Technical MCQ By Mcs'17

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
| By MCS17
M
MCS17
Community Contributor
Quizzes Created: 1 | Total Attempts: 158
Questions: 60 | Attempts: 158

Settings

Conducted by Math Computing Society

• 1.

Which of the following relational algebra operations do not require the participating tables to be union-compatible?

• A.

Union

• B.

Intersection

• C.

Difference

• D.

Join

D. Join
Explanation
The join operation in relational algebra does not require the participating tables to be union-compatible. Join combines rows from two or more tables based on a common attribute and creates a new table. It matches the values of the common attribute in the tables and combines the rows that have matching values. Unlike union, intersection, and difference operations, join does not require the tables to have the same number or types of columns.

Rate this question:

• 2.

Which of the following is not a property of transactions?

• A.

Atomicity

• B.

Concurrency

• C.

Isolation

• D.

Durability

B. Concurrency
Explanation
Concurrency is not a property of transactions. Transactions ensure atomicity, which means that they are either executed in their entirety or not at all. Isolation ensures that transactions are executed independently and do not interfere with each other. Durability ensures that once a transaction is committed, its changes are permanent. However, concurrency refers to the ability of multiple transactions to execute simultaneously without interfering with each other, which is not a property of transactions.

Rate this question:

• 3.

Relational Algebra does not have

• A.

Selection operator

• B.

Projection operator

• C.

Aggregation operators

• D.

Division operator

C. Aggregation operators
Explanation
The correct answer is "Aggregation operators." Relational Algebra is a formal language used to query and manipulate relational databases. It includes various operators such as selection, projection, and division, which are used to perform specific operations on the data. However, aggregation operators are not part of the Relational Algebra. Aggregation operators are typically used in SQL queries to perform calculations on groups of data, such as finding the sum, average, or maximum value.

Rate this question:

• 4.

Checkpoints are a part of

• A.

Recovery measures

• B.

Security measures.

• C.

Concurrency measures

• D.

Authorization measures.

A. Recovery measures
Explanation
Checkpoints are a part of recovery measures. In computer systems, a checkpoint refers to a specific point in time where the system's state is saved. This allows for the system to be restored to that point in case of a failure or error. Recovery measures are put in place to ensure the system can recover from such failures and continue functioning properly. Checkpoints play a crucial role in this process by providing a reference point for restoring the system to a known, stable state.

Rate this question:

• 5.

Tree structures are used to store data in

• A.

Network model

• B.

Relational model

• C.

Hierarchical model

• D.

File based system

C. Hierarchical model
Explanation
Tree structures are used to store data in a hierarchical model. In a hierarchical model, data is organized in a tree-like structure with parent-child relationships. Each parent can have multiple children, but each child can have only one parent. This model is commonly used in systems where data has a one-to-many relationship, such as an organizational chart or a file system. In a hierarchical model, data can be accessed quickly and efficiently by following the parent-child relationships.

Rate this question:

• 6.

The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is

• A.

Procedural DML

• B.

Non-Procedural DML

• C.

Procedural DDL

• D.

Non-Procedural DDL

B. Non-Procedural DML
Explanation
Non-Procedural DML is the correct answer because it allows the user to specify the data to be retrieved without specifying exactly how to get it. Non-Procedural DML focuses on what data is needed, rather than how to retrieve it. This type of language is often used in high-level programming languages and query languages, where the user only needs to specify the desired outcome and the system takes care of the implementation details.

Rate this question:

• 7.

Precedence graphs help to find a AC14/AT11 Database Management Systems 2

• A.

Serializable schedule

• B.

Recoverable schedule

• C.

• D.

A. Serializable schedule
Explanation
Precedence graphs help to find a Serializable schedule. A Serializable schedule is a schedule in which the outcome is the same as if the transactions were executed one at a time in some order. Precedence graphs are used to determine if a schedule is serializable by representing the transactions as nodes and the dependencies between them as edges. If the graph is acyclic, then the schedule is serializable. If there is a cycle in the graph, then the schedule is not serializable. Therefore, precedence graphs are a useful tool for analyzing and determining the serializability of schedules in database management systems.

Rate this question:

• 8.

The rule that a value of a foreign key must appear as a value of some specific table is called

• A.

Referential constraint

• B.

Index.

• C.

Integrity constraint

• D.

Functional dependency.

A. Referential constraint
Explanation
A referential constraint is a rule that ensures that the value of a foreign key in a table must appear as a value in another specific table. It is used to maintain the integrity and consistency of data in a relational database by enforcing relationships between tables. This constraint helps to prevent orphaned records and ensures that data remains accurate and valid.

Rate this question:

• 9.

The clause in SQL that specifies that the query result should be sorted in ascending or descending order based on the values of one or more columns is

• A.

View

• B.

Order by

• C.

Group by

• D.

Having

B. Order by
Explanation
The clause in SQL that specifies that the query result should be sorted in ascending or descending order based on the values of one or more columns is "Order by". This clause is used to sort the result set in either ascending (default) or descending order. It allows the user to specify one or more columns to sort by, and the sorting is done based on the values in those columns.

Rate this question:

• 10.

What is a disjoint less constraint?

• A.

It requires that an entity belongs to no more than one level entity set.

• B.

The same entity may belong to more than one level.

• C.

The database must contain an unmatched foreign key value.

• D.

An entity can be joined with another entity in the same level entity set.

A. It requires that an entity belongs to no more than one level entity set.
Explanation
A disjoint less constraint is a requirement that an entity can only belong to one level entity set. This means that the same entity cannot be associated with multiple levels. For example, if we have a database with different levels of employees (e.g., junior, senior, manager), a disjoint less constraint would ensure that an employee can only be part of one level, such as either junior or senior, but not both. This constraint helps maintain data integrity and avoids confusion in the database.

Rate this question:

• 11.

According to the levels of abstraction, the schema at the intermediate level is called

• A.

Logical schema

• B.

Physical schema

• C.

Subschema

• D.

None of the above

D. None of the above
Explanation
The question is asking for the term used to describe the schema at the intermediate level according to the levels of abstraction. However, none of the given options (Logical schema, Physical schema, Subschema) accurately describe the schema at the intermediate level. Therefore, the correct answer is "None of the above".

Rate this question:

• 12.

It is an abstraction through which relationships are treated as higher level entities

• A.

Generalization

• B.

Specialization

• C.

Aggregation

• D.

Inheritance

C. Aggregation
Explanation
Aggregation is the correct answer because it refers to the concept of treating relationships between objects as higher-level entities. In aggregation, objects can be composed of other objects, forming a whole-part relationship. This allows for a more abstract representation of relationships, where the focus is on the overall structure or composition rather than the specific details of individual objects. Generalization and specialization are related to inheritance, which involves creating subclasses based on a superclass. While inheritance is a form of abstraction, it is not directly related to treating relationships as higher-level entities.

Rate this question:

• 13.

A relation is in ____________ if an attribute of a composite key is dependent on an attribute of other composite key.

• A.

2NF

• B.

3NF

• C.

BCNF

• D.

1NF

B. 3NF
Explanation
In 3NF (Third Normal Form), an attribute of a composite key is dependent on an attribute of another composite key. This means that the relation has been normalized to eliminate any transitive dependencies, ensuring that each non-key attribute is functionally dependent on the primary key. This level of normalization helps to minimize redundancy and improve data integrity in the database.

Rate this question:

• 14.

What is data integrity?

• A.

It is the data contained in database that is non redundant.

• B.

It is the data contained in database that is accurate and consistent.

• C.

It is the data contained in database that is secured.

• D.

It is the data contained in database that is shared.

B. It is the data contained in database that is accurate and consistent.
Explanation
Data integrity refers to the reliability and consistency of data stored in a database. It ensures that the data is accurate, complete, and consistent throughout its lifecycle. This means that the data is free from errors, duplications, and inconsistencies. Maintaining data integrity is crucial for ensuring the quality and reliability of information in a database, as it allows users to trust the data and make informed decisions based on it.

Rate this question:

• 15.

What are the desirable properties of a decomposition

• A.

Partition constraint

• B.

Dependency preservation

• C.

Redundancy

• D.

Security.

B. Dependency preservation
Explanation
Dependency preservation is a desirable property of a decomposition because it ensures that the functional dependencies present in the original relation are preserved in the decomposed relations. This means that any dependencies that existed between attributes in the original relation will still hold true in the decomposed relations. This property is important because it ensures that the integrity and consistency of the data is maintained during the decomposition process.

Rate this question:

• 16.

In an E-R diagram double lines indicate

• A.

Total participation

• B.

Multiple participation.

• C.

Cardinality N

• D.

None of the above.

A. Total participation
Explanation
Double lines in an E-R diagram indicate total participation. Total participation means that every entity in one entity set must participate in a relationship with entities in another entity set. In other words, it ensures that every instance of an entity set is associated with at least one instance of another entity set. Double lines are used to represent this constraint in the E-R diagram.

Rate this question:

• 17.

The operation which is not considered a basic operation of relational algebra is

• A.

Join

• B.

Selection

• C.

Union

• D.

Cross product

A. Join
Explanation
The basic operations of relational algebra include Selection, Projection, Union, Difference, Intersection, and Cartesian Product. Join is not considered a basic operation because it combines two relations based on a common attribute, creating a new relation. It is a more complex operation that requires the comparison of values in the common attribute and the merging of tuples from both relations.

Rate this question:

• 18.

Fifth Normal form is concerned with

• A.

Functional dependency

• B.

Multivalued dependency

• C.

Join dependency

• D.

Domain-key.

C. Join dependency
Explanation
Fifth Normal form (5NF) is concerned with join dependency. Join dependency occurs when a relation can be decomposed into multiple smaller relations, and the original relation can be reconstructed by joining these smaller relations. In 5NF, all join dependencies are eliminated, resulting in a more efficient and flexible database design. This normalization form ensures that the database schema is free from redundancy and anomalies, leading to improved data integrity and maintainability.

Rate this question:

• 19.

Block-interleaved distributed parity is RAID level

• A.

2

• B.

3

• C.

4

• D.

5

D. 5
Explanation
Block-interleaved distributed parity is a RAID level where data is divided into blocks and distributed across multiple drives, along with parity information. This allows for improved fault tolerance and data protection. In this RAID level, each block of data is striped across multiple drives, and parity information is calculated and distributed across the drives as well. This ensures that if a drive fails, the data can be reconstructed using the parity information from the remaining drives. Therefore, the correct answer is 5.

Rate this question:

• 20.

Immediate database modification technique uses

• A.

Both undo and redo

• B.

Undo but no redo

• C.

Redo but no undo

• D.

Neither undo nor redo.

A. Both undo and redo
Explanation
The immediate database modification technique uses both undo and redo. Undo is used to reverse the changes made to the database in case of a rollback or an error, while redo is used to reapply the changes made to the database in case of a commit or a crash. By using both undo and redo, the database can maintain consistency and ensure that any changes made to the database are properly recorded and can be reversed if necessary.

Rate this question:

• 21.

What will be output if you will compile and execute the following c code? #define message "union is\ power of c" void main() { clrscr(); printf("%s",message); getch(); }

• A.

Union is power of c

• B.

Union is power of c

• C.

union is Power of c

• D.

Compiler error

• E.

None of these

B. Union is power of c
Explanation
The code defines a macro "message" using the "#define" directive. The macro is defined as "union is power of c". In the main function, the code clears the screen using the "clrscr()" function, then prints the value of the "message" macro using the "printf()" function. Finally, it waits for a key to be pressed using the "getch()" function. Therefore, when the code is compiled and executed, it will output "union is power of c".

Rate this question:

• 22.

What will be output if you will compile and execute the following c code? #define call(x) #x void main(){ printf("%s",call(c/c++)); }

• A.

C

• B.

C++

• C.

#c/c++

• D.

C/c++

• E.

Compiler error

D. C/c++
Explanation
The code is using the # operator in the macro definition. The # operator is used to convert the argument into a string literal. In this case, the argument is "c/c++". So when the code is executed, the printf statement will print the string "c/c++" as the output.

Rate this question:

• 23.

What will be output if you will compile and execute the following c code? converted by Web2PDFConvert.com void main() { if(printf("cquestionbank")) printf("I know c"); else printf("I know c++"); }

• A.

I know c

• B.

I know c++

• C.

cquestionbankI know c

• D.

cquestionbankI know c++

• E.

Compiler error

C. cquestionbankI know c
Explanation
The code will output "cquestionbankI know c". This is because the printf() function in the if statement will print "cquestionbank" and return the number of characters printed, which is not zero. Therefore, the if statement evaluates to true and the code inside the if block will be executed, printing "I know c".

Rate this question:

• 24.

Int y[4] = {6, 7, 8, 9}; int *ptr = y + 2; printf("%d\n", ptr[ 1 ] ); What isprinted when the sample code above is executed? a) 6 b) 7 c) 8 d) 9 Ans: d 27. int i = 4; switch (i) { default: ; case 3: i += 5; if ( i == 8) { i++; if (i == 9) break; i *= 2; } i -= 4; break; case 8: i += 5; break; } printf("i = %d\n", i); What will the output of the sample code above be?

• A.

i = 5

• B.

i = 8

• C.

i = 9

• D.

i = 10

A. i = 5
Explanation
The code starts with the value of i being 4. It enters the switch statement and since there is no case for 4, it goes to the default case. In the default case, i is incremented by 5, making it 9. Then it enters the if statement and since i is not equal to 9, it multiplies i by 2, making it 18. Then it subtracts 4 from i, making it 14. Finally, it breaks out of the switch statement and prints the value of i, which is 14. Therefore, the correct answer is "i = 14".

Rate this question:

• 25.

What will be the value of `a` after the following code is executed #define square(x) x*x a = square(2+3)

• A.

25

• B.

13

• C.

11

• D.

10

C. 11
Explanation
The code defines a macro `square(x)` that squares its input. The value of `a` is then assigned the result of `square(2+3)`, which is `2+3*2+3`. Following the order of operations, the multiplication is performed first, resulting in `2+6+3`. Finally, the addition is performed, resulting in `11`.

Rate this question:

• 26.

What would be the output of the following program? #include main() { char str[]="S\065AB"; printf("\n%d", sizeof(str)); }

• A.

7

• B.

6

• C.

5

• D.

error

B. 6
Explanation
The output of the program would be 6. The program declares a character array named "str" and initializes it with the string "S\065AB". The escape sequence "\065" represents the ASCII value for the character '5'. Therefore, the string "S\065AB" is equivalent to "S5AB". The sizeof() function returns the size of the character array, which is 6 (including the null character at the end of the string). The printf() function is used to print the result.

Rate this question:

• 27.

What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?

• A.

The element will be set to 0

• B.

The compiler would report an error

• C.

The program may crash if some important data gets overwritten

• D.

The array size would appropriately grow

C. The program may crash if some important data gets overwritten
Explanation
If a value is assigned to an array element whose subscript exceeds the size of the array, it may lead to overwriting important data in the program. This can cause the program to crash as it tries to access memory that it is not supposed to. Therefore, the correct answer is that the program may crash if some important data gets overwritten.

Rate this question:

• 28.

Main() { struct { int i; }xyz; (*xyz)->i=10; printf("%d",xyz.i); } What is the output of thisprogram?

• A.

program will not compile

• B.

10

• C.

god only knows

• D.

B. 10
Explanation
The program will output 10. This is because the program defines a structure called xyz with a member variable i. It then assigns the value 10 to the member variable i using the pointer to the structure. Finally, it prints the value of xyz.i, which is 10.

Rate this question:

• 29.

What is the output of the following code? #include void main() { int s=0; while(s++ # define a 10 converted by Web2PDFConvert.com main() { printf("%d..",a); foo(); printf("%d",a); } void foo() { #undef a #define a 50 }

• A.

10..10

• B.

10..50

• C.

Error

C. Error
Explanation
The code will result in an error because the variable "a" is undefined when it is called in the printf statement in the main function. This is because the "#undef a" statement in the foo function removes the definition of "a" and the subsequent "#define a 50" statement only applies within the foo function. Therefore, when "a" is called in the main function, it is not recognized and an error occurs.

Rate this question:

• 30.

What will be the output of the following statements? int i = 3; printf("%d%d",i,i++);

• A.

34

• B.

43

• C.

44

• D.

33

B. 43
Explanation
The output of the given statements will be 43. This is because the printf function first evaluates the format string and then evaluates the arguments in order from left to right. In this case, the format string "%d%d" expects two integer arguments. When the first argument i is encountered, its value is 3. Then, the second argument i++ is encountered. The post-increment operator increments the value of i to 4, but the value used in the printf function is still the original value of i, which is 3. Therefore, the output is 43.

Rate this question:

• 31.

What will be the output of the following statements? int a=5,b=6,c=9,d; d=(ac?1:2):(c>b?6:8)); printf("%d",d);

• A.

1

• B.

2

• C.

6

• D.

Error

D. Error
Explanation
The given code has a syntax error. There is an extra closing parenthesis ")" after the ternary operator. The correct code should be: d=(a>c?1:2):(c>b?6:8); printf("%d",d); This code will result in a compilation error.

Rate this question:

• 32.

What will be the output of the following statement ? printf( 3 + "goodbye");

• A.

Goodbye

• B.

Odbye

• C.

Bye

• D.

dbye

D. dbye
Explanation
The given statement printf(3 + "goodbye") is adding the integer 3 to the string "goodbye". In C programming, when a number is added to a string, it results in a pointer to a character in the string. In this case, adding 3 to "goodbye" will result in a pointer to the fourth character of the string, which is 'd'. Therefore, the output of the statement will be "dbye".

Rate this question:

• 33.

What will be the output of the following statement ? printf("%X%x%ci%x",11,10,'s',12);

• A.

Error

• B.

Basc

• C.

Bas94c

• D.

none of these

B. Basc
Explanation
The output of the given statement will be "basc". This is because the statement uses the printf function to print a series of values. %X is used to print the hexadecimal representation of the number 11, which is B. %x is used to print the hexadecimal representation of the number 10, which is a. %c is used to print the character 's'. %x is used again to print the hexadecimal representation of the number 12, which is c. Therefore, the output will be "basc".

Rate this question:

• 34.

What will be the output of the following statement ? int a=10; printf("%d &i",a,10);

• A.

Error

• B.

10

• C.

10 10

• D.

none of these

D. none of these
Explanation
The output of the given statement will be "10 &i". This is because the printf() function is used to print the value of the variable "a" followed by the string "&i". The "%d" format specifier is used to print the value of the integer variable, which in this case is 10. The "&i" is simply a string that will be printed as it is.

Rate this question:

• 35.

What will be the output of the following arithmetic expression ? 5+3*2%10-8*6

• A.

-37

• B.

-42

• C.

-32

• D.

-28

A. -37
Explanation
The given arithmetic expression follows the order of operations, which is parentheses, exponents, multiplication and division (from left to right), and addition and subtraction (from left to right). First, the multiplication operation is performed, resulting in 3*2 = 6. Then, the modulo operation is performed, resulting in 6%10 = 6. Next, the addition operation is performed, resulting in 5+6 = 11. Finally, the subtraction operation is performed, resulting in 11-8 = 3. Since there are no parentheses or exponents in the expression, the final result is 3, which does not match any of the given answer choices. Therefore, the correct answer is not available.

Rate this question:

• 36.

What isDequeue?

• A.

Elements can be added from front

• B.

Elements can be added to or removed from either the front or rear

• C.

Elements can be added from rear

• D.

None of the above

B. Elements can be added to or removed from either the front or rear
Explanation
A Dequeue (Double Ended Queue) is a data structure in which elements can be added to or removed from either the front or rear. This means that elements can be added or removed from both ends of the queue, providing flexibility in accessing and manipulating the elements. This makes Dequeue a versatile data structure for various applications that require efficient insertion and deletion operations at both ends.

Rate this question:

• 37.

Number of binary trees formed with 5 nodes are

• A.

30

• B.

36

• C.

108

• D.

42

D. 42
Explanation
The number of binary trees that can be formed with 5 nodes is 42. This can be determined using the formula for the number of binary trees with n nodes, which is given by the Catalan number C(n) = (2n)! / ((n+1)! * n!). Plugging in n=5, we get C(5) = (2*5)! / ((5+1)! * 5!) = 10! / (6! * 5!) = 42. Therefore, the correct answer is 42.

Rate this question:

• 38.

The _______ memory allocation function modifies the previous allocated space.

• A.

calloc

• B.

free

• C.

malloc

• D.

realloc

D. realloc
Explanation
The realloc memory allocation function is used to modify the previously allocated space. It allows for resizing the memory block that was previously allocated using malloc, calloc, or realloc itself. The function takes the pointer to the previously allocated block, the new size of the block, and returns a pointer to the modified block. This function is useful when there is a need to change the size of the allocated memory dynamically, such as when adding or removing elements from an array.

Rate this question:

• 39.

The statement printf("%c", 100); will print?

• A.

prints 100

• B.

print garbage

• C.

prints ASCII equivalent of 100

• D.

None of the above

C. prints ASCII equivalent of 100
Explanation
The statement printf("%c", 100); will print the ASCII equivalent of the number 100, which is the character 'd'.

Rate this question:

• 40.

When determining the efficiency of algorithm, the space factor is measured by

• A.

Counting the maximum memory needed by the algorithm

• B.

Counting the minimum memory needed by the algorithm

• C.

Counting the average memory needed by the algorithm

• D.

Counting the maximum disk space needed by the algorithm

A.     Counting the maximum memory needed by the algorithm
Explanation
The efficiency of an algorithm is determined by measuring the space factor, which refers to the amount of memory needed by the algorithm. In this case, the correct answer is counting the maximum memory needed by the algorithm. This means that we consider the highest amount of memory that the algorithm requires during its execution. By counting the maximum memory usage, we can evaluate the algorithm's efficiency in terms of space utilization and make comparisons with other algorithms.

Rate this question:

• 41.

The complexity of Bubble sort algorithm is

• A.

O(n)

• B.

O(log n)

• C.

O(n2)

• D.

O(n log n)

B.     O(log n)
• 42.

• A.

for relatively permanent collections of data

• B.

for the size of the structure and the data in the structure are constantly changing

• C.

for both of above situation

• D.

for none of above situation

B.     for the size of the structure and the data in the structure are constantly changing
Explanation
Linked lists are best suited for situations where the size of the structure and the data in the structure are constantly changing. This is because linked lists allow for efficient insertion and deletion of elements at any position in the list, without the need to shift or resize the entire structure. The dynamic nature of linked lists makes them ideal for situations where the collection of data is frequently modified, as they can easily accommodate changes in size and content without incurring significant overhead.

Rate this question:

• 43.

If the values of a variable in one module is indirectly changed by another module, this situation is called

• A.

internal change

• B.

inter-module change

• C.

side effect

• D.

side-module update

C.     side effect
Explanation
When the values of a variable in one module are indirectly changed by another module, it is referred to as a "side effect." This means that the second module has an impact on the state or behavior of the first module, even though it may not be the intended or expected outcome. Side effects can occur when modules interact with each other and can sometimes lead to unexpected bugs or behavior in a program.

Rate this question:

• 44.

In linear search algorithm the Worst case occurs when

• A.

The item is somewhere in the middle of the array

• B.

The item is not in the array at all

• C.

The item is the last element in the array

• D.

The item is the last element in the array or is not there at all

D.     The item is the last element in the array or is not there at all
Explanation
In linear search algorithm, the worst case occurs when the item is the last element in the array or is not there at all. This is because in linear search, we iterate through each element of the array sequentially until we find the desired item or reach the end of the array. Therefore, if the item is the last element, we have to iterate through the entire array before finding it. Similarly, if the item is not present in the array, we have to iterate through the entire array to confirm its absence.

Rate this question:

• 45.

For an algorithm the complexity of the average case is

• A.

Much more complicated to analyze than that of worst case

• B.

Much more simpler to analyze than that of worst case

• C.

Sometimes more complicated and some other times simpler than that of worst case

• D.

None or above

A.     Much more complicated to analyze than that of worst case
Explanation
The complexity of the average case for an algorithm is much more complicated to analyze than that of the worst case. This is because the worst case scenario represents the maximum amount of time or resources that the algorithm can take, while the average case takes into account the distribution of inputs and their likelihood of occurring. Analyzing the average case requires considering all possible inputs and their probabilities, making it a more complex task compared to analyzing the worst case.

Rate this question:

• 46.

The complexity of merge sort algorithm is

• A.

O(n)

• B.

O(log n)

• C.

O(n2)

• D.

O(n log n)

D.     O(n log n)
Explanation
The complexity of the merge sort algorithm is O(n log n). This means that the time it takes to sort a list of n elements using merge sort grows at a rate that is proportional to n multiplied by the logarithm of n. This is considered to be an efficient sorting algorithm as it has a better time complexity compared to other sorting algorithms like bubble sort or insertion sort, which have a time complexity of O(n2).

Rate this question:

• 47.

The complexity of linear search algorithm is

• A.

O(n)

• B.

O(log n)

• C.

O(n2)

• D.

O(n log n)

A.     O(n)
Explanation
The complexity of the linear search algorithm is O(n) because it has to iterate through each element in the worst case scenario. This means that the time it takes to find the desired element increases linearly with the size of the input. It does not have any logarithmic or quadratic components, which are represented by O(log n) and O(n^2) respectively. O(n log n) is the complexity of certain sorting algorithms, but it is not applicable to linear search.

Rate this question:

• 48.

When determining the efficiency of algorithm the time factor is measured by

• A.

Counting microseconds

• B.

Counting the number of key operations

• C.

Counting the number of statements

• D.

Counting the kilobytes of algorithm

B.     Counting the number of key operations
Explanation
The efficiency of an algorithm is measured by counting the number of key operations. Key operations refer to the fundamental operations or steps performed in the algorithm that directly contribute to its execution time. By counting these key operations, we can analyze and compare the efficiency of different algorithms in terms of their time complexity. Counting microseconds, the number of statements, or the kilobytes of the algorithm are not accurate measures of time factor in determining efficiency.

Rate this question:

• 49.

Which of the following data structure is linear data structure?

• A.

Trees

• B.

Graphs

• C.

Arrays

• D.

None of above

C.     Arrays
Explanation
Arrays are a linear data structure because they store data elements in a contiguous memory location. Each element in an array can be accessed by its index, which is a linear sequence of integers starting from 0. Arrays have a fixed size and can store elements of the same data type. They are efficient for accessing and retrieving elements, but not for inserting or deleting elements in the middle of the array.

Rate this question:

• 50.

The elements of an array are stored successively in memory cells because

• A.

by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated

• B.

the architecture of computer memory does not allow arrays to store other than serially

• C.

both of above

• D.

none of above

A.     by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated
Explanation
The elements of an array are stored successively in memory cells because by this way, the computer can keep track of only the address of the first element. The addresses of other elements can be calculated by adding the appropriate offset to the address of the first element. This allows for efficient memory management and access to array elements.

Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

• Current Version
• Mar 20, 2023
Quiz Edited by
ProProfs Editorial Team
• Jan 02, 2017
Quiz Created by
MCS17

Related Topics