0% found this document useful (0 votes)
90 views13 pages

10292020214439ECET Computer Science - 2020

This document contains a computer science exam with 40 multiple choice questions covering topics like registers, logic gates, data types, binary conversions, assembly language instructions, memory, operating systems, algorithms and more. Each question is followed by 4 possible answers and the correct solution. The questions test knowledge of fundamental computer science concepts.

Uploaded by

M.hanmandlu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views13 pages

10292020214439ECET Computer Science - 2020

This document contains a computer science exam with 40 multiple choice questions covering topics like registers, logic gates, data types, binary conversions, assembly language instructions, memory, operating systems, algorithms and more. Each question is followed by 4 possible answers and the correct solution. The questions test knowledge of fundamental computer science concepts.

Uploaded by

M.hanmandlu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SR Empower Academy

Computer Science – 2020 ECET A.P

Computer Science
1) Simplest Registers only consists of
(A) Counter (B) EPROM (C) latch (D) flip-flop
Solution: (D)
2) Which of the following is a Universal Gate?
(A) AND gate (B) OR gate (C) NAND gate (D) NOR gate
Solution: (C)

3) (𝑥 ′ ) is a
(A) complement (B) dual complement (C) reflection (D) duality
Solution: (D)
4) A Multiplexer is also called as a
(A) Coder (B) parallel adder (C) Data selector (D) NOR gate
Solution: (C)
5) A Binary variable can take the values
(A) 0 only (B) 0 and -1 (C) 0 and 1 (D) 1 and 2
Solution: (C)
6) (1010.011)2 =
(A) (10.365)10 (B) (10.375)10 (C) (11.365)10 (D) (11.375)10
Solution: (B)
7) Each square in a Karnaugh map represents a
(A) Point (B) value (C) minterm (D) maxterm
Solution: (C)
8) Circuit whose output depends on directly present input is called
(A) combinational circuit (B) sequential circuit
(C) combinational sequence (D) series
Solution: (A)
9) The purpose of the microprocessor is to control _______________
(A) Processing (B) Memory (C) Switches (D) Tasks
Solution: (B)
10) If segment address = 1005H, offset address = 5555H, then the physical address is __________
(A) 155AH (B) 4550H (C) 155A5H (D) 56555H
Solution: (C)
11) Which of the following instruction is not valid?
(A) MOV AX,BX (B) MOV AX,500 (C) MOV DS,5000H (D) PUSH AX
Solution: (C)
12) The addressing mode that is used in unconditional branch instruction is
(A) Intra segment direct addressing mode
(B) Intra segment indirect addressing mode
(C) Intra segment direct and indirect addressing mode
(D) Inter segment direct addressing mode
Solution: (B)
13) During comparison operation, the result of comparing or subtracting is stored in
(A) Memory (B) Registers (C) Stack (D) no where
Solution: (D)
14) The BIU contains FIFO register of size 6 bytes is called as
(A) Queue (B) Stack (C) Segment (D) Register
Solution: (A)
15) The fetching of the program from secondary memory to place it in physical memory during the executing
of CPU is called ________________
For More information:
Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
(A) Mapping (B) swapping in (C) swapping out (D) pipelining
Solution: (B)
16) The instruction “JUMP’” belongs to
(A) sequential control flow instructions (B) data transfer instructions
(C) branch instructions (D) control transfer & branch instructions
Solution: (D)
17) The first processor with an inbuilt floating point unit is ______________
(A) 80386 (B) 80486 (C) 8086 (D) 80286
Solution: (B)
18) Which group of instructions do not affect the flags?
(A) Arithmetic operations (B) Logic operations
(C) Branch operations (D) Data transfer operations
Solution: (D)
19) The delay between the time an interrupt request is received and the start of executing of the Interrupt
service routine is called _________________
(A) Interrupt latency (B) Interrupt back (C) Interrupt hold (D) Interrupt service
Solution: (A)
20) The DMA controller may be given exclusive access to the main memory to transfer a block of data without
interruption is known as ________________
(A) Block (or) burst mode (B) Stealing mode
(C) Bus master (D) Bus slave
Solution: (A)
21) The addressing mode which makes use of in-direction pointers is
(A) Indirect addressing mode (B) Index addressing mode
(C) Relative addressing mode (D) Offset addressing mode
Solution: (A)
22) What is the highest speed memory between the main memory and the CPU called?
(A) Register memory (B) Cache memory
(C) Storage memory (D) Virtual memory
Solution: (B)
23) Which one of the following can produce the final product of machine processing in a form usable by
humans
(A) Storage (B) Control (C) Input device (D) Output device
Solution: (D)
24) In the case of, Zero-address instruction method the operands are stored in -----------
(A) Registers (B) Stack (C) Accumulators (D) Cache
Solution: (B)
25) The memory which is used to store the copy of data (or) instructions stored in larger memories inside the
CPU is called ______________
(A) Level 1 cache (B) Level 2 cache (C) Registers (D) TLB
Solution: (A)
26) In the following indexed addressing mode instruction, MOV 5(R1), LOC the Effective Address is
(A) EA = 5+R1 (B) EA = R1 (C) EA = [R1] (D) EA = 5 + [R1]
Solution: (D)
27) Which technique is preferable for transferring a large amount of data to and from a memory in a short
time
(A) DMA (B) Interrupt Driven I/o
(C) Programmed I/o (D) BUS
Solution: (A)

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
28) The instructions like MOV or ADD are called as
(A) OP-Code (B) Operators (C) Commands (D) Operand
Solution: (A)
29) What will be the output of the C program?
#include<stdio.h>
int main()
{
int a;
a = 1, 2, 3;
print f(“%d”,a);
return 0;
}
(A) 1 (B) 3 (C) Compile Error (D) Run time Error
Solution: (C)
30) What will be the output of the C program?
#include<stdio.h>
int main()
{
char *ptr;
char string[]=”learn C from 2braces.com”;
ptr = string;
ptr + = 6;
printf(“%s”,ptr);
return 0;
}
(A) Compilation Error (B) Runtime Error (C) from 2braces.com (D) C from 2braces.com
Solution: (D)
31) Which of the following mode argument is used to truncate in files?
(A) a (B) w (C) f (D) t
Solution: (B)
32) Find the post order by using the given pre-order and in-order.
Inorder Traversal in [] = {4, 2, 5, 1, 3, 6}
Preorder Traversal pre [] = {1, 2, 4, 5, 3, 6}
(A) Post-Order post = {4,2,5,6,3,1} (B) Post-Order post = {2,6,3,4,5,1}
(C) Post-Order post = {4,5,2,6,1,3} (D) Post-Order post = {4,5,2,6,3,1}
Solution: (D)
33) A text file is the one in which the data is stored in
(A) ASCII code (B) Octal code (C) Binary code (D) Text code
Solution: (A)
34) Memory efficient Doubly linked list is also called as _______________
(A) XOR linked list (B) Circular Single linked list
(C) NOR linked list (D) Single linked list
Solution: (A)
35) Which of the following function sets first n characters of a string to a given character ___________
(A) strinit() (B) strnset() (C) strset() (D) strcset()
Solution: (B)
36) The time complexity of a quick sort algorithm which makes use of median, found by an O(n) algorithm as
pivot element is __________
(A) O(n2) (B) O(nlogn) (C) O(nloglogn) (D) O(n)
Solution: (B)

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
37) What is the corresponding postfix expression for the given infix expression a+b*(c^d-e)^(f+g*h)-i
(A) abc^de-fg+*^*+i- (B) abcde^-fg*+*^h*+i-
(C) abcd^e-fgh*+^*+i- (D) ab^-dc*+ef^gh*+i-
Solution: (C)
38) What will be the output of the C program?
#include<stdio.h>
int main()
{
Int c = 5, n = 10;
do{
no/ =c;
}while(c--);
printf(“%d”,no);
return 0;
}
(A) 1 (B) Runtime Error (C) 0 (D) Compiler Error
Solution: (D)
39) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are _________
(A) Added (B) Removed (C) Rearranged (D) Modified
Solution: (A)
40) Three or more devices share a link in ________ connection.
(A) Unipoint (B) Multipoint (C) Point to point (D) Simplex
Solution: (B)
41) How many layers are present in the Internet protocol stack (TCP/IP model)?
(A) 5 (B) 7 (C) 6 (D) 10
Solution: (A)
42) Delimiting and synchronization of data exchange is provided by _________
(A) Application layer (B) Session layer (C) Transport layer (D) Link layer
Solution: (B)
43) ____________ allows you to connect and login to a remote computer
(A) Telnet (B) FTP (C) HTTP (D) SMTP
Solution: (A)
44) Which network topology required a central controller or hub?
(A) Star (B) Mesh (C) Ring (D) Bus
Solution: (A)
45) In TDM, slots are further divided into ____________
(A) Seconds (B) Frames (C) Packets (D) Bits
Solution: (B)
46) Automatic repeat request error management mechanism is provided by ____________
(A) logical link control sublayer (B) media access control sublayer
(C) network interface control sublayer (D) application access control sublayer
Solution: (A)
47) In classful addressing, a large part of available addresses are ____________
(A) Organized (B) Blocked (C) Wasted (D) Communicated
Solution: (C)
48) The time taken by a packet to travel from client to server and then back to the Client is called ________
(A) STT (B) RTT (C) PTT (D) FTP
Solution: (B)
49) Round robin scheduling falls under the category of ____________________
(A) Dead Lock (B) Demand Paging

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
(C) Non-preemptive scheduling (D) Preemptive scheduling
Solution: (D)
50) Which one of the following is the Dead Lock Avoidance algorithm?
(A) Banker’s algorithm (B) Round Robin algorithm
(C) Elevator algorithm (D) Karn’s algorithm
Solution: (A)
51) The aim of creating Page Replacement algorithm is to ______________
(A) Replaces pages faster (B) Increase the page fault rate
(C) Decrease the page fault rate (D) To allocate multiple pages to process
Solution: (C)
52) What are the two methods of the LRU page replacement policy that can be implemented in hardware?
(A) Counters (B) RAM registers (C) Stack and counters (D) Registers
Solution: (C)
53) Virtual memory is normally implemented by ___________
(A) Demand Paging (B) Buses (C) Virtualization (D) paging
Solution: (A)
54) Process is _______________
(A) Program in high level language kept on disk
(B) Contents of main memory
(C) A program in execution
(D) A job in secondary memory
Solution: (C)
55) With paging there is no _________ fragmentation
(A) Internal (B) External (C) Demand (D) Segmentation
Solution: (B)
56) In paged memory systems, if the page size is increased, then the internal fragmentation generally _____
(A) Becomes less (B) Becomes more (C) Remains constant (D) Remains equal
Solution: (B)
57) Memory management techniques in which system stores & retrieves data from secondary storage for use
in main memory is called ________________
(A) Fragmentation (B) Paging (C) Mapping (D) Relocating
Solution: (B)
58) If a process needs I/O to or from a disk, and if drive or controller is busy then _____________
(A) The request will be placed in the queue of pending requests for that drive
(B) The request will not be processed and will be ignored completely
(C) The request will be not placed
(D) The request closed
Solution: (A)
59) The process that residing in main memory and are ready and waiting to execute are kept on a list called
___________
(A) Job queue (B) Ready queue (C) Execution queue (D) Process queue
Solution: (B)
60) To avoid dead lock _______________
(A) There must be a fixed number of resources to allocate
(B) Resource allocation must be done only once
(C) All dead locked processes must be aborted
(D) Inversion technique can be used
Solution: (A)
61) The term attribute refers to a __________ of a table.
(A) Record (B) Column (C) Tuple (D) Key
Solution : (B)
For More information:
Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
62) Functional Dependencies are the types of constraints that are based on ___________
(A) Key (B) Key revisited (C) Superset key (D) Foregin key
Solution : (A)
63) Tables in second normal form (2NF):
(A) Eliminate all hidden dependencies
(B) Eliminate the possibility of insertion anomalies
(C) Have a composite key
(D) Have all non-key fields that depends on the whole primary key
Solution : (A)
64) Triggers are supported in
(A) Delete (B) Update (C)Views (D) Alter
Solution : (C)
65) Which of the following creates a virtual relation for strong the query?
(A) Function (B) View (C) Procedure (D) Triggers
Solution : (B)
66) Data integrity constraints are used to :
(A) Control who is allowed access to the data
(B) Ensure that duplicate records are not entered into the table
(C) Improve the quality of data entered for a specific property
(D) Prevent users from changing the values stored in the table
Solution : (C)
67) Database _________ is the logical design of the database and database__________ is a snapshot of the data in
the data base at a given instant of time
(A) Instance, Schema (B) Relation, Schema (C) Relation, Domain (D) Schema, Instance
Solution : (D)
68) We indicate roles in E-R diagrams by labeling the lines that connect ________ to ____________
(A) Diamond, diamond (B)Rectangle ,diamond
(C) rectangle ,rectangle (D) Diamond ,rectangle
Solution : (D)
69) If we want to retain all duplicates, we must write ________ in place of union.
(A) Union all (B) Union some (C) Intersect all (D) Intersect some
Solution : (A)
70) Using which of the following, can a user request information from a database?
(A) Query (B) Relation (C) Structure (D) Complier
Solution : (A)
71) Identify the user-defined type of from the following in C++?
(A) Float (B) Classes (C) Double (D) Int
Solution : (B)
72) Which type of Constructor doesn’t take any arguments?
(A) Default (B) Parameterized (C) Copy constructor (D) Nonargumented
Solution : (A)
73) Which of the following gets called when an object is being created?
(A) Constructor (B) Virtual function (C) Destructors (D) Main
Solution : (A)
74) Find the wrong statement about Abstract Class in C++.
(A) We can’t create its objects.
(B) We can’t create pointers to an abstract class
(C) It contains at least one pure virtual function
(D)We can create references to an abstract class
Solution : (B)

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
75) In case of Inheritance in C++ where both Base and Derived class are having Constructors when an object of
Derived class is created then ________________
(A) Constructor of Derived class will be invoked first
(B) Constructor of Base class will be invoked first
(C) Constructor of Derived class will be executed first followed by Base class
(D) Constructor of Base class will be executed first followed by Derived class
Solution: (D)
76) What is the implicit pointer that is passed as the first argument for non static Member functions in C++?
(A) ‘self pointer (B) std::auto_ptr pointer (C) ‘Myself’ pointer (D) ‘this’ pointer
Solution: (D)
77) Which of the following operator can be overloaded in C++?
(A) ? (B) :: (C) . (D) ==
Solution: (D)
78) What is the output of the following program?
#include<iostream.h>
Using namespace std;
Void main()
{ char *s = “C++”,
cout<<s<<” ”;
S++;
cout<<s<<” “;
}
(A) C++ C++ (B) C++ ++ (C) ++ ++ (D) Compiler error
Solution: (D)
79) _____________ is used to write a single character to output file in C++
(A) cin() (B) put () (C) get () (D) getW()
Solution: (B)
80) In C++, dynamic memory allocation is done using _____________ operator
(A) calloc() (B) malloc() (C) allocate (D) New
Solution: (D)
81) Which function is used to perform some action when the object is to be destroyed?
(A) finalize () (B) delete() (C) main () (D) remove ()
Solution: (A)
82) Which of this clas is super class of every class in java?
(A) String class (B) Object class (C) Abstract class (D) Array List class
Solution: (B)
83) Which method of string class in java is used to convert the Boolean into String?
(A) Public static String value Of (double I) (B) Public static String value Of (Boolean I)
(C) Public Boolean equals (Object an Object) (D) Public static String value Of (Object obj)
Solution: (A)
84) Which method is called only once during the run time of your applet?
(A) Stop() (B) paint() (C) init() (D) destroy()
Solution: (C)
85) Which of these exceptions will be thrown if we use null reference for an arithmetic operation?
(A) ArithmeticException (B) NullPointerException
(C) IlegalAcessException (D) IllegalOperationException
Solution: (B)
86) Which of this method is used to find out that a thread is still running or not?
(A) run() (B) Alive() (C) is Alive() (D) check Run()
Solution: (C)

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
87) Predict the output of following Java Program
class Test {
int i;
}
class Main {
public static void main (String args[]) {
Test t = new Test ();
System.out.println(t.i);
}
}
(A) Garbage value (B) 0 (C) compile time error (D) run time error
Solution: (B)
88) Which of this method of Thread class is used to suspend a thread for a period of time?
(A) Sleep () (B) terminate () (C) suspend () (D) stop ()
Solution: (A)
89) Which is used to store data and partial results, as well as to perform dynamic linking, return values for
methods, and dispatch exceptions?
(A) Window (B) Panel (C) Frame (D) Container
Solution: (C)
90) Which of these is a super class of wrappers Double & Integer?
(A) Long (B) Digits (C) Float (D) Number
Solution: (D)
91) How can you open a link in a new browser window?
(A) <a href = “url” target = “new”> (B) <a href = “url” target = “_blank”>
(C) <a href = “url” .new> (D) <a href = “url” target = “open”>
Solution: (B)
92) If you want to merge two or more rows in table which attribute you can use?
(A) Rowmerge (B) Rowspan (C) Colmerge (D) Colspan
Solution: (B)
93) When from data contains sensitive or personal information then which method is more preferable?
(A) Get method (B) Post method (C) Host method (D) Put method
Solution: (B)
94) HTML documents are transmitted from web servers to web browsers using ___________
(A) FTP (B) HTTP (C) XML (D) JSP
Solution: (B)
95) Which in-built function will add a value to the end of an array in Php?
(A) Array_unshift() (B) Into_array() (C) Inend_array() (D) Array_push()
Solution: (D)
96) What will be the output of the following Php code?
<? Php
$number=array(“4”,”hello”,2);,
echo (array_sum ($number));
?>
(A) 4hello2 (B) 4 (C) 2 (D) 6
Solution: (D)
97) Which of the following is used to access MySQL database in Php?
(A) mysqlconnect () function (B) mysql-connect ()
(C) mysql_connect () function (D) sql_connect () function
Solution: (C)

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P
98) Which of the following is used in Php to store user data in a session?
(A) $_SESSION (B) SYS_SESSION (C) $SESSION (D) $_SESSIONS
Solution: (A)
99) __________ Object is used to fill to DataSet/Data Table with query results in ADO.net.
(A) Data Reader (B) DataSet (C) DataAdapter (D) Data Tables
Solution: (C)
100) Ado.NET DataAdapter provides the communication between__________
(A) Data object and DataSet (B) Data object and Data source
(C) Dataset and Data base (D) Dataset and Data source
Solution: (D)

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564
SR Empower Academy
Computer Science – 2020 ECET A.P

For More information:


Download "SR Empower academy" Mobile App from play store|Contact: 7995470564

You might also like