Computer Science Study Materials for Competitive Exams

Sample Questions, Previous Year Solved Papers, Study Materials For Competitive Examinations Like UGC NET, SET And GATE Computer Science.

Friday, 18 December 2015

1.       Which one of the following software applications would be the most appropriate for performing numerical and statistical calculations?
(A) Database                            (B) Document processor
(C) Graphics package             (D) Spreadsheet
Answer: D
2.       In order to save an existing document with a different name you need to …………
(A) Retype the document and give it a different name
(B) Use the Save as... command
(C) Copy and paste the original document to a new document and then save
(D) Use Windows Explorer to copy the document to a different location and then 
rename it
Answer: B
3.       What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer?
(B) Assembling                        (B) Compiling
(C) Translating             (D) Uploading
Answer: B
4.       To access properties of an object, the mouse technique to use is:
(A) right-clicking          (B) shift-clicking
(C) dragging                 (D) dropping
Answer: A
5.       What type of resource is most likely to be a shared common resource in a computer network?
(A) keyboards               (B) speakers
(C) floppy disk drives (D) printers
Answer: D
6.       To "maximize" a window means to ……….....
(A) fill it to capacity                  (B) expand it to fit the desktop
(C) put only like files inside   (D) drag it to the Recycle Bin
Answer: B
7.       The "home page" of a web site is …………….
(A) the largest page     (B) the last page
(C) the first page          (D) the most colorful page
Answer: C
8.       A personal computer is
(A) MC               (B) SC
(C) YC               (D) PC
Answer: D
9.       Saving is the process of ………….
(A) copying a document from memory to a storage medium
(B) making changes to a document's existing content
(C) changing the appearance, or overall look, of a document
(D) developing a document by entering text using a keyboard
Answer: A
10.    To find a saved document in the computer's memory and bring it up on the screen to view.
(A) reverse        (B) rerun
(C) retrieve        (D) return
Answer: C


Wednesday, 16 December 2015

1.       The receive equalizer reduces delay distortions using a ...............
(A) tapped delay lines             (B) gearshift
(C) descrambler                       (D) difference engine
Answer: A
2.       While transmitting odd-parity coded symbols, the number of zeros in each symbol is:
(A) odd                           (B) even
(C) Both (A) and (B)    (D) unknown
Answer: D
3.       The program that accepts the commands for composing, receiving and replying to messages, as well as for manipulating mail boxes is .....................
(A) user agent                          (B) browser agent
(C) message transfer agent   (D) server agent
Answer: A
4.       A file is being transferred. The time required actually is 6- hours. The mean time between crashes is 2-hours. The time required for the transfer is hours if synchronization is not provided.
(A) 12 hours     (B) 3 hours
(C) Zero hours             (D) Infinite
Answer: D
5.       The parameter which gives the probability of the transport layer itself spontaneously terminating a connection due to internal problems is called ...............
(A) protection                (B) resilience
(C) option negotiation (D) transfer failure
Answer: B

6.       .................... type of multiplexing are used by transport layer to improve transmission efficiency.
(A) upward        (B) downward
(C) horizontal   (D) vertical
Answer: A
7.       Multiplexing of different transport connections onto the same network connection is called ................
(A) Upward multiplexing        (B) Downward multiplexing
(C) Congestion control           (D) Flow control
Answer: A
8.       Window size in TCP header indicates ................
(A) number of bytes the receiver is willing to accept
(B) number of bytes the sender is willing to accept
(C) number of bytes the sender transmitting in each segment
(D) number of bytes in the receiver
Answer: B
9.       The size of the TCP congestion window depends on .................
(A) bandwidth                          (B) retransmission time
(C) threshold parameter         (D) traffic
Answer: C
10.    The FIN bit in the TCP header represents .................
(A) establish connection        (B) release a connection
(C) data transfer                       (D) None of these
Answer: B


Monday, 14 December 2015

1.       Which IEEE 802 standard provides for a collision-free protocol?
(A) 802.2           (B) 892.3
(C) 802.1           (D) 802.5
Answer: D
2.       In Token Ring, Which of the following is not a transceiver function ?
(A) Transmission and receipt of data
(B) Checking of line voltages
(C) Addition and subtraction of header
(D) Collision
Answer: C
3.       When the receiver sees five consecutive incoming '1' bits followed by a '0' bit it automatically destuffs ................... in bit stuffing.
(A) '1' bit                        (B) '0' bit
(C) '01' bit          (D) '10' bit
Answer: B
4.       If source machine sends independent frames to destination machine without having acknowledgment, this service is .................
(A) Unacknowledged connection oriented
(B) Unacknowledged connection less
(C) Acknowledged connection oriented
(D) Acknowledged connection less
Answer: A
5.       ATM multiplexes cells using .................
(A) asynchronous FDM          (B) synchronous FDM
(C) asynchronous TDM          (D) synchronous TDM
Answer: C

6.       Which AAL type is designed to support a data stream that has a constant bit rate?
(A) AAL1           (B) AAL2
(C) AAL3/4        (D) AAL5
Answer: A
7.       SEND and RECEIVE primitives are called as ................. primitives.
(A) blocking                  (B) non blocking
(C) data transfer           (D) error control
Answer: A
8.       CONNECT and DISCONNECT primitives are called as ..................... primitives.
(A) blocking                  (B) non blocking
(C) data transfer           (D) error control
Answer: B
9.       The end points of a transport connection are called .....................
(A) TSAPs         (B) AAL -SAPs
(C) NSAPs        (D) PSAPs
Answer: A
10.    Which of the following are session layer check points?
(A) allow just a portion of a file to be resent
(B) detect and recover errors
(C) control the addition of headers
(D) are involved in dialog control
Answer: A


Thursday, 10 December 2015

1.       BSC stands for ..................
(A) Binary synchronous control
(B) Binary synchronous communication
(C) Bit-oriented synchronous communication
(D) Byte-oriented synchronous communication
Answer: B
2.       HDLC is an acronym for ....................
(A) high - duplex line communication
(B) high -level data link control
(C) half - duplex digital link combination
(D) host double level circuit
Answer: B
3.       Decryption and Encryption of data are the responsibility of which of the following layer?
(A) Session layer         (B) Network layer
(C) Transport layer      (D) Presentation layer
Answer: D
4.       The components in the domain name space are separated by ....................
(A) Comma       (B) Dot
(C) Colon          (D) Semi colon
Answer: B
5.       ............... protocol is used for constant bit rate.
(A) AAL1           (B) AAL2
(C) AAL ¾         (D) AAL5
Answer: A

6.       In ATM network ................. message is used by a source host to set up a connection.
(A) SET UP                   (B) Call PROCEEDING
(C) CONNECT             (D) RELEASE
Answer: A
7.       How many class A, B and C networks IDs can exist?
(A) 2,113,658    (B) 16,382
(C) 126              (D) 128
Answer: A
8.       Which of the following TCP/IP internet protocol, a diskless machine uses to obtain its IP address from a server?
(A) RDP             (B) ARP
(C) RARP          (D) RIP
Answer: C
9.       A single transport layer connection split and connects the different network connections is called .........................
(A) Upward multiplexing        (B) Downward multiplexing
(C) Congestion control           (D) None of these
Answer: B
10.    What type of addressing is specifically used by the transport layer?
(A) station address      (B) application program port address
(C) dialog address       (D) network address
Answer: B


Tuesday, 8 December 2015

1.       Which type of memory gets lost when you switch off ?
(A) ROM            (B) RAM
(C) Cache         (D) Dynamic
Answer: B
2.       What is the name of the program that controls the computer?
(A) The Operating System     (B) An Application Program
(C) A Browser                           (D) The File Manager
Answer: A
3.       What is the storage capacity of a CD ROM?
(A) 700 MB                    (B) 500 MB
(C) 7000 MB                 (D) 4.7 GB
Answer: A
4.       What is the storage capacity of a DVD?
(A) 700 MB                    (B) 500 MB
(C) 7000 MB                 (D) 4.7 GB
Answer: D
5.       CPU stands for
(A) Computer Processing Unit          (B) Central Processing Unit
(C) Computer Protection Unit                        (D) Central Processing Upload
Answer: B
6.       The………….. of a system includes the programs or instructions.
(A) hardware                (B) icon
(C) information             (D) software
Answer: D
7.       Text in a column is generally aligned ………………..
(A) justified       (B) right
(C) centre          (D) left
Answer: D
8.       Back up of the data files will help to prevent ………………
(A) loss of confidentiality       (B) duplication of data
(C) loss of data                         (D) virus infection
Answer: C
9.       The background of any Word document …………….
(A) is always white color
(B) is the color you preset under the Option menu
(C) is always the same for the entire document
(D) can have any color you choose
Answer: D
10.    The benefit of using computers is that …………….
(A) Computers are very fast and can store huge amounts of data
(B) Computers provide accurate output even when input is incorrect
(C) Computers are designed to be inflexible
(D) All of the above
Answer: A


Friday, 4 December 2015

1.       The problem of a station not being able to detect a potential competitor for the medium because it thinks that there is activity between them is called .....................
(A) Exposed Station Problem            (B) Collision Avoidance Problem
(C) Hidden Station Problem              (D) Access Grant Problem
Answer: A
2.       Protocols in which stations listen for a carrier and act accordingly are ..................
(A) ALOHA                    (B) Multiple access
(C) Station Model        (D) CSMA
Answer: D
3.       What is the port number for (Trivial File Transfer Protocol) TFTP?
(A) 65                 (B) 67
(C) 63                 (D) 69
Answer: D
4.       What is the port number for Gopher services?
(A) 23                 (B) 70
(C) 80                 (D) 71
Answer: B
5.       Firewalls are used for ................
(A) routing         (B) security
(C) tunnelling   (D) congestion control
Answer: B

6.       To translate the message semantics from one format to other, ............... is used.
(A) application gateway          (B) transport gateway
(C) session gateway               (D) network gateway
Answer: A
7.       The routing algorithm within each network is ..................
(A) Routing information protocol      (B) Exterior gateway protocol
(C) Interior gateway protocol             (D) Middle gateway protocol
Answer: C
8.       Fragmentation means ...................
(A) adding of small packets to form large packet
(B) breaking large packet into small packets
(C) combining large packets in to a single packet
(D) forwarding a packet through different networks
Answer: B
9.       Bridges are used at ................ layer.
(A) Physical layer        (B) MAC layer
(C) Network                  (D) Transport
Answer: B
10.    Routers are used at ................. layer.
(A) Physical layer        (B) MAC layer
(C) Network                  (D) Transport
Answer: C