Computer Science MCQs | Computer Science Multiple Choice Questions with Answers

Questions
1 In TCP/IP Reference model, the job of _______ layer is to permit hosts to inject packets into any network and travel them independently to the destination.
A Physical
B Transport
C Application
D Host-to-network

Answer: Option [A]
2 If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be :
A N
B (N – 1)
C N(N – 1) 2
D N(N + 1) 2

Answer: Option [B]
3 Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ________ the critical angle.
A equal to
B less than
C greater than
D less than or equal to

Answer: Option [D]
4 The number of strings of length 4 that are generated by the regular expression (0|∈)1+2* (3|∈), where | is an alternation character, {+, *} are quantification characters, and ∈ is the null string, is :
A 08
B 10
C 11
D 12

Answer: Option [A]
5 The content of the accumulator after the execution of the following 8085 assembly language program, is : MVI A, 42H MVI B, 05H UGC: ADD B DCR B JNZ UGC ADI 25H HLT
A 82 H
B 78 H
C 76 H
D 76 H

Answer: Option [B]
6 In _______, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.
A Loop unrolling
B Strength reduction
C Loop concatenation
D Loop jamming

Answer: Option [B]
7 Which of the following is not typically a benefit of dynamic linking ? I. Reduction in overall program execution time. II. Reduction in overall space consumption in memory. III. Reduction in overall space consumption on disk. IV. Reduction in the cost of software updates.
A I and IV
B I only
C II and III
D IV only

Answer: Option [B]
8 Which of the following is FALSE ?
A The grammar S → a Sb |bSa|SS|∈, where S is the only non-terminal symbol and ∈ is the null string, is ambiguous
B SLR is powerful than LALR
C An LL(1) parser is a top-down parser
D YACC tool is an LALR(1) parser generator

Answer: Option [B]
9 Consider the reference string 012301401234 If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are _______ and ______ respectively.
A 10, 9
B 9, 9
C 10, 10
D 9, 10

Answer: Option [B]
10 If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are : 98, 37, 14, 124, 65, 67
A 320
B 322
C 321
D 319

Answer: Option [B]
11 In UNIX, _________ creates three subdirectories : ‘PIS’ and two subdirectories ‘progs’ and ‘data’ from just created subdirectory ‘PIS’.
A mkdir PIS/progs PIS/data PIS
B mkdir PIS progs data
C mkdir PIS PIS/progs PIS/data
D mkdir PIS/progs data

Answer: Option [A]
12 A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler reevaluates the process priority for every ‘T’ time units and decides next process to be scheduled. If the process have no I/O operations and all arrive at time zero, then the scheduler implements _________ criteria.
A Priority scheduling
B Round Robin Scheduling
C Shortest Job First
D FCFS

Answer: Option [B]
13 If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is :
A 1 + S3 S1
B 1 – S3 S1
C 1 + S1 S3
D 1 – S1 S3

Answer: Option [D]
14 The ________ model is preferred for software development when the requirements are not clear.
A Rapid Application Development
B Rational Unified Process
C Evolutionary Model
D Waterfall Model

Answer: Option [A]
15 Which of the following is not included in waterfall model ?
A Requirement analysis
B Risk analysis
C Design
D Coding

Answer: Option [B]
16 The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is :
A P + 1
B P – 1
C P – 2
D P + 2

Answer: Option [B]
17 The extent to which a software tolerates the unexpected problems, is termed as :
A Accuracy
B Reliability
C Correctness
D Robustness

Answer: Option [B]
18 An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ______.
A Masquerade Attack
B Replay Attack
C Passive Attack
D Denial of Service Attack

Answer: Option [B]
19 A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?
A 100 Kbps
B 200 Kbps
C 400 Kbps
D 1000 Kbps

Answer: Option [B]
20 Pipelining improves performance by :
A decreasing instruction latency
B eliminating data hazards
C exploiting instruction level parallelism
D decreasing the cache miss rate

Answer: Option [B]