Multiple Choice Questions on Information Technology

Computer Science Engineering

Multiple Choice Questions on Information Technology

1- Java ____________ is a language of machine instructions understood by the java virtual machine and usually generated (compiled) from Java language source code.

(a) Javap

(b) Applet

(c) Beans

(d) Bytecode

 

2- Banker’s algorithm is used for _______________ purpose.

(a) Deadlock avoidance

(b) Deadlock removal

(c) Deadlock prevention

(d) Deadlock continuation

 

3- Which traversal technique lists the nodes of a binary search tree in ascending order:

(a) Post-order

(b) In-order

(c) Pre-order

(d) Linear order

 

4- Another name of IEEE 802.11.a is ________________.

(a) Wi-max

(b) Fast ethernet

(c) Wi-Fi

(d) 802.11g

 

5- What does the URL need to access documents? I. Path name II. Host name III. DNS IV. Retrieval method V. Server port number

(a) I, II,III

(b) I, III, V

(c) I,II, IV

(d) III, IV, V

 

6- B+ tree is preferred to binary tree in database because:

(a) Disk capacities are greater than memory capacities

(b) Disk access is much slower than memory access

(c) Disk data transfer rates are much less than memory data transfer rate.

(d) Disk are more reliable than memory

 

7- Which one of the following statements is false:

(a) Context-free languages are closed under union

(b) Context-free languages are closed under concatenation.

(c) Context-free languages are closed under intersection.

(d) Context-free languages are closed under Kleene closure.

 

8- Which of the following binary number is the same as its 2’s complement:

(a) 1010

(b) 1000

(c) 0101

(d) 1001

 

9- Which of the following logic families is well suited for high-speed operations?

(a) TTL

(b) ECL

(c) MOS

(d) CMOS

 

10- 8085 microprocessor has ___ hardware interrupts:

(a) 2

(b) 3

(c) 4

(d) 5

 

ANSWERS:

1-(d), 2-(a), 3-(b), 4-(a), 5-(b), 6-(b), 7-(c), 8-(c), 9-(b), 10-(d)