PhD Entrance Exam - Computer Science
100 Questions with Answers
1. Which of the following is used to translate high-level language into machine code?
Answer: c) Compiler
2. Which concept is used in Operating Systems for resource allocation?
Answer: a) CPU scheduling
3. Binary numbers use which digits?
Answer: a) 0 and 1
4. What is the time complexity of merge sort?
Answer: a) n log n
5. What is the Halting Problem?
Answer: b) An unsolvable problem
6. Which data structure works on LIFO?
Answer: b) Stack
7. What is the output of a lexical analyzer?
Answer: c) A finite automaton
8. Which data structure is used in DFS?
Answer: a) Linked list
9. Which type of relationship is represented by a foreign key?
Answer: a) One-to-many
10. What is the time complexity of searching in a hash table?
Answer: c) O(1)
11. What does a compiler check?
Answer: c) Syntax error
12. Is RAM volatile?
Answer: b) False
13. Which of these is a valid expression type?
Answer: c) Infix
14. Which protocol is used for Wi-Fi communication?
Answer: a) IEEE 802.11
15. What is the architecture of the OSI model?
Answer: a) Layered approach
16. Which protocol is used for internet communication?
Answer: d) TCP/IP
17. Which device connects multiple networks?
Answer: c) Router
18. What uniquely identifies a device in a network?
Answer: c) MAC address
19. Which protocol dynamically assigns IP addresses?
Answer: c) DHCP
20. What is the loopback IP address?
Answer: a) 127.0.0.1
21. Which of these is a type of machine learning?
Answer: c) Supervised
22. Which algorithm is used for classification?
Answer: c) Decision Trees
23. What is used to evaluate classification models?
Answer: a) Precision and recall
24. Which of the following is a type of supervised learning?
Answer: d) Support Vector Machine
25. What is overfitting?
Answer: b) A model performing well on training but poorly on test data
26. Which algorithm is used to find the shortest path in a graph?
Answer: c) Dijkstra's algorithm
27. Which is used to uniquely identify rows in a table?
Answer: b) Primary key
28. What is the function of an OS?
Answer: d) All of the above
29. Which of the following is a type of DoS attack?
Answer: b) Ping of Death
30. Which protocol is used for sending emails?
Answer: c) SMTP
31. What is the time complexity of the Tower of Hanoi problem?
Answer: c) O(2^n)
32. Which algorithm is used for hashing?
Answer: a) SHA-256
33. What does ACID in databases stand for?
Answer: b) Atomicity, Consistency, Isolation, Durability
34. What is the purpose of a firewall?
Answer: c) Filter incoming and outgoing traffic
35. What defines an NP-complete problem?
Answer: c) No known polynomial-time solution exists
36. A language is said to be recursive if:
Answer: a) There exists a Turing machine that accepts it
37. Which of the following is a phase in compiler design?
Answer: d) Parsing
38. Which of these is a function of an operating system?
Answer: d) All of the above
39. What is the purpose of DNS?
Answer: a) Translate domain names into IP addresses
40. Which ML model is used for classification?
Answer: c) Decision Tree
41. What is the advantage of using cache memory?
Answer: c) Increased speed
42. Which of the following is a NoSQL database?
Answer: d) All of the above
43. What is the time complexity of BFS?
Answer: a) O(V)
44. What kind of solution does an approximation algorithm provide?
Answer: b) Approximate solution
45. What is the valid range for IPv4 addresses?
Answer: c) 0 to 255
46. What is a row in a table called?
Answer: c) Tuple
47. What is a critical section?
Answer: a) Code that accesses shared resources
48. Which of these is an operating system?
Answer: c) Windows 11
49. What is a binary search tree?
Answer: a) Binary tree with balanced nodes
50. Which port is used for HTTP?
Answer: c) 80
51. What is the purpose of a context switch in an OS?
Answer: c) To switch CPU from one process to another
52. What is the use of the "JOIN" operation in SQL?
Answer: b) Retrieve rows from multiple tables
53. A system is in a safe state when:
Answer: b) It can allocate resources without deadlock
54. In cryptography, which algorithm is symmetric?
Answer: c) AES
55. What does the term "backpropagation" refer to?
Answer: c) Error correction in neural networks
56. Which language is used for statistical computing and graphics?
Answer: d) R
57. What is the time complexity of matrix multiplication (naive approach)?
Answer: c) O(n^3)
58. IPv6 addresses are:
Answer: c) 128-bit
59. Which of the following is not a machine learning paradigm?
Answer: d) Regressive
60. In a B+ tree, all records are stored:
Answer: b) In the leaves
61. Which scheduling algorithm may cause starvation?
Answer: b) Shortest Job First
62. Which of the following defines a many-to-many relationship?
Answer: c) Multiple entities related to multiple
63. A function that calls itself is known as:
Answer: a) Recursive
64. Which method is used in clustering?
Answer: a) K-Means
65. In software engineering, the term "modularity" refers to:
Answer: b) Independence of modules
66. Which protocol ensures secure HTTP communication?
Answer: c) HTTPS
67. What is the purpose of a foreign key?
Answer: b) Connect tables
68. The traveling salesman problem (TSP) is:
Answer: a) NP-complete
69. In artificial intelligence, a utility function is used to:
Answer: c) Rank states based on desirability
70. What does RAID stand for?
Answer: b) Redundant Array of Independent Disks
71. What is overfitting in machine learning?
Answer: b) When a model performs well on training but poorly on testing data
72. The "parity bit" is used for:
Answer: b) Error detection
73. Which command in Linux is used to list directory contents?
Answer: a) ls
74. Which storage device has no moving parts?
Answer: c) SSD
75. Which of the following is a supervised learning algorithm?
Answer: c) Random Forest
76. Which of the following best describes Big-O notation?
Answer: c) Worst case performance
77. Which formal language is accepted by a finite automaton?
Answer: a) Regular language
78. Which of the following tools is commonly used in data mining?
Answer: b) Hadoop
79. What is an NP-hard problem?
Answer: b) As hard as the hardest problems in NP
80. What is entropy in information theory?
Answer: b) Average amount of information
81. A pushdown automaton is used to recognize:
Answer: b) Context-free languages
82. Which of the following is not a cloud computing model?
Answer: d) CAaaS
83. Which of the following is used for knowledge representation in AI?
Answer: c) Semantic networks
84. In distributed systems, what does "consensus" mean?
Answer: c) Agreement on a single data value among nodes
85. The primary advantage of a heuristic search is:
Answer: b) Speed in complex spaces
86. What is the main drawback of the Waterfall model?
Answer: c) No backtracking
87. What is "semantic analysis" in compiler design?
Answer: c) Ensuring meaningful statements
88. Which concept allows objects to be represented in terms of their class?
Answer: d) Abstraction
89. What is the time complexity of accessing an element in a hash table (average case)?
Answer: a) O(1)
90. Which of these is a deep learning framework?
Answer: b) TensorFlow
91. In a graph, a cycle that visits each vertex exactly once is called:
Answer: b) Hamiltonian cycle
92. What is data abstraction?
Answer: a) Hiding how data is stored
93. Which of the following uses backtracking?
Answer: c) N-Queens problem
94. What is the role of a kernel in an OS?
Answer: c) Manages system resources
95. What is the name of the algorithm that is used to find strongly connected components in a
graph?
Answer: b) Tarjan's algorithm
96. Which of the following is a type of real-time system?
Answer: a) ATM software
97. What is the full form of SDN in networking?
Answer: a) Software Defined Network
98. What is a "latent variable" in machine learning?
Answer: c) Unobserved factor inferred from observed variables
99. The process of evaluating the performance of a model on unseen data is called:
Answer: d) Cross-validation
100. What is Git primarily used for?
Answer: c) Version control