Header Ads

Best Computer Science Questions for DRDO

Best Computer Science Questions for DRDO


1
The computer program language which is widely used in computer science and engineering
and also in business is
a. COBOL
b. FORTRAN
c. PASCAL
d. LISP
Answer. a



2.
The control unit of a microprocessor
a. Stores data in the memory
b. Accepts input data from keyboard
c. Performs arithmetic/logic function
d. None of above
Answer. d
3.
A group of magnetic tapes, videos or terminals usually under the control of one master is
a. Cylinder
b. Surface
c. Track
d. Cluster
Answer. d
4.
The two paradigms if IPC are ………… and …….
a. call, reply
b. shared memory, message passing
c. send, receive
d. call by value, call by reference
Answer. b
5.
To ensure that the ……… condition never occurs in the system, we must guarantee that, whenever a process requests a resource, it does not have any other resource.
a. mutual exclusion
b. no-preemption
c. circular waits
d. hold and wait
Answer. d
 6.
Which of the following is/are the CSS properties used in font property type.
i) font-family  ii) font-variant  iii) color  iv) size
a. i, ii and iii only
b. ii, iii and iv only
c. i, iii and iv only
d. All i, ii, iii and iv only
Answer. a
 7.
A ……………………. object is any object created by the execution of JavaScript code.
a. native
b. host
c. user defined
d. remote
Answer. c
8.
We can select the column heading in excel ??
a. Click on column heading
b. Edit choose the select than click on column
c. Both of the above
d. None of the above
Answer. c
9.
 …….. sorting algorithm is frequently used when n is small where n is total number of elements.
a. Heap
b. Insertion
c. Bubble
d. Quick
Answer. b
10.
……… form of access is used to add and remove nodes from a queue.
a. LIFO, Last In First Out
b. FIFO, First In First Out
c. Both a and b
d. None of these
Answer. b
11.
What is the SEO in digital marketing??
a. search engine optimization
b. it is the google's spider bot
c. it is search engine
d. none of the above
Answer. a
12.
Database __________ which is the logical design of the database, and the database _______ which is a snapshot of the data in the database at a given instant in time.
a. Instance, Schema
b. Relation, Schema
c. Relation, Domain
d. Schema, Instance
Answer. d
13.
 The request and release of resources are ___________
a. command line statements
b. interrupts
c. system calls
d. special programs
Answer. c
14.
The disadvantage of a process being allocated all its resources before beginning its execution is :
a. Low CPU utilization
b. Low resource utilization
c. Very high resource utilization
d. None of the mentioned
Answer. b
15.
In Domain Name System (DNS), well known port 53 provides services of
a. UDP
b. TCP
c. ICMP
d. Both A & B
Answer. d
16.
A DNS client/server program can support an e-mail program to find IP address of an
a. E-Mail Server
b. DNS Server
c. Email Recipient
d. DNS Recipient
Answer. c
17.
Encryption and decryption provide secrecy, or confidentiality, but not
a. Authentication
b. Integrity
c. Privacy
d. All of the above
Answer. b
18.
In comparison with static RAM memory, the dynamic RAM memory has
a. lower bit density and higher power consumption
b. higher bit density and higher power consumption
c. lower bit density and lower power consumption
d. higher bit density and lower power consumption
Answer. b
19.
Evaluate !(1 && !(0 || 1)).
a. True
b. False
c. Unevaluatable
d. depend on compiler
Answer. a
20.
Which of the statements is true in a protected derivation of a derived class from a base class?
a. Private members of the base class become protected members of the derived class
b. Protected members of the base class become public members of the derived class
c. Public members of the base class become protected members of the derived class
d. Protected derivation does not affect private and protected members of the derived class
Answer. c
21.
Assume that we have constructor function for both Base and Derived classes. Now consider the declaration :



main ( )

Base *p = new Derived;
In what sequence, the constructor will be executed ?
a. Derived class constructor is followed by Base class constructor.
b. Base class constructor is followed by Derived class constructor.
c. Base class constructor is never called.
d. Derived class constructor is never called.
Answer. a
 22.
What is the error in the following code?
class t
{
virtual void print();
}
a. No error
b. Function print() should be declared as static.
c. Function print() should be defined.
d. Class t should contain data members.
Answer. a
23. Which of the statements are true ?
I. Function overloading is done at compile time.
II. Protected members are accessible to the member of derived class.
III. A derived class inherits constructors and destructors.
IV. A friend function can be called like a normal function.
V. Nested class is a derived class.
a. I, II, III
b. II, III, V
c. III, IV, V
d. I, II, IV
Answer. d
24.   What will be the output of following program?
#include<iostream.h>
void main()
{
float x;
x=(float)9/2;
cout<<x;
}
a. 4.5
b. 4.0
c. 4
d. 5
Answer. a
 
 25 if x =5, y =2 then x ^y equals________.
(where ^ is a bitwise XOR operator)
a. 00000111
b. 10000010
c. 10100000
d. 11001000
Answer. a
26.
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
a. 9 bits
b. 11 bits
c. 14 bits
d. 15 bits
Answer. d
27.
Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network? 
a. Tree
b. Ring
c. Star
d. Bus
Answer. d

  28 Dijkstra banker algorithm is an operating system to solve the problem of
a. dead look avoidance
b. dead look recovery
c. mutual exclusion
d. contest sustaining
Answer. a
29.
Which of the following are language processors?
a. Assembler
b. Compilers
c. interpreters
d. All of these
Answer. d
30.
The view of total database content is
a. Internal view
b. Conceptual view
c. External view
d. Physical View
Answer. b
31.
ODBC stands for 
a. Object Database Connectivity
b. Oral Database Connectivity
c. Open Database Connectivity
d. Oracle Database Connectivity
Answer. c
32.
The data structure required for breadth first traversal on a graph is
a. Stack
b. Queue
c. Array
d. Tree
Answer. b
33.
A basic instruction that can be interpreted by computer generally has
a. A decoder and an accumulator
b. Sequence register and decoder
c. An operand and an address
d. An address and decoder
Answer. c
   34. The register used as a working area in CPU is

a. Program counter
b. Instruction register
c. Instruction decoder
d. Accumulator
Answer. d
35.
The control unit of computer
a. Performs ALU operations on the data
b. Direct the other unit of computers
c. Controls the operation of the output devices
d. Is a device for manually operating the computer
Answer. b
36.
The bus which is used to transfer data from main memory to peripheral device is
a. Data bus
b. Input bus
c. DMA bus
d. Output bus
Answer. c
37.
If an array is used as function argument, the array is passed
a. By value
b. By reference
c. By name
d. The array cannot be used as a function argument
Answer. b
  38.Which of the following data structure is non-linear type?
a. Strings
b. Lists
c. Stacks
d. None of above
Answer. d

 39. What is the output of the following program segment?
main()
{
int i = ++2;
printf(“%d\n”, i);
}
a. 3
b. 2
c. 0
d. error or compiler dependent
Answer. a
40. Output of the program given below is
int i;
main()
{
printf(“%d”, i)
a. 1
b. 0
c. -1
d. NULL
Answer. b
     41. Which command is used to create a directory?

a. CRDIR
b. MKDIR
c. MD
d. CR
Answer. b
42.
Which is the earliest and most widely used shell that came with the UNIX system?
a. C Shell
b. Korn Shell
c. Bourne Shell
d. Smith Shell
Answer. c
43.
Which of the following best illustrates the default subnet mask for a class A,B, and C Network
a. 0.0.0.0, 0.0.0.1, 0.0.1.1
b. 255.255.255.0, 255.255.0.0, 255.0.0.0
c. 255.0.0.0, 255.255.0.0, 255.255.255.0
d. 255.255.0.0, 255.255.255.0, 255.255.255.255
Answer. c
44.
Which channel is deployed by the radio station for transmission?
a. Half duplex
b. Full duplex
c. Simplex channel
d. None of the above
Answer. c
45.
ATM is an example of 
a. Ring topology
b. Star topology
c. Bus topology
d. None of the above
Answer. b
46.
Which of the following device is used to connect two systems, especially if the systems use different protocols? 
a. Hub
b. Bridge
c. Gateway
d. Repeater
Answer. c
  47. Frames from one LAN can be transmitted to another LAN via the device

a. Router
b. Bridge
c. Repeater
d. Modem
Answer. b
48.
In classful addressing, the IP address 190.255.254.254 belongs to
a. A
b. B
c. C
d. D
Answer. b
49.
What is the correct HTML for creating a hyperlink?
a. < a href="http://www. educatepk.com"> educatepk
b. http://www.educatepk.com
c. educatepk.com
d. educatepk.com
Answer. a

51.
VGA stands for
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
Answer. a
52.
Which SQL statement is used to insert new data in a database?
a. ADD NEW
b. INSERT NEW
c. INSERT INTO
d. ADD RECORD
Answer. c
53.
Which of the following is not a transmission medium?
a. telephone lines
b. coaxial cables
c. microwave systems
d. modem
Answer. d
54.
Why would a hacker use a proxy server?
a. To create a stronger connection with the target.
b. To create a ghost server on the network.
c. To hide malicious activity on the network.
d. To obtain a remote access connection.
Answer. c
55.
Sniffing is used to perform ______________ fingerprinting.
a. Passive stack
b. Active stack
c. Passive banner grabbing
d. Scanned
Answer. a
56.
 Services running on a system are determined by _____________.
a. The system’s IP address.
b. The Active Directory
c. The system’s network name
d. The port assigned
Answer. d
57.
 Which of the following can be a multivalued attribute?
a. Phone_number
b. Name
c. Date_of_birth
d. All of the mentioned
Answer. a
58. Comment on the output of this C code?

int main()
{
float f1 = 0.1;
if (f1 == 0.1)
printf("equal\n");
else
printf("not equal\n");
}
a. equal
b. not equal
c. Output depends on compiler
d. None of the mentioned
Answer. b
59.
Which of the following is not a valid variable name declaration?
a. int _a3;
b. int a_3;
c. int 3_a;
d. int _3a
Answer. c
60.
To access the services of operating system, the interface is provided by the:
a. system calls
b. API
c. library
d. assembly instructions
Answer. a
61.
Which one of the following is not a real time operating system?
a. VxWorks
b. Windows CE
c. RTLinux
d. Palm OS
Answer. d
62.
Program always deals with:
a. logical address
b. absolute address
c. physical address
d. relative address
Answer. a
63.
 The Process Control Block is :
a. a Block in memory
b. Process type variable
c. Data Structure
d. a secondary storage section
Answer. c
64.
What is the numerical range of a char in Java?
a. -128 to 127
b. 0 to 256
c. 0 to 32767
d. 0 to 65535
Answer. d
65.
 Which one is a valid declaration of a boolean in java?
a. boolean b1 = 1;
b. boolean b2 = ‘false’;
c. boolean b3 = false;
d. boolean b4 = ‘true’
Answer. c
66.
The decimal equivalent of the octal number (645)8 is ______
a. (450)10
b. (451)10
c. (421)10
d. (501)10
Answer. c
67.
On subtracting (001100)2 from (101001)2 using 2’s complement, we get
a. 1101100
b. 011101
c. 11010101
d. 11010111
Answer. b
68.
Static memory holds data as long as
a. AC power is applied
b. DC power is applied
c. Capacitor is fully charged
d. None of the Mentioned
Answer. b
69.
The physical layer translates logical communication requests from the ______ into hardware specific operations.
a. data link layer
b. network layer
c. trasnport layer
d. application layer
Answer. a
70.
A feature of MS Office that saves the document automatically after certain interval is called ____
a. Save
b. Save As
c. Auto Save
d. Backup
Answer. c
71.
Superscript, subscript, strikethrough are known as ?
a. Font Face
b. Font Style
c. Font Effects
d. Font Format
Answer. c
72.
Which of the following enables us to view data from a table based on a specific criterion
a. Form
b. Query
c. Macro
d. Report
Answer. b
73.
A attribute in a relation is a foreign key if the _______ key from one relation is used as an attribute in that relation. 
a. Candidate
b. Primary
c. Super
d. Sub
Answer. b
74.
What is the full form of SOAP ?
a. Small Object Access Procedure
b. Simple Object Access Protocol
c. Simple Object Access Procedure
d. Small Object Access Protocol
Answer. b
75.
Consider the following statements:

1. Web Browser is an application/software that is used to navigate the world wide web (WWW).
2. Web Browser assists to connect personal computer to internet.

Choose the correct answer from the codes given below:
a. only1
b. only2
c. both
d. none
Answer. c
76.
Pick out the wrong statment?
a. Information stored in RAM can be changed by over writing it
b. Information stored in ROM cannot be changed by overwriting
c. Information can be stored in any location of RAM
d. Computer main memory can be accessed only sequentially
Answer. d
77.
which of the following is true??
a. sram is used as main memory
b. dram is used as cache memory
c. both
d. none
Answer. d
78.
which of the following is true??
a. web server is used static web page
b. application server is used for dynamic web page
c. both
d. none
Answer. c
79.
which of the following is an object oriented programming language?
a. pascal
b. ruby
c. java
d. python
Answer. c
80.
which of the following is not an internet search engine?
a. lycos
b. infoseek
c. ixquick
d. kaspersky
Answer. d
81.
which file format is used for the disk image file?
a. .ISO
b. .swf
c. .pdp
d. .eps
Answer. a
82.
which of the following c language statement correct??
a. -5%2=1
b. 5%-2=-1
c. -5%-2= -1
d. none
Answer. c
83.
A type of phishing atteck where mobile phone recieve text message containg a web site hyper link called??
a. spoofing
b. smishing
c. farming
d. Zombie
Answer. b
84.
SSH protocol is works on ?? and its port no is 
a. TCP, 143
b. UDP, 143
c. TCP and UDP , 22
d. TCP and UDP , 443
Answer. c
85.
Which of the following places the common data elements in order from smallest to largest?
a. Character, File, Record, Field, Database, File
b. Character, Record, Field, Database, File
c. Character, Field, Record, File, Database
d. Bit, Byte, Character, Record, Field, File, Database
Answer. c
86.
Breaking logical memory into blocks of the same size is called as: 


a. Frames
b. Segments
c. Packets
d. Pages
Answer. d
87.
Virtual memory is_______.
a. memory on the hard disk that the CPU uses an extended RAM
b. in RAM
c. only necessary if you do not have any RAM in your computer
d. a backup device for floppy disk
Answer. a
88.
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
a. CISC
b. RISC
c. BOTH
d. NONE
Answer. b
89.
which of the following is largest storage??
a. EXA BYTE
b. ZETTA BYTE
c. YOTTA BYTE
d. TERA BYTE
Answer. c
90.
Note book, laptop,palm,hand-held computers are coming under the category of......... computer
a. Digital computer
b. Digital computer
c. Portable computer
d. Hybrid computer
Answer. c
91.
.... printer is a non-impact printer and is quite in working
a. Inkjet
b. Laser
c. Thermal
d. Dot matrix
Answer. a
92.
Joshy, Perfumes are examples of.............
a. Operating system
b. Computer languages
c. . Computer viruses
d. Web portals
Answer. c
93.
Which of the following is not a reserved keyword for c?
a. auto
b. case
c. register
d. none
Answer. d
94.
If an integer needs two bytes of storage, then maximum value of an unsigned integer is 
a. 2^16-1
b. 2^15-1
c. 2^16
d. 2^15
Answer. a
95.
In IPv4 layer, datagram is of
a. Fixed length
b. Variable length
c. Global length
d. none
Answer. b
96.
In Internetwork, network layer is responsible for
    a. Host to User Link
    b. Host to Host Delivery
    c. User to Host IP
    d. Host to Server communication
    Answer. b
    97.
    What are attributes of good software ?
    a. Software maintainability
    b. Software functionality
    c. Software development
    d. Software maintainability & functionality
    Answer. d
    98.
    Which one of the following models is not suitable for accommodating any change?
    a. Build & Fix Model
    b. Prototyping Model
    c. RAD Model
    d. Waterfall Model
    Answer. d
    99.
     Which model can be selected if user is involved in all the phases of SDLC?
    a. Waterfall Model
    b. Prototyping Model
    c. RAD Model
    d. both Prototyping Model & RAD Model
    Answer. c
    100.
    The bus used to connect the monitor to the CPU is __
    a. PCI bus
    b. SCSI bus
    c. Memory bus
    d. none
    Answer. b

    No comments