PPSC Lecturer of Computer Science Past Paper Questions
PPSC Lecturer of Computer Science Past Paper Questions
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these
(5) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these
(6) _________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these
7) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is
stored in:
(a) Main Memory
(b) Hard Disk
(d) X.25
(e) None of these
(11) ________ layer is responsible for the transfer of a packet of data along one link in the network. It
organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these
(12) Encryption is the conversion of data in some intelligible format into an unintelligible format called
_________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these
(13) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these
(18) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these
(19) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these
(20) The ________ Process Model defines a series of events that will trigger transitions from state to
state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these
21. Which of the following best describes virtual memory?
(a)A portion of the hard disk considered as RAM
(b)Extended memory on the secondary storage thatis used whenever physical memory is full
(c)The abstraction of separating logical memorymemory as seen by the processfrom physical
memorymemory as seen by the processor
(d)It is the page file in Windows folder (e)None of these
22. The cmp instruction modifies the:
(a)Instruction register (b)Flags register (c)Segment register (d)None of these
23. Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1 Assuming there
are 4 page frames available and that all frames are initially empty, what is the total number of page
faults that would occur for the page reference string above if the least-recently-used (LRU) replacement
policy is used?
(a)6 (b)9 (c)10 (d)11 (e)None of these
24. The Bankers algorithm is used to ____________.
(a)Rectify deadlock (b)Detect deadlock (c)Prevent deadlock
(d)Avoid deadlock (e)None of these
25. The necessary conditions needed before deadlock can occur are ______.
(a) No Mutual Exclusion, Hold and wait, Preemption, Circular Wait
36. Which of the following HTML form method is suitable when you need to send larger form
submissions?
(a) Get (b) Post (c) Both Get and Post (d) Ajax (e)None of these
37. (2,4) is a point on a circle that has center at the origin. Which of the following points are also on circle?
(a) (2,-4) (b) (-2,4) (c) (4,-2) (d) All of above (e)None of these
38. In Bresenhams algorithm, while generating a circle , it is easy to generate?
(a) One octant first and other by successive reflection
(b) One octant first and other by successive rotation
(c) One octant first and other by successive translation
(d) All octants (e)None of these
(39) Object (also called ____) is a common data type that includes photograph, audio, video, or a
document created in other applications.
(a) Number (b) BLOB (c) Integer (d) Binary (e) None of these
(40) In a database, a(n) ____ is a group of related fields.
(a) Table (b) Key (c) Record (d) Primary Field (e) None of these
(41) In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a) Main (b) Identifying (c) Master (d) Key (e) None of these
(42) If the lowest annual fee at a discount warehouse is Rs.2025 and the highest is Rs. 5550, a(n) ____
on the Annual Fee field ensures it is a value between Rs. 2025 and Rs. 5550.
(a) Range Check (b) Completeness Check (c) consistency check
(d) alphabetic/numeric check (e) None of these
(c) wide area network (WAN) (d) variable area network (VAN) (e) None of these
(50) With ____ memory, the operating system allocates a portion of a storage medium, usually the
hard disk, to function as additional RAM.
(a) Virtual (b) Performance (c) Device (d) Managed (e) None of these
Computer Science Mcqs for Lecturer and Subject Specialist PSC Exam
1.
58. All PCs have a BIOS what does bios stand for-Basic Input Output System
59. What is the common name for an integrated circuit A Chip
60. In WWW terms what does i.e. mean on a domain name-Ireland
61. What company introduced the first commercial minicomputer 65 DEC
62. Name the first web browser publicly available NCSA Mosaic
63. The worlds most powerful super computer is called ASCI white.
64. World Wide Web was invented in 1993 by Tim Bareness Lee.
65. The B-programming language was developed by Ken Thompson.
66. The 1st commercially produced and sold computer (1951) was UNIVAC.
67. The transformation from heavy computers to PCs was made possible using microprocessors.
68. The first microprocessor was developed in 1971 by Intel.
69. A pentium 4 (P-4) employs roughly 40 million transistors.
70. Mark-1, Apple-1, and collossus were initial desktop computers.
71. Binary digits are briefed as bit.
72. A collection of bits is called byte.
73. The first home computer (1977), which was sold in millions of units was Apple II.
74. PARAM is a supercomputer.
75. Father of the Computer.. Charles Babbage
76. What does CMOS stand for in a computer- Complementary metal Oxide semi-conductor
a. Data link detects transmission errors while transport layer detects segmentation faults.
b. Data link detects node-to-node errors while transport layer detects end-to-end errors.
c. Data link detects end-to-end errors while transport layer detects node-to-node errors
d. Data link detects segmentation errors while transport layer detects bit error.
e. None of theses
7. Phase Shift Keying (PSK) method is used to modulate digital signals at 9600bps using 16 levels. The
line signals speed (i.e. modulation rate) will be:
a. 1200 bands
b. 2400 bands
c. 4800 bands
d. 9600 bands
e. None of these
8. Exception handling is a powerful tenchnique that separates error-handling code from ______ code
a. Buggy
b. Faulty
c. Normal
d. Exceptional
e. None of these
9. When a subroutine is called, the address of the instruction following the CALL instructions stored in/on
the:
a. Stack pointer
b. Accumulator
c. Programs counter
d. Stack
e. None of these
10. Binary tree preorder traversal is defined recursively as follows:
a. Traverse left subtree, visit the root, traverse right subtree
b. Traverse right subtree, visit the root, traverse left subtree
c. Visit the root, traverse left subtree, traverse right subtree
d. traverse left subtree, traverse right subtree, visit the root
e. None of these
11. What value will return to the operating system upon the successful completion of a program?
a. -1
b. 1
c. 0
d. None of these
12. Which of the following is TRUE about given UML diagram?
a. Checking Accound is a generalization of Saving Account
b. Bank Account is composition of Checking Account and Saving Account
c. Saving Account can process Check
d. Checking Account has a balance?
e. None of theses
13. The advantages of creating a prototype are:
a. It allows developers to experiment with number of different design options.
b. It can serve as means of communication between developers and customers.
c. It is better than water fall model
d. Both a and b
e. None of these
14. Choose the correct statement:
a. Testing can show the presence of bugs but never their absence
b. Testing can always find all the bugs
c. Testing can always be exhaustive
d. If we test enough then we can find all of the bugs
e. None of these
15. Which of the following operations need the participating relations to be union compatible?
a. UNION
b. INTERSECTION
c. DIFFERENCE
d. All of these
e. None of these
16. The language used in application programs to request data from the DBMA is reffered to as the:
a. DML
b. DDL
c. VDL
d. SDL
e. None of these
17. What is the correct XHTML for a paragraph?
a. <P></p>
b. <P></P>
c. <p></p>
d. </p><p>
e. None of these
18. Which of the follwoing HTML form method is suitable when you need to send larger form submission?
a. Get
b. Post
c. Both Get and Post
d. Ajax
e. None of these
19. (2,4) is a point on a circle that has senter at the origion. Which of the follwoing points are also on
circle?
a. (2,-4)
b. (-2,4)
c. (4,-2)
d. All of the above
e. None of these
20. In Bresenhams algorithm, while generating a circle, it is easy to generate?
a. One octant first and other by successive reflection
b. One octant first and other by successive rotation
c. One octant first and other by successive translation
d. All octants
e. None of these.