Miscellaneous Computer Science MCQs Objective Question and Answer

Miscellaneous Computer Science MCQs Objective Question and Answer

Computer Science

  Previous Year Computer Science Exam Top 50 MCQs (Most Important)

  1. The term  “PUSH”    and  “POP”  Is related to the.
  2. Array
  3. Lists
  4. Stacks
  5. All of the above
  6. None of the above

Ans:= 3

  1. A string of eight 0s and 1s is called a:
  2. megabyte.
  3. B. byte.
  4. Kilobyte

Answer: B

  1. Easily reloctable language is
    1. Machine language
    2. Assembly language
    3. High level language
    4. Medium level language
    5. Low level language

Ans:= 2

  1. One of the main feature that distinguish microprocessors from micro- computers is
    1. Words are usually larger in microprocessors
    2. Words are shorter than microprocessors
  1. Microprocessors does not contain I/O devices
  2. Exactly the same as the machine cycle tim
  3. None of the above

Ans:= 3

  1. DPI stands for
    1. Desktop projection ink
    2. Dot per inch
    3. Dotmatricks printer ink
    4. Desktop pixel inch
    5. None of these

Ans:= 2

  1. Computers use the            language      to      process     
  2.   A. processing
  3. kilobyte
  4. binary representational

Answer: C

  1. File record length
    1. Should always be fixed
    2. Should always be variable
    3. Depends upon the the size of file
    4. Should be chosen to match the data characteristics
    5. None of the above

Ans:= 4

  1. …………….. is the time required by a sector to reach below read/write heat
  2. Seek time
  3. Latency time
  4. Access time
  5. None
  6. None of the above

Ans:= 2

  1. ……………… is a technique of improving the priority of process waiting in queue for CPU allocation
    1. Starvation
    2. Ageing
    3. Revocation
    4. Relocation
    5. None of the above

 

Ans:= 2

  1. A grammar for a programming language is a formal description
    1. Syntax
  2. Semantics
  3. Structure
  4. Code
  5. None of the above

Ans:= 3

  1. All of the following are examples of real security and privacy risks EXCEPT: hackers.
  2. identity

Answer: B

  1. The Memory allocation scheme

Subject  to “external” fragmentation  is.

  1. Segmentation
  2. Swapping
  3. Pure Demand paging
  4. Multiple fixed contiguous 
  5. None of the these

Ans:= 1

  1. Virtual Memory is.
  2. simple to implement
  3. used in all major commercial operating System
  4. less efficient in utilization of memory
  5. useful when fast I/O devices are not available.
  6. None of these

Ans:= 2

  1. Before proceeding with its execution each process must acquire all the resources it needs is called.
  2. Hold and wait
  3. No Pre-emption
  4. circular wait
  5. Starvation
  6. None of these

Ans:= 1

  1. The main reason to encrypt a  file  is to
  2. Reduce its size
  3. Secure it for transmission
  4. Prepare it for backup
  5. Include it in start-up sequence
  6. None of these

Ans:= 2

  1. “LRU” page replacement policy is .
  2. last Replaced Unit
  3. Least Restored Unit
  4. Least Recently Used
  5. Least Required Unit
  6. None of these

Ans:= 3

  1. Which of   the   Following  is   not   a fundamental process state.
  2. ready
  3. terminated
  4. executing
  5. blocked
  6. none of these

Ans:= 4

  1. ODBC stands For:-
  2. Object Database Connectivity
  3. Oral Database Connectivity
  4. Oracle Database Connectivity
  5. Open Database Connectivity
  6. None of these

Ans:= 4

  1. Which two   files   are   used   during operation of the DBMS.
  2. Query languages and utilities
  3. DML and Query Language
  4. Data dictionary    and    transiction language
  5. Data dictionary and query language
  6. None of these

Ans:= 3

  1. A protocol is a set of rules governing a time sequence of events that must take place.
  2. Between proxy
  3. Between an interface
  4. Between Modems
  5. Across an interface
  6. None of these

Ans:= 1

  1. In Communication Satellite, Multiple Repeaters are known
  2. Detector
  3. Modulator
  4. Stations
  5. transponders
  6. None of these

Ans:= 4

  1. Which of the following is required to communicate between two computers ?
  2. communication software
  3. protocol
  4. communication hardware
  5. all of   above   including   access   to transmission  medium
  6. None of these

Ans:= 4

  1. Which of the following is an advantage to using fiber optics data transmission.
  2. Resistance to data theft
  3. Fast Data transmission Rate
  4. Low noise Level
  5. All of the above

Ans:= 4

24.Which   of   the   following   is   not   a transmission medium ?

  1. Telephone lines
  2. Coaxial Cabels
  3. Modem
  4. Microwave Systems
  5. None of these

Ans:= 3

  1. What is   meant   by   a   dedicated computer ?
  2. Which is Used by one person only
  3. Which is assigned to one and only one task.
  4. which does not kind of software
  5. which is    meant    for    application software only

Ans:= 2

  1. A computer program that converts an entire program into machine language at one time is called an
  2. Interpreter
  3. Simulator
  4. Compiler
  5. Commander
  6. None of these

Ans:= 3

  1. A technique for direct search is .
  2. Binary Search
  3. Linear Search
  4. Tree Search
  5. Hashing
  6. None of these

Ans:= 4

  1. Two Main measures for the efficiency of an algorithm are.
  2. Processor and Memory
  3. Complexity and capacity
  4. Time and Space
  5. Data and Space
  6. None of these

Ans:=3

  1. The space factor when determining the efficiency of algorithm is measured by.
  2. Counting the    maximum    memory needed by the algorithm
  3. Counting the    minimum    memory needed by the algorithm
  4. Counting the average memory needed by the algorithm.
  5. counting the   maximum  disk   space needed by the algorithm
  6. None of these

Ans:= 1

  1. The Memory  address   of   the   first element of an array is called.
  2. floor address
  3. foundation address
  4. first address
  5. base address
  6. none of these

Ans:= 4

  1. Latency time is
    1. Time to spin the needed data under head
    2. Time to spin the needed data under track
    3. Time to spin data under sector
    4. All of the above
    5. None of the these

Ans:= 1

  1. What does Router do in a Network ?
  2. Forwards a Packet to all outgoing links
  3. Forwards a  packet  to  the  next  free outgoing
  4. Determines on  which  outing  link  a packet is to be forwarded
  5. Forwards a packet to all outgoing links except the originated
  6. None of these

Ans:= 3

33.Repeator  operates  in  which  layer  of the OSI Model ?

  1. Physical Layer
  2. Data Link Layer
  3. Network Layer
  4. Transport Layer
  5. None of these

Ans:= 1

  1. IP address are converted to
  2. A binary string
  3. A lphanumeric string
  4. A hirearachy of domain names
  5. A hexadecimal string
  6. None of these

Ans:= 3

  1. By an intranet we mean
  2. a LAN of an organization
  3. a Wide  area  network  connecting  all branches of an
  4. A corporate computer network
  5. a network connecting all computers organization and using the internet protocol
  6. None of these

Ans:= 4

  1. GIF images can have only upto……..

Colors.

  1. 128
  2. 256
  3. 512

4.1024

  1. None of these

Ans:= 2

  1. ………. Is stored on a client and contains state information of the website visited.
  2. Cookies
  3. Servelet
  4. History
  5. Resident Page
  6. None of these

Ans:= 1

38……. Are small application that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.

  1. Applets
  2. Java Bean
  3. Sockets
  4. Java Component
  5. None of these Ans:= 1
  6. Encryption is the conversion of data in some intelligible format into an unintelligible format called……… to prevent the data from being understood if read by an unauthorized party.
  7. Clear Text
  8. Encrypted Text
  9. Cipher Text
  10. Coded Text
  11. None of the these

Ans:= 3

  1. The Method for storing data temporarily such that the input-output of the same job is overlapped with its own processing is known as.
  2. Spooling
  3. Contention
  4. I/O wait
  5. Buffering
  6. None of these

Ans:= 4

  1. A process known as

                          is used by large retailers to study trends.

  1. data mining B. data selection C. POS
  2. data conversion

Answer: A

  1. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
  2. robotics. B. simulation.
  3. computer forensics. D. animation.

Answer: C

  1. is the science

that attempts to produce machines that display the same type of intelligence that humans do.

  1. Nanoscience
  2. B. Nanotechnology
  3. C. Simulation
  4. Artificial intelligence (AI)

Answer: D

  1. is data that has

been organized or presented in a meaningful fashion.

  1. A process
  2. B. Software
  3. C. Storage
  4. Information

Answer: D

  1. The name for the way that computers manipulate data into information is        called: 
  2. a.programming.
  3. processing.
  4. C. storing.
  5. organizing.

Answer: B

  1. Computers gather data, which means that they allow users to

data.

  1. present
  2. B. input
  3. C. output
  4. store

Answer: B

  1. Which of the following does not affect the resolution of a video display image.
  2. Bandwidth
  3. Raster scan image
  4. Vertical and horizontal lines of resolution
  5. Screen size
  6. None of these

Ans:=  1

  • Database Software may be divided into
  1. five distinct categories
  2. four distinct categoris
  3. three distinct categoris
  4. two distinct categoris
  5. None of these

Ans:=  3

49.is a technique of temporarily  removing  inactive  program from the memory of computer System.

  1. Swapping
  2. Spooling Seamphone
  3. Scheduler
  4. None of these

Ans:= 1

  1. who is father of computer science ?
  2. Charles Babbage
  3. John McCarthy
  4. Dennis Ritchie
  5. Allan Turing

Ans:=D

Learn Sorting in Handbook Series:  Click here 

Follow Us on Social Platforms to get Updated : twiter,  facebookGoogle Plus


Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *

*