Home Computer Science

# Computer Science

Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, and information theory) to practical disciplines (including the design and implementation of hardware and software). Computer science is generally considered an area of academic research and distinct from computer programming

## CS 302 Midterm Quiz

0

Let's Start!

Let's Start!

Created on By Tayyaba Bibi

CS302 Midterm Quiz

CS302 Midterm Quiz  29 -06_ 22

1 / 13

The Extended ASCII Code (American Standard Code for Information Interchange) is a

_____ code

2 / 13

The difference of 111 - 001 equals

3 / 13

A NOR’s gate output is HIGH if

4 / 13

Tri-State Buffer is basically a/an _________ gate.

Tri-State Buffer is basically a/an _________ gate.

5 / 13

The binary value “1010110” is equivalent to decimal __________

6 / 13

2's complement of any binary number can be calculated by

7 / 13

2's complement of any binary number can be calculated by

8 / 13

A.(B.C) = (A.B).C is an expression of __________

9 / 13

The Quad Multiplexer has _____ outputs

10 / 13

GAL is an acronym for ________.

11 / 13

For a 3-to-8 decoder how many 2-to-4 decoders will be required?

12 / 13

The function to be performed by the processor is selected by set of inputs known as

________

13 / 13

The average score is 0%

0%

## CS301 Midterm Quiz

0

Let's Start!

Let's Start!

Created on By Tayyaba Bibi

CS301 Midterm Quiz

CS301 Midterm Quiz 28-06-22

1 / 14

 New items are added at the ________ of the stack.

2 / 14

~BinarySearchTree() is a ________ .

3 / 14

 A hash function returns a ________ value.

4 / 14

Which of the following is NOT an open addressing technique to resolve collisions?

5 / 14

 Insertion in a linked list can be done at

6 / 14

 Every AVL is ___________.

7 / 14

 AVL tree is linear data structure.

8 / 14

 Searching an element in an AVL tree takes maximum _______ time (where n is number of nodes in AVL tree)

9 / 14

 Binary Search Tree voilates the condition of AVL tree when any node has balance equal to

10 / 14

 Which of the following is NOT an open addressing technique to resolve collisions?

11 / 14

 get(?) method of list class is used to:

12 / 14

The expression
if (! heap ->isEmpty() )
checks

13 / 14

For a perfect binary tree of height 4, What will be the sum of hights of nodes?

14 / 14

 In ________, a programmer uses two pointers in the node, i.e. one to point to next node and the other to point to the previous node.

The average score is 0%

0%

## CS001 Latest Quiz For Midterm

0

Let's Start!

Let's Start!

Created on By Tayyaba Bibi

CS001 Latest Quiz

CS001 Latest Quiz 23-06-22

1 / 13

1.

 Three small lights at the keyboard shows the on/off status for ________.

2 / 13

2.

 ________ is an example of input device.

3 / 13

3.

 ________ resides at the bottom of the window.

4 / 13

4. What are the two broad categories of software?

5 / 13

5.

 Which of the following is primary storage?

6 / 13

6. Data is saved in form of ________.

7 / 13

7.

 The main components of the computer, communicates with each other with the help of ________.

8 / 13

8.

 Key used to exit from certain type of applications is called ________.

9 / 13

9.

 During writing a letter you typed a wrong character in notepad. How will you go back and remove that character?

10 / 13

10.

 Menu bar resides below the ________.

11 / 13

11. Tab key is a ________.

12 / 13

12.

 Scroll bars are used to see the ________.

13 / 13

13. To arrange icons on the desktop

The average score is 0%

0%

## CS601 Midterm latest Quiz

0

Let's Start!

Let's Start!

Created on By Tayyaba Bibi

CS601 Midterm Latest Quiz

CS601 Midterm Latest Quiz Dated 19-06-22

1 / 12

1. Congestion Control is a feature of ___ layer (s).

2 / 12

2. S-frames in High-Level Data Link Control (HDLC) are only used to

transfer ___ information.

3 / 12

(DLC) layer provides services between ___

4 / 12

4. ___ is an authentication protocol, which is used by the PPP to

5 / 12

5. To control and manage the transfer of data, a protocol called Point to

Point Protocol (PPP) is used at the ____ layer.

6 / 12

6. In Block coding we divide our message into blocks of k bits called as

7 / 12

7. ___ is an Authentication Protocol, which uses two-step process to

authenticate user information

8 / 12

8. The ___ protocols uses both flow and error control.

9 / 12

9. The ___ is the number of signal elements sent per unit time.

10 / 12

10. The extra bits added with the original data for error detection/correction

are called ___.

11 / 12

11. ___ is responsible for governing node to node communication.

12 / 12

12. Error correction is more ___ than the error detection.

The average score is 0%

0%

## CS101 Midterm Quiz

31
Created on By Tayyaba Bibi

CS101 Midterm Quiz

CS101 Midterm Quiz Dated 15-06-22

1 / 12

When you type a query in the search bar of google. Google finds all those pages which contains

2 / 12

On Social media, sometimes. A particular

Is very popular.

3 / 12

The repetitive use of an instruction or sequence of instructions is called

4 / 12

The repetitive use of an instruction or sequence of instructions is called

5 / 12

CPU and RAM are connected with to communicate with each other

6 / 12

The ........ divides long messages into small segments, which are transmitted over the Internet.

7 / 12

Which operation can be used to invert all of the bits of an RGB bitmap image?

8 / 12

All bit patterns. which represent positive numbers in excess notation start with

9 / 12

Google does not distinguish the capital letters or small letters

10 / 12

Which of the following techniques is used to place the bit in the hole at the left end if it fell off the right end?

11 / 12

In CD. data is stored on a single-track from inside outside

12 / 12

Which of the following protocol is not associated with the transfer of email messages?

The average score is 47%

0%

## Introduction to programming CS 201 Midterm Quiz

12

Let's Start!

Let's Start!

Created on By Tayyaba Bibi

Cs201 Midterm Quiz

Cs201 Midterm Quiz Dated 13-06-22

1 / 12

Which of the following can not be a variable name?

2 / 12

Preprocessor program perform its function before ______ phase takes place.

3 / 12

Pointer is a variable which store,

4 / 12

Dealing with structures and functions passing by reference is the most economical method

5 / 12

In if structure the block of statements is executed only,

6 / 12

Initialization of variable at the time of definition is,

7 / 12

A precise sequence of steps to solve a problem is called

8 / 12

Which of the following header file include string conversion functions?

9 / 12

If the file is not properly closed in the program, the program ____________.

10 / 12

What does 5 ^ 6 , evaluate to in decimal where ‘^’ is Exclusive OR operator?

11 / 12

Computer can understand only machine language code.

12 / 12

What will be the range of numbers generated by function rand () % 9?

The average score is 50%

0%

## Introduction to programming CS 201 Midterm Quiz

Wrong shortcode initialized

## Introduction to programming CS 201 Midterm Quiz

4

Let's Start!

Let's Start!

Created on By Tayyaba Bibi

CS201 Midterm Quiz

CS201 Midterm Quiz Dated12-06-22

1 / 12

1. Which of the following functionreturns the size of a string variable?

2 / 12

2. What will be the correct syntax to initialize all elements of two-dimensional array to value 0?

3 / 12

3. What will be the value of ‘a’ and ‘b’ after executing the following statements?

a = 3;

b = a++;

4 / 12

4. If an array has 100 elements, what is allowable range of subscripts?

5 / 12

5. Searching is easier when an array is already sorted

6 / 12

6. The condition in while loop may contain logical expression but not relational expression.

7 / 12

7. What does !(7) evaluate to in decimal where ! is a NOT operator?

8 / 12

8. What is the output of the following statement?

int i = 2.5; do { cout i * 2; } while (i > 3 && i < 10);

9 / 12

9. When an array element is passed to a function, it is passed by ----------------

10 / 12

10. What will be the value of i and j in the following code segment?

int i, j ;

int x = {2, 3, 4, 8, 9} ;

int *ptr =&x;

i = (*ptr)++ ;

j = *ptr++ ;

11 / 12

11. Declaring structures does not mean that memory is allocated.

12 / 12

12. UNIX has been developed in ________ language.

The average score is 27%

0%

## Introduction to programming CS 201 Midterm Quiz

3

Let's Start!

Let's Start!

Created on By Tayyaba Bibi

CS201 Midterm Quiz

CS201 Midterm Quiz Dated 12-06-22

1 / 12

1) What will be the result of expression x%= 2, if x = 7?

2 / 12

2) What will be the correct syntax for initialization of pointer ptr with string "programming"?

3 / 12

3) bytes are occupied by declaring following array of characters?

char str[] = “programming”;

4 / 12

4) the result of arithmetic expression 6+27/3*3?

5 / 12

5) known as development language of _______ operating system

6 / 12

6) What does 5 | 6 , evaluate to in decimal where ‘|’ is bitwise OR operator?

7 / 12

7) Member function tellg() returns the current location of the _____________ pointer.

8 / 12

8) The data type before a function name represents its,

9 / 12

9) If the break statement is missed in switch statement then,

10 / 12

10) Which of the following function(s) is/are included in stdlib.h header file?

11 / 12

11) The correct syntax of do-while loop is,

12 / 12

12) In order to get 256 from the number 2568 we divide this number by 10 and take,

The average score is 30%

0%

## Introduction to Programming CS201 Quiz 1

28

Let's Start Quiz!!!

Let's Start Quiz!!!

Created on By Usman Ali

Introduction to Programming CS201

CS201 Quiz 1

1 / 9

1) A function is a block of statements that can be defined once and used ________ in the program.

2 / 9

2) Switch support_______________ data.

3 / 9

3) __________ of a variable means the locations within a program from where it can be accessed.

4 / 9

4) In while loop the loop counter must be initialized,

5 / 9

5) Macros are categorized into ....... Types.

6 / 9

6) The operators ++ and –- are used to increment or decrement the value of a variable by ________

7 / 9

7) X is an integer variable; what does X++ means,

8 / 9

8) The most suitable data type for number 325.25 is ______.

9 / 9

9) _________statement is used to terminate the processing of a particular case and exit from switch structure.

The average score is 54%

0%

## CS101 Introduction to Computing Quiz 1

28

Hurry Up Time is Running!!!

Hurry Up Time is Running!!!

Created on By Usman Ali

CS101 Introduction to Computing Quiz 1

## CS101 Introduction to Computing Quiz 1

1 / 15

If the result after comparison of two variables in relational
operator is False, then if statement returns value

2 / 15

A significant example of iterative techniques is:

3 / 15

An object is actually a special case of the general concept of a

4 / 15

A paradigm works on object called

5 / 15

A Specific example is the ___ series of standards, which address numerous industrial activities such as design, production,
installation and servicing

6 / 15

RGB Stands For

7 / 15

The simplest form of array is the ___ array.

8 / 15

In particular the chart that indicates the entire game is
overseen by a function named ___

9 / 15

Design phase is followed by ___

10 / 15

5%2 would give

11 / 15

In modern computer applications, problems are more easily
solved in the context of:

12 / 15

Which of following is not a phase of SDLC?

13 / 15

This ___ view of the database is called a database model.

14 / 15

The sign of modulus is

15 / 15

An alternative to translators