Computer Questions with solutions MCQs

1. The basic architecture of a computer system was developed by

A

John Von Neumann

B

Charles Babbage

C

Blaise Pascal

D

Garden Moore

Computer KUET MCA 2022
Correct Answer : A
Explanation :

The von Neumann architecture — also known as the von Neumann model or Princeton architecture — is a computer architecture based on a 1945 description by John von Neumann, and by others, in the First Draft of a Report on the EDVAC.

Correct Answered :

Wrong Answered :

2. Conversion of hexadecimal number (1D7F)16 to a decimal number is 

A

755110

B

877110

C

555710

D

778110

Computer KUET MCA 2022
Correct Answer : A
Explanation :

= 1*163 + 13*162 + 7*161 + 15*160
= 4076 + 3328 + 112 + 15
= 7551

Correct Answered :

Wrong Answered :

3. How many bytes does 4 kilobytes represent?

A

1000

B

1024

C

4096

D

8196

Computer KUET MCA 2022
Correct Answer : C
Explanation :

KB to Bytes Conversion Table
Kilobytes (KB)Bytes (B) decimalBytes (B) binary
4 KB4000 Bytes4096 Bytes
5 KB5000 Bytes5120 Bytes
6 KB6000 Bytes6144 Bytes
7 KB7000 Bytes7168 Bytes

Correct Answered :

Wrong Answered :

4. Which of the following address is generated by CPU?

A

Logical address

B

Physical address

C

Actual address

D

Simple address

Computer KUET MCA 2022
Correct Answer : A
Explanation :

A logical address is generated by CPU while a program is running. Since a logical address does not physically exists it is also known as a virtual address. This address is used as a reference by the CPU to access the actual physical memory location.

Correct Answered :

Wrong Answered :

5. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register?

A

Absolute mode

B

Indirect mode

C

Immediate mode

D

Index mode

Computer KUET MCA 2022
Correct Answer : D
Explanation :

Base indexed mode : The effective address of the operand is generated by adding a constant value to the content of a register.

Correct Answered :

Wrong Answered :

6. Which of the following Boolean rules is correct?

A

A + 0 = 0

B

A + 1 = 1

C

A + A = A.A

D

A + A.B = A + B

Computer KUET MCA 2022
Correct Answer : D
Explanation :

A + A.B = A + B

Correct Answered :

Wrong Answered :

7. The performance of cache memory is frequently measured in terms of a quantity called

A

Miss ratio

B

Latency ratio

C

Read ratio

D

Hit ratio

Computer KUET MCA 2022
Correct Answer : D
Explanation :

The performance of cache memory is frequently measured in terms of a quantity called Hit ratio.

Correct Answered :

Wrong Answered :

8. In C++, which of the following operator cannot be overloaded?

A

^

B

==

C

.

D

!

Computer KUET MCA 2022
Correct Answer : C
Explanation :

Some operators cannot be overloaded which include sizeof operator, typeid, Scope resolution (::), Class member access operator (.), Ternary or conditional operator (?:). These operators cannot be overloaded because it can cause serious programming issues or errors and also it is syntactically not possible.

Correct Answered :

Wrong Answered :

9. Which of the following is true about virtual functions in C++?

A

Virtual functions are functions that can be overridden in derived class with the same signature.

B

Virtual functions enable run-time polymorphism in a inheritance hierarchy.

C

If a function is virtual in the base class, the most-derived class implementation of the function is called according to the actual type of the object referred to, regardless of the declared type of the pointer or reference. In non-virtual functions, the functions are called according to the type of reference or pointer.

D

All of these

Computer KUET MCA 2022
Correct Answer : D
Explanation :

All of these

Correct Answered :

Wrong Answered :

10. How many types of access specifiers are provided in OPP (C++)?

A

1

B

2

C

3

D

4

Computer KUET MCA 2022
Correct Answer : C
Explanation :

In C++, there are three access specifiers: public - members are accessible from outside the class. private - members cannot be accessed (or viewed) from outside the class. protected - members cannot be accessed from outside the class, however, they can be accessed in inherited classes.

Correct Answered :

Wrong Answered :

11. What is the base data type of a pointer variable by which the memory would be allocated to it?

A

Int

B

Do datatype

C

Depends upon the type of the variable to which it is pointing

D

Unsigned int

Computer KUET MCA 2022
Correct Answer : D
Explanation :

Unsigned int

Correct Answered :

Wrong Answered :

12. Snapshot of the data in the database at a given instant of time is called.

A

Database Schema

B

Database Instance

C

Database Snapshot

D

All of the above

Computer KUET MCA 2022
Correct Answer : B
Explanation :

Database Instance

Correct Answered :

Wrong Answered :

13. Which of the following data constraints would be used to specify that the value of cells in a column must be one of specific set of possible values?

A

A domain constraint

B

A range constraint

C

An intra relation constraint

D

An inter relation constraint

Computer KUET MCA 2022
Correct Answer : A
Explanation :

A domain constraint

Correct Answered :

Wrong Answered :

14. In Context of database, Let T1 and T2 be two concurrent transactions. Consider the following sequence of operations on data X :

T1 : R(X) T1 : W(X) T2 : R(X) T2 : W(X)

This is called ______Problem


A

Dirty Read

B

Lost update

C

Incorrect summary

D

Unrepeatable Read

Computer KUET MCA 2022
Correct Answer : A
Explanation :

Dirty Read

Correct Answered :

Wrong Answered :

15. Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

A

Non repeatable read

B

Phantom read

C

Dirty read

D

Consistent read

Computer KUET MCA 2022
Correct Answer : C
Explanation :

Dirty Read

Correct Answered :

Wrong Answered :

16. Identify the data structure which allows deletion at both ends of the list but insertion at only one end?

A

Stack

B

Priority Queue

C

Output restricted queue

D

Input restricted queue

Computer KUET MCA 2022
Correct Answer : D
Explanation :

Input restricted queue

Correct Answered :

Wrong Answered :

17. Which of the following is not a linear data structure?

A

Stack

B

Graph

C

List

D

None of these

Computer KUET MCA 2022
Correct Answer : B
Explanation :

Graph

Correct Answered :

Wrong Answered :

18. Merge sort uses which of the following technique to implement sorting?

A

Backtracking

B

Greedy Algorithm

C

Divide and Conquer

D

Dynamic Programming

Computer KUET MCA 2022
Correct Answer : C
Explanation :

Divide and Conquer

Correct Answered :

Wrong Answered :

19. A complete binary tree with the property that the value at each node is at least as large as the values at its children is called

A

Binary Search Tree

B

Binary Tree

C

Completely Balanced Tree

D

Heap

Computer KUET MCA 2022
Correct Answer : D
Explanation :

In a Max. Binary Heap, the key value at each node is as least as large as the values at its children. Similarly in Min Binary Heap, the key at root must be minimum among all keys present in Binary Heap.

Correct Answered :

Wrong Answered :

20. To access the services of the operating system, the interface is provided by the ____.

A

Library

B

System calls

C

Assembly instructions

D

API

Computer KUET MCA 2022
Correct Answer : B
Explanation :

To access services of the Operating System an interface is provided by the System Calls

Correct Answered :

Wrong Answered :

21. Switching the CPU to another Process requires to save state of the old process and loading new process state is called as ____.

A

Process Blocking

B

Context Switch

C

Time Sharing

D

None of above

Computer KUET MCA 2022
Correct Answer : B
Explanation :

Context Switch

Correct Answered :

Wrong Answered :

22. The operating system and the other processes are protected from being modified by an already running process because ____.

A

They are in different memory spaces.

B

They are in different logical addresses

C

They have a protection algorithm

D

Every address generated by the CPU is being checked against the relocation and limit registers.

Computer KUET MCA 2022
Correct Answer : D
Explanation :

Every address generated by the CPU is being checked against the relocation and limit registers.

Correct Answered :

Wrong Answered :

23. What is the worst case time complexity of a quick sort algorithm?

A

O(n)

B

O(nlogn)

C

O(n2)

D

O(logn)

Computer KUET MCA 2022
Correct Answer : C
Explanation :

O(n2)

Correct Answered :

Wrong Answered :

24. The following paradigm can be used to find the solution of the problem in the minimum time:

Given a set of non negative integers, and a value K, determine if there is a subset of the given set with sum equal to K?


A

Divide and Conquer

B

Dynamic Programming

C

Greedy Algorithm

D

Brand and Bound

Computer KUET MCA 2022
Correct Answer : B
Explanation :

“Subset sum problem”: Given a set of non-negative integers, and a value sum, determine if there is a subset of the given set with sum equal to given sum(K). Dynamic Programming paradigm can be used to find the solution of the problem in minimum time.

Correct Answered :

Wrong Answered :

25. Best case time complexity of binary search algorithm is

A

O(N)

B

O(LOGN)

C

O(NLOGN)

D

O(N2)

Computer KUET MCA 2022
Correct Answer : B
Explanation :

The time complexity of the binary search algorithm is O(log n). The best-case time complexity would be O(1) when the central index would directly match the desired value. Binary search worst case differs from that. The worst-case scenario could be the values at either extremity of the list or values not in the list.

Correct Answered :

Wrong Answered :

26. According to Chomsky classification, language of finite automata is :

A

Type 0

B

Type 1

C

Type 2

D

Type 3

Computer KUET MCA 2022
Correct Answer : D
Explanation :

Type 3 grammars are generated by regular languages. These languages are exactly all those languages that can be accepted by finite state automata. Type 3 is the most restricted grammar.

Correct Answered :

Wrong Answered :

27. How many DFA`s exits with two states over input alphabet {0, 1}

A

16

B

26

C

32

D

64

Computer KUET MCA 2022
Correct Answer : D
Explanation :

Number of DFA’s = 2n * n(2*n).

Correct Answered :

Wrong Answered :

28. Which of the following statement is false?

A

Context free language is the subset of context sensitive language

B

Regular language is the subset of context sensitive language

C

Recursively enumerable language is the super set of regular language

D

Context sensitive language is a subset of context free language

Computer KUET MCA 2022
Correct Answer : D
Explanation :

Context sensitive language is a subset of context free language

Correct Answered :

Wrong Answered :

29. Which of the following can accept even palindrome over {a,b}

A

Push down Automata

B

Turing machine

C

NDFA

D

All of the mentioned

Computer KUET MCA 2022
Correct Answer : C
Explanation :

NDFA

Correct Answered :

Wrong Answered :

30. The required resources for communication between end systems are reserved for the duration of the session between end systems in _____ method.

A

Packet switching

B

Circuit switching

C

Line switching

D

Frequency switching

Computer KUET MCA 2022
Correct Answer : B
Explanation :

In circuit-switched networks, the resources needed along a path (buffers, link bandwidth) to provide for communication between the end systems are reserved for the duration of the session.

Correct Answered :

Wrong Answered :

31. The device bridge is used at ____ layer of OSI reference model.

A

Datalink

B

Network

C

Transport

D

Application

Computer KUET MCA 2022
Correct Answer : A
Explanation :

Bridge works at Data link layer.

Correct Answered :

Wrong Answered :

32. In ____, the chances of collision can be reduced if a station senses the medium before trying to use it.

A

MA

B

CSMA

C

FDMA

D

CDMA

Computer KUET MCA 2022
Correct Answer : B
Explanation :

CSMA

Correct Answered :

Wrong Answered :

33. Which of the following is not a function of network layer?

A

routing

B

inter networking

C

congestion control

D

error control

Computer KUET MCA 2022
Correct Answer : D
Explanation :

in the osi model, network layer is the third layer and it provides data routing paths for network communications. error control is a function of the data link layer and the transport layer.

Correct Answered :

Wrong Answered :

CONTACT US

  • J & K

  • admin@prepmart.in

  • LIKE AND SHARE YOUR EXPERIENCE

    Like Us on Facebook Join Us on Telegram
    VISITORS COUNT 9 4 8 7 4 2
    Developed By : Azhar Rashid Teli