PPSC Lecturer of Computer Science Past Paper Questions
(1) AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these
(2) In the Base + Offset addressing, Offset address is also
known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these
(3) The technique for allowing a unit to check the status of
another independently function unit is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these
(4) The method for storing data temporarily such that the
input-output of the same job is overlapped with its own processing, is known
as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these
(5) The DMA that uses Busses when CPU is not using them is
termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these
(6) _________ Scheduler deals with the decision as to
whether to admit another new job to the system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these
7) When the process is in the states of Blocked Suspended or
Ready Suspended, its relevant data is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these
(8) Priority, P = (Time Waiting + Run Time) / Run Time is
used to calculate priority in __________ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these
(9) HDLC Protocol stands for:
(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these
(10) _________ is the generic name for a set of standards
issued by the International CommunicationsStandards Body CCITT, designed to
support Message Handling Systems; i.e. Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these
(11) ________ layer is responsible for the transfer of a
packet of data along one link in the network. It organizes data into frames and
detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these
(12) Encryption is the conversion of data in some
intelligible format into an unintelligible format called _________ to prevent
the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these
(13) Binary search requires about ______ comparisons with an
initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these
(14) A _________ header list is a header list where the last
node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these
(15) ________ are small applications that are accessed on an
internet server, transported over the internet, automatically installed and run
as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these
(16) AWT stands for:
(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these
17) GIF images can have only upto _______ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these
(18) ________ is stored on a client and contains state
information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these
(19) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these
(20) The ________ Process Model defines a series of events
that will trigger transitions from state to state for each of software
engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these
21. Which of the following best describes “virtual memory?”
(a)A portion of the hard disk considered as RAM
(b)Extended memory on the secondary storage thatis used
whenever physical memory is full
(c)The abstraction of separating logical memory–memory as
seen by the process–from physical
memory–memory as seen by the processor
(d)It is the page file in Windows folder (e)None of these
22. The ‘cmp’ instruction modifies the:
(a)Instruction register (b)Flags register (c)Segment
register (d)None of these
23. Consider the following page reference string: 1, 2, 3,
4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1 Assuming there
are 4 page frames available and that all frames are initially
empty, what is the total number of page
faults that would occur for the page reference string above
if the least-recently-used (LRU) replacement
policy is used?
(a)6 (b)9 (c)10 (d)11 (e)None of these
24. The Banker’s algorithm is used to ____________.
(a)Rectify deadlock (b)Detect deadlock (c)Prevent deadlock
(d)Avoid deadlock (e)None of these
25. The necessary conditions needed before deadlock can
occur are ______.
(a) No Mutual Exclusion, Hold and wait, Preemption, Circular
Wait
(b) Mutual Exclusion, No Hold and wait, Preemption, Circular
Wait
(c) Mutual Exclusion, Hold and wait, No Preemption, Circular
Wait
(d) Mutual Exclusion, Hold and wait, Preemption, No Circular
Wait (e)None of these
26. Difference between data link layer and transport layer
error detection is that:
(a)Data link detects transmission errors while transport
layer detects segmentation faults
(b)Data link detects node‐to‐node errors while transport
layer detects end‐to‐end errors
(c)Data link detects end‐to‐end errors while transport layer
detects node‐to‐node errors
(d)Data link detects segmentation errors while transport
layer detects bit error (e)None of these
27. Phase shift keying (PSK.) method is used to modulate
digital signals at 9600 bps using 16 levels. The
line signals speed (i.e. modulation rate) will be:
(a) 1200 bands (b) 2400 bands (c) 4800 bands (d) 9600 bands
(e)None of these
28. Exception handling is a powerful technique that
separates error-handling code from ______ code.
(a)Buggy (b)Faulty (c)Normal (d)Exceptional (e)None of these
29. When a subroutine is called, the address of the
instruction following the CALL instructions stored in/on
the:
(a)Stack pointer (b)Accumulator (c)Program counter (d)Stack
(e)None of these
30. Binary tree “preorder” traversal isdefined recursively
as follows:
(a)Traverse left subtree, visit th
e root, traverse right subtree
(b)Traverse right subtree, visit the root, traverse left
subtree
(c)Visit the root, traverse leftsubtree, traverse right
subtree
(d)Traverse left subtree, traverse right subtree , visit the
root (e)None of these
31. The advantages of creating a prototype are:
(a) It allows developers to experiment with number of
different design options
(b) It can serve as means of communication between
developers and customers
(c) It is better than water fall model (d) Both (a) and (b)
(e)None of these
32. Choose the correct statement.
(a) Testing can show the presence of bugs but never their
absence
(b) Testing can always find all the bugs
(c) Testing can always be exhaustive
(d) If we test enough then we can find all of the bugs
(e)None of these
33. Which of the following operations need the participating
relations to be union compatible?
(a) UNION (b)INTERSECTION (c)DIFFERENCE (d)All of these
(e)None of these
34. The language used in application programs to requestdata
from the DBMS isreferred to as the:
(a)DML (b)DDL (c)VDL (d)SDL (e)None of these
35. What is the correct XHTML for a paragraph?
(a)
(b)
(c) (d)
(e)None of these
36. Which of the following HTML form method is suitable when
you need to send larger form
submissions?
(a) Get (b) Post (c) Both Get and Post (d) Ajax (e)None of
these
37. (2,4) is a point on a circle that has center at the
origin. Which of the following points are also on circle?
(a) (2,-4) (b) (-2,4) (c) (4,-2) (d) All of above (e)None of
these
38. In Bresenham’s algorithm, while generating a circle , it
is easy to generate?
(a) One octant first and other by successive reflection
(b) One octant first and other by successive rotation
(c) One octant first and other by successive translation
(d) All octants (e)None of these
(39) Object (also called ____) is a common data type that
includes photograph, audio, video, or a
document created in other applications.
(a) Number (b) BLOB (c) Integer (d) Binary (e) None of these
(40) In a database, a(n) ____ is a group of related fields.
(a) Table (b) Key (c) Record (d) Primary Field (e) None of
these
(41) In a database, a(n) ____ field is a field that uniquely
identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) None of
these
(42) If the lowest annual fee at a discount warehouse is
Rs.2025 and the highest is Rs. 5550, a(n) ____
on the Annual Fee field ensures it is a value between Rs.
2025 and Rs. 5550.
(a) Range Check (b) Completeness Check (c) consistency check
(d) alphabetic/numeric check (e) None of these
(43) A DBMS uses the ____ to perform validation checks.
(a) Data Server (b) data mart (c) data warehouse (d) data
dictionary
(e) None of these
(44) _______ is a network technology that defines how
messages are routed from one end of a
network to the other, ensuring the data arrives correctly by
dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) None of these
(45) When a computer sends data over the Internet, the data
is divided into small pieces, or ____.
(a) Bundles (b) Packets (c) Slices (d) Baskets (e) None of
these
47) The amount of data, instructions, and information that
can travel over a communications channel
sometimes is called the ____.
(a) Broadband (b) Baseband (c) Latency (d) Bandwidth (e)
None of these
(48) Fiber-optic cables have all of the following advantages
over cables that use wire except____.
(a) lower costs and easier installation and modification
(b) faster data transmission and smaller size
(c) less susceptible to noise from other devices
(d) better security for signals during transmission
(e) None of these
(49) A _________ is a network that connects computers and
devices in a limited geographical area,
such as a home, school computer laboratory, or office
building.
(a) local area network (LAN) (b) metropolitan area network
(MAN)
(c) wide area network (WAN) (d) variable area network (VAN)
(e) None of these
(50) With ____ memory, the operating system allocates a
portion of a storage medium, usually the
hard disk, to function as additional RAM.
(a) Virtual (b) Performance (c) Device (d) Managed (e) None
of these
Computer Science Mcqs for Lecturer and Subject Specialist
PSC Exam
Our PC belongs to 4th generation
Bit means Binary Digit
1 byte = 8 bits
Intel means Integrated Electronics
1 worksheet contains 256 columns
G.W.Basic G.W stands for Gate Way
Super Computer was created by J.H.Van Tassel
CORBA is Common Object Request Broker Architecture
URL is Uniform or Universal Resource Locator
Intel invented RAM chip
1 mega byte = 1048576 bytes
1 kilo byte = 1024 bytes
A combination of 16 bits are called word.
A terabyte = 1 trillion bytes
Fred Cohen coined the word computer virus
First computer virus was created in 1970 at Bell
laboratories
WORM means Write Once Read Many
Power of a super computer is measured in FLOPS (Floating
Point Operations per Second)
WWW/http: (hypertext transfer protocol) was created by Tim
Burner Lee in 1992
Information stored on disk as series of bumps on its shiny
side.
DVDs hold more information than CDs. They use smaller bumps
and have two reflective layers
Recordable CDs do not have bumps. There are patches of color
on disk to change the reflected laser light
In 1951 Univac – 1, the world’s first commercial computer
was designed by John Mauchly and J. Presper Eckert. They built ENIAC, the first
electronic computer in 1946
In 1968 mainframe was built.
In 1976 first supercomputer the Cray-1 was developed
In 1981 IBM produce the IBM PC.
In 1998 IBM made quantum computer
Super computers uses parallel processing
In 1974, computer games were introduced.
PROM is the abbreviation of programmable read only memory
What was the world’s first high level programming language
1957: IBM FORTRAN
A JPEG is a picture file format – what does JPEG stand for:
Joint Photographic Experts Group
During World War II, IBM built the computers the Nazis used
to manage their death/concentration camps
Registers are temporary storage areas within the CPU.
First apple computer was built in garage.
The language of small talk is object oriented.
Shell is an operating environment.
Virtual memory is also known as virtual page.
NOS refer to operating systems for a network.
In EBCDIC each character is denoted by 8 bits.
Diodes are used in analog computer circuits as limiter.
Wetware stands for any organic intelligence.
GIGO stands for garbage in garbage out.
Application of flip-flap are counters, shift register and
transfer register.
Bootstrap is associated with computer.
FORTRAN stands for formula translator.
A group of character that is termed as a single entity is
called word.
Clip art is a computer prepared art.
Mark sensing is another term for OMR.
Authorization to make multiple software copies is called
site licensing.
Antivirus is also known as vaccines.
Free software is also known as public domain software.
In computer DFD stands for Data Flow Diagram.
Cyber Space is called to Virtual world of the computer.
What does the sun in SUN Microsystems stand for Stanford University
Network
What does Intel stand for- Integrated Electronics
All PCs have a BIOS what does bios stand for-Basic Input
Output System
What is the common name for an integrated circuit A Chip
In WWW terms what does i.e. mean on a domain name-Ireland
What company introduced the first commercial minicomputer 65
DEC
Name the first web browser publicly available NCSA Mosaic
The world’s most powerful super computer is called ASCI
white.
World Wide Web was invented in 1993 by Tim Bareness Lee.
The B-programming language was developed by Ken Thompson.
The 1st commercially produced and sold computer (1951) was
UNIVAC.
The transformation from heavy computers to PCs was made
possible using microprocessors.
The first microprocessor was developed in 1971 by Intel.
A pentium 4 (P-4) employs roughly 40 million transistors.
Mark-1, Apple-1, and collossus were initial desktop
computers.
Binary digits are briefed as bit.
A collection of bits is called byte.
The first home computer (1977), which was sold in millions
of units was Apple II.
‘PARAM’ is a supercomputer.
Father of the Computer.. Charles Babbage
What does CMOS stand for in a computer- Complementary metal
Oxide semi-conductor
Computer Science Mcqs For Public Service Commission Exams
1. Which of the following best describes “virtual memory”?
a. A portion of the hard disk considered as RAM.
b. Extended memory on the secondary storage that is used
whenever physical memory is full .
c. The abstraction of separating logical memory – memory as
seen by the process – from physical memory – memory as seen ny the processor.
d. It is the page file in Windows folder.
e. None of these.
2. The ‘cmp’ instruction modifies the:
a. Instruction register.
b. Flags register.
c. Segment register.
d. None of these.
3. Consider the following page reference string:
1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,. Assuming there are 4
page framess available and that all frames are initially empty, what is the
total number of page faults that would occur for the page reference string
above if the least-recently-used (LRU) replacement policy is used?
a. 6
b. 9
c. 10
d. 11
e. None of these
4. The Banker’s algorithm is used to _________
a. Rectify deadlock
b. Detect deadlock
c. Prevent deadlock
d. Avoid deadlock
e. None of these
5. The necessary conditions needed before deadlock can occur
are ________.
a. No Mutual Exclusion, Hold and wait, Preemption, Circular
Wait.
b. Mutual Exclusion, No Hold and wait, Preemption, Circular
Wait.
c. Mutual Exclusion, Hold and wait, No Preemption, Circular
Wait.
d. Mutual Exclusion, Hold and wait, Preemption, No Circular
Wait.
6. Differences between data lick layer and transport layer
error detection is that:
a. Data link detects transmission errors while transport
layer detects segmentation faults.
b. Data link detects node-to-node errors while transport
layer detects end-to-end errors.
c. Data link detects end-to-end errors while transport layer
detects node-to-node errors
d. Data link detects segmentation errors while transport
layer detects bit error.
e. None of theses
7. Phase Shift Keying (PSK) method is used to modulate
digital signals at 9600bps using 16 levels. The line signals speed (i.e.
modulation rate) will be:
a. 1200 bands
b. 2400 bands
c. 4800 bands
d. 9600 bands
e. None of these
8. Exception handling is a powerful tenchnique that
separates error-handling code from ______ code
a. Buggy
b. Faulty
c. Normal
d. Exceptional
e. None of these
9. When a subroutine is called, the address of the
instruction following the CALL instructions stored in/on the:
a. Stack pointer
b. Accumulator
c. Programs counter
d. Stack
e. None of these
10. Binary tree “preorder” traversal is defined recursively
as follows:
a. Traverse left subtree, visit the root, traverse right
subtree
b. Traverse right subtree, visit the root, traverse left
subtree
c. Visit the root, traverse left subtree, traverse right
subtree
d. traverse left subtree, traverse right subtree, visit the
root
e. None of these
11. What value will return to the operating system upon the
successful completion of a program?
a. -1
b. 1
c. 0
d. None of these
12. Which of the following is TRUE about given UML diagram?
a. Checking Accound is a generalization of Saving Account
b. Bank Account is composition of Checking Account and
Saving Account
c. Saving Account can process Check
d. Checking Account has a balance?
e. None of theses
13. The advantages of creating a prototype are:
a. It allows developers to experiment with number of
different design options.
b. It can serve as means of communication between developers
and customers.
c. It is better than water fall model
d. Both a and b
e. None of these
14. Choose the correct statement:
a. Testing can show the presence of bugs but never their
absence
b. Testing can always find all the bugs
c. Testing can always be exhaustive
d. If we test enough then we can find all of the bugs
e. None of these
15. Which of the following operations need the participating
relations to be union compatible?
a. UNION
b. INTERSECTION
c. DIFFERENCE
d. All of these
e. None of these
16. The language used in application programs to request
data from the DBMA is reffered to as the:
a. DML
b. DDL
c. VDL
d. SDL
e. None of these
17. What is the correct XHTML for a paragraph?
a. <P></p>
b. <P></P>
c. <p></p>
d. </p><p>
e. None of these
18. Which of the follwoing HTML form method is suitable when
you need to send larger form submission?
a. Get
b. Post
c. Both Get and Post
d. Ajax
e. None of these
19. (2,4) is a point on a circle that has senter at the
origion. Which of the follwoing points are also on circle?
a. (2,-4)
b. (-2,4)
c. (4,-2)
d. All of the above
e. None of these
20. In Bresenham’s algorithm, while generating a circle, it
is easy to generate?
a. One octant first and other by successive reflection
b. One octant first and other by successive rotation
c. One octant first and other by successive translation
d. All octants
e. None of these.
Share:
0 153 comments اپنی راے کمنٹس میں دیں:
Post a Comment
اگر کوئی مسئلہ ھو تو کمنٹ کریں