Computer Science MCQs | Computer Science Multiple Choice Questions with Answers

Questions
1 Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level
A Performed
B Managed
C Defined
D Optimized

Answer: Option [C]
2 The software _________ of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them.
A Design
B Partition
C Process
D Requirement

Answer: Option [B]
3 Which one of the following set of attributes should not be encompassed by effective software metrics ?
A Simple and computable
B Consistent and objective
C Consistent in the use of units and dimensions
D Programming language dependent

Answer: Option [D]
4 Which one of the following is used to compute cyclomatic complexity ?
A The number of regions – 1
B E – N + 1, where E is the number of flow graph edges and N is the number of flow graph nodes
C P – 1, where P is the number of predicate nodes in the flow graph G
D P + 1, where P is the number of predicate nodes in the flow graph G

Answer: Option [D]
5 Consider the following statements S1 and S2 : S1 : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell. S2 : A soft handover is one in which the channel in the source cell is released and only then the channel in the target cell is engaged.
A S1 is true and S2 is not true
B S1 is not true and S2 is true
C Both S1 and S2 are true
D Both S1 and S2 are not true

Answer: Option [D]
6 Fact-less fact table in a data warehouse contains
A only measures
B only dimensions
C keys and measures
D only surrogate keys

Answer: Option [D]
7 Which e-business model allows consumers to name their own price for products and services ?
A B2 B
B B2 G
C C2 C
D C2 B

Answer: Option [D]
8 __________ model is designed to bring prices down by increasing the number of customers who buy a particular product at once.
A Economic Order Quantity
B Inventory
C Data Mining
D Demand-Sensitive Pricing

Answer: Option [D]
9 A hierarchical memory system that uses cache memory has cache access time of 50 nano seconds, main memory access time of 300 nano seconds, 75% of memory requests are for read, hit ratio of 0.8 for read access and the write-through scheme is used. What will be the average access time of the system both for read and write requests ?
A 157.5 n.sec
B 110 n.sec
C 75 n.sec
D 82.5 n.sec

Answer: Option [A]
10 For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate
A Internal interrupts
B External interrupts
C Software interrupts
D None of the above

Answer: Option [C]
11 In a dot matrix printer the time to print a character is 6 m.sec., time to space in between characters is 2 m.sec., and the number of characters in a line are 200. The printing speed of the dot matrix printer in characters per second and the time to print a character line are given by which of the following options ?
A 125 chars/second and 0.8 seconds
B 250 chars/second and 0.6 seconds
C 166 chars/second and 0.8 seconds
D 250 chars/second and 0.4 seconds

Answer: Option [A]
12 How many times will the following loop be executed ? LXI B, 0007 H LOP : DCX B MOV A, B ORA C JNZ LOP
A 05
B 07
C 09
D 00

Answer: Option [B]
13 Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085 microprocessor performs addition of 87 H and 79 H.
A 11, 1, 1, 1
B 10, 0, 1, 0
C 01, 1, 0, 0
D 00, 0, 1, 1

Answer: Option [D]
14 Location transparency allows : I. Users to treat the data as if it is done at one location. II. Programmers to treat the data as if it is at one location. III. Managers to treat the data as if it is at one location. Which one of the following is correct ?
A I, II and III
B I and II only
C II and III only
D II only

Answer: Option [A]
15 Which of the following is correct ? I. Two phase locking is an optimistic protocol. II. Two phase locking is pessimistic protocol III. Time stamping is an optimistic protocol. IV. Time stamping is pessimistic protocol.
A I and III
B II and IV
C I and IV
D II and III

Answer: Option [D]
16 __________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information.
A Write-ahead log
B Check-pointing
C Log buffer
D Thomas

Answer: Option [B]
17 Let R = ABCDE is a relational scheme with functional dependency set F = {A → B, B → C, AC → D}. The attribute closures of A and E are
A ABCD, φ
B ABCD, E
C Φ, φ
D ABC, E

Answer: Option [B]
18 Consider the following statements : I. Re-construction operation used in mixed fragmentation satisfies commutative rule. II. Re-construction operation used in vertical fragmentation satisfies commutative rule Which of the following is correct ?
A I
B II
C Both are correct
D None of the statements are correct 2

Answer: Option [D]
19 Which of the following is false ?
A Every binary relation is never be in BCNF
B Every BCNF relation is in 3NF
C 1 NF, 2 NF, 3 NF and BCNF are based on functional dependencies
D Multivalued Dependency (MVD) is a special case of Join Dependency (JD)

Answer: Option [A]
20 Which of the following categories of languages do not refer to animation languages ?
A Graphical languages
B General-purpose languages
C Linear-list notations
D None of the above

Answer: Option [D]