0% found this document useful (0 votes)
156 views

Test Preparation Computer Knowledge

The document provides definitions for 153 computer-related terms, including abbreviations and acronyms like VDU, DOS, WORDSTAR, ALU, ROM, RAM, KB, LAN, LCD, RADAR, and more. It also covers computer history topics like the development of early computers like EDSAC, EDVAC, ENIAC; generations of computers; and the introduction of programming languages, games, and formats like FORTRAN, JPEGs. The document serves as a reference for basic computer terminology and milestones.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views

Test Preparation Computer Knowledge

The document provides definitions for 153 computer-related terms, including abbreviations and acronyms like VDU, DOS, WORDSTAR, ALU, ROM, RAM, KB, LAN, LCD, RADAR, and more. It also covers computer history topics like the development of early computers like EDSAC, EDVAC, ENIAC; generations of computers; and the introduction of programming languages, games, and formats like FORTRAN, JPEGs. The document serves as a reference for basic computer terminology and milestones.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Test Preparation Computer

Knowledge
You can prepare here with our Daily Update Test Preparation for Geography
of Pakistan. Let us start British History Test Preparation;
1. VDU stands for Visual Display Unit.
2. One kilobyte is approximately 1000 bytes.
3. DOS stands for Disk Operating System.
4. WORD STAR is a popular Word processing program.
5. WORD STAR was developed by Micro pro Company.
6. PC stands for Personal Computer.
7. ALU stands for Arithmetic Logic Unit.
8. The VDU and Keyboard together form a TERMINAL.
9. The speed of the dot matrix printers is measured by CPS which stands
for characters per second.
10. The speed of the line printers is measured by LPM which stands for
Lines per second.
11. DBMS stands for Database Management System.
12. IBM is a famous computer company.
13. IBM stands for International Business Machines Corporation.
14. ROM stands for Read Only Memory.
15. The actual machine of the computer is commonly known as Hardware.
16. The programs run on the computer are commonly known as Software.
17. All the output which is printed on paper is called Hard Copy.
18. The number of pixels on a computer screen determines a screen’s
Resolution.
19. A processor’s speed is measured in Megahertz.
20. Software that assists the computer in performing instructions is called
as system software.
21. CAM stands for Computer Aided Manufacturing.
22. DPI stands for Dots per Inch.
23. DTP stands for Desk Top Publishing.
24. EPROM stands for Erasable and Programmable Read only Memory.
25. A magnetic storage disk made out of a thin piece of plastic is called
Floppy Disk.
26. A pictorial representation of the step by step sequence for solving a
problem is known as a Flow Chart.
27. A measure of storage capacity equal to one thousand megabytes is one
Gigabyte.
28. A variable whose value is accessible throughout the program is called
Global Variable.
29. A huge, worldwide network of computers that communicate with each
other, allowing global communications between users is known popularly
as Internet.
30. KB stands for Kilobyte.
31. LAN stands for Local Area Network.
32. A printer which uses light to transfer the image to paper is the Laser
Printer.
33. Memory which retains all its contents even after the power is turned off
is known as Non-Volatile Memory.
34. The result that is generated by the computer after processing the
information provided to it is known as Output.
35. Electronic mail is more popularly known as E-Mail.
36. PILOT stands for Programmed Inquiry Learning or Teaching.
37. PILOT was developed by Doug Engelbart.
38. IQL stands for Interactive Query Language.
39. LOGO was developed by Dr. Seymour Papert.
40. CAL stands for Computer Assisted Learning.
41. APT stands for Automatically Programmed Tooling.
42. `C’ language was invented by Dennis M. Ritchie.
43. Modula-2 was developed by Niklaus Wirth.
44. Terminals that have their own memory are called Smart terminals.
45. The memory that needs electric power to sustain its contents is known
as Volatile Memory.
46. MOS stands for Metallic Oxide Semi conductors.
47. Dvorak key board was designed by August Dvorak.
48. A simple device which functions as a simpler alternative to the keyboard
is the Mouse.
49. Automatic drawing input device is called Scanner.
50. In the second generation computers, magnetic cores were used as Main
Memory Devices.
51. LCD stands for Liquid Crystal Display.
52. RADAR stands for Radio Detection and Ranging.
53. RADAR works on the principle of Echo.
54. Software-in-Hardware modules are called Firmware.
55. A device by which any microcomputer can use ordinary television set for
producing output is called RF modulator.
56. EDSAC stands for Electronic Delayed Storage Automatic Computer.
57. EDVAC stands for Electronic Discrete Variable Automatic Computer.
58. EDSAC was developed in the year 1949.
59. EDVAC was developed in the year 1952.
60. ENIAC stands for Electronic Numerical Integrator and Calculator.
61. The most successful computing device in the ancient time was Abacus.
62. Use of some mechanism for the operation of a machine is known as
Automation.
63. Radar contact with the moon was first made in 1945.
64. Radar contact with Venus was first made in1961.
65. A system in which information is displayed on a television screen is
known as Video Text System.
66. A modern means of communication in which the information is stored
in a computer at a TV station is known as Teletext.
67. Global communication became possible by using Satellites.
68. Morse code was invented by Samuel Morse.
69. The code used in a teleprinter is the Baudot Code.
70. Teleprinter exchange is popularly known as Telex.
71. A device which converts sound waves into electrical waves is called
Microphone.
72. AVC stands for Automatic Volume Control.
73. The device used to measure wavelengths of radio waves is Wavemeter.
74. A hollow metallic tube used in place of wire in electric circuits carrying
high frequency currents is called Waveguide.
75. An instrument used to measure the intensity of radiations is the
Radiometer.
76. An instrument used to measure electrical voltage is the Voltmeter.
77. VTVM stands for Vacuum Tube Volt Meter.
78. A circuit which maintains a constant voltage is called Voltage Stabilizer.
79. SCR stands for Silicon Controlled Rectifier.
80. A device used to increase or decrease electric voltage is called a
Transformer.
81. A magnetic tape that records both audio and video signals is called a
Video Tape.
82. The first electronic calculator was manufactured in 1963 by Bell Punch
Company.
83. USAMASER stands for Microwave Amplification by stimulated
Emission of Radiation.
84. A computer which can handle a large volume of numbers is called a
Number cruncher.
85. POST stands for Power on Self Test.
86. POST is a test carried out just after the computer has been switched on.
87. An index of the files stored on a disk is called Directory.
88. CP/M stands for Control program for Microcomputers.
89. CP/M was developed by digital Research Inc.
90. USAMVS stands for Multiple Virtual Storage Operating System.
91. MVS is used in Mainframe computers.
92. The process of starting a computer is called Booting.
93. A group of four binary digits is called a NIBBLE.
94. BPI stands for Bit per Inch.
95. A smart card is a multi-functional microprocessor.
96. LIPS stands for Logical Inferences Per Second.
97. A computerized machine is normally called a Robot.
98. A robot is a machine directed by a Computer.
99. A robot which resembles a human being is called an Android.
100. PL/1 stands for Program Language-1.
101. The language PL/1 has combined features of COBOL and
FORTRAN.
102. BASIC stands for Beginner’s All-purpose Symbolic Instruction
Code.
103. COBOL stands for Common Business Oriented Language.
104. ALGOL stands for Algorithmic Language.
105. ALGOL was developed in the early 1960s in Europe.
106. COBOL was first introduced in the year 1961.
107. FORTRAN stands for Formula Translation.
108. FORTRAN was developed and introduced by IBM in the year1957.
109. PL/1 was introduced in the 1960s by IBM.
110. COMAL stands for Common Algorithmic Language.
111. BASIC was developed by John Kemeny and Thomas Kurtz.
112. SNOBOL stands for String Oriented Symbolic Language.
113. SNOBOL was developed in 1962.
114. LISP stands for List Processing Language.
115. LISP was developed by John McCarthy.
116. Loud speaker was invented by Rice Kellogg.
117. PROM stands for Programmable Read Only Memory.
118. Two types of RAM chips are dynamic and static.
119. Data is fed into the computer by first converting it into Binary
codes.
120. Half byte = 1 nibble = 4 bits
121. Bit means Binary Digit.
122. 1 byte = 8 bits
123. 1 mega byte = 1048576 bytes
124. 1 kilo byte = 1024 bytes
125. A combination of 16 bits is called word.
126. A terabyte = 1 trillion bytes
127. Our PC belongs to 4th generation.
128. Fred Cohen coined the word computer virus.
129. First computer virus was created in 1970 at Bell laboratories.
130. WORM means Write Once Read Many.
131. Power of a super computer is measured in FLOPS (Floating Point
Operations per Second).
132. WWW/http: (hypertext transfer protocol) was created by Tim
Burner Lee in 1992.
133. Intel means Integrated Electronics.
134. 1 worksheet contains 256 columns.
135. In G. W. Basic, G.W stands for Gate Way.
136. Super Computer was created by J. H. Van Tassel.
137. CORBA is Common Object Request Broker Architecture.
138. URL is Uniform or Universal Resource Locator.
139. Intel invented RAM chip.
140. Information stored on disk as series of bumps on its shiny side.
141. DVDs hold more information than CDs. They use smaller bumps
and have two reflective layers.
142. Recordable CDs do not have bumps. There are patches of color on
disk to change the reflected laser light.
143. In 1951 Univac–1, the world’s first commercial computer was
designed by John Mauchly and J. Presper Eckert. They built ENIAC, the
first electronic compute.
144. In 1968 mainframe was built.
145. In 1976 first supercomputer the Cray-1 was developed.
146. In 1981, IBM produced the IBM PC.
147. In 1998 IBM made quantum computer.
148. Super computers uses parallel processing.
149. In 1974, computer games were introduced.
150. World’s first high level programming language in 1957 was IBM
FORTRAN.
151. A JPEG is a picture file format.
152. JPEG stand for Joint Photographic Experts Group.
153. During World War II, IBM built the computers the Nazis used to
manage their death/ concentration camps.
154. Registers are temporary storage areas within the CPU.
155. First apple computer was built in garage.
156. The language of small talk is object oriented.
157. Shell is an operating environment.
158. Virtual memory is also known as virtual page.
159. NOS refer to operating systems for a network.
160. In EBCDIC each character is denoted by 8 bits.
161. Diodes are used in analog computer circuits as limiter.
162. Wetware stands for any organic intelligence.
163. GIGO stands for garbage in garbage out.
164. Application of flip-flap is counters, shift register and transfer
register.
165. Bootstrap is associated with computer.
166. FORTRAN stands for formula translator.
167. A group of character that is termed as a single entity is called
word.
168. Clip art is a computer prepared art.
169. Mark sensing is another term for OMR.
170. Authorization to make multiple software copies is called site
licensing.
171. Antivirus is also known as vaccines.
172. Free software is also known as public domain software.
173. In computer DFD stands for Data Flow Diagram.
174. Cyber Space is called to Virtual world of the computer.
175. SUN stand for Stanford University Network.
176. Intel stand for Integrated Electronics.
177. BIOS stands for Basic Input Output System.
178. The common name for an integrated circuit is a Chip.
179. In WWW terms on a domain name i.e. means Ireland.
180. 65 DEC company introduced the first commercial minicomputer.
181. The first web browser publicly available was NCSA Mosaic.
182. The world’s most powerful super computer is called ASCI white.
183. World Wide Web was invented in 1993 by Tim Bareness Lee.
184. The B-programming language was developed by Ken Thompson.
185. The 1st commercially produced and sold computer in 1951 was
UNIVAC.
186. The transformation from heavy computers to PCs was made
possible using microprocessors.
187. The first microprocessor was developed in 1971 by Intel.
188. A Pentium 4 (P-4) employs roughly 40 million transistors.
189. Mark-1, Apple-1, and colossus were initial desktop computers.
190. Binary digits are briefed as bit.
191. A collection of bits is called byte.
192. The first home computer in 1977 sold in millions of units, was
Apple II.
193. ‘PARAM’ is a supercomputer.
194. Father of the Computer is called Charles Babbage.
195. The worst case time complexity of AVL tree is better in
comparison to binary search tree for Search and Insert Operations
196. The GSM network is divided into the following three major
systems: BSS, BSC, MSC
197. If the disk head is located initially at 32, find the number of disk
moves required with FCFS if the disks queue of I/O blocks requests are
98, 37, 14, 124, 65, 67. 310
198. Component level design is concerned with Flow oriented analysis
199. The Mobile Application Protocol (MAP) typically runs on top of
which protocol? HTTP (Hyper Text Transfer Protocol)
200. If a packet arrives with an M-bit value is ‘l’ and a fragmentation
offset value ‘0’, and then it is ______ fragment. (A) First (B) Middle (C)
Last (D) All of the above
201. The number of bit strings of length eight that will either start with
a 1 bit or end with two bits 00 shall be 160.
202. In compiler design ‘reducing the strength’ refers to Reducing
efficiency of program.
203. In which addressing mode, the effective address of the operand is
generated by adding a constant value to the contents of
register? Indirect
204. Which of the following is true? A relation in 3NF is always in
BCNF.
205. Given memory partitions of 100 K, 500 K, 200 K, 300 K and 600
K (in order) and processes of 212 K, 417 K, 112 K, and 426 K (in order),
using the first-fit algorithm, in which partition would the process
requiring 426 K be placed? 200 K
206. What is the size of the Unicode character in Windows Operating
System? 8-Bits
207. In which tree, for every node the height of its left sub tree and
right sub tree differ almost by one? AVL tree
208. The design issue of Data link Layer in OSI Reference Model
is Representation of bits
209. Given the following expressions of a grammar E -> E * F / F + E /
F and F -> F – F / id, which of the following is true? + has higher
precedence than *
210. The maturity levels used to measure a process are Initial,
Repeatable, Defined, Managed, Optimized.
211. The problem of indefinite blockage of low-priority jobs in general
priority scheduling algorithm can be solved using: Compaction
212. Which API is used to draw a circle? Ellipse ( )
213. In DML, RECONNCT command cannot be used with (A)
OPTIONAL Set (B) FIXED Set (C) MANDATOR Set (D) All of the above
214. RAD stands for Rapid Application Development (Solved MCQs of
Computer Science)
215. Suppose that someone starts with a chain letter. Each person who
receives the letter is asked to send it on to 4 other people. Some people
do this, while some do not send any letter. How many people have seen
the letter, including the first person, if no one receives more than one
letter and if the chain letter ends after there have been 100 people who
read it but did not send it out? Also find how many people sent out the
letter? 144 & 44
216. A hash function f defined as f (key) = key mod 13, with linear
probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the
location of 79? 2
217. Identify the Risk factors which are associated with Electronic
payment system. Sending Credit Card details over internet.
218. Which of the following are two special functions that are meant
for handling exception that occurs during exception handling itself? Non
void terminate ( ) and non-void unexpected ( )
219. Which of the following memory allocation scheme suffers from
external fragmentation? Paging
220. Basis path testing falls under Black box testing
221. The User Work Area (UWA) is a set of Program variables declared
in the host program to communicate the contents of individual records
between DBMS & the Host record, Host program and Host record
222. The maximum number of keys stored in a B-tree of order m and
depth d is (md+1 – 1) / (m – 1)
223. Which of the following is the most powerful paring method? SLR
224. In UNIX, which of the following command is used to set the task
priority? PS
225. AES is a round cipher based on the Rijndal Algorithm that uses a
128-bit block of data. AES has three different configurations. ______
rounds with a key size of 128 bits, ______ rounds with a key size of 192
bits and ______ rounds with a key size of 256 bits. 20, 12, 14
226. Given an empty stack, after performing push (1), push (2), Pop,
push (3), push (4), Pop, Pop, push (5), pop, what is the value of the top
of the stack? 1
227. Enumeration is a process of Sequencing a list of operators
228. Which of the following mode declaration is used in C++ to open a
file for input? In:: ios
229. Data Encryption Techniques are particularly used for Reduce
Storage Space Requirement.
230. Let L be a set accepted by a nondeterministic finite automaton.
The number of states in non-deterministic finite automaton is |Q|. The
maximum number of states in equivalent finite automaton that accepts
L is |Q|
231. What is the result of the following expression? (1 & 2) + (3 & 4)? 1
232. Back propagation is a learning technique that adjusts weights in
the neural network by propagating weight changes. Forward from source
to hidden nodes
233. ______ is an “umbrella” activity that is applied throughout the
software engineering process. Designing
234. Identify the operation which is commutative but not
associative? EX-OR (Solved MCQs of Computer Science)
235. Given a Relation POSITION (Posting No, Skill), then query to
retrieve all distinct pairs of posting-nos. requiring skill is Select
p1.posting-No, p2.posting-No from position p1, position p2 where
p1.skill=p2.skill and p1.posting-No< p2.posting-No
236. The postfix expression AB + CD – can be evaluated using a Stack
 * 

237. The post order traversal of a binary tree is DEBFCA. Find out the
preorder traversal. ABDECF
238. The branch logic that provides making capabilities in the control
unit is known as Controlled transfer
239. The number of colours required to properly colour the vertices of
every planer graph is 2
240. Networks that use different technologies can be connected by
using Routers
241. Both hosts and routers are TCP/IP protocol software. However,
routers do not use protocol from all layers. The layer for which protocol
software is not needed by a router is Layer – 5 (Application)
242. In multiuser database if two users wish to update the same record
at the same time, they are prevented from doing so by Record lock
243. A binary search tree is a binary tree: (A) All items in the left
subtree are less than root (B) All items in the right subtree are greater
than or equal to the root (C) Each subtree is itself a binary search
tree (D) All of the above
244. What deletes the entire file except the file structure? ZAP
245. Which command is the fastest among the following? COPY
STRUCTURE TO <NEW FILE>
246. B  tree are preferred to binary tree in Database because Disk access
+

is much slower than memory access


247. A Transaction Manager is which of the following? (A) Maintains a
log of transactions (B) Maintains before and after database images (C)
Maintains appropriate concurrency control (D) All of the above
248. Leaves of which of the following trees are at the same level? B-tree
249. Which of the following TCP/IP Internet protocol is diskless
machine uses to obtain its IP address from a server? ARP
250. Decryption and encryption of data are the responsibility of which
of the following layer? Presentation layer
251. In which circuit switching, delivery of data is delayed because data
must be stored and retrieved from RAM? Time division
252. In which Routing Method do all the routers have a common
database? Link state
253. Page Shift Keying (PSK) Method is used to modulate digital signal
at 9600 bps using 16 levels. Find the line signals and speed (i.e.
modulation rate). 2400 bauds
254. The station to hub distance in which it is 2000 meters. 100 Base-
F (Solved MCQs of Computer Science)

255. Main aim of software engineering is to produce Software within


budget in the given schedule
256. Key process areas of CMM level 4 are also classified by a process
which is CMM level 5
257. Validation means Are we building the right product
258. If a process is under statistical control, then it is Predictable
259. In a function oriented design, we Maximize cohesion and minimize
coupling
260. Which of the following metric does not depend on the
programming language used? Function count
261. A / B  tree index is to be built on the name attribute of the relation
+

STUDENT. Assume that all students names are of length 8 bytes, disk
block are of size 512 bytes and index pointers are of size 4 bytes. Given
this scenario what would be the best choice of the degree (i.e. the
number of pointers per node) of the B  tree? 16
+

262. The Inorder traversal of the tree will yield a sorted listing of
elements of tree in Binary search tree
263. Mobile IP provides two basic functions. Agent discovery and
registration
264. Pre-emptive scheduling is the strategy of temporarily suspending
a gunning process Before the CPU time slice expires
265. In round robin CPU scheduling as time quantum is increased the
average turnaround time Varies irregularly
266. Resources are allocated to the process on non-sharable basis
is Mutual exclusion
267. Consider the following page trace: 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5.
Percentage of page fault that would occur if FIFO page replacement
algorithm is used with number of frames for the JOB m = 4 will be 10
268. Check sum used along with each packet computes the sum of the
data, where data is treated as a sequence of Character
269. If an integer needs two bytes of storage, then the maximum value
of a signed integer is 2  – 1
15

270. Which of the following logic families is well suited for high-speed
operations? ECL
271. Interrupts which are initiated by an instruction are Hardware
272. Print if (“%c”, 100); Prints ASCII equivalent of 100
273. For the transmission of the signal, Bluetooth wireless technology
uses Time division duplex
274. What is the routing algorithm used by RIP and IGRP? Dijkestra
vector (Solved MCQs of Computer Science)
275. Identify the incorrect statement: E-Commerce security threats can
be grouped into three major categories.
276. Reliability of software is directly dependent on Number of errors
present
277. ______ is not an E-Commerce application. Evaluating an
employee
278. ______ is a satellite based tracking system that enables the
determination of person’s position. Global Positioning System
279. A complete microcomputer system consists of (A) Microprocessor
(B) Memory (C) Peripheral equipment (D) All of the above
280. Where does a computer add and compare data? CPU chip
281. Pipelining strategy is called implement Instruction prefetch
282. Which of the following data structure is linear type? (A) Strings
(B) Lists (C) Queues (D) All of the above
283. To represent hierarchical relationship between elements, which
data structure is suitable? Tree
284. When data and acknowledgement are sent in the same frame, this
is called as Piggy backing
285. Encryption and Decryption is the responsibility of _______
Layer. Application
286. An analog signal carries 4 bits in each signal unit. If 1000 signal
units are sent per second, then baud rate and bit rate of the signal are
_______ and _______. 1000 bauds \ sec & 4000 bps
287. The VLF and LF bauds use _______ propagation for
communication. Ground
288. Using the RSA public key crypto system, if p = 13, q = 31 and d =
7, then the value of e is 10
289. FAN IN of a component A is defined as Number of components
that can call or pass control to component A.
290. The relationship of data elements in a module is called Cohesion
291. Software Configuration Management is the discipline for
systematically controlling (A) the changes due to the evolution of work
products as the project proceeds. (B) The changes due to defects (bugs)
being found and then fixed. (C) the changes due to requirement
changes (D) all of the above
292. Which one of the following is not a step of requirement
engineering? Requirement design
293. Testing of software with actual data and in actual environment is
called Beta testing
294. The student marks should not be greater than 100. This
is Integrity constraint (Solved MCQs of Computer Science)
295. GO BOTTOM and SKIP-3 commands are given one after another
in a database file of 30 records. It shifts the control to 28th record
296. Based on the cardinality ratio and participation ________
associated with a relationship type, choose the Foreign Key Design, the
Cross Referencing Design or Mutual Referencing Design. Constraints
297. Data Integrity control uses Passwords to prohibit unauthorised
access to files.
298. What does the following declaration mean? int (*ptr) [10]; ptr is a
pointer to an array of 10 integers.
299. Which of the following operators cannot be overloaded in C+ +? : :
300. _________ allows creating classes which are derived from other
classes, so that they automatically include some of its “parent’s”
members, plus its own members. Inheritance
301. The correct way to round off a floating number x to an integer
value is y = (int) (x + 0.5)
302. What is the value of the postfix expression? a b c d + – ∗ (where a
= 8, b = 4, c = 2 and d = 5) –24
303. If the queue is implemented with a linked list, keeping track of a
front pointer and a rear pointer, which of these pointers will change
during an insertion into a non-empty queue? Only rear pointer changes
304. _______ is often used to prove the correctness of a recursive
function. Mathematical Induction
305. For any B-tree of minimum degree t ≥ 2, every node other than
the root must have at least ________ keys and every node can have at
most ________ keys. t – 1, 2t – 1
306. Given two sorted list of size ‘m’ and ‘n’ respectively. The number
of comparison needed in the worst case by the merge sort algorithm will
be m + n – 1
307. The context free grammar for the language, L = {a  b  | n ≤ m + 3,
n m

n ≥ 0, m ≥ 0} is S → aaaA | aa A | aA | λ, A → aAb | B, B → Bb | λ


308. The process of assigning load addresses to the various parts of the
program and adjusting the code and data in the program to reflect the
assigned addresses is called Relocation
309. Which of the following derivations does a top-down parser use
while parsing an input string? The input is scanned from left to
right. Leftmost derivation
310. The dual of a Boolean expression is obtained by
interchanging Boolean sums and Boolean products and interchanging 0’s
& 1’s
311. Let P(m, n) be the statement, “m divides n” where the universe of
discourse for both the variables is the set of positive integers. Determine
the truth values of each of the following propositions: I. ∀m ∀n P(m, n),
II. ∃m ∀n P(m, n) I – false & II – true
312. Big – O estimate for, f(x) = (x + 1) log(x  + 1) + 3x  is given as O(x )
2 2 2

313. How many edges are there in a forest of t-trees containing a total
of n vertices? n – t
314. Let f and g be the functions from the set of integers to the set
integers defined by f(x) = 2x + 3 and g(x) = 3x + 2. Then the
composition of f and g and g and f is given as 6x + 7, 6x + 11 (Solved
MCQs of Computer Science)
315. A graph is non-planar if and only if it contains a subgraph
homomorphic to K   or K
3, 3 5

316. Active X controls are Pentium binary programs that can be


embedded in Web pages
317. Which of the following is widely used inside the telephone system
for long-haul data traffic? ATM
318. The document standards for EDI were first developed by large
business house during the 1970s and are now under the control of the
following standard organisation: ANSI
319. Electronic Data Interchange Software consists of the following
four layers: Business application, Internal format conversion, EDI
translator, EDI envelope
320. The virtual address generated by a CPU is 32 bits. The Translation
Look-aside Buffer (TLB) can hold total 64 page table entries and a 4-way
set associative (i.e. with 4-cache lines in the set). The page size is 4 KB.
The minimum size of TLB tag is 16 bits
321. Consider a disk queue with request for input/output to block on
cylinders. 98, 183, 37, 122, 14, 124, 65, 67 in that order. Assume that
disk head is initially positioned at cylinder 53 and moving towards
cylinder number 0. The total number of head movements using Shortest
Seek Time First (SSTF) and SCAN algorithms are respectively 236 and
252 cylinders
322. How much space will be required to store the bit map of a 1.3 GB
disk with 512 bytes block size? 332.8 KB
323. Linux operating system uses Fair Preemptive Scheduling
324. COCOMO stands for COnstructive COst Model
325. While estimating the cost of software, Lines of Code (LOC) and
Function Points (FP) are used to measure which one of the
following? Size of software
326. A good software design must have Low module coupling, high
module cohesion
327. Cyclometric complexity of a flow graph G with n vertices and e
edges is V(G) = e–n+2
328. When the following code is executed what will be the value of x
and y? int x = 1, y = 0; y = x++; 2, 1
329. How many values can be held by an array A (–1, m; 1, m)? m
(m+2)
330. What is the result of the expression (1&2) + (3/4)? 0
331. How many times the word ‘print’ shall be printed by the following
program segment? For (i=1, i<2,i++), For (j=1,j<2,j++), For
(k=1,k<2,k++), Printf(“print/n”) 8
332. Which of the following is not a type of Database Management
System? Sequential
333. Manager’s salary details are to be hidden from Employee Table.
This Technique is called as External level Data-hiding
334. A Network Schema Permits many to many relationship (Solved
MCQs of Computer Science)
335. Which normal form is considered as adequate for usual database
design? 3NF
336. If D , D ,..D  are domains in a relational model, then the relation is
1 2 n

a table, which is a subset of D ×D × … ×D


1 2 n

337. Which of the following addresses is used to deliver a message to


the correct application program running on a host? Port
338. In ________ substitution, a character in the plaintext is always
changed to the same character in the cipher text, regardless of its
position in the text. Monoalphabetic
339. In classful addressing, the IP address 190.255.254.254 belongs
to Class B
340. In hierarchical routing with 4800 routers, what region and cluster
sizes should be chosen to minimize the size of the routing table for a
three layer hierarchy? 15 clusters, 16 regions and 20 routers
341. In IPv4 header, the ______ field is needed to allow the
destination host to determine which datagram a newly arrived fragment
belongs to. Identification
342. Given L1=L (a*baa*) and L2=L (ab*). The regular expression
corresponding to language L3 = L1/L2 (right quotient) is given by a*ba*
343. Given the production rules of a grammar G1 as S  → AB | aaB, A →
1

a | Aa, B → b and the production rules of a grammar G2 as, S  → aS bS  | 2 2 2

bS aS  | λ. Which of the following is correct statement? G1 is ambiguous


2 2

and G2 is ambiguous.
344. Given a grammar: S1 → Sc, S → SA | A, A → aSb | ab, there is a
rightmost derivation S1 ⇒ Sc ⇒SAC ⇒ SaSbc. Thus, SaSbc is a right
sentential form, and its handle is aSb
345. The equivalent production rules corresponding to the production
rules S → Sα  |Sα  | β  | β  is S → β  | β  | β A | β A, A → α A | α A | λ
1 2 1 2 1 2 1 2 1 2

346. Which is the correct statement(s) for Non-Recursive predictive


parser? S1: First (α) = {t| α ⇒ * tβ for some string β} ⇒*tβ, S2:
Follow(X) = {a| S⇒ *αXaβ for some strings α and β} Both statements S1
and S2 are correct.
347. Given an open address hash table with load factor α < 1, the
expected number of probes in a successful search is Atmost (1/α) ln 1/(1–
α)
348. For a B-tree of height h and degree t, the total CPU time used to
insert a node is O(th)
349. The time complexity to build a heap with a list of n numbers
is O(n)
350. The value of postfix expression: 8 3 4 + – 3 8 2 / + * 2 $ 3 + is 52
351. Repository of information gathered from multiple sources, storing
under unified scheme at a single site is called as Data warehousing
352. The task of correcting and pre-processing data is called as Data
cleaning
353. Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher
text of the given plain text SUZANNE BUTAEEZ
354. The relation “divides” on a set of positive integers is Anti
symmetric and transitive (Solved MCQs of Computer Science)
355. Give as good a big–O estimate as possible for the following
functions: (nlogn+n ) (n +2) and (n! +2 ) (n +log(n +1)) O(n ) & O(n * n!)
2 3 n 3 2 5 3
356. A test contains 100 true/false questions. How many different ways
can a student answer the questions on the test, if the answer may be left
blank also? 3 100

357. How many edges must be removed to produce the spanning forest
of a graph with N vertices, M edges and C connected components? M–
N+C
358. Which of the following shall be a compound proposition involving
the propositions p, q and r, that is true when exactly two of the p, q and r
are true and is false otherwise? (p ∧ q ∧⎤ r) ∨ ( p ∧⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
359. The truth value of the statements: ∃!xP(x) → ∃xP(x) and ∃!
x⎤ P(x) → ⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition
“There exists a unique x such that P(x) is true”) are: True and True
360. How many different Boolean functions of degree 4 are there? 2 16

361. A Boolean operator s is defined as follows: 1 s 1 = 1, 1 s 0 = 0, 0 s 1


= 0 and 0 s 0 = 1. What will be the truth value of the expression (x s y) s
z = x s (y s z)? Always true
362. Which one of the following is decimal value of a signed binary
number 1101010, if it is in 2’s complement form? – 22
363. A set of processors P1, P2….… Pk can execute in parallel if
Bernstein’s conditions are satisfied on a pairwise basis; that is P1 || P2 ||
P3 || ….. || Pk if and only if: Pi || Pj for all i ≠ j
364. When a mobile telephone physically moves from one to another
cell, the base station transfers ownership to the cell getting strongest
signal. This process is known as Handoff
365. A virtual memory based memory management algorithm partially
swaps out a process. This is an example of Medium term scheduling
366. Assuming that the disk head is located initially at 32, find the
number of disk moves required with FCFS if the disk queue of I/O block
requests are 98, 37, 14, 124, 65, 67: 321
367. Let the page fault service time be 10 millisecond (ms) in a
computer with average memory access time being 20 nanosecond (ns).
If one page fault is generated for every 106 memory accesses, what is the
effective access time for memory? 30 ns
368. Consider the following UNIX command: Sort <in> temp; head –
30 <temp; rm temp which of the following functions shall be performed
by this command? Sort, taking the input from “in” and writing the output
to “temp” then prints 30 lines from temp on terminal. Finally “temp” is
removed.
369. The MV command changes The directory entry
370. A file is downloaded in a home computer using a 56 kbps MODEM
connected to an Internet Service Provider. If the download of file
completes in 2 minutes, what is the maximum size of data
downloaded? 6.72 Mbs
371. ______ CSMA protocol, after the station finds the line idle, it
sends or refrains from sending based on the outcome of a random
number generator. p-persistent
372. Which of the following substitution technique have the
relationship between a character in the plaintext and a character in the
ciphertext as one-to-many? Polyalphabetic
373. What is the maximum length of CAT-5 UTP cable in Fast Ethernet
network? 100 meters
374. The ______ is a set of standards that defines how a dynamic web
document should be written, how input data should be supplied to the
program, and how the output result should be used. Common Gateway
Interface (Solved MCQs of Computer Science)
375. The count-to-infinity problem is associated with Distance vector
routing algorithm
376. The IEEE single-precision and double-precision format to
represent floating-point numbers, has a length of ______ and ______
respectively. 32 bits and 64 bits
377. Consider an undirected graph G with 100 nodes. The maximum
number of edges to be included in G so that the graph is not connected
is 4851
378. The amortized time complexity to perform ______ operation(s)
in Splay trees is O(Ig n). Search, Insert and Delete
379. Suppose that the splits at every level of Quicksort are in
proportion 1-β to β, where 0 < β ≤ 0.5 is a constant. The number of
elements in an array is n. The maximum depth is approximately – (Ig
n)/Ig (1 – β)
380. The minimum number of nodes in a binary tree of depth d (root is
at level 0) is d + 1
381. The efficient data structure to insert/delete a number in a stored
set of numbers is Doubly linked list
382. The number of states in a minimal deterministic finite automaton
corresponding to the language L = { a  | n≥4 } is 5
n

383. Regular expression for the language L = {w ∈ {0, 1}* | w has no


pair of consecutive zeros} is (1 + 01)* (0 + λ)
384. Consider the following two languages: L  = {a  b  a  | n + l +k>5}
1
n l k

L  = {a  b  a  |n>5, l >3, k≤ l} Which of the following is true? L  is regular


2
n l k
1

language and L  is not regular language.


2

385. LL grammar for the language L = {a  b  c  | m≥0, n≥0} is S → aSc


n m n+m

| S | λ; S  → bS c| λ
1 1 1
386. The number of eight-bit strings beginning with either 111 or 101
is 64
387. Find the number of ways to paint 12 offices so that 3 of them will
be green, 2 of them pink, 2 of them yellow and the rest ones white. 1,
66,320
388. Consider the In-order and Post-order traversals of a tree as given
below: In-order: j e n k o p b f a c l g m d h i Post-order: j n o p k e f b c l
m g h i d a. The Pre-order traversal of the tree shall be a b e j k n o p f c d
glmhi
389. A simple graph G with n-vertices is connected if the graph
has More than (n – 1) (n – 2)/2 edges
390. Which one of the following set of gates is best suited for ‘parity’
checking and ‘parity’ generation? EX-OR, EX-NOR
391. The quantification ∃!x P(x) denotes the proposition “There exists a
unique x such that P(x) is true”, express the quantification using
universal and existential quantifications and logical operators: ∃x
P(x) ∧∀x∀y ((P(x) ∧ P(y)) → x = y)
392. If F and G are Boolean functions of degree n. Then, which of the
following is true? F ≤ F + G and F G ≤ F
393. In which one of the following, continuous process improvement is
done? CMM
394. The ______ of a program or computing system is the structure or
structures of the system, which comprise software components, the
externally visible properties of these components, and the relationship
among them. Software architecture (Solved MCQs of Computer Science)
395. Working software is not available until late in the process
in Waterfall model
396. Equivalence partitioning is a ______ testing method that divides
the input domain of a program into classes of data from which test cases
can be derived. Black box
397. Linked Lists are not suitable for Binary Search
398. Usage of Preemption and Transaction Rollback prevents Deadlock
situation
399. The _____ language was originally designed as the
Transformation Language for Style Sheet facility. XSTL
400. Views are useful for _____ unwanted information, and for
collecting together information from more than one relation into a
single view. Hiding
401. The decision tree classifier is a widely used technique
for Classification
402. Cross_tab displays permit users to view ______ of
multidimensional data at a time. Two dimensions
403. A method to provide secure transmission of email is called PGP
404. Thoma’s-write rule is Timestamp ordering protocol
405. The hit ratio of a Translation Look Aside Buffer (TLAB) is 80%. It
takes 20 nanoseconds (ns) to search TLAB and 100 ns to access main
memory. The effective memory access time is 140 ns
406. Which of the following set of UNIX commands will always display
“WELCOME”? Title = WELCOME; export title; sh –c “echo $title”
407. Eco system is a Frame work for Building Internet Market
408. The technique of temporarily delaying outgoing
acknowledgements so that they can be hooked onto the next outgoing
data frame is known as Piggy backing
409. ______ is process of extracting previously non known valid and
actionable information from large data to make crucial business and
strategic decisions. Data Mining
410. The aspect ratio of an image is defined as The ratio of width to its
height measured in unit length.
411. Using RSA algorithm, what is the value of cipher text C, if the
plain text M = 5 and p = 3, q = 11 & d = 7? 26
412. You are given an OR problem and a XOR problem to solve. Then,
which one of the following statements is true? Problem can be solved
using single layer perception and XOR problem can be solved using radial
basis function.
413. Let V  = 2I – J + K and V  = I + J – K, then the angle between V  &
1 2 1

V  and a vector perpendicular to both V  & V  shall be: 90  and (–2I – J +


2 1 2

3K)
414. In classful addressing, an IP address 123.23.156.4 belongs to
______ class format. A (Solved MCQs of Computer Science)
415. The Mandelbrot set used for the construction of beautiful images
is based on the following transformation: x = x + z  Here Both x & z are
n+1
2
n

complex numbers.
416. Which of the following permutations can be obtained in the
output using a stack of size 3 elements assuming that input, sequence is
1, 2, 3, 4, 5? 3, 4, 5, 2, 1
417. In a Linear Programming Problem, suppose there are 3 basic
variables and 2 non-basic variables, then the possible numbers of basic
solutions are 10
418. Which provides an interface to the TCP/IP suit protocols in
Windows95 and Windows NT? Calinsock Active-X Control
419. If dual has an unbounded solution, then its corresponding primal
has No feasible solution
420. The number of distinct bracelets of five beads made up of red,
blue, and green beads (two bracelets are indistinguishable if the rotation
of one yield another) is, 51
421. Which are the classifications of data used in Mobile
Applications? Private data, Public data, Shared data.
422. In an enhancement of a CPU design, the speed of a floating point
unit has been increased by 20% and the speed of a fixed point unit has
been increased by 10%. What is the overall speed achieved if the ratio of
the number of floating point operations to the number of fixed point
operations is 2 : 3 and the floating point operation used to take twice the
time taken by the fixed point operation in original design? 1.62
423. Lamps are to be connected to a single electric outlet by using an
extension board each of which has four outlets. The number of extension
boards needed to connect all the light is 19
424. Which of the following flags are set when ‘JMP’ instruction is
executed? No flag is set
425. A thread is a light weight process. In the above statement, weight
refers to Number of resources
426. The Z-buffer algorithm is used for Hidden surface removal of
objects. The maximum number of objects that can be handled by this
algorithm shall Be arbitrary no. of objects
427. The power set of AUB, where A = {2, 3, 5, 7} and B = {2, 5, 8, 9}
is 64
428. In Win32, which function is used to create Windows
Applications? Win Main
429. Suppose a processor does not have any stack pointer registers,
which of the following statements is true? All subroutine calls and
interrupts are possible.
430. Everything below the system call interface and above the physical
hardware is known as Kernel.
431. Which is not the correct statement? The class of regular sets is not
closed under inverse homomorphism.
432. When a programming Language has the capacity to produce new
data type, it is called as, Extensible Language
433. Which of the following operating system is better for
implementing client-server network? Windows 2000
434. Consider a system having m resources of the same type. These
resources are shared by 3 processes A, B and C which have peak
demands of 3, 4 and 6 respectively. For what value of m deadlock will
not occur? 13 (Solved MCQs of Computer Science)
435. The Default Parameter Passing Mechanism is called as Call by
Value
436. Which of the following regular expression identities are true? (r +
s)* = (r*s*)*
437. Functions defined with class name are called as Constructor
438. Let f be the fraction of a computation (in terms of time) that is
parallelizable, P the number of processors in the system, and s  the
p

speed up achievable in comparison with sequential execution – then the


s  can be calculated using the relation: 1/ [1 – f + f/P]
p

439. If the parse tree of a word w generated by a Chomsky normal form


grammar has no path of length greater than i, then the word w is of
length No greater than 2 i–1

440. The Object Modelling Technique (OMT) uses the following three
kinds of model to describe a system Object Model, Dynamic Model, and
Functional Model.
441. The factors that determine the quality of a software system
are Correctness, reliability
442. Skolmization is the process of Removing all the existential
quantifiers.
443. Which level of Abstraction describes how data are stored in the
data base? Physical level
444. The transform which possesses the “multi-resolution” property
is Wavelet transforms
445. Which one is a collection of templates and rules? XSL
446. A program P calls two subprograms P  and P . P can fail 50% times
1 2 1 

and P  40% times. Then P can fail 70%


2

447. Third normal form is based on the concept of Transitive


Dependency
448. If the Fourier transform of the function f(x, y) is F(m, n), then the
Fourier transform of the function f(2x, 2y) is: 1/4 F(m/2 , n/2)
449. ______ establishes information about when, why and by whom
changes are made in software. An Audit Trail.
450. An expert system shell is an expert system without Domain
knowledge
451. An example of a dictionary-based coding technique is LZW coding
452. Which is the method used to retrieve the current state of a check
box? Get State ( )
453. Referential integrity is directly related to Foreign key
454. A cryptarithmetic problem of the type SEND + MORE MONEY
Can be solved efficiently using Constraint satisfaction technique (Solved
MCQs of Computer Science)
455. A* algorithm is guaranteed to find an optimal solution if g is
always 1.
456. In Delta Rule for error minimization Weights are adjusted w.r.to
difference between desired output and actual output
457. The concept of pipelining is most effective in improving
performance if the tasks being performed in different stages: require
about the same amount of time
458. What is Granularity? The size of data item
459. Suppose that a given application is run on a 64-processor machine
and that 70 percent of the application can be parallelized. Then the
expected performance improvement using Amdahl’s law is 4.22
460. Which level of Abstraction describes what data are stored in the
Database? Logical level
461. The problem that occurs when one transaction updates a database
item and then the transaction fails for some reason is Dirty Read
Problem
462. In an image compression system 16384 bits are used to represent
256 × 256 image with 256 gray levels. What is the compression ratio for
this system? 2
463. X.25 is ________ Network. Connection Oriented Network
464. Which of the following can be used for clustering of data? Self
organizing map
465. Which of the following is scheme to deal with deadlock? Time out
466. If the pixels of an image are shuffled then the parameter that may
change is Covariance
467. The common property of functional language and logical
programming language: Both are declarative
468. Consider a schema R (A, B, C, D) and functional dependencies A-
>B and C -> D. Then the decomposition R (A, B) and R (C, D)
1 2

is Dependency preserving but not lossless join


469. The quantiser in an image-compression system is a lossy element
which exploits the psychovisual redundancy
470. Data Warehouse provides Storage, Functionality Responsiveness to
queries
471. A* algorithm uses f ‘ = g + h’ to estimate the cost of getting from
the initial state to the goal state, where g is a measure of the cost of
getting from initial state to the current node and the function h’ is an
estimate of the cost of getting from the current node to the goal state. To
find a path involving the fewest number of steps, we should set g = 1
472. The transform which possesses the highest ‘energy compaction’
property is Cosine transforms
473. The _______ memory allocation function modifies the previous
allocated space. realloc( )
474. The mechanism that binds code and data together and keeps them
secure from outside world is known as Encapsulation (Solved MCQs of
Computer Science)
475. Which of the following IP address class is a multicast
address? Class D
476. While unit testing a module, it is found that for a set of test data,
maximum 90% of the code alone were tested with a probability of
success 0.9. The reliability of the module is atmost 0.81
477. The upper bound of computing time of m coloring decision
problem is O(nm )n

478. Which one of the following statements is incorrect? Cyclometric


complexity for a flow graph G is V (G) = E – N + 2, where E is the number
of edges & N is the number of nodes in the flow graph.
479. Consider a weighted undirected graph with positive edge weights
and let (u, v) be an edge in the graph. It is known that the shortest path
from source vertex s to u has weight 53 and shortest path from s to v has
weight 65. Which statement is always true? Weight (u, v) > 12
480. Consider the regular expression (a + b) (a + b) … (a + b) (n-times).
The minimum number of states in finite automaton that recognizes the
language represented by this regular expression contains n + 1 states
481. Number of binary trees formed with 5 nodes is 42
482. Are we building the right product? This statement refers
to Validation
483. The following postfix expression is evaluated using a stack
823^/23* + 51* – The top two elements of the stack after first * is
evaluated 6, 1
484. The following CFG S -> aB | bA, A -> a | as | bAA, B -> b | bs | aBB
Generates strings of terminals that have Equal number of a’s and b’s
485. Consider the following pseudo-code: If (A > B) and (C > D) then A
= A + 1, B = B + 1 And if the cyclomatic complexity of the pseudo-code
is 3
486. Which layer of OSI reference model uses the ICMP (Internet
Control Message Protocol)? Network layer
487. Which diagram provides a formal graphic notation for modeling
objects, classes and their relationships to one another? Object diagram
488. A computer system supports 32 bit virtual address as well as 32
bit physical addresses. Since the virtual address space is of same size as
that of physical address space, if we want to get rid of virtual memory,
which one of the following is true? Hardware support for memory
management is not needed.
489. The feasible region represented by the constraints x  – x  < 1, x  +
1 2 1

x  > 3, x  > 0, x  > 0 of the objective function Max Z = 3x  +


2 1 2 1

2x  is Unbounded feasible region


2

490. The colour of an object is largely determined by its diffuse


reflection coefficient. If K  = (0.8, 0.4, 0), then what shall be the colour
d

of the object, if the light used is blue and magenta? Black and Red
491. If an instruction takes ‘i’ microseconds and a page fault takes an
additional ‘j’ microseconds. The effective instruction time, if on the
average a page fault occurs every k instructions, is i + j/k
492. How many relations are there on a set with n elements that are
symmetric and a set with n elements that are reflexive and
symmetric? 2  and 2
n(n+1)/2 n(n–1)/2

493. The strategy used to reduce the number of tree branches and the
number of static evaluations applied in case of a game tree is Alpha-beta
pruning strategy
494. What is the size (in terms of bits) of Header length field in IPV4
header? 4 (Solved MCQs of Computer Science)
495. ______ is sometimes said to be object oriented, because the only
way to manipulate kernel objects is by invoking methods on their
handles. Windows NT
496. A user level process in Unix traps the signal sent on a Ctrl + C
input and has a signal handling routine that saves appropriate files
before terminating the process. When a Ctrl + C input is given to this
process, what is the mode in which the signal handling routine
executes? Kernel mode
497. A CPU generally handles an interrupt by executing an interrupt
service routine By checking the interrupt register after finishing the
executing the current instruction
498. Radio signals generally propagate according to the following
mechanisms: Reflection, Diffraction, Scattering
499. If ‘a’ and ‘b’ are the end points of a line, then which one of the
following is true? If both end points are left, right, above or below the
window, the line is trivially invisible
500. If the period of a signal is 1000 ms, then what is its frequency in
kilohertz? 10  KHz
–3
501. HTML is defined using SGML – an _______ standard,
information processing-text and office systems (SGML) for text
information processing. ISO – 8879
502. What is the meaning of ‘Hibernate’ in Windows XP/Windows
7? Shutdown the computer without closing the running applications.
503. Assume that we have constructor functions for both base class and
derived class. Now consider the declaration in main ( ). Base * P = New
Derived; in what sequence will the constructor be called? Base class
constructor followed by derived class constructor
504. Which one of the following options is not a shell in UNIX
system? Net Shell
505. In which file the compiler manage the various objects, which are
used in windows programming? Text File
506. On a disk with 1000 cylinders (0 to 999) find the number of
tracks, the disk arm must move to satisfy all the requests in the disk
queue. Assume the last request service was at track 345 and the head is
moving toward track 0. The queue in FIFO order contains requests for
the following tracks: 123, 874, 692, 475, 105, 376. (Assume SCAN
algorithm) 1219
507. Halftoning is defined as A technique for using minimum number of
intensity levels to obtain increased visual resolution.
508. If the primal Linear Programming problem has unbounded
solution, then it’s dual problem will have no feasible solution at all
509. Given a flow graph with 10 nodes, 13 edges and one connected
components, the number of regions and the number of predicate
(decision) nodes in the flow graph will be 5, 4
510. Function points can be calculated by UFP ∗ CAF
511. One weakness of boundary value analysis and equivalence
partitioning is they do not explore combinations of input circumstances
512. Which once of the following is not a software myth? If an
organization does not understand how to control software projects
internally, it will invariably struggle when it outsources software projects.
513. Which is the protocol for performing RPCs between applications
in a language and system independent way? Simple Object Access
Protocol (SOAP)
514. The document that is used by XSLT to indicate, how to transform
the elements of the XML document to another format is Style sheet
(Solved MCQs of Computer Science)
515. Which of the following concepts means adding new concepts to a
program as it runs? Dynamic loading
516. Which of the following correctly describes overloading of
functions? Ad-hoc polymorphism
517. The compiler converts all operands up to the type of the largest
operand is called Type Promotion
518. C++ actually supports the following two complete dynamic
systems: One defined by C and one specific to C++
519. Important advantage of using new and delete operators in C++
is Allocation of memory and frees the memory previously allocated.
520. Given the following statements: S : The grammars S → asb | bsa |
1

ss | a and S → asb | bsa | a are not equivalent. S : The grammars S → ss |


2

sss | asb | bsa | λ and S → ss | asb | bsa | λ are equivalent. Which of the
following is true? Both S  and S  are correct.
1 2

521. High level knowledge which relates to the use of sentences in


different contexts and how the context affect the meaning of the
sentences? Pragmatic
522. The objective of ________ procedure is to discover at least one
________ that causes two literals to match. unification, substitution
523. If h* represents an estimate of the cost of getting from the current
node N to the goal node and h represents actual cost of getting from the
current node to the goal node, then A* algorithm gives an optimal
solution if h* underestimates h
524. The mean-end analysis process centers around the detection of
differences between the current state and goal state. Once such a
difference is isolated, an operator that can reduce the difference must be
found. But perhaps that operator cannot be applied to the current state.
So a sub-problem of getting to a state in which it can be applied is set
up. The kind of backward chaining in which operators are selected and
then sub goals are set up to establish the precondition of operators is
called operator subgoaling
525. In alpha-beta pruning, _________ is used to cut off the search at
maximizing level only and _________ is used to cut off the search at
minimizing level only. beta, alpha
526. If A and B are two fuzzy sets with membership functions, μ (x) =
A

{0.2, 0.5, 0.6, 0.1, 0.9}, μ (x) = {0.1, 0.5, 0.2, 0.7, 0.8} Then the value of
B

μ  will be {0.1, 0.5, 0.2, 0.1, 0.8}


A∩B

527. The height h(A) of a fuzzy set A is defined as h(A) = sup A(x),
x ∈ A. Then the fuzzy set A is called normal when h(A) = 1
528. An artificial neuron receives n inputs x , x ,…., x  with weights w ,
1 2 n 1

w ,…., w  attached to the input links. The weighted sum ________ is


2 n

computed to be passed on to a non-linear filter φ called activation


function to release the output. Σ w  ⋅ x
i i
529. Consider the formula in image processing R  = 1 – 1/C Where
D R 

C  =n /n C  is called as compression ratio n  and n  denotes the number


R 1 2  R 1 2

of information carrying units in two datasets that represent the same


information. In this situation R  is called as relative _________ of the
D

first data set. Data Redundancy


530. Find the false statement: The AES (Advanced Encryption
Standard) cryptosystem allows variable key lengths of size 56 bits and 124
bits.
531. The message 11001001 is to be transmitted using the CRC
polynomial x  + 1 to protect it from errors. The message that should be
3

transmitted is 11001001011
532. _________ comparisons are necessary in the worst case to find
both the maximum and minimum of n numbers. floor (3n/2) – 2
533. Let A and B be two n × n matrices. The efficient algorithm to
multiply the two matrices has the time complexity O(n2.81)
534. The recurrence relation T(n)=mT(n/2) tan  is satisfied by O(n )
2 1g m

(Solved MCQs of Computer Science)


535. The longest common subsequence of the sequences X = <A, B, C,
B, D, A, B> and Y = <B, D, C, A, B, A> has length 4
536. Assuming there are n keys and each key is in the range [0, m – 1].
The run time of bucket sort is O(n + m)
537. A _________ complete subgraph and a _________ subset of
vertices of a graph G = (V, E) are a clique and a vertex cover
respectively. maximal, minimal
538. The Greibach normal form grammar for the language L = {a  b  | n n+1

n ≥ 0} is S → a SB | b, B → b
539. Given the following statements: S : Every context-sensitive
1

language L is recursive. S : There exists a recursive language that is not


2

context sensitive. Which statement is correct? S  is correct and S  is


1 2

correct.
540. What is the bit rate for transmitting uncompressed 800 × 600
pixel colour frames with 8 bits/pixel at 40 frames/second? 153.6 Mbps
541. In IPV 4, the IP address 200.200.200.200 belongs to Class C
542. Which layer of OSI reference model is responsible for
decomposition of messages and generation of sequence numbers to
ensure correct re-composition from end to end of the
network? Transport
543. A client-server system uses a satellite network, with the satellite at
a height of 40,000 kms. What is the best-case delay in response to a
request? (Note that the speed of light in air is 3,00,000
km/second). 533.33 m sec
544. The start and stop bits are used in serial communication
for synchronization
545. _________ is a type of transmission impairment in which the
signal looses strength due to the resistance of the transmission
medium. Attenuation
546. Which of the following is a design criteria for instruction formats?
(A) The size of instructions (B) The number of bits in the address fields
(C) The sufficient space in the instruction format to express all the
operations desired. (D) All of these
547. Synchronization is achieved by a timing device called a
________ which generates a periodic train of________. master clock
generator, clock pulse
548. The essential difference between traps and interrupts is traps are
synchronous and interrupts are asynchronous with the program.
549. Consider the following schemas: Branch = (Branch-name, Assets,
Branch-city) Customer = (Customer-name, Bank name, Customer-city)
Borrow = (Branch-name, loan number, customer account-number)
Deposit = (Branch-name, Account number, Customer-name, Balance).
Using relational Algebra, the Query that finds customers who have
balance more than 10,000 is π  (σ  > 10000
customer-name balance
(Deposit)

550. Find the false statement: Conceptual model is not accurate


representation of “Universe of interest”.
551. Which of the following points lies on the same side as the origin,
with reference to the line 3x + 7y = 2? (0.5, 0)
552. In Unix, how do you check that two given strings a and b are
equal? test $a = $b
553. In windows 2000 operating system all the processor-dependent
code is isolated in a dynamic link library called Hardware abstraction
layer
554. To place a sound into a word document, following feature of
windows is used: OLE (Solved MCQs of Computer Science)
555. Translation Look-aside Buffer (TLB) is an associative memory in
which item to be searched is compared with all the keys simultaneously.
556. Simplest way of deadlock recovery is Kill one of the processes
557. The directory structure used in Unix file system is called Directed
acyclic graph
558. Which statement is not true about process O in the Unix operating
system? Process O is called init process.
559. Which of the following commands would return process_id of
sleep command? Sleep 1 and echo $!
560. Possible thread states in Windows 2000 operating system
include: Ready, standby, running, waiting, transition and terminated
561. _________ is a process model that removes defects before they
can precipitate serious hazards. Cleanroom software engineering
562. Equivalence partitioning is a __________ method that divides
the input domain of a program into classes of data from which test cases
can be derived. Black-box testing
563. Software safety is a __________ activity that focuses on the
identification and assessment of potential hazards that may affect
software negatively and cause an entire system to fail. Software quality
assurance
564. The “PROJECT” operator of a relational algebra creates a new
table that has always Same number of rows as the original table
565. The employee information of an Organization is stored in the
relation: Employee (name, sex, salary, deptname) Consider the
following SQL query Select deptname from Employee Where sex = ‘M’
group by deptname having avg (salary) > {select avg (salary) from
Employee} Output of the given query corresponds to Average salary of
male employees in a department is more than average salary of the
organization.
566. For a database relation R(a, b, c, d) where the domains of a, b, c, d
include only the atomic values. The functional dependency a → c, b → d
holds in the following relation In 1NF not in 2NF
567. In any n-element heap, the number of nodes of height h is less
than equal to [n/2 ]
h+1

568. A vertex cover of an undirected graph G(V, E) is a subset V  ⊆ V


1

vertices such that If (u, v) ∈ E then u ∈ V  or v ∈ V


1 1

569. In a fully connected mesh network with n devices, there are


________ physical channels to link all devices. n(n–1)/2
570. The baud rate of a signal is 600 baud/second. If each signal unit
carries 6 bits, then the bit rate of a signal is 3600
571. An image is 1024∗800 pixels with 3 bytes/pixel. Assume the
image is uncompressed. How long does it take to transmit it over a 10-
Mbps Ethernet? 1.966 seconds
572. The ________ measures the relative strengths of two signals or a
signal at two different points. Decibel
573. Which one of the following media is multidrop? Thick Coaxial
cable
574. What is the baud rate of the standard 10 Mbps Ethernet? 20 mega
baud (Solved MCQs of Computer Science)
575. At any iteration of simplex method, if Δj (Zj – Cj) corresponding
to any non-basic variable Xj is obtained as zero, the solution under the
test is Alternative solution
576. A basic feasible solution to a m-origin, n-destination
transportation problem is said to be _________ if the number of
positive allocations are less than m + n – 1. Degenerate
577. An actor in an animation is a small program invoked _______
per frame to determine the characteristics of some object in the
animation. Once
578. Bresenham line drawing algorithm is attractive because it
uses Integer arithmetic only
579. The refresh rate above which a picture stops flickering and fuses
into a steady image is called Critical fusion frequency
580. In homogenous coordinate system (x, y, z) the points with z = 0
are called Point at infinity
581. If 40 black lines interleaved with 40 white lines can be
distinguished across one inch, the resolution is 40 line-pairs per inch
582. Images tend to be very large collection of data. The size of memory
required for a 1024 by 1024 image in which the colour of each pixel is
represented by a n-bit number, (in an 8 bit machines) is n / 8 MB
583. Arrays in C language can have _________ with reference to
memory representation. Only one subscript
584. Horn clauses are special kinds of propositions which can be
described as A single atomic proposition on left side or an empty left side
585. Which of the following is/are the fundamental semantic model(s)
of parameter passing? (A) In mode (B) Out mode (C) in-out mode (D) all
of the above
586. The grammar with production rules S → aSb |SS|λ generates
language L given by: L = {w∈ {a, b}* | n  (w) = n  (w) and n  (v) ≥ n  (v)
a b a b

where v is any prefix of w}


587. A pushdown automation M = (Q, Σ, Γ, δ, q , z, F) is set to be
0

deterministic subject to which of the following condition(s), for every


q ∈ Q, a ∈ Σ ∪ {λ} and b ∈ Γ (s1) δ (q, a, b) contains at most one element
(s2) if δ (q, λ, b) is not empty then δ(q, c, b) must be empty for every
c ∈ Σ Both s1 and s2
588. For every context free grammar (G) there exists an algorithm that
passes any w ∈ L (G) in number of steps proportional to |w| 3

589. The statements s1 and s2 are given as: s1: Context sensitive
languages are closed under intersection, concatenation, substitution and
inverse homomorphism. s2: Context free languages are closed under
complementation, substitution and homomorphism. Which of the
following is correct statement? s1 is correct and s2 is not correct.
590. Which one of the following is not an addressing mode? Relative
indexed
591. Computers can have instruction formats with Zero address, one
address, two addresses and three address instructions
592. Which is not a typical program control instruction? SHL
593. Interrupt which arises from illegal or erroneous use of an
instruction or data is Internal interrupt
594. The simplified function in product of sums of Boolean function
F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is (W’ + X’) (Y’ + Z’) (X’ + Z)
(Solved MCQs of Computer Science)
595. When an array is passed as a parameter to a function which of the
following statements is correct? The function can change values in the
original array
596. Suppose you want to delete the name that occurs before “Vivek” in
an alphabetical listing. Which of the following data structures shall be
most efficient for this operation? Doubly linked list
597. Binary symmetric channel uses Half duplex protocol
598. Hamming distance between 100101000110 and 110111101101 is 6
599. Given code word 1110001010 is to be transmitted with even parity
check bit. The encoded word to be transmitted for this code
is 11100010101
600. The number of distinct binary images which can be generated
from a given binary image of right M × N are 2 MN

601. If f(x, y) is a digital image, then x, y and amplitude values of f


are Finite
602. Consider the following processes with time slice of 4 milliseconds
(I/O requests are ignored): Process            A B C D          Arrival time     0
123   CPU cycle       8 495. The average turnaround time of these
processes will be 18.25 milliseconds
603. A job has four pages A, B, C, D and the main memory has two page
frames only. The job needs to process its pages in following order:
ABACABDBACD Assuming that a page interrupt occurs when a new
page is brought in the main memory, irrespective of whether the page is
swapped out or not. The number of page interrupts in FIFO and LRU
page replacement algorithms are 9 and 8
604. Let the time taken to switch between user mode and kernel mode
of execution be T1 while time taken to switch between two user
processes be T2. Which of the following is correct? T1 < T2
605. Working set model is used in memory management to implement
the concept of Principal of Locality
606. A UNIX file system has 1 KB block size and 4-byte disk addresses.
What is the maximum file size if the inode contains ten direct block
entries, one single indirect block entry, one double indirect block entry
and one triple indirect block entry? 16 GB
607. A thread is usually defined as a light weight process because an
Operating System (OS) maintains smaller data structure for a thread
than for a process. In relation to this, which of the following statement is
correct? OS maintains only CPU registers for each thread
608. The versions of windows operating system like windows XP and
window Vista uses following file system: (A) FAT-16 (B) FAT-32 (C)
NTFS (NT File System) (D) All of the above
609. Which one of the following is a correct implementation of the
meta-predicate “not” in PROLOG (Here G represents a goal)? not (G):–
call(G), !, fail. not(G).
610. Which one of the following is not an informed search
technique? Depth first search
611. If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x
(P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known
as Skolemization
612. Given two jugs of capacities 5 litres and 3 litres with no measuring
markers on them. Assume that there is endless supply of water. Then
the minimum number of states to measure 4 litres water will be 7
613. The map colouring problem can be solved using which of the
following technique? Constraint satisfaction
614. Which of the following is a knowledge representation technique
used to represent knowledge about stereotype situation? Scripts (Solved
MCQs of Computer Science)
615. A fuzzy set A on R is ________ if A (λx  + (1 – λ) x ) ≥ min [A(x ),
1 2 1

A(x )] for all x , x  ∈ R and all λ ∈ [0, 1], where min denotes the minimum
2 1 2

operator. Convex
616. Which of the following is a correct predicate logic statement for
“Every Natural number has one successor”? ∀x∃y (succ(x, y) ∧ (∃z succ(x,
z) ⇒ equal (y, z)))
617. α – β cutoffs are applied to Minimax search
618. Which of the following is not a part of an expert system
shell? Knowledge Base
619. The Blocks World Problem in Artificial Intelligence is normally
discussed to explain a Planning system
620. Means-Ends Analysis process centres on the detection of
difference between the current state and the goal state. Once such a
difference is found, and then to reduce the difference one applies An
operator that can reduce the difference
621. Suppose a file of 10,000 characters is to be sent over a line at
2400 bps. Assume that the data is sent in frames. Each frame consists of
1000 characters and an overhead of 48 bits per frame. Using
synchronous transmission, the total overhead time is 0.2 second
622. Which of the following is the size of Network bits and Host bits of
Class Aof IP address? Network bits 7, Host bits 24
623. Which of the following field of the TCP header tells how many
bytes may be sent starting at the byte acknowledged? Window size
624. Which of the following is a bit rate of an 8-PSK signal having 2500
Hz bandwidth? 7500 bps
625. Given the IP address 201.14.78.65 and the subnet mask
255.255.255.224. What is the subnet address? 201.14.78.64
626. If an artificial variable is present in the ‘basic variable’ of optimal
simplex table then the solution is Infeasible solution
627. An optimal assignment requires that the minimum number of
horizontal and vertical lines that can be drawn to cover all zeros be equal
to the number of Rows or columns
628. Assume, L is regular language. Let statements S  and S  are defined 1 2

as: S : SQRT (L) = {x| for some y with |y| = |x| , xy∈L}. S : LOG (L) = {x|
1
2
2

for some y with |y| = 2 , xy∈ L}. Which of the following is true? Both


|x|

S  and S  are correct.


1 2

629. A regular grammar for the language L = {a b  | n is even and m isn m

even} is given by S→aaS | S ; S  → bbS  | λ


1 1 1

630. The language L = {a  b  a  b  | n ≥ 0, m ≥ 0} is Context free but not


n n m m

linear
631. Assume statements S  and S  defined as: S : L -L  is recursive
1 2 1 2 1

enumerable where L  and L  are recursive and recursive enumerable


1 2

respectively. S : The set of all Turing machines is countable. Which of


2

the following is true? Both S  and S  are correct


1 2

632. _______ constraints ensure that a value that appears in one


relation for a given set of attributes also appears for a certain set of
attributes in another relation. Referential Integrity
633. The SQL expression, Select distinct T, branch_name from branch
T, branch S where T.assets>S.assets and S.branch_city=”Mumbai” finds
the names of All branches that have greater assets than some branch
located in Mumbai.
634. Let A be the set of comfortable houses given as A = {x /0.8, x /0.9, 1 2

x /0.1, x /0.7} and B be the set of affordable houses B = {x /0.9, x /0.8,


3 4 1 2

x /0.6, x /0.2} Then the set of comfortable and affordable houses


3 4

is {x /0.8, x /0.8, x /0.1, x /0.2} (Solved MCQs of Computer Science)


1 2 3 4

635. Support of a fuzzy set A = { x /0.2, x /0.15, x /0.9, x /0.95, x /0.15}


1 2 3 4 5

within a universal set X is given as {x , x , x , x , x }


1 2 3 4 5

636. In a single perceptron, the updation rule of weight vector is given


by w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)
637. ______ refers to the discrepancy among a computed, observed or
measured value and the true specified or theoretically correct
values. Error
638. Which logic family dissipates the minimum power? CMOS
639. Which of the following electronic component is not found in
IC’s? Inductor
640. A given memory chip has 14 address pins and 8 data pins. It has
the following number of locations. 2 14

641. The instruction: MOV CL, [BX] [DI] + 8 represent the _____
addressing mode. Based Indexed
642. The power dissipation of a flip-flop is 3mW. The power
dissipation of a digital system with 4 flip-flops is given by 12 mW
643. A binary ripple counter is required to count up to 16383. How
many flip-flops are required? 14
644. The time complexity of recurrence relation T(n) = T(n/3) +
T(2n/3) + O(n) is O(n Ig n)
645. How many people must there be in a room before there is a 50%
chance that two of them were born on the same day of the year? At least
23
646. The number of possible parenthesizations of a sequence of n
matrices is Ω(2 ) n

647. The time complexity of an efficient algorithm to find the longest


monotonically increasing subsequence of n numbers is O(n Ig n)
648. Given 0-1 knapsack problem and fractional knapsack problem and
the following statements: S : 0-1 knapsack is efficiently solved using
1

Greedy algorithm. S : Fractional knapsack is efficiently solved using


2

Dynamic programming. Which of the following is true? Both S  and 1

S  are not correct.


2

649. Equivalence class partitioning approach is used to divide the input


domain into a set of equivalence classes, so that if a program works
correctly for a value, then it will work correctly for all the other values in
that class. This is used To reduce the number of test cases required
650. The failure intensity for a basic model as a function of failures
experienced is given as λ(μ)-λ [1 – (μ)/(V )] where λ  is the initial failure
0 0 0

intensity at the start of the execution, μ is the average or expected


number of failures at a given point in time, the quantity V  is the total
0

number of failures that would occur in infinite time. Assume that a


program will experience 100 failures in infinite time; the initial failure
intensity was 10 failures/CPU hr. Then the decrement of failures
intensity per failure will be –0.1 per CPU hr.
651. Improving processing efficiency or performance or restructuring
of software to improve changeability is known as Perfective maintenance
652. In ____, modules A and B make use of a common data type, but
perhaps perform different operations on it. Stamp coupling
653. Sixty (60) reusable components were available for an application.
If only 70% of these components can be used, rest 30% would have to be
developed from scratch. If average component is 100 LOC and cost of
each LOC is Rs. 14, what will be the risk exposure if risk probability is
80%? Rs. 20,160
654. Consider the following two function declarations: (i) int *f( ) (ii)
int (*f)( ) Which of the following is true? The first declaration is a
function returning a pointer to an integer and the second is a pointer to
function returning integer. (Solved MCQs of Computer Science)
655. Assume that we have constructor function for both Base and
Derived classes. Now consider the declaration: main ( )          Base *p =
new Derived;         In what sequence, the constructor will be
executed? Base class constructor is followed by Derived class constructor
656. MPEG involves both spatial compression and temporal
compression. The spatial compression is similar to JPEG and temporal
compression removes ______ frames. Redundant
657. If the data unit is 111111 and the divisor is 1010. In CRC method,
what is the dividend at the transmission before division? 111111000
658. If user A wants to send an encrypted message to user B. The plain
text of A is encrypted with the Public Key of user B
659. A _____ can forward or block packets based on the information
in the network layer and transport layer header. Proxy firewall
660. The two color systems – the HSV and HLS are Hue, Saturation,
Value and Hue, Lightness, Saturation
661. The parametric representation of the line segment between the
position vectors P (2, 3) and P (5, 4) is given as x (t)= 2+3t, y(t)=3+t 0 ≤ t
1 2

≤1
662. The programming languages C and C++ are not strongly typed
languages because: Both C and C++ allow functions for which parameters
are not type checked and also the union types in these languages are not
type checked.
663. The tracing model in Prolog describes program execution in terms
of certain events. These events are Call, exit, redo and fail
664. Which of the following statements is not correct with reference to
distributed systems? In a distributed system, if a user wants to run the
program on other nodes or share the resources on remote sites due to their
beneficial aspects, user has to log on to that site.
665. Which of the following shell scripts will produce the output “my
first script”? For i in my first script; do echo –i $i; done
666. The portion of Windows 2000 operating system which is not
portable is Virtual memory management
667. Which of the following statements is not true for UNIX Operating
System? UNIX
668.

You might also like