COMPUTER APPLICATION- PAGE 1
COMPUTER APPLICATION MCQs- PAGE 1
1. What names objects, defines the type of data that can be stored in an object, and encodes data for network transmission ?
(A) MIB (B) SMI (C) SNMP (D) ASN.1
Ans: B
2. Which of the following application protocol is a framework for managing devices in an internet using the TCP/IP protocol suite ?
(A) SMTP (B) SNMP (C) FTP (D) TELNET
Ans: B
3. What is the bit combination used by the SAPI field of ISDN’s data link layer, to control call for end-to-end signaling in LAPD addressing format ?
(A) 000000 (B) 000010 (C) 010000 (D) 000001
Ans: D
4. The set of pages that a process is currently using is called as :
(A) Program (B) Page Group (C) Working Group (D) Working Set
Ans: D
5. The upper bound on the time complexity of the nondeterministic sorting algorithm is :
(A) O(n) (B) O(n log n) (C) O(1) (D) O(log n)
Ans: A
6. There is a chain of 20 stores; each of the store having 5 departments. Then, which of the following is a correct representation of array size ?
(A) 5*20 (B) 6*21 (C) 20*5 (D) 21*6
Ans: C
7. One from the following is also known as Pre-Order traversal. What that one is ?
(A) LNR (B) LRN (C) RLN (D) NLR
Ans: D
8. From the following, select the valid data structure which reflects hierarchical relationship between the elements :
(A) Graph (B) Queue (C) Tree (D) Stack
Ans: C
9. Which of the following matrix does have high proportions of zero entries as the elements ?
(A) Inverse Matrix (B) Sparse Matrix
(C) Determinant Matrix (D) Square Matrix
Ans: B
10. Recursive algorithms are based on :
(A) Divide and conquer approach (B) Top-down approach
(C) Bottom-up approach (D) Hierarchical approach
Ans: A
11. What do you call the selected keys in the quick sort method ?
(A) Outer key (B) Inner key (C) Partition key (D) Pivot key
Ans: D
12. How many nodes does a complete binary tree of level 5 have ?
(A) 16 (B) 15 (C) 32 (D) 31
Ans: D
13. The Sorting method which is used for external sort is :
(A) Bubble sort (B) Quick sort (C) Merge sort (D) Radix sort
Ans: C
14. A node of a directed graph G having no out-degree and a positive in-degree is called :
(A) Source node (B) Sink node (C) Sibling node (D) Null node
Ans: B
15. What would be the depth of tree whose level is 9 ?
(A) 10 (B) 8 (C) 9 (D) 11
Ans: B
16. A collection of data designed to be used by different people is called a/an :
(A) Organization (B) Database (C) Relationship (D) Schema
Ans: B
17. Which of the following is an attribute that can uniquely identify a row in a table ?
(A) Secondary key (B) Candidate key (C) Foreign key (D) None of the above
Ans: B
18. Which of the following is the oldest database model ?
(A) Relational (B) Deductive (C) Physical (D) Network
Ans: D
(A) MIB (B) SMI (C) SNMP (D) ASN.1
Ans: B
2. Which of the following application protocol is a framework for managing devices in an internet using the TCP/IP protocol suite ?
(A) SMTP (B) SNMP (C) FTP (D) TELNET
Ans: B
3. What is the bit combination used by the SAPI field of ISDN’s data link layer, to control call for end-to-end signaling in LAPD addressing format ?
(A) 000000 (B) 000010 (C) 010000 (D) 000001
Ans: D
4. The set of pages that a process is currently using is called as :
(A) Program (B) Page Group (C) Working Group (D) Working Set
Ans: D
5. The upper bound on the time complexity of the nondeterministic sorting algorithm is :
(A) O(n) (B) O(n log n) (C) O(1) (D) O(log n)
Ans: A
6. There is a chain of 20 stores; each of the store having 5 departments. Then, which of the following is a correct representation of array size ?
(A) 5*20 (B) 6*21 (C) 20*5 (D) 21*6
Ans: C
7. One from the following is also known as Pre-Order traversal. What that one is ?
(A) LNR (B) LRN (C) RLN (D) NLR
Ans: D
8. From the following, select the valid data structure which reflects hierarchical relationship between the elements :
(A) Graph (B) Queue (C) Tree (D) Stack
Ans: C
9. Which of the following matrix does have high proportions of zero entries as the elements ?
(A) Inverse Matrix (B) Sparse Matrix
(C) Determinant Matrix (D) Square Matrix
Ans: B
10. Recursive algorithms are based on :
(A) Divide and conquer approach (B) Top-down approach
(C) Bottom-up approach (D) Hierarchical approach
Ans: A
11. What do you call the selected keys in the quick sort method ?
(A) Outer key (B) Inner key (C) Partition key (D) Pivot key
Ans: D
12. How many nodes does a complete binary tree of level 5 have ?
(A) 16 (B) 15 (C) 32 (D) 31
Ans: D
13. The Sorting method which is used for external sort is :
(A) Bubble sort (B) Quick sort (C) Merge sort (D) Radix sort
Ans: C
14. A node of a directed graph G having no out-degree and a positive in-degree is called :
(A) Source node (B) Sink node (C) Sibling node (D) Null node
Ans: B
15. What would be the depth of tree whose level is 9 ?
(A) 10 (B) 8 (C) 9 (D) 11
Ans: B
16. A collection of data designed to be used by different people is called a/an :
(A) Organization (B) Database (C) Relationship (D) Schema
Ans: B
17. Which of the following is an attribute that can uniquely identify a row in a table ?
(A) Secondary key (B) Candidate key (C) Foreign key (D) None of the above
Ans: B
18. Which of the following is the oldest database model ?
(A) Relational (B) Deductive (C) Physical (D) Network
Ans: D
19. UNIVAC is :
(A) Universal Automatic Computer
(B) Universal Array Computer
(C) Universal Automatic Control
(D) Unvalued Automatic Computer
Ans: A
20. DBMS is a collection of __________ that enables users to create and maintain a database.
(A) Keys (B) Translators (C) Program (D) Language Activity
Ans: C
21. Which is single user operating system ?
(A) MS-DOS (B) UNIX (C) XENIX (D) LINUX
Ans: A
22. How can you disable extended selection mode ?
(A) Press F8 again to disable (B) Press Del to disable (C) Press Esc to disable (D) Press Enter to disable
Ans: C
23. Maximum length of DOS command using any optional parameter is :
(A) 26 Character (B) 87 Character (C) 127 Character (D) None of above
Ans: C
24. Which of the following helps to reduce spelling error in the document ?
(A) Auto format (B) Auto correct (C) Smart tags (D) Auto test
Ans: B
25. Disk copy command in DOS is used to :
(A) Copy a file
(B) Copy contents of one floppy disk to another
(C) Copy contents of CD-ROM to another
(D) All of the above
Ans: B
26. What is gutter margin ?
(A) Margin that is added to the left margin when printing
(B) Margin that is added to right margin when printing
(C) Margin that is added to the binding side of page when printing
(D) Margin that is added to the outside of the page when printing
Ans: C
27. VGA is :
(A) Video Graphics Array (B) Visual Graphics Array
(C) Volatile Graphics Array (D) Video Graphics Adapter
Ans: A
28. Disk scheduling includes deciding :
(A) Which should be accessed next ?
(B) Order in which disk access requests must be serviced
(C) The physical location of the file
(D) The logical location of the file
Ans: B
29. CD-ROM stands for :
(A) Compactable Read Only Memory
(B) Compact Data Read Only Memory
(C) Compactable Disk Read Only Memory
(D) Compact Disk Read Only Memory
Ans: D
(A) Universal Automatic Computer
(B) Universal Array Computer
(C) Universal Automatic Control
(D) Unvalued Automatic Computer
Ans: A
20. DBMS is a collection of __________ that enables users to create and maintain a database.
(A) Keys (B) Translators (C) Program (D) Language Activity
Ans: C
21. Which is single user operating system ?
(A) MS-DOS (B) UNIX (C) XENIX (D) LINUX
Ans: A
22. How can you disable extended selection mode ?
(A) Press F8 again to disable (B) Press Del to disable (C) Press Esc to disable (D) Press Enter to disable
Ans: C
23. Maximum length of DOS command using any optional parameter is :
(A) 26 Character (B) 87 Character (C) 127 Character (D) None of above
Ans: C
24. Which of the following helps to reduce spelling error in the document ?
(A) Auto format (B) Auto correct (C) Smart tags (D) Auto test
Ans: B
25. Disk copy command in DOS is used to :
(A) Copy a file
(B) Copy contents of one floppy disk to another
(C) Copy contents of CD-ROM to another
(D) All of the above
Ans: B
26. What is gutter margin ?
(A) Margin that is added to the left margin when printing
(B) Margin that is added to right margin when printing
(C) Margin that is added to the binding side of page when printing
(D) Margin that is added to the outside of the page when printing
Ans: C
27. VGA is :
(A) Video Graphics Array (B) Visual Graphics Array
(C) Volatile Graphics Array (D) Video Graphics Adapter
Ans: A
28. Disk scheduling includes deciding :
(A) Which should be accessed next ?
(B) Order in which disk access requests must be serviced
(C) The physical location of the file
(D) The logical location of the file
Ans: B
29. CD-ROM stands for :
(A) Compactable Read Only Memory
(B) Compact Data Read Only Memory
(C) Compactable Disk Read Only Memory
(D) Compact Disk Read Only Memory
Ans: D
30. Which technique is used by operating system to execute several programs concurrently by switching back and forth ?
(A) Partitioning (B) Multitasking
(C) Windowing (D) Paging
Ans: B
31. Dispatcher function is to :
(A) Put tasks in I/O wait (B) Schedule tasks in processor
(C) Change task priorities (D) All of the above
Ans: B
32. Where can you set the shading color for a range of cells in Excel ?
(A) Chose required color form Patterns tab of Format cells dialog box
(B) Chose required color on Fill Color tool in Formating toolbar
(C) Chose required color on Fill Color tool drawing toolbar
(D) All of the above
Ans: D
33. Operating system is :
(A) a collection of hardware components
(B) a collection of input outputs devices
(C) a collection of software routines
(D) all of the above
Ans: C
34. Which enables us to send the same letter to different persons ?
(A) macros (B) template (C) mail merge (D) none
Ans: C
35. Which one is example for network database ?
(A) Unify (B) Ingress
(C) IDMS (D) None of the above
Ans: C
36. Which of the following format you can decide to apply or not in Auto Format dialog box ?
(A) Number format (B) Border format
(C) Font format (D) All of the above
Ans: D
37. Which scheduling policy is best suited for time sharing operating systems ?
(A) Shortest job first (B) Round robin
(C) First come first serve (D) Elevator
Ans: B
38. Which file is the batch file that is read while booting a computer ?
(A) Autoexec.bat (B) Auto-batch
(C) Auto executive.bat (D) Auto.bat
Ans: A
39. Macintosh computer uses :
(A) System 7.0 (B) AU/X
(C) Xenix (D) None of the above
Ans: A
40. In 3-tier client/server applications, the business logic lies at __________.
(A) The client
(B) The Database Server
(C) Divided between client and server alternatively
(D) Middle Tier
Ans: D
41. Copy and Xcopy are same in the sense :
(A) Both are internal command of DOS
(B) Both are external command of DOS
(C) Both can be used to copy file or group of files
(D) Both (A) and (B)
Ans: C
42. For two variables, n=2, the number of possible Boolean functions is :
(A) 4 (B) 8 (C) 16 (D) 12
Ans: C
43. 64K memory contains how many words of 8 bits each :
(A) 65,536 (B) 64,536 (C) 65,436 (D) 65,546
Ans: A
44. The sum of −6 and −13 using 2’s complement addition is :
(A) 11100011 (B) 11110011 (C) 11001100 (D) 11101101
Ans: D
45. What is Q, when S=1 and R=1 for SR flip-flop ?
(A) No change (B) Clear to 0 (C) Set to 1 (D) Indeterminate
Ans: D
46. What does T stands for in T filp-flop ?
(A) Top (B) Type (C) Toggle (D) Tickle
Ans: C
47. What number will z be in the sample code given below ?
int z, x=5, y=−10, a=4, b=2;
z=x++−−−y*b/a;
(A) 5 (B) 6 (C) 10 (D) 11
Ans: C
48. Which of the following is not a keyword in C language ?
(A) Void (B) Volatile (C) Sizeof (D) Getchar
Ans: D
49 What is the return value of the following statement if it is placed in C program ?
strcmp (“ABC”, “ABC’’);
(A) 33 (B) −1 (C) 1 (D) 0
Ans: D
50. Every C program consists of __________ function(s).
(A) Only one (B) Only two (C) One or two (D) One or many
Ans: D
51. What is the only function, all C programs must contain ?
(A) Start() (B) System() (C) Main() (D) Program()
Ans: C
52. Which of the following is not a correct variable type ?
(A) Float (B) Real (C) Int (D) Double
Ans: B
53. HTTP (Hyper Text Transfer Protocol) has similarities to both of the following protocols :
(A) FTP; SMTP (B) FTP; SNMP (C) FTP; MTV (D) FTP; URL
Ans: A
(A) Partitioning (B) Multitasking
(C) Windowing (D) Paging
Ans: B
31. Dispatcher function is to :
(A) Put tasks in I/O wait (B) Schedule tasks in processor
(C) Change task priorities (D) All of the above
Ans: B
32. Where can you set the shading color for a range of cells in Excel ?
(A) Chose required color form Patterns tab of Format cells dialog box
(B) Chose required color on Fill Color tool in Formating toolbar
(C) Chose required color on Fill Color tool drawing toolbar
(D) All of the above
Ans: D
33. Operating system is :
(A) a collection of hardware components
(B) a collection of input outputs devices
(C) a collection of software routines
(D) all of the above
Ans: C
34. Which enables us to send the same letter to different persons ?
(A) macros (B) template (C) mail merge (D) none
Ans: C
35. Which one is example for network database ?
(A) Unify (B) Ingress
(C) IDMS (D) None of the above
Ans: C
36. Which of the following format you can decide to apply or not in Auto Format dialog box ?
(A) Number format (B) Border format
(C) Font format (D) All of the above
Ans: D
37. Which scheduling policy is best suited for time sharing operating systems ?
(A) Shortest job first (B) Round robin
(C) First come first serve (D) Elevator
Ans: B
38. Which file is the batch file that is read while booting a computer ?
(A) Autoexec.bat (B) Auto-batch
(C) Auto executive.bat (D) Auto.bat
Ans: A
39. Macintosh computer uses :
(A) System 7.0 (B) AU/X
(C) Xenix (D) None of the above
Ans: A
40. In 3-tier client/server applications, the business logic lies at __________.
(A) The client
(B) The Database Server
(C) Divided between client and server alternatively
(D) Middle Tier
Ans: D
41. Copy and Xcopy are same in the sense :
(A) Both are internal command of DOS
(B) Both are external command of DOS
(C) Both can be used to copy file or group of files
(D) Both (A) and (B)
Ans: C
42. For two variables, n=2, the number of possible Boolean functions is :
(A) 4 (B) 8 (C) 16 (D) 12
Ans: C
43. 64K memory contains how many words of 8 bits each :
(A) 65,536 (B) 64,536 (C) 65,436 (D) 65,546
Ans: A
44. The sum of −6 and −13 using 2’s complement addition is :
(A) 11100011 (B) 11110011 (C) 11001100 (D) 11101101
Ans: D
45. What is Q, when S=1 and R=1 for SR flip-flop ?
(A) No change (B) Clear to 0 (C) Set to 1 (D) Indeterminate
Ans: D
46. What does T stands for in T filp-flop ?
(A) Top (B) Type (C) Toggle (D) Tickle
Ans: C
47. What number will z be in the sample code given below ?
int z, x=5, y=−10, a=4, b=2;
z=x++−−−y*b/a;
(A) 5 (B) 6 (C) 10 (D) 11
Ans: C
48. Which of the following is not a keyword in C language ?
(A) Void (B) Volatile (C) Sizeof (D) Getchar
Ans: D
49 What is the return value of the following statement if it is placed in C program ?
strcmp (“ABC”, “ABC’’);
(A) 33 (B) −1 (C) 1 (D) 0
Ans: D
50. Every C program consists of __________ function(s).
(A) Only one (B) Only two (C) One or two (D) One or many
Ans: D
51. What is the only function, all C programs must contain ?
(A) Start() (B) System() (C) Main() (D) Program()
Ans: C
52. Which of the following is not a correct variable type ?
(A) Float (B) Real (C) Int (D) Double
Ans: B
53. HTTP (Hyper Text Transfer Protocol) has similarities to both of the following protocols :
(A) FTP; SMTP (B) FTP; SNMP (C) FTP; MTV (D) FTP; URL
Ans: A
54. Which of there clipping algorithm follows the divide and conquer strategy ?
(a) 4-bit algorithm (b) Mid-point algorithm (c) Cyrus Beck algorithm (d) Cohen Sutherland algorithm
Ans: B
55. Which of the following window is depicted by region code (0000) ?
(a) Viewing window (b) Left clipping window (c) Right clipping window (d) Bottom clipping window
Ans: A
56. Which of the following is changed by the scale transformation of an object ?
(a) Size (b) Location (c) Shape (d) (a) and (b) both
Ans: A
57. If boundary is specified in a single colour and algorithm proceeds by considering pixels one by one until boundary colour is encountered, this approach is called
(a) Scan line fill algorithm (b) Boundary fill algorithm
(c) Flood fill algorithm (d) Parallel curve algorithm
Ans: B
58. In which transformation, the shape of an object can be modified in any of direction depending upon the values assigned ?
(a) Reflection (b) Shearing (c) Scaling (d) None of the above
Ans: B
59. Which of the following is not a process metric ?
(a) Functionality (b) Quality (c) Productivity (d) Efficiency
Ans: A
60. Which two of the following models will not be able to give desired outcome if user‟s participation is not involved ?
(a) Waterfall and spiral (b) RAD and spiral (c) RAD and waterfall (d) RAD and prototyping
Ans: D
61. A cube of size 1 unit is placed such that origin coincides with one vertex and three axes run along the edges from that vertex. The vertex diagonal opposite to vertex (0, 1, 0) will be
(a) (0, 0, 0) (b) (1, 1, 0) (c) (0, 1, 1) (d) (1, 0, 1)
Ans: D
62. In which of the following application linked list is not a suitable data structure ?
(a) Insertion sort (b) Binary search (c) Radix sort (d) Polynomial manipulation
Ans: B
63. If each node in a tree has value greater than every value in its left subtree and lesser than every value in right subtree, it will be called (a) Complete tree (b) Full binary tree (c) Binary search tree (d) Threaded tree
Ans: C
64. Which of these data structure is most suitable for implementing Breadth First Search (BFS) ?
(a) Queue (b) Stack (c) Tree (d) Heap
Ans: A
65. For a function of n input variables, robustness testing yields.
(a) (4n + 3) test cases (b) (6n + 1) test cases
(c) (4n + 1) test cases (d) (2n + 1) test cases Ans: B
66. GSM is related to which of the following generations of cellular networks ?
(a) First generation (b) Third generation (c) Second generation (d) Fourth generation
Ans: C
67. The two addresses required in mobile IP equipped devices are
(a) Home and Public addresses (b) Private and Public addresses (c) Home and Care-of addresses (d) None of the above
Ans: C
68. Which of the following is a standard assigned to Bluetooth ?
(a) IEEE 802.15.1 (b) IEEE 802 (c) IEEE 802.11 (d) IEEE 1471
Ans: A
69. What is the maximum range of Bluetooth, version 5.0 ?
(a) 120 metres (b) 200 metres (c) 240 metres (d) None of the above
Ans: C
70. Which of the following represent the closest speed at which 4G and 4G LTE operate ?
(a) 200 kbps – 3 Mbps (b) 300 Mbps – 1 Gbps (c) > 1 Gbps (d) None of the above
Ans: B
71. The process of changing the channel associated with current connection when call is in progress is termed as
(a) Stand off (b) Handover (c) Hand off (d) None of these
Ans: C
72. Which of the following is a „false‟ statement ?
(a) The union of two regular sets is regular. (b) The intersection of two regular sets is regular
(c) Every subset of regular set is regular (d) None of the above
Ans: C
73. The machine which has the output associated with its states is called as
(a) Melay machine (b) Moore machine (c) Xeno machine (d) Finite state machine
Ans: B
74. In which phase of the compiler the Push Down Automata is used ?
(a) Lexical analysis (b) Syntax analysis (c) Code optimization (d) Code generation
Ans: B
75. The context sensitive languages are recognized by the machines termed as
(a) Push Down Automata (b) Linear Bounded Automata (c) Finite Automata (d) None of the above
Ans: B
76. Which of the following is not a key process area in CMM level 5 ?
(a) Defect prevention (b) Process change management (c) Software Product Engineering (d) Technology change managementAns: C
77. In C++ an exception is thrown using the key word ________.
(a) throws (b) throw (c) threw (d) thrown
Ans: B
78. Which of the following operator is used to concatenate strings in Java ?
(a) & (b) % (c) ++ (d) +
Ans: D
79. Which of the following is not a casting operator in C++ ?
(a) explicit_cast (b) static_cast (c) dynamic_cast (d) reinterpret_cast
Ans: A
80. In C++ Cin and Cout are the predefined stream ________.
(a) operators (b) objects (c) functions (d) data types
Ans: B
81. The arguments of WinMain( ) function are mandatory and they communicate with ________.
(a) Operating system (b) Hardware (c) Kernel (d) None of these
Ans: A
82. Which of the following can be used to manipulate the access control list ?
(a) X host (b) X host + hostname (c) X host_hostname (d) None of the above
Ans: A
83. Which of these is the extension of VC++ resource file ?
(a) res (b) rs (c) rc (d) rcp
Ans: C
84. Which of the following tool is used to show the running process in tree view ?
(a) Process viewer (b) SPY++ (c) VC++ (d) VB
Ans: B
85. The basic storage element used in clocked sequential circuit is termed as
(a) Full Adder (b) Multiplexer (c) Flip flop (d) None of the above
Ans: C
86. A Data bus is ________
(a) Unidirection (b) Bidirection (c) Arbitrarily wide (d) None of the above
Ans: B
87. The single bus structure is primarily the feature of –
(a) Main frame computers (b) Mini computers (c) High performance computers (d) Micro computer
Ans: C
90. A fuzzy set A is called normal when
(a) Height (A) = 0 (b) Height (A) < 0 (c) Height (A) = 1 (d) Height (A) < 1
Ans: C
91. Which of the following 2 input Boolean logic function is linearly inseparable ?
(a) AND (b) OR (c) NOR (d) XOR
Ans: D
93. Which file contains setting for all .NET application types such as windows consoles, class libraries and web applications ?
(a) Web.config (b) Machine.config (c) Global.asax (d) All of the above
Ans: B
94. Which of these is the first event when a user requests a web page in ASP.NET ?
(a) PreLoad (b) Load (c) Preinit (d) Init
Ans: C
95. What is the use of the tag <canvas> in HTML page ?
(a) Adding any image (b) Graphic drawing using SVG (c) Graphic growing using JavaScript (d) None of the above
Ans: C
96. If you want that command object should return XML data, then which of the following command object method will you use ?
(a) getXMlData (b) getXml (c) ExecuteXmLReader (d) None of the above
Ans: C
97. Which of the following is (are) the application layer protocol(s) ?
(a) FTP (b) DNS (c) Telnet (d) All of the above Ans: D
98. The default parameter passing mechanism is also called as ________
(a) function call (b) call by value (c) call by reference (d) None of the above
Ans: B
99. In C, which of the following header file includes a function for variable number of arguments ?
(a) stdlib.h (b) stdarg.h (c) ctype.h (d) (a) and (b) both
Ans: B
100. To store dissimilar data together which type shall be used ?
(a) array (b) structure (c) stack (d) None of these
Ans: B
(a) 4-bit algorithm (b) Mid-point algorithm (c) Cyrus Beck algorithm (d) Cohen Sutherland algorithm
Ans: B
55. Which of the following window is depicted by region code (0000) ?
(a) Viewing window (b) Left clipping window (c) Right clipping window (d) Bottom clipping window
Ans: A
56. Which of the following is changed by the scale transformation of an object ?
(a) Size (b) Location (c) Shape (d) (a) and (b) both
Ans: A
57. If boundary is specified in a single colour and algorithm proceeds by considering pixels one by one until boundary colour is encountered, this approach is called
(a) Scan line fill algorithm (b) Boundary fill algorithm
(c) Flood fill algorithm (d) Parallel curve algorithm
Ans: B
58. In which transformation, the shape of an object can be modified in any of direction depending upon the values assigned ?
(a) Reflection (b) Shearing (c) Scaling (d) None of the above
Ans: B
59. Which of the following is not a process metric ?
(a) Functionality (b) Quality (c) Productivity (d) Efficiency
Ans: A
60. Which two of the following models will not be able to give desired outcome if user‟s participation is not involved ?
(a) Waterfall and spiral (b) RAD and spiral (c) RAD and waterfall (d) RAD and prototyping
Ans: D
61. A cube of size 1 unit is placed such that origin coincides with one vertex and three axes run along the edges from that vertex. The vertex diagonal opposite to vertex (0, 1, 0) will be
(a) (0, 0, 0) (b) (1, 1, 0) (c) (0, 1, 1) (d) (1, 0, 1)
Ans: D
62. In which of the following application linked list is not a suitable data structure ?
(a) Insertion sort (b) Binary search (c) Radix sort (d) Polynomial manipulation
Ans: B
63. If each node in a tree has value greater than every value in its left subtree and lesser than every value in right subtree, it will be called (a) Complete tree (b) Full binary tree (c) Binary search tree (d) Threaded tree
Ans: C
64. Which of these data structure is most suitable for implementing Breadth First Search (BFS) ?
(a) Queue (b) Stack (c) Tree (d) Heap
Ans: A
65. For a function of n input variables, robustness testing yields.
(a) (4n + 3) test cases (b) (6n + 1) test cases
(c) (4n + 1) test cases (d) (2n + 1) test cases Ans: B
66. GSM is related to which of the following generations of cellular networks ?
(a) First generation (b) Third generation (c) Second generation (d) Fourth generation
Ans: C
67. The two addresses required in mobile IP equipped devices are
(a) Home and Public addresses (b) Private and Public addresses (c) Home and Care-of addresses (d) None of the above
Ans: C
68. Which of the following is a standard assigned to Bluetooth ?
(a) IEEE 802.15.1 (b) IEEE 802 (c) IEEE 802.11 (d) IEEE 1471
Ans: A
69. What is the maximum range of Bluetooth, version 5.0 ?
(a) 120 metres (b) 200 metres (c) 240 metres (d) None of the above
Ans: C
70. Which of the following represent the closest speed at which 4G and 4G LTE operate ?
(a) 200 kbps – 3 Mbps (b) 300 Mbps – 1 Gbps (c) > 1 Gbps (d) None of the above
Ans: B
71. The process of changing the channel associated with current connection when call is in progress is termed as
(a) Stand off (b) Handover (c) Hand off (d) None of these
Ans: C
72. Which of the following is a „false‟ statement ?
(a) The union of two regular sets is regular. (b) The intersection of two regular sets is regular
(c) Every subset of regular set is regular (d) None of the above
Ans: C
73. The machine which has the output associated with its states is called as
(a) Melay machine (b) Moore machine (c) Xeno machine (d) Finite state machine
Ans: B
74. In which phase of the compiler the Push Down Automata is used ?
(a) Lexical analysis (b) Syntax analysis (c) Code optimization (d) Code generation
Ans: B
75. The context sensitive languages are recognized by the machines termed as
(a) Push Down Automata (b) Linear Bounded Automata (c) Finite Automata (d) None of the above
Ans: B
76. Which of the following is not a key process area in CMM level 5 ?
(a) Defect prevention (b) Process change management (c) Software Product Engineering (d) Technology change managementAns: C
77. In C++ an exception is thrown using the key word ________.
(a) throws (b) throw (c) threw (d) thrown
Ans: B
78. Which of the following operator is used to concatenate strings in Java ?
(a) & (b) % (c) ++ (d) +
Ans: D
79. Which of the following is not a casting operator in C++ ?
(a) explicit_cast (b) static_cast (c) dynamic_cast (d) reinterpret_cast
Ans: A
80. In C++ Cin and Cout are the predefined stream ________.
(a) operators (b) objects (c) functions (d) data types
Ans: B
81. The arguments of WinMain( ) function are mandatory and they communicate with ________.
(a) Operating system (b) Hardware (c) Kernel (d) None of these
Ans: A
82. Which of the following can be used to manipulate the access control list ?
(a) X host (b) X host + hostname (c) X host_hostname (d) None of the above
Ans: A
83. Which of these is the extension of VC++ resource file ?
(a) res (b) rs (c) rc (d) rcp
Ans: C
84. Which of the following tool is used to show the running process in tree view ?
(a) Process viewer (b) SPY++ (c) VC++ (d) VB
Ans: B
85. The basic storage element used in clocked sequential circuit is termed as
(a) Full Adder (b) Multiplexer (c) Flip flop (d) None of the above
Ans: C
86. A Data bus is ________
(a) Unidirection (b) Bidirection (c) Arbitrarily wide (d) None of the above
Ans: B
87. The single bus structure is primarily the feature of –
(a) Main frame computers (b) Mini computers (c) High performance computers (d) Micro computer
Ans: C
90. A fuzzy set A is called normal when
(a) Height (A) = 0 (b) Height (A) < 0 (c) Height (A) = 1 (d) Height (A) < 1
Ans: C
91. Which of the following 2 input Boolean logic function is linearly inseparable ?
(a) AND (b) OR (c) NOR (d) XOR
Ans: D
93. Which file contains setting for all .NET application types such as windows consoles, class libraries and web applications ?
(a) Web.config (b) Machine.config (c) Global.asax (d) All of the above
Ans: B
94. Which of these is the first event when a user requests a web page in ASP.NET ?
(a) PreLoad (b) Load (c) Preinit (d) Init
Ans: C
95. What is the use of the tag <canvas> in HTML page ?
(a) Adding any image (b) Graphic drawing using SVG (c) Graphic growing using JavaScript (d) None of the above
Ans: C
96. If you want that command object should return XML data, then which of the following command object method will you use ?
(a) getXMlData (b) getXml (c) ExecuteXmLReader (d) None of the above
Ans: C
97. Which of the following is (are) the application layer protocol(s) ?
(a) FTP (b) DNS (c) Telnet (d) All of the above Ans: D
98. The default parameter passing mechanism is also called as ________
(a) function call (b) call by value (c) call by reference (d) None of the above
Ans: B
99. In C, which of the following header file includes a function for variable number of arguments ?
(a) stdlib.h (b) stdarg.h (c) ctype.h (d) (a) and (b) both
Ans: B
100. To store dissimilar data together which type shall be used ?
(a) array (b) structure (c) stack (d) None of these
Ans: B
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15