0% found this document useful (0 votes)
30 views36 pages

Ce MCQ

The document contains a comprehensive examination covering topics in digital circuits and data structures and algorithms. It includes multiple-choice questions with correct answers provided for each question, addressing concepts such as binary numbers, logic gates, memory elements, and algorithm complexities. The examination tests knowledge on various digital components and algorithmic strategies.

Uploaded by

joelroys637
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views36 pages

Ce MCQ

The document contains a comprehensive examination covering topics in digital circuits and data structures and algorithms. It includes multiple-choice questions with correct answers provided for each question, addressing concepts such as binary numbers, logic gates, memory elements, and algorithm complexities. The examination tests knowledge on various digital components and algorithmic strategies.

Uploaded by

joelroys637
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

COMPREHENSIVE EXAMINATION

DCF

1. Which of the following is a valid binary number?

o A) 10101

o B) 20201

o C) 2A01

o D) 1010B

o Answer: A) 10101

2. Which of the following logic gates is known as the "universal gate"?

o A) AND Gate

o B) OR Gate

o C) NOT Gate

o D) NAND Gate

o Answer: D) NAND Gate

3. What is the result of an AND operation between 1101 and 1011?

o A) 1111

o B) 1001

o C) 1010

o D) 1000

o Answer: B) 1001

4. Which arithmetic circuit is used to perform addition and subtraction of binary numbers?

o A) Half adder

o B) Full adder

o C) Subtractor

o D) Multiplier

o Answer: B) Full adder

5. Which of the following is the main function of a multiplexer?

o A) To increase data rate

o B) To select one of many input lines


o C) To store data

o D) To decode data

o Answer: B) To select one of many input lines

6. What is the function of a demultiplexer?

o A) To combine several inputs into one output

o B) To select one input from many outputs

o C) To distribute one input to many outputs

o D) To add binary numbers

o Answer: C) To distribute one input to many outputs

7. Which of the following is an example of a combinational logic circuit?

o A) Flip-flop

o B) Multiplexer

o C) Counter

o D) Register

o Answer: B) Multiplexer

8. Which type of encoder converts an active input line into its corresponding binary code?

o A) Decimal to binary encoder

o B) Priority encoder

o C) Octal encoder

o D) BCD encoder

o Answer: B) Priority encoder

9. What is the purpose of a decoder in digital circuits?

o A) To encode data into binary form

o B) To convert binary data into readable output

o C) To convert a binary code into its corresponding output line

o D) To store binary data

o Answer: C) To convert a binary code into its corresponding output line

10. Which of the following is used for sequential logic design?

• A) AND gate
• B) NOR gate

• C) Flip-flops

• D) XOR gate

• Answer: C) Flip-flops

11. What is the function of a D flip-flop?

• A) Stores one bit of data

• B) Adds binary numbers

• C) Decodes binary input

• D) Multiplies binary numbers

• Answer: A) Stores one bit of data

12. Which number system uses digits from 0 to 7?

• A) Binary

• B) Octal

• C) Decimal

• D) Hexadecimal

• Answer: B) Octal

13. In which number system is the base 16 used?

• A) Binary

• B) Octal

• C) Decimal

• D) Hexadecimal

• Answer: D) Hexadecimal

14. Which logic gate gives the output 1 when all inputs are different?

• A) AND gate

• B) OR gate

• C) XOR gate

• D) NOR gate

• Answer: C) XOR gate

15. Which of the following represents the binary number 1101 in decimal?
• A) 13

• B) 14

• C) 15

• D) 16

• Answer: A) 13

16. Which circuit is used to perform multiplication in binary?

• A) Multiplier circuit

• B) Adder circuit

• C) Shift register

• D) Encoder

• Answer: A) Multiplier circuit

17. What is the maximum number of inputs for a 4-to-1 multiplexer?

• A) 1

• B) 2

• C) 4

• D) 16

• Answer: C) 4

18. What is the function of a shift register?

• A) To add numbers

• B) To store and shift data

• C) To multiply numbers

• D) To decode binary input

• Answer: B) To store and shift data

19. Which of the following is a sequential circuit that has memory?

• A) AND gate

• B) Flip-flop

• C) XOR gate

• D) Multiplexer

• Answer: B) Flip-flop
20. Which type of memory element stores data temporarily and is used in counters and
registers?

• A) Flip-flop

• B) Latch

• C) Register

• D) All of the above

• Answer: D) All of the above

21. Which of the following is true about a half adder?

• A) It adds two binary numbers and produces a sum and carry output.

• B) It adds three binary numbers.

• C) It produces only a sum output.

• D) It adds more than two binary numbers.

• Answer: A) It adds two binary numbers and produces a sum and carry output.

22. Which of the following is the basic unit of storage in memory circuits?

• A) Bit

• B) Byte

• C) Word

• D) Word register

• Answer: A) Bit

23. Which gate is represented by the following truth table: 1, 0, 1, 0?

• A) AND gate

• B) OR gate

• C) XOR gate

• D) NAND gate

• Answer: C) XOR gate

24. Which logic gate has the following truth table: 0, 1, 1, 1?

• A) AND gate

• B) OR gate

• C) NOT gate
• D) NOR gate

• Answer: B) OR gate

25. How many input lines are required for an 8-to-1 multiplexer?

• A) 8

• B) 3

• C) 2

• D) 1

• Answer: B) 3

26. What is the output of a 2-input NAND gate if both inputs are 1?

• A) 0

• B) 1

• C) Undefined

• D) 2

• Answer: A) 0

27. Which of the following is a primary use of flip-flops in digital circuits?

• A) Memory storage

• B) Data conversion

• C) Multiplexing

• D) Data transmission

• Answer: A) Memory storage

28. What does a priority encoder do?

• A) Converts a priority input into binary code

• B) Converts binary data to decimal form

• C) Encodes a data stream into digital format

• D) Determines the highest priority input and encodes it

• Answer: D) Determines the highest priority input and encodes it

29. Which number system is used in digital circuits to simplify logic design?

• A) Binary

• B) Decimal
• C) Octal

• D) Hexadecimal

• Answer: A) Binary

30. Which of the following is the result of the binary addition of 1011 and 1101?

• A) 11000

• B) 11010

• C) 10000

• D) 11111

• Answer: A) 11000

31. Which of the following gates has the property of being true when at least one input is
true?

• A) NAND gate

• B) NOR gate

• C) AND gate

• D) OR gate

• Answer: D) OR gate

32. What is the main function of a full adder?

• A) To add two binary digits and a carry input

• B) To subtract binary numbers

• C) To divide binary numbers

• D) To multiply binary numbers

• Answer: A) To add two binary digits and a carry input

33. Which of the following is used in a binary multiplication circuit?

• A) AND gate

• B) XOR gate

• C) OR gate

• D) NOT gate

• Answer: A) AND gate

34. How many states are there in a 2-bit counter?


• A) 2

• B) 4

• C) 6

• D) 8

• Answer: B) 4

35. What is the purpose of a register in a digital circuit?

• A) To store data

• B) To perform calculations

• C) To decode data

• D) To multiply data

• Answer: A) To store data

36. Which type of memory element stores a bit of data for an indefinite period until it is
explicitly cleared?

• A) Latch

• B) Flip-flop

• C) Register

• D) All of the above

• Answer: B) Flip-flop

37. Which of the following is an example of a combinational logic circuit?

• A) Flip-flop

• B) Multiplexer

• C) Counter

• D) Register

• Answer: B) Multiplexer

38. Which logic gate has an output of 1 only when both inputs are the same?

• A) XOR gate

• B) AND gate

• C) NOR gate

• D) XNOR gate
• Answer: D) XNOR gate

39. Which of the following represents the decimal number 12 in binary?

• A) 1010

• B) 1101

• C) 1001

• D) 1100

• Answer: D) 1100

40. What is the output of a 3-input AND gate when all inputs are 1?

• A) 1

• B) 0

• C) Undefined

• D) 2

• Answer: A) 1

41. Which of the following is NOT a characteristic of a flip-flop?

• A) Stores a single bit of data

• B) Has a feedback loop

• C) Affects the output only on a clock edge

• D) Performs binary arithmetic operations

• Answer: D) Performs binary arithmetic operations

42. What is the function of a half subtractor in digital circuits?

• A) To add two binary digits

• B) To subtract two binary digits

• C) To multiply binary numbers

• D) To divide binary numbers

• Answer: B) To subtract two binary digits

43. What type of flip-flop has both the SET and RESET inputs?

• A) D flip-flop

• B) JK flip-flop

• C) T flip-flop
• D) SR flip-flop

• Answer: D) SR flip-flop

44. Which of the following can be used to perform binary to BCD conversion?

• A) Decoder

• B) Encoder

• C) Shift register

• D) Binary to BCD converter

• Answer: D) Binary to BCD converter

45. What is the key characteristic of sequential logic circuits?

• A) Output depends only on current inputs

• B) Output depends on previous inputs and current inputs

• C) Output is always zero

• D) Output is determined by external signals

• Answer: B) Output depends on previous inputs and current inputs

46. Which of the following gates performs the logical operation of "not AND"?

• A) NAND gate

• B) NOR gate

• C) XOR gate

• D) AND gate

• Answer: A) NAND gate

47. What is the binary result of the addition of 1110 and 1011?

• A) 10101

• B) 10001

• C) 11001

• D) 11101

Answer: A) 10101

48. Which of the following is the primary use of an encoder in digital circuits?

• A) To encode a priority signal into binary form

• B) To decode data into a readable format


• C) To add binary numbers

• D) To store data

Answer: A) To encode a priority signal into binary form

49. What is the function of the NOT gate?

• A) It inverts the input signal

• B) It passes the input signal unchanged

• C) It adds binary digits

• D) It multiplies binary digits

Answer: A) It inverts the input signal

50. Which of the following is the main difference between a latch and a flip-flop?

• A) A latch is level-triggered, while a flip-flop is edge-triggered

• B) A flip-flop is level-triggered, while a latch is edge-triggered

• C) A flip-flop stores multiple bits, while a latch stores only one bit

• D) A latch has no feedback loop, while a flip-flop does

Answer: A) A latch is level-triggered, while a flip-flop is edge-triggered

DSA

Data Structures and Algorithms

1. Which of the following is the correct order of elements in a stack (LIFO)?

o A) First In First Out

o B) Last In First Out

o C) First Come First Serve

o D) Random Access

o Answer: B) Last In First Out

2. Which operation is used to remove an element from the top of the stack?

o A) Enqueue

o B) Dequeue

o C) Push
o D) Pop

o Answer: D) Pop

3. What is the time complexity of searching for an element in a binary search tree (BST)?

o A) O(n)

o B) O(log n)

o C) O(n^2)

o D) O(1)

o Answer: B) O(log n)

4. Which of the following sorting algorithms has the best average case time complexity?

o A) Bubble Sort

o B) Quick Sort

o C) Selection Sort

o D) Insertion Sort

o Answer: B) Quick Sort

5. Which of the following algorithms uses a divide-and-conquer approach?

o A) Merge Sort

o B) Bubble Sort

o C) Selection Sort

o D) Linear Search

o Answer: A) Merge Sort

6. Which algorithm is based on the idea of breaking a problem into smaller subproblems
and solving them recursively?

o A) Dynamic Programming

o B) Divide and Conquer

o C) Greedy Algorithm

o D) Backtracking

o Answer: B) Divide and Conquer

7. Which of the following is a heuristic approach used for optimization problems?

o A) Binary Search
o B) Hill Climbing

o C) Quick Sort

o D) Merge Sort

o Answer: B) Hill Climbing

8. What is the base case of recursion?

o A) A recursive call

o B) A condition that stops further recursion

o C) A loop

o D) A function that calls itself

o Answer: B) A condition that stops further recursion

9. Which of the following is the backtracking technique used for solving problems like
puzzles or games?

o A) Dynamic Programming

o B) Depth-First Search

o C) Recursion

o D) Backtrack Programming

o Answer: D) Backtrack Programming

10. Which of the following is true about recursion in algorithms?

o A) It always reduces the problem size by 1

o B) It calls a function without returning control

o C) It may result in an infinite loop if the base case is not defined

o D) It always solves the problem in linear time

o Answer: C) It may result in an infinite loop if the base case is not defined

Database Systems

11. Which of the following is a valid definition of a database?

o A) A collection of tables with rows and columns

o B) A group of interconnected applications

o C) A set of data files


o D) A collection of algorithms for data retrieval

o Answer: A) A collection of tables with rows and columns

12. Which of the following tasks is the responsibility of a Database Administrator (DBA)?

o A) Designing user interfaces

o B) Writing applications using SQL

o C) Managing database security and performance

o D) Writing database queries

o Answer: C) Managing database security and performance

13. Which of the following is the correct definition of normalization in databases?

o A) Process of designing efficient queries

o B) Process of combining data from multiple tables

o C) Process of organizing data to reduce redundancy

o D) Process of adding indices to speed up queries

o Answer: C) Process of organizing data to reduce redundancy

14. Which of the following is a benefit of using the Entity-Relationship (ER) model?

o A) It helps in defining the relationships between entities

o B) It creates physical storage structures

o C) It simplifies the process of writing SQL queries

o D) It reduces the number of tables in the database

o Answer: A) It helps in defining the relationships between entities

15. Which of the following SQL commands is used to retrieve data from a database?

o A) SELECT

o B) INSERT

o C) DELETE

o D) UPDATE

o Answer: A) SELECT

16. What does the Structured Query Language (SQL) 'WHERE' clause do?

o A) Specifies the table from which data should be selected

o B) Filters records based on a condition


o C) Groups the records based on a condition

o D) Limits the number of records retrieved

o Answer: B) Filters records based on a condition

17. Which of the following is a Procedural Language used in database systems?

o A) PL/SQL

o B) SQL

o C) NoSQL

o D) DDL

o Answer: A) PL/SQL

18. Which of the following is an example of an exception handler in databases?

o A) Trigger

o B) Constraint

o C) Stored Procedure

o D) Error message

o Answer: D) Error message

19. Which of the following best describes the architecture of a Hierarchical Database
Management System (DBMS)?

o A) Data is organized in tables with rows and columns

o B) Data is organized in a tree-like structure with parent-child relationships

o C) Data is stored in a key-value store

o D) Data is stored in a graph-like structure with nodes and edges

o Answer: B) Data is organized in a tree-like structure with parent-child relationships

20. Which of the following is true about a database index?

o A) It reduces the size of the database

o B) It speeds up data retrieval

o C) It stores data permanently

o D) It can only be used for numeric data types

o Answer: B) It speeds up data retrieval


Data Structures and Algorithms

21. Which data structure is used to implement recursion?

• A) Queue

• B) Stack

• C) Linked List

• D) Array

• Answer: B) Stack

22. What is the best case time complexity of the Quick Sort algorithm?

• A) O(n log n)

• B) O(n)

• C) O(n^2)

• D) O(1)

• Answer: A) O(n log n)

23. What is the worst-case time complexity of Merge Sort?

• A) O(n)

• B) O(n log n)

• C) O(n^2)

• D) O(1)

• Answer: B) O(n log n)

24. Which of the following search algorithms is the most efficient for searching a sorted
array?

• A) Linear Search

• B) Binary Search

• C) Jump Search

• D) Exponential Search

• Answer: B) Binary Search

25. Which data structure uses the FIFO (First In, First Out) principle?

• A) Stack

• B) Queue
• C) Linked List

• D) Tree

• Answer: B) Queue

26. What is the space complexity of Quick Sort in the worst case?

• A) O(log n)

• B) O(n)

• C) O(n log n)

• D) O(1)

• Answer: B) O(n)

27. Which of the following is a characteristic of a greedy algorithm?

• A) It always provides an optimal solution

• B) It considers all possible solutions before making a decision

• C) It chooses the best option available at the moment

• D) It uses recursion to solve problems

• Answer: C) It chooses the best option available at the moment

28. In which scenario would you use the Backtracking algorithm?

• A) Solving optimization problems

• B) Searching for a specific element in an array

• C) Solving constraint satisfaction problems like puzzles

• D) Sorting an unsorted array

• Answer: C) Solving constraint satisfaction problems like puzzles

29. Which of the following is an example of a Divide and Conquer algorithm?

• A) Binary Search

• B) Quick Sort

• C) Merge Sort

• D) All of the above

• Answer: D) All of the above

30. Which of the following algorithms is used for solving the "Knapsack Problem"?

• A) Divide and Conquer


• B) Greedy Algorithm

• C) Dynamic Programming

• D) Backtracking

• Answer: C) Dynamic Programming

Database Systems

21. Which of the following SQL statements is used to update existing data in a table?

• A) INSERT

• B) UPDATE

• C) DELETE

• D) SELECT

• Answer: B) UPDATE

22. Which of the following is a key feature of the Entity-Relationship (ER) model?

• A) It represents real-world entities and their relationships

• B) It helps in writing efficient SQL queries

• C) It directly manages the physical storage of data

• D) It is used for data retrieval in hierarchical databases

• Answer: A) It represents real-world entities and their relationships

23. Which of the following is the correct normalization process step for converting a table
to 1NF (First Normal Form)?

• A) Remove transitive dependencies

• B) Ensure atomicity of values

• C) Eliminate partial dependencies

• D) Remove redundant data

• Answer: B) Ensure atomicity of values

24. What is the primary purpose of an Index in a database?

• A) To store the data permanently

• B) To speed up the retrieval of records

• C) To perform data validation


• D) To establish referential integrity

• Answer: B) To speed up the retrieval of records

25. What type of relationship does a "1:N" (One to Many) cardinality represent in an ER
diagram?

• A) One entity in one table is related to one entity in another table

• B) One entity in one table is related to many entities in another table

• C) Many entities in one table are related to one entity in another table

• D) Many entities in one table are related to many entities in another table

• Answer: B) One entity in one table is related to many entities in another table

26. Which of the following is true about a Foreign Key in a relational database?

• A) It uniquely identifies a record in a table

• B) It is used to enforce referential integrity between tables

• C) It stores data permanently in the database

• D) It is used to join tables in SQL queries

• Answer: B) It is used to enforce referential integrity between tables

27. Which SQL command is used to delete a table from a database?

• A) REMOVE

• B) DELETE

• C) DROP

• D) TRUNCATE

• Answer: C) DROP

28. What is the purpose of the 'GROUP BY' clause in SQL?

• A) To select multiple tables in a single query

• B) To filter records based on a condition

• C) To aggregate data into groups

• D) To update existing records in a table

• Answer: C) To aggregate data into groups

29. Which of the following is a feature of the Relational Database Management System
(RDBMS)?
• A) It uses a tree structure for data storage

• B) It stores data in tables with rows and columns

• C) It can only store text data

• D) It does not support SQL queries

• Answer: B) It stores data in tables with rows and columns

30. Which of the following is the primary role of a Database Management System (DBMS)?

• A) It stores data in the cloud

• B) It manages the interaction between the database and applications

• C) It provides a user interface for querying data

• D) It organizes data in the form of entities and attributes

• Answer: B) It manages the interaction between the database and applications

Programming in C

Programming in C

1. Which of the following is a valid declaration of an array in C?

o A) int arr(5);

o B) int arr[5];

o C) array[5] int;

o D) int[5] arr;

o Answer: B) int arr[5];

2. What is the purpose of the 'break' statement in a loop in C?

o A) It skips the current iteration and moves to the next iteration

o B) It exits the loop completely

o C) It pauses the execution of the program

o D) It stops the execution of the program

o Answer: B) It exits the loop completely

3. Which of the following functions is used to get input from the user in C?

o A) scanf()

o B) printf()
o C) input()

o D) get_input()

o Answer: A) scanf()

4. What is the return type of a function that does not return any value in C?

o A) void

o B) int

o C) char

o D) float

o Answer: A) void

5. In C, what is the size of an integer variable?

o A) 2 bytes

o B) 4 bytes

o C) 8 bytes

o D) 16 bytes

o Answer: B) 4 bytes

Object-Oriented Programming (OOP)

6. What is a constructor in object-oriented programming?

o A) A function that returns the object's reference

o B) A special function used to initialize an object

o C) A method that destroys the object

o D) A method that copies data from one object to another

o Answer: B) A special function used to initialize an object

7. What is the purpose of a destructor in C++?

o A) To initialize an object

o B) To copy the object’s data

o C) To free resources before the object is destroyed

o D) To create an object from a class

o Answer: C) To free resources before the object is destroyed


8. Which concept allows a class to inherit attributes and methods from another class in
OOP?

o A) Encapsulation

o B) Abstraction

o C) Inheritance

o D) Polymorphism

o Answer: C) Inheritance

9. Which of the following is an example of function overloading in C++?

o A) Defining two functions with the same name but different parameter types

o B) Using different names for each function

o C) Using the same function name with no parameters

o D) Defining functions in different classes with the same name

o Answer: A) Defining two functions with the same name but different parameter types

10. Which keyword is used to define a base class in C++ for inheritance?

• A) parent

• B) super

• C) base

• D) class

• Answer: D) class

Discrete Mathematics

11. Which of the following is a graph with no cycles called?

• A) Complete Graph

• B) Bipartite Graph

• C) Directed Acyclic Graph (DAG)

• D) Tree

• Answer: D) Tree

12. Which of the following is true about a directed graph (digraph)?

• A) Edges have no direction


• B) Each edge has an associated direction from one vertex to another

• C) All vertices are connected by an edge

• D) It contains no loops

• Answer: B) Each edge has an associated direction from one vertex to another

13. In graph theory, what is a 'path' defined as?

• A) A sequence of vertices connected by edges

• B) A set of vertices in the graph

• C) A closed loop with no repeated edges

• D) A single vertex in the graph

• Answer: A) A sequence of vertices connected by edges

14. What is the truth value of the logical expression (p ∧ q) ∨ (¬p ∧ r) when p = true, q = false,
and r = true?

• A) True

• B) False

• C) Undefined

• D) Cannot be determined

• Answer: A) True

15. Which of the following is true about a tree in graph theory?

• A) It is a connected graph with no cycles

• B) It can have multiple roots

• C) It is a graph with only directed edges

• D) It is a graph that contains loops

• Answer: A) It is a connected graph with no cycles

Operations Research

16. In Linear Programming Problems (LPP), what does the objective function represent?

• A) A constraint that limits the decision variables

• B) The goal of the optimization (e.g., maximizing or minimizing)

• C) The resources required for a solution


• D) A condition for feasibility

• Answer: B) The goal of the optimization (e.g., maximizing or minimizing)

17. Which of the following is a characteristic of a feasible solution in LPP?

• A) It satisfies all the objective functions

• B) It satisfies all the constraints of the problem

• C) It violates at least one constraint

• D) It is the optimal solution

• Answer: B) It satisfies all the constraints of the problem

18. Which method is commonly used to solve the transportation problem in operations
research?

• A) Simplex Method

• B) Hungarian Method

• C) North-West Corner Method

• D) Least Cost Method

• Answer: C) North-West Corner Method

19. In project scheduling, which technique is used to determine the minimum time required
to complete a project with multiple dependent tasks?

• A) PERT (Program Evaluation Review Technique)

• B) Gantt Chart

• C) Monte Carlo Simulation

• D) Critical Path Method (CPM)

• Answer: D) Critical Path Method (CPM)

20. What is the key feature of the assignment problem in operations research?

• A) It involves assigning jobs to workers to minimize the total cost or maximize profit

• B) It involves determining the optimal sequence of jobs for a single worker

• C) It deals with finding the maximum flow in a network

• D) It aims to schedule tasks to minimize project duration

• Answer: A) It involves assigning jobs to workers to minimize the total cost or maximize profit
OPERATING SYSTEMS

Operating Systems

1. Which of the following is the primary role of an operating system?

o A) To execute user applications directly

o B) To manage hardware resources and provide services for software applications

o C) To control the flow of data in a network

o D) To monitor user activities on the computer

o Answer: B) To manage hardware resources and provide services for software


applications

2. Which of the following components is not part of the computer system architecture?

o A) CPU

o B) Memory

o C) Disk Storage

o D) Compiler

o Answer: D) Compiler

3. What is the purpose of the kernel in an operating system?

o A) To manage the system’s graphical user interface

o B) To manage hardware and system resources such as CPU, memory, and devices

o C) To execute user-level applications

o D) To provide network services

o Answer: B) To manage hardware and system resources such as CPU, memory, and
devices

4. Which operating system structure uses both a monolithic kernel and microservices?

o A) Microkernel structure

o B) Hybrid structure

o C) Layered structure

o D) Monolithic structure

o Answer: B) Hybrid structure

5. What is the main goal of process scheduling in an operating system?


o A) To manage memory allocation

o B) To ensure that each process gets the CPU for a specific amount of time

o C) To assign priorities to processes

o D) To create and terminate processes

o Answer: B) To ensure that each process gets the CPU for a specific amount of time

Process Concept and Scheduling

6. Which of the following is true about a process in an operating system?

o A) A process is a program that is not currently executing

o B) A process is an instance of a running program that is managed by the operating


system

o C) A process is a physical device used for data storage

o D) A process cannot be terminated once started

o Answer: B) A process is an instance of a running program that is managed by the


operating system

7. In which CPU scheduling algorithm does the process with the smallest burst time get
the CPU next?

o A) Round Robin

o B) Shortest Job First (SJF)

o C) First Come First Serve (FCFS)

o D) Priority Scheduling

o Answer: B) Shortest Job First (SJF)

8. Which of the following is the correct order of process states in a typical operating
system?

o A) New -> Ready -> Running -> Blocked -> Terminated

o B) Running -> Ready -> Blocked -> New -> Terminated

o C) New -> Running -> Blocked -> Ready -> Terminated

o D) Ready -> New -> Blocked -> Running -> Terminated

o Answer: A) New -> Ready -> Running -> Blocked -> Terminated
9. Which of the following is a process that is temporarily removed from the running queue
and placed in a waiting queue?

o A) Blocked Process

o B) Ready Process

o C) Running Process

o D) Zombie Process

o Answer: A) Blocked Process

10. In which scheduling algorithm does each process get an equal share of the CPU time,
rotating in a circular order?

• A) Round Robin

• B) Shortest Job First

• C) First Come First Serve

• D) Multilevel Queue Scheduling

• Answer: A) Round Robin

Memory Management

11. Which memory allocation method divides memory into fixed-size partitions and
allocates them to processes?

• A) Paging

• B) Segmentation

• C) Contiguous Memory Allocation

• D) Virtual Memory

• Answer: C) Contiguous Memory Allocation

12. In which memory management scheme are processes divided into fixed-size blocks
called pages?

• A) Segmentation

• B) Virtual Memory

• C) Paging

• D) Contiguous Memory Allocation

• Answer: C) Paging
13. Which of the following is a disadvantage of contiguous memory allocation?

• A) External fragmentation

• B) Internal fragmentation

• C) Complex memory management

• D) High overhead for memory allocation

• Answer: A) External fragmentation

14. What is the main purpose of segmentation in memory management?

• A) To reduce fragmentation

• B) To allow the system to allocate memory dynamically based on logical divisions

• C) To create multiple address spaces

• D) To implement virtual memory

• Answer: B) To allow the system to allocate memory dynamically based on logical divisions

15. Which memory management technique allows a process to access more memory than
is physically available by using a portion of the disk as if it were RAM?

• A) Virtual Memory

• B) Segmentation

• C) Paging

• D) Contiguous Allocation

• Answer: A) Virtual Memory

Virtual Memory

16. In demand paging, what happens when a page fault occurs?

• A) The process is suspended

• B) The page is loaded from disk into memory

• C) The program terminates

• D) The CPU is restarted

• Answer: B) The page is loaded from disk into memory

17. Which of the following is a major disadvantage of virtual memory?

• A) Increased CPU performance


• B) External fragmentation

• C) Page faults leading to overhead and slow performance

• D) Simplified memory management

• Answer: C) Page faults leading to overhead and slow performance

18. What is the primary function of a page table in a virtual memory system?

• A) It tracks the location of processes in memory

• B) It maps virtual addresses to physical addresses

• C) It manages memory fragmentation

• D) It stores data that is not currently in use

• Answer: B) It maps virtual addresses to physical addresses

19. Which of the following is used to reduce page fault rate in virtual memory?

• A) FIFO (First-In-First-Out) Page Replacement Algorithm

• B) Least Recently Used (LRU) Page Replacement Algorithm

• C) Optimal Page Replacement Algorithm

• D) All of the above

• Answer: D) All of the above

20. What is the term for a situation where a computer's performance slows down due to too
many page faults?

• A) Thrashing

• B) Fragmentation

• C) Deadlock

• D) Segmentation Fault

• Answer: A) Thrashing

File Concepts and Protection

21. What is the function of a file system?

• A) To store data in the main memory

• B) To manage file storage and retrieval on disk

• C) To protect files from unauthorized access


• D) To manage file operations in the user space

• Answer: B) To manage file storage and retrieval on disk

22. Which of the following is a key feature of a directory structure in an operating system?

• A) It organizes files in a hierarchical structure for easy navigation

• B) It encrypts file data for security

• C) It stores files in contiguous blocks of memory

• D) It automatically backs up files to an external device

• Answer: A) It organizes files in a hierarchical structure for easy navigation

23. Which of the following is a security measure used to protect files in an operating
system?

• A) Encryption

• B) User permissions

• C) File access control lists (ACLs)

• D) All of the above

• Answer: D) All of the above

24. What is the purpose of a file access control list (ACL)?

• A) To allocate space for files

• B) To manage the directory structure

• C) To define who can access a file and the types of operations they can perform

• D) To back up files periodically

• Answer: C) To define who can access a file and the types of operations they can perform

25. Which of the following is a benefit of a linked allocation file system?

• A) It reduces fragmentation

• B) It allows fast access to files stored on disk

• C) It ensures all files are stored in contiguous blocks

• D) It makes file access time predictable

• Answer: A) It reduces fragmentation


COMPUTER NETWORKS

Data Communication and Networks

1. What is the primary function of a data communication system?

o A) To manage network security

o B) To exchange data between devices

o C) To control the flow of data on a network

o D) To store data on remote servers

o Answer: B) To exchange data between devices

2. Which of the following is a key difference between analog and digital communication?

o A) Analog signals are represented by binary digits, while digital signals use
continuous waves

o B) Analog communication uses continuous signals, while digital communication


uses discrete signals

o C) Digital communication is slower than analog communication

o D) Analog signals are more robust to noise than digital signals

o Answer: B) Analog communication uses continuous signals, while digital


communication uses discrete signals

3. Which of the following is a disadvantage of analog signals?

o A) They can be easily encoded for secure transmission

o B) They are less susceptible to noise and distortion

o C) They suffer from signal degradation over long distances

o D) They require more bandwidth than digital signals

o Answer: C) They suffer from signal degradation over long distances

4. Which of the following types of signal is used in digital communication?

o A) Continuous sine waves

o B) Discrete pulses or voltage levels

o C) Analog waveforms

o D) Radio waves

o Answer: B) Discrete pulses or voltage levels


Transmission Impairment

5. What is the main cause of transmission impairment in data communication?

o A) Network congestion

o B) Noise and distortion

o C) Low-frequency signals

o D) High data rates

o Answer: B) Noise and distortion

6. Which of the following is a common method of mitigating transmission impairments?

o A) Error detection and correction

o B) Reducing the signal frequency

o C) Increasing the transmission speed

o D) Using analog modulation

o Answer: A) Error detection and correction

Data Link Layer: Error Detection and Correction

7. What is the primary function of the data link layer in the OSI model?

o A) To route data between different networks

o B) To ensure reliable communication over a physical link

o C) To encrypt data for secure transmission

o D) To manage congestion in the network

o Answer: B) To ensure reliable communication over a physical link

8. Which of the following is an example of error detection in the data link layer?

o A) Parity bit

o B) IP address

o C) TCP checksum

o D) Sequence number

o Answer: A) Parity bit

9. Which error detection technique is most commonly used in Ethernet networks?

o A) CRC (Cyclic Redundancy Check)


o B) Checksum

o C) Hamming code

o D) Parity bit

o Answer: A) CRC (Cyclic Redundancy Check)

10. Which method is used for error correction in the data link layer?

• A) Forward Error Correction (FEC)

• B) Retransmission requests

• C) Both A and B

• D) Data compression

• Answer: C) Both A and B

Wired LAN: IEEE Standards and Standard Ethernet

11. Which IEEE standard defines the specifications for Ethernet?

• A) IEEE 802.11

• B) IEEE 802.3

• C) IEEE 802.5

• D) IEEE 802.15

• Answer: B) IEEE 802.3

12. Which of the following is true about Standard Ethernet (IEEE 802.3)?

• A) It is a wireless LAN standard

• B) It uses coaxial cables for data transmission

• C) It uses the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) protocol

• D) It is limited to 10 Mbps data transfer speeds

• Answer: C) It uses the CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
protocol

13. What type of topology does Standard Ethernet use?

• A) Star topology

• B) Bus topology

• C) Ring topology
• D) Mesh topology

• Answer: B) Bus topology

Wireless LAN

14. Which IEEE standard defines wireless LAN (WLAN) specifications?

• A) IEEE 802.3

• B) IEEE 802.5

• C) IEEE 802.11

• D) IEEE 802.15

• Answer: C) IEEE 802.11

15. Which of the following is a characteristic of Wireless LAN (WLAN)?

• A) It uses physical cables to transmit data

• B) It operates in the 2.4 GHz and 5 GHz frequency bands

• C) It uses CSMA/CD to control access to the medium

• D) It only supports data rates up to 10 Mbps

• Answer: B) It operates in the 2.4 GHz and 5 GHz frequency bands

16. Which protocol is commonly used in WLANs for authentication and encryption?

• A) HTTP

• B) SSL/TLS

• C) WPA/WPA2

• D) FTP

• Answer: C) WPA/WPA2

Transport Layer

17. Which of the following is the main responsibility of the transport layer in the OSI model?

• A) Establishing, maintaining, and terminating connections between hosts

• B) Routing data between different networks

• C) Ensuring data is delivered reliably and in order

• D) Managing network congestion


• Answer: C) Ensuring data is delivered reliably and in order

18. Which protocol is used in the transport layer for reliable communication between
processes?

• A) TCP (Transmission Control Protocol)

• B) IP (Internet Protocol)

• C) UDP (User Datagram Protocol)

• D) ICMP (Internet Control Message Protocol)

• Answer: A) TCP (Transmission Control Protocol)

19. Which transport layer protocol is best suited for applications that require low latency
and can tolerate some data loss, such as online gaming?

• A) TCP

• B) UDP

• C) FTP

• D) HTTP

• Answer: B) UDP

Application Layer

20. Which layer of the OSI model handles end-user services like web browsing and email?

• A) Transport Layer

• B) Data Link Layer

• C) Application Layer

• D) Network Layer

• Answer: C) Application Layer

21. What is the main function of the Domain Name System (DNS) in the Internet?

• A) To route data packets between devices

• B) To assign IP addresses to domain names

• C) To handle data encryption and decryption

• D) To establish communication sessions between devices

• Answer: B) To assign IP addresses to domain names


22. Which protocol is primarily used for retrieving web pages in the World Wide Web?

• A) DNS

• B) FTP

• C) HTTP

• D) Telnet

• Answer: C) HTTP

23. Which version of HTTP introduced support for persistent connections, where multiple
requests and responses can be sent over the same connection?

• A) HTTP/1.0

• B) HTTP/1.1

• C) HTTP/2

• D) HTTP/3

• Answer: B) HTTP/1.1

You might also like