0% found this document useful (0 votes)
8 views

MCQ COMP SCI

Uploaded by

Jay Trivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

MCQ COMP SCI

Uploaded by

Jay Trivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

Type-I Error occurs if ___________________

A. the null hypothesis is rejected even though it is true

B. the null hypothesis is accepted even though it is false

C. both the null hypothesis as well as alternative hypothesis are rejected

D. None of the above

2. Survey research studies _________

A. Events B. Processes C. Populations D. Circumstances

3. Which of the following options are the main tasks of research in modern society?

A. to discover new things

B. to keep pace with the advancement in knowledge

C. to systematically examine and critically analyse the investigations/sources with


objectivity

D. all of the above

4. The depth of any research can be judged by:

A. title of the research B. duration of the research

C. objectives of the research D. total expenditure on the research

5. Research can be conducted by a person who:

A. is a hard worker B. holds a postgraduate degree

C. has studied research methodology D. possesses thinking and reasoning ability

6. The first step of research is:

A. Finding a problem B. Selecting a problem

C. Searching a problem D. Identifying a problem

7. Research is

A. Working in a scientific way to search for truth of any problem

B. Finding solution to any problem

C. Searching again and again


D. None of the above

8. A research paper

A. is a compilation of information on a topic

B. can be published in more than one journal

C. contains original research as deemed by the author

D. contains peer-reviewed original research or evaluation of research conducted by


others

9. Which is the main objective of research?

A. To review the literature

B. To get an academic degree

C. To summarize what is already known

D. To discover new facts or to make fresh interpretation of known facts

10. To test null hypothesis, a researcher uses:

A. X B. t test C. ANOVA D. factorial analysis

11. In the relational model, relationships between relations or tables are created by using:
A. composite keys.
B. determinants.
C. candidate keys.
D. foreign keys.

12. SQL is:


A. a programming language.
B. an operating system.
C. a data sublanguage.
D. a DBMS.

13. What is (void*)0?


A. Representation of NULL pointer
B. Representation of void pointer
C. Error
D. None of above

14. Which of the following is not the member of class?


A. Static function
B. Friend function
C. Const function
D. Virtual function

15. Which of the following cannot be friend?


A. Function
B. Class
C. Object
D. Operator function

16. What is the numerical range of a char in Java?


A. -128 to 127
B. -(215) to (215) – 1
C. 0 to 32767
D. 0 to 65535

17. What command do you use to create Linux file systems?


A. Fdisk
B. Mkfs
C. Fsck
D. mount

18. In a database, a field is


A. a specific data item
B. a specific object.
C. part of a record.
D. part of an algorithm.

19. In object-oriented programming, an object


A. is a class.
B. may contain data and methods.
C. is a program.
D. may contain classes.

20. The reason for software bugs and failures is due to


A. Software companies
B. Software Developers
C. Both Software companies and Developers
D. All of the mentioned

21. RAD stands for


A. Relative Application Development
B. Rapid Application Development
C. Rapid Application Document
D. None of the mentioned

22. A data flow can


A. Only emanate from an external entity
B. Only terminate in an external entity
C. May emanate and terminate in an external entity
D. May either emanate or terminate in an external entity but not both

23. ISP stands for


A. Instruction Set Processor
B. Information Standard Processing
C. Interchange Standard Protocol
D. Interrupt Service Procedure

24. Which of this is not a class of IP address?


A. Class E
B. Class C
C. Class D
D. Class F

25. Which is related to exception in java?

A. final
B. finally
C. finalize
D. All above

26. Java don’t support


A. Multiple Inheritance
B. MultiThreading
C. Constructor
D. None of these

27. A program that is used to view websites is called a

A. Browser
B. Web viewer
C. Spreadsheet
D. Word processor
28. What is the term for unsolicited Email?
A. Spam
B. Backbone
C. Usenet
D. News group
29. Which among the following is the shortcut key for help in computer system?
A. F2
B. F1
C. CTRL+F1
D. ALT + F1
30. A computer program that converts assembly language to machine language is
A. compiler
B. Interpreter
C. Assembler
D. Comparator
31. Using Microsoft word we can simply ___
A. Paste picture B. Type C. Format a text D. All the above functions

32. The Binary Coded Decimal (BCD) uses


A. 6 bits B. 8 bits C. 16 bits D. 32 bits

33. Which of the following is billionth of a second?


A.Microsecond B.Nanosecond C. Terabyte D. Gigabyte

34. The two kinds of main memory are


A.CDs and DVDs B.RAM and ROM C.Primary and secondary
D.Direct and sequential

35. RAM is also called as


A. Virtual memory B. Volatile memory
C. Non volatile memory D. Cache memory
36. Internal hard disk is
A. Removable but not fixed B. Removable C. Not fixed D. Fixed

37. The main memory of computer is also called as


A. Hard-disk B. Primary storage C. Secondary storage D. Internal memory

38. How much data can be stored in a CD?


A.300 MB B. 400 MB C. 670 MB D. 700 MB

39. _____ has the shortest access times.


A.Virtual Memory B. Secondary Memory
C. Cache Memory D. All of the above

40. Which of the following is the second largest measurement of RAM?


A. Megabyte B. Gigabyte C. Byte D. Terabyte

41. Programs stored in ROM are called as


A. Fireware B. Formware C. Farmware D. Firmware

42. Cache memory acts between


A.CPU and Hard disk
B. RAM and ROM
C. CPU and RAM
D. All of these

43. We can make use of the wild card entries such as ___ in Windows Explorer.
A. #,@ B. ^,* C. ?,* D. ?,#

44. Who is the father of computer?


A. Charles Newman B. Charles Babbage C. Henry Babbage D. Henry luce

45. What is an another name of Personal Computer?


A. Micro-Computer B. Private Computer
C. Distinctive Computer D. Individual Computer

46. Where would you find the letters QUERTY?


A. Mouse B. Screen C. Numeric Keypad D. Keyboard

47. Computer Moniter is also known as :


A. DVU B. UVD C. VDU D. CCTV

48. The output shown on the computer monitor is called


A. VDU B. Hard Copy C. Soft Copy D. Screen Copy

49. Eight Bits make up a


A. byte B. megabyte C. kilobyte D. None

50. The printed output from a computer is called


A. Copy B. Soft Copy C. Hard Copy D. Paper

***

You might also like