General Computer Knowledge

View in English View in Hindi

A Dequeue allows

A)
Insertion at only one end but deletion at both ends

B)
Insertion at both ends but deletion at one end

C)
Both (insertion at only one end but deletion at both ends) and (insertion at both ends but deletion at one end)

D)
Insertion and deletion in middle but not at either ends


Correct Answer :

Both (insertion at only one end but deletion at both ends) and (insertion at both ends but deletion at one end)

A full binary tree with n leaves contains

A)
n nodes

B)
log2n nodes

C)
2n-1 nodes

D)
2n nodes


Correct Answer :

2n-1 nodes

The complexity of Merge Sort algorithm is

A)
O(n)

B)
O(log2n)

C)
O(n2)

D)
O(nlog2n)


Correct Answer :

O(nlog2n)

The complexity of bubble sort algorithm is

A)
O(n)

B)
O(log2n)

C)
O(n2)

D)
O(nlog2n)


Correct Answer :

O(n2)

Stack data structure is used in

A)
Garbage collection

B)
Pointer manipulation

C)
Recursion

D)
None of these


Correct Answer :

Recursion

Linked lists are best suited

A)
For relatively permanent collection of data

B)
For the dynamic allocation of data

C)
For the insertion of data at one end

D)
When data accesses is done at one end


Correct Answer :

For the dynamic allocation of data

A relational database is a

A)
Set of tuples

B)
Set of nodes in tree form

C)
Set of nodes in hierarchichal form

D)
None of these


Correct Answer :

Set of tuples

E-R diagram can be transformed to

A)
Objects and classes

B)
Tables

C)
Arrays

D)
None of these


Correct Answer :

Tables

A weak entity set is a

A)
Entity set whose existence depends on another weak entity set

B)
Entity set whose existence depends on another strong entity set

C)
Entity set whose existence dependency does not matter

D)
None of these


Correct Answer :

Entity set whose existence depends on another strong entity set

In ACID properties of transactions processing, 'C' stands for

A)
Consistency

B)
Cordinality

C)
Conefirmity

D)
None of these


Correct Answer :

Consistency

Encryption is a technique

A)
To design conceptual schema

B)
To translate global data

C)
To provide privacy of data

D)
To update database


Correct Answer :

To provide privacy of data

Full form of DDL in SQL is

A)
Data directed language

B)
Data definition language

C)
Data density language

D)
To update database


Correct Answer :

Data definition language

A database can be inconsistent due to

A)
Atomicity

B)
Redundancy

C)
Efficiency

D)
All options are correct


Correct Answer :

Redundancy

SQL is developed to support

A)
Hierarchichal database

B)
Relational database

C)
Network database

D)
A simple data file


Correct Answer :

Relational database

Which of the following is the property of object oriented programming?

A)
Polymorphism

B)
Data encapsulation

C)
Operator overloading

D)
All options are correct


Correct Answer :

All options are correct

Member function of a class in C++ can be called by an object of that class using

A)
Dot operator

B)
Ternary operator

C)
Relational operator

D)
Scope resolution operator


Correct Answer :

Dot operator

What value is displayed in the following C++ example?
float fees[5] ={32.15, 45.23, 52.43, 82.15, 97.05};
cout << fees[2];

A)
0

B)
45.23

C)
52.43

D)
82.15


Correct Answer :

52.43

Reusability of code in C++ programs is justified with the following feature

A)
Information binding

B)
Data abstraction

C)
Data encapsulation

D)
Inheritance


Correct Answer :

Inheritance

Which one of the following keywords is used for memory allocation in C++?

A)
Malloc

B)
Calloc

C)
New

D)
Free


Correct Answer :

New

Which statement is true about destructor in C++?

A)
Destroy the objects when no longer requires

B)
Create and use constant objects

C)
Used in classes to display the class contents

D)
All options are correct


Correct Answer :

Destroy the objects when no longer requires

“Run time binding” is the term used in C++. Its synonym is

A)
Virtual function

B)
Instantiation

C)
Polymorphism

D)
None of these


Correct Answer :

Polymorphism

Which language is not an object oriented programming language?

A)
C++

B)
Java

C)
Small talk

D)
C


Correct Answer :

C

In C++, the operator overloading is an example of

A)
Polymorphism

B)
Inheritance

C)
Encapsulation

D)
Data hiding


Correct Answer :

Polymorphism

The reason of dividing OSI model in terms of number of layers is

A)
Ease the implementation of protocols for communication between systems

B)
Ease the browsing of internet

C)
Ease the programming storage

D)
None of these


Correct Answer :

Ease the implementation of protocols for communication between systems

First layer of OSI reference model is known as

A)
Physical layer

B)
Session layer

C)
Transport layer

D)
Network layer


Correct Answer :

Physical layer

Latest Updates