0% found this document useful (0 votes)
54 views8 pages

My FE OQ2

This document contains 20 multiple choice questions about computer science topics such as logic, binary, algorithms, and computer architecture. The questions cover a range of fundamental CS concepts and each includes 4 possible answer choices with one correct answer indicated.

Uploaded by

Tay Za
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views8 pages

My FE OQ2

This document contains 20 multiple choice questions about computer science topics such as logic, binary, algorithms, and computer architecture. The questions cover a range of fundamental CS concepts and each includes 4 possible answer choices with one correct answer indicated.

Uploaded by

Tay Za
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

2019 A

1.For logical variables p and q, which of the following is a logical expressions that evaluates to true for
any values of p and q?

Ans (b)

2. What is the Hamming distance of bit strings 10101 and 11110?

a) 0 b) 2 c) 3 d) 5

Ans (c)

3. A candy box contains four flavors of candies: 6 lemon-flavored, 12 strawberry-flavored, 8 orange-


flavored, and 4 grape-flavored. When a candy is randomly chosen from the box, what is the probability
that it is either lemon- or orange-flavored?

Ans (b)

4. What is the result after evaluation of the following postfix expression? Here, symbols +, −, ×, and ÷
represent the arithmetic operators of addition, subtraction, multiplication, and division, respectively.

546+×493÷+×

a) 98 b) 154 c) 238 d) 350

Ans (d)

5. Which of the following is a sequential circuit that has two (2) stable states?

a) Adder circuit b) Capacitor c) Flip-flop d) NAND gate

Ans (c)

6. Which of the following is an appropriate description of flash memory?

a) All its contents can be erased at once with ultraviolet rays.

b) Data can be electronically erased in block units.


c) It can be rewritten at a high speed and is used for the cache memory of a CPU.

d) It needs to rewrite data periodically.

Ans (b)

7. Which of the following is an equivalent representation of the circuit below where only NAND gates
are used?

Ans (b)

8. Which of the following is the technique for estimating activity durations where past information is
statistically analyzed and various coefficients are determined?

a) Analogous estimate b) Bottom-up estimate

c) Parametric estimate d) Three-point estimate

Ans (c)

9. Which of the following is the critical path of the project activities shown in the figure below?

a) A -> B -> E -> I -> L b) A -> C -> D -> E -> H -> K c) A -> C -> F -> I -> L d) A -> C -> G -> J -> L

Ans (d)
10. Which of the following performs processing according to steps (1) through (3)?

(1) Based on the types and quantities, as well as the parts list of the product to be manufactured within
a future fixed period of time, the required quantity of components is calculated.

(2) The net order quantity of each component is calculated from the amount of inventory that can be
allocated.

(3) The ordering time for the components is determined with consideration for the manufacturing or
procurement lead time.

a) CAD b) CRP c) JIT d) MRP

Ans (d)

11. Which of the following is an appropriate explanation of a scatter diagram?

a) It is a chart used to determine if a relationship, pattern, or trend exists between two numeric
attributes.

b) It is a chart used to summarize the frequency distribution of a given attribute.

c) It is a type of chart that contains both bars and a line graph, where individual values are represented
in descending order by bars, and the cumulative total is represented by a line.

d) It is a type of chart used to determine whether a process is in a stable state or not, and it plots
characteristic values based on temporal transition.

Ans (a)

12. Which of the following inventory valuation methods calculates the inventory unit price by dividing
the total purchase amount by the total quantity of items purchased at the end of the accounting period?
a) First-in- first-out method b) Last-in- first-out method

c) Moving average method d) Periodic average method

Ans (d)

2019 S

13. For an eight-bit integer x represented in two’s complement format, which of the following yields the
value of 5x? Here, the overflow or underflow can be ignored in this multiplication.

a) Shift x to the left by 1 bit, then add the initial value of x to it.

b) Shift x to the left by 2 bits, then add the initial value of x to it.
c) Shift x to the right arithmetically by 1 bit, then subtract the initial value of x from it.

d) Shift x to the right arithmetically by 2 bits, then subtract the initial value of x from it.

Ans (b)

14. How many four-digit decimal numbers are made from four (4) different digits between 0 and 9?
Here, a four-digit decimal number has a non-zero leading digit.

a) 4320 b) 4436 c) 4536 d) 5040

Ans (c)

15. What is the value of the postfix expression below when variables A, B, C, and D have values 4, 3, 5,
and 6, respectively? Here, symbols ‘+’, ‘−’, ‘’, and ‘’ represent the arithmetic operators of addition,
subtraction, multiplication, and division, respectively.

AB2+DBC−

a) -3 b) 0 c) 3 d) 40/3

Ans (b)

16. Which of the following is a binary search tree?

Ans (b)

17. When the procedure described below is executed in sequence for an empty stack and empty queue,
what is the value assigned to variable x? Here, the functions used in the procedure are defined as
follows:

[Function definitions] push(y): pushes data y onto the top of the stack.

pop(): removes the data from the top of the stack and returns it as the function value.
enq(y): inserts data y at the tail of the queue.

deq(): removes the data from the head of the queue and returns it as the function value.

[Procedure]

push(a)

push(b)

enq(pop())

enq(c)

push(d)

push(deq())

x ← pop()

a) a b) b c) c d) d

Ans (b)

18. For a function f( x, y) defined below, what is the value of f( 775, 527)? Here, x mod y represents the
remainder after division of x by y.

f( x, y): if y = 0 then return x else return f( y, x mod y)

a) 0 b) 31 c) 248 d) 527

Ans (b)
19. The flowchart below shows the algorithm of concatenating two character strings in X and Y, with the
resulting character string in Z. Which of the following is the appropriate pair of operations to insert in
the blanks, A and B? Here, X and Y are character arrays of dimensions m and n, respectively, where the i-
th character of each string is stored as the i-th element of the character array.

Ans (a)

20. Which of the following is an appropriate characteristic of SRAM compared to DRAM? Here, SRAM
and DRAM are compared in products manufactured in the same or similar semiconductor geometric
process.

a) SRAM consumes more power, particularly when idle, compared to DRAM.

b) SRAM is non-volatile, whereas DRAM is volatile.

c) SRAM needs to be refreshed, whereas DRAM does not.

d) SRAM uses more transistors in a memory cell compared to DRAM.

Ans (d)
5. Two stack operations are defined: PUSH n:

Pushes a data (integer value n) to the stack.

POP: Pops a data from the stack.

For an empty stack, which of the following is the result of performing stack operations in the sequence
below?

Ans (c)

6. In a table search, which of the following is a characteristic of the search technique known as hashing?

a) It is a method in which a collision between storage locations of data does not occur.

b) It is a search technique that uses a binary tree.

c) The storage locations of data are determined based on the function values of their keys.

d) The time required to perform the search is approximately proportional to the size of the entire table.

Ans (c)

7. The binary search algorithm is used to search for a given item when items are sorted. If the number of
items is 1 million, which of the following is the closest to the maximum number of comparisons required
to find the item?

a) 15 b) 20 c) 25 d) 30

Ans (b)
8. The figure shows the storage sequence of instructions fetched by a processor. Which of the following
corresponds to a?

a) Accumulator b) Data cache

c) Instruction register d) Program register (program counter)

Ans (c)

9. Which of the following is the main purpose of optimization by a compiler?

a) To improve the maintainability of a program

b) To make debugging of a program easier

c) To reduce the execution time of a program d) To reduce the time needed to generate object codes

You might also like