All questions of CBT II for Computer Science Engineering (CSE) Exam

A distributed network configuration in which all data information pass through a central computer is________.
  • a)
    Bus Network
  • b)
    Ring Network
  • c)
    Star Network
  • d)
    Font to Point Network
Correct answer is option 'C'. Can you explain this answer?

Tejas Verma answered
Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central hub which acts as a conduit to transmit messages.

Which is not the component of the information system.
  • a)
    hardware
  • b)
    software
  • c)
    people
  • d)
    None of these
Correct answer is option 'D'. Can you explain this answer?

Shubham Sharma answered
  • An information system has five key components hardware, software, data, processes, and people.
  • Hardware consists of everything in the physical layer of the information system. For example, hardware can include servers, workstations, networks etc.
  • Software refers to the programs that control the hardware and produce the desired information or results. Software consists of system software and application software.
  • People who have an interest in an information system are called stakeholders. Stakeholders include the management group responsible for the system.

Artificial Intelligence is associated with which generation?
  • a)
    First Generation
  • b)
    Second Generation
  • c)
    Third Generation
  • d)
    Fifth Generation
Correct answer is option 'D'. Can you explain this answer?

Shubham Sharma answered
Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and react like humans. Fifth generation computers are in a developmental stage which is based on artificial intelligence.

Arrange in descending order the units of memory TB, KB, GB, MB.
  • a)
    TB > MB > GB > KB
  • b)
    MB > GB > TB > KB
  • c)
    TB > GB > MB > KB
  • d)
    GB > MB > KB > TB
Correct answer is option 'C'. Can you explain this answer?

Rajesh Khanna answered
Computers do all calculations using a code made of just two numbers; 0 and 1. This system is called binary code.
Unit of Memory Abbreviation Exact Memory Amount
Binary Digit Bit, b 1 or 0
Byte B 8 bits
Kilobyte KB or K 1024 bytes
Megabyte MB 1024 KB
Gigabyte GB 1024 MB
Terabyte TB 1024 GB

The loss in signal power as light travels down the fiber is called:
  • a)
    attenuation
  • b)
    prorogation
  • c)
    scattering
  • d)
    interruption
Correct answer is option 'A'. Can you explain this answer?

Rajesh Khanna answered
Attenuation is the reduction in power of the light signal as it is transmitted. It is caused by passive media components such as cable, and connectors.

Paging:
  • a)
    is a method of memory allocation by which the program is subdivided into equal portions, or pages and core are subdivided into equal portions or blocks.
  • b)
    consist of those addresses that may be generated by a processor during execution of a computation.
  • c)
    is a method of allocating processor time.
  • d)
    allows multiple programs to reside in separate areas of the core at the time.
Correct answer is option 'A'. Can you explain this answer?

Mita Mehta answered
Paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory. In this scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. Paging is an important part of virtual memory implementations in modern operating systems, using secondary storage to let programs exceed the size of available physical memory.

Which of the following communication modes support two-way traffic but in only one direction at a time?
  • a)
    simplex
  • b)
    half duplex
  • c)
    full duplex
  • d)
    all of the above
Correct answer is option 'B'. Can you explain this answer?

Half Duplex Communication Mode

Half duplex is a communication mode that allows two-way traffic, but only in one direction at a time. In this mode of communication, data can be transmitted in both directions, but not simultaneously. It requires a communication channel that can be switched between transmitting and receiving modes.

Explanation:

Half duplex communication can be compared to a walkie-talkie system where the user can either transmit or receive messages, but not both at the same time. When one user is speaking, the other user needs to wait until the transmission is complete before responding.

Comparison with other Communication Modes:

1. Simplex: Simplex communication mode only allows one-way traffic. In this mode, data can only be transmitted in one direction, and there is no provision for receiving data. Examples of simplex communication include radio and television broadcasting.

2. Half Duplex: Half duplex allows two-way traffic, but only in one direction at a time. It requires the communication channel to be switched between transmitting and receiving modes. Examples of half duplex communication include walkie-talkies and CB radios.

3. Full Duplex: Full duplex communication allows two-way traffic simultaneously. It provides separate channels for transmitting and receiving data, allowing both parties to communicate at the same time. Examples of full duplex communication include telephone conversations and video conferences.

Conclusion:

In summary, half duplex communication mode supports two-way traffic, but only in one direction at a time. It allows data transmission and reception, but not simultaneously. This mode is commonly used in various communication systems where simultaneous two-way communication is not required.

A ……. Circuit is an interconnection of flip-flops and gates.
  • a)
    Combinational
  • b)
    Digital
  • c)
    Sequential
  • d)
    All of these
Correct answer is option 'C'. Can you explain this answer?

Tejas Verma answered
A sequential circuit is a logical circuit, where the output depends on the present value of the input signal as well as the sequence of past inputs.

A system program that separately compiled modules of a program into a form suitable for execution is:
  • a)
    Assembler
  • b)
    Linking loader
  • c)
    Cross compiler
  • d)
    Load and go
Correct answer is option 'B'. Can you explain this answer?

Rajesh Khanna answered
Linking loader combines the function of a relocating loader with the ability to combine a no. of program segments that have been independently compiled into an executable program.

In OSI network architecture, the dialogue control and token management are responsible for which of the following layers?
  • a)
    session layer
  • b)
    network layer
  • c)
    transport layer
  • d)
    data link layer
Correct answer is option 'A'. Can you explain this answer?

Kajal Banerjee answered
Explanation:

The OSI (Open Systems Interconnection) network architecture is a conceptual framework that standardizes the functions of a communication system into seven different layers. These layers work together to ensure reliable and efficient communication between network devices.

The session layer is responsible for establishing, managing, and terminating connections between applications or processes on different devices. It provides services such as dialogue control and token management.

Dialogue Control:
Dialogue control refers to the coordination and synchronization of communication between two devices. It ensures that the devices take turns sending and receiving data, preventing conflicts and ensuring orderly communication.

Token Management:
Token management is a mechanism used to control access to a shared resource in a network. It ensures that only one device at a time has the right to transmit data over the network. The token is passed between devices, granting them permission to transmit data.

Responsibility of the Session Layer:
The session layer is responsible for managing the dialogue between two devices, including establishing and terminating connections, as well as coordinating the flow of data. It provides services that allow applications to establish sessions, exchange data, and manage tokens for controlled access to the network.

Layer Correspondence:
In the OSI network architecture, the session layer corresponds to the fifth layer. The seven layers in the OSI model are as follows:

1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

Therefore, the dialogue control and token management are responsible for the session layer (option A).

Which of the following is not the property of Transactions?
  • a)
    Atomicity
  • b)
    Isolation
  • c)
    Durability
  • d)
    Symmetricity
Correct answer is option 'D'. Can you explain this answer?

Hiral Menon answered
Understanding Transaction Properties
In the context of database management systems, transactions are crucial for ensuring data integrity and consistency. The key properties of transactions are often summarized by the acronym ACID, which stands for Atomicity, Consistency, Isolation, and Durability.

Key Properties of Transactions
- Atomicity:
This property ensures that a transaction is treated as a single unit of work. It either completes fully or does not happen at all. If any part of the transaction fails, the entire transaction is rolled back, maintaining the database's integrity.
- Isolation:
Isolation ensures that transactions execute independently of one another. Even if transactions are occurring simultaneously, the outcome should not be affected by the concurrent execution of other transactions, preventing data inconsistency.
- Durability:
Once a transaction has been committed, it remains so, even in the event of system failures. This ensures that completed transactions are not lost and that the database reflects all committed transactions fully.

Why Symmetricity is Not a Property
- Symmetricity:
This term does not relate to transaction properties in databases. It refers to a concept in mathematics and computer science dealing with symmetry and balance, which is not applicable to the ACID properties of transactions.
In conclusion, while Atomicity, Isolation, and Durability are essential properties of transactions, Symmetricity is not relevant in this context, making it the correct answer to the question.

Which of the following protocols is used to File transfer from one machine to another?
  • a)
    FTP
  • b)
    SMTP
  • c)
    HTTP
  • d)
    Email
Correct answer is option 'A'. Can you explain this answer?

Vedika Singh answered
FTP is a standard network protocol used to transfer files from one host to another host over a TCP-based network such as the Internet.

Which of the following is also called as transparent flip flop:
  • a)
    J-K flip flop
  • b)
    S-R flip flop
  • c)
    T flip flop
  • d)
    D flip flop
Correct answer is option 'D'. Can you explain this answer?

Shubham Sharma answered
The truth table of D flip flop is shown
When the clock is high, the Output Q follows the input. Hence D flip flop is known as the transparent flip flop.

Input taken by semantic analyzer and output produces by semantic analyzer are
  • a)
    Token stream, syntax tree
  • b)
    Character stream, token stream
  • c)
    Syntax tree, intermediate representation
  • d)
    Syntax tree, syntax tree
Correct answer is option 'D'. Can you explain this answer?

Vedika Singh answered
Phases of Compiler Input Output
Lexical Analyzer Character stream Token stream
Syntax Analyzer Token stream Syntax tree
Semantic Analyzer Syntax tree Syntax tree
Intermediate Code Generator Syntax tree Intermediate representation
Machine-Independent Code Optimizer Intermediate representation Intermediate representation
Code Generator Intermediate representation Target-machine code
Machine-Dependent Code Optimizer Target-machine code Target-machine code

With reference to the effect of greenhouse gases, which of the following is/are true?
Select the answer from the following options
a) Changes to plant growth and nutrition levels
b) Ozone depletion
c) Smog pollution
  • a)
    Only a
  • b)
    Only a and b
  • c)
    Only b and c
  • d)
    a, b and c
Correct answer is option 'D'. Can you explain this answer?

Rajesh Khanna answered
Effect of greenhouse gases:
Increase in temperature on Earth
Changes to plant growth and nutrition levels
Desertification of fertile areas
Ocean acidification
Ozone depletion
Smog pollution
Impact on agriculture and livestock
Migration of species due to change in climate pattern

Which of the following operators in ‘C’ does not associate from the right?
  • a)
    ,
  • b)
    =
  • c)
    + =
  • d)
    ++
Correct answer is option 'A'. Can you explain this answer?

Pragati Ahuja answered
Introduction:
In the programming language 'C', operators are used to perform various operations on variables and constants. Each operator has its own precedence and associativity rules. Associativity determines the order in which operators with the same precedence are evaluated. Operators can associate from left to right or from right to left.

Explanation:
The given options are a), b), c), and d), and we need to determine which operator does not associate from the right.

a) , (Comma Operator):
The comma operator in 'C' is used to separate expressions and evaluate them from left to right. It has the lowest precedence among all the operators, and it associates from left to right. For example:

```c
int a = 5, b = 10, c = 15;
int result = (a = b, a + c); // result = 25
```

Here, the comma operator is used to assign the value of `b` to `a` first (a = b), and then evaluate `a + c`. As the comma operator associates from left to right, the value of `a` becomes 10, and the result is calculated as 10 + 15 = 25.

b) = (Assignment Operator):
The assignment operator in 'C' is used to assign a value to a variable. It has right-to-left associativity. For example:

```c
int a = 5;
int b = (a = 10); // b = 10
```

Here, the value 10 is assigned to `a` using the assignment operator (a = 10), and then the value of `a` is assigned to `b`. As the assignment operator associates from right to left, the value of `a` is assigned to `b`, and `b` becomes 10.

c) = (Equality Operator):
The equality operator in 'C' is used to compare two values for equality. It has left-to-right associativity. For example:

```c
int a = 5, b = 10;
if (a == b) {
printf("Equal");
} else {
printf("Not Equal"); // Output: Not Equal
}
```

Here, the equality operator (a == b) compares the values of `a` and `b`, and the result is evaluated from left to right. As `a` is not equal to `b`, the output will be "Not Equal".

d) ?: (Conditional Operator):
The conditional operator in 'C' is used to evaluate a condition and choose between two expressions based on the result. It has right-to-left associativity. For example:

```c
int a = 5, b = 10;
int max = (a > b) ? a : b; // max = 10
```

Here, the conditional operator (a > b) ? a : b checks if `a` is greater than `b`. If the condition is true, the value of `a` is assigned to `max`; otherwise, the value of `b` is assigned to `max`. As the conditional operator associates from right to left, the value of `a` (10) is assigned to `max`.

Conclusion:
Among the given options, the operator that does not associate from

Which of the following communication devices combines transmissions from several I/O devices into one line?
  • a)
    Concentrator
  • b)
    Modifier
  • c)
    Multiplexer
  • d)
    Full-duplex line
Correct answer is option 'C'. Can you explain this answer?

Rajesh Khanna answered
Multiplexer (MUX) is a device that selects one of several analog or digital input signals and forwards the selected input into a single line. So, MUX multiplexes input signals into an aggregate signal (common channel) for transmission.

The expansion of RAM is _______.
  • a)
    Read Octet Machine
  • b)
    Random Access Memory
  • c)
    Read Access Memory
  • d)
    Random Access Machine
Correct answer is option 'B'. Can you explain this answer?

Mita Mehta answered
Primary Memory (Main Memory): Primary memory is also known as main memory. It holds only those data and instructions on which computer is currently working. It has limited capacity and data is lost when power is switched off.
Primary memory can be divided into RAM (Random Access Memory) and ROM (Read Only Memory)
RAM ROM
It is Volatile or temporary memory It is Non Volatile or permanent memory
Data gets erased when the power supply is off Data stored permanently
Faster memory Slow memory
It is used in the normal operations of a computer after starting up and loading the operating system A ROM chip is used primarily in the start-up process of a computer

Feature(s) of Zero Waste Management is (are):
  • a)
    Separation of garbage at the source
  • b)
    Separate collection of each kind
  • c)
    Involvement of the community in all activities
  • d)
    All of the above
Correct answer is option 'D'. Can you explain this answer?

Mita Mehta answered
Features of Zero Waste Management:
Separation of garbage at the source
Separate collection of each kind of waste
Involvement of the community in all activities
Benefits of Zero Waste Management:
Reducing, reusing and recycling can be a key part of a climate change strategy to reduce our greenhouse gas emissions
Conserves resources and minimizes pollution
Promotes social equity and builds community

Which of the following techniques is an alternative to log based recovery?
  • a)
    Check points
  • b)
    Shadow paging
  • c)
    Locks
  • d)
    Page based
Correct answer is option 'B'. Can you explain this answer?

Shadow paging

Shadow paging is an alternative to log-based recovery technique used in database management systems. It is a technique that provides recovery and concurrency control without the need for maintaining a log file.

How Shadow Paging works:

1. Pages: In shadow paging, the database is divided into fixed-size pages. Each page consists of a header and data area.

2. Shadow Page Table (SPT): Shadow paging uses a separate data structure called the Shadow Page Table (SPT) to keep track of the pages. The SPT contains information about the current state of each page, such as whether it is in use or free, and the address of its corresponding shadow page.

3. Shadow Pages: Shadow pages are copies of the original pages that are created during the checkpoint operation. They are used for recovery in case of failures.

4. Checkpoint: Periodically, a checkpoint operation is performed to update the shadow pages. During the checkpoint, the entire database is copied into the shadow pages, and the SPT is updated to point to the new shadow pages.

5. Transaction Execution: During normal operation, when a transaction modifies a page, it creates a copy of the original page and applies the modifications to the copy. The SPT is updated to point to the new shadow page.

6. Transaction Commit: When a transaction is committed, the modified pages are written back to the original pages, and the SPT is updated to reflect the changes.

7. Transaction Abort: If a transaction is aborted, the modified pages are discarded, and the SPT is reverted to point to the original pages.

8. Recovery: In case of a failure, the system can recover by restoring the original pages from the shadow pages using the SPT.

Advantages of Shadow Paging:
- Simplicity: Shadow paging is a relatively simple recovery technique compared to log-based recovery.
- No log maintenance: Since shadow paging does not use a log file, there is no need to maintain and update the log during normal operation, reducing overhead.
- Faster recovery: Recovery in shadow paging is faster compared to log-based recovery as it involves restoring the original pages directly from the shadow pages.

Disadvantages of Shadow Paging:
- Increased storage overhead: Shadow paging requires additional storage space to maintain the shadow pages.
- Limited concurrency control: Shadow paging does not provide fine-grained concurrency control mechanisms like locking, which may result in reduced concurrency in a multi-user environment.

Overall, shadow paging is an alternative recovery technique that provides simplicity and faster recovery compared to log-based recovery. However, it has certain limitations in terms of storage overhead and concurrency control.

Which of the following algorithms gives the best performance, If the given input array is sorted or nearly sorted?
  • a)
    Selection sort
  • b)
    Bubble sort
  • c)
    Insertion sort
  • d)
    Merge sort
Correct answer is option 'C'. Can you explain this answer?

Shubham Sharma answered
Insertion sort is used when the number of elements is small. It can also be useful when the input array is almost sorted, only a few elements are misplaced in a complete big array.

Which of the following is true about a critical section program segment?
  • a)
    It should be run in a certain specified amount of time.
  • b)
    Where shared resources are accessed
  • c)
    Which must be enclosed by a pair of semaphores operations, P and V
  • d)
    Which avoids deadlocks
Correct answer is option 'B'. Can you explain this answer?

Rohit Mehta answered
Understanding Critical Sections
A critical section is a segment of a program where shared resources are accessed. It is crucial to manage access to these resources to prevent issues like race conditions and data inconsistency.
Key Characteristics of Critical Sections:
  • Shared Resources: The primary purpose of a critical section is to manage access to shared resources (e.g., variables, files, devices) among multiple processes or threads. Only one process should access the shared resource at a time to maintain data integrity.
  • Mutual Exclusion: Critical sections must enforce mutual exclusion, ensuring that when one process is executing in its critical section, no other process can enter its critical section. This is vital for preventing conflicts and ensuring data is not corrupted.
  • Synchronization Mechanisms: Various synchronization mechanisms, such as semaphores, mutexes, and locks, are used to manage critical sections. These mechanisms help ensure that only one process can enter the critical section at any moment.
  • Deadlock Avoidance: While critical sections should ideally avoid deadlocks, this is not a requirement for defining a critical section. Instead, the focus is on ensuring that processes can safely access shared resources.
  • Timing Constraints: There is no strict requirement for critical sections to execute within a specified amount of time. Instead, the emphasis is on safe and exclusive access to resources.

Conclusion:
Thus, option 'B' is correct because it accurately describes the essence of a critical section as a segment where shared resources are accessed, highlighting the importance of managing concurrent access to ensure system stability and data integrity.

Tension in the cable supporting an elevator is equal to the weight of the elevator. From this, we can conclude that the elevator is going up or down with a ______.
  • a)
    Uniform Acceleration
  • b)
    Uniform Velocity
  • c)
    Variable Acceleration
  • d)
    Either (2) or (3)
Correct answer is option 'B'. Can you explain this answer?

Puja Tiwari answered
Explanation:
When an elevator is supported by a cable, the tension in the cable is equal to the weight of the elevator. This is because the tension in the cable needs to counteract the force of gravity acting on the elevator.

Uniform Velocity:
If the elevator is moving with a uniform velocity, it means that the net force acting on the elevator is zero. In this case, the tension in the cable is equal to the weight of the elevator, balancing out the force of gravity and allowing the elevator to move at a constant speed.

Variable Acceleration:
If the elevator is moving with a variable acceleration, it means that there is a net force acting on the elevator. This net force is responsible for the acceleration of the elevator, and the tension in the cable must be greater than the weight of the elevator to provide this net force.

Conclusion:
Since the tension in the cable is equal to the weight of the elevator, we can conclude that the elevator is moving with a uniform velocity. This is because if the elevator were moving with a variable acceleration, the tension in the cable would be greater than the weight of the elevator.

Therefore, the correct answer is option 'B' - Uniform Velocity.

A web cookie is a small piece of data_______
  • a)
    sent from a website and stored in user’s web browser while a user is browsing a website
  • b)
    sent from user and stored in the server while a user is browsing a website
  • c)
    sent from root server to all servers
  • d)
    none of the mentioned
Correct answer is option 'A'. Can you explain this answer?

Vedika Singh answered
Web cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store) or to record the user's browsing activity.

Which of the following is true in any C program?
  • a)
    must contain at least one function
  • b)
    need not contain any function
  • c)
    needs input data
  • d)
    both (a) and (b)
Correct answer is option 'A'. Can you explain this answer?

Kalyan Sharma answered
In any C program, it is true that it must contain at least one function. Let's break down the options and explain why option A is the correct answer.

a) Must contain at least one function:
- In C programming, a function is a block of code that performs a specific task. It is a fundamental building block of any program.
- Without functions, a C program cannot perform any meaningful operations or tasks. Functions are essential for code organization, reusability, and modularity.
- Therefore, every C program must contain at least one function to accomplish something useful.

b) Need not contain any function:
- This statement is incorrect because, as mentioned above, functions are necessary in C programming.
- Without functions, a C program would be incomplete and non-functional.

c) Needs input data:
- While most programs require input data to perform operations, it is not a mandatory requirement for every C program.
- There can be C programs that do not rely on user input or external data sources. For example, a program that performs a series of predefined calculations or generates random numbers does not necessarily need input data.

d) Both (a) and (b):
- This option is incorrect because option (b) is incorrect. As discussed earlier, a C program must contain at least one function.

In conclusion, the correct answer is option 'A' - a C program must contain at least one function. Functions are essential for the functionality and structure of a C program.

What is sizeof() in C?
  • a)
    Operator
  • b)
    Function
  • c)
    Macro
  • d)
    None of these
Correct answer is option 'A'. Can you explain this answer?

Tejas Verma answered
Sizeof is a much-used operator in the C programming language. It is a compile time unary operator which can be used to compute the size of its operand. The result of sizeof is of unsigned integral type which is usually denoted by size_t.

Which of the following uses the greatest number of layers in the OSI model?
  • a)
    Bridge
  • b)
    Repeater
  • c)
    Router
  • d)
    Gateway
Correct answer is option 'D'. Can you explain this answer?

Mita Mehta answered
Gateways are found in all seven layers of the OSI layers. A gateway can translate information between different network data formals or network architectures.

Timing and control unit is a part of a(n)______.
  • a)
    ALU
  • b)
    Processor
  • c)
    Memory
  • d)
    CMOS
Correct answer is option 'B'. Can you explain this answer?

Sandeep Unni answered
The Timing and Control Unit is a crucial component of a processor. It is responsible for coordinating and synchronizing the various operations within the processor, ensuring that they are executed in the correct sequence and at the appropriate time. This unit generates and sends control signals to different components of the processor, including the Arithmetic Logic Unit (ALU), memory, and input/output devices.

The Timing and Control Unit performs several important functions in a processor:

1. Instruction Fetch: The unit fetches instructions from memory according to the program counter and sends them to the instruction decoder.

2. Instruction Decode: The unit decodes the instructions fetched from memory, determining the type of operation to be performed and the location of operands.

3. Execution Control: The unit controls the execution of the instructions, sending appropriate signals to the ALU and other functional units to perform arithmetic, logical, or data transfer operations.

4. Memory Access: The unit coordinates the transfer of data between the processor and memory. It generates control signals for reading from or writing to memory, ensuring that the data is transferred accurately.

5. Input/Output Control: The unit manages the input/output operations of the processor, coordinating the transfer of data between the processor and external devices.

6. Interrupt Handling: The unit handles interrupts, which are signals generated by external devices to request attention from the processor. It interrupts the normal execution of the program and transfers control to the interrupt service routine.

In summary, the Timing and Control Unit plays a crucial role in coordinating the various operations of a processor, ensuring that instructions are fetched, decoded, and executed in the correct sequence and at the appropriate time. It controls the flow of data between different components of the processor, including the ALU, memory, and input/output devices. Therefore, it is an integral part of the processor itself.

The two’s complement of binary number 010111.1100 is ?
  • a)
    101001.1100
  • b)
    101000.0100
  • c)
    010111.0011
  • d)
    101000.0011
Correct answer is option 'B'. Can you explain this answer?

Explanation:

To find the two's complement of a binary number, we need to follow these steps:

1. Invert all the bits (change 0s to 1s and 1s to 0s) of the given binary number.
- The given binary number is 010111.1100.
- Inverting all the bits, we get 101000.0011.

2. Add 1 to the inverted number.
- Adding 1 to 101000.0011, we get 101000.0100.

Therefore, the two's complement of the binary number 010111.1100 is 101000.0100.

Answer: Option B) 101000.0100

If we arrange different gases in decreasing order of their percentage available in the atmosphere. Which one of the options is correct?
  • a)
    Oxygen, Nitrogen, Carbon Dioxide and Hydrogen
  • b)
    Oxygen, Nitrogen, Hydrogen and Carbon Dioxide
  • c)
    Nitrogen, Oxygen, Hydrogen and Carbon Dioxide
  • d)
    Nitrogen, Oxygen, Carbon Dioxide and Hydrogen
Correct answer is option 'D'. Can you explain this answer?

Jatin Das answered
Explanation:

The correct answer is option 'D' - Nitrogen, Oxygen, Carbon Dioxide, and Hydrogen.

Reasoning:

In Earth's atmosphere, gases are present in different percentages. The composition of the Earth's atmosphere is primarily made up of Nitrogen, Oxygen, Carbon Dioxide, and trace amounts of other gases like Hydrogen.

The correct order of gases in decreasing percentage is as follows:

1. Nitrogen: Nitrogen is the most abundant gas in Earth's atmosphere, making up about 78% of the total volume. It is a colorless and odorless gas that is essential for the growth of plants and is also used in various industrial processes.

2. Oxygen: Oxygen is the second most abundant gas in the atmosphere, making up approximately 21% of the total volume. It is vital for the survival of most living organisms as it is involved in the process of respiration and combustion.

3. Carbon Dioxide: Carbon Dioxide is present in the atmosphere in much lower concentrations compared to Nitrogen and Oxygen. It constitutes only about 0.04% of the total volume. Carbon Dioxide plays a crucial role in the Earth's climate system as it is a greenhouse gas responsible for trapping heat and contributing to global warming.

4. Hydrogen: Hydrogen is a trace gas in Earth's atmosphere, present in very small amounts. Its concentration is less than 0.01%. Although it is not a significant component of the atmosphere, Hydrogen is important in various industrial processes and is also used as a fuel source.

Therefore, the correct order of gases in decreasing percentage available in the atmosphere is Nitrogen, Oxygen, Carbon Dioxide, and Hydrogen (option D).

Which of the SQL statement will give an incorrect output for the following query:
Print the sum of the total marks of all those students whose roll number is between 500 and 1000.
  • a)
    Select roll_no, sum(marks) from student where roll_no >= 500 and roll_no
  • b)
    Select roll_no, sum(marks) from student where roll_no between 500 and 1000
  • c)
    Select roll_no, sum(marks) from student where roll_no in (500, 100)
  • d)
    None of the above
Correct answer is option 'C'. Can you explain this answer?

Vedika Singh answered
Aggregate functions are functions that take a collection (a set or multiset) of values as input and return a single value.
The SQL WHERE clause is used to restrict the number of rows affected by a SELECT, UPDATE or DELETE query.
In option 3, the query will only print results for roll_no 500 and roll_no 1000. It will not provide any roll number in between.

Which of the following are non-impact printers?
  • a)
    Drum printer
  • b)
    Chain printer
  • c)
    Laser Printer
  • d)
    1 and 2
Correct answer is option 'C'. Can you explain this answer?

Mita Mehta answered
  • Non-impact printers print the characters without using ribbons, These printers print a complete page at a time so they are also called page printers. E.g. Ink-Jet printer, Laser printer
  • The impact printers print the characters by striking them on the ribbon which is then pressed on the paper, E.g. Drum printer, chain printer, Dot matrix printer

Which among the following nuclear reactors was built in India with assistance from Canada?
  • a)
    Kudankulam
  • b)
    APSARA
  • c)
    CIRUS
  • d)
    Kiaga
Correct answer is option 'C'. Can you explain this answer?

Explanation:

CIRUS Nuclear Reactor:
- The CIRUS (Canadian-Indian Reactor) was a research reactor built in India with assistance from Canada.
- It was a 40 MWt (Megawatt thermal) nuclear research reactor located at the Bhabha Atomic Research Centre (BARC) in Trombay, Mumbai.
- The reactor was operational from 1960 to 2010 and played a significant role in India's nuclear research and development programs.
- Canada provided both the reactor design and the necessary nuclear fuel for the CIRUS reactor.

Other Options:
- Kudankulam Nuclear Power Plant is a nuclear power plant in Tamil Nadu, India, built with assistance from Russia.
- APSARA (Apsara Experimental Reactor) was the first nuclear reactor in India, which became operational in 1956 with assistance from the United Kingdom.
- Kaiga Nuclear Power Plant is a nuclear power plant in Karnataka, India, built with indigenous technology and assistance from other countries.
In conclusion, the CIRUS nuclear reactor was built in India with assistance from Canada, contributing to the country's nuclear research and development initiatives.

Which of the following is used to compile, debug and execute java program?
  • a)
    JDK
  • b)
    JIT
  • c)
    JVM
  • d)
    JRE
Correct answer is option 'A'. Can you explain this answer?

Diya Reddy answered
Understanding Java Development Tools
When working with Java, various tools and components play specific roles in the software development process. Among them, the Java Development Kit (JDK) is essential for compiling, debugging, and executing Java programs.
What is JDK?
- The Java Development Kit (JDK) is a comprehensive package that provides all the necessary tools to develop Java applications.
- It includes:
- Java Compiler (javac): Converts Java source code into bytecode.
- Java Debugger (jdb): Helps identify and fix bugs in your Java programs.
- Java Runtime Environment (JRE): Allows the execution of Java programs.
Roles of Other Components
- Java Virtual Machine (JVM):
- Executes the bytecode generated by the JDK.
- Provides an environment for running Java applications but does not compile or debug them.
- Java Runtime Environment (JRE):
- Contains the JVM and libraries required to run Java applications.
- Does not include development tools like the compiler or debugger, making it insufficient for development purposes.
- Just-In-Time Compiler (JIT):
- A part of the JVM that improves performance by compiling bytecode to native code during execution.
- JIT is not involved in the initial compilation or debugging process.
Conclusion
In summary, the JDK is the only option that encompasses all necessary tools for compiling, debugging, and executing Java programs. Without the JDK, developers would lack the essential functionalities required for effective Java programming.

Which of the following has the smallest storage capacity?
  • a)
    Zip disk
  • b)
    Hard disc
  • c)
    Floppy disc
  • d)
    Data cartridge
Correct answer is option 'C'. Can you explain this answer?

Ashwin Das answered
Storage Capacity of Different Storage Devices

In this question, we are given four options: Zip disk, Hard disk, Floppy disk, and Data cartridge. We need to determine which of these options has the smallest storage capacity. Let's analyze each option in detail:

1. Zip disk:
- Zip disks were a popular removable storage medium in the late 1990s and early 2000s.
- They were introduced by Iomega and came in two sizes: 100 MB and 250 MB.
- Compared to other storage devices at that time, Zip disks had a decent storage capacity.
- However, in today's standards, the storage capacity of Zip disks is considered small.

2. Hard disk:
- Hard disks are the primary storage devices in computers.
- They come in various sizes, but the most common sizes for desktop computers are 1 TB (terabyte) and 2 TB.
- Hard disks used in servers or high-end systems can have even larger capacities, reaching up to tens of terabytes.
- Compared to other options in the given list, hard disks have much larger storage capacities.

3. Floppy disk:
- Floppy disks were widely used in the 1980s and 1990s as a portable storage medium.
- The most common size of floppy disks is 3.5 inches, with a storage capacity of 1.44 MB (megabyte).
- Floppy disks have become obsolete due to their extremely small storage capacity and the emergence of more advanced storage technologies.

4. Data cartridge:
- Data cartridges are typically used in tape drives for backup and archival purposes.
- They come in various sizes, ranging from a few gigabytes to several terabytes.
- Data cartridges are designed for high-capacity storage and are commonly used in enterprise-level systems.
- Compared to the other options, data cartridges have larger storage capacities.

Conclusion:
Based on the analysis above, we can conclude that the floppy disk has the smallest storage capacity among the given options. With a capacity of only 1.44 MB, floppy disks are significantly smaller than Zip disks, hard disks, and data cartridges.

A device that connects to a network without the use of a cable is said to be:
  • a)
    Distributed
  • b)
    Centralised
  • c)
    Open source
  • d)
    Wireless
Correct answer is option 'D'. Can you explain this answer?

Pragati Ahuja answered
Understanding Wireless Connectivity
In today's digital world, the term "wireless" refers to devices that connect to a network without the need for physical cables. This technology has revolutionized how we communicate and interact with devices.
Key Characteristics of Wireless Devices:
- No Physical Connections: Wireless devices utilize radio waves or infrared signals to transmit data, eliminating the need for wired connections. This allows for greater flexibility in device placement and mobility.
- Types of Wireless Technologies: Common wireless technologies include Wi-Fi, Bluetooth, and cellular networks. Each serves different purposes, from local area networking to mobile communications.
- Ease of Use: Wireless devices are often more user-friendly. They can be easily set up without the hassle of connecting multiple cables, making them ideal for both personal and professional environments.
Benefits of Wireless Connectivity:
- Mobility: Users can move freely within the range of the network without being tethered by cables. This is particularly beneficial in settings like homes, offices, and public spaces.
- Scalability: Wireless networks can easily expand to accommodate additional devices without the need for extensive rewiring or infrastructure changes.
- Cost-Effectiveness: Installing a wireless network can be more economical than laying down cables, especially in large or complex environments.
Conclusion
In summary, a device that connects to a network without cables is classified as "wireless." This technology offers significant advantages in terms of mobility, ease of use, and cost-effectiveness, making it a preferred choice in various applications today.

What is the default line spacing in the MS word?
  • a)
    1.0
  • b)
    1.15
  • c)
    1.5
  • d)
    2.0
Correct answer is option 'B'. Can you explain this answer?

The default line spacing in MS Word is 1.15. This means that there is a slight space between each line of text, making it easier to read and visually appealing. Let's break down the answer in detail:

Default Line Spacing:
The default line spacing refers to the spacing between each line of text in a document. It determines the amount of vertical space between lines and affects the overall appearance and readability of the document.

Importance of Line Spacing:
Line spacing is an important aspect of formatting text in a document. It helps in improving readability by providing enough space between lines, making it easier for the reader to distinguish between different lines of text. Line spacing also plays a vital role in making the document visually appealing and organized.

Options in MS Word:
MS Word provides various options for line spacing. These options include single spacing, double spacing, 1.5 line spacing, and others. However, the default line spacing in MS Word is set to 1.15.

Reasoning for Default Line Spacing:
The default line spacing of 1.15 in MS Word is chosen based on readability and aesthetics. It strikes a balance between single spacing, which can appear too compact, and double spacing, which can result in excessive vertical space between lines.

Benefits of 1.15 Line Spacing:
1. Improved Readability: The slight space between lines enhances legibility, especially for lengthy documents or paragraphs.
2. Visual Appeal: The extra space between lines makes the text look more organized and visually appealing.
3. Accommodates Font Styles: Different font styles and sizes may require additional spacing between lines to ensure optimal readability.

Conclusion:
In summary, the default line spacing in MS Word is set to 1.15. This choice is made to ensure improved readability, visual appeal, and compatibility with different font styles. However, users can always change the line spacing according to their preference and specific document requirements.

Which of the memories has the shortest access time?
  • a)
    Cache memory
  • b)
    Magnetic bubble memory
  • c)
    Magnetic core memory
  • d)
    RAM
Correct answer is option 'A'. Can you explain this answer?

Tarun Sen answered
< b="" />Cache memory< />
Cache memory is a small, fast, and expensive type of memory that is located close to the CPU. It acts as a buffer between the CPU and the main memory (RAM), serving as a temporary storage for frequently accessed data and instructions. Cache memory is designed to provide fast access to data, reducing the time it takes for the CPU to retrieve information.

< b="" />Magnetic bubble memory< />
Magnetic bubble memory is a type of non-volatile memory that uses magnetic domains in a thin film to store data. It was popular in the 1970s and 1980s, but it has been largely replaced by other memory technologies. Magnetic bubble memory had a relatively slow access time compared to other types of memory, making it less suitable for applications that require fast data retrieval.

< b="" />Magnetic core memory< />
Magnetic core memory, also known as ferrite core memory, was one of the earliest types of computer memory. It used small magnetic cores to store data, and it was relatively slow compared to modern memory technologies. Magnetic core memory had a longer access time compared to cache memory.

< b="" />RAM< />
RAM, or random access memory, is a type of volatile memory that stores data and instructions that are actively used by the CPU. It is faster than magnetic core memory and magnetic bubble memory, but it still has a longer access time compared to cache memory.

< b="" />Conclusion< />
Among the given options, cache memory has the shortest access time. This is because cache memory is designed to be faster and more efficient in retrieving data compared to other types of memory. It is located closer to the CPU, allowing for quick access to frequently used data and instructions. On the other hand, magnetic bubble memory and magnetic core memory are older technologies that have slower access times. RAM is faster than the magnetic memories but still slower than cache memory. Therefore, cache memory is the memory with the shortest access time among the options provided.

In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
  • a)
    Block
  • b)
    Record
  • c)
    Tuple
  • d)
    Table
Correct answer is option 'D'. Can you explain this answer?

Shubham Sharma answered
A relational database organizes data in tables (or relations). A table is made up of rows & columns. A row is also called a record and a column is also called a field.

LANs can be connected by devices called _________which operate in the data link layer?
  • a)
    Hub
  • b)
    Bridge
  • c)
    HDLC
  • d)
    Router
Correct answer is option 'B'. Can you explain this answer?

Tejas Verma answered
LAN’s can be connected by devices called bridges which operate in the data link layer. Bridge examines the data layer link address to do routing. They are not supposed to examine the payload field of the frames they route.

Consider an operation of addition. For two numbers the operations will generate a sum. If the operands are string and the same operation would produce a third string by concatenation. This feature is called__________.
  • a)
    Inheritance
  • b)
    Encapsulation
  • c)
    Polymorphism
  • d)
    Binding
Correct answer is option 'C'. Can you explain this answer?

Rajesh Khanna answered
Polymorphism is the ability to use an operator or method in different way. It gives different meaning (or functions) to the operators or methods.
Eg. Single operator + behaves differently in different contexts such as integers, string or float referring to the concept of polymorphism.

Among the following statements, the incorrect one is:-
  • a)
    Calamine and Siderite are carbonates.
  • b)
    Argentite and Cuprite are oxides.
  • c)
    Zinc blende and Pyrites are sulphides.
  • d)
    Malachite and Azurite are ores of copper.
Correct answer is option 'B'. Can you explain this answer?

Shubham Sharma answered
Among the given options all are correct except argentite and cuprite. Cuprite is not an oxide.
Calamine ZnCO3 and Siderite FeCO3 .
Argentite Ag2S and Cuprite Cu2O .
Zinc blende ZnS and Pyrites FeS2 .
Malachite CuCO3.Cu(OH)2 and Azurite Cu3(CO3)2(OH)2 .

The ACCEPT command in SQL?
  • a)
    creates a customized prompt when accepting user input
  • b)
    Explicitly defines a NUMBER or DATE data type variable
  • c)
    Hides user input for security reasons
  • d)
    All of the above
Correct answer is option 'A'. Can you explain this answer?

Pragati Ahuja answered
Understanding the ACCEPT Command in SQL
The ACCEPT command is often used in SQL environments, particularly in Oracle SQL*Plus, to gather user input during the execution of scripts. Here's why option 'A' is the correct answer:
Customized Prompts
- The primary function of the ACCEPT command is to create a customized prompt for user input.
- This allows users to enter values that can be used later in the script, enhancing interactivity and user experience.
- For example, one can prompt a user to enter a specific value, such as a date or an ID, which can then be utilized in subsequent SQL commands.
Misconceptions about Data Types
- While the ACCEPT command does allow for input, it does not explicitly define data types like NUMBER or DATE.
- Instead, it simply captures user input as a string. If specific data types are required, additional conversion functions must be applied later in the code.
Security Considerations
- The ACCEPT command does not inherently hide user input for security purposes.
- If sensitive data is being entered, developers need to implement additional security measures, as the command itself does not provide encryption or obfuscation for the data entered by users.
Conclusion
- Therefore, while ACCEPT facilitates user engagement through customized prompts, it does not define data types or provide security features. Thus, the correct answer is option 'A', focusing on its role in creating a user-friendly prompt for input.

Chapter doubts & questions for CBT II - RRB JE Mock Test Series for Computer Science Engineering 2026 2025 is part of Computer Science Engineering (CSE) exam preparation. The chapters have been prepared according to the Computer Science Engineering (CSE) exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Computer Science Engineering (CSE) 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of CBT II - RRB JE Mock Test Series for Computer Science Engineering 2026 in English & Hindi are available as part of Computer Science Engineering (CSE) exam. Download more important topics, notes, lectures and mock test series for Computer Science Engineering (CSE) Exam by signing up for free.

Top Courses Computer Science Engineering (CSE)