MCQOPTIONS
Saved Bookmarks
This section includes 168 Mcqs, each offering curated multiple-choice questions to sharpen your Civil Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
If A = {x: x = 3n, n ? 6, n ? N} and B = {x: x = 9n, n ? 4, n ? N}, then which of thefollowing is false? |
| A. | A ? B = {9, 81, 729, 6561} |
| B. | A U B = {3, 9, 27, 81,243, 729, 6561} |
| C. | A ? D = {3, 27, 243, 6561} |
| D. | A-B = {3, 27,243} |
| Answer» B. A U B = {3, 9, 27, 81,243, 729, 6561} | |
| 102. |
Computers use addressing mode techniques for _____________________. |
| A. | to reduce no. of bits in the field of instruction |
| B. | giving programming versatility to the user by providing facilities as pointers to memory counters for loop control |
| C. | All the above |
| D. | specifying rules for modifying or interpreting address field of the instruction |
| Answer» D. specifying rules for modifying or interpreting address field of the instruction | |
| 103. |
The number of simple digraphs with |V | = 3 and exactly 3 edges is |
| A. | 80 |
| B. | 88 |
| C. | 76 |
| D. | 84 |
| Answer» D. 84 | |
| 104. |
SSTF stands for |
| A. | small – small-time-first |
| B. | Shortest-Seek-time-first scheduling |
| C. | small-simple-time-first scheduling |
| D. | simple-seek-time-first |
| Answer» C. small-simple-time-first scheduling | |
| 105. |
The number of interchanges required to sort 5, 1, 6, 2 4 in ascending order using Bubble Sortis |
| A. | 5 |
| B. | 6 |
| C. | 8 |
| D. | 7 |
| Answer» B. 6 | |
| 106. |
How are information system and capability related to each other ? |
| A. | Increased volumed processing speed |
| B. | Improved processing speed |
| C. | All of the above |
| D. | Faster retrieval of information |
| Answer» E. | |
| 107. |
The scale of cohesion from the weakest (least desirable) to the strongest (most desirable) are |
| A. | informational, functional,temporal, coincidental,sequential, logical |
| B. | cofincidental, logical, temporal, communicational, sequential, functional, informational |
| C. | informational, temporal, logical, sequential, functional, coincidental |
| D. | informational, logical, temporal, sequential, functional |
| Answer» C. informational, temporal, logical, sequential, functional, coincidental | |
| 108. |
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window |
| A. | increases linearly |
| B. | does not increase |
| C. | increases exponentially |
| D. | increases quadratically |
| Answer» D. increases quadratically | |
| 109. |
The ASCII code for letter A is |
| A. | 1000001 |
| B. | 1100011 |
| C. | 10011 |
| D. | 1111111 |
| Answer» B. 1100011 | |
| 110. |
By an extranet we mean |
| A. | the intranets of two co-operating organizations interconnected via a secure leased line |
| B. | an extra fast computer network |
| C. | an extra connection to internet provided to co-operating organization |
| D. | an extra network used by an organization for higher reliability |
| Answer» B. an extra fast computer network | |
| 111. |
For the same functionality coding in C vs coding in assembly language yieds code in LOC which is |
| A. | times smaller |
| B. | three times larger |
| C. | same size |
| D. | 10 times smaller |
| Answer» B. three times larger | |
| 112. |
The set of all real numbers under the usual multiplication operation is not a group since |
| A. | multiplication is not associative |
| B. | multiplication is not a binary operation |
| C. | zero has no inverse |
| D. | identity element does not exist |
| Answer» D. identity element does not exist | |
| 113. |
The complexity of multiplying two matrices of order m*n and n*p is |
| A. | mp |
| B. | mnp |
| C. | np |
| D. | mn |
| Answer» C. np | |
| 114. |
If set x = {a, b, c, d}, then number of binary operations that can be defined on x is |
| A. | 24 |
| B. | 42 |
| C. | 416 |
| D. | 216 |
| Answer» E. | |
| 115. |
An FSM (Finite State Machine) can be considered to be a TM (Turing Machine) of finite tape length |
| A. | rewinding capacity, and unidirectional tape movement |
| B. | without rewinding capability and unidirectional tape movement. |
| C. | rewinding capability and bidirectional tape movement |
| D. | without rewinding capability and bidirectional tape movement |
| Answer» C. rewinding capability and bidirectional tape movement | |
| 116. |
2.The time required for a gate or inverter to change its state is called |
| A. | Decay time |
| B. | Rise time |
| C. | Charging time |
| D. | Propagation time |
| Answer» E. | |
| 117. |
Checking quality of software in both simulated and live environments is known as |
| A. | Usability |
| B. | Checking |
| C. | Validation |
| D. | Vaidity |
| Answer» B. Checking | |
| 118. |
XLL definition is used along with XML to specify |
| A. | The presentation of XML document |
| B. | The data types of the contents of XML document |
| C. | The structure of XML document |
| D. | The links with other documents |
| Answer» E. | |
| 119. |
If the stack pointer is initialised with (4FEB)H, then after execution of Pushoperation in 8085 microprocessor, the Stack Pointer shall be |
| A. | 4FEC |
| B. | 4FEA |
| C. | 4FED |
| D. | 4FE9 |
| Answer» D. 4FE9 | |
| 120. |
The instructions which copy information from one location to another either in theprocessor’s internal register set or in the external main memory are called |
| A. | Program control instructions. |
| B. | Data transfer instructions |
| C. | Logical instructions. |
| D. | Input-output instructions |
| Answer» C. Logical instructions. | |
| 121. |
Which two files are used during operation of the DBMS |
| A. | DML and query language |
| B. | Query languages and utilities |
| C. | Data dictionary and query language |
| D. | Data dictionary and transaction log |
| Answer» E. | |
| 122. |
The rating of coupling of modules for strongest (least desirable) to weakest (most desirable) are |
| A. | common, content, control, stamp, data |
| B. | content, common, control, stamp, data |
| C. | data, control, common, stamp, content |
| D. | data, common ,stamp, content, common |
| Answer» C. data, control, common, stamp, content | |
| 123. |
If for two sets A and B, A U B = A? B = A, then we have |
| A. | B ? A ? f |
| B. | A- B ? f |
| C. | None of these |
| D. | A = B |
| Answer» E. | |
| 124. |
Consider a program with a linked origin of 5000. Let the memory area allocated to ithave the start address of 70000. Which amongst the following will be the valueto be loaded in relocation register? |
| A. | 50000 |
| B. | 20000 (B) (C) |
| C. | None of above |
| D. | 70000 |
| Answer» D. 70000 | |
| 125. |
A characteristic of the data that binary search uses but the linear search ignores isthe___________. |
| A. | Length of the list. |
| B. | Order of the elements of the list |
| C. | Type of elements of the list |
| D. | Maximum value in list. |
| Answer» C. Type of elements of the list | |
| 126. |
The name of the protocol is unit in network layer |
| A. | frame |
| B. | Segment |
| C. | message |
| D. | datagram |
| Answer» E. | |
| 127. |
What are the values of C0 and C1 in d(t) = C1 C0t - 16t2, if d(1) = 4 and v(2) = -65? |
| A. | C0 = 1, C1 = -21 |
| B. | C0 = -1, C1 = 21 |
| C. | C0 = 0, C1 = 1 |
| D. | C0 = -1, C1 = 19 |
| Answer» C. C0 = 0, C1 = 1 | |
| 128. |
The cache memory of 1K words uses direct mapping with a block size of 4 words.How many blocks can the cache accommodate. |
| A. | 512 words. |
| B. | 256 words. |
| C. | 128 words. |
| D. | 1024 words. |
| Answer» C. 128 words. | |
| 129. |
If regular set A is represented by A = (01 1)* and the regular set \'B\' is represented by B = ((01)*1*)*, then |
| A. | B ⊂ A |
| B. | A ⊂ B |
| C. | A=B |
| D. | A and B are incomparable |
| Answer» D. A and B are incomparable | |
| 130. |
Coding and testing is done in following manner : |
| A. | Cross sectional |
| B. | Adhoc |
| C. | Top-clown |
| D. | Bottom-up |
| Answer» B. Adhoc | |
| 131. |
Which of the following respectively represent commutative law, Associative law and Distributive law ?I. A.(B C)=(A.B).CII. A.(B C)=A.B A.CIII. A B = B ACODES |
| A. | II, I and III |
| B. | I,III, and II |
| C. | III, I and II |
| D. | III, II and I |
| Answer» D. III, II and I | |
| 132. |
Internet requires |
| A. | a local area network |
| B. | an international agreement to connect computers |
| C. | a World Wide Web |
| D. | a commonly agreed set of rules to communicate between computers |
| Answer» E. | |
| 133. |
Internet uses |
| A. | Circuit switching |
| B. | Packet switching |
| C. | Telex switching |
| D. | Telephone switching |
| Answer» C. Telex switching | |
| 134. |
A full binary tree with 2n 1 nodes contain |
| A. | n non-leaf nodes |
| B. | n leaf nodes |
| C. | n-1 non-leaf nodes |
| D. | n-1 leaf nodes |
| Answer» B. n leaf nodes | |
| 135. |
Running time of NFA to DFA conversion including the case where NFA has e-transition i |
| A. | 0 (n332) |
| B. | 0 (n3) |
| C. | 0 (n22n) |
| D. | 0 (n32n) |
| Answer» E. | |
| 136. |
In multiple granularity level locking a transaction is locking a node in Exclusive write mode. At that mode what are the locks that are permitted. |
| A. | Intension – Exclusive lock |
| B. | Intension – share lock |
| C. | None of above |
| D. | Shared – Intension – Exclusive |
| Answer» D. Shared – Intension – Exclusive | |
| 137. |
Informational cohesion is a realization of |
| A. | structured programming |
| B. | data abstraction |
| C. | concurrency |
| D. | modularity |
| Answer» C. concurrency | |
| 138. |
A sort which relatively passes through a list to exchange the first element with any elementless than it and then repeats with a new first element is called |
| A. | selection sort. |
| B. | insertion sort. |
| C. | quick sort. |
| D. | heap sort. |
| Answer» D. heap sort. | |
| 139. |
Your evaluation shows the beneits out weight costs for a proposed system. Select the best fit foranswer : |
| A. | Feasibility study |
| B. | Cost/beneit analysis |
| C. | Benefits |
| D. | Feasibility |
| Answer» C. Benefits | |
| 140. |
Which of these is not a part of Synthesis phase |
| A. | Obtain address of a memory operand from the symbol table |
| B. | Obtain machine code corresponding to the mnemonic from the Mnemonics table |
| C. | Synthesize a machine instruction or the machine form of a constant |
| D. | Perform LC processing |
| Answer» E. | |
| 141. |
A combinational logic circuit which generates a particular binary word or number is |
| A. | Multiplexer |
| B. | Decoder |
| C. | Demultiplexer |
| D. | Encoder |
| Answer» B. Decoder | |
| 142. |
Floating point representation is used to store |
| A. | whole numbers |
| B. | Boolean values |
| C. | integers |
| D. | real integers |
| Answer» E. | |
| 143. |
A grammar will be meaningless |
| A. | if left hand side of a production is a single terminal |
| B. | if terminal set and non-terminal set are not disjoint |
| C. | all of these |
| D. | if left hand side of a production has no non terminal |
| Answer» D. if left hand side of a production has no non terminal | |
| 144. |
Adders |
| A. | is called so because a full adder involves two half-adders |
| B. | adds 2 bits |
| C. | All of these |
| D. | needs two input and generates two output |
| Answer» D. needs two input and generates two output | |
| 145. |
If a node in a BST has two children, then its inorder predecessor has |
| A. | no right child |
| B. | no left child |
| C. | no child |
| D. | two children |
| Answer» B. no left child | |
| 146. |
The [][]UL decomposition method is computationally more efficient than Naïve Gauss elimination for solving |
| A. | multiple sets of simultaneous linear equations with different coefficient matrices and the same right hand side vectors. |
| B. | a single set of simultaneous linear equations. |
| C. | less than ten simultaneous linear equations. |
| D. | multiple sets of simultaneous linear equations with the same coefficient matrix and different right hand side vectors. |
| Answer» E. | |
| 147. |
Which of the following are not a machine instructions |
| A. | ORG. |
| B. | MOV. |
| C. | (B) & (C). |
| D. | EN |
| Answer» D. EN | |
| 148. |
Which scheduling policy is most suitable for a time-shared operating system |
| A. | Elevator. |
| B. | Shortest-job First |
| C. | First-Come-First-Serve. |
| D. | Round-Robin |
| Answer» E. | |
| 149. |
If a node having two children is deleted from a binary tree, it is replaced by its |
| A. | Inorder successor |
| B. | Inorder predecessor |
| C. | None of the above |
| D. | Preorder predecessor |
| Answer» B. Inorder predecessor | |
| 150. |
\'n\' Flip flops will divide the clock frequency by a factor of |
| A. | n |
| B. | n2 |
| C. | log (n) |
| D. | 2n |
| Answer» D. 2n | |