Header Ads

SSC IMD Computer Science Previous Years Questions Papers

 SSC IMD Computer Science  Previous Years Questions  Papers 
 SSC IMD Computer Science  Previous Years Questions 
Computer Science Questions  Papers for IMD


QID : 901 - Which of the following logical operations produce a 0 if the inputs are 1, 1, and 0?
Options:
1) OR and AND
2) OR, AND, Exclusive-OR
3) AND, Exclusive-OR and Exclusive-NOR
4) Exclusive-NOR
Correct Answer: AND, Exclusive-OR and Exclusive-NOR

QID : 902 - The code that needs 7 bits to represent a character____________.
Options:
1) ASCII
2) BCD
3) EBCDIC
4) None of these
Correct Answer: ASCII


ssc imd questions


QID : 903 - Which of the following defines the minimum time delay between the initiations of two independent memory operations?
Options:
1) Access time
2) Cycle time
3) Transfer rate
4) Latency time
Correct Answer: Cycle time

QID : 904 - Which of the following statements about the Program Counter (PC) is true?
Options:
1) It is a register
2) It is a cell in ROM
3) During execution of the current instruction, its content does not change
4) None of these
Correct Answer: It is a register


QID : 905 - If (123)5 = (A3)B then how many values are possible for A?
Options:
1) 3
 2) 2
 3) 1
 4) 4
 Correct Answer: 2
QID : 906 - By which of the following can the speed imbalance between memory access and CPU operation be reduced?
Options:
1) Cache memory
2) Cache memory or Memory interleaving
3) Reducing the size of memory
4) None of these
Correct Answer: Cache memory or Memory interleaving

QID : 907 - Which of the following statements is false?
Options:
1) By scanning a bit pattern, one can say whether it represents data or not
2) Whether a given piece of information is a data or not, depends on the particular application
3) Positive numbers cannot be represented in 2's complement form
4) Positive numbers cannot be represented in 1's complement form
Correct Answer: By scanning a bit pattern, one can say whether it represents data or not
QID : 908 - Among the below, that does not need extra hardware for DRAM refreshing is
Options:
1) 8085
 2) Motorola-6800
3) Z-80
4) None of these
Correct Answer: Z-80

QID : 909 - Which of the following is not an advantage of MOS devices over bipolar devices?
Options:
1) It allows higher bit densities and is also cost-effective
2) It is easy to fabricate
3) It's higher-impedance
4) It's operational speed
Correct Answer: It's operational speed
QID : 910 - Which of the following is equal to the Boolean expression X + X' Y?
Options:
1) X + XY
 2) Y + YX
 3) X' Y + Y' X
 4) None of these
Correct Answer: None of these
QID : 911 - Which of the following is / are register(s)?
Options:
1) Buffer
2) Stack pointer
3) Both stack pointer and program counter
4) None of these
Correct Answer: Both stack pointer and program counter
QID : 912 - In which of the following does CPU perform read or write operations at any point in time?
Options:
1) ROM
 2) PROM
 3) EPROM
 4) RAM
 Correct Answer: EPROM
QID : 913 - Among the following which is a nonvolatile memory?
Options:
1) ROM
 2) LSI
 3) RAM
 4) VLSI
 Correct Answer: ROM

QID : 914 - Which of the following is false concerning backup files?
Options:
1) These files are automatically generated when one saves a document.
2) These files help in protecting the document due to out of order of the computer or power failure.
3) These files get deleted as soon as the computer is turned off.
4) None of these
Correct Answer: These files get deleted as soon as the computer is turned off.
QID : 915 - Which of the following can be programmed one time by either the manufacturer or the computer user? ( Once programmed, it cannot be modified.)
Options:
1) RAM
 2) ROM
 3) PROM
 4) EPROM
Correct Answer: PROM

QID : 916 - Which of the following statements refers to virtual memory?
Options:
1) It is an extremely large main memory.
2) It is an extremely large secondary memory.
3) It is an illusion of an extremely large memory.
4) It is a type of memory that is used in supercomputers.
Correct Answer: It is an illusion of an extremely large memory.

QID : 917 - Which of the following statements refers to 'Overlay'?
Options:
1) It is a part of an operating system.
2) It is a specific memory location.
3) It is a single contiguous memory that was used in the olden days for running large programs by swapping.
4) It is overloading the system with many user files.
Correct Answer: It is a single contiguous memory that was used in the olden days for running large programs by swapping.

QID : 918 - Which of the following statements is true about concurrent processes?
Options:
1) They are processes that do not overlap in time.
2) They are processes that do overlap in time.
3) They are processes that are executed by a processor at the same time.
4) None of these
Correct Answer: They are processes that do overlap in time.

QID : 919 - The page replacement policy that sometimes leads to more page faults when the size of the memory is increased is
Options:
1) FIFO
 2) LRU
 3) No such policy exists
4) None of these
Correct Answer: FIFO

QID : 920 - Among the following the real-time systems are
Options:
1) An online railway reservation system
2) A process control system
3) Aircraft control system
4) Both process control system and aircraft control system
Correct Answer: Both process control system and aircraft control system
QID : 921 - In page memory systems, if the page size is increased, then the internal fragmentation generally
Options:
1) becomes less
2) becomes more
3) remains constant
4) None of these
Correct Answer: becomes more

QID : 922 - An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of unit of R such that no deadlock will ever occur is
Options:
1) 2
 2) 4
 3) 7
 4) 5
 Correct Answer: 4

QID : 923 - Mutual exclusion problem occurs__________.
Options:
1) between two disjoint processes that do not interact
2) among processes that share resources
3) among processes that do not use the same resource
4) None of these
Correct Answer: among processes that do not use the same resource

QID : 924 - Memory protection is of no use in a
Options:
1) single user system
2) non-multiprogramming system
3) non-multitasking system
4) None of these
Correct Answer: None of these

QID : 925 - Disk scheduling involves deciding
Options:
1) which disk should be accessed next
2) the order in which disk access requests must be serviced
3) the physical location where files should be accessed in the disk
4) None of these
Correct Answer: the order in which disk access requests must be serviced
QID : 926 - For showing which of the following is dirty bit used?
Options:
1) Page with corrupted data
2) Wrong page in the memory
3) Page that is modified after being loaded into cache memory
4) Page that is less frequently accessed
Correct Answer: Page that is modified after being loaded into cache memory
QID : 927 - Which of the following is a service not supported by the operating system?
Options:
1) Protection
2) Accounting
3) Compilation
4) I/O operation
Correct Answer: Compilation
QID : 928 - For which of the following is the first-fit, best-fit and the worst-fit algorithms used?
Options:
1) contiguous allocation of memory
2) linked allocation of memory
3) indexed allocation of memory
4) All options are correct
Correct Answer: contiguous allocation of memory

QID : 929 - Which of the following is/are single-user operating system(s)?
Options:
1) MS-DOS
 2) UNIX
 3) Both MS-DOS and UNIX
4) None of these
Correct Answer MS-DOS
QID : 930 - In a multiprogramming environment
Options:
1) the processor executes more than one process at a time
2) the programs are developed by more than one person
3) more than one process resides in the memory
4) a single user can execute many programs at the same time
Correct Answer: more than one process resides in the memory

QID : 931 - The size of virtual memory depends on the size of the
Options:
1) data bus
2) main memory
3) address bus
4) None of these
Correct Answer: address bus

QID : 932 - Which of the following statements is true?
Options:
1) Overlays are used to increase the size of physical memory.
2) Overlays are used to increase the logical address space.
3) When overlays are used, the size of a process is not limited to the size of physical memory.
4) Overlays are used whenever the physical address space is smaller than logical address space.
Correct Answer: When overlays are used, the size of a process is not limited to the size of physical memory.

QID : 933 
Options:
1) 12.8 ms
 2) 8 ms
3) 16 ms
 4) None of these
Correct Answer: 12.8 ms

QID : 934 - In partitioned memory allocation scheme, the
Options:
1) best-fit algorithm is always better than the first-fit algorithm.
2) first-fit algorithm is always better than the best-fit algorithm.
3) superiority of the first-fit and best-fit algorithms depend on the sequence of memory requests.
4) None of these
Correct Answer: superiority of the first-fit and best-fit algorithms depend on the sequence of memory requests.

QID : 935 - Cascading termination refers to termination of all child processes before the parent terminates
Options:
1) normally
2) abnormally
3) normally or abnormally
4) None of these
Correct Answer: normally
QID : 936 - Which of the following is the most suitable scheduling scheme in a real-time operating system?
Options:
1) round-robin
2) first-come-first-served
3) preemptive scheduling
4) random scheduling
Correct Answer: preemptive scheduling

QID : 937 - If there are 32 segments, each of size 1 kbytes, then the logical address should have
Options:
1) 13 bits
2) 14 bits
3) 15 bits
4) 16 bits
Correct Answer: 15 bits

QID : 938 - When a subroutine is called
Options:
1) it defines a new locality
2) it is in the same locality from where it was called
3) it does not define a new locality
4) None of these
Correct Answer: it defines a new locality

QID : 939 - Consider the following page reference string :
1 2 3 4 2 1 5 6 2 1 2 3 7 6 3 2 1 2 3 6
For LRU page replacement algorithm with 4 frames, the number of page faults is :
Options:
1) 14
2) 5
3) 10
4) 11
Correct Answer: 10

QID : 940 - Which of the following statements is true?
Options:
1) Thrashing increases the CPU utilization
2) Thrashing decreases the CPU utilization
3) Thrashing keeps the CPU utilization constant
4) None of these
Correct Answer: Thrashing decreases the CPU utilization
QID : 941 - An I/O port typically consists of four registers:
status,_______,_________ and _______
Options:
1) control, system in, system out
2) control, data in, data out
3) control, flow in, flow out
4) control, input, output
Correct Answer: control, data in, data out
QID : 942 - Which of the following registers is ready by the host to get input?
Options:
1) Flow in
2) Flow out
3) Data in
 4) Data out
Correct Answer: Data in

QID : 943 - The CPU hardware has a wire called __________ that the CPU senses after executing every instruction.
Options:
1) Interrupt sending line
2) Interrupt request line
3) Interrupt bus
4) Interrupt receiving line
Correct Answer: Interrupt request line

QID : 944 - Which of the following is a unique tag, usually a number that identifies the file within the file system?
Options:
1) File identifier
2) File name
3) File type
4) None of these
Correct Answer: File identifier
QID : 945 - Which of the following statements is true?
Options:
1) By using the specific system call, we cannot open the file.
2) By using the specific system call, we cannot read the file.
3) By using the specific system call, we cannot write into the file.
4) None of these
Correct Answer: None of these
QID : 946 - Which of the following statements is true?
Options:
1) The interrupt vector contains the interrupts.
2) The interrupt vector contains the memory addresses of specialized interrupt handlers.
3) The interrupt vector contains the identifiers of interrupts.
4) The interrupt vector contains the device addresses.
Correct Answer: The interrupt vector contains the memory addresses of specialized interrupt handlers.
QID : 947 - Which of the following refers to the categorization of division by zero, accessing a protected or non existent memory address, or attempting to execute a privileged instruction from user mode?
Options:
1) Errors
2) Exceptions
3) Interrupt handlers
4) All options are correct
Correct Answer: Exceptions
QID : 948 - Which of the following is used for large data transfers?
Options:
1) DMA
2) programmed I/O
3) controller register
4) None of these
Correct Answer: DMA
QID : 949 - Which of the following statements is not true?
Options:
1) A dedicated device is opposite to a sharable device.
2) A dedicated device is same as a sharable device.
3) A dedicated device is cannot be used concurrently by several processes.
4) None of these
Correct Answer: A dedicated device is same as a sharable device.
QID : 950 - A keyboard is an example of a device that is accessed through a _______ interface.
Options:
1) block system
2) set of blocks
3) character stream
4) None of these
Correct Answer: character stream

QID : 951 - Which of the following directive specifies the end of execution of a program?
Options:
1) End
2) Return
3) Stop
4) Terminate
Correct Answer: Return
QID : 952 - Which of the following statements is not true?
Options:
1) Encryption is used to protect data from unauthorized access during transmission.
2) Encryption is used to ensure user authentication.
3) Encryption is used to ensure data integrity.
4) Encryption is used to ensure that the data corruption doesn’t happens.
Correct Answer: Encryption is used to ensure that the data corruption doesn’t happens.

QID : 953 - Which of the following refers to cipher-block chaining?
Options:
1) Data is logically ‘ANDed’ with previous block
2) Data is logically ‘ORed’ with previous block
3) Data is logically ‘XORed’ with previous block
4) None of these
Correct Answer: Data is logically ‘XORed’ with previous block
QID : 954 - Which of the following is true about 'Hash Function'?
Options:
1) It creates a small flexible block of data.
2) It creates a small, fixed block of data.
3) It creates a encrypted block of data.
4) None of these
Correct Answer: It creates a small, fixed block of data.
QID : 955 - Which of the following is true about the role of Key Distribution Center?
Options:
1) It is used to distribute keys to everyone in world.
2) It is intended to reduce the risks inherent in exchanging keys.
3) It is a system that is not absolutely responsible for providing keys to the users in a network that shares sensitive or private data.
4) None of these
Correct Answer: It is intended to reduce the risks inherent in exchanging keys.
QID : 956 - Which of the following statements is true?
Options:
1) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are added.
2) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are removed.
3) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are rearranged.
4) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are modified.
Correct Answer: In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are added.

QID : 957 - Which of the following refers to structure or format of data?
Options:
1) Syntax
2) Semantics
3) Strut
4) None of these
Correct Answer: Syntax

QID : 958 - In Internet protocol stack, which of the following is the 5th layer to receive data at B, when data is sent from device A to device B?
Options:
1) Application layer
2) Transport layer
3) Link layer
4) Session layer
Correct Answer: Application layer

QID : 959 - Which of the following statements is true?
Options:
1) Transport layer is implemented in end system.
2) Transport layer is implemented in NIC.
3) Transport layer is implemented in earthnet.
4) None of these
Correct Answer: Transport layer is implemented in end system.
QID : 960 - Which of the following statements is true?
Options:
1) Header of a frame generally contains synchronization bytes.
2) Header of a frame generally contains addresses.
3) Header of a frame generally contains frame identifier.
4) All options are correct
Correct Answer: All options are correct
QID : 961 - For which of the following networks is a local telephone network an example of?
Options:
1) Packet switched
2) Circuit switched
3) Both packet switched and circuit switched
4) None of these
Correct Answer: Packet switched

QID : 962 - Which two types of IPsec can be used to secure communications between two LANs?
Options:
1) AH tunnel mode and ESP tunnel mode
2) AH tunnel mode and AH transport mode
3) AH transport mode and ESP tunnel mode
4) None of these
Correct Answer: AH tunnel mode and ESP tunnel mode

QID : 963 - Which of the following statements is true with respect to TCP?
Options:
1) Connection-oriented
2) Process-to-process
3) Transport layer protocol
4) All options are correct
Correct Answer: All options are correct

QID : 964 - Which of the following refers to a piece of icon or image on a web page associated with another webpage?
Options:
1) url
2) hyperlink
3) plugin
4) None of these
Correct Answer: hyperlink

QID : 965 - Which of the following statements is true?
Options:
1) URL stands for unique reference label.
2) URL stands for uniform reference label.
3) URL stands for uniform resource locator.
4) URL stands for unique resource locator.
Correct Answer: URL stands for uniform resource locator.
QID : 966 - The maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask are
Options:
1) 17
2) 18
3) 19
4) 30
Correct Answer: 30
QID : 967 - Among the following, that which is not applicable for IP is
Options:
1) Error reporting
2) Handle addressing conventions
3) Datagram format
4) Packet handling conventions
Correct Answer: Error reporting
QID : 968 - Which of the following statements is true?
Options:
1) GIS stands for Geographic Information System.
2) GIS stands for Generic Information System.
3) GIS stands for Geological Information System.
4) GIS stands for Geographic Information Sharing.
Correct Answer: GIS stands for Geographic Information System.

QID : 969 - Which of the following statements is true?
Options:
1) Metadata is data about data.
2) Metadata is meteorological data.
3) Metadata is oceanic data.
4) Metadata is contour data.
Correct Answer: Metadata is data about data.

QID : 970 - Which of the following statements is true?
Options:
1) Euclidean space is related to GIS.
2) Ramanujan space is related to GIS.
3) Pythagorian space is related to GIS.
4) None of these
Correct Answer: Euclidean space is related to GIS.

QID : 971 - Which of the following statements is true?
A. Fields can be discrete only.
B. Fields can be continuous only.
C. Fields can be both discrete or continuous.
Options:
1) Only A
2) Only B
3) Both A and B
4) Only C
Correct Answer: Only C
QID : 972 - Concerning ‘Ordinal Data Values’, which of the following statements is true?
A. They are date values that can be put in some natural sequence but that do not allow any other type of computation.
B. An example of Ordinal data value is classifying household income as ‘low’, ‘average’ or ‘high’.
Options:
1) Only A
2) Only B
3) Both A and B
4) Neither A and nor B
Correct Answer: Both A and B

QID : 973 - Which of the following statements is true about TIN?
Options:
1) TIN stands for Traffic Internet Network.
2) TIN stands for Triangulated Irregular Network.
3) TIN stands for Temporal Interest Network.
4) TIN stands for Temperature Interface Node.
Correct Answer: TIN stands for Triangulated Irregular Network.

QID : 974 - Which of the following statements is true?
Options:
1) ‘Fields’ are geographic phenomena that occur everywhere in the study area.
2) ‘Objects’ are geographic phenomena that occur ‘sparsely’ over the study area.
3) Fields can be continuous or discrete.
4) All options are correct
Correct Answer: All options are correct

QID : 975 - Which of the following are full-fledged GIS packages?
A. ILWIS
B. GeoMedia
C. ArcGIS
D. Corp
Options:
1) Only A
2) Only A and B
3) A, B and C only
4) A, B, C and D
Correct Answer: A, B, C and D
QID : 976 - What type of statement is the following?
Create table employee (name varchar ,id integer)
Options:
1) DML
 2) DDL
 3) View
4) Integrity constraint
Correct Answer: DDL

QID : 977 - Which of the following actions does the command given below perform?
Delete from r; r – relation
Options:
1) Remove relation
2) Clear relation entries
3) Delete fields
4) Delete rows
Correct Answer: Clear relation entries

QID : 978 - In the SQL given below, identify the error.
Select * from employee where dept_name= "Comp Sci";  
Options:
1) Dept_name
2) Employee
3) "Comp Sci"
4) From
 Correct Answer: "Comp Sci"

QID : 979 - In SQL the spaces at the end of the string are removed by which of the following functions?
Options:
1) Upper
2) String
3) Trim
4) Lower
Correct Answer: Trim
QID : 980 - The subset of super key is a candidate key under what condition?
Options:
1) No proper subset is a super key
2) All subsets are super keys
3) Subset is a super key
4) Each subset is a super key
Correct Answer: No proper subset is a super key

QID : 981 - Which of the following is a property of the entire relation, rather than of the individual tuples in which each tuple is unique?
Options:
1) Rows
2) Key
3) Attribute
4) Fields
Correct Answer: Key
QID : 982 - How many levels of headings are in html?
Options:
1) 3
2) 6
3) 8
4) 5
Correct Answer: 6

QID : 983 - In which of the following forms is this extra information is usually maintained at the client?
Options:
1) Cookie
2) History
3) Remainder
4) None of these
Correct Answer: Cookie
QID : 984 - Which of the following is a valid uniform resource locator?
Options:
 1) http://www.acm.org/sigmod
 2) www.google.com
 3) www.ann.in
 4) http:/www.acm.org/sigmod/
 Correct Answer: http://www.acm.org/sigmod
QID : 985 - How many types of indexes are there in sql server?
Options:
1) 4
2) 3
3) 2
4) 5
Correct Answer: 2
QID : 986 - If an index is _________________ the metadata and statistics continue to exists
Options:
1) Disabling
2) Dropping
3) Altering
4) Both disabling and dropping
Correct Answer: Disabling
QID : 987 - What are the ways of dealing with deadlock?
Options:
1) Deadlock prevention
2) Deadlock recovery
3) Deadlock detection
4) All options are correct
Correct Answer: All options are correct

QID : 988 - The result of _____unknown is unknown.
Options:
1) XOR
2) OR
3) AND
4) NOT
Correct Answer: NOT
QID : 989 - Which of the following is used to store movie and image files?
Options:
1) Clob
2) Blob
3) Image
4) Binary
Correct Answer: Blob
QID : 990 - The user defined data type can be created using
Options:
1) Create datatype
2) Create data
3) Create define type
4) Create type
Correct Answer: Create type

QID : 991 - Which symbol will be used with grep command to match the pattern pat at the beginning of a line?
Options:
1) ^pat
2) $pat
3) pat$
4) pat^
Correct Answer: ^pat
QID : 992 - Which command is used to sort the lines of data in a file in reverse order?
Options:
1) sort
2) sh
3) st
4) sort-r
Correct Answer: sort-r
QID : 993 - What are the basic data types in Fortran?
Options:
1) Integer, Real, Double Precision, Character
2) Integer, Real, Character, Logical
3) Integer, Real, Complex, Character
4) interger, Real, Character,Double precision,complex and logical
Correct Answer: interger, Real, Character,Double precision,complex and logical

QID : 994 - In which column does the code start in Fortran 77 fixed format?
Options:
1) 6
2) 9
3) 8
4) 7
Correct Answer: 7

QID : 995 - Which of the following approach help us understand better about Real time examples, say Vehicle or Employee of an Organization?
Options:
1) Procedural approach
2) Object Oriented approach
3) Both Procedural approach and Object Oriented approach
4) None of these
Correct Answer: Object Oriented approach
QID : 996 - Which of the following Paradigm is followed by Object Oriented Language Design?
Options:
1) Process-Oriented Model
2) Data Controlling access to code
3) Both Process-Oriented Model and Data Controlling access to code
4) None of these
Correct Answer: Data Controlling access to code

QID : 997 - The operator used for dereferencing or indirection is ____
Options:
1) *
2) &
3) ->
4) –>>
Correct Answer: *
QID : 998 - Which of the following is the correct option?
string* x, y;
Options:
1) x is a pointer to a string, y is a string
2) y is a pointer to a string, x is a string
3) both x and y are pointer to string types
4) None of these
Correct Answer: x is a pointer to a string, y is a string

QID : 999 - Which one of the following is not a possible state for a pointer?
Options:
1) hold the address of the specific object
2) point one past the end of an object
3) zero
4) None of these
Correct Answer: None of these

QID : 1000 
Options:
1) 5
2) 10
3) 15
4) it will return some random number
Correct Answer: it will return some random number
for info question visit: https://cse-mcq.blogspot.com/2019/04/computer-science-question-paper-for-imd.html

No comments