Explore topic-wise InterviewSolutions in Current Affairs.

This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1.

Triple – DES are also known as(a) IDES(b) 3DES(c) DESede(d) all of these

Answer»

(d) all of these

2.

How many bits are used by DES algorithm?(a) 8(b) 1(c) 56(d) 64

Answer»

56 bits are used by DES algorithm

3.

The DES key is apparently …….. bits.(a) 16(b) 32 (c) 64 (d) 128

Answer»

The DES key is apparently 64 bits.

4.

DES was introduced by ……..(a) FEPS(b) FIPS(c) FPS(d) FPSE

Answer»

DES was introduced by FIPS

5.

Write a note on case analysis.

Answer»

Alternative statement analyses the problem into two cases. Case analysis statement generalizes it to multiple cases. Case analysis splits the problem into an exhaustive set of disjoint cases. For each case, the problem is solved independently. If Cl, C2, and C3 are conditions, and S1, S2, S3 and S4 are statements, a 4 – case analysis statement has the form,

1. case C1 

2. S1 

3. case C2 

4. S2 

5. case C3 

6. S3 

7. else 

8. S4

The conditions C1, C2, and C3 are evaluated in turn. For the first condition that evaluates to true, the corresponding sttement is executed, and the case analysis statement ends. If none of the conditions evaluates to true, then the default case S4 is executed.

1. The cases are exhaustive: at least one of the cases is true. If all conditions are false, the default case is true.

2. The cases are disjoint: only one of the cases is true. Though it is possible for more than one condition to be true, the case analysis always executes only one case, the first one that is true. If the three conditions are disjoint, then the four cases are (1) C1, (2) C2, (3) C3, (4) (not C1) and (not C2) and (not C3).

6.

Which one is used for converting programs into computer executable instructions?(a) Converter(b) Apps(c) Translator(d) exe files

Answer»

(c) Translator

7.

How many types of payment frauds are there?(a) 2 (b) 3 (c) 4 (d) 5

Answer»

There are 3 types of payment frauds

8.

The conversion of plaintext into meaningless ciphertext is done by ………

Answer»

encryption algorithm

9.

TLS means ………

Answer»

Transport Layer Security

10.

DES was introduced in the year(a) 1972(b) 1975(c) 1976(d) 1978

Answer»

DES was introduced in 1976

11.

Which one of the following is not a control flow statements?(a) Sequential(b) Assignment(c) Iterative(d) Alternative

Answer»

(b) Assignment

12.

Which one of the following process executes the same action repeatedly?(a) Conditional(b) Alternative(c) Iterative(d) None of these

Answer»

(c) Iterative

13.

Destroying the authenticity and integrity of the business information is …….(a) Information leakage(b) Tampering(c) Squatting(d) Phishing

Answer»

(b) Tampering

14.

The notation which is not formal nor exact is …….(a) Flow chart (b) Pseudo code (c) Compiler (d) Translator

Answer»

(b) Pseudo code

15.

There are important control flow statements.(a) four(b) three (c) two (d) five

Answer»

There are three important control flow statements.

16.

Distinguish between a condition and a statement.

Answer»
Statementcondition
A statement is a phrase that commands the computer  to do an action.A condition is a phrase that describes a test of the state.
In flow chart rectangular box is used.In flow chart diamond box is used.
Ex. x : = 5Ex. if C
S1
else
S2
17.

DDoS means …………

Answer»

Distributed Denial of Service

18.

Data Encryption standard was introduced in ……(a) America(b) Africa(c) India(d) Russia

Answer»

Data Encryption standard was introduced in America

19.

Which of the following is true about Ransomware(a) Ransomware is not a subset of malware(b) Ransomware deletes the file instantly(c) Typopiracy is a form of ransomware(d) Hackers demand ransom from the victim

Answer»

(d) Hackers demand ransom from the victim

20.

If is a ……….. statement.(a) Conditional(b) Alternative(c) Case Analysis(d) Iterative

Answer»

(a) Conditional

21.

Write a note on refinement.

Answer»

After decomposing a problem into smaller subproblems, the next step is either to refine the subproblem or to abstract the subproblem.

1. Each subproblem can be expanded into more detailed steps. Each step can be further expanded to still finer steps, and so on. This is known as refinement

2. We can also abstract the subproblem. We specify each subproblem by its input property and the input – output relation. While solving the main problem, we only need to know the specification of the subproblems. We do not need to know how the subproblems are solved.

22.

If C is false in line 2, trace the control flow in this algorithm.1. S1 2. – – C is false 3. if C 4. S2 5. else

Answer»

S1 ; S2 ; S4

23.

What is case analysis?

Answer»

Case Analysis statement generalizes the problem into multiple cases. Case Analysis splits the problem into an exhaustive set of disjoint cases.

24.

Case analysis statement generalizes the statement into …….. cases.(a) 2(b) 3(c) 5(d) multiple

Answer»

Case analysis statement generalizes the statement into multiple cases.

25.

After an algorithmic problem is decomposed into subproblems, we can abstract the subproblems as …….(a) refinement(b) pseudo – code(c) decomposition(d) functions

Answer»

After an algorithmic problem is decomposed into subproblems, we can abstract the subproblems as functions

26.

What is DDoS?

Answer»

Distributed Denial of Service (DDoS) Attacks: 

It is a process of taking down an E-Commerce site by sending continious overwhelming request to its server. This attack will be conducted from numerous unidentified computers using botnet. This attack will slow down and make the server inoperative. DDoS attacks is also called as network flooding.

27.

………. is a diagrammatic notation for representing algorithms.(a) Pseudo code (b) Flowchart (c) Program (d) Languages

Answer»

(b) Flowchart

28.

The algorithmic notation similar to Programming language is …….(a) Flow chart(b) Pseudo code(c) C ++(d) C

Answer»

(b) Pseudo code

29.

Which one of the following algorithmic notation is used for giving visual intuition of control flow?(a) Flow chart(b) Programming languages(c) Pseudo code(d) Compiler

Answer»

(a) Flow chart

30.

Which one of the following is odd?(a) Python (b) C++ (c) C (d) Ctrl + S

Answer»

(d) Ctrl + S

31.

Explain the Basic Building Blocks of Algorithms.

Answer»

Data:

Algorithms take input data, process the data, and produce output data. Computers provide

instructions to perform operations on data. 

For example, there are instructions for doing arithmetic operations on numbers, such as add, subtract, multiply and divide. There are different kinds of data such as numbers and text.

Variables:

Variables are named boxes for storing data. When we do operations on data, We need to store the results in variables. The data stored in a variable is also known as the value of the variable. We can store a value in a variable or change the value of variable, using an assignment statement.

Control flow:

An algorithm is a sequence of statements. However, after executing a statement, the next statement executed need not be the next statement in the algorithm. The statement to be executed next may depend on the state of the process. Thus, the order in which the statements are executed may differ from the order in which they are written in the algorithm. This order of execution of statements is known as the control flow.

There are three important control flow statements to alter the control flow depending on the state.

1. In sequential control flow, a sequence of statements are executed one after another in the same order as they are written.

2. In alternative control flow, a condition of the state is tested, and if the condition is true, one statement is executed; if the condition is false, an alternative statement is executed.

3. In iterative control flow, a condition of the state is tested, and if the condition is true, a statement is executed. The two steps of testing the condition and executing the statement are repeated until the condition becomes false.

Functions:

The parts of an algorithm are known as functions. A function is like a sub algorithm. It takes an input, and produces an output, satisfying a desired input output relation.

32.

Define a function to double a number in two different ways:1. n + n 2. 2 x n

Answer»

1. Double (n)

– – inputs: n is a real number or an integer, n > 0

– – Outputs: y is a real number or an integer such that y = n + n

2. Double (n)

– – inputs: n is a real number or an integer, n > 0

– – Outputs: y is a real number or an integer such that y = 2 x n

33.

Write the specification of an algorithm hypotenuse w hose inputs are the lengths of the two shorter sides of a right angled triangle, and the output is the length of the third side.

Answer»

1. hypotenuse (a, b)

2. – – inputs: a, b are real numbers, a > 0, b > 0 

3. – – outputs: c2 = a2 + b2 wrhere c is real number, c > 0

34.

Define functions.

Answer»

The parts of an algorithm are known as functions. A function is like a sub-algorithm. It takes , an input, and produces an output, satisfying a desired input output relation.

35.

Suppose you want to solve the quadratic equation ax2 + bx + c – 0 by an algorithm. quadratic_solve (a, b, c) — inputs : ? — outputs: ?You intend to use the formula and you are prepared to handle only real number roots. Write a suitable specification.

Answer»

1. Quadratic – solve (a, b, c)

2. – – inputs: b2 – 4 ac > = 0 where a, b, c are real numbers, a ≠ 0

3. – – outputs: and x2 are real numbers such that a(x1)2 + bx1 + c = 0 and a(x2)2 + bx2 + c = 0

36.

What is the desired relation between the inputs A and B, and the output q and r?

Answer»

1. The two outputs q (quotient) and r (remainder) should satisfy the property A = q X B + r, and 

2. The remainder r should be less than the divisor B,

0 < r < B

Combining these requirements, we will specify the desired input-output relation as – 

outputs: A = q X B + r and 0 < r < B.

37.

Write the following(i) initial state(ii) final state

Answer»

The values of the variables when the algorithm starts is known as the initial state, and the values of the variables when the algorithm finishes is known as the final state.

38.

Explain the three control flow statement.

Answer»

There are three important control flow statements to alter the control flow depending on the state.

1. In sequential control flow, a sequence of statements are executed one after another in the same order as they are written. 

2. In alternative control flow, a condition of the state is tested, and if the condition is true, one statement is executed; if the condition is false, an alternative statement is executed.

3. In iterative control flow, a condition of the state is tested, and if the condition is true, a statement is executed. The two steps of testing the condition and executing the statement are repeated until the condition becomes false.

39.

Explain Algorithm Design Techniques.

Answer»

There are a few basic principles and techniques for designing algorithms.

1. Specification:

The first step in problem solving is to state the problem precisely. A problem is specified in terms of the input given and the output desired. The specification must also state the properties of the given input, and the relation between the input and the output.

2. Abstraction:

A problem can involve a lot of details. Several of these details are unnecessary for solving the problem. Only a few details are essential. Ignoring or hiding unnecessary details and modeling an entity only by its essential properties is known as abstraction. For example, when we represent the state of a process, we select only the variables essential to the problem and ignore inessential details.

3. Composition:

An algorithm is composed of assignment and control flow statements. A control flow statement tests a condition of the state and depending on the value of the condition, decides the next statement to be executed.

4. Decomposition:

We divide the main algorithm into functions. We construct each function independently of the main algorithm and other functions. Finally, we construct the main algorithm using the functions. When we use the functions, it is enough to know the specification of the function. It is not necessary to know how the function is implemented.

40.

Explain the specification format.

Answer»

Specification format:

We can write the specification in a standard three part format:

1. The name of the algorithm and the inputs

2. Input : the property of the inputs

3. Output : the desired input – output relation

The first part is the name of the algorithm and the inputs. The second part is the property of the inputs. It is written as a comment which starts with – inputs: The third part is the desired input – output relation. It is written as a comment which starts with – outputs:. The input and output can be written using English and mathematical notation.

41.

The input and output are passed between an algorithm and the user through …..(a) data (b) assignment (c) stage (d) variables

Answer»

(d) variables

42.

To execute in a computer, an algorithm must be expressed using the statement of …..(a) Object code (b) Machine Language (c) Assembler (d) Programming Languages

Answer»

(d) Programming Languages

43.

If the statement are executed one after the other, then it is control flow.(a) Sequential(b) iterative(c) selection(d) alternative

Answer»

(a) Sequential

44.

In which one of the following control flow, the statements are repeated until the conditon becomes false ……..(a) Sequential(b) iterative(c) selection(d) alternative

Answer»

(b) iterative

45.

Which one of the following is not a techniques for designing algorithms?(a) specifications(b) abstraction(c) encapsulation(d) compositio

Answer»

(c) encapsulation

46.

How many Algorithmic designing techniques are there?(a) 2 (b) 3 (c) 4 (d) 5

Answer»

There are 4 Algorithmic designing techniques.

47.

In specification, the input and output can be written using ….... (a) English (b) Mathematical notation (c) Binary format (d) Both a and b

Answer»

(d) Both a and b

48.

What are the values of variable m and n after the assignments in line (1) and line (3)?1. m, n : = 2, 5 2. – – m, n = ?, ?3. m, n : = m + 3, n – 1 4. – – m, n = ?, ?(a) 4, 5 (b) 5, 4 (c) 5,5 (d) 4, 4

Answer»

Answer is (b) 5, 4

49.

What is the format of the specification of an algorithm?

Answer»

Let P be the required property of the inputs and Q the property of the desired outputs.

Format of specification of an algorithm: 

1. Algorithm name (Inputs)

2. Inputs – P

3. Outputs – Q

50.

The first part of the specification is …..(a) Input (b) Output (c) property of inputs (d) The name of the algorithm and the inputs

Answer»

(d) The name of the algorithm and the inputs