##### Computer Past Papers Solved

Computer Past Papers Solved are here. All the Computer Past Papers Solved have been taken from the most repeated and the most important papers. Let us prepare Computer Past Papers Solved or click here for more.

## Computer Past Papers Solved

- Which of the following set of UNIX commands will always display “WELCOME”?
**Title = WELCOME; export title; sh –c “echo $title”** - Eco system is a Frame work for
**Building Internet Market** - The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as
**Piggy backing** - ______ is process of extracting previously non known valid and actionable information from large data to make crucial business and strategic decisions.
**Data Mining** - The aspect ratio of an image is defined as
**The ratio of width to its height measured in unit length.** - Using RSA algorithm, what is the value of cipher text C, if the plain text M = 5 and p = 3, q = 11 & d = 7?
**26** - You are given an OR problem and a XOR problem to solve. Then, which one of the following statements is true?
**Problem can be solved using single layer perception and XOR problem can be solved using radial basis function.** - Let V
_{1}= 2I – J + K and V_{2}= I + J – K, then the angle between V_{1}& V_{2}and a vector perpendicular to both V_{1}& V_{2}shall be:**90**^{০}and (–2I – J + 3K) - In classful addressing, an IP address 123.23.156.4 belongs to ______ class format.
**A (Solved MCQs of Computer Science)** - The Mandelbrot set used for the construction of beautiful images is based on the following transformation: x
_{n + 1}= x^{2}_{n}+ z Here**Both x & z are complex numbers.** - Which of the following permutations can be obtained in the output using a stack of size 3 elements assuming that input, sequence is 1, 2, 3, 4, 5?
**3, 4, 5, 2, 1** - In a Linear Programming Problem, suppose there are 3 basic variables and 2 non-basic variables, then the possible numbers of basic solutions are
**10** - Which provides an interface to the TCP/IP suit protocols in Windows95 and Windows NT?
**Calinsock Active-X Control** - If dual has an unbounded solution, then its corresponding primal has
**No feasible solution** - The number of distinct bracelets of five beads made up of red, blue, and green beads (two bracelets are indistinguishable if the rotation of one yield another) is,
**51** - Which are the classifications of data used in Mobile Applications?
**Private data, Public data, Shared data.** - In an enhancement of a CPU design, the speed of a floating point unit has been increased by 20% and the speed of a fixed point unit has been increased by 10%. What is the overall speed achieved if the ratio of the number of floating point operations to the number of fixed point operations is 2 : 3 and the floating point operation used to take twice the time taken by the fixed point operation in original design?
**1.62** - Lamps are to be connected to a single electric outlet by using an extension board each of which has four outlets. The number of extension boards needed to connect all the light is
**19** - Which of the following flags are set when ‘JMP’ instruction is executed?
**No flag is set** - A thread is a light weight process. In the above statement, weight refers to
**Number of resources**(Computer Past Papers Solved) - The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be handled by this algorithm shall
**Be arbitrary no. of objects** - The power set of AUB, where A = {2, 3, 5, 7} and B = {2, 5, 8, 9} is
**64** - In Win32, which function is used to create Windows Applications?
**Win Main** - Suppose a processor does not have any stack pointer registers, which of the following statements is true?
**All subroutine calls and interrupts are possible.** - Everything below the system call interface and above the physical hardware is known as
**Kernel.** - Which is not the correct statement?
**The class of regular sets is not closed under inverse homomorphism.** - When a programming Language has the capacity to produce new data type, it is called as,
**Extensible Language** - Which of the following operating system is better for implementing client-server network?
**Windows 2000** - Consider a system having m resources of the same type. These resources are shared by 3 processes A, B and C which have peak demands of 3, 4 and 6 respectively. For what value of m deadlock will not occur?
**13 (Solved MCQs of Computer Science)** - The Default Parameter Passing Mechanism is called as
**Call by Value** - Which of the following regular expression identities are true?
**(r + s)* = (r*s*)*** - Functions defined with class name are called as
**Constructor** - Let f be the fraction of a computation (in terms of time) that is parallelizable, P the number of processors in the system, and s
_{p}the speed up achievable in comparison with sequential execution – then the s_{p}can be calculated using the relation:**1/ [1 – f + f/P]** - If the parse tree of a word w generated by a Chomsky normal form grammar has no path of length greater than i, then the word w is of length
**No greater than 2**^{i–1} - The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system
**Object Model, Dynamic Model, and Functional Model.** - The factors that determine the quality of a software system are
**Correctness, reliability** - Skolmization is the process of
**Removing all the existential quantifiers.** - Which level of Abstraction describes how data are stored in the data base?
**Physical level** - The transform which possesses the “multi-resolution” property is
**Wavelet transforms** - Which one is a collection of templates and rules?
**XSL** - A program P calls two subprograms P
_{1}and P_{2}. P_{1 }can fail 50% times and P_{2}40% times. Then P can fail**70%** - Third normal form is based on the concept of
**Transitive Dependency** - If the Fourier transform of the function f(x, y) is F(m, n), then the Fourier transform of the function f(2x, 2y) is:
**1/4 F(m/2 , n/2)** - ______ establishes information about when, why and by whom changes are made in software.
**An Audit Trail.** - An expert system shell is an expert system without
**Domain knowledge** - An example of a dictionary-based coding technique is
**LZW coding** - Which is the method used to retrieve the current state of a check box?
**Get State ( )** - Referential integrity is directly related to
**Foreign key** - A cryptarithmetic problem of the type SEND + MORE MONEY Can be solved efficiently using
**Constraint satisfaction technique (Solved MCQs of Computer Science)** - A* algorithm is guaranteed to find an optimal solution if
**g is always 1.** - In Delta Rule for error minimization
**Weights are adjusted w.r.to difference between desired output and actual output** - The concept of pipelining is most effective in improving performance if the tasks being performed in different stages:
**require about the same amount of time** - What is Granularity?
**The size of data item** - Suppose that a given application is run on a 64-processor machine and that 70 percent of the application can be parallelized. Then the expected performance improvement using Amdahl’s law is
**4.22** - Which level of Abstraction describes what data are stored in the Database?
**Logical level** - The problem that occurs when one transaction updates a database item and then the transaction fails for some reason is
**Dirty Read Problem** - In an image compression system 16384 bits are used to represent 256 × 256 image with 256 gray levels. What is the compression ratio for this system?
**2** - X.25 is ________ Network.
**Connection Oriented Network** - Which of the following can be used for clustering of data?
**Self organizing map** - Which of the following is scheme to deal with deadlock?
**Time out**(Computer Past Papers Solved) - If the pixels of an image are shuffled then the parameter that may change is
**Covariance** - The common property of functional language and logical programming language:
**Both are declarative** - Consider a schema R (A, B, C, D) and functional dependencies A->B and C -> D. Then the decomposition R
_{1}(A, B) and R_{2}(C, D) is**Dependency preserving but not lossless join** - The quantiser in an image-compression system is a
**lossy element which exploits the psychovisual redundancy** - Data Warehouse provides
**Storage, Functionality Responsiveness to queries**