Computer Science And Engineering Model Test Paper -II


50 Questions MCQ Test | Computer Science And Engineering Model Test Paper -II


Description
This mock test of Computer Science And Engineering Model Test Paper -II for Government Jobs helps you for every Government Jobs entrance exam. This contains 50 Multiple Choice Questions for Government Jobs Computer Science And Engineering Model Test Paper -II (mcq) to study with solutions a complete question bank. The solved questions answers in this Computer Science And Engineering Model Test Paper -II quiz give you a good mix of easy questions and tough questions. Government Jobs students definitely take this Computer Science And Engineering Model Test Paper -II exercise for a better result in the exam. You can find other Computer Science And Engineering Model Test Paper -II extra questions, long questions & short questions for Government Jobs on EduRev as well by searching above.
QUESTION: 1

Consider the following sequence of instructions :

Solution:
QUESTION: 2

10’s complement of (924)11 is ______

Solution:
QUESTION: 3

An example of a self complementing code is _____

Solution:
QUESTION: 4

The rule that a value of a foreign key must appear as a value of some specific table is called -

Solution:
QUESTION: 5

Output of the following program fragment is _____

Solution:
QUESTION: 6

A relation R is given as :

Determine weather R is

Solution:
QUESTION: 7

What cannot replace “?” in the following C code to print all odd numbers less than 100 for (i = 1; ? ; i = i + 2)

printf(“ %d\n”,i);

Solution:
QUESTION: 8

An equivalence relation has the following property :

Solution:
QUESTION: 9

What is the value of b after the execution of the following code statements?

c = 10;

b = ++c + ++c;

Solution:
QUESTION: 10

(P ⇒ ¬ P) ⇒ ¬ P is

Solution:
QUESTION: 11

In communication satellite, multiple represents are known as _______

Solution:
QUESTION: 12

Which of the following is central to the OSI model & its protocols?

Solution:
QUESTION: 13

In digital signature technique, the sender of the message uses _____ to create ciphertext.

Solution:
QUESTION: 14

Which of the following implements the three address code?

Solution:
QUESTION: 15

Recursive descent parsing is an example of _______

Solution:
QUESTION: 16

A Unix device driver is _____

Solution:
QUESTION: 17

RSA algorithm is a___________ cryptography.

Solution:
QUESTION: 18

Which memory management scheme permits the physical address space of a process to be non contiguous?

Solution:
QUESTION: 19

Any syntactic construct that can be describe d by a regular expression can also be described by a ______

Solution:
QUESTION: 20

An e- business that allows consumer to name their own price for products and services, is based on which e- business mode?

Solution:
QUESTION: 21

Which of the following I/O devices have a very high character density?

Solution:
QUESTION: 22

A _______ ensures that transactions executed automatically.

Solution:
QUESTION: 23

______ is a way by which a message send to upstream router to stop sending multicast message

Solution:
QUESTION: 24

The ______ defines the way of connecting or relating two or more entities together.

Solution:
QUESTION: 25

Match the following

Communication between application located on different devices :

Solution:
QUESTION: 26

When more than one attributes of a table are related with many attributes of one or more other tables.

Solution:
QUESTION: 27

A grammar for a programming language is a formal description of ______

Solution:
QUESTION: 28

The database administration function includes _______

Solution:
QUESTION: 29

Zero address instruction format is used for ______

Solution:
QUESTION: 30

The relational database environment has all of the following components except _______

Solution:
QUESTION: 31

In top down analysis and design

Solution:
QUESTION: 32

DTD definition is used along with XML to specify -

Solution:
QUESTION: 33

In linked list representation, a node contains at least ________

Solution:
QUESTION: 34

The OS of a computer may periodically collect all the free memory space to from contiguous block of free space. This is called _____

Solution:
QUESTION: 35

Which one is not a risk management activity?

Solution:
QUESTION: 36

A key difference between logic and the PROLOG representation is that the PROLOG interpreter has a ______

Solution:
QUESTION: 37

Software testing is ______

Solution:
QUESTION: 38

Which of the following is the less desirable property of the knowledge?

Solution:
QUESTION: 39

Software mistakes during coding are known as _____

Solution:
QUESTION: 40

________ can be viewed as a recursive produce

Solution:
QUESTION: 41

Which command is used to remove the read permission of the note from both the group and others?

Solution:
QUESTION: 42

A common type of error detecting code is called a ______

Solution:
QUESTION: 43

Which of the following is called forward error correction?

Solution:
QUESTION: 44

The _____ updates the probabilities every kbyte, which is tuned to speed up the process while hurting little the compression achieved.

Solution:
QUESTION: 45

Which of the following is true? (i) On average, neural networks have higher computational rates than conventional computers (ii) Neural networks learn by example (iii) Neural networks mimic the way the human brain works.

Solution:
QUESTION: 46

JPEG supports three types of selective refinement

Solution:
QUESTION: 47

The following context free grammar

generated strings of terminals that have .

Solution:
QUESTION: 48

What is the limit of data compression?

Solution:
QUESTION: 49

The data transmission between two sockets is organized by _______

Solution:
QUESTION: 50

Network programming is essentially a _______

Solution: