Model Questions on Computer Science and Engineering

Interested users can download the Model Questions on Computer Science and Engineering from the links enclosed below. Download the Last 5 Years Model Questions on Computer Science and Engineering Solved along with the Answers of each question.

Model Questions on Computer Science and Engineering
This Model Questions on Computer Science and Engineering may vary from the Actual paper. Use the Model Questions on Computer Science and Engineering as a reference for the exam preparation. Check the Model Questions on Computer Science and Engineering from this page.

At the bottom of this page, you will find ‘Click here links’ for downloading the Model Questions on Computer Science and Engineering. Click on the required link & download your related Model Questions on Computer Science and Engineering to make as a reference for your scheduled preparation.

Computer Science and Engineering Model Question

1. A minimum of _____ variable(s) is/are required to be shared between processes to solve the critical section problem.
(a) One
(b) Two
(c) Three
(d) Four

2. The address of a page table in memory is pointed by
(a) stack pointer
(b) page table base register
(c) page register
(d) program counter

3. The following program:
main()
{
if(fork()>0)
sleep(100);
}
results in the creation of
(a) an orphan process
(b) a zombie process
(c) a process that executes forever
(d) None of these

4. What is the mounting of file system?
(a) creating of a file system
(b) removing portion of the file system into a directory structure
(c) attaching portion of the file system into a directory structure
(d) deleting a file system

5. A page fault occurs when
(a) a page gives inconsistent data
(b) a page cannot be accessed due to its absence from memory
(c) a page is invisible
(d) All of the above

6. The data structure used for file directory is called
(a) mount table
(b) hash table
(c) file table
(d) process table

7. A process control block does not contain
(a) Program counter
(b) Bootstrap program
(c) Stack
(d) Code

8. The part of machine level instruction, which tells the central processor what to be done is
(a) Operation code
(b) Address
(c) Locator
(d) Flip-flop

9. A system program that combines the separately compiled modules of a program into a form suitable for execution
(a) Assembler
(b) Linking loader
(c) Cross compiler
(d) None of these

10. The strategy of allowing processes that are logically runnable to be temporarily suspended is called
(a) Preemptive scheduling
(b) Non-preemptive scheduling
(c) Shortest job first
(d) FCFS

11. The LRU algorithm pages out page
(a) That have been used recently
(b) That have not been used recently
(c) That have least used recently
(d) None of these

12. Semaphore are used to solve the problems of
(a) Race condition
(b) Process synchronization
(c) Mutual exclusion
(d) None of these

13. Round-robin scheduling
(a) allows interactive tasks quicker access to the processor
(b) gives each task the same chance at the processor
(c) is quite complex to implement
(d) allows processor-bound tasks more time in the processor

14. __________ provides a larger size of virtual memory but requires virtual memory which provides multidimensional memory.
(a) Paging method
(b) Segmentation method
(c) Paging and segmentation method
(d) None of these

15. A direct method of deadlock prevention is to prevent the occurrences of
(a) Mutual exclusion
(b) Hold and wait
(c) Circular waits
(d) No preemption

16. What is dispatch latency?
(a) The time taken by the dispatcher to stop one process and start another
(b) The time taken by the processor to write a file into disk
(c) The whole time taken by all processors
(d) None of these

17. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?
(a) Partitioning
(b) Multitasking
(c) Paging
(d) Timesharing

18. Which of the following gets called when an object goes out of scope?
(a) Constructor
(b) Destructor
(c) Main
(d) virtual function

19. What is the output of following program code?
#include <iostream>
using namespace std;
int fun(int=0, int=0);
int main()
{
cout << fun(5);
return 0;
}
int fun(int x, int y)
{
return (x+y);
}
(a) Compile error
(b) 5
(c) 0
(d) 10

20. Which of the following operators cannot be overloaded?
(a) >>
(b) ? :
(c) .
(d) Both (b) and (c)

21. When a base class is privately inherited by the derived class, then
(a) protected members of the base class become private members of derived class
(b) public members of the base class become private members of derived class
(c) both (a) and (b)
(d) only (b)

22. What is use of eof()?
(a) Returns true if a file open for reading has reached the next character.
(b) Returns true if a file open for reading has reached the next word.
(c) Returns true if a file open for reading has reached the end.
(d) Returns true if a file open for reading has reached the middle.

23. Which of the following is not a type of constructor?
(a) Copy Constructor
(b) Friend Constructor
(c) Default Constructor
(d) Parameterized Constructor

24. Default constructor has
(a) Single argument
(b) Multiple arguments
(c) No argument
(d) Cannot say

25. In multi-level inheritance, the middle class acts as
(a) Base class
(b) Derived class
(c) Both (a) and (b)
(d) None of these

More Question Set on Computer Science and Engineering

Model Question Old Question
Sample Papers Mock Test
Practice Set Question Bank
Important Questions Test Papers
Typical Questions Selected Questions

26. To have a pointer to class member it must be declared as
(a) Public
(b) Private
(c) Protected
(d) All of these

27. From which stream does the program receive data?
(a) Cin
(b) Cout
(c) Cerr
(d) All of these

28. In which file mode open() fails if the file already exists?
(a) ios:: trunk
(b) ios::nocreate
(c) ios::write
(d) ios::noreplace

29. In which method is address of object implicitly passed to the called function?
(a) Pass-by-value
(b) Pass-by-reference
(c) Both (a) and (b)
(d) None of these

30. The Java compiler translates source code into
(a) Machine code
(b) Assembly code
(c) Byte code
(d) JVM code

31. Polymorphism is achieved by
(a) Overloading
(b) Encapsulation
(c) Dynamic Binding
(d) Overriding

32. Runtime polymorphism is achieved by
(a) Friend function
(b) Virtual function
(c) Function overloading
(d) Operator overloading

33. Exception handling is targeted at
(a) Run-time error
(b) Compile time error
(c) Logical error
(d) All of these

34. Assume that we have constructor functions for both base class and derived class. Now consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called?
(a) Derived class constructor followed by Base class constructor.
(b) Base class constructor followed by derived class constructor.
(c) Base class constructor will not be called.
(d) Derived class constructor will not be called.

35. An object is
(a) a variable of class datatype.
(b) same as a class.
(c) just like a global variable.
(d) collection of data-members and member functions.

36. Pixel mask means
(a) A string containing only 1’s
(b) A string containing only 0’s
(c) A string containing 1 and 0
(d) A string containing 0 and 0

37. Intensity range of a 8 pixel image is
(a) 0 to 7
(b) 0 to 25
(c) 0 to 255
(d) 0 to 225

38. If a line is drawn from A(5,5) to B(13,9) using Bresenham’s Algorithm.Then, if the first pixel is (5,5) then the second pixel is
(a) (7,6)
(b) (6,6)
(c) (8,7)
(d) (9,7)

39. Frame Buffer is also known as
(a) Refresh Buffer
(b) Memory Buffer
(c) Both (a) and (b)
(d) None of these

40. Which transformation distorts the geometry of object?
(a) Shearing
(b) Rotation
(c) Scaling
(d) None of these

41. When we select a portion of image and making invisible or not showing the rest. What will you call this?
(a) Windowing
(b) Clipping
(c) Viewport
(d) None of these

42. The basic attributes of a straight line segment are
(a) Type
(b) Width
(c) Color
(d) All of these

43. Hue of a color is related to
(a) Luminance
(b) Saturation
(c) Wavelength
(d) None of these

44. The phenomenon of having a continuous glow of beam on the screen even after it is removed is known as
(a) Fluorescence
(b) Persistence
(c) Phosphorescence
(d) Incandescence

45. The amount of light emitted by the phosphor coating depends on the
(a) Number of electrons striking the screen
(b) Speed of electrons striking the screen
(c) Distance from the cathode to the screen
(d) None of these

46. Which type data structure is used for efficient implementation of scan-line algorithm to fill regions?
(a) Node list
(b) Edge list
(c) Stack
(d) None of these

47. Random scan systems are designed for
(a) Line drawing application
(b) Pixel drawing application
(c) Color drawing application
(d) None of these

48. What is the name given to the process of converting each primitive from its geometric definition into set of pixels that make up the primitive in the image space?
(a) Rasterization
(b) Scan conversion
(c) (b) only
(d) Both (a) and (b)

49. Vector graphics is composed of
(a) Pixels
(b) Paths
(c) Palette
(d) All of these

50. The tuples of the relations can be of __________ order.
(a) Any
(b) Same
(c) Sorted
(d) Constant