0

Computer Applications

Description: This test covers important topics from Computer Science for competitive exams like UGC NET, GATE etc.
Number of Questions: 15
Created by:
Tags: Computer Science Digital Systems and Microprocessors Computer Organization and Architecture Computer Networks Information Systems and Software Engineering Operating Systems with Case Study of Unix Operating System Finite Automata and Formal Languages Languages in Computation
Attempted 0/15 Correct 0 Score 0

Which of these is not a type of computer memory?

  1. Cache

  2. Instruction opcode

  3. PROM

  4. SRAM

  5. DRAM


Correct Option: B
Explanation:

An opcode (operation code) is the portion of a machine language instruction that specifies the operation to be performed.

Which OSI layer protocol is Telnet?

  1. Physical

  2. Data Link

  3. Transport

  4. Network

  5. Application


Correct Option: E
Explanation:

Telnet is an application layer protocol.

What is the use of Spanning Tree Protocol for any bridged Ethernet local area network?

  1. Fault Tolerance

  2. Shortest Path Routing

  3. Speedy Delivery

  4. Ensuring a loop-free topology

  5. Minimising collisions


Correct Option: D
Explanation:

The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops or the need for manual enabling/disabling of these backup links.

Which of these activities does not come under the scope of software maintenance?

  1. Feasibility analysis

  2. Fixing defects

  3. Enhancement of capabilities

  4. Deletion of obsolete capabilities

  5. Alignment with customer priorities


Correct Option: A
Explanation:

A feasibility study is the evaluation and analysis of  potential of a proposed project, which is based on extensive investigation and research to support the process of decision making. It is the first phase of Software Development Life Cycle (SDLC).

Which page replacement algorithm swaps out the page whose next use will occur farthest in the future?

  1. Least Recently Used

  2. First In First Out

  3. Optimal Page Replacement Policy

  4. Second-chance Algorithm

  5. Clock Algorithm


Correct Option: C
Explanation:

In Optimal Page Replacement Policy, when a page needs to be swapped in, the operating system swaps out the page whose next use will occur farthest in the future.

What type of programming language is C?

  1. Recognised only by a Turing machine

  2. Context-sensitive

  3. Regular

  4. Unrestricted

  5. Context-free


Correct Option: E
Explanation:

C is a context-free language.

For what purpose is the swap space in the disk used?

  1. Saving temporary internet files

  2. Saving HTML pages

  3. Saving process data

  4. Storing TLB

  5. Saving device drivers


Correct Option: C
Explanation:

Swap space is used when the amount of physical memory (RAM) is full. If the system needs more memory resources and the RAM is full, inactive pages in memory are moved to the swap space. While swap space can help machines with a small amount of RAM, it should not be considered a replacement for more RAM. Swap space is located on hard drives, which have a slower access time than physical memory.

Which of these is a non-preemptive CPU scheduling algorithm?

  1. First In First Out

  2. Fixed priority preemptive scheduling

  3. Round-robin scheduling

  4. Multilevel queue scheduling

  5. Multilevel feedback queue scheduling


Correct Option: A
Explanation:

First In First Out (FIFO) is the simplest scheduling algorithm. FIFO simply queues processes in the order that they arrive in the ready queue.

Which of the following cannot be used for the development of a software product?

  1. Waterfall model

  2. Spiral model

  3. Iterative and incremental development

  4. COCOMO Model

  5. Rapid application development


Correct Option: D
Explanation:

The Constructive Cost Model (COCOMO Model) is an algorithmic model used for software cost estimation. 

The balance of parenthesis in an arithmetic expression can be best checked with which of the following data structures?

  1. Queue

  2. Stack

  3. Tree

  4. Heap

  5. List


Correct Option: B
Explanation:

A stack is a particular kind of abstract data type or collection in which the principal (or only) operations on the collection are the addition of an entity to the collection, known as push and removal of an entity, known as pop. The relation between the push and pop operations is such that the stack is a Last-In-First-Out (LIFO) data structure. It is the best data for checking the balancing of parenthesis.

Which of these techniques does not use the divide and conquer policy?

  1. Merge sort

  2. Heap sort

  3. Binary search

  4. Insertion sort

  5. Quick sort


Correct Option: D
Explanation:

 Insertion sort is a simple sorting algorithm that builds the final sorted array (or list) one item at a time. It is a sequential technique.

Which of these is not a feature of UDP?

  1. No guarantee of delivery

  2. Checksums

  3. Port Numbers

  4. Transaction-oriented

  5. Handshaking dialogues


Correct Option: E
Explanation:

UDP uses a simple transmission model with a minimum of protocol mechanism. It has no handshaking dialogues and thus exposes any unreliability of the underlying network protocol to the user's program.

Microprogramming is related to the designing of which of the following components?

  1. CPU

  2. Hard Disk

  3. RAM

  4. ROM

  5. Control Unit


Correct Option: A
Explanation:

Writing the microcode is often called microprogramming and the microcode in a particular processor implementation is sometimes called a microprogram. Microprogramming is the designing of the CPU.

Which of these resources is individually owned by each thread of the same process?

  1. Stack

  2. Address space

  3. Memory

  4. File handles

  5. Socket


Correct Option: A
Explanation:

 Kernel threads do not own resources except for a stack, a copy of the registers including the program counter and thread-local storage

Which of the following computer networking protocols is used by a host computer to request its IP address when its MAC address is available?

  1. POP

  2. IMAP

  3. SMTP

  4. ARP

  5. RARP


Correct Option: E
Explanation:

The Reverse Address Resolution Protocol (RARP) is a computer networking protocol used by a host computer to request its Internet Protocol (IPv4) address from an administrative host, when it has its Link Layer or hardware address available, such as a MAC address.

- Hide questions