mcq computer science

100
1. For the 8-bit word 00111001, the check bits stored with it would be 0111. Suppose when the word is read from memory, the check bits are calculated to be 1101.What is the data word that was read from memory? A. 10011001 B. 00011001 C. 00111000 D. 11000110 View/ Hide Ans Correct Answer is B Explanat ion 2. Consider a 32 - bit microprocessor, with a 16 - bit external data bus, driven by an 8 MHz input clock. Assume that the microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What is maximum data transfer rate for this microprocessor ? A. 8 x 10 6 bytes / sec B. 4 x 10 6 bytes / sec C. 16 x 10 6 bytes / sec D. 4 x 10 9 bytes / sec View/ Hide Ans Correct Answer is B Explanat ion 3. The RST 7 instruction in 8085 microprocessor is

Upload: rakeshguptacse

Post on 14-Apr-2016

87 views

Category:

Documents


8 download

DESCRIPTION

multiple choice questions on computer science

TRANSCRIPT

Page 1: MCQ Computer Science

1.For the 8-bit word 00111001, the check bits stored with it would be 0111. Suppose when the word is read from memory, the check bits are calculated to be 1101.What is the data word that was read from memory?

A. 10011001

B. 00011001

C. 00111000

D. 11000110

View/Hide Ans Correct Answer is B

Explanation

2.

Consider a 32 - bit microprocessor, with a 16 - bit external data bus, driven by an 8 MHz input clock. Assume that the microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What is maximum data transfer rate for this microprocessor ?

A. 8 x 106 bytes / sec

B. 4 x 106 bytes / sec

C. 16 x 106 bytes / sec

D. 4 x 109 bytes / sec

View/Hide Ans Correct Answer is B

Explanation

3. The RST 7 instruction in 8085 microprocessor is equivalent to

A. CALL 0010 H

B. CALL 0034 H

C. CALL 0038 H

D. CALL 003C H

View/Hide Correct Answer is C

Page 2: MCQ Computer Science

Ans

Explanation

4. The equivalent hexadecimal notation for octal number 2550276 is:

A. FADED

B. AEOBE

C. ADOBE

D. ACABE

View/Hide Ans Correct Answer is C

Explanation

5.

The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for executing an instruction. The fifty percent of the cycles use memory bus. A memory read/write employs one machine cycle. For execution of the programs, the system utilizes 90 percent of the CPU time. For block data transfer, an IO device is attached to the system while CPU executes the background programs continuously. What is the maximum IO data transfer rate if programmed IO data transfer technique is used?

A. 500 Kbytes/sec

B. 2.2 Mbytes/sec

C. 125 Kbytes/sec

D. 250 Kbytes/sec

View/Hide Ans Correct Answer is D

Explanation

6. The number of Flip-Flops required to design a modulo - 272 counter is

A. 8

B. 9

Page 3: MCQ Computer Science

C. 27

D. 11

View/Hide Ans Correct Answer is B

Explanation

7.

Let E1 and E2 be two entities in E-R diagram with simple single valued attributes. R1 and R2 are two relationships between E1 and E2 where R1 is one-many and R2 is many - many. R1 and R2 donot have any attributes of their own. How many minimum number of tables are required to represent this situation in the relational model ?

A. 4

B. 3

C. 2

D. 1

View/Hide Ans Correct Answer is A

Explanation

8.

The student information in a university is stored in the relation STUDENT (name, sex, marks, dept_Name) Consider the following SQL query select deptName from STUDENT where sex = 'M' group by dept_Name having avg (marks) > (select avg (marks) from STUDENT) It returns the names of the department in which

A. the average marks of male students is more than the average marks of the students in the same department

B. The average marks of male students is more than the average marks of the students in the university

C. The average marks of male students is more than the average marks of male students in the university

D. The average marks of students is more than the average marks of male students in the university

View/Hide Correct Answer is D

Page 4: MCQ Computer Science

Ans

Explanation

9. Which one of the following statements about normal forms is FALSE?

A. Lossless, preserving decomposition into 3NF is always possible

B. Lossless, preserving decomposition into BCNF is always possible

C. Any relation with two attributes is in BCNF

D. BCNF is stronger than 3NF

View/Hide Ans Correct Answer is B

Explanation

10. The relation vendor order (v_no, v_ord_no, v_name, qty_sup, unit_price) is in 2NF because :

A. Non key attribute V_name is dependent on V_no which is part of composite key

B. Non key attribute V_name is dependent on qty_sup

C. key attribute qty_sup is dependent on primary_key unit price

D. key attribute v_ord_no is dependent on primary_key unit price

View/Hide Ans Correct Answer is A

Explanation

Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015

11. the relational schemas R1 and R2 form a loseless join decomposition of R if and only if

A. R1∧R2-->(R1-R2)

B. R1-->R2

C. R1∧R2-->(R2-R1)

Page 5: MCQ Computer Science

D. R2-->R1∧R2

View/Hide Ans Correct Answer is C

Explanation

12. In the index allocation scheme of blocks to a file, the maximum possible size of the file depends on

A. The number of blocks used for the index, and the size of the index

B. The size of the blocks, and the size of the address

C. size of the index

D. size of the blocks

View/Hide Ans Correct Answer is A

Explanation

13. Give the number of principal vanishing point (s) along with their direction for the standard perspective transformation :

A. only one in the direction K

B. Two in the directions I and J

C. Three in the directions I, J and K

D. Only two in the directions J and K

View/Hide Ans Correct Answer is A

Explanation

14.Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45 degrees about a point P( -1, -1). The co-ordinates of the new triangle obtained after rotation shall be

A. A'(-1, √2 -1), B'(-1, 2√2 - 1), C'((3/2)√2 - 1, (9/2)√2 - 1)

B. A'(√2 -1,- 1), B'( 2√2 - 1, -1), C'((3/2)√2 - 1, (9/2)√2 - 1)

Page 6: MCQ Computer Science

C. A'(-1, √2 -1), B'(2√2 - 1, -1), C'((3/2)√2 - 1, (9/2)√2 - 1)

D. A'(-1, √2 -1), B'( 2√2 - 1, -1), C'((9/2)√2 - 1, (3/2)√2 - 1)

View/Hide Ans Correct Answer is A

Explanation

15. The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude is called

A. Strobing

B. Amplification

C. Conditioning

D. Quantization

View/Hide Ans Correct Answer is D

Explanation

16. which of the following is not a basic primitive of the graphics kernel system(GKS) ?

A. POLYLINE

B. POLYDRAW

C. FILL AREA

D. POLYMARKER

View/Hide Ans Correct Answer is B

Explanation

17. Which of the following statements is/are incorrect ?

A.Mapping the co-ordinates of the points and lines that form the picture into appropriate co-ordinates on the device or workstation is known as viewing transformation.

Page 7: MCQ Computer Science

B. The right handed cartesian co-ordinate system in whose coordinates we describe the picture is known as world coordinate system.

C. The co-ordinate system that corresponds to the device or workstation where the image is to be displayed is known as physical device co-ordinate system.

D.

Left-handed co-ordinate system in which the display area of the virtual display device corresponds to the unit(|x|) square whose lower left handed corner is at origin of the co-ordinate system, is known as normalized device co-ordinate system.

View/Hide Ans Correct Answer is D

Explanation

18.

Match the following

List-I List-II

Flood Gun An electron gun designed to flood the entire screen with electrons.

Collector Partly energised by flooding gun, stores the charge generated by the writing gun

Ground used to discharge the collector

Phosphorus Grains

used in memory -tube display and similar to those used in standard CRT

Writing Gun System

used in memory -tube display and basically the same as the electron gun used in a conventional CRT.

Codes : (a) (b) (c) (d) (e)

A. (i) (ii) (iii) (iv) (v)

B. (ii) (iii) (i) (iv) (v)

C. (iii) (i) (ii) (v) (iv)

D. (iv) (v) (i) (ii) (iii)

View/Hide Correct Answer is A

Page 8: MCQ Computer Science

Ans

Explanation

19. Minimal Deterministic finite automaton for the language L = { 0n | n > 0, n ≠ 4 } will have

A. 1 final state among 5 states

B. 4 final states among 5 states

C. 1 final state among 6 states

D. 5 final states among 6 states

View/Hide Ans Correct Answer is D

Explanation

20. The regular expression corresponding to the language L where L = { x ∈ {0,1}* | x ends with 1 and does not contain substring 00 } is

A. (1 + 01)*(10 + 01)

B. (1 + 01)*01

C. (1 + 01)*(1 + 01)

D. (10 + 01)* 01

View/Hide Ans Correct Answer is C

Explanation

Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015

21. The transition function for the language L = {w|na(w) and nb(w) are both odd} is given by:

δ(q0, a) = q1 δ(q0, b) = q2

δ(q1, a) = q0 δ(q1, b) = q3

δ(q2, a) = q3 δ(q2, b) = q0

Page 9: MCQ Computer Science

δ(q3, a) = q2 δ(q3, b) = q1

the initial and final states of automata are

A. q0 and q0 respectively

B. q0 and q1 respectively

C. q0 and q2 respectively

D. q0 and q3 respectively

View/Hide Ans Correct Answer is D

Explanation

22. The clausal form of the disjunctive normal form ¬A ∨ ¬B ∨ ¬C ∨D is

A. A ∧ B ∧ C ⇒ D

B. A ∨ B ∨ C ∨ D ⇒ true

C. A ∧ B ∧ C ∧ D ⇒ true

D. A ∧ B ∧ C ∧ D ⇒ false

View/Hide Ans Correct Answer is A

Explanation

23. Which of the following is false for the programming language PROLOG ?

A. A PROLOG variable can only be assigned to a value once

B. PROLOG is a Strongly Typed Language.

C. The scope of a variable in PROLOG is a single clause or rule.

D. the scope of a variable in PROLOG is a Single Query

View/Hide Ans Correct Answer is B

Page 10: MCQ Computer Science

Explanation

24. Which one of the following is true ?

A. The resolvent of two horn clauses is not a horn clause.

B. The resolvent of two horn clauses is a Horn Clause.

C. if we resolve a negated goal G against a fact or rule A to get Clause C then C has positive literal and non null goal.

D. if we resolve a negated goal G against a fact or rule A to get clause C then C has positive literal or null goal.

View/Hide Ans Correct Answer is B

Explanation

25. Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender ?

A. Broadcasting

B. Unicasting

C. Packet Switching

D. Circuit Switching

View/Hide Ans Correct Answer is D

Explanation

26. Which of the following control fields in TCP header is used to specify the sender has no more data to transmit ?

A. FIN

B. RST

C. SYN

D. PSH

Page 11: MCQ Computer Science

View/Hide Ans Correct Answer is A

Explanation

27. Which are the two modes of IP security ?

A. Transport and Certificate

B. Transport and Tunnel

C. Certificate and Tunnel

D. Preshared and Transport

View/Hide Ans Correct Answer is B

Explanation

28.A message "COMPUTERNETWORK" encrypted(ignore quotes)using columnar transposition cipher with a key "LAYER". the encrypted message is :

A. CTTOEWMROPNRUEK

B. MROUEKCTTPNROEW

C. OEWPNRCTTUEKMRO

D. UEKPNRMROOEWCTT

View/Hide Ans Correct Answer is C

Explanation

29.

Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency(two samples per hertz). what is the bit rate required, if it is assumed that each sample requires 8 bits ?

A. 32 kbps

B. 64 kbps

Page 12: MCQ Computer Science

C. 128 kbps

D. 256 kbps

View/Hide Ans Correct Answer is C

Explanation

30. The Maximum payload of a TCP segment is

A. 65535

B. 65515

C. 65495

D. 65475

View/Hide Ans Correct Answer is C

Explanation

Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015

31. All pair Shortest paths problem is efficiently solved using :

A. Dijkstra' algorithm

B. Bellman-Ford algorithm

C. Kruskal Algorithm

D. Floyd-Warshall algorithm

View/Hide Ans Correct Answer is D

Explanation

32. The travelling salesman problem can be solved in :

A. Polynomial time using dynamic programming algortihm

B. Polynomial time using branch and bound algortihm

Page 13: MCQ Computer Science

C. Exponential time using dynamic programming algorithm or branch and bound algorithm.

D. Polynomial time using backtracking algorithm.

View/Hide Ans Correct Answer is C

Explanation

33. Which of the following is asymptotically smaller ?

A. lg(lg*n)

B. lg*(lg n)

C. lg(n!)

D. lg*(n!)

View/Hide Ans Correct Answer is A

Explanation

34.Consider a hash table of size m=100 and the hash function h(k) = floor(m(kA mod 1)) for A = (√5 − 1)/2 = 0.618033. Compute the location to which the key k = 123456 is placed in hash table.

A. 77

B. 82

C. 88

D. 89

View/Hide Ans Correct Answer is C

Explanation

35. Let f(n) and g(n) be asymptotically non-negative functions. which of the following is correct ?

A. θ(f(n) * g(n)) = min(f(n), g(n))

Page 14: MCQ Computer Science

B. θ(f(n) * g(n)) = max(f(n), g(n))

C. θ(f(n) + g(n)) = min(f(n), g(n))

D. θ(f(n) + g(n)) = max(f(n), g(n))

View/Hide Ans Correct Answer is D

Explanation

36. The number of nodes of height h in any n - element heap is _____

A. h

B. zh

C. ceil(n/zh)

D. ceil(n/zh + 1)

View/Hide Ans Correct Answer is D

Explanation

37. In Java, when we implement an interface method, it must be declared as :

A. Private

B. Protected

C. Public

D. Friend

View/Hide Ans Correct Answer is C

Explanation

38. The Servlet Response interface enables a servlet to formulate a response for a client using the method ______

A. void log(Exception e, String s)

Page 15: MCQ Computer Science

B. Void destroy()

C. int getServerPort()

D. void setContextType(String Type)

View/Hide Ans Correct Answer is D

Explanation

39. Which one of the following is correct ?

A. Java Applets cannot be written is many programming languages.

B. An applet is not a small program.

C. An applet can be run on its own.

D. Applets are embedded in another applications.

View/Hide Ans Correct Answer is D

Explanation

40. In XML we can specify the frequency of an element by using the symbols :

A. + * !

B. # * !

C. + * ?

D. - * ?

View/Hide Ans Correct Answer is C

Explanation

Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015

41. In XML, Doctype declaration specifies to include a reference to ____ file

A. Document Type Definition

Page 16: MCQ Computer Science

B. Document Type Declaration

C. Document Transfer Definition

D. Document Type language

View/Hide Ans Correct Answer is A

Explanation

42. Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule ?

A. Inheritance

B. Polymorphism

C. Encapsulation

D. Abstraction

View/Hide Ans Correct Answer is C

Explanation

43. Verification :

A. refers to the set of activities that ensure that software correctly implements a specific function.

B. gives answer to the question - are we building the product right ?

C. requires execution of software

D. both 1 and 2

View/Hide Ans Correct Answer is D

Explanation

44. Which design matric is used to measure the compactness of the program in terms of lines of code ?

Page 17: MCQ Computer Science

A. Consistency

B. Conciseness

C. Efficiency

D. Accuracy

View/Hide Ans Correct Answer is B

Explanation

45. Requirements prioritization and negotiation belongs to :

A. Requirements validation

B. Requirements elicitation

C. Feasibility Study

D. Requirement reviews

View/Hide Ans Correct Answer is B

Explanation

46. Adaptive maintenance is a maintenance which ______

A. Correct errors that were not discovered till testing phase.

B. is carried out to port the existing software to a new environment.

C. improves the system performance.

D. both (2) and (3)

View/Hide Ans Correct Answer is B

Explanation

47. A design concept refinement is a

A. Top-down Approach

Page 18: MCQ Computer Science

B. Complementary of Abstraction concept

C. Process of elaboration

D. All of the above

View/Hide Ans Correct Answer is D

Explanation

48. A software design is highly modular if :

A. cohesion is functional and coupling is data type.

B. cohesion is coincidental and coupling is data type.

C. cohesion is sequential and coupling is content type.

D. cohesion is functional and coupling is stamp type.

View/Hide Ans Correct Answer is A

Explanation

49.

Match the following for operating system techniques with the most appropriate advantage :

List-I List-II

(a) Spooling (i) Allows several jobs in memory to improve CPU utilization

(b) Mult iprogramming

{ii) Access to shared resources among geographically dispersed computers in a transparent way

(c) Time sharing overlapping I/O and computations

Distributed Computing

Allows many users to share a computer simultaneously by switching processor frequently

codes : (a) (b) (c) (d)

Page 19: MCQ Computer Science

A. (iii) (i) (ii) (iv)

B. (iii) (i) (iv) (ii)

C. (iv) (iii) (ii) (i)

D. (ii) (iii) (iv) (i)

View/Hide Ans Correct Answer is B

Explanation

50. Which of the following statements is not true for Multi Level Feedback Queue processor scheduling algorithm ?

A. Queues have different priorities.

B. Each queue may have different scheduling algorithm

C. Processes are permanently assigned to a queue

D. This algorithm can be configured to match a specific system under design

View/Hide Ans Correct Answer is C

Explanation

51.What is the most appropriate function of Memory Management Unit (MMU) ?A.It is an associative memory to store TLBB.It is a technique of supporting multi programming by creating dynamic partitionsC.It is a chip to map virtual address to physical addressD.It is an algorithm to allocate and deallocate main memory to a processView/Hide AnsCorrect Answer is BExplanation52.Dining Philosopher's problem is aA.Producer Consumer problemB.Classical IPC problemC.Starvation ProblemD.Synchronization PrimitiveView/Hide AnsCorrect Answer is BExplanation53.In ______ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is easy.A.IndexB.LinkedC.ContiguousD.Bit MapView/Hide AnsCorrect Answer is AExplanation54.A unix file may be of type :A.Regular fileB.Directory FileC.Device FileD.Any one of the aboveView/Hide AnsCorrect Answer is DExplanation55.Match the following :

List-I List-II

Page 20: MCQ Computer Science

(a) Intelligence (i) Contextual, tacit, transfer needs learning

(b) Knowledge (ii) Scattered facts, easily transferrable

(c) Information (iii) Judgemental

(d) Data (iv) Codifiable, endorsed with relevance and purpose

codes : (a) (b) (c) (d)A.(iii) (ii) (iv) (i)B.(iii) (i) (iv) (ii)C.(i) (ii) (iii) (iv)D.(i) (iii) (iv) (ii)View/Hide AnsCorrect Answer is BExplanation74.WOW32 is aA.Win 32 API library for creating processes and threads.B.Special kind of file system to the NT name space.C.Kernel - mode objects accessible through Win32 APID.Special execution environment used to run 16 bit windows applications on 32 - bit machines.View/Hide AnsCorrect Answer is DExplanation75.The Unix command : $ vi file1 file2A.Edits file1 and stores the contents of file1 in file2B.Both files i.e File1 and file2 can be edited using "ex" command to travel between filesC.Both files can be edited using the "mv" command to move between the filesD.Edits file1 first, saves it and the edits file2View/Hide AnsCorrect Answer is BExplanation

Operating System

1.If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67.

A. 239

B. 310

C. 321

D. 325

View/Hide Ans Correct Answer is c

Explanation

Page 21: MCQ Computer Science

2. Which of the following memory allocation scheme suffers from external fragmentation ?

A. Segmentation

B. Pure demand paging

C. Swapping

D. Paging

View/Hide Ans Correct Answer is a

Explanation

3.Consider a system having m resources of the same type. These resources are shared by 3 processes A, B and C which have peak demands of 3, 4 and 6 respectively. For what value of m deadlock will not occur ?

A. 7

B. 9

C. 10

D. 13

View/Hide Ans Correct Answer is d

Explanation

4. Pre-emptive scheduling is the strategy of temporarily suspending a running process

A. before the CPU time slice expires

B. to allow starving processes to run

C. when it requests I/O

D. to avoid collision

View/Hide Ans Correct Answer is a

Explanation

5. Resources are allocated to the process on non-sharable basis is

Page 22: MCQ Computer Science

A. mutual exclusion

B. hold and wait

C. no pre-emption

D. circular wait

View/Hide Ans Correct Answer is a

Explanation

6. In round robin CPU scheduling as time quantum is increased the average turn around time

A. increases

B. decreases

C. remains constant

D. varies irregularly

View/Hide Ans Correct Answer is d

Explanation

7.Pool based allocation of memory achieves better usage. Memory can be preempted from inactive programs and used to accommodate active programs. This is called

A. Preemption

B. Swapping

C. Spooling

D. Scheduling

View/Hide Ans Correct Answer is b

Explanation

8. Which of these is an example of a virtual resource?

A. Print server

Page 23: MCQ Computer Science

B. Virtual machine

C. Virtual memory

D. All of the above

View/Hide Ans Correct Answer is d

Explanation

9. Which concept explains the working of an Operating System?

A. It is event driven

B. It is object oriented

C. It is procedure based system software

D. It is a collection of procedures that interact with each other

View/Hide Ans Correct Answer is a

Explanation

10. Which of these is/are the desirable features of an Operating system

A. Extensible

B. Portable

C. Reliable

D. All of the above

View/Hide Ans Correct Answer is d

Explanation

11. Blocking and Caching are the terms associated with which Operating system functions respectively

A. Memory management and Disk Scheduling

B. IOCS and Disk Scheduling

Page 24: MCQ Computer Science

C. IOCS and Memory management

D. Process management and IOCS

View/Hide Ans Correct Answer is b

Explanation

12. Which of these is not a term describing the collection of Operating Programs

A. Monitor

B. Kernel

C. Supervisor

D. Server

View/Hide Ans Correct Answer is d

Explanation

13. Transparency is a desirable feature of which type of Operating system-

A. Batch Processing

B. Real time

C. Distributed

D. Time sharing

View/Hide Ans Correct Answer is c

Explanation

14. Which operating system implementation has to focus on the issue of Good response time

A. Batch Processing

B. Multiprogramming

C. Distributed

D. Time sharing

Page 25: MCQ Computer Science

View/Hide Ans Correct Answer is d

Explanation

15. Program Priorities, Preemption are the key concepts of

A. Batch Processing

B. Real time

C. multiprogramming

D. Time sharing

View/Hide Ans Correct Answer is c

Explanation

16. Which operating system implementation has to focus on the issue of resource sharing?

A. Batch Processing

B. Multiprogramming

C. Distributed

D. Time sharing

View/Hide Ans Correct Answer is c

Explanation

17. This OS interleaves execution of processes in an application program to meet its deadline

A. Batch Processing

B. Real time

C. multiprogramming

D. Time sharing

View/Hide Ans Correct Answer is b

Page 26: MCQ Computer Science

Explanation

18. What in multiprogramming OS provides a foolproof method of implementing memory protection to avoid program interference?

A. Direct Memory Access

B. Privileged mode

C. Memory Protection

D. Both 2 and 3

View/Hide Ans Correct Answer is d

Explanation

19. What are the functions of multiprogramming OS?

A. Scheduling

B. Memory Management

C. I/O management

D. All of above

View/Hide Ans Correct Answer is d

Explanation

20. Applications like Banking and reservations require which type of OS?

A. Real Time

B. Hard Real Time

C. Soft Real Time

D. None of the above

View/Hide Ans Correct Answer is c

21. What feature of RTOS is supported by executing parts of a computation in different computer systems?

Page 27: MCQ Computer Science

A. Computation speed up

B. Resource sharing

C. Reliability

D. Communication

View/Hide Ans Correct Answer is a

Explanation

22. Which OS employs the techniques of fault tolerance and graceful degradation to ensure continuity of operation?

A. Batch Processing

B. Real time

C. Distributed

D. Time sharing

View/Hide Ans Correct Answer is b

Explanation

23.Pool based allocation of memory achieves better usage. Memory can be preempted from inactive programs and used to accommodate active programs. This is called

A. Preemption

B. Swapping

C. Spooling

D. Scheduling

View/Hide Ans Correct Answer is b

Explanation

24. Which of these is an example of a virtual resource?

A. Print server

Page 28: MCQ Computer Science

B. Virtual machine

C. Virtual memory

D. All of the above

View/Hide Ans Correct Answer is d

Explanation

25. Which concept explains the working of an Operating System?

A. It is event driven

B. It is object oriented

C. It is procedure based system software

D. It is a collection of procedures that interact with each other

View/Hide Ans Correct Answer is a

Explanation

26. Which of these is/are the desirable features of an Operating system

A. Extensible

B. Portable

C. Reliable

D. All of the above

View/Hide Ans Correct Answer is d

Explanation

27. Blocking and Caching are the terms associated with which Operating system functions respectively

A. Memory management and Disk Scheduling

B. IOCS and Disk Scheduling

C. IOCS and Memory management

Page 29: MCQ Computer Science

D. Process management and IOCS

View/Hide Ans Correct Answer is b

Explanation

28. Which of these is not a term describing the collection of Operating Programs

A. Monitor

B. Kernel

C. Supervisor

D. Server

View/Hide Ans Correct Answer is d

Explanation

29. Transparency is a desirable feature of which type of Operating system-

A. Batch Processing

B. Real time

C. Distributed

D. Time sharing

View/Hide Ans Correct Answer is c

Explanation

30. Which operating system implementation has to focus on the issue of Good response time

A. Batch Processing

B. Multiprogramming

C. Distributed

D. Time sharing

View/Hide Correct Answer is d

Page 30: MCQ Computer Science

Ans

31. Program Priorities, Preemption are the key concepts of

A. Batch Processing

B. Real time

C. multiprogramming

D. Time sharing

View/Hide Ans Correct Answer is c

Explanation

32. Which operating system implementation has to focus on the issue of resource sharing?

A. Batch Processing

B. Multiprogramming

C. Distributed

D. Time sharing

View/Hide Ans Correct Answer is c

Explanation

33. This OS interleaves execution of processes in an application program to meet its deadline

A. Batch Processing

B. Real time

C. multiprogramming

D. Time sharing

View/Hide Ans Correct Answer is b

Page 31: MCQ Computer Science

Explanation

34. What in multiprogramming OS provides a foolproof method of implementing memory protection to avoid program interference?

A. Direct Memory Access

B. Privileged mode

C. Memory Protection

D. Both 2 and 3

View/Hide Ans Correct Answer is d

Explanation

35. What are the functions of multiprogramming OS?

A. Scheduling

B. Memory Management

C. I/O management

D. All of above

View/Hide Ans Correct Answer is d

Explanation

36. Applications like Banking and reservations require which type of OS?

A. Real Time

B. Hard Real Time

C. Soft Real Time

D. None of the above

View/Hide Ans Correct Answer is c

Explanation

37. What feature of RTOS is supported by executing parts of a computation in different computer systems?

Page 32: MCQ Computer Science

A. Computation speed up

B. Resource sharing

C. Reliability

D. Communication

View/Hide Ans Correct Answer is a

Explanation

38. Which OS employs the techniques of fault tolerance and graceful degradation to ensure continuity of operation?

A. Batch Processing

B. Real time

C. Distributed

D. Time sharing

View/Hide Ans Correct Answer is b

Explanation

39.If ttra and tcam are the time taken to transfer a block from memory to cache and access time of cache memory respectively, then what will be the effective memory access time if h is the hit ratio

A. h+ ttra *(1+ tcam)

B. h*tcam +(1-h) *(ttra+tcam)

C. h +(1-h) *(ttra+tcam)

D. (h+1)*tcam +(1-h) *(ttra+tcam)

View/Hide Ans Correct Answer is b

Explanation

40. Programs tend to make memory accesses that are in proximity of previous access this is called

A. spatial locality

Page 33: MCQ Computer Science

B. temporal locality

C. reference locality

D. access locality

View/Hide Ans Correct Answer is a

Explanation

41. Which term means to access some data and instructions repeatedly?

A. spatial locality

B. temporal locality

C. reference locality

D. access locality

View/Hide Ans Correct Answer is b

Explanation

42.Processor architectures use several levels of cache memories to reduce the effective memory access time. which is the correct match i)L1 Cache a) part of memory chip ii)L2 Cache b) Cache on CPU Chip ii)L3 Cache c) Cache external to CPU

A. i)-a ii)-b iii)-c

B. i)-b ii)-c iii)-a

C. i)-c ii)-b iii)-a

D. i)-c ii)-a iii)-b

View/Hide Ans Correct Answer is b

Explanation

43.An Intel processor uses a cache block size of 128 bytes and a memory transfer to cache is about 10 times the access time of cache memory. with cache hit ratio of 0.97 what percent will be the effective memory access to that of access time of memory

Page 34: MCQ Computer Science

A. 20 percent

B. 30 percent

C. 40 percent

D. 50 percent

View/Hide Ans Correct Answer is c

Explanation

44. Contents of which fields of Program Status Word (PSW) define the subsequent actions of the CPU

A. Condition code, Privileged mode, Program Counter

B. Condition code, Privileged mode, interrupt mask

C. Privileged mode, interrupt mask, interrupt code

D. Privileged mode, interrupt mask, Program Counter

View/Hide Ans Correct Answer is d

Explanation

45. Which of the following should be a privileged instruction-

A. Load Bound registers

B. Load a value in a CPU Register

C. Forcibly terminate a process

D. All of the above

View/Hide Ans Correct Answer is d

Explanation

46. Throughput of a multiprogramming OS that processes n programs over th eperiod of time that starts t0 and ends at tf is

A. (tf-t0)/n

B. tf*n/t0

Page 35: MCQ Computer Science

C. n/(tf-t0)

D. n*tf*t0

View/Hide Ans Correct Answer is c

Explanation

47. Which of these are the reasons for CPU-bound programs having higher priority than the I/O bound programs

A. CPU utilization is better in CPU-bound programs

B. I/O bound programs do not get an opportunity to be executed

C. Period of concurrent CPU and I/O bound activities is rare.

D. All of the above

View/Hide Ans

Explanation

48. Which of these is incorrect in context of Real Time Operating System?

A. Permits creation of multiple processes within an application.

B. Permits priorities to be assigned to the processes.

C. Doesn't allow programmer to define interrupts and interrupt processing routines

D. Provides fault tolerance and graceful degradation capabilities.

View/Hide Ans Correct Answer is c

Explanation

49. Which of these is not a goal of Scheduling Algorithm for Different Operating Systems

A. Fairness

B. balance

C. maximize throughput

Page 36: MCQ Computer Science

D. Policy enforcement

View/Hide Ans Correct Answer is c

Explanation

50. Which of these is a disadvantage of first Come First Serve?

A. Convoy Effect

B. Small average and worst-case waiting times

C. Simplicity

D. non-preemptive

View/Hide Ans Correct Answer is a

51. What is the duration of a time quantum in Round-Robin Scheduling?

A. 10-100 millisec

B. 10-100 nanosec

C. 100-1000 millisec

D. 100-1000 nanosec

View/Hide Ans Correct Answer is a

Explanation

52. As a rule of thumb what percentage of the CPU bursts should be shorter than the time quantum?

A. 80%

B. 70%

C. 60%

D. 50%

View/Hide Ans Correct Answer is a

Page 37: MCQ Computer Science

Explanation

53. Interval between the time since submission of the job to the time its results become available, is called

A. Response Time

B. Throughput

C. Waiting time

D. Turnaround Time

View/Hide Ans Correct Answer is a

Explanation

54. A scheduler which selects processes from Primary memory is called

A. Long Term Scheduler

B. Medium Term Scheduler

C. Short Term Scheduler

D. Job Scheduler

View/Hide Ans Correct Answer is c

Explanation

55. The scheduling in which CPU is allocated to the process with least CPU-burst time is called

A. Priority Scheduling

B. Round Robin Scheduling

C. Multilevel Queue Scheduling

D. Shortest job first Scheduling

View/Hide Ans Correct Answer is d

Explanation

56. Which of the following is a fundamental process state

Page 38: MCQ Computer Science

A. blocked

B. executing

C. Waiting

D. swapped

View/Hide Ans Correct Answer is b

Explanation

57. Which of the following approaches require knowledge of the system state?

A. deadlock detection.

B. deadlock prevention.

C. deadlock avoidance.

D. all of the above.

View/Hide Ans Correct Answer is d

Explanation

58. Which scheduling policy is used for a batch processing operating system

A. Shortest-job First.

B. Round-Robin.

C. Priority Based

D. First-Come-First-Serve.

View/Hide Ans Correct Answer is d

Explanation

59. A critical section is a program segment

A. which is having a higher priority.

B. where shared resources are accessed.

Page 39: MCQ Computer Science

C. which forces deadlocks.

D. where code is shared by programs.

View/Hide Ans Correct Answer is b

Explanation

60. Which amongst the following is a valid page replacement policy?

A. RU policy (Recurrently used)

B. LRU policy (Least Recently Used)

C. only a

D. both a and b

View/Hide Ans Correct Answer is b

61. SSTF stands for

A. Shortest-Seek-time-first scheduling

B. simple-seek-time-first

C. smallest � seek-time-first.

D. None of the above

View/Hide Ans Correct Answer is a

Explanation

62. Before proceeding with its execution, each process must acquire all the resources it needs is called

A. pre-emption.

B. circular wait.

C. hold and wait

D. deadlock.

Page 40: MCQ Computer Science

View/Hide Ans Correct Answer is c

Explanation

63. The total time to prepare a disk drive mechanism for a block of data to be read from is its

A. Access Time

B. Seek time

C. latency plus seek time

D. Access time plus seek time plus transmission time

View/Hide Ans Correct Answer is c

Explanation

64. Which of these is a technique of improving the priority of process waiting in Queue for CPU allocation

A. Starvation

B. Relocation

C. Promotion

D. Ageing

View/Hide Ans Correct Answer is d

Explanation

65. In which of the following page replacement policies Balady�s anomaly does not occurs? (A) FIFO (B) LRU (C) LFU (D) NRU

A. All of the above

B. B, C and D

C. A and B.

D. Only A

View/Hide Ans Correct Answer is b

Page 41: MCQ Computer Science

Explanation

66. Page fault frequency in an operating system is reduced when the

A. processes tend to be of an equal ratio of the I/O-bound and CPU-bound

B. size of pages is increased

C. locality of reference is applicable to the process

D. processes tend to be CPU-bound

View/Hide Ans Correct Answer is c

Explanation

67. Cycle stealing is a term closely associated with-

A. DMA

B. Virtual Memory

C. Processor Scheduler

D. Disk manager

View/Hide Ans Correct Answer is a

Computer Fundamentals

1. An online backing storage system capable of storing larger quantities of data is

A. CPU

B. Memory

C. Secondary storage

D. Mass Storage

View/Hide Ans Correct Answer is D

Explanation

Page 42: MCQ Computer Science

2. Which of the following does not affect the resolution of a video display image?

A. Bandwidth

B. Raster scan rage

C. Vertical and horizontal lines of resolution

D. Screen Size

View/Hide Ans Correct Answer is a

Explanation

3. Latency time is

A. Time to spin the needed data under head

B. Time to spin the needed data under track

C. Time to spin data under sector

D. All of these

View/Hide Ans Correct Answer is a

Explanation

4. DPI stands for

A. Desktop projection Ink

B. Dot per inch

C. Dot-matrix printer ink

D. Desktop pixel Inch

View/Hide Ans Correct Answer is b

Explanation

5. Databases software may be divided into

A. five distinct categories

Page 43: MCQ Computer Science

B. four distinct categories

C. three distinct categories

D. two distinct categories

View/Hide Ans Correct Answer is c

Explanation

6. File record length

A. Should always be fixed

B. Should always be variable

C. Depends upon the size of file

D. Should be chosen to match the data characteristics.

View/Hide Ans Correct Answer is d

Explanation

7. ......is the time required by a sector to reach below read/write heat

A. Seek Time

B. Latency Time

C. Access Time

D. None

View/Hide Ans Correct Answer is b

Explanation

8. .......is a technique of improving the priority of process waiting in Queue for CPU allocation

A. Starvation

B. Ageing

C. Revocation

Page 44: MCQ Computer Science

D. Relocation

View/Hide Ans Correct Answer is b

Explanation

9. A grammar for a programming language is a formal description of

A. Syntax

B. Semantics

C. Structure

D. Code

View/Hide Ans Correct Answer is c

Explanation

10. ........is a technique of temporarily removing inactive programs from the memory of computer system

A. Swapping

B. Spooling

C. Semaphore

D. Scheduler

View/Hide Ans Correct Answer is a

1. The memory allocation scheme subject to "external" fragmentation is

A. segmentation

B. swapping

C. pure demand paging

D. multiple fixed contiguous partitions

View/Hide Ans Correct Answer is a

Page 45: MCQ Computer Science

Explanation

12. Virtual memory is

A. simple to implement

B. used in all major commercial operating systems

C. less efficient in utilization of memory

D. useful when fast I/O devices are not available

View/Hide Ans Correct Answer is b

Explanation

13. Before proceeding with its execution, each process must acquire all the resources it needs is called

A. hold and wait

B. No pre-emption

C. circular wait

D. starvation

View/Hide Ans Correct Answer is a

Explanation

14. The main reason to encrypt a file is to .......

A. Reduce its size

B. Secure it for transmission

C. Prepare it for backup

D. Include it in the start-up sequence

View/Hide Ans Correct Answer is b

Explanation

15. "LRU" page replacement policy is

Page 46: MCQ Computer Science

A. Last Replaced Unit

B. Last Restored Unit

C. Least Recently Used

D. Least Required Unit

View/Hide Ans Correct Answer is c

Explanation

16. Which of the following is not a fundamental process state

A. ready

B. terminated

C. executing

D. blocked

View/Hide Ans Correct Answer is d

Explanation

17. ODBC stands for

A. Object Database Connectivity

B. Oral Database Connectivity

C. Oracle Database Connectivity

D. Open Database Connectivity

View/Hide Ans Correct Answer is d

Explanation

18. Which two files are used during operations of the DBMS

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

Page 47: MCQ Computer Science

D. Data dictionary and query language

View/Hide Ans Correct Answer is c

Explanation

19. A protocol is a set of rules governing a time sequence of events that must take place

A. between peers

B. between an interface

C. between modems

D. across an interface

View/Hide Ans Correct Answer is a

Explanation

20. In communication satellite, multiple repeaters are known as

A. detector

B. modulator

C. stations

D. transponders

View/Hide Ans Correct Answer is d

21. Which of the following is required to communicate between two computers?

A. communications software

B. protocol

C. communication hardware

D. all of above including access to transmission medium

View/Hide Correct Answer is d

Page 48: MCQ Computer Science

Ans

Explanation

22. Which of the following is an advantage to using fiber optics data transmission?

A. resistance to data theft

B. fast data transmission rate

C. low noise level

D. All of these

View/Hide Ans Correct Answer is d

Explanation

23. Which of the following is not a transmission medium?

A. telephone lines

B. coaxial cables

C. modem

D. microwave systems

View/Hide Ans Correct Answer is c

Explanation

24. A technique for direct search is

A. Binary Search

B. Linear Search

C. Tree Search

D. Hashing

View/Hide Ans Correct Answer is d

Explanation

Page 49: MCQ Computer Science

25. Two main measures for the efficiency of an algorithm are

A. Processor and memory

B. Complexity and capacity

C. Time and Space

D. Data and Space

View/Hide Ans Correct Answer is c

Explanation

26. The space factor when determining the efficiency of algorithm is measured by

A. Counting the maximum memory needed by the algorithm

B. Counting the minimum memory needed by the algorithm

C. Counting the average memory needed by the algorithm

D. Counting the maximum disk space needed by the algorithm

View/Hide Ans Correct Answer is a

Explanation

27. The memory address of the first element of an array is called

A. floor address

B. foundation address

C. first address

D. base address

View/Hide Ans Correct Answer is d

Explanation

28. The term "push" and "pop" is related to the

A. array

Page 50: MCQ Computer Science

B. lists

C. stacks

D. all of these

View/Hide Ans Correct Answer is c

Explanation

29. What does Router do in a network?

A. Forwards a packet to all outgoing links

B. Forwards a packet to the next free outgoing link

C. Determines on which outing link a packet is to be forwarded

D. Forwards a packet to all outgoing links except the original link

View/Hide Ans Correct Answer is c

Explanation

30. Repeater operates in which layer of the OSI model?

A. Physical layer

B. Data link layer

C. Network layer

D. Transport layer

View/Hide Ans Correct Answer is a

31. GIF images can have only upto...... colors

A. 128

B. 256

C. 512

D. 1024

View/Hide Correct Answer is b

Page 51: MCQ Computer Science

Ans

Explanation

32. ......is stored on a client and contains state information of the website visited

A. Cookies

B. Servelet

C. History

D. Resident Page

View/Hide Ans Correct Answer is a

Explanation

33......are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.

A. Applets

B. Java Bean

C. Sockets

D. Java Component

View/Hide Ans Correct Answer is a

Explanation

34.Encryption is the conversion of data in some intelligible format into an unintelligible format called.....to prevent the data from being understood if read by an unauthorized party.

A. Clear Text

B. Encrypted Text

C. Cipher Text

D. Coded Text

View/Hide Ans Correct Answer is c

Page 52: MCQ Computer Science

Explanation

35.The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as

A. Spooling

B. Contention

C. I/O wait

D. Buffering

View/Hide Ans Correct Answer is d

Explanation

36. Each cell in Microsoft Office Excel documents is referred to by its cell address, which is the......

A. cell�s column label

B. cell�s column label and worksheet tab name

C. cell�s row and column labels

D. cell�s row label

View/Hide Ans Correct Answer is c

Explanation

37. The lowest form of computer language is called

A. BASIC

B. FORTRAN

C. Machine Language

D. COBOL

View/Hide Ans Correct Answer is c

Explanation

Page 53: MCQ Computer Science

38. The portion of the application that you work with in an application software package is the

A. user interface

B. utility interface

C. processing interface

D. analytical interface

View/Hide Ans Correct Answer is a

Explanation

39. A.....provides access to features of the program.

A. menu bar

B. browser

C. Office Assistant

D. feature presentation

View/Hide Ans Correct Answer is a

Explanation

40. Menus are a part of the

A. hardware

B. monitor

C. Status Bar

D. user interface

View/Hide Ans Correct Answer is d

41. Which of the following is the term for a request for specific data contained in a database?

A. question

B. query

Page 54: MCQ Computer Science

C. inquiry

D. quiz

View/Hide Ans Correct Answer is b

Explanation

42. Windows 7 is an example of a(n)

A. application software

B. browser

C. Operating system

D. shareware

View/Hide Ans Correct Answer is c

Explanation

43. The most powerful type of computer.

A. mainframe computers

B. microcomputers

C. minicomputers

D. supercomputers

View/Hide Ans Correct Answer is d

Explanation

44. The system component that controls and manipulates data in order to produce information is called the

A. keyboard

B. microprocessor

C. monitor

D. mouse

Page 55: MCQ Computer Science

View/Hide Ans Correct Answer is b

Explanation

45. Which of the following is not an operating system for mobile phones?

A. Android

B. Symbian

C. iOS

D. All of these are OS for mobile phones

View/Hide Ans Correct Answer is d

Explanation

46. This type of file is created by word processors.

A. worksheet

B. document

C. database

D. presentation

View/Hide Ans Correct Answer is b

Explanation

47.Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use computer technology.

A. graphics

B. input

C. memory

D. wireless

View/Hide Ans Correct Answer is d

Page 56: MCQ Computer Science

Explanation

48.The Internet was launched in 1969 when the United States funded a project that developed a national computer network called

A. Web

B. ISP

C. CERN

D. ARPANET

View/Hide Ans Correct Answer is d

Explanation

49. A(n)......program provides access to Web resources.

A. Web

B. ISP

C. browser

D. URL

View/Hide Ans Correct Answer is c

Explanation

50. Rules for exchanging data between computers are called

A. programs

B. procedures

C. protocols

D. hyperlinks

View/Hide Ans Correct Answer is c

51. The last part of the domain name following the dot(.) is the top........domain

Page 57: MCQ Computer Science

A. Level

B. link

C. locator

D. language

View/Hide Ans Correct Answer is a

Explanation

52. 51.Many individuals create their own personal sites called Web logs, or......

A. social networks

B. blogs

C. wikis

D. search engines

View/Hide Ans Correct Answer is b

Explanation

53. Programs that automatically submit your search request to several search engines simultaneously are called ......

A. metasearch engines

B. inclusive search engines

C. spiders

D. hits

View/Hide Ans Correct Answer is a

Explanation

54. .......cash is the Internet�s equivalent to traditional cash.

A. Universal

B. Web

Page 58: MCQ Computer Science

C. Premium

D. Digital

View/Hide Ans Correct Answer is d

Explanation

55. These programs allow parents as well as organizations to block out selected sites and set time limits on Internet access.

A. plug-ins

B. filters

C. FTP

D. DSL

View/Hide Ans

Explanation

56. ....are narrowly focused on specific disciplines and occupations.

A. Basic applications

B. Business suites

C. Specialized applications

D. Utility programs

View/Hide Ans Correct Answer is c

DBMS

1. Usage of Preemption and Transaction Rollback prevents ______.

A. Unauthorised usage of data file

B. Deadlock situation

C. Data manipulation

Page 59: MCQ Computer Science

D. File preemption

View/Hide Ans Correct Answer is B

Explanation

2. Views are useful for _____ unwanted information, and for collecting together information from more than one relation into a single view.

A. Hiding

B. Deleting

C. Highlighting

D. All of the above

View/Hide Ans Correct Answer is A

Explanation

3. The decision tree classifier is a widely used technique for ______.

A. Classification

B. Association

C. Partition

D. Clustering

View/Hide Ans Correct Answer is A

Explanation

4. Cross_tab displays permit users to view ______ of multidimensional data at a time.

A. 1 − dimension

B. 2 − dimensions

C. 3 − dimensions

D. Multidimensions

View/Hide Correct Answer is B

Page 60: MCQ Computer Science

Ans

Explanation

5. Thoma’s-write rule is ______.

A. Two phase locking protocol

B. Timestamp ordering protocol

C. One phase locking protocol

D. Sliding window protocol

View/Hide Ans Correct Answer is B

Explanation

6. Value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.

A. Logical Integrity

B. Referential Integrity

C. Domain Integrity

D. Data Integrity

View/Hide Ans Correct Answer is B

Explanation

7.The SQL expression Select distinct T, branch_name from branch T, branch S where T.assets ‹ S.assets and S.branch_city= “Mumbai” finds the names of

A. All branches that have greater assets than some branch located in Mumbai.

B. All branches that have greater assets than all branches in Mumbai.

C. The branch that has greatest asset in Mumbai.

D. Any branch that has greater assets than any branch in Mumbai.

View/Hide Ans Correct Answer is A

Page 61: MCQ Computer Science

Explanation

8.

Consider the following schemas : Branch_Schema = (branch_name, assets, city) Customer_Schema = (cutstomer_name, street, city) Deposit_Schema = (branch_name, account_number, customer_name, balance) Borrow_Schema = (branch_name, loan_number, customer_name, amount) Which of the following tuple relational calculus finds all customers who have loan amount more than ` 12,000 ?

A. t(customer_name) | t∈borrow[?] t[amount]›12000}

B. {t |t(customer_name) | t∈borrow[?] t[amount]›12000}

C. {t |[?] ∈ borrow (t(customer_name=s(customer_ name))[?] [amount]›12000}

D. {t |[?] ∈ borrow (t(customer_name)[?] s[amount] ›12000}

View/Hide Ans Correct Answer is C

Explanation

9.

Match the following :(a) Create     (i) The E-R Model(b) Select     (ii) Relationship Model(c) Rectangle     (iii) DDL(d) Record     (iv) DMLCodes :(a) (b) (c) (d)

A. (iii) (iv) (i) (ii)

B. (iv) (iii) (ii) (i)

C. (iv) (iii) (i) (ii)

D. (iii) (iv) (ii) (i)

View/Hide Ans Correct Answer is A

Explanation

10. Which of the following is true ?

A. A relation in BCNF is always in 3NF

B. A relation in 3NF is always in BCNF

C. BCNF and 3NF are same

Page 62: MCQ Computer Science

D. A relation in BCNF is not in 3NF

View/Hide Ans Correct Answer is A

11.The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between

A. DBMS & the Host record

B. Host program and Host record

C. Host program and DBMS

D. Host program and Host language

View/Hide Ans Correct Answer is C

Explanation

12.If a relation with a Schema R is decomposed into two relations R1 and R2 such that (R1 ∪ R2) = R1 then which one of the following is to be satisfied for a lossless joint decomposition (→ indicates functional dependency)

A. (R1 ∩ R2) → R1 or R1 ∩ R2 → R2

B. R1 ∩ R2 → R1

C. R1 ∩ R2 → R2

D. R1 ∩ R2 → R1 and R1 ∩ R2 → R2

View/Hide Ans Correct Answer is A

Explanation

13. Which level of Abstraction describes how data are stored in the data base ?

A. Physical level

B. View level

C. Abstraction level

D. Logical level

Page 63: MCQ Computer Science

View/Hide Ans Correct Answer is A

Explanation

14. Third normal form is based on the concept of ______.

A. Closure Dependency

B. Transitive Dependency

C. Normal Dependency

D. Functional Dependency

View/Hide Ans Correct Answer is B

Explanation

15. Referential integrity is directly related to

A. Relation key

B. Foreign key

C. Primary key

D. Candidate key

View/Hide Ans Correct Answer is B

Explanation

16. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by

A. Jamming

B. Password

C. Documentation

D. Record lock

View/Hide Ans Correct Answer is D

Explanation

Page 64: MCQ Computer Science

17. B+ tree are preferred to binary tree in Database because

A. Disk capacity are greater than memory capacities

B. Disk access is much slower than memory access

C. Disk data transfer rates are much less than memory data transfer rate

D. Disks are more reliable than Memory

View/Hide Ans Correct Answer is B

Explanation

18. A Transaction Manager is which of the following ?

A. Maintains a log of transactions

B. Maintains before and after database images

C. Maintains appropriate concurrency control

D. All of the above

View/Hide Ans Correct Answer is D

Explanation

19. What is Granularity ?

A. The size of database

B. The size of data item

C. The size of record

D. The size of file

View/Hide Ans Correct Answer is B

Explanation

20. Which level of Abstraction describes what data are stored in the Database ?

A. Physical level

Page 65: MCQ Computer Science

B. View level

C. Abstraction level

D. Logical level

View/Hide Ans Correct Answer is D

21.The problem that occurs when one transaction updates a database item and then the transaction fails for some reason is ________.

A. Temporary Select Problem

B. Temporary Modify Problem

C. Dirty Read Problem

D. None

View/Hide Ans Correct Answer is C

Explanation

22. Consider a schema R(A, B, C, D) and functional dependencies A → B and C → D. Then the decomposition R1(A, B) and R2(C, D) is

A. Dependency preserving but not lossless join

B. Dependency preserving and lossless join

C. Lossless Join but not dependency preserving

D. Lossless Join

View/Hide Ans Correct Answer is A

Explanation

23. If D1,D2, ....Dn are domains in a relational model, then the relation is a table, which is a subset of

A. D1+D2+... +Dn

B. D1ΧD2Χ ... ΧDn

C. D1∪D2∪... ∪Dn

Page 66: MCQ Computer Science

D. D1−D2−...−Dn

View/Hide Ans Correct Answer is B

Explanation

24. Which of the following is not a type of Database Management System ?

A. Hierarchical

B. Network

C. Relational

D. Sequential

View/Hide Ans Correct Answer is D

Explanation

25. Manager&rsquos salary details are to be hidden from Employee Table. This Technique is called as

A. Conceptual level Datahiding

B. Physical level Datahiding

C. External level Datahiding

D. Logical level Datahiding

View/Hide Ans Correct Answer is C

Explanation

26. A Network Schema

A. restricts to one to many relationship

B. permits many to many relationship

C. stores Data in a Database

D. stores Data in a Relation

View/Hide Correct Answer is B

Page 67: MCQ Computer Science

Ans

Explanation

27. The relation “divides” on a set of positive integers is ________.

A. Symmetric and transitive

B. Anti symmetric and transitive

C. Symmetric only

D. Transitive only

View/Hide Ans Correct Answer is B

Explanation

28. The “PROJECT” operator of a relational algebra creates a new table that has always

A. More columns than columns in original table

B. More rows than original table

C. Same number of rows as the original table

D. Same number of columns as the original table

View/Hide Ans Correct Answer is C

Explanation

29.

The employee information of an Organization is stored in the relation : Employee (name, sex, salary, deptname) Consider the following SQL query Select deptname from Employee Where sex = ‘M’ group by deptname having avg (salary) > {select avg (salary) from Employee} Output of the given query corresponds to

A. Average salary of employee more than average salary of the organization.

B. Average salary less than average salary of the organization.

C. Average salary of employee equal to average salary of the organization

D. Average salary of male employees in a department is more than average salary of the organization

Page 68: MCQ Computer Science

View/Hide Ans Correct Answer is D

Explanation

30.For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation

A. In 1NF not in 2NF

B. In 2NF not in 3NF

C. In 3NF

D. In 1NF

View/Hide Ans Correct Answer is B

31.Match the following : a.Foreign keys i.Domain constraint b.Private key ii.Referential integrity c.Event control action model iii.Encryption d.Data security iv. Trigger

A. a b c d iii ii i iv

B. a b c d ii i iv iii

C. a b c d iii iv i ii

D. a b c d i ii iii iv

View/Hide Ans Correct Answer is b

Explanation

32. SQL command to delete a column from an existing table:

A. Alter table

B. Drop table

C. Delete table

D. Delete column

View/Hide Ans Correct Answer is a

Explanation

Page 69: MCQ Computer Science

33. With QBE, inserting records from one or more source tables into a single target table can be achieved by:

A. Append action query

B. Update action query

C. Insert action query

D. Make table action query

View/Hide Ans Correct Answer is a

Explanation

34. Tuple in relational algebra refers to:

A. Row

B. Column

C. Table

D. Relation

View/Hide Ans Correct Answer is a

Explanation

35. An attribute or set of attributes within one relation that matches the candidate key of some(possibly the same) relation:

A. Super Key

B. Candidate key

C. Primary key

D. Foreign key

View/Hide Ans Correct Answer is d

Explanation

36. A subset of data in a data warehouse in the form of summary data, related to a particular department or business function:

Page 70: MCQ Computer Science

A. Meta Data

B. Archive data

C. Data Marts

D. Operational Data Store

View/Hide Ans Correct Answer is c

Explanation

37. The normalization of 1NF relations to 2NF involves:

A. Removal of partial dependencies

B. Removal of full dependencies

C. Removal of transitive dependencies

D. Removal of multi-valued dependencies

View/Hide Ans Correct Answer is a

Explanation

38. Why do we go for Normalization of Data Bases?

A. To avoid the repetitions

B. To prevent fragmentation

C. Avoid redundancy

D. To prevent replication

View/Hide Ans Correct Answer is c

Explanation

39. if a relation is in BCNF then it is in:

A. 2 NF

B. 3 NF

C. 1 NF

Page 71: MCQ Computer Science

D. 1 NF and 2 NF

View/Hide Ans Correct Answer is c

Explanation

40. A file is:

A. an abstract data type

B. logical storage unit

C. usually non volatile

D. volatile

View/Hide Ans Correct Answer is c

41. What property of the files prevents sharing of files and directories?

A. Tree structure

B. One level structure

C. Two level structure

D. Length

View/Hide Ans Correct Answer is a

Explanation

42. E-R modeling technique is:

A. Tree structure

B. Top-down method

C. Bottom-up method

D. Right-left approach

View/Hide Ans Correct Answer is b

Explanation

Page 72: MCQ Computer Science

43. Data items stored as grouped items is:

A. Record

B. List

C. Strings

D. Title list

View/Hide Ans Correct Answer is a

Explanation

44. Data items are fragmented, replicated and propagated in:

A. DBMS

B. RDBMS

C. DDBMS

D. DML

View/Hide Ans Correct Answer is c

Explanation

45. If every non-key attribute is functionally dependent on the primary key, then the relation will be in

A. 1NF

B. 2NF

C. 3NF

D. 4NF

View/Hide Ans Correct Answer is c

Explanation

46. which of the following is record based logical model(s)?

A. Network Model

Page 73: MCQ Computer Science

B. Object-oriented model

C. Relational Model

D. Entity Relationship Model

View/Hide Ans Correct Answer is a,c

Explanation

47. In an E-R diagram ellipses represents

A. Entity sets

B. relationship among entity sets

C. attributes

D. link in attributes & entity sets

View/Hide Ans Correct Answer is c

Explanation

48. The set of permitted values for each attribute is called its

A. Attribute set

B. attribute range

C. domain

D. group

View/Hide Ans Correct Answer is c

Explanation

49. Relations produced from an E-R model will always be in

A. 1NF

B. 2NF

C. 3NF

D. 4NF

Page 74: MCQ Computer Science

View/Hide Ans Correct Answer is c

Explanation

50. E-R modeling technique is a

A. Top-down approach

B. Bottom-up approach

C. Left-right approach

D. none of above

View/Hide Ans Correct Answer is a

51. Redundancy is dangerous as it is a potential threat to data

A. Integrity

B. Consistency

C. Sufficiency

D. None

View/Hide Ans Correct Answer is a,b

Explanation

52. Who is more concerned about the conceptual level of the DBMS

A. DBA

B. The end user

C. The Systems programmer

D. Client

View/Hide Ans Correct Answer is a

Explanation

53. An Attribute of one table matching the primary key of another table is called as

Page 75: MCQ Computer Science

A. Foreign key

B. Secondary key

C. Candidate key

D. Composite

View/Hide Ans Correct Answer is a

Explanation

54. If a relation is in BCNF, then it is also in

A. 1NF

B. 2NF

C. 3NF

D. all of above

View/Hide Ans Correct Answer is c

Explanation

55. The way a particular application views the data from the database that the application uses is a

A. Module

B. Relational Model

C. Schema

D. Sub Schema

View/Hide Ans Correct Answer is d

Explanation

56. Locking can be used for:

A. Deadlock

B. Lost Update

Page 76: MCQ Computer Science

C. Uncommitted dependency

D. Inconsistent data

View/Hide Ans Correct Answer is bcd

Explanation

57. In relation Model Column is referred to as :

A. Tuple

B. Entity

C. Degree

D. Attribute

View/Hide Ans Correct Answer is d

Explanation

58. ER Model Comes under

A. Physical data Model

B. Record based logical Model

C. Object based logical Model

D. All of above

View/Hide Ans Correct Answer is c

Explanation

59.Which of the following is the problem of file management system? (a) Lack of data independence(b) Data redundancy(c) Update (d) all Periodically adding, changing, & Deleting file records is called file

A. Updating

B. Upgrading

C. Restructuring

Page 77: MCQ Computer Science

D. Renewing

View/Hide Ans Correct Answer is d

Explanation

60. Which of the following is a relational database

A. 4th Dimensions

B. FoxPro

C. dbase-IV

D. All of the above

View/Hide Ans Correct Answer is a

61. The Index consists of :

A. A list of keys

B. Pointers to the master list

C. Both (a) & (b)

D. None of above

View/Hide Ans Correct Answer is d

Explanation

62. Report generators are used to

A. Store data input by a user

B. retrieve information from files

C. Answer queries

D. Both (b) & (c)

View/Hide Ans Correct Answer is c

Explanation

Page 78: MCQ Computer Science

63. In a relational schema, each tuple is divided into fields called :

A. Relations

B. Domains

C. Queries

D. None of above

View/Hide Ans Correct Answer is d

Explanation

64. The set of permitted values for each attribute is called its :

A. Attribute set

B. Attribute range

C. Domain

D. Group

View/Hide Ans Correct Answer is b

Explanation

65. A DBMS consists of application programs called :

A. FORTRAN

B. AUTOFLOW

C. BPL

D. TOTAL

View/Hide Ans Correct Answer is c

Explanation

66. A locked file can be :

A. Accessed by only one user

B. modified by user with correct password

Page 79: MCQ Computer Science

C. is used to hide sensitive information

D. None

View/Hide Ans Correct Answer is c

Explanation

67. Transaction X holds a shared lock R. if transaction Y requests for a shared lock on R :

A. result in deadlock situation

B. Immediately Granted

C. Immediately rejected

D. Granted as is released by X

View/Hide Ans Correct Answer is b

Explanation

68. command used to select only one copy of each set of duplicable rows :

A. Select Distant

B. Select Unique

C. Select Different

D. None

View/Hide Ans Correct Answer is a

Explanation

69. Which of following is the characteristics of a relational database model?

A. Tables

B. Treelike Structure

C. Complex logical relationship

Page 80: MCQ Computer Science

D. records

View/Hide Ans Correct Answer is acd

Explanation

70. Which command is used to remove rows from a table?

A. Delete

B. Remove

C. Truncate

D. Both (a) & (b)

View/Hide Ans Correct Answer is d

71. Which command is used to remove a table or index from the database in SQL?

A. Delete Table

B. Drop table

C. Erase Table

D. None of above

View/Hide Ans Correct Answer is b

Explanation

72. A report generator is used to :

A. Update files

B. Print files on paper

C. Data Entry

D. None

View/Hide Ans Correct Answer is b

Explanation

Page 81: MCQ Computer Science

73. The modify operation is likely to be done after :

A. Delete

B. Look-up

C. Insert

D. None of above

View/Hide Ans Correct Answer is b

Explanation

74. The database environment has all of the following components except :

A. Users

B. Separate files

C. Database

D. DBA

View/Hide Ans Correct Answer is b

Explanation

75. If every non key attribute is functionally dependent on the primary key, then the relation will be in :

A. 1NF

B. 2NF

C. 3NF

D. 4NF

View/Hide Ans Correct Answer is c

Explanation

76. Director�s Salary details are hidden from the employee, that is :

A. Conceptual level Hiding

Page 82: MCQ Computer Science

B. Physical level data Hiding

C. External level data hiding

D. None of above

View/Hide Ans Correct Answer is c

Explanation

77. Which of the following is record based logical model(s)?

A. Network Model

B. object oriented model

C. Relational Model

D. E-R Model

View/Hide Ans Correct Answer is ac

Explanation

78. The distinguishable parts of a record are called

A. Data

B. files

C. fields

D. All of above

View/Hide Ans Correct Answer is c

Explanation

79. Embedded pointers provide

A. An inverted index

B. a secondary access path

C. a physical record key

D. all of above

Page 83: MCQ Computer Science

View/Hide Ans Correct Answer is b

Explanation

80. Which database handles full text data, image, audio and video?

A. Transaction database

B. Graphics database

C. Video on demand database

D. Multimedia database

View/Hide Ans Correct Answer is d

81. A data dictionary does not provide information about

A. Where data is located

B. who owns it

C. size of disk storage device

D. How the data is used

View/Hide Ans Correct Answer is c

Explanation

82. Data item characteristics that are important in data management include

A. Width

B. language

C. spelling

D. all of above

View/Hide Ans Correct Answer is a

Explanation

83. A schema describes

Page 84: MCQ Computer Science

A. Record & files

B. data elements

C. record relationships

D. all of the above

View/Hide Ans Correct Answer is d

Explanation

84. Data security threat include

A. Privacy invasion

B. hardware failure

C. Fraudulent manipulation of data

D. all of above

View/Hide Ans Correct Answer is a

Explanation

85. Which language is used by most of dbms�s for helping their users to access data?

A. 4GL

B. SQL

C. Query languages

D. HLL

View/Hide Ans Correct Answer is c

Explanation

86. Which of the following is at highest level in the hierarchy of data organization?

A. Data Record

B. data File

Page 85: MCQ Computer Science

C. Database

D. Data Bank

View/Hide Ans Correct Answer is c

Explanation

87. The logical data structure with one to many relationship is a

A. Network

B. Tree

C. Chain

D. All of above

View/Hide Ans Correct Answer is d

Explanation

88. An entry in a telephone book can be compared to a

A. Database

B. File

C. Record

D. Field

View/Hide Ans Correct Answer is c

http://www.brightways.org/ugc-net-gate-mcq-dbms.php?page=9#!