You are on page 1of 9

Cryptography

What is the second step in finding GCD(3118, 250) using Euclid's Algorithm?
Select one:
a. 6 = 3 × 2 + 0
b. 118 = 8 × 14 + 6
c. 250 = 2 × 118 + 14
d. 3118 = 12 × 250 + 118
Number of rounds of operation used in DES algorithm is
Select one:
a. 14
b. 16
c. 12

d. 10
Perform the following operation using reduction first and identify the right answer..... (273 + 147)
mod 10
Select one:
a. 3 mod 10
b. 0 mod 12
c. 6 mod 10

d. 0 mod 10
Hide the relationship between the ciphertext and the plaintext.
Select one:
a. Confusion
b. Both
c. None

d. Diffusion
DES is an example of
Select one:
a. Signature algorithm
b. Hash algorithm
c. Feistel Structure Cipher

Internal to Wipro
d. Hill Cipher
Alice transmits a file to Bob. The file contains sensitive information that is to be protected from
disclosure. Eve, who is not authorized to read the file, is able to capture a copy of the file during its
transmission. This is an attack on A. Release of message contents
Select one:
a. Integrity
b. Confidentiality
c. Availability

Previous page
The relation ship between symbol in a plain text with a symbol in cipher text is one to
many ____

Select one:
a. None
b. Both
c. Poly Alphabetic Cipher
d. Mono Alphabetic Cipher

Previous page

Two users are communicating with other secretly using Data Encryption Standard. Plaintext and key
of length 64 bits are used. During the transmission one of the user feels the plaintext is been
decoded and decided to change one bit of the key and could able to see many bits in the cipher text
are been changed. This is called as
Select one:
a. chosen cipher text attack
b. diffusion
c. confusion

d. avalanche effect
Perform the following operation using reduction first and identify the right answer.... (424 × 32) mod
10
Select one:
a. 3 mod 10
b. 6 mod 10
c. 5 mod 10
d. 8 mod 10

Text obtained for Plain text “ CALCULATOR” using Play fair Cipher if Key is “ JILL “

Internal to Wipro
Select one:
a. IBAIRCSBMT
b. IBAIRCBSTM
c. IBIARCBSMT

d. IBAIRCBSMT

Artificial Intelligence
Any device that perceives its environment and takes actions that maximize its chance of success at
some goal is termed?
Select one:
a. Processor
b. Data
c. Input

d. Intelligent agent
Which of the following is a type of artificial intelligence agent?
Select one:
a. Learning AI Agent
b. All the above
c. Simple Reflex AI Agent

d. Goal-Based AI Agent
Which of the following AI systems Aims to build machines that can truly reason and solve problems.
Select one:
a. Strong AI
b. Weak AI
c. Applied AI

d. Cognitive AI
Given the nodes in the map named {A, B, C, D, G} where its fully connected graph with G being the
goal node and A being the start node. At node C, the heuristic cost can be higher than the cost of
the path AC.
Select one:
a. True

Internal to Wipro
b. False
Which of the following is an example of heuristic search?
Select one:
a. Breadth-First Search
b. Hill Climbing

c. Best-First Search

d. AO* Algorithm
Time complexity of Bidirectional search is ….where b is the branching factor and d is the depth.
Select one:
a. O(b^d/2)
b. O(d^b)
c. O(b/d)

d. O(b*d)
Knowledge in AI can be represented as?
Select one:
a. Both A and B
b. None of the above
c. Propositional Logic
d. Predicate Logic

Previous page

For external action selection, which element is used in the agent?


Select one:
a. Perceive
b. None of the above
c. Performance

d. Actuator
Which term is used for describing the judgmental or commonsense part of problem solving?
Select one:
a. Critical
b. Value based
c. Analytical

Internal to Wipro
d. Heuristic

Previous page

The part of the rule that expresses a situation or premise is called a(n)
Select one:
a. Antecedent
b. Subject
c. Verb
d. Proposition

Previous page

Distributed Data Systems


__________ on which the operations are performed
Select one:
a. Subject
b. Rules
c. Operations

d. Object
_________ trigger the execution of application programs.
Select one:
a. Object
b. Operations
c. Rules

d. Subject
__________ access control defines access rights based on the users, the type of access and the
objects to be accessed
Select one:
a. Data protection
b. Multilevel
c. Discretionary

d. Encryption
In a disk subsystem all connected servers share the storage capacity and each server can be
assigned free storage more flexibly as required

Internal to Wipro
Select one:
a. True
b. False
Which of the following is NOT a definition of distributes database or distributes database
management system
Select one:
a. Collection of multiple, logically interrelated databases distributed over a computer network.
b. Refer jointly to the distributed database and the distributed DBMS.
c. Centralized environment to server users individually by received requests from the clients.

d. The software system that permits the management of the distributed database and makes the
distribution transparent to the users.
Which of the following RAID level saves disk space
Select one:
a. 01
b. 1
c. 10

d. 5
Autonomy local systems in the context of distributes database management system, refers to the
distribution of control, not of data.
Select one:
a. False

b. True
In top-down design methodology the process by which the enterprise is examined to determine
entity types and relationships among these entities
Select one:
a. conceptual design
b. view design
c. global conceptual design

d. local conceptual design


The objective of _________ is to partition a relation into a set of smaller relations so that many of the
user applications will run on only one fragment.
Select one:
a. Primary Horizontal fragmentation
b. Vertical fragmentation

Internal to Wipro
c. Derived Horizontal fragmentation

d. Primary Vertical fragmentation


In peer-to-peer systems , there is no distinction of client machines versus servers, each machine has
full DBMS functionality and can communicate with other machines to execute queries and
transactions
Select one:
a. True b. False

Software Architectures
PMBOK has ____________ number of project management areas
Select one:
a. NONE
b. NINE
c. FOUR
d. FIVE
This layer implements the core functionality of the system this can be attributed to which of the
following layers -
Select one:
a. Data Layer
b. Security Layer
c. Application Layer

d. Business Layer
The below diagram represents a sample performance scenario. In which step of the Quality Attribute
Workshop (QAW) is this finalized?
Select one:
a. Scenario Consolidation
b. Scenario Prioritization
c. Scenario Brainstorming

d. Scenario Refinement
For an efficient documentation of the architecture the source should clearly adhere to the software
architecture.
Select one:
a. True b. False

Internal to Wipro
Which among the following is NOT an architectural driver?
Select one:
a. Test Case
b. Design Constraints
c. Functional Requirements

d. ttribute Scenarios
In 4+1 view, which view is concerned with topology, communication and security?
Select one:
a. Developement view
b. Logical view
c. Physical view

d. process view
In view based approach of software architecture which statement of is not true
Select one:
a. a view corresponding to a structure is created by using elements and their inter-relationship
b. each views represents certain architectural aspects of the system, created for stakeholder.
c. a view is the visualizing a code.

d. all the views combined together form the consistent whole.


----------- are sequences of activities or interactions that describe the system's response to a specific
stimulus when the system is in a specific state.
Select one:
a. Process
b. States
c. Instances

d. Traces
The mapping of development environment/execution environment is better represented in
Select one:
a. Module View
b. Component and Connectors View
c. Allocation View

d. Quality View
The major concerns of security view includes

Internal to Wipro
Select one:
a. Lack of proper implementation
b. Poor design decision to boost performance
c. All of the above.

d. Complete ignorance of security threats

Internal to Wipro

You might also like