৪৯তম স্পেশাল বিসিএস (কম্পিউটার সাইন্স) প্রশ্ন সমাধান ২০২৫

icon

200.00 Ques

icon

200.00 Marks

icon

120.00 Mins

icon

0.50 Neg

Total Question

/ 100

Subject

icon

Created: 4 weeks ago


1.

Which one is not an ACID property?

A

Authenticity

B

Consistency

C

Isolation

D

Durability

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


2.

Which of the following is a guided transmission medium?

A

Radiowave

B

Microwave

C


Coaxial Cable 

D

Infrared

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


3.

In C, to retain the values of variables between function calls, we should use:

A

auto


B

extern

C

static

D

register

কম্পিউটার সায়েন্স

ফাংশন (Function)

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


4.

Thrashing is memory management occurs when:

A

Page size is too small 

B

CPU utilization is very high 

C

The system spends more time swapping pages than executing processes

D

Page table is too large


কম্পিউটার সায়েন্স

মেমোরি (Memory)

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


5.

  _______ is used to store web addresses for future use? 

A

Routing

B

DNS resolution

C

Caching

D

ARP resolution

কম্পিউটার সায়েন্স

ওয়েবসাইট (Web Site)

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


6.

Which one is false with respect to a VLAN?

A

Provides a logical separation on Layer 2 

B

Improves security 

C

VLAN tag can distinguish traffic

D

Increases network management complexity

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


7.

In virtual memory, TLB is used to: 

A

store instructions 

B

control data transfers

C

handle cache misses

D

translate virtual address to physical address quickly

কম্পিউটার সায়েন্স

মেমোরি (Memory)

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


8.

A router processes packets @1 Gbps; if 10 packets (1200 bytes each) arrive at once, queuing delay for the 10th packets (in µs) is:

A

96

B

86.4

C

115.2

D

120

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


9.

 _____ method is a first order optimization method. 

A

Newton

B

Quasi-Newton

C

Gradient descent

D

Conjugate gradient

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


10.

Which criterion is not mandatory for a solution of critical section problem? 

A

Mutual exclusion

B

Bounded waiting 

C

Circular waiting

D

Progress

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


11.

For a n-element min-Heap: 

A

the smallest element can be found anywhere in the heap.

B

it is a type of binary search tree.


C

accessing an arbitrary element is an O(n) operation. 

D

the largest element is always at the root.

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


12.

Cache hit rate = 80%; cache access time = 5 ns; memory access time = 50 ns. Then, effective access time (in ns): 

A

15

B

45

C

50

D

55

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


13.

What will be the time complexity of the following algorithm: 
sum = 0; 
for (i=1; i<=n; i= i*2)
     for (j=1; j

        sum+=i*j; 

A

O(n)

B

O(logn)

C

O(n2)

D

O(n log n) 

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


14.

What output will be generated by the compiler after lexical and syntax analyses, respectively?

A

Tokens and a parse tree

B

A parse tree and tokens

C

A Syntax tree and intermediate codes

D

Tokens and error messages

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


15.

Which one is a compile time polymorphism?

A

Virtual function 

B

Operator overloading

C


Function overriding

D

Dynamic binding

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


16.

A relation R on a set B is an equivalence relation if it is: 

A

Reflexive and symmetric

B

Reflexive and transitive


C

symmetric and transitive

D

Reflexive, symmetric and transitive

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


17.

______ operates at the network layer and is used to connect different networks? 

A

Hub

B

Switch

C

Router

D

Repeater

কম্পিউটার সায়েন্স

নেটওয়ার্কের প্রকারভেদ (Types of network)

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


18.

The chromatic index of a bipartite graph with at least one edge is: 

A

1

B

2

C

3

D

4

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


19.

 Which loop is an exit-controlled loop? 

A

for loop

B

while loop

C

do while loop

D

None of the above

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


20.

 Hyper-threading:

A

creates multiple physical cores

B

Allows a single physical core to execute multiple threads simultaneously

C

reduces cache size

D

Only applied to GPU

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


21.

For BFS of a graph, we should use: 

A

queue

B

Stack

C

priority queue

D

stack.

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


22.

In Agile, backlog refers to the list of:

A

completed tasks 

B

pending bugs

C

features and tasks to be developed 

D

rejected requirements

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


23.

_____ uses disk space as an extension of RAM.

A

Caching

B

Virtual memory

C

Spooling

D

Buffer

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


24.

Newton's backward interpolation formula is the most effective when:

A

Interpolation point is near the beginning 

B

Interpolation point is near the end

C

Data points are not equally spaced

D

Function is non-polynomial

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


25.

The address block 192.168.16.0/20 contains _____ IP Addresses.

A

1024

B

4096

C

2048

D

65536

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


26.

In Huffman coding, the algorithm repeatedly picks two nodes and merges those. These two nodes are:

A

with the highest frequency 

B

with the lowest frequency

C

one highest and one lowest frequency

D

picked arbitrarily

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


27.

 

Direct Memory Access allows:

A

CPU to execute instructions while l/O transfers data directly to memory 

B

Only CPU controlled data transfer

C

memory to execute instructions independently

D

Reducing cache hits

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


28.

 ____ testing is performed without a knowledge of the internal implementation.

A

White box 

B

Black box

C

Unit

D

Integration

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


29.

  Which one is not an addressing mode?

A

Immediate

B

Direct

C

Indirect

D

Sequential

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


30.

Assuming P1, P2, P3 have burst time (in ms) 6, 8, 3, respectively, which statement is true about SJF?

A

Waiting time of P1 is 3 ms

B

Turn-around time of P3 is 9 ms

C

Waiting time for P2 is 6 ms

D

Turn-around time of P1 is 8 ms

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


31.

Using _____ order we can delete tree nodes in such a way that a child node is deleted before its parents

A

Pre

B

Post

C

In

D

Level

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


32.

During a phone conversation, which mode of communication takes place? 

A

Simplex

B

Full-duplex

C

Half-duplex

D

Multiplex

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


33.

A priority queue is best-implemented using a: 

A

Stack

B

Linked list 

C

array

D

heap

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


34.

Which protocol is used to send an email over the Internet?

A

FTP

B

SMTP

C

HTTP

D

SNMP

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


35.

What does the 'continue' statement do inside a loop? 

A

exits the loop entirely 

B

terminates the program

C

re-execute the loop twice

D

skip the rest of the current iteration and move to the next

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


36.

In Agile, Software is delivered: 

A

at the end of the project 

B

in small incremental iterations

C

after complete documentation

D

only when all features have been implemented

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


37.

Intel 8086 (16 bit) microprocessor has a ____ bit address bus.

A

B

16

C

20

D

32

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


38.

OS System Calls performs the following basic operations on files: 

A

Read, Write, Delete 

B

Write, Print, Reposition 

C

Delete, Truncate, Sort data

D

Modify, update, sort data

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


39.

The bisection method is used to: 

A

Find the eigenvalue of a matrix

B

Solve a system of linear equation

C

Find roots of non-linear equations

D

Perform numerical integration

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


40.

In an array-based implementation of a complete binary tree, what is the index of the left child of a node at index i (assuming zero-based indexing)?


A

2i

B

2i + 1

C

i + 1

D

i - 1

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


41.

Which optimization technique is not used for eliminating redundant codes?

A

Dead code elimination

B

Partial redundancy elimination

C

Common subexpression elimination

D

Constant folding

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


42.

Which register in a CPU points to the next instruction to be executed?

A

Accumulator

B

Flags

C

SP

D

PC

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


43.

______ Layer of the TCP/IP model is responsible for port binding.

A

Application

B

Internet

C

Transport

D

Network

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


44.

 The main difference between a latch (L) and a flip flop (FF) is:

A

FF is level-triggered, L is edge-triggered

B

FF is edge-triggered, L is level-triggered

C

FF cannot store data but L can

D

L can store more data than a FF

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


45.

Which phase in the compiler design performs data type checking?

A

Lexical analysis 

B

Syntax analysis

C

Semantic analysis

D

Code generation

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


46.

Which one below is an example of a NoSQL database?

A

MySQL

B

MongoDB

C

Oracle


D

PostgreSQL

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


47.

 The space complexity of a recursive algorithm is mainly due to: 

A

Input size

B

Output size

C

Variables inside loops

D

Function call

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


48.

What is the role of an index in a database? 

A

To store large binary objects 

B

To store data integrity constraints

C

To boost the speed of data retrieval operations

D

To group the related table together

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


49.

 ______ is a non-preemptive algorithm. 

A

FCFS


B

Round Robin


C

Shortest Remaining Time

D

None of the above


কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


50.

Which one below is an iterative method? 

A

Gauss elimination

B

Gauss-Seidel

C

Cramer’s rule

D

Matrix inversion

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


51.

A primary key: 

A

Can have NULL

B

Uniquely identifies each row

C

Must be a foreign key

D

Can have duplicates

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


52.

A page fault occurs when: 

A

Deadlock happens

B

Page is found in memory

C

Page is found in memory

D

Page is not found in memory

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


53.

OSI ______ Layer establishes, manages & terminates logical connections between applications. 

A

Transport

B

Network

C

Session

D

Data link

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


54.

Which of the following is the simplified version of Boolean function F = Y (X + XY)?


A

X.Y

B

X.Y

C

X.Y

D

X.Y

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


55.

Which one is true for a DFA? 

A

DFA can have ε-transitions

B

DFA accepts all context-free languages

C

DFA accepts regular languages

D

DFA can have multiple transitions for the same input from a state

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


56.

______ combines multiple signals over a single medium by assigning different time slots.


A

FDM

B

TDM

C

WDM

D

SDM

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


57.

 Data ______ is the ability to modify a schema definition in a level without affecting the next higher level. 

A

binding

B

abstraction

C

mapping

D

independence


কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


58.

In OOP, ______ is used to restrict access to certain details of an object.

A

Inheritance

B

Polymorphism

C

Abstraction

D

Encapsulation

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


59.

Garbage collection is required in SSD, because: 

A

SSD cells must be erased before being written 

B

SSDs cannot store large files

C

SSDs do not support random access

D

It reduces read latency

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


60.

Which one is a supervised learning algorithm?

A

K-means

B

Decision tree

C

Apriori

D

DBSCAN

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


61.

Contrapositive of “If it rains, the home team wins”:

A

If the home team wins, then it rains

B

If the home team does not win, it does not rain

C

If it does not rain then the home team does not win

D

The home team wins whenever rains

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


62.

Pushdown automata (PDA) is equivalent in power to:

A

Regular expressions

B

Context-free grammars 

C

Context-sensitive grammars 

D

Turing machines

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


63.

OSI model Data Link Layer’s primary function: 

A

Packet routing

B

Error detection & correction

C

End-to-end communication

D

Data encryption

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


64.

Which command can we use to save all transactions?

A

Save point

B

Commit

C

Save

D

Rollback

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


65.

Intel 8085 microprocessor is a _____ bit microprocessor.

A

8

B

16

C

32

D

64

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


66.

 “Either all of its operations are executed or none.” — This refers to:

A

Consistency

B

Isolation

C

Atomicity

D

Durability

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


67.

 Interrupt-driven I/O is preferred over polling because it: 

A

Reduces CPU idle time

B

Is slower

C

Uses more memory

D

Requires fewer devices

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


68.

What is the output of the following C code?

#include

int main(){ 

int arr[5] = {1,2,3,4,5};

int *p = (arr+2); 

printf("%d",p[-1]);

return 0; 

}

A

2

B

3

C

Undefined behavior 

D

Compilation error

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


69.

 In machine learning, supervised learning means: 

A

Training with unlabeled data

B

No training is required

C

Training with labeled data

D

Only reinforcement signals are used

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


70.

 A 16-bit address bus can address a maximum of ____ KB memory. 

A

16

B

32

C

64

D

128

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


71.

 A* search algorithm is: 

A

Only complete but not optimal

B

Only optimal but not complete

C

Complete and optimal if the heuristic is admissible

D

Neither optimal nor complete

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


72.

 To solve a problem using recursion we should use a:

A

Linked list 

B

Stack

C

Queue

D

Array

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


73.

 ______ sort uses a divide and conquer approach? 

A

Insertion

B

Quick

C

Bubble

D

Selection


কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


74.

Which of the following is a combinational circuit?

A

Counter


B

Flip flop

C

Multiplexor

D

Register

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


75.

 The number of binary strings of length 5 is: 

A

10

B

25

C

32

D

64

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


76.

 A half-adder circuit has: 

A

1 input, 2 outputs

B

2 inputs, 2 outputs 

C

2 inputs, 1 output 

D

3 inputs, 2 outputs


কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


77.

______ reduces redundancy and improves integrity.

A

Indexing


B

Normalization

C

Denormalization


D

Partitioning


কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


78.

 Which one is correct to declare & initialize array in C?

A

int arr(5) = {1,2,3,4,5};

B

int arr[5] = {1,2,3,4,5};

C

int arr( ) = 1,2,3,4,5; 

D

Array arr(5) = {1,2,3,4,5};

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


79.

 A complete graph of n vertices has ______ edges. 

A

n

B

n(n+1)/2

C

n(n-1)/2 

D

n2

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


80.

 ______ algorithm is used to find a shortest path in a positive weighted graph.

A

Prim’s

B

Kruskal’s

C

Dijkstra’s

D

DFS

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


81.

The register SP in a microprocessor: 

A

Points to the first instruction 


B

Points to the top of the stack

C

Holds the base address of the memory

D

Holds the I/O port address

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


82.

Consider 3 processes (P1, P2, P3) and 2 resources (R1, R2). If P1 holds R1 & requests R2, P2 holds R2 & requests R1, what is the minimum number of additional resource units of R1 or R2 needed to the deadlock assuming no preemption? 


A

0 unit 

B

1 unit of R1 or 1 unit of R2 

C

2 units (1 of R1 & 1 of R2)

D

Not enough information

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


83.

 UDP is a ______ protocol. 

A

Connection-less 

B

Connection-oriented

C

Application layer 

D

Network access layer

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


84.

 Which of the following is not a characteristic of problems suited for Dynamic programming (SP means subproblems)?


A

Overlapping SP

B

Optimal substructure

C

Independent SP

D

Repeated computation of SP

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


85.

 ______ is used in C to write a single character to a file. 

A

fputs() 

B

fprintf()

C

fputc() 

D

fwrite()


কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


86.

 What is the hexadecimal value of 11110110112?

A

3BD

B

3DB

C

3CB

D

3DA

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


87.

 The minimum number of NAND gates required to implement an OR gate is: 

A

1

B

2

C

3

D

4

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


88.

 Which data structure allows insertion at one end and deletion at the other end?

A

Stack

B

Tree

C

Queue

D

Graph

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


89.

 Which of the following protocols is used together with HTTP in HTTPS? 

A

SHA

B

SSH

C

TLS

D

VPN

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


90.

______ refers to information about data. 

A

Hyper data

B

Tera data 

C

Meta data

D

Big data 

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


91.

 The Principal of Locality in memory systems helps to: 

A

Reduce CPU clock cycles

B

Improve cache performance

C

Increase instruction length

D

Reduce I/O latency

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


92.

 Adaptive maintenance is required when: 

A

Errors are found in software

B

User requirements are stable

C

Documentation is missing

D

The environment such as OS, hardware changes

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


93.

 Alpha-Beta pruning can:

A

Change the final minmax result

B

Only reduces the number of nodes evaluated

C

Increase the depth of the tree

D

Increase the branching factor

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


94.

 Which one is true for a B+ tree? 

A

Internal nodes store only actual data

B

Leaf nodes store actual data

C

Does not maintain sorted data

D

Retrieval of data is slower

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


95.

 Which of the following will delete all records from the table with the table structure? 

A

ALTER

B

DELETE

C

DROP

D

TRUNCATE

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


96.

 Which of the following is a numerical method for eigenvalue problems? 

A

Gauss elimination

B

Power method

C

Newton interpolation

D

Trapezoidal rule

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


97.

 ______ replaces the page that has not been used for the longest time: 

A

MRU

B

LRU

C

FIFO

D

LIFO

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


98.

 Greedy methods guarantee an optimal solution when: 

A

Overlapping subproblems exist 

B

Problems have optimal substructure and greedy choice property

C

Divide and conquer can be applied

D

Subproblems are independent

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


99.

 For a connected acyclic graph with v vertices and e edges we have: 

A

v = e

B

v = e + 1

C

v = e + 2

D

v + 1 = e

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago


Created: 4 weeks ago


100.

 Find the output of the following code snippet:

#include

#define MULTIPLY(a,b) a/b

int main(){

  int x=5, y=2, result; 

  result = MULTIPLY(y+x,y+x);

  printf("%d",result);

  return 0;

A

1

B

7

C

9

D

Runtime error

কম্পিউটার সায়েন্স

বিবিধ

বিসিএস

Unfavorite

0

Updated: 4 weeks ago

© LXMCQ, Inc. - All Rights Reserved