Computer Science
Computer Science
REGISTER NO
NAME
HALL TICKET NO.
MOBILE NO EMAIL ID
HALL
CANDIDATE INVEGILATOR
SIGNATURE SIGNATURE WITH
DATE
10. A XOR gate has inputs A and B, and the output Y. Then the output equation is _________.
a) Y = AB b) Y = AB +A‟B c) Y=A‟B+AB‟ d) Y=AB+A‟B‟
Page 1 of 4
12. A data structure in which elements can be inserted or deleted at/from both ends but not in the
middle is?
a) Queue b) Circular queue c) Deque d) Priority queue
13. What will be the height of a balanced full binary tree with 8 leaves?
a) 8 b) 5 c) 6 d) 4
14. A graph with all vertices having equal degree is known as a _______ Graph.
a) Multi b) Regular c) Simple d) Complete
15. In _______ search, the search starts at the beginning of the list and check every element in the
list.
a) Linear b) Binary c) Hash d) Binary tree
17. Which algorithm strategy builds up a solution by choosing the option that looks the best at every
step.
a) Greedy method b) Branch and bound method
c) Dynamic programming d) Divide and conquer
18. __________ enumerates a list of promising nodes that could be computed to give the possible
solutions of a given problem.
a) Exhaustive search b) Brute force
c) Backtracking d) Divide and conquer
20. Two main measures for finding efficiency of an algorithm are _________.
a) Time and space complexity b) Data and space rate
c) Processor and memory speed d) Complexity and capacity
21. In which of the following formats data is stored in the database management system?
a) Image b) Text c) Table d) Graph
22. The ability to query data, as well as insert, delete, and alter tuples, is offered by ____________.
a) TCL (Transaction Control Language) b) DCL (Data Control Language)
c) DDL (Data Definition Language) d) DML (Data Manipulation Language)
23. ______ is a set of one or more attributes taken collectively to uniquely identify a record.
a) Primary Key b) Foreign key c) Super key d) Candidate key
25. In the ________ normal form, a composite attribute is converted to individual attributes.
a) First b) Second c) Third d) Fourth
Page 2 of 4
27. A process which is copied from main memory to secondary memory on the basis of requirement
is known as __________.
a) Demand paging b) Paging c) Threads d) Segmentation
28. A systematic procedure for moving the CPU to new process is known as __________.
a) Synchronization b) Deadlock c) Starvation d) Context Switching
29. To access the services of operating system, the interface is provided by ____________.
a) System Calls b) API c) Library d) Assembly Instructions
30. Which command is used for printing the current working directory?
a) dir b) HOME c) cd d) pwd
35. Identify among the following the network device used to connect two dissimilar types of
networks.
a) Switch b) Hub c) Bridge d) Gateway
39. Which model can be selected if user is involved in all the phases of SDLC?
a) Waterfall Model b) Prototyping Model
c) RAD Model d) Both Prototyping Model & RAD Model
40. ________ is an “umbrella” activity that is applied throughout the software engineering process.
a) Debugging b) Testing c) Designing d) Software quality assurance
42. What is the size of the „int‟ data type (in bytes) in C?
a) 4 b) 8 c) 2 d) 1
43. The C++ code which causes abnormal termination/behaviour of a program should be written
under _________ block.
a) catch b) try c) throw d) finally
Page 3 of 4
44. Which concept allows you to reuse the written code in C++?
a) Inheritance b) Polymorphism c) Abstraction d) Encapsulation
46. Which of the following is defined as the process of elimination of parts of a scene outside a
window or a viewport?
a) editing b) cutting c) plucking d) clipping
47. Which of the following operations can be used to zoom in or out around any axis on a three-
dimensional object from its original position?
a) Rotation b) Shearing c) Scaling d) Translation
49. The combination of text, graphics art, sound, animation and video delivered by computer or
other electronic devices is called ________.
a) Multimedia b) Hyper media c) Visual media d) None of the above
Page 4 of 4