0

Computer Basics

Description: This test covers some important questions on computer science for various entrance exams.
Number of Questions: 15
Created by:
Tags: Computer Science OSI Model and its Layers OSI Layer Operating Systems with Case Study of Unix Operating System Computer Networks Finite Automata and Formal Languages Theory of Computation Programming and Data Structures
Attempted 0/15 Correct 0 Score 0

What is the size of a MAC address?

  1. 48 bits

  2. 12 bits

  3. 1 byte

  4. 3 bytes

  5. 32 bits


Correct Option: A
Explanation:

The original IEEE 802 MAC address comes from the original Xerox Ethernet addressing scheme. This 48-bit address space contains potentially 248 or 281,474,976,710,656 possible MAC addresses.

Which of these is a web browser for mobile devices?

  1. Internet Explorer

  2. SlimBrowser

  3. WAP

  4. GreenBrowser

  5. Opera


Correct Option: C
Explanation:

Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.

What is the return value of fork() system call in the parent process when the child process has been successfully created?

  1. Zero

  2. -1

  3. Any negative value

  4. No return value

  5. A positive value


Correct Option: E
Explanation:

The return value in the parent process is the process identifier of the newly created child process (a positive value).

In which technique are the outgoing acknowledgements delayed temporarily and sent along with the next outgoing data frame as ACK field?

  1. Bit stuffing

  2. Sliding window protocol

  3. Piggybacking

  4. Multicasting

  5. Anycast


Correct Option: C
Explanation:

Piggybacking is a bi-directional data transmission technique in the network layer (OSI model). It makes the most of the sent data frames from receiver to emitter, adding the confirmation that the data frame sent by the sender was received successfully (ACK acknowledge). This practically means, that instead of sending an acknowledgement in an individual frame it is piggy-backed on the data frame.

Which of these is not true for the fork() system call?

  1. When a process forks, it creates a copy of itself.

  2. Both parent and child processes always share the same address space.

  3. The system call takes no arguments.

  4. Negative return value means an unsuccessful atempt to create a child.

  5. Forking is an important part of Unix.


Correct Option: B
Explanation:

The fork operation creates a separate address space for the child. The child process has an exact copy of all the memory segments of the parent process. If copy-on-write semantics are implemented,  actual physical memory may not be assigned.

In which network topology is every node connected to central node?

  1. Bus

  2. Star

  3. Ring

  4. Mesh

  5. Tree


Correct Option: B
Explanation:

In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. In Star topology every node (computer workstation or any other peripheral) is connected to central node called hub or switch.

Which of the following techniques use binary exponential backoff algorithm as part of network congestion avoidance?

  1. CSMA/CA

  2. Fair queuing

  3. RED

  4. Slotted ALOHA

  5. Priority schemes


Correct Option: A
Explanation:

In carrier sense multiple access with collision avoidance (CSMA/CA) technique this algorithm is part of the channel access method used to send data on these network.

Which technology is popularly known as 'Wireless Cable'?

  1. CDMA

  2. ATM

  3. MMDS

  4. GSM

  5. LMDS


Correct Option: C
Explanation:

Broadband Radio Service (BRS) formerly known as Multichannel Multipoint Distribution Service (MMDS), also known as Wireless Cable, is a wireless telecommunications technology, used for general-purpose broadband networking or, more commonly, as an alternative method of cable television programming reception.

Which of the following is a measure of the cyclomatic complexity of a source code?

  1. Number of lines of the source code

  2. Amount of computational resources

  3. Size of the input

  4. Number of linearly independent paths

  5. Interaction between various elements of the system


Correct Option: D
Explanation:

The cyclomatic complexity of a section of source code is the count of the number of linearly independent paths through the source code.

What is the maximum possible number of edges in a graph without self loops and n-nodes?

  1. n2

  2. n(n-1)/2

  3. n

  4. n-1

  5. n(n+1)/2


Correct Option: B
Explanation:

When each node is connected to every other node then it means n nodes are connected to (n-1) nodes. But since the graph is undirected, edges in both the directions mean the same. Hence, the number of edges is divided by 2 to give the result as n(n-1)/2.

In which RAID level is block-level striping with distributed parity implemented?

  1. RAID 0

  2. RAID 1

  3. RAID 2

  4. RAID 5

  5. RAID 10


Correct Option: D
Explanation:

RAID 5 (block-level striping with distributed parity) distributes parity along with the data and requires that all drives but one be present to operate. The array is not destroyed by a single drive failure. On drive failure, any subsequent reads can be calculated from the distributed parity such that the drive failure is masked from the end user. RAID 5 requires at least three disks.

The minimum number of page frames that must be allocated to a running process in a virtual memory environment is calculated using

  1. page size

  2. physical memory size

  3. virtual memory size

  4. number of running processes

  5. instruction set architecture


Correct Option: E
Explanation:

Instruction set architecture determines the minimum number of page frames that must be allocated to a running process.

The inorder traversal of which data structure is always in sorted order?

  1. AVL tree

  2. Min-max heap

  3. Binary search tree

  4. Unrooted binary tree

  5. Random binary tree


Correct Option: C
Explanation:

A binary search tree (BST), sometimes also called an ordered or sorted binary tree, is a node-based binary tree data structure.The major advantage of binary search trees over other data structures is that the related sorting algorithms and search algorithms such as inorder traversal can be very efficient.

What is common between a logic programming language and a functional language?

  1. Both are procedural

  2. Both are based on lambda calculus

  3. Both are declarative

  4. Both use Horn Clause

  5. Both are imperative


Correct Option: C
Explanation:

Declarative programming is a non-imperative style of programming in which programs describe their desired results without explicitly listing commands or steps that must be performed. Functional and logical programming languages are characterized by a declarative programming style.

Which of these devices is used for forwarding data packets between computer networks?

  1. Hub

  2. Token Ring

  3. Network Controller

  4. Bridge

  5. Router


Correct Option: E
Explanation:

A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.

- Hide questions