Anda di halaman 1dari 34

1.

___runs on computer hardware and serve as platform for other softwares to run
on

Operating System

Application Software

System Software

All

2. ___ is the layer of a computer system between the hardware and the user
program

Operating environment

Operating system

System environment

None

3. The primary purpose of an operating system is ____

To make the most efficient use of the computer hardware

To allow people to use the computer

To keep systems programmers employed

To make computers easier to use

4. ____ transforms one interface into another interface

Program

Software

Data

None

5. _____ system is built directly on the hardware

Environment

System

Operating

None

6. Multiprogramming systems
Are easier to develop than single programming systems

Execute each job faster

Execute more jobs in the same time period

Are used only one large mainframe computers.

7. _______ is the first program run on a computer when the computer boots up

System software

Operating system

System operations

None

8. ________ interface consists of things like program counter, registers, interrupts


and terminals

Hardware

Software

Data

None

9. ______ shares characteristics with both hardware and software

Operating system

Software

Data

None

10. ____ is used in operating system to separate mechanism from policy

Single level implementation

Two level implementation

Multi level implementation

None
. ___runs on computer hardware and serve as platform for other softwares to run on

Operating System

Application Software

System Software

All
Ans : 1

2. ___ is the layer of a computer system between the hardware and the user
program

Operating environment

Operating system

System environment

None
Ans : 2

3. The primary purpose of an operating system is ____

To make the most efficient use of the computer hardware

To allow people to use the computer

To keep systems programmers employed

To make computers easier to use


Ans : 1

4. ____ transforms one interface into another interface

Program

Software

Data

None
Ans : 2

5. _____ system is built directly on the hardware

Environment

System

Operating

None
Ans : 3

6. Multiprogramming systems
Are easier to develop than single programming systems

Execute each job faster

Execute more jobs in the same time period

Are used only one large mainframe computers.


Ans : 3

7. _______ is the first program run on a computer when the computer boots up

System software

Operating system

System operations

None
Ans : 2

8. ________ interface consists of things like program counter, registers, interrupts


and terminals

Hardware

Software

Data

None
Ans : 1

9. ______ shares characteristics with both hardware and software

Operating system

Software

Data

None
Ans : 1

10. ____ is used in operating system to separate mechanism from policy

Single level implementation

Two level implementation

Multi level implementation

None
Ans : 2
Paper : COMPUTER BASED OBJECTIVE QUESTIONS FOR BANK PO

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a
computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a
database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers
instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same
type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the
actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

16. Computers use the ____________ language to process data.


A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet, each number and each special
character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C

20. A string of eight 0s and 1s is called a:


A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

24. The components that process data are located in the:


A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. The ____________, also called the “brains” of the computer, is responsible for
processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables your computer’s hardware
devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and
different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
36. Smaller and less expensive PC-based servers are replacing ____________ in many
businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
37. ____________ are specially designed computers that perform complex calculations
extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
39. The difference between people with access to computers and the Internet and those
without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices
on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
45. ____________ controls the way in which the computer system functions and provides a
means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
47. ____________ are specially designed computer chips that reside inside other devices,
such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
48. The steps and tasks needed to process data, such as responses to questions or clicking an
icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A

Fill in the Blank:

51. Between PCs and Macs, the ____________ is the platform of choice for graphic design
and animation.
Answer: Mac
52. The ____________ is the program that manages the hardware of the computer system,
including the CPU, memory, storage devices, and input/output devices.
Answer: operating system

53. The type of operating system software you use depends on your computer’s
____________.
Answer: platform
54. ____________software helps you carry out tasks, such as typing a document or creating
a spreadsheet.
Answer: Application
55. ____________are the fastest and most expensive computers.
Answer: Supercomputers
56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte
57. Input devices are used to provide the steps and tasks the computer needs to process data,
and these steps and tasks are called ____________.
Answer: instructions
58. A computer gathers data, processes it, outputs the data or information, and
____________ the data or information.
Answer: stores
59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)
61. The devices you use to enter data into a computer system are known as ____________
devices.
Answer: input
62. The devices on a computer system that let you see the processed information are known
as ____________ devices.
Answer: output
63. ____________ is the set of computer instructions or programs that enables the hardware
to perform different tasks.
Answer: Software
64. When you connect to the ____________, your computer is communicating with a server
at your Internet service provider (ISP).
Answer: Internet
65. ____________ are computers that excel at executing many different computer programs
at the same time.
Answer: Mainframes
66. ____________is the application of computer systems and techniques to gather legal
evidence.
Answer: Computer forensics
67. ____________ is the science that attempts to create machines that will emulate the
human thought process.
Answer: Artificial intelligence (AI)
68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs
generally run ____________ as an operating system.
Answer: Microsoft Windows
69. A process known as ____________ tracks trends and allows retailers to respond to
consumer buying patterns.
Answer: data mining
70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage
71. You would use ____________ software to create spreadsheets, type documents, and edit
photos.
Answer: application
72. ____________ are computers that support hundreds or thousands of users
simultaneously.
Answer: Mainframes
73. ____________ is the term given to the act of stealing someone’s identity and ruining
their credit rating.
Answer: Identity theft
74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers
75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and
respond to procedures just like humans.
Answer: simulators

True and False

76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.


Answer: True
77. Data can be a number, a word, a picture, or a sound.
Answer: True
78. Strictly defined, a computer is a data processing device.
Answer: True
79. The discrepancy between the “haves” and “have-nots” with regard to
computer technology is commonly referred to as the digital society.
Answer: False (digital divide)
80. One of the benefits of becoming computer fluent is being a savvy computer user and
consumer and knowing how to avoid viruses, the programs that pose threats to computer
security.
Answer: True
81. Trend-spotting programs, developed for business, have been used to predict criminal
activity.
Answer: True
82. Employers do not have the right to monitor e-mail and network traffic on employee
systems used at work.
Answer: False
83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True
84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)
85. The CPU and memory are located on a special circuit board in the system unit called the
motherboard.
Answer: True
86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True

87. The main difference between a supercomputer and a mainframe is that supercomputers
are designed to execute a few programs as quickly as possible, whereas mainframes are
designed to handle many programs running at the same time (but at a slower pace).
Answer: True
88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False
89. Embedded computers are self-contained computer devices that have their own
programming and do not receive input.
Answer: True
90. A Web browser is a special device that is installed in your computer that allows it to
communicate with other devices on a network.
Answer: False (network adapter)
91. With a wireless network, it is easier to relocate devices.
Answer: True
92. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)

Matching:
93. Match the following terms with their approximate size:
I. kilobyte A. one million bytes
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E

94. Match the following terms with their meanings:


I. printer A. storage device
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A

95. Match the following terms with their meanings:


I. mainframe A. the most expensive computers that perform complex calculations extremely
rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a
network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands
of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions
such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B

96. Match the following terms with their meanings:


I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the
computer system functions
Answer: D, C, E, A, B

97. Match the following terms with their meanings:


I. system software A. the set of programs that enables computer hardware devices and
application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E

98. Match the following terms with their meanings:


I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A

99. Match the following terms with their meanings:


I. bit A. the science revolving around the use of nanostructures to build devices on an
extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A

100. Match the following fields to the related computer technology:


I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E

1. Which of the command is used to remove files ?


a. erase
b. rm
c. delete
d. dm

Ans: b

2. Which of the following command is used to count just the number


of lines contained in a file ?
a. wc-1
b. wc-w
c.wc-c
d. wc-r

Ans: a

3. Which command is used to copy a file wb with the same name


from the programs directory to the misc. directory ?
a. copy programs/wb misc/wb
b. cp programs/wb misc
c. copy a:programs/wb b:misc/wb
d. tar programs/wb misc/wb

Ans: b

4. The commonly used UNIX commands like date, Is, cat, etc. are
stored in
a. /dev directory
b. /bin and /usr/bin directories
c. /unix directory
d. /tmp directory

Ans: b

5. Which of the following directories contain all the files created by a


user, including his login directory ?
a. /tmp
b. /usr
c. /etc
d. /dev

Ans: b

6. Which command is used to copy the three files wb, colllect and
mon into the misc directory, under the same, when you were
currently in the programs directory ?
a. copy wb collect mon/misc
b. cp wb collect mon ../misc
c. copy wb ../misc collect ../misc mon ../misc
d. tar wb collect mon/misc

Ans: b

7. Which of the following command is used to display the directory


attributes rather than its contents ?
a. 1s-1-d
b. Is-x
c. Is-1
d. is-F

Ans: a
8. Which command is used to remove a directory
a. rd
b. dldir
c. rmdir
d. rdir

Ans: c

9. Which command is used to list out all the hidden files along with
the other files ?
a. Is-1
b. Is-F
c. Is-x
d Is-a

Ans: d

10. The file that contains a set of instructions which are performed
when a user logs in, is
a) .exrc
b) .profile
c) autoexec.bat
d) .autoexec

Ans: b

PS Exam





Search

• Home
• MCQ Quiz
• MCQ Bank
• Class Notes
• Contact Us

Data structures & Algorithms - Multiple Choice


Questions (MCQs) - Objective Set 2
Multiple Choice Questions (MCQs) - Data Structures and Algorithms

Following are the multiple choice questions (MCQs) or objective questions from
Data Structures and Algorithms. The questions are set from the topics such as
arrays, records, pointers, linked lists, stacks, queues, recursion, trees, sorting
and searching.

Set - 2
1. The memory address of the first element of an array is called

a. floor address
b. foundation address
c. first address
d. base address

2. The memory address of fifth element of an array can be calculated by the


formula

a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words


per memory cell for the array
b. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of
words per memory cell for the array
c. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of
words per memory cell for the array
d. None of above
3. Which of the following data structures are indexed structures?

a. linear arrays
b. linked lists
c. both of above
d. none of above

4. Which of the following is not the required condition for binary search
algorithm?

a. The list must be sorted


b. there should be the direct access to the middle element in any sublist
c. There must be mechanism to delete and/or insert elements in list
d. none of above

5. Which of the following is not a limitation of binary search algorithm?

a. must use a sorted array


b. requirement of sorted array is expensive when a lot of insertion and deletions
are needed
c. there must be a mechanism to access middle element directly
d. binary search algorithm is not efficient when the data elements are more than
1000.

6. Two dimensional arrays are also called

a. tables arrays
b. matrix arrays
c. both of above
d. none of above

7. A variable P is called pointer if

a. P contains the address of an element in DATA.


b. P points to the address of first element in DATA
c. P can store only memory addresses
d. P contain the DATA and the address of DATA

8. Which of the following data structure can't store the non-homogeneous data
elements?

a. Arrays
b. Records
c. Pointers
d. None

9. Which of the following data structure store the homogeneous data elements?

a. Arrays
b. Records
c. Pointers
d. None

10. Each data item in a record may be a group item composed of sub-items;
those items which are indecomposable are called

a. elementary items
b. atoms
c. scalars
d. all of above

11. The difference between linear array and a record is

a. An array is suitable for homogeneous data but hte data items in a record may
have different data type
b. In a record, there may not be a natural ordering in opposed to linear array.
c. A record form a hierarchical structure but a lienear array does not
d. All of above

12. Which of the following statement is false?

a. Arrays are dense lists and static data structure


b. data elements in linked list need not be stored in adjecent space in memory
c. pointers store the next data element of a list
d. linked lists are collection of the nodes that contain information part and next
pointer

13. Binary search algorithm can not be applied to

a. sorted linked list


b. sorted binary trees
c. sorted linear array
d. pointer array
14. When new data are to be inserted into a data structure, but there is no
available space; this situation is usually called

a. underflow
b. overflow
c. housefull
d. saturated

15. The situation when in a linked list START=NULL is

a. underflow
b. overflow
c. housefull
d. saturated

16. Which of the following is two way list?

a. grounded header list


b. circular header list
c. linked list with header and trailer nodes
d. none of above

17. Which of the following name does not relate to stacks?

a. FIFO lists
b. LIFO list
c. Piles
d. Push-down lists

18. The term "push" and "pop" is related to the

a. array
b. lists
c. stacks
d. all of above

19. A data structure where elements can be added or removed at either end but
not in the middle

a. Linked lists
b. Stacks
c. Queues
d. Deque

20. When inorder traversing a tree resulted E A C K F H D B G; the preorder


traversal would return

a. FAEKCDBHG
b. FAEKCDHGB
c. EAFKHDCBG
d. FEAKDCHBG

Answers
1. The memory address of the first element of an array is called
d. base address

2. The memory address of fifth element of an array can be calculated by the


formula
a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words
per memory cell for the array

3. Which of the following data structures are indexed structures?


a. linear arrays

4. Which of the following is not the required condition for binary search
algorithm?
c. There must be mechanism to delete and/or insert elements in list

5. Which of the following is not a limitation of binary search algorithm?


d. binary search algorithm is not efficient when the data elements are more than
1000.

6. Two dimensional arrays are also called


c. both of above

7. A variable P is called pointer if


a. P contains the address of an element in DATA.

8. Which of the following data structure can't store the non-homogeneous data
elements?
a. Arrays

9. Which of the following data structure store the non-homogeneous data


elements?
b. Records

10. Each data item in a record may be a group item composed of sub-items;
those items which are indecomposable are called
d. all of above

11. The difference between linear array and a record is


d. All of above

12. Which of the following statement is false?


c. pointers store the next data element of a list

13. Binary search algorithm can not be applied to


a. sorted linked list

14. When new data are to be inserted into a data structure, but there is no
available space; this situation is usually called
b. overflow

15. The situation when in a linked list START=NULL is


a. underflow

16. Which of the following is two way list?


d. none of above

17. Which of the following name does not relate to stacks?


a. FIFO lists

18. The term "push" and "pop" is related to the


c. stacks

19. A data structure where elements can be added or removed at either end but
not in the middle
d. Deque

20. When inorder traversing a tree resulted E A C K F H D B G; the preorder


traversal would return
b. FAEKCDHGB

< Prev Next >

PS Exam





Search

• Home
• MCQ Quiz
• MCQ Bank
• Class Notes
• Contact Us

Data structures & Algorithms - Multiple Choice


Questions (MCQs) - Objective Set 1
Multiple Choice Questions (MCQs) - Data Structures and Algorithms
Following are the multiple choice questions (MCQs) or objective questions from
Data Structures and Algorithms. The questions are set from the topics such as
arrays, records, pointers, linked lists, stacks, queues, recursion, trees, sorting
and searching.

Set - 1
1. Two main measures for the efficiency of an algorithm are
a. Processor and memory
b. Complexity and capacity
c. Time and space
d. Data and space

2. The time factor when determining the efficiency of algorithm is measured by


a. Counting microseconds
b. Counting the number of key operations
c. Counting the number of statements
d. Counting the kilobytes of algorithm

3. The space factor when determining the efficiency of algorithm is measured by


a. Counting the maximum memory needed by the algorithm
b. Counting the minimum memory needed by the algorithm
c. Counting the average memory needed by the algorithm
d. Counting the maximum disk space needed by the algorithm

4. Which of the following case does not exist in complexity theory


a. Best case
b. Worst case
c. Average case
d. Null case

5. The Worst case occur in linear search algorithm when


a. Item is somewhere in the middle of the array
b. Item is not in the array at all
c. Item is the last element in the array
d. Item is the last element in the array or is not there at all

6. The Average case occur in linear search algorithm


a. When Item is somewhere in the middle of the array
b. When Item is not in the array at all
c. When Item is the last element in the array
d. When Item is the last element in the array or is not there at all

7. The complexity of the average case of an algorithm is


a. Much more complicated to analyze than that of worst case
b. Much more simpler to analyze than that of worst case
c. Sometimes more complicated and some other times simpler than that of worst
case
d. None or above

8. The complexity of linear search algorithm is


a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)

9. The complexity of Binary search algorithm is


a. O(n)
b. O(log )
c. O(n2)
d. O(n log n)
10. The complexity of Bubble sort algorithm is
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)

11. The complexity of merge sort algorithm is


a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)

12. The indirect change of the values of a variable in one module by another
module is called
a. internal change
b. inter-module change
c. side effect
d. side-module update

13. Which of the following data structure is not linear data structure?
a. Arrays
b. Linked lists
c. Both of above
d. None of above

14. Which of the following data structure is linear data structure?


a. Trees
b. Graphs
c. Arrays
d. None of above

15. The operation of processing each element in the list is known as


a. Sorting
b. Merging
c. Inserting
d. Traversal

16. Finding the location of the element with a given value is:
a. Traversal
b. Search
c. Sort
d. None of above

17. Arrays are best data structures


a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly
changing
c. for both of above situation
d. for none of above situation

18. Linked lists are best suited


a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly
changing
c. for both of above situation
d. for none of above situation

19. Each array declaration need not give, implicitly or explicitly, the information
about
a. the name of array
b. the data type of array
c. the first data from the set to be stored
d. the index set of the array

20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and
the addresses of other elements can be calculated
b. the architecture of computer memory does not allow arrays to store other than
serially
c. both of above
d. none of above

Answers
1. Two main measures for the efficiency of an algorithm are
c. Time and space

2. The time factor when determining the efficiency of algorithm is measured by


b. Counting the number of key operations
3. The space factor when determining the efficiency of algorithm is measured by
a. Counting the maximum memory needed by the algorithm

4. Which of the following case does not exist in complexity theory


d. Null case

5. The Worst case occur in linear search algorithm when


d. Item is the last element in the array or is not there at all

6. The Average case occur in linear search algorithm


a. When Item is somewhere in the middle of the array

7. The complexity of the average case of an algorithm is


a. Much more complicated to analyze than that of worst case

8. The complexity of linear search algorithm is


a. O(n)

9. The complexity of Binary search algorithm is


b. O(log n)

10. The complexity of Bubble sort algorithm is


c. O(n2)

11. The complexity of merge sort algorithm is


d. O(n log n)

12. The indirect change of the values of a variable in one module by another
module is called
c. side effect

13. Which of the following data structure is not linear data structure?
d. None of above

14. Which of the following data structure is linear data structure?


c. Arrays

15. The operation of processing each element in the list is known as


d. Traversal

16. Finding the location of the element with a given value is:
b. Search

17. Arrays are best data structures


a. for relatively permanent collections of data
18. Linked lists are best suited
b. for the size of the structure and the data in the structure are constantly
changing

19. Each array declaration need not give, implicitly or explicitly, the information
about
c. the first data from the set to be stored

20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and
the addresses of other elements can be calculated

< Prev

Related Links
Subscribe
Wish to get contents in your Email?

Enter your email address:

Join PS Exam

Sharing Enriches!
Who's Online
We have 25 guests online
Popular Articles
• Computer Fundamentals - Objective Questions (MCQ) with Solutions and
Explanations - Set 1
• Data structures & Algorithms - Multiple Choice Questions (MCQs) -
Objective Set 2
• MS-Word-Objective Questions (MCQ) with Solutions and Explanations -
Set 1
• Computer Fundamentals - Objective Questions (MCQ) with Solutions - Set
10
• MS-Excel Objective Questions (MCQ) with Solutions and Explanations -
Set 1
Main Menu
• Home
• Blog
• MCQ Quiz
• MCQ Bank
• New Things in IT
• Class Notes and Others
• Downloads
• Contact Us
• Subscribe Free Feeds
• Privacy Policy

For Computer Officer

Computer Officer Preparation

• Write a recursive function in C++ to verify if a given string is palindrome or


not
• C++ Lecture Videos : Programming Abstractions
• C++ MCQs and Interview Questions
• Download C, C++ Notes
• Programming Paradigms

Subscribe to this Feed

Subscribe to RSS headline updates from:


Powered by FeedBurner

PS Exam on Facebook

You are here: MCQ Bank Data Structures and Algorithms Data structures &
Algorithms - Multiple Choice Questions (MCQs) - Objective Set 1


• Top

Privacy Policy | Feeds | Contact Us | NUPT Photos

PS Exam is all about Computer Science and Computer Jobs Exam Preparation, for
those who are pursuing Career in Information Technology Field!

Our revenue source is advertisements and provide you Free Multiple Choice
Questions, Free Quizes, Ebooks and Class Notes, Questions and Answers,
Resources to help you prepare better, all for FREE. This site uses Google
Adsense and other third party advertisements. The links with double underline are
advertisements from Infolinks.

Did you know that your Internet


Explorer 6 (IE6) is out of date?
This template is compatible with IE6, however your experience will be
enhanced with a newer browser.

To get the best possible experience using our website we recommend that
you upgrade to a newer version or other web browser. A list of the most
popular web browsers can be found below





Do not show this message again

Anda mungkin juga menyukai