

MCQOPTIONS
Saved Bookmarks
This section includes 839 Mcqs, each offering curated multiple-choice questions to sharpen your C++ Programming knowledge and support exam preparation. Choose a topic below to get started.
301. |
The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and |
A. | Data Size |
B. | Round Size |
C. | Key Size |
D. | Encryption Size |
Answer» D. Encryption Size | |
302. |
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ? |
A. | Round key algorithm |
B. | Public key algorithm |
C. | Advanced Encryption Standard |
D. | Asymmetric key algorithm |
Answer» D. Asymmetric key algorithm | |
303. |
Which is the principle of the encryption using a key? |
A. | The key indicates which funcion is used for encryption. Thereby it is more difficult to decrypt a intercepted message as the function is unknown |
B. | The key contains the secret function for encryption including parameters. Only a password can activate the key |
C. | All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption |
D. | The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption |
Answer» C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption | |
304. |
Which of the following requires no password travel across the internet ? |
A. | Readable system |
B. | Manipulation system |
C. | Challenge–response system |
D. | Responce system |
Answer» D. Responce system | |
305. |
Which is the largest disadvantage of the symmetric Encryption? |
A. | More complex and therefore more time-consuming calculations |
B. | Problem of the secure transmission of the Secret Key |
C. | Less secure encryption function |
D. | Isn’t used any more |
Answer» C. Less secure encryption function | |
306. |
Which of the following is not a property of good encryption technique ? |
A. | Relatively simple for authorized users to encrypt and decrypt data |
B. | Decryption key is extremely difficult for an intruder to determine |
C. | Encryption depends on a parameter of the algorithm called the encryption key |
D. | None of the mentioned |
Answer» E. | |
307. |
Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key? |
A. | Not true, the message can also be decrypted with the Public Key |
B. | A so called “one way function with back door” is applyed for the encryption |
C. | The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key |
D. | The encrypted message contains the function for decryption which identifies the Private Key |
Answer» C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key | |
308. |
In which of the following encryption key is used to encrypt and decrypt the data ? |
A. | Public key |
B. | Private key |
C. | Symmetric key |
D. | Asymmetric key |
Answer» D. Asymmetric key | |
309. |
The cipher which uses the exclusive-or operation as defined in computer science is called |
A. | Caesar cipher |
B. | XOR cipher |
C. | cipher |
D. | cipher text |
Answer» C. cipher | |
310. |
The shift cipheris sometimes referred to as the |
A. | Caesar cipher |
B. | Julia cipher |
C. | plain cipher |
D. | All of them |
Answer» B. Julia cipher | |
311. |
The Data Encryption Standard (DES) was designed by |
A. | Microsoft |
B. | Apple |
C. | IBM |
D. | None |
Answer» D. None | |
312. |
RSA stands for |
A. | Rivest, Shamir, Adleman |
B. | Roger, Shamir, Adrian |
C. | Robert, Shamir, Anthoney |
D. | Rivest, Shaw, Adleman |
Answer» B. Roger, Shamir, Adrian | |
313. |
ECB stands for |
A. | Electronic Control Book |
B. | Electronic Code Book |
C. | Electronic Cipher Book |
D. | Electronic Cryptography Book |
Answer» C. Electronic Cipher Book | |
314. |
The Cryptography can provide |
A. | entity authentication |
B. | nonrepudiation of messages |
C. | confidentiality |
D. | All of them |
Answer» E. | |
315. |
The process of transforming plain text to unreadable text. |
A. | Decryption |
B. | Encryption |
C. | Network Security |
D. | Information Hiding |
Answer» C. Network Security | |
316. |
The microcomputer system by using the ____device interface |
A. | Input |
B. | Output |
C. | Both a and b |
D. | None of these |
Answer» D. None of these | |
317. |
Pseudo instructions are basically |
A. | false instructions |
B. | instructions that are ignored by the microprocessor |
C. | assembler directives |
D. | instructions that are treated like comments |
Answer» D. instructions that are treated like comments | |
318. |
The ____ place the data from a register onto the data bus. |
A. | CPU |
B. | ALU |
C. | Both a and b |
D. | None of these |
Answer» B. ALU | |
319. |
In which form CPU provide output: |
A. | Computer signals |
B. | Digital signals |
C. | Metal signals |
D. | None of these |
Answer» C. Metal signals | |
320. |
The first task of DOS operating system after loading into the memory is to use the filecalled___________ |
A. | HIMEM.SYS |
B. | CONFIG.SYS |
C. | AUTOEXEC.BAT |
D. | SYSTEM.INI |
Answer» C. AUTOEXEC.BAT | |
321. |
The first modern computer was called_____________ |
A. | FLOW-MATIC |
B. | UNIVAC-I |
C. | ENIAC |
D. | INTEL |
Answer» D. INTEL | |
322. |
Which are the four categories of registers: |
A. | General‐ purpose register |
B. | Pointer or index registers |
C. | Segment registers |
D. | All of these |
Answer» E. | |
323. |
MSD stands for: |
A. | Least significant digit |
B. | Most significant digit |
C. | Medium significant digit |
D. | low significant digit |
Answer» C. Medium significant digit | |
324. |
The 16 bit register is separated into groups of 4 bit where each groups is called: |
A. | BCD |
B. | Nibble |
C. | Half byte |
D. | None of these |
Answer» C. Half byte | |
325. |
Signal voltage ranges for a logic high and for a logic low in RS-232C standard are |
A. | Low = 0 volt to 1.8 volt, high = 2.0 volt to 5 volt |
B. | Low =-15 volt to –3 vol, high = +3 volt to +15 volt |
C. | Low = +3 volt to +15 volt, high = -3 volt to -15 volt |
D. | Low = 2 volt to 5.0 volt, high = 0 volt to 1.8 volt |
Answer» C. Low = +3 volt to +15 volt, high = -3 volt to -15 volt | |
326. |
A nibble can be represented in the from of: |
A. | Octal digit |
B. | Decimal |
C. | Hexadecimal |
D. | None of these |
Answer» D. None of these | |
327. |
A/n …. Device is any device that provides information, which is sent to the CPU. |
A. | Input |
B. | Output |
C. | CPU |
D. | Memory |
Answer» B. Output | |
328. |
The left side of any binary number is called: |
A. | Least significant digit |
B. | Most significant digit |
C. | Medium significant digit |
D. | low significant digit |
Answer» C. Medium significant digit | |
329. |
Which one of the following is not a vectored interrupt? |
A. | TRAP |
B. | INTR |
C. | RST 7.5 |
D. | RST 3 |
Answer» E. | |
330. |
Which is the brain of computer ? |
A. | ALU |
B. | CPU |
C. | MU |
D. | None of these |
Answer» C. MU | |
331. |
PROM stands for |
A. | Programmable read‐only memory |
B. | Programmable read write memory |
C. | Programmer read and write memory |
D. | None of these |
Answer» B. Programmable read write memory | |
332. |
Synchronization bit at the beginning of character is called ________. |
A. | stop bit |
B. | simplex |
C. | half duplex |
D. | start bit |
Answer» E. | |
333. |
Which is a 8 bit Microprocessor ? |
A. | Intel 4040 |
B. | Pentium-I |
C. | 8088 |
D. | Motorala MC-6801 |
Answer» E. | |
334. |
EPROM stands for |
A. | Erasable Programmable read‐only memory |
B. | Electrically Programmable read write memory |
C. | Electrically Programmable read‐only memory |
D. | None of these |
Answer» B. Electrically Programmable read write memory | |
335. |
The First electronic computer was completed in __________. |
A. | 1946 |
B. | 1938 |
C. | 1941 |
D. | 1950 |
Answer» B. 1938 | |
336. |
What is the microprocessor comprises: |
A. | Register section |
B. | One or more ALU |
C. | Control unit |
D. | All of these |
Answer» E. | |
337. |
Each memory location has |
A. | Address |
B. | Contents |
C. | Both a and b |
D. | None of these |
Answer» D. None of these | |
338. |
Customized ROMS are called |
A. | Mask ROM |
B. | Flash ROM |
C. | EPROM |
D. | None of these |
Answer» B. Flash ROM | |
339. |
The First Microprocessor was__________. |
A. | Intel 4004 |
B. | Intel 8080 |
C. | Intel 8085 |
D. | Intel 4008 |
Answer» B. Intel 8080 | |
340. |
Designing logic circuits and writing instructions to enable the microprocessor to communicate with peripheral is called _________. |
A. | interfacing |
B. | monitoring |
C. | polling |
D. | pulling |
Answer» B. monitoring | |
341. |
_______ means at the same time, the transmitter and receiver are synchronized with the same clock. |
A. | asynchronous |
B. | serial data |
C. | synchronous |
D. | parallel data |
Answer» D. parallel data | |
342. |
The 1 MB byte of memory can be divided into ______ segment. |
A. | 1 Kbyte |
B. | 64 Kbyte |
C. | 33 Kbyte |
D. | 34 Kbyte |
Answer» C. 33 Kbyte | |
343. |
The IF is called as _________. |
A. | initial flag |
B. | indicate flag |
C. | interrupt flag |
D. | inter flag |
Answer» D. inter flag | |
344. |
A microprocessor is a _______ chip integrating all the functions of a CPU of a computer. |
A. | multiple |
B. | single |
C. | double |
D. | triple |
Answer» C. double | |
345. |
Microprocessor is a/an _______ circuit that functions as the CPU of the computer. |
A. | electronic |
B. | mechanic |
C. | integrating |
D. | processing |
Answer» B. mechanic | |
346. |
Microprocessor is the ______ of the computer and it perform all the computational tasks. |
A. | main |
B. | heart |
C. | important |
D. | simple |
Answer» C. important | |
347. |
The OF is called as _______. |
A. | overflow flag |
B. | overdue flag |
C. | one flag |
D. | over flag |
Answer» B. overdue flag | |
348. |
The CF is known as ________. |
A. | carry flag |
B. | condition flag |
C. | common flag |
D. | cross flag |
Answer» B. condition flag | |
349. |
The SF is called as ________. |
A. | service flag |
B. | sign flag |
C. | single flag |
D. | signal flag |
Answer» C. single flag | |
350. |
Before a disk can be used to store data. It must be……. |
A. | Formatted |
B. | Reformatted |
C. | Addressed |
D. | None of the above |
Answer» B. Reformatted | |