

MCQOPTIONS
Saved Bookmarks
This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
Given the sequence of terms, AD CG FK JP, the next term is |
A. | OV |
B. | OW |
C. | PV |
D. | PW |
Answer» B. OW | |
2. |
Which of the following assertions are CORRECT? P: Adding 7 to each entry in a list adds 7 to the mean of the list Q: Adding 7 to each entry in a list adds 7 to the standard deviation of the list R: Doubling each entry in a list doubles the mean of the list S: Doubling each entry in a list leaves the standard deviation of the list unchanged |
A. | P, Q |
B. | Q, R |
C. | P, R |
D. | R, S |
Answer» D. R, S | |
3. |
An automobile plant contracted to buy shock absorbers from two suppliers X and Y. X supplies 60% and Y supplies 40% of the shock absorbers. All shock absorbers are subjected to a quality test. The ones that pass the quality test are considered reliable. Of X’s shock absorbers, 96% are reliable. Of Y’s shock absorbers, 72% are reliable. The probability that a randomly chosen shock absorber, which is found to be reliable, is made by Y is |
A. | 0.288 |
B. | 0.334 |
C. | 0.667 |
D. | 0.720 |
Answer» C. 0.667 | |
4. |
A political party orders an arch for the entrance to the ground in which the annual convention is being held. The profile of the arch follows the equation y = 2x – 0.1x2 where y is the height of the arch in meters. The maximum possible height of the arch is |
A. | 8 meters |
B. | 10 meters |
C. | 12 meters |
D. | 14 meters |
Answer» C. 12 meters | |
5. |
Wanted Temporary, Part-time persons for the post of Field Interviewer to conduct personal interviews to collect and collate economic data. Requirements: High School-pass, must be available for Day, Evening and Saturday work. Transportation paid, expenses reimbursed. Which one of the following is the best inference from the above advertisement? |
A. | Gender-discriminatory |
B. | Xenophobic |
C. | Not designed to make the post attractive |
D. | Not gender-discriminatory |
Answer» D. Not gender-discriminatory | |
6. |
Choose the most appropriate alternative from the options given below to complete the following sentence: Suresh’s dog is the one ––––––––– was hurt in the stampede. |
A. | that |
B. | which |
C. | who |
D. | whom |
Answer» B. which | |
7. |
Choose the grammatically INCORRECT sentence |
A. | They gave us the money back less the service charges of Three Hundred rupees |
B. | This country’s expenditure is not less than that of Bangladesh |
C. | The committee initially asked for a funding of Fifty Lakh rupees, but later settled for a lesser sum. |
D. | This country’s expenditure on educational reforms is very less. |
Answer» E. | |
8. |
Which one of the following options is the closest in meaning to the word given below? Mitigate |
A. | Diminish |
B. | Divulge |
C. | Dedicate |
D. | Denote |
Answer» B. Divulge | |
9. |
Choose the most appropriate alternative from the options given below to complete the following sentence: Despite several ––––––––– the mission succeeded in its attempt to resolve the conflict. |
A. | attempts |
B. | setbacks |
C. | meetings |
D. | delegations |
Answer» C. meetings | |
10. |
The cost function for a product in a firm is given by 5q2, where q is the amount of production. The firm can sell the product at a market price of Rs 50 per unit. The number of units to be produced by the firm such that the profit is maximized is |
A. | 5 |
B. | 10 |
C. | 15 |
D. | 25 |
Answer» B. 10 | |
11. |
Consider the data given in previous question. The size of the cache tag directory is |
A. | 160 Kbits |
B. | 136 bits |
C. | 40 Kbits |
D. | 32 bits |
Answer» B. 136 bits | |
12. |
A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32 Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit. The number of bits in the tag field of an address is |
A. | 11 |
B. | 14 |
C. | 16 |
D. | 27 |
Answer» D. 27 | |
13. |
Table A Id Name Age ---------------- 12 Arun 60 15 Shreya 24 99 Rohit 11 Table B Id Name Age ---------------- 15 Shreya 24 25 Hari 40 98 Rohit 20 99 Rohit 11 Table C Id Phone Area ----------------- 10 2200 02 99 2100 01 Consider the above tables A, B and C. How many tuples does the result of the following SQL query contains? SELECT A.id FROM A WHERE A.age > ALL (SELECT B.age FROM B WHERE B. name = "arun") |
A. | 4 |
B. | 3 |
C. | 0 |
D. | 1 |
Answer» C. 0 | |
14. |
Consider the following relations A, B, C. How many tuples does the result of the following relational algebra expression contain? Assume that the schema of A U B is the same as that of A. Table A Id Name Age ---------------- 12 Arun 60 15 Shreya 24 99 Rohit 11 Table B Id Name Age ---------------- 15 Shreya 24 25 Hari 40 98 Rohit 20 99 Rohit 11 Table C Id Phone Area ----------------- 10 2200 02 99 2100 01 |
A. | 7 |
B. | 4 |
C. | 5 |
D. | 9 |
Answer» B. 4 | |
15. |
Consider the above question. What output will be generated by the given code dsegment if: Line 1 is replaced by “auto int a = 1;” Line 2 is replaced by “register int a = 2;” |
A. | 3 1 4 1 4 2 |
B. | 4 2 6 1 6 1 |
C. | 4 2 6 2 2 0 |
D. | 4 2 4 2 2 0 |
Answer» E. | |
16. |
Consider a random variable X that takes values +1 and −1 with probability 0.5 each. The values of the cumulative distribution function F(x) at x = −1 and +1 are |
A. | 0 and 0.5 |
B. | 0 and 1 |
C. | 0.5 and 1 |
D. | 0.25 and 0.75 |
Answer» D. 0.25 and 0.75 | |
17. |
Register renaming is done in pipelined processors |
A. | as an alternative to register allocation at compile time |
B. | for efficient access to function parameters and local variables |
C. | to handle certain kinds of hazards |
D. | as part of address translation |
Answer» D. as part of address translation | |
18. |
Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find the congestion window size at the end of the tenth transmission. |
A. | 8 MSS |
B. | 14 MSS |
C. | 7 MSS |
D. | 12 MSS |
Answer» D. 12 MSS | |
19. |
Consider a source computer(S) transmitting a file of size 106 bits to a destination computer(D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to R2; and L3 connects R2 to D.Let each link be of length 100 km. Assume signals travel over each link at a speed of 108 meters per second.Assume that the link bandwidth on each link is 1Mbps. Let the file be broken down into 1000 packets each of size 1000 bits. Find the total sum of transmission and propagation delays in transmitting the file from S to D? |
A. | 1005 ms |
B. | 1010 ms |
C. | 3000 ms |
D. | 3003 ms |
Answer» B. 1010 ms | |
20. |
Consider the virtual page reference string 1, 2, 3, 2, 4, 1, 3, 2, 4, 1 On a demand paged virtual memory system running on a computer system that main memory size of 3 pages frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number of page faults under the corresponding page replacements policy. Then |
A. | OPTIMAL < LRU < FIFO |
B. | OPTIMAL < FIFO < LRU |
C. | OPTIMAL = LRU |
D. | OPTIMAL = FIFO |
Answer» C. OPTIMAL = LRU | |
21. |
A file system with 300 GByte disk uses a file descriptor with 8 direct block addresses, 1 indirect block address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and the size of each disk block address is 8 Bytes. The maximum possible file size in this file system is |
A. | 3 Kbytes |
B. | 35 Kbytes |
C. | 280 Bytes |
D. | Dependent on the size of the disk |
Answer» C. 280 Bytes | |
22. |
A list of n strings, each of length n, is sorted into lexicographic order using the merge-sort algorithm. The worst case running time of this computation is |
A. | O(n log n) |
B. | O(n2 log n) |
C. | O(n2 + log n |
D. | O(n2) |
Answer» C. O(n2 + log n | |
23. |
Let G be a complete undirected graph on 6 vertices. If vertices of G are labeled, then the number of distinct cycles of length 4 in G is equal to |
A. | 15 |
B. | 30 |
C. | 45 |
D. | 360 |
Answer» D. 360 | |
24. |
How many onto (or surjective) functions are there from an n-element (n >= 2) set to a 2-element set? |
A. | 2n |
B. | 2n - 1 |
C. | 2n - 2 |
D. | 2(2n - 2 |
Answer» D. 2(2n - 2 | |
25. |
Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements. Assume that the insertion and deletion operation are carried out using REAR and FRONT as array index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full and queue empty are |
A. | Full: (REAR+1) mod n == FRONT, empty: REAR == FRONT |
B. | Full: (REAR+1) mod n == FRONT, empty: (FRONT+1) mod n == REAR |
C. | Full: REAR == FRONT, empty: (REAR+1) mod n == FRONT |
D. | Full: (FRONT+1) mod n == REAR, empty: REAR == FRONT |
Answer» B. Full: (REAR+1) mod n == FRONT, empty: (FRONT+1) mod n == REAR | |
26. |
A n Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B? |
A. | 245.248.136.0/21 and 245.248.128.0/22 |
B. | 245.248.128.0/21 and 245.248.128.0/22 |
C. | 245.248.132.0/22 and 245.248.132.0/21 |
D. | 245.248.136.0/24 and 245.248.132.0/21 |
Answer» B. 245.248.128.0/21 and 245.248.128.0/22 | |
27. |
Suppose a fair six-sided die is rolled once. If the value on the die is 1, 2, or 3, the die is rolled a second time. What is the probability that the sum total of values that turn up is at least 6? |
A. | 10/21 |
B. | 5/12 |
C. | 2/3 |
D. | 1/6 |
Answer» C. 2/3 | |
28. |
Fetch_And_Add(X,i) is an atomic Read-Modify-Write instruction that reads the value of memory location X, increments it by the value i, and returns the old value of X. It is used in the pseudocode shown below to implement a busy-wait lock. L is an unsigned integer shared variable initialized to 0. The value of 0 corresponds to lock being available, while any non-zero value corresponds to the lock being not available. AcquireLock(L){ while (Fetch_And_Add(L,1)) L = 1; } ReleaseLock(L){ L = 0; } This implementation |
A. | fails as L can overflow |
B. | fails as L can take on a non-zero value when the lock is actually available |
C. | works correctly but may starve some processes |
D. | works correctly without starvation |
Answer» C. works correctly but may starve some processes | |
29. |
Consider the 3 processes, P1, P2 and P3 shown in the table. Process Arrival time Time Units Required P1 0 5 P2 1 7 P3 3 4 The completion order of the 3 processes under the policies FCFS and RR2 (round robin scheduling with CPU quantum of 2 time units) are |
A. | FCFS: P1, P2, P3 RR2: P1, P2, P3 |
B. | FCFS: P1, P3, P2 RR2: P1, P3, P2 |
C. | FCFS: P1, P2, P3 RR2: P1, P3, P2 |
D. | FCFS: P1, P3, P2 RR2: P1, P2, P3 |
Answer» D. FCFS: P1, P3, P2 RR2: P1, P2, P3 | |
30. |
Let G be a weighted graph with edge weights greater than one and G'be the graph constructed by squaring the weights of edges in G. Let T and T' be the minimum spanning trees of G and G', respectively, with total weights t and t'. Which of the following statements is TRUE? |
A. | T = T with total weight t = t2 |
B. | T = T with total weight t < t2 |
C. | T != T but total weight t = t2 |
D. | None of the above |
Answer» E. | |
31. |
The bisection method is applied to compute a zero of the function f(x) = x4 – x3 – x2 – 4 in the interval [1,9]. The method converges to a solution after ––––– iterations |
A. | 1 |
B. | 3 |
C. | 5 |
D. | 7 |
Answer» C. 5 | |
32. |
Consider the following transactions with data items P and Q initialized to zero: T1: read (P) ; read (Q) ; if P = 0 then Q : = Q + 1 ; write (Q) ; T2: read (Q) ; read (P) ; if Q = 0 then P : = P + 1 ; write (P) ; Any non-serial interleaving of T1 and T2 for concurrent execution leads to |
A. | A serializable schedule |
B. | A schedule that is not conflict serializable |
C. | A conflict serializable schedule |
D. | A schedule for which a precedence graph cannot be drawn |
Answer» C. A conflict serializable schedule | |
33. |
Given the language L = {ab, aa, baa}, which of the following strings are in L*? 1) abaabaaabaa 2) aaaabaaaa 3) baaaaabaaaab 4) baaaaabaa |
A. | 1, 2 and 3 |
B. | 2, 3 and 4 |
C. | 1, 2 and 4 |
D. | 1, 3 and 4 |
Answer» D. 1, 3 and 4 | |
34. |
In the IPv4 addressing format, the number of networks allowed under Class C addresses is |
A. | 2 14 |
B. | 2 7 |
C. | 2 21 |
D. | 2 24 |
Answer» D. 2 24 | |
35. |
Which of the following transport layer protocols is used to support electronic mail? |
A. | SMTP |
B. | IP |
C. | TCP |
D. | UDP |
Answer» D. UDP | |
36. |
The amount of ROM needed to implement a 4 bit multiplier is |
A. | 64 bits |
B. | 128 bits |
C. | 1 Kbits |
D. | 2 Kbits |
Answer» E. | |
37. |
Let G be a simple undirected planar graph on 10 vertices with 15 edges. If G is a connected graph, then the number of bounded faces in any embedding of G on the plane is equal to |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» E. | |
38. |
The recurrence relation capturing the optimal execution time of the Towers of Hanoi problem with n discs is |
A. | T(n) = 2T(n − 2) + 2 |
B. | T(n) = 2T(n − 1) + n |
C. | T(n) = 2T(n/2) + 1 |
D. | T(n) = 2T(n − 1) + 1 |
Answer» E. | |
39. |
Which of the following statements are TRUE about an SQL query? P : An SQL query can contain a HAVING clause even if it does not have a GROUP BY clause Q : An SQL query can contain a HAVING clause only if it has a GROUP BY clause R : All attributes used in the GROUP BY clause must appear in the SELECT clause S : Not all attributes used in the GROUP BY clause need to appear in the SELECT clause |
A. | P and R |
B. | P and S |
C. | Q and R |
D. | Q and S |
Answer» C. Q and R | |
40. |
Given the basic ER and relational models, which of the following is INCORRECT? |
A. | An attribute of an entity can have more than one value |
B. | An attribute of an entity can be composite |
C. | In a row of a relational table, an attribute can have more than one value |
D. | In a row of a relational table, an attribute can have exactly one value or a NULL value |
Answer» D. In a row of a relational table, an attribute can have exactly one value or a NULL value | |
41. |
The protocol data unit (PDU) for the application layer in the Internet stack is |
A. | Segment |
B. | Datagram |
C. | Message |
D. | Frame |
Answer» D. Frame | |
42. |
Consider the function f(x) = sin(x) in the interval [π/4, 7π/4]. The number and location(s) of the local minima of this function are |
A. | One, at π/2 |
B. | One, at 3π/2 |
C. | Two, at π/2 and 3π/2 |
D. | Two, at π/4 and 3π/2 |
Answer» E. | |
43. |
T he decimal value 0.5 in IEEE single precision floating point representation has |
A. | fraction bits of 000…000 and exponent value of 0 |
B. | fraction bits of 000…000 and exponent value of −1 |
C. | fraction bits of 100…000 and exponent value of 0 |
D. | no exact representation |
Answer» C. fraction bits of 100…000 and exponent value of 0 | |
44. |
Assuming P != NP, which of the following is true ? (A) NP-complete = NP (B) NP-complete \cap P = \Phi (C) NP-hard = NP (D) P = NP-complete |
A. | A |
B. | B |
C. | C |
D. | D |
Answer» C. C | |
45. |
Which of the following is TRUE? |
A. | Every relation in 3NF is also in BCNF |
B. | A relation R is in 3NF if every non-prime attribute of R is fully functionally dependent on every key of R |
C. | Every relation in BCNF is also in 3NF |
D. | No relation can be in both BCNF and 3Nf |
Answer» D. No relation can be in both BCNF and 3Nf | |
46. |
Consider the following logical inferences. I1: If it rains then the cricket match will not be played. The cricket match was played. Inference: There was no rain. I2: If it rains then the cricket match will not be played. It did not rain. Inference: The cricket match was played. Which of the following is TRUE? |
A. | Both I1 and I2 are correct inferences |
B. | I1 is correct but I2 is not a correct inference |
C. | I1 is not correct but I2 is a correct inference |
D. | Both I1 and I2 are not correct inferences |
Answer» C. I1 is not correct but I2 is a correct inference | |