300+ TOP Computer Engineering MCQs and Answers

Computer Engineering Multiple Choice Questions

1. A protocol which handles sending e-mail and routing e-mail between mail servers is:

(a) Internet Protocol
(b) Transport control Protocol
(c) Simple mail transfer Protocol
(d) Server control Protocol

Answer: (c)

2. A language which is used to model configuration and state data manipulated by the NETCONF protocol is:

(a) Data Manipulation Language
(b) YANG data modeling language
(c) Shell Script Language
(d) Data Definition Language

Answer: (b)

3. A networking architecture that separates the control plane from the data plane and centralizes the network controller is known as:

(a) Software-Defined Networking
(b) Network-Function Virtualization
(c) Machine-to-Network
(d) Centralized Network Controller

Answer: (a)

4. A template that allows separation of the presentation of data from the actual data by using placeholders and associated logic is:

(a) Django template
(b) URL template
(c) Xively cloud template
(d) Form template

Answer: (a)

5. Consider the following relational Schema for a library database:

Book (Title, Author, Catalog_no, Publisher, Year, Price)
Collection (Title, Author, Catalog_no)

With the following functional dependencies:
1. Title, Author → Catalog_no
2. Catalog_no →Title, Author, Publisher, Year
3. Publisher, Title, Year→ Price
Assume (Author, Title) is the key for both the schema which one of the following statements is correct?

(a) Both book and collection are in BCNF only
(b) Both book and collection are in 3NF only
(c) Book is in 2 NF and collection is in 3 NF
(d) Both book and collection are in 2 NF only

Answer: (c)

6. The time taken by the header of a message to travel between two directly-connected nodes in the network is called:

(a) Startup time
(b) Per-hop time
(c) Per-word transfer time
(d) Word-transfer time

Answer: (b)

7. Which one of the following decomposition techniques is used to decompose problems whose underlying computations correspond to a search of a space for solutions?

(a) Recursive decomposition
(b) Data decomposition
(c) Exploratory decomposition
(d) Speculative decomposition

Answer: (c)

8. In which parallel computer, the same instruction is executed synchronously by all processing units?

(a) SISD
(b) SIMD
(c) MISD
(d) MIMD

Answer: (b)

9. The ratio of time taken by single processor system and that taken by a parallel processing system is called:

(a) Efficiency
(b) Speed up
(c) Throughput
(d) Turnaround time

Answer: (b)

10. The hardware technique that detects and resolves hazards is called:

(a) Interlock
(b) Intralock
(c) Halt
(d) Inter unlock

Answer: (a)

11. The total power of an AM -modulated carrier wave is 1160 ? while that of each side-band is 80 ?. The modulation index is

(a) 0.08
(b) 0.2
(c) 0.4
(d) 0.81

Answer: (c)

12. The intermediate frequency IF in standard AM receiver is:

(a) 455 Hz
(b) 455 kHz
(c) 4.55 MHz
(d) 45.5 MHz

Answer: (b)

13. A complex band pass signal has bandwidth of 500 kHz and the lowest frequency of 200 kHz, then the Nyquist minimum sampling rate will be

(a) 14,00,000 Samples / sec
(b) 10,00,000 Samples / sec
(c) 7,00,000 Samples / sec
(d) 4,00,000 Samples / sec

Answer: (a)

14. The chemical composition of a quartz crystal is

(a) Germanium oxide
(b) Silicon dioxide
(c) Sodium silicate
(d) Mixture of Germanium oxide and Sodium silicate

Answer: (b)

15. An object falling through air will fall faster than the one falling through water, because:

(a) Air has much less fluid resistance than water
(b) Weight of the object in water is more than that in air
(c) Air has much more friction than water
(d) Size of the object in water is more than that in air

Answer: (a)

16. A language ? is accepted by some ?-NFA if and only if L is accepted by some:

(a) NFA
(b) DFA
(c) FSM
(d) PDA

Answer: (b)

17. If L is a context free language and R is a regular language, then L ∩ R is a:

(a) Regular language
(b) Non-regular language
(c) Context sensible language
(d) Context free language

Answer: (d)

18. A finite automaton cannot be in more than one state at any one time is called:

(a) FSM
(b) Deterministic Finite Automaton
(c) Non-deterministic Finite Automaton
(d) Regular language

Answer: (b)

19. Which one of the following languages are described by Finite Automata?

(a) Regular language
(b) Content sensitive language
(c) Content-free language
(d) Recursive language

Answer: (a)

20. The minimum length of antenna for efficient transmission of signals of wavelength ? required is

(a) ?/2
(b) ?/3
(c) ?/4
(d) ?/5

Answer: (c)

21. In order to describe an algorithm for searching an AND – OR graph, we need to exploit a value called:

(a) Modality
(b) Mobility
(c) Futility
(d) Quality

Answer: (c)

22. Most commonly used language for Artificial Intelligence programming is:

(a) C
(b) CC++
(c) LISP
(d) PASCAL

Answer: (c)

23. The process of writing programs that can themselves produce formal descriptions from informal ones is:

(a) Optimization
(b) Feasibility
(c) Coding
(d) Operationalization

Answer: (d)

24. How well a model trained on the training set predicts the right output for new instances is called:

(a) Specialization
(b) Generalization
(c) Modularization
(d) Optimization

Answer: (b)

25. In polynomial interpolation, given N points, we find the (N−1)th degree polynomial that is used to predict the output for any X which is outside of the range of Xt in the training set is called:

(a) Extrapolation
(b) Interpolation
(c) Polynomial evaluation
(d) Friction

Answer: (a)

26. For which of the following regions, a transistor as a switch will be stable?

(a) Saturation and active
(b) Active and cutoff
(c) Cutoff and saturation
(d) Active and saturation

Answer: (c)

27. Which of the following is a current controlled device?

(a) JEET
(b) MOSFET
(c) BJT
(d) Zener diode

Answer: (c)

28. What is the value of an inductance when an inductor filter is connected to a full wave rectifier operating at 60 Hz for providing a dc output voltage with 4 % ripple at 100 Ω load?

(a) 1.5625 ?
(b) 2.3525 ?
(c) 1.3525 ?
(d) 2.5625 ?

Answer: (a)

29. An amplifier of gain 1000 has a gain-change of 20 % due to temperature variation. If a negative feed-back of 0.1 is introduced into the above amplifier, the change in gain of the feedback amplifier due to the temperature variation would be

(a) 0.01 %
(b) 0.2 %
(c) 5 %
(d) 7.5 %

Answer: (b)

30. For a 32 bit processor with a 32 bit instruction format in which the first 10 bits contain the opcode and the remaining bits contain an operand address. What is the maximum directly addressable memory space?

(a) 16 MB
(b) 4 GB
(c) 1 KB
(d) 4 MB

Answer: (a)

31. Consider the following statements:

1. Vertical micro-programmed control unit operates faster than horizontal micro-programmed control unit
2. Direct microprogramming results in very short micro-instructions
3. Hardwired control unit operates fastest
4. Micro-programming enables backward compatibility of programs

Which of the above statements are correct?
(a) 3 and 4
(b) 1 and 2
(c) 2 and 3
(d) 1 and 4

Answer: (a)

32. If an instruction requires ′?′ microseconds for execution and page fault requires ‘?’ microseconds for resolving, and average page fault occurs every ‘?’ instruction, then effective instruction time will be

(a) (?+?)∗?
(b) (?+?)/?
(c) ?+(?/?)
(d) ?+?∗?

Answer: (c)

33. The cache memory of 1 ? words uses direct mapping with a block size of 4 words. How many blocks can the cache accommodate?

(a) 128 words
(b) 256 words
(c) 512 words
(d) 1024 words

Answer: (b)

34. How many NAND Gates are required to implement the Boolean function?

F = BC′+A(B +CD)

(a) 3
(b) 4
(c) 5
(d) 6

Answer: (c)

35. Which of the following is/are not the general attributes of horizontal micro-instructions?
1. Short formats
2. Ability to express a high degree of parallelism
3. Little encoding of the control information

(a) 1 only
(b) 2 only
(c) 3 only
(d) 1, 2 and 3

Answer: (a)

36. If each address space represents one byte of storage space, how many address lines are needed to access RAM chips arranged in an 4×6 array, where each chip is 8?×4 bits?

(a) 14
(b) 15
(c) 16
(d) 17

Answer: (d)

37. A 3 bit ?/2?, ? has a reference of 5 ? . If the values of ? and the binary input are 15 ?Ω and 110 ? respctively what is the output voltage?

(a) 0.375 ?
(b) 3.75 ?
(c) 4.25 ?
(d) 4.28 ?

Answer: (b)

38. Consider the following machines regarding Finite automatas:
1. DFA
2. NFA
3. E – NFA
4. Any automaton

Which of the above are correct about the applicability of Arden’s Theorem?
(a) 1 and 4
(b) 1 and 2
(c) 2 and 3
(d) 3 and 4

Answer: (b)

39. In C programming, the qualifiers ‘signed’ and ‘unsigned’ apply to
1. Char
2. Float
3. Int
4. Double

(a) 1 and 4
(b) 2 and 3
(c) 1 and 3
(d) 2 and 4

Answer: (c)

40. When a compiler encounters a function parameter for a single-subscripted array of the form int a [ ], it converts the parameter to:

(a) Int a
(b) Int & a
(c) Int * a
(d) No conversion is required

Answer: (c)

41. The dominator node in DAG represents

(a) Any node of DAG which represents start of loop
(b) Last node of DAG
(c) Node with highest degree of DAG
(d) Isolated node of DAG

Answer: (a)

42. Which of the following is used for grouping of characters into tokens?

(a) Parser
(b) Code optimization
(c) Code generator
(d) Lexical analyzer

Answer: (d)

43. Consider the following contents of different registers:

Offset (displacement) = 5000 H
[AX]−1000 ? , [BX]−2000? , [SI]−4000? , [DI]−3000?
[BP]−5000 ? , [SP]−6000? , [CS]−0000? , [DS]−2000?
[SS]−3000 ? , [IP]−7000? ,

What is the effective address of the data for the following instruction?

MOV AX, [BX ] [SI]

(a) 20000?
(b) 25000?
(c) 26000?
(d) 30000?

Answer: (c)

44. A computer company wants to hire 25 programmers to handle systems programming jobs and 40 programmers for applications programming. Of those hired, 10 will be expected to perform jobs of both types, the number of programmers hired must be:

(a) 40
(b) 45
(c) 50
(d) 55

Answer: (d)

45. Which one of the following register is updated during instruction execution to point to the next instruction byte to be fetched?

(a) Stack pointer
(b) Frame pointer
(c) Program counter
(d) Argument pointer

Answer: (c)

46. A policy that only allows a decision to be made when we execute the program is said to be:

(a) Static policy
(b) Dynamic policy
(c) Constant policy
(d) Random policy

Answer: (b)

47. A general solution for the machine with many completely independent address spaces which can grow or shrink independently, without affecting each other?

(a) Paging
(b) Segmentation
(c) Framing
(d) Spooling

Answer: (b)

48. The purpose of the system call KILL used in signal handling is to:

(a) Send signal to another process
(b) Change set of blocked signals, then pause
(c) Examine set of blocked signals
(d) Clean up after signal handler

Answer: (a)

49. The most common technique used to reduce the disk accesses in a file system is known as:

(a) Buffer cache
(b) Long-structured file system
(c) LFS -cleaner
(d) Write-through caches

Answer: (a)

50. If the time to transfer a block from the controller to memory over the bus is longer than the time to read a block from the disk, it may be necessary to read one block and then skip two or more blocks is called:

(a) Spooling
(b) Interleaving
(c) Interlinking
(d) Data hiding

Answer: (b)

51. When installing a SCSI CD – ROM drive, one must set the adapter to:

(a) B0007
(b) Unused SCSI address
(c) Same address as the SCSI device
(d) SCSI identify as 1

Answer: (b)

52. The ability to access the capabilities over the network through standard mechanisms that promote use by heterogeneous thin or thick client platform is:

(a) On demand service
(b) Rapid elasticity
(c) Ubiquitous Network Access
(d) Location Independent Resource Pooling

Answer: (c)

53. A grouping of services or service components that have specific delivery commitments and roles identified with the customer is:

(a) Service Level Agreements
(b) Service Level Management
(c) Service Level Management Objective
(d) Services Portfolio

Answer: (a)

54. The period of time within which systems, applications or functions must be recovered after an outage is:

(a) Mean Time to Recover
(b) Recovery Time Objective
(c) Recovery Point Objective
(d) Mean Time Return Failure

Answer: (b)

55. The chargeback scheme where the IT costs are defined in measurable events, transactions and functions that are relevant to the business and outside the IT organization is:

(a) Resource or usage based
(b) Allocation based
(c) Activity based costing
(d) Product or service based

Answer: (d)

56. Consider the Unix shell command:
Sort studentmarks | more

It means:
(a) Use the ‘sort’ command as a pipe for file ‘students’, and filter to command ‘more’
(b) Use the ‘sort’ filter on file ‘studentmarks’, and pipe to the command ‘more’
(c) Output the sorted ‘studentmarks’, to file ‘more’
(d) Request more input for file ‘studentmarks’ in order to sort it

Answer: (b)

57. What allows the Java programmer to destroy an object A?

(a) a. delete ( )
(b) a. finalize ( )
(c) Runtime. GetRuntime ( ). gc ( )
(d) Only the garbage collection system can destroy an object

Answer: (d)

58. In which order a Binary search tree should be traversed to obtain the output sequence in descending order?

(a) Root, left and right
(b) Right, root and left
(c) Right, left and root
(d) Left, root and right

Answer: (b)

59. The function call A.max( ) will set the pointer this to the:

(a) Contents of the object ?
(b) Address of the object ?
(c) Address of the function max
(d) Address of the first argument of function max

Answer: (b)

60. A class which can inherit the attributes of two or more classes is called:

(a) Hierarchical Inheritance
(b) Multilevel Inheritance
(c) Multiple Inheritance
(d) Hybrid Inheritance

Answer: (c)

61. Which one of the following statements is true with respect to Virtual Functions?

(a) These cannot be static members
(b) They cannot be friend of another class
(c) They cannot be accessed by using object pointers
(d) One can have virtual constructors, but cannot have virtual destructors

Answer: (a)

62. In a ? program, a programmer has written following line in a function.
x=100+”hello”; //x defined as integer data type

Which part of compiler will detect the error?

(a) Lexical Analyzer
(b) Syntax Analyzer
(c) Semantic Analyzer
(d) Intermediate code Generator

Answer: (c)

63. In a program, dead code occurs because of

(a) Aliasing
(b) Function in-lining and macros
(c) Loop invariant instructions and loop peeling
(d) Constant folding, constant propagation and copy propagation

Answer: (d)

64. In which method a Parse tree is created, a depending graph is drawn and then the semantic rules of the Parse tree nodes are evaluated in topological sorted order?

(a) Parse tree method
(b) Bottom up translation
(c) Top-down translation
(d) Recursive evaluator model

Answer: (a)

65. The Capability Maturity Model (CMM) level 5 defines:

(a) Initial mature work processes in software development organization
(b) Managed work processes in software development organization
(c) Optimizing work processes in software development organization
(d) Repeatable work processes in software development organization

Answer: (c)

66. Consider the following statements:

The UML sequence diagram shows
1. Lifelines of processes along vertical lines
2. Sequence of operations within a process
3. Interactions among processes

Which of the above statements are correct?
(a) 1, 2 and 3
(b) 1 and 2 only
(c) 1 and 3 only
(d) 2 and 3 only

Answer: (c)

67. Black box testing is also called

(a) Data flow testing
(b) Loop testing
(c) Behavioral testing
(d) Graph based testing

Answer: (c)

68. The Wireless Application Protocol (WAP) is:

(a) A product of W3C -World Wide Web Consortium
(b) A data link layer of the OSI model
(c) Aims to ensure Interoperability among service providers
(d) Incurs high overheads of protocol stack

Answer: (c)

69. Which one of the following is an error reporting protocol?

(a) ARP
(b) TCP
(c) ICMP
(d) UDP

Answer: (c)

70. What is the probability of getting a number greater than 4 while single throw of a dice?

(a) 1/4
(b) 2/3
(c) 1/2
(d) 1/3

Answer: (d)

71. Three sections of a class have respectively 25,50,25 students. The mean marks obtained by the first two sections are respectively 60 and 55. The overall mean of all three sections is 58. The mean of the third section is

(a) 52
(b) 57
(c) 58
(d) 62

Answer: (d)

72. A shop keeper sold product A at Rs. 266 after giving a discount of 5 % on the marked price. Without this discount he could have earned a profit of 12 % on the cost price. The cost price of A is

(a) 200
(b) 227
(c) 250
(d) 275

Answer: (c)

73. The performance of the network is often evaluated by which of the following two networking metrics?

(a) Speedup and accuracy
(b) Throughput and delay
(c) Speedup and delay
(d) Throughput and accuracy

Answer: (b)

74. A sine wave is offset 1/6 cycle with respect to time 0. Its phase will be nearly:

(a) 1.05 rad
(b) 0.79 rad
(c) 0.52 rad
(d) 0.26 rad

Answer: (a)

75. If a periodic signal is decomposed into 5 sine waves with frequencies of 100 Hz, 300 Hz, 500 Hz, 700 Hz and 900 Hz, its bandwidth will be:

(a) 800 Hz
(b) 700 Hz
(c) 600 Hz
(d) 500 Hz

Answer: (a)

76. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. The throughput of this network will be:

(a) 2 Mbps
(b) 4 Mbps
(c) 6 Mbps
(d) 8 Mbps

Answer: (a)

77. A distributed service that allows distributed processes to coordinate with each other through a shared hierarchical name space of data registers is known as:

(a) Oozie
(b) Mahout
(c) ZooKeeper
(d) Sqoop

Answer: (c)

78. Which one of the following filters is a space-efficient probabilistic data structure used to test whether an element is a member of a set or not?

(a) Flajolet filter
(b) DGIM filter
(c) Bloom filter
(d) High Pass filter

Answer: (c)

79. In Big Data Analysis, an algorithm for finding the frequent itemsets which is effort-intensive both with space and time is:

(a) Page Rank algorithm
(b) Trust Rank algorithm
(c) Apriori algorithm
(d) SON algorithm

Answer: (c)

80. A process of discovering the natural grouping(s) of a set of patterns, points, or objects based on a distance measure on that space is known as:

(a) Classifying
(b) Searching
(c) Matching
(d) Clustering

Answer: (d)

81. An algorithm that divides the entire file of baskets into segments small enough so that all frequent itemsets for the segment can be found in main memory is:

(a) PCY algorithm
(b) The SON algorithm
(c) The Toivonen’s algorithm
(d) The Randomized algorithm

Answer: (b)

82. Which one of the following is not a type of Contexts in Context-aware Computing?

(a) Structural Context
(b) Mechanical Context
(c) Temporal Context
(d) User Context

Answer: (b)

83. Which one of the following is not a cellular Architectural approach?

(a) Cell Splitting
(b) Cell Breathing
(c) Cell Sectoring
(d) Reuse partitioning

Answer: (b)

84. Which of the following are Radio propagation mechanisms?

1. Reflection and transmission
2. Scattering
3. Diffraction

(a) 1 and 2 only
(b) 1, 2 and 3
(c) 1 and 3 only
(d) 2 and 3 only

Answer: (b)

85. Which one of the following layers is not an Open System Interconnection (OSI) layer?

(a) Data link layer
(b) Transport layer
(c) Presentation layer
(d) Direction layer

Answer: (d)

86. If the transmitter and receiver in a WLAN operating at 2.4 GHz are separated by a distance of 50 ?, and the power transmitted by the transmitter is 10 dBm . The received power considering free-space propagation and Omni-directional antennas at both ends will be nearly:

(a) −72 dBm
(b) −64 dBm
(c) −56 dBm
(d) −52 dBm

Answer: (b)

87. What is the throughput, if Bus clock is 8.33 MHz, 32 bit-data wide (parallel), synchronous mode?

(a) 269 MBps
(b) 267 MBps
(c) 33 MBps
(d) 31 MBps

Answer: (c)

88. Few addressing modes, fixed instruction size and use more registers for separate memory operations are the features of:

(a) CISC
(b) RISC
(c) RAID
(d) DMA

Answer: (b)

89. A block set-associative cache consists of a total of 64 blocks divided into four-bl0ck sets. The main memory contains 4096 blocks, each consisting of 128 words. The number of bits in main memory address will be:

(a) 17 bits
(b) 18 bits
(c) 19 bits
(d) 20 bits

Answer: (c)

90. If the average page-fault service time of 20 ms, a MAT of 80 ns and the probability of a page fault is 10 %. An effective access time will be:

(a) 2,000,672 ns
(b) 2,000,072 ns
(c) 2,000,036 ns
(d) 2,000,006 ns

Answer: (b)

91. For a bus frequency of 100 MHz and with data being transferred at 64 bits at a time. The DDR SDRAM gives a transfer rate of:

(a) 800 MB/S
(b) 1600 MB/S
(c) 3200 MB/S
(d) 6400 MB/S

Answer: (b)

92. Each computer connected to the Internet is assigned a unique compound number which is:

(a) An 8-bit number
(b) A 32-bit number but is expressed as four single byte values, each in the range of 0 to 255
(c) A 64-bit number but is expressed as eight single byte values, each in the range of 0 to 65536
(d) A 16-bit number and is expressed as a four single byte values, each one in the range of 0 to 128.

Answer: (b)

93. Which of the following is the appropriate format for graphics that are to be embedded within an Internet document?

(a) BMP
(b) TIFF
(c) GIF
(d) HTML

Answer: (c)

94. Consider the following test processes:
1. Acceptance testing
2. System testing
3. Verification
4. Unit testing
5. Integration testing

What is the correct order of conducting, these tests?
(a) 3, 4, 5, 2 and 1
(b) 4, 3, 5, 2 and 1
(c) 3, 2, 5, 4 and 1
(d) 4, 2, 5, 3 and 1

Answer: (a)

95. Consider the following statements:
1. Condition coverage is Black-Box testing
2. Boundary analysis is Black-Box testing
3. Decision coverage is White-Box testing
4. Data Equivalence partitioning is Black-Box testing

Which of the above statements are correct?
(a) 2, 3 and 4
(b) 1, 2 and 4
(c) 1, 2 and 3
(d) 1, 3 and 4

Answer: (a)

96. Consider the following statements regarding maintenance testing:
1. It need not be done for emergency bug fixes
2. It is a testing to show how easy it will be to maintain the system
3. Additional new tests may be required apart from re-test and regression test
4. It needs careful risk and impact analysis as its scope is difficult

Which of the above statements are correct?
(a) 1 and 2
(b) 3 and 4
(c) 2 and 3
(d) 1 and 4

Answer: (b)

97. Which of the following can be used for digital fingerprint of a file?

(a) Netstart
(b) Cryptcat
(c) Md5sum
(d) All of these

Answer: (c)

98. If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4 out of the 24 alphabet letters?

(a) 40 ℎ? approximately
(b) 46 ℎ? approximately
(c) 52 ℎ? approximately
(d) 58 ℎ? approximately

Answer: (b)

99. Trojan-Horse programs are

(a) Legitimate programs that allow unauthorized access
(b) Hacker programs that do not show up on the system
(c) Do not work
(d) Immediately discovered

Answer: (a)

100. Consider the following statements regarding the block encryption algorithms:
1. Columnar Transportation Cipher is an example of block Cipher
2. One Cipher text block may depend on several plaintext letters
3. An error in the encryption process affects only that character

Which of the above statements are correct?
(a) 1, 2 and 3
(b) 1 and 2 only
(c) 1 and 3 only
(d) 2 and 3 only

Answer: (b)

101. ATM (Asynchronous Transfer Mode) is fundamentally a:
1. Circuit switching
2. Packet switching
3. Narrow band

Which of the above is/are correct?
(a) 1 only
(b) 2 only
(c) 3 only
(d) 1, 2 and 3

Answer: (b)

102. In ? ++, a container is

(a) A data structure composed of objects
(b) A holder object that stores and manipulates a collection of objects
(c) An object that contains housekeeping information
(d) An interface for binary search tree implemented as a class

Answer: (b)

103. There are three classes A, B and C. An object of class B is passed as a parameter to a method in class A. An object of class C is created in class B as private member. The relation between A, B and C are:

(a) B aggregates A, and C aggregates B
(b) B aggregates A, and C composed of B
(c) A aggregates B, and B is composed of C
(d) A is composed of B, and B aggregates C

Answer: (c)

104. There are two variables A and B. Variable A is used by several functions of program. Variable B’s value is changed in successive calls of a single function, in which it is declared.
1. A is global and static
2. B is local and static
3. A is global and external
4. B is local and external

Which of the above statements are correct?
(a) 1 and 3
(b) 1 and 4
(c) 2 and 4
(d) 2 and 3

Answer: (d)

105. Consider the following statements:
1. A pointer to a base class can point to an object of its derived class
2. A pointer to a derived class can point to an object of the base class
3. A base class pointer can access extra added members in a derived class
4. A base pointer cast into a derived pointer can access it fully

Which of the above statements are correct?
(a) 1 and 3
(b) 2 and 3
(c) 1 and 4
(d) 2 and 4

Answer: (c)

106. Array is a structured data type in C programming language. It may be defined as, a finite:

(a) Collection of data items, not necessarily ordered, but of the same data type
(b) Collection of data items, not necessarily ordered, but of different data type
(c) Ordered collection of data items of different data type
(d) Ordered collection of data items of the same data type

Answer: (d)

107. The simple object model that is frequently used for database applications and which is easier to understand and use than OLE DB is:

(a) ADO
(b) ASP
(c) XML
(d) ODBC

Answer: (a)

108. Which one of the following CPU scheduling algorithms suffers from starvation?

(a) Round Robin
(b) FCFS (First Come First Serve)
(c) SJF (Shortest Job First)
(d) Multilevel Queues

Answer: (c)

109. An operating system uses swapping. A running process encounters the need to wait for an event. The correct sequence of states for the process to re-enter its running stage is:

(a) Blocked → Blocked – Ready → Blocked – suspended → Ready → Running
(b) Blocked – suspended → Blocked – Ready → Blocked → Ready → Running
(c) Ready → Running → Blocked → Ready→ Running
(d) Blocked→ Blocked-suspended → Blocked-Ready → Ready → Running

Answer: (d)

110. What is the maximum possible disk space for a cluster size of 2 kbytes for a MS-DOS disk system?

(a) 128 Mbytes
(b) 512 Mbytes
(c) 512 bytes
(d) 128 bytes

Answer: (a)

111. Consider the following consistency semantics:
1. Writes to an open file by a user are visible immediately to other users that have this file open.
2. Once a file is closed, the changes made to it are visible only in sessions starting later. Already open instances of the file do not reflect these changes.
3. A file has a single image that interleaves all accesses regardless of their origin.

Which of the above are used in UNIX file system?
(a) 1, 2 and 3
(b) 1 and 2 only
(c) 1 and 3 only
(d) 2 and 3 only

Answer: (c)

112. If a host broadcasts a frame that includes a source and destination hardware address, and its purpose is to assign IP addresses to itself, which protocol at the Network layer does the host use?

(a) RARP
(b) ARPA
(c) ICMP
(d) TCP

Answer: (a)

113. What range of addresses can be used in the first octet of a class ? network address?

(a) 1 – 126
(b) 1 – 127
(c) 128 – 190
(d) 128 – 191

Answer: (d)

114. The transport layer protocols used for real time multimedia, file transfer, ? ??? and ? -mail respectively are

(a) TCP, UDP, UDP and TCP
(b) TCP, UDP, TCP and UDP
(c) UDP, TCP, UDP and TCP
(d) UDP, TCP, TCP and UDP

Answer: (c)

115. In a LAN network every system is identified by

(a) Name
(b) MAC Address
(c) IP Address
(d) Serial number given by manufacturer

Answer: (c)

116. Maximum data rate of a channel for a noiseless 3-kHz binary channel is

(a) 3000 bps
(b) 6000 bps
(c) 9000 bps
(d) 15000 bps

Answer: (b)

117. What is MTTF in redundancy for data storage in disks?

(a) Middle-time-training-failure
(b) Mean-time-to-failure
(c) Mean-time-training-failure
(d) Middle-training -to-failure

Answer: (b)

118. The advantage of using DBMS is that it offers data independence which is achieved through:

(a) Data abstraction
(b) Exceptional handling
(c) Data hiding
(d) Transaction

Answer: (a)

119. A weak entity can be identified only by considering some of its attributes in conjunction with the:

(a) Total participation
(b) Primary key of another entity
(c) Independent entity
(d) All the attributes of the strong entity

Answer: (b)

120. Which of the following are the limitations for creating, using and managing decision-support system in a database management system?

1. Lack of analytical sophistication
2. Database layout limitations
3. Inability to handle or process large amounts of data

(a) 1 and 2 only
(b) 1 and 3 only
(c) 2 and 3 only
(d) 1, 2 and 3

Answer: (d)

121. The method of accessing the data which uses the search key value transformation to support the efficient retrieval of data entries is known as:

(a) Hash-based indexing
(b) Sequential indexing
(c) Random indexing
(d) Direct indexing

Answer: (a)

122. Two skills associated with being a good listener are the ability

(a) To listen to more than one message at a time and to provide constructive criticism
(b) To pay attention and to provide feedback
(c) To pay attention and to mask your disinterest when necessary
(d) To pay attention and to provide a strong point of view in response to a given message

Answer: (b)

123. Which one of the following communication style is the most effective and healthiest?

(a) Passive style
(b) Aggressive style
(c) Passive-aggressive style
(d) Assertive style

Answer: (d)

124. What is the correct assignment of the following properties to the 8086 instructions to RET or IRET or Both?

1. Works in conjunction with INT
2. Retrieves flags
3. Retrieves Return Address
4. Works in conjunction with CALL

(a) 1→ IRET 2→ RET 3→ IRET 4→ Both
(b) 1→ IRET 2→ IRET 3→ Both 4→ RET
(c) 1→ RET 2→ IRET 3→ IRET 4→ Both
(d) 1→ IRET 2→ Both 3→ IRET 4→ RET

Answer: (b)

125. The NASSCOM, an organization for Indian Information Technology is

(a) National Association for Computing
(b) National Association of Software and Services Companies
(c) National Association for Science, Software and Communication
(d) National Aim for Software, Services Communication Management

Answer: (b)

126. The Shanti Swarup Bhatnagar prize for Science and Technology is awarded annually by

(a) Ministry of Science and Technology
(b) Tata Institute of Fundamental Research
(c) Indian Institute of Science Bangalore
(d) Council of Scientific and Industrial Research

Answer: (d)

127. The use of distributed computing facilities for application requiring large computing power over a long period of time is:

(a) High-Performance Computing
(b) High-Throughput Computing
(c) Many Tasks Computing
(d) Distributed Computing

Answer: (b)

128. A small change in either the plaintext or the key producing a significant change in the ciphertext is called:

(a) Feistel effect
(b) Claude Shannon effect
(c) Bit independence effect
(d) Avalanche effect

Answer: (d)

129. Finding an effective linear equation between plaintext, ciphertext and the key that holds with probability ? ≠0.5 is the objective of:

(a) Differential Cryptanalysis
(b) Linear Cryptanalysis
(c) Brute-Force Attack
(d) Feistel Analysis

Answer: (b)

130. During the design of ? -boxes used in various cryptographic algorithms, if for a 1-bit input change, at least ? output bits change, then it satisfies:

(a) Strict avalanche criterion
(b) Bit independence criterion
(c) Permutation criterion
(d) Guaranteed avalanche criterion

Answer: (d)

131. The block cipher mode of operation used for encryption of stream-oriented transmission over noisy channel is:

(a) Electronic Codebook
(b) Output Feedback
(c) Cipher Feedback
(d) Cipher Block Chaining

Answer: (b)

132. A popular approach to generating a secure pseudorandom number is known as:

(a) Pseudorandom Number Generator (PRNG)
(b) Linear Congruential Generator (LCG)
(c) True Random Number Generator (TRNG)
(d) Blum, Blum, Shub Generator (BBS)

Answer: (d)

133. Which Novell NetWare Utility Program allows one to recover deleted files from network drives only?

(a) Map
(b) Salvage
(c) Filter
(d) Capture

Answer: (b)

134. What type of problem can be caused by the electromagnetic field of speakers?

(a) Distortion of video display
(b) RAM errors
(c) Computer shut down
(d) Read / write problem on magnetic disks and tapes

Answer: (d)

135. In a 100 % modulated AM signal with carrier power 100 ?, the power in the upper sideband is:

(a) 75 ?
(b) 66 ?
(c) 50 ?
(d) 25 ?

Answer: (d)

136. The function call A.max( ) will set the pointer this to the:

(a) Contents of the object ?
(b) Address of the object ?
(c) Address of the function max
(d) Address of the first argument of function max

Answer: (b)

137. A class which can inherit the attributes of two or more classes is called:

(a) Hierarchical Inheritance
(b) Multilevel Inheritance
(c) Multiple Inheritance
(d) Hybrid Inheritance

Answer: (c)

138. Which one of the following statements is true with respect to Virtual Functions?

(a) These cannot be static members
(b) They cannot be friend of another class
(c) They cannot be accessed by using object pointers
(d) One can have virtual constructors, but cannot have virtual destructors

Answer: (a)

139. In a ? program, a programmer has written following line in a function.
x=100+”hello”; //x defined as integer data type

Which part of compiler will detect the error?

(a) Lexical Analyzer
(b) Syntax Analyzer
(c) Semantic Analyzer
(d) Intermediate code Generator

Answer: (c)

140. In a program, dead code occurs because of

(a) Aliasing
(b) Function in-lining and macros
(c) Loop invariant instructions and loop peeling
(d) Constant folding, constant propagation and copy propagation

Answer: (d)

141. In which method a Parse tree is created, a depending graph is drawn and then the semantic rules of the Parse tree nodes are evaluated in topological sorted order?

(a) Parse tree method
(b) Bottom up translation
(c) Top-down translation
(d) Recursive evaluator model

Answer: (a)

142. The Capability Maturity Model (CMM) level 5 defines:

(a) Initial mature work processes in software development organization
(b) Managed work processes in software development organization
(c) Optimizing work processes in software development organization
(d) Repeatable work processes in software development organization

Answer: (c)

143. Consider the following statements:

The UML sequence diagram shows
1. Lifelines of processes along vertical lines
2. Sequence of operations within a process
3. Interactions among processes

Which of the above statements are correct?
(a) 1, 2 and 3
(b) 1 and 2 only
(c) 1 and 3 only
(d) 2 and 3 only

Answer: (c)

144. Black box testing is also called

(a) Data flow testing
(b) Loop testing
(c) Behavioral testing
(d) Graph based testing

Answer: (c)

145. The Wireless Application Protocol (WAP) is:

(a) A product of W3C -World Wide Web Consortium
(b) A data link layer of the OSI model
(c) Aims to ensure Interoperability among service providers
(d) Incurs high overheads of protocol stack

Answer: (c)

146. A statement that can be either true or false, depending on the truth values of its propositional variables is called:

(a) Contradiction
(b) Tautology
(c) Absurdity
(d) Contingency

Answer: (d)

147. Which one of the following algorithms is designed by Ford and Fulkerson?

(a) The labeling algorithm
(b) The matching algorithm
(c) The line drawing algorithm
(d) The edge detection algorithm

Answer: (a)

148. In Object-Oriented Programming using C++, static variable is also known as:

(a) Object variable
(b) Class variable
(c) Stored variable
(d) Global variable

Answer: (b)

149. Which one of the following types of class is not used to create objects?

(a) Anonymous class
(b) Nested class
(c) Base class
(d) Abstract class

Answer: (d)

150. The XML DOM object is

(a) Entity
(b) Entity Reference
(c) Comment Reference
(d) Comment Data

Answer: (b)

151. Which one of the following characteristics is satisfied by websites without the attached database?

(a) The ability to generate data via SQL
(b) The inability to use a browser to display WebPages
(c) Static information using HTML or JavaScript
(d) The need to use TCP/IP as the network protocol

Answer: (c)

152. A model which is used to understand the design of a data structure to indicate an implementation-independent view of the data structure is:

(a) Linear data type
(b) Non- linear data type
(c) Abstract data type
(d) Primitive data type

Answer: (c)

153. Which one of the following search algorithms cannot be applied to a sorted linked list?

(a) Sequential search algorithm
(b) Iterative search algorithm
(c) Recursive search algorithm
(d) Binary search algorithm

Answer: (d)

154. In a queue an element can be added arbitrarily and from which only either the smallest or largest element can be removed, the type of the queue is:

(a) Circular queue
(b) Priority queue
(c) Deques
(d) Ordinary queue

Answer: (b)

155. Postfix notation is also known as:

(a) Reverse polish notation
(b) Polish notation
(c) Infix notation
(d) Reverse notation

Answer: (a)

156. In a depth-first search of an undirected graph G, every edge of G is:

(a) Either a tree edge or a back edge
(b) Either a forward edge or a cross edge
(c) Either a left edge or a right edge
(d) Either a front edge or a parallel edge

Answer: (a)

157. The time required to perform a sequence of data structure operations is averaged over all the operations performed is called:

(a) Average case analysis
(b) Amortized analysis
(c) Performance analysis
(d) Best case analysis

Answer: (b)

158. Which algorithm solves the single-source shortest-paths problem in the general case in which edge weights may be negative?

(a) Dijkstra algorithm
(b) Bellman-Ford algorithm
(c) Ford-Fulkerson algorithm
(d) Prim algorithm

Answer: (b)

159. Which of the following statements are correct regarding asymptotic notation?

1. ?-notation provides an asymptotic upper bound on a function
2. Ω- notation provides an asymptotic lower bound on a function
3. ?- notation provides an asymptotic lower bound on a function

(a) 1 and 2 only
(b) 1 and 3 only
(c) 2 and 3 only
(d) 1, 2 and 3

Answer: (a)

160. The primary determinant in selecting activities in each iteration of the spiral model of software development is:

(a) Cost
(b) Iteration size
(c) Constraints
(d) Risk

Answer: (d)

161. Which one of the following testing is essentially a set of path test performed to examine the many different paths through the modules?

(a) Integration testing
(b) Unit testing
(c) Function testing
(d) System testing

Answer: (b)

162. An approach which is very simple in its philosophy where basically all the modules are constructed and tested independently of each other and when they are finished, they are all put together at same time is:

(a) Top-Down strategy
(b) Bottom-Up strategy
(c) Big-Bang strategy
(d) Breadth-First strategy

Answer: (c)

163. Capability maturity model in software engineering is a technique which is used to improve the:

(a) Testing
(b) Understanding of the software
(c) Software process
(d) Prototype model

Answer: (c)

164. A model which enables the developer to apply the prototyping at any stage in evolution of the product and which addresses the risks associated with software development is:

(a) Spiral model
(b) Prototype model
(c) Water fall model
(d) V-shape model

Answer: (a)

165. Which one of the following supports basic OLAP operations, including slice-and-dice, drill-down, roll-up and pivoting?

(a) Information processing
(b) Analytical processing
(c) Transaction processing
(d) Data mining

Answer: (b)

166. Which one of the following systems is customer-oriented and is used for transaction and query processing by Clerks, Clients and IT professionals?

(a) OLAP
(b) OLTP
(c) ROLAP
(d) HOLAP

Answer: (b)

167. In the discretization technique, if the discretization process uses class information then it is:

(a) Top-down discretization
(b) Bottom-up discretization
(c) Supervised discretization
(d) Un-supervised discretization

Answer: (c)

168. In which one of the following data transformations the low-level or primitive (raw) data are replaced by higher-level concepts through the use of concept hierarchies?

(a) Smoothing
(b) Aggregation
(c) Normalization
(d) Generalization

Answer: (d)

169. The database which is partitioned across multiple disks and parallel processing occurs within a specific task that is performed concurrently on different processors against different sets of data, is:

(a) Vertical parallelism
(b) Horizontal parallelism
(c) Inter-query parallelism
(d) Intra-query parallelism

Answer: (b)

170. In a distributed transaction processing system, a transaction should satisfy the properties of:

(a) RPC
(b) ACID
(c) Nested transactions
(d) MOM (Message Oriented Middleware)

Answer: (b)

171. The distributed systems containing devices which are often characterized by small, battery-powered, mobile, adopt to contextual changes, encourage ad hoc composition and recognize sharing are called:

(a) Distributed Computing Systems
(b) Cloud Computing Systems
(c) Distributed Information Systems
(d) Distributed Pervasive Systems

Answer: (d)

172. Which one of the following architectural styles of distributed systems is based on publish/subscribe systems?

(a) Event-based architectures
(b) Object-based architectures
(c) Data-centered architectures
(d) Layered architectures

Answer: (a)

173. In a decentralized distributed system architecture where the tables of distributed relational databases, are split column-wise and distributed across multiple machines, is called:

(a) Horizontal distribution
(b) Overlay distribution
(c) Three-tiered distribution
(d) Vertical distribution

Answer: (d)

174. In a distributed system, the interface suitable for development work in high-performance server clusters and can handle more advanced features of buffering and synchronization is:

(a) RPC (Remote Procedure Call)
(b) Berkeley Socket Interface
(c) XTI (Open Transport Interface)
(d) MPI (Message-Passing Interface)

Answer: (d)

175. Consider the following statements regarding ‘data structure’:

1. In Hash table, access time is independent of the size ? of the collection
2. In Search tree, elements are accessible in their natural order

Which of the above statements is/are correct?
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2

Answer: (c)

176. Which of the following shells are found in the ‘UNIX Operating System’?

1. Bourne shell
2. C shell
3. Korn shell
4. Restricted shell

Select the correct answer using the codes given below:
(a) 1, 2 and 3 only
(b) 1, 2 and 4 only
(c) 1, 3 and 4 only
(d) 1, 2, 3 and 4

Answer: (d)

177. A ‘Brouter ’ combines the features of a:

(a) Router and a Gateway
(b) Bridge and a Gateway
(c) Router and a Bridge
(d) Bridge and a Repeater

Answer: (c)

178. Which Microsoft TCP/IP (Transfer Control Protocol) / (Internet Protocol) can be used over the Internet to create a secure virtual network?

(a) SLIP (Serial Line Internet Protocol)
(b) PPTP (Point-to-Point Tunneling Protocol)
(c) TCP (Transfer Control Protocol)
(d) HTTP (Hyper Text Transfer Protocol)

Answer: (b)

179. Consider the following statements:
1. A mouse listener can keep other mouse listeners from receiving a mouse event by invoking the consume ( ) method on Mouse Event Object
2. To enable events for a component, one must first invoke enable Events ( ) with the appropriate flags

Which of the above statement(s) is / are correct?
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2

Answer: (d)

180. When an exception is thrown but not caught in a particular scope, the method-call stack is ‘unwound’, and an attempt is made to catch the exception in the next outer try block. This process is called

(a) Rethrowing Exception
(b) Stack Unwinding
(c) Stack Unwounding
(d) Stack Tracing

Answer: (b)

181. Consider the following statements:
In RDBMS, the second normal form(s) is/are:
1. A composite attributes is converted to individual attributes
2. Non key attributes are functional dependent on key attributes
3. The non key attributes functionally dependent on not a part of key attributes

Which of the above statements is/are correct?
(a) 1 only
(b) 2 only
(c) 3 only
(d) 1, 2 and 3

Answer: (b)

182. In a relation (table) if a non key attribute is fully functionally dependent on composite key, then the relation (table) is in:

(a) DKNF (Domain Key Normal Form)
(b) BCNF (Boyce – Codd Normal Form)
(c) Fourth Normal Form
(d) Third Normal Form

Answer: (b)

183. A NETCONF client that provides a command line interface for interacting with the Netopeer-server is:

(a) Netopeer-manager
(b) Netopeer-configurator
(c) Netopeer-cli
(d) Netopeer-server

Answer: (c)

Computer Engineering Objective Questions with Answers Pdf Download Online Quiz Test

Leave a Reply

Your email address will not be published. Required fields are marked *