Anda di halaman 1dari 109

Basic Networking Multiple Choice Questions

Sunday, 15 April 2012

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

1) Which of the following is not a type of Computer Network?


Local Area Network (LAN)
Personal Area Network (PAN)
Remote Area Network (RAN)
Metropolitan Area Network (MAN)
Show/Hide Answer
Answer = c
Explanation:The Types of Computer Networks are LAN, MAN, PAN, WAN,
CAN but RAN Remote Area Network is not a type of CN.
2) Full Form of NIC?
New Internet Connection
Network Interface Card
Network Interface Connection
Net Interface Card
Show/Hide Answer
Answer =B
Explanation: NIC is Network Interface Card Which is Used to Connect
Computer to a Network.
3) Which of the following are type of Twisted Pair Cable?
Coaxial Cable
Shielded Twisted Pair (STP)
Unshielded Twisted Pair (UTP)
Only B and C
Show/Hide Answer
Answer = D
Explanation:STP and UTP are type of Twisted Pair Cable which are mostly
used in all Networks.
4) _________ Supports Data Rate Upto 1000 Mbps Gigabyte Ethernet.
CAT 1
Thinnet
CAT 5
CAT 5e
Show/Hide Answer
Answer = D
Explanation: CAT 5e is also Know As 1000 Mbps Gigabyte Ethernet
and Supports Data Rate Upto 1000 Mbps.
5) Which Color Coding of Cable is Used to Connect Similar Devices?
Straight Cable
Cross Over Cable
Serial Cable
All of Above.
Show/Hide Answer

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Answer = B
Explanation: Cross Over Color Coding of UTP Cable is Used to connect
Similar Devices like HUB to HUB, PC to PC, Switch To Switch.
6) HUB is a _________ Device and Switch is a ________ Device.
Unicast, Multicast
Malticast, Unicast
Broadcast, Unicast
None of Above
Show/Hide Answer
Answer = C
Explanation: Hub is a Broadcasting Device and Switch is a Unicasting
Device because Switch have Memory Element to Store MAC Address.
7) Switch is a Device of _________ Layer of OSI Model.
Network Layer
Data Link Layer
Application Layer
Session Layer
Show/Hide Answer
Answer = B
Explanation: Switches Operate On Th Second Layer of OSI Model That is
Data Link Layer.
8) Star Topology is Based On a Central Device that can be __________ ?
HUB
Switch
Only A
Both A and B
Show/Hide Answer
Answer = D
Explanation: HUB and Switch are used in Star Type Networks.
9) TCP/IP is also well known as _______.
OSI Model
TCP Model
DOD Model
Network Model
Show/Hide Answer
Answer = C
Explanation: TCP/IP Model is also known as DOD model.
10) IPX/SPX is used in ______________.
Novell's Netware Network
Mac - Macintosh
Apple
Microsoft
Show/Hide Answer
Answer = A
Explanation: IPX/SPX - Internet Packet Exchanger/Sequenced Package
Exchanger is used in Novell's Netware Network.

C Language Objective Type Quiz Questions

Sunday, 28 October 2012

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.

1) A self contained block of statements that perform a coherent task of


some kind is called a?
Monitor
Function
Program
Structure
Show/Hide Answer
Answer = B
2) Recursion is sometimes called ?
Circular definition
Complex definition
Procedure
Union
Show/Hide Answer
Answer =A
3) The directive that can be used to test whether an expression evaluates
to a nonzero value or not is ?
#if
#elif
#endif
#exit
Show/Hide Answer
Answer = A
4) The number of arguments supplied from the command line, by
conversion is known as ?
arg c
arg v
#define
#include
Show/Hide Answer
Answer = A
5) The expression X=4+2%-8 evaluates ?
-6
6
4
None
Show/Hide Answer
Answer =B
6) Determine which of the following is valid character constant ?
'//'
'\0'
'xyz'
'\052'
Show/Hide Answer
Answer = A
7) Given the statement , maruti.engine.bolts=25 . Which of the following is
true?
Structure bolts is nested within structure engine
Structure engine is nested within structure maruti
Structure maruti is nested within structure engine

d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Structure maruti nested within structure bolts


Show/Hide Answer
Answer =B
8) To access a structure element using a pointer, ......... operator is used?
dot ( . )
pointer ( & )
pointer ( * )
arrow ( -> )
Show/Hide Answer
Answer =D
9) The ........ operator is a technique to forcefully convert one data type to
the other ?
Cast
Conversion
Type
Uniary
Show/Hide Answer
Answer = A
10) Which of the following numerical value is invalid constant ?
assignment operator
relational operator
logical operator
bitwise shift operator
Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/10/c-language-objective-type-quizquestions.html#sthash.05MjTkXe.dpuf
1) << Operator is used for ?

a.
b.
c.
d.

a.
b.
c.
d.

Right Shifting
Left Shifting
Bitwise Shifting
Bitwise Complement

Show/Hide Answer
Answer = B
2) The value that follows the keyword CASE may only be ?
Constant
Variable
Semicolon
number
Show/Hide Answer
Answer = A
3) The machine registers are sometimes called ?

a.
b.
c.
d.

Local Variables
Global Variables
Accumulators
Static variable
Answer = A
4) An array of pointer is same as ?

a.
b.

pointer to array
pointer to pointer

Show/Hide Answer

c.
d.

pointer to function
pointer to structure
Show/Hide Answer
Answer =B
5) scanf( ) function can be used for reading ?

a.
b.
c.
d.

a.
b.
c.
d.

double character
single character
multiple character
no character

Show/Hide Answer
Answer = C
6) C allows three way transfer of control with the help of ?
unary operator
relational operator
ternary operator
comparison operator
Show/Hide Answer
Answer =C
7) The statement that transfer control to the beinning of the loop is called ?

a.
b.
c.
d.

a.
b.
c.
d.

break statement
exit statement
continue statement
goto statement

Show/Hide Answer
Answer = C
8) The number of arguments supplied from the command line, by convention, is known
as ?
arg c
arg v
#define
#include

Show/Hide Answer
Answer = A
9) If an array is used as function argument, the array is passed ?

a.
b.
c.
d.

by value.
by reference
by name
the array can not be used as function argument
Show/Hide Answer
Answer = B
10) The function fprintf is used in a program ?

a.
b.
c.
d.

When too many printf calls have been already used in the program.
In place of printf, since printf uses more memory
When the output is to be printed on to a file.
When the type of variables to be printed are not known before.
Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/10/mcq-on-c-language-onlineprogramming.html#sthash.Z7CsSmgf.dpuf
1) When we use the case control structure ?

a.
b.
c.
d.

To choose one from multiple alternatives


To switch from one instruction to another
To make the execution fast
None of above

Show/Hide Answer
Answer = A
2) The case keyword is followed by ?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Float values
Character values
integer values
Both b and c

Show/Hide Answer
Answer = D
3) What will be the output of following code ?
#include<stdio.h>
void main( )
{
char suite =3;
switch(suite)
{
case 1:
printf("ALL QUIZ");
case 2:
printf("All quiz is great");
default:
printf("All quiz contains MCQs");
}
printf("Are you like All quiz ?");
}

ALL QUIZ
All quiz is great
All quiz contains MCQs
All quiz is great Are you like Al quiz ?
Show/Hide Answer
Answer = D
Explanation: Because the condition within the switch does not match any case so the default
block will be executed. After then the control will be transferred to out of the switch and print
statement will be executed.
4) What will be the output of following code ?
void main( )
{
int c=3;
switch(c)
{
case '3':
printf("Hi");
break;
case 3:
printf("Hello");
break;
default:
printf("How r u ?");
}
}

Hi
Hello
How r u ?
None of above
Answer = B

Show/Hide Answer

5) What will be the output of following program ?


void main( )
{
int 1=3;
switch(i)
{
case 0:
printf("I am here");
case 1+0:
printf("I m in second case");
case 4/2:
printf("I m in third case");
case 8%5:
printf("Good bye");
}
}
a.
b.
c.
d.

a.
b.
c.
d.

All case statements will be executed


I am here
Good bye
I am in third case
Show/Hide Answer
Answer = C
6) What will be the output of following ?
void main( )
{
int suite =1;
switch(suite);
{
case 0:
printf("Its morning time");
case 1:
printf("Its evening time");
}
}
Error
Its morning time
Its evening time
None of above
Show/Hide Answer
Answer = A
Explanation: The code will generate an error that the case is outside switch. It is because of the
semicolon after the switch statement.
- See more at: http://allquiz.blogspot.in/2012/09/c-programming-language-objectivetype.html#sthash.XY9YdTZN.dpuf
1) What will be the output of following program ?
#include<stdio.h>
int main( )
{
int a=300,b,c;
if(a>=400)
b=300;
c=200;
printf("%d,%d\n",b,c);
return 0;
}

a.
b.
c.

Garbage value, Garbage Value


300,200
200,300

d.

a.
b.
c.
d.

a.
b.
c.
d.

Garbage value,200

Show/Hide Answer
Answer = D
Explanation: As the condition within the if statement is false so the value of b will not be
initialized so it will print the garbage value and c is initialized to 200 so the output will be
Garbage,200
2) What will be the output of following code ?
#include<stdio.h>
int main( )
{
int x=10,y=20;
if(x = = y)
printf("%d%d",x,y);
return 0;
}
Garbage values
Raise an error
Prints Nothing
None of above

Show/Hide Answer
Answer = C
Explanation:As the condition of if statement is not true, so the statement immediately after if
that is print statement will not be executed and the code prints nothing.
3) Give the output of following code ?
#include<stdio.h>
int main( )
{
int x=3;
float y=3.0;
if(x = = y)
printf(" x and y are equal");
else
printf(" x and y are not equal");
}
x and y are equal
x and y are not equal
x and y are same
None of above
Show/Hide Answer
Answer = A
4) What will be the output of code ?
#include<stdio.h>
int main( )
{
int x=3,y,z;
y=x=10;
z=x<10;
printf("x=%dy=%dz=%d\n",x,y,z);
return 0;
}

a.
b.
c.
d.

10,10,10
10,10,0
0,0,0
0,10,10
Answer = B
5) What will be the output ?
#include<stdio.h>
int main( )
{

Show/Hide Answer

int k=35;
printf("%d%d%d",k==35,k=50,k>40);
}
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

35,50,40
0,50,0
0,0,0
1,1,1

Show/Hide Answer
Answer =B
6) Which of the following statement is used to take the control to the beginning of the
loop ?
exit
break
continue
None of these

Show/Hide Answer
Answer = C
7) A do - while loop is useful when we want that the statement within the loop must be
executed ?
only once
at least once
more than once
None of above

Show/Hide Answer
Answer = B
8) What will the output of following program ?
#include<stdio.h>
void main( )
{
int i=0;
for(;i;)
printf("Allquiz");
}
Prints Nothing
Raise an error
Garbage value
Allquiz

Show/Hide Answer
Answer = A
9) What will be the output of following program ?
#include<stdio.h>
void main( )
{
int i;
for(i=1;i<=5;printf("%d",i));
i++
}

Error
Garbage values
1 to 5
Infinite loop
Show/Hide Answer
Answer =D
10) What will be the output of following program ?
#include<stdio.h>
int main( )

int x=4;
while(x==1)
{
x=x-1;
printf("%d",x);
x--;
}

}
a.
b.
c.
d.

4
1,2,3,4
Prints Nothing
None of above

Show/Hide Answer
Answer =C
- See more at: http://allquiz.blogspot.in/2012/09/c-language-multiple-choicequestions.html#sthash.pGvh6fpf.dpuf
1) What will be the output of following program ?
#include<stdio.h>
int main( )
{
int i=2,j=3,k,l;
float a,b;
k = i/j * j;
l = j/i * j;
a = i/j * j;
b = j/i * i;
printf("%d %d%f%f\n",k,l,a,b);
return 0;
}

a.
b.
c.
d.

3, 0, 0, 0
0, 3, 0.000000, 2.000000
0,0,0,0
Error
Show/Hide Answer
Answer = B
Explanation: As K and L are integer variables so it prints the integer value as result and a and b
are float variable, so float value will be print as result.
2) What will be the output of following program ?
#incllude<stdio.h>
int main( )
{
int a,b;
a = -3 - - 25;
b = -3 - - (-3);
printf("a=%d b=%d\n",a,b);
return 0;
}

a.
b.
c.
d.

a = 22 b = -6
a = -6 b = 22
a= 3 b=3
No Output

Show/Hide Answer
Answer = A
Explanation:No Explanation
3) What will be the output of following program ?
#include<stdio.h>

int main( )
{
float a=5,b=2;
int c,d;
c =a%d;
d =a/2;
printf("%d\n",d);
return 0;
}
a.
b.
c.
d.

a.
b.
c.
d.

3
2
Error
None of above

Show/Hide Answer
Answer = C
Explanation: Program will give the error : Illegal use of floating point. The statement c = a%b
will give the error.
4) What will be the output of program ?
#include<stdio.h>
int main( )
{
printf("nn /n/n nn/n");
return 0;
}
Nothing
nn /n/n nn
nn /n/n
Error
Show/Hide Answer
Answer = B
Explanation: No Explanation
5) What will be the output of program ?
#include<stdio.h>
int main( )
{
int a,b;
printf("Enter two values of a and b");
scanf("%d%d",&a,&b);
printf("a=%d b=%d"a,b);
return 0;
}

a.
b.
c.
d.

a.
b.
c.
d.

a=0 b=0
a=1 b=1
Values you entered
None of above

Show/Hide Answer
Answer = C
Explanation: No Explanation
6) A character variable can at a time store ?
1 character
8 character
254 character
None of above

Show/Hide Answer
Answer = A
Explanation: No Explanation
7) The maximum value that an integer constant can have is ?

a.
b.
c.
d.

-32767
32767
1.7014e + 38
-1.7014e + 38
Show/Hide Answer
Answer = B
Explanation: The range of an integer number is -32767 - 32767
8) Which of the following is false in C ?

a.
b.
c.
d.

a.
b.
c.
d.

Keywords cannot be used as variable names


Variable names can contain a digit
Variable names do not contain a blank space
Capital letters can be used in variable names
Show/Hide Answer
Answer = A
Explanation: Keywords can be used as variable names but by doing this it creates confusion
9) On which if the following operator can % operator NOT be used ?
int variable
float variable
int constant
All of above
Answer = B
Explanation: No Explanation
10) A C variable cannot start with ?

a.
b.
c.
d.

Show/Hide Answer

An alphabet
A number
A special symbol other that underscore
Both B and C
Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/09/c-langiage-multiple-choicequestions.html#sthash.2d0C6YmK.dpuf
1) Which of the following is not true in context of C language ?

a.
b.
c.
d.

It is array of characters
Last character of character array is always \0
C inserts the null character automatically
Any string in C can be read by the function getchar()
Show/Hide Answer
Answer = B and C
Explanation: No Explanation
2) Which of the following operations can not be perform on pointers in C ?

a.
b.
c.
d.

Addition of two pointers


Subtraction of a number from a pointer
Subtraction of one pointer from another
Addition of a number to a pointer
Show/Hide Answer
Answer = A
Explanation: No Explanation
3) What will be the output of following program ?
main( )
{
static char a[]="BOMBAY"
char *b="BOMBAY";
printf("\n%d%d",size of(a),size of (b));
}

a.
b.
c.
d.

a=7,
a=7,
a=2,
a=7,

b=7
b=2
b=7
b=0

Show/Hide Answer
Answer = C
Explanation: No Explanation
4) What is the output of C statement 7.5 % 3 ?
a.
b.
c.
d.

1.5
1
No output
Error
Show/Hide Answer
Answer = D
Explanation: No Explanation
5) Any program in C has access to three standard files?

a.
b.
c.
d.
e.

standard input file, standard output file, standard error file


stdin, stdout, stderr
keywords, screen, stderr
All of above
None of above
Show/Hide Answer
Answer = B
Explanation: No Explanation
6) An identifier in C ?

a.
b.
c.
d.
e.

is a name of thing such as variable and function


is made up of letters, numerals and the underscore
can contain both uppercase and lowercase letters
All of above
None of above
Show/Hide Answer
Answer = D
Explanation:No Explanation
7) The single character input/output functions are ?

a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

a.
b.
c.

scanf( ) and printf( )


getchar( ) and printf( )
scanf( ) and putchar( )
getchar( ) and putchar( )
None of above

Show/Hide Answer
Answer = D
Explanation: No Explanation
8) Precedence determines which operator ?

is evaluated first
is most important
is fastest
Operates on the largest number
None of above

Show/Hide Answer
Answer = A
Explanation: No Explanation
9) In C, the NULL statement which does nothing is just ?
a.,
;
:

d.

a.
b.
c.
d.
e.

Show/Hide Answer
Answer = B
Explanation:No Explanation
10) The two operators && and || are ?
arithmetic operators
equality operators
logical operators
relational operators
None of above
Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/06/multiple-choice-questions-on-clanguage.html#sthash.tLLmchtw.dpuf
1) The Conditional Compilation ?

a.
b.
c.
d.

It is taken care of by the compiler


It is setting the compiler options conditionally
It is compiling a program based on condition
None of Above
Show/Hide Answer
Answer = C
2) Originally C was developed as ?

a.
b.
c.
d.

System Programming Language


General Purpose Language
Data Processing Language
None of Above
Show/Hide Answer
Answer = A
3) Minimum number of temporary variable needed to swap the contents of 2 variable
is ?

a.
b.
c.
d.

1
2
3
0
Answer =D

Show/Hide Answer

4)*ptr++ is equivalent to ?
a.
b.
c.
d.

ptr++
*ptr
++*ptr
None of Above

Show/Hide Answer

Answer = D
5) Expression C=i++ Causes ?

a.
b.
c.
d.

Value of i is assigned to C and then I is incremented by 1


i to be incremented by 1, and then value of i assigned to C
Value of i assigned to C
i to be incremented by 1
Show/Hide Answer
Answer = A

6) Declaration int *(*p) int(*a)(i) is ?


a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

A pointer to function that accepts an integer argument and returns an integer


A pointer to a, which returns an integer
A pointer to subroutine, which returns result of evaluation
None of Above
Show/Hide Answer
Answer = A
7) Null pointer and UN-initialized pointers are same ?
True
False
Varies from program to program
None of Above

Show/Hide Answer
Answer = B
8) In which header file Null macro is defined ?
stdio.h and stddeth
Iostream.h
string.h
preprocessor
Answer = A
9) Null pointer is ?

Show/Hide Answer

a.
b.
c.
d.

A pointer which does not point anywhere


Pointer defined with name Null
A pointer that returns 0 values
None of Above
Show/Hide Answer
Answer = A
10) Null macro is ?

a.
b.
c.
d.

A macro with name Null


A macro which represents Null pointer
A macro defined with no name
None of Above
Show/Hide Answer
Answer = B
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-in-cwith.html#sthash.INWQPNtp.dpuf

MCQ Questions And Answers On Computer Arithmetic


Tuesday, 28 August 2012

Following are the multiple choice questions on computer arithmetic based


on the concept of computer memory and storage system.

a.
b.
c.
d.

1) Which memory stores the data permanently ?


Primary memory
Secondary memory
Cache memory
Registers
Show/Hide Answer

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.

Answer = B
Explanation: Secondary memory stores the data permanently until we remove it.
2) Which of the following is the cheapest type of memory ?
Secondary memory
Primary memory
Cache memory
ROM
Show/Hide Answer
Answer = A
Explanation: Secondary memory is the cheapest form because it can not process
the data through the CPU directly. The data must be brought into the primary
memory form execution. Therefore secondary memory is the form of slowest
memory.
3) Which of the following is auxiliary memory of the computer system ?
ROM
SRAM
Cache memory
Magnetic tape
Show/Hide Answer
Answer = A
Explanation:ROM is the secondary memory which stores the data permanently also
known as auxiliary memory.
4) What does IBG stands for ?
Intra byte gaps
Inter block gaps
Inter bit gaps
Intra block gaps
Show/Hide Answer
Answer = B
Explanation:Inter block gaps is the space between the two consecutive physical
blocks of memory.
5) On what type of ROM data can be written only once ?
PROM
EPROM
EEPROM
EROM
Show/Hide Answer
Answer = A
Explanation:In Programmable Read Only Memory once the data is written it
remains there forever.
6) In optical storage system which medium is used for reading and
recording data ?
Laser light
Black light
High energy visible light
Ultraviolet light
Show/Hide Answer
Answer = A
Explanation: Optical storage system use the laser light to retrieve as well as to
record the data.
7) Which is known as solid state memory ?
Parallel serial bus

b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Universal parallel bus


Universal serial bus
Universal computer bus
Show/Hide Answer
Answer = C
Explanation:No Explanation
8) In MO system which of the following temperature is used as a recording
medium ?
Room temperature
Curie temperature
Neel temperature
Boiling point temperature
Show/Hide Answer
Answer = B
Explanation:Curie temperature is used for recording data in Magneto Optical
system. Curie temperature is the temperature at which the material loses its
magnetic properties and above this temperature the material becomes
paramagnetic.
9) The amount of space available in the computer system for holding the
data is called?
Storage space
Storage area
Storage capacity
Storage address
Show/Hide Answer
Answer = A
Explanation: No Explanation
10) Which of the following is not a type of magnetic storage system ?
Magnetic tape
Floppy disk
Compact disk
Hard disk
Show/Hide Answer
Answer = C
Explanation: Compact disk is the optical storage system not the magnetic storage
system.
- See more at: http://allquiz.blogspot.in/2012/08/mcq-questions-and-answers-oncomputer.html#sthash.aMnS5Ihw.dpuf
1) On receiving an interrupt from an I/O device, the CPU ?

a.
b.
c.
d.

a.
b.
c.
d.

halts for a predetermined time


hands over control of address bus and data bus to the interrupting device.
branches off to the interrupt service routine immediately
branches off to the interrupt service routine after the completion of the current instruction.
Show/Hide Answer
Answer = D
2) To get boolean expression in the product of sum form from a given Karnaugh map ?
don't care condition should not be present
don't care conditions if present should be takes as zeros
one should cover all the 0's present and complement the resulting expression.
one should cover all the 1'a present and complement the resulting expression.
Show/Hide Answer

Answer = C
3) The reduced form of the boolean expression (A + B)(A + C) is ?
a.
b.
c.
d.

AB + AC
AC + B
A+B+C
A + BC
Show/Hide Answer
Answer = D
4) Name the cache also known as internal cache ?

a.
b.
c.
d.

a.
b.
c.
d.

L1
L2
L3
L4

cache
cache
cache
cache

Show/Hide Answer
Answer = A
Explanation:L1 cache is also known as internal cache and it resides in the CPU. L2 is known as
secondary cache and it is within the motherboard.
5) Which of the following is not a CPU register ?
Memory control register
Memory data register
Memory buffer register
Instruction register
Show/Hide Answer
Answer = A
Explanation: There is no MCR in the CPU
6) The main task of memory address register is?

a.
b.
c.
d.

stores
stores
stores
stores

the
the
the
the

address
address
address
address

of
of
of
of

next location in the main memory


next location in cache memory
next location in secondary memory
output device to which the data is sent
Show/Hide Answer

Answer = A
Explanation: No Explanation
7) Which register indicates whether the data register holds the data to be transferred or
not ?
a.
b.
c.
d.

a.
b.
c.
d.

a.

MAR
MBR
MDR
Status register

Show/Hide Answer
Answer = D
Explanation: No Explanation
8) Which of the following operation represents the machine cycle?
Fetch - Execute - Decode - Store
Execute - Decode - Store - Fetch
Decode - Fetch - Store - Execute
Fetch - Decode -Execute - Store
Show/Hide Answer
Answer = D
Explanation: In Fetch phase the instruction is brought into the computer, in Decode phase the
instruction in divided into different parts, in Execute phase the decoded instruction is executed by
the CPU and finally the result sent to the output device or main memory.
9) The decoding phase of instruction cycle is also known as ?
Translating

b.
c.
d.

a.
b.
c.
d.

Interpreting
Analyzing
Breaking

Show/Hide Answer
Answer =B
Explanation:Decoding phase is also known as interpreting as the instruction in interpreted to
determine two key attribute of the instruction , the opcode and the operand.
10) Cache memory is used to transfer data between ?
Main memory and secondary memory
Processor and main memory
Processor and secondary memory
Processor and output device
Show/Hide Answer
Answer = B
Explanation:Cache is always placed between the main memory and processor in the computer
system.
- See more at: http://allquiz.blogspot.in/2012/08/questions-and-answers-oncomputer.html#sthash.PQcfVtqk.dpuf
1) The .... is ultraviolet light erasable and electricity programmable.This allows the user
to create and store until programs and data are perfected. ?

a.
b.
c.
d.

EPROM
PROM
ROM
RAM
Show/Hide Answer
Answer = A
Explanation: N/A
2) What table shows the electrical status of digital circuits output for every possible
combination of electrical states in the inputs ?

a.
b.
c.
d.

Function Table
Truth Table
Routing Table
ASCII Table

Show/Hide Answer

Answer = A
Explanation: No Explanation
3) The gray code for decimal 7 is ?
a.
b.
c.
d.

a.
b.
c.
d.

a.

0111
1011
0100
0101

Show/Hide Answer
Answer = C
Explanation: First convert decimal seven to binary that is 0111 then convert it into gray code.
4) Which of the following electronic component are not found in ordinary ICs?
Diodes
Transistors
Resistors
Inductors

Show/Hide Answer
Answer = D
Explanation: Inductor is a passive two terminal electronic component that stores energy in its
magnetic field
5) Choose the correct statements ?
Bus is a group of information carrying wires

b.
c.
d.
e.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Bus is needed to achieve reasonable speed of operation


Bus can carry data or address
A bus can be shared by more that one device
All of above
Show/Hide Answer
Answer = E
Explanation: A bus have all the four features.
6) If the memory access takes 20 ns with cache and 110 ns without it,then the hit ratio
(cache uses 10 as memory) is ?
93
90
87
88

%
%
%
%

Show/Hide Answer
Answer = B
Explanation: If we find what we want in the cache then it is called Hit otherwise it is miss.
7) Any instruction should have at least ?
2 operands
1 operand
3 operands
None of above

Show/Hide Answer
Answer = D
Explanation: An instruction can be without operand also.
8) The number of clock cycles necessary to complete 1 fetch cycle in 8085 is ?
3
4
4
3

or
or
or
or

4
5
6
5

Show/Hide Answer
Answer = C
Explanation: No Explanation
9) Motorola's 68040 is comparable to ?
8085
80286
80386
80486

Show/Hide Answer
Answer = D
Explanation: Motorola 68040 is a microprocessor released in 1970. It is called as oh - four - oh
or oh forty
10) The addressing mode used in the instruction PUSH B ?
Direct
Register
Register Indirect
Immediate
Show/Hide Answer
Answer = C
Explanation:In register indirect addressing mode the operand is found from the memory whose
address is fetched from the register in the instruction code.
- See more at: http://allquiz.blogspot.in/2012/08/computer-arithmetic-questionsand.html#sthash.fJK6w3Oe.dpuf
1) The term sum - of - product in Boolean algebra means ?

a.
b.

The AND function of several OR functions


The OR function of several AND functions

c.
d.

The OR function of several OR function


The AND function of several AND functions
Show/Hide Answer
Answer = B
Explanation: Sum-Of-Products expressions lend themselves well to implementation as a set

of AND gates (products) feeding into a single OR gate (sum).


2) The fan out capability of a digital building block can be defined as ?
a.
b.
c.
d.
e.

The number of inputs that one output can transmit to


The amount of cooling required for fanning the hear out
The number of inputs that can transmit to one input
The maximum power dissipation that the unit can stand
None of above
Show/Hide Answer
Answer = A
Explanation: N/A
3) The ALE line of an 8085 microprocessor is used to ?

a.
b.
c.
d.

Execute an RST by hardware


Executes the instruction supplied by external device through the INTA signal
Executes an instruction from memory location 20 H
Executes a NOP
Show/Hide Answer
Answer = A

ALE is address latch enable. the lower order address


remains only for a single T satate then ths data is latched and the
lower order address bus stores the data.
Explanation:

4) The cost for storing a bit is minimum in ?


a.
b.
c.
d.

Cache
Register
RAM
Magnetic tape
Answer = D
Explanation: N/A

Show/Hide Answer

5) The index register in a digital computer is used for ?


a.
b.
c.
d.

Pointing to the stack address


Indirect addressing
Keeping track of number of times a loop is executed
Address modification
Show/Hide Answer
Answer = D
Explanation: An index register in a computer's CPU is a processor register used for
modifying operand addresses during the run of a program, typically for doing
vector/array operations.
6) After reset the CPU begins execution from the memory location ?

a.
b.
c.
d.

0000H
0001H
FFEFH
8000H
Answer = A
Explanation: N/A

Show/Hide Answer

7) A single register to clear the lower four bits of the accumulator in 8085 assembly

language is ?
a.
b.
c.
d.

XRI
ANI
XRI
ANI

0FH
FOH
FOH
OFH

Show/Hide Answer
Answer = B
Explanation: ANI FOH ANDs the accumulator with immediate. F leaves the high nibble
whatever it is, 0 clears the lower nibble
8) If the total number of states in the fetching and execution phases of an 8085
instruction is known to be 7; the number of machine cycles is ?

a.
b.
c.
d.

0
1
2
3
Answer = C
Explanation: N/A

Show/Hide Answer

9) Von Neumann architecture is ?


a.
b.
c.
d.

SISD
SIMD
MIMD
MISD

Show/Hide Answer
Answer = A
Explanation: In computing, SISD (single instruction, single data) is a term referring to a
computer architecture in which a single processor, a uniprocessor, executes a single
instruction stream, to operate on data stored in a single memory. This corresponds to
the von Neumann architecture.
10) A typical application of MIMD is?

a.
b.
c.
d.

railway reservation
weather forecasting
matrix multiplication
All of above

Show/Hide Answer
Answer = A
Explanation: MIMD (multiple instruction, multiple data) is a technique employed to
achieve parallelism.
- See more at: http://allquiz.blogspot.in/2012/08/objective-type-questionscomputer.html#sthash.p3EoCnFa.dpuf
1) Which of the following is a minimum error code ?

a.
b.
c.
d.

Octal code
Binary code
Gray code
Excess-3 code
Show/Hide Answer
Answer = C
Explanation: No Explanation
2) In a positive edge triggered JK flip flop, a low J and low K produces ?

a.
b.
c.

High state
Low state
toggle state

d.

no change

Show/Hide Answer
Answer = D
Explanation: In JK Flip Flop if J = K = 0 then it holds its current state. There will be no
change.
3) Negative numbers can't be represented in ?

a.
b.
c.
d.

a.
b.
c.
d.

signed magnitude form


1's complement form
2's complement form
None of above

Show/Hide Answer
Answer = D
Explanation: No Explanation
4) Which of the following architecture is not suitable for realising SIMD ?
Vector processor
Array processor
Von Neumann
All of above

Show/Hide Answer

Answer = C
Explanation: No Explanation
5) The XOR operator + is ?
a.
b.
c.
d.

commutative
associative
distributive over AND operator
A and B

Show/Hide Answer
Answer = D
Explanation: As A + B = B + A and A + ( B + C) = (A + B ) + C
Hence it is commutative and associative.
6) The binary equivalent of the Gray code 11100 is..... ?

a.
b.
c.
d.

10111
00111
01011
10101
Show/Hide Answer
Answer = A
Explanation: The rule for changing the Gray code to binary is that first bit remains the
same and the next bit is obtained by adding the first LSB of binary to the second LSB of
Gray code and so on... So the answer of the question is 10111.
7) An assembler that runs on one machine but produces machine code for another
machine is called ?

a.
b.
c.
d.

simulator
emulator
cross assembler
boot strap loader

Show/Hide Answer
Answer = C
Explanation: Cross assembler is an assembler which runs on one type of processor and
produces machine code for another.
8) Which of the following unit can be used to measure the speed of a computer ?

a.
b.
c.
d.
e.

a.
b.
c.
d.

SYPS
MIPS
BAUD
FLOPS
B and D

Show/Hide Answer
Answer = E
Explanation: MIPS measures the execution speed of computers CPU but not the whole
system. FLOPS is a measure of computer's performance especially in the field of
scientific calculations that makes heavy use of floating point calculations.
9) Which of the following logic families is well suited for high speed operations?
TTL
ECL
MOS
CMOS

Show/Hide Answer
Answer = B
Explanation: ECL is used for high speed applications because of its price and power
demands.
10) Which of the following comments about half adder are true?

a.
b.
c.
d.
e.

It adds 2 bits
It is called so because a full adder involves two half adders
It does half the work of full adder
It needs two inputs and generates two outputs
A, B and D
Show/Hide Answer
Answer = E
Explanation: No Explanation
- See more at: http://allquiz.blogspot.in/2012/06/computer-arithmetic-objectivetype.html#sthash.EEPu74z6.dpuf
1) What is the hexadecimal equivalent of a binary number 10101111 ?

a.
b.
c.
d.
e.

AF
9E
8C
All of above
None of above
Answer = A
Explanation:No Explanation

Show/Hide Answer

2) A NOR gate recognizes only the input word whose bits are ?
a.
b.
c.
d.
e.

a.
b.
c.
d.

0's and 1's


1's
0's
0's or 1's
None of above

Show/Hide Answer
Answer = C
Explanation: No Explanation
3) The operation which is commutative but not associative is ?
AND
OR
EX-OR
NAND

Show/Hide Answer

Answer = D
Explanation: No Explanation
4) All digital circuits can be realized using only ?
a.
b.
c.
d.

a.
b.
c.
d.
e.

EX-OR gates
Half adders
Multiplexers
OR gates

Show/Hide Answer
Answer = B
Explanation: No Explanation
5) The XOR gates are ideal for testing parity because even parity words produces a ......
output and odd parity word produces a ....... output ?
low, high
high, low
odd, even
even, odd
None of above

Show/Hide Answer

Answer = A
Explanation: No Explanation
6) Flip flop output is always ?
a.
b.
c.
d.
e.

Complementary
Independent of each other
the same
same as inputs
None of above

Show/Hide Answer

Answer = A
Explanation: No Explanation
7) A half adder adds ..... bits ?
a.
b.
c.
d.
e.

16
10
8
2
None of above
Show/Hide Answer
Answer = D
Explanation:No Explanation
8) How many flip - flop circuits are needed to divide by 16 ?

a.
b.
c.
d.

Two
Four
Eight
Sixteen
Show/Hide Answer
Answer = C
Explanation: No Explanation
9) A flip flop is a ..... elements that stores a 216 binary digits as a low or high voltage ?

a.
b.
c.
d.
e.

chip
bus
I/O
memory
None of above
Answer = D
Explanation: No Explanation

Show/Hide Answer

10) A positive AND gate is also a negative ?


a.
b.
c.
d.
e.

NAND gate
AND gate
NOR gate
OR gate
None of these
Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/06/multiple-choice-questions-oncomputer.html#sthash.Nw45sj9j.dpuf
1) Half adder is an example of ?

a.
b.
c.
d.

Combinational Circuits
Sequential Circuits
Asynchronous Circuits
None of these
Show/Hide Answer
Answer = A
Explanation: Combinational circuits are the circuits whose output depends on the inputs
of the same instant of time.
2) In JK flip flop same input, i.e at a particular time or during a clock pulse, the output
will oscillate back and forth between 0 and 1. At the end of the clock pulse the value of
output Q is uncertain. The situation is referred to as ?

a.
b.
c.
d.

Conversion condition
Race around condition
Lock out state
None of these

Show/Hide Answer
Answer = B
Explanation:A race around condition is a flaw in an electronic system or process
whereby the output and result of the process is unexpectedly dependent on the
sequence or timing of other events.
3) In a JK flip flop, if j=k, the resulting flip flop is referred to as ?

a.
b.
c.
d.

a.
b.
c.
d.

D flip flop
T flip flop
S-R flip flop
None of these

Show/Hide Answer
Answer = C
Explanation: In JK flip flop if both the inputs are same then the flip flop behaves like SR
flip flop.
4) Master slave flip flop is also referred to as ?
Level triggered flip flop
Pulse triggered flip flop
Edge triggered flip flop
None of these
Show/Hide Answer
Answer = B
Explanation:The term pulse triggered means the data is entered on the rising edge of
the clock pulse, but the output does not reflect the change until the falling edge of clock
pulse.
5) Fetch and decode cycle is required in ?

a.
b.
c.
d.

Direct addressing
Immediate addressing
Indirect addressing
None of above
Show/Hide Answer
Answer = B
Explanation:Fetch and decode cycle is required in Immediate addressing because it
stores the operand directly on which the operation is performed.
6) Valid bit in each cache is associated with ?

a.
b.
c.
d.

Each memory byte in cache


Each memory word in cache
One bit with the all memory words
None of above
Show/Hide Answer
Answer = A
Explanation:No explanation
7) In J-K flip flop the function K=J is used to realize ?

a.
b.
c.
d.

D flip flop
S-R flip flop
T flip flop
Master slave flip flop

Show/Hide Answer
Answer = D
Explanation: T flip flop allows the same inputs. So if in JK flip flop J = K then it will work
as T flip flop.
8) An encoder has 2n input lines and ..... output lines ?

a.
b.
c.
d.

2
n
2*n
n*n

Show/Hide Answer

Answer = B
Explanation:No Explanation.
9) ASCII code for alphabet character requires ..... bits ?
a.
b.
c.
d.

16
15
8
7

Show/Hide Answer

Answer = D
Explanation:No explanation
10) The basic limitation of FSM is that ?
a.
b.
c.
d.

An FSM can remember arbitrary large amount of information


An FSM sometimes recognize grammars that are not regular
It sometimes fails to recognize grammar that are regular
All of the above comments are true
Show/Hide Answer
Answer = A
Explanation: FSM stands for Finite State Machine.
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-oncomputer_10.html#sthash.x2IrY6OQ.dpuf

1) A shift register can be used for ?


a.
b.
c.
d.
e.

Serial to parallel conversion


Parallel to serial conversion
Digital delay line
All of the above
None of the above
Show/Hide Answer
Answer = D
Explanation:Shift registers can have both parallel and serial inputs. These are often
configured as serial - in - parallel- out or parallel - in - serial - out.
2) Semiconductor memory is-

a.
b.
c.
d.
e.

a.
b.
c.
d.

Somewhat large than the magnetic core memory


A non-volatile memory
Somewhat slower than magnetic core memory
All of above
None of these
Show/Hide Answer
Answer = B
Explanation: Semiconductor memory is an electronic storage device often used as
computer memory. Examples of semiconductor memory is: ROM, flash memory,
magnetoresistive random-access memory (MRAM)
3) Which of the following is a universal gate ?
AND
EX-OR
OR
NAND
Show/Hide Answer
Answer = D
Explanation: NAND is the universal gate as using this gate we can have all other gates
like AND, OR, EX-OR, NOT.
4) The logic 1 in positive logic system is represented by ?

a.
b.
c.
d.
e.

Zero voltage
Lower voltage level
Higher voltage level
Negative voltage
None of the above
Show/Hide Answer
Answer = C
Explanation:The logic 1 is represented by higher voltage while 0 is represented as low
voltage.
5) Which function -positive logic is equivalent to OR function in negative logic?

a.
b.
c.
d.
e.

NOT
OR
AND
NOR
None of the above
Show/Hide Answer
Answer = C
Explanation: AND function performs performs as OR in negative logic.

6) Which of the following logic expressions is wrong ?


a.
b.
c.

1+0=1
1+1=0
1+0+1=1

d.
e.

1+1+1=1
None of the above
Show/Hide Answer
Answer = C
Explanation: 1+0 = 1 again this result is added to 1 as 1+1 which is equal to 0 with
carry 1 but not equal to 1.
7) A Combination logic circuit that is used when it is desired to send data from two or
more source through a single transmission line is known as-

a.
b.
c.
d.
e.

Decoder
Encoder
Multiplexer
De multiplexer
None of the above

Show/Hide Answer
Answer = C
Explanation:Multiplexer is a device that selects one of the analog or digital input and
send it through single transmission line.
8) The m-bit parallel adder consists of-

a.
b.
c.
d.
e.

(m+1) full adders


m/2 full adders
m-1 full adders
m full adders
None of the above

Show/Hide Answer

Answer = D
Explanation:No explanation
9) A logic circuit which is used to change a BCD number into an equivalent decimal
number is-

a.
b.
c.
d.
e.

Decoder
Encoder
Multiplexer
Code converter
None of the above
Show/Hide Answer
Answer = A
Explanation:Decoder is used to convert the BCD numbers into decimal.
10) Which of the following property is true in context of Well Formed Formula(WFF) ?

a.
b.
c.
d.

Each letter is a term


If x and y are terms then x = y is a formula
If P is a formula then 7p is a formula
All of above
Show/Hide Answer
Answer = B
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-oncomputer.html#sthash.6X8JEber.dpuf
1) The advantage of single bus over a multi bus is ?

a.
b.
c.
d.

low cost
flexibility in attaching peripheral devices
high operating speed
A and B
Show/Hide Answer

Answer = D
Explanation: However single bus costs low and it is easy to attach peripheral devices in single bus
but multibus architecture have a great advantage in speed and of course, will affect performance
also
2) In serial communication, an extra clock is needed ?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

to synchronize the devices


for programmed baud rate control
to make efficient use of RS-232
None of above
Show/Hide Answer
Answer = B
Explanation: No Explanation
3) In which of the following instruction bus idle situation occurs ?
EI
DAD rp
INX H
DAA

Show/Hide Answer
Answer = B
Explanation: No Explanation
4) The addressing used in an instruction of the form ADD X Y is?
absolute
immediate
indirect
index

Show/Hide Answer
Answer = A
Explanation: The effective address for an absolute instruction address is the address parameter
itself with no modifications.
5) The speed imbalance between memory access and CPU operation can be reduced
by ?
cache memory
memory interleaving
reducing the size of memory
A and B

Show/Hide Answer
Answer = D
Explanation: No Explanation
6) Which of the following does not need extra hardware for DRAM refreshing ?
8085
Motorola - 6800
Z - 80
None of these

Show/Hide Answer
Answer = C
Explanation: No Explanation
7) The first operating system used in micro processor is ?
Zenix
DOS
CPIM
Multics
Answer = C
Explanation: No Explanation

Show/Hide Answer

8) Instead of counting with binary number a ring counter uses words that have a single
high..... ?
a.
b.
c.
d.

bytes
gate
bit
chip
Show/Hide Answer
Answer = C
Explanation: No Explanation
9) The memory cell of a dynamic RAM is simpler and smaller that the memory cell of
a ...... RAM ?

a.
b.
c.
d.
e.

volatile
semiconductor
static
bipolar
None of above
Show/Hide Answer
Answer =C
Explanation: No Explanation
10) A multiplexer with a 4 bit data select input is a ?

a.
b.
c.
d.

4 : 1 multiplexer
16 : 1 multiplexer
2 : 1 multiplexer
8 : 1 multiplexer
Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/09/quiz-questions-and-answers-oncomputer.html#sthash.Qt1ngdif.dpuf
1) Computer use thousands of flip flops. To coordinate the overall action, a common
signal called the ..... is sent to each flip - flop.?

a.
b.
c.
d.
e.

a.
b.
c.
d.

latch
master
clock
slave
None of above

Show/Hide Answer
Answer = C
Explanation: To coordinate the overall action, a square wave signal called the clock is sent to
each flip flop. This signal prevents the flip flop from changing states until the right time.
2) Which of the following flip flop is free from race around condition ?
SR flip flop
T flip flop
Master slave flip flop
All of above
Show/Hide Answer
Answer = C
Explanation: Toggling more that once during a clock cycle is called racing. JK master slave flip
flop avoids racing.
3) Which logic family dissipates the minimum power ?

a.
b.
c.
d.
e.

DTL
ECL
TTL
CMOS
None of above
Show/Hide Answer

Answer = D
Explanation: CMOS dissipates low power. Typically the static power dissipation is 10 nw per gate
which is due to the flow of leakage currents.
4) The functional capacity of SSI devices is ?
a.
b.
c.
d.
e.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

1 to 11 gates
12 to 99 gates
100 to 10,000 gates
More than 10,000 gates
None of above

Show/Hide Answer
Answer = A
Explanation: No Explanation
5) What advantage do ICs have over discrete devices due to their greater complexity ?
Smaller size
Higher Reliability
Lower cost
All of above

Show/Hide Answer
Answer =D
Explanation: ICs can also combine analog and digital circuits on a single chip to create functions
such as A/D converters and D/A converters. Such circuits offer smaller size and lower cost, but
must carefully account for signal interference.
6) A subtractor is usually not present in computer because ?
It is expensive
It is not possible to design it
The adder will take care of subtraction
None of above
Show/Hide Answer
Answer = C
Explanation: A subtractor can be designed using the same approach as that of an adder.
7) A chip having 150 gates will be classified as ?
SSI
MSI
LSI
VLSI

Show/Hide Answer
Answer = C
Explanation: Latent semantic indexing (LSI) is an indexing and retrieval method that uses a
mathematical technique called Singular value decomposition (SVD) to identify patterns in the
relationships between the terms and concepts contained in an unstructured collection of text.
8) Pseudo instructions are ?

a.
b.
c.
d.

assembler directive
instruction in any program that have no corresponding machine code instruction
instruction in any program whose presence or absence will not change the output for any
input

None of above

Show/Hide Answer
Answer = A
Explanation: Pseudo instructions are simply the assembly instructions that do not have a direct
machine language equivalent.
9) Programming in a language that actually controls the path of signals or data within
the computer is called ?
a.
b.
c.
d.

micro programming
system programming
assembly programming
machine language programming

Show/Hide Answer
Answer = A
Explanation:No Explanation
10) Which of the following is not typically found in the status register of micro processor
?
a.
b.
c.
d.

overflow
zero result
negative result
none of above

Show/Hide Answer
Answer = D
Explanation: A status register or flag register is a collection of flag bits for a processor. The
status register is a hardware register which contains information about the state of the processor
- See more at: http://allquiz.blogspot.in/2012/09/computer-arithmetic-quiz-questionsand.html#sthash.Uo7E2auj.dpuf

computer Graphics
1) What is ZUI in computer Graphics ?
a.
b.
c.
d.

A Widget
Logical Enhancement of GUI
An application that saves memory
None of above
Show/Hide Answer
Answer = A
Explanation: Zooming user interface or zoomable user interface (ZUI, pronounced zoo-ee) is a
graphical environment where users can change the scale of the viewed area in order to see more
detail or less, and browse through different documents
2) In Bresenham's algorithm, while generating a circle , it is easy to generate?

a.
b.
c.
d.

One octant first and other by successive reflection


One octant first and other by successive rotation
One octant first and other by successive translation
All octants
Show/Hide Answer
Answer = A
Explanation:In Bresehnam's algorithm only one octant is needs to be generated ans
other octants can be obtained by successive reflection.
3) Why a circle drawn on the screen appears to be elliptical ?

a.
b.
c.
d.

It is due to the aspect ratio of monitor


Screen has rectangular shape
Our eyes are not at the same level on screen
CRT is completely spherical
Show/Hide Answer
Answer = A
4) In bresenhan's algorithm error term is initialized to ?

a.
b.
c.
d.

a.
b.

0
1
-1/2
None of above

Show/Hide Answer
Answer = A
5) Which of the following technique is used in Midpoint Subdivision algorithm ?
Linear search
Binary search

c.
d.

Heap sort
Bubble sort
Show/Hide Answer
Answer = B
Explanation: In mid point subdivision algorithm the line segment is separated at its mid point and
them the two resulting segments are checked for visibility and clipping.
6) Which of the following clipping algorithm follows the Divide and Conquer strategy?

a.
b.
c.
d.

a.
b.
c.
d.

4-bit algorithm
Midpoint algorithm
Cyrus break algorithm
Cohen- Sutherland algorithm

Show/Hide Answer
Answer = B
Explanation:No Explanation
7) A line with endpoints codes as 0000 and 0100 is ?
Partially invisible
Completely visible
Completely invisible
Trivially invisible

Show/Hide Answer

Answer = A
8) Choose the correct statement?
a.
b.
c.
d.

Random scan monitors draw a picture one line at a time


The components line of a random scan picture must be refreshed in a particular order
Raster scan monitors draw a picture one line at a time
Random scan method is well suited for displaying shading and color areas
Show/Hide Answer
Answer = A
- See more at: http://allquiz.blogspot.in/2012/09/computer-graphics-interviewquestions.html#sthash.LW8QCrC0.dpuf
1) The ISO standard for computer Graphics is ?

a.
b.
c.
d.

Graphics Kernel System


Graphics Standard System
Computer graphics standard
None of above.

Show/Hide Answer
Answer = A
Explanation: GKS is the first computer graphics standard.
2) Examples of Presentation Graphics is ?

a.
b.
c.
d.

a.
b.
c.
d.

Bar Charts
CAD
Line Graphs
A and C

Show/Hide Answer
Answer = D
Explanation: Presentation Graphics deals with the graphical representation of
information. Examples of Presentation includes bar charts, line graphs, surface graphs
and pie charts.
3) The technique used to summarize the financial, statistical, mathematical,scientific
and economic data is ?
Computer Art
Image processing
Presentation Graphics
None of above

Show/Hide Answer
Answer = C
Explanation:Presentation Graphics is commonly used to summarize the financial,
statistical, mathematical,scientific and economic data for research reports, consumer
information bulletins and other types of reports.
4) Computer generated models of physical,financial and economic systems are often
used for ?
a.
b.
c.
d.

Entertainment
Quality Control
Educational Aid
None of above

Show/Hide Answer
Answer = C
Explanation:Computer generated models of physical,financial and economic system are
often used as Educational Aids.
5) Special System designed for some training application are known as ?

a.
b.
c.
d.

GUI
Simulators
Video Display Devices
None of above

Show/Hide Answer

Answer = A
Explanation:N/A
6) Computer Graphics models are now commonly used for making ?
a.
b.
c.
d.

Motion pictures
Music Videos
Television shows
All of above
Answer = D
Explanation: N/A

Show/Hide Answer

7) Graphics and image processing technique used to produce a transformation of one


object into another is called ?
a.
b.
c.
d.

Animation
Morphine
Half toning
None of above
Show/Hide Answer
Answer = A
Explanation: When motion is provided to an object then it is known as animation.
8) The amount of light emitted by the phosphor coating depends on the?

a.
b.
c.
d.

Number of electrons striking the screen


Speed of electrons striking the screen
Distance from the cathode to the screen
None of above
Show/Hide Answer
Answer = A
Explanation: The amount of light emitted by the phosphor coating depends on the
number of electrons striking the screen, so the brightness of a display can be controlled
by varying the voltage on the control grid.

9) The maximum number of points that can be displayed without overlap on a CRT is
refereed to as ?
a.
b.
c.
d.

Resolution
Persistence
Attenuation
None of above
Show/Hide Answer
Answer = A
Explanation:Resolution is the number of points per centimeter that can be plotted
horizontally and vertically, although it is often simply stated as the total number of
points in each direction.

10) Gray scale is used in ?


a.
b.
c.
d.

Monitor that have color capability


Monitor that have no color capability
Random scan display
None of above
Show/Hide Answer
Answer = B
Explanation: Grayscale or greyscale digital image is an image in which the value of each
pixel is a single sample, that is, it carries only intensity information. Images of this sort,
also known as black-and-white, are composed exclusively of shades of gray, varying
from black at the weakest intensity to white at the stronges
- See more at: http://allquiz.blogspot.in/2012/08/computer-graphics-questions-andanswer.html#sthash.A0XStUC2.dpuf
1) Reflection of a point about x-axis, followed by a counter-clockwise rotation of 90 0, is
equivalent to reflection about the line ?

a.
b.
c.
d.

x
y
x
x

=
=
=
+

-y
-x
y
y=1

Show/Hide Answer

Answer = C
Explanation: It is x = y
2) In the raster scan method for transformation, a 90 0 rotation can be performed by ?
a.
b.
c.
d.

reversing the order of bits within each row in the frame buffer
by performing XOR on the frame buffer location
by coping each row of the block into a column in the new frame buffer location
None of above
Show/Hide Answer
3) Which of the following is an odd function ?

a.
b.
c.
d.

f(x) = x2 - |x|
f(x) = sin(x) + cos(x)
f(x) = (x)(ax + 1) / (ax - 1)
None of these

Show/Hide Answer
Answer = D
Explanation:None of the function is going to be odd.
4) Obliquee projection with an angle of 45 0 to the horizontal plane is called as ?

a.
b.

Cabinaet projection
Isometric projection

c.
d.

Cavalier projection
None of these
Show/Hide Answer
Answer = C
Explanation: Oblique projection is a simple type of graphical projection used for
producing pictorial, two-dimensional images of three-dimensional objects
5) The people of the planet Mars designed a scale for measuring the temperature, in
which water freezes at 100 units and boils at 250 units. The people of Jupiter designed a
scale in which water freezes at 75 units and boils at 300 units. A temperature of 200
units in Mars will measure ..... in Jupiter ?

a.
b.
c.
d.

300
225
250
175

Show/Hide Answer

Answer = B
Explanation:N/A
6) (2,4) is a point on a circle that has center at the origin. Which of the following points
are also on circle ?
a.
b.
c.
d.
e.

(2,-4)
(-2,4)
(4,-2)
(-4,2)
All of above
Answer = E
Explanation:N/A

Show/Hide Answer

7) A cube of side 1 unit is places such that the origin coincides with one of its vertices
and the three axes run along three of its edges. The vertex diagonally opposite to
(0,1,0) is ?
a.
b.
c.
d.

(0,0,0)
(1,1,0)
(0,1,1)
(0,1,1)

Show/Hide Answer

Answer = D
Explanation:N/A
8) Which of the following statement is true ?
a.
b.
c.
d.

Request, sample and event are the three basic modes of input
Keyboard is a device ideally suited for use in sample mode
A mouse is typically a device for inputting an absolute position on the screen
Special graphics hardware support is essential for providing menu-driven user interface to
an application
Show/Hide Answer
Answer = A
Explanation: N/A
9) Choose the incorrect statement from the following about the basic ray tracing
technique used in image synthesis ?

a.
b.
c.
d.

In this technique rays are cast from the eye point through every pixel on the screen
In this technique, viewing transformation are not supplied to the scene prior to rendering
This technique removes hidden surfaces.
In this technique rays are cast from the light source to the object in the scene

Show/Hide Answer
Answer = D
Explanation: Ray tracing is a technique for generating an image by tracing the path of
light through pixels in an image plane and simulating the effects of its encounters with
virtual objects.
10) Aspect ratio is generally defined as the ratio of the ?
a.
b.
c.
d.

Vertical to horizontal points


Horizontal to vertical points
Vertical to (horizontal + vertical) points
Either A or B , depending on the convention followed
Show/Hide Answer
Answer = D
Explanation: Aspect ration is the ratio of rectangle's width and height.
- See more at: http://allquiz.blogspot.in/2012/08/objective-type-questions-and-answerson_17.html#sthash.FZ9QY9fF.dpuf
1) When several types of output devices are available in graphics installation, it is
convenient to use ?

a.
b.
c.
d.

bundled attributes
unbundles attributes
inquiry attributes
all of above

Show/Hide Answer
Answer = A
Explanation: Individual attribute commands provide a simple and direct method for
specifying
attributes when a single output device is used. When several kinds of output device are
available at a graphics installation, it is convenient to set up a table for each output
device
that lists set of attribute values that are to be used on that device to display each
primitive
type. Attribute specified in this manner is known as bundled attribute.
2) x = at2 ; y = 2at is the parametric equation of ?

a.
b.
c.
d.

Circle
Rectangular hyperbola
Parabola
Ellipse

Show/Hide Answer
Answer = C
Explanation: parametric equation is a method of defining a relation using parameters.
3) In displaying a clipped picture the efficient method is ?

a.
b.
c.
d.

Clipping against the window and then applying the window transformation
Applying window transformation and then clipping against the viewport
Both A and B have the same efficiency
Efficiency depends on whether the window is an aligned rectangle or not
Show/Hide Answer
Answer = D
Explanation: N/A
4) The anti - aliasing technique which allows shift of 1/4,1/2 and 3/4 of a pixel
diameter enabling a closer path of a line is ?

a.
b.
c.
d.

Pixel phasing
Filtering
Intensity compensation
Sampling technique

Show/Hide Answer
Answer = A
Explanation: Pixel phasing is an anti-aliasing technique, stair steps are smoothed out by
moving
the electron beam to more nearly approximate positions specified by the object
geometry.
5) All the hidden surface algorithms employe image space approach except ?
a.
b.
c.
d.

Back face removal


Depth buffer method
Scan line method
Depth sort method
Show/Hide Answer
Answer = A
Explanation: A simple object space algorithm is Back-Face removal (or back face cull)
where no faces on the back of the object are displayed. It can only be used on solid
objects modeled as a polygon mesh.
6) The major components of CRT are ?

a.
b.
c.
d.
e.

a.
b.
c.
d.

Electronic Gun
Phosphorous coated screen
Control electrodes
Deflection yoke
All of above

Show/Hide Answer
Answer = E
Explanation: N/A
7) ........ used to regulate the flow of elections in CRT ?
Electronic Gun
Focusing electrode
Control electrode
All of the above

Show/Hide Answer
Answer = C
Explanation: The electrode in an electron tube whose voltage with respect to the voltage
of the cathode determines the electron flow to the anode.
8) The glow given off by the, phosphor during exposure of the electron beam is known
as ?

a.
b.
c.
d.

Fluorescence
Phosphorescence
Persistence
All of the above
Show/Hide Answer
Answer = A
Explanation: Fluorescence is the emission of light by a substance that has absorbed light
or other electromagnetic radiation. It is a form of luminescence
9) Raster is a synonym for the term ?

a.
b.
c.
d.

Array
Matrix
Model
All of above
Answer = B
Explanation: N/A

Show/Hide Answer

10) The ......... simply reads each successive byte of data from the frame buffer?
a.
b.
c.
d.

Digital Controller
Data Controller
Display Controller
All of above
Show/Hide Answer
Answer = C
Explanation: A Video Display Controller or VDC is an integrated circuit which is the main
component in a video signal generator, a device responsible for the production of a TV
video signal in a computing or game system. Some VDCs also generate an Audio signal,
but in that case it's not their main function
- See more at: http://allquiz.blogspot.in/2012/07/computer-graphics-mcq-set3.html#sthash.HTLuhRL9.dpuf
1) Hue of color is related to ?

a.
b.
c.
d.

a.
b.
c.
d.

Luminance
Saturation
Incandescence
Wavelength

Show/Hide Answer
Answer = D
Explanation: A hue refers to the gradation of color within the optical spectrum, or visible
spectrum, of light. "Hue" may also refer to a particular color within this spectrum, as
defined by its dominant wavelength, or the central tendency of its combined
wavelengths. For example, a light wave with a central tendency within 565-590 nm will
be yellow.
2) The phenomenon of having a continuous glow of a beam on the screen even after it is
removed is called as ?
Fluorescence
Persistence
Phosphorescence
Incandescence
Answer = C
Explanation: No Explanation

Show/Hide Answer

3) The line 2x-y+4=0, if clipped against this window will connect the points ?
a.
b.
c.
d.

(0, 1) and (3, 3)


(0, 1) and (2, 3)
(1, 2) and (4, 2)
None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
4)Reflection of a point about x-axis, followed by a counter-clockwise rotation of 90 0 , is
equivalent to reflection about the line ?

a.
b.
c.
d.

x
y
x
x

=
=
=
+

-y
-x
y
y=1

Show/Hide Answer
Answer = C
Explanation: No Explanation
5) The best hidden surface removal method used for complex scenes with more than a
few thousand surfaces is ?

a.
b.
c.
d.
e.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

depth sorting method


scan line algorithm
depth buffer algorithm
octree method
C and D

Show/Hide Answer
Answer = E
Explanation: No Explanation
6) The point at which a set of projected parallel lines appear to coverage is called as a ?
convergence point
vanishing point
point of illusion
point of delusion

Show/Hide Answer
Answer = B
Explanation: No Explanation
7) The basic element of a picture in volume graphics is ?
pixel
volsel
voxel
None of above

Show/Hide Answer
Answer = C
Explanation: No Explanation
8) Let R be the radius of a circle. The angle subtended by an arc of length R at the center
of the circle is ?
1 degree
1 radian
45 degree
impossible to determine
Show/Hide Answer
Answer = B
Explanation: No Explanation
9) A bilinear transformation can be simulated by the transformation ?

a.
b.
c.
d.

transformation, rotation and stretching


translation and rotation
rotation, stretching and inversion
rotation, stretching, inversion and translation
Show/Hide Answer
Answer = D
Explanation: No Explanation
10) A circle, if scaled only in one direction becomes a ?

a.
b.
c.
d.

parabola
hyperbola
ellipse
remains a circle

Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/06/objective-type-questions-oncomputer.html#sthash.9mRH4i6L.dpuf
1) If the eccentricity is less than one then the conic is ?

a.
b.
c.

circle
parabola
ellipse

d.

a.
b.
c.
d.

hyperbola

Show/Hide Answer
Answer = C
Explanation: The type of a conic corresponds to its eccentricity, those with eccentricity
less than 1 being ellipses, those with eccentricity equal to 1 being parabolas, and those
with eccentricity greater than 1 being hyperbolas.
2) Fractals deals with curves that are ?
irregularly irregular
regularly irregular
irregularly regular
regularly regular

Show/Hide Answer
Answer = B
Explanation:Fractal curves are geometric pattern that is repeated at ever smaller scales
to produce irregular shapes and surfaces that cannot be represented by classical
geometry. Fractals are used especially in computer modeling of irregular patterns and
structures in nature. For details refer : http://en.wikipedia.org/wiki/Fractal
3) The best hidden surface removal algorithm is ?

a.
b.
c.
d.

painters
Depth buffer
Area subdivision
Depends on the application

Show/Hide Answer
Answer = D
Explanation:The Choice of the algorithm depends upon the application.
4) Engineering drawing commonly applies ?

a.
b.
c.
d.

oblique projection
orthographic projection
perspective projection
None of above

Show/Hide Answer
Answer = B
Explanation: An engineering drawing, a type of technical drawing, is used to fully and
clearly define requirements for engineered items. Orthographic projection is used for
such drawings.
5) Back face removal is an example of ?

a.
b.
c.
d.

object space method


image space method
combination of both
None of above

Show/Hide Answer
Answer = A
Explanation: A simple object space algorithm is Back-Face removal (or back face cull)
where no faces on the back of the object are displayed.

6) A raster color display processor supports a resolution of 1024 x 800 with upto 16
million colors simultaneously displayable. What will be the approximate size of frame
buffer used in the display processor ?
a.
b.
c.
d.

1.2 x 106
2.4 x 106
16 x 106
105

Show/Hide Answer
Answer = B
Explanation: No Explanation
7) Which of the following device has a relative origin ?
a.
b.
c.
d.

Joystick
Track ball
Mouse
None of above
Answer = C
Explanation:No explanation

Show/Hide Answer

8) In a clipping algorithm of Cohen & Sutherland using region codes, a line is already
clipped if the ?
a.
b.
c.
d.
e.

codes of the end point are same


logical AND of the end point code is not 0000
logical OR of the end points code is 0000
logical AND of the end point code is 0000
A and B
Show/Hide Answer
Answer = E
Explanation: No Explanation
9) The subcategories of orthographic projection are ?

a.
b.
c.
d.

cavalier, cabinet, isometric


cavalier, cabinet
isometric, dimetric, trimetric
isometric, cavalier, trimetric
Show/Hide Answer
Answer = C
Explanation: No Explanation
10) The refresh rate below which a picture flickers is ?

a.
b.
c.
d.

25
30
35
60
Show/Hide Answer
Answer = A
- See more at: http://allquiz.blogspot.in/2012/06/multiple-choice-questions-oncomputer_16.html#sthash.FcZ339zy.dpuf

Computer networks
1) What was the department of the U.S. government that developed the initial stages of
the Internet ?
a.
b.
c.
d.

Department of Commerce
Department of Defense
Department of the Military
Judicial Department
Answer = B

Show/Hide Answer

2) In what decade was ARPANET developed ?


a.
b.
c.
d.

1950s
1960s
1970s
1980s

Show/Hide Answer

Answer =B
3) ARPANET was funded by: ?
a.
b.
c.
d.

the U.S. government


IBM
Microsoft
a group of interested scientists
Answer = A
4)The Internet is controlled by?

a.
b.
c.
d.

a.
b.
c.
d.

Show/Hide Answer

the U.S. government


IBM, Intel, and Microsoft
no one in particular
the U.S. taxpayers

Show/Hide Answer
Answer = C
5) Hundreds of universities, government entities, and research labs have formed ?
Internet
WWW
Internet2
TCP/IP
Show/Hide Answer
Answer =C
6)The first users of the Internet were ?

a.
b.
c.
d.

a.
b.
c.
d.

a few dozen computers at universities and government research centers


the military
all U.S. universities and colleges
IBM and Microsoft
Show/Hide Answer
Answer = A
7) Much, or nearly all, of the cost of initially building and operating the Internet was
supplied by ?
the largest computer companies
the U.S. government
U.S. research universities
personal users of the Internet

Show/Hide Answer

Answer = B
8) TCP/IP stands for ?
a.
b.
c.
d.

a.
b.
c.

Transmission Control Protocol/Internet Protocol


Transmission Control Procedures/Internet Procedures
Translation Computing Procedures/International Protocols
Transaction Computing Printing/Internet Processing
Show/Hide Answer
Answer = A
9) Open standards refers to ?
standards not owned by any company
standards used by all countries
standards that are free to all parties

d.

a.
b.
c.
d.

software programs running on different types of operating systems


Show/Hide Answer
10) Every host computer on the Internet has a(n) ?
similar IP address
unique 15-digit number
unique IP address
common name and number

Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2013/03/evaluation-of-internet-questionsand.html#sthash.ayDD4s9v.dpuf
1) BSC is a ?

a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

a.
b.
c.
d.

a.
b.
c.
d.

Character Oriented Protocol


Bit Oriented Protocol
Full duplex protocol
Half duplex protocol
A and D

Show/Hide Answer
Answer = E
Explanation: BSC stands for Binary synchronous Communication. It is a character oriented
protocol by IBM's that interpret a transmission frame as a character and usually contain one byte.
2) Which of the following are non - polling system ?
TDMA
Stop & wait
Xon/Xoff
Continuous ARQ
A and C

Show/Hide Answer
Answer = E
Explanation: No Explanation
3) Adaptive or dynamic directory used in packet routing changes?
within each user session
with each user session
at system generation time only
Both A and B

Show/Hide Answer
Answer = A
Explanation: No Explanation
4) The parameter which gives the probability of the transport layer itself spontaneously
terminating a connection due to internal problem is called?
protection
resilience
option negotiation
transfer failure
Show/Hide Answer
Answer = B
Explanation: Resilience is the ability to provide and maintain an acceptable level of service in the
face of faults and challenges to normal operation.
5) What is the main purpose of a data link content monitor ?

a.
b.
c.
d.

to
to
to
to

detect problems in protocols


determine the type of switching
determine the type of transmission used in data link
determine the flow of data
Show/Hide Answer

Answer = A
Explanation: No Explanation
6) Which of the following is an example of bounded media ?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Wave guide
Coaxial Cable
Fiber optic cable
All of above

Show/Hide Answer
Answer = D
Explanation: Bounded media is also calles the wired media or guided media.
7) ICMPv6 includes ......?
RARP
ARP
ICMP
B and C

Show/Hide Answer
Answer = D
Explanation: Internet control message protocol includes ABP and ICMP both.
8) IPv6 has ...... bit address ?
32
64
128
variable

Show/Hide Answer
Answer = C
Explanation: IPv6 addresses have a size of 128 bits. Therefore, IPv6 has a vastly enlarged
address space compared to IPv4.
9) What is the main difference between DDCMP and SDLC ?
DDCMP does not need special hardware to final the beginning of a message
DDCMP has a message header
SDLC has a IP address
SDLC does not use CPC
Show/Hide Answer
Answer = A
Explanation: HDLC (High-Level Data Link Control) is communication protocol and SDLC
(Synchronous Data Link Control) is data link protocols.
10) Number of bits per symbol used in Baudot code is ?
7
8
5
9

Show/Hide Answer
Answer = C
Explanation: Baudot code is a character set that preceded the more sophisticated character set
EBCDIC
- See more at: http://allquiz.blogspot.in/2012/09/computer-networks-multiplechoice.html#sthash.1hif4uhO.dpuf

WhichprotocolworkingattheTransportlayerprovidesaconnectionlessservice
betweenhosts?
1)

a.
b.
c.
d.

IP
ARP
TCP
UDP

Show/Hide Answer

Answer = D
Explanation: User Datagram Protocol is used at the Transport layer to provide a
connectionless service.
2) Which protocol works at the Transport layer and provides virtual circuits between
hosts?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.
e.

IP
ARP
TCP
UDP

Show/Hide Answer
Answer = C
Explanation: Transmission Control Protocol sets up a virtual circuit before transmitting
any data. This creates a reliable session and is known as a connection-oriented session.
3) Which protocol works at the Internet layer and provides a connection service
between hosts?
IP
ARP
TCP
UDP

Show/Hide Answer
Answer = A
Explanation: Internet Protocol is used to address hosts and route packets through the
internetwork. The question does not refer to a connection-oriented service, which is
different from a plain connection service.
4) If a host broadcasts a frame that includes a source and destination hardware
address, and its purpose is to assign IP addresses to itself, which protocol at the
Network layer does the host use?
RARP
ARPA
ICMP
TCP
IPX
Show/Hide Answer
Answer = A
Explanation: Reverse ARP is used to find an IP address from a known hardware address.
5) If a router interface is congested, which protocol in the IP suite is used to tell
neighbor routers?

a.
b.
c.
d.
e.

RARP
ARP
ICMP
IP
TCP
Show/Hide Answer
Answer = C
Explanation: Internet Control Message Protocol (ICMP) is used to send redirects back to
an originating router.
6) What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part
of?

a.
b.
c.
d.
e.

172.16.10.20 through 172.16.10.22


172.16.10.1 through 172.16.10.255
172.16.10.16 through 172.16.10.23
172.16.10.17 through 172.16.10.31
172.16.10.17 through 172.16.10.30
Show/Hide Answer
Answer = E
Explanation: First start by using the 256 mask, which in this case is 256240=16. The

first subnet is 16; the second subnet is 32. This host must be in the 16 subnet; the
broadcast address is 31 and the valid host range is 1730.
7) What range of addresses can be used in the first octet of a Class B network address?
a.
b.
c.
d.
e.
f.

a.
b.
c.
d.

a.
b.
c.
d.
e.
f.
g.

1-126
1-127
128-190
128-191
129-192
192-220

Show/Hide Answer
Answer = D
Explanation: A Class B network is defined in the first octet with the numbers 128191.
8) What range of addresses can be used in the first octet of a Class C address?
1-127
129-192
203-234
192-223

Show/Hide Answer
Answer = D
Explanation: A Class C network is defined in the first octet with the numbers 192-223.
9) How many bytes is an Ethernet address?
3
4
5
6
7
8
16
Show/Hide Answer
Answer = D
Explanation: An Ethernet (MAC) address is 6 bytes long (48 bits).
10) What protocol is used to find the hardware address of a local device?

a.
b.
c.
d.
e.

RARP
ARP
IP
ICMP
BootP

Show/Hide Answer
Answer = B
Explanation: Address Resolution Protocol (ARP) is used to find the hardware address
from a known IP address.
- See more at: http://allquiz.blogspot.in/2012/07/multiple-choice-questions-onccna.html#sthash.B2jQ7evh.dpuf
1) Manchester code is a ?

a.
b.
c.
d.

Bi- Polar code


non return to zero code
polar code
B and C

Show/Hide Answer

Answer = D
Explanation:No Explanation
2) How many OSI layers are covered in the X.25 standard ?
a.

three

b.
c.
d.
e.

two
seven
six
None of above
Show/Hide Answer
Answer = A
Explanation:The three layer are : Physical, Data Link, Network.
3) The receive equalizer reduce delay distortions using ?

a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

tapped delay lines


gearshift
descrambler
difference engine
None of above

Show/Hide Answer
Answer = A
Explanation: No Explanation
4) In communication satellite, multiple repeaters are known as ?
detector
modulator
stations
transponders
None of above
Show/Hide Answer
Answer = D
Explanation: A communications satellite's transponder, is the series of interconnected
units which form a communications channel between the receiving and the transmitting
antennas.
5) In OSI network architecture, the dialogue control and token management are
responsibilities of ?

a.
b.
c.
d.
e.

Session layer
network layer
transport layer
Data link layer
None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
6) The geostationary satellite used for communication system ?

a.
b.
c.
d.

a.
b.
c.
d.

rotates with earth


remains stationery relative to the earth
is positioned over equator
All of above
Show/Hide Answer
Answer = D
Explanation: A geosynchronous satellite is a satellite in geosynchronous orbit, with an
orbital period the same as the Earth's rotation period. Such a satellite returns to the
same position in the sky after each sidereal day, and over the course of a day traces out
a path in the sky that is typically some form of analemma. A special case of
geosynchronous satellite is the geostationary satellite, which has a geostationary orbit
a circular geosynchronous orbit directly above the Earth's equator
7) Radio communication frequencies ranges from?
3 KHz to 300 KHz
3 KHz to 300 GHz
300 KHz to 3 GHz
3 KHz to 3,000 GHz

Show/Hide Answer

Answer = B
Explanation: Radio frequency (RF) is a rate of oscillation in the range of about 3 kHz to
300 GHz, which corresponds to the frequency of radio waves, and the alternating
currents which carry radio signals.
8) The frequency ranges from 300 KHz to 3 MHz is used for ?
a.
b.
c.
d.
e.

AM radio transmission
TV transmission
FM radio transmission
Microwave communication, satellite and rader
None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
9) Establishing a virtual connection is functionally equivalent to ?

a.
b.
c.
d.
e.

Connecting as virtual memory


Physically connecting a DTE and DCE
Placing a telephone call prior to a conversation
Placing a modem prior to a conversation
None of above
Show/Hide Answer
Answer = C
Explanation: No Explanation
10) Which of the following is a function of e-mail system ?

a.
b.
c.
d.

Composition
Transfer
Reporting
All of above

Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/07/objective-type-questions-oncomputer.html#sthash.n44v915K.dpuf
1) A network that requires human intervention of route signals is called a ?

a.
b.
c.
d.
e.

Bus network
Ring netwkork
Star network
T-switched network
None of above

Show/Hide Answer

Answer = D
Explanation: No Explanation
2) Which layer functions as liaison between user support layers and network support
layers ?
a.
b.
c.
d.

network layer
physical layer
transport layer
session layer

Show/Hide Answer
Answer = C
Explanation: Transport Layer functions as liaison between user support layers
(Application, Presentation and Session) and network support layers (Network, Data Link
and Physical)
3) If digital data rate of 9600 bps is encoded using 8-level phase shift keying method,
the modulation rate is?

a.
b.
c.
d.
e.

1200
3200
4800
9600
None

bands
bands
bands
bands
of above

Show/Hide Answer
Answer = C
Explanation: Add Explanation in comments!!!
4) Maximum data rate of a channel for a noiseless 3-KHz binary channel is?
a.
b.
c.
d.

3000
6000
1500
None

bps
bps
bps
of above

Answer = B
Explanation: Explanation 4

Show/Hide Answer

5) If the bit string 0111101111101111110 is subjected to bit stuffing for the flag string
01111110, the output string is ?
a.
b.
c.
d.

011110111110011111010
01111011111011111100
01111011111011111010
0111101111101111110
Answer = A
Explanation: No Explanation

Show/Hide Answer

6) Which of the following is not a standard RS-232C signal ?


a.
b.
c.
d.

RTS
CTS
DSR
VDR
Answer = D
Explanation:No Explanation

Show/Hide Answer

7) In Ethernet CSMS/CD the special bit sequence transmitted by the media access
management for collision handling is called as ?
a.
b.
c.
d.

preamble
postamble
jam
None of above

Show/Hide Answer

Answer = C
Explanation: No Explanation
8) HDLC is ?
a.
b.
c.
d.
e.

bit oriented
Code transparent
Code dependent
None of above
A and B
Answer = D
Explanation: No Explanation

Show/Hide Answer

9) Which of the following are non-polling system ?


a.
b.
c.
d.
e.

TDMA
stop & wait
Xon/Xoff
Continuous ARQ
A and C
Show/Hide Answer
Answer = E
Explanation: No Explanation
10) Adaptive or dynamic directory used in packet routing changes ?

a.
b.
c.
d.

within each user session


with each user session
at system generation times only
Both A and B
Show/Hide Answer
Answer = A
- See more at: http://allquiz.blogspot.in/2012/06/computer-networks-objectivetype.html#sthash.lr52cZDj.dpuf
1) Collection of interconnected networks sometimes called ?

a.
b.
c.
d.

Internet
Wireless network
Mobile Network
None of these

Show/Hide Answer
Answer = A
Explanation: Internet is not a single network but network of networks.
2) Which of the following is wrong example of network layer ?

a.
b.
c.
d.
e.

a.
b.
c.
d.

X.25 Level 2-ISO


Source Routing and Domain Naming Usenet
Internet Protocol(IP) - ARPANET
X-25 Packet Level Prrotocol (PLP) - ISO
None of these
Show/Hide Answer
Answer = A
Explanation: X.25 is an ITU - T standard that specifies an interface between a host
system and a packet switching network.
3) Mobile computers and personal digital assistant (PDAs) are the examples of ?
Radio broadcasting
Wireless network
Geosynchronous
LAN

Show/Hide Answer
Answer = B
Explanation: Personal Digital Assistant also known as palmtop computers is a mobile
device that functions as the personal information manager, mostly access internet
through Wi - Fi or wireless wide area network
4) ATM (Asynchronous Transfer Mode) is fundamentally a....... technology?

a.
b.
c.
d.

Circuit switching
Packet switching
Narrow band
None of these

Show/Hide Answer

Answer = B
Explanation:ATM is a cell switching and multiplexing technology that combines the
features of circuit switching with packet switching. Like X.25 and frame relay ATM
defines the interaction between the user equipment and network.
5) Which of the following is a variation of Frequency Division Multiplexing (FDM) ?
a.
b.
c.
d.

Time Division Multiplexing(TDM)


Pulse Code Multiplexing(PCM)
Wavelength Division Multiplexing(WDM)
None of these
Show/Hide Answer
Answer = C
Explanation:The WDM is commonly applied on the optical carrier while FDM is applied on
the radio carrier. Since wavelength and frequency are tied together through a simple
directly inverse relationship, the two terms actually describe the same concept.
6) One security method is encryption. But encryption does nothing to keep digital pests
and hackers out. To accomplish this goal, we need ?

a.
b.
c.
d.

Router
Bridges
Hubs
Firewalls
Show/Hide Answer
Answer = D
Explanation: Main objective of firewall is to control the incoming and outgoing network
traffic by analyzing the data packets and determining whether it should be allowed
through or not, based on a predetermined rule set.
7) HTTP refers to ?

a.
b.
c.
d.

Hyper Text Transfer Protocol


Hyper Text Transmission Protocol
Hyper Text Tie Protocol
None of these
Show/Hide Answer
Answer = A
Explanation:No explanation
8) Why was the OSI developed ?

a.
b.
c.
d.

Manufacturers disliked the TCP/IP protocol


The rate of data transfer was increasing exponentially
Standards were needed to allow any two systems to communicate
None of these
Show/Hide Answer
Answer = C
Explanation:OSI was an effort to standardize the networking that was started in 1977
9) Auto dialing allows ?

a.
b.
c.
d.

You to dial up phone numbers by typing them on the keyboard


A personal computer to answer incoming calls without human assistance
Both A and B
None of above
Show/Hide Answer
Answer = A
Explanation:Auto dialer is an electronic device or software that automatically dials the
telephone numbers.

10) Sending a file from your personal computer's primary memory or disk to another
computer is called ?
a.
b.
c.
d.
e.

uploading
hang on
logging on
downloading
None of these

Show/Hide Answer
Answer = A
Explanation: Uploading refers to sending data from local system to remote system such
as server or client.
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-oncomputer_13.html#sthash.aZwnqD6y.dpuf
1) Which of the following is a congestion control algorithm?

a.
b.
c.
d.

a.
b.
c.
d.

The leaky bucket


Token bucket
Resource Respondez sil vous plait protocol
All of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
2) Which of the following is a function of e-mail system ?
Mosaic
Netscape
Internet Explorer
All of above
Answer = D
Explanation: No Explanation
3) Demodulation is the process of ?

Show/Hide Answer

a.
b.
c.
d.
e.

converting digital signals to analog signals


converting analog signals to digital signals
dividing the high-speed signals into frequency bands
combining many low speed signals into one high speed channel
None of above
Show/Hide Answer
Answer = B
Explanation: No Explanation
4) Bulletin board system ?

a.
b.
c.
d.
e.

is a public access message system


converts digital signals to analog signals
is a modem capable of accepting commands
converts digital signals to analog signals
None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
5) An information utility can offer a user ?

a.
b.
c.
d.
e.

instant bonds and stock quotations


news stories from wire services
Complete airline schedules for all domestic flights
All of above
None of above
Show/Hide Answer

Answer = D
Explanation: No Explanation
6) A network that requires human intervention of route signals is called a ?
a.
b.
c.
d.
e.

bus network
ring network
star network
T- switched network
None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
7) In OSI network architecture, the dialogue control and token management are
responsibilities of ?

a.
b.
c.
d.
e.

session layer
network layer
transport layer
data link layer
none of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
8) What is the main function of transport layer ?

a.
b.
c.
d.

node to node delivery


process to process message delivery
synchronization
updating and maintenance of routing tables
Show/Hide Answer
Answer = B
Explanation: No Explanation
9) Which of the following is an important characteristics of LAN ?

a.
b.
c.
d.
e.

application independent interface


low cost access for low bandwidth channels
unlimited expansion
parallel transmission
None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
10) To deliver a message to the correct application program running on a host, the ....
address must be consulted ?

a.
b.
c.
d.

port
physical
IP
None
Show/Hide Answer
Answer = A
- See more at: http://allquiz.blogspot.in/2012/06/multiple-choice-questions-oncomputer_07.html#sthash.OJwu2DH0.dpuf
1) The area of coverage of satellite radio beam is known as... ?

a.
b.
c.
d.
e.

Footprint
Circular polarization
Beam width
Identity
None of Above
Show/Hide Answer

Answer = A
Explanation:No explanation for this question.
2) Coaxial cable has conductors with ?
a.
b.
c.
d.
e.

Equal resistance
The same diameter
Both A and B
A common axis
None of these
Show/Hide Answer
Answer = D
Explanation: Coaxial cables has two type of conductors one is inner and other is outer
that has common axis.
3) What protects the coaxial cable from noise ?

a.
b.
c.
d.

Inner conductor
Outer conductor
Diameter of cable
Insulating material

Show/Hide Answer
Answer = B
Explanation:The outer conductor is covered in protective plastic sheath. This shielding of
coaxial cable give it a good combination of high bandwidth and excellent noise
immunity.
4) Error detection at the data link level is achieved by ?

a.
b.
c.
d.
e.

Bit stuffing
Hamming codes
Cyclic Redundancy codes
Equalization
None of above
Show/Hide Answer
Answer = A
Explanation:Bit stuffing also known as positive justification is the insertion of noninformation bits into data.
5) MAN refers to ?

a.
b.
c.
d.

Mega Area Network


Metropolitan Area Network
Mini Area Network
Medium Area Network

Show/Hide Answer
Answer = B
Explanation: A metropolitan area network covers a city. The best example is the cable
television network available in cities.
6) Which of the following layer is not in OSI model ?

a.
b.
c.
d.

physical layer
internet layer
network layer
transport layer

Show/Hide Answer
Answer =B
Explanation: The OSI model has total 7 layers out of which internet layer is not a part of
OSI model.
7) Nyquist Theorem to calculate data rate is ?

a.
b.
c.
d.

2H log2 V bits/sec
H log2 V bits/sec
Hlog2 (1+S/N)
2H log2 (1+s/n)
Answer = A
Explanation:No explanation

Show/Hide Answer

8) Copper wire is an example of ?


a.
b.
c.
d.

Guided Transmission Media


Unguided Transmission Media
Group Media
None of these
Show/Hide Answer
Answer = A
Explanation:Copper wires comes under the Guided Media. Coaxial cables consist of the
stiff copper wire as a core.
9) Iridium and Dysprosium projects, proposed by Motorola are related to ?

a.
b.
c.
d.

Geosynchronous satellite
Wavelength
Low orbit satellite
ISDN

Show/Hide Answer
Answer = C
Explanation:Moving down in altitude, we come to LEO satellites. Due to their rapid
motion, large numbers of them are needed for a complete system.
10) Which of the following is a type of fragmentation ?

a.
b.
c.
d.

Transparent
Non transparent
Both A and B
None of these
Show/Hide Answer
Answer = C
Explanation:Fragmentation is used to break up the packets into fragments. It is of two
types : Transparent and Non transparent.
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-oncomputer_09.html#sthash.oxAERydl.dpuf

a.
b.
c.
d.

a.
b.
c.
d.

a.

1) Which of the following is considered a broad band communication channel ?


coaxial cable
fiber optics cable
microwave circuits
all of above
Show/Hide Answer
Answer = D
2) Which of the following does not allow multiple uses or devices to share one
communication line?
doubleplexer
multiplexer
concentrator
controller

Show/Hide Answer
Answer = A
3) Which of the following is required to communicate between two computers ?
communications software

b.
c.
d.

a.
b.
c.
d.

protocol
communication hardware
all of above including access to transmission medium
Show/Hide Answer
Answer = D
4)Which of the following is an advantage to using fiber optics data transmission ?
resistance to data theft
fast data transmission rate
low noise level
all of above
Show/Hide Answer
Answer = D
5)The interactive transmission of data within a time sharing system may be best suited
to ?

a.
b.
c.
d.

simplex lines
half-duplex lines
full duplex lines
biflex-lines
Show/Hide Answer
Answer = B
6) The optical fiber trans-Atlantic cable TAT-14 includes a section from Bude, Cornwall
to Tucker ton, New Jersey. Determine the propagation delay if the route length is 6,254
km. ?

a.
b.
c.
d.

31.98
3.198
31.27
312.7

ms
ms.
ms
ms

Show/Hide Answer
Answer = C
7) Manchester encoding is principally designed to ?

a.
b.
c.
d.

ensure that the line remains unbalanced.


have more than one symbol per bit period.
increase the bandwidth of a signal transmitted on the medium
ensure that a transition occurs in the center of each bit period.
Show/Hide Answer
Answer = D
8) A router ?

a.
b.
c.
d.

forwards a packet to all outgoing links.


forwards a packet to all outgoing links, except the link upon which the packet originated
forwards a packet to the next free outgoing link
determines on which outgoing link a packet is to be forwarded.
Show/Hide Answer
Answer = D
9) Telephone systems may be classified as ?

a.
b.
c.
d.

simplex and symmetrical.


duplex and asymmetrical.
simplex and asymmetrical.
duplex and symmetrical.
Show/Hide Answer
Answer = D
10) Which of the following signal is not standard RS-232-C signal ?

a.
b.
c.
d.

VDR
RTS
CTS
DSR

Show/Hide Answer
Answer =A
- See more at: http://allquiz.blogspot.in/2012/04/multiple-choice-questions-oncomputer.html#sthash.GFaG2RFG.dpuf
a.
b.
c.
d.

a.
b.
c.
d.

1) The collection of communication lines and routers is called


LAN
MAN
WAN
Communication Subnet
Show/Hide Answer
Answer = D
2) In the IEEE standards 802.5 standard is also called ?
Ethernet
Token Bus
Wireless Token Area Network
Token Ring
Show/Hide Answer
Answer = D
Explanation: In the IEEE standards 802.5 standard is also called Token Ring

a.
b.
c.
d.

3) _________ have a single communication channel that is shared by all the users on
the
network. ?
Point-to-Point
Broadcast Network
Protocol
PAN
Show/Hide Answer
Answer = B
Explanation: Broadcast Network Have Single Communication channel.

a.
b.

4)A Wireless Access Point Behaves in a similar manner to that of a master-slave


operation ?
True
False
Show/Hide Answer
Answer = True

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

5) Which of the following is an advantage to using fiber optics data transmission?


resistance to data theft
fast data transmission rate
low noise level
all of above
Show/Hide Answer
Answer = D

6) Which of the following is required to communicate between two computers?


communications software
protocol
communication hardware
all of above including access to transmission medium
Show/Hide Answer
Answer = D
7) Which of the following types of channels moves data relatively slowly?
wide band channel
voice band channel
narrow band channel
all of above
Show/Hide Answer

Answer = C

a.
b.
c.
d.

8) A protocol is a set of rules governing a time sequence of events that must take
place ?
between peers
between an interface
between modems
across an interface
Show/Hide Answer
Answer = A

a.
b.
c.
d.

9) Which of the following transmission systems provide the highest data rate to in
individual device?
computer bus
telephone lines
voice and mode
lease lines
Show/Hide Answer
Answer = A

a.
b.
c.
d.

10) Communiction circuits that transmit data in both directions but not at the same time are
operating in
a simplex mode
a half duplex mode
a full duplex mode
an asynchronous mode
Show/Hide Answer
Answer = B
- See more at: http://allquiz.blogspot.in/2012/04/computer-network-fundamentals-mcqugc.html#sthash.08vF0d7e.dpuf

Data Structure Objective Type Questions And Answers


Wednesday, 29 August 2012

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.

Data structure multiple choice questions and answers with explanation.


1) The average search time of hashing with linear probing will be less if the
load factor ?
is far less than one
equals one
is far greater than one
None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
2) The complexity of binary search algorithm is ?
n
nlogn
logn
n2
Show/Hide Answer
Answer = D
Explanation:N/A
3) The postfix equivalent of the prefix * + ab - cd is ?
ab + cd - *
abcd + - *
ab + cd * -

d.

ab + - cd *
Show/Hide Answer

a.
b.
c.
d.
e.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Answer = A
Explanation: No Explanation
4)The linked list implementation of sparse matrices is superior to the
generalized dope vector method because it is?
Conceptually easier
Completely dynamic
Efficient in accessing an entry
Efficient if the sparse matrix is a band matrix
A and B
Show/Hide Answer
Answer = E
Explanation: N/A
5) Sparse matrix have ?
many zero entries
many non-zero entries
higher dimension
none of above
Show/Hide Answer
Answer = A
Explanation: A sparse matrix is a matrix populated primarily with zeros
6) Which of the following algorithm solves the all pair shortest path
problem ?
Dijkstra's algorithm
Floyd's algorithm
Prim's algorithm
Warshall's algorithm
Show/Hide Answer
Answer = B
Explanation: The FloydWarshall algorithm (also known as Floyd's algorithm, Roy
Warshall algorithm, RoyFloyd algorithm, or the WFI algorithm) is a graph analysis
algorithm for finding shortest paths in a weighted graph (with positive or negative
edge weights) and also for finding transitive closure of a relation R.
7) As part of maintenance work, you are entrusted with the work of
rearranging the library books in a shelf in proper order, at the end of each
day. The ideal choice will be ?
Bubble sort
Insertion sort
Selection sort
Heap sort
Show/Hide Answer
Answer = B
Explanation:N/A
8) The way a card game player arranges his cards as he picks them up one
by one, is an example of ?
bubble sort
selection sort
insertion sort
merge sort

a.
b.
c.
d.

a.
b.
c.
d.

Show/Hide Answer
Answer = C
Explanation: He scans throught the rest of the cards and pick the one with least
value and places it next to the point till which he has already sorted the cards
9) The average successful search time for sequential search on 'n' items
is ?
n/2
(n - 1)/2
(n + 2)/2
log(n) + 1
Show/Hide Answer
Answer = C
Explanation:N/A
10) Linked lists are suitable for which of the following problems ?
Insertion sort
Binary search
Radix sort
Polynomial manipulation
Show/Hide Answer
Answer = B
Explanation: Through Linked list binary search can be performed efficiently.
- See more at: http://allquiz.blogspot.in/2012/08/data-structure-objective-typequestions.html#sthash.WzXSJaXE.dpuf
1) If the sequence of operations - push(1), push(2), pop, push(1), push(2), pop, pop,
pop, push(2), pop are performed on a stack, the sequence of popped out values are ?

a.
b.
c.
d.

2,
2,
2,
2,

2,
2,
1,
1,

1,
1,
2,
2,

1,
2,
2,
2,

2
2
1
2

Show/Hide Answer
Answer = A
Explanation: The elements are popped from the top of the stack.
2) Queue can be used to implement ?
a.
b.
c.
d.

radix sort
quick sort
recursion
depth first search
Show/Hide Answer
Answer = A
Explanation: A simple version of an LSD radix sort can be achieved using queues as buckets.
3) A machine took 200 sec to sort 200 names, using bubble sort. In 800 sec, it can
approximately sort ?

a.
b.
c.
d.

400
800
750
800

names
names
names
names

Show/Hide Answer
Answer = A
Explanation:For sorting 200 names bubble sort makes 200 x 199/2 = 19900 comparisons. The
time needed for 1 comparison is 200 sec. In 800 sec it can make 80,000 comparisons. We have to
fine n, such that n(n - 1)/2 = 80,000. From this n is approximately 400.

4) A machine needs a minimum of 100 sec to sort 1000 names by quick sort.The
minimum time needed to sort 100 names will be approximately ?
a.
b.
c.
d.

50.2 sec
6.7 sec
72.7 sec
11.2 sec
Show/Hide Answer
Answer = B
Explanation: In the best case quick sort algorithm makes n log(n) comparisons. so 1000
x log (1000) = 9000 comparisons, which takes 100 sec. To sort 100 names a minimum of
100 log(100) = 600 comparisons are needed. This takes 100 x 600/9000 = 6.7 sec.
5) The number of binary trees with 3 nodes which when traversed in post order gives
the sequence A,B,C is ?

a.
b.
c.
d.

3
9
7
5

Show/Hide Answer

Answer = D
Explanation: Five trees are

6) The average search time of hashing with linear probing will be less if the load
factor ?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

is far less than one


equals one
is far greater than one
none of above

Show/Hide Answer
Answer = A
Explanation:Load factor is the ratio number of records that are currently present and the total
number of records that can be present. If the load factor is less, free space will be more. This
means probability of collision is less. So the search time will be less.
7) A binary tree that has n leaf nodes. The number of nodes of degree 2 in this tree is ?
log2n
n-1
n
2n

Show/Hide Answer
Answer = B
Explanation: It can be proved by induction that a binary tree with n leaf nodes will have total of
2n - 1 nodes. So number of non-leaf nodes is (2n - 1)-n=n-1
8) The principal of locality justifies the use of ?
Interrupts
DMA
Polling
Cache memory
Show/Hide Answer
Answer = D
Explanation:In principal of phenomenon the same value or same memory location is being used
frequently.
9) Sparse matrices have ?

a.

many zero entries

b.
c.
d.

a.
b.
c.
d.

many non- zero entries


higher dimension
none of above

Show/Hide Answer
Answer = A Explanation: A sparse matrix is a matrix populated primarily with zeros
10) The postfix expression for * + a b - c d is?
ab
ab
ab
ab

+ cd - *
cd + - *
+ cd * + - cd *

Show/Hide Answer
Answer = A
Explanation: No Explanation
- See more at: http://allquiz.blogspot.in/2012/08/data-structure-multiplechoice.html#sthash.RZlerNfi.dpuf
1)What is Data Structure ?
a.
b.
c.
d.

Way to organize data


Accessing of data elements in specified manner
Organization of mathematical and logical concepts
All of Above
Show/Hide Answer
Answer = D
Explanation:A Data Structure may be organized in different ways : The logical or
mathematical model of a particular organization of data is called Data Structure.
2) Which operation is not possible on Data Structure ?

a.
b.
c.
d.

Traversing
Insertion
Reading
Deletion

Show/Hide Answer
Answer = C
Explanation:Possible operations on the Data Structure are Traversing, Insertion,
Searching and Deletion.
3) The memory address of the first element is called ?

a.
b.
c.
d.

Floor Address
Foundation Address
First Address
Base Address
Show/Hide Answer
Answer = D
Explanation:The memory address of the first element is often called base address in
Data Structure.
4) The value of first linked list address is ?

a.
b.
c.
d.

0
-1
1
None of Above

Show/Hide Answer
Answer = 0
Explanation: No explanation for this question.
5) Two dimensional arrays are also called ?

a.
b.
c.
d.

Matrix Array
Table Array
Both a and b
None of the Above
Show/Hide Answer
Answer = C
Explanation:Two dimensional arrays are called as matrix array and table arrays because
they contains rows and columns.
6) The situation in linked list START=NULL is called ?

a.
b.
c.
d.

Overflow
Underflow
Both of above
None of Above
Show/Hide Answer
Answer = B
Explanation:It is the situation when we are trying to delete an item from the empty
linked list.
7) Length of the linear array can be found by using the formula ?

a.
b.
c.
d.

a.
b.
c.
d.

UB - LB + 1
LB + UB
LB - UB
LB - UB + 1

Show/Hide Answer
Answer = A
Explanation:The length of linear array can be found by using UB - LB + 1 Where UB is
upper Bound, LB is Lower Bound of the array.
8) The restriction while using the binary search is ?
List should be small in number
List should be large in number
List should be sorted
No restriction
Show/Hide Answer
Answer = C
Explanation: Binary search can be applied to a list only if the list is either in ascending
or descending order.
9) The terms PUSH and POP are related to ?

a.
b.
c.
d.

Arrays
Stacks
Linked List
None

Show/Hide Answer
Answer = B
Explanation:PUSH is used for inserting an element into the stack and POP is used for
deleting an elements from the stack.
10) The operation of processing element is called ?

a.
b.
c.
d.

Traversing
Inserting
Deleting
Searching
Show/Hide Answer
Answer = A
Explanation:Traversing means visiting or processing each element exactly once.

- See more at: http://allquiz.blogspot.in/2012/04/multiple-choice-questions-ondata.html#sthash.tc2qocJR.dpuf


1) A transparent DBMS ?
a.
b.
c.
d.
e.

Can not hide sensitive information from users


Keep its logical structure hidden from users
Keeps its physical structure hidden from users
Both B and C
None of above
Show/Hide Answer
Answer = C
Explanation: It is a kind of database management system which is totally physically
invisible to the users , transparency in a distributed DBMS refers to a complete
separation of higher level semantics of a system from lower level implementation.the
advantage of a fully transparent DBMS is the high level of support it provides for the
development of complex applications.
2) Primitive operations common to all record management system include ?

a.
b.
c.
d.
e.

Print
Sort
Look up
All of above
None of above

Show/Hide Answer

Answer = C
Explanation: N/A
3) The master list of an indexed file ?
a.
b.
c.
d.
e.

Is sorted in ascending order


contains only a list of keys and record numbers
has a number assigned to each record
Both B and C
None of above
Show/Hide Answer
Answer = C
Explanation: An indexed file contains records ordered by a record key. Each record
contains a field that contains the record key.
4) A condition that led to the development of database was ?

a.
b.
c.
d.
e.

A demand for more data to support information needs


An increase in the amount of data handled by organizations
The poliferation of data files
All of above
None of above
Show/Hide Answer
Answer = D
Explanation: N/A
5) Information can be transferred between the DBMS and a ?

a.
b.
c.
d.
e.

Spreadsheet program
Word processor program
Graphics programs
All of above
None of above
Answer = D
Explanation:N/A

Show/Hide Answer

6) Goals for the design of the logical schema includes ?


a.
b.
c.
d.
e.

Avoiding data inconsistency


Being able to construct queries easily
Being able to access data efficiency
All of above
None of above
Show/Hide Answer
Answer = D
Explanation: N/A
7) A locked file can be ?

a.
b.
c.
d.
e.

Accessed by only one user


Modified by users with the correct password
Is used to hide sensitive information
Both B and C
None of above
Show/Hide Answer
Answer = A
Explanation: File locking is a mechanism that restricts access to a computer file by
allowing only one user or process access at any specific time
8) Versatile report generator can provide ?

a.
b.
c.
d.
e.

Columnar totals
Subtotals
Calculations
All of above
None of above
Answer = D
Explanation: N/A

Show/Hide Answer

9) A trigger is ?
a.
b.
c.
d.

A statement that enables to start any DBMS


A statement that is executed by the user when debugging an application program
A condition the system tests for the validity of the database user
A statement that is executed automatically by the system as a side effect of modification
to the database
Show/Hide Answer
Answer = D
Explanation: A database trigger is procedural code that is automatically executed in
response to certain events on a particular table or view in a database
10) Manager's salary details are hidden from the employee. This is ?

a.
b.
c.
d.

Conceptual level data hiding


Physical level data hiding
Externel level hiding
None of above
Show/Hide Answer
Answer = C
Explanation: The external view level is closest to the users. It is concerned with the way
the data is viewed by individual users.
- See more at: http://allquiz.blogspot.in/2012/07/database-management-systemmultiple.html#sthash.95EEdEuQ.dpuf
1) Related fields in a database are grouped to form ?

a.
b.
c.
d.
e.

Data Fields
Data Record
Menu
Bank
None of above

Show/Hide Answer
Answer = B
Explanation: Related fields in the data base are grouped into the Records. Records are
the total of all information of a particular item.
2) Entities having primary key are called ?

a.
b.
c.
d.

a.
b.
c.
d.

Primary Entities
Strong Entities
Weak Entities
Primary Key

Show/Hide Answer
Answer = B
Explanation: Entity having its own primary key is called a strong entity and the entity
not having its own primary key is called a weak entity.
3) In the E-R diagrams, the term cardinality is a synonym for the term ?
Attribute
Degree
Entities
Cartesian
Show/Hide Answer
Answer = D
Explanation: No Explanation
4) TRUNCATE statement in SQL is a ?

a.
b.
c.
d.

DML statement
DDL statement
DCL statement
None of above
Show/Hide Answer
Answer = B
Explanation: TRUNCATE statement remove all records from a table, including all spaces
allocated for the records are removed.
5) The default date format in SQL is ?

a.
b.
c.
d.

a.
b.
c.
d.

DD-MON-YY
DD-MM-YY
DD-MM-YYY
MM-DD-YY

Show/Hide Answer
Answer = A
Explanation: No Explanation
6) For adding number of hours to a date, which of the following statement is used ?
Date + Number
Date + Number/24
Date + Number of Hours
None of above

Show/Hide Answer
Answer = B
Explanation: For example we want to add 3hrs to the date then we use the statement :
DATE + 3/24
7) Which syntax is the more accurate for creating SYNONYM ?

a.

CREATE [PUBLIC] SYNONYM synonym for object

b.
c.
d.

CREATE SYNONYM synonym for object from table name


CREATE [PUBLIC] SYNONYM synonym for column name
None of these
Show/Hide Answer
Answer = A
Explanation: No Explanation
8) A data dictionary is a special file that contains ?

a.
b.
c.
d.
e.

the names of all fields in all files


the data types of all fields in all files
the widths of all fields in all files
All of above
None of above
Show/Hide Answer
Answer = D
Explanation: Refer: http://en.wikipedia.org/wiki/Data_dictionary
9) A command that lets you change one or more fields of a record is ?

a.
b.
c.
d.
e.

insert
Modify
Look-up
All of above
None of above

Show/Hide Answer

Answer = B
Explanation: No Explanation
10) In a large DBMS ?
a.
b.
c.
d.
e.

Each user can see only a small part of the entire database
Each user can access every sub schema
Each sub schema contains every field in the logical schema
All of above
None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
- See more at: http://allquiz.blogspot.in/2012/06/objective-type-questions-on-database.html#sthash.Htr8VH6N.dpuf
1) An unnormalized relation contains values ?

a.
b.
c.
d.

Atomic
Non - Atomic
Classified
None of these
Show/Hide Answer
Answer = C
Explanation: N/A
2) A relation scheme is said to be in ...... form if the values in the domain of each
attribute of the relation are atomic ?

a.
b.
c.
d.

Unnormalized
First Normal
BoyceCODD
None of these

Show/Hide Answer

Answer = B
Explanation:N/A
3) A second Normal form does not permit ...... dependency between a non prime

attribute and the relation key ?


a.
b.
c.
d.

Partial
Multi
Functional
Valued

Show/Hide Answer

Answer = A
Explanation:N/A
4) A relation scheme is in ..... if it is in the 1NF and if all non prime attributes are fully
functionally dependent on the relation key ?
a.
b.
c.
d.

First Normal Form


Second Normal Form
Boyce Codd Normal Form
Fourth Normal Form

Show/Hide Answer

Answer = D
Explanation:N/A
5) In a Third Normal Form relation, every ......attribute is non - transitively and fully
dependent on the every candidate key ?
a.
b.
c.
d.

Prime
Non Prime
Unique
None of these
Answer = C
Explanation:N/A

Show/Hide Answer

6) A generalization of the Boyce Codd Normal form to relation schemes which includes
the multivalued dependencies is called ?
a.
b.
c.
d.

Second Normal Form


Third Normal Form
Fourth Normal Form
Fifth Normal Form
Answer = D
Explanation:N/A

Show/Hide Answer

7) 5 NF is related to ?
a.
b.
c.
d.

Functional dependency
Multivalued dependency
Join dependency
None of these

Show/Hide Answer

Answer = D
Explanation:N/A
8) Project join Normal form is also referred to as ?
a.
b.
c.
d.

Second Normal Form


Third Normal Form
Fourth Normal Form
Fifth Normal Form
Answer = D
Explanation:N/A

Show/Hide Answer

9) The compiled form of the definition is known as ?


a.
b.
c.
d.

Data Dictionary
Directory
System catalog
All of above
Answer = B
Explanation:N/A

Show/Hide Answer

10) Once a sequence is created, it is documented in the ?


a.
b.
c.
d.

Database
Datatable
Data Dictionary
Data Document

Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/08/multiple-choice-questions-on-database.html#sthash.7cp941Pb.dpuf
1) A multiple - form file management system ?

a.
b.
c.
d.
e.

a.
b.
c.
d.

a.
b.
c.
d.

Lets you define different forms for different operations


Lets you create a look up form with an associated read only password to prevent access by
unauthorized users.
Both A and B
Allows you to entry data in all the forms
None of above
Show/Hide Answer
Answer = C
Explanation:Multiple form management system allows to perform different operations
along with checks for the unauthorized access.
2) Embedded pointer provide ?
A secondary access path
A physical record key
An inverted index
None of above

Show/Hide Answer
Answer = A
Explanation: Embedded pointer is a pointer set in a data record instead of in a directory.
3) In relational schema, each tuple is divided into fields called ?

Relations
Domains
Queries
All of above
Answer = B
Explanation:No Explanation
4) A logical schema ?

a.
b.
c.
d.

Show/Hide Answer

is the entire database


is a standard way of organizing information into accessible parts
describes how data is actually stored on disk
All of above
Show/Hide Answer

Answer =B
Explanation: A logical schema is a data model of a specific problem domain expressed in
terms of a particular data management technology.
5) Administrate supervision of database activity is the responsibility of ?
a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

Database administrator
DP Manager
DB Manager
DP Administration
None of above

Show/Hide Answer
Answer = A
Explanation: No Explanation
6) What software packages are commonly for business that have to track extensive lists
of clients and inventory?
Special purpose packages
Custom made programs
Single function application packages
Data management packages
None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
7) Periodically adding, changing and deleting file records is called file ?
updating
upgrading
restructuring
renewing
None of above
Answer = A
Explanation: No Explanation
8) Data security threats include ?

a.
b.
c.
d.

Show/Hide Answer

hardware failure
privacy invasion
fraudulent manipulation of data
All of above
Show/Hide Answer
Answer = B
Explanation: No Explanation
9) The online soft copy display a customer's charge account to respond to an inquiry is
an example of ?

a.
b.
c.
d.

a.
b.
c.
d.
e.

forecasting report
exception report
regularly scheduled report
on demand report

Show/Hide Answer
Answer = D
Explanation: No Explanation
10) In order to understand DBMS, it is important to understand?
the physical schema
all sub schema that are system support
one sub schema
Both A and B
None of above
Show/Hide Answer
Answer = C

- See more at: http://allquiz.blogspot.in/2012/09/database-management-systemobjective.html#sthash.b3xM4mJG.dpuf

Discrete Structure
1) Let A and B be any two arbitrary events then which one of the following is true ?
a.
b.
c.
d.

P( A intersection B) = P(A). P(B)


P(A union B) = P(A) + P(B)
P(AB) = P(A intersection B). P(B)
P(A union B) >= P(A) + P(B)
Show/Hide Answer
Answer = D
2) If X and Y be the sets. Then the set ( X - Y) union (Y- X) union (X intersection Y ) is
equal to?

a.
b.
c.
d.

X union Y
Xc union Yc
X intersection Y
Xc intersection Yc

Show/Hide Answer

Answer = A
3) If G is an undirected planer graph on n vertices with e edges then ?
a.
b.
c.
d.

e<=n
e<=2n
e<=3n
None of these
Answer = B

Show/Hide Answer

4) Which of the following statement is false ?


a.
b.
c.
d.

G
G
G
G

is
is
is
is

connected and is circuitless


connected and has n edges
minimally connected graph
circuitless and has n-1 edges
Show/Hide Answer
Answer = B
5) Probability that two randomly selected cards from a set of two red and two black
cards are of same color is ?

a.
b.
c.
d.

1/2
1/3
2/3
None of these

Show/Hide Answer

Answer = B
6) The number of circuits that can be created by adding an edge between any two
vertices in a tree is ?
a.
b.

Two
Exactly one

c.
d.

At least two
None
Answer = B

Show/Hide Answer

7) In a tree between every pair of vertices there is ?


a.
b.
c.
d.

Exactly one path


A self loop
Two circuits
n number of paths

Show/Hide Answer

Answer = A
8) The minimum number of cards to be dealt from an arbitrarily shuffled deck of 52
cards to guarantee that three cards are from some same suit is ?
a.
b.
c.
d.

8
3
9
12

Show/Hide Answer

Answer = C
9) Context free languages are closed under ?
a.
b.
c.
d.

union, intersection
Intersection , complement
union , kleene star
Complement , kleene star
Answer = C

Show/Hide Answer

10) Let R be a symmetric and transitive relation on a set A. Then ?


a.
b.
c.
d.

R is reflexive and hence a partial order


R is reflexive and hence an equivalence relation
R is not reflexive and hence not an equivalence relation
None of above
Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-ondiscrete_11.html#sthash.HvnAvvNX.dpuf
1) A tour of G is a closed walk of graph G which includes every edge G at least once.
A ..... tour of G is a tour which includes every edge of G exactly once ?

a.
b.
c.
d.

a.
b.
c.
d.

Hamiltonian
Planar
Isomorphic
Euler

Show/Hide Answer
Answer = D
Explanation: If some closed walk in a graph contains all the edges then the walk is
called Euler.
2) Which of the following is not a type of graph ?
Euler
Hamiltonian
Tree
Path
Show/Hide Answer

Answer = D
Explanation:Path is a way from one node no another but not a graph.
3) Choose the most appropriate definition of plane graph ?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

A graph drawn in a plane in such a way that any pair of edges meet only at their end
vertices

A graph drawn in a plane in such a way that if the vertex set of graph can be partitioned
into two non - empty disjoint subset X and Y in such a way that each edge of G has one end in X
and one end in Y.
A simple graph which is Isomorphic to Hamiltonian graph
None of these
Show/Hide Answer
Answer = A
Explanation: No explanation for this question.
4) A continuous non - intersecting curve in the plane whose origin and terminus coincide
?
Planer
Jordan
Hamiltonian
All of these

Show/Hide Answer
Answer = B
Explanation: The jordan graph is the set of all vertices of minimum eccentricity that is
the set of all vertices A where the greatest distance to other vertex B is minimal.
5) Polyhedral is.... ?
A simple connected graph
A plane graph
A graph in which the degree of every vertex and every face is atleast 3
All of above
Show/Hide Answer
Answer = D
Explanation: A polyhedral graph is the undirected graph formed from the vertices and
edges of a convex polyhedron
6) A path in graph G, which contains every vertex of G once and only once ?

a.
b.
c.
d.

Eulartour
Hamiltonian Path
Eular trail
Hamiltonian tour
Show/Hide Answer
Answer = B
Explanation:A Hamiltonian circuit in a connected graph is defined as a closed walk that
traverse every vertex of G exactly once except the starting vertex.
7) A minimal spanning tree of a graph G is.... ?

a.
b.
c.
d.

a.
b.

A spanning sub graph


A tree
Minimum weights
All of above

Show/Hide Answer
Answer = D
Explanation: A tree is said to be spanning tree of connected graph G if it is subgraph of G
and contains all the vertices of G.
8) A tree having a main node, which has no predecessor is.... ?
Spanning tree
Rooted tree

c.
d.

Weighted tree
None of these
Show/Hide Answer
Answer = B
Explanation:A tree in which one vertex distinguish from all other is called rooted tree.
9) Diameter of a graph is denoted by diam(G) is defined by.... ?

a.
b.
c.
d.

max (e(v) : v belongs to V)


max( d(u,v) )
Both A and B
None of these
Show/Hide Answer
Answer = C
Explanation: The diameter of a graph G is largest distance between two vertices in a
graph G.
10) A vertex of a graph is called even or odd depending upon ?

a.
b.
c.
d.

Total number of edges in a graph is even or odd


Total number of vertices in a graph is even or odd
Its degree is even or odd
None of these
Show/Hide Answer
Answer = C
Explanation: The vertex of a graph is called even or odd based on its degree.
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-ondiscrete_5464.html#sthash.0fcfISDU.dpuf
1) A graph is a collection of.... ?

a.
b.
c.
d.

Row and columns


Vertices and edges
Equations
None of these
Show/Hide Answer
Answer = B
Explanation: A graph contains the edges and vertices
2) The degree of any vertex of graph is .... ?

a.
b.
c.
d.

The number of edges incident with vertex


Number of vertex in a graph
Number of vertices adjacent to that vertex
Number of edges in a graph
Show/Hide Answer
Answer = A
Explanation: The number of edges connected on a vertex v with the self loop counted
twice is called the degree of vertex.
3) If for some positive integer k, degree of vertex d(v)=k for every vertex v of the graph
G, then G is called... ?

a.
b.
c.
d.

K graph
K-regular graph
Empty graph
All of above
Show/Hide Answers
Answer = B
Explanation: A graph in which all vertices are of equal degree is called regular graph.

4) A graph with no edges is known as empty graph. Empty graph is also known as... ?
a.
b.
c.
d.

Trivial graph
Regular graph
Bipartite graph
None of these

Show/Hide Answer
Answer = A
Explanation: Trivial graph is the second name for empty graph.
5) Length of the walk of a graph is .... ?

a.
b.
c.
d.

The number of vertices in walk W


The number of edges in walk W
Total number of edges in a graph
Total number of vertices in a graph
Show/Hide Answer
Answer = B
Explanation: A walk is defined as finite altering sequence of vertices and edges. No
Edges appear more than once but vertex may appear more than once.

6) If the origin and terminus of a walk are same, the walk is known as... ?
a.
b.
c.
d.

Open
Closed
Path
None of these

Show/Hide Answer
Answer = B
Explanation: A walk which begins and ends with same vertex is called closed walk
otherwise it is open.
7) A graph G is called a ..... if it is a connected acyclic graph ?

a.
b.
c.
d.

Cyclic graph
Regular graph
Tree
Not a graph
Show/Hide Answer
Answer = C
Explanation: No explanation for this question.
8) Eccentricity of a vertex denoted by e(v) is defined by.... ?

a.
b.
c.
d.

u&v}

max { d(u,v): u belongs to v, u does not equal to v : where d(u,v) is the distance between

min { d(u,v): u belongs to v, u does not equal to v }


Both A and B
None of these
Show/Hide Answer
Answer = A
Explanation: The eccentricity E(v) of a vertex V in the graph is the distance from v to
the vertex farthest from v in G.
9) Radius of a graph, denoted by rad(G) is defined by.... ?

a.
b.
c.
d.

max {e(v): v belongs to V }


min { e(v): v belongs to V}
max { d(u,v): u belongs to v, u does not equal to v }
min { d(u,v): u belongs to v, u does not equal to v }
Show/Hide Answer

Answer = A
Explanation: The diameter or radius of a graph G is largest distance between two
vertices in the graph G.
10) The complete graph K, has... different spanning trees?
a.
b.
c.
d.

nn-2
n*n
nn
n2
Show/Hide Answer
Answer = A
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-ondiscrete_08.html#sthash.rRHMr6qo.dpuf
1) Context free Grammar is ?

a.
b.
c.
d.

A Compiler
A language expression
A regular expression
None of these

Show/Hide Answer
Answer = B
Explanation: Context free Grammar generate the context free languages. These are
defined by the rule of the form A -> b Where A a non terminal and b is the string of
terminals.
2) The idea of an automation with a stack as auxiliary storage... ?

a.
b.
c.
d.

Finite automata
Push down automata
Deterministic automata
None of these
Show/Hide Answer
Answer = B
Explanation: Push down automata manipulate the stack, as a part of performing a
transition.
3) A Pushdown automata is.....if there is at most one transition applicable to each
configuration ?

a.
b.
c.
d.

Deterministic
Non Deterministic
Finite
Non Finite
Show/Hide Answer
Answer = A
Explanation:If in every situation only one transition is available as continuation of
computation, then the result is a deterministic push down automation (DPDA).
4) The graphical representation of the transition of finite automata is ?

a.
b.
c.
d.

Finite diagram
State diagram
Node diagram
E-R diagram

Show/Hide Answer
Answer = B
Explanation: State diagram is called the graphical representation of Finite automata.

5) If two sets A and B have no common elements i.e (A intersection B) has no element
then such sets are known as ?
a.
b.
c.
d.

a.
b.
c.
d.

Intersection
Union
Disjoint
Complement

Show/Hide Answer
Answer = C
Explanation:If two sets have no element in common then they are called disjoint sets.
6) The domain D of the relation R is defined as the.... ?
Set of all elements of ordered pair which belongs to R
Set of all last elements of ordered pair which belongs to R
Set of all first elements of ordered pair which belongs to R
None of these
Show/Hide Answer
Answer = C
Explanation: No explanation for this question
7) 'A language is regular if and only if it is accepted by a finite automation' ?

a.
b.
c.
d.

The given statement is true


The given statement is false
The given statement is partially true
Sometime true, sometimes false
Show/Hide Answer
Answer = A
Explanation: A regular language is accepted by the finite automation. Every regular
language is context free.
8) Which of the following does not belong to the context free grammer?

a.
b.
c.
d.

Terminal symbol
Non-terminal symbol
Start symbol
End symbol
Show/Hide Answer
Answer = D
Explanation:Context free grammar consist of terminal symbols, non terminal symbols,
set of production rules, a start symbol but does not have any End symbol.
9) A regular grammar is a..... ?

a.
b.
c.
d.

Context free grammar


Non context free grammar
English grammar
None of above
Show/Hide Answer
Answer = A
Explanation: Regular grammar is context free grammar. Such a grammar restricts its
rules to a single non terminal on the left hand side and right hand side consisting of a
single terminal.
10) The context free language are closed under... ?

a.
b.
c.
d.

Union
Kleene star
Concatenation
All of above

Show/Hide Answer

Answer = D
Explanation: Context free language is closed under union, kleene star and
concatenation.
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-ondiscrete.html#sthash.yslNc91D.dpuf

Information technology
1) Which country created the most used networking software in 1980's ?
a.
b.
c.
d.

Sun
IBM
Novell
Microsoft
Show/Hide Answer
Answer =C
2) In what year was the @ chosen for its use in email address ?

a.
b.
c.
d.

a.
b.
c.
d.

1972
1976
1980
1984

Show/Hide Answer
Answer =A
3) Which American computer company is called Big Blue ?
IBM
Compaq Corp
Microsoft
Tandy Svenson
Show/Hide Answer
Answer = A
4) Who is credited with the idea of using punch cards to control patterns in a waving
machine ?

a.
b.
c.
d.

Pascal
Hollerith
Babbage
Jacquard
Answer =D
5) What does SSL stands for ?

a.
b.
c.
d.

System socket layer


Secure system login
Secure socket layer
Secure system login

Show/Hide Answer

Show/Hide Answer

Answer =C
6) What is MAC ?
a.
b.
c.
d.

A computer made by Apple


Memory address corruption
Mediocre Apple Computer
Media Access Control
Answer =D

Show/Hide Answer

7) What does PPTP stand for ?


a.
b.
c.
d.

Point
Point
Point
Point

to
to
to
to

Point
Point
Point
Point

Transmission Protocol
Transfer Protocol
Tunneling Protocol
Traffic Protocol
Show/Hide Answer

Answer = C
8) The IBM PC-XT was the first to include a hard drive. What was the capacity of this
disk ?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

750 KB
10 KB
20 KB
1.44 KB

Show/Hide Answer
Answer =B
9) In 1983, which person was the first to offer a definition of the term 'computer
virus' ?
Smith
Cohen
Norton
Mcafee

Show/Hide Answer
Answer = B
10) DTP computer abbreviation usually means ?

DeskTop Publishing
Data Type Programming
Digital Transmission Protocol
None Of above

Show/Hide Answer
Answer = B
- See more at: http://allquiz.blogspot.in/2012/09/computer-quiz-informationtechnology.html#sthash.BtpZVWdo.dpuf
1) Who invented microprocessor ?

a.
b.
c.
d.

Joseph Jacquard
Herman H Goldstein
Marcian E Huff
George Boole
Show/Hide Answer
Answer =C
2) .INI extention refers to which kind of file ?

a.
b.
c.
d.

a.
b.
c.
d.

Image file
System file
Hypertext related file
Image color matching profile file

Show/Hide Answer
Answer =B
3) Who built the world's first binary digit computer ?
Alan Turing
Konrad Zuse
George Boole
Ken Thompson
Answer =B

Show/Hide Answer

4) What is VCM ?
a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Virtual Connection Manager


Virtual Channel Memory
Video Controlled Modem
Voice Connection Module

Show/Hide Answer
Answer =B
5) Who is largely responsible for breaking the German Enigma Codes created a test
provided a foundation for artificial intelligence ?
Alan Turing
Jeff Bezos
George Boole
Charles Babbage

Show/Hide Answer
Answer = A
6) Who co - founded Hotmail in 1996 and then sold the company to microsoft ?
Shawn Fanning
Ada Byron Lovelace
Sabeer Bhatia
Ray Tomlinson
Show/Hide Answer
Answer = C
7) What was the first ARPANET message?

a.
b.
c.
d.

a.
b.
c.
d.

Hello world
Cyberspace, the final frontier
mary has a little lamp
Lo

Show/Hide Answer
Answer = D
8) Where are the headquarters of Microsoft located ?
Santa Clara
Tucson
Redmond
Richmond
Answer = A
9) What does DOCSIS stands for ?

a.
b.
c.
d.

Data
Data
Data
Data

over
over
over
over

cable
cable
cable
cable

Show/Hide Answer

service internet standard


security internet standard
secure international standard
service interface srandard
Show/Hide Answer

Answer = D
10) Who designed the first electronic computer - ENIAC?
a.
b.
c.
d.

Von Neumann
Joseph M Jacquard
J.P.Eckert and J.W.Mauchly
All of above
Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/09/information-technology-questions-set3.html#sthash.TCAYvcTc.dpuf
1) A presentation means ?

a.
b.
c.
d.

Display of products
Explaining the utility of products
A gift
Display of communication or skills
Show/Hide Answer
Answer = B
2) The term CRM means ?

a.
b.
c.
d.

a.
b.
c.
d.

Customer Relationship Management


Customer Retention Manager
Customer's Relative Meet
Channel Root Market
Show/Hide Answer
Answer = A
3) Why would a switch be used in a network in preference to a HUB ?
To
To
To
To

reduce the network traffic


prevent the spread of all viruses
connect a computer directly to the internet
manage password security at the work station
Show/Hide Answer
Answer = A
4) What should be done to successfully convert the format of an image from BMP to
JPEG ?

a.
b.
c.
d.

Compress the file


Rename the image
Use the save as command
Change the image file extension
Show/Hide Answer
Answer =C
5) A company regularly updates a user reference guide. Some staff are confused about
which of the printed document is the most current. What feature should be included in
the reference guide to eliminate this confusion ?

a.
b.
c.
d.

a.
b.
c.
d.

Data printed
Version number
Authors name
Copyright information

Show/Hide Answer
Answer = B
6) The term associated with the processing of comparison speed is ?
FFTS
MPG
MIPS
CPS
Show/Hide Answer
Answer =C
7) The data from a spreadsheet needs to be imported into a database package. Which
file format would be the most appropriate when saving the spreadsheet file ?

a.
b.
c.
d.

CSV
HTML
PDF
RTF
Show/Hide Answer
Answer =A
8) For reproducing sound the CD audio player uses a ?

a.
b.
c.
d.

Quartz Cristal
Titanium Needle
Laser Beam
Barium Titanium Ceramic
Show/Hide Answer
Answer =C
9) Which of the following would indicate that the motherboard battery has failed ?

a.
b.
c.
d.

Operating system passwords are lost


Files on the hard disk are lost and corrupted
Hardware settings, including virtual memory reverts to default values
Hardware settings, including the current date and time reverts to default values
Show/Hide Answer
Answer = D
10) Which of the following is essential component of communication cycle ?

a.
b.
c.
d.

A message
An interpreter
An email account
An internet connection
Show/Hide Answer
Answer =A
- See more at: http://allquiz.blogspot.in/2012/07/information-technology-objectivetype.html#sthash.g3oSH3f1.dpuf
1) Full form of "OS" is?

a.
b.
c.
d.

Order of significance
Operating system
Open software
Optical Sensor

Show/Hide Answer

Answer = B
2) The ribbon is used in ?
a.
b.
c.
d.

Laser Printer
Plotter
Ink-jet printer
Dot Matrix printer
Answer = D
3) Address book contains?

a.
b.
c.
d.

Email address
Phone numbers
People Names
All of the above

Show/Hide Answer

Show/Hide Answer

Answer = D
4) Full form of "DOCOMO" ?
a.
b.
c.
d.

a.
b.

Do Connect over Mobile


Do Communications Over the Mobile network
Dongle Communication Over Mobile
Do Communication Or More
Show/Hide Answer
Answer =B
5) Joystick is used to ?
Move cursor on the screen
Computer games

c.
d.

Both a and b
None of these
Show/Hide Answer

Answer = C

6) A DNS translates a domain name into what ?


a.
b.
c.
d.

Binary
Hex
IP
URL
Answer = C
7) When was the first e-mail sent ?

a.
b.
c.
d.

a.
b.
c.
d.

Show/Hide Answer

1963
1969
1971
1974

Show/Hide Answer
Answer = C Explanation: It was sent by Ray Tomlinson
8) What type of memory is volatile ?
Cache
RAM
ROM
Hard Drive
Show/Hide Answer
Answer =B
9) Which of the below is not an iPhone 4 feature ?

a.
b.
c.
d.

a.
b.
c.
d.

4G
Front facing camera
HD recording
Multitasking

Show/Hide Answer
Answer = A
10) Main memory is also known as ?
Auxiliary memory
Primery memory
Secondry memory
None of above
Show/Hide Answer
Answer = B
- See more at: http://allquiz.blogspot.in/2012/04/multiple-choice-questionson_08.html#sthash.8U4uPZjQ.dpuf

Operating System MCQ Questions


Monday, 8 October 2012

a.
b.
c.
d.

1) Which is the best process to access number of records from the same
file ?
A batch job
An on-line job
A real time job
All of above
Show/Hide Answer

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Answer = A
Explanation: Many batch jobs are run in parallel and JCL is used to control the
operation of each job
2) What is the name of the arrangement where several central processing
units share one memory ?
Multi tasking
Multi programming
Multi processing
Concurrent programming
Show/Hide Answer
Answer = C
Explanation: Multiprogramming is the allocation of a computer system and its
resources to more than one concurrent application, job or user
3) Banker's algorithm for resource allocation deals with ?
Dead lock prevention
Dead lock avoidance
Dead lock recovery
Mutual Exclusion
Show/Hide Answer
Answer = B
Explanation: The Banker's algorithm is a resource allocation and deadlock
avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating
the allocation of predetermined maximum possible amounts of all resources, and
then makes a "s-state" check to test for possible deadlock conditions for all other
pending activities, before deciding whether allocation should be allowed to continue.
4) If the CPU scheduling policy is STF, the average waiting time (without
prevention) will be ?
12.8 ms
6.8 ms
17 ms
None of above
Show/Hide Answer
Answer = B
Explanation: No Explanation
5) Producer consumer problem can be solved using ?
Semaphores
Event counters
Monitors
All of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
6) If the CPU scheduling policy is priority scheduling without pre-emption,
the average waiting time will be ?
19 ms
11.8 ms
10.8 ms
None of above
Show/Hide Answer
Answer = C
Explanation: No Explanation

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

7) Situation where two or more processes are reading or writing some


shared data and the final result depends upon who runs precisely is
called ?
Race Condition
Critical Section
Mutual Exclusion
Message Passing
Show/Hide Answer
Answer = A
Explanation: A race condition or race hazard is a type of flaw in an electronic or
software system where the output is dependent on the sequence or timing of other
uncontrollable events.
8) In partitioned memory allocation scheme ?
The best fit algorithm is always better than the first fit algorithm
The best fir algorithm is always better that best fit algorithm
The superiority of the first fir algorithm depends upon the sequence of
memory request
None of above
Show/Hide Answer
Answer = C
Explanation: No Explanation
9) The main function of dispatcher is ?
swapping a process to the disk
Assigning reads process to the CPU
Suspending some of the processes when the CPU load is high
Bring processes from the disk to the main memory
Show/Hide Answer
Answer = B
Explanation: The dispatcher is the module that gives control of the CPU to the
process selected by the short-time scheduler
10) For implementing multiprogramming system ?
special support from
special support from processor is not essential
cache memory must be available
mote than one processor must be available
Show/Hide Answer
Answer = B
- See more at: http://allquiz.blogspot.in/2012/10/operating-system-mcqquestions.html#sthash.qzVgjefT.dpuf
1) PMTLR is acronym for ?

a.
b.
c.
d.

Page Map Table Limit Register


Page Memory Table With Limit Register
Both A and B
None of these
Show/Hide Answer
Answer = A
Explanation: N/A
2) Paging is ?

a.
b.

Virtual memory
Memory management scheme

c.
d.

Allocation of memory
Deadlock prevention scheme
Show/Hide Answer
Answer = B
Explanation: paging is one of the memory-management schemes by which a computer
can store and retrieve data from secondary storage for use in main memory.
3) Chaining and indexing are the strategies of ?

a.
b.
c.
d.

Contiguous allocation
Non - Contiguous allocation
Partition allocation
Static allocation
Show/Hide Answer
Answer = B
Explanation: Chaining and Indexing are Non Contiguous Allocation strategies that
contains pointes to the memory locations.
4) Which of the following scheduler is in charge of handling the swapped out process ?

a.
b.
c.
d.

short term
long term
medium term
none of these

Show/Hide Answer
Answer = A
Explanation: The short-term scheduler (also known as the CPU scheduler) decides which
of the ready, in-memory processes are to be executed (allocated a CPU) next following a
clock interrupt, an IO interrupt, an operating system call or another form of signal.
5) Round robin scheduling algorithm falls under the category of ?

a.
b.
c.
d.

Preemptive scheduling
Non preemptive scheduling
sometimes preemptive sometimes non preemptive
None of these
Show/Hide Answer
Answer = A
Explanation: Round-robin (RR) is one of the simplest scheduling algorithms for
processes in an operating system. As the term is generally used, time slices are assigned
to each process in equal portions and in circular order, handling all processes without
priority.In order to schedule processes fairly, a round-robin scheduler generally employs
time-sharing, giving each job a time slot or quantum (its allowance of CPU time), and
interrupting the job if it is not completed by then. So it falls under preemptive
scheduling.
6) Only the process executing the critical section is allowed access to the shared
variable, all other processes should prevented from doing so until the completion of the
critical section. This is often referred to as ?

a.
b.
c.
d.

a.
b.

Mutual exclusion
Semaphores
Deadlock
Interprocess communication

Show/Hide Answer
Answer = A
Explanation: N/A
7) Partition Description Table (PDT) collect the ?
Current Partition Status
Attributes

c.
d.

Both A and B
None of these
Answer = C
Explanation: n/a

Show/Hide Answer

8) Belady's Anomaly is a behavior of which page replacement algorithm ?


a.
b.
c.
d.

FIFO
Optimal
Circular FIFO
LRU

Show/Hide Answer
Answer = A
Explanation: Bldy's anomaly proves that it is possible to have more page faults when
increasing the number of page frames while using the First in First Out (FIFO) page
replacement algorithm.
9) Which of the following is an operating system call ?

a.
b.
c.
d.

CREATE
LINK
SYSTEM
All of these
Answer = D
Explanation: N/A

Show/Hide Answer

10) The reference bit is used for the purpose of ?


a.
b.
c.
d.

Improving MRU algorithm


Implementing LRU page replacement algorithm
Checking of the page table entry is in cache memory
Checking to see if parameters are passed to a procedure by value or by address
Show/Hide Answer
Answer = A
- See more at: http://allquiz.blogspot.in/2012/08/operating-system-multiplechoice.html#sthash.gvrsVX0O.dpuf
1) In UNIX the status of the process may be ?

a.
b.
c.
d.
e.

running
orphan
sleeping
zombie
All of above

Show/Hide Answer

Answer = E
Explanation:No Explanation
2) Which of the following processes has a PID I ?
a.
b.
c.
d.

Kernel
UNIX
hilt
shell
Answer = C
Explanation:No Explanation
3) The PID of kernel process is ?

Show/Hide Answer

a.
b.
c.
d.

undefined
0
1
3
Show/Hide Answer
Answer = B
Explanation: No Explanation
4) Which of the following command is not a cursor movement command ?

a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

n
a
$
j
None of above

Show/Hide Answer
Answer = B
Explanation:No Explanation
5) The Commands used to compare the files is known as ?

comp
du
cmp
ccp
None

Show/Hide Answer
Answer = C
Explanation: No Explanation
6) Which of the following command is used with vi editor to delete a single character ?
z
y
a
x
None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
7) Which command is used with vi editor to move the cursor one row up ?

a.
b.
c.
d.
e.

a.
b.
c.
d.
e.

i
j
h
k
None of above

Show/Hide Answer
Answer = D
Explanation: No Explanation
8) Which command is used with the vi editor to move the cursor to the left ?
i
k
j
h
None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
9) Which command is used with the vi editor to save file and remain in the editing
mode ?

a.

:q

b.
c.
d.
e.

q!
:w
:x
None of above
Show/Hide Answer
Answer = C
Explanation: No Explanation
10) Which command is used to extract specific columns from the file ?

a.
b.
c.
d.
e.

cat
grep
cut
paste
None of above

Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/06/multiple-choice-questions-onoperating.html#sthash.PaaXrsit.dpuf
1)Virtual memory is ?

a.
b.
c.
d.

Extremely large main memory


Extremely large secondary memory
An illusion of an extremely large memory
A type of memory used in super computers
Show/Hide Answer
Answer = C
Explanation: Virtual memory is a feature of Operating System that enables a process to
use a memory independent of other processes.
2) Spatial locality refers to the problem that once a location is referenced ?

a.
b.
c.
d.

It will not be referenced again


It will be referenced again
A nearby location will be referenced soon
None of Above
Show/Hide Answer
Answer = B
Explanation: Spatial locality or locality of reference stats that the same value or related
value is going to be referenced again.
3) Which of the following is an example of SPOOLED device?

a.
b.
c.
d.

The terminal used to enter the input data for a program being executed
The secondary memory device in a virtual memory system
A line printer used to print the output of number of job's
None of above
Show/Hide Answer
Answer = C
Explanation:Line printer used to print the output of number of job's is an example of
print spooling. In print spooling documents are loaded into the buffer and then the
printer pulls then off the buffer at its own rate.
4) Page fault occurs when ?

a.
b.
c.
d.

The page in corrupted by application software


The page is in main memory
The page is not in main memory
One tries to divide number by 0
Show/Hide Answer
Answer = C
Explanation:Page fault occurs when the page that is not in the main memory is tried to
be accessed.

5) Overlays is ?
a.
b.
c.
d.

A part of Operating System


A specific memory location
A single contiguous memory that was used in the olden days for running large programs
by swapping
Overloading the system with many user files
Show/Hide Answer
Answer = C
Explanation: An overlay is when a process replaces itself with the code of another
program.

6) Determine the number of page faults when references to pages occurs in the order
1,2,4,5,2,1,2,4. Assume that the main memory can accommodate 3 pages and the main
memory already has the pages 1 and 2. With page 1 having been brought earlier that
page 2(Assume LRU algorithm is used) ?
a.
b.
c.
d.

3
5
4
None

Show/Hide Answer
Answer = C
Explanation:As the reference string is 1,2,4,5,2,1,2,4 so if LRU page replacement
algorithm is used then there will be 4 page faults.
7) Concurrent processed are processed that ?

a.
b.
c.
d.

Do not overlap in time


Overlap in time
Are executed by processor at the same time
None of Above
Show/Hide Answer
Answer = B
Explanation:Concurrent means something that executed at the same time ad something
else.
8) The rage replacement policy that sometimes leads to more page faults when the size
of the memory is increased is ?

a.
b.
c.
d.

FIFO
LRU
no such policy exists
None of Above
Show/Hide Answer
Answer = A
Explanation:If the size of memory is increased and FIFO page replacement algorithm is
used then there will be more page faults.
9) The only transition that is initiated by the user process itself is ?

a.
b.
c.
d.

a.
b.

block
dispatch
wake up
None of Above

Show/Hide Answer
Answer = A
10) Working set(r,k) at an instance of time t, is a set of ?
k future references that operating system will make
Future references that the operating system will make in the next 'k' time units

c.
d.

k references with high frequency


Pages that have been referenced in the last k time units
Show/Hide Answer
Answer = D
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-onoperating.html#sthash.LPaZ9uqe.dpuf
1) Which of the following file name extension suggests that the file is Backup copy of
another file ?

a.
b.
c.
d.

TXT
COM
BAS
BAK
Show/Hide Answer
Answer = D
Explanation: BAK extension is used for the backup files however the extension should
be removed before opening the file to open it correctly. Eg : "myfile.doc.bak"should be
renamed with "myfile.doc".
2) FIFO scheduling is.....

a.
b.
c.
d.

Preemptive Scheduling
Non Preemptive Scheduling
Deadline Scheduling
Fair share scheduling
Show/Hide Answer
Answer = B
Explanation: In the non preemptive scheduling the CPU can not take back from the
process to which it is assigned, until it completes its execution
3)Switching the CPU to another Process requires to save state of the old process and
loading new process state is called as ...

a.
b.
c.
d.

Process Blocking
Context Switch
Time Sharing
None of the above
Show/Hide Answer
Answer = B
Explanation: The old state of the process can be saved through the concept of context
switching.
4)The Banker's algorithm is used

a.
b.
c.
d.

to prevent deadlock in operating systems


to detect deadlock in operating systems
to rectify a deadlocked state
none of the above
Show/Hide Answer
Answer = A
Explanation: In an operating system, a deadlock is a situation which occurs when a
process enters a waiting state because a resource requested by it is being held by
another waiting process, which in turn is waiting for another resource. If a process is
unable to change its state indefinitely because the resources requested by it are being
used by other waiting process, then the system is said to be in a deadlock.
5)A thread

a.
b.
c.
d.

is a lightweight process where the context switching is low


is a lightweight process where the context switching is high
is used to speed up paging
none of the above
Show/Hide Answer
Answer = A

6) A tree structured file directory system


a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

allows easy storage and retrieval of file names


is a much debated unnecessary feature
is not essential when we have millions of files
none of the above
Show/Hide Answer
Answer = A
Explanation: It is easy to access anything if it is in hierarchical structure.
7) Full Form Of PCB
Program Control Block
Process Control Block
Process Communication Block
None of the above

Show/Hide Answer
Answer = B
Explanation: It is also called the Task Controlling Block or Task Struct that contains the
information needed to manage a particular process
8)The mechanism that bring a page into memory only when it is needed is called....?
Segmentation
Fragmentation
Demand Paging
Page Replacement
Show/Hide Answer
Answer = C
Explanation: Under the concept of demand paging , the page is brought into the memory
only when it is needed
9) Which technique was introduced because a single job could not keep both the CPU
and the I/O devices busy?

a.
b.
c.
d.

Time-sharing
Spooling
Preemptive scheduling
Multiprogramming
Show/Hide Answer
Answer = D
Explanation: Through Multiprogramming multiple processes gets executed at a same
time
10) Which directory implementation is used in most Operating System ?

a.
b.
c.
d.

Single level directory structure


Two level directory structure
Tree directory structure
Acyclic directory structure

Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/04/multiple-choice-questions-onoperating_06.html#sthash.GGnHLZRy.dpuf
1) Round Robin algorithm is essentially the preemptive version of ?

a.
b.
c.
d.

FIFO
Shortest Job First
Shortest Remaining
Longest time first
Show/Hide Answer
Answer = a
Explanation: In round robin algorithm time slices are assigned to the processes in equal
portion and in circular order.

2) A page fault occurs ?


a.
b.
c.
d.

when
when
when
when

the
the
the
the

page is not in the memory


page is in the memory
process enters the blocked state
process is in the ready state
Show/Hide Answer

Answer = a
Explanation: A page fault occurs when a process accesses a page that has been mapped
into the address space, but is not loaded into the physical memory.
3) Which of the following will determine your choice of systems software for your
computer?
a.
b.
c.
d.

a.
b.
c.
d.

Is the applications software you want to use compatible with it ?


Is it expensive ?
Is it compatible with your hardware ?
Both 1 and 3
Show/Hide Answer
Answer = D
Explanation: The choice of the software should be compatible with the hardware and
should not be expensive enough.
4) What is a shell ? ?
It
It
It
It

is
is
is
is

a
a
a
a

hardware component
command interpreter
part in compiler
tool in CPU scheduling.

Show/Hide Answer
Answer = B
Explanation: A Shell is the command line interpreter that provides the traditional user
interface for the UNIX operating system. Users direct the operation of the computer by
entering commands as text for a command line interpreter to execute or by creating text
scripts of one or more such commands.
5) Routine is not loaded until it is called. All routines are kept on disk in a relocatable
load format. The main program is loaded into memory & is executed. This type of loading
is called... ?
a.
b.
c.
d.

Static loading
Dynamic loading
Dynamic linking
Overlays

Show/Hide Answer
Answer = C
Explanation: Dynamic linking provides the facility to load or unload routines at runtime
6) In the blocked state ?

a.
b.
c.
d.

a.
b.
c.
d.

the processes waiting for I/O are found


the process which is running is found
the processes waiting for the processor are found
none of the above
Show/Hide Answer
Answer = A
Explanation: All the processes that are waiting for the completion of some event such
as I/O operation or a signal are in Blocked state.
7) What is the memory from 1K - 640K called ?
Extended Memory
Normal Memory
Low Memory
Conventional Memory

Show/Hide Answer

Answer = D
8) Virtual memory is ..... ?
a.
b.
c.
d.

a.
b.
c.
d.

An extremely large main memory


An extremely large secondary memory
An illusion of extremely large main memory
A type of memory used in super computers.
Show/Hide Answer
Answer = C
Explanation: Virtual memory allows a program to be designed as though there is only
one kind of memory, "virtual" memory, which behaves like directly addressable
read/write memory (RAM).
9) Which is not the state of the process ?
Blocked
Running
Ready
Privileged
Show/Hide Answer
Answer = D
10) The number of processes completed per unit time is known as.... ?

a.
b.
c.
d.

Output
Throughput
Efficiency
Capacity

Show/Hide Answer
Answer = B
Explanation: Throughput is the amount of data transfer from one place to another. It is
measured in Kbps, Gbps, Mbps
- See more at: http://allquiz.blogspot.in/2012/04/multiple-choice-questions-onoperating.html#sthash.unecNV4J.dpuf

Software Engineering MCQ Questions and Answers


Thursday, 13 September 2012

a.
b.
c.
d.

a.
b.
c.
d.

Software engineering multiple choice and objective type questions and


answers with appropriate explanation.
1) According to Brooks, if n is the number of programmers in a project
team then the number of communication paths is ?
n(n-1)/2
nlogn
n
n(n+1)/2
Show/Hide Answer
Answer = A
Explanation: No Explanation
2) Which of the following software engineering concept does Ada language
support ?
Abstraction
Generic
Information Hiding
All of above
Show/Hide Answer

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Answer = D
Explanation:Ada is a structured, and object-oriented high-level computer
programming language, extended from Pascal and other languages.
3) In unit testing of a module, it is found that for a set of test data, at the
maximum 90% of the code alone were tested with the probability of
success 0.9. The reliability of module is ?
Greater than 0.9
Equal to 0.9
At most 0.81
At least 1/0.81
Show/Hide Answer
Answer = C
Explanation: Since only 90% code is tested and that too with 90% success, the
reliability will be at most 0.81. It may increase or decrease is some more set of test
data is given for testing the rest of the code.
4)According to PUTNAM, Project effort is inversely proportional to the
fourth power of development time, Doubling the development schedule for
a 100 person -month project would reduce the project effort to ?
50 PM
7.16 PM
25 PM
6.25 PM
Show/Hide Answer
Answer = D
Explanation:Doubling the developing time reduces the project effort by a factor of
24 = 16. So, the project effort will be 100/16 = 6.25 PM
5) Which of the following type of maintenance takes the maximum chunk of
the total maintenance effort in a typical life cycle of software product ?
Adaptive maintenance
Corrective maintenance
Preventive maintenance
Perfective maintenance
Show/Hide Answer
Answer = D
Explanation: This is maintenance that will improve the performance of the ICT
system. Usually this will involve adding features not originally present to the
software to make it produce the information from a database faster or to improve the
speed of a network
6) Software testing techniques are most effective if applied immediately
after ?
Requirement specification
Design
Coding
Integration
Show/Hide Answer
Answer = B
Explanation: No Explanation
7) The reliability of a program be 0.8. The reliability of an equivalent
program is 0.9. The probability that both the programs give the wrong
result for the same input is ?

a.
b.
c.
d.

0.72
0.17
0.1
0.02
Show/Hide Answer

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Answer = D
Explanation: No Explanation
8) If the decision table has 3 variables and 3 rules then ?
specification may not be complete
design could be faulty
coding will be incorrect
All of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
9) A program P calls two subprograms P1 and P2. P1 can fail 50% times and
P2 can fail 40% times. The program P can fail ?
50%
60%
10%
70%
Show/Hide Answer
Answer = D
Explanation: P can fail : 1 - (1 - 0.5)(1 - 0.4) = 0.7 times means 70%
10) Which of the following comments about the object oriented design of
software, is not true?
Objects inherit the properties of the class
Classes are defines based on the attributes of objects
An object can belong to two classes
Classes are always different
Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/09/software-engineering-mcq-questionsand.html#sthash.isFsnwZ4.dpuf
1) In functional decomposition, the data flow diagram ?

a.
b.
c.
d.
e.

is ignored
is partitioned according to the closeness of the datagram and storage items
is partitioned according to the logical closeness of the actigram
Both A and C
None of above
Show/Hide Answer
Answer = C
Explanation: N/A
2) Which of the following is done in order a data in phase 1 of the system development
life cycle ?

a.
b.
c.
d.
e.

Reviewing policies and procedures


Using questionnaires to contact surveys
Conducting Interviews
All of above
None of above
Show/Hide Answer

Answer = D
Explanation: N/A
3) A graphic representation of an information system is called ?
a.
b.
c.
d.
e.

Flow chart
Pictogram
Data flow diagram
Histogram
None of above

Show/Hide Answer

Answer = C
Explanation:N/A
4) To avoid errors in transcription and transposition, during data entry the system
analyst should ?
a.
b.
c.
d.

Provide for a check digit


Provide for a hash totals
Provide batch totals
All of above

Show/Hide Answer

Answer = D
Explanation: N/A
5) In the system concepts, the term integration ?
a.
b.
c.
d.
e.

implies structure and order


refers to the manner in which each component functions with other component of the
system

means that part of the computer system depend on one another


refers to the holism of system
None of above
Show/Hide Answer
Answer = D
Explanation: system integration is the bringing together of the component subsystems
into one system and ensuring that the subsystems function together as a system. In
information technology, systems integration is the process of linking together different
computing systems and software applications physically or functionally, to act as a
coordinated whole
6) RAD is a linear sequential software development process model. RAD is an acronym
for ?

a.
b.
c.
d.

Rapid Application Development


Rapid Action Development
Rough Application Development
Rough Action Development
Show/Hide Answer
Answer = A
Explanation: Rapid application development (RAD) is a software development
methodology that uses minimal planning in favor of rapid prototyping. The "planning" of
software developed using RAD is interleaved with writing the software itself
7) In risk analysis of spiral model, which of the following risk includes ?

a.
b.
c.
d.

Technical
Management
Both A and B
None of these

Show/Hide Answer

Answer = C
Explanation: N/A
8) The model remains operative until the software is retired ?
a.
b.
c.
d.

Waterfall
Incremental
Spiral
None of these
Show/Hide Answer
Answer = C
Explanation: The spiral model is based on continuous refinement of key products for
requirements definition and analysis, system and software design, and implementation
(the code). At each iteration around the cycle, the products are extensions of an earlier
product. This model uses many of the same phases as the waterfall model, in essentially
the same order, separated by planning, risk assessment, and the building of prototypes
and simulations
9) A quantitative measure of the degree to which a system, component, or process
posses a given attribute ?

a.
b.
c.
d.

Measure
Measurement
Metric
None of these

Show/Hide Answer

Answer = C
Explanation: N/A
10) RAD is not appropriate when ?
a.
b.
c.
d.

Fast finding already done


Technical risks are high
Testing is not needed
None of above
Show/Hide Answer
Answer = B
Explanation: RAD model may not be useful for large, unique or highly complex
projects.This method cannot be a success if the team is not sufficiently motivated and
nor is unable to work cohesively together.
- See more at: http://allquiz.blogspot.in/2012/08/objective-type-questions-and-answerson.html#sthash.3uIx62sF.dpuf
1) Given a source code with 10 operators includes 6 unique operators, and 6 operand
including 2 unique operands. The program volume is ?

a.
b.
c.
d.

a.
b.
c.
d.

48
120
720
insufficient data

Show/Hide Answer
Answer = A
Explanation: No Explanation
2) In the system conceps, term organization ?

system

implies structure and order


refers to the manner in which each component fuctions with other components of the
refers to the holism of system
means that part of the computer system depend on one another
Show/Hide Answer

Answer = A
Explanation: No Explanation
3) In the system concepts, the term integration ?
a.
b.

system

implies structure and order


refers to the manner in which each component functions with other components of the

c.
d.

means that parts of computer system depends on one another


refers to the holism of systems
Show/Hide Answer
Answer = D
Explanation: No Explanation
4) Project indicator enables a software project manager to ?

a.
b.
c.
d.

assess the status of an ongoing project


track potential risks
uncover problem araes before they " go critical "
All of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
5) Once object oriented programming has been accomplished, unit testing is applied for
each class. Class tests includes ?

a.
b.
c.
d.

a.
b.
c.
d.

Fault based testing


Random testing
Partition teting
All of above

Show/Hide Answer
Answer = D
Explanation: No Explanation
6) ............ Developed a set of software quality factors that has been given the acronym
FURPS - Functinality, Usability, Reliability, performance, Supportability ?
Hewlett - Packard
Rambaugh
Booch
Jacobson
Show/Hide Answer
Answer = A
Explanation: No Explanation
7) In system design, we do following ?

a.
b.
c.
d.

a.
b.
c.
d.

a.

Hardware design after software


Software design after hardware
Parallel hardware and software design
No hardware design needed
Show/Hide Answer
Answer = C
Explanation: No Explanation
8) The document listing all procedures and regulations that generally govern an
organization is the ?
Personal poling bank
Organizing manual
Administration policy manual
Procedure log

Show/Hide Answer
Answer = B Explanation: No Explanation
9) A turnkey package includes ?
Software

b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Hardware
Traning
All of above

Show/Hide Answer
Answer = D
Explanation: No Explanation
10) Detailed design is expressed by ?
CSPEC
PSPEC
MINI SPEC
Code SPEC

Show/Hide Answer
Answer = C
- See more at: http://allquiz.blogspot.in/2012/07/software-engineering-objectivetype.html#sthash.m8Qn6Dez.dpuf 1) White box testing, a software testing technique is
sometimes called ?

Basic path
Graph Testing
Dataflow
Glass box testing
Show/Hide Answer
Answer = D
Explanation: White box testing also named as clear box testing, transparent testing,
glass box testing and structural testing. It is a method in which the internal structure of
application is tested.
2) Black box testing sometimes called ?

a.
b.
c.
d.

Data Flow testing


Loop Testing
Behavioral Testing
Graph Based Testing
Show/Hide Answer
Answer = C
Explanation: Black box testing is a method that tests for the functionality of an
application.
3) Which of the following is a type of testing ?

a.
b.
c.
d.

a.
b.
c.
d.

Recovery Testing
Security Testing
Stress Testing
All of above

Show/Hide Answer
Answer = D
Explanation: Recovery testing is a method for testing how well a software can recover
from crashes. Security testing ensures that the software protects the data and performs
its all functions. Stress testing determines the robustness of software.
4) The objective of testing is ?
Debugging
To uncover errors
To gain modularity
To analyze system

Show/Hide Answer
Answer = B
Explanation: The main objecting of testing is to make the software error free.

5) ...... is a black box testing method ?


a.
b.
c.
d.

Boundary value analysis


Basic path testing
Code path analysis
None of above

Show/Hide Answer
Answer = A
Explanation:In boundary value analysis, we choose an input from test cases from an
equivalence class such that the input lies on the edge of equivalence class.
6) Structured programming codes includes ?

a.
b.
c.
d.
e.

a.
b.
c.
d.

sequencing
alteration
iteration
multiple exit from loops
only A, B and C

Show/Hide Answer
Answer = E
Explanation:These three constructs are sufficient to program any algorithm. Moreover,
as far as possible single entry single exit control constructs are used.
7) An important aspect of coding is ?
Readability
Productivity
To use as small memory space as possible
brevity
Show/Hide Answer
Answer = A
Explanation:Readability and understandability as a clear objective of coding activity can
itself help in producing software that is more maintainable.
8) Data structure suitable for the application is discussed in ?

a.
b.
c.
d.

data design
architectural design
procedural design
interface design

Show/Hide Answer
Answer = A
Explanation: Data design is the first and most important design activity, where the main
issue is to select the appropriate data structure.

9) In object oriented design of software , objects have ?


a.
b.
c.
d.

attributes and names only


operations and names only
attributes, name and operations
None of above
Show/Hide Answer
Answer = C
Explanation: The objects contains attributes, names and operations as well.
10) Function oriented metrics were first proposed by ?

a.
b.
c.
d.

John
Gaffney
Albrecht
Basili
Show/Hide Answer

Answer = C
Explanation:Albrecht suggests a measure called Function point, which are derives using
a empirical relationship based on the countable measures of software information
domain.
- See more at: http://allquiz.blogspot.in/2012/06/software-engineering-multiplechoice.html#sthash.MI60pDTl.dpuf
1) Software engineering aims at developing ?
a.
b.
c.
d.

Reliable Software
Cost Effective Software
Reliable and cost effective Software
None Of Above
Show/Hide Answer
Answer = C
Explanation:Software engineering is the process that aims at developing the software's
that are Reliable and cost effective as well.
2) A good specification should be ?

a.
b.
c.
d.

Unambiguous
Distinctly Specific
Functional
All of Above
Show/Hide Answer
Answer = D
Explanation:A good specification should have all the qualities such as unambiguos,
distinctly specific and functional.
3) Which of the following is a tool in design phase ?

a.
b.
c.
d.

a.
b.
c.
d.

Abstraction
Refinement
Information Hiding
All of Above

Show/Hide Answer
Answer = D
4) Information hiding is to hide from user, details ?
that
that
that
that

are relevant to him


are not relevant to him
may be maliciously handled by him
are confidential
Show/Hide Answer
Answer = C
Explanation:Information hiding is just the process of making inaccessible certain details
that have no effect on the other parts of the program.
5) Which of the following comments about object oriented design of software, is not
true ?

a.
b.
c.
d.

Objects inherit the properties of class


Classes are defined based on the attributes of objects
an object can belong to two classes
classes are always different
Show/Hide Answer
Answer = C
Explanation:An object can not belong to two classes.
6) Design phase includes?

a.

data, architectural and procedural design only

b.
c.
d.

architectural, procedural and interface design only


data, architectural and interface design only
data, architectural, interface and procedural design
Show/Hide Answer
Answer = D
Explanation:Design phase included the design of whole software including data,
architectural, interface and procedural design.
7) To completely write the program in FORTRAN and rewrite the 1% code in assembly
language, if the project needs 13 days, the team consists of ?

a.
b.
c.
d.

a.
b.
c.
d.

13 programmers
10 programmers
8 programmers
100/13 programmers

Show/Hide Answer
Answer = C
Explanation: Writing the whole program in FORTRAN takes 100 man-day, remaining 1%
code requires 4 man-day. If it is completed in 13 days then 104/13 = 8 programmers it
required.
8) If 99% of the program is written in FORTRAN and the remaining 1% in assembly
language, the percentage increase in the programming time compared to writing the
entire program in FORTRAN and rewriting the 1% in assembly language is ?
10
5
13
8

Show/Hide Answer
Answer = B
Explanation:The first case takes 99+10=109 man-day. The second case require
100+4=104 man-day. Percentage = (109-104)*100/100 = 5
9) If the entire program is written in FORTRAN, the percentage increase in the execution
time, compared to writing the entire program in FORTRAN and rewriting the 1% in
assembly language is ?

a.
b.
c.
d.

0.9
0.8
8
9
Show/Hide Answer
Answer = B
Explanation:Let the first case takes 100 units of time to execute. Second case will take
99 +(1/5) units of time. As the 1% coding in assembly language will take 1/5 units of
time. Hence the required percentage = 0.8*100/100 = 0.8.
10) If 99% of the program is written in FORTRAN and the remaining 1% in assembly
language the percentage increase in the execution time, compared to writing the 1% in
assembly language is ?

a.
b.
c.
d.

0.9
0.1
1
0
Show/Hide Answer
Answer = D
Explanation:In both cases the final program will have the same 99% of code in
FORTRAN and the remaining 1% in assembly language. Hence the execution time will
remain same.
- See more at: http://allquiz.blogspot.in/2012/05/multiple-choice-questions-onsoftware.html#sthash.935ONXAv.dpuf

1) Spiral Model was developed by?


a.
b.
c.
d.

a.
b.
c.
d.

Bev Littlewood
Berry Bohem
Roger Pressman
Victor Bisili

Show/Hide Answer
Answer = B
Explanation: Spiral model was developed by Berry Bohem in 1986 in his article "A Spiral
Model of Software Development and Enhancement"
2) Which model is popular for students small projects ?
Waterfall Model
Spiral Model
Quick and Fix model
Prototyping Model
Show/Hide Answer
Answer = A
Explanation: No Explanation
3) Which is not a software life cycle model?

a.
b.
c.
d.

Spiral Model
Waterfall Model
Prototyping Model
Capability maturity Model
Show/Hide Answer
Answer = D
Explanation:Capability maturity model is not a software life cycle model
4) Project risk factor is considered in ?

a.
b.
c.
d.

Spiral Model
Waterfall Model
Prototyping Model
Iterative enhancement Model
Show/Hide Answer
Answer = A
Explanation:Aim of Risk analysis phase in the spiral model is to eliminate the high risk
problems before they threaten the project operation or cost.
5) SDLC stands for ?

a.
b.
c.
d.

Software design life cycle


Software development life cycle
System design life cycle
System development life cycle
Show/Hide Answer
Answer = B
Explanation:Full form of SDLC is software development life cycle.
6) Build and Fix model has?

a.
b.
c.
d.

3
1
2
4

Phases
Phases
Phases
Phases

Show/Hide Answer
Answer = C
Explanation:Build and fix model has 2 phases one is " build " and other is " fix " .
7) SRS stands for ?

a.
b.
c.
d.

Software requirement specification


Software requirement solution
System requirement specification
None of Above
Show/Hide Answer
Answer = A
Explanation: SRS acts as a contract between the developer and the user.
8) Waterfall model is not suitable for ?

a.
b.
c.
d.

Small Projects
Complex Projects
Accommodating change
None of Above
Show/Hide Answer
Answer = C
Explanation:Waterfall model does not accommodate any change that's why this model is
used in those situations where requirements are well understood.
9) RAD stands for ?

a.
b.
c.
d.

Rapid Application Development


Relative Application Development
Ready Application Development
Repeated Application Development
Show/Hide Answer
Answer =A
Explanation:No Explanation for this question.
10) RAD Model was purposed by ?

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

IBM
Motorola
Microsoft
Lucent Technologies

Show/Hide Answer
Answer =A
Explanation:RAD Model was purposed by IBM in 1980s through the book of James Martin
entitles "Rapid Application Development"
See
more
at:
http://allquiz.blogspot.in/2012/04/multiple-choice-questions-onsoftware_22.html#sthash.g6IbykBR.dpuf 1) What is Software ?
Set of computer programs, procedures and possibly associated document concerned with
the operation of data processing.
A set of compiler instructions
A mathematical formula
None of above
Show/Hide Answer
Answer = A
Explanation: Computer software or just software, is a collection of computer programs and
related data that provides the instructions for telling a computer what to do and how to do it.
2) Which of the following is not the characteristic of software ?
Software
Software
Software
Software

does not wear out


is flexible
is not manufactured
is always correct

Show/Hide Answer
Answer = D
Explanation:A Software is not correct until it meets all the user requirements.
3) Which of the following is not a product matrix ?

a.
b.
c.
d.

Size
Reliability
Productivity
Functionality
Show/Hide Answer
Answer = C
Explanation: Software metric are used to quantitatively characterize the different
aspects of software process or software product. Product metrics are the measures for
the software product.
4)Which of the following is not a process metric ?

a.
b.
c.
d.

Productivity
Functionality
Quality
Efficiency
Show/Hide Answer
Answer = B
Explanation: Software metric are used to quantitatively characterize the different
aspects of software process or software product.Process metrics qualify the attributes of
software development and environment.
5) Efforts is measured in terms of ?

a.
b.
c.
d.

Person - Months
Persons
Rupees
Months
Show/Hide Answer
Answer = A
Explanation:Most appropriate unit of Effort is Person-Months , meaning thereby number
of persons involved for specified months
6) Infrastructure software are covered under ?

a.
b.
c.
d.

a.
b.
c.
d.

a.
b.
c.
d.

Generic Products
Customised Products
Generic and Customised Products
None of the above
Show/Hide Answer
Answer = A
Explanation:Generic products are developed for anonymous customers. The target is
generally the entire world and many copies are expected to be sold. Infrastructure
software like operating systems, compilers, word processors etc are covered under this
category.
7) Management of software development is dependent upon ?
People
Product
Process
All of above

Show/Hide Answer
Answer = D
Explanation:The management of software development is dependent upon four factors :
People, Product, Process and Project.
8) During software development which factor is most crucial ?
People
Process
Product
Project
Show/Hide Answer
Answer = A
Explanation:Software development requires good managers. The manager who can

understand the requirements of people. Hence , people are the crucial and criticle during
software development.
9) Milestones are used to ?
a.
b.
c.
d.

a.
b.
c.
d.

Know the cost of the project


Know the status of the project
Know the user expectations
None of the above

Show/Hide Answer
Answer =A
Explanation:Milestones are used to measure the process or status of the project
10) The term module in the design phase refers to ?
Functions
Procedures
Sub programs
All of the above

Show/Hide Answer
Answer =D
Explanation: All the terms have the same meaning.
- See more at: http://allquiz.blogspot.in/2012/04/multiple-choice-questions-onsoftware.html#sthash.e3gQ3R74.dpuf

Anda mungkin juga menyukai