250+ TOP MCQs on Multithreading and Answers

Computer Fundamentals Multiple Choice Questions on “Multithreading”.

1. Multithreading is also called as ____________
a) Concurrency
b) Simultaneity
c) Crosscurrent
d) Recurrent

Answer: a
Clarification: Concurrency is often used in place of multithreading. Multitasking allows multiple threads to run at a time.

2. Multiprocessing allows single processor to run several concurrent threads.
a) True
b) False

Answer: a
Clarification: The statement is false. Multitasking allows single processor to run several concurrent threads.

3. A single sequential flow of control within a program is ________
a) Process
b) Task
c) Thread
d) Structure

Answer: c
Clarification: A thread is a sequential flow of control within a program. Single-threaded program can handle one task at any time.

4. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network

Answer: b
Clarification: The answer is TCP. TCP stands for Transmission Control Protocol. Servers receive requests from clients.

5. Java extension used in threads?
a) java.lang.Thread
b) java.language.Thread
c) java.lang.Threads
d) java.Thread

Answer: a
Clarification: java.lang.Thread is the class that is extended if any user wants to extend threads.

6. A method that must be overridden while extending threads.
a) run()
b) start()
c) stop()
d) paint()

Answer: a
Clarification: run()method must be overridden (It is similar to main method of sequential program).

7. An interface that is implemented while using threads.
a) java.lang.Run
b) java.lang.Runnable
c) java.lang.Thread
d) java.lang.Threads

Answer: b
Clarification: java.lang.Runnable is correct. Any thread class implements runnable.

8. A thread becomes non runnable when?
a) Its stop method is invoked
b) Its sleep method is invoked
c) Its finish method is invoked
d) Its init method is invoked

Answer: b
Clarification: A thread becomes Not Runnable when one of these events occurs:
• Its sleep method is invoked.
• The thread calls the wait method to wait for a specific condition to be satisfied.
• The thread is blocking on I/O.

9. A method used to temporarily release time for other threads.
a) yield()
b) set()
c) release()
d) start()

Answer: a
Clarification: We can use the yield() method to temporarily release time for other threads. It is static by default.

10. A method used to force one thread to wait for another thread to finish.
a) join()
b) connect()
c) combine()
d) concat()

Answer: a
Clarification: The answer is join(). We can use the join() method to force one thread to wait for another thread to finish.

250+ TOP MCQs on The History of Internet and Answers

Computer Fundamentals Multiple Choice Questions on “The History of Internet”.

1. ARPANET stands for?
a) Advanced Research Project Agency Network
b) Advanced Research Programmed Auto Network
c) Advanced Research Project Automatic Network
d) Advanced Research Project Authorized Network

Answer: a
Clarification: ARPANET stands for Advanced Research Project Agency Network. It was developed in late 1960s under ARPA (Advanced Research Projects Agency).

2. Internet can help you find the shortest route.
a) True
b) False

Answer: a
Clarification: The statement is true. Obviously, Internet is so widespread; it can help us in all the possible ways. It can predict the weather, play music, etc.

3. In this technique, there is no direct contact between users and their programs during execution.
a) Time Sharing
b) Batch Processing
c) System Processing
d) Message Passing

Answer: b
Clarification: In the Batch Environment, there is no direct interaction between users and their programs during execution.

4. A technique that marked the beginning of computer communications.
a) Batch Environment
b) Message passing
c) User Environment
d) Time Sharing

Answer: d
Clarification: The answer is time sharing. In time sharing, Users were able to interact with the computer and could share its information processing resources.

5. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment

Answer: a
Clarification: This happens in time sharing. In this, users were able to interact with the computer and could share its information processing resources.

6. TCP stands for?
a) Transmission control program
b) Transmission control protocol
c) Transfer control program
d) Transfer control protocol

Answer: b
Clarification: TCP stands for transmission control protocol. It basically allows different networks to interconnect.

7. The “Victorian internet” is actually?
a) Telegraph
b) Batch Environment
c) Unit Environment
d) System Environment

Answer: a
Clarification: It was a telegraph. Invented in the 1840s. Used extensively by the U.S. Government.

8. Packet switching was invented in?
a) 1960s
b) 1980s
c) 2000s
d) 1990s

Answer: a
Clarification: Packet switching was developed in 1964. In packet switching, the message is broken into parts and then sent over independently.

9. The probability of failure-free operation of a software application in a specified environment for a specified time.
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety

Answer: a
Clarification: The answer is software reliability. It is estimated using historical and development data.

10. DARPA stands for?
a) Data Advanced Research Projects Agency
b) Defense Advanced Research Product Agency
c) Data based Advanced Research Product Agency
d) Defense Advanced Research Projects Agency

Answer: d
Clarification: DARPA (Defense Advanced Research Projects Agency) contracted with BBN (Bolt, Beranek & Newman) to create ARPAnet.

250+ TOP MCQs on Network Security and Answers

Computer Fundamentals Multiple Choice Questions on “Network Security”.

1. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT

Answer: c
Clarification: Network security covers a variety of computer networks, both private and public. Everyday jobs like conducting transactions and communications among business and government agencies etc.

2. Network Security provides authentication and access control for resources.
a) True
b) False

Answer: a
Clarification: The statement is true. AFS is an example. It helps us protect vital information.

3. Which is not an objective of network security?
a) Identification
b) Authentication
c) Access control
d) Lock

Answer: d
Clarification: The Identification, Authentication and Access control are the objectives of network security. There is no such thing called lock.

4. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint

Answer: a
Clarification: The answer is UserID. UserID is a part of identification. UserID can be a combination of username, user student number etc.

5. The process of verifying the identity of a user.
a) Authentication
b) Identification
c) Validation
d) Verification

Answer: a
Clarification: It is called an authentication. It is typically based on passwords, smart card, fingerprint, etc.

6. A concern of authentication that deals with user rights.
a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification

Answer: c
Clarification: Functional authorization is concerned with individual user rights. Authorization is the function of specifying access rights to resources related to information security.

7. CHAP stands for?
a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol

Answer: a
Clarification: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.

8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control

Answer: d
Clarification: Access control refers to the security features. Applications call access control to provide resources.

9. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module

Answer: c
Clarification: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for performing encryption or decryption

10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text

Answer: a
Clarification: The text that gets transformed is called plain text. The algorithm used is called cipher.

250+ TOP MCQs on EBCDIC and Answers

Computer Fundamentals Multiple Choice Questions on “EBCDIC”.

1. What does EBCDIC stand for?
a) Extended Binary Converted Decimal Intermediate Code
b) Extended Binary Coded Decimal Intermediate Code
c) Extended Binary Coded Decimal Interchange Code
d) Extended Binary Converted Decimal Interchange Code

Answer: c
Clarification: EBCDIC is the Extended BCD interchange code. It uses 8 bits to represent a symbol. It can represent 256 different characters.

2. In EBCDIC, a maximum of 128 different characters can be represented.
a) True
b) False

Answer: b
Clarification: EBCDIC uses 8 bits for representation. Therefore, 28 i.e., 256 different characters can be represented and not 128. Thus, the above statement is false.

3. The EBCDIC code for the character A is ______________
a) digit : 1100 zone : 0001
b) digit : 1111 zone : 0001
c) digit : 1100 zone : 1010
d) digit : 1111 zone : 1010

Answer: a
Clarification: The character A is represented by the digit 1100 and the zone 0001. The hex representation for the same is C1. Similarly for B it is C2 and so on.

4. The hex representation for F is _______________
a) C6
b) C5
c) D6
d) D1

Answer: a
Clarification: Certain hex representations are :
C1=A
C2=B
C3=D
C4=E
C5=F
C6=G
C7=H
C8=I
C9=J.

5. In EBCDIC, D5 is used to represent ________ character.
a) J
b) N
c) O
d) K

Answer: b
Clarification: D5 is used to represent N in this system. The representations D1 to D9 are used for the characters J to R respectively.

6. Which of the following is not a character of the digit 1110?
a) S
b) Z
c) O
d) X

Answer: c
Clarification: All the alphabets from S to Z have their digit as 1110. Here, O has the digit 1101 and therefore is the incorrect option. Example: S has the digit as 1110 and zone 0010.

7. What is the hexadecimal equivalent of the digit 9?
a) E9
b) F9
c) G9
d) H9

Answer: b
Clarification: For digits in EBCDIC, the hex equivalent starts from F0 to F9.
F0=0
F1=1
F2=2
F3=3 and so on.

8. The characters from 0 to 9 have their common digit as ___________
a) 1111
b) 0000
c) 0001
d) 1000

Answer: a
Clarification: The digits are 1111 in case of numbers. Here, 0.101 gets converted to 1.010 in its 1’s complement format.

9. The EBCDIC is mainly used in ___________
a) Programming
b) Machine Codes
c) Mainframes
d) Super Computers

Answer: c
Clarification: This concept of EBCDIC was invented by IBM. It is mainly used in the IBM mainframe environment. So basically, mainframes use EBCDIC codes.

10. Which of the following character is available in EBCDIC but not in ASCII?
a) cent sign
b) dollar sign
c) comma
d) punctuation

Answer: a
Clarification: The cent sign wasn’t available in ASCII which is the American Standard Code for Information interchange. It was available in EBCDIC though and thus was considered better.

250+ TOP MCQs on Processor & Its Types and Answers

Computer Fundamentals Multiple Choice Questions on “Processor & Its Types”.

1. Computer has a built-in system clock that emits millions of regularly spaced electric pulses per _____ called clock cycles.
a) second
b) millisecond
c) microsecond
d) minute

Answer: a
Clarification: The regularly spaced electric pulses per second are referred to as the clock cycles. All the jobs performed by the processor are on the basis of clock cycles.

2. It takes one clock cycle to perform a basic operation.
a) True
b) False

Answer: a
Clarification: It takes exactly one clock cycle to perform a basic operation, such as moving a byte of memory from a location to another location in the computer.

3. The operation that does not involves clock cycles is _________
a) Installation of a device
b) Execute
c) Fetch
d) Decode

Answer: a
Clarification: Normally, several clock cycles are required to fetch, execute and decode a particular program.
Installation of a device is done by the system on its own.

4. The number of clock cycles per second is referred as ________
a) Clock speed
b) Clock frequency
c) Clock rate
d) Clock timing

Answer: a
Clarification: The number of clock cycles per second is the clock speed. It is generally measured in gigahertz(109 cycles/sec) or megahertz (106 cycles/sec).

5. CISC stands for ____________
a) Complex Information Sensed CPU
b) Complex Instruction Set Computer
c) Complex Intelligence Sensed CPU
d) Complex Instruction Set CPU

Answer: b
Clarification: CISC is a large instruction set computer. It has variable length instructions. It also has variety of addressing modes.

6. Which of the following processor has a fixed length of instructions?
a) CISC
b) RISC
c) EPIC
d) Multi-core

Answer: b
Clarification: The RISC which stands for Reduced Instruction set computer has a fixed length of instructions. It has a small instruction set. Also has reduced references to memory to retrieve operands.

7. Processor which is complex and expensive to produce is ________
a) RISC
b) EPIC
c) CISC
d) Multi-core

Answer: c
Clarification: CISC stands for complex instruction set computer. It is mostly used in personal computers. It has a large instruction set and a variable length of instructions.

8. The architecture that uses a tighter coupling between the compiler and the processor is ____________
a) EPIC
b) Multi-core
c) RISC
d) CISC

Answer: a
Clarification: EPIC stands for Explicitly parallel instruction computing. It has a tighter coupling between the compiler and the processor. It enables the compiler to extract maximum parallelism in the original code.

9. MAR stands for ___________
a) Memory address register
b) Main address register
c) Main accessible register
d) Memory accessible register

Answer: a
Clarification: The MAR stands for memory address register. It holds the address of the active memory location.

10. A circuitry that processes that responds to and processes the basic instructions that are required to drive a computer system is ________
a) Memory
b) ALU
c) CU
d) Processor

Answer: d
Clarification: The processor is responsible for processing the basic instructions in order to drive a computer. The primary functions of a processor are fetch, decode and execute.

250+ TOP MCQs on Algorithms and Answers

Computer Fundamentals Multiple Choice Questions on “Algorithms”.

1. The word ____________comes from the name of a Persian mathematician Abu Ja’far Mohammed ibn-i Musa al Khowarizmi.
a) Flowchart
b) Flow
c) Algorithm
d) Syntax

Answer: c
Clarification: The word algorithm comes from the name of a Persian mathematician Abu Ja’far Mohammed ibn-i Musa al Khowarizmi.

2. In computer science, algorithm refers to a special method usable by a computer for the solution to a problem.
a) True
b) False

Answer: a
Clarification: The statement is true. This word algorithm refers to a special method usable by a computer for the solution to a problem. The statement of the problem specifies in general terms the desired input/output relationship.

3. This characteristic often draws the line between what is feasible and what is impossible.
a) Performance
b) System Evaluation
c) Modularity
d) Reliability

Answer: a
Clarification: Algorithms help us to understand scalability. Performance often draws the line between what is feasible and what is impossible.

4. The time that depends on the input: an already sorted sequence that is easier to sort.
a) Process
b) Evaluation
c) Running
d) Input

Answer: c
Clarification: The running time depends on the input: an already sorted sequence is easier to sort. The running time is given by the size of the input, since short sequences are easier to sort than the longer ones. Generally, we seek upper bounds on the running time, because it is reliable.

5. Which of the following is incorrect?
Algorithms can be represented:
a) as pseudo codes
b) as syntax
c) as programs
d) as flowcharts

Answer: b
Clarification: Representation of algorithms:
-As programs
-As flowcharts
-As pseudo codes.

6. When an algorithm is written in the form of a programming language, it becomes a _________
a) Flowchart
b) Program
c) Pseudo code
d) Syntax

Answer: b
Clarification: An algorithm becomes a program when it is written in the form of a programming language. Thus, any program is an algorithm.

7. Any algorithm is a program.
a) True
b) False

Answer: b
Clarification: The statement is false. An algorithm is represented in the form of a programming language is called a program. Any program is an algorithm but the reverse is not true.

8. A system wherein items are added from one and removed from the other end.
a) Stack
b) Queue
c) Linked List
d) Array

Answer: b
Clarification: In a queue, the items are inserted from the rear end and deleted from the front end.

9. Another name for 1-D arrays.
a) Linear arrays
b) Lists
c) Horizontal array
d) Vertical array

Answer: a
Clarification: Linear arrays are the 1-Dimensional arrays wherein only one row is present and the items are inserted.

10. A data structure that follows the FIFO principle.
a) Queue
b) LL
c) Stack
d) Union

Answer: a
Clarification: The answer is Queue. A Queue follows the FIFO principle. FIFO stands for First In First Out.