PakMCQs Computer Test
PakMCQs Computer Test are here. All the PakMCQs Computer Test have been taken from the past papers which are the most repeated and the most important PakMCQs Computer Test. Let us prepare PakMCQs Computer Test or click here for more.
PakMCQs Computer Test
- A* algorithm uses f ‘ = g + h’ to estimate the cost of getting from the initial state to the goal state, where g is a measure of the cost of getting from initial state to the current node and the function h’ is an estimate of the cost of getting from the current node to the goal state. To find a path involving the fewest number of steps, we should set g = 1
- The transform which possesses the highest ‘energy compaction’ property is Cosine transforms
- The _______ memory allocation function modifies the previous allocated space. realloc( )
- The mechanism that binds code and data together and keeps them secure from outside world is known as Encapsulation (Solved MCQs of Computer Science)
- Which of the following IP address class is a multicast address? Class D
- While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module is atmost 0.81
- The upper bound of computing time of m coloring decision problem is O(nmn)
- Which one of the following statements is incorrect? Cyclometric complexity for a flow graph G is V (G) = E – N + 2, where E is the number of edges & N is the number of nodes in the flow graph.
- Consider a weighted undirected graph with positive edge weights and let (u, v) be an edge in the graph. It is known that the shortest path from source vertex s to u has weight 53 and shortest path from s to v has weight 65. Which statement is always true? Weight (u, v) > 12
- Consider the regular expression (a + b) (a + b) … (a + b) (n-times). The minimum number of states in finite automaton that recognizes the language represented by this regular expression contains n + 1 states
- Number of binary trees formed with 5 nodes is 42
- Are we building the right product? This statement refers to Validation
- The following postfix expression is evaluated using a stack 823^/23* + 51* – The top two elements of the stack after first * is evaluated 6, 1
- The following CFG S -> aB | bA, A -> a | as | bAA, B -> b | bs | aBB Generates strings of terminals that have Equal number of a’s and b’s
- Consider the following pseudo-code: If (A > B) and (C > D) then A = A + 1, B = B + 1 And if the cyclomatic complexity of the pseudo-code is 3
- Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)? Network layer
- Which diagram provides a formal graphic notation for modeling objects, classes and their relationships to one another? Object diagram
- A computer system supports 32 bit virtual address as well as 32 bit physical addresses. Since the virtual address space is of same size as that of physical address space, if we want to get rid of virtual memory, which one of the following is true? Hardware support for memory management is not needed.
- The feasible region represented by the constraints x1 – x2 < 1, x1 + x2 > 3, x1 > 0, x2 > 0 of the objective function Max Z = 3x1 + 2x2 is Unbounded feasible region
- The colour of an object is largely determined by its diffuse reflection coefficient. If Kd = (0.8, 0.4, 0), then what shall be the colour of the object, if the light used is blue and magenta? Black and Red
- If an instruction takes ‘i’ microseconds and a page fault takes an additional ‘j’ microseconds. The effective instruction time, if on the average a page fault occurs every k instructions, is i + j/k
- How many relations are there on a set with n elements that are symmetric and a set with n elements that are reflexive and symmetric? 2n(n+1)/2 and 2n(n–1)/2
- The strategy used to reduce the number of tree branches and the number of static evaluations applied in case of a game tree is Alpha-beta pruning strategy
- What is the size (in terms of bits) of Header length field in IPV4 header? 4 (Solved MCQs of Computer Science)
- ______ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles. Windows NT
- A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling routine that saves appropriate files before terminating the process. When a Ctrl + C input is given to this process, what is the mode in which the signal handling routine executes? Kernel mode
- A CPU generally handles an interrupt by executing an interrupt service routine By checking the interrupt register after finishing the executing the current instruction
- Radio signals generally propagate according to the following mechanisms: Reflection, Diffraction, Scattering
- If ‘a’ and ‘b’ are the end points of a line, then which one of the following is true? If both end points are left, right, above or below the window, the line is trivially invisible
- If the period of a signal is 1000 ms, then what is its frequency in kilohertz? 10–3 KHz
- HTML is defined using SGML – an _______ standard, information processing-text and office systems (SGML) for text information processing. ISO – 8879
- What is the meaning of ‘Hibernate’ in Windows XP/Windows 7? Shutdown the computer without closing the running applications.
- Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main ( ). Base * P = New Derived; in what sequence will the constructor be called? Base class constructor followed by derived class constructor
- Which one of the following options is not a shell in UNIX system? Net Shell
- In which file the compiler manage the various objects, which are used in windows programming? Text File
- On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order contains requests for the following tracks: 123, 874, 692, 475, 105, 376. (Assume SCAN algorithm) 1219
- Halftoning is defined as A technique for using minimum number of intensity levels to obtain increased visual resolution.
- If the primal Linear Programming problem has unbounded solution, then it’s dual problem will have no feasible solution at all
- Given a flow graph with 10 nodes, 13 edges and one connected components, the number of regions and the number of predicate (decision) nodes in the flow graph will be 5, 4
- Function points can be calculated by UFP ∗ CAF
- One weakness of boundary value analysis and equivalence partitioning is they do not explore combinations of input circumstances
- Which once of the following is not a software myth? If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects.
- Which is the protocol for performing RPCs between applications in a language and system independent way? Simple Object Access Protocol (SOAP)
- The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is Style sheet (Solved MCQs of Computer Science)
- Which of the following concepts means adding new concepts to a program as it runs? Dynamic loading
- Which of the following correctly describes overloading of functions? Ad-hoc polymorphism
- The compiler converts all operands up to the type of the largest operand is called Type Promotion
- C++ actually supports the following two complete dynamic systems: One defined by C and one specific to C++
- Important advantage of using new and delete operators in C++ is Allocation of memory and fr-ees the memory previously allocated.
- Given the following statements: S1: The grammars S → asb | bsa | ss | a and S → asb | bsa | a are not equivalent. S2: The grammars S → ss | sss | asb | bsa | λ and S → ss | asb | bsa | λ are equivalent. Which of the following is true? Both S1 and S2 are correct.
- High level knowledge which relates to the use of sentences in different contexts and how the context affect the meaning of the sentences? Pragmatic
- The objective of ________ procedure is to discover at least one ________ that causes two literals to match. unification, substitution
- If h* represents an estimate of the cost of getting from the current node N to the goal node and h represents actual cost of getting from the current node to the goal node, then A* algorithm gives an optimal solution if h* underestimates h
- The mean-end analysis process centers around the detection of differences between the current state and goal state. Once such a difference is isolated, an operator that can reduce the difference must be found. But perhaps that operator cannot be applied to the current state. So a sub-problem of getting to a state in which it can be applied is set up. The kind of backward chaining in which operators are selected and then sub goals are set up to establish the precondition of operators is called operator subgoaling
- In alpha-beta pruning, _________ is used to cut off the search at maximizing level only and _________ is used to cut off the search at minimizing level only. beta, alpha
- If A and B are two fuzzy sets with membership functions, μA(x) = {0.2, 0.5, 0.6, 0.1, 0.9}, μB(x) = {0.1, 0.5, 0.2, 0.7, 0.8} Then the value of μA ∩ B will be {0.1, 0.5, 0.2, 0.1, 0.8}
- The height h(A) of a fuzzy set A is defined as h(A) = sup A(x), x ∈ A. Then the fuzzy set A is called normal when h(A) = 1
- An artificial neuron receives n inputs x1, x2,…., xn with weights w1, w2,…., wn attached to the input links. The weighted sum ________ is computed to be passed on to a non-linear filter φ called activation function to release the output. Σ wi ⋅ xi
- Consider the formula in image processing RD = 1 – 1/CR Where CR =n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent the same information. In this situation RD is called as relative _________ of the first data set. Data Redundancy
- Find the false statement: The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
- The message 11001001 is to be transmitted using the CRC polynomial x3 + 1 to protect it from errors. The message that should be transmitted is 11001001011
- _________ comparisons are necessary in the worst case to find both the maximum and minimum of n numbers. floor (3n/2) – 2
- Let A and B be two n × n matrices. The efficient algorithm to multiply the two matrices has the time complexity O(n2.81)
- The recurrence relation T(n)=mT(n/2) tan2 is satisfied by O(n1g m) (Solved MCQs of Computer Science)
- The longest common subsequence of the sequences X = <A, B, C, B, D, A, B> and Y = <B, D, C, A, B, A> has length 4