Best Computer Science Questions for DRDO
Best Computer Science Questions for DRDO
1
| |||
a. COBOL | |||
b. FORTRAN | |||
c. PASCAL | |||
d. LISP | |||
Answer. a |
2.
The control unit of a microprocessor
| ||
a. Stores data in the memory | ||
b. Accepts input data from keyboard | ||
c. Performs arithmetic/logic function | ||
d. None of above | ||
Answer. d |
3.
A group of magnetic tapes, videos or terminals usually under the control of one master is
| ||
a. Cylinder | ||
b. Surface | ||
c. Track | ||
d. Cluster | ||
Answer. d |
4.
The two paradigms if IPC are ………… and …….
| ||
a. call, reply | ||
b. shared memory, message passing | ||
c. send, receive | ||
d. call by value, call by reference | ||
Answer. b |
5.
To ensure that the ……… condition never occurs in the system, we must guarantee that, whenever a process requests a resource, it does not have any other resource.
| ||
a. mutual exclusion | ||
b. no-preemption | ||
c. circular waits | ||
d. hold and wait | ||
Answer. d |
6. |
Which of the following is/are the CSS properties used in font property type.
i) font-family ii) font-variant iii) color iv) size | |
a. i, ii and iii only | ||
b. ii, iii and iv only | ||
c. i, iii and iv only | ||
d. All i, ii, iii and iv only | ||
Answer. a |
7. |
A ……………………. object is any object created by the execution of JavaScript code.
| |
a. native | ||
b. host | ||
c. user defined | ||
d. remote | ||
Answer. c |
8.
We can select the column heading in excel ??
| ||
a. Click on column heading | ||
b. Edit choose the select than click on column | ||
c. Both of the above | ||
d. None of the above | ||
Answer. c |
9.
…….. sorting algorithm is frequently used when n is small where n is total number of elements.
| ||
a. Heap | ||
b. Insertion | ||
c. Bubble | ||
d. Quick | ||
Answer. b |
10.
……… form of access is used to add and remove nodes from a queue.
| ||
a. LIFO, Last In First Out | ||
b. FIFO, First In First Out | ||
c. Both a and b | ||
d. None of these | ||
Answer. b |
11.
What is the SEO in digital marketing??
| ||
a. search engine optimization | ||
b. it is the google's spider bot | ||
c. it is search engine | ||
d. none of the above | ||
Answer. a |
12.
Database __________ which is the logical design of the database, and the database _______ which is a snapshot of the data in the database at a given instant in time.
| ||
a. Instance, Schema | ||
b. Relation, Schema | ||
c. Relation, Domain | ||
d. Schema, Instance | ||
Answer. d |
13.
The request and release of resources are ___________
| ||
a. command line statements | ||
b. interrupts | ||
c. system calls | ||
d. special programs | ||
Answer. c |
14.
The disadvantage of a process being allocated all its resources before beginning its execution is :
| ||
a. Low CPU utilization | ||
b. Low resource utilization | ||
c. Very high resource utilization | ||
d. None of the mentioned | ||
Answer. b |
15.
In Domain Name System (DNS), well known port 53 provides services of
| ||
a. UDP | ||
b. TCP | ||
c. ICMP | ||
d. Both A & B | ||
Answer. d |
16.
A DNS client/server program can support an e-mail program to find IP address of an
| ||
a. E-Mail Server | ||
b. DNS Server | ||
c. Email Recipient | ||
d. DNS Recipient | ||
Answer. c |
17.
Encryption and decryption provide secrecy, or confidentiality, but not
| ||
a. Authentication | ||
b. Integrity | ||
c. Privacy | ||
d. All of the above | ||
Answer. b |
18.
In comparison with static RAM memory, the dynamic RAM memory has
| ||
a. lower bit density and higher power consumption | ||
b. higher bit density and higher power consumption | ||
c. lower bit density and lower power consumption | ||
d. higher bit density and lower power consumption | ||
Answer. b |
19.
Evaluate !(1 && !(0 || 1)).
| ||
a. True | ||
b. False | ||
c. Unevaluatable | ||
d. depend on compiler | ||
Answer. a |
20.
Which of the statements is true in a protected derivation of a derived class from a base class?
| ||
a. Private members of the base class become protected members of the derived class | ||
b. Protected members of the base class become public members of the derived class | ||
c. Public members of the base class become protected members of the derived class | ||
d. Protected derivation does not affect private and protected members of the derived class | ||
Answer. c |
21.
Assume that we have constructor function for both Base and Derived classes. Now consider the declaration :
main ( )
Base *p = new Derived;
In what sequence, the constructor will be executed ?
| ||
a. Derived class constructor is followed by Base class constructor. | ||
b. Base class constructor is followed by Derived class constructor. | ||
c. Base class constructor is never called. | ||
d. Derived class constructor is never called. | ||
Answer. a |
22. |
What is the error in the following code?
class t { virtual void print(); } | |
a. No error | ||
b. Function print() should be declared as static. | ||
c. Function print() should be defined. | ||
d. Class t should contain data members. | ||
Answer. a |
23. Which of the statements are true ?
I. Function overloading is done at compile time. II. Protected members are accessible to the member of derived class. III. A derived class inherits constructors and destructors. IV. A friend function can be called like a normal function. V. Nested class is a derived class. | ||
a. I, II, III | ||
b. II, III, V | ||
c. III, IV, V | ||
d. I, II, IV | ||
Answer. d |
24. What will be the output of following program?
#include<iostream.h> void main() { float x; x=(float)9/2; cout<<x; } | ||
a. 4.5 | ||
b. 4.0 | ||
c. 4 | ||
d. 5 | ||
Answer. a |
25 if x =5, y =2 then x ^y equals________.
(where ^ is a bitwise XOR operator) | ||
a. 00000111 | ||
b. 10000010 | ||
c. 10100000 | ||
d. 11001000 | ||
Answer. a |
26.
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
| ||
a. 9 bits | ||
b. 11 bits | ||
c. 14 bits | ||
d. 15 bits | ||
Answer. d |
27.
Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network?
| ||
a. Tree | ||
b. Ring | ||
c. Star | ||
d. Bus | ||
Answer. d |
28 Dijkstra banker algorithm is an operating system to solve the problem of
| ||
a. dead look avoidance | ||
b. dead look recovery | ||
c. mutual exclusion | ||
d. contest sustaining | ||
Answer. a |
29.
Which of the following are language processors?
| ||
a. Assembler | ||
b. Compilers | ||
c. interpreters | ||
d. All of these | ||
Answer. d |
30.
The view of total database content is
| ||
a. Internal view | ||
b. Conceptual view | ||
c. External view | ||
d. Physical View | ||
Answer. b |
31.
ODBC stands for
| ||
a. Object Database Connectivity | ||
b. Oral Database Connectivity | ||
c. Open Database Connectivity | ||
d. Oracle Database Connectivity | ||
Answer. c |
32.
The data structure required for breadth first traversal on a graph is
| ||
a. Stack | ||
b. Queue | ||
c. Array | ||
d. Tree | ||
Answer. b |
33.
A basic instruction that can be interpreted by computer generally has
| ||
a. A decoder and an accumulator | ||
b. Sequence register and decoder | ||
c. An operand and an address | ||
d. An address and decoder | ||
Answer. c |
34. The register used as a working area in CPU is
| ||
a. Program counter | ||
b. Instruction register | ||
c. Instruction decoder | ||
d. Accumulator | ||
Answer. d |
35.
The control unit of computer
| ||
a. Performs ALU operations on the data | ||
b. Direct the other unit of computers | ||
c. Controls the operation of the output devices | ||
d. Is a device for manually operating the computer | ||
Answer. b |
36.
The bus which is used to transfer data from main memory to peripheral device is
| ||
a. Data bus | ||
b. Input bus | ||
c. DMA bus | ||
d. Output bus | ||
Answer. c |
37.
If an array is used as function argument, the array is passed
| ||
a. By value | ||
b. By reference | ||
c. By name | ||
d. The array cannot be used as a function argument | ||
Answer. b |
38.Which of the following data structure is non-linear type?
| ||
a. Strings | ||
b. Lists | ||
c. Stacks | ||
d. None of above | ||
Answer. d |
39. What is the output of the following program segment?
main() { int i = ++2; printf(“%d\n”, i); } | ||
a. 3 | ||
b. 2 | ||
c. 0 | ||
d. error or compiler dependent | ||
Answer. a |
40. Output of the program given below is
int i; main() { printf(“%d”, i) | ||
a. 1 | ||
b. 0 | ||
c. -1 | ||
d. NULL | ||
Answer. b |
41. Which command is used to create a directory?
| ||
a. CRDIR | ||
b. MKDIR | ||
c. MD | ||
d. CR | ||
Answer. b |
42.
Which is the earliest and most widely used shell that came with the UNIX system?
| ||
a. C Shell | ||
b. Korn Shell | ||
c. Bourne Shell | ||
d. Smith Shell | ||
Answer. c |
43.
Which of the following best illustrates the default subnet mask for a class A,B, and C Network
| ||
a. 0.0.0.0, 0.0.0.1, 0.0.1.1 | ||
b. 255.255.255.0, 255.255.0.0, 255.0.0.0 | ||
c. 255.0.0.0, 255.255.0.0, 255.255.255.0 | ||
d. 255.255.0.0, 255.255.255.0, 255.255.255.255 | ||
Answer. c |
44.
Which channel is deployed by the radio station for transmission?
| ||
a. Half duplex | ||
b. Full duplex | ||
c. Simplex channel | ||
d. None of the above | ||
Answer. c |
45.
ATM is an example of
| ||
a. Ring topology | ||
b. Star topology | ||
c. Bus topology | ||
d. None of the above | ||
Answer. b |
46.
Which of the following device is used to connect two systems, especially if the systems use different protocols?
| ||
a. Hub | ||
b. Bridge | ||
c. Gateway | ||
d. Repeater | ||
Answer. c |
47. Frames from one LAN can be transmitted to another LAN via the device
| ||
a. Router | ||
b. Bridge | ||
c. Repeater | ||
d. Modem | ||
Answer. b |
48.
In classful addressing, the IP address 190.255.254.254 belongs to
| ||
a. A | ||
b. B | ||
c. C | ||
d. D | ||
Answer. b |
49.
What is the correct HTML for creating a hyperlink?
| ||
a. < a href="http://www. educatepk.com"> educatepk | ||
b. http://www.educatepk.com | ||
c. educatepk.com | ||
d. educatepk.com | ||
Answer. a |
51.
VGA stands for
| ||
a. Video Graphics Array | ||
b. Visual Graphics Array | ||
c. Volatile Graphics Array | ||
d. Video Graphics Adapter | ||
Answer. a |
52.
Which SQL statement is used to insert new data in a database?
| ||
a. ADD NEW | ||
b. INSERT NEW | ||
c. INSERT INTO | ||
d. ADD RECORD | ||
Answer. c |
53.
Which of the following is not a transmission medium?
| ||
a. telephone lines | ||
b. coaxial cables | ||
c. microwave systems | ||
d. modem | ||
Answer. d |
54.
Why would a hacker use a proxy server?
| ||
a. To create a stronger connection with the target. | ||
b. To create a ghost server on the network. | ||
c. To hide malicious activity on the network. | ||
d. To obtain a remote access connection. | ||
Answer. c |
55.
Sniffing is used to perform ______________ fingerprinting.
| ||
a. Passive stack | ||
b. Active stack | ||
c. Passive banner grabbing | ||
d. Scanned | ||
Answer. a |
56.
Services running on a system are determined by _____________.
| ||
a. The system’s IP address. | ||
b. The Active Directory | ||
c. The system’s network name | ||
d. The port assigned | ||
Answer. d |
57.
Which of the following can be a multivalued attribute?
| ||
a. Phone_number | ||
b. Name | ||
c. Date_of_birth | ||
d. All of the mentioned | ||
Answer. a |
58. Comment on the output of this C code?
int main() { float f1 = 0.1; if (f1 == 0.1) printf("equal\n"); else printf("not equal\n"); } | ||
a. equal | ||
b. not equal | ||
c. Output depends on compiler | ||
d. None of the mentioned | ||
Answer. b |
59.
Which of the following is not a valid variable name declaration?
| ||
a. int _a3; | ||
b. int a_3; | ||
c. int 3_a; | ||
d. int _3a | ||
Answer. c |
60.
To access the services of operating system, the interface is provided by the:
| ||
a. system calls | ||
b. API | ||
c. library | ||
d. assembly instructions | ||
Answer. a |
61.
Which one of the following is not a real time operating system?
| ||
a. VxWorks | ||
b. Windows CE | ||
c. RTLinux | ||
d. Palm OS | ||
Answer. d |
62.
Program always deals with:
| ||
a. logical address | ||
b. absolute address | ||
c. physical address | ||
d. relative address | ||
Answer. a |
63.
The Process Control Block is :
| ||
a. a Block in memory | ||
b. Process type variable | ||
c. Data Structure | ||
d. a secondary storage section | ||
Answer. c |
64.
What is the numerical range of a char in Java?
| ||
a. -128 to 127 | ||
b. 0 to 256 | ||
c. 0 to 32767 | ||
d. 0 to 65535 | ||
Answer. d |
65.
Which one is a valid declaration of a boolean in java?
| ||
a. boolean b1 = 1; | ||
b. boolean b2 = ‘false’; | ||
c. boolean b3 = false; | ||
d. boolean b4 = ‘true’ | ||
Answer. c |
66.
The decimal equivalent of the octal number (645)8 is ______
| ||
a. (450)10 | ||
b. (451)10 | ||
c. (421)10 | ||
d. (501)10 | ||
Answer. c |
67.
On subtracting (001100)2 from (101001)2 using 2’s complement, we get
| ||
a. 1101100 | ||
b. 011101 | ||
c. 11010101 | ||
d. 11010111 | ||
Answer. b |
68.
Static memory holds data as long as
| ||
a. AC power is applied | ||
b. DC power is applied | ||
c. Capacitor is fully charged | ||
d. None of the Mentioned | ||
Answer. b |
69.
The physical layer translates logical communication requests from the ______ into hardware specific operations.
| ||
a. data link layer | ||
b. network layer | ||
c. trasnport layer | ||
d. application layer | ||
Answer. a |
70.
A feature of MS Office that saves the document automatically after certain interval is called ____
| ||
a. Save | ||
b. Save As | ||
c. Auto Save | ||
d. Backup | ||
Answer. c |
71.
Superscript, subscript, strikethrough are known as ?
| ||
a. Font Face | ||
b. Font Style | ||
c. Font Effects | ||
d. Font Format | ||
Answer. c |
72.
Which of the following enables us to view data from a table based on a specific criterion
| ||
a. Form | ||
b. Query | ||
c. Macro | ||
d. Report | ||
Answer. b |
73.
A attribute in a relation is a foreign key if the _______ key from one relation is used as an attribute in that relation.
| ||
a. Candidate | ||
b. Primary | ||
c. Super | ||
d. Sub | ||
Answer. b |
74.
What is the full form of SOAP ?
| ||
a. Small Object Access Procedure | ||
b. Simple Object Access Protocol | ||
c. Simple Object Access Procedure | ||
d. Small Object Access Protocol | ||
Answer. b |
75.
Consider the following statements:
1. Web Browser is an application/software that is used to navigate the world wide web (WWW).
2. Web Browser assists to connect personal computer to internet.
Choose the correct answer from the codes given below:
| ||
a. only1 | ||
b. only2 | ||
c. both | ||
d. none | ||
Answer. c |
76.
Pick out the wrong statment?
| ||
a. Information stored in RAM can be changed by over writing it | ||
b. Information stored in ROM cannot be changed by overwriting | ||
c. Information can be stored in any location of RAM | ||
d. Computer main memory can be accessed only sequentially | ||
Answer. d |
77.
which of the following is true??
| ||
a. sram is used as main memory | ||
b. dram is used as cache memory | ||
c. both | ||
d. none | ||
Answer. d |
78.
which of the following is true??
| ||
a. web server is used static web page | ||
b. application server is used for dynamic web page | ||
c. both | ||
d. none | ||
Answer. c |
79.
which of the following is an object oriented programming language?
| ||
a. pascal | ||
b. ruby | ||
c. java | ||
d. python | ||
Answer. c |
80.
which of the following is not an internet search engine?
| ||
a. lycos | ||
b. infoseek | ||
c. ixquick | ||
d. kaspersky | ||
Answer. d |
81.
which file format is used for the disk image file?
| ||
a. .ISO | ||
b. .swf | ||
c. .pdp | ||
d. .eps | ||
Answer. a |
82.
which of the following c language statement correct??
| ||
a. -5%2=1 | ||
b. 5%-2=-1 | ||
c. -5%-2= -1 | ||
d. none | ||
Answer. c |
83.
A type of phishing atteck where mobile phone recieve text message containg a web site hyper link called??
| ||
a. spoofing | ||
b. smishing | ||
c. farming | ||
d. Zombie | ||
Answer. b |
84.
SSH protocol is works on ?? and its port no is
| ||
a. TCP, 143 | ||
b. UDP, 143 | ||
c. TCP and UDP , 22 | ||
d. TCP and UDP , 443 | ||
Answer. c |
85.
Which of the following places the common data elements in order from smallest to largest?
| ||
a. Character, File, Record, Field, Database, File | ||
b. Character, Record, Field, Database, File | ||
c. Character, Field, Record, File, Database | ||
d. Bit, Byte, Character, Record, Field, File, Database | ||
Answer. c |
86.
Breaking logical memory into blocks of the same size is called as:
| ||
a. Frames | ||
b. Segments | ||
c. Packets | ||
d. Pages | ||
Answer. d |
87.
Virtual memory is_______.
| ||
a. memory on the hard disk that the CPU uses an extended RAM | ||
b. in RAM | ||
c. only necessary if you do not have any RAM in your computer | ||
d. a backup device for floppy disk | ||
Answer. a |
88.
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
| ||
a. CISC | ||
b. RISC | ||
c. BOTH | ||
d. NONE | ||
Answer. b |
89.
which of the following is largest storage??
| ||
a. EXA BYTE | ||
b. ZETTA BYTE | ||
c. YOTTA BYTE | ||
d. TERA BYTE | ||
Answer. c |
90.
Note book, laptop,palm,hand-held computers are coming under the category of......... computer
| ||
a. Digital computer | ||
b. Digital computer | ||
c. Portable computer | ||
d. Hybrid computer | ||
Answer. c |
91.
.... printer is a non-impact printer and is quite in working
| ||
a. Inkjet | ||
b. Laser | ||
c. Thermal | ||
d. Dot matrix | ||
Answer. a |
92.
Joshy, Perfumes are examples of.............
| ||
a. Operating system | ||
b. Computer languages | ||
c. . Computer viruses | ||
d. Web portals | ||
Answer. c |
93.
Which of the following is not a reserved keyword for c?
| ||
a. auto | ||
b. case | ||
c. register | ||
d. none | ||
Answer. d |
94.
If an integer needs two bytes of storage, then maximum value of an unsigned integer is
| ||
a. 2^16-1 | ||
b. 2^15-1 | ||
c. 2^16 | ||
d. 2^15 | ||
Answer. a |
95.
In IPv4 layer, datagram is of
| ||
a. Fixed length | ||
b. Variable length | ||
c. Global length | ||
d. none | ||
Answer. b |
96.
In Internetwork, network layer is responsible for
| ||
a. Host to User Link | ||
b. Host to Host Delivery | ||
c. User to Host IP | ||
d. Host to Server communication | ||
Answer. b |
97.
What are attributes of good software ?
| ||
a. Software maintainability | ||
b. Software functionality | ||
c. Software development | ||
d. Software maintainability & functionality | ||
Answer. d |
98.
Which one of the following models is not suitable for accommodating any change?
| ||
a. Build & Fix Model | ||
b. Prototyping Model | ||
c. RAD Model | ||
d. Waterfall Model | ||
Answer. d |
99.
Which model can be selected if user is involved in all the phases of SDLC?
| ||
a. Waterfall Model | ||
b. Prototyping Model | ||
c. RAD Model | ||
d. both Prototyping Model & RAD Model | ||
Answer. c |
100.
The bus used to connect the monitor to the CPU is __
| ||
a. PCI bus | ||
b. SCSI bus | ||
c. Memory bus | ||
d. none | ||
Answer. b |
Post a Comment