Search Topics....

Tuesday, November 7, 2017

HSST Exam Coaching @ Koyilandy , Kozhikode

Special GK session for HSST Exam All Subjects
On 11/11/2017 ( Sat )

Venue: Masters Academy
Near Railway Station
Koyilandy

Contact:8281409617

Sunday, November 5, 2017

Mock Exam #34

Take Mock Exam #34

Deadlock : OS

1. In this Algorithm, it is assumed that a deadlock will never occur

A.Banker's Algorithm
B.Dijkstra's algorithm
C.Ostrich Algorithm
D.Greedy Algorithm


This approach may be used in dealing with deadlocks in concurrent programming if they are believed to be very rare and the cost of detection or prevention is high. It is named for the ostrich effect which is defined as "to stick one's head in the sand and pretend there is no problem."

2. Resources are allocated to the process on non-sharable basis is

A. mutual exclusion
B. hold and wait
C. no pre-emption
D. circular wait

3. Which one of the following is a visual ( mathematical ) way to determine the deadlock occurrence?

A. resource allocation graph
B. starvation graph
C. inversion graph
D. none of the mentioned

4.Name the situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A.Starvation
B.Fragmentation
C.Deadlock
D.None of these

5. Banker's algorithm is

A.Deadlock Prevention
B.Deadlock Detection
C.Deadlock Avoidance
D.All of these

HSST Exam Preparation

 
1. Processor manufactured by AMD

  1. Sempron.
  2. Phenom.
  3. Turion.
  4. All of these
 
2. Which unit is largest

  1. Yotta Byte
  2. Peta Byte
  3. Tera Byte
  4. Zeta Byte
 
3. X is an electronic toll collection system by national highway authority of India. It was initially set up in the golden quadrilateral stretch but now is implemented in over 247 toll plaza across national highways. Name this system which uses Radio frequency identification to work

  1. Speedtag
  2. Fastrack
  3. Fastag
  4. Speedtrack
 
4.Technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities

  1. Salami Attack
  2. Data Diddling
  3. Data Mining
  4. Dictionary Attack
 
5. Characteristics of Salami Attack

  1. Small attacks add up to one major attack that can go undetected
  2. unauthorized changing of data before or during their input to a computer system
  3. process of discovering patterns in large data sets
  4. All of these
Answers

Friday, October 6, 2017

HSST COMPUTER SCIENCE ONLINE MODEL TEST

......,,,,,,,,Be prepared for first Online Model Test......,

Test based on our previous sessions

Those who scores below 30 Will be expelled from this group.

Those who don't take the exam also will be removed.

Cut off Marks 30

Sunday, October 1, 2017

Online HSST Computer Science Exam Study Group

Wish to join the study group  ?
  • Please leave your Mobile Number with Name to WhatsApp Number 7012853532 (  Group Admin )
  • Previous Sessions can be accessed from our official Blog
  • You can follow this blog to receive the discussions in your email...

https://hsstcomputers.blogspot.in/

Saturday, September 30, 2017

HSST EXAM Orientation & WhatsApp Group Get together

Orientation Programme @ Sunday ( 01/10/2017 )
------------------------
1. HSST Syllabus Discussion
2. Importance of GK and Current Affairs
3. Arranging Best Faculties for Coaching
4. Online Virual Class room
5. model Question Preparation
6. Smooth Running of WhatsApp Group
7. Periodic Get together..
8. Buying Reference Books
9. UGC NET

All are welcome

Admins