0% found this document useful (0 votes)
141 views21 pages

Entrance Exam Questions

Masters in computer science entrance exam questions for practice

Uploaded by

Anushka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views21 pages

Entrance Exam Questions

Masters in computer science entrance exam questions for practice

Uploaded by

Anushka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Question 1:

Spring is a _______ framework?

A. Free
B. Open source
C. Under license
D. Proprietary

Question 2:

Which forms simplifies and ensures that there are minimal aggregates and repetitive groups?

A. 1NF
B. 2NF
C. 3NF
D. 4NF

Question 3:

If there exists a set of transactions such that every transaction in the set is waiting for another
transaction in the set, then the system enters in:

A. Deadlock State
B. Rollback state
C. Active state
D. Prevent state

Question 4:

The counter measures to protect databases against threats are-

A. Access Control
B. Inference Control
C. Flow Control
D. All of these

Question 5:

____________ do not take their decisions on measurements or estimates of the current traffic and
topology.

A. Static algorithms
B. Adaptive algorithms
C. Non-Adaptive algorithms
D. Recursive algorithms
Question 6:

_______ advanced macro facility allows us to establish loops.

A. DB
B. REPT
C. ANOP
D. DW

Question 7:

Which statement is correct with respect to wireless ad-hoc network

A. Access point is must


B. All nodes are access points
C. Access point is not required
D. Nodes are not required

Question 8:

Which one of the following languages over the alphabet {0,1} is described by the regular expression:

(0+1) 0 (0+1)*0 (0+1)*?

A. The set of all Istrings containing the substring 00


B. The set of all strings containing at most two O's
C. The set of all strings containing at least two 0's
D. The set of all strings that begin and end with either 0 or 1

Question 9:

In a n-node binary tree maximum ______ number of threads are possible.

A. n+1
B. n
C. n-1
D. n(n-1)

Question 10:

In soft real time operating system, time constraints are very strict and even the shortest possible delay is
not acceptable. T/F

A. TRUE
B. FALSE
Question 11:

The sort which has best case as well as worst case time complexity O(n log n) is

A. bubble sort
B. Insertion sort
C. Quick sort
D. Merge sort

Question 12:

What is a long-term scheduler?

A. It selects which process has to be brought into the ready queue


B. It selects which process has to be executed next and allocates CPU
C. It selects which process to remove from memory by swapping
D. None of above

Question 13:

PHP keyword to define derived class is

A. extend
B. extends
C. inherit
D. link

Question 14

What are the examples of NoSql document store databases ?

A. Cassandra
B. MongoDB
C. Neo4j
D. All

Question 15:

SMTP is ______ protocol

A. Network Layer
B. Application Layer
C. Transport Layer
D. Session Layer
Question 16:

If user requirements are unclear and frequently changed, which one of the following models is used to
develop such projects?

A. Waterfall model
B. Incremental model
C. Concurrent model
D. Prototyping model

Question 17:

In PL/SQL, a way to select multiple rows of data from the database and then process each individually is
provided by

A. View
B. Cursor
C. Trigger
D. Procedure

Question 18:

Type 1 grammar is represented by which of the following language?

A. Recursively Enumerable Language


B. Context Sensitive Language
C. Recursive Language
D. Deterministic Context free Language

Question 19:

What is Checked Exception in Java

A. An exception which should be thrown inside the method along with declaring that the method
throws it
B. An exception which should be handled using TRY CATCH statements.
C. Exceptions for which the compiler throws error without completing. compilation for not
handling properly.
D. All the above

Question 20:

Which of the following techniques can be used for wireless session tracking?

A. Cookies
B. URL Rewriting
C. Hidden Fields
D. None of the above
Question 21:

A synthesized attribute is an attribüte whose value at a parse tree node depends on __________

A. Attributes at the siblings only


B. Attributes at parent node only
C. Attributes at children nodes only
D. None of the above

Question 22:

The derived classes possess characteristics of base class is known as...

A. Data Abstraction
B. Data Binding
C. Inheritance
D. Polymorphism

Question 23:

_____________multiple access technique is used by IEEE 802.11 standard for wireless LAN?

A. CDMA
B. ALOHA
C. CSMA/CD
D. CSMA/CA

Question 24:

Which of the following is a type of file organization?

A. Sequential FO
B. Heap FO
C. Hash FO
D. All of the above

Question 25:

PHP communicate with Web Server using protocol

A. SMTP
B. NTFS
C. HTTP
D. FTP
Question 26:

The ________ is an implicit parameter to all member functions.

A. friend function
B. this pointer
C. iostream file
D. class object

Question 27:

A queue that allows deletion of only the largest item in collection is called

A. Prionty Queue
B. Ascending Priority Queue
C. Descending priority Queue
D. None of the above

Question 28:

Constant pointer to constant memory of type integer can be written as___________

A. const int const ptr


B. const int const ptr = &x
C. int *const ptr
D. const int *ptr

Question 29:

Which of the following is not considered in Communication Practices?

A. Listen
B. Face-to-face Communication
C. The risk consider
D. Facilitate the activity

Question 30:

_______is used to find and fix bugs in the Java programs

A. JVM
B. JRE
C. JDK
D. JDB
Question 31:

At the ready queue when a process arrives In priority scheduling algorithm, the priority of this process is
compared with the priority of?

A. currently running process


B. parent process
C. all process
D. init process

Question 32:

Consider the following DAG. What will be the regular expression for the DAG?

A. (a+a(b-(c))) + (b-(c) (d))


B. a+a(b-c)+(b-c) d
C. (a+a*(b-(c)+(b-(c))) *(d))
D. a+(a*b-c)+(b-cd)

Question 33:

PHP function to start session

A. startsession()
B. session()
C. session_start()
D. session_init()

Question 34:

Array name is a _____

A. Special variable
B. Special Pointer
C. Pointer to Constant Memory
D. Constant Pointer To Non-constant Memory

Question 35:

pg_fetch_array() function returns

A. values
B. array
C. row
D. NULL
Question 36:

IEEE 802.15 standard is known for------LANS

A. Wired Network
B. Wireless Speciality Network
C. Bluetooth
D. not in the list

Question 37:

Which statement is true about a static nested class?

A. You must have a reference to an instance of the enclosing class to instantiate it.
B. It does not have access to non-static members of the enclosing class.
C. It's variables and methods must be static
D. It must extend the enclosing class.

Question 38:

What is a comparator in Java?

A. Interface to compare integer.


B. Comparison method for lists
C. Interface to compare two objects in Java.
D. All of these

Question 39:

The language accepted by this DFA is -

A. a(a+b)*ab
B. a(a+b)*
C. a(a+b)* + b (a+b)*
D. e+(a+b)*
Question 40:

AJAX allows communication

A. synchronous
B. without reloading whole page
C. next page
D. web page

Question 41:

What are the disadvantages of File Systems?

A. Data redundancy
B. Data inconsistency
C. Difficulty in accessing data
D. All of the above

Question 42

What will be the output of the JAVA program below ?class Equals

{ public static void main(String[] args)

{ int x = 100;

double y = 100.1,

boolean b = (x = y);

System.out.println(b); } }

A. TRUE
B. FALSE
C. Compilation fails.
D. An exception is thrown at runtime.

Question 43:

The time complexity of the following code is: for (i=1;i<=n;i++) for (j=1;j<= j)

x=x+1

A. O(n)

B. O(n)

C. O(log n)

D. O(n log n)
Question 44:

What is the name of the machine for the following definition M = (Q, à, G, d,q0, ZO, F) where d:Qx (àÈ
{e})xG→QxG*

A. DFA
B. NFA
C. Push Down Automata(PDA)
D. Turing Machine

Question 45:

______is the process of modifying the addresses used in the address sensitive instructions of a program
such that the program can execute correctly from the designated area of memory.

A. Program Relocation
B. Pure interpretation
C. Impure Interpretation
D. Linking

Question46:

Error detection is the _________

A. detection of errors caused by noise or other impairments during transmission from the
transmitter to the receiver
B. Odetection of errors and reconstruction of the original, error-free data.
C. only restructuring of data
D. none the mentioned

Question47:

Generalization is denoted by using…………. symbol.

a. Triangle
b. Ellipse
c. Circle
d. Square

Question 48:

Which of the following machine has a Read-Write Head?

A. Turing Machine
B. Melay Machine
C. Moore Machine
D. NFA
Question 49:

XML: is used

a. Reduce load on server


b. connect to server
c. display data
d. display data on server

Question 50:

Objects are…………………. components of modeling.

A. fundamental and structural


B. fundamental, logical and structural
C. logical and structural
D. fundamental and logical

Question 51:

Identify the correct extension of the user-defined header file in C++

a. .cpp
b. hg
c. hf
d. h

Question 52:

In _______ Operand fields are completely processed in intermediate code.

a. Variant-1
b. Variant-2
c. Both of above
d. None of above

Question 53:

Function pointer that takes int argument and returns void can be declared as

A. (void*) fptr (int)


B. (void) *fptr (int *)
C. (void *) *fptr (int)
D. (void*) fptr (int*)
Question 54:

UML stands for

A. Universal Modeling Language


B. Unified Modeling Language
C. Unique Model Language
D. Unify Model Language

Question55:

C++ uses which approach?

a. right-left
b. Top-down
c. left-right
d. bottom-up

Question 56:

10 Base5 also known as ________

A. thick ethernet
B. shield ethernet
C. twist ethernet
D. thin ethernet

Question 57:

To allocate special memory in CPU; we use ……………… modifier.

a. register
b. const
c. MU
d. MR

Question 58:

Class diagram represents ………………..

A. Time dependent view of the system


B. Behavioral view of the system
C. Structural view of the system
D. Sequential view of the system
Question 59:

Which of the following is not system call?

a. fork()
b. exec()
c. scanf()
d. wait()

Question 60:

To include integrity constraint in the existing relation, which command is used?

A. Drop table
B. Modify table
C. Alter table
D. Create table

Question 61:

To include integrity constraint in the existing relation, which command is used?

A. Drop table
B. Modify table
C. Alter table
D. Create table

Question 61

Suppose that you would like to create an instance of a new Map that has an iteration order that is the
same as the iteration order of an existing instance of a Map.

Which concrete implementation of the Map interface should be used for the new instance?

A. LinkedHashMap
B. TreeMap
C. Answer depends on the implementation of existing instance.
D. HashMap

Question 62:

skips the comments and white spaces from the input characters.

A. Parser
B. Scanner
C. Preprocessor
D. Loader
Question 53:

System Design is a development of

A. Investigation and study of problem.


B. blue print, a computer solution to a problem that has same components and inter
relationship amongst the components as original problem has.
C. gathering of facts and diagnosing the problem.
D. its detailed study and analysis

Question 64:

Which of the following is an Advanced Assembler directive?

A. DC
B. LTORG
C. DS
D. START

Question 65:

PHP function to send Email is

A. SMTP
B. main()
C. send_email()
D. mail()

Question 66:

To declare constant in C, we can use

A. const
B. const and #define
C. void
D. constant

Question 67:

To keep the values of variables unchanged during multiple entries and exits from a block, we use

A. Pass By Reference
B. Pass By Value
C. Pointers
D. static modifier
Question 68:

The number of bits used for addressing in Gigabit Ethernet is

A. 32 bits
B. 48bits
C. 64bits
D. 128bits

Question 69:

B-tree of order m has how many maximum number of children?

A. m
B. m+1
C. m-1
D. m/2

Question 70:

What is the result of the following program?

public static synchronized void main(String[] args) throws InterruptedException

{Thread f = new Thread(),

f.start();

System.out.print("A");

f wait(1000);

System.out.print("B"); }

A. It prints A and B with a 1000 seconds delay between them


B. It only prints A and exits.
C. It only prints B and exits.
D. A will be printed, and then an exception is thrown

Question 71:

The statement in JDBC that can execute stored procedure and dynamic SQL is

A. Callable
B. PreaparedStatement
C. executeQuery
D. executeUpdate
Question 72:

To specify the number of digits to be displayed after the decimal point of a float value the command in
C++ is _________

A. width()
B. precision()
C. fill()
D. setf()

Question 73:

Which of the following is high-speed adaptation of a waterfall model where multiple software teams
work in parallel on different system functions?

A. RAD model
B. Concurrent model
C. Spiral model
D. Prototyping model

Question 74:

What are the functions of DBA?

A. Network Maintenance
B. Routine Maintenance
C. Authorization for data access
D. All of the above

Question 75:

Consider the following Grammar G=({S, A, B, C}, {a, b}, P, S ) where P is:

S -> BC |AB

A -> aAa | epsilon

B -> bAa

C -> epsilon

Then Follow (A) is:

A. {a, b}
B. {a, $}
C. {a}
D. { b ,$}
Question 76:

Which of the following devices takes data sent from one network device and forwards it to the
destination node based on MAC address?

A. Hub
B. Switch
C. Modem
D. Gateways

Question 77:

Well documented systems are ……….

A. difficult to maintain and manage


B. not manageable
C. easy to maintain and manage
D. none of the above

Question 78:

Choose the RDBMS which supports full fledged client server application development

A. dBase V
B. Oracle 7.1
C. FoxPro 2.1
D. Ingress

Question 79:

If the transaction Ti has obtained exclusive lock on the data item Q, then

A. Ti can both read and write Q.


B. Ti can read Q
C. Ti can write Q
D. Ti cannot read and write Q.

Question 80:

How can we share memory of a variable at bit level instead at byte level?

A. Using Bitwise Operators


B. Using structure
C. Using Union
D. Using Array
Question 81:

Macro and Pre-Processing definitions starts with _______

A. #
B. ##
C. #and ##
D. /*

Question 82:

The structure used to store the database modifications and maintains a record of all the update activities
in the database is

A. Stable Memory
B. Log
C. Record
D. Catalog

Question 83:

PHP function to sort associative array by value in ascending order

A. sort()
B. arsort()
C. Orsort()
D. asort()

Question 84:

Operator overloading in C++ indicates ____________

A. Data Abstraction
B. Run time polymorphism
C. Compile time polymorphism
D. Exception Handling

Question 85:

Public, Private and Protected visibilities of attributes and methods are denoted by using ………….. symbols
respectively in a class diagram.

A. +,#,-
B. #, +,-
C. -,+,#
D. +,-,#
Question 86:

The relation employee(ID, name, street, credit, salary) is decomposed into employee1 (ID, name) and
employee2(name, street, credit, salary)

A. lossless decomposition
B. lossless join decomposition
C. lossy decomposition
D. All of the above

Question 87:

PHP function to change the owner of file

A. chown
B. nlink
C. chgrp
D. chmod

Question 88:

Aggregation is a ………… relationship.

A. Owns a
B. Whole Part
C. General
D. Nominal

Question 89:

Which of the following is not an action of LR parser?

A. Shift
B. Accept
C. Reduce
D. GOTO

Question 90:

The cost benefit analysis of the system is determined by:

A. Technical feasibility
B. Economical feasibility
C. Operational feasibility
D. Conventional feasibility
Question 91:

Which of the following address belongs class A?

A. 130.12.12.248
B. 128.12.12.248
C. 121.12.12.248
D. 129.12.12.248

Question 92:

printf("%d",*(a+i)) is same as _____

A. printf("%d", *a[i])
B. printf("%d",a[i])
C. printf("%d", **a[i])
D. printf("%d",a[i+1])

Question 93:

Keyword asm is used for _________

A. Assembly Code in C
B. Assembling of code In C
C. Constant Declaration In C
D. Reserved For Future Use
Question 94:

Lock that prevents the use of any tables in the database from one transaction, while another transaction
is being processed is called

A. database-level lock
B. table-level lock
C. page-level lock
D. row-level lock

Question 95:

strstr() function in PHP used for

A. find string position


B. Searches first occurrence of string
C. Searches occurrence of string
D. Searches the pattern in string
Question 97:

If we use header node in a linked list then __________

A. space can be optimized


B. space overhead but time optimized
C. Time overhead
D. Both space & time can be optimized

Question 98:

In which agile model, Pair programming is carried out ?

A. Extrem Programming
B. Dynamic Systems Development technique
C. Adaptive Software Development
D. Scrum

Question 99:

ER Diagram is a tool for ............ modeling while Data Flow Diagram is a tool for ……….. modeling.

A. General, Physical
B. Data, Process
C. Logical, Physical
D. Fundamental, Logical

Question 100:

paging suffers from fragmentation.

A. Internal
B. External
C. Both of above
D. None of above

You might also like