Alien head

Computer Basics

Description: Basics of Computer Fundamentals- An Multiple Type Multiple Questions Test for Students who want to be Succesful in Life
Number of Questions: 25
Created by:
Tags: COMPUTER Computer Basic Fundamentals Computer Fundamentals Fundamental of Computers Basics of Computers Computer Knowledge
Attempted 0/25 Correct 0 Score 0

The number of distinct simple graphs with three nodes is

  1. 15

  2. 10

  3. 7

  4. 9

Correct Option: A

The recurrence relation that arises in relation with the complexity of Binary Search is

  1. T(n) = T(n/2) + k

  2. T(n) = 2T(n/2) + k

  3. T(n) = T(n/2) + log n

  4. T(n) = T(n/2) + n

Correct Option: B

Let A and B be any two arbitrary events then which one of the following is true?

  1. P(A + B) = P(A)P(B)

  2. P(AUB) = P(A) + P(B

  3. P(A|B) = P(AΩB)P(B)

  4. P(AΩB) ≤ P(A) + P(B)

Correct Option: D

Pascal implementations permit recursion(1) because

  1. They use dynamic allocation for variable

  2. They use static allocation for variable

  3. Stacks are not available on all machines

  4. It is not possible to implement recursion on all machine

Correct Option: A

Use of goto statement may be harmful because

  1. It increases the running time of programs

  2. It makes program verification difficult

  3. It increases the memory required for programs

  4. It results in compiler generating larger machine code

Correct Option: B

Redundancy is dangerous as it is a potential threat to data

  1. integrity

  2. consistency

  3. sufficiency

  4. None of these

Correct Option: B

Consider the following functions f1(n) and f2(n) f1(n) = n3 for 0 ≤ n < 10,000 n2 for n ≥ 1 f2(n) = n for 0 ≤ 100 n2 for n ≥ 10,000. Which of the following is true?

  1. f1(n) is O(f2(n))

  2. f1(n) is O(n3)

  3. f2(n) is O(f1(n))

  4. f1(n) is O(n)

Correct Option: B

Given a system using unplanned blocking and 80 bytes blocks. A file contains records of 20,40,25,15,35,40,35. What percentage of shape will be wasted in the blocks allocated for the file?

  1. 7.5%

  2. 9.5%

  3. 11.5%

  4. 12.5%

Correct Option: D

Consider the following set of functional dependencies on the scheme (A,B,C)
The conical cover for the set is

  1. A→BC and B→C

  2. A→BC and AB→C

  3. A→BC and A→B

  4. A→B and B→C

Correct Option: C

The following program
main() {*int i=100; int M(); printf(“%d“,(*M)(i));} int M(x)int x{printf(“%d”,++x);}

  1. prints 100

  2. prints 101

  3. prints an error message

  4. prints 1013

Correct Option: D

If an instruction takes time m if there is no page fault, and time n if there is a page fault. What is the effective instruction time if page faults occur once every i instructions?

  1. m

  2. (n-m)/i

  3. (m+(n-m))/i

  4. None of these

Correct Option: C

The term polling in a computer means a process by which a computer system

  1. Detects/corrects error

  2. Multiplexes the inputs and updates the memory accordingly

  3. Decides correct alternative by analyzing several ones

  4. Inquires to see if a terminal has any transaction to send

Correct Option: D

Semaphore operations are atomic because they are implemented with in the Operating System's

  1. shall

  2. kernel

  3. I/O

  4. hardware

Correct Option: A

Shift of a register by one bit to left in binary code is equivalent to

  1. addition of 2

  2. exponent of 2

  3. multiplication of 2

  4. subtraction of 2

Correct Option: C

A ROM is used to store the task for multiplication of two 8-bits unsigned integers. The size of ROM required is

  1. 256x16

  2. 64k x 8

  3. 4k x 16

  4. 64k x 16

Correct Option: D

If a windows NT-based computer is to function as a print server for the network, what will be the most critical component?

  1. Free disk space

  2. Frequent backups

  3. Fast process

  4. None of these

Correct Option: A

If the compiler runs on a computer other than the computer for which it produces object codes, is

  1. Self compiler

  2. Cross compiler

  3. Resident compiler

  4. None of these

Correct Option: B

Which of the following layer protocols are responsible for user and the application program support such as passwords, resource sharing, and file transfer and network management?

  1. layer 7 protocol

  2. ayer 6 protocol

  3. layer 5 protocol

  4. layer 4 protocol

Correct Option: A

The string 1101 does not below to set represented by

  1. 110*(0+1)

  2. 1(0+1)*101

  3. (10)(01)(00+11)*

  4. (00+(11*)0)*

Correct Option: C

While the database transfers 8-bits of data in parallel, the SID pin handles---------(numbers).

  1. 1 bit at a time

  2. 2 bit at a time

  3. 3 bit at a time

  4. 4 bit at a time

Correct Option: A

Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS?

  1. 10

  2. 12

  3. 120

  4. 1200

Correct Option: C

What does 'dumb' terminal essentially consists of?

  1. Keyboards and micro-processer

  2. Keyboard and VDU

  3. Microprocessor and VDU

  4. None of these

Correct Option: B

The process used to set up a program once the system operational is

  1. Operating system

  2. Block box

  3. Boot strap

  4. Utility

Correct Option: C

Let f(x, y, z) = x' + y'x + xz be a switchihg function. Which of the following is valid?

  1. y'x is a prime implicant of f

  2. xz is a minterm of f

  3. xz is an implicant of f

  4. y is a prime implement of f

Correct Option: D

The Quick sort algorithm requires a maximum of ______ stack space in the worst case

  1. O(n)

  2. O(m)

  3. O(logn)

  4. None of these

Correct Option: A
+ View questions