KPPSC Solved Mcqs Lecturer Computer Science Test held on 23-05-2023



(1)   Informal description of Algorithm of steps in an algorithm is called

(a)    Algorithm (b) Psuedocode (c) Flow chart (d) Program

 

(2)   The protocol used for transmission of data/information across the internet.

(a)    ICMP (b) SNMMP (c) HTTP (d) SFTP

 

(3)   The implication p-àq is equivalent to its

(a)    qàp  (b) l-àqà-p (c) pàq (d) làp-àq

 

(4)The pointer pointing to a variable goes out of scope called

(a) Empty Pointer (b) Null Pointer (c) Wild Pointer (d) Dangling Pointer

 

(5) Which of the following technique used in cryptography to convert plain text into a coded message.

(a) Algorithm (b) Encryption (c) Decryption (d) Authorization

(6) Which of the following is used as a database management system?

(a) MYSQL (b) Java (c) Perl (d) Visual Basics

(7) Function in Programming

(a) Set of instruction that can be called repeatedly (b) Variable that can store multiple values (c) Command that prints output (d) Loop that executes a set of number of items

(8) Type of variable that can be used where the scope and extent of the variable is within the method or statement block in which it is declared.

(a) Constant (b) Local Variables (c) Global variable (d) Static Variable

(9) The smallest unit of storing data is

(a) Byte (b) Bit (c) Word (d) KB

(10) The design approach that focuses on the need and preferences of the end users

(a) Information Architecture (b) Interaction Design(c) User-Centered Design (d) User-Research

(11) The Component of the Computer that holds data, program instruction that are currently in used.

(a) Random Access Memory (RAM) (b) Read only Memory(c) Hardisk (d) Extented Memory

(12) How long is IPV6 address?

(a) 18 bits (b) 32 bits (c) 64 bits (d) 128 bits

(13) Which of the following is not suitable as a Cache replacement algorithm?

(a) Most frequently used (b) First in First out(c) Least frequently used (d) Last in first out

(14) Computer memory addresses are represented using

(a) Hexa decimal numbers (b) Decimals numbers (c) Binary Numbers (d) Octal Numbers

(15) UNICODE is an example of

(a) Character encoding set (b) Driver (c) Software (d) Database

(16) Default address of computer is

(a) 1.1.1.1 (b) 127.0.0.1 (c) 192.168.0.1 (d)  0.0.0.0

(17) Which of the following is the type of software that is designed  to prevent un-authorized access to a computer network system or network?

(a) Backup Software (b) Firewall (c) Antivirus (d) Phishing Software

(18) A _______ presents a choice of operations or services that can be performed by a system at a given time

(a) Icons (b) Menus (c) Pointers (d) Windows

(19) Which of the following is the type of software that is used create and edits spreadsheets?

(a) GOOGLE docs (b) Google sheet (c) Google Colab (d) Adobe Photoshop

(20) The ability of the user system to modify the user interface is

(a) Recoverability (b) Observer ability (c) Customizability (d) Responsiveness

(21) The sorting algorithm which repeatedly swaps the adjacent elements if they are in the wrong order

(a) Bubble sort (b) Insertion sort (c) Adjacent sort (d) Quick Sort

(22) In the context of database system ,a candidate key that consist of two or more attributes that together uniquely identify an entity occurrences is called _______________

(a)  Compound Key (b) Composite Key (c) Primary key (d) Foreign Key

(23) Any Programming Language must have construct to support.

(a) Selection (b) Sequence (c) Iteration (d) All of these

(24) ASCII Stand for

(25) _________expresses how many pixels are present in a display or entire screen

(a)  Pixel count (b) Resolution (c) OpenGL (d) Screen Pixel

(26) For larger inputs, merge sort is faster than insertion sort

(a) True (b) False (c) Cannot be determined (d) Sometimes

(27) Worst space complexity of Queue is

(a) On2 (b) O (n) (c) O (logn) (d) O (nlogn)

(28)Which of the following is not a programming language?

(a) Python (b) HTML (c) Java (d) Ruby

(29)Which of the following is not a web browser?

(a) Chrome (b) Apache (c) Firefox (d) Safira

(30) What is the output of the following code?

Intnum1=5;

Intnum2=7;

Cout<<num1+num2;

(a)    5 (b) 7 (c) 12 (d) None of these

(31) Which of the following is known as the language made up of binary coded instruction?

(a) High level (b) BASIC (c) C (d) Machine

(32) ________ is used to provide the specific implementation of a method which is already provided by its super class

(a) Operator overloads (b) Method Overload (c) Method overriding (d) Operator Overriding

(33) Source Program is compiled to an intermediate form called _________

(a) Byte Code (b) Smart Code (c) Executable Code (d) Psuedo Code

(34) Colors Printer use the inks cartridges of

(a) Cyan Magenta Yellow Black (b) Cyan Magenta yellow (c) Red Green blue (d) Red Green blue Black

(35) Which of the following language does the Computer understand?

(a) Computer Understands only C language (b) Computer Understand only assembly language (c) Computer Understand only binary Language (d) Computer understand only BASIC language

(36) Which of the following is not a commonly used computer network topology?

(a) Bus (b) Star (c) Ring (d) Hexagon

(37) Which of the following is the correct way to get the length of string variable in C++?

(a) Name Length () (b) Length (name) (c) Name size () (d) Size (name)

(38) Which of the following is the correct way to declare and initialize a string varable in C++?

(a) String name=’john ‘(b)  char name=’john’(c) string name name=’john’(d) char name (5) {j,o,h,n}

(39)____________ describing the bundling of data and methods  operating on this data into one unit.

(a) Abstraction (b) Polymorphism (c) Encapsulation (d) Aggregation

(40) Which of the following are not the characteristics of High Level Language?

(a) Machine Code (b) Platform Independent (c) interactive execution (d) User Friendly

(41) When algorithm is written in the form of programming language, it becomes a ____

(a) Flowchart (b) Psuedo code (c) Program (d) Syntax

(42) What is the correct way to declare a constant integer in C++”

(a) Int constant x=5 (b) Int x=5 (c) Intx Const5; (d) none of these

(43) Which of the following is designed to control the operations of computer?

(a) User (b) Application software (c) System Software (d) Utility Software

(44) The condition “Every non-prime attribute has a full functional dependency on a candidate key (attribute depend on the complete primary key is satisfied in.

(a) First Normal Form (b) Second Normal Form (c) Extensive Normal Form (d) Un-Normalized Form

(45) Software Process Model that incorporates risk assessment during iteration is called

(a) Waterfall Process Model (b) Prototype Process Model (c) Spiral Process Model (d) Rapid Application Development Process Model

 

Answers:

b) Pseudocode - Pseudocode is an informal description of the steps in an algorithm.

 

(c) HTTP - HTTP (Hypertext Transfer Protocol) is the protocol used for transmission of data/information across the internet.

 

(a) q→p - The implication p→q is equivalent to its contrapositive, which is q→p.

 

(d) Dangling Pointer - When a pointer pointing to a variable goes out of scope, it is called a dangling pointer.

 

(b) Encryption - Encryption is the technique used in cryptography to convert plaintext into a coded message.

 

(a) MYSQL - MySQL is a database management system.

 

(a) Set of instructions that can be called repeatedly - A function in programming is a set of instructions that can be called repeatedly.

 

(b) Local Variables - Local variables are used where the scope and extent of the variable are within the method or statement block in which it is declared.

 

(b) Bit - The smallest unit of storing data is a bit.

 

(c) User-Centered Design - User-Centered Design focuses on the needs and preferences of end-users.

 

(a) Random Access Memory (RAM) - RAM holds data and program instructions that are currently in use.

 

(d) 128 bits - IPv6 addresses are 128 bits long.

 

(d) Last in First out - Last in First Out (LIFO) is not suitable as a cache replacement algorithm.

 

(a) Hexadecimal Numbers - Computer memory addresses are often represented using hexadecimal numbers.

 

(a) Character encoding set - UNICODE is an example of a character encoding set.

 

(b) 127.0.0.1 - 127.0.0.1 is the loopback address for the localhost.

 

(b) Firewall - A firewall is designed to prevent unauthorized access to a computer network system.

 

(b) Menus - Menus present a choice of operations or services that can be performed by a system at a given time.

 

(b) Google Sheet - Google Sheets is used to create and edit spreadsheets.

 

(c) Customizability - The ability of the user system to modify the user interface is customizability.

 

(a) Bubble Sort - Bubble sort repeatedly swaps adjacent elements if they are in the wrong order.

 

(a) Compound Key - A candidate key that consists of two or more attributes is called a compound key.

 

(d) All of these - Any programming language must have constructs to support selection, sequence, and iteration.

 

ASCII stands for American Standard Code for Information Interchange.

 

(b) Resolution - Resolution expresses how many pixels are present in a display or entire screen.

 

(a) True - For larger inputs, merge sort is generally faster than insertion sort.

 

(b) O (n) - The worst space complexity of a queue is O(n).

 

(b) HTML - HTML is not a programming language; it is a markup language for web pages.

 

(b) Apache - Apache is a web server, not a web browser.

 

(c) 12 - The code adds num1 and num2, resulting in 5 + 7 = 12.

 

(d) Machine - The language made up of binary-coded instructions is machine language.

 

(c) Method overriding - Method overriding is used to provide the specific implementation of a method provided by its superclass.

 

(a) Byte Code - Source programs are compiled to an intermediate form called byte code in some programming languages.

 

(a) Cyan Magenta Yellow Black - Color printers use ink cartridges of cyan, magenta, yellow, and black.

 

(c) Computer Understands only binary Language - Computers understand instructions in binary language.

 

(d) Hexagon - Hexagon is not a commonly used computer network topology.

 

(c) Name size () - The correct way to get the length of a string variable in C++ is name.size().

 

(a) String name = 'john' - The correct way to declare and initialize a string variable in C++ is string name = 'john';.

 

(c) Encapsulation - Encapsulation describes the bundling of data and methods operating on this data into one unit.

 

(a) Machine Code - High-level languages do not directly represent machine code.

 

(c) Program - When an algorithm is written in the form of a programming language, it becomes a program.

 

(c) Int x Const 5; - The correct way to declare a constant integer in C++ is const int x = 5;.

 

(c) System Software - System software is designed to control the operations of a computer.

 

(b) Second Normal Form - The condition "Every non-prime attribute has a full functional dependency on a candidate key" is satisfied in the Second Normal Form.

 

(c) Spiral Process Model - The software process model that incorporates risk assessment during iteration is the Spiral Process Model.

 

 

 If there is any wrong answer write it in comments with explanation

 

 

 

 

  

Post a Comment (0)
Previous Post Next Post