Best Computer Science Questions for DRDO
Best Computer Science Questions for DRDO
1
| |||
| a. COBOL | |||
| b. FORTRAN | |||
| c. PASCAL | |||
| d. LISP | |||
| Answer. a | |||
| 2.
The control unit of a microprocessor
| ||
| a. Stores data in the memory | ||
| b. Accepts input data from keyboard | ||
| c. Performs arithmetic/logic function | ||
| d. None of above | ||
| Answer. d | ||
| 3.
A group of magnetic tapes, videos or terminals usually under the control of one master is
| ||
| a. Cylinder | ||
| b. Surface | ||
| c. Track | ||
| d. Cluster | ||
| Answer. d | ||
| 4.
The two paradigms if IPC are ………… and …….
| ||
| a. call, reply | ||
| b. shared memory, message passing | ||
| c. send, receive | ||
| d. call by value, call by reference | ||
| Answer. b | ||
| 5.
To ensure that the ……… condition never occurs in the system, we must guarantee that, whenever a process requests a resource, it does not have any other resource.
| ||
| a. mutual exclusion | ||
| b. no-preemption | ||
| c. circular waits | ||
| d. hold and wait | ||
| Answer. d | ||
| 6. |
Which of the following is/are the CSS properties used in font property type.
i) font-family ii) font-variant iii) color iv) size | |
| a. i, ii and iii only | ||
| b. ii, iii and iv only | ||
| c. i, iii and iv only | ||
| d. All i, ii, iii and iv only | ||
| Answer. a | ||
| 7. |
A ……………………. object is any object created by the execution of JavaScript code.
| |
| a. native | ||
| b. host | ||
| c. user defined | ||
| d. remote | ||
| Answer. c | ||
| 8.
We can select the column heading in excel ??
| ||
| a. Click on column heading | ||
| b. Edit choose the select than click on column | ||
| c. Both of the above | ||
| d. None of the above | ||
| Answer. c | ||
| 9.
…….. sorting algorithm is frequently used when n is small where n is total number of elements.
| ||
| a. Heap | ||
| b. Insertion | ||
| c. Bubble | ||
| d. Quick | ||
| Answer. b | ||
| 10.
……… form of access is used to add and remove nodes from a queue.
| ||
| a. LIFO, Last In First Out | ||
| b. FIFO, First In First Out | ||
| c. Both a and b | ||
| d. None of these | ||
| Answer. b | ||
| 11.
What is the SEO in digital marketing??
| ||
| a. search engine optimization | ||
| b. it is the google's spider bot | ||
| c. it is search engine | ||
| d. none of the above | ||
| Answer. a | ||
| 12.
Database __________ which is the logical design of the database, and the database _______ which is a snapshot of the data in the database at a given instant in time.
| ||
| a. Instance, Schema | ||
| b. Relation, Schema | ||
| c. Relation, Domain | ||
| d. Schema, Instance | ||
| Answer. d | ||
| 13.
The request and release of resources are ___________
| ||
| a. command line statements | ||
| b. interrupts | ||
| c. system calls | ||
| d. special programs | ||
| Answer. c | ||
| 14.
The disadvantage of a process being allocated all its resources before beginning its execution is :
| ||
| a. Low CPU utilization | ||
| b. Low resource utilization | ||
| c. Very high resource utilization | ||
| d. None of the mentioned | ||
| Answer. b | ||
| 15.
In Domain Name System (DNS), well known port 53 provides services of
| ||
| a. UDP | ||
| b. TCP | ||
| c. ICMP | ||
| d. Both A & B | ||
| Answer. d | ||
| 16.
A DNS client/server program can support an e-mail program to find IP address of an
| ||
| a. E-Mail Server | ||
| b. DNS Server | ||
| c. Email Recipient | ||
| d. DNS Recipient | ||
| Answer. c | ||
| 17.
Encryption and decryption provide secrecy, or confidentiality, but not
| ||
| a. Authentication | ||
| b. Integrity | ||
| c. Privacy | ||
| d. All of the above | ||
| Answer. b | ||
| 18.
In comparison with static RAM memory, the dynamic RAM memory has
| ||
| a. lower bit density and higher power consumption | ||
| b. higher bit density and higher power consumption | ||
| c. lower bit density and lower power consumption | ||
| d. higher bit density and lower power consumption | ||
| Answer. b | ||
| 19.
Evaluate !(1 && !(0 || 1)).
| ||
| a. True | ||
| b. False | ||
| c. Unevaluatable | ||
| d. depend on compiler | ||
| Answer. a | ||
| 20.
Which of the statements is true in a protected derivation of a derived class from a base class?
| ||
| a. Private members of the base class become protected members of the derived class | ||
| b. Protected members of the base class become public members of the derived class | ||
| c. Public members of the base class become protected members of the derived class | ||
| d. Protected derivation does not affect private and protected members of the derived class | ||
| Answer. c | ||
| 21.
Assume that we have constructor function for both Base and Derived classes. Now consider the declaration :
main ( )
Base *p = new Derived;
In what sequence, the constructor will be executed ?
| ||
| a. Derived class constructor is followed by Base class constructor. | ||
| b. Base class constructor is followed by Derived class constructor. | ||
| c. Base class constructor is never called. | ||
| d. Derived class constructor is never called. | ||
| Answer. a | ||
| 22. |
What is the error in the following code?
class t { virtual void print(); } | |
| a. No error | ||
| b. Function print() should be declared as static. | ||
| c. Function print() should be defined. | ||
| d. Class t should contain data members. | ||
| Answer. a | ||
23. Which of the statements are true ?
I. Function overloading is done at compile time. II. Protected members are accessible to the member of derived class. III. A derived class inherits constructors and destructors. IV. A friend function can be called like a normal function. V. Nested class is a derived class. | ||
| a. I, II, III | ||
| b. II, III, V | ||
| c. III, IV, V | ||
| d. I, II, IV | ||
| Answer. d | ||
24. What will be the output of following program?
#include<iostream.h> void main() { float x; x=(float)9/2; cout<<x; } | ||
| a. 4.5 | ||
| b. 4.0 | ||
| c. 4 | ||
| d. 5 | ||
| Answer. a | ||
|
25 if x =5, y =2 then x ^y equals________.
(where ^ is a bitwise XOR operator) | ||
| a. 00000111 | ||
| b. 10000010 | ||
| c. 10100000 | ||
| d. 11001000 | ||
| Answer. a | ||
| 26.
Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
| ||
| a. 9 bits | ||
| b. 11 bits | ||
| c. 14 bits | ||
| d. 15 bits | ||
| Answer. d | ||
| 27.
Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network?
| ||
| a. Tree | ||
| b. Ring | ||
| c. Star | ||
| d. Bus | ||
| Answer. d | ||
28 Dijkstra banker algorithm is an operating system to solve the problem of
| ||
| a. dead look avoidance | ||
| b. dead look recovery | ||
| c. mutual exclusion | ||
| d. contest sustaining | ||
| Answer. a | ||
| 29.
Which of the following are language processors?
| ||
| a. Assembler | ||
| b. Compilers | ||
| c. interpreters | ||
| d. All of these | ||
| Answer. d | ||
| 30.
The view of total database content is
| ||
| a. Internal view | ||
| b. Conceptual view | ||
| c. External view | ||
| d. Physical View | ||
| Answer. b | ||
| 31.
ODBC stands for
| ||
| a. Object Database Connectivity | ||
| b. Oral Database Connectivity | ||
| c. Open Database Connectivity | ||
| d. Oracle Database Connectivity | ||
| Answer. c | ||
| 32.
The data structure required for breadth first traversal on a graph is
| ||
| a. Stack | ||
| b. Queue | ||
| c. Array | ||
| d. Tree | ||
| Answer. b | ||
| 33.
A basic instruction that can be interpreted by computer generally has
| ||
| a. A decoder and an accumulator | ||
| b. Sequence register and decoder | ||
| c. An operand and an address | ||
| d. An address and decoder | ||
| Answer. c | ||
34. The register used as a working area in CPU is
| ||
| a. Program counter | ||
| b. Instruction register | ||
| c. Instruction decoder | ||
| d. Accumulator | ||
| Answer. d | ||
| 35.
The control unit of computer
| ||
| a. Performs ALU operations on the data | ||
| b. Direct the other unit of computers | ||
| c. Controls the operation of the output devices | ||
| d. Is a device for manually operating the computer | ||
| Answer. b | ||
| 36.
The bus which is used to transfer data from main memory to peripheral device is
| ||
| a. Data bus | ||
| b. Input bus | ||
| c. DMA bus | ||
| d. Output bus | ||
| Answer. c | ||
| 37.
If an array is used as function argument, the array is passed
| ||
| a. By value | ||
| b. By reference | ||
| c. By name | ||
| d. The array cannot be used as a function argument | ||
| Answer. b | ||
38.Which of the following data structure is non-linear type?
| ||
| a. Strings | ||
| b. Lists | ||
| c. Stacks | ||
| d. None of above | ||
| Answer. d | ||
39. What is the output of the following program segment?
main() { int i = ++2; printf(“%d\n”, i); } | ||
| a. 3 | ||
| b. 2 | ||
| c. 0 | ||
| d. error or compiler dependent | ||
| Answer. a | ||
40. Output of the program given below is
int i; main() { printf(“%d”, i) | ||
| a. 1 | ||
| b. 0 | ||
| c. -1 | ||
| d. NULL | ||
| Answer. b | ||
41. Which command is used to create a directory?
| ||
| a. CRDIR | ||
| b. MKDIR | ||
| c. MD | ||
| d. CR | ||
| Answer. b | ||
| 42.
Which is the earliest and most widely used shell that came with the UNIX system?
| ||
| a. C Shell | ||
| b. Korn Shell | ||
| c. Bourne Shell | ||
| d. Smith Shell | ||
| Answer. c | ||
| 43.
Which of the following best illustrates the default subnet mask for a class A,B, and C Network
| ||
| a. 0.0.0.0, 0.0.0.1, 0.0.1.1 | ||
| b. 255.255.255.0, 255.255.0.0, 255.0.0.0 | ||
| c. 255.0.0.0, 255.255.0.0, 255.255.255.0 | ||
| d. 255.255.0.0, 255.255.255.0, 255.255.255.255 | ||
| Answer. c | ||
| 44.
Which channel is deployed by the radio station for transmission?
| ||
| a. Half duplex | ||
| b. Full duplex | ||
| c. Simplex channel | ||
| d. None of the above | ||
| Answer. c | ||
| 45.
ATM is an example of
| ||
| a. Ring topology | ||
| b. Star topology | ||
| c. Bus topology | ||
| d. None of the above | ||
| Answer. b | ||
| 46.
Which of the following device is used to connect two systems, especially if the systems use different protocols?
| ||
| a. Hub | ||
| b. Bridge | ||
| c. Gateway | ||
| d. Repeater | ||
| Answer. c | ||
47. Frames from one LAN can be transmitted to another LAN via the device
| ||
| a. Router | ||
| b. Bridge | ||
| c. Repeater | ||
| d. Modem | ||
| Answer. b | ||
| 48.
In classful addressing, the IP address 190.255.254.254 belongs to
| ||
| a. A | ||
| b. B | ||
| c. C | ||
| d. D | ||
| Answer. b | ||
| 49.
What is the correct HTML for creating a hyperlink?
| ||
| a. < a href="http://www. educatepk.com"> educatepk | ||
| b. http://www.educatepk.com | ||
| c. educatepk.com | ||
| d. educatepk.com | ||
| Answer. a | ||
| 51.
VGA stands for
| ||
| a. Video Graphics Array | ||
| b. Visual Graphics Array | ||
| c. Volatile Graphics Array | ||
| d. Video Graphics Adapter | ||
| Answer. a | ||
| 52.
Which SQL statement is used to insert new data in a database?
| ||
| a. ADD NEW | ||
| b. INSERT NEW | ||
| c. INSERT INTO | ||
| d. ADD RECORD | ||
| Answer. c | ||
| 53.
Which of the following is not a transmission medium?
| ||
| a. telephone lines | ||
| b. coaxial cables | ||
| c. microwave systems | ||
| d. modem | ||
| Answer. d | ||
| 54.
Why would a hacker use a proxy server?
| ||
| a. To create a stronger connection with the target. | ||
| b. To create a ghost server on the network. | ||
| c. To hide malicious activity on the network. | ||
| d. To obtain a remote access connection. | ||
| Answer. c | ||
| 55.
Sniffing is used to perform ______________ fingerprinting.
| ||
| a. Passive stack | ||
| b. Active stack | ||
| c. Passive banner grabbing | ||
| d. Scanned | ||
| Answer. a | ||
| 56.
Services running on a system are determined by _____________.
| ||
| a. The system’s IP address. | ||
| b. The Active Directory | ||
| c. The system’s network name | ||
| d. The port assigned | ||
| Answer. d | ||
| 57.
Which of the following can be a multivalued attribute?
| ||
| a. Phone_number | ||
| b. Name | ||
| c. Date_of_birth | ||
| d. All of the mentioned | ||
| Answer. a | ||
58. Comment on the output of this C code?
int main() { float f1 = 0.1; if (f1 == 0.1) printf("equal\n"); else printf("not equal\n"); } | ||
| a. equal | ||
| b. not equal | ||
| c. Output depends on compiler | ||
| d. None of the mentioned | ||
| Answer. b | ||
| 59.
Which of the following is not a valid variable name declaration?
| ||
| a. int _a3; | ||
| b. int a_3; | ||
| c. int 3_a; | ||
| d. int _3a | ||
| Answer. c | ||
| 60.
To access the services of operating system, the interface is provided by the:
| ||
| a. system calls | ||
| b. API | ||
| c. library | ||
| d. assembly instructions | ||
| Answer. a | ||
| 61.
Which one of the following is not a real time operating system?
| ||
| a. VxWorks | ||
| b. Windows CE | ||
| c. RTLinux | ||
| d. Palm OS | ||
| Answer. d | ||
| 62.
Program always deals with:
| ||
| a. logical address | ||
| b. absolute address | ||
| c. physical address | ||
| d. relative address | ||
| Answer. a | ||
| 63.
The Process Control Block is :
| ||
| a. a Block in memory | ||
| b. Process type variable | ||
| c. Data Structure | ||
| d. a secondary storage section | ||
| Answer. c | ||
| 64.
What is the numerical range of a char in Java?
| ||
| a. -128 to 127 | ||
| b. 0 to 256 | ||
| c. 0 to 32767 | ||
| d. 0 to 65535 | ||
| Answer. d | ||
| 65.
Which one is a valid declaration of a boolean in java?
| ||
| a. boolean b1 = 1; | ||
| b. boolean b2 = ‘false’; | ||
| c. boolean b3 = false; | ||
| d. boolean b4 = ‘true’ | ||
| Answer. c | ||
| 66.
The decimal equivalent of the octal number (645)8 is ______
| ||
| a. (450)10 | ||
| b. (451)10 | ||
| c. (421)10 | ||
| d. (501)10 | ||
| Answer. c | ||
| 67.
On subtracting (001100)2 from (101001)2 using 2’s complement, we get
| ||
| a. 1101100 | ||
| b. 011101 | ||
| c. 11010101 | ||
| d. 11010111 | ||
| Answer. b | ||
| 68.
Static memory holds data as long as
| ||
| a. AC power is applied | ||
| b. DC power is applied | ||
| c. Capacitor is fully charged | ||
| d. None of the Mentioned | ||
| Answer. b | ||
| 69.
The physical layer translates logical communication requests from the ______ into hardware specific operations.
| ||
| a. data link layer | ||
| b. network layer | ||
| c. trasnport layer | ||
| d. application layer | ||
| Answer. a | ||
| 70.
A feature of MS Office that saves the document automatically after certain interval is called ____
| ||
| a. Save | ||
| b. Save As | ||
| c. Auto Save | ||
| d. Backup | ||
| Answer. c | ||
| 71.
Superscript, subscript, strikethrough are known as ?
| ||
| a. Font Face | ||
| b. Font Style | ||
| c. Font Effects | ||
| d. Font Format | ||
| Answer. c | ||
| 72.
Which of the following enables us to view data from a table based on a specific criterion
| ||
| a. Form | ||
| b. Query | ||
| c. Macro | ||
| d. Report | ||
| Answer. b | ||
| 73.
A attribute in a relation is a foreign key if the _______ key from one relation is used as an attribute in that relation.
| ||
| a. Candidate | ||
| b. Primary | ||
| c. Super | ||
| d. Sub | ||
| Answer. b | ||
| 74.
What is the full form of SOAP ?
| ||
| a. Small Object Access Procedure | ||
| b. Simple Object Access Protocol | ||
| c. Simple Object Access Procedure | ||
| d. Small Object Access Protocol | ||
| Answer. b | ||
| 75.
Consider the following statements:
1. Web Browser is an application/software that is used to navigate the world wide web (WWW).
2. Web Browser assists to connect personal computer to internet.
Choose the correct answer from the codes given below:
| ||
| a. only1 | ||
| b. only2 | ||
| c. both | ||
| d. none | ||
| Answer. c | ||
| 76.
Pick out the wrong statment?
| ||
| a. Information stored in RAM can be changed by over writing it | ||
| b. Information stored in ROM cannot be changed by overwriting | ||
| c. Information can be stored in any location of RAM | ||
| d. Computer main memory can be accessed only sequentially | ||
| Answer. d | ||
| 77.
which of the following is true??
| ||
| a. sram is used as main memory | ||
| b. dram is used as cache memory | ||
| c. both | ||
| d. none | ||
| Answer. d | ||
| 78.
which of the following is true??
| ||
| a. web server is used static web page | ||
| b. application server is used for dynamic web page | ||
| c. both | ||
| d. none | ||
| Answer. c | ||
| 79.
which of the following is an object oriented programming language?
| ||
| a. pascal | ||
| b. ruby | ||
| c. java | ||
| d. python | ||
| Answer. c | ||
| 80.
which of the following is not an internet search engine?
| ||
| a. lycos | ||
| b. infoseek | ||
| c. ixquick | ||
| d. kaspersky | ||
| Answer. d | ||
| 81.
which file format is used for the disk image file?
| ||
| a. .ISO | ||
| b. .swf | ||
| c. .pdp | ||
| d. .eps | ||
| Answer. a | ||
| 82.
which of the following c language statement correct??
| ||
| a. -5%2=1 | ||
| b. 5%-2=-1 | ||
| c. -5%-2= -1 | ||
| d. none | ||
| Answer. c | ||
| 83.
A type of phishing atteck where mobile phone recieve text message containg a web site hyper link called??
| ||
| a. spoofing | ||
| b. smishing | ||
| c. farming | ||
| d. Zombie | ||
| Answer. b | ||
| 84.
SSH protocol is works on ?? and its port no is
| ||
| a. TCP, 143 | ||
| b. UDP, 143 | ||
| c. TCP and UDP , 22 | ||
| d. TCP and UDP , 443 | ||
| Answer. c | ||
| 85.
Which of the following places the common data elements in order from smallest to largest?
| ||
| a. Character, File, Record, Field, Database, File | ||
| b. Character, Record, Field, Database, File | ||
| c. Character, Field, Record, File, Database | ||
| d. Bit, Byte, Character, Record, Field, File, Database | ||
| Answer. c | ||
| 86.
Breaking logical memory into blocks of the same size is called as:
| ||
| a. Frames | ||
| b. Segments | ||
| c. Packets | ||
| d. Pages | ||
| Answer. d | ||
| 87.
Virtual memory is_______.
| ||
| a. memory on the hard disk that the CPU uses an extended RAM | ||
| b. in RAM | ||
| c. only necessary if you do not have any RAM in your computer | ||
| d. a backup device for floppy disk | ||
| Answer. a | ||
| 88.
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
| ||
| a. CISC | ||
| b. RISC | ||
| c. BOTH | ||
| d. NONE | ||
| Answer. b | ||
| 89.
which of the following is largest storage??
| ||
| a. EXA BYTE | ||
| b. ZETTA BYTE | ||
| c. YOTTA BYTE | ||
| d. TERA BYTE | ||
| Answer. c | ||
| 90.
Note book, laptop,palm,hand-held computers are coming under the category of......... computer
| ||
| a. Digital computer | ||
| b. Digital computer | ||
| c. Portable computer | ||
| d. Hybrid computer | ||
| Answer. c | ||
| 91.
.... printer is a non-impact printer and is quite in working
| ||
| a. Inkjet | ||
| b. Laser | ||
| c. Thermal | ||
| d. Dot matrix | ||
| Answer. a | ||
| 92.
Joshy, Perfumes are examples of.............
| ||
| a. Operating system | ||
| b. Computer languages | ||
| c. . Computer viruses | ||
| d. Web portals | ||
| Answer. c | ||
| 93.
Which of the following is not a reserved keyword for c?
| ||
| a. auto | ||
| b. case | ||
| c. register | ||
| d. none | ||
| Answer. d | ||
| 94.
If an integer needs two bytes of storage, then maximum value of an unsigned integer is
| ||
| a. 2^16-1 | ||
| b. 2^15-1 | ||
| c. 2^16 | ||
| d. 2^15 | ||
| Answer. a | ||
| 95.
In IPv4 layer, datagram is of
| ||
| a. Fixed length | ||
| b. Variable length | ||
| c. Global length | ||
| d. none | ||
| Answer. b | ||
| 96.
In Internetwork, network layer is responsible for
| ||
| a. Host to User Link | ||
| b. Host to Host Delivery | ||
| c. User to Host IP | ||
| d. Host to Server communication | ||
| Answer. b | ||
| 97.
What are attributes of good software ?
| ||
| a. Software maintainability | ||
| b. Software functionality | ||
| c. Software development | ||
| d. Software maintainability & functionality | ||
| Answer. d | ||
| 98.
Which one of the following models is not suitable for accommodating any change?
| ||
| a. Build & Fix Model | ||
| b. Prototyping Model | ||
| c. RAD Model | ||
| d. Waterfall Model | ||
| Answer. d | ||
| 99.
Which model can be selected if user is involved in all the phases of SDLC?
| ||
| a. Waterfall Model | ||
| b. Prototyping Model | ||
| c. RAD Model | ||
| d. both Prototyping Model & RAD Model | ||
| Answer. c | ||
| 100.
The bus used to connect the monitor to the CPU is __
| ||
| a. PCI bus | ||
| b. SCSI bus | ||
| c. Memory bus | ||
| d. none | ||
| Answer. b | ||

Post a Comment