৪৯তম স্পেশাল বিসিএস (কম্পিউটার সাইন্স) প্রশ্ন সমাধান ২০২৫
200.00 Ques
200.00 Marks
120.00 Mins
0.50 Neg
Total Question
/ 100
Subject
Created: 4 weeks ago
Which one is not an ACID property?
A
Authenticity
B
Consistency
C
Isolation
D
Durability
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which of the following is a guided transmission medium?
A
Radiowave
B
Microwave
C
Coaxial Cable
D
Infrared
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In C, to retain the values of variables between function calls, we should use:
A
auto
B
extern
C
static
D
register
কম্পিউটার সায়েন্স
ফাংশন (Function)
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Thrashing is memory management occurs when:
A
Page size is too small
B
CPU utilization is very high
C
The system spends more time swapping pages than executing processes
D
Page table is too large
কম্পিউটার সায়েন্স
মেমোরি (Memory)
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
_______ is used to store web addresses for future use?
A
Routing
B
DNS resolution
C
Caching
D
ARP resolution
কম্পিউটার সায়েন্স
ওয়েবসাইট (Web Site)
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one is false with respect to a VLAN?
A
Provides a logical separation on Layer 2
B
Improves security
C
VLAN tag can distinguish traffic
D
Increases network management complexity
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In virtual memory, TLB is used to:
A
store instructions
B
control data transfers
C
handle cache misses
D
translate virtual address to physical address quickly
কম্পিউটার সায়েন্স
মেমোরি (Memory)
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A router processes packets @1 Gbps; if 10 packets (1200 bytes each) arrive at once, queuing delay for the 10th packets (in µs) is:
A
96
B
86.4
C
115.2
D
120
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
_____ method is a first order optimization method.
A
Newton
B
Quasi-Newton
C
Gradient descent
D
Conjugate gradient
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which criterion is not mandatory for a solution of critical section problem?
A
Mutual exclusion
B
Bounded waiting
C
Circular waiting
D
Progress
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
For a n-element min-Heap:
A
the smallest element can be found anywhere in the heap.
B
it is a type of binary search tree.
C
accessing an arbitrary element is an O(n) operation.
D
the largest element is always at the root.
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Cache hit rate = 80%; cache access time = 5 ns; memory access time = 50 ns. Then, effective access time (in ns):
A
15
B
45
C
50
D
55
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
What will be the time complexity of the following
algorithm:
sum = 0;
for (i=1; i<=n; i= i*2)
for (j=1; j
sum+=i*j;
A
O(n)
B
O(logn)
C
O(n2)
D
O(n log n)
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
What output will be generated by the compiler after lexical and syntax analyses, respectively?
A
Tokens and a parse tree
B
A parse tree and tokens
C
A Syntax tree and intermediate codes
D
Tokens and error messages
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one is a compile time polymorphism?
A
Virtual function
B
Operator overloading
C
Function overriding
D
Dynamic binding
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A relation R on a set B is an equivalence relation if it is:
A
Reflexive and symmetric
B
Reflexive and transitive
C
symmetric and transitive
D
Reflexive, symmetric and transitive
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ operates at the network layer and is used to connect different networks?
A
Hub
B
Switch
C
Router
D
Repeater
কম্পিউটার সায়েন্স
নেটওয়ার্কের প্রকারভেদ (Types of network)
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The chromatic index of a bipartite graph with at least one edge is:
A
1
B
2
C
3
D
4
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which loop is an exit-controlled loop?
A
for loop
B
while loop
C
do while loop
D
None of the above
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Hyper-threading:
A
creates multiple physical cores
B
Allows a single physical core to execute multiple threads simultaneously
C
reduces cache size
D
Only applied to GPU
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
For BFS of a graph, we should use:
A
queue
B
Stack
C
priority queue
D
stack.
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In Agile, backlog refers to the list of:
A
completed tasks
B
pending bugs
C
features and tasks to be developed
D
rejected requirements
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
_____ uses disk space as an extension of RAM.
A
Caching
B
Virtual memory
C
Spooling
D
Buffer
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Newton's backward interpolation formula is the most effective when:
A
Interpolation point is near the beginning
B
Interpolation point is near the end
C
Data points are not equally spaced
D
Function is non-polynomial
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The address block 192.168.16.0/20 contains _____ IP Addresses.
A
1024
B
4096
C
2048
D
65536
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In Huffman coding, the algorithm repeatedly picks two nodes and merges those. These two nodes are:
A
with the highest frequency
B
with the lowest frequency
C
one highest and one lowest frequency
D
picked arbitrarily
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Direct Memory Access allows:
A
CPU to execute instructions while l/O transfers data directly to memory
B
Only CPU controlled data transfer
C
memory to execute instructions independently
D
Reducing cache hits
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
____ testing is performed without a knowledge of the internal implementation.
A
White box
B
Black box
C
Unit
D
Integration
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one is not an addressing mode?
A
Immediate
B
Direct
C
Indirect
D
Sequential
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Assuming P1, P2, P3 have burst time (in ms) 6, 8, 3, respectively, which statement is true about SJF?
A
Waiting time of P1 is 3 ms
B
Turn-around time of P3 is 9 ms
C
Waiting time for P2 is 6 ms
D
Turn-around time of P1 is 8 ms
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Using _____ order we can delete tree nodes in such a way that a child node is deleted before its parents
A
Pre
B
Post
C
In
D
Level
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
During a phone conversation, which mode of communication takes place?
A
Simplex
B
Full-duplex
C
Half-duplex
D
Multiplex
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A priority queue is best-implemented using a:
A
Stack
B
Linked list
C
array
D
heap
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which protocol is used to send an email over the Internet?
A
FTP
B
SMTP
C
HTTP
D
SNMP
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
What does the 'continue' statement do inside a loop?
A
exits the loop entirely
B
terminates the program
C
re-execute the loop twice
D
skip the rest of the current iteration and move to the next
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In Agile, Software is delivered:
A
at the end of the project
B
in small incremental iterations
C
after complete documentation
D
only when all features have been implemented
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Intel 8086 (16 bit) microprocessor has a ____ bit address bus.
A
৪
B
16
C
20
D
32
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
OS System Calls performs the following basic operations on files:
A
Read, Write, Delete
B
Write, Print, Reposition
C
Delete, Truncate, Sort data
D
Modify, update, sort data
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The bisection method is used to:
A
Find the eigenvalue of a matrix
B
Solve a system of linear equation
C
Find roots of non-linear equations
D
Perform numerical integration
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In an array-based implementation of a complete binary tree, what is the index of the left child of a node at index i (assuming zero-based indexing)?
A
2i
B
2i + 1
C
i + 1
D
i - 1
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which optimization technique is not used for eliminating redundant codes?
A
Dead code elimination
B
Partial redundancy elimination
C
Common subexpression elimination
D
Constant folding
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which register in a CPU points to the next instruction to be executed?
A
Accumulator
B
Flags
C
SP
D
PC
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ Layer of the TCP/IP model is responsible for port binding.
A
Application
B
Internet
C
Transport
D
Network
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The main difference between a latch (L) and a flip flop (FF) is:
A
FF is level-triggered, L is edge-triggered
B
FF is edge-triggered, L is level-triggered
C
FF cannot store data but L can
D
L can store more data than a FF
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which phase in the compiler design performs data type checking?
A
Lexical analysis
B
Syntax analysis
C
Semantic analysis
D
Code generation
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one below is an example of a NoSQL database?
A
MySQL
B
MongoDB
C
Oracle
D
PostgreSQL
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The space complexity of a recursive algorithm is mainly due to:
A
Input size
B
Output size
C
Variables inside loops
D
Function call
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
What is the role of an index in a database?
A
To store large binary objects
B
To store data integrity constraints
C
To boost the speed of data retrieval operations
D
To group the related table together
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ is a non-preemptive algorithm.
A
FCFS
B
Round Robin
C
Shortest Remaining Time
D
None of the above
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one below is an iterative method?
A
Gauss elimination
B
Gauss-Seidel
C
Cramer’s rule
D
Matrix inversion
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A primary key:
A
Can have NULL
B
Uniquely identifies each row
C
Must be a foreign key
D
Can have duplicates
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A page fault occurs when:
A
Deadlock happens
B
Page is found in memory
C
Page is found in memory
D
Page is not found in memory
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
OSI ______ Layer establishes, manages & terminates logical connections between applications.
A
Transport
B
Network
C
Session
D
Data link
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which of the following is the simplified version of Boolean
function F = Y (X + XY)?
A
X.Y
B
X.Y
C
X.Y
D
X.Y
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one is true for a DFA?
A
DFA can have ε-transitions
B
DFA accepts all context-free languages
C
DFA accepts regular languages
D
DFA can have multiple transitions for the same input from a state
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ combines multiple signals over a single medium by assigning different time slots.
A
FDM
B
TDM
C
WDM
D
SDM
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Data ______ is the ability to modify a schema definition in a level without affecting the next higher level.
A
binding
B
abstraction
C
mapping
D
independence
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In OOP, ______ is used to restrict access to certain details of an object.
A
Inheritance
B
Polymorphism
C
Abstraction
D
Encapsulation
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Garbage collection is required in SSD, because:
A
SSD cells must be erased before being written
B
SSDs cannot store large files
C
SSDs do not support random access
D
It reduces read latency
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one is a supervised learning algorithm?
A
K-means
B
Decision tree
C
Apriori
D
DBSCAN
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Contrapositive of “If it rains, the home team wins”:
A
If the home team wins, then it rains
B
If the home team does not win, it does not rain
C
If it does not rain then the home team does not win
D
The home team wins whenever rains
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Pushdown automata (PDA) is equivalent in power to:
A
Regular expressions
B
Context-free grammars
C
Context-sensitive grammars
D
Turing machines
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
OSI model Data Link Layer’s primary function:
A
Packet routing
B
Error detection & correction
C
End-to-end communication
D
Data encryption
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which command can we use to save all transactions?
A
Save point
B
Commit
C
Save
D
Rollback
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Intel 8085 microprocessor is a _____ bit microprocessor.
A
8
B
16
C
32
D
64
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
“Either all of its operations are executed or none.” — This refers to:
A
Consistency
B
Isolation
C
Atomicity
D
Durability
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Interrupt-driven I/O is preferred over polling because it:
A
Reduces CPU idle time
B
Is slower
C
Uses more memory
D
Requires fewer devices
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
What is the output of the following C code?
#include
int main(){
int arr[5] = {1,2,3,4,5};
int *p = (arr+2);
printf("%d",p[-1]);
return 0;
}
A
2
B
3
C
Undefined behavior
D
Compilation error
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
In machine learning, supervised learning means:
A
Training with unlabeled data
B
No training is required
C
Training with labeled data
D
Only reinforcement signals are used
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A 16-bit address bus can address a maximum of ____ KB memory.
A
16
B
32
C
64
D
128
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A* search algorithm is:
A
Only complete but not optimal
B
Only optimal but not complete
C
Complete and optimal if the heuristic is admissible
D
Neither optimal nor complete
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
To solve a problem using recursion we should use a:
A
Linked list
B
Stack
C
Queue
D
Array
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ sort uses a divide and conquer approach?
A
Insertion
B
Quick
C
Bubble
D
Selection
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which of the following is a combinational circuit?
A
Counter
B
Flip flop
C
Multiplexor
D
Register
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The number of binary strings of length 5 is:
A
10
B
25
C
32
D
64
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A half-adder circuit has:
A
1 input, 2 outputs
B
2 inputs, 2 outputs
C
2 inputs, 1 output
D
3 inputs, 2 outputs
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ reduces redundancy and improves integrity.
A
Indexing
B
Normalization
C
Denormalization
D
Partitioning
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one is correct to declare & initialize array in C?
A
int arr(5) = {1,2,3,4,5};
B
int arr[5] = {1,2,3,4,5};
C
int arr( ) = 1,2,3,4,5;
D
Array arr(5) = {1,2,3,4,5};
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
A complete graph of n vertices has ______ edges.
A
n
B
n(n+1)/2
C
n(n-1)/2
D
n2
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ algorithm is used to find a shortest path in a positive weighted graph.
A
Prim’s
B
Kruskal’s
C
Dijkstra’s
D
DFS
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The register SP in a microprocessor:
A
Points to the first instruction
B
Points to the top of the stack
C
Holds the base address of the memory
D
Holds the I/O port address
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Consider 3 processes (P1, P2, P3) and 2 resources (R1, R2). If P1 holds R1 & requests R2, P2 holds R2 & requests R1, what is the minimum number of additional resource units of R1 or R2 needed to the deadlock assuming no preemption?
A
0 unit
B
1 unit of R1 or 1 unit of R2
C
2 units (1 of R1 & 1 of R2)
D
Not enough information
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
UDP is a ______ protocol.
A
Connection-less
B
Connection-oriented
C
Application layer
D
Network access layer
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which of the following is not a characteristic of problems suited for Dynamic programming (SP means subproblems)?
A
Overlapping SP
B
Optimal substructure
C
Independent SP
D
Repeated computation of SP
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ is used in C to write a single character to a file.
A
fputs()
B
fprintf()
C
fputc()
D
fwrite()
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
What is the hexadecimal value of 11110110112?
A
3BD
B
3DB
C
3CB
D
3DA
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The minimum number of NAND gates required to implement an OR gate is:
A
1
B
2
C
3
D
4
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which data structure allows insertion at one end and deletion at the other end?
A
Stack
B
Tree
C
Queue
D
Graph
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which of the following protocols is used together with HTTP in HTTPS?
A
SHA
B
SSH
C
TLS
D
VPN
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ refers to information about data.
A
Hyper data
B
Tera data
C
Meta data
D
Big data
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
The Principal of Locality in memory systems helps to:
A
Reduce CPU clock cycles
B
Improve cache performance
C
Increase instruction length
D
Reduce I/O latency
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Adaptive maintenance is required when:
A
Errors are found in software
B
User requirements are stable
C
Documentation is missing
D
The environment such as OS, hardware changes
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Alpha-Beta pruning can:
A
Change the final minmax result
B
Only reduces the number of nodes evaluated
C
Increase the depth of the tree
D
Increase the branching factor
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which one is true for a B+ tree?
A
Internal nodes store only actual data
B
Leaf nodes store actual data
C
Does not maintain sorted data
D
Retrieval of data is slower
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which of the following will delete all records from the table with the table structure?
A
ALTER
B
DELETE
C
DROP
D
TRUNCATE
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Which of the following is a numerical method for eigenvalue problems?
A
Gauss elimination
B
Power method
C
Newton interpolation
D
Trapezoidal rule
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
______ replaces the page that has not been used for the longest time:
A
MRU
B
LRU
C
FIFO
D
LIFO
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Greedy methods guarantee an optimal solution when:
A
Overlapping subproblems exist
B
Problems have optimal substructure and greedy choice property
C
Divide and conquer can be applied
D
Subproblems are independent
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
For a connected acyclic graph with v vertices and e edges we have:
A
v = e
B
v = e + 1
C
v = e + 2
D
v + 1 = e
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago
Created: 4 weeks ago
Find the output of the following code snippet:
#include
#define MULTIPLY(a,b) a/b
int main(){
int x=5, y=2, result;
result = MULTIPLY(y+x,y+x);
printf("%d",result);
return 0;
}
A
1
B
7
C
9
D
Runtime error
কম্পিউটার সায়েন্স
বিবিধ
বিসিএস
0
Updated: 4 weeks ago