HNBGU Ph.D Entrance Examination 2022-23
Computer Science and Application Solved MCQ
इन्हें भी पढ़ें:
- लिंग स्कूल एवं समाज Solved MCQ 2021
- निर्देशन एवं परामर्श Solved MCQ 2021
- समावेशी विद्यालय का सृजन Solved MCQ 2021
- ज्ञान एवं पाठ्यक्रम Solved MCQ 2021
- Gender School and Society Solved MCQ 2021
- Environmental Education Solved MCQ 2021
- Guidance and Councelling Solved MCQ 2021
- Knowledge and Curriculum Solved MCQ 2021
- B.Ed topics in Easy Language
-
FIFO scheduling is:
- Fair-share scheduling
- Deadline scheduling
- Preemptive scheduling
-
...... is a way of dealing with dedicated I/O devices in a multiprogramming system.
- System call
- Storage
- Buffer
-
In Unix, which system call creates the new process?
- Create
- New
- None of the above
-
Which concept allows you to reuse the written code in C++?
- Polymorphism
- Abstraction
- Encapsulation
-
How structures and classes in C++ differ?
- structures by default hide every member whereas classes do not.
- Structures cannot have private members whereas classes can have.
- In Structures, members are private by default whereas, in classes, they are public by default.
-
What is the space complexity of searching in a heap?
- O (log n)
- O (1)
- O (n log n)
-
What is the time complexity to count the number of elements in the linked list?
- O (1)
- O (log n)
- None of the mentioned
-
A form of recursive-descent parsing that does not require any back-tracking is known as:
- non-predictive parsing
- recursive parsing
- non-recursive parsing
-
The vlues appearing in given attributes of any tuple in the referencing relation must likewise occur in specified attributes of at least one tuple in the referenced relation, according to ........integrity constraint.
- Primary
- Referencing
- Specific
-
The ability to query data, as well as insert, delete, and alter tuples, is offered by ......
- TCL (Transaction control Language)
- DCL (Data control language)
- DDL (Data definition language)
-
........Operations do not preserve non-matched tuples.
- Left outer join
- Natural join
- Right outer join
-
Which forms have a relation that contains information about a single entity?
- 2NF
- 5NF
- 3NF
-
FTP runs exclusively over.....
- HTTP
- SMTP
- HTML
-
The....... layer is responsible for resolving access to the shared media or resources.
- Physical
- Network
- Transport
-
In Moore machine, output is produced over the change of :
- transitions
- Both (A) and (B)
- None of the mentioned.
-
A context free grammar is ambiguous, if:
- It has more than one rightmost derivations.
- No parse tree can be generated for the CFG
- None of the mentioned.
-
Which of these architecture is power efficient?
- ISA
- IANA
- CISC
-
What does VLIW stand for:
- Very Long instruction width
- Very Large instruction word
- Very Large instruction width
-
For the tree below, write the post-order traversal:
- 6,2,7,2,5,11,9,5,4
- 6,5,11,2,7,5,9,4,2
- 6,2,7,2,11,5,5,9,4
-
Which one of the following cloud concepts is related to sharing and pooling the resources?
- Polymorphism
- Abstraction
- None of the mentioned.
-
Which one of the following options can be considered as the cloud?
- Intranet
- Web Application
- All of the mentioned
-
Cloud Foundry is a :
- industry wide PaaS initiative
- Factory that produces cloud components
- None of the above
-
Java supports bothe Primitive and Non-primitive (User Defined ) Data types. Which one of the following is not a primitive data type?
- Byte
- Short
- Long
-
In a stack, if a user tries to remove an element from an empty stack, it is called.....
- Empty collection
- Overflow
- Garbage collection
-
Which of the following is not the application of stack?
- A parenthesis balancing program
- Tracking of local variables at runtime
- Compiler Syntax Analyzer
-
The data structure required for Breadth first traversal on a graph is :
- Stack
- Array
- Tree
-
Queues serve major role in .......
- Simulation of recursion
- Simulation of arbitrary linked list
- Simulation of heap sort
-
Which of the following is not an advantage of a priority queue?
- Easy to implement
- Processes with different priority can be efficiently handled
- Applications with differing requirements
-
A deadlock avoidance algorithm dynamically examines the .....to ensure that a circular wait condition can never exist.
- operating system
- resources
- system storage state
-
Memory management technique, in which system stores and retrieves data from secondary storage for use in main memory is called:
- fragmentation
- mapping
- None of the mentioneds
-
A process is selected from the .... queue by the .... scheduler, to be executed.
- blocked, short-term
- wait, long-term
- ready, long-term
-
Which of the following is not a type of Artificial Intelligence agent?
- Learning AI agent
- Goal-based AI agent
- Simple reflwx AI agent
-
Which layer is responsible for process to process delivery in a general network model?
- Netowrk layer
- Session layer
- Data link layer
-
Seven devices are arranged in a mesh topology, ..... physical channels link these devices.
- 7
- 6
- 20
-
Synchronous transmission does not have .......
- A start bit
- A stop bit
- Gaps between bytes
-
Which of the following is false with respect to TCP?
- Connection-oriented
- Process-to-process
- Transport layer protocol
-
The ...... field is used to detect errors over the entire user datagram.
- udp header
- source port
- destination port
-
Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
- HTTP
- FTP
- None of the mentioned
-
In a class, encapsulating an object of another class is called:
- Encapsulation
- Inheritance
- None of the above
-
Virtual function os ....... class function which expected to be redefined in ... class, so that when reference is made to derived class object using pointer then we can call virtual function to execute ..... class definition version.
- derived, derived, derived
- Base, derived, base
- Base, base, derived
-
Open ..... to delete unnecessary and temporary file saved on the hard disk.
- Disk defragmentation
- Disk writeup
- Disk operating
-
Register which is used to store values of arithemetic and logical operations is termed as
- Arithemetic register
- Logical register
- Controller
-
Special effects used to introduce slides in a presentation are called:
- Effects
- Custom animations
- Present animations
-
Normally, the synchronous counter is designed using.......
- S-R flip-flops
- d flip-flops
- T flip-flops
-
If a signal passing thorugh a gate is inhibited by sending a LOW into one of the inputs, and the output is HIGH, the gate is a (n):
- AND
- NOR
- OR
-
Which of the following can detect an error if a programmer by mistake writes multiplication istead of division?
- Interpreter
- Compiler or interpreter test
- Compiler
-
Dynamic hashing allows us to:
- Accommodate the growth of the database
- Accommodate the shrinkage of the database
- Allows modification of hash function
-
What dows the not null integrity constraint do?
- It ensures that at least one tuple is present in the relation.
- It ensures that at least one foreign key is present in the realtion.
- It ensures that all tuples have finite attributes on all the relations.
-
Collections of operations that form a single logical unit of work are called:
- Views
- Networks
- Units
-
Which of the following is not a method in deadlock handling?
- Deadlock prevention
- Deadlock detection
- Deadlock recovery
नोट: यदि आपको इस प्रश्नपत्र के किसी भी उत्तर में कोई संशय होता है तो आप हमें टिप्पणी अनुभाग या कांटेक्ट पेज में जाकार अपना उत्तर पुष्टि के साथ भेज सकते हैं हम इस आधार पर उत्तर में बदलाव किया जा सकता है
(यदि आप किसी प्रश्नपत्र का हल चाहतें हैं तो कांटेक्ट पेज में जाकार आप हमें प्रश्न पत्र ईमेल द्वारा भेज सकते हैं आपको सीघ्र ही इस वेबसाइट पर हल प्रश्न प्रदान कर दिया जायेगा .)