Computer Science MCQs Test
Computer Science MCQs Test are here. All the Computer Science MCQs Test have been taken from the past papers which are the most repeated and the most important Computer Science MCQs Test. Let us prepare Computer Science MCQs Test or click here for more.
Computer Science MCQs Test
- If f(x, y) is a digital image, then x, y and amplitude values of f are Finite
- Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored): Process A B C D Arrival time 0 123 CPU cycle 8 495. The average turnaround time of these processes will be 18.25 milliseconds
- A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order: ABACABDBACD Assuming that a page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are 9 and 8
- Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct? T1 < T2
- Working set model is used in memory management to implement the concept of Principal of Locality
- A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry? 16 GB
- A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following statement is correct? OS maintains only CPU registers for each thread
- The versions of windows operating system like windows XP and window Vista uses following file system: (A) FAT-16 (B) FAT-32 (C) NTFS (NT File System) (D) All of the above
- Which one of the following is a correct implementation of the meta-predicate “not” in PROLOG (Here G represents a goal)? not (G):– call(G), !, fail. not(G).
- Which one of the following is not an informed search technique? Depth first search
- If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as Skolemization
- Given two jugs of capacities 5 litres and 3 litres with no measuring markers on them. Assume that there is endless supply of water. Then the minimum number of states to measure 4 litres water will be 7
- The map colouring problem can be solved using which of the following technique? Constraint satisfaction
- Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? Scripts (Solved MCQs of Computer Science)
- A fuzzy set A on R is ________ if A (λx1 + (1 – λ) x2) ≥ min [A(x1), A(x2)] for all x1, x2 ∈ R and all λ ∈ [0, 1], where min denotes the minimum operator. Convex
- Which of the following is a correct predicate logic statement for “Every Natural number has one successor”? ∀x∃y (succ(x, y) ∧ (∃z succ(x, z) ⇒ equal (y, z)))
- α – β cutoffs are applied to Minimax search
- Which of the following is not a part of an expert system shell? Knowledge Base
- The Blocks World Problem in Artificial Intelligence is normally discussed to explain a Planning system
- Means-Ends Analysis process centres on the detection of difference between the current state and the goal state. Once such a difference is found, and then to reduce the difference one applies An operator that can reduce the difference
- Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is 0.2 second
- Which of the following is the size of Network bits and Host bits of Class Aof IP address? Network bits 7, Host bits 24
- Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged? Window size
- Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth? 7500 bps
- Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address? 201.14.78.64
- If an artificial variable is present in the ‘basic variable’ of optimal simplex table then the solution is Infeasible solution
- An optimal assignment requires that the minimum number of horizontal and vertical lines that can be drawn to cover all zeros be equal to the number of Rows or columns
- Assume, L is regular language. Let statements S1 and S2 are defined as: S1: SQRT (L) = {x| for some y with |y| = |x|2, xy∈L}. S2: LOG (L) = {x| for some y with |y| = 2|x|, xy∈ L}. Which of the following is true? Both S1 and S2 are correct.
- A regular grammar for the language L = {anbm | n is even and m is even} is given by S→aaS | S1; S1 → bbS1 | λ
- The language L = {an bn am bm | n ≥ 0, m ≥ 0} is Context fr-ee but not linear
- Assume statements S1 and S2 defined as: S1: L2-L1 is recursive enumerable where L1 and L2 are recursive and recursive enumerable respectively. S2: The set of all Turing machines is countable. Which of the following is true? Both S1 and S2 are correct
- _______ constraints ensure that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation. Referential Integrity
- The SQL expression, Select distinct T, branch_name from branch T, branch S where T.assets>S.assets and S.branch_city=”Mumbai” finds the names of All branches that have greater assets than some branch located in Mumbai.
- Let A be the set of comfortable houses given as A = {x1/0.8, x2/0.9, x3/0.1, x4/0.7} and B be the set of affordable houses B = {x1/0.9, x2/0.8, x3/0.6, x4/0.2} Then the set of comfortable and affordable houses is {x1/0.8, x2/0.8, x3/0.1, x4/0.2} (Solved MCQs of Computer Science)
- Support of a fuzzy set A = { x1/0.2, x2/0.15, x3/0.9, x4/0.95, x5/0.15} within a universal set X is given as {x1, x2, x3, x4, x5} (Computer Science MCQs Test)
- In a single perceptron, the updation rule of weight vector is given by w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)
- ______ refers to the discrepancy among a computed, observed or measured value and the true specified or theoretically correct values. Error
- Which logic family dissipates the minimum power? CMOS
- Which of the following electronic component is not found in IC’s? Inductor
- A given memory chip has 14 address pins and 8 data pins. It has the following number of locations. 214
- The instruction: MOV CL, [BX] [DI] + 8 represent the _____ addressing mode. Based Indexed
- The power dissipation of a flip-flop is 3mW. The power dissipation of a digital system with 4 flip-flops is given by 12 mW
- A binary ripple counter is required to count up to 16383. How many flip-flops are required? 14
- The time complexity of recurrence relation T(n) = T(n/3) + T(2n/3) + O(n) is O(n Ig n)
- How many people must there be in a room before there is a 50% chance that two of them were born on the same day of the year? At least 23
- The number of possible parenthesizations of a sequence of n matrices is Ω(2n)
- The time complexity of an efficient algorithm to find the longest monotonically increasing subsequence of n numbers is O(n Ig n)
- Given 0-1 knapsack problem and fractional knapsack problem and the following statements: S1: 0-1 knapsack is efficiently solved using Greedy algorithm. S2: Fractional knapsack is efficiently solved using Dynamic programming. Which of the following is true? Both S1 and S2 are not correct.
- Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for a value, then it will work correctly for all the other values in that class. This is used To reduce the number of test cases required
- The failure intensity for a basic model as a function of failures experienced is given as λ(μ)-λ0[1 – (μ)/(V0)] where λ0 is the initial failure intensity at the start of the execution, μ is the average or expected number of failures at a given point in time, the quantity V0 is the total number of failures that would occur in infinite time. Assume that a program will experience 100 failures in infinite time; the initial failure intensity was 10 failures/CPU hr. Then the decrement of failures intensity per failure will be –0.1 per CPU hr.
- Improving processing efficiency or performance or restructuring of software to improve changeability is known as Perfective maintenance
- In ____, modules A and B make use of a common data type, but perhaps perform different operations on it. Stamp coupling
- Sixty (60) reusable components were available for an application. If only 70% of these components can be used, rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will be the risk exposure if risk probability is 80%? Rs. 20,160
- Consider the following two function declarations: (i) int *f( ) (ii) int (*f)( ) Which of the following is true? The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer. (Solved MCQs of Computer Science)
- Assume that we have constructor function for both Base and Derived classes. Now consider the declaration: main ( ) Base *p = new Derived; In what sequence, the constructor will be executed? Base class constructor is followed by Derived class constructor
- MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes ______ frames. Redundant
- If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division? 111111000
- If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the Public Key of user B
- A _____ can forward or block packets based on the information in the network layer and transport layer header. Proxy firewall
- The two color systems – the HSV and HLS are Hue, Saturation, Value and Hue, Lightness, Saturation
- The parametric representation of the line segment between the position vectors P1(2, 3) and P2(5, 4) is given as x (t)= 2+3t, y(t)=3+t 0 ≤ t ≤ 1
- The programming languages C and C++ are not strongly typed languages because: Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are not type checked.
- The tracing model in Prolog describes program execution in terms of certain events. These events are Call, exit, redo and fail
- Which of the following statements is not correct with reference to distributed systems? In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.
- Which of the following shell scripts will produce the output “my first script”? For i in my first script; do echo –i $i; done
- The portion of Windows 2000 operating system which is not portable is Virtual memory management
- Which of the following statements is not true for UNIX Operating System? UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.
- The first home computer in 1977 sold in millions of units, was Apple II.
- ‘PARAM’ is a supercomputer.
- Father of the Computer is called Charles Babbage.
- The worst case time complexity of AVL tree is better in comparison to binary search tree for Search and Insert Operations
- The GSM network is divided into the following three major systems: BSS, BSC, MSC
- If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disks queue of I/O blocks requests are 98, 37, 14, 124, 65, 67. 310
- Component level design is concerned with Flow oriented analysis
- The Mobile Application Protocol (MAP) typically runs on top of which protocol? HTTP (Hyper Text Transfer Protocol)
- If a packet arrives with an M-bit value is ‘l’ and a fragmentation offset value ‘0’, and then it is ______ fragment. (A) First (B) Middle (C) Last (D) All of the above
- The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be 160.
- In compiler design ‘reducing the strength’ refers to Reducing efficiency of program.
- In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register? Indirect
- Which of the following is true? A relation in 3NF is always in BCNF.
- Given memory partitions of 100 K, 500 K, 200 K, 300 K and 600 K (in order) and processes of 212 K, 417 K, 112 K, and 426 K (in order), using the first-fit algorithm, in which partition would the process requiring 426 K be placed? 200 K