NTA-NET (Based on NTA-UGC) Computer Science (Paper-II): Questions 878 - 879 of 2012

Access detailed explanations (illustrated with images and videos) to 2012 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 550.00 or

How to register?

Question number: 878

» Neural Networks and AI » Frames, Scripts, Semantic Nets, Production Systems, Procedural Representations

Edit

Appeared in Year: 2014

Match List-Ⅰ List-Ⅱ▾

Question

Match the following: (December Paper III)

List-Ⅰ (Column I) List-Ⅱ (Column II)

(A)

Script

(i)

Knowledge about objects and events is stored in record-like structures consisting of slots and slot values.

(B)

Conceptual dependencies

(ii)

Primitive concepts and rules to represent natural language statements

(C)

Associative network

(iii)

Frame like structures used to represent stereotypical patterns for commonly occurring events in terms of actors, roles, props and scenes

(D)

Frames

(iv)

Directed graph with labelled nodes for graphical representation of knowledge

Choices

Choice (4) Response
  • (A)
  • (B)
  • (C)
  • (D)

a.

  • (i)
  • (iv)
  • (iii)
  • (ii)

b.

  • (i)
  • (iv)
  • (ii)
  • (iii)

c.

  • (iii)
  • (iv)
  • (i)
  • (ii)

d.

  • (iii)
  • (ii)
  • (iv)
  • (i)

Question number: 879

» Networks, Virtualization, & Cloud Computing » Network Security » DNS, Resource Records, Name Servers

Edit

Appeared in Year: 2014

MCQ▾

Question

A Trojan horse is (December Paper III)

Choices

Choice (4) Response

a.

A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation.

b.

A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred.

c.

A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes

d.

None of the above

Developed by: