COMPUTER SCIENCE - PAGE 1
1. In a BST, the traversal type which would print the values in the nodes in sorted order is.
(a). Preorder
(b). Inorder
(c). Postorder
(d). None of the above
Answer: Option-B
2. Among the following statements about binary trees which one is NOT true?
(a). Every non-empty tree has exactly one root node.
(b). Every non-root node has exactly one parent.
(c). Every binary tree has at least one node.
(d). Every node has at most two children.
Answer: Option-C
3. DRAM is used as main memory in a computer system because it
(a). needs refreshing circuitary
(b). consumes less power
(c). has higher speed
(d). has lower cell density
Answer: Option-C
4. A public key encryption system
(a). Allows only the correct receiver to decode the data
(b). Does not encode the data before transmitting it
(c). Allows only the correct sender to decode the data
(d). Allows only one to decode the transmission
Answer: Option-A
5. Environment variables can be accessed by
(a). System programs
(b). C programs
(c). Shell scripts
(d). All of these
Answer: Option-D
6. The interval between the time of submission and completion of a job is called as ___________
(a). Turnaround time
(b). Waiting time
(c). Response time
(d). Throughput
Answer: Option-A
7. DML is used for
(a). Addition of new structures in the database system
(b). Manipulation and processing of database
(c). Definition of physical structure of database system
(d). Description of logical structure of database
Answer: Option-B
8. 8251 is a
(a). UART
(b). USART
(c). Programmable interval timer/counter
(d). Programmable Interrupt Controller
Answer: Option-B
9. Suppose that N = {1, 2, 3, ...} be ordered by divisibility, which one of the following subset is totally ordered?
(a). (2, 6, 24)4
(b). (4, 15, 30)
(c). (3,5,15)
(d). (2,9,16)
Answer: Option-A
10. The cause for poor response time is
(a). High I/O rates
(b). High paging rates
(c). Process busy
(d). Any of the above
Answer: Option-D
11. The contrapositive of the statement, "You win the game if you know the rules but are not overconfident" is:
(a). If you lose the game then you don't know the rules or you are overconfident.
(b). If you know the rules and are overconfident then you win the game.
(c). A necessary condition that you know the rules or you are not overconfident is that you win the game.
(d). If you dont't know the rules or are overconfident you lose game.
Answer: Option-A
12. The infix expression for the postfix expression x 12 + z 17 y + 42 * / + is:
(a). x + 12 + z / 17 + y * 42
(b). x + 12 + z / (17 + y)*42
(c). (x + 12 + z)/(17 + y * 42)
(d). x + 12 + z / ((17 + y) * 42)
Answer: Option-D
13. Which among the following searching technique takes (1) time to locate a data?
(a). Binary Search
(b). Tree Search
(c). Hashing
(d). Linear Search
Answer: Option-C
14. If L1 be the class of languages accepted by finite state machines and L2 be the class of languages represented by regular expressions then,
(a). L1 ∩ L2 = Φ
(b). L2 ⊆ L1
(c). L1 ⊂ L2
(d). L1 = L2
Answer: Option-D
15. The method adopted by the memory management module of an OS of a computer to periodically collect all the free memory space to form contiguous block of free space is called
(a). Dynamic Memory Allocation
(b). Garbage Collection
(c). Concatenation
(d). Collision
Answer: Option-B
16. The basic types of programmable arrays are made of ________________
(a). AND gates
(b). AND gates and OR gates
(c). OR gates
(d). NAND and NOR gates
Answer: Option-B
17.In which one of the following models can requirements be redefined
(a). Spiral Model
(b). Prototyping Model
(c). Waterfall Model
(d). Evolutionary Model
Answer: Option-B
18. Which among the following statements is false?
(a). The data dictionary contains the name and description of each data element
(b). Data elements in the database can be modified by changing the data dictionary
(c). The data dictionary is a tool used exclusively by the database administrator
(d). Database administrator normally maintains the data dictionary
Answer: Option-B
19. A COCOMO model is
(a). Complete Cost Estimation Model
(b). Constructive Cost Estimation Model
(c). Common Cost Estimation Model
(d). Comprehensive Cost Estimation Model
Answer: Option-B
20. Von Neumann architecture is
(a). SISD
(b). SIMD
(c). MIMD
(d). MISD
Answer: Option-A
21. The device that is used to forward data packets from one network to another is called a _________
(a). Bridge
(b). Hub
(c). Switch
(d). Gateway
Answer: Option-C
22.Which among the following is the most general phrase structured grammar?
(a). Context - Sensitive
(b). Context - Free
(c). Regular
(d). None of the above
Answer: Option-A
23. When the following instructions have been executed, what will be the contents of register AL?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
(a). 0A and carry flag is reset
(b). 0A and carry flag is set
(c). 6A and carry flag is reset
(d). 6A and carry flag is set
Answer: Option-B
24. The first modern computer was called __________
(a). UNIVAC-I
(b). FLOW-MATIC
(c). ENIAC
(d). INTEL
Answer: Option-C
25. Let r be a resource. There are 3 user processes each requiring 2 units of R. Then the minimum number of units of R such that no deadlocks will occur is
(a). 4
(b). 5
(c). 3
(d). 2
Answer: Option-A
(a). Preorder
(b). Inorder
(c). Postorder
(d). None of the above
Answer: Option-B
2. Among the following statements about binary trees which one is NOT true?
(a). Every non-empty tree has exactly one root node.
(b). Every non-root node has exactly one parent.
(c). Every binary tree has at least one node.
(d). Every node has at most two children.
Answer: Option-C
3. DRAM is used as main memory in a computer system because it
(a). needs refreshing circuitary
(b). consumes less power
(c). has higher speed
(d). has lower cell density
Answer: Option-C
4. A public key encryption system
(a). Allows only the correct receiver to decode the data
(b). Does not encode the data before transmitting it
(c). Allows only the correct sender to decode the data
(d). Allows only one to decode the transmission
Answer: Option-A
5. Environment variables can be accessed by
(a). System programs
(b). C programs
(c). Shell scripts
(d). All of these
Answer: Option-D
6. The interval between the time of submission and completion of a job is called as ___________
(a). Turnaround time
(b). Waiting time
(c). Response time
(d). Throughput
Answer: Option-A
7. DML is used for
(a). Addition of new structures in the database system
(b). Manipulation and processing of database
(c). Definition of physical structure of database system
(d). Description of logical structure of database
Answer: Option-B
8. 8251 is a
(a). UART
(b). USART
(c). Programmable interval timer/counter
(d). Programmable Interrupt Controller
Answer: Option-B
9. Suppose that N = {1, 2, 3, ...} be ordered by divisibility, which one of the following subset is totally ordered?
(a). (2, 6, 24)4
(b). (4, 15, 30)
(c). (3,5,15)
(d). (2,9,16)
Answer: Option-A
10. The cause for poor response time is
(a). High I/O rates
(b). High paging rates
(c). Process busy
(d). Any of the above
Answer: Option-D
11. The contrapositive of the statement, "You win the game if you know the rules but are not overconfident" is:
(a). If you lose the game then you don't know the rules or you are overconfident.
(b). If you know the rules and are overconfident then you win the game.
(c). A necessary condition that you know the rules or you are not overconfident is that you win the game.
(d). If you dont't know the rules or are overconfident you lose game.
Answer: Option-A
12. The infix expression for the postfix expression x 12 + z 17 y + 42 * / + is:
(a). x + 12 + z / 17 + y * 42
(b). x + 12 + z / (17 + y)*42
(c). (x + 12 + z)/(17 + y * 42)
(d). x + 12 + z / ((17 + y) * 42)
Answer: Option-D
13. Which among the following searching technique takes (1) time to locate a data?
(a). Binary Search
(b). Tree Search
(c). Hashing
(d). Linear Search
Answer: Option-C
14. If L1 be the class of languages accepted by finite state machines and L2 be the class of languages represented by regular expressions then,
(a). L1 ∩ L2 = Φ
(b). L2 ⊆ L1
(c). L1 ⊂ L2
(d). L1 = L2
Answer: Option-D
15. The method adopted by the memory management module of an OS of a computer to periodically collect all the free memory space to form contiguous block of free space is called
(a). Dynamic Memory Allocation
(b). Garbage Collection
(c). Concatenation
(d). Collision
Answer: Option-B
16. The basic types of programmable arrays are made of ________________
(a). AND gates
(b). AND gates and OR gates
(c). OR gates
(d). NAND and NOR gates
Answer: Option-B
17.In which one of the following models can requirements be redefined
(a). Spiral Model
(b). Prototyping Model
(c). Waterfall Model
(d). Evolutionary Model
Answer: Option-B
18. Which among the following statements is false?
(a). The data dictionary contains the name and description of each data element
(b). Data elements in the database can be modified by changing the data dictionary
(c). The data dictionary is a tool used exclusively by the database administrator
(d). Database administrator normally maintains the data dictionary
Answer: Option-B
19. A COCOMO model is
(a). Complete Cost Estimation Model
(b). Constructive Cost Estimation Model
(c). Common Cost Estimation Model
(d). Comprehensive Cost Estimation Model
Answer: Option-B
20. Von Neumann architecture is
(a). SISD
(b). SIMD
(c). MIMD
(d). MISD
Answer: Option-A
21. The device that is used to forward data packets from one network to another is called a _________
(a). Bridge
(b). Hub
(c). Switch
(d). Gateway
Answer: Option-C
22.Which among the following is the most general phrase structured grammar?
(a). Context - Sensitive
(b). Context - Free
(c). Regular
(d). None of the above
Answer: Option-A
23. When the following instructions have been executed, what will be the contents of register AL?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
(a). 0A and carry flag is reset
(b). 0A and carry flag is set
(c). 6A and carry flag is reset
(d). 6A and carry flag is set
Answer: Option-B
24. The first modern computer was called __________
(a). UNIVAC-I
(b). FLOW-MATIC
(c). ENIAC
(d). INTEL
Answer: Option-C
25. Let r be a resource. There are 3 user processes each requiring 2 units of R. Then the minimum number of units of R such that no deadlocks will occur is
(a). 4
(b). 5
(c). 3
(d). 2
Answer: Option-A
26. The binary equivalent of decimal number 20.625 is
A:-10100.1011
B:-10100.1100
C:-10100.1010
D:-10101.1010
Correct Answer:- Option-C
27. A memory that contains 32K memory requires how many different addresses
A:-32752
B:-32768
C:-32640
D:-31744
Correct Answer:- Option-B
28. An SDRAM chip has 4096 rows, a refresh time of 128ms, the memory bus runs at 166 MHz and the refresh cycle takes 4 clock cycles. The refresh overhead is:
A:-0.00076
B:-0.00770
C:-0.00740
D:-0.00748
Correct Answer:- Option-A
29. What is the address line for RST 4.5?
A:-0028H
B:-0018H
C:-0020H
D:-0024H
Correct Answer:- Option-D
30. Which of the following is a software interrupt?
A:-RST 6.5
B:-RST 5
C:-INTR
D:-RST 7.5
Correct Answer:- Option-B
31. The expression E+((A+B)*D)-C can be written in Reverse Polish Notation as
A:-AB+D*E+C-
B:-AB+D*+E-C
C:--+*+ABDEC
D:-EAB+D*+C-
Correct Answer:- Option-D
32. The maximum number of I/O devices that can be connected to 8085 microprocessor is
A:-255
B:-512
C:-65536
D:-256
Correct Answer:- Option-C
33. How many pins does a DDR SDRAM DIMM have?
A:-184
B:-168
C:-72
D:-172
Correct Answer:- Option-A
34. UART is
A:-8255
B:-8250
C:-8251
D:-8279
Correct Answer:- Option-B
35. DMA Controller gets complete access to main memory through which technique?
A:-Burst Mode
B:-Memory Stealing
C:-Cycle Stealing
D:-Memory Con
Correct Answer:- Option-A
36. Which of the following represents the average-case performance of a quicksort algorithm?
A:-O(n)
B:-O(log n)
C:-O(n/2)
D:-O(nlog n)
Correct Answer:- Option-D
37. Which of the following is not the required condition for binary search algorithm?
A:-The list must be sorted
B:-There should be direct access to the middle element in any sublist
C:-There must be mechanism to delete and/or insert element in list
D:-None of these
Correct Answer:- Option-C
38. A 3-ary tree is a tree in which every internal node has exactly 3 children. The number of leaf nodes in such a tree with 6 internal nodes will be
A:-10
B:-23
C:-17
D:-13
Correct Answer:- Option-D
39. Of the following sorting algorithms, the one which has a running time that is least dependent on the initial ordering of the input is
A:-Insertion sort
B:-Quick sort
C:-Merge sort
D:-Selection sort
Correct Answer:- Option-C
40. The number of edges in a regular graph of degree d and n vertices is
A:-maximum(n,d)
B:-n+d
C:-nd
D:-nd/2
Correct Answer:- Option-D
41. The depth of a complete binary tree is given by
A:-n log n
B:-log n + 1
C:-log n
D:-n log n + 1
Correct Answer:- Option-B
42. Convert the expression ((A+B)*C-(D-E)^(F+G)) to equivalent Postfix notation
A:-AB+C*DE--FG+^
B:-AB-C*DE--FG+^
C:-AB+CDE*--FG+^
D:-AB+*CDE--FG+^
Correct Answer:- Option-A
43. Merge sort uses
A:-Divide and Conquer strategy
B:-Backtracking approach
C:-Heuristic search
D:-Greedy approach
Correct Answer:- Option-A
44. Linked lists are best suited
A:-for relatively permanent collections of data
B:-for the size of the structure and the data in the structure are constantly changing
C:-for both of above situations
D:-for none of above situations
Correct Answer:- Option-B
45. The complexity of the average case of an algorithm is
A:-much more complicated to analyze than that of worst case
B:-much more simpler to analyze than that of worst case
C:-some times more complicated and some other times simpler than that of worst case
D:-none of the above
Correct Answer:- Option-A
46. What is the minimum number of units of resource R required such that no deadlock will ever occur in an operating system containing 5 user processes each requiring 2 units of R?
A:-5
B:-6
C:-7
D:-8
Correct Answer:- Option-B
47. The page miss ratio in a paged memory is 0.72. The time required to access a page in primary and secondary memory are 10ns and 100ns, respectively. The average time required to access a page is:
A:-64.8
B:-35.2
C:-74.8
D:-45.2
Correct Answer:- Option-C
48. The value of a counting semaphore at a particular instance of time is 5. '#' P operations and 16 V operations were completed on this semaphore subsequently. If the final value of the semaphore is 8, then '#' will be
A:-11
B:-12
C:-16
D:-13
Correct Answer:- Option-D
49. Given the following disk queue: 95, 180, 34, 119, 11, 123, 62, 64 with read-write head initially at the track 50 and the tail track being at 199. If C-LOOK disk scheduling algorithm is followed, then the total number of head movement required is:
A:-157
B:-146
C:-187
D:-236
Correct Answer:- Option-A
50. NTFS stands for
A:-New Type File System
B:-Novel Technology File Service
C:-New Technology File System
D:-New Technology File Service
Correct Answer:- Option-C
51. Shift-reduce parsers are
A:-top-down parsers
B:-bottom-up parsers
C:-both top-down and bottom-up parsers
D:-None of the above
Correct Answer:- Option-B
52. Consider the following grammar:
S→ABSc|Abc
BA→AB
Bb→bb
Ab→ab
Aa→aa
Which of the following sentences can be derived by the above grammar?
A:-aab
B:-abcc
C:-abbc
D:-abc
Correct Answer:- Option-D
53. Which of the following is an intermediate language?
A:-UNCOL
B:-PASCAL
C:-COBOL
D:-SNOBOL
Correct Answer:- Option-A
54. If an input file named "Test" is given to Lex, then its output file will be
A:-Test.lex
B:-Test.obj
C:-Test.out
D:-Test.yy.c
Correct Answer:- Option-D
55. The Banker's algorithm is used
A:-to detect deadlock in operating system
B:-to rectify a deadlocked state
C:-to prevent deadlock in operating system
D:-None of the above
Correct Answer:- Option-C
A:-10100.1011
B:-10100.1100
C:-10100.1010
D:-10101.1010
Correct Answer:- Option-C
27. A memory that contains 32K memory requires how many different addresses
A:-32752
B:-32768
C:-32640
D:-31744
Correct Answer:- Option-B
28. An SDRAM chip has 4096 rows, a refresh time of 128ms, the memory bus runs at 166 MHz and the refresh cycle takes 4 clock cycles. The refresh overhead is:
A:-0.00076
B:-0.00770
C:-0.00740
D:-0.00748
Correct Answer:- Option-A
29. What is the address line for RST 4.5?
A:-0028H
B:-0018H
C:-0020H
D:-0024H
Correct Answer:- Option-D
30. Which of the following is a software interrupt?
A:-RST 6.5
B:-RST 5
C:-INTR
D:-RST 7.5
Correct Answer:- Option-B
31. The expression E+((A+B)*D)-C can be written in Reverse Polish Notation as
A:-AB+D*E+C-
B:-AB+D*+E-C
C:--+*+ABDEC
D:-EAB+D*+C-
Correct Answer:- Option-D
32. The maximum number of I/O devices that can be connected to 8085 microprocessor is
A:-255
B:-512
C:-65536
D:-256
Correct Answer:- Option-C
33. How many pins does a DDR SDRAM DIMM have?
A:-184
B:-168
C:-72
D:-172
Correct Answer:- Option-A
34. UART is
A:-8255
B:-8250
C:-8251
D:-8279
Correct Answer:- Option-B
35. DMA Controller gets complete access to main memory through which technique?
A:-Burst Mode
B:-Memory Stealing
C:-Cycle Stealing
D:-Memory Con
Correct Answer:- Option-A
36. Which of the following represents the average-case performance of a quicksort algorithm?
A:-O(n)
B:-O(log n)
C:-O(n/2)
D:-O(nlog n)
Correct Answer:- Option-D
37. Which of the following is not the required condition for binary search algorithm?
A:-The list must be sorted
B:-There should be direct access to the middle element in any sublist
C:-There must be mechanism to delete and/or insert element in list
D:-None of these
Correct Answer:- Option-C
38. A 3-ary tree is a tree in which every internal node has exactly 3 children. The number of leaf nodes in such a tree with 6 internal nodes will be
A:-10
B:-23
C:-17
D:-13
Correct Answer:- Option-D
39. Of the following sorting algorithms, the one which has a running time that is least dependent on the initial ordering of the input is
A:-Insertion sort
B:-Quick sort
C:-Merge sort
D:-Selection sort
Correct Answer:- Option-C
40. The number of edges in a regular graph of degree d and n vertices is
A:-maximum(n,d)
B:-n+d
C:-nd
D:-nd/2
Correct Answer:- Option-D
41. The depth of a complete binary tree is given by
A:-n log n
B:-log n + 1
C:-log n
D:-n log n + 1
Correct Answer:- Option-B
42. Convert the expression ((A+B)*C-(D-E)^(F+G)) to equivalent Postfix notation
A:-AB+C*DE--FG+^
B:-AB-C*DE--FG+^
C:-AB+CDE*--FG+^
D:-AB+*CDE--FG+^
Correct Answer:- Option-A
43. Merge sort uses
A:-Divide and Conquer strategy
B:-Backtracking approach
C:-Heuristic search
D:-Greedy approach
Correct Answer:- Option-A
44. Linked lists are best suited
A:-for relatively permanent collections of data
B:-for the size of the structure and the data in the structure are constantly changing
C:-for both of above situations
D:-for none of above situations
Correct Answer:- Option-B
45. The complexity of the average case of an algorithm is
A:-much more complicated to analyze than that of worst case
B:-much more simpler to analyze than that of worst case
C:-some times more complicated and some other times simpler than that of worst case
D:-none of the above
Correct Answer:- Option-A
46. What is the minimum number of units of resource R required such that no deadlock will ever occur in an operating system containing 5 user processes each requiring 2 units of R?
A:-5
B:-6
C:-7
D:-8
Correct Answer:- Option-B
47. The page miss ratio in a paged memory is 0.72. The time required to access a page in primary and secondary memory are 10ns and 100ns, respectively. The average time required to access a page is:
A:-64.8
B:-35.2
C:-74.8
D:-45.2
Correct Answer:- Option-C
48. The value of a counting semaphore at a particular instance of time is 5. '#' P operations and 16 V operations were completed on this semaphore subsequently. If the final value of the semaphore is 8, then '#' will be
A:-11
B:-12
C:-16
D:-13
Correct Answer:- Option-D
49. Given the following disk queue: 95, 180, 34, 119, 11, 123, 62, 64 with read-write head initially at the track 50 and the tail track being at 199. If C-LOOK disk scheduling algorithm is followed, then the total number of head movement required is:
A:-157
B:-146
C:-187
D:-236
Correct Answer:- Option-A
50. NTFS stands for
A:-New Type File System
B:-Novel Technology File Service
C:-New Technology File System
D:-New Technology File Service
Correct Answer:- Option-C
51. Shift-reduce parsers are
A:-top-down parsers
B:-bottom-up parsers
C:-both top-down and bottom-up parsers
D:-None of the above
Correct Answer:- Option-B
52. Consider the following grammar:
S→ABSc|Abc
BA→AB
Bb→bb
Ab→ab
Aa→aa
Which of the following sentences can be derived by the above grammar?
A:-aab
B:-abcc
C:-abbc
D:-abc
Correct Answer:- Option-D
53. Which of the following is an intermediate language?
A:-UNCOL
B:-PASCAL
C:-COBOL
D:-SNOBOL
Correct Answer:- Option-A
54. If an input file named "Test" is given to Lex, then its output file will be
A:-Test.lex
B:-Test.obj
C:-Test.out
D:-Test.yy.c
Correct Answer:- Option-D
55. The Banker's algorithm is used
A:-to detect deadlock in operating system
B:-to rectify a deadlocked state
C:-to prevent deadlock in operating system
D:-None of the above
Correct Answer:- Option-C
56. In the Internet Protocol(IP) suit of protocols, which of the following best describes the purpose of the Address Resolution Protocol?
A:-To translate web addresses to host names
B:-To determine the IP address of a given host name
C:-To determine the hardware address of a given host name
D:-To determine the hardware address of a given IP address
Correct Answer:- Option-D
57. Given the basic ER and relational models, which of the following is incorrect?
A:-An attribute of an entity can have more than one value
B:-An attribute of an entity can be composite
C:-In a row of a relational table, an attribute can have more than one value
D:-In arow of a relational table, an attribute can have exactly one value or a NULL value
Correct Answer:- Option-C
58. Communication circuits that transmit data in both directions but not at the same time are operating in
A:-simplex mode
B:-half duplex mode
C:-full duplex mode
D:-asynchronous mode
Correct Answer:- Option-B
59. For which one of the following reasons does Internet Protocol(IP) use the time-to-live(TTL) field in the IP datagram header?
A:-Ensure packets reach destination within that time
B:-Discard packets that reach later than that time
C:-Prevent packets from looping indefinitely
D:-Limit the time for which a packet gets queued in intermediate routers
Correct Answer:- Option-C
60. The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are
A:-TCP, UDP, UDP and TCP
B:-UDP, TCP, TCP and UDP
C:-UDP, TCP, UDP and TCP
D:-TCP, UDP, TCP and UDP
Correct Answer:- Option-C
61. The normal form that is considered adequate for relational database design is
A:-2NF
B:-3NF
C:-4NF
D:-BCNF
Correct Answer:- Option-B
62. Result of compilation of DDL statement is stored in a special file called as
A:-database file
B:-symbol table
C:-database schema file
D:-data dictionary
Correct Answer:- Option-D
63. The number of entities to which another entity can be associated via a relationship set is called
A:-Messaging Cardinality
B:-Logical Cardinality
C:-Mapping Cardinality
D:-Data Cardinality
Correct Answer:- Option-C
64. The network topology that supports bidirectional links between each possible node is
A:-Ring
B:-Star
C:-Tree
D:-Mesh
Correct Answer:- Option-D
65. Which of the following UML diagram has a static view
A:-Collaboration
B:-Use case
C:-State-chart
D:-Activity
Correct Answer:- Option-B
66. What is the goal of the requirements analysis and specifications phase of the software development life cycle?
A:-Understanding the customer requirements and organize them in an informal document
B:-Determining the scope of the software
C:-Analyzing the cost of the development
D:-none of the above
Correct Answer:- Option-A
67. Which diagram in UML shows a complete or a partial view of the structure of a modeled system at a specific time
A:-Sequence diagram
B:-Collaboration diagram
C:-Class diagram
D:-Object diagram
Correct Answer:- Option-D
68. SRS document is called a black box specification of a system because
A:-It does not contain the contradictory material
B:-It does not contain the user document
C:-SRS document should specify only the external behavior of the system
D:-none of the above
Correct Answer:- Option-C
69. Which of the following is the structural model that demonstrate the other system in the environment of the system being developed
A:-System context model
B:-Interaction model
C:-Environmental model
D:-Both system context and interaction
Correct Answer:- Option-A
70. In object oriented design of software which of the following is not true
A:-Object inherits the properties of the class
B:-Classes are defined based on the attributes of the object
C:-Objects can belong to two classes
D:-Classes are always different
Correct Answer:- Option-C
71. Quality management in software engineering is also known as
A:-SQA
B:-SQM
C:-SQI
D:-SQA & SQM
Correct Answer:- Option-A
72. Which of the following is not a core step of Six Sigma?
A:-Define
B:-Control
C:-Measure
D:-Analyse
Correct Answer:- Option-B
73. According to ISO 9001, inspection and testing comes under which management responsibility
A:-Process control
B:-Document control
C:-Control of non-conforming products
D:-Servicing
Correct Answer:- Option-A
74. What involves preparing software for external release and keeping track of the system version that have been released for customer use
A:-System building
B:-Release management
C:-change management
D:-Version management
Correct Answer:- Option-B
75. A class variable is a variable declared as ______ inside a class.
A:-const
B:-final
C:-static
D:-extends
Correct Answer:- Option-C
76. ________ determines the point of time at which a variable comes into existence in memory.
A:-data type
B:-functions
C:-scope
D:-storage class
Correct Answer:- Option-D
77. What does the following program output?
public class ABC {
public static int function1(int p, int q) {
if (q==0) return 1;
else if (p<q) return 0;
else
return function1(p-1,q)+function1(p-1,q-1);
}
public static void main(String[] args) {
System.out.println(ABC.function1(3,2));
}
}
A:-4
B:-3
C:-2
D:-1
Correct Answer:- Option-B
78.The following Java program segment prints:
String S1=new String("Hello");
String S2=new String("Hello");
if (S1==S2)
System.out.println("They are same");
else
System.out.println("They are not same");
A:-They are same
B:-They are not same
C:-Garbage
D:-Run time error
Correct Answer:- Option-B
79. Asynchronous Java Script and XML (Ajax) incorporates
P: Asynchronous data retrieval using XMLHttpRequest
Q: Standards based presentation using XHTML and CSS
R: Data interchanges and manipulation using XML and XSLT
S: Dynamic display and interaction using the Document Object Model
A:-P and R
B:-P and Q
C:-P, R and S
D:-P, Q, R and S
Correct Answer:- Option-D
80. In Java, MVC stands for
A:-Model Video Controller
B:-Mobile View Controller
C:-Model View Controller
D:-None of the above
Correct Answer:- Option-C
81. Among the following, the Java package which is used by the compiler itself and need not be explicitly imported is:
A:-java.lang
B:-java.awt
C:-java.math
D:-java.applet
Correct Answer:- Option-A
82. Distributed applications are created in Java using __________.
A:-RMI and JDBC
B:-CORBA and JDBC
C:-RMI and CORBA
D:-None of the above
Correct Answer:- Option-C
83. DMSP stands for:
A:-Distributed Mail Support Plan
B:-Document Management System Protocol
C:-Digital Media Services Protocol
D:-Distributed Mail System Protocol
Correct Answer:- Option-D
84. The Artificial intelligence is concerned with designing intelligent computer system that exhibits intelligent characteristics expressed by_________
A:-Functional behavior
B:-Human behavior
C:-Human brain
D:-Statistical analysis
Correct Answer:- Option-B
85. In a program module such as procedure or a function the role of parameters is to
A:-serve as module's input and output
B:-indicate the number of variables that will be declared in the module
C:-isolate calculations that could potentially cause errors
D:-reassign data types to variables declared in the main program
Correct Answer:- Option-A
86. Which of the following functions is performed by the compiler?
A:-Formatting program output
B:-Evaluating the data passed to the program modules
C:-Connecting multiple object programs
D:-Translating a source program into object code
Correct Answer:- Option-D
87. A_____ is a set of information that is exchanged between a client and a web browser and a web server during an HTTP transaction.
A:-infoset
B:-clientinfo
C:-cookies
D:-transkie
Correct Answer:- Option-C
88. Which of the following steps should be taken first in the development of a web site?
A:-creating links for navigating the site.
B:-drafting the text for the site.
C:-mapping out the structure and contents of the site.
D:-inserting image place holders.
Correct Answer:- Option-C
89. PHP scripts are used in
A:-server side scripting
B:-command-line scripting
C:-Client-side GUI application
D:-All of the above
Correct Answer:- Option-D
90. Which webserver is developed by Microsoft?
A:-Apache Tomcat
B:-Caudium
C:-Internet Information Services(IIS)
D:-WEBrick
Correct Answer:- Option-C
91. Which of the following is not an ASP.NET page event?
A:-Init
B:-Load
C:-Import
D:-Disposed
Correct Answer:- Option-C
92. The exact format of frame in case of synchronous transmission depends on whether transmission scheme is
A:-digital
B:-analog
C:-either character oriented or bit-oriented
D:-none of the above
Correct Answer:- Option-C
93. A module which is a collection of functions and data designed to be used by another application is called
A:-Abandon
B:-DLL
C:-LCID
D:-PICS
Correct Answer:- Option-B
A:-To translate web addresses to host names
B:-To determine the IP address of a given host name
C:-To determine the hardware address of a given host name
D:-To determine the hardware address of a given IP address
Correct Answer:- Option-D
57. Given the basic ER and relational models, which of the following is incorrect?
A:-An attribute of an entity can have more than one value
B:-An attribute of an entity can be composite
C:-In a row of a relational table, an attribute can have more than one value
D:-In arow of a relational table, an attribute can have exactly one value or a NULL value
Correct Answer:- Option-C
58. Communication circuits that transmit data in both directions but not at the same time are operating in
A:-simplex mode
B:-half duplex mode
C:-full duplex mode
D:-asynchronous mode
Correct Answer:- Option-B
59. For which one of the following reasons does Internet Protocol(IP) use the time-to-live(TTL) field in the IP datagram header?
A:-Ensure packets reach destination within that time
B:-Discard packets that reach later than that time
C:-Prevent packets from looping indefinitely
D:-Limit the time for which a packet gets queued in intermediate routers
Correct Answer:- Option-C
60. The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are
A:-TCP, UDP, UDP and TCP
B:-UDP, TCP, TCP and UDP
C:-UDP, TCP, UDP and TCP
D:-TCP, UDP, TCP and UDP
Correct Answer:- Option-C
61. The normal form that is considered adequate for relational database design is
A:-2NF
B:-3NF
C:-4NF
D:-BCNF
Correct Answer:- Option-B
62. Result of compilation of DDL statement is stored in a special file called as
A:-database file
B:-symbol table
C:-database schema file
D:-data dictionary
Correct Answer:- Option-D
63. The number of entities to which another entity can be associated via a relationship set is called
A:-Messaging Cardinality
B:-Logical Cardinality
C:-Mapping Cardinality
D:-Data Cardinality
Correct Answer:- Option-C
64. The network topology that supports bidirectional links between each possible node is
A:-Ring
B:-Star
C:-Tree
D:-Mesh
Correct Answer:- Option-D
65. Which of the following UML diagram has a static view
A:-Collaboration
B:-Use case
C:-State-chart
D:-Activity
Correct Answer:- Option-B
66. What is the goal of the requirements analysis and specifications phase of the software development life cycle?
A:-Understanding the customer requirements and organize them in an informal document
B:-Determining the scope of the software
C:-Analyzing the cost of the development
D:-none of the above
Correct Answer:- Option-A
67. Which diagram in UML shows a complete or a partial view of the structure of a modeled system at a specific time
A:-Sequence diagram
B:-Collaboration diagram
C:-Class diagram
D:-Object diagram
Correct Answer:- Option-D
68. SRS document is called a black box specification of a system because
A:-It does not contain the contradictory material
B:-It does not contain the user document
C:-SRS document should specify only the external behavior of the system
D:-none of the above
Correct Answer:- Option-C
69. Which of the following is the structural model that demonstrate the other system in the environment of the system being developed
A:-System context model
B:-Interaction model
C:-Environmental model
D:-Both system context and interaction
Correct Answer:- Option-A
70. In object oriented design of software which of the following is not true
A:-Object inherits the properties of the class
B:-Classes are defined based on the attributes of the object
C:-Objects can belong to two classes
D:-Classes are always different
Correct Answer:- Option-C
71. Quality management in software engineering is also known as
A:-SQA
B:-SQM
C:-SQI
D:-SQA & SQM
Correct Answer:- Option-A
72. Which of the following is not a core step of Six Sigma?
A:-Define
B:-Control
C:-Measure
D:-Analyse
Correct Answer:- Option-B
73. According to ISO 9001, inspection and testing comes under which management responsibility
A:-Process control
B:-Document control
C:-Control of non-conforming products
D:-Servicing
Correct Answer:- Option-A
74. What involves preparing software for external release and keeping track of the system version that have been released for customer use
A:-System building
B:-Release management
C:-change management
D:-Version management
Correct Answer:- Option-B
75. A class variable is a variable declared as ______ inside a class.
A:-const
B:-final
C:-static
D:-extends
Correct Answer:- Option-C
76. ________ determines the point of time at which a variable comes into existence in memory.
A:-data type
B:-functions
C:-scope
D:-storage class
Correct Answer:- Option-D
77. What does the following program output?
public class ABC {
public static int function1(int p, int q) {
if (q==0) return 1;
else if (p<q) return 0;
else
return function1(p-1,q)+function1(p-1,q-1);
}
public static void main(String[] args) {
System.out.println(ABC.function1(3,2));
}
}
A:-4
B:-3
C:-2
D:-1
Correct Answer:- Option-B
78.The following Java program segment prints:
String S1=new String("Hello");
String S2=new String("Hello");
if (S1==S2)
System.out.println("They are same");
else
System.out.println("They are not same");
A:-They are same
B:-They are not same
C:-Garbage
D:-Run time error
Correct Answer:- Option-B
79. Asynchronous Java Script and XML (Ajax) incorporates
P: Asynchronous data retrieval using XMLHttpRequest
Q: Standards based presentation using XHTML and CSS
R: Data interchanges and manipulation using XML and XSLT
S: Dynamic display and interaction using the Document Object Model
A:-P and R
B:-P and Q
C:-P, R and S
D:-P, Q, R and S
Correct Answer:- Option-D
80. In Java, MVC stands for
A:-Model Video Controller
B:-Mobile View Controller
C:-Model View Controller
D:-None of the above
Correct Answer:- Option-C
81. Among the following, the Java package which is used by the compiler itself and need not be explicitly imported is:
A:-java.lang
B:-java.awt
C:-java.math
D:-java.applet
Correct Answer:- Option-A
82. Distributed applications are created in Java using __________.
A:-RMI and JDBC
B:-CORBA and JDBC
C:-RMI and CORBA
D:-None of the above
Correct Answer:- Option-C
83. DMSP stands for:
A:-Distributed Mail Support Plan
B:-Document Management System Protocol
C:-Digital Media Services Protocol
D:-Distributed Mail System Protocol
Correct Answer:- Option-D
84. The Artificial intelligence is concerned with designing intelligent computer system that exhibits intelligent characteristics expressed by_________
A:-Functional behavior
B:-Human behavior
C:-Human brain
D:-Statistical analysis
Correct Answer:- Option-B
85. In a program module such as procedure or a function the role of parameters is to
A:-serve as module's input and output
B:-indicate the number of variables that will be declared in the module
C:-isolate calculations that could potentially cause errors
D:-reassign data types to variables declared in the main program
Correct Answer:- Option-A
86. Which of the following functions is performed by the compiler?
A:-Formatting program output
B:-Evaluating the data passed to the program modules
C:-Connecting multiple object programs
D:-Translating a source program into object code
Correct Answer:- Option-D
87. A_____ is a set of information that is exchanged between a client and a web browser and a web server during an HTTP transaction.
A:-infoset
B:-clientinfo
C:-cookies
D:-transkie
Correct Answer:- Option-C
88. Which of the following steps should be taken first in the development of a web site?
A:-creating links for navigating the site.
B:-drafting the text for the site.
C:-mapping out the structure and contents of the site.
D:-inserting image place holders.
Correct Answer:- Option-C
89. PHP scripts are used in
A:-server side scripting
B:-command-line scripting
C:-Client-side GUI application
D:-All of the above
Correct Answer:- Option-D
90. Which webserver is developed by Microsoft?
A:-Apache Tomcat
B:-Caudium
C:-Internet Information Services(IIS)
D:-WEBrick
Correct Answer:- Option-C
91. Which of the following is not an ASP.NET page event?
A:-Init
B:-Load
C:-Import
D:-Disposed
Correct Answer:- Option-C
92. The exact format of frame in case of synchronous transmission depends on whether transmission scheme is
A:-digital
B:-analog
C:-either character oriented or bit-oriented
D:-none of the above
Correct Answer:- Option-C
93. A module which is a collection of functions and data designed to be used by another application is called
A:-Abandon
B:-DLL
C:-LCID
D:-PICS
Correct Answer:- Option-B
94:-IT Act 2000, Section _________ describes the penalty for hacking computer system.
A:-Section 43
B:-Section 65
C:-Section 66
D:-Section 66 A
Ans: C
95:-In 8086 microprocessor which is a maskable interrupt ?
A:-NMI
B:-INTR
C:-TRAP
D:-None of the above
Ans: B
96:-International cyber security Day
A:-January 30
B:-March 15
C:-November 30
D:-June 11
Ans: C
97:-Scareware is a
A:-Virus
B:-Malware
C:-Worm
D:-Spam
Ans: B
98:-Bluetooth technology uses _________ signals for data transmission.
A:-Infrared
B:-Radio waves
C:-Microwaves
D:-Electromagnetic waves
Ans: B
99:-Which protocol is used for receive email services ?
A:-HTTP
B:-SMTP
C:-POP3
D:-FTP
Ans: C
100:-Microsoft's latest web browser
A:-Internet Explorer
B:-Edge
C:-Mozilla Firefox
D:-Opera
Ans: B
A:-Section 43
B:-Section 65
C:-Section 66
D:-Section 66 A
Ans: C
95:-In 8086 microprocessor which is a maskable interrupt ?
A:-NMI
B:-INTR
C:-TRAP
D:-None of the above
Ans: B
96:-International cyber security Day
A:-January 30
B:-March 15
C:-November 30
D:-June 11
Ans: C
97:-Scareware is a
A:-Virus
B:-Malware
C:-Worm
D:-Spam
Ans: B
98:-Bluetooth technology uses _________ signals for data transmission.
A:-Infrared
B:-Radio waves
C:-Microwaves
D:-Electromagnetic waves
Ans: B
99:-Which protocol is used for receive email services ?
A:-HTTP
B:-SMTP
C:-POP3
D:-FTP
Ans: C
100:-Microsoft's latest web browser
A:-Internet Explorer
B:-Edge
C:-Mozilla Firefox
D:-Opera
Ans: B
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15