.
  Vyom World.com . Let's Touch the Sky Together!  
.

Home
VyomWorld.com Home
Interview Questions
VyomLinks.com Home
JobsAssist.com Home
Vyom Network
Contact Us
Jobs & Careers
Resume Submitter
Placement Papers
IT Companies Directory
Computer Jobs
Interview Questions
Online Exams
Vyom Career eMag.
Fun
Send FREE SMS!
SMS Jokes
Source Codes Library
Source Codes Home
ASP Source Codes
C Source Codes
C++ Source Codes
COBOL Source Codes
Java Source Codes
Pascal Source Codes
Submit Source Codes
GATE
GATE an Overview
GATE Preparation
Study Materal
GRE
GRE an Overview
GRE Questions
GRE Preparation
GRE Universities
TOEFL Preparation
TOEFL Resources
GMAT Preparation
GMAT Resources
MBA Preparation
MBA Resources
Networking Concepts
Networking Concepts
Testing Preparation
Testing Resources
Webmasters
Free Traffic Builder
Webmaster Articles
Web Hosting
Tutorials
Hardware Tutorial
1500 Free eBooks New!


Home » Placement Papers » Persistent Placement Papers » Persistent Previous Year Placement Paper

 

Persistent Placement Paper -: Quantitative and Analytical Reasoning Questions With Answers


Advertisements
Advertisements




Persistent Previous Years Solved Sample Placement Papers

  1. The primary goal of the......................protocol is to provide a private channel between communicating applications, which ensures privacy of data, authentication of the partners, and integrity.

    • A) SSL
    • B) ESP
    • C) TSL
    • D) PSL

    Answer: A) SSL

  2. The................is used to provide integrity check, authentication, and encryption to IP datagram.

    • A) SSL
    • B) ESP
    • C) TSL
    • D) PSL

    Answer: B) ESP

  3. In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.

    • A) Tunneling
    • B) Encapsulation
    • C) Both A and B
    • D) None of the above

    Answer: C) Both A and B

  4. The.............................is a collection of protocols designed by Internet Engineering Task Force (IETF) to provide security for a packet at the network level.

    • A) IPsec
    • B) Netsec
    • C) Packetsec
    • D) Protocolsec

    Answer: A) IPsec

  5. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations is called the ……………….

    • A) SSL handshake protocol
    • B) SSL authentication protocol
    • C) SSL record protocol
    • D) SSL cipher protocol

    Answer: C) SSL record protocol

  6. While initiating an SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server.

    • A) 420
    • B) 1032
    • C) 443
    • D) 322

    Answer: C) 443

  7. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys is called the …………………

    • A) SSL handshake protocol
    • B) SSL authentication protocol
    • C) SSL record protocol
    • D) SSL cipher protocol

    Answer: A) SSL handshake protocol

  8. State whether the following statements are true.

    • i) An application-level gateway is often referred to as a proxy.
    • ii) In proxy, a direct connection is established between the client and the destination server.
    • A) True, False
    • B) False, True
    • C) True, True
    • D) False, False

    Answer: A) True, False

  9. If the time quantum is too large, Round Robin scheduling degenerates to:

    (A) Shortest Job First Scheduling

    (B) Multilevel Queue Scheduling

    (C) FCFS

    (D) None of the above

    Ans: (C)
  10. Transponders are used for which of the following purposes?

    (A) Uplinking

    (B) Downlinking

    (C) Both (A) and (B)

    (D) None of the above

    Ans: (C)
  11. The format specifier “-%d” is used for which purpose in C?

    (A) Left justifying a string

    (B) Right justifying a string

    (C) Removing a string from the console

    (D) Used for the scope specification of a char[] variable

    Ans: (A)
  12. Which of the following is an infix expression?

    a) (a+b)*(c+d)

    b) ab+c*

    c) +ab

    d) abc+*

    Answer: a

    Explanation: (a+b)*(c+d) is an infix expression. +ab is a prefix expression and ab+c* is a postfix expression.

  13. What is the time complexity of an infix to postfix conversion algorithm?

    a) O(N log N)

    b) O(N)

    c) O(N²)

    d) O(M log N)

    Answer: b

    Explanation: The time complexity of an infix to postfix expression conversion algorithm is mathematically found to be O(N).

  14. What is the postfix expression for the corresponding infix expression?

    a+b*c+(d*e)

    a) abc*+de*+

    b) abc+*de*+

    c) a+bc*de+*

    d) abc*+(de)*+

    Answer: a

    Explanation: Using the infix to postfix expression conversion algorithm, the corresponding postfix expression is found to be abc*+de*+.

  15. Parentheses are simply ignored in the conversion of infix to postfix expression.

    a) True

    b) False

    Answer: b

    Explanation: When a parenthesis is encountered, it is placed on the operator stack. When the corresponding parenthesis is encountered, the stack is popped until the other parenthesis is reached and they are discarded.




 


.

Recently Updated: New Placement Papers added.
Vyom Network : Web Hosting | Dedicated Server | Free SMS, GRE, GMAT, MBA | Online Exams | Freshers Jobs | Software Downloads | Programming & Source Codes | GRE Preparation | Jobs, Discussions | Software Listing | Free eBooks | Free eBooks | Free Business Info | Interview Questions | Free Tutorials | International Business Information | IAS Preparation | Jokes, Songs, Fun | Free Classifieds | Free Recipes | FAQs | Free Downloads | Bangalore Info | Tech Solutions | Project Outsourcing, Web Hosting | GATE Preparation | MBA Preparation | SAP Info | Excellent Mobiles | Software Testing | Interview Questions | Freshers Jobs | Server Insiders | File Extension Directory

Copyright ©2003-2024 Vyom Technosoft Pvt. Ltd., All Rights Reserved. Read our Privacy Policy