Aiml
Aiml
Aiml
1. A perceptron is:
a) a single layer feed-forward neural network with pre-processing
b) an auto-associative neural network
c) a double layer auto-associative neural network
d) a neural network that contains feedback
7. A perceptron adds up all the weighted inputs it receives, and if it exceeds a certain value,
it outputs a 1, otherwise it just outputs a 0.
a) True
b) False
c) Sometimes – it can also output intermediate values as well
d) Can’t say
8. The network that involves backward links from output to the input and hidden layers is
called as ---------.
a) Self organizing maps
b) Perceptrons
c) Recurrent neural network
d) Multi layered perceptron
10. A rule-based system generally represents which one of the following statement..
a) If
b) If-Then
c) If-Else
d) Iff
15. Forward chaining systems are ----------, where as backward chaining systems are ---------.
a) Goal-driven, goal-driven
b) Goal-driven, data-driven
c) Data-driven, goal-driven
d) Data-driven, data-driven
16. The turing machine showed that you could use a/an ..............system to program any algorithmic
task ?
a) Binary
b) Electrochemical
c) Recursive
d) Semantic
17. The characteristics of the computer system capable of thinking,reasoning and learning is
called ?
a) Machine intelligence
b) Human intelligence
c) Artificial intelligence
d) Virtual intelligence
20. A.M Turing developed a technique for determining whether a computer could or could
not demonstrate the artificial intelligence. Presently this technique is called ?
a) Turing test
b) Algorithm
c) Boolean algebra
d) Logarithm
21. What is the term used for describing the judgmental or commonsense part of problem
solving?
a) Heuristic
b) Critical
c) Value based
d) Analytical
22. Weak AI is
a) the embodiment of human intellectual capabilities within a computer.
b) a set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) the study of mental faculties through the use of mental models implemented on a
computer.
d) All of the above
23. What among the following constitutes to the representation of the knowledge in different
forms?
a) Relational method where each fact is set out systematically in columns
b) Using Frames
c) Inferential knowledge
d) Semantic Networks
e) All above
25. A.M. turing developed a technique for determining whether a computer could or could
not demonstrate the artificial Intelligence, Presently, this technique is called
a) Turing Test
b) Algorithm
c) Boolean Algebra
d) Logarithm
29. Factors which affect the performance of learner system does not include
a) Representation scheme used
b) Training scenario
e) Type of feedback
d) Good data structures
e) Learning algorithm
32. Though local search algorithms are not systematic, key advantages would include
a) Less memory
b) More time
c) Finds a solution in large infinite space
d) a & c
35. Hill climbing sometimes called ------------- because it grabs a good neighbor state without
thinking ahead about where to go next.
a) Needy local search
b) Heuristic local search
c) Greedy local search
d) Optimal local search
39. From which rule does the modus ponens are derived?
a) Inference rule
b) Module rule
c) Both a & b
d) None of the mentioned
40. The field that investigates the mechanics of human intelligence is:
a) history
b) cognitive science
c) psychology
d) sociology
41. Natural language processing is divided into the two subfields of:
a) symbolic and numeric
b) time and motion
c) algorithmic and heuristic
d) understanding and generation
42. Which of the following have people traditionally done better than computers?
a) recognizing relative importance
b) finding similarities
c) resolving ambiguity
d) All of the mentioned
51. What is the name for information sent from robot sensors to robot controllers?
a) temperature
b) pressure
c) feedback
d) signal
e) output
53. The field that investigates the mechanics of human intelligence is:
a) history
b) cognitive science
c) psychology
d) sociology
55. ------------- is the process of deriving logical conclusions from given facts
a) Representation
b) Execution
c) Reasoning
d) Planning
56. Identify the correct step used to start designe of an expert system
a) Feasiblity study
b) Problem recognization
c) Scope study
d) Rapid prototyping
57. If the antecedent is only partially true, then the output fuzzy set is truncated according to the ---
--------- method
a) Intrinsic
b) Implication
c) Boolean
d) None of the given
58. Choose the fields in which Fuzzy inference systems have been successfully applied
a) automatic control
b) data classification
c) decision analysis
d) All of the given
60. What is the name of the computer program that simulates the thought processes of human
beings?
a) Human logic
b) Expert reason
c) Expert system
d) Personal information
62. IF name is "Bob" AND weather is cold THEN tell Bob "Wear a coat" The above rule is an example
of --------------
a) Recommendation Rule
b) Directive Rule
c) Relation Rule
d) None of the given options
63. Which of the following is a valid example which represents a suitable antecedent in a rule?
a) IF x > 3
b) IF name is “Bob”
c) IF weather is cold
d) All of the given options
64. IF A THEN B This can be considered to have a similar logical meaning as the following
a) A -> B
b) A <-> B
c) A <- B
d) None of the given
65. A rule, which takes a set of inputs and gives advice as a result, is called
a) Recommendation Rule
b) Directive Rule
c) Relation Rule
d) None of the given options
68. Measure of the effectiveness of an attribute in classifying the training data is called
a) Information Gain
b) Measure Gain
c) Information Goal
d) None of the given
70. The entropy is 1 when the collection contains number of positive example --------to/than
negative example
a) Equal
b) Greater
c) Less
d) None of given
71. The multilayer perceptions are the most basic artificial neural
a) Network
b) Layers
c) Icon
d) None of given
72. A computer program that contains expertise in a particular domain is called an:
a)intelligent planner
b)automatic processor
c)expert system
d)operational symbolizer
76. In GA, the random process is repeated until an individual with required ------- level is
found
a) Higher
b) Lower
c) Fitness
d) Logical
78. Artificial Neural Networks is a new learning paradigm which takes its roots from -------
inspired approach to learning
a) Chemistry
b) Physics
c) Biology
d) Mathematics
83. Breadth-first search is a good idea when you are confident that the branching factor is
a) Extremely
b) Small
c) Medium
d) Large
84. In Basic Genetic Algorithm the term mutation refers to a small random
a) Number
b) Change
c) Operator
d) Operand
85. An ----------- is “A computer program designed to model the problem solving ability of a
human expert."
a) Expert system
b) Intelligent System
c) Echo System
d) Energy System
90. The High level language ..…. has now become the dominant AI programming language.
a) Ada
b) Lisp
b) AI pro
d) High AI
94. What is the name for information sent from robot sensors to robot controllers?
a) temperature
b) pressure
c) feedback
d) signal
e) output
95. Which provides agents with information about the world they inhabit?
a) Sense
b) Perception
c) Reading
d) Hearing
Answers
1. a 20. a 39. a
2. b 21. a 40. b
3. d 22. c 41. d
4. d 23. e 42. d
5. d 24. a 43. c
6. c 25. a 44. d
7. a 26. d 45. d
8. c 27. a 46. b
9. d 28. a 47. c
71. a 86. c
72. c 87. a
ARTIFICIAL INTELLIGENCE
1. A perceptron is:
a) a single layer feed-forward neural network with pre-processing
b) an auto-associative neural network
c) a double layer auto-associative neural network
d) a neural network that contains feedback
7. A perceptron adds up all the weighted inputs it receives, and if it exceeds a certain value,
it outputs a 1, otherwise it just outputs a 0.
a) True
b) False
c) Sometimes – it can also output intermediate values as well
d) Can’t say
8. The network that involves backward links from output to the input and hidden layers is
called as ---------.
a) Self organizing maps
b) Perceptrons
c) Recurrent neural network
d) Multi layered perceptron
10. A rule-based system generally represents which one of the following statement..
a) If
b) If-Then
c) If-Else
d) Iff
15. Forward chaining systems are ----------, where as backward chaining systems are ---------.
a) Goal-driven, goal-driven
b) Goal-driven, data-driven
c) Data-driven, goal-driven
d) Data-driven, data-driven
16. The turing machine showed that you could use a/an ..............system to program any algorithmic
task ?
a) Binary
b) Electrochemical
c) Recursive
d) Semantic
17. The characteristics of the computer system capable of thinking,reasoning and learning is
called ?
a) Machine intelligence
b) Human intelligence
c) Artificial intelligence
d) Virtual intelligence
20. A.M Turing developed a technique for determining whether a computer could or could
not demonstrate the artificial intelligence. Presently this technique is called ?
a) Turing test
b) Algorithm
c) Boolean algebra
d) Logarithm
21. What is the term used for describing the judgmental or commonsense part of problem
solving?
a) Heuristic
b) Critical
c) Value based
d) Analytical
22. Weak AI is
a) the embodiment of human intellectual capabilities within a computer.
b) a set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) the study of mental faculties through the use of mental models implemented on a
computer.
d) All of the above
23. What among the following constitutes to the representation of the knowledge in different
forms?
a) Relational method where each fact is set out systematically in columns
b) Using Frames
c) Inferential knowledge
d) Semantic Networks
e) All above
25. A.M. turing developed a technique for determining whether a computer could or could
not demonstrate the artificial Intelligence, Presently, this technique is called
a) Turing Test
b) Algorithm
c) Boolean Algebra
d) Logarithm
29. Factors which affect the performance of learner system does not include
a) Representation scheme used
b) Training scenario
e) Type of feedback
d) Good data structures
e) Learning algorithm
32. Though local search algorithms are not systematic, key advantages would include
a) Less memory
b) More time
c) Finds a solution in large infinite space
d) a & c
35. Hill climbing sometimes called ------------- because it grabs a good neighbor state without
thinking ahead about where to go next.
a) Needy local search
b) Heuristic local search
c) Greedy local search
d) Optimal local search
39. From which rule does the modus ponens are derived?
a) Inference rule
b) Module rule
c) Both a & b
d) None of the mentioned
40. The field that investigates the mechanics of human intelligence is:
a) history
b) cognitive science
c) psychology
d) sociology
41. Natural language processing is divided into the two subfields of:
a) symbolic and numeric
b) time and motion
c) algorithmic and heuristic
d) understanding and generation
42. Which of the following have people traditionally done better than computers?
a) recognizing relative importance
b) finding similarities
c) resolving ambiguity
d) All of the mentioned
51. What is the name for information sent from robot sensors to robot controllers?
a) temperature
b) pressure
c) feedback
d) signal
e) output
53. The field that investigates the mechanics of human intelligence is:
a) history
b) cognitive science
c) psychology
d) sociology
55. ------------- is the process of deriving logical conclusions from given facts
a) Representation
b) Execution
c) Reasoning
d) Planning
56. Identify the correct step used to start designe of an expert system
a) Feasiblity study
b) Problem recognization
c) Scope study
d) Rapid prototyping
57. If the antecedent is only partially true, then the output fuzzy set is truncated according to the ---
--------- method
a) Intrinsic
b) Implication
c) Boolean
d) None of the given
58. Choose the fields in which Fuzzy inference systems have been successfully applied
a) automatic control
b) data classification
c) decision analysis
d) All of the given
60. What is the name of the computer program that simulates the thought processes of human
beings?
a) Human logic
b) Expert reason
c) Expert system
d) Personal information
62. IF name is "Bob" AND weather is cold THEN tell Bob "Wear a coat" The above rule is an example
of --------------
a) Recommendation Rule
b) Directive Rule
c) Relation Rule
d) None of the given options
63. Which of the following is a valid example which represents a suitable antecedent in a rule?
a) IF x > 3
b) IF name is “Bob”
c) IF weather is cold
d) All of the given options
64. IF A THEN B This can be considered to have a similar logical meaning as the following
a) A -> B
b) A <-> B
c) A <- B
d) None of the given
65. A rule, which takes a set of inputs and gives advice as a result, is called
a) Recommendation Rule
b) Directive Rule
c) Relation Rule
d) None of the given options
68. Measure of the effectiveness of an attribute in classifying the training data is called
a) Information Gain
b) Measure Gain
c) Information Goal
d) None of the given
70. The entropy is 1 when the collection contains number of positive example --------to/than
negative example
a) Equal
b) Greater
c) Less
d) None of given
71. The multilayer perceptions are the most basic artificial neural
a) Network
b) Layers
c) Icon
d) None of given
72. A computer program that contains expertise in a particular domain is called an:
a)intelligent planner
b)automatic processor
c)expert system
d)operational symbolizer
76. In GA, the random process is repeated until an individual with required ------- level is
found
a) Higher
b) Lower
c) Fitness
d) Logical
78. Artificial Neural Networks is a new learning paradigm which takes its roots from -------
inspired approach to learning
a) Chemistry
b) Physics
c) Biology
d) Mathematics
83. Breadth-first search is a good idea when you are confident that the branching factor is
a) Extremely
b) Small
c) Medium
d) Large
84. In Basic Genetic Algorithm the term mutation refers to a small random
a) Number
b) Change
c) Operator
d) Operand
85. An ----------- is “A computer program designed to model the problem solving ability of a
human expert."
a) Expert system
b) Intelligent System
c) Echo System
d) Energy System
90. The High level language ..…. has now become the dominant AI programming language.
a) Ada
b) Lisp
b) AI pro
d) High AI
94. What is the name for information sent from robot sensors to robot controllers?
a) temperature
b) pressure
c) feedback
d) signal
e) output
95. Which provides agents with information about the world they inhabit?
a) Sense
b) Perception
c) Reading
d) Hearing
Answers
1. a 20. a 39. a
2. b 21. a 40. b
3. d 22. c 41. d
4. d 23. e 42. d
5. d 24. a 43. c
6. c 25. a 44. d
7. a 26. d 45. d
8. c 27. a 46. b
9. d 28. a 47. c
71. a 86. c
72. c 87. a
Introduction to Programming
1) Program development process has ----------------stages
a) 5 b) 6 c) 4 d) None
2) When program is finalized its ---------------------is prepared
a) documentation b) implementation c) algorithm d) None
3) ---------------example of procedural language
a) C b) C++ c) SQL d) None
4) The ----------------------------are used in programs to increase readability
a) token b) variable c) white spaces d) None
5) Which symbol is used to represent the OR operator in C++?
a) * b) || c) && d) None
6) The maximum range of an integer variable is ---------------------
a) 32768 b) 32776 c) 32778 d) None
7) Symbolic constant can be declared in -------------ways
a) 3 b) 0 c) 1 d) None
8) In if statement, true is represented by
a) 0 b) 1 c) 3 d) None
9) Which of the following is a correct identifier in C++?
a) 7maketea b) int c) VAR_a1234 d) $var_name
10) Which of the following is called address operator?
a) * b) % c) _ d) &
11) Which of the following escape sequence represents tab?
a) \t b) \r c) \b d) \a
12) Who created C++
a) Ken Thompson b) Bjarne Stroustrup c) Dennis Ritchie d) None
13) Which of the following correctly declares an array?
a) int array; b) int array[10]; c) array{10}; d) None
14) Which of the following gives the memory address of the first element in array?
a) array[1]; b) array[3]; c) array(0); d) array[0];
15) The data elements in the structure are also known as ?
a) objects b) members c) data d) None
16) The contents of a variable can be
a) fix b) permanent c) changed d) None
17) From where the execution of the program starts in C++?
a) Headers b) main function c) header files d) None
18) How many objects can present in a single class?
a) 1 b) 2 c) as many as possible d) 3
19) How many types of returning values from function are present in c++?
a) 1 b) 2 c) 4 d) 3
20) Object is a collection of functions and
a) properties b) methods c) class d) None
21) Which operator is used to declare the destructor?
a) # b) & c) $ d) ~
22) The switch statement is also called as?
a) choosing structure b) selective structure c) certain structure d) None
23) The destination statement for the goto label is identified by what label?
a) : b) * c) @ d) &
24) The maximum range of a character variable is ---------------------
a) -128 b) 0 c) 127 d) None
25) Which of the following is used to terminate the function declaration?
a) : b) ; c) :: d) None
26) How many minimum number of functions are need to be presented in C++?
a) 0 b) 2 c) 1 d) None
27) How many specifiers are present in access specifiers in class?
a) 1 b) 2 c) 4 d) None
28) Which is used to define the member of a class externally?
a) :: b) : c) # d) None
29) An expression consists of
a) operators b) operand c) both a &b d) None
30) What is the result of given expression: 11*3-35/(11%4)
a) 20 b) 22 c) 29 d) None
31) How many variables can be used in one cout object?
a) one b) two c) many d) None
32) Which of following symbol is used for AND operator?
a) || b) ! c) & d) None
33) All of the following are logical operators except
a) = b) && c) ! d) ||
34) The do while loop is this type of loop
a) pre-test b) post-test c) infinite d) None
35) Which of following loop is called counter loop?
a) for b) if c) do-while d) None
36) Which of the following is not a simple data type?
a) int b) float c) char d) array
37) The index of first element of an array is always starts with
a) 2 b) 1 c) 0 d) None
38) How many elements are in the array? int a[5];
a) 5 b) 4 c) 0 d) None
39) Array is a collection of consecutive memory
a) values b) locations c) data types d) None
40) Before a structure can be used, it must be
a) declared b) initialized c) de-allocated d) None
41) How many ways, a function definition can be given in C++
a) 2 b) 1 c) 0 d) 3
42) The statement that activates the function is known as function
a) argument b) call c) definition d) None
43) Which one is not a valid variable example?
a) $sam_paro b) ohc c) hi_ccc d) file123
44) C++ class contains data members and
a) interfaces b) methods c) clients d) None
45) Which of the class’s members are available to anyone
a) private b) protected c) public d) None
46) Constructor function’s return type is
a) int b) char c) float d) None
47) Which is an example of invalid variable in C++?
a) pukhsam b) float c) big_face d) None
48) Another name for base class is
a) sub class b) derived class c) parent class d) None
49) The inheritance relationship between classes of a program is called a class
a) hierarchy b) inheritance c) base d) None
50) Which one is a type of constant in C++
a) variable b) uaf c) int d) literal
51) Which of the following has no return type in C++
a) void b) int c) float d) None
52) The cout object is used with which operator?
a) >> b) :: c) << d) None
53) The output of given line in C++ will be: int a=5; a+=5; cout<<”a”;
a) a b) 5 c) 10 d) None
54) How many variables can be used in one cin object?
a) one b) two c) as many as possible d) None
55) Single line comments can be given in C++ with
a) /* b) // c) / d) None
56) In C++, variable may include letters, numbers and
a) keywords b) data type c) underscore d) None
Answer Key
1) a 2) a 3) a 4) c 5) b 6) d 7) d
8) b 9) c 10) d 11) a 12) b 13) b 14) d
15) b 16) c 17) b 18) c 19) d 20) a 21) d
22) b 23) a 24) c 25) b 26) c 27) d 28) a
29) c 30) b 31) c 32) d 33) a 34) b 35) a
36) d 37) c 38) a 39) b 40) a 41) d 42) b
43) a 44) b 45) c 46) d 47) b 48) c 49) a
50) d 51) a 52) c 53) a 54) c 55) b 56) c
UNIVERSITY OF AGRICULTURE, FAISALABAD
Department of Computer Science
CS-631 3(2-1) Compiler Theory
Q1. Which code is known as machine code that is processed or executed by the processor?
a. Source code
b. Object code
c. MISL code
d Byte code
Q2. Low level language is also called as
a. Machine language
b. Binary language
c. A and B are same
d High level languages
Q3. Which programming language use symbolic codes called MNEMONICS for developing
the program?
a. Machine language
b. Low level language
c. High level language
d Assembly language
Q4.
Which programming language uses constraint rather than algorithm?
a. SQL
b. C++
c. Assembly
d PROLOG
Q5. Which program allows text to be entered and changed?
a. Editor
b. Translator
c. Compiler
d Interpreter
Q6. Which program is known as translator , which read the whole code written in high level
language at once and then convert it into machine language?
a. Editor
b. Linker
c. Compiler
d Interpreter
Q7. Which is a translator program, which read the code written in high level language line by
line convert it into machine language?
a. Linker
b. Editor
c. Compiler
d Interpreter
Q8. Which program combine two or more object modules into a single object module or into
an executable file?
a. Linker
b. Interpreter
c. Assembler
D Compiler
Q9. Which program is also called as loader?
a. Interpreter
b. Linker
c. Javac
d Compiler
Q10. A __________ is responsible for the task of collecting different modules of a skeletal
source program.
a. Linker
b. Loader
c. Preprocessor
d Processor
Q11. Which code have extension "O" in unix system?
a. Source code
b. C language program
c. Object code
d Binary code
Q12. Machine language belong to __________ generation of computer language.
a. First
b. Third
c. Fourth
d Fifth
Q13. Which program is used to translates from low level language to higher one?
a. Parse generator
b. De compiler
c. Cross compiler
d Scanner
Q14. __________ refer to program that translate machine code to corresponding assembly
code.
a. Parse generator
b. Scanner
c. Disassembler
d Cross compiler
Q15. Which compiler is used to convert high level code into machine level code?
a. General compiler
b. Cross compiler
c. Native code compiler
d JIT compiler
Q16. Which compiler is used to test new hardware platform?
a. Cross compiler
b. Native code compiler
c. Source to source compiler
d JIT compiler
Q17. Which compiler comes with the virtual machine and it is optional?
a. Cross compiler
b. Miltipass compiler
c. One pass compiler
d JIT compiler
Q18. Native code is also called __________.
a. C-code
b. O-code
c. P-code
D Byte-code
Q19. Which compiler is the compiler that passes through the source code of each compilation
unit only once?
a. One pass compiler
b. Narrow compiler
c. A and B is same
d Multipass compiler
Q20. Which compiler is faster?
a. Single pass
b. Multi pass
c. Narrow
d None
Q21. __________ accept the stream of character as input and produces stream of token as
output.
a. Parser
b. Lexical analyzer
c. Scanner
d B and C are same
Q22. The sequences of character that give rise to token are called __________.
a. Intermediate code
b. Stream
c. Lexemes
d Semantic
Q23. The syntactical analyzer is also called __________.
a. Lexemes
b. Parser
c. Lexical analyzer
d Scanner
Q24. What is refer to checking context dependent datatype?
a. Lexical analysis
b. Parser
c. Semantic analysis
d Syntactical analysis
Q25. What is responsible to produce faster and smaller object program by performing some
improvements over intermediate code?
a. Intermediate code generator
b. Code generator
c. Interpreter
d Code optimizer
Q26. What is responsible for generation of final machine code tailored to target system?
a. Interpreter
b. Semantic analyzer
c. Code generator
d Code optimizer
Q27. Which programming language use compiler as well as interpreter to produce output?
a. C language
b. C++
c. COBOL
d Java
Q28. Which data structure is used for book keeping?
a. Lookup table
b. Symbol table
c. Inode table
d Tree
Q29. Which tool is used to construct compiler?
a. Compiler – Compiler
b. Compiler - generator
c. NELIAC
d Both a and b
Q30. __________ is used to construct compiler.
a. Context free grammer
b. Pragmas
c. Significant Comments
d Lexical analyzer
Q31. In ADA programming language compiler directives are called __________.
a. Pregmas
b. Preprocessor directives
c. Linker
d Loader
Q32. Bootstrapping technique is also called as __________.
a. Parser
b. Self – hosting
c. NELIAC
d None of these
Q33. The process of modifying an existing compiler to work on a new machine is often known
as __________.
a. Boot starp
b. Translation
c. Porting
d Transformation
Q34. Which program is used collect statistics on the behavior of an object program during
execution?
a. Profilers
b. Debugger
c. Loader
d Preprocessor
Q35. The lexical analyzer produce tokens, which are stored in a buffer until they are consumed
by the __________.
a. Linker
b. Loader
c. Parser
d Preprocessor
Q36. What is called lexical analysis?
a. Parallel analysis
b. Linear analysis
c. Parser
d Token
Q37. __________ expressions are widely used to specify lexical pattern.
a. Regular
b. Mathematical
c. String
d Prefix
Q38. Which operation is used for searching a lexical entry in the symbol table?
a. Insert
b. Lookup
c. Select
d Scanner
Q39. The additional information along with a token is called its __________.
a. Lexeme
b. Keyword
c. Attributes
d Subset
Q40. A lexical analyzer filter out __________ and __________.
a. Comment, Keyword
b. Whitespace, Comment
c. Character, Number
d Operator, oprand
Q41. Token refer to a set of __________.
a. String
b. Keyword
c. Pattern
d Lexeme
Q42. Which kind of relationship exists between lexical analyzer and parser?
a. Producer- Consumer
b. Teacher- student
c. Has- a
d Association
Q43. What is sequence of characters that gives rise to token?
a. Keyword
b. Word
c. Pattern
d Lexeme
Q44. Lexer is implemented as a __________, which in turn is called by the parser.
a. Lexical analyzer
b. Function
c. Processor
d Scanner
Q45. A __________ is finite sequence of symbol.
a. String
b. Word
c. Both a and b
d Language
Q46. An alphabet is a __________ set of symbol.
a. Finite
b. Infinite
c. Large
d None
Q47. How many type of formal language according to Noam Chomsky?
a. Two
b. Three
c. Four
d Five
Q48. The process of discovering a handle and reducing it to the appropriate left hand side is
called __________.
a. Handle
b. Handle pruning
c. Bottom parsing
d Handle parsing
Q49. Which is parse generator?
a. Yacc
b. Visual parse++
c. Grammatica
d All of the above
Q50. The following grammar
G = (N, T, P, S)
N = {S, A, B}
T = {a, b, c}
P : S ? aSa
S ? aAa
A ? bB
B ? bB
B ? c is
a. is type 3
b. Is type 2 but not type 3
c. Is type 1 but not type 2
d Is type 0 but not type 1
Q51. The following grammar
G = (N, T, P, S)
N = {S, A, B, C, D, E}
T = {a, b, c}
P : S ? aAB
AB ? CD
CD ? CE
C ? aC
C?b
bE ? bc is
a. Is type 3
b. Is type 2 but not type 3
c. Is type 1 but not type 2
d Is type 0 but not type 1
Q52. The following grammar
G = (N, T, P, S)
N = {S, A, B, C}
T = {a, b, c}
P : S ? aS
A ? bB
B ? cC
C ? a is
a. Is type 3
b. Is type 2 but not type 3
c. Is type 1 but not type 2
d Is type 0 but not type 1
Q53 The following grammar
G = (N, T, P, S)
N = {S, A, B, C, D, E}
T = (a, b, c}
P : S ? ABCD
BCD ? DE
D ? aD
D?a
E ? bE
E ? c is
a. Is type 3
b. Is type 2 but not type 3
c. Is type 1 but not type 2
d Is type 0 but not type 1
Q54. Consider the following CFG
S ? aB S ? bA
B?bA?a
B ? bS A ? aS
B ? aBB A ? bAA
This derivation is
a. A leftmost derivation
b. A rightmost derivation
c. Both a and b
d Neither a and b
Q55. Consider the following language
L = {anbncndn|n = 1}
L is
Answers:
1 b 11 c 21 d 31 a 41 a Q.51 C
2 c 12 a 22 c 32 b 42 a 52 A
3 d 13 b 23 b 33 c 43 d 53 D
4 d 14 c 24 c 34 a 44 b 54 D
5 a 15 a 25 d 35 c 45 c 55 B
6 c 16 a 26 c 36 b 46 a
7 d 17 d 27 d 37 a 47 c
8 a 18 c 28 b 38 b 48 b
9 b 19 c 29 d 39 c 49 d
10 c 20 a 30 a 40 b 50 b
DATA COMMUNICATION AND NETWORKING (MCQ’s)
1. Which of the following items is not used in Local Area Networks(LANs)?
A. Computer Modem B. Cable
C. Modem D. Interface card
4. WI–FI uses
A. Phase line B. Radio waves
C. Optic fiber D. Sound waves
5. Network components are connected to the same cable in the _______ topology.
A. Mesh B. Bus C. Star D. Ring
10. Servers are other computer which provide resources to other computer connected by.
A. Super computer B. Mainframe C. Network D. Client
11. Which of the following refers to a small, single-site network?
A. RAM B. DSL C. USB D. PAN
17. In a ring topology, the computer in possession of the ______ can transmit data.
A. Data B. Packet C. Access method D. Token
29. A combination of hardware and software that allows communication and electronic transfer
of information between computer is a
A. Network B. Server
C. Peripheral D. Backup system
32. ________ is the transmission of data between two or more computers over communication
links.
A. Data communication B. Data networking
C. Networking D. Communication
A. 1 B. 2 C. 3 D. 4
36. ________ is the transmission of data between two or more computers over communication
links.
A. Data communication B. Data networking
C. Networking D. Communication
38. Term that is used for physical path by which a message travels from sender to receiver is
A. Jitter B. Protocol
C. Transmission Medium D. Information
39. In star topology if central hub goes down, it effects
A. One node B. No node C. whole system D. whole network
42. Mode in which each station can send and receive data but not at same time is called.
A. Half Duplex B. Simplex
C. Full Duplex D. Duplex
50. An internet is a
A. Collection of WANS B. Network of networks
C. collection of LANS D. Collection of identical LANS and WANS
52. Mode that is like a two ways street with traffic flowing in both directions simultaneously is
A. Simplex B. Full Duplex
C. Half Duplex D. None of the above
54. Five components that make up a data communications system are message, sender, receiver,
medium and
A. protocol B. Code C. connecting device D. both a and b
1 C 2 A 3 D 4 B 5 B
6 C 7 B 8 B 9 B 10 C
11 D 12 C 13 C 14 A 15 B
16 C 17 D 18 B 19 A 20 A
21 A 22 A 23 C 24 D 25 C
26 A 27 B 28 B 29 A 30 C
31 C 32 A 33 C 34 C 35 C
36 A 37 A 38 C 39 C 40 A
41 A 42 A 43 D 44 B 45 A
46 D 47 C 48 A 49 A 50 B
51 A 52 B 53 C 54 A 55 A
EXIT EXAMINATION
DATA STRUCTURES AND ALGORITHMS MCQS
1. A 26. A
2. C 27. A
3. C 28. A
4. C 29. A
5. A 30. D
6. A 31. D
7. B 32. A
8. A 33. A
9. A 34. C
10. C 35. B
11. A 36. A
12. A 37. C
13. A 38. A
14. C 39. C
15. D 40. A
16. A 41. D
17. B 42. B
18. A 43. C
19. A 44. B
20. C 45. C
21. A 46. B
22. A 47. B
23. A 48. D
24. C 49. B
25. A 50. C
MCQ’s of Database Systems
1. A database containing all students in a class would store basic data of students in:
a). Record b). Field c). Cell d). File
2. SQL stands for:
a). Unstructured Language b). Structured Language
c). Seek Quality Language d). None
3. The objectives of database management systems include:
a) Database Integrity b). Data Integration c). Availability d). All
4. Which of the following is handled by DBMS?
a) Data Integrity b). Data Security c). Data Independence d). All
5. The database system is composed of four major parts:
a) Hardware, Hard drive, Monitor, Data, User b). Hardware, Software, People and Data
c). Software, You, Me, DBA, Client d). DBMS, Hardware, User, Programming, Engineer
6. Data that causes inconsistency lacks:
a). Good data b). Data integrity c). Data redundancy d). Data Anomaly
7. DBMS stand for:
a). Database Modeling system b). Database Management System
c). Data business model system d). Data business management service
8. Database application contain procedures for:
a). Adding records b). Deleting records c). Processing queries d). All
9. The major component of DBMS is called:
a). Database manager b). File Management c). Data Manager d). All
10. Duplicate data in multiple data files is:
a). Data redundancy b). Data Multiplication c). Data Integrity d). None
11. The description of structure and organization of data in a database is contained in:
a). Data dictionary b). Data Mine c). Structured query language
d). None
12. A request for information from a database in database terminology is called:
a). Report b). Letter c). Table d). Query
13. Which of the following is not a database management system?
a). MS Access b). MS SQL c). Oracle d). SQL server
14. Which of the following is not one of the three schemas used in the ANSI/SPARC
a). External b). Internal c). Implementation d). Conceptual
15. Which of three schemas used in three-schema model represents how users view database?
a). External b). Internal c). Implementation d). Conceptual
16. Which data model creates parent-child relationships between data elements and enables each
child to have just one parent?
a). Hierarchical b). Network c). Relational d). Object
17. Which of the following data models stores data in table structures and performs various
operations on table rows and columns?
a). Hierarchical b). Network c). Relational d). Object
18. DBA stand for.
a). Database administrator b). data basic administration
c). Database application d). database authority
19. Which of the following represents a collection of concepts that are used to describe the
Structure of a database.
a). Data warehouse b). data model c). data structure d). data type
20. Physical database design decisions must be made carefully because of impacts on
a). Data accessibility b). response time c). security d). all
21. Organizing the database in-computer disk storage is done in.
a). Logical design b). physical design c). analysis
d). implementation
22. Customers, cars, and parts are examples of
a). Entities b). attributes c). cardinals d). relationships
23. An identifier may be.
a). Composite b). unique c). non-unique d). all
24. The relationship can be.
a). one by one b). one to many c). many to many d). all
25. Which of the following is an example of one to one relationship?
a). student-RegNo b). person-automobile c). mother-daughter
d). person-phone number
26. Which of the following is a one-to-many relationship?
a). student-RegNo b). person-automobile c). mother-daughter
d). both b and c
27. An entity related to itself in an ERD model refers to.
a). Recursive relationship b). one-to-many relationship
c). many-to-many relationship d). one-to-one relationship
28. In an E-R diagram, a rectangle represents a (n).
a). Entity class b). weak entity c). relationship d). attribute
29. The most common type of relationship encountered in data modeling is______relationship:
a). Unary b). Binary c). Ternary d). Associative
30. The degree of a relationship refers to the:
a). Number of entities b). Maximum cardinality
c). Minimum cardinality d). Number of attributes in a the identifiers
a). Table b). Record c). Field d). Cell
31. A table must have
a). Primary key b). Secondary Key c). Composite Key d). Sort key
32. A two dimensional table of data is called a:
a). Group b). Set c). Declaration d). Relation
33. A relation is also known as:
a). Table b). Tuple c). Relationship d). Attribute
34. A row of a relation is called a (n)
a). Attribute b). Entity c). tuple d). Field
35. A key is:
a). A field that identifies only one record b). The most important field in a record
c). The first field of table d). None
36. Which of the following describes the primary key?
a). It must be unique b). It helps in indexing of a large database
c). It makes sorting quicker d). All of the above
37. How many primary keys can a table have?
a). One b). At least one, but not more than two
c). Between 1 and 5 d). No limit
38. Which field listed below is the most appropriate primary key?
a). A person’s name b). A person’s street address
c). A person’s birth date d). A person’s social security number
39. An attribute in a relation of a database that serves as the primary key of another relation in the
same database is called a:
a). Global key b). Line key c). Foreign key d). None
40. A primary key that consists of more than one attributes is called a:
a). Foreign key b). Composite key c). Multi-valued key d). Global key
41. In 3NF, which form of dependency is removed?
a). Functional b).Non-Functional c). Associative d). Transitive
42. In relational database, table is also called:
a). Tuple b). Relation c).File d). Schema
43. In 3NF, a non-key attribute must not depend on a:
a).Non-key Attribute b). Key attribute c). Composite key d). Sort key
44. Every relation must have:
a). Primary key b). Candidate key
c). Secondary key d). Mutually exclusiveness
45. The goal of normalization is to:
a). Get stable data structure b). Increase number of relation
c). Increase redundancy d). None
46. In 2NF, which form of dependency is removed?
a). Functional b). Partial c). Associative d). Transitive
47. A relation is in third normal form if it is in second normal form and:
a). Dependent on part of the key b). Dependent on all of the key
c). Independent of the key d). Has no transitive dependencies
48. The 2NF describes the tabular format in which:
a). All the key attributes are defined b). No repeating groups in the table
c). All attributes are dependent on the primary key d). All
49. The normalization process generally:
a). Reduces the number of relations b). Increases the number of relations
c). Reduces the number of functional dependencies
d). Increases the number of functional dependencies
50. A relation is automatically in:
a). First normal form b). Second normal form c). Third normal form
d). Boyce-Codd normal form
51. A relation is considered a:
a). Column b). One dimensional table c). Two dimensional table
d). Three dimensional table
52. Which of the following is a requirement of 3NF?
a). Must contain a partial dependency b). Must contain a composite
c). Must contain no transitive dependency d). Must contain no partial dependencies
53. Which of the following should not be placed in a relational table?
a). Entity b). Attribute c). Relationship d). Repeating group
54. Which of the following is a group of one or more attributes that uniquely identifies a row?
a). Key b). Determinant c). Tuple d). Relation
55. A weak entity is one which:
a). Is not in a relationship with any other entities b). Does not have a unique identifier
c). Cannot exist in the database by itself d). Is a subtype
1. d 2. b 3. d 4. d 5. b
6. b 7. b 8. d 9. a 10. a
1. Machine learning is
a) The autonomous acquisition of knowledge through the use of computer
programs
b) The autonomous acquisition of knowledge through the use of manual programs
e) The selective acquisition of knowledge through the use of computer programs
d) The selective acquisition of knowledge through the use of manual programs
e) None of the mentioned
2. Which modifies the performance element so that it makes better decision?
a) Performance element
b) Changing element
c) Learning element
d) None of the mentioned
3. . How many things are concerned in design of a learning element?
a) 1
b) 2
c) 3
d) 4
4. What is used in determining the nature of the learning problem?
a) Environment
b) Feedback
c) Problem
d) All of the mentioned
5. Which is used for utility functions in game playing algorithm?
a) Linear polynomial
b) Weighted polynomial
c) Polynomial
d) Linear weighted polynomial
6. Which is used to choose among multiple consistent hypotheses?
a) Razor
b) Ockham razor
c) Learning element
d) None of the mentioned
7. What will happen if the hypothesis space contains the true function?
a) Realizable
b) Unrealizable
c) Both a & b
d) None of the mentioned
8. What takes input as an object described bya set of attributes?
a) Tree
b) Graph
c) Decision graph
d) Decision tree
9. How the decision tree reaches its decision?
a) Single test
b) Two test
c) Sequence of test
d) No test
10. What will take place as the agent observes its interactions with the world?
a) Learning
b) Hearing
c) Perceiving
d) Speech
11. Which modifies the performance element so that it makes better decision?
a) Performance element
b) Changing element
c) Learning element
d) None of the mentioned
12. 3. How many things are concerned in design of a learning element?
a) 1
b) 2
c) 3
d) 4
(The three main issues are affected in design of a learning element are components,
feedback and representation.)
13. What is used in determining the nature of the learning problem?
a) Environment
b) Feedback
c) Problem
d) All of the mentioned
14. How many types are available in machine learning?
a) 1
b) 2
c) 3
d) 4
15. Factors which affect the performance of learner system does not include
a) Representation scheme used
b) Training scenario
c) Type of feedback
d) Good data structures
16. Different learning method does not include:
a) Memorization
b) Analogy
c) Deduction
d) Introduction
17. Which of the following is the model used for learning?
a) Decision trees
b) Neural networks
c) Propositional and FOL rules
d) All of the mentioned
18. Automated vehicle is an example of ______.
a) Supervised learning
b) Unsupervised learning
c) Active learning
d) Reinforcement learning
19. Following is an example of active learning:
a) News Recommender system
b) Dust cleaning machine
c) Automated vehicle
d) None of the mentioned
20. In which of the following learning the teacher returns reward and punishment to learner?
a) Active learning
b) Reinforcement learning
c) Supervised learning
d) Unsupervised learning
30. Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer
35. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23
D. Network bits 8, Host bits 23
43. Which of these software engineering activities are not a part of software processes ?
a) Software dependence.
b) Software development.
c) Software validation.
d) Software specification.
48. The Unified Modeling Language (UML) has become an effective standard for software
modelling. How many different notations does it have?
a) Three
b) Four
c) Six
d) Nine
49. Which model in system modelling depicts the dynamic behaviour of the system?
a) Context Model
b) Behavioral Model
c) Data Model
d) Object Model
50. Which perspective in system modelling shows the system or data architecture?
a) Structural perspective
b) Behavioral perspective
c) External perspective
55. Which diagram in UML shows a complete or partial view of the structure of a modeled
system at a specific time?
a) Sequence Diagram
b) Collaboration Diagram
c) Class Diagram
d) Object Diagram
59. A software engineer designs the user interface by applying an iterative process that
draws on predefined design principles.
a) True
b) False
60. What incorporates data, architectural, interface, and procedural representations of the
software?
a) design model
b) user’s model
c) mental image
d) system image
63. What are the advantages of neural networks over conventional computers?
(i) They have the ability to learn by example
(ii) They are more fault tolerant
(iii)They are more suited for real time operation due to their high ‘computational’ rates
a) (i) and (ii) are true
b) (i) and (iii) are true
c) Only (i)
d) All of the mentioned
65. Why is the XOR problem exceptionally interesting to neural network researchers?
a) Because it can be expressed in a way that allows you to use a neural network
b) Because it is complex binary operation that cannot be solved using neural networks
c) Because it can be solved by a single layer perceptron
d) Because it is the simplest linearly inseparable problem that exists.
67. A perceptron adds up all the weighted inputs it receives, and if it exceeds a certain
value, it outputs a 1, otherwise it just outputs a 0.
a) True
b) False
c) Sometimes – it can also output intermediate values as well
d) Can’t say
68. The network that involves backward links from output to the input and hidden layers is
called as ---------.
a) Self organizing maps
b) Perceptrons
c) Recurrent neural network
d) Multi layered perceptron
70. A rule-based system generally represents which one of the following statement..
a) If
b) If-Then
c) If-Else
d) Iff
Multiple Choice Questions: Operating System
1. What is operating system?
a) collection of programs that manages hardware resources
b) system service provider to the application programs
c) link to interface the hardware and application programs
d) all of the mentioned
2. If a process fails, most operating system write the error information to a ______
a) log file
b) another running process
c) new file
d) none of the mentioned
3. The systems which allows only one process execution at a time, are called _______
a) uniprogramming systems
b) uniprocessing systems
c) unitasking systems
d) none of the mentioned
4. A process can be terminated due to ________
a) normal exit
b) fatal error
c) killed by another process
d) all of the mentioned
5. What is the ready state of a process?
a) when process is scheduled to run after some execution
b) when process is unable to run until some task has been completed
c) when process is using the CPU
d) none of the mentioned
6. Hardware generated change of flow with in system is called ___________
a) Process
b) Interrupts
c) Request
d) Instruction
7. In ______ systems, user cannot interact with the job when it is executed.
a) Parallel
b) Multiuser
c) Batch
d) Embedded
8. In operating system, each process has its own
a) address space and global variables
b) open files
c) pending alarms, signals and signal handlers
d) all of the mentioned
9. What is interprocess communication?
a) communication within the process
b) communication between two process
c) communication between two threads of same process
d) none of the mentioned
10. A set of processes is deadlock if
a) each process is blocked and will remain so forever
b) each process is terminated
c) all processes are trying to kill each other
d) none of the mentioned
11. Which system call returns the process identifier of a terminated child?
a) wait
b) exit
c) fork
d) get
12. The address of the next instruction to be executed by the current process is provided by the
a) CPU registers
b) Program counter
c) Process stack
d) Pipe
13. A Process Control Block(PCB) does not contain which of the following :
a) Code
b) Stack
c) Bootstrap program
d) Data
14. The number of processes completed per unit time is known as __________
a) Output
b) Throughput
c) Efficiency
d) Capacity
15. The state of a process is defined by:
a) the final activity of the process
b) the activity just executed by the process
c) the activity to next be executed by the process
d) the current activity of the process
16. Which of the following is not the state of a process?
a) New
b) Old
c) Waiting
d) Running
17. The Process Control Block is:
a) Process type variable
b) Data Structure
c) A secondary storage section
d) A Block in memory
18. The entry of all the PCBs of the current processes is in:
a) Process Register
b) Program Counter
c) Process Table
d) Process Unit
19. The degree of multiprogramming is:
a) the number of processes executed per unit time
b) the number of processes in the ready queue
c) the number of processes in the I/O queue
d) the number of processes in memory
20. A single thread of control allows the process to perform:
a) only one task at a time
b) multiple tasks at a time
c) only two tasks at a time
d) all of the mentioned
21. The objective of multiprogramming is to :
a) Have some process running at all times
b) Have multiple programs waiting in a queue ready to run
c) To minimize CPU utilization
d) None of the mentioned
22. When the process issues an I/O request :
a) It is placed in an I/O queue
b) It is placed in a waiting queue
c) It is placed in the ready queue
d) It is placed in the Job queue
23. When a process terminates :
a) It is removed from all queues
b) It is removed from all, but the job queue
c) Its process control block is de-allocated
d) Its process control block is never de-allocated
24. What is a long-term scheduler ?
a) It selects which process has to be brought into the ready queue
b) It selects which process has to be executed next and allocates CPU
c) It selects which process to remove from memory by swapping
d) None of the mentioned
25. What is a medium-term scheduler ?
a) It selects which process has to be brought into the ready queue
b) It selects which process has to be executed next and allocates CPU
c) It selects which process to remove from memory by swapping
d) None of the mentioned
26. What is a short-term scheduler ?
a) It selects which process has to be brought into the ready queue
b) It selects which process has to be executed next and allocates CPU
c) It selects which process to remove from memory by swapping
d) None of the mentioned
27. The primary distinction between the short term scheduler and the long term scheduler is :
a) The length of their queues
b) The type of processes they schedule
c) The frequency of their execution
d) None of the mentioned
28. The only state transition that is initiated by the user process itself is :
a) block
b) wakeup
c) dispatch
d) none of the mentioned
29. In a time-sharing operating system, when the time slot given to a process is completed, the process
goes from the running state to the :
a) Blocked state
b) Ready state
c) Suspended state
d) Terminated state
30. In a multiprogramming environment :
a) the processor executes more than one process at a time
b) the programs are developed by more than one person
c) more than one process resides in the memory
d) a single user can execute many programs at the same time
31. Suppose that a process is in “Blocked” state waiting for some I/O service. When the service is
completed, it goes to the :
a) Running state
b) Ready state
c) Suspended state
d) Terminated state
32. The context of a process in the PCB of a process does not contain :
a) the value of the CPU registers
b) the process state
c) memory-management information
d) context switch time
33. Which of the following need not necessarily be saved on a context switch between processes?
a) General purpose registers
b) Translation look a side buffer
c) Program counter
d) All of the mentioned
34. Which of the following does not interrupt a running process ?
a) A device
b) Timer
c) Scheduler process
d) Power failure
35. Which process can be affected by other processes executing in the system?
a) cooperating process
b) child process
c) parent process
d) init process
36. When several processes access the same data concurrently and the outcome of the execution
depends on the particular order in which the access takes place, is called
a) dynamic condition
b) race condition
c) essential condition
d) critical condition
37. If a process is executing in its critical section, then no other processes can be executing in their
critical section. This condition is called
a) mutual exclusion
b) critical exclusion
c) synchronous exclusion
d) asynchronous exclusion
38. Which one of the following is a synchronization tool?
a) thread
b) pipe
c) semaphore
d) socket
39. A semaphore is a shared integer variable
a) that can not drop below zero
b) that can not be more than zero
c) that can not drop below one
d) that can not be more than one
40. Process synchronization can be done on
a) hardware level
b) software level
c) both hardware and software level
d) none of the mentioned
41. A monitor is a module that encapsulates
a) shared data structures
b) procedures that operate on shared data structure
c) synchronization between concurrent procedure invocation
d) all of the mentioned
42. A parent process calling _____ system call will be suspended until children processes terminate.
a) wait
b) fork
c) exit
d) exec
43. The child process can :
a) be a duplicate of the parent process
b) never be a duplicate of the parent process
c) cannot have another program loaded into it
d) never have another program loaded into it
44. Message passing system allows processes to :
a) communicate with one another without resorting to shared data
b) communicate with one another by resorting to shared data
c) share data
d) name the recipient or sender of the message
45. Messages sent by a process :
a) have to be of a fixed size
b) have to be a variable size
c) can be fixed or variable sized
d) None of the mentioned
46. The link between two processes P and Q to send and receive messages is called :
a) communication link
b) message-passing link
c) synchronization link
d) all of the mentioned
47. In the Zero capacity queue :
a) the queue can store at least one message
b) the sender blocks until the receiver receives the message
c) the sender keeps sending and the messages don’t wait in the queue
d) none of the mentioned
48. The Zero Capacity queue :
a) is referred to as a message system with buffering
b) is referred to as a message system with no buffering
c) is referred to as a link
d) none of the mentioned
49. Bounded capacity and Unbounded capacity queues are referred to as :
a) Programmed buffering
b) Automatic buffering
c) User defined buffering
d) No buffering
50. The request and release of resources are ___________
a) command line statements
b) interrupts
c) system calls
d) special programs
51. Multithreaded programs are :
a) lesser prone to deadlocks
b) more prone to deadlocks
c) not at all prone to deadlocks
d) none of the mentioned
52. For a deadlock to arise, which of the following conditions must hold simultaneously ?
a) Mutual exclusion
b) No preemption
c) Hold and wait
d) All of the mentioned
53. Deadlock prevention is a set of methods :
a) to ensure that at least one of the necessary conditions cannot hold
b) to ensure that all of the necessary conditions do not hold
c) to decide if the requested resources for a process have to be given or not
d) to recover from a deadlock
54. For non sharable resources like a printer, mutual exclusion :
a) must exist
b) must not exist
c) may exist
d) none of the mentioned
55. For sharable resources, mutual exclusion :
a) is required
b) is not required
c) may be or may not be required
c) none of the mentioned
Answers:
1 D 12 B 23 A 34 C 45 C
2 A 13 C 24 A 35 A 46 A
3 B 14 B 25 C 36 B 47 B
4 D 15 D 26 B 37 A 48 B
5 A 16 B 27 C 38 C 49 B
6 B 17 B 28 A 39 A 50 C
7 C 18 C 29 B 40 C 51 B
8 D 19 D 30 C 41 D 52 D
9 B 20 A 31 B 42 A 53 A
10 A 21 A 32 D 43 A 54 A
11 A 22 A 33 B 44 A 55 B
Software Engineering MCQs
1. The linear sequential model of software development is also known as the
a) Classical life cycle model b) Fountain model c) Waterfall model d) Spiral model
2. Evolutionary software process models
a) Are iterative in nature b) Can easily accommodate product requirements
changes c) Do not generally produce throwaway systems d) All of above
3. Which of the following is not the element of computer-based systems?
a) documentation b) software c) Hardware d) Stakeholder
4. Three things that make requirements elicitation difficult are problems of
a) Budgeting b) scope c) understanding d) b and c
5. Which of the following is not one of the requirement classifications used in Quality
Function Deployment (QFD)?
a) Mandatory b) Exciting c) Normal d) Expected
6. Which of following is not a UML diagram used creating a system analysis model?
a) Use Case Diagram b) Sequence Diagram c) Data Flow Diagram
d) Class Diagram
7. The entity relationship diagram
a) depicts relationships between data objects b) depicts functions that transform the data flow
c) indicates how data are transformed by the system d) indicates system reactions to
external events
8. UML activity diagrams are useful in representing which analysis model elements?
a) Behavioral elements b) Class-based elements c) Flow-based elements
d) Scenario-based elements
9. The importance of software design can be summarized in a single word
a) accuracy b) complexity c) efficiency d) quality
10. Usability questionnaires are most meaningful to the interface designers when completed by
a) customers b) experienced programmers c) product users
d) project managers
11. What types of errors are missed by black-box testing and can be uncovered by white-box
testing?
a) Behavioral error b) Logical error c) Typographical error d) Both b and c
12. Black- box testing attempts to find errors in which of the following categories
a) incorrect or missing functions b) interface errors c) performance errors
d) All a, b &c
13. Which model is popular for students’ small projects?
a) Waterfall Model b) Spiral Model c) Quick and Fix model
d) Prototyping Model
14. Which is not a software life cycle model?
a) Spiral Model b) Waterfall Model c) Prototyping Model d) Capability
maturity Model
15. Project risk factor is considered in_____?
a) Spiral Model b) Waterfall Model c) Prototyping Model d) Iterative
enhancement Model
16. SDLC stands for?
a) Software design life cycle b) Software development life cycle c) System design life
cycle d) Spiral development life cycle
17. SRS stands for?
a) Software requirement specification b) Software requirement solution
c)System requirement specification d) None of these
18. Waterfall model is not suitable for?
a) Small Projects b) Complex Projects c) Accommodating change d) None of
These
19. Software engineering aims at developing?
a) Reliable Software b) Cost Effective Software c) Reliable and cost-effective Software
d) None of these
20. White box testing, a software testing technique is sometimes called ?
a) Basic path b) Graph Testing c) Dataflow d) Glass box testing
21. The objective of testing is ?
a) Debugging b)To uncover errors c)To gain modularity d)To analyze
system
22. Effective software project management focuses on four P's which are
a) people, performance, payoff, product b) people, product, performance, process
c) people, product, process, project d) people, process, payoff, product
23. The first step in project planning is to
a) determine the budget. b) select a team organizational model. c) determine the project
constraints. d) establish the objectives and scope.
24. Agile Software Development is based on
a)I ncremental Development b) Iterative Development c) Linear Development
d) Both a&b
Answers
21) b 42) b
1) c 22) c 43) d
2) d 23) d 44) b
3) d 24) d 45) c
4) d 25) a 46) d
5) a 26) b 47) c
6) c 27) b 48) b
7) a 28) c 49) a
8) d 29) b 50) c
9) d 30) d 51) a
10) c 31) d 52) c
11) d 32) c 53) d
12) d 33) a 54) c
13) a 34) a 55) c
14) d 35) d
15) a 36) a
16) b 37) d
17) a 38) b
18) c 39) c
19) c 40) b
20) d 41) c
System Architecture & Assembly Language
37. When generating physical addresses from a logical address the offset is stored in _____
a) Translation look-aside buffer
b) Relocation register
c) Page table
d) Shift register
38. The technique used to store programs larger than the memory is ______
a) Overlays
b) Extension registers
c) Buffers
d) Both Extension registers and Buffers
39. The unit which acts as an intermediate agent between memory and backing store to reduce
process time is _____
a) TLB’s
b) Registers
c) Page tables
d) Cache
40. The Load instruction does the following operation/s,
a) Loads the contents of a disc onto a memory location
b) Loads the contents of a location onto the accumulators
c) Load the contents of the PCB onto the register
d) None of the mentioned
41. The CISC stands for ___________
a) Computer Instruction Set Compliment
b) Complete Instruction Set Compliment
c) Computer Indexed Set Components
d) Complex Instruction set computer
42. The computer architecture aimed at reducing the time of execution of instructions is
________
a) CISC
b) RISC
c) ISA
d) ANNA
43. The Sun micro systems processors usually follow _____ architecture.
a) CISC
b) ISA
c) ULTRA SPARC
d) RISC
44. The iconic feature of the RISC machine among the following is _______
a) Reduced number of addressing modes
b) Increased memory size
c) Having a branch delay slot
d) All of the mentioned
45. Both the CISC and RISC architectures have been developed to reduce the ______
a) Cost
b) Time delay
c) Semantic gap
d) All of the mentioned
46. Out of the following which is not a CISC machine.
a) IBM 370/168
b) VAX 11/780
c) Intel 80486
d) Motorola A567
47. Pipe-lining is a unique feature of _______
a) RISC
b) CISC
c) ISA
d) IANA
48. In CISC architecture most of the complex instructions are stored in _____
a) Register
b) Diodes
c) CMOS
d) Transistors
49. Which of the architecture is power efficient?
a) CISC
b) RISC
c) ISA
d) IANA
50. The pipelining process is also called as ______
a) Superscalar operation
b) Assembly line operation
c) Von Neumann cycle
d) None of the mentioned
51. The reserved memory or private space of the subroutine gets deallocated when _______
a) The stop instruction is executed by the routine
b) The pointer reaches the end of the space
c) When the routine’s return statement is executed
d) None of the mentioned
52. _____ the most suitable data structure used to store the return addresses in the case of nested
subroutines.
a) Heap
b) Stack
c) Queue
d) List
53. Which of the register/s of the processor is/are connected to Memory Bus?
a) PC
b) MAR
c) IR
d) Both PC and MAR
54. The internal Components of the processor are connected by _______
a) Processor intra-connectivity circuitry
b) Processor bus
c) Memory bus
d) Rambus
55. The registers, ALU and the interconnection between them are collectively called as _____
a) process route
b) information trail
c) information path
d) data path
Answers:
1. a 2. b 3. d 4. b 5. b 6. b 7. d 8. c 9. b 10. d
11. a 12. a 13. c 14. a 15. d 16. b 17. c 18. a 19. b 20. c
21. c 22. c 23. a 24. d 25. d 26. a 27. d 28. b 29. a 30. a
31. b 32. c 33. c 34. d 35. a 36. c 37. b 38. a 39. d 40. b
41. d 42. b 43. d 44. c 45. c 46. d 47. a 48. d 49. b 50. b
51. c 52. b 53. b 54. b 55. d
CS -710 Visual Programming
a. Public
b. Private
c. Protected
d. None of these
2. Methods having same name & parameters but different classes that are related by inheritance
a. Method overriding
b. Method overloading
c. Method doubling
d. None
a. Input.
b. Output
c. Both a and b
d. None
7. The process of carefully observing the working of an algorithm to find out logical errors is called:
a. Desk Checking
b. Compiling
c. Debugging
d. Coding
a. Flow chart
b. Coding
c. Desk Checking
d. None
9. The set of rules for writing a program in any programming language is called:
a. Syntax
b. Bug
c. Debug
d. None
a. Error code
b. Source code
c. Linked code
d. Object code
11. A type of language in which instructions are written in binary form is called:
a. Machine language
b. Assembly language
d. None
a. Complex
b. Simple
c. Time-consuming
d. Both a and c
a. Assembly language
b. Pascal
c. BASIC
d. FORTRAN
a. Java
b. Binary Language
c. Pascal
d. C++
c. Compiler
17. What access modifier provides the most relaxed access privilege
a. Public
b. Private
c. Protected
d. None of these
a. Command Button
b. Forms
c. Variable
d. Text Box
a. Label
b. Text box
c. Button
d. None
a. Label
b. Textbox
c. Property
d. Button
21. In Java keyword __________ is used to inherit a class.
a. parent
b. own
c. extends
d. relate
22. A memory location with some data that cannot change is called:
a. Constant.
b. Variable.
c. Named constant.
d. Symbolic constant.
a. Number
b. Underscore
c. Letter
d. Special Characters
a. Number.
b. Underscore
c. Upper-case letter
d. Lower-case letter
26: Which of the following is NOT valid variable name?
a. ThisIsAValidVariableName
B. So0is0This
c. HOWABOUTTHIS?
c. IS_THIS_VALID_ASWELL
27. Which term describes the kind of values that a variable can store?
a. Variable Name
b. Datatype
c. Variabletype
d. Variablesize
c. A data type has no impact on how fast your application will run.
30. What kinds of numbers are stored in Single and Double data types?
a. Name of datatype
b. Name of variable
c. Data type
d. All
34. Which of the following can be used to get input from user on a form?
a. Format
b. Text box
c. Messagebox
d. None
a. Operators
b. Operand
c. Both a and b
d. None
36. An expression can be a:
a. Constant.
b. Variable.
a. Sales — Revenues
b. Mpg, Gallons
c. Pi * Radius
d. M/n
a. +
b. -
c. %
d. &&
a. Exponentiation
b. Multiplication
c. Division
d. Integer remainder
a. 1
b. 3
c. 8
d. None
41. Which of the following operators is used to assign a value to a variable?
a. >
b. +
c. =
d. None
a. x = 100
b. x = a + b
c. x = c - d + 10
d. All of these
int x, y, z; y = 10, z = 3; x = y * z + 3;
a. 12
b. 60
c. 30
d. 33
Int x = 0;
x += 30;
a. 0
b. 30
c. 33
d. none
45. ________________ loop executes at least once.
a. For
b. Do While
c. While
d. foreach
a.int
b. double
c. long
d. bool
a. 2.666
b. 2
c. 2/3
d. 3
a. Integer
b. Real
c. float
d. String
49. The statement to declare a local variable called Index that will store integer numbers is:
b. String strindex
d. int lndex
50. Which of the following statements is NOT true about variables?
a. ZIPCODE 7 64323
b. Const pi as double
c. Const pi=3.141592
d. None
a. Inputbox
b. MessageBox
c. Msgbox
d. None
a. Vari'Name
b. 100bye
c. VariableName
d. All
55. Methods with same name in same class but different parameters are
a. Method overriding
b. Method overloading
c. Method doubling
d. None
Answers
1- B
2- A
3- B
4- B
5- A
6- C
7- C
8- B
9- A
10- D
11- A
12- D
13- A
14- B
15- A
16- B
17- A
18- C
19- B
20- C
21- C
22- A
23- C
24- D
25- A
26- C
27- B
28- A
29- B
30- A
31- D
32- A
33- A
34- B
35- C
36- C
37- B
38- D
39- D
40- A
41- C
42- D
43- D
44- B
45- B
46- B
47- B
48- B
49- D
50- A
51- B
52- A
53- C
54- C
55- B