0% found this document useful (0 votes)
67 views37 pages

15th September

The document contains a series of multiple-choice questions covering various topics in computer science, including audio compression, binary operations, data structures, software engineering, and network protocols. Each question presents a scenario or concept, followed by four answer options. The questions are designed to test knowledge and understanding of fundamental computing principles and practices.

Uploaded by

ramshankarroy07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views37 pages

15th September

The document contains a series of multiple-choice questions covering various topics in computer science, including audio compression, binary operations, data structures, software engineering, and network protocols. Each question presents a scenario or concept, followed by four answer options. The questions are designed to test knowledge and understanding of fundamental computing principles and practices.

Uploaded by

ramshankarroy07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1.

Audio compression can be used for_____


ऑडियो संपीड़न का उपयोग _____ के डिए डकया जा सकाा ै
(a) voice and data
(b) video and voice
(c) speech or music
(d) picture and colors
2. ____ is basically a form of pictorial presentation.
____ मूिाः डित्रात्मक प्रस्ाुडा का एक रूप ै।
(a) Photography
(b) Animations
(c) Drawing
(d) Creativity
3. Consider two binary numbers A = 110001 and B = 001100. What
is the result of (A and B) OR (NOT A AND NOT B) ?
दो बाइनरी संख्याओं A = 110001 और B = 001100 पर डििार करें । (A और B) या
(NOT A और NOT B) का पररणाम क्या ै?
(a) 000000
(b) 110001
(c) 001100
(d) 111101
4. What is the minimized expression for the Boolean function F(A, B, C, D)
= Σ(0, 1, 2, 4, 5, 6, 10, 12, 13) using the K-map method?
5. The minimum number of edges in a spanning tree of a connected
graph with “n” vertices is:
“n” शीर्षों िािे एक संयोडजा ग्राफ के फिे ैु ए िक्ष
ृ में डकनारों क ्यूनाम संख्या ै:
(a) n
(b) n-1
(c) n+1
(d) n(n-1) /2
6. In pointer implementation of linked lists, which operation can be
performed in constant time (O(1) ) when inserting or deleting nodes?
Linked List के पॉइंटर कायाा ्ियन में , नोड्स को सडममडिा या ैटााे समय कौन सा
ऑपरे शन डनरं ार समय (O(1)) में डकया जा सकाा ै?
(a) Inserting at the beginning
(b) Inserting at the end
(c) Inserting at a specific position
(d) Deleting a specific node
7. For a 2-D array represented in row-major order, the index formula to
access the element at row “i” and column “j” using the base address “B” is:
पंडि-प्रमुख क्रम में दशाा ए गए 2-िी सरणी के डिए, आधार पाा "B" का उपयोग करके पंडि
"i" और स्ांभ "j" पर ात्ि ाक पैु ंिने के डिए सूिकांक सूत्र ै:
(a) Index = B + (i * n+j)
(b) Index = B + (j * n+i)
(c) Index = B + (i +j)
(d) Index = B + (i* m+j)
8. In general, a file is basically a collection of all related____.
सामा्याः, एक फाइि मूिाः सभी संबंडधा ____ का संग्रै ैोाी ै।
(a) Rows & Columns
(b) Database
(c) Fields
(d) Records
9. Which of the following refers to the number of attributes in a relation?
डनमनडिडखा में से कौन सा संबंध में डिशेर्षााओं क संख्या को संदडभा ा कराा ै?
(a) Row
(b) Degree
(c) Column
(d) All of the above
10. Process-to-process communication involves communication between:
प्रडक्रया-से-प्रडक्रया संिार में डनमनडिडखा के बीि संिार शाडमि ैोाा ै:
(a) Different network layers
(b) Different devices on the same network
(c) Devices using different protocols
(d) Process on different devices
11. The term HTTP stand for:
(a) Hyper Terminal Tracing Program
(b) Hypertext Tracing Program
(c) Hypertext Transfer Protocol
(d) Hypertext Tracing Protocol
12. Which software life cycle model is based on iterative prototyping?
कौन सा सॉफ्टिेयर जीिन िक्र मॉिि पुनराित्त
ृ प्रोटोटाइडपंग पर आधाररा ै?
(a) Waterfall model
(b) Spiral model
(c) Agile model
(d) Prototype model
13. ISO 9000 and SEI CMM are both frameworks related to:
आईएसओ 9000 और एसईआई सीएमएम दोनों ैी डनमनडिडखा से संबंडधा ्ेमिका ैं:
(a) Software testing
(b) Software documentation
(c) Software quality assurance and process improvement
(d) Software design principles
14. What is the term for defining multiple methods in a class with the
same name but different parameters?
एक ैी नाम िेडकन अिग-अिग परामीटर िािे क्लास में कई डिडधयों को पररभाडर्षा करने
के डिए क्या शब्द ै?
(a) Overriding
(b) Overloading
(c) Inheriting
(d)Inheritance
15. The language accepted by Push down Automation:
पुश िाउन ऑटोमे शन द्वारा स्िीकृा भार्षा:
(a) Recursive Language
(b) Context free language
(c) Linearly Bounded language
(d) All of the mentioned
16. Which among the following is best example of semantic network?
डनमनडिडखा में से कौन सा डसमें डटक नेटिका का सबसे अच्छा उदाैरण ै?
(a) Wordnet
(b) Human Food Chain
(c) MYSIN
(d) Autonomous car driver
17. Which of the following is not a Characteristics of Expert Systems?
डनमनडिडखा में से कौन डिशेर्षज्ञ प्रणाडियों क डिशेर्षाा नैीं ै?
(a) Understandable
(b) Highly responsive
(c) Unreliable
(d) High performance
18. Unclassified email is called?
अिगीकृा ईमे ि को क्या कैा जााा ै?
(a) Extra mail
(b) Spam
(c) Junk mail
(d) None of the above
19. Which of the following is the abbreviation of JPEG?
(a) Joint Photographic Experts Group
(b) Joint Photographs Expansion Group
(c) Joint Photographic Expanded Group
(d) Joint Photographic Expansion Group
20. When adding two positive binary numbers using the 2’s complement
method, if the result has a carry-out from the most significant bit (MSB) ,
what should be done?
(a) Ignore the carry
(b) Add the carry to the least significant bit (LSB)
(c) Add the carry to the sign bit
(d) Subtract the carry-from the MSB
21. In the context of the All-pair Shortest Paths algorithm, what does
the term “transitive property” refer to?
(a) The property of having a cycle path
(b) The property of having all vertices connected to each other
(c) The property of being able to reach one vertex from another
(d) The property of a path being shorter than another path
22. In a Binary Search Tree (BST) , the operation of deleting a node
with one child involves:
बाइनरी सिा ट्री (BST) में , एक िाइल्ि िािे नोि को ैटाने के ऑपरे शन में शाडमि ै:
(a) Removing the node and replacing it with its left child
(b) Removing the node and replacing it with its right child
(c) Removing the node and replacing it with its parent
(d) Removing the node and leaving the subtree unaltered
23. Counting Sort is particularly efficient for sorting arrays where the range
of elements is:
गणना सॉटा डिशेर्ष रूप से उन सरडणयों को सॉटा करने के डिए कुशि ै जैां ात्िों क सीमा ै:
(a) Very large
(b) Very small
(c) Constant
(d) Sorted
24. What is the primary function of SNMP (Simple Network
Management Protocol) ?
SNMP (डसंपि नेटिका मनेजमें ट प्रोटोकॉि) का प्राथडमक काया क्या ै?
(a) File transfer
(b) Remote terminal access
(c) Network management and monitoring
(d) Web browsing
25. Frame design in the Data Link Layer includes:
िे टा डिंक परा में फ़्रेम डिजाइन में शाडमि ैं:
(a) Deciding the routing path for data packets
(b) Defining the structure of data frames
(c) Assigning IP addresses to devices
(d) Setting the data transmission rate
26. TCP regulates the end-to-end packet flow by use of:
टीसीपी डनमनडिडखा के उपयोग द्वारा अंा-से-अंा पकेट प्रिाै को
डनयंडत्रा कराा ै:
(a) Source quench messages
(b) A window size advertisement
(c) Fixed size segments
(d) Binary exponential backoff
27. What is the primary purpose of Software Requirements Specification
(SRS) documents?
सॉफ्टिेयर आिश्यकाा डिडनदेश (एसआरएस) दस्ाािेजों का प्राथडमक उद्दे श्य क्या ै?
(a) To list the programming languages used
(b) To describe the user Interface design
(c) To define the software’s functional and non-functional requirements
(d) To specify the hardware components required
28. What is encapsulation in OOP?
OOP में एनकप्सुिेशन क्या ै?
(a) The ability to inherit properties from multiple classes
(b) The process of creating objects
(c) The bundling of data and methods that operate on the data
(d) The use of abstract classes only
29. What is the purpose of CSS media queries?
CSS मीडिया क्वेरीज का उद्दे श्य क्या ै?
(a) To add multimedia content to a webpage
(b) To create animations
(c) To apply different styles based on the device’s characteristics
(d) To define color schemes for a website
30. How can you make an asynchronous request to a server in JavaScript?
आप जािा डस्क्रप्ट में डकसी सिा र से एडसंक्रोनस अनुरोध कसे कर सकाे ैं?
(a) Using the “async” keyword
(b) Using the “await” keyword
(c) Using the fetch PI or XLHtpRquest
(d) By defining a callback finction
31. What is the purpose of SQL injection attacks?
SQL इंजेक्शन ैमिों का उद्दे श्य क्या ै?
(a) To increase the performance of database queries
(b) To bypass authentication systems
(c) To improve database security
(d) To enhance data encryption
32. A grammar that produces more than one parse tree for the same
sentence is called:
िै व्याकरण जो एक ैी िाक्य के डिए एक से अडधक पासा िक्ष
ृ उत्पन्न कराा ै, उसे कैाे
ैं:
(a) Contiguous
(b) Ambiguous
(c) Unambiguous
(d) Regular
33. The minimum number of productions required to produce a
language consisting of palindrome strings over Σ = {a, b} is
Σ = {a, b} पर पडिंड्रोम डस्ट्रंग्स से युि भार्षा का डनमाा ण करने के डिए आिश्यक
्यूनाम उत्पादनों क संख्या ै
(a) 3
(b) 7
(c) 5
(d) 6
34. Which of the following is true for the language: {ap| p is a prime}
डनमनडिडखा में से कौन सा भार्षा के डिए सत्य ै: {ap| p एक अभाज्य संख्या ै}
(a)It is regular but not context-free
(b) It is neither regular nor context-free, but accepted by a Turing
machine
(c)It is not accepted by a Turing Machine
(d)It is context-free but not regular
35. Which products are people most likely to be more uncomfortable buying
on the Internet?
इंटरनेट पर डकन उत्पादों को खरीदने में िोगों को सबसे अडधक असैजाा मैसूस ैोाी ै?
(a) Books
(b) Movie ticket
(c) Furniture
(d) None of the above
Thanks

You might also like