1. AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these

2. In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these

3. The technique for allowing a unit to check the status of another independently function unit is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these

4. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these

5. The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these

6. _____________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level ( Also known as Long term Scheduler / Job Scheduler)
(b) Medium Level
(c) Low Level / Short term scheduler / dispatcher
(d) Short term
(e) None of these

7. When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these

8. Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these

9. HDLC Protocol stands for:
(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these

10.___________ is the generic name for a set of standards issued by the International CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e. Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these

11. ____________ layer is responsible for the transfer of a packet of data along one link in the network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these

12. Encryption is the conversion of data in some intelligible format into an unintelligible format called _ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

13. Binary search requires about __ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20 (Rounded)
(c) 35
(d) 100
(e) None of these (exect)

14. A_____________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these

15. ________ are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these

16.____________AWT stands for:
(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these

17._______________GIF images can have only upto _ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these

18._____________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these

19.In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these

20. The ________Process Model defines a series of events that will trigger transitions from state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these

Which of the following best describes “virtual memory?”
(a) A portion of the hard disk considered as RAM
(b) Extended memory on the secondary storage that is used whenever physical memory is full
(c) The abstraction of separating logical memory–memory as seen by the process–from physical memory–memory as seen by the processor
(d) It is the page file in Windows folder
(e)None of these

The ‘cmp’ instruction modifies the:
(a) Instruction register
(b)Flags register
(c)Segment register
(d)None of these

Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1 Assuming there are 4 page frames available and that all frames are initially empty, what is the total number of page faults that would occur for the page reference string above if the least-recently-used (LRU) replacement policy is used? (Solution details)
(e)None of these

The Banker’s algorithm is used to _________.
(a)Rectify deadlock
(b)Detect deadlock
(c)Prevent deadlock
(d)Avoid deadlock
(e)None of these

The necessary conditions needed before deadlock can occur are _________.
(a) No Mutual Exclusion, Hold and wait, Preemption, Circular Wait
(b) Mutual Exclusion, No Hold and wait, Preemption, Circular Wait
(c) Mutual Exclusion, Hold and wait, No Preemption, Circular Wait
(d) Mutual Exclusion, Hold and wait, Preemption, No Circular Wait
(e)None of these

Difference between data link layer and transport layer error detection is that:
(a) Data link detects transmission errors while transport layer detects segmentation faults
(b) Data link detects node‐to‐node errors while transport layer detects end‐to‐end errors
(c) Data link detects end‐to‐end errors while transport layer detects node‐to‐node errors
(d) Data link detects segmentation errors while transport layer detects bit error
(e) None of these

Phase shift keying (PSK.) method is used to modulate digital signals at 9600 bps using 16 levels. The line signals speed (i.e. modulation rate) will be:
(a) 1200 bands
(b) 2400 bands
(c) 4800 bands
(d) 9600 bands
(e)None of these

Exception handling is a powerful technique that separates error-handling code from ______________code.
(e)None of these

When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the:
(a)Stack pointer
(c)Program counter
(e)None of these

Binary tree “preorder” traversal isdefined recursively as follows:
(a)Traverse left subtree, visit the root, traverse right subtree
(b)Traverse right subtree, visit the root, traverse left subtree
(c)Visit the root, traverse leftsubtree, traverse right subtree
(d)Traverse left subtree, traverse right subtree , visit the root
(e)None of these

The advantages of creating a prototype are:
(a) It allows developers to experiment with number of different design options
(b) It can serve as means of communication between developers and customers
(c) It is better than water fall model
(d) Both (a) and (b)
(e)None of these

Choose the correct statement.
(a) Testing can show the presence of bugs but never their absence
(b) Testing can always find all the bugs
(c) Testing can always be exhaustive
(d) If we test enough then we can find all of the bugs
(e)None of these

Which of the following operations need the participating relations to be union compatible?
(d)All of these
(e)None of these

The language used in application programs to requestdata from the DBMS isreferred to as the:
(e)None of these

What is the correct XHTML for a paragraph?
(a) “<p></p>”
(b) “</p>”
(c) “<p>”
(d) “<p……/p>”
(e)None of these

Which of the following HTML form method is suitable when you need to send larger form submissions?
(a) Get
(b) Post
(c) Both Get and Post
(d) Ajax
(e)None of these

(2,4) is a point on a circle that has center at the origin. Which of the following points are also on circle?
(a) (2,-4)
(b) (-2,4)
(c) (4,-2)
(d) All of above
(e)None of these

In Bresenham’s algorithm, while generating a circle , it is easy to generate?
(a) One octant first and other by successive reflection
(b) One octant first and other by successive rotation
(c) One octant first and other by successive translation
(d) All octants
(e)None of these

Object (also called _________) is a common data type that includes photograph, audio, video, or a document created in other applications.
(a) Number
(b) BLOB
(c) Integer
(d) Binary
(e) None of these

In a database, a(n) _________ is a group of related fields.
(a) Table
(b) Key
(c) Record
(d) Primary Field
(e) None of these

In a database, a(n) ________ field is a field that uniquely identifies each record in a file.
(a) Main
(b) Identifying
(c) Master
(d) Key
(e) None of these

If the lowest annual fee at a discount warehouse is Rs.2025 and the highest is Rs. 5550, a(n) ______________on the Annual Fee field ensures it is a value between Rs. 2025 and Rs. 5550.
(a) Range Check
(b) Completeness Check
(c) consistency check
(d) alphabetic/numeric check
(e) None of these

A DBMS uses the _______ to perform validation checks.
(a) Data Server
(b) data mart
(c) data warehouse
(d) data dictionary
(e) None of these

_________ is a network technology that defines how messages are routed from one end of a network to the other, ensuring the data arrives correctly by dividing it into packets.
(a) HTML
(b) XML
(c) HTTP
(d) TCP/IP
(e) None of these

When a computer sends data over the Internet, the data is divided into small pieces, or __________.
(a) Bundles
(b) Packets
(c) Slices
(d) Baskets
(e) None of these

The amount of data, instructions, and information that can travel over a communications channel sometimes is called the __________.
(a) Broadband
(b) Baseband
(c) Latency
(d) Bandwidth
(e) None of these

Fiber-optic cables have all of the following advantages over cables that use wire except__________.
(a) lower costs and easier installation and modification
(b) faster data transmission and smaller size
(c) less susceptible to noise from other devices
(d) better security for signals during transmission
(e) None of these

A ______ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.
(a) local area network (LAN)
(b) metropolitan area network (MAN)
(c) wide area network (WAN)
(d) variable area network (VAN)
(e) None of these

With ________ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
(a) Virtual
(b) Performance
(c) Device
(d) Managed
(e) None of these

1 thought on “PPSC Lecturer Computer Science-Past Paper 2015 (Solved)”

Leave a Reply

Your email address will not be published. Required fields are marked *