Multiple Choice Questions on Computer Science

Multiple Choice Questions on Computer Science

1-A compound statement which is neither a tautology nor a contradiction is called _______ 

(a) Contingency

(b) Equivalence

(c) Condition

(d) Inference

2-An exceptional condition in a computer system caused by an event external to the CPU is known as  

(a) Halt

(b) Process

(c) Interrupt

(d) None of these

3-In asynchronous bus controlling data transfer is based on use of _______ 

(a) Clock

(b) Sending clock

(c) Handshake

(d) None of the above

4-In memory a word is retrieved based on a portion of its content rather than its address. This memory is known as _________ 

(a) Associative memory 

(b) Retrieval memory 

(c) Read only memory 

(d) None of the above

5-Which of the following is a type of interrupt ? 

(a) External interrupt 

(b) Internal interrupt 

(c) Software interrupt 

(d) All of the above

6-A complete graph with 15 vertices has ________ edges. 

(a) 15

(b) 120

(c) 105

(d) 210

7-Which of the following is a non-linear data structure ? 

(a) Linked list

(b) Array

(c) Graph

(d) Queue

8-Which of the following is not used for hash function ? 

(a) Mid-square method 

(b) Division method 

(c) Folding method 

(d) Probe method

9-In which of the following records are maintained in the logical sequence of their primary key values ? 

(a) Index sequential file 

(b) Sequential file 

(c) Relative file  

(d) Direct file

10-In a multiprogramming environment 

(a) The processor executes more than one process at a time. 

(b) The programs are developed by more than one person. 

(c) More than one process resides in the memory. 

(d) A single user can execute many programs at the same time.

11-Which of the following scheduling algorithms gives minimum average waiting time ? 

(a) FCFS

(b) SJF

(c) Round Robin

(d) Priority

12-Mutual exclusion problem occurs 

(a) between two disjoint processes that do not interact. 

(b) among processes that share resources. 

(c) among processes that do not use the same resources. 

(d) None of the above  

13-Each row or record of a relational table is known as  

(a) Domain

(b) Attribute

(c) Tuple

(d) Key

14-Which of the following operation of relational algebra, selects certain columns from the table and discards the other columns ? 

(a) SELECT

(b) PROJECT

(c) DIVISION

(d) None of the above

15-Which of the following normal form is based on the concept of full functional dependency on each candidate key of the relation ? 

(a) 1 NF

(b) 2 NF

(c) 3 NF

(d) None of the above

16-A tablespace is further broken down into _________. 

(a) Blocks

(b) Extents

(c) Files

(d) Segments

17-The _________ information is used to limit the amount of recovery operations to be done following a system crash resulting in the loss of volatile storage. 

(a) Log

(b) Data file

(c) Check point

(d) None of the above

18-A jam signal sent through a network means 

(a) The network traffic is too congested 

(b) There has been a data collision 

(c) It is time to go 

(d) The printer’s paper feeder is jammed

19-What is difference between a Router and a Brouter ? 

(a) A brouter routinely broadcasts routing information. 

(b) A brouter is a basic functionality of router 

(c) A brouter can function as a bridge as well as a router. 

(d) A brouter is a router that routes signals on broadband network

20-Which of the following is solution of mobile IP problem ? 

(a) Care of address 

(b) Carefree address 

(c) Don’t care address 

(d) None of the above

21-The solution that satisfies all constraints of the given problem and either maximizes or minimizes a given objective function is called _________ solution. 

(a) greedy

(b) feasible

(c) optimal

(d) ordered

22-SRS stands for 

(a) Software Requirements Specification 

(b) System Requirements Specification 

(c) Systematic Requirements Specification 

(d) None of the above

23-Which of the following is the most important feature of spiral model ? 

(a) Quality management

(b) Performance management 

(c) Efficiency management

(d) Risk management

24-The process through which an existing system undergoes an alteration, to be reconstituted in a new form, is called  

(a) Engineering

(b) Prototyping

(c) Re-Engineering

(d) Debugging

25-Context diagram explains 

(a) The internal view of the system 

(b) The overview of the system 

(c) The entities of the system

(d) None of the above

26-A turing machine crashes 

(a) If the machine reads all the input characters without traversing some state. 

(b) If the machine traverses all its states till the input remains. 

(c) If the transitional function is not defined.  

(d) None of the above

27-When a derived class inherits from many base classes, this process is known as  

(a) Default inheritance 

(b) Multiplex inheritance 

(c) Multilevel inheritance

(d) Multiple inheritance

28-The transformation, when applied to any object, results only in distortion of shape is called 

(a) Reflection

(b) Scaling

(c) Rotation

(d) Shearing

29-The encoding format TIFF stands for  

(a) Tagged Image File Format

(b) Tagged Image Format File 

(c) Transformed Image File Format

(d) Transformed Image Format File

30-The point at which a set of projected parallel lines appear to converge is called as a  

(a) convergence point 

(b) vanishing point  

(c) point of illusion 

(d) point of delusion

ANSWERS:

1-(a), 2-(c), 3-(c), 4-(a), 5-(c), 6-(c), 7-(c), 8-(d), 9-(b), 10-(a), 11-(b), 12-(b), 13-(c), 14-(b), 15-(b), 16-(d), 17-(c), 18-(b), 19-(c), 20-(a), 21-(c), 22-(a), 23-(d), 24-(c), 25-(c), 26-(c), 27-(d), 28-(d), 29-(a), 30-(b)