Free download in PDF Computer Science Multiple Choice Questions(MCQs) & Answers. These multiple choice questions on Computer Science are very useful for NIELIT, BCA, B.Sc. MCA, M.Sc. B.Tech, M.Tech, BE, ME students an interview for various positions like Web Developer, System Analyst etc.
1
Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level
2
The software _________ of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them.
5
Consider the following statements S1 and S2 : S1 : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell. S2 : A soft handover is one in which the channel in the source cell is released and only then the channel in the target cell is engaged.
9
A hierarchical memory system that uses cache memory has cache access time of 50 nano seconds, main memory access time of 300 nano seconds, 75% of memory requests are for read, hit ratio of 0.8 for read access and the write-through scheme is used. What will be the average access time of the system both for read and write requests ?
11
In a dot matrix printer the time to print a character is 6 m.sec., time to space in between characters is 2 m.sec., and the number of characters in a line are 200. The printing speed of the dot matrix printer in characters per second and the time to print a character line are given by which of the following options ?
14
Location transparency allows : I. Users to treat the data as if it is done at one location. II. Programmers to treat the data as if it is at one location. III. Managers to treat the data as if it is at one location. Which one of the following is correct ?
15
Which of the following is correct ? I. Two phase locking is an optimistic protocol. II. Two phase locking is pessimistic protocol III. Time stamping is an optimistic protocol. IV. Time stamping is pessimistic protocol.
16
__________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information.
18
Consider the following statements : I. Re-construction operation used in mixed fragmentation satisfies commutative rule. II. Re-construction operation used in vertical fragmentation satisfies commutative rule Which of the following is correct ?