# Solved MCQs of Computer Science

Solved MCQs of Computer Science for test preparation are here. Many departments have announced the jobs of different posts related to Solved MCQs of Computer Science. I found that people are taking interest in all my posts. This gave me the strength to gather data on Solved MCQs of Computer Science test preparation. So, I took my time and arranged the data on Solved MCQs of Computer Science because it has the demand now a day. You can prepare for KPPSC, PPSC, FPSC, CSS, NTS, OTS, PTS, MTS, AJKPSC, SPSC, BPSC, ITS, CTS, ATS, CTSP, STS, GTS, FTSPAK, DTS, CTSP, ETS, CTA, JTS, UTS, GCTS and all the vacant posts like Assistant Director, District Population Welfare Officer, Deputy District Population Welfare Officer, Tehsil Population Welfare Officer, Speech Writer, Deputy Director, Information Officer, Stenographer, Communication Specialist, Demographer, Transferring Officer, Instructor, Technical Officer, Producer, Staff Officer, Executive Engineer, GIS Specialist, Administration, Estate Management, TE&TP, Town Planning, Architecture, Psychologist, Assistant Chief, Labour Officer, Treasury Officer, Accountant, Computer Operator, Librarian, Scientific Officer, Establishment and Finance, Forest Officer, Assistant Manager, Additional Solicitor, Controller, Medical Officer, Agriculture Officer, Farm Manager, Cotton Inspector, Information Officer, Photographer, Supervisor, Naib Qasid, “Management Trainees”, Secondary School Teacher, Headmaster, Headmistress, Lecturer, etc.

**Solved MCQs of Computer Science**

You can prepare here with our Solved MCQs of Physical Education Test Preparation. Let us start Solved MCQs of Computer Science Test Preparation;

**Solved MCQs of Physical Education**

- The worst case time complexity of AVL tree is better in comparison to binary search tree for
**Search and Insert Operations** - The GSM network is divided into the following three major systems:
**BSS, BSC, MSC** - If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disks queue of I/O blocks requests are 98, 37, 14, 124, 65, 67.
**310** - Component level design is concerned with
**Flow oriented analysis** - The Mobile Application Protocol (MAP) typically runs on top of which protocol?
**HTTP (Hyper Text Transfer Protocol)** - If a packet arrives with an M-bit value is ‘l’ and a fragmentation offset value ‘0’, and then it is ______ fragment. (A) First (B) Middle (C) Last
**(D) All of the above** - The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be
**160.** - In compiler design ‘reducing the strength’ refers to
**Reducing efficiency of program.** - In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register?
**Indirect** - Which of the following is true?
**A relation in 3NF is always in BCNF.** - Given memory partitions of 100 K, 500 K, 200 K, 300 K and 600 K (in order) and processes of 212 K, 417 K, 112 K, and 426 K (in order), using the first-fit algorithm, in which partition would the process requiring 426 K be placed?
**200 K** - What is the size of the Unicode character in Windows Operating System?
**8-Bits** - In which tree, for every node the height of its left sub tree and right sub tree differ almost by one?
**AVL tree** - The design issue of Data link Layer in OSI Reference Model is
**Representat****i****on of bits** - Given the following expressions of a grammar E -> E * F / F + E / F and F -> F – F / id, which of the following is true?
**+ has higher precedence than *** - The maturity levels used to measure a process are
**Initial, Repeatable, Defined, Managed, Optimized.** - The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using:
**Compaction** - Which API is used to draw a circle?
**Ellipse ( )** - In DML, RECONNCT command cannot be used with (A) OPTIONAL Set (B) FIXED Set (C) MANDATOR Set
**(D) All of the above** - RAD stands for
**Rapid Application Development (Solved MCQs of Computer Science)** - Suppose that someone starts with a chain letter. Each person who receives the letter is asked to send it on to 4 other people. Some people do this, while some do not send any letter. How many people have seen the letter, including the first person, if no one receives more than one letter and if the chain letter ends after there have been 100 people who read it but did not send it out? Also find how many people sent out the letter?
**144 & 44** - A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79?
**2** - Identify the Risk factors which are associated with Electronic payment system.
**Sending Credit Card details over internet.** - Which of the following are two special functions that are meant for handling exception that occurs during exception handling itself?
**Non void terminate ( ) and non-void unexpected ( )** - Which of the following memory allocation scheme suffers from external fragmentation?
**Paging** - Basis path testing falls under
**Black box testing** - The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
**DBMS & the Host record,****Host program and Host record** - The maximum number of keys stored in a B-tree of order m and depth d is
**(md+1 – 1) / (m – 1)** - Which of the following is the most powerful paring method?
**SLR** - In UNIX, which of the following command is used to set the task priority?
**PS** - AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
**20, 12, 14** - Given an empty stack, after performing push (1), push (2), Pop, push (3), push (4), Pop, Pop, push (5), pop, what is the value of the top of the stack?
**1** - Enumeration is a process of
**Sequencing a list of operators** - Which of the following mode declaration is used in C++ to open a file for input?
**In:: ios** - Data Encryption Techniques are particularly used for
**Reduce Storage Space Requirement.** - Let L be a set accepted by a nondeterministic finite automaton. The number of states in non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite automaton that accepts L is
**|Q|** - What is the result of the following expression? (1 & 2) + (3 & 4)?
**1** - Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
**Forward from source to hidden nodes** - ______ is an “umbrella” activity that is applied throughout the software engineering process.
**Designing** - Identify the operation which is commutative but not associative?
**EX-OR (Solved MCQs of Computer Science)** - Given a Relation POSITION (Posting No, Skill), then query to retrieve all distinct pairs of posting-nos. requiring skill is
**Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill=p2.skill and p1.posting-No< p2.posting-No** - The postfix expression AB + CD –
_{ * }can be evaluated using a**Stack** - The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
**ABDECF** - The branch logic that provides making capabilities in the control unit is known as
**Controlled transfer** - The number of colours required to properly colour the vertices of every planer graph is
**2** - Networks that use different technologies can be connected by using
**Routers** - Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is
**Layer – 5 (Application)** - In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
**Record lock** - A binary search tree is a binary tree: (A) All items in the left subtree are less than root (B) All items in the right subtree are greater than or equal to the root (C) Each subtree is itself a binary search tree
**(D) All of the above** - What deletes the entire file except the file structure?
**ZAP** - Which command is the fastest among the following?
**COPY STRUCTURE TO <NEW FILE>** - B
_{+}tree are preferred to binary tree in Database because**Disk access is much slower than memory access** - A Transaction Manager is which of the following? (A) Maintains a log of transactions (B) Maintains before and after database images (C) Maintains appropriate concurrency control
**(D) All of the above** - Leaves of which of the following trees are at the same level?
**B-tree** - Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server?
**ARP** - Decryption and encryption of data are the responsibility of which of the following layer?
**Presentation layer** - In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM?
**Time division** - In which Routing Method do all the routers have a common database?
**Link state** - Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 levels. Find the line signals and speed (i.e. modulation rate).
**2400 bauds** - The station to hub distance in which it is 2000 meters.
**100 Base-F**_{x }**(Solved MCQs of Computer Science)** - Main aim of software engineering is to produce
**Software within budget in the given schedule** - Key process areas of CMM level 4 are also classified by a process which is
**CMM level 5** - Validation means
**Are we building the right product** - If a process is under statistical control, then it is
**Predictable** - In a function oriented design, we
**Maximize cohesion and minimize coupling** - Which of the following metric does not depend on the programming language used?
**Function count** - A / B
^{+}tree index is to be built on the name attribute of the relation STUDENT. Assume that all students names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B^{+}tree?**16** - The Inorder traversal of the tree will yield a sorted listing of elements of tree in
**Binary search tree** - Mobile IP provides two basic functions.
**Agent discovery and registration** - Pre-emptive scheduling is the strategy of temporarily suspending a gunning process
**Before the CPU time slice expires** - In round robin CPU scheduling as time quantum is increased the average turnaround time
**Varies irregularly** - Resources are allocated to the process on non-sharable basis is
**Mutual exclusion** - Consider the following page trace: 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be
**10** - Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of
**Character** - If an integer needs two bytes of storage, then the maximum value of a signed integer is
**2**^{15}– 1 - Which of the following logic families is well suited for high-speed operations?
**ECL** - Interrupts which are initiated by an instruction are
**Hardware** - Print if (“%c”, 100);
**Prints ASCII equivalent of 100** - For the transmission of the signal, Bluetooth wireless technology uses
**Time division duplex** - What is the routing algorithm used by RIP and IGRP?
**Dijkestra vector****(Solved MCQs of Computer Science)** - Identify the incorrect statement:
**E-Commerce security threats can be grouped into three major categories.** - Reliability of software is directly dependent on
**Number of errors present** - ______ is not an E-Commerce application.
**Evaluating an employee** - ______ is a satellite based tracking system that enables the determination of person’s position.
**Global Positioning System** - A complete microcomputer system consists of (A) Microprocessor (B) Memory (C) Peripheral equipment
**(D) All of the above** - Where does a computer add and compare data?
**CPU chip** - Pipelining strategy is called implement
**Instruction prefetch** - Which of the following data structure is linear type? (A) Strings (B) Lists (C) Queues
**(D) All of the above** - To represent hierarchical relationship between elements, which data structure is suitable?
**Tree** - When data and acknowledgement are sent in the same frame, this is called as
**Piggy backing** - Encryption and Decryption is the responsibility of _______ Layer.
**Application** - An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are _______ and _______.
**1000 bauds \ sec & 4000 bps** - The VLF and LF bauds use _______ propagation for communication.
**Ground** - Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is
**10** - FAN IN of a component A is defined as
**Number of components that can call or pass control to component A.** - The relationship of data elements in a module is called
**Cohesion** - Software Configuration Management is the discipline for systematically controlling (A) the changes due to the evolution of work products as the project proceeds. (B) The changes due to defects (bugs) being found and then fixed. (C) the changes due to requirement changes
**(D) all of the above** - Which one of the following is not a step of requirement engineering?
**Requirement design** - Testing of software with actual data and in actual environment is called
**Beta testing** - The student marks should not be greater than 100. This is
**Integrity constraint (Solved MCQs of Computer Science)** - GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
**28th record** - Based on the cardinality ratio and participation ________ associated with a relationship type, choose the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design.
**Constraints** - Data Integrity control uses
**Passwords to prohibit unauthorised access to files.** - What does the following declaration mean? int (*ptr) [10];
**ptr is a pointer to an array of 10 integers.** - Which of the following operators cannot be overloaded in C+ +?
**: :** - _________ allows creating classes which are derived from other classes, so that they automatically include some of its “parent’s” members, plus its own members.
**Inheritance** - The correct way to round off a floating number x to an integer value is
**y = (int) (x + 0.5)** - What is the value of the postfix expression? a b c d + – ∗ (where a = 8, b = 4, c = 2 and d = 5)
**–24** - If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue?
**Only rear pointer changes** - _______ is often used to prove the correctness of a recursive function.
**Mathematical Induction** - For any B-tree of minimum degree t ≥ 2, every node other than the root must have at least ________ keys and every node can have at most ________ keys.
**t – 1, 2t – 1** - Given two sorted list of size ‘m’ and ‘n’ respectively. The number of comparison needed in the worst case by the merge sort algorithm will be
**m + n – 1** - The context free grammar for the language, L = {a
^{n}b^{m}| n ≤ m + 3, n ≥ 0, m ≥ 0} is**S → aaaA | aa A | aA | λ, A → aAb | B, B → Bb | λ** - The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called
**Relocation** - Which of the following derivations does a top-down parser use while parsing an input string? The input is scanned from left to right.
**Leftmost derivation** - The dual of a Boolean expression is obtained by interchanging
**Boolean sums and Boolean products and interchanging 0’s & 1’s** - Let P(m, n) be the statement, “m divides n” where the universe of discourse for both the variables is the set of positive integers. Determine the truth values of each of the following propositions: I. ∀m ∀n P(m, n), II. ∃m ∀n P(m, n)
**I – false & II – true** - Big – O estimate for, f(x) = (x + 1) log(x
^{2}+ 1) + 3x^{2}is given as**O(x**^{2}) - How many edges are there in a forest of t-trees containing a total of n vertices?
**n – t** - Let f and g be the functions from the set of integers to the set integers defined by f(x) = 2x + 3 and g(x) = 3x + 2. Then the composition of f and g and g and f is given as
**6x + 7, 6x + 11 (Solved MCQs of Computer Science)** - A graph is non-planar if and only if it contains a subgraph homomorphic to
**K**_{3, 3}or K_{5} - Active X controls are Pentium binary programs that can be embedded in
**Web pages** - Which of the following is widely used inside the telephone system for long-haul data traffic?
**ATM** - The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation:
**ANSI** - Electronic Data Interchange Software consists of the following four layers:
**Business application, Internal format conversion, EDI translator, EDI envelope** - The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4-cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is
**16 bits** - Consider a disk queue with request for input/output to block on cylinders. 98, 183, 37, 122, 14, 124, 65, 67 in that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are respectively
**236 and 252 cylinders** - How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size?
**332.8 KB** - Linux operating system uses
**Fair Preemptive Scheduling** - COCOMO stands for
**COnstructive COst Model** - While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?
**Size of software** - A good software design must have
**Low module coupling, high module cohesion** - Cyclometric complexity of a flow graph G with n vertices and e edges is
**V(G) = e–n+2** - When the following code is executed what will be the value of x and y? int x = 1, y = 0; y = x++;
**2, 1** - How many values can be held by an array A (–1, m; 1, m)?
**m (m+2)** - What is the result of the expression (1&2) + (3/4)?
**0** - How many times the word ‘print’ shall be printed by the following program segment? For (i=1, i<2,i++), For (j=1,j<2,j++), For (k=1,k<2,k++), Printf(“print/n”)
**8** - Which of the following is not a type of Database Management System?
**Sequential** - Manager’s salary details are to be hidden from Employee Table. This Technique is called as
**External level Data-hiding** - A Network Schema
**Permits many to many relationship (Solved MCQs of Computer Science)** - Which normal form is considered as adequate for usual database design?
**3NF** - If D
_{1}, D_{2},..D_{n}are domains in a relational model, then the relation is a table, which is a subset of**D**_{1}×D_{2}× … ×D_{n} - Which of the following addresses is used to deliver a message to the correct application program running on a host?
**Port** - In ________ substitution, a character in the plaintext is always changed to the same character in the cipher text, regardless of its position in the text.
**Monoalphabetic** - In classful addressing, the IP address 190.255.254.254 belongs to
**Class B** - In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy?
**15 clusters, 16 regions and 20 routers** - In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to.
**Identification** - Given L1=L (a*baa*) and L2=L (ab*). The regular expression corresponding to language L3 = L1/L2 (right quotient) is given by
**a*ba*** - Given the production rules of a grammar G1 as S
_{1}→ AB | aaB, A → a | Aa, B → b and the production rules of a grammar G2 as, S_{2}→ aS_{2}bS_{2}| bS_{2}aS_{2}| λ. Which of the following is correct statement?**G1 is ambiguous and G2 is ambiguous.** - Given a grammar: S1 → Sc, S → SA | A, A → aSb | ab, there is a rightmost derivation S1 ⇒ Sc ⇒SAC ⇒ SaSbc. Thus, SaSbc is a right sentential form, and its handle is
**aSb** - The equivalent production rules corresponding to the production rules S → Sα
_{1}|Sα_{2}| β_{1}| β_{2}is**S → β**_{1}| β_{2}| β_{1}A | β_{2}A, A → α_{1}A | α_{2}A | λ - Which is the correct statement(s) for Non-Recursive predictive parser? S1: First (α) = {t| α ⇒ * tβ for some string β} ⇒*tβ, S2: Follow(X) = {a| S⇒ *αXaβ for some strings α and β}
**Both statements S1 and S2 are correct.** - Given an open address hash table with load factor α < 1, the expected number of probes in a successful search is
**Atmost (1/α) ln 1/(1– α)** - For a B-tree of height h and degree t, the total CPU time used to insert a node is
**O(th)** - The time complexity to build a heap with a list of n numbers is
**O(n)** - The value of postfix expression: 8 3 4 + – 3 8 2 / + * 2 $ 3 + is
**52** - Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
**Data warehousing** - The task of correcting and pre-processing data is called as
**Data cleaning** - Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
**BUTAEEZ** - The relation “divides” on a set of positive integers is
**Anti symmetric and transitive (Solved MCQs of Computer Science)** - Give as good a big–O estimate as possible for the following functions: (nlogn+n
^{2}) (n^{3}+2) and (n! +2^{n}) (n^{3}+log(n^{2}+1))**O(n**^{5}) & O(n^{3}* n!) - A test contains 100 true/false questions. How many different ways can a student answer the questions on the test, if the answer may be left blank also?
**3**^{100} - How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components?
**M–N+C** - Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when exactly two of the p, q and r are true and is false otherwise?
**(p****∧ q****∧⎤ r)****∨ ( p****∧⎤ q****∧ r)****∨ (****⎤ p****∧ q****∧ r****)** - The truth value of the statements: ∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) → ⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition “There exists a unique x such that P(x) is true”) are:
**True and True** - How many different Boolean functions of degree 4 are there?
**2**^{16} - A Boolean operator s is defined as follows: 1 s 1 = 1, 1 s 0 = 0, 0 s 1 = 0 and 0 s 0 = 1. What will be the truth value of the expression (x s y) s z = x s (y s z)?
**Always true** - Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement form?
**– 22** - A set of processors P1, P2….… Pk can execute in parallel if Bernstein’s conditions are satisfied on a pairwise basis; that is P1 || P2 || P3 || ….. || Pk if and only if:
**Pi || Pj for all i ≠ j** - When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as
**Handoff** - A virtual memory based memory management algorithm partially swaps out a process. This is an example of
**Medium term scheduling** - Assuming that the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O block requests are 98, 37, 14, 124, 65, 67:
**321** - Let the page fault service time be 10 millisecond (ms) in a computer with average memory access time being 20 nanosecond (ns). If one page fault is generated for every 106 memory accesses, what is the effective access time for memory?
**30 ns** - Consider the following UNIX command: Sort <in> temp; head – 30 <temp; rm temp which of the following functions shall be performed by this command?
**Sort, taking the input from “in” and writing the output to “temp” then prints 30 lines from temp on terminal. Finally “temp” is removed.** - The MV command changes
**The directory entry** - A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded?
**6.72 Mbs** - ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
**p-persistent** - Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?
**Polyalphabetic** - What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
**100 meters** - The ______ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
**Common Gateway Interface****(Solved MCQs of Computer Science)** - The count-to-infinity problem is associated with
**Distance vector routing algorithm** - The IEEE single-precision and double-precision format to represent floating-point numbers, has a length of ______ and ______ respectively.
**32 bits and 64 bits** - Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that the graph is not connected is
**4851** - The amortized time complexity to perform ______ operation(s) in Splay trees is O(Ig n).
**Search, Insert and Delete** - Suppose that the splits at every level of Quicksort are in proportion 1-β to β, where 0 < β ≤ 0.5 is a constant. The number of elements in an array is n. The maximum depth is approximately
**– (Ig n)/Ig (1 – β)** - The minimum number of nodes in a binary tree of depth d (root is at level 0) is
**d + 1** - The efficient data structure to insert/delete a number in a stored set of numbers is
**Doubly linked list** - The number of states in a minimal deterministic finite automaton corresponding to the language L = { a
^{n}| n≥4 } is**5** - Regular expression for the language L = {w ∈ {0, 1}* | w has no pair of consecutive zeros} is
**(1 + 01)* (0 + λ)** - Consider the following two languages: L
_{1}= {a^{n}b^{l}a^{k}| n + l +k>5} L_{2}= {a^{n}b^{l}a^{k}|n>5, l >3, k≤ l} Which of the following is true?**L**_{1}is regular language and L_{2}is not regular language. - LL grammar for the language L = {a
^{n}b^{m}c^{n+m}| m≥0, n≥0} is**S → aSc | S**_{1}| λ; S_{1}→ bS_{1}c| λ - The number of eight-bit strings beginning with either 111 or 101 is
**64** - Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow and the rest ones white.
**1, 66,320** - Consider the In-order and Post-order traversals of a tree as given below: In-order: j e n k o p b f a c l g m d h i Post-order: j n o p k e f b c l m g h i d a. The Pre-order traversal of the tree shall be
**a b e j k n o p f c d g l m h i** - A simple graph G with n-vertices is connected if the graph has
**More than (n – 1) (n – 2)/2 edges** - Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?
**EX-OR, EX-NOR** - The quantification ∃!x P(x) denotes the proposition “There exists a unique x such that P(x) is true”, express the quantification using universal and existential quantifications and logical operators:
**∃x P(x)****∧∀x****∀y ((P(x)****∧ P(y)) → x = y****)** - If F and G are Boolean functions of degree n. Then, which of the following is true?
**F ≤ F + G and F G ≤ F** - In which one of the following, continuous process improvement is done?
**CMM** - The ______ of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these components, and the relationship among them.
**Software architecture****(Solved MCQs of Computer Science)** - Working software is not available until late in the process in
**Waterfall model** - Equivalence partitioning is a ______ testing method that divides the input domain of a program into classes of data from which test cases can be derived.
**Black box** - Linked Lists are not suitable for
**Binary Search** - Usage of Preemption and Transaction Rollback prevents
**Deadlock situation** - The _____ language was originally designed as the Transformation Language for Style Sheet facility.
**XSTL** - Views are useful for _____ unwanted information, and for collecting together information from more than one relation into a single view.
**Hiding** - The decision tree classifier is a widely used technique for
**Classification** - Cross_tab displays permit users to view ______ of multidimensional data at a time.
**Two dimensions** - A method to provide secure transmission of email is called
**PGP** - Thoma’s-write rule is
**Timestamp ordering protocol** - The hit ratio of a Translation Look Aside Buffer (TLAB) is 80%. It takes 20 nanoseconds (ns) to search TLAB and 100 ns to access main memory. The effective memory access time is
**140 ns** - Which of the following set of UNIX commands will always display “WELCOME”?
**Title = WELCOME; export title; sh –c “echo $title”** - Eco system is a Frame work for
**Building Internet Market** - The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as
**Piggy backing** - ______ is process of extracting previously non known valid and actionable information from large data to make crucial business and strategic decisions.
**Data Mining** - The aspect ratio of an image is defined as
**The ratio of width to its height measured in unit length.** - Using RSA algorithm, what is the value of cipher text C, if the plain text M = 5 and p = 3, q = 11 & d = 7?
**26** - You are given an OR problem and a XOR problem to solve. Then, which one of the following statements is true?
**Problem can be solved using single layer perception and XOR problem can be solved using radial basis function.** - Let V
_{1}= 2I – J + K and V_{2}= I + J – K, then the angle between V_{1}& V_{2}and a vector perpendicular to both V_{1}& V_{2}shall be:**90**^{০}**and (–2I – J + 3K)** - In classful addressing, an IP address 123.23.156.4 belongs to ______ class format.
**A (Solved MCQs of Computer Science)** - The Mandelbrot set used for the construction of beautiful images is based on the following transformation: x
_{n + 1}= x^{2}_{n}+ z Here**Both x & z are complex numbers.** - Which of the following permutations can be obtained in the output using a stack of size 3 elements assuming that input, sequence is 1, 2, 3, 4, 5?
**3, 4, 5, 2, 1** - In a Linear Programming Problem, suppose there are 3 basic variables and 2 non-basic variables, then the possible numbers of basic solutions are
**10** - Which provides an interface to the TCP/IP suit protocols in Windows95 and Windows NT?
**Calinsock Active-X Control** - If dual has an unbounded solution, then its corresponding primal has
**No feasible solution** - The number of distinct bracelets of five beads made up of red, blue, and green beads (two bracelets are indistinguishable if the rotation of one yield another) is,
**51** - Which are the classifications of data used in Mobile Applications?
**Private data, Public data, Shared data.** - In an enhancement of a CPU design, the speed of a floating point unit has been increased by 20% and the speed of a fixed point unit has been increased by 10%. What is the overall speed achieved if the ratio of the number of floating point operations to the number of fixed point operations is 2 : 3 and the floating point operation used to take twice the time taken by the fixed point operation in original design?
**1.62** - Lamps are to be connected to a single electric outlet by using an extension board each of which has four outlets. The number of extension boards needed to connect all the light is
**19** - Which of the following flags are set when ‘JMP’ instruction is executed?
**No flag is set** - A thread is a light weight process. In the above statement, weight refers to
**Number of resources** - The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be handled by this algorithm shall
**Be arbitrary no. of objects** - The power set of AUB, where A = {2, 3, 5, 7} and B = {2, 5, 8, 9} is
**64** - In Win32, which function is used to create Windows Applications?
**Win Main** - Suppose a processor does not have any stack pointer registers, which of the following statements is true?
**All subroutine calls and interrupts are possible.** - Everything below the system call interface and above the physical hardware is known as
**Kernel.** - Which is not the correct statement?
**The class of regular sets is not closed under inverse homomorphism.** - When a programming Language has the capacity to produce new data type, it is called as,
**Extensible Language** - Which of the following operating system is better for implementing client-server network?
**Windows 2000** - Consider a system having m resources of the same type. These resources are shared by 3 processes A, B and C which have peak demands of 3, 4 and 6 respectively. For what value of m deadlock will not occur?
**13 (Solved MCQs of Computer Science)** - The Default Parameter Passing Mechanism is called as
**Call by Value** - Which of the following regular expression identities are true?
**(r + s)* = (r*s*)*** - Functions defined with class name are called as
**Constructor** - Let f be the fraction of a computation (in terms of time) that is parallelizable, P the number of processors in the system, and s
_{p}the speed up achievable in comparison with sequential execution – then the s_{p}can be calculated using the relation:**1/ [1 – f + f/P]** - If the parse tree of a word w generated by a Chomsky normal form grammar has no path of length greater than i, then the word w is of length
**No greater than 2**^{i–1} - The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system
**Object Model, Dynamic Model, and Functional Model.** - The factors that determine the quality of a software system are
**Correctness, reliability** - Skolmization is the process of
**Removing all the existential quantifiers.** - Which level of Abstraction describes how data are stored in the data base?
**Physical level** - The transform which possesses the “multi-resolution” property is
**Wavelet transforms** - Which one is a collection of templates and rules?
**XSL** - A program P calls two subprograms P
_{1}and P_{2}. P_{1 }can fail 50% times and P_{2}40% times. Then P can fail**70%** - Third normal form is based on the concept of
**Transitive Dependency** - If the Fourier transform of the function f(x, y) is F(m, n), then the Fourier transform of the function f(2x, 2y) is:
**1/4 F(m/2 , n/2)** - ______ establishes information about when, why and by whom changes are made in software.
**An Audit Trail.** - An expert system shell is an expert system without
**Domain knowledge** - An example of a dictionary-based coding technique is
**LZW coding** - Which is the method used to retrieve the current state of a check box?
**Get State ( )** - Referential integrity is directly related to
**Foreign key** - A cryptarithmetic problem of the type SEND + MORE MONEY Can be solved efficiently using
**Constraint satisfaction technique (Solved MCQs of Computer Science)** - A* algorithm is guaranteed to find an optimal solution if
**g is always 1.** - In Delta Rule for error minimization
**Weights are adjusted w.r.to difference between desired output and actual output** - The concept of pipelining is most effective in improving performance if the tasks being performed in different stages:
**require about the same amount of time** - What is Granularity?
**The size of data item** - Suppose that a given application is run on a 64-processor machine and that 70 percent of the application can be parallelized. Then the expected performance improvement using Amdahl’s law is
**4.22** - Which level of Abstraction describes what data are stored in the Database?
**Logical level** - The problem that occurs when one transaction updates a database item and then the transaction fails for some reason is
**Dirty Read Problem** - In an image compression system 16384 bits are used to represent 256 × 256 image with 256 gray levels. What is the compression ratio for this system?
**2** - X.25 is ________ Network.
**Connection Oriented Network** - Which of the following can be used for clustering of data?
**Self organizing map** - Which of the following is scheme to deal with deadlock?
**Time out** - If the pixels of an image are shuffled then the parameter that may change is
**Covariance** - The common property of functional language and logical programming language:
**Both are declarative** - Consider a schema R (A, B, C, D) and functional dependencies A->B and C -> D. Then the decomposition R
_{1}(A, B) and R_{2}(C, D) is**Dependency preserving but not lossless join** - The quantiser in an image-compression system is a
**lossy element which exploits the psychovisual redundancy** - Data Warehouse provides
**Storage, Functionality Responsiveness to queries** - A* algorithm uses f ‘ = g + h’ to estimate the cost of getting from the initial state to the goal state, where g is a measure of the cost of getting from initial state to the current node and the function h’ is an estimate of the cost of getting from the current node to the goal state. To find a path involving the fewest number of steps, we should set
**g = 1** - The transform which possesses the highest ‘energy compaction’ property is
**Cosine transforms** - The _______ memory allocation function modifies the previous allocated space.
**realloc( )** - The mechanism that binds code and data together and keeps them secure from outside world is known as
**Encapsulation****(Solved MCQs of Computer Science)** - Which of the following IP address class is a multicast address?
**Class D** - While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module is
**atmost 0.81** - The upper bound of computing time of m coloring decision problem is
**O(nm**^{n}) - Which one of the following statements is incorrect?
**Cyclometric complexity for a flow graph G is V (G) = E – N + 2, where E is the number of edges & N is the number of nodes in the flow graph.** - Consider a weighted undirected graph with positive edge weights and let (u, v) be an edge in the graph. It is known that the shortest path from source vertex s to u has weight 53 and shortest path from s to v has weight 65. Which statement is always true?
**Weight (u, v)**__>__12 - Consider the regular expression (a + b) (a + b) … (a + b) (n-times). The minimum number of states in finite automaton that recognizes the language represented by this regular expression contains
**n + 1 states** - Number of binary trees formed with 5 nodes is
**42** - Are we building the right product? This statement refers to
**Validation** - The following postfix expression is evaluated using a stack 823^/23* + 51* – The top two elements of the stack after first * is evaluated
**6, 1** - The following CFG S -> aB | bA, A -> a | as | bAA, B -> b | bs | aBB Generates strings of terminals that have
**Equal number of a’s and b’s** - Consider the following pseudo-code: If (A > B) and (C > D) then A = A + 1, B = B + 1 And if the cyclomatic complexity of the pseudo-code is
**3** - Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
**Network layer** - Which diagram provides a formal graphic notation for modeling objects, classes and their relationships to one another?
**Object diagram** - A computer system supports 32 bit virtual address as well as 32 bit physical addresses. Since the virtual address space is of same size as that of physical address space, if we want to get rid of virtual memory, which one of the following is true?
**Hardware support for memory management is not needed.** - The feasible region represented by the constraints x
_{1}– x_{2}< 1, x_{1}+ x_{2}> 3, x_{1}> 0, x_{2}> 0 of the objective function Max Z = 3x_{1}+ 2x_{2}is**Unbounded feasible region** - The colour of an object is largely determined by its diffuse reflection coefficient. If K
_{d}= (0.8, 0.4, 0), then what shall be the colour of the object, if the light used is blue and magenta?**Black and Red** - If an instruction takes ‘i’ microseconds and a page fault takes an additional ‘j’ microseconds. The effective instruction time, if on the average a page fault occurs every k instructions, is
**i + j/k** - How many relations are there on a set with n elements that are symmetric and a set with n elements that are reflexive and symmetric?
**2**^{n(n+1)/2}and 2^{n(n–1)/2} - The strategy used to reduce the number of tree branches and the number of static evaluations applied in case of a game tree is
**Alpha-beta pruning strategy** - What is the size (in terms of bits) of Header length field in IPV4 header?
**4****(Solved MCQs of Computer Science)** - ______ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
**Windows NT** - A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling routine that saves appropriate files before terminating the process. When a Ctrl + C input is given to this process, what is the mode in which the signal handling routine executes?
**Kernel mode** - A CPU generally handles an interrupt by executing an interrupt service routine
**By checking the interrupt register after finishing the executing the current instruction** - Radio signals generally propagate according to the following mechanisms:
**Reflection, Diffraction, Scattering** - If ‘a’ and ‘b’ are the end points of a line, then which one of the following is true?
**If both end points are left, right, above or below the window, the line is trivially invisible** - If the period of a signal is 1000 ms, then what is its frequency in kilohertz?
**10**^{–3}KHz - HTML is defined using SGML – an _______ standard, information processing-text and office systems (SGML) for text information processing.
**ISO – 8879** - What is the meaning of ‘Hibernate’ in Windows XP/Windows 7?
**Shutdown the computer without closing the running applications.** - Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main ( ). Base * P = New Derived; in what sequence will the constructor be called?
**Base class constructor followed by derived class constructor** - Which one of the following options is not a shell in UNIX system?
**Net Shell** - In which file the compiler manage the various objects, which are used in windows programming?
**Text File** - On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order contains requests for the following tracks: 123, 874, 692, 475, 105, 376. (Assume SCAN algorithm)
**1219** - Halftoning is defined as
**A technique for using minimum number of intensity levels to obtain increased visual resolution.** - If the primal Linear Programming problem has unbounded solution, then it’s dual problem will have
**no feasible solution at all** - Given a flow graph with 10 nodes, 13 edges and one connected components, the number of regions and the number of predicate (decision) nodes in the flow graph will be
**5, 4** - Function points can be calculated by
**UFP****∗****CAF** - One weakness of boundary value analysis and equivalence partitioning is
**they do not explore combinations of input circumstances** - Which once of the following is not a software myth?
**If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects.** - Which is the protocol for performing RPCs between applications in a language and system independent way?
**Simple Object Access Protocol (SOAP)** - The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is
**Style sheet (Solved MCQs of Computer Science)** - Which of the following concepts means adding new concepts to a program as it runs?
**Dynamic loading** - Which of the following correctly describes overloading of functions?
**Ad-hoc polymorphism** - The compiler converts all operands up to the type of the largest operand is called
**Type Promotion** - C++ actually supports the following two complete dynamic systems:
**One defined by C and one specific to C++** - Important advantage of using new and delete operators in C++ is
**Allocation of memory and frees the memory previously allocated.** - Given the following statements: S
_{1}: The grammars S → asb | bsa | ss | a and S → asb | bsa | a are not equivalent. S_{2}: The grammars S → ss | sss | asb | bsa | λ and S → ss | asb | bsa | λ are equivalent. Which of the following is true?**Both S**_{1}and S_{2}are correct. - High level knowledge which relates to the use of sentences in different contexts and how the context affect the meaning of the sentences?
**Pragmatic** - The objective of ________ procedure is to discover at least one ________ that causes two literals to match.
**unification, substitution** - If h* represents an estimate of the cost of getting from the current node N to the goal node and h represents actual cost of getting from the current node to the goal node, then A* algorithm gives an optimal solution if
**h* underestimates h** - The mean-end analysis process centers around the detection of differences between the current state and goal state. Once such a difference is isolated, an operator that can reduce the difference must be found. But perhaps that operator cannot be applied to the current state. So a sub-problem of getting to a state in which it can be applied is set up. The kind of backward chaining in which operators are selected and then sub goals are set up to establish the precondition of operators is called
**operator subgoaling** - In alpha-beta pruning, _________ is used to cut off the search at maximizing level only and _________ is used to cut off the search at minimizing level only.
**beta, alpha** - If A and B are two fuzzy sets with membership functions, μ
_{A}(x) = {0.2, 0.5, 0.6, 0.1, 0.9}, μ_{B}(x) = {0.1, 0.5, 0.2, 0.7, 0.8} Then the value of μ_{A ∩ B}will be**{0.1, 0.5, 0.2, 0.1, 0.8}** - The height h(A) of a fuzzy set A is defined as h(A) = sup A(x), x ∈ A. Then the fuzzy set A is called normal when
**h(A) = 1** - An artificial neuron receives n inputs x
_{1}, x_{2},…., x_{n}with weights w_{1}, w_{2},…., w_{n}attached to the input links. The weighted sum ________ is computed to be passed on to a non-linear filter φ called activation function to release the output.**Σ w**_{i}**⋅****x**_{i} - Consider the formula in image processing R
_{D}= 1 – 1/C_{R }Where C_{R}=n_{1}/n_{2 }C_{R}is called as compression ratio n_{1}and n_{2}denotes the number of information carrying units in two datasets that represent the same information. In this situation R_{D}is called as relative _________ of the first data set.**Data Redundancy** - Find the false statement:
**The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.** - The message 11001001 is to be transmitted using the CRC polynomial x
^{3}+ 1 to protect it from errors. The message that should be transmitted is**11001001011** - _________ comparisons are necessary in the worst case to find both the maximum and minimum of n numbers.
**floor (3n/2) – 2** - Let A and B be two n × n matrices. The efficient algorithm to multiply the two matrices has the time complexity
**O(n2.81)** - The recurrence relation T(n)=mT(n/2) tan
^{2}is satisfied by**O(n**^{1g m}) (Solved MCQs of Computer Science) - The longest common subsequence of the sequences X = <A, B, C, B, D, A, B> and Y = <B, D, C, A, B, A> has length
**4** - Assuming there are n keys and each key is in the range [0, m – 1]. The run time of bucket sort is
**O(n + m)** - A _________ complete subgraph and a _________ subset of vertices of a graph G = (V, E) are a clique and a vertex cover respectively.
**maximal, minimal** - The Greibach normal form grammar for the language L = {a
^{n}b^{n + 1}| n ≥ 0} is**S → a SB | b, B → b** - Given the following statements: S
_{1}: Every context-sensitive language L is recursive. S_{2}: There exists a recursive language that is not context sensitive. Which statement is correct?**S**_{1}is correct and S_{2}is correct. - What is the bit rate for transmitting uncompressed 800 × 600 pixel colour frames with 8 bits/pixel at 40 frames/second?
**153.6 Mbps** - In IPV 4, the IP address 200.200.200.200 belongs to
**Class C** - Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network?
**Transport** - A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second).
**533.33 m sec** - The start and stop bits are used in serial communication for
**synchronization** - _________ is a type of transmission impairment in which the signal looses strength due to the resistance of the transmission medium.
**Attenuation** - Which of the following is a design criteria for instruction formats? (A) The size of instructions (B) The number of bits in the address fields (C) The sufficient space in the instruction format to express all the operations desired.
**(D) All of these** - Synchronization is achieved by a timing device called a ________ which generates a periodic train of________.
**master clock generator, clock pulse** - The essential difference between traps and interrupts is
**traps are synchronous and interrupts are asynchronous with the program.** - Consider the following schemas: Branch = (Branch-name, Assets, Branch-city) Customer = (Customer-name, Bank name, Customer-city) Borrow = (Branch-name, loan number, customer account-number) Deposit = (Branch-name, Account number, Customer-name, Balance). Using relational Algebra, the Query that finds customers who have balance more than 10,000 is
**π**_{customer-name}(σ_{balance}> 10000^{(Deposit)} - Find the false statement:
**Conceptual model is not accurate representation of “Universe of interest”.** - Which of the following points lies on the same side as the origin, with reference to the line 3x + 7y = 2?
**(0.5, 0)** - In Unix, how do you check that two given strings a and b are equal?
**test $a = $b** - In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called
**Hardware abstraction layer** - To place a sound into a word document, following feature of windows is used:
**OLE (Solved MCQs of Computer Science)** - Translation Look-aside Buffer (TLB) is
**an associative memory in which item to be searched is compared with all the keys simultaneously.** - Simplest way of deadlock recovery is
**Kill one of the processes** - The directory structure used in Unix file system is called
**Directed acyclic graph** - Which statement is not true about process O in the Unix operating system?
**Process O is called init process.** - Which of the following commands would return process_id of sleep command?
**Sleep 1 and echo $!** - Possible thread states in Windows 2000 operating system include:
**Ready, standby, running, waiting, transition and terminated** - _________ is a process model that removes defects before they can precipitate serious hazards.
**Cleanroom software engineering** - Equivalence partitioning is a __________ method that divides the input domain of a program into classes of data from which test cases can be derived.
**Black-box testing** - Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
**Software quality assurance** - The “PROJECT” operator of a relational algebra creates a new table that has always
**Same number of rows as the original table** - The employee information of an Organization is stored in the relation: Employee (name, sex, salary, deptname) Consider the following SQL query Select deptname from Employee Where sex = ‘M’ group by deptname having avg (salary) > {select avg (salary) from Employee} Output of the given query corresponds to
**Average salary of male employees in a department is more than average salary of the organization.** - For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
**In 1NF not in 2NF** - In any n-element heap, the number of nodes of height h is
**less than equal to [n/2**^{h + 1}] - A vertex cover of an undirected graph G(V, E) is a subset V
_{1}⊆ V vertices such that**If (u, v)****∈****E then u****∈****V**_{1}or v**∈****V**_{1} - In a fully connected mesh network with n devices, there are ________ physical channels to link all devices.
**n(n–1)/2** - The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is
**3600** - An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet?
**1.966 seconds** - The ________ measures the relative strengths of two signals or a signal at two different points.
**Decibel** - Which one of the following media is multidrop?
**Thick Coaxial cable** - What is the baud rate of the standard 10 Mbps Ethernet?
**20 mega baud (Solved MCQs of Computer Science)** - At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any non-basic variable Xj is obtained as zero, the solution under the test is
**Alternative solution** - A basic feasible solution to a m-origin, n-destination transportation problem is said to be _________ if the number of positive allocations are less than m + n – 1.
**Degenerate** - An actor in an animation is a small program invoked _______ per frame to determine the characteristics of some object in the animation.
**Once** - Bresenham line drawing algorithm is attractive because it uses
**Integer arithmetic only** - The refresh rate above which a picture stops flickering and fuses into a steady image is called
**Critical fusion frequency** - In homogenous coordinate system (x, y, z) the points with z = 0 are called
**Point at infinity** - If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
**40 line-pairs per inch** - Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is
**n / 8 MB** - Arrays in C language can have _________ with reference to memory representation.
**Only one subscript** - Horn clauses are special kinds of propositions which can be described as
**A single atomic proposition on left side or an empty left side** - Which of the following is/are the fundamental semantic model(s) of parameter passing? (A) In mode (B) Out mode (C) in-out mode
**(D) all of the above** - The grammar with production rules S → aSb |SS|λ generates language L given by:
**L = {w****∈****{a, b}* | n**_{a}(w) = n_{b}(w) and n_{a}(v) ≥ n_{b}(v) where v is any prefix of w} - A pushdown automation M = (Q, Σ, Γ, δ, q
_{0}, z, F) is set to be deterministic subject to which of the following condition(s), for every q ∈ Q, a ∈ Σ ∪ {λ} and b ∈ Γ (s1) δ (q, a, b) contains at most one element (s2) if δ (q, λ, b) is not empty then δ(q, c, b) must be empty for every c ∈ Σ**Both s1 and s2** - For every context free grammar (G) there exists an algorithm that passes any w ∈ L (G) in number of steps proportional to
**|w|**^{3} - The statements s1 and s2 are given as: s1: Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism. s2: Context free languages are closed under complementation, substitution and homomorphism. Which of the following is correct statement?
**s1 is correct and s2 is not correct.** - Which one of the following is not an addressing mode?
**Relative indexed** - Computers can have instruction formats with
**Zero address, one address, two addresses and three address instructions** - Which is not a typical program control instruction?
**SHL** - Interrupt which arises from illegal or erroneous use of an instruction or data is
**Internal interrupt** - The simplified function in product of sums of Boolean function F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is
**(W’ + X’) (Y’ + Z’) (X’ + Z) (Solved MCQs of Computer Science)** - When an array is passed as a parameter to a function which of the following statements is correct?
**The function can change values in the original array** - Suppose you want to delete the name that occurs before “Vivek” in an alphabetical listing. Which of the following data structures shall be most efficient for this operation?
**Doubly linked list** - Binary symmetric channel uses
**Half duplex protocol** - Hamming distance between 100101000110 and 110111101101 is
**6** - Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is
**11100010101** - The number of distinct binary images which can be generated from a given binary image of right M × N are
**2**^{MN} - If f(x, y) is a digital image, then x, y and amplitude values of f are
**Finite** - Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored): Process A B C D Arrival time 0 123 CPU cycle 8 495. The average turnaround time of these processes will be
**18.25 milliseconds** - A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order: ABACABDBACD Assuming that a page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
**9 and 8** - Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct?
**T1 < T2** - Working set model is used in memory management to implement the concept of
**Principal of Locality** - A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry?
**16 GB** - A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following statement is correct?
**OS maintains only CPU registers for each thread** - The versions of windows operating system like windows XP and window Vista uses following file system: (A) FAT-16 (B) FAT-32 (C) NTFS (NT File System)
**(D) All of the above** - Which one of the following is a correct implementation of the meta-predicate “not” in PROLOG (Here G represents a goal)?
**not (G):– call(G), !, fail. not(G).** - Which one of the following is not an informed search technique?
**Depth first search** - If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as
**Skolemization** - Given two jugs of capacities 5 litres and 3 litres with no measuring markers on them. Assume that there is endless supply of water. Then the minimum number of states to measure 4 litres water will be
**7** - The map colouring problem can be solved using which of the following technique?
**Constraint satisfaction** - Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation?
**Scripts (Solved MCQs of Computer Science)** - A fuzzy set A on R is ________ if A (λx
_{1}+ (1 – λ) x_{2}) ≥ min [A(x_{1}), A(x_{2})] for all x_{1}, x_{2}∈ R and all λ ∈ [0, 1], where min denotes the minimum operator.**Convex** - Which of the following is a correct predicate logic statement for “Every Natural number has one successor”?
**∀****x****∃****y (succ(x, y)****∧****(****∃****z succ(x, z)****⇒****equal (y, z)))** - α – β cutoffs are applied to
**Minimax search** - Which of the following is not a part of an expert system shell?
**Knowledge Base** - The Blocks World Problem in Artificial Intelligence is normally discussed to explain a
**Planning system** - Means-Ends Analysis process centres on the detection of difference between the current state and the goal state. Once such a difference is found, and then to reduce the difference one applies
**An operator that can reduce the difference** - Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is
**0.2 second** - Which of the following is the size of Network bits and Host bits of Class Aof IP address?
**Network bits 7, Host bits 24** - Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged?
**Window size** - Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth?
**7500 bps** - Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address?
**201.14.78.64** - If an artificial variable is present in the ‘basic variable’ of optimal simplex table then the solution is
**Infeasible solution** - An optimal assignment requires that the minimum number of horizontal and vertical lines that can be drawn to cover all zeros be equal to the number of
**Rows or columns** - Assume, L is regular language. Let statements S
_{1}and S_{2}are defined as: S_{1}: SQRT (L) = {x| for some y with |y| = |x|^{2}, xy∈L}. S_{2}: LOG (L) = {x| for some y with |y| = 2^{|x|}, xy∈ L}. Which of the following is true?**Both S**_{1}and S_{2}are correct. - A regular grammar for the language L = {a
^{n}b^{m}| n is even and m is even} is given by**S→aaS | S**_{1}; S_{1}→ bbS_{1}| λ - The language L = {a
^{n}b^{n}a^{m}b^{m}| n ≥ 0, m ≥ 0} is**Context free but not linear** - Assume statements S
_{1}and S_{2}defined as: S_{1}: L_{2}-L_{1}is recursive enumerable where L_{1}and L_{2}are recursive and recursive enumerable respectively. S_{2}: The set of all Turing machines is countable. Which of the following is true?**Both S**_{1}and S_{2}are correct - _______ constraints ensure that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.
**Referential Integrity** - The SQL expression, Select distinct T, branch_name from branch T, branch S where T.assets>S.assets and S.branch_city=”Mumbai” finds the names of
**All branches that have greater assets than some branch located in Mumbai.** - Let A be the set of comfortable houses given as A = {x
_{1}/0.8, x_{2}/0.9, x_{3}/0.1, x_{4}/0.7} and B be the set of affordable houses B = {x_{1}/0.9, x_{2}/0.8, x_{3}/0.6, x_{4}/0.2} Then the set of comfortable and affordable houses is**{x**_{1}/0.8, x_{2}/0.8, x_{3}/0.1, x_{4}/0.2}**(Solved MCQs of Computer Science)** - Support of a fuzzy set A = { x
_{1}/0.2, x_{2}/0.15, x_{3}/0.9, x_{4}/0.95, x_{5}/0.15} within a universal set X is given as**{x**_{1}, x_{2}, x_{3}, x_{4}, x_{5}} - In a single perceptron, the updation rule of weight vector is given by
**w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)** - ______ refers to the discrepancy among a computed, observed or measured value and the true specified or theoretically correct values.
**Error** - Which logic family dissipates the minimum power?
**CMOS** - Which of the following electronic component is not found in IC’s?
**Inductor** - A given memory chip has 14 address pins and 8 data pins. It has the following number of locations.
**2**^{14} - The instruction: MOV CL, [BX] [DI] + 8 represent the _____ addressing mode.
**Based Indexed** - The power dissipation of a flip-flop is 3mW. The power dissipation of a digital system with 4 flip-flops is given by
**12 mW** - A binary ripple counter is required to count up to 16383. How many flip-flops are required?
**14** - The time complexity of recurrence relation T(n) = T(n/3) + T(2n/3) + O(n) is
**O(n Ig n)** - How many people must there be in a room before there is a 50% chance that two of them were born on the same day of the year?
**At least 23** - The number of possible parenthesizations of a sequence of n matrices is
**Ω(2**^{n}) - The time complexity of an efficient algorithm to find the longest monotonically increasing subsequence of n numbers is
**O(n Ig n)** - Given 0-1 knapsack problem and fractional knapsack problem and the following statements: S
_{1}: 0-1 knapsack is efficiently solved using Greedy algorithm. S_{2}: Fractional knapsack is efficiently solved using Dynamic programming. Which of the following is true?**Both S**_{1}and S_{2}are not correct. - Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for a value, then it will work correctly for all the other values in that class. This is used
**To reduce the number of test cases required** - The failure intensity for a basic model as a function of failures experienced is given as λ(μ)-λ
_{0}[1 – (μ)/(V_{0})] where λ_{0}is the initial failure intensity at the start of the execution, μ is the average or expected number of failures at a given point in time, the quantity V_{0}is the total number of failures that would occur in infinite time. Assume that a program will experience 100 failures in infinite time; the initial failure intensity was 10 failures/CPU hr. Then the decrement of failures intensity per failure will be**–0.1 per CPU hr.** - Improving processing efficiency or performance or restructuring of software to improve changeability is known as
**Perfective maintenance** - In ____, modules A and B make use of a common data type, but perhaps perform different operations on it.
**Stamp coupling** - Sixty (60) reusable components were available for an application. If only 70% of these components can be used, rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will be the risk exposure if risk probability is 80%?
**Rs. 20,160** - Consider the following two function declarations: (i) int *f( ) (ii) int (*f)( ) Which of the following is true?
**The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer.****(Solved MCQs of Computer Science)** - Assume that we have constructor function for both Base and Derived classes. Now consider the declaration: main ( ) Base *p = new Derived; In what sequence, the constructor will be executed?
**Base class constructor is followed by Derived class constructor** - MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes ______ frames.
**Redundant** - If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division?
**111111000** - If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the
**Public Key of user B** - A _____ can forward or block packets based on the information in the network layer and transport layer header.
**Proxy firewall** - The two color systems – the HSV and HLS are
**Hue, Saturation, Value and Hue, Lightness, Saturation** - The parametric representation of the line segment between the position vectors P
_{1}(2, 3) and P_{2}(5, 4) is given as**x (t)= 2+3t, y(t)=3+t 0 ≤ t ≤ 1** - The programming languages C and C++ are not strongly typed languages because:
**Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are not type checked.** - The tracing model in Prolog describes program execution in terms of certain events. These events are
**Call, exit, redo and fail** - Which of the following statements is not correct with reference to distributed systems?
**In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.** - Which of the following shell scripts will produce the output “my first script”?
**For i in my first script; do echo –i $i; done** - The portion of Windows 2000 operating system which is not portable is
**Virtual memory management** - Which of the following statements is not true for UNIX Operating System?
**UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.**

**Disclaimer**

All the data for Solved MCQs of Computer Science test preparation have been compiled very carefully. Still, there remain chances of correction. Therefore, your comments on the given information for correction are welcome.

Help us by Sharing!
## 1 Response

[…] Solved MCQs of Computer Science […]