Daily Exam Programmer 02-10-2024

Join us on Telegram


Q 1:

A Software Requirements Specification (SRS) document should avoid discussing which one of the following?

(1) Non-functional requirements
(2) User interface issues
(3) Design specification
(4) Interfaces with third party software
Correct Answer: Design specification

Q 2: Software risk always involves two characteristics
(1) Fire fighting and crisis management
(2) Known and unknown risks
(3) Uncertainty and loss
(4) Staffing and budget
Correct Answer: Uncertainty and loss

Q 3: ................is a digital version of AMPS
(1) GSM
(2) D-AMPS
(3) IS-95
(4) None of the above
Correct Answer: D-AMPS

Q 4:

In a time-domain plot, the horizontal axis is a measure of.............

(1) signal amplitude
(2) frequency
(3) phase
(4) time
Correct Answer: time

Q 5: Optimal Asymmetric Encryption Padding is employed in RSA to counter
(1) Known Ciphertext Attack
(2) Chosen Ciphertext Attack
(3) Known Plaintext Attack
(4) Chosen Plaintext Attack
Correct Answer: Chosen Ciphertext Attack

Q 6: What is the correct ordering of attacks on the basis of difficulty level (High to low)
(1) known plaintext, chosen plaintext, chosen ciphertext, ciphertext only
(2) known plaintext, chosen ciphertext, chosen plaintext, ciphertext only
(3) ciphertext only, known plaintext, chosen plaintext, chosen ciphertext
(4) ciphertext only, chosen plaintext, known plaintext, chosen ciphertext
Correct Answer: ciphertext only, known plaintext, chosen plaintext, chosen ciphertext

Q 7: Which of the following denote page code model in ASP.NET?
(1) single-file
(2) code-behind
(3) Both 1 and 2
(4) None of the above
Correct Answer: Both 1 and 2

Q 8:

The ISO quality assurance standard that applies to software engineering is

(1) ISO 9000:2004
(2) ISO 9001:2000
(3) 150 9002 2001
(4) ISO 9003 2004
Correct Answer: ISO 9001:2000

Q 9:

A type of cybercrime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating charge per click without having actual interest in the targets of the ad's link

(1) Phishing
(2) Zombie
(3) Click fraud
(4) None of the above
Correct Answer: Click fraud

Q 10:

A review summary report answers which three questions?

(1) Terminate project, replace producer, request a time extension
(2) What defects were found, what caused defects, who was responsible
(3) What was reviewed, who reviewed it, what were the findings
(4) None of the above
Correct Answer: What was reviewed, who reviewed it, what were the findings