Collections of CS MCQs
Collections of CS MCQs
Collections of CS MCQs
Contents
Solved MCQs of Basic of IT ......................................................... 4
Solved MCQs of Computer networking .................................... 10
Solved MCQ of Internet Security .............................................. 21
Solved MCQs of Database Management System (DBMS) ........ 25
Solved MCQs of Data Structure ................................................ 38
Solved MCQs of System Analysis and Design ........................... 45
Solved MCQs of Operating System Principles........................... 54
Solved MCQs of Computer Security ......................................... 64
Solved MCQs of C ..................................................................... 68
Solved MCQs of C++ ................................................................. 72
Solved MCQs of Java................................................................. 80
Set-1
1. Binary code "0" means ............
A) State of absence
B) State of presence
C) State of Negative
D) State of Positive
6. Internet is .................
A) Network of Networks
B) Networks of Communication
C) Networks of Data
D) Group of LAN
7. ................. is a standalone tag.
A) <img>
B) <body>
C) <head>
D) <p>
14. ............ is used to pointing / selecting the screen co-ordinates by detecting the light.
A) Light Pen
B) Bar Code Reader
C) Digital Camera
D) Smart Cards
15. ............... displays the information about the active document such as page number, section number,
number of pages, insertion point, position, etc.
A) View Bar
B) Menu Bar
C) Status Bar
D) Ruler Line
20. The short cut key to start a new line without starting a new paragraph is ......
A) Ctrl+Enter
B) Shift+Enter
C) Alt+Enter
D) Enter
Answers:
1. A) State of absence
11. A) shaded
2. B) <body>
13. B) Internet
4. B) 7
5. A) Input
6. A) Network of Networks
16. D) Appending
7. A) <img>
17. A) Ctrl+End
9. A) 16
20. B) Shift+Enter
19. The loss in signal power as light travels down the fiber is called .............
A) Attenuation
B) Propagation
C) Scattering
D) Interruption
20. Which of the following TCP/IP protocols is used for transferring files form one machine to another.
A) FTP
B) SNMP
C) SMTP
D) RPC
Answers:
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
D) Peer to Peer
D) All of the above
C) Session Layer
A) Telnet
A) Physical layer
D) Mesh
B) Baud
B) Half-duplex
A) Attenuation
A) FTP
Answers:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
C) T-switched network
A) Application
A) UDP
C) NFS
D) Frame
B) IP address
D) All of the above
D) Gateway
C) Multiplexer
B) Application
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
A) FTP
D) A and B
A) The primary ring
A) Physical
A) Mesh
B) Newsgroups
A) TCP/IP
A) True, True
C) Star
D) Both of A and B
Set-3
1.
2.
3.
4.
5.
A) FDDI
D) All of the above
B) Fast Ethernet
A) S/NET
C) Subnet... number.
Answers:
6. B) True, True
7. A) Static subneting
8. D) All i, ii, iii, iv and v only
9. A) Address .....Protocol (ARP)
10. B) Static allocation
Set-5
1. The examples of Interior Gateway Protocols (IGP) are.
i) Open Short Path First (OSPF)
ii) Routing Information Protocol (RIP)
iii) Border Gateway Protocol (BGP)
A) i only
B) i, and ii only
C) i and iii only
D) All i, ii and iii
2. FTP server listens to connections on port .
A) 19 and 20
B) 20 and 21
C) 21 and 22
D) 20 and 22
3. Which of the following operations can be performed by using FTP.
i) Connect to a remote host
ii) Select directory
iii) Define the transfer mode
iv) List file available
A) i, and ii only
B) i, ii and iii only
C) ii, iii and iv only
D) All i, ii, iii and iv
4. A .. is a set of information that is exchanged between a client and web browser and a web
server during an HTTP transaction.
A) infoset
B) clientinfo
C) cookie
D) transkie
5. Match the following HTTP status code to their respective definitions.
i) 400
a) OK
ii) 500
b) Not found
iii) 200
c) Continue
iv) 100
d) Internal server error
A) i-b, ii-d, iii-a, iv-c
B) i-a, ii-b, iii-c, iv-d
C) i-b, ii-c, iii-a, iv-d
D) i-b, ii-a, iii-c, iv-d
6. Loopback address . of IPv6 address is equivalent to the IPV4 loopback address
127.0.0.1.
A) (: : 1)
B) (: : )
Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html
1.
2.
3.
4.
5.
B) i, and ii only
B) 20 and 21
D) All i, ii, iii and iv
C) cookie
A) i-b, ii-d, iii-a, iv-c
Answers:
6.
7.
8.
9.
10.
A) (: : 1)
B) (: : )
B) Bus
B) Mac sub layer
B) 1
11.
12.
13.
14.
15.
Answers:
D) All i, ii, iii and iv
16.
A) Encryption
17.
B) i, iii, iv and v only
18.
A) Chock point
19.
D) All of the above
20.
1.
2.
3.
4.
5.
Answers:
A) SSL
6.
B) ESP
7.
C) Both A and B
8.
A) IPsec
9.
C) SSL record protocol
10.
C) 443
A) SSL handshake protocol
A) True, False
D) All i, ii, iii, iv and v
A) Tunnel
Answers:
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
C) Program
B) Domains
A) Entity
C) Data Flow Diagram
A) Hierarchical schema
C) System
B) Schema
C) Having
B) is a standard ... accessible parts.
A) Standard query language
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
B) Information
B) SQL server service manager
A) record
B) Operational database
C) Multiple databases
A) Hierarchic Sequential Access Method
D) sysindexes
C) It should avoid/reduce redundancy.
A) Chain
A) Constraints
Answers:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
B) Primary Key
A) Unique predicate
C) DISTINCT
C) i-true, ii-true
A) Data Control Language
A) Normalization
A) Weak entity
D) Predicate
A) Constraints
B) Cardinality, Degree
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
A) Subset of X
C) DDL
C) Both of them
B) Random access
A) Delete * from table_name
A) Key integrity
B) Fourth Normal Form
B) Backup Utility
C) Terminal Interface
D) Fourth Normal Form
Set-3
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
B) Inner
A) Like Predicate
A) i, ii, and iv only
C) drop database database_name
A) Composite Key
B) Query optimization
B) Trigger
C) Security
B) i, ii and iii only
C) Curser
Set-4
1. State true or false.
i) Select operator is not a unary operator.
ii) Project operator chooses subset of attributes or columns of a relation.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
2. database is used as template for all databases created.
A) Master
B) Model
C) Tempdb
D) None of the above
3. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values
can be assigned to each data items. This is referred to as
A) Data Security
B) Domain access
C) Data Control
D) Domain Integrity
4. .. operator is basically a join followed by a project on the attributes of first relation.
A) Join
B) Semi-Join
C) Full Join
D) Inner Join
5. Which of the following is not a binary operator in relational algebra?
A) Join
B) Semi-Join
C) Assignment
D) Project
6. Centralizing the integrity checking directly under the DBMS .. Duplication and ensures the
consistency and validity of the database.
A) Increases
B) Skips
C) Does not reduce
D) Reduces
7. Which of the following is/are the DDL statements?
A) Create
B) Drop
C) Alter
D) All of the above
Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html
Answers:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
C) i-False, ii-True
B) Model
D) Domain Integrity
B) Semi-Join
D) Project
D) Reduces
D) All of the above
D) Refresh
B) Constraint
C) Both of them
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
C) Relations
C) Index
C) Both of them
B) Edgar F. Codd
A) use database
C) =<
C) navigation
B) Referential Integrity Constraints
B) HAVING Clause
D) Foreign Key
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
Set-2
1. A directed graph is . if there is a path from each vertex to every other vertex in the
digraph.
A) Weakly connected
B) Strongly Connected
C) Tightly Connected
D) Linearly Connected
2. In the .. traversal we process all of a vertexs descendents before we move to an adjacent
vertex.
A) Depth First
B) Breadth First
C) With First
D) Depth Limited
3. State True of False.
i) Network is a graph that has weights or costs associated with it.
ii) An undirected graph which contains no cycles is called a forest.
iii) A graph is said to be complete if there is no edge between every pair of vertices.
A) True, False, True
B) True, True, False
C) True, True, True
D) False, True, True
4. Match the following.
a) Completeness
i) How long does it take to find a solution
b) Time Complexity
ii) How much memory need to perform the search.
c) Space Complexity
iii) Is the strategy guaranteed to find the solution when there in one.
A) a-iii, b-ii, c-i
B) a-i, b-ii, c-iii
C) a-iii, b-i, c-ii
D) a-i, b-iii, c-ii
5. The number of comparisons done by sequential search is
A) (N/2)+1
B) (N+1)/2
C) (N-1)/2
D) (N+2)/2
6. In , search start at the beginning of the list and check every element in the list.
A) Linear search
B) Binary search
C) Hash Search
Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html
Answers:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
B) Strongly Connected
A) Depth First
B) True, True, False
C) a-iii, b-i, c-ii
B) (N+1)/2
A) Linear search
D) True, True
C) Merge Sort
A) True, True
B) Bipartite
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
B) 0 and -1
C) r=(r+1)% QUEUE_SIZE
C) Both i and ii
B) Linked Lists
C) 4
D) Traversal
B) Sentinel
A) vertices, edges
C) Both A and B
D) [log2n]+1
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
Answers:
A) System
D) All of the above
D) Tactical
A) Rectangle
B) Information
C) Parallel Operation
B) Herbert A Simon
C) May emanate and entity
A) System Analysis
A) System Development Life Cycle
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
A) MDP
C) a repository of data
C) Physical
B) Computer Program
B) Feasibility Study
C) Enter or leave a data Store
A) Lock in customers
A) Information
D) Intangible, Intangible
A) i and iii
Answers:
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
D) Investment
D) All A, B & C
B) Logical
A) i-True, ii-True
D) A, B, C
D) they will get merged
B) Master development Plan
B) Development, Operating
D) a, b, c, d, e and f
B) System flowchart
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Answers:
A) Conceptual
D) 1, 2 & 3
B) is a DFD which .... of the system
A) Hierarchy input process output
A) Problem definition
B) 1, 2 & 4
A) System Development Life Cycle
B) Terms of reference
D) All A, B, C
B) System Document
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
Set-2
1. The first batch operating system was developed in the ................. by General Motors for use on an
IBM 701.
A) mid 1940's
B) mid 1950's
C) mid 1960's
D) mid 1970's
2. Process is ........................
A) A program in execution
B) An instance of a program running on a computer.
C) The entity that can be assigned to and executed
D) All of the above.
3. ................... is a facility that allows programmers to address memory from a logical point of view,
without regard to the main memory, physically available.
A) Visual memory
B) Real memory
C) Virtual memory
D) Secondary memory
4. ............ is a large kernel, including scheduling file system, networking, device drivers, memory
management and more.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel
5. A .................... architecture assigns only a few essential functions to the kernel, including address
spaces, Inter process communication(IPC) and basic scheduling.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel
6. State whether true or false.
i) Multithreading is useful for application that perform a number of essentially independent tasks that
do not be serialized.
ii) An example of multithreading is a database server that listens for and process numerous client
request.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
7. With ................ only one process can execute at a time; meanwhile all other process are waiting for
the processer. With .............. more than one process can be running simultaneously each on a
different processer.
A) Multiprocessing, Multiprogramming
Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html
Set-3
1.
2.
3.
4.
5.
D) Both A and B
B) MS-DOS
B) True, True
B) User-level threads
A) Mutual Exclusion
Answers:
6.
7.
8.
9.
10.
A) Mutual Exclusion
A) Deadlock
D) All i, ii, iii and iv
C) Circular waits
B) Memory management
Set-4
1.
2.
3.
4.
5.
Answers:
B) Memory management
6.
C) real . virtual memory
7.
A) long term scheduling
8.
C) short term scheduling
9.
B) access time
10.
C) N-Step SCAN
D) All i, ii, iii, iv and v
B) i, iii and iv only
A) Fetch policy
B) demand cleaning
1. In computer security, . means that computer system assets can be modified only by
authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
2. In computer security, .. means that the information in a computer system only be
accessible for reading by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
3. The type of threats on the security of a computer system or network are ..
i) Interruption
ii) Interception
iii) Modification
iv) Creation
v) Fabrication
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, ii, iii and v only
D) All i, ii, iii, iv and v
4. Which of the following is independent malicious program that need not any host program?
A) Trap doors
B) Trojan horse
C) Virus
D) Worm
5. The .. is code that recognizes some special sequence of input or is triggered by being run from
a certain user ID of by unlikely sequence of events.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
6. The .. is code embedded in some legitimate program that is set to explode when certain
conditions are met.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
7. Which of the following malicious program do not replicate automatically?
A) Trojan Horse
B) Virus
C) Worm
D) Zombie
Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html
11.
12.
13.
14.
15.
B) Integrity
A) Confidentiality
C) i, ii, iii and v only
D) Worm
A) Trap doors
Answers:
16.
17.
18.
19.
20.
C) Logic Bomb
A) Trojan Horse
C) Trojan Horses
C) True, True
B) Virus
Set 2
1. .. are used in denial of service attacks, typically against targeted web sites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse
2. Select the correct order for the different phases of virus execution.
i) Propagation phase
ii) Dormant phase
iii) Execution phase
iv) Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i
3. A attaches itself to executable files and replicates, when the infected program is
executed, by finding other executable files to infect.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
4. .. is a form of virus explicitly designed to hide itself from detection by antivirus
software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
5. A .. creates copies during replication that are functionally equivalent but have
distinctly different bit patterns.
A) Boot Sector Virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
6. A portion of the Polymorphic virus, generally called a .. , creates, a random
encryption, key to encrypt the remainder of the virus.
A) mutual engine
B) mutation engine
C) multiple engine
D) polymorphic engine
7. State whether the following statement is true.
i) A macro virus is platform independent.
ii) Macro viruses infect documents, not executable portions of code.
A) i-only
B) ii-only
C) Both i and ii
D) Non i and ii
Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html
1.
2.
3.
4.
5.
B) Zombie
C) ii, i, iv an iii
C) Parasitic Virus
A) Stealth virus
B) Polymorphic Virus
Answers:
6.
7.
8.
9.
10.
B) mutation engine
C) Both i and ii
D) All of the above
B) Propagation phase
B) Zombie
Solved MCQs of C
Set-1
Answers:
1. C) Dennis Ritche
2. B) 8
3. D) All of the above
4. C) 15
5. B) A complier
6. D) Homogenous data type
7. C) ( )
8. A) Loop
9. D) 2
10. B) Address of variable
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
B) is used first
A) Single address at a time
A) At least one digit
B) a=3, c=5
A) Blank Spaces
B) 1
A) Keywords can variable names
C) 34
B) 6
B) related data items and variables
Answers:
121.
122.
123.
124.
125.
126.
127.
128.
129.
130.
A) Simula67
C) C with classes
B) Identifiers
D) All of the above.
B) a-iii, b-i, c-ii
B) 1
D) All i, ii, iii and iv
D) All of the above
B) a Boolean expression
B) Class
131.
132.
133.
134.
135.
136.
137.
138.
139.
140.
C) Inline function
D) Header files
C) False, True
B) +
B) ii-False, ii-True
C) protected
C) x=26, m=11, n=16
C) To facilitate the reusability of code
D) It is visible throughout the block.
A) We want to exchange .. classes
Answers:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
C) <<
B) True, False
C) Both i and ii
A) Encapsulation
D) All of the above.
A) ->*
C) Meta Class
B) .*
C) Default constructor
D) Constructor
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
B) Platform independent
D) Oak programming language
A) Java is object ...... interpreted
B) compile a java program
A) Dynamic content
B) 2.3
B) java.awt.AWTEvent
B) 1,2 & 3
D) 3
A) JDBC calls, network protocol
151.
152.
153.
154.
155.
156.
157.
158.
159.
160.
1.
2.
3.
4.
5.
C) java.lang.Object
B) Debug a java program
C) Program won't run
C) executeUpdate()
D) init method
Answers:
6. C) an assignment
7. D) all methods ... interface
8. C) Java Web Server
9. A) i-false, ii-false
10. D) Parameterized
Answers:
1. A) pre increment
2. B) left to right
3. A) switch, if
4. C) switch
5. C) throws.java.io.IOException
6. A) Break
7. D) system
8. C) Java doc
9. B) Compiler
10.C) hardware
Answers:
1. D) parameterized
2. C) java.sql.*
3. A) .DAT
4. C) Database
5. A) 1
6. B) i-false, ii-true
7. C) i-true, ii-false
8. C) class, RemoteInterface
9. A) Serialization, persistence
10.B) public void myMethod(int a, int b);
Answers:
1. B) inputstream, outputstream
2. C) Test class should be declared as abstract
3. D) classes and interfaces
4. D) All of them
5. A) 0
6. B) 1
7. B) A Boolean expression
8. D) both B and C
9. C) exit();
10.D) an interface that defines methods to read primitive data types.
Answers:
1. C) this
2. C) initial
3. C) i-false, ii-true, iii-false, iv-false
4. B) abstract data type
5. B) False
6. A) Not necessary
7. A) i-true, ii-true, iii-false, iv-true
8. C) True
9. A) Serialization, persistence
10.C) i-false, ii-true, iii-false, iv-false