Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 950 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

851.

The order in which the return addresses are generated and used is

A. lifo
B. fifo
C. random
D. highest priority
Answer» B. fifo
852.

When parameters are being passed on to the subroutines they are stored in

A. registers
B. memory locations
C. processor stacks
D. all of the mentioned
Answer» E.
853.

What is subroutine nesting?

A. having multiple subroutines in a program
B. using a linking nest statement to put many subroutines under the same name
C. having one routine call the other
D. none of the mentioned
Answer» D. none of the mentioned
854.

The location to return to, from the subroutine is stored in

A. tlb
B. pc
C. mar
D. link registers
Answer» E.
855.

The return address of the Sub-routine is pointed to by

A. ir
B. pc
C. mar
D. special memory registers
Answer» C. mar
856.

To overcome the problems of the assembler in dealing with branching code we use

A. interpreter
B. debugger
C. op-assembler
D. two-pass assembler
Answer» E.
857.

The utility program used to bring the object code into memory for execution is

A. loader
B. fetcher
C. extractor
D. linker
Answer» B. fetcher
858.

The assembler stores the object code in

A. main memory
B. cache
C. ram
D. magnetic disk
Answer» E.
859.

The last statement of the source program should be

A. stop
B. return
C. op
D. end
Answer» E.
860.

           directive specifies the end of execution of a program.

A. end
B. return
C. stop
D. terminate
Answer» C. stop
861.

The assembler stores all the names and their corresponding values in

A. special purpose register
B. symbol table
C. value map set
D. none of the mentioned
Answer» C. value map set
862.

The assembler directive EQU, when used in the instruction: Sum EQU 200 does

A. finds the first occurrence of sum and assigns value 200 to it
B. replaces every occurrence of sum with 200
C. re-assigns the address of sum by adding 200 to its original address
D. assigns 200 bytes of memory starting the location of sum
Answer» C. re-assigns the address of sum by adding 200 to its original address
863.

The directive used to perform initialization before the execution of the code is

A. reserve
B. store
C. dataword
D. equ
Answer» D. equ
864.

           directive is used to specify and assign the memory required for the block of code.

A. allocate
B. assign
C. set
D. reserve
Answer» E.
865.

The instructions like MOV or ADD are called as

A. op-code
B. operators
C. commands
D. none of the mentioned
Answer» B. operators
866.

                      converts the programs written in assembly language into machine instructions.

A. machine compiler
B. interpreter
C. assembler
D. converter
Answer» D. converter
867.

The condition flag Z is set to 1 to indicate

A. the operation has resulted in an error
B. the operation requires an interrupt call
C. the result is zero
D. there is no empty register available
Answer» D. there is no empty register available
868.

While using the iterative construct (Branching) in execution                              instruction is used to check the condition.

A. testandset
B. branch
C. testcondn
D. none of the mentioned
Answer» C. testcondn
869.

In a system, which has 32 registers the register id is                       long.

A. 16 bit
B. 8 bits
C. 5 bits
D. 6 bits
Answer» D. 6 bits
870.

Can you perform an addition on three operands simultaneously in ALN using Add instruction?

A. yes
B. not possible using add, we’ve to use addsetcc
C. not permitted
D. none of the mentioned
Answer» D. none of the mentioned
871.

RTN stands for

A. register transfer notation
B. register transmission notation
C. regular transmission notation
D. regular transfer notation
Answer» B. register transmission notation
872.

The transfer of large chunks of data with the involvement of the processor is done by

A. dma controller
B. arbitrator
C. user system programs
D. none of the mentioned
Answer» B. arbitrator
873.

Which of the following techniques used to effectively utilize main memory?

A. address binding
B. dynamic linking
C. dynamic loading
D. both dynamic linking and loading
Answer» D. both dynamic linking and loading
874.

The BOOT sector files of the system are stored in

A. harddisk
B. rom
C. ram
D. fast solid state chips in the motherboard
Answer» C. ram
875.

Complete the following analogy:- Registers are to RAM’s as Cache’s are to

A. system stacks
B. overlays
C. page table
D. tlb
Answer» E.
876.

Does the Load instruction do the following operation/s?

A. loads the contents of a disc onto a memory location
B. loads the contents of a location onto the accumulators
C. load the contents of the pcb onto the register
D. none of the mentioned
Answer» C. load the contents of the pcb onto the register
877.

The unit which acts as an intermediate agent between memory and backing store to reduce process time is

A. tlb’s
B. registers
C. page tables
D. cache
Answer» E.
878.

The technique used to store programs larger than the memory is

A. overlays
B. extension registers
C. buffers
D. both extension registers and buffers
Answer» B. extension registers
879.

When generating physical addresses from a logical address the offset is stored in

A. translation look-aside buffer
B. relocation register
C. page table
D. shift register
Answer» C. page table
880.

If we want to perform memory or arithmetic operations on data in Hexa- decimal mode then we use                      symbol before the operand.

A. ~
B. !
C. $
D. *
Answer» D. *
881.

Add #%01011101,R1 , when this instruction is executed then

A. the binary addition between the operands takes place
B. the numerical value represented by the binary value is added to the value of r1
C. the addition doesn’t take place, whereas this is similar to a mov instruction
D. none of the mentioned
Answer» B. the numerical value represented by the binary value is added to the value of r1
882.

Physical memory is divided into sets of finite size called as

A. frames
B. pages
C. blocks
D. vectors
Answer» B. pages
883.

During the transfer of data between the processor and memory we use

A. cache
B. tlb
C. buffers
D. registers
Answer» E.
884.

To get the physical address from the logical address generated by CPU we use

A. mar
B. mmu
C. overlays
D. tlb
Answer» C. overlays
885.

           method is used to map logical addresses of variable length onto physical memory.

A. paging
B. overlays
C. segmentation
D. paging with segmentation
Answer» D. paging with segmentation
886.

When using the Big Endian assignment to store a number, the sign bit of the number is stored in

A. the higher order byte of the word
B. the lower order byte of the word
C. can’t say
D. none of the mentioned
Answer» B. the lower order byte of the word
887.

The type of memory assignment used in Intel processors is

A. little endian
B. big endian
C. medium endian
D. none of the mentioned
Answer» B. big endian
888.

If a system is 64 bit machine, then the length of each word will be

A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 12 bytes
Answer» C. 16 bytes
889.

The collection of the above mentioned entities where data is stored is called

A. block
B. set
C. word
D. byte
Answer» D. byte
890.

The smallest entity of memory is called

A. cell
B. block
C. instance
D. unit
Answer» B. block
891.

In a normal n-bit adder, to find out if an overflow as occurred we make use of

A. counter
B. flip flop
C. shift register
D. push down stack
Answer» D. push down stack
892.

The most efficient method followed by computers to multiply two unsigned numbers is

A. booth algorithm
B. bit pair recording of multipliers
C. restoring algorithm
D. non restoring algorithm
Answer» C. restoring algorithm
893.

For the addition of large integers, most of the systems make use of

A. fast adders
B. full adders
C. carry look-ahead adders
D. none of the mentioned
Answer» D. none of the mentioned
894.

In some pipelined systems, a different instruction is used to add to numbers which can affect the flags upon

A. and gate
B. nand gate
C. nor gate
D. xor gate
Answer» E.
895.

The register used to store the flags is called as

A. flag register
B. status register
C. test register
D. log register
Answer» C. test register
896.

The processor keeps track of the results of its operations using flags called

A. conditional code flags
B. test output flags
C. type flags
D. none of the mentioned
Answer» B. test output flags
897.

When we perform subtraction on -7 and 1 the answer in 2’s complement form is

A. 1010
B. 1110
C. 0110
D. 1000
Answer» E.
898.

Which method of representation has two representations for ‘0’?

A. sign-magnitude
B. 1’s complement
C. 2’s complement
D. none of the mentioned
Answer» B. 1’s complement
899.

Which method/s of representation of numbers occupies a large amount of memory than others?

A. sign-magnitude
B. 1’s complement
C. 2’s complement
D. 1’s & 2’s compliment
Answer» B. 1’s complement
900.

           addressing mode is most suitable to change the normal sequence of execution of instructions.

A. relative
B. indirect
C. index with offset
D. immediate
Answer» B. indirect