Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
949 views9 pages

PHD CS 100 Questions Answers Complete

The document contains 100 questions and answers related to Computer Science, covering topics such as programming languages, algorithms, data structures, operating systems, networking, machine learning, and database management. Each question is followed by a correct answer, providing a comprehensive overview for PhD entrance exam preparation. The content is structured to test knowledge in various fundamental areas of computer science.

Uploaded by

mohinidc2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
949 views9 pages

PHD CS 100 Questions Answers Complete

The document contains 100 questions and answers related to Computer Science, covering topics such as programming languages, algorithms, data structures, operating systems, networking, machine learning, and database management. Each question is followed by a correct answer, providing a comprehensive overview for PhD entrance exam preparation. The content is structured to test knowledge in various fundamental areas of computer science.

Uploaded by

mohinidc2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

PhD Entrance Exam - Computer Science

100 Questions with Answers

1. Which of the following is used to translate high-level language into machine code?

Answer: c) Compiler

2. Which concept is used in Operating Systems for resource allocation?

Answer: a) CPU scheduling

3. Binary numbers use which digits?

Answer: a) 0 and 1

4. What is the time complexity of merge sort?

Answer: a) n log n

5. What is the Halting Problem?

Answer: b) An unsolvable problem

6. Which data structure works on LIFO?

Answer: b) Stack

7. What is the output of a lexical analyzer?

Answer: c) A finite automaton

8. Which data structure is used in DFS?

Answer: a) Linked list

9. Which type of relationship is represented by a foreign key?

Answer: a) One-to-many

10. What is the time complexity of searching in a hash table?

Answer: c) O(1)

11. What does a compiler check?

Answer: c) Syntax error

12. Is RAM volatile?


Answer: b) False

13. Which of these is a valid expression type?

Answer: c) Infix

14. Which protocol is used for Wi-Fi communication?

Answer: a) IEEE 802.11

15. What is the architecture of the OSI model?

Answer: a) Layered approach

16. Which protocol is used for internet communication?

Answer: d) TCP/IP

17. Which device connects multiple networks?

Answer: c) Router

18. What uniquely identifies a device in a network?

Answer: c) MAC address

19. Which protocol dynamically assigns IP addresses?

Answer: c) DHCP

20. What is the loopback IP address?

Answer: a) 127.0.0.1

21. Which of these is a type of machine learning?

Answer: c) Supervised

22. Which algorithm is used for classification?

Answer: c) Decision Trees

23. What is used to evaluate classification models?

Answer: a) Precision and recall

24. Which of the following is a type of supervised learning?

Answer: d) Support Vector Machine


25. What is overfitting?

Answer: b) A model performing well on training but poorly on test data

26. Which algorithm is used to find the shortest path in a graph?

Answer: c) Dijkstra's algorithm

27. Which is used to uniquely identify rows in a table?

Answer: b) Primary key

28. What is the function of an OS?

Answer: d) All of the above

29. Which of the following is a type of DoS attack?

Answer: b) Ping of Death

30. Which protocol is used for sending emails?

Answer: c) SMTP

31. What is the time complexity of the Tower of Hanoi problem?

Answer: c) O(2^n)

32. Which algorithm is used for hashing?

Answer: a) SHA-256

33. What does ACID in databases stand for?

Answer: b) Atomicity, Consistency, Isolation, Durability

34. What is the purpose of a firewall?

Answer: c) Filter incoming and outgoing traffic

35. What defines an NP-complete problem?

Answer: c) No known polynomial-time solution exists

36. A language is said to be recursive if:

Answer: a) There exists a Turing machine that accepts it

37. Which of the following is a phase in compiler design?


Answer: d) Parsing

38. Which of these is a function of an operating system?

Answer: d) All of the above

39. What is the purpose of DNS?

Answer: a) Translate domain names into IP addresses

40. Which ML model is used for classification?

Answer: c) Decision Tree

41. What is the advantage of using cache memory?

Answer: c) Increased speed

42. Which of the following is a NoSQL database?

Answer: d) All of the above

43. What is the time complexity of BFS?

Answer: a) O(V)

44. What kind of solution does an approximation algorithm provide?

Answer: b) Approximate solution

45. What is the valid range for IPv4 addresses?

Answer: c) 0 to 255

46. What is a row in a table called?

Answer: c) Tuple

47. What is a critical section?

Answer: a) Code that accesses shared resources

48. Which of these is an operating system?

Answer: c) Windows 11

49. What is a binary search tree?

Answer: a) Binary tree with balanced nodes


50. Which port is used for HTTP?

Answer: c) 80

51. What is the purpose of a context switch in an OS?

Answer: c) To switch CPU from one process to another

52. What is the use of the "JOIN" operation in SQL?

Answer: b) Retrieve rows from multiple tables

53. A system is in a safe state when:

Answer: b) It can allocate resources without deadlock

54. In cryptography, which algorithm is symmetric?

Answer: c) AES

55. What does the term "backpropagation" refer to?

Answer: c) Error correction in neural networks

56. Which language is used for statistical computing and graphics?

Answer: d) R

57. What is the time complexity of matrix multiplication (naive approach)?

Answer: c) O(n^3)

58. IPv6 addresses are:

Answer: c) 128-bit

59. Which of the following is not a machine learning paradigm?

Answer: d) Regressive

60. In a B+ tree, all records are stored:

Answer: b) In the leaves

61. Which scheduling algorithm may cause starvation?

Answer: b) Shortest Job First

62. Which of the following defines a many-to-many relationship?


Answer: c) Multiple entities related to multiple

63. A function that calls itself is known as:

Answer: a) Recursive

64. Which method is used in clustering?

Answer: a) K-Means

65. In software engineering, the term "modularity" refers to:

Answer: b) Independence of modules

66. Which protocol ensures secure HTTP communication?

Answer: c) HTTPS

67. What is the purpose of a foreign key?

Answer: b) Connect tables

68. The traveling salesman problem (TSP) is:

Answer: a) NP-complete

69. In artificial intelligence, a utility function is used to:

Answer: c) Rank states based on desirability

70. What does RAID stand for?

Answer: b) Redundant Array of Independent Disks

71. What is overfitting in machine learning?

Answer: b) When a model performs well on training but poorly on testing data

72. The "parity bit" is used for:

Answer: b) Error detection

73. Which command in Linux is used to list directory contents?

Answer: a) ls

74. Which storage device has no moving parts?

Answer: c) SSD
75. Which of the following is a supervised learning algorithm?

Answer: c) Random Forest

76. Which of the following best describes Big-O notation?

Answer: c) Worst case performance

77. Which formal language is accepted by a finite automaton?

Answer: a) Regular language

78. Which of the following tools is commonly used in data mining?

Answer: b) Hadoop

79. What is an NP-hard problem?

Answer: b) As hard as the hardest problems in NP

80. What is entropy in information theory?

Answer: b) Average amount of information

81. A pushdown automaton is used to recognize:

Answer: b) Context-free languages

82. Which of the following is not a cloud computing model?

Answer: d) CAaaS

83. Which of the following is used for knowledge representation in AI?

Answer: c) Semantic networks

84. In distributed systems, what does "consensus" mean?

Answer: c) Agreement on a single data value among nodes

85. The primary advantage of a heuristic search is:

Answer: b) Speed in complex spaces

86. What is the main drawback of the Waterfall model?

Answer: c) No backtracking

87. What is "semantic analysis" in compiler design?


Answer: c) Ensuring meaningful statements

88. Which concept allows objects to be represented in terms of their class?

Answer: d) Abstraction

89. What is the time complexity of accessing an element in a hash table (average case)?

Answer: a) O(1)

90. Which of these is a deep learning framework?

Answer: b) TensorFlow

91. In a graph, a cycle that visits each vertex exactly once is called:

Answer: b) Hamiltonian cycle

92. What is data abstraction?

Answer: a) Hiding how data is stored

93. Which of the following uses backtracking?

Answer: c) N-Queens problem

94. What is the role of a kernel in an OS?

Answer: c) Manages system resources

95. What is the name of the algorithm that is used to find strongly connected components in a

graph?

Answer: b) Tarjan's algorithm

96. Which of the following is a type of real-time system?

Answer: a) ATM software

97. What is the full form of SDN in networking?

Answer: a) Software Defined Network

98. What is a "latent variable" in machine learning?

Answer: c) Unobserved factor inferred from observed variables

99. The process of evaluating the performance of a model on unseen data is called:
Answer: d) Cross-validation

100. What is Git primarily used for?

Answer: c) Version control

You might also like