PPSC Lecturer Computer Science Solved Past Paper of 2017

1).        Which module gives control of the CPU to the process selected by the short-term scheduler?

A).       Dispatcher

B).       Interrupt        

C).       Scheduler

D).       None of these

2).        The process that are residing in main memory for execution are kept on a list called:

A).       Job queue

B).       Ready queue

C).       Execution queue

D).       Process queue

3).        Interval from the time of submission of a process to the time of completion is termed as:

A).       Waiting time

B).       Turnaround time

C).       Response time

D).       Throughput

4).        Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?

A).       First-come first-served scheduling

B).       Shortest job scheduling

C).       Priority scheduling

D).       None of these

5).        In priority scheduling algorithm:

A).       CPU is allocated to the process with highest priority

B).       CPU is allocated to the process with lowest priority

C).       Equal priority processes cannot be scheduled

D).       None of these

6).        In priority scheduling algorithm, when a process arrives at the ready queue, Its priority is compared with the priority of:

A).       All process

B).       Currently process  

C).       Parent process  

D).       Init process

7).        Time quantum is defined in:

A).       Shortest job scheduling 

B).       Round robin scheduling algorithm  

C).       Priority scheduling algorithm

D).       Multilevel queue scheduling algorithm

8).        In multilevel feedback scheduling algorithm:

A).       A process can move to a different classified ready

B).       Classification of ready queue is permanent

C).       Processes are not classified into groups

D).       None of the mentioned

9).        Which one of the following cannot be scheduled by the kernel?

A).       Kernel level thread  

B).       User level thread

C).       Process

D).       None of these

10).     A process refers to 5 pages, A, B,C,D,E in the order: A, B,C,D, A,B,E,A,B,C,D,E. If number of page replacement algorithm is FIFO, the Internal store of 3 frames is:

A).       8

B).       10 

C).       9 

D).       7

11).     A memory page containing a heavily used variable that was initialized very early and is in replacement algorithm used is:

A).       LRU

B).       LFU 

C).       FIFO 

D).       None of these

12).     Users are………………………….that their processes are running on a paged system.

A).       Aware

B).       Unaware   

C).       Informed   

D).       None of these  

 13).    The aim of creating page replacement algorithm is to:

A).       Replace pages faster  

B).       Increase the page fault rate   

C).       Decrease the page fault rate   

D).       To allocate multiple page to process.

14).     A FIFO replacement algorithm associates with each page the ………………….

A).       Time it was brought into memory  

B).       Size of the page in memory   

C).       Page after and before it

D).       All of these  

 15).    Optimal page – replacement algorithm is:

A).       Replace the page that has not been used for a long time.

B).       Replace the page that has been used for a long time.

C).       Replace the page that will not be used for a long time.

D).       None of these

16).     Optimal page – replacement algorithm is difficult to implement, because:

A).       It requires a lot of information.

B).       It requires future knowledge of the reference string

C).       it is too complex

D).       It is extremely expensive

17).     LRU page – replacement algorithm associates with each page the …………………………..

A).       Time it was brought into memory  

B).       The time of that pages last use

C).       Page after and before it 

D).       All of these

18).     For 3 page frames, the following is the reference string: 7 0 1 2 0 3 0 4 2 3 0 3 2 1 2 0 1  0 1 7 0 1; How many page faults does the LRU page replacement algorithm produce?

A).       10

B).       15 

C).       11 

D).       12

 19).    CPU fetches the instruction from memory according to the value of:

A).       Program Counter

B).       Status register 

C).       Instruction register

D).       Program status word

20).     A memory buffer used to accommodate a spood differential is called:

A).       Slack pointer

B).       Cache

C).       Accumulator

D).       Disk buffer

21).     Which one of the following is the address generated by CPU?

A).       Physical

B).       Absolute address

C).       Logical address

D).       None of these

22).     Run time mapping from virtual to physical address is done by:

A).       Memory management unit

B).       CPU

C).       PCI

D).       None of these

23).     Memory management techniques in which system stores and retrieves data from secondary storage for used in main memory is called:

A).       Fragmentation

B).       Paging

C).       Mapping

D).       None of these

24).     The Interrupt request line is a part of the:

A).       Data line

B).       Control line

C).       Address line

D).       None of these

25).     The return address from the interrupt services routine is stored on the:

A).       System heap

B).       Processor register

C).       Processor slack

D).       Memory

26).     The signal sent to the device from the processor to the device after receiving an interrupt is:

A).       Interrupt acknowledge

B).       Return signal

C).       Service signal

D).       Permission signal

27).     A relational database consists of a collection of:

A).       Tables

B).       Fields

C).       Records

D).       Keys

28).     A ……………………..in a table represents a relationship among a set of values.

A).       Column

B).       Key

C).       Row

D).       Entry

29).     The term …………………………is used to refer to a row.

A).       Attribute

B).       Tuple

C).       Field

D).       Instance

30).     The term attribute refers to a ……………………….of a table.

A).       Record

B).       Column

C).       Tuple

D).       Key

31).     For each attribute of a permitted values, called the ………………………….of the attribute.

A).       Domain

B).       Relation

C).       Set

D).       Schema

32).     Which of the following is a tuple-generating dependency?

A).       Functional dependency

B).       Equality-generating dependencies

C).       Multi-valued dependencies

D).       Non-functional dependencies

33).     The main task carried out in the to remove repeating attributes to separate tables.

A).       First Normal Form

B).       Second Normal Form

C).       Third Normal Form

D).       Fourth Normal Form

34).     Which of the normal is based on multi-valued dependencies?

A).       First

B).       Second

C).       Third

D).       Fourth

35).     Which forms has a relation that possesses data about an individual entity?

A).       2NF

B).       3NF

C).       4NF

D).       5NF

36).     Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set?

A).       A many-to-many relationship set

B).       A multi-valued attribute of an entity set

C).       A one-to-many relationship set

D).       Both A and B

37).     In which of the following, a separate schema is created consisting of that attribute and the primary key of the entity set?

A).       A many-to-many relationship set

B).       A multi-valued attribute of an entity set

C).       A one-to-many relationship set

D).       Both A and B

38).     In 2NF:

A).       No functional dependencies (FDs) exist

B).       No multi-valued dependencies (MVDs)

C).       No partial FDs exist

D).       No partial MVDs exist

39).     ………………………… can help us detect  poor E-P  design,

A).       Database Design Process

B).       E-R Design Process

C).       Relational Scheme

D).       Functional Dependencies

40).     Build & Fix Model is suitable for programming exercises of ………………….LOC (Line of Code)

A).       100-200

B).       200-400

C).       400-1000

D).       Above 1000

41).     What is the best way to represent the attributes in a large database?

A).       Relational-and

B).       Concatenation

C).       Dot representation

D).       All of these

42).     Designers uses which of the following to tune performance of systems to support time critical operations?

A).       Demoralization

B).       Redundant optimization

C).       Optimization

D).       Realization

43).     RAD stands for:

A).       Relative Application Development

B).       Rapid Application Development

C).       Rapid Application Document

D).       Rational Application Document

44).     Which one of the following models is not suitable for accommodating any change?

A).       Build & Fix  Model

B).       Prototyping Model

C).       RAD Model

D).       Waterfall Model

45).     Which one of the following is not a phase of Prototyping Model?

A).       Quick

B).       Coding

C).       Prototype Refinement

D).       Engineer Product

46).     RAD Model has:

A).       2 Phase

B).       3 Phase

C).       5 Phase

D).       6 Phase

47).     What is the major drawback of using RAD Model?

A).       High Specialized & skilled developers designers are required

B).       Increase reusability of components

C).       Encourages customer / client feedback.

D).       Both A & C

48).     SDLC Stands for:

A).       Software Development Life Cycle

B).       System Development Life Cycle

C).       Software Design Life Cycle

D).       System Design Life Cycle

49).     Which model can be selected in all the phases of SDLC?

A).       Waterfall Model

B).       Prototyping Model

C).       RAD Model

D).       Both A & C

50).     Two devices are in network if:

A).       A process in one device is able to exchange information with a process in another device.

B).       A process is running on both devices

C).       PIDs of the processes running of different devices are same.

D).       None of these

51).     In computer network nodes are:

A).       The computer that originates the data

B).       The computer that routes the data

C).       The computer that terminates data

D).       All of these

52).     Communication channel is shared by all the machines on the network in:

A).       Broadcast network

B).       Uni-cast network

C).       Multi-cast network

D).       None of these

53).     Bluetooth is an example of:

A).       Personal area network

B).       Local area network

C).       Virtual private network

D).       None of these

54).     A………………………..is a device that forwards  packets between networks by processing the routing information included in the packet.

A).       Bridge

B).       Firewall

C).       Router

D).       All of these

55).     A list of protocols used by a system, one protocol per layer is called:

A).       Protocol architecture

B).       Protocol stack

C).       Protocol suit

D).       None of these

 

56).     Network congestion occurs:

A).       In case of traffic overloading

B).       When system terminates

C).       When connection between two nodes terminates

D).       None of these

57).     Which one of the following extends a private network across public networks?

A).       Local area network

B).       Virtual private network

C).       Enterprise private network

D).       Storage area network

58).     The network layer concerns:

A).       Bits

B).       Frames

C).       Packets

D).       None of these

59).     Which one of the following is not a function of network layer?

A).       Routing

B).       Inter-networking

C).       Congestion control

D).       None of these

60).     The 4 byte IP address consists of:

A).       Network address

B).       Host address

C).       Both A & B

D).       None of these

61).     In virtual circuit, network each packet contains:

A).       Full source and destination address

B).       A short VC number

C).       Both A and B

D).       None of these

62).     Which one of the following routing algorithm can be used for network layer design?

A).       Shortest path algorithm

B).       Distance vector routing

C).       Link stale routing

D).       All of these

63).     The network layer protocol of Internet is:

A).       Ethernet

B).       Internet Protocol

C).       Hypertext transfer protocol

D).       None of these

64).     ICMP is primarily used for:

A).       Error and diagnostic functions

B).       Addressing

C).       Forwarding

D).       None of these

65).     The lexical analyzer takes …………………….as input and produces a stream of ……………as output:

A).       Source program

B).       Token, sources program

C).       Both A & B

D).       None of these

66).     Parsing is also known as:

A).       Lexical Analysis

B).       Syntax Analysis

C).       Semantic Analysis

D).       Code Generation

67).     A compiler program written in a high level language is called:

A).       Source Program

B).       Object Program

C).       Machine Language Program

D).       None of these

68).     The number of pixels stored in the frame buffer of a graphics system is known as:

A).       Resolution

B).       Depth

C).       Mass

D).       None of these

69).     In graphical system, the array of pixels in the picture is stored in:

A).       Memory

B).       Frame buffer

C).       Processor

D).       All of these

70).     Which of the following is key characteristic of hackor?

A).       Afraid to say they don’t know the answer

B).       Willing to find answers on their own

C).       Not willing to find answers on their own

D).       All of these

71).     Which of the following focuses on discovery of (previously) unknown properties on data?

A).       Data mining

B).       Big Data

C).       Data wrangling

D).       Machine Learning

72).     Which  process model should be used in virtually all situations of web engineering?

A).       Incremental Model

B).       Waterfall

C).       Spiral Model

D).       None of these

73).     Which analysis is a part of Analysis model of the web engineering process framework?

A).       Content Analysis

B).       Interaction Analysis

C).       Functional Analysis

D).       All of these

74).     Which of the following statements are incorrect with reference to web-based system?

A).       Should be un-scalable

B).       Must be to cope uncertain, random heavy demand on services

C).       Must be secure

D).       Are subject to assorted legal, social and ethical scrutiny

75).     What category of web-based system would you assign to electronic shopping?

A).       Information

B).       Interactive

C).       Transaction-oriented

D).       Workflow-oriented

76).     What category of web-based system would you assign to discussion groups?

A).       Collaborative work

B).       Online communities

C).       Web portals

D).       Workflow-oriented

77).     W3C stands for:

A).       World Wide Web Consortium

B).       World Wide Web Collaboration

C).       World Wide Web Community

D).       None of these

78).     Which of the following is a risk associated with using hypertext in web applications?

A).       Loss of sense of locality and direction

B).       Cognitive overload for users

C).       Both A and B

D).       None of these

79).     Which of the following is not a NosQL database?

A).       SQL Server

B).       MongoDB

C).       Cassandra

D).       None of these

80).     Which of the following is NoSQL Database type?

A).       SQL

B).       Document databases

C).       JSON

D).       All of these

81).     Which one of the following is an example of Operating System?

A).       Microsoft Word

B).       Microsoft Excel

C).       Microsoft Access

D).       Microsoft Windows

82).     By default on which page the Header or the   Footer is printed, in MS Word?

A).       On first page

B).       On alternate page

C).       On every page

D).       None of these

83).     Complete the number series: 15, 31, 63, 127, 255,……………………………

A).       513

B).       511

C).       523

D).       517

84).     Solve the equation: { ¼ + 5/8} ÷{1/2 + ¾} = ?

A).       35/32

B).       10/7

C).       5/12

D).       7/10

85).     “To face the music” means:

A).       To be greeted rudely

B).       To be offered warm hospitality

C).       To be on the front seat in a concert

D).       To bear the consequences

86).     What is the synonym of “Posthumous”?

A).       After death

B).       Moisture

C).       Rich

D).       Rear

87).     What is the antonym of “Meandering”?

A).       Sliding

B).       Straight

C).       Sloping

D).       Curved

88).     Find the correctly spelt word:

A).       Dicotomy

B).       Dicotemy 

C).       Dichotomy

D).       Dechotomy

89).     To which fruit is Plantain similar to?  

A).       Grapefruit

B).       Apples

C).       Jackfruit

D).       Bananas

90).     Exposure to sunlight results in formation of ………………….in the body.

A).       Vitamin A

B).       Vitamin C

C).       Vitamin K

D).       Vitamin D

91).     Who was the first American President to resign while in office?

A).       Theodore Roosevelt

B).       Bill Clinton

C).       Richard Nixon

D).       John Quicy Adams

92).     The current capital of Kazakhstan is Astana name of the former capital:

A).       Almaty

B).       Dushanbe

C).       Bishkek

D).       None of these

93).     In Geography what do you understand by “Pangaea”?

A).       A super continent

B).       Hills formed by Lava outflow

C).       Concentration of Sulpher in hot springs

D).       None of these

94).     After the partition of Bengal the Capital of East Bengal and Assam was:

A).       Dhaka

B).       Calcutta

C).       Chittagong

D).       Sylhett

95).     Which was the official language during the Muslim Ruler in India?

A).       Urdu

B).       Turkish

C).       Persian

D).       Arabic

96).     Which of the following is not an Olympic Sport?

A).       Squash

B).       Badminton

C).       Wrestling

D).       Fencing

97).     The Flag of which country is also known as the Union Jack?

A).       UK

B).       USA

C).       New Zealand

D).       Barbados

98).     Bobo Forum for Asia, which holds its annual conference at Boao Hainan Province, China was originally proposed by former President Ramos of Philippines form Prime Minister Monhiro Hosokawa of Japan and:

A).       Former Primer Minister Bob Hawke of Australia

B).       Former Prime Minister Mahathir Muhammad Malaysia

C).       Former President Hu Jin Tao of China

D).       Former Prime Minister Shaukat Aziz of Pakistan

ترکی تمام ہونا محاورہ ہے اس کا مفہوم کیاہے؟.99

غیر ملکی سفر پر جانا. (A

بجٹ ختم کرنا.(B

کو شش ترک کرنا.(C

بہادری ختم ہونا.(D

امیر خسرو کس شہر کس شہر میں مدفون ہے؟.(100

عمرکوٹ.(A

ملتان.(B

دہلی .(C

رائے بریلی.(D

3 thoughts on “PPSC Lecturer Computer Science Solved Past Paper of 2017

Leave a comment

Your email address will not be published.