2017 PPSC (Punjab Public Service Commission) Lecturer Computer Science.

FULL PAPER Solved –

2017 PPSC (Punjab Public Service Commission) Lecturer Computer Science.

2017 PPSC (Punjab Public Service Commission) Lecturer Computer Science

2017 PPSC (Punjab Public Service Commission) Lecturer Computer Science

Computer Networks Question & Answers — Basics
1. Two devices are in network if
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned
View Answer
Answer:a
2. In computer network nodes are
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
View Answer
Answer:d
3. Communication channel is shared by all the machines on the network in
a) broadcast network
b) unicast network
c) multicast network
d) none of the mentioned
View Answer:a
4. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned
View Answer
Answer:a
5. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned
View Answer
Answer:c
6. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned
View Answer
Answer:b
7. Network congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
View Answer
Answer:a
8. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer:b
Network Layer
9. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
View Answer
Answer:c
10. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) none of the mentioned
View Answer
Answer:d
11. The 4 byte IP address consists of
a) network address
b) host address
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
12. In virtual circuit network each packet contains
a) full source and destination address
b) a short VC number
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
13. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Answer:d.
Database Questions & Answers focuses on “Database Design Process ”
14. Which of the following is a tuple-generating dependencies ?
a) Functional dependency
b) Equality-generating dependencies
c) Multivalued dependencies
d) Non-functional dependency
View Answer
Answer: c
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
15. The main task carried out in the __________ is to remove repeating attributes to separate tables.
a) First Normal Form
b) Second Normal Form
c) Third Normal Form
d) Fourth Normal Form
View Answer
Answer: a
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
16. Which of the normal form is based on multivalued dependencies ?
a) First
b) Second
c) Third
d) Fourth
View Answer
Answer:d
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
17. Which forms has a relation that possesses data about an individual entity?
a) 2NF
b) 3NF
c) 4NF
d) 5NF
View Answer
Answer:c
18. In 2NF
a) No functional dependencies (FDs) exist.
b) No multivalued dependencies (MVDs) exist.
c) No partial FDs exist.
d) No partial MVDs exist.
View Answer
Answer: c
19. _____________ can help us detect poor E-R design.
a) Database Design Process
b) E-R Design Process
c) Relational scheme
d) Functional dependencies
View Answer:d
20. Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) Both a and b
View Answer:a
21. In which of the following , a separate schema is created consisting of that attribute and the primary key of the entity set.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) Both a and b
View Answer:b
22. What is the best way to represent the attributes in a large database?
a) Relational-and
b) Concatenation
c) Dot representation
d) All of the above
View Answer b
23. Designers use which of the following to tune performance of systems to support time-critical operations?
a) Denormalization
b) Redundant optimization
c) Optimization
d) Realization
View Answer:a
Operating System— CPU Scheduling
24. Which module gives control of the CPU to the process selected by the short-term scheduler?
a) dispatcher
b) interrupt
c) scheduler
d) none of the mentioned
View Answer
Answer:a
25. The processes that are residing in main memory and are ready and waiting to execute are kept on a list called
a) job queue
b) ready queue
c) execution queue
d) process queue
View Answer
Answer:b
26. The interval from the time of submission of a process to the time of completion is termed as
a) waiting time
b) turnaround time
c) response time
d) throughput
View Answer
Answer:b
27. Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?
a) first-come, first-served scheduling
b) shortest job scheduling
c) priority scheduling
d) none of the mentioned
View Answer
Answer:a
28. In priority scheduling algorithm
a) CPU is allocated to the process with highest priority
b) CPU is allocated to the process with lowest priority
c) equal priority processes can not be scheduled
d) none of the mentioned
View Answer
Answer:a
29. In priority scheduling algorithm, when a process arrives at the ready queue, its priority is compared with the priority of
a) all process
b) currently running process
c) parent process
d) init process
View Answer
Answer:b
30. Time quantum is defined in
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
View Answer
Answer:b
31. Process are classified into different groups in
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
View Answer
Answer:d
32. In multilevel feedback scheduling algorithm
a) a process can move to a different classified ready queue
b) classification of ready queue is permanent
c) processes are not classified into groups
d) none of the mentioned
View Answer
Answer:a
33. Which one of the following can not be scheduled by the kernel?
a) kernel level thread
b) user level thread
c) process
d) none of the mentioned
View Answer
Answer:b
Operating System Page Replacement Algorithms
34. A process refers to 5 pages, A, B, C, D, E in the order : A, B, C, D, A, B, E, A, B, C, D, E. If the page replacement algorithm is FIFO, the number of page transfers with an empty internal store of 3 frames is :
a) 8
b) 10
c) 9
d) 7
View Answer
Answer: c
35. A memory page containing a heavily used variable that was initialized very early and is in constant use is removed, then the page replacement algorithm used is :
a) LRU
b) LFU
c) FIFO
d) None of these
View Answer
Answer: c
36. Users _______ that their processes are running on a paged system.
a) are aware
b) are unaware
c) None of these
View Answer
Answer: b
37. The aim of creating page replacement algorithms is to :
a) replace pages faster
b) increase the page fault rate
c) decrease the page fault rate
d) to allocate multiple pages to processes
View Answer
Answer: c
38. A FIFO replacement algorithm associates with each page the _______
a) time it was brought into memory
b) size of the page in memory
c) page after and before it
d) All of these
View Answer
Answer: a
39. Optimal page — replacement algorithm is :
a) Replace the page that has not been used for a long time
b) Replace the page that has been used for a long time
c) Replace the page that will not be used for a long time
d) None of these
View Answer
Answer: c
40. Optimal page — replacement algorithm is difficult to implement, because :
a) it requires a lot of information
b) it requires future knowledge of the reference string
c) it is too complex
d) it is extremely expensive
View Answer
Answer: b
Explanation: None.
41. LRU page — replacement algorithm associates with each page the ______
a) time it was brought into memory
b) the time of that pages last use
c) page after and before it
d) All of these
View Answer
Answer: b
Explanation: None.
42. For 3 page frames, the following is the reference string :
7 0 1 2 0 3 0 4 2 3 0 3 2 1 2 0 1 7 0 1
i) How many page faults does the LRU page replacement algorithm produce ?
a) 10
b) 15
c) 11
d) 12
View Answer
Answer: d
Software Life Cycle Models
43. Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code).
a) 100-200
b) 200-400
c) 400-1000
d) above 1000
View Answer
Answer:a
Explanation: Build & Fix Model is suitable for small projects & programming exercises of 100 or 200 lines.
44.RAD stands for
a) Relative Application Development
b) Rapid Application Development
c) Rapid Application Document
View Answer
Answer:b
Explanation: None.
45. Which one of the following models is not suitable for accommodating any change?
a) Build & Fix Model
b) Prototyping Model
c) RAD Model
d) Waterfall Model
Answer:d
Explanation: Real projects rarely follow the sequential flow that the Waterfall Model proposes.
46. Which one of the following is not a phase of Prototyping Model?
a) Quick Design
b) Coding
c) Prototype Refinement
d) Engineer Product
View Answer
Answer:b
Explanation: A prototyping model generates only a working model of a system.
47. RAD Model has
a) 2 phases
b) 3 phase
c) 5 phases
d) 6 phases
View Answer
Answer:c
48. What is the major drawback of using RAD Model?
a) Highly specialized & skilled developers/designers are required.
b) Increases re-usability of components.
c) Encourages customer/client feedback.
d) Both a & c.
View Answer
Answer:d
Explanation: The client may create an unrealistic product vision leading a team to over or under-develop functionality.Also, the specialized & skilled developers are not easily available.
49. SDLC stands for
a) Software Development Life Cycle
b) System Development Life cycle
c) Software Design Life Cycle
d) System Design Life Cycle
Answer: a
50. Which model can be selected if user is involved in all the phases of SDLC?
a) Waterfall Model
b) Prototyping Model
c) RAD Model
d) both b & c
View Answer
Answer:c
Software Engineering— Web Engineering
51. Which process model should be used in virtually all situations of web engineering?
a) Incremental Model
b) Waterfall Model
c) Spiral Model
d) None of the mentioned
View Answer
Answer:a
Explanation:The web enginering proces must accommodate incremental delivery, frequent changes and short timeline.
52. Which analysis is a part of Analysis model of the web engineering process framework?
a) Content Analysis
b) Interaction Analysis
c) Functional Analysis
d) All of the mentioned
View Answer
Answer:d
Explanation:Analysis model establishes a basis for design which requires all the mentioned options.
53. Which of the following statements are incorrect with reference to web-based systems? Web-based systems
a) should be unscalable
b) must be able to cope with uncertain, random heavy demands on services
c) must be secure
d) are subject to assorted legal, social, and ethical scrutiny
View Answer
Answer:a
Explanation:Web-based systems should be scalable.
54. What category of web-based system would you assign to electronic shopping?
a) Informational
b) Interactive
c) Transaction-oriented
d) Workflow-oriented
View Answer
Answer:c
55. What category of web-based system would you assign to discussion groups?
a) Collaborative work
b) Online communities
c) Web portals
d) Workflow-oriented
View Answer
Answer:b
Explanation:The answer is self explanatory.
56. W3C stands for
a) World Wide Web Consortium
b) World Wide Web Collaboration
c) World Wide Web Community
d) None of the mentioned
View Answer
Answer:a
Explanation:W3C is an international consortium where member organizations, a full-time staff, and the public work together to develop web standards.
57. Which of the following is a risk associated with using hypertext in web applications?
a) loss of sense of locality and direction
b) cognitive overload for users
c) All of the mentioned
d) None of the mentioned
Answer:c
Explanation:Hypertexts and links may divert the users attention from the main content.
Computer Organization— Interrupts
58. The interrupt-request line is a part of the
a) Data line
b) Control line
c) Address line
d) None
Answer:b
Explanation: The Interrupt-request line is a control line along which the device is allowed to send the interrupt signal.
59. The return address from the interrupt-service routine is stored on the
a) System heap
b) Processor register
c) Processor stack
d) Memory
View Answer
Answer:c
Explanation: The Processor after servicing the interrupts as to load the address of the previous process and this address is stored in the stack.
60. The signal sent to the device from the processor to the device after recieving an interrupt is
a) Interrupt-acknowledge
b) Return signal
c) Service signal
d) Permission signal
View Answer
Answer:a
Explanation: The Processor upon recieving the interrupt should let the device know that its request is received.
Operating System— Memory Management
61. CPU fetches the instruction from memory according to the value of
a) program counter
b) status register
c) instruction register
d) program status word
View Answer
Answer:a
62. A memory buffer used to accommodate a speed differential is called
a) stack pointer
b) cache
c) accumulator
d) disk buffer
View Answer
Answer:b
63. Which one of the following is the address generated by CPU?
a) physical address
b) absolute address
c) logical address
Answer:c
64. Run time mapping from virtual to physical address is done by
a) memory management unit
b) CPU
c) PCI
d) none of the mentioned
View Answer
Answer:a
65. Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
View Answer
Answer:b
MongoDB Questions and Answers — NoSQL Databases
66. Which of the following is not a NoSQL database ?
a) SQL Server
b) MongoDB
c) Cassandra
d) None of the mentioned
View Answer
Answer:a
Explanation:Microsoft SQL Server is a relational database management system developed by Microsoft.
67. Which of the following is a NoSQL Database Type ?
a) SQL
b) Document databases
c) JSON
d) All of the mentioned
View Answer
Answer:b
Explanation:Document databases pair each key with a complex data structure known as a document.
Database— Relational Database and Database Schema
68. A relational database consists of a collection of
a) Tables
b) Fields
c) Records
d) Keys
View Answer
Answer:a
Explanation:Fields are the column of the relation or tables.Records are each row in relation.Keys are the constraints in a relation .
69. A ________ in a table represents a relationship among a set of values.
a) Column
b) Key
c) Row
d) Entry
View Answer
Answer:c
Explanation:Column has only one set of values.Keys are constraints and row is one whole set of attributes.Entry is just a piece of data.
70. The term _______ is used to refer to a row.
a) Attribute
b) Tuple
c) Field
d) Instance
View Answer
Answer:b
Explanation:Tuple is one entry of the relation with several attributes which are fields.
71. The term attribute refers to a ___________ of a table.
a) Record
b) Column
c) Tuple
d) Key
View Answer
72. For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.
a) Domain
b) Relation
c) Set
d) Schema
View Answer
Answer:a
Explanation:The values of the attribute should be present in the domain.Domain is a set of values permitted
Automata Theory— Lexical Analysis
73. The output of the lexical and syntax analyzer can stated as:
a) parse stream, parse tree
b) token tree, parse tree
c) token stream, parse tree
d) All of the mentioned
View Answer
Answer: c
Compiler
74. Parsing is also known as
a) Lexical Analysis
b) Syntax Analysis
c) Semantic Analysis
d) Code Generation
View Answer
Answer: b
Explanation: Parsing or syntactic analysis is the process of analysing a string of symbols and conforming to the rules of grammar.
75. A compiler program written in a high level language is called
a) Source Program
b) Object Program
c) Machine Language Program
d) None of the mentioned
View Answer
Answer: a
Explanation: The input that we give in high level language is also known as the source language.
76. which is an Operating system ans :Microsoft Window
77. By default, on which page the header or the footer is printed? A. on first page B. on alternate page C. on every page D. none of the above
Ans . C
78. The number of pixels stored in the frame buffer of a graphics system is known as
a) Resolution b) Depth c)Resalution
Answer: a
Explanation: Number of pixels determines the resolution .
79. In graphical system, the array of pixels in the picture are stored in :
a) Memory b) Frame buffer c) Processor d) All the above View Answer
Answer: b
Explanation: Frame buffer is mainly used to store pixels
Data Science Questions— Basics of Data Science
80. Which of the following is key characteristic of hacker ?
a) Afraid to say they dont know the answer
b) Willing to find answers on their own
c) Not Willing to find answers on their own
d) All of the mentioned
View Answer
Answer:b
81. Math Q ans: 7/10
82. compete the series 31.63.127.225… (511) 15,31,63,127,255 ans: 511
General Knowledge
83. which game is not in Olympic ?
wrestling
squash
badminton
fencing
Ans: Squash
84.Which countrys flag is called union jeck (UK)
85.Which vitamin human body gets on sun light (vitamin D)
86 Old capital of kazakhastan (almaty)
87.Ameer khusru kahan dafan hen ( Delhi )
88.synonym of Posthumous(after death)
89. antonym of meandering (straight)
90. capital of east bangal after division of bangal (Dacca))
91. Tarki tamam krna ans: bahaduri katam hona
92. Correct the spell… ( Dichotomy)
93.Posthumous synonym ans:after death
94:Plantain fruit is similar to ans:Banana
95:Pangea meaning ans: prehistoric supercontinent
96. “Face the music” mean. (be confronted with the unpleasant consequences of one’s actions)
97.1st president of America to in-office resign. (Richard Nixon)
98. Japan and Philippine President meet in China , third President was : ?
99.Which of the following focuses on the discovery of (previously) unknown properties on the data ?
a) Data mining
b) Big Data
c) Data wrangling
d) Machine Learning
View Answer
Answer:a
2017 PPSC (Punjab Public Service Commission) Lecturer Computer Science.
User Rating: 4.8 (1 votes)

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*

More in Jobs, Pakistan
Hawk Batteries Price List Pakistan Tubular Specs rates
Hawk Batteries in Pakistan Price – Details – Products

Hawk Tubular (Deep Cycle) Battery TVC First Time in Pakistan with 18 Month of Free Replacement Guarantee. This is what...

Close