Caravan Computer Science MCQs PDF
Caravan Computer Science MCQs PDF are here. All the Caravan Computer Science MCQs PDF have been taken from past papers which are the repeated and the most important. Let us prepare Caravan Computer Science MCQs PDF or click here for more.
Caravan Computer Science MCQs PDF
- Reliability of software is directly dependent on Number of errors present
- ______ is not an E-Commerce application. Evaluating an employee
- ______ is a satellite based tracking system that enables the determination of person’s position. Global Positioning System
- A complete microcomputer system consists of (A) Microprocessor (B) Memory (C) Peripheral equipment (D) All of the above
- Where does a computer add and compare data? CPU chip
- Pipelining strategy is called implement Instruction prefetch
- Which of the following data structure is linear type? (A) Strings (B) Lists (C) Queues (D) All of the above
- To represent hierarchical relationship between elements, which data structure is suitable? Tree
- When data and acknowledgement are sent in the same frame, this is called as Piggy backing
- Encryption and Decryption is the responsibility of _______ Layer. Application
- An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are _______ and _______. 1000 bauds \ sec & 4000 bps
- The VLF and LF bauds use _______ propagation for communication. Ground
- Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is 10
- FAN IN of a component A is defined as Number of components that can call or pass control to component A.
- The relationship of data elements in a module is called Cohesion
- Software Configuration Management is the discipline for systematically controlling (A) the changes due to the evolution of work products as the project proceeds. (B) The changes due to defects (bugs) being found and then fixed. (C) the changes due to requirement changes (D) all of the above
- Which one of the following is not a step of requirement engineering? Requirement design
- Testing of software with actual data and in actual environment is called Beta testing
- The student marks should not be greater than 100. This is Integrity constraint (Solved MCQs of Computer Science)
- GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to 28th record
- Based on the cardinality ratio and participation ________ associated with a relationship type, choose the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. Constraints
- Data Integrity control uses Passwords to prohibit unauthorised access to files.
- What does the following declaration mean? int (*ptr) [10]; ptr is a pointer to an array of 10 integers.
- Which of the following operators cannot be overloaded in C+ +? : :
- _________ allows creating classes which are derived from other classes, so that they automatically include some of its “parent’s” members, plus its own members. Inheritance
- The correct way to round off a floating number x to an integer value is y = (int) (x + 0.5)
- What is the value of the postfix expression? a b c d + – ∗ (where a = 8, b = 4, c = 2 and d = 5) –24
- If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue? Only rear pointer changes
- _______ is often used to prove the correctness of a recursive function. Mathematical Induction
- For any B-tree of minimum degree t ≥ 2, every node other than the root must have at least ________ keys and every node can have at most ________ keys. t – 1, 2t – 1
- Given two sorted list of size ‘m’ and ‘n’ respectively. The number of comparison needed in the worst case by the merge sort algorithm will be m + n – 1
- The context fr-ee grammar for the language, L = {an bm | n ≤ m + 3, n ≥ 0, m ≥ 0} is S → aaaA | aa A | aA | λ, A → aAb | B, B → Bb | λ
- The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called Relocation
- Which of the following derivations does a top-down parser use while parsing an input string? The input is scanned from left to right. Leftmost derivation
- The dual of a Boolean expression is obtained by interchanging Boolean sums and Boolean products and interchanging 0’s & 1’s
- Let P(m, n) be the statement, “m divides n” where the universe of discourse for both the variables is the set of positive integers. Determine the truth values of each of the following propositions: I. ∀m ∀n P(m, n), II. ∃m ∀n P(m, n) I – false & II – true
- Big – O estimate for, f(x) = (x + 1) log(x2 + 1) + 3x2 is given as O(x2)
- How many edges are there in a forest of t-trees containing a total of n vertices? n – t
- Let f and g be the functions from the set of integers to the set integers defined by f(x) = 2x + 3 and g(x) = 3x + 2. Then the composition of f and g and g and f is given as 6x + 7, 6x + 11 (Solved MCQs of Computer Science)
- A graph is non-planar if and only if it contains a subgraph homomorphic to K 3, 3 or K5
- Active X controls are Pentium binary programs that can be embedded in Web pages
- Which of the following is widely used inside the telephone system for long-haul data traffic? ATM
- The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation: ANSI
- Electronic Data Interchange Software consists of the following four layers: Business application, Internal format conversion, EDI translator, EDI envelope
- The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4-cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is 16 bits
- Consider a disk queue with request for input/output to block on cylinders. 98, 183, 37, 122, 14, 124, 65, 67 in that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are respectively 236 and 252 cylinders
- How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size? 332.8 KB
- Linux operating system uses Fair Preemptive Scheduling
- COCOMO stands for COnstructive COst Model
- While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following? Size of software
- A good software design must have Low module coupling, high module cohesion
- Cyclometric complexity of a flow graph G with n vertices and e edges is V(G) = e–n+2
- When the following code is executed what will be the value of x and y? int x = 1, y = 0; y = x++; 2, 1
- How many values can be held by an array A (–1, m; 1, m)? m (m+2)
- What is the result of the expression (1&2) + (3/4)? 0
- How many times the word ‘print’ shall be printed by the following program segment? For (i=1, i<2,i++), For (j=1,j<2,j++), For (k=1,k<2,k++), Printf(“print/n”) 8
- Which of the following is not a type of Database Management System? Sequential
- Manager’s salary details are to be hidden from Employee Table. This Technique is called as External level Data-hiding
- A Network Schema Permits many to many relationship (Solved MCQs of Computer Science)
- Which normal form is considered as adequate for usual database design? 3NF
- If D1, D2,..Dn are domains in a relational model, then the relation is a table, which is a subset of D1×D2× … ×Dn
- Which of the following addresses is used to deliver a message to the correct application program running on a host? Port
- In ________ substitution, a character in the plaintext is always changed to the same character in the cipher text, regardless of its position in the text. Monoalphabetic
- In classful addressing, the IP address 190.255.254.254 belongs to Class B
- In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy? 15 clusters, 16 regions and 20 routers