Miscellaneous Computer Science MCQs Question and Answer
Basics of Computer Hardware Course in Cyber Security with Examples:-In this cyberpointsolution tutorial we are going to describe about the Miscellaneous Computer Science MCQs Objective Question and Answer.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every best/top computer Science mcq course with examples in the light of cyberpointsolution.com
Cyber Point Solution
Computer Fundamentals Questions and Answers Mcqs: Click here
The Arithmetic & Logic Unit(MCQs): Click here
Data Structure Questions and Answers – Array and Array Operations: Click here
Miscellaneous Computer Science MCQs Previous Year Computer Science Exam Top 50 MCQs (Most Important)
- The term “PUSH” and “POP” Is related to the.
- Array
- Lists
- Stacks
- All of the above
- None of the above
Ans:= 3
- A string of eight 0s and 1s is called a:
- megabyte.
- B. byte.
- Kilobyte
Answer: B
- Easily reloctable language is
- Machine language
- Assembly language
- High level language
- Medium level language
- Low level language
Ans:= 2
- One of the main feature that distinguish microprocessors from micro- computers is
- Words are usually larger in microprocessors
- Words are shorter than microprocessors
- Microprocessors does not contain I/O devices
- Exactly the same as the machine cycle tim
- None of the above
Ans:= 3
- DPI stands for
- Desktop projection ink
- Dot per inch
- Dotmatricks printer ink
- Desktop pixel inch
- None of these
Ans:= 2
- Computers use the language to process
- A. processing
- kilobyte
- binary representational
Answer: C
- File record length
- Should always be fixed
- Should always be variable
- Depends upon the the size of file
- Should be chosen to match the data characteristics
- None of the above
Ans:= 4
- …………….. is the time required by a sector to reach below read/write heat
- Seek time
- Latency time
- Access time
- None
- None of the above
Ans:= 2
- ……………… is a technique of improving the priority of process waiting in queue for CPU allocation
- Starvation
- Ageing
- Revocation
- Relocation
- None of the above
Ans:= 2
- A grammar for a programming language is a formal description
- Syntax
- Semantics
- Structure
- Code
- None of the above
Ans:= 3
- All of the following are examples of real security and privacy risks EXCEPT: hackers.
- identity
Answer: B
- The Memory allocation scheme
Subject to “external” fragmentation is.
- Segmentation
- Swapping
- Pure Demand paging
- Multiple fixed contiguous
- None of the these
Ans:= 1
- Virtual Memory is.
- simple to implement
- used in all major commercial operating System
- less efficient in utilization of memory
- useful when fast I/O devices are not available.
- None of these
Ans:= 2
- Before proceeding with its execution each process must acquire all the resources it needs is called.
- Hold and wait
- No Pre-emption
- circular wait
- Starvation
- None of these
Ans:= 1
- The main reason to encrypt a file is to
- Reduce its size
- Secure it for transmission
- Prepare it for backup
- Include it in start-up sequence
- None of these
Ans:= 2
- “LRU” page replacement policy is .
- last Replaced Unit
- Least Restored Unit
- Least Recently Used
- Least Required Unit
- None of these
Ans:= 3
- Which of the Following is not a fundamental process state.
- ready
- terminated
- executing
- blocked
- none of these
Ans:= 4
- ODBC stands For:-
- Object Database Connectivity
- Oral Database Connectivity
- Oracle Database Connectivity
- Open Database Connectivity
- None of these
Ans:= 4
- Which two files are used during operation of the DBMS.
- Query languages and utilities
- DML and Query Language
- Data dictionary and transiction language
- Data dictionary and query language
- None of these
Ans:= 3
- A protocol is a set of rules governing a time sequence of events that must take place.
- Between proxy
- Between an interface
- Between Modems
- Across an interface
- None of these
Ans:= 1
- In Communication Satellite, Multiple Repeaters are known
- Detector
- Modulator
- Stations
- transponders
- None of these
Ans:= 4
- Which of the following is required to communicate between two computers ?
- communication software
- protocol
- communication hardware
- all of above including access to transmission medium
- None of these
Ans:= 4
- Which of the following is an advantage to using fiber optics data transmission.
- Resistance to data theft
- Fast Data transmission Rate
- Low noise Level
- All of the above
Ans:= 4
24.Which of the following is not a transmission medium ?
- Telephone lines
- Coaxial Cabels
- Modem
- Microwave Systems
- None of these
Ans:= 3
- What is meant by a dedicated computer ?
- Which is Used by one person only
- Which is assigned to one and only one task.
- which does not kind of software
- which is meant for application software only
Ans:= 2
- A computer program that converts an entire program into machine language at one time is called an
- Interpreter
- Simulator
- Compiler
- Commander
- None of these
Ans:= 3
- A technique for direct search is .
- Binary Search
- Linear Search
- Tree Search
- Hashing
- None of these
Ans:= 4
- Two Main measures for the efficiency of an algorithm are.
- Processor and Memory
- Complexity and capacity
- Time and Space
- Data and Space
- None of these
Ans:=3
- The space factor when determining the efficiency of algorithm is measured by.
- Counting the maximum memory needed by the algorithm
- Counting the minimum memory needed by the algorithm
- Counting the average memory needed by the algorithm.
- counting the maximum disk space needed by the algorithm
- None of these
Ans:= 1
- The Memory address of the first element of an array is called.
- floor address
- foundation address
- first address
- base address
- none of these
Ans:= 4
- Latency time is
- Time to spin the needed data under head
- Time to spin the needed data under track
- Time to spin data under sector
- All of the above
- None of the these
Ans:= 1
- What does Router do in a Network ?
- Forwards a Packet to all outgoing links
- Forwards a packet to the next free outgoing
- Determines on which outing link a packet is to be forwarded
- Forwards a packet to all outgoing links except the originated
- None of these
Ans:= 3
33.Repeator operates in which layer of the OSI Model ?
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- None of these
Ans:= 1
- IP address are converted to
- A binary string
- A lphanumeric string
- A hirearachy of domain names
- A hexadecimal string
- None of these
Ans:= 3
- By an intranet we mean
- a LAN of an organization
- a Wide area network connecting all branches of an
- A corporate computer network
- a network connecting all computers organization and using the internet protocol
- None of these
Ans:= 4
- GIF images can have only upto……..
Colors.
- 128
- 256
- 512
4.1024
- None of these
Ans:= 2
- ………. Is stored on a client and contains state information of the website visited.
- Cookies
- Servelet
- History
- Resident Page
- None of these
Ans:= 1
38……. Are small application that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
- Applets
- Java Bean
- Sockets
- Java Component
- None of these Ans:= 1
- Encryption is the conversion of data in some intelligible format into an unintelligible format called……… to prevent the data from being understood if read by an unauthorized party.
- Clear Text
- Encrypted Text
- Cipher Text
- Coded Text
- None of the these
Ans:= 3
- The Method for storing data temporarily such that the input-output of the same job is overlapped with its own processing is known as.
- Spooling
- Contention
- I/O wait
- Buffering
- None of these
Ans:= 4
- A process known as
is used by large retailers to study trends.
- data mining B. data selection C. POS
- data conversion
Answer: A
- The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
- robotics. B. simulation.
- computer forensics. D. animation.
Answer: C
- is the science
that attempts to produce machines that display the same type of intelligence that humans do.
- Nanoscience
- B. Nanotechnology
- C. Simulation
- Artificial intelligence (AI)
Answer: D
- is data that has
been organized or presented in a meaningful fashion.
- A process
- B. Software
- C. Storage
- Information
Answer: D
- The name for the way that computers manipulate data into information is called:
- a.programming.
- processing.
- C. storing.
- organizing.
Answer: B
- Computers gather data, which means that they allow users to
data.
- present
- B. input
- C. output
- store
Answer: B
- Which of the following does not affect the resolution of a video display image.
- Bandwidth
- Raster scan image
- Vertical and horizontal lines of resolution
- Screen size
- None of these
Ans:= 1
- Database Software may be divided into
- five distinct categories
- four distinct categoris
- three distinct categoris
- two distinct categoris
- None of these
Ans:= 3
49.is a technique of temporarily removing inactive program from the memory of computer System.
- Swapping
- Spooling Seamphone
- Scheduler
- None of these
Ans:= 1
- who is father of computer science ?
- Charles Babbage
- John McCarthy
- Dennis Ritchie
- Allan Turing
Ans:=D
Follow Us On Cyber Point Solution Youtube Channel : Click Here
Follow Us on Social Platforms to get Updated : twiter, facebook, Google Plus
Learn More Ethical Hacking and Cyber Security click on this link. cyber security
This Question paper provided by cyberpointsolution.com which is very beneficial to all computer science government exam .Cyber Point Solution is the best growing fastest website in the field of computer science and also it has you-tube channel you can also live video.
Computer Science Questions and Answers
Computer Science Interview Questions and Answers
Our Computer Science Questions and Answers prepares an individual for competitive exams, entrance exams, various tests and interviews. Questions have detailed problem descriptions and solutions with detailed explanations so that one can understand them easily. One should spend 1 hour daily for 5-6 months to learn and assimilate various Computer Science subjects comprehensively. Here’s the benefits of our completely solved Computer Science questions and answers:
Visit this link…………….