Model Questions on Computer Science and Engineering
Interested users can download the Model Questions on Computer Science and Engineering from the links enclosed below. Download the Last 5 Years Model Questions on Computer Science and Engineering Solved along with the Answers of each question.
This Model Questions on Computer Science and Engineering may vary from the Actual paper. Use the Model Questions on Computer Science and Engineering as a reference for the exam preparation. Check the Model Questions on Computer Science and Engineering from this page.
At the bottom of this page, you will find ‘Click here links’ for downloading the Model Questions on Computer Science and Engineering. Click on the required link & download your related Model Questions on Computer Science and Engineering to make as a reference for your scheduled preparation.
Computer Science and Engineering Model Question
1. A minimum of _____ variable(s) is/are required to be shared between processes to solve the critical section problem.
(a) One
(b) Two
(c) Three
(d) Four
2. The address of a page table in memory is pointed by
(a) stack pointer
(b) page table base register
(c) page register
(d) program counter
3. The following program:
main()
{
if(fork()>0)
sleep(100);
}
results in the creation of
(a) an orphan process
(b) a zombie process
(c) a process that executes forever
(d) None of these
4. What is the mounting of file system?
(a) creating of a file system
(b) removing portion of the file system into a directory structure
(c) attaching portion of the file system into a directory structure
(d) deleting a file system
5. A page fault occurs when
(a) a page gives inconsistent data
(b) a page cannot be accessed due to its absence from memory
(c) a page is invisible
(d) All of the above
6. The data structure used for file directory is called
(a) mount table
(b) hash table
(c) file table
(d) process table
7. A process control block does not contain
(a) Program counter
(b) Bootstrap program
(c) Stack
(d) Code
8. The part of machine level instruction, which tells the central processor what to be done is
(a) Operation code
(b) Address
(c) Locator
(d) Flip-flop
9. A system program that combines the separately compiled modules of a program into a form suitable for execution
(a) Assembler
(b) Linking loader
(c) Cross compiler
(d) None of these
10. The strategy of allowing processes that are logically runnable to be temporarily suspended is called
(a) Preemptive scheduling
(b) Non-preemptive scheduling
(c) Shortest job first
(d) FCFS
11. The LRU algorithm pages out page
(a) That have been used recently
(b) That have not been used recently
(c) That have least used recently
(d) None of these
12. Semaphore are used to solve the problems of
(a) Race condition
(b) Process synchronization
(c) Mutual exclusion
(d) None of these
13. Round-robin scheduling
(a) allows interactive tasks quicker access to the processor
(b) gives each task the same chance at the processor
(c) is quite complex to implement
(d) allows processor-bound tasks more time in the processor
14. __________ provides a larger size of virtual memory but requires virtual memory which provides multidimensional memory.
(a) Paging method
(b) Segmentation method
(c) Paging and segmentation method
(d) None of these
15. A direct method of deadlock prevention is to prevent the occurrences of
(a) Mutual exclusion
(b) Hold and wait
(c) Circular waits
(d) No preemption
16. What is dispatch latency?
(a) The time taken by the dispatcher to stop one process and start another
(b) The time taken by the processor to write a file into disk
(c) The whole time taken by all processors
(d) None of these
17. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?
(a) Partitioning
(b) Multitasking
(c) Paging
(d) Timesharing
18. Which of the following gets called when an object goes out of scope?
(a) Constructor
(b) Destructor
(c) Main
(d) virtual function
19. What is the output of following program code?
#include <iostream>
using namespace std;
int fun(int=0, int=0);
int main()
{
cout << fun(5);
return 0;
}
int fun(int x, int y)
{
return (x+y);
}
(a) Compile error
(b) 5
(c) 0
(d) 10
20. Which of the following operators cannot be overloaded?
(a) >>
(b) ? :
(c) .
(d) Both (b) and (c)
21. When a base class is privately inherited by the derived class, then
(a) protected members of the base class become private members of derived class
(b) public members of the base class become private members of derived class
(c) both (a) and (b)
(d) only (b)
22. What is use of eof()?
(a) Returns true if a file open for reading has reached the next character.
(b) Returns true if a file open for reading has reached the next word.
(c) Returns true if a file open for reading has reached the end.
(d) Returns true if a file open for reading has reached the middle.
23. Which of the following is not a type of constructor?
(a) Copy Constructor
(b) Friend Constructor
(c) Default Constructor
(d) Parameterized Constructor
24. Default constructor has
(a) Single argument
(b) Multiple arguments
(c) No argument
(d) Cannot say
25. In multi-level inheritance, the middle class acts as
(a) Base class
(b) Derived class
(c) Both (a) and (b)
(d) None of these
More Question Set on Computer Science and Engineering
Model Question | Old Question |
Sample Papers | Mock Test |
Practice Set | Question Bank |
Important Questions | Test Papers |
Typical Questions | Selected Questions |
26. To have a pointer to class member it must be declared as
(a) Public
(b) Private
(c) Protected
(d) All of these
27. From which stream does the program receive data?
(a) Cin
(b) Cout
(c) Cerr
(d) All of these
28. In which file mode open() fails if the file already exists?
(a) ios:: trunk
(b) ios::nocreate
(c) ios::write
(d) ios::noreplace
29. In which method is address of object implicitly passed to the called function?
(a) Pass-by-value
(b) Pass-by-reference
(c) Both (a) and (b)
(d) None of these
30. The Java compiler translates source code into
(a) Machine code
(b) Assembly code
(c) Byte code
(d) JVM code
31. Polymorphism is achieved by
(a) Overloading
(b) Encapsulation
(c) Dynamic Binding
(d) Overriding
32. Runtime polymorphism is achieved by
(a) Friend function
(b) Virtual function
(c) Function overloading
(d) Operator overloading
33. Exception handling is targeted at
(a) Run-time error
(b) Compile time error
(c) Logical error
(d) All of these
34. Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called?
(a) Derived class constructor followed by Base class constructor.
(b) Base class constructor followed by derived class constructor.
(c) Base class constructor will not be called.
(d) Derived class constructor will not be called.
35. An object is
(a) a variable of class datatype.
(b) same as a class.
(c) just like a global variable.
(d) collection of data-members and member functions.
36. Pixel mask means
(a) A string containing only 1’s
(b) A string containing only 0’s
(c) A string containing 1 and 0
(d) A string containing 0 and 0
37. Intensity range of a 8 pixel image is
(a) 0 to 7
(b) 0 to 25
(c) 0 to 255
(d) 0 to 225
38. If a line is drawn from A(5,5) to B(13,9) using Bresenham’s Algorithm.Then, if the first pixel is (5,5) then the second pixel is
(a) (7,6)
(b) (6,6)
(c) (8,7)
(d) (9,7)
39. Frame Buffer is also known as
(a) Refresh Buffer
(b) Memory Buffer
(c) Both (a) and (b)
(d) None of these
40. Which transformation distorts the geometry of object?
(a) Shearing
(b) Rotation
(c) Scaling
(d) None of these
41. When we select a portion of image and making invisible or not showing the rest. What will you call this?
(a) Windowing
(b) Clipping
(c) Viewport
(d) None of these
42. The basic attributes of a straight line segment are
(a) Type
(b) Width
(c) Color
(d) All of these
43. Hue of a color is related to
(a) Luminance
(b) Saturation
(c) Wavelength
(d) None of these
44. The phenomenon of having a continuous glow of beam on the screen even after it is removed is known as
(a) Fluorescence
(b) Persistence
(c) Phosphorescence
(d) Incandescence
45. The amount of light emitted by the phosphor coating depends on the
(a) Number of electrons striking the screen
(b) Speed of electrons striking the screen
(c) Distance from the cathode to the screen
(d) None of these
46. Which type data structure is used for efficient implementation of scan-line algorithm to fill regions?
(a) Node list
(b) Edge list
(c) Stack
(d) None of these
47. Random scan systems are designed for
(a) Line drawing application
(b) Pixel drawing application
(c) Color drawing application
(d) None of these
48. What is the name given to the process of converting each primitive from its geometric definition into set of pixels that make up the primitive in the image space?
(a) Rasterization
(b) Scan conversion
(c) (b) only
(d) Both (a) and (b)
49. Vector graphics is composed of
(a) Pixels
(b) Paths
(c) Palette
(d) All of these
50. The tuples of the relations can be of __________ order.
(a) Any
(b) Same
(c) Sorted
(d) Constant