
‏(0)۸-:ھ‎
‎8:-0(71^(2}}`
‎C:-O(log n}
D:-0(n log n}
Correct Answer:- Option-D
Question41:-Dijkstra's banking algorithm in an operating system, solves the problem of
A:-Deadlock recovery
B:-Mutual exclusion
C:-Deadlock avoidance
D:-None of these
Correct Answer:- Option-C
Question42:-Interval between the time of submission and completion of the job is called
A:-Waiting time
B:-Response time
C:-Throughput
D:-Turmaround time
Correct Answer:- Option-D
Question43:-The example of non-preemptive scheduling is
A:-First-Come-First-Served
B:-Round Robin
C:-Last-In-First-Out
D:-Shortest-job-First
Correct Answer:- Option-A

Question44:- is a process-to-process protocol that adds only port addresses, checksum, error control and length
information to the data from the upper layer.

A:-TCP

B:-UDP

مج

D:-None of the above
Correct Answer:- Option-B
Question45:-The RSA algorithm uses a cryptography method.
A:-Public Key
B:-Private Key
C:-Symmetric Key
D:-All the above
Correct Answer:- Option-A
Question46:-The attack is related to confidentiality.
A:-Fabrication
B:-Interception
C:-Modification
D:-Interruption
Correct Answer:- Option-B
Question47:-The cryptography method in which the plaintext BBBB becomes the ciphertext BCDE. This is probably
A:-Transposition cipher
B:-Monoalphabetic substitution cipher

Similar Question Papers

Ask Question

(Press Ctrl+g to toggle between English and the chosen language)


Questions & Answers

HSST COMPUTER SCIENCE SR FOR SC/ST HIGHER SECONDARY EDUCATION : Video