Explore topic-wise MCQs in C++ Programming.

This section includes 839 Mcqs, each offering curated multiple-choice questions to sharpen your C++ Programming knowledge and support exam preparation. Choose a topic below to get started.

301.

The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and

A. Data Size
B. Round Size
C. Key Size
D. Encryption Size
Answer» D. Encryption Size
302.

Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?

A. Round key algorithm
B. Public key algorithm
C. Advanced Encryption Standard
D. Asymmetric key algorithm
Answer» D. Asymmetric key algorithm
303.

Which is the principle of the encryption using a key?

A. The key indicates which funcion is used for encryption. Thereby it is more difficult to decrypt a intercepted message as the function is unknown
B. The key contains the secret function for encryption including parameters. Only a password can activate the key
C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption
D. The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption
Answer» C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption
304.

Which of the following requires no password travel across the internet ?

A. Readable system
B. Manipulation system
C. Challenge–response system
D. Responce system
Answer» D. Responce system
305.

Which is the largest disadvantage of the symmetric Encryption?

A. More complex and therefore more time-consuming calculations
B. Problem of the secure transmission of the Secret Key
C. Less secure encryption function
D. Isn’t used any more
Answer» C. Less secure encryption function
306.

Which of the following is not a property of good encryption technique ?

A. Relatively simple for authorized users to encrypt and decrypt data
B. Decryption key is extremely difficult for an intruder to determine
C. Encryption depends on a parameter of the algorithm called the encryption key
D. None of the mentioned
Answer» E.
307.

Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?

A. Not true, the message can also be decrypted with the Public Key
B. A so called “one way function with back door” is applyed for the encryption
C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key
D. The encrypted message contains the function for decryption which identifies the Private Key
Answer» C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key
308.

In which of the following encryption key is used to encrypt and decrypt the data ?

A. Public key
B. Private key
C. Symmetric key
D. Asymmetric key
Answer» D. Asymmetric key
309.

The cipher which uses the exclusive-or operation as defined in computer science is called

A. Caesar cipher
B. XOR cipher
C. cipher
D. cipher text
Answer» C. cipher
310.

The shift cipheris sometimes referred to as the

A. Caesar cipher
B. Julia cipher
C. plain cipher
D. All of them
Answer» B. Julia cipher
311.

The Data Encryption Standard (DES) was designed by

A. Microsoft
B. Apple
C. IBM
D. None
Answer» D. None
312.

RSA stands for

A. Rivest, Shamir, Adleman
B. Roger, Shamir, Adrian
C. Robert, Shamir, Anthoney
D. Rivest, Shaw, Adleman
Answer» B. Roger, Shamir, Adrian
313.

ECB stands for

A. Electronic Control Book
B. Electronic Code Book
C. Electronic Cipher Book
D. Electronic Cryptography Book
Answer» C. Electronic Cipher Book
314.

The Cryptography can provide

A. entity authentication
B. nonrepudiation of messages
C. confidentiality
D. All of them
Answer» E.
315.

The process of transforming plain text to unreadable text.

A. Decryption
B. Encryption
C. Network Security
D. Information Hiding
Answer» C. Network Security
316.

The microcomputer system by using the ____device interface

A. Input
B. Output
C. Both a and b
D. None of these
Answer» D. None of these
317.

Pseudo instructions are basically

A. false instructions
B. instructions that are ignored by the microprocessor
C. assembler directives
D. instructions that are treated like comments
Answer» D. instructions that are treated like comments
318.

The ____ place the data from a register onto the data bus.

A. CPU
B. ALU
C. Both a and b
D. None of these
Answer» B. ALU
319.

In which form CPU provide output:

A. Computer signals
B. Digital signals
C. Metal signals
D. None of these
Answer» C. Metal signals
320.

The first task of DOS operating system after loading into the memory is to use the filecalled___________

A. HIMEM.SYS
B. CONFIG.SYS
C. AUTOEXEC.BAT
D. SYSTEM.INI
Answer» C. AUTOEXEC.BAT
321.

The first modern computer was called_____________

A. FLOW-MATIC
B. UNIVAC-I
C. ENIAC
D. INTEL
Answer» D. INTEL
322.

Which are the four categories of registers:

A. General‐ purpose register
B. Pointer or index registers
C. Segment registers
D. All of these
Answer» E.
323.

MSD stands for:

A. Least significant digit
B. Most significant digit
C. Medium significant digit
D. low significant digit
Answer» C. Medium significant digit
324.

The 16 bit register is separated into groups of 4 bit where each groups is called:

A. BCD
B. Nibble
C. Half byte
D. None of these
Answer» C. Half byte
325.

Signal voltage ranges for a logic high and for a logic low in RS-232C standard are

A. Low = 0 volt to 1.8 volt, high = 2.0 volt to 5 volt
B. Low =-15 volt to –3 vol, high = +3 volt to +15 volt
C. Low = +3 volt to +15 volt, high = -3 volt to -15 volt
D. Low = 2 volt to 5.0 volt, high = 0 volt to 1.8 volt
Answer» C. Low = +3 volt to +15 volt, high = -3 volt to -15 volt
326.

A nibble can be represented in the from of:

A. Octal digit
B. Decimal
C. Hexadecimal
D. None of these
Answer» D. None of these
327.

A/n …. Device is any device that provides information, which is sent to the CPU.

A. Input
B. Output
C. CPU
D. Memory
Answer» B. Output
328.

The left side of any binary number is called:

A. Least significant digit
B. Most significant digit
C. Medium significant digit
D. low significant digit
Answer» C. Medium significant digit
329.

Which one of the following is not a vectored interrupt?

A. TRAP
B. INTR
C. RST 7.5
D. RST 3
Answer» E.
330.

Which is the brain of computer ?

A. ALU
B. CPU
C. MU
D. None of these
Answer» C. MU
331.

PROM stands for

A. Programmable read‐only memory
B. Programmable read write memory
C. Programmer read and write memory
D. None of these
Answer» B. Programmable read write memory
332.

Synchronization bit at the beginning of character is called ________.

A. stop bit
B. simplex
C. half duplex
D. start bit
Answer» E.
333.

Which is a 8 bit Microprocessor ?

A. Intel 4040
B. Pentium-I
C. 8088
D. Motorala MC-6801
Answer» E.
334.

EPROM stands for

A. Erasable Programmable read‐only memory
B. Electrically Programmable read write memory
C. Electrically Programmable read‐only memory
D. None of these
Answer» B. Electrically Programmable read write memory
335.

The First electronic computer was completed in __________.

A. 1946
B. 1938
C. 1941
D. 1950
Answer» B. 1938
336.

What is the microprocessor comprises:

A. Register section
B. One or more ALU
C. Control unit
D. All of these
Answer» E.
337.

Each memory location has

A. Address
B. Contents
C. Both a and b
D. None of these
Answer» D. None of these
338.

Customized ROMS are called

A. Mask ROM
B. Flash ROM
C. EPROM
D. None of these
Answer» B. Flash ROM
339.

The First Microprocessor was__________.

A. Intel 4004
B. Intel 8080
C. Intel 8085
D. Intel 4008
Answer» B. Intel 8080
340.

Designing logic circuits and writing instructions to enable the microprocessor to communicate with peripheral is called _________.

A. interfacing
B. monitoring
C. polling
D. pulling
Answer» B. monitoring
341.

_______ means at the same time, the transmitter and receiver are synchronized with the same clock.

A. asynchronous
B. serial data
C. synchronous
D. parallel data
Answer» D. parallel data
342.

The 1 MB byte of memory can be divided into ______ segment.

A. 1 Kbyte
B. 64 Kbyte
C. 33 Kbyte
D. 34 Kbyte
Answer» C. 33 Kbyte
343.

The IF is called as _________.

A. initial flag
B. indicate flag
C. interrupt flag
D. inter flag
Answer» D. inter flag
344.

A microprocessor is a _______ chip integrating all the functions of a CPU of a computer.

A. multiple
B. single
C. double
D. triple
Answer» C. double
345.

Microprocessor is a/an _______ circuit that functions as the CPU of the computer.

A. electronic
B. mechanic
C. integrating
D. processing
Answer» B. mechanic
346.

Microprocessor is the ______ of the computer and it perform all the computational tasks.

A. main
B. heart
C. important
D. simple
Answer» C. important
347.

The OF is called as _______.

A. overflow flag
B. overdue flag
C. one flag
D. over flag
Answer» B. overdue flag
348.

The CF is known as ________.

A. carry flag
B. condition flag
C. common flag
D. cross flag
Answer» B. condition flag
349.

The SF is called as ________.

A. service flag
B. sign flag
C. single flag
D. signal flag
Answer» C. single flag
350.

Before a disk can be used to store data. It must be…….

A. Formatted
B. Reformatted
C. Addressed
D. None of the above
Answer» B. Reformatted