Computer Science Study Materials for Competitive Exams

Sample Questions, Previous Year Solved Papers, Study Materials For Competitive Examinations Like UGC NET, SET And GATE Computer Science.

Sunday, 24 May 2015

1.       The statement char ch = ‘Z’ would store in ch :
(A) The character Z
(B) ASCII value of Z
(C) Z along with the single inverted commas
(D) Both (A) and (B)
Answer: B
2.       Which of the following is NOT a character constant?
(A) ‘Thank You’
(B) ‘Enter values of P, N, R’
(C) ‘23.56E-03’
(D) All the above
Answer: D
3.       The maximum value that an integer constant can have is .................
(A) -32767
(B) 32767
(C) 1.7014e+38
(D) –1.7014e+38
Answer: B
4.       A C variable cannot start with .............
(A) An alphabet
(B) A number
(C) A special symbol other than underscore
(D) Both (B) & (C) above
Answer: D
5.       Which of the following statement is wrong ?
(A) mes = 123.56;
(B) con = 'T' * 'A';
(C) this = 'T' * 20;
(D) 3 + a = b;
Answer: D

6.       Which of the following shows the correct hierarchy of arithmetic operators in C ?
(A) **, * or /, + or -
(B) **, *, /, +, -
(C) **, /, *, +, -
(D) / or *, - or +
Answer: D
7.       In b = 6.6 / a + 2 * n; which operation will be performed first?
(A) 6.6 / a           (B) a + 2
(C) 2 * n             (D) Depends upon compiler
Answer: D
8.       Which of the following is allowed in a C Arithmetic instruction?
(A) [ ]      (B) { }
(C) ( )      (D) None of the above
Answer: C
9.       Which of the following statements is false ?
(A) Each new C instruction has to be written on a separate line
(B) Usually all C statements are entered in small case letters
(C) Blank spaces may be inserted between two words in a C statement
(D) Blank spaces cannot be inserted within a variable name
Answer: A
10.    If a is an integer variable, a = 5/2; will return a value
(A) 2.5    (B) 3
(C) 2       (D) 0
Answer: C

Thursday, 7 May 2015

41.       The main objective of designing various modules of a software system is:
(A) To decrease the cohesion and to increase the coupling
(B) To increase the cohesion and to decrease the coupling
(C) To increase the coupling only
(D) To increase the cohesion only
Answer: B
42.       Three essential components of a software project plan are:
(A) Team structure, Quality assurance plans, Cost estimation
(B) Cost estimation, Time estimation, Quality assurance plan
(C) Cost estimation, Time estimation, Personnel estimation
(D) Cost estimation, Personnel estimation, Team structure
Answer: B
43.       Reliability of software is dependent on:
(A) Number of errors present in software
(B) Documentation
(C) Testing suties
(D) Development Processes
Answer: A
44.       In transform analysis, input portion is called:
(A) Afferent branch                 (B) Efferent branch
(C) Central Transform             (D) None of the above
Answer: A
45.       The Function Point (FP) metric is:
(A) Calculated from user requirements
(B) Calculated from Lines of code
(C) Calculated from software’s complexity assessment
(D) None of the above
Answer: C

46.       Data Mining can be used as ................. Tool.
(A) Software     (B) Hardware
(C) Research    (D) Process
Answer: C
47.       The processing speeds of pipeline segments are usually:
(A) Equal           (B) Unequal
(C) Greater        (D) None of these
Answer: B
48.       The cost of a parallel processing is primarily determined by:
(A) Time complexity    
(B) Switching complexity
(C) Circuit complexity
(D) None of the above
Answer: B
49.       A data warehouse is always ....................
(A) Subject oriented    (B) Object oriented
(C) Program oriented (D) Compiler oriented
Answer: A
50.    The term 'hacker' was originally associated with:
(A) A computer program
(B) Virus
(C) Computer professionals who solved complex computer problems.
(D) All of the above
Answer: C

31.       Which activity is not included in the first pass of two pass assemblers?
(A) Build the symbol table
(B) Construct the intermediate code
(C) Separate mnemonic opcode and operand fields
(D) None of the above
Answer: D
32.       Which of the following is not collision resolution technique?
(A) Hash addressing   (B) Chaining
(C) Both (A) and (B)    (D) Indexing
Answer: D
33.       Code optimization is responsibility of:
(A) Application programmer  
(B) System programmer
(C) Operating system             
(D) All of the above
Answer: B
34.       Which activity is included in the first pass of two pass assemblers?
(A) Build the symbol table
(B) Construct the intermediate code
(C) Separate mnemonic opcode and operand fields
(D) None of these
Answer: A,B,C
35.       In two pass assembler the symbol table is used to store:
(A) Label and value    (B) Only value
(C) Mnemonic              (D) Memory Location
Answer: D
36.       Semaphores are used to:
(A) Synchronise critical resources to prevent deadlock
(B) Synchronise critical resources to prevent contention
(C) Do I/o
(D) Facilitate memory management
Answer: A
37.       In which of the following storage replacement strategies, is a program placed in the largest available hole in the memory?
(A) Best fit         (B) First fit
(C) Worst fit       (D) Buddy
Answer: C
38.       Remote computing system involves the use of timesharing systems and:
(A) Real time processing        (B) Batch processing
(C) Multiprocessing                 (D) All of the above
Answer: B
39.       Non modifiable procedures are called
(A) Serially useable procedures      
(B) Concurrent procedures
(C) Reentrant procedures                 
(D) Topdown procedures
Answer: C
40.    Match the following
(a) Disk scheduling                 (1) Round robin
(b) Batch processing               (2) Scan
(c) Time sharing                       (3) LIFO
(d) Interrupt processing          (4) FIFO
(A) a-3, b-4, c-2, d-1    
(B) a-4, b-3, c-2, d-1
(C) a-2, b-4, c-1, d-3   
(D) a-3, b-4, c-1, d-2
Answer: C

21.       What item is at the root after the following sequence of insertions into an empty splay tree:
1, 11, 3, 10, 8, 4, 6, 5, 7, 9, 2 ?
(A) 1       (B) 2
(C) 4       (D) 8
Answer: B
22.       Suppose we are implementing quadratic probing with a Hash function, Hash (y)=X mode 100. If an element with key 4594 is inserted and the first three locations attempted are already occupied, then the next cell that will be tried is:
(A) 2       (B) 3
(C) 9       (D) 97
Answer: D
23.       Weighted graph:
(A) Is a bi-directional graph
(B) Is directed graph
(C) Is graph in which number associated with arc
(D) Eliminates table method
Answer: C
24.       What operation is supported in constant time by the doubly linked list, but not by the singly linked list?
(A) Advance     (B) Backup
(C) First                         (D) Retrieve
Answer: B
25.       How much extra space is used by heap sort?
(A) O(1)              (B) O(Log n)
(C) O(n)             (D) O(n2)
Answer: A
26.       Error control is needed at the transport layer because of potential error occurring ..............
(A) from transmission line noise      
(B) in router
(C) from out of sequence delivery   
(D) from packet losses
Answer: B
27.       Making sure that all the data packets of a message are delivered to the destination is ................ control.
(A) Error             (B) Loss
(C) Sequence (D) Duplication
Answer: A
28.       Which transport class should be used with a perfect network layer?
(A) TP0 and TP2          (B) TP1 and TP3
(C) TP0, TP1, TP3       (D) TP0, TP1, TP2, TP3, TP4
Answer: A
29.       Which transport class should be used with residual-error network layer?
(A) TP0, TP2                 (B) TP1, TP3
(C) TP1, TP3, TP4       (D) TP0, TP1, TP2, TP3, TP4
Answer: B
30.    Virtual circuit is associated with a ..................... service.
(A) Connectionless     (B) Error-free
(C) Segmentation        (D) Connection-oriented
Answer: D

11.       Suppose x and y are two Integer Variables having values 0x5AB6 and 0x61CD respectively. The result (in hex) of applying bitwise operator AND to x and y will be:
(A) 0x5089        (B) 0x4084
(C) 0x78A4       (D) 0x3AD1
Answer: B
0x5AB6=0101 1010 1011 0110
0x61CD=0110 0001 1100 1101
AND     =0100 0000 1000 0100
              = 0x4084
12.       Consider the following statements,
int i=4, j=3, k=0;
k=++i - --j + i++ - --j +j++; What will be the values of i, j and k after the statement.
(A) 7, 2, 8           (B) 5, 2, 10
(C) 6, 2, 8          (D) 4, 2, 8
Answer: C
13.       What is the value of the arithmetic expression (Written in C)
2*3/4-3/4* 2
(A) 0       (B) 1
(C) 1.5    (D) None of the above
Answer: B
14.       A function object:
(A) is an instance of a class for which operator () is a member function.
(B) is an instance of a class for which operator → is a member function.
(C) is a pointer to any function
(D) is a member function of a class
Answer: A
15.       Polymorphism means:
(A) A template function
(B) Runtime type identification within a class hierarchy
(C) Another name for operator overloading
(D) Virtual inheritance
Answer: B
16.       The E-R model is expressed in terms of:
(i) Entities
(ii) The relationship among entities
(iii) The attributes of the entities
(A) (i) and (iii)  
(B) (i), (ii) and (iii)
(C) (ii) and (iii)
(D) None of the above
Answer: B
17.       Specialization is a ............... process.
(A) Top - down             (B) Bottom -Up
(C) Both (A) and (B)    (D) None of the above
Answer: A
18.       The completeness constraint has rules:
(A) Supertype, Subtype
(B) Total specialization, Partial specialization
(C) Specialization, Generalization
(D) All of the above
Answer: B
19.       The entity type on which the ................. type depends is called the identifying owner.
(A) Strong entity           (B) Relationship
(C) Weak entity            (D) E - R
Answer: C
20.    Match the following:
(i) 5 NF              (a) Transitive dependencies eliminated
(ii) 2 NF                         (b) Multivalued attribute removed
(iii) 3 NF            (c) Contains no partial functional dependencies
(iv) 4 NF            (d) Contains no join dependency
(A) i-a, ii-c, iii-b, iv-d    
(B) i-d, ii-c, iii-a, iv-b
(C) i-d, ii-c, iii-b, iv-a   
(D) i-a, ii-b, iii-c, iv-d
Answer: B