Test Preparation Computer Knowledge
Test Preparation Computer Knowledge
Knowledge
You can prepare here with our Daily Update Test Preparation for Geography
of Pakistan. Let us start British History Test Preparation;
1. VDU stands for Visual Display Unit.
2. One kilobyte is approximately 1000 bytes.
3. DOS stands for Disk Operating System.
4. WORD STAR is a popular Word processing program.
5. WORD STAR was developed by Micro pro Company.
6. PC stands for Personal Computer.
7. ALU stands for Arithmetic Logic Unit.
8. The VDU and Keyboard together form a TERMINAL.
9. The speed of the dot matrix printers is measured by CPS which stands
for characters per second.
10. The speed of the line printers is measured by LPM which stands for
Lines per second.
11. DBMS stands for Database Management System.
12. IBM is a famous computer company.
13. IBM stands for International Business Machines Corporation.
14. ROM stands for Read Only Memory.
15. The actual machine of the computer is commonly known as Hardware.
16. The programs run on the computer are commonly known as Software.
17. All the output which is printed on paper is called Hard Copy.
18. The number of pixels on a computer screen determines a screen’s
Resolution.
19. A processor’s speed is measured in Megahertz.
20. Software that assists the computer in performing instructions is called
as system software.
21. CAM stands for Computer Aided Manufacturing.
22. DPI stands for Dots per Inch.
23. DTP stands for Desk Top Publishing.
24. EPROM stands for Erasable and Programmable Read only Memory.
25. A magnetic storage disk made out of a thin piece of plastic is called
Floppy Disk.
26. A pictorial representation of the step by step sequence for solving a
problem is known as a Flow Chart.
27. A measure of storage capacity equal to one thousand megabytes is one
Gigabyte.
28. A variable whose value is accessible throughout the program is called
Global Variable.
29. A huge, worldwide network of computers that communicate with each
other, allowing global communications between users is known popularly
as Internet.
30. KB stands for Kilobyte.
31. LAN stands for Local Area Network.
32. A printer which uses light to transfer the image to paper is the Laser
Printer.
33. Memory which retains all its contents even after the power is turned off
is known as Non-Volatile Memory.
34. The result that is generated by the computer after processing the
information provided to it is known as Output.
35. Electronic mail is more popularly known as E-Mail.
36. PILOT stands for Programmed Inquiry Learning or Teaching.
37. PILOT was developed by Doug Engelbart.
38. IQL stands for Interactive Query Language.
39. LOGO was developed by Dr. Seymour Papert.
40. CAL stands for Computer Assisted Learning.
41. APT stands for Automatically Programmed Tooling.
42. `C’ language was invented by Dennis M. Ritchie.
43. Modula-2 was developed by Niklaus Wirth.
44. Terminals that have their own memory are called Smart terminals.
45. The memory that needs electric power to sustain its contents is known
as Volatile Memory.
46. MOS stands for Metallic Oxide Semi conductors.
47. Dvorak key board was designed by August Dvorak.
48. A simple device which functions as a simpler alternative to the keyboard
is the Mouse.
49. Automatic drawing input device is called Scanner.
50. In the second generation computers, magnetic cores were used as Main
Memory Devices.
51. LCD stands for Liquid Crystal Display.
52. RADAR stands for Radio Detection and Ranging.
53. RADAR works on the principle of Echo.
54. Software-in-Hardware modules are called Firmware.
55. A device by which any microcomputer can use ordinary television set for
producing output is called RF modulator.
56. EDSAC stands for Electronic Delayed Storage Automatic Computer.
57. EDVAC stands for Electronic Discrete Variable Automatic Computer.
58. EDSAC was developed in the year 1949.
59. EDVAC was developed in the year 1952.
60. ENIAC stands for Electronic Numerical Integrator and Calculator.
61. The most successful computing device in the ancient time was Abacus.
62. Use of some mechanism for the operation of a machine is known as
Automation.
63. Radar contact with the moon was first made in 1945.
64. Radar contact with Venus was first made in1961.
65. A system in which information is displayed on a television screen is
known as Video Text System.
66. A modern means of communication in which the information is stored
in a computer at a TV station is known as Teletext.
67. Global communication became possible by using Satellites.
68. Morse code was invented by Samuel Morse.
69. The code used in a teleprinter is the Baudot Code.
70. Teleprinter exchange is popularly known as Telex.
71. A device which converts sound waves into electrical waves is called
Microphone.
72. AVC stands for Automatic Volume Control.
73. The device used to measure wavelengths of radio waves is Wavemeter.
74. A hollow metallic tube used in place of wire in electric circuits carrying
high frequency currents is called Waveguide.
75. An instrument used to measure the intensity of radiations is the
Radiometer.
76. An instrument used to measure electrical voltage is the Voltmeter.
77. VTVM stands for Vacuum Tube Volt Meter.
78. A circuit which maintains a constant voltage is called Voltage Stabilizer.
79. SCR stands for Silicon Controlled Rectifier.
80. A device used to increase or decrease electric voltage is called a
Transformer.
81. A magnetic tape that records both audio and video signals is called a
Video Tape.
82. The first electronic calculator was manufactured in 1963 by Bell Punch
Company.
83. USAMASER stands for Microwave Amplification by stimulated
Emission of Radiation.
84. A computer which can handle a large volume of numbers is called a
Number cruncher.
85. POST stands for Power on Self Test.
86. POST is a test carried out just after the computer has been switched on.
87. An index of the files stored on a disk is called Directory.
88. CP/M stands for Control program for Microcomputers.
89. CP/M was developed by digital Research Inc.
90. USAMVS stands for Multiple Virtual Storage Operating System.
91. MVS is used in Mainframe computers.
92. The process of starting a computer is called Booting.
93. A group of four binary digits is called a NIBBLE.
94. BPI stands for Bit per Inch.
95. A smart card is a multi-functional microprocessor.
96. LIPS stands for Logical Inferences Per Second.
97. A computerized machine is normally called a Robot.
98. A robot is a machine directed by a Computer.
99. A robot which resembles a human being is called an Android.
100. PL/1 stands for Program Language-1.
101. The language PL/1 has combined features of COBOL and
FORTRAN.
102. BASIC stands for Beginner’s All-purpose Symbolic Instruction
Code.
103. COBOL stands for Common Business Oriented Language.
104. ALGOL stands for Algorithmic Language.
105. ALGOL was developed in the early 1960s in Europe.
106. COBOL was first introduced in the year 1961.
107. FORTRAN stands for Formula Translation.
108. FORTRAN was developed and introduced by IBM in the year1957.
109. PL/1 was introduced in the 1960s by IBM.
110. COMAL stands for Common Algorithmic Language.
111. BASIC was developed by John Kemeny and Thomas Kurtz.
112. SNOBOL stands for String Oriented Symbolic Language.
113. SNOBOL was developed in 1962.
114. LISP stands for List Processing Language.
115. LISP was developed by John McCarthy.
116. Loud speaker was invented by Rice Kellogg.
117. PROM stands for Programmable Read Only Memory.
118. Two types of RAM chips are dynamic and static.
119. Data is fed into the computer by first converting it into Binary
codes.
120. Half byte = 1 nibble = 4 bits
121. Bit means Binary Digit.
122. 1 byte = 8 bits
123. 1 mega byte = 1048576 bytes
124. 1 kilo byte = 1024 bytes
125. A combination of 16 bits is called word.
126. A terabyte = 1 trillion bytes
127. Our PC belongs to 4th generation.
128. Fred Cohen coined the word computer virus.
129. First computer virus was created in 1970 at Bell laboratories.
130. WORM means Write Once Read Many.
131. Power of a super computer is measured in FLOPS (Floating Point
Operations per Second).
132. WWW/http: (hypertext transfer protocol) was created by Tim
Burner Lee in 1992.
133. Intel means Integrated Electronics.
134. 1 worksheet contains 256 columns.
135. In G. W. Basic, G.W stands for Gate Way.
136. Super Computer was created by J. H. Van Tassel.
137. CORBA is Common Object Request Broker Architecture.
138. URL is Uniform or Universal Resource Locator.
139. Intel invented RAM chip.
140. Information stored on disk as series of bumps on its shiny side.
141. DVDs hold more information than CDs. They use smaller bumps
and have two reflective layers.
142. Recordable CDs do not have bumps. There are patches of color on
disk to change the reflected laser light.
143. In 1951 Univac–1, the world’s first commercial computer was
designed by John Mauchly and J. Presper Eckert. They built ENIAC, the
first electronic compute.
144. In 1968 mainframe was built.
145. In 1976 first supercomputer the Cray-1 was developed.
146. In 1981, IBM produced the IBM PC.
147. In 1998 IBM made quantum computer.
148. Super computers uses parallel processing.
149. In 1974, computer games were introduced.
150. World’s first high level programming language in 1957 was IBM
FORTRAN.
151. A JPEG is a picture file format.
152. JPEG stand for Joint Photographic Experts Group.
153. During World War II, IBM built the computers the Nazis used to
manage their death/ concentration camps.
154. Registers are temporary storage areas within the CPU.
155. First apple computer was built in garage.
156. The language of small talk is object oriented.
157. Shell is an operating environment.
158. Virtual memory is also known as virtual page.
159. NOS refer to operating systems for a network.
160. In EBCDIC each character is denoted by 8 bits.
161. Diodes are used in analog computer circuits as limiter.
162. Wetware stands for any organic intelligence.
163. GIGO stands for garbage in garbage out.
164. Application of flip-flap is counters, shift register and transfer
register.
165. Bootstrap is associated with computer.
166. FORTRAN stands for formula translator.
167. A group of character that is termed as a single entity is called
word.
168. Clip art is a computer prepared art.
169. Mark sensing is another term for OMR.
170. Authorization to make multiple software copies is called site
licensing.
171. Antivirus is also known as vaccines.
172. Free software is also known as public domain software.
173. In computer DFD stands for Data Flow Diagram.
174. Cyber Space is called to Virtual world of the computer.
175. SUN stand for Stanford University Network.
176. Intel stand for Integrated Electronics.
177. BIOS stands for Basic Input Output System.
178. The common name for an integrated circuit is a Chip.
179. In WWW terms on a domain name i.e. means Ireland.
180. 65 DEC company introduced the first commercial minicomputer.
181. The first web browser publicly available was NCSA Mosaic.
182. The world’s most powerful super computer is called ASCI white.
183. World Wide Web was invented in 1993 by Tim Bareness Lee.
184. The B-programming language was developed by Ken Thompson.
185. The 1st commercially produced and sold computer in 1951 was
UNIVAC.
186. The transformation from heavy computers to PCs was made
possible using microprocessors.
187. The first microprocessor was developed in 1971 by Intel.
188. A Pentium 4 (P-4) employs roughly 40 million transistors.
189. Mark-1, Apple-1, and colossus were initial desktop computers.
190. Binary digits are briefed as bit.
191. A collection of bits is called byte.
192. The first home computer in 1977 sold in millions of units, was
Apple II.
193. ‘PARAM’ is a supercomputer.
194. Father of the Computer is called Charles Babbage.
195. The worst case time complexity of AVL tree is better in
comparison to binary search tree for Search and Insert Operations
196. The GSM network is divided into the following three major
systems: BSS, BSC, MSC
197. If the disk head is located initially at 32, find the number of disk
moves required with FCFS if the disks queue of I/O blocks requests are
98, 37, 14, 124, 65, 67. 310
198. Component level design is concerned with Flow oriented analysis
199. The Mobile Application Protocol (MAP) typically runs on top of
which protocol? HTTP (Hyper Text Transfer Protocol)
200. If a packet arrives with an M-bit value is ‘l’ and a fragmentation
offset value ‘0’, and then it is ______ fragment. (A) First (B) Middle (C)
Last (D) All of the above
201. The number of bit strings of length eight that will either start with
a 1 bit or end with two bits 00 shall be 160.
202. In compiler design ‘reducing the strength’ refers to Reducing
efficiency of program.
203. In which addressing mode, the effective address of the operand is
generated by adding a constant value to the contents of
register? Indirect
204. Which of the following is true? A relation in 3NF is always in
BCNF.
205. Given memory partitions of 100 K, 500 K, 200 K, 300 K and 600
K (in order) and processes of 212 K, 417 K, 112 K, and 426 K (in order),
using the first-fit algorithm, in which partition would the process
requiring 426 K be placed? 200 K
206. What is the size of the Unicode character in Windows Operating
System? 8-Bits
207. In which tree, for every node the height of its left sub tree and
right sub tree differ almost by one? AVL tree
208. The design issue of Data link Layer in OSI Reference Model
is Representation of bits
209. Given the following expressions of a grammar E -> E * F / F + E /
F and F -> F – F / id, which of the following is true? + has higher
precedence than *
210. The maturity levels used to measure a process are Initial,
Repeatable, Defined, Managed, Optimized.
211. The problem of indefinite blockage of low-priority jobs in general
priority scheduling algorithm can be solved using: Compaction
212. Which API is used to draw a circle? Ellipse ( )
213. In DML, RECONNCT command cannot be used with (A)
OPTIONAL Set (B) FIXED Set (C) MANDATOR Set (D) All of the above
214. RAD stands for Rapid Application Development (Solved MCQs of
Computer Science)
215. Suppose that someone starts with a chain letter. Each person who
receives the letter is asked to send it on to 4 other people. Some people
do this, while some do not send any letter. How many people have seen
the letter, including the first person, if no one receives more than one
letter and if the chain letter ends after there have been 100 people who
read it but did not send it out? Also find how many people sent out the
letter? 144 & 44
216. A hash function f defined as f (key) = key mod 13, with linear
probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the
location of 79? 2
217. Identify the Risk factors which are associated with Electronic
payment system. Sending Credit Card details over internet.
218. Which of the following are two special functions that are meant
for handling exception that occurs during exception handling itself? Non
void terminate ( ) and non-void unexpected ( )
219. Which of the following memory allocation scheme suffers from
external fragmentation? Paging
220. Basis path testing falls under Black box testing
221. The User Work Area (UWA) is a set of Program variables declared
in the host program to communicate the contents of individual records
between DBMS & the Host record, Host program and Host record
222. The maximum number of keys stored in a B-tree of order m and
depth d is (md+1 – 1) / (m – 1)
223. Which of the following is the most powerful paring method? SLR
224. In UNIX, which of the following command is used to set the task
priority? PS
225. AES is a round cipher based on the Rijndal Algorithm that uses a
128-bit block of data. AES has three different configurations. ______
rounds with a key size of 128 bits, ______ rounds with a key size of 192
bits and ______ rounds with a key size of 256 bits. 20, 12, 14
226. Given an empty stack, after performing push (1), push (2), Pop,
push (3), push (4), Pop, Pop, push (5), pop, what is the value of the top
of the stack? 1
227. Enumeration is a process of Sequencing a list of operators
228. Which of the following mode declaration is used in C++ to open a
file for input? In:: ios
229. Data Encryption Techniques are particularly used for Reduce
Storage Space Requirement.
230. Let L be a set accepted by a nondeterministic finite automaton.
The number of states in non-deterministic finite automaton is |Q|. The
maximum number of states in equivalent finite automaton that accepts
L is |Q|
231. What is the result of the following expression? (1 & 2) + (3 & 4)? 1
232. Back propagation is a learning technique that adjusts weights in
the neural network by propagating weight changes. Forward from source
to hidden nodes
233. ______ is an “umbrella” activity that is applied throughout the
software engineering process. Designing
234. Identify the operation which is commutative but not
associative? EX-OR (Solved MCQs of Computer Science)
235. Given a Relation POSITION (Posting No, Skill), then query to
retrieve all distinct pairs of posting-nos. requiring skill is Select
p1.posting-No, p2.posting-No from position p1, position p2 where
p1.skill=p2.skill and p1.posting-No< p2.posting-No
236. The postfix expression AB + CD – can be evaluated using a Stack
*
237. The post order traversal of a binary tree is DEBFCA. Find out the
preorder traversal. ABDECF
238. The branch logic that provides making capabilities in the control
unit is known as Controlled transfer
239. The number of colours required to properly colour the vertices of
every planer graph is 2
240. Networks that use different technologies can be connected by
using Routers
241. Both hosts and routers are TCP/IP protocol software. However,
routers do not use protocol from all layers. The layer for which protocol
software is not needed by a router is Layer – 5 (Application)
242. In multiuser database if two users wish to update the same record
at the same time, they are prevented from doing so by Record lock
243. A binary search tree is a binary tree: (A) All items in the left
subtree are less than root (B) All items in the right subtree are greater
than or equal to the root (C) Each subtree is itself a binary search
tree (D) All of the above
244. What deletes the entire file except the file structure? ZAP
245. Which command is the fastest among the following? COPY
STRUCTURE TO <NEW FILE>
246. B tree are preferred to binary tree in Database because Disk access
+
STUDENT. Assume that all students names are of length 8 bytes, disk
block are of size 512 bytes and index pointers are of size 4 bytes. Given
this scenario what would be the best choice of the degree (i.e. the
number of pointers per node) of the B tree? 16
+
262. The Inorder traversal of the tree will yield a sorted listing of
elements of tree in Binary search tree
263. Mobile IP provides two basic functions. Agent discovery and
registration
264. Pre-emptive scheduling is the strategy of temporarily suspending
a gunning process Before the CPU time slice expires
265. In round robin CPU scheduling as time quantum is increased the
average turnaround time Varies irregularly
266. Resources are allocated to the process on non-sharable basis
is Mutual exclusion
267. Consider the following page trace: 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5.
Percentage of page fault that would occur if FIFO page replacement
algorithm is used with number of frames for the JOB m = 4 will be 10
268. Check sum used along with each packet computes the sum of the
data, where data is treated as a sequence of Character
269. If an integer needs two bytes of storage, then the maximum value
of a signed integer is 2 – 1
15
270. Which of the following logic families is well suited for high-speed
operations? ECL
271. Interrupts which are initiated by an instruction are Hardware
272. Print if (“%c”, 100); Prints ASCII equivalent of 100
273. For the transmission of the signal, Bluetooth wireless technology
uses Time division duplex
274. What is the routing algorithm used by RIP and IGRP? Dijkestra
vector (Solved MCQs of Computer Science)
275. Identify the incorrect statement: E-Commerce security threats can
be grouped into three major categories.
276. Reliability of software is directly dependent on Number of errors
present
277. ______ is not an E-Commerce application. Evaluating an
employee
278. ______ is a satellite based tracking system that enables the
determination of person’s position. Global Positioning System
279. A complete microcomputer system consists of (A) Microprocessor
(B) Memory (C) Peripheral equipment (D) All of the above
280. Where does a computer add and compare data? CPU chip
281. Pipelining strategy is called implement Instruction prefetch
282. Which of the following data structure is linear type? (A) Strings
(B) Lists (C) Queues (D) All of the above
283. To represent hierarchical relationship between elements, which
data structure is suitable? Tree
284. When data and acknowledgement are sent in the same frame, this
is called as Piggy backing
285. Encryption and Decryption is the responsibility of _______
Layer. Application
286. An analog signal carries 4 bits in each signal unit. If 1000 signal
units are sent per second, then baud rate and bit rate of the signal are
_______ and _______. 1000 bauds \ sec & 4000 bps
287. The VLF and LF bauds use _______ propagation for
communication. Ground
288. Using the RSA public key crypto system, if p = 13, q = 31 and d =
7, then the value of e is 10
289. FAN IN of a component A is defined as Number of components
that can call or pass control to component A.
290. The relationship of data elements in a module is called Cohesion
291. Software Configuration Management is the discipline for
systematically controlling (A) the changes due to the evolution of work
products as the project proceeds. (B) The changes due to defects (bugs)
being found and then fixed. (C) the changes due to requirement
changes (D) all of the above
292. Which one of the following is not a step of requirement
engineering? Requirement design
293. Testing of software with actual data and in actual environment is
called Beta testing
294. The student marks should not be greater than 100. This
is Integrity constraint (Solved MCQs of Computer Science)
295. GO BOTTOM and SKIP-3 commands are given one after another
in a database file of 30 records. It shifts the control to 28th record
296. Based on the cardinality ratio and participation ________
associated with a relationship type, choose the Foreign Key Design, the
Cross Referencing Design or Mutual Referencing Design. Constraints
297. Data Integrity control uses Passwords to prohibit unauthorised
access to files.
298. What does the following declaration mean? int (*ptr) [10]; ptr is a
pointer to an array of 10 integers.
299. Which of the following operators cannot be overloaded in C+ +? : :
300. _________ allows creating classes which are derived from other
classes, so that they automatically include some of its “parent’s”
members, plus its own members. Inheritance
301. The correct way to round off a floating number x to an integer
value is y = (int) (x + 0.5)
302. What is the value of the postfix expression? a b c d + – ∗ (where a
= 8, b = 4, c = 2 and d = 5) –24
303. If the queue is implemented with a linked list, keeping track of a
front pointer and a rear pointer, which of these pointers will change
during an insertion into a non-empty queue? Only rear pointer changes
304. _______ is often used to prove the correctness of a recursive
function. Mathematical Induction
305. For any B-tree of minimum degree t ≥ 2, every node other than
the root must have at least ________ keys and every node can have at
most ________ keys. t – 1, 2t – 1
306. Given two sorted list of size ‘m’ and ‘n’ respectively. The number
of comparison needed in the worst case by the merge sort algorithm will
be m + n – 1
307. The context free grammar for the language, L = {a b | n ≤ m + 3,
n m
313. How many edges are there in a forest of t-trees containing a total
of n vertices? n – t
314. Let f and g be the functions from the set of integers to the set
integers defined by f(x) = 2x + 3 and g(x) = 3x + 2. Then the
composition of f and g and g and f is given as 6x + 7, 6x + 11 (Solved
MCQs of Computer Science)
315. A graph is non-planar if and only if it contains a subgraph
homomorphic to K or K
3, 3 5
and G2 is ambiguous.
344. Given a grammar: S1 → Sc, S → SA | A, A → aSb | ab, there is a
rightmost derivation S1 ⇒ Sc ⇒SAC ⇒ SaSbc. Thus, SaSbc is a right
sentential form, and its handle is aSb
345. The equivalent production rules corresponding to the production
rules S → Sα |Sα | β | β is S → β | β | β A | β A, A → α A | α A | λ
1 2 1 2 1 2 1 2 1 2
357. How many edges must be removed to produce the spanning forest
of a graph with N vertices, M edges and C connected components? M–
N+C
358. Which of the following shall be a compound proposition involving
the propositions p, q and r, that is true when exactly two of the p, q and r
are true and is false otherwise? (p ∧ q ∧⎤ r) ∨ ( p ∧⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
359. The truth value of the statements: ∃!xP(x) → ∃xP(x) and ∃!
x⎤ P(x) → ⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition
“There exists a unique x such that P(x) is true”) are: True and True
360. How many different Boolean functions of degree 4 are there? 2 16
| S | λ; S → bS c| λ
1 1 1
386. The number of eight-bit strings beginning with either 111 or 101
is 64
387. Find the number of ways to paint 12 offices so that 3 of them will
be green, 2 of them pink, 2 of them yellow and the rest ones white. 1,
66,320
388. Consider the In-order and Post-order traversals of a tree as given
below: In-order: j e n k o p b f a c l g m d h i Post-order: j n o p k e f b c l
m g h i d a. The Pre-order traversal of the tree shall be a b e j k n o p f c d
glmhi
389. A simple graph G with n-vertices is connected if the graph
has More than (n – 1) (n – 2)/2 edges
390. Which one of the following set of gates is best suited for ‘parity’
checking and ‘parity’ generation? EX-OR, EX-NOR
391. The quantification ∃!x P(x) denotes the proposition “There exists a
unique x such that P(x) is true”, express the quantification using
universal and existential quantifications and logical operators: ∃x
P(x) ∧∀x∀y ((P(x) ∧ P(y)) → x = y)
392. If F and G are Boolean functions of degree n. Then, which of the
following is true? F ≤ F + G and F G ≤ F
393. In which one of the following, continuous process improvement is
done? CMM
394. The ______ of a program or computing system is the structure or
structures of the system, which comprise software components, the
externally visible properties of these components, and the relationship
among them. Software architecture (Solved MCQs of Computer Science)
395. Working software is not available until late in the process
in Waterfall model
396. Equivalence partitioning is a ______ testing method that divides
the input domain of a program into classes of data from which test cases
can be derived. Black box
397. Linked Lists are not suitable for Binary Search
398. Usage of Preemption and Transaction Rollback prevents Deadlock
situation
399. The _____ language was originally designed as the
Transformation Language for Style Sheet facility. XSTL
400. Views are useful for _____ unwanted information, and for
collecting together information from more than one relation into a
single view. Hiding
401. The decision tree classifier is a widely used technique
for Classification
402. Cross_tab displays permit users to view ______ of
multidimensional data at a time. Two dimensions
403. A method to provide secure transmission of email is called PGP
404. Thoma’s-write rule is Timestamp ordering protocol
405. The hit ratio of a Translation Look Aside Buffer (TLAB) is 80%. It
takes 20 nanoseconds (ns) to search TLAB and 100 ns to access main
memory. The effective memory access time is 140 ns
406. Which of the following set of UNIX commands will always display
“WELCOME”? Title = WELCOME; export title; sh –c “echo $title”
407. Eco system is a Frame work for Building Internet Market
408. The technique of temporarily delaying outgoing
acknowledgements so that they can be hooked onto the next outgoing
data frame is known as Piggy backing
409. ______ is process of extracting previously non known valid and
actionable information from large data to make crucial business and
strategic decisions. Data Mining
410. The aspect ratio of an image is defined as The ratio of width to its
height measured in unit length.
411. Using RSA algorithm, what is the value of cipher text C, if the
plain text M = 5 and p = 3, q = 11 & d = 7? 26
412. You are given an OR problem and a XOR problem to solve. Then,
which one of the following statements is true? Problem can be solved
using single layer perception and XOR problem can be solved using radial
basis function.
413. Let V = 2I – J + K and V = I + J – K, then the angle between V &
1 2 1
3K)
414. In classful addressing, an IP address 123.23.156.4 belongs to
______ class format. A (Solved MCQs of Computer Science)
415. The Mandelbrot set used for the construction of beautiful images
is based on the following transformation: x = x + z Here Both x & z are
n+1
2
n
complex numbers.
416. Which of the following permutations can be obtained in the
output using a stack of size 3 elements assuming that input, sequence is
1, 2, 3, 4, 5? 3, 4, 5, 2, 1
417. In a Linear Programming Problem, suppose there are 3 basic
variables and 2 non-basic variables, then the possible numbers of basic
solutions are 10
418. Which provides an interface to the TCP/IP suit protocols in
Windows95 and Windows NT? Calinsock Active-X Control
419. If dual has an unbounded solution, then its corresponding primal
has No feasible solution
420. The number of distinct bracelets of five beads made up of red,
blue, and green beads (two bracelets are indistinguishable if the rotation
of one yield another) is, 51
421. Which are the classifications of data used in Mobile
Applications? Private data, Public data, Shared data.
422. In an enhancement of a CPU design, the speed of a floating point
unit has been increased by 20% and the speed of a fixed point unit has
been increased by 10%. What is the overall speed achieved if the ratio of
the number of floating point operations to the number of fixed point
operations is 2 : 3 and the floating point operation used to take twice the
time taken by the fixed point operation in original design? 1.62
423. Lamps are to be connected to a single electric outlet by using an
extension board each of which has four outlets. The number of extension
boards needed to connect all the light is 19
424. Which of the following flags are set when ‘JMP’ instruction is
executed? No flag is set
425. A thread is a light weight process. In the above statement, weight
refers to Number of resources
426. The Z-buffer algorithm is used for Hidden surface removal of
objects. The maximum number of objects that can be handled by this
algorithm shall Be arbitrary no. of objects
427. The power set of AUB, where A = {2, 3, 5, 7} and B = {2, 5, 8, 9}
is 64
428. In Win32, which function is used to create Windows
Applications? Win Main
429. Suppose a processor does not have any stack pointer registers,
which of the following statements is true? All subroutine calls and
interrupts are possible.
430. Everything below the system call interface and above the physical
hardware is known as Kernel.
431. Which is not the correct statement? The class of regular sets is not
closed under inverse homomorphism.
432. When a programming Language has the capacity to produce new
data type, it is called as, Extensible Language
433. Which of the following operating system is better for
implementing client-server network? Windows 2000
434. Consider a system having m resources of the same type. These
resources are shared by 3 processes A, B and C which have peak
demands of 3, 4 and 6 respectively. For what value of m deadlock will
not occur? 13 (Solved MCQs of Computer Science)
435. The Default Parameter Passing Mechanism is called as Call by
Value
436. Which of the following regular expression identities are true? (r +
s)* = (r*s*)*
437. Functions defined with class name are called as Constructor
438. Let f be the fraction of a computation (in terms of time) that is
parallelizable, P the number of processors in the system, and s the
p
440. The Object Modelling Technique (OMT) uses the following three
kinds of model to describe a system Object Model, Dynamic Model, and
Functional Model.
441. The factors that determine the quality of a software system
are Correctness, reliability
442. Skolmization is the process of Removing all the existential
quantifiers.
443. Which level of Abstraction describes how data are stored in the
data base? Physical level
444. The transform which possesses the “multi-resolution” property
is Wavelet transforms
445. Which one is a collection of templates and rules? XSL
446. A program P calls two subprograms P and P . P can fail 50% times
1 2 1
of the object, if the light used is blue and magenta? Black and Red
491. If an instruction takes ‘i’ microseconds and a page fault takes an
additional ‘j’ microseconds. The effective instruction time, if on the
average a page fault occurs every k instructions, is i + j/k
492. How many relations are there on a set with n elements that are
symmetric and a set with n elements that are reflexive and
symmetric? 2 and 2
n(n+1)/2 n(n–1)/2
493. The strategy used to reduce the number of tree branches and the
number of static evaluations applied in case of a game tree is Alpha-beta
pruning strategy
494. What is the size (in terms of bits) of Header length field in IPV4
header? 4 (Solved MCQs of Computer Science)
495. ______ is sometimes said to be object oriented, because the only
way to manipulate kernel objects is by invoking methods on their
handles. Windows NT
496. A user level process in Unix traps the signal sent on a Ctrl + C
input and has a signal handling routine that saves appropriate files
before terminating the process. When a Ctrl + C input is given to this
process, what is the mode in which the signal handling routine
executes? Kernel mode
497. A CPU generally handles an interrupt by executing an interrupt
service routine By checking the interrupt register after finishing the
executing the current instruction
498. Radio signals generally propagate according to the following
mechanisms: Reflection, Diffraction, Scattering
499. If ‘a’ and ‘b’ are the end points of a line, then which one of the
following is true? If both end points are left, right, above or below the
window, the line is trivially invisible
500. If the period of a signal is 1000 ms, then what is its frequency in
kilohertz? 10 KHz
–3
501. HTML is defined using SGML – an _______ standard,
information processing-text and office systems (SGML) for text
information processing. ISO – 8879
502. What is the meaning of ‘Hibernate’ in Windows XP/Windows
7? Shutdown the computer without closing the running applications.
503. Assume that we have constructor functions for both base class and
derived class. Now consider the declaration in main ( ). Base * P = New
Derived; in what sequence will the constructor be called? Base class
constructor followed by derived class constructor
504. Which one of the following options is not a shell in UNIX
system? Net Shell
505. In which file the compiler manage the various objects, which are
used in windows programming? Text File
506. On a disk with 1000 cylinders (0 to 999) find the number of
tracks, the disk arm must move to satisfy all the requests in the disk
queue. Assume the last request service was at track 345 and the head is
moving toward track 0. The queue in FIFO order contains requests for
the following tracks: 123, 874, 692, 475, 105, 376. (Assume SCAN
algorithm) 1219
507. Halftoning is defined as A technique for using minimum number of
intensity levels to obtain increased visual resolution.
508. If the primal Linear Programming problem has unbounded
solution, then it’s dual problem will have no feasible solution at all
509. Given a flow graph with 10 nodes, 13 edges and one connected
components, the number of regions and the number of predicate
(decision) nodes in the flow graph will be 5, 4
510. Function points can be calculated by UFP ∗ CAF
511. One weakness of boundary value analysis and equivalence
partitioning is they do not explore combinations of input circumstances
512. Which once of the following is not a software myth? If an
organization does not understand how to control software projects
internally, it will invariably struggle when it outsources software projects.
513. Which is the protocol for performing RPCs between applications
in a language and system independent way? Simple Object Access
Protocol (SOAP)
514. The document that is used by XSLT to indicate, how to transform
the elements of the XML document to another format is Style sheet
(Solved MCQs of Computer Science)
515. Which of the following concepts means adding new concepts to a
program as it runs? Dynamic loading
516. Which of the following correctly describes overloading of
functions? Ad-hoc polymorphism
517. The compiler converts all operands up to the type of the largest
operand is called Type Promotion
518. C++ actually supports the following two complete dynamic
systems: One defined by C and one specific to C++
519. Important advantage of using new and delete operators in C++
is Allocation of memory and frees the memory previously allocated.
520. Given the following statements: S : The grammars S → asb | bsa |
1
sss | asb | bsa | λ and S → ss | asb | bsa | λ are equivalent. Which of the
following is true? Both S and S are correct.
1 2
{0.2, 0.5, 0.6, 0.1, 0.9}, μ (x) = {0.1, 0.5, 0.2, 0.7, 0.8} Then the value of
B
527. The height h(A) of a fuzzy set A is defined as h(A) = sup A(x),
x ∈ A. Then the fuzzy set A is called normal when h(A) = 1
528. An artificial neuron receives n inputs x , x ,…., x with weights w ,
1 2 n 1
transmitted is 11001001011
532. _________ comparisons are necessary in the worst case to find
both the maximum and minimum of n numbers. floor (3n/2) – 2
533. Let A and B be two n × n matrices. The efficient algorithm to
multiply the two matrices has the time complexity O(n2.81)
534. The recurrence relation T(n)=mT(n/2) tan is satisfied by O(n )
2 1g m
n ≥ 0} is S → a SB | b, B → b
539. Given the following statements: S : Every context-sensitive
1
correct.
540. What is the bit rate for transmitting uncompressed 800 × 600
pixel colour frames with 8 bits/pixel at 40 frames/second? 153.6 Mbps
541. In IPV 4, the IP address 200.200.200.200 belongs to Class C
542. Which layer of OSI reference model is responsible for
decomposition of messages and generation of sequence numbers to
ensure correct re-composition from end to end of the
network? Transport
543. A client-server system uses a satellite network, with the satellite at
a height of 40,000 kms. What is the best-case delay in response to a
request? (Note that the speed of light in air is 3,00,000
km/second). 533.33 m sec
544. The start and stop bits are used in serial communication
for synchronization
545. _________ is a type of transmission impairment in which the
signal looses strength due to the resistance of the transmission
medium. Attenuation
546. Which of the following is a design criteria for instruction formats?
(A) The size of instructions (B) The number of bits in the address fields
(C) The sufficient space in the instruction format to express all the
operations desired. (D) All of these
547. Synchronization is achieved by a timing device called a
________ which generates a periodic train of________. master clock
generator, clock pulse
548. The essential difference between traps and interrupts is traps are
synchronous and interrupts are asynchronous with the program.
549. Consider the following schemas: Branch = (Branch-name, Assets,
Branch-city) Customer = (Customer-name, Bank name, Customer-city)
Borrow = (Branch-name, loan number, customer account-number)
Deposit = (Branch-name, Account number, Customer-name, Balance).
Using relational Algebra, the Query that finds customers who have
balance more than 10,000 is π (σ > 10000
customer-name balance
(Deposit)
589. The statements s1 and s2 are given as: s1: Context sensitive
languages are closed under intersection, concatenation, substitution and
inverse homomorphism. s2: Context free languages are closed under
complementation, substitution and homomorphism. Which of the
following is correct statement? s1 is correct and s2 is not correct.
590. Which one of the following is not an addressing mode? Relative
indexed
591. Computers can have instruction formats with Zero address, one
address, two addresses and three address instructions
592. Which is not a typical program control instruction? SHL
593. Interrupt which arises from illegal or erroneous use of an
instruction or data is Internal interrupt
594. The simplified function in product of sums of Boolean function
F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is (W’ + X’) (Y’ + Z’) (X’ + Z)
(Solved MCQs of Computer Science)
595. When an array is passed as a parameter to a function which of the
following statements is correct? The function can change values in the
original array
596. Suppose you want to delete the name that occurs before “Vivek” in
an alphabetical listing. Which of the following data structures shall be
most efficient for this operation? Doubly linked list
597. Binary symmetric channel uses Half duplex protocol
598. Hamming distance between 100101000110 and 110111101101 is 6
599. Given code word 1110001010 is to be transmitted with even parity
check bit. The encoded word to be transmitted for this code
is 11100010101
600. The number of distinct binary images which can be generated
from a given binary image of right M × N are 2 MN
A(x )] for all x , x ∈ R and all λ ∈ [0, 1], where min denotes the minimum
2 1 2
operator. Convex
616. Which of the following is a correct predicate logic statement for
“Every Natural number has one successor”? ∀x∃y (succ(x, y) ∧ (∃z succ(x,
z) ⇒ equal (y, z)))
617. α – β cutoffs are applied to Minimax search
618. Which of the following is not a part of an expert system
shell? Knowledge Base
619. The Blocks World Problem in Artificial Intelligence is normally
discussed to explain a Planning system
620. Means-Ends Analysis process centres on the detection of
difference between the current state and the goal state. Once such a
difference is found, and then to reduce the difference one applies An
operator that can reduce the difference
621. Suppose a file of 10,000 characters is to be sent over a line at
2400 bps. Assume that the data is sent in frames. Each frame consists of
1000 characters and an overhead of 48 bits per frame. Using
synchronous transmission, the total overhead time is 0.2 second
622. Which of the following is the size of Network bits and Host bits of
Class Aof IP address? Network bits 7, Host bits 24
623. Which of the following field of the TCP header tells how many
bytes may be sent starting at the byte acknowledged? Window size
624. Which of the following is a bit rate of an 8-PSK signal having 2500
Hz bandwidth? 7500 bps
625. Given the IP address 201.14.78.65 and the subnet mask
255.255.255.224. What is the subnet address? 201.14.78.64
626. If an artificial variable is present in the ‘basic variable’ of optimal
simplex table then the solution is Infeasible solution
627. An optimal assignment requires that the minimum number of
horizontal and vertical lines that can be drawn to cover all zeros be equal
to the number of Rows or columns
628. Assume, L is regular language. Let statements S and S are defined 1 2
as: S : SQRT (L) = {x| for some y with |y| = |x| , xy∈L}. S : LOG (L) = {x|
1
2
2
linear
631. Assume statements S and S defined as: S : L -L is recursive
1 2 1 2 1
641. The instruction: MOV CL, [BX] [DI] + 8 represent the _____
addressing mode. Based Indexed
642. The power dissipation of a flip-flop is 3mW. The power
dissipation of a digital system with 4 flip-flops is given by 12 mW
643. A binary ripple counter is required to count up to 16383. How
many flip-flops are required? 14
644. The time complexity of recurrence relation T(n) = T(n/3) +
T(2n/3) + O(n) is O(n Ig n)
645. How many people must there be in a room before there is a 50%
chance that two of them were born on the same day of the year? At least
23
646. The number of possible parenthesizations of a sequence of n
matrices is Ω(2 ) n
≤1
662. The programming languages C and C++ are not strongly typed
languages because: Both C and C++ allow functions for which parameters
are not type checked and also the union types in these languages are not
type checked.
663. The tracing model in Prolog describes program execution in terms
of certain events. These events are Call, exit, redo and fail
664. Which of the following statements is not correct with reference to
distributed systems? In a distributed system, if a user wants to run the
program on other nodes or share the resources on remote sites due to their
beneficial aspects, user has to log on to that site.
665. Which of the following shell scripts will produce the output “my
first script”? For i in my first script; do echo –i $i; done
666. The portion of Windows 2000 operating system which is not
portable is Virtual memory management
667. Which of the following statements is not true for UNIX Operating
System? UNIX
668.