0% found this document useful (0 votes)
109 views39 pages

MODEL ANSWER KEY - SFS-2014-computer Science - 20 - 1 - 2016

The document contains 60 multiple choice questions from a State Forest Service Examination for the subject of Computer Science. It provides the questions, possible answer choices, and the identified answer key for each question covering topics such as DBMS, computer hardware, programming languages, data structures, algorithms, databases, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views39 pages

MODEL ANSWER KEY - SFS-2014-computer Science - 20 - 1 - 2016

The document contains 60 multiple choice questions from a State Forest Service Examination for the subject of Computer Science. It provides the questions, possible answer choices, and the identified answer key for each question covering topics such as DBMS, computer hardware, programming languages, data structures, algorithms, databases, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

State Forest Service Examination - 2014

(Provisional Model Answer Key)


Computer Science

Q1 : In DBMS, data about data is stored in

A Hard Disk

B Data Dictionary

C RAM

D None of these

Answer Key: B

Q2 : Brain of the computer is

A RAM

B Input Device

C CPU

D Output Units

Answer Key: C

Q3 : Frame buffer is termed as

A Virtual Memory

B ROM

C I/O Buffer

D Video Memory

Answer Key: D

Q4 : Data converted into meaningful form is termed as

A File

B Directory

C Information

D None of these
Answer Key: C

Q5 : PARAM is an example of ______ Computer

A Mainframe

B Mini

C Super

D Personal

Answer Key: C

Q6 : SQL is a ______ Query language

A Procedural

B Non procedural

C Intermediate

D None of these

Answer Key: B

Q7 : _________system software that coverts assembly language program to machine language

A Compiler

B Interpreter

C Assembler

D Loader

Answer Key: C

Q8 : Which of the following device is used to get hardcopy graphics?

A Light Pen

B Plotter

C Monitor

D Joystick

Answer Key: B

Q9 : Information stored in computer is in


A Hexadecimal form

B Integer form

C Binary form

D Character form

Answer Key: C

Q10 Convert (0.4375)10 = (?)2


:

A 0.010

B 0.1010

C 0.0111

D 0.1110

Answer Key: C

Q11 Subschema can be created using following SQL statement


:

A Create Index

B Create Table

C Create View

D None of these

Answer Key: C

Q12 Binary addition of 10100 and 1111 is


:

A 100111

B 100011

C 101110

D 100010

Answer Key: B

Q13 In ‘C’ Programming language, dynamic memory is allocated using


:
A Structures

B Arrays

C Pointers

D Queues

Answer Key: C

Q14 Which of the following memory is refreshed a number of times per second?
:

A Hard disk

B RAM

C ROM

D Dynamic RAM

Answer Key: D

Q15 Time taken to position the Read/Write head at the desired track of disk is known as
:

A Access time

B Seek time

C Latency time

D Data transfer time

Answer Key: B

Q16 Which of the following symbols are used in Assembly Language?


:

A Tags

B Numbers

C Characters

D Mnemonics

Answer Key: D

Q17 DMA controller is used in a computer to transfer the data


:
A From main memory to CPU

B From hard disk to main memory

C From ROM to RAM

D All options are correct

Answer Key: B

Q18 ________ are universal gates


:

A NOT, OR

B NAND, NOR

C XOR, NOT

D XNOR, AND

Answer Key: B

Q19 1 TB =______ Byte :


:

A 220

B 230

C 240

D 250

Answer Key: C

Q20 ________ is used for storing programs that are not to be changed
:

A ROM

B RAM

C Monitor

D Cache Memory

Answer Key: A

Q21 Which one of the following is the fastest secondary storage device in a computer system?
:
A Hard disk

B Magnetic Tape

C CD

D Pen drive

Answer Key: A

Q22 EEPROM can be erased by exposing it to


:

A Magnetic field

B Electric charge

C Sun Light

D Ultraviolet radiation

Answer Key: B

Q23 In 8085, two buffer registers are


:

A Instruction Register, accumulator

B Address buffer, Address data buffer

C Address buffer, Instruction Register

D DAA, address data register

Answer Key: B

Q24 Conceptual design of the database is done with the help of


:

A Data marts

B Data models

C DFD

D Flowchart

Answer Key: B

Q25 A step by step procedure used to solve a problem is called


:
A Flowchart

B Data flow Diagram

C System Program

D Algorithm

Answer Key: D

Q26 Primary means of searching the records from database is called as


:

A Candidate Key

B Primary Key

C Foreign Key

D Alternate Key

Answer Key: B

Q27 Which of the following is a range value of unsigned type variable is ‘C’?
:

A -32768 to +32767

B 0 to 32767

C -32767 to 0

D 0 to 65535

Answer Key: D

Q28 What is the Output of the following C Program?


:
void main ( )

int i=6;

Printf (“\n %d %d”, ++i, ++i);

A 78

B 87

C 88
D Output many vary from computer to computer

Answer Key: A

Q29 What is the output for the following ‘C’ code?


:
Void main ( )

float i = 0.9;

if ( i < 0.9 )

printf (“Good”);

else

printf (“very good”);

A Good

B very good

C 0.9

D Printf

Answer Key: B

Q30 Which of the following C statement is used to print the values of a, b and c?
: int a = 27;

float b = 5.14;

double c =5.24;

A printf (“%d %f %f ”, a,b,c) ;

B printf (“%d %f %lf ”, a,b,c) ;

C printf (“%d %f %d”, a,b,c) ;

D printf (“%lf %f %f ”, a,b,c) ;

Answer Key: B

Q31 String in ‘C’ is a set of ______


:

A Numbers
B Characters

C Floating point numbers

D None of these

Answer Key: B

Q32 “Continue” keywords in ‘C’ is used to transfer the control to the beginning of
:

A loop

B program

C if statement

D main() function

Answer Key: A

Q33 Which of the following is the default return type of a function in ‘C’?
:

A float

B int

C char

D void

Answer Key: D

Q34 The execution of a ‘C’ program starts from


:

A scanf() function

B main() function

C library function

D do-while loop

Answer Key: B

Q35 8085 include auxiliary carry flag as _______flag


:

A Third
B Fourth

C Fifth

D Sixth

Answer Key: C

Q36 In ‘C’ which notation used as preprocessor directive?


:

A %

B ||

C #

D !

Answer Key: C

Q37 When parameters are passed in functions of a ‘C’ program, which method uses pointers?
:

A Call by value

B Call by reference

C Call by return

D None of these

Answer Key: B

Q38 A function of a ‘C’ program cannot return more than


:

A One value

B Two values

C Three values

D Four values

Answer Key: A

Q39 Full form of BIOS is


:

A Bigger Input or Smaller


B Basic Input and Output Sum

C Better Input and Output System

D Basic Input Output System

Answer Key: D

Q40 In ‘C’ language, System level programming can be done easily because it facilitates
:

A Binary operators

B Bit wise operators

C Logical operators

D None of these

Answer Key: B

Q41 Union in ‘C’ is


:

A Used to store different members at same memory location

B A primitive data type

C A text file

D A variable of long integer type

Answer Key: A

Q42 Commonly used function for direct/random access file in ‘C’ is


:

A fread()

B fseek()

C ftell()

D All options are correct

Answer Key: D

Q43 Which of the following linear data structure allow both insertion and deletion at only one end?
:

A Queue
B Stack

C Circular queue

D Tree

Answer Key: B

Q44 From which end of the Queue elements are deleted?


:

A Rear

B Front

C Middle

D Any Position

Answer Key: B

Q45 The access of queue element is


:

A Sequential

B Random

C Direct

D Indexed

Answer Key: A

Q46 Which searching algorithm need sorted list?


:

A Sequential search

B Hashing

C Binary Search

D None of these

Answer Key: C

Q47 Which term does not relate to stack?


:

A FIFO
B LIFO

C POP

D PUSH

Answer Key: A

Q48 Liner type data structure is


:

A Strings

B Arrays

C Queue

D All options are correct

Answer Key: D

Q49 Postfix notation for A + (B*C) - D is as follows


:

A ABC*D-+

B A+BC*-D

C AB+C*-D

D None of these

Answer Key: A

Q50 Postfix notational expressions are stored in the following data structure
:

A Queue

B linked list

C Stack

D Doubly linked list

Answer Key: C

Q51 A Dequeue allows


:

A Insertion at only one end but deletion at both ends


B Insertion at both ends but deletion at one end

C Both (insertion at only one end but deletion at both ends) and (insertion at both ends but etion at one end)

D Insertion and deletion in middle but not at either ends

Answer Key: C

Q52 Properties of Binary search Tree (BST) are


:

A It is a Binary Tree

B All items in the left subtree are less than root

C All items in the right subtree are greater than root

D All options are correct

Answer Key: D

Q53 A full binary tree with n leaves contains


:

A n nodes

B log2n nodes

C 2n-1 nodes

D 2n nodes

Answer Key: C

Q54 Static queue is implemented using


:

A Pointers

B Nodes

C Arrays

D None of these

Answer Key: C

Q55 The complexity of Merge Sort algorithm is


:

A O(n)
B O(log2n)

C O(n2)

D O(nlog2n)

Answer Key: D

Q56 The complexity of bubble sort algorithm is


:

A O(n)

B O(log2n)

C O(n2)

D O(nlog2n)

Answer Key: C

Q57 Stack data structure is used in


:

A Garbage collection

B Pointer manipulation

C Recursion

D None of these

Answer Key: C

Q58 Linked lists are best suited


:

A For relatively permanent collection of data

B For the dynamic allocation of data

C For the insertion of data at one end

D When data accesses is done at one end

Answer Key: B

Q59 A database file must ensure following properties


:

A Data consistency
B Data integrity

C Both (Data consistency) and (Data integrity)

D None of these

Answer Key: C

Q60 A relational database is a


:

A Set of tuples

B Set of nodes in tree form

C Set of nodes in hierarchichal form

D None of these

Answer Key: A

Q61 In DBMS, Network model is based on


:

A Linked list

B Graph

C Tree

D Queue

Answer Key: B

Q62 A database always requires


:

A Secondary storage device

B Only primary storage device

C DMA controller

D None of these

Answer Key: A

Q63 E-R diagram can be transformed to


:

A Objects and classes


B Tables

C Arrays

D None of these

Answer Key: B

Q64 A weak entity set is a


:

A Entity set whose existence depends on another weak entity set

B Entity set whose existence depends on another strong entity set

C Entity set whose existence dependency does not matter

D None of these

Answer Key: B

Q65 Referential Integnity constraint can be enforced by designing


:

A Foreign key with respect to primary key of another table

B Subset of a single table

C Index with respect to primary key of another table

D None of these

Answer Key: A

Q66 Which operator is not basic relational algebric operator?


:

A Select ( p( ))

B Project ( A1A2)

C Cartesian product (A x B)

D Division

Answer Key: D

Q67 ''NOT NULL'' keyword in SQL is used


:

A As constrainst
B When value is unknown

C When value is missed during insertaion

D All options are correct

Answer Key: D

Q68 A relation contains atomic values of the attributes, then relation is said to be in
:

A 1 NF

B 2 NF

C 3 NF

D 4 NF

Answer Key: A

Q69 In ACID properties of transactions processing, 'C' stands for


:

A Consistency

B Cordinality

C Conefirmity

D None of these

Answer Key: A

Q70 Data security risk do not include


:

A Privacy of communication protocol

B Data tempering

C Password guessing

D Data theft

Answer Key: A

Q71 Encryption is a technique


:

A To design conceptual schema


B To translate global data

C To provide privacy of data

D To update database

Answer Key: C

Q72 The goal of normalization is to eliminate


:

A Insertion anamoly

B Deletion anamoly

C Update anamoly

D All options are correct

Answer Key: D

Q73 Which of the following is a recovery technique?


:

A Public key encryption

B Shadow paging

C Hash file organization

D Indexed file organization

Answer Key: B

Q74 A relation is in 4NF if it is in 3NF and contains


:

A No multi-valuved dependency

B No non prime attribute is transitively dependent on the key

C No lossy decomposition

D Every nonkey attrubutes is fully dependent on the primary key

Answer Key: A

Q75 Full form of DDL in SQL is


:

A Data directed language


B Data definition language

C Data density language

D None of these

Answer Key: B

Q76 A database can be inconsistent due to


:

A Atomicity

B Redundancy

C Efficiency

D All options are correct

Answer Key: B

Q77 In order to have multi-valued dependency on the table, it must have


:

A Only one attribute

B NULL or one attribute

C Two or more attributes

D Less than two attributes

Answer Key: C

Q78 Which of the following is object oriented programming language?


:

A C

B Pascal

C COBOL

D C++

Answer Key: D

Q79 SQL is developed to support


:

A Hierarchichal database
B Relational database

C Network database

D A simple data file

Answer Key: B

Q80 SQL provides


:

A Controlling access to database

B Providing facility for integrity constraints

C Query on database files

D All options are correct

Answer Key: D

Q81 Which of the following is not a DDL command of SQL?


:

A Create table

B Alter

C Drop

D Insert

Answer Key: D

Q82 DML commands of SQL allows


:

A Deletion of tuples from table(s)

B Definition of table(s)

C Creation of views

D None of these

Answer Key: A

Q83 Transaction in a database should be


:

A Atomic
B Durable

C Consistent

D All options are correct

Answer Key: D

Q84 Natural join operator of relational Algebra, joins _____ tables at a time
:

A Three

B Four

C Two

D Five

Answer Key: C

Q85 Which of the following is not a Set operator in SQL?


:

A Like

B Union

C Intersection

D Minus

Answer Key: A

Q86 Which of the following is the property of object oriented programming?


:

A Polymorphism

B Data encapsulation

C Operator overloading

D All options are correct

Answer Key: D

Q87 The header file iostream.h is included in C++ program to use


:

A return()
B Input/output functions

C main()

D Run operation

Answer Key: B

Q88 In C++, size of character array should be _______ the number of characters in the string
:

A One larger than

B One less than

C Two larger than

D Two less than

Answer Key: A

Q89 Member function of a class in C++ can be called by an object of that class using
:

A Dot operator

B Ternary operator

C Relational operator

D Scope resolution operator

Answer Key: A

Q90 Which of the following is an insertion operator in C++?


:

A >>

B &

C <<

D !

Answer Key: C

Q91 What value is displayed in the following C++ example?


:
float fees[5] ={32.15, 45.23, 52.43, 82.15, 97.05};
cout << fees[2];
A 0

B 45.23

C 52.43

D 82.15

Answer Key: C

Q92 Which of the following operators can be overloaded in C++?


:

A Relational operator

B Dot operator

C Scope resolution operator

D Point to member operator

Answer Key: A

Q93 'In-line' function may not work when


:

A Function contains static variable

B Function is recursive

C Function not returning value, if a return exists

D All options are correct

Answer Key: D

Q94 Inheriting the attributes of two or more existing classes at same level for defining new class is known as
:

A Multilevel inheritance

B Multiple inheritance

C Hybrid inheritance

D All options are correct

Answer Key: B

Q95 Reusability of code in C++ programs is justified with the following feature
:
A Information binding

B Data abstraction

C Data encapsulation

D Inheritance

Answer Key: D

Q96 Which class cannot be instantiated?


:

A Inherited class

B Public class

C Private class

D Virtual class

Answer Key: D

Q97 In C++, “?” is a :


:

A Unary operator

B Binary operator

C Ternary operator

D None of these

Answer Key: C

Q98 Which one of the following keywords is used for memory allocation in C++?
:

A Malloc

B Calloc

C New

D Free

Answer Key: C

Q99 Which statement is true about destructor in C++?


:
A Destroy the objects when no longer requires

B Create and use constant objects

C Used in classes to display the class contents

D All options are correct

Answer Key: A

Q100 In C++, virtual function is defined and declared in


:

A Derived class

B Base class

C Derived object

D Destructor

Answer Key: B

Q101 In C++, member function with the same name in two different classes is
:

A Not allowed

B Allowed

C Only if the two classes have same name

D Both (Not allowed) and (Only if the two classes have same name)

Answer Key: B

Q102 Which of the following cannot be passed to a function in C++?


:

A Variable

B Arrays

C Class objects

D Header files

Answer Key: D

Q103 “Run time binding” is the term used in C++. Its synonym is
:
A Virtual function

B Instantiation

C Polymorphism

D None of these

Answer Key: C

Q104 Which entity occupies space in memory during C++ program execution?
:

A Class

B Virtual class

C Public class

D Object

Answer Key: D

Q105 Which language is not an object oriented programming language?


:

A C++

B Java

C Small talk

D C

Answer Key: D

Q106 In C++, information hiding is achieved through


:

A Polymorphism

B Type Conversion

C Data encapsulation

D None of these

Answer Key: C

Q107 During Program execution in C++, “divide by Zero” error can be handled by
:
A Polymorphism

B Data encapsulation

C Exception handling

D None of these

Answer Key: C

Q108 The feature supported by inheritance in C++ is


:

A Characteristics of super class are inherited to subclass

B Member functions are inherited at subclass

C Member functions can be redefining at subclass

D All options are correct

Answer Key: D

Q109 In C++, the operator overloading is an example of


:

A Polymorphism

B Inheritance

C Encapsulation

D Data hiding

Answer Key: A

Q110 The purpose of OSI model, specifying various layers is


:

A The rate of data transfer increasing exponentially

B Standard needed to allow any two system to communicate

C Standard needed for internet protocols

D Standard needed for Wireless networking

Answer Key: B

Q111 The reason of dividing OSI model in terms of number of layers is


:
A Ease the implementation of protocols for communication between systems

B Ease the browsing of internet

C Ease the programming storage

D None of these

Answer Key: A

Q112 First layer of OSI reference model is known as


:

A Physical layer

B Session layer

C Transport layer

D Network layer

Answer Key: A

Q113 _______ layer of OSI reference model is responsible to determine the interface of the system with the user
:

A Application

B Transport

C Session

D Data link

Answer Key: A

Q114 ‘Internet’ is an example of


:

A LAN

B MAN

C WAN

D None of these

Answer Key: C

Q115 If a computer network cable is broken, whole network goes down in _____ topology
:
A Star

B Ring

C Mesh

D All options are correct

Answer Key: B

Q116 Which of the following is a most reliable topology?


:

A Bus

B Star

C Ring

D Mesh

Answer Key: D

Q117 Hierarchical topology is used to establish a network which is also known as


:

A Bus network

B Star network

C Tree network

D Mesh network

Answer Key: C

Q118 MAN stands for


:

A Machine Area Network

B Metropolitan Area Network

C Metropolitan Asynchronous Network

D Machine Asynchronous Network

Answer Key: B

Q119 Which of the following component is responsible for network communication in a computer system?
:
A UPS

B Ethernet card

C SVGA card

D SMPS

Answer Key: B

Q120 Which of the following has minimum transmission speed?


:

A Twisted pair wire

B Fiber optic cable

C Coaxial cable

D Microwave

Answer Key: A

Q121 Speed of internet connection is measured in


:

A Kilo bits per second

B Kilo Boolean per second

C Meter per second

D None of these

Answer Key: A

Q122 Error correction can be done by using


:

A Hamming code

B CRC

C Framing

D Two dimensional parity check

Answer Key: A

Q123 TCP/IP is an example of


:
A Communication protocol

B Networking protocol

C Data transfer protocol

D All options are correct

Answer Key: D

Q124 In a computer network, which of the following is a connecting device?


:

A Router

B Hub

C Switch

D All options are correct

Answer Key: D

Q125 _________ is a device that combines transmission from various I/O devices into one line
:

A Modifier

B Multiplexer

C Concentrator

D Gateway

Answer Key: B

Q126 The amount of data transmitted in a fixed amount of time is called


:

A Refresh rate

B Resolution

C Bandwidth

D Frequency

Answer Key: C

Q127 During data transmission, parity bits are attached with data bits for detecting
:
A Buffer size

B Destination

C Errors

D None of these

Answer Key: C

Q128 In communication satellite, multiple repeaters are known as


:

A Detector

B Modulator

C Stations

D Transponders

Answer Key: D

Q129 ‘Communication protocol’ means


:

A Data transformation

B Set of rules to communicate data from one machine to another machine

C Transmission signals

D None of these

Answer Key: B

Q130 At network layer, the data packet is known by name


:

A Frame

B Packet

C Datagram

D Circuit

Answer Key: B

Q131 A network using ______ technique is called a store and forward network
:
A Circuit switching

B Message switching

C Packet switching

D Both (Circuit switching) and (Message switching)

Answer Key: B

Q132 File server is a _______ which is used to store files received from various client machines
:

A Specialized computer system

B Modem

C Router

D Transponder

Answer Key: A

Q133 HTTP stands for


:

A Hyper Text Transfer Protocol

B Hyper Text Transmission Protocol

C Hyper Text Tie up Protocol

D Hyper Thing Together Protocol

Answer Key: A

Q134 IP address consists of _______ parts separated by dots


:

A 2

B 3

C 4

D 1

Answer Key: C

Q135 Domain name matching to IP address is performed by


:
A Electronic mail

B URL

C DNS

D FTP

Answer Key: C

Q136 Which of the following protocol(s) is/are used by HTTP?


:

A FTP

B SMTP

C POP

D All options are correct

Answer Key: D

Q137 For accessing the details of reservation on Online Indian Railway reservation system, following task is being done
: on the system

A Accessing website

B Accessing word processing software

C Accessing spread sheet software

D None of these

Answer Key: A

Q138 Which of the following resources is identified by URL?


:

A Image

B Webpage

C Sound file

D All options are correct

Answer Key: D

Q139 HTTP is based on


:
A Deductive principle

B Hierarchical principle

C Client Server principle

D Object oriented principle

Answer Key: C

Q140 Which of the following is connectionless transport layer protocol?


:

A TCP

B FTP

C NNTP

D UDP

Answer Key: D

Q141 Which of the following is a character oriented data link protocol?


:

A SDLC

B BISYNC

C HDLC

D All options are correct

Answer Key: B

Q142 Web pages are written by using following language


:

A C

B Pascal

C HTML

D None of these

Answer Key: C

Q143 A JAVA program cannot be written without using


:
A Procedure

B Tag

C Class

D None of these

Answer Key: C

Q144 Which one is the largest HTML heading tag?


:

A H1

B H2

C H3

D H4

Answer Key: A

Q145 What is the full form ISP?


:

A Internet system provider

B Internet sequential programming

C Internet service provider

D None of these

Answer Key: C

Q146 Which of the following is used to create dynamic content on the web page?
:

A GML

B DHTML

C COBOL

D C++

Answer Key: B

Q147 In HTML, tag < sup > is used for


:
A Subscript

B Superscript

C Strike out

D Setting margin

Answer Key: B

Q148 Public key algorithms are used for


:

A Storage of information

B Information exchange

C Information security

D None of these

Answer Key: C

Q149 Which of the following function is not performed by the operating system?
:

A Processor management

B Constraint satisfaction

C Deadlock handling

D File management

Answer Key: B

Q150 Firewall is software which is normally installed on the _______ of organization


:

A Google server

B Client machine

C Proxy server

D None of these

Answer Key: C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy