HNBGU PHD Entrance Exam Computer Science and application 2022-23 Solved MCQ

HNBGU Ph.D Entrance Examination 2022-23

Computer Science and Application Solved MCQ

hnbgu phd entrance exam computer science and application solved mcq
  1. FIFO scheduling is:
    1. Fair-share scheduling
    2. Deadline scheduling
    3. Non-preemptive scheduling
    4. Preemptive scheduling

  2. ...... is a way of dealing with dedicated I/O devices in a multiprogramming system.
    1. System call
    2. Spooling
    3. Storage
    4. Buffer

  3. In Unix, which system call creates the new process?
    1. Create
    2. Fork
    3. New
    4. None of the above

  4. Which concept allows you to reuse the written code in C++?
    1. Inheritance
    2. Polymorphism
    3. Abstraction
    4. Encapsulation

  5. How structures and classes in C++ differ?
    1. structures by default hide every member whereas classes do not.
    2. In structurs, members are public by default whereas, in classes, they are private by default.
    3. Structures cannot have private members whereas classes can have.
    4. In Structures, members are private by default whereas, in classes, they are public by default.

  6. What is the space complexity of searching in a heap?
    1. O (log n)
    2. O (n)
    3. O (1)
    4. O (n log n)

  7. What is the time complexity to count the number of elements in the linked list?
    1. O (1)
    2. O (n)
    3. O (log n)
    4. None of the mentioned

  8. A form of recursive-descent parsing that does not require any back-tracking is known as:
    1. predictive parsing
    2. non-predictive parsing
    3. recursive parsing
    4. non-recursive parsing

  9. The vlues appearing in given attributes of any tuple in the referencing relation must likewise occur in specified attributes of at least one tuple in the referenced relation, according to ........integrity constraint.
    1. Referential
    2. Primary
    3. Referencing
    4. Specific

  10. The ability to query data, as well as insert, delete, and alter tuples, is offered by ......
    1. TCL (Transaction control Language)
    2. DCL (Data control language)
    3. DDL (Data definition language)
    4. DML (Data Manupulation language)

  11. ........Operations do not preserve non-matched tuples.
    1. Left outer join
    2. Inner join
    3. Natural join
    4. Right outer join

  12. Which forms have a relation that contains information about a single entity?
    1. 4NF
    2. 2NF
    3. 5NF
    4. 3NF

  13. FTP runs exclusively over.....
    1. HTTP
    2. TCP
    3. SMTP
    4. HTML

  14. The....... layer is responsible for resolving access to the shared media or resources.
    1. Physical
    2. MAC sublayer
    3. Network
    4. Transport

  15. In Moore machine, output is produced over the change of :
    1. transitions
    2. states
    3. Both (A) and (B)
    4. None of the mentioned.

  16. A context free grammar is ambiguous, if:
    1. It has more than one rightmost derivations.
    2. It has more than one leftmost derivations.
    3. No parse tree can be generated for the CFG
    4. None of the mentioned.

  17. Which of these architecture is power efficient?
    1. RISC
    2. ISA
    3. IANA
    4. CISC

  18. What does VLIW stand for:
    1. Very Long instruction width
    2. Very Large instruction word
    3. Very Large instruction width
    4. Very Long instruction word

  19. For the tree below, write the post-order traversal:
    1. 6,2,7,2,5,11,9,5,4
    2. 6,5,11,2,7,5,9,4,2
    3. 6,5,2,11,7,4,9,5,2
    4. 6,2,7,2,11,5,5,9,4

  20. Which one of the following cloud concepts is related to sharing and pooling the resources?
    1. Polymorphism
    2. Virtualization
    3. Abstraction
    4. None of the mentioned.

  21. Which one of the following options can be considered as the cloud?
    1. Hadoop
    2. Intranet
    3. Web Application
    4. All of the mentioned

  22. Cloud Foundry is a :
    1. industry wide PaaS initiative
    2. Factory that produces cloud components
    3. VMware-led open source PaaS
    4. None of the above

  23. Java supports bothe Primitive and Non-primitive (User Defined ) Data types. Which one of the following is not a primitive data type?
    1. Byte
    2. Short
    3. Class
    4. Long

  24. In a stack, if a user tries to remove an element from an empty stack, it is called.....
    1. Underflow
    2. Empty collection
    3. Overflow
    4. Garbage collection

  25. Which of the following is not the application of stack?
    1. A parenthesis balancing program
    2. Tracking of local variables at runtime
    3. Compiler Syntax Analyzer
    4. Data Transfer between two asynchronous process

  26. The data structure required for Breadth first traversal on a graph is :
    1. Stack
    2. Array
    3. Queue
    4. Tree

  27. Queues serve major role in .......
    1. Simulation of recursion
    2. Simulation of arbitrary linked list
    3. Simulation of limited resource allocation
    4. Simulation of heap sort

  28. Which of the following is not an advantage of a priority queue?
    1. Easy to implement
    2. Processes with different priority can be efficiently handled
    3. Applications with differing requirements
    4. Easy to delete elements in any case

  29. A deadlock avoidance algorithm dynamically examines the ensure that a circular wait condition can never exist.
    1. operating system
    2. resources
    3. system storage state
    4. resource allocation state

  30. Memory management technique, in which system stores and retrieves data from secondary storage for use in main memory is called:
    1. fragmentation
    2. paging
    3. mapping
    4. None of the mentioneds

  31. A process is selected from the .... queue by the .... scheduler, to be executed.
    1. blocked, short-term
    2. wait, long-term
    3. ready, short-term
    4. ready, long-term

  32. Which of the following is not a type of Artificial Intelligence agent?
    1. Learning AI agent
    2. Goal-based AI agent
    3. Simple reflwx AI agent
    4. Unity-based AI agent

  33. Which layer is responsible for process to process delivery in a general network model?
    1. Netowrk layer
    2. Transport layer
    3. Session layer
    4. Data link layer

  34. Seven devices are arranged in a mesh topology, ..... physical channels link these devices.
    1. 7
    2. 6
    3. 20
    4. 21

  35. Synchronous transmission does not have .......
    1. A start bit
    2. A stop bit
    3. Gaps between bytes
    4. All of the above

  36. Which of the following is false with respect to TCP?
    1. Connection-oriented
    2. Process-to-process
    3. Transport layer protocol
    4. Unreliable

  37. The ...... field is used to detect errors over the entire user datagram.
    1. udp header
    2. checksum
    3. source port
    4. destination port

  38. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
    1. HTTP
    2. FTP
    3. Telnet
    4. None of the mentioned

  39. In a class, encapsulating an object of another class is called:
    1. Encapsulation
    2. Inheritance
    3. Composition
    4. None of the above

  40. Virtual function os ....... class function which expected to be redefined in ... class, so that when reference is made to derived class object using pointer then we can call virtual function to execute ..... class definition version.
    1. Base, derived, derived
    2. derived, derived, derived
    3. Base, derived, base
    4. Base, base, derived

  41. Open ..... to delete unnecessary and temporary file saved on the hard disk.
    1. Disk defragmentation
    2. Disk writeup
    3. Disk operating
    4. Disk cleanup

  42. Register which is used to store values of arithemetic and logical operations is termed as
    1. Arithemetic register
    2. Logical register
    3. Accumulator
    4. Controller

  43. Special effects used to introduce slides in a presentation are called:
    1. Effects
    2. Custom animations
    3. Transitions
    4. Present animations

  44. Normally, the synchronous counter is designed using.......
    1. S-R flip-flops
    2. J-K flip-flops
    3. d flip-flops
    4. T flip-flops

  45. If a signal passing thorugh a gate is inhibited by sending a LOW into one of the inputs, and the output is HIGH, the gate is a (n):
    1. AND
    2. NAND
    3. NOR
    4. OR

  46. Which of the following can detect an error if a programmer by mistake writes multiplication istead of division?
    1. Interpreter
    2. Compiler or interpreter test
    3. Compiler
    4. None of the above

  47. Dynamic hashing allows us to:
    1. Accommodate the growth of the database
    2. Accommodate the shrinkage of the database
    3. Allows modification of hash function
    4. All of the mentioned

  48. What dows the not null integrity constraint do?
    1. It ensures that at least one tuple is present in the relation.
    2. It ensures that at least one foreign key is present in the realtion.
    3. It ensures that all tuples have a finite value on a specified attribute.
    4. It ensures that all tuples have finite attributes on all the relations.

  49. Collections of operations that form a single logical unit of work are called:
    2. Networks
    3. Units
    4. Transactions

  50. Which of the following is not a method in deadlock handling?
    1. Deadlock prevention
    2. Deadlock detection
    3. Deadlock recovery
    4. Deadlock distribution

नोट: यदि आपको इस प्रश्नपत्र के किसी भी उत्तर में कोई संशय होता है तो आप हमें टिप्पणी अनुभाग या कांटेक्ट पेज में जाकार अपना उत्तर पुष्टि के साथ भेज सकते हैं हम इस आधार पर उत्तर में बदलाव किया जा सकता है
(यदि  आप  किसी  प्रश्नपत्र का हल चाहतें हैं तो कांटेक्ट पेज में जाकार आप हमें प्रश्न पत्र ईमेल द्वारा भेज सकते हैं आपको  सीघ्र ही  इस वेबसाइट पर हल  प्रश्न  प्रदान कर दिया  जायेगा .)

Post a Comment