PPPSC Mock Test Preparation Quiz no 6 A.J. Bhatti October 16, 2020 Welcome to your PPPSC Mock Test Preparation Quiz no 6 Name Email A storage devices where the access time is effectively independent of the location of the data is referred as (A) Direct access (B) Secondary storage (C) Primary storage (D) None of these The Function Which are used for performing some other Functions are Utility Functions Accessor Functions Public Functions Private Functions To ensure correct operation of a computer system, we need to ensure that a process cannot access memory outside its address space address access space address space Memory protection Space A Virus is also known as "Worm" True or False True False The information that gets transformed in encryption is ____________ a) Plain text b) Parallel text c) Encrypted text d) Decrypted text An algorithm in encryption is called _____________ a) Algorithm b) Procedure c) Cipher d) Module In Windows operating system it is a window that is used to display text or to receive text from you. The type of text it displays or the type of text you are asked to provide depends on the application or the situation. (A) Control’s Focus (B) Dialog Boxes (C) Command Buttons (D) Text Boxes CHAP stands for? a) Challenge Handshake authentication protocol b) Challenge Hardware authentication protocol c) Circuit Hardware authentication protocol d) Circuit Handshake authentication protocol An object is an ............ Pillar of Class Instance of Class Builder of Class Both A and C In OOP the Class used for inheritance is known as Concrete Class Abstract Class Public Class Child Class The Functions used to access Private Data Members and allows us to Set and Get there Values From Outside the World are............ Utility Functions Private Functions Accessor Funtions Public Functions 15.A computer system that allows only one user to use the computer at a given time is known as a Multi-User Systems Batch Systems Single User Systems Both A & B 16............... are the Early computers were large machines run from a console with card readers and tape drives as input devices and line printers, tape drives, and card punches as output devices. The user did not interact directly with the system; instead the user prepared a job, (which consisted of the program, data, and some control information about the nature of the job in the form of control cards) and submitted this to the computer operator. Single User Systems First Generation Systems Multi-User Systems Batch Systems 17.The System that Perform Collection of Jobs in Sequence is known as ........ Batch System Operating system Single User System Multi User System 14: What is operating System.....??? The operating system acts as the manager of all Computer resources, facing numerous and possibly conflicting requests for resources The operating system acts as the manager of all Memory resources, facing numerous and possibly conflicting requests for resources The operating system acts as the manager of all Cache resources, facing numerous and possibly conflicting requests for resources The operating system acts as the manager of all CPU resources, facing numerous and possibly conflicting requests for resources ......... Register holds the smallest legal physical memory address for a process Base Register Limit Register Base & Limit Register None of the above Which Register contains contains the size of the process Base Register Limit Base Base & Limit Limit Register A fixed-rate clock and a counter are used to implement a CPU Protection CPU Timer Variable & CPU Timer variable timer The very first version of Microsoft Office was released for (A) Windows operating system (B) Apple Macintosh OS (C) Unix (D) None of these Is it possible to make a concrete class "Employee" form Abstract Class "Person".... Yes No Vice Versa The first version of MS Office to be released for the Microsoft Windows operating system is (A) Microsoft Office 3.0 (C) Microsoft Office 2007 (B) Microsoft Office 2003 (D) Microsoft Office XP Class Employee : Public Person {}(Which is the Parent Class ) Class Employee Class Child Class Person Class ................spend more time doing computations, few very long CPU bursts. CPU Bound Processes I/O Bound Processes None of Them All of Them The state of a process is defined in part by the .......... activity of that process Previous Upcoming current All of them What operation is done in the type of Process named as "New" The process is being created. The process is being Deleted. The process is being updated. The process is being Selected. In Running Process state the Instructions are being ....... Loaded Deleted Released executed When a process is allocated the CPU, it executes for a while, and eventually quits, is interrupted or waits for a particular event, such as completion of an I/O request. In the case of an I/O request, the device may be busy with the I/O request of some other process, hence the list of processes waiting for a particular I/O device is called a ............ Process Queue Job Queue device queue Both A & B A process migrates between the various scheduling queues throughout its .......... Progressing lifetime CPU Time All of Them In .............scheduler (or job scheduler) selects which processes should be brought into the ready queue, from the job pool that is the list of all jobs in the system Long Term Short Term Middle Level None of the above The ................ scheduler (or CPU scheduler) selects which process should be executed next and allocates CPU. Short-term Long-term Middle-term All of the above Economy of Scale is Databases and database systems are designed to share data stored in one location for many different purposes access of database form as number of points simultaneously Both A & B None of Above .................. is the process to access the database in such a way that all the data accesses are completed correctly and transparently Concurrency Concurrency Control Economy Scale Both A & C High Cost and Conversion Cost are the benefits of DBMS System , Is it True ??? True False The Data is Divided into ....... Levels 1 2 3 4 The sending process is .......... until the receiving process or the mailbox receives the message Terminated blocked Restart Starts The sending process sends the message and resumes operation is called blocking send Non-blocking recieve Non-blocking send All of them In ......... receive: The receiver blocks until a message is available Blocking Process Non Blocking Recieve All of the above In .......... receiver: The receiver receives either a valid message or a null Blocking NonProccess-blocking Non-blocking None of these Q no 13 : The process of to allow or restrict different database users to interact with the database is known as Database Management Services Authorization of Data Authorization Services of DBMS All of the above Q No 14 : if the system is working for such an organization which is spread across the country and it is deployed over a number of offices throughout the country, then the DBMS should be able to communicate to the central database station. This Service of DBMS is known as......... Transaction Processing Data communication Support Data integrity Data processing Q no 15:Data Integrity a Service of DBMS responsible for Originality of Data Duplication of Data Bogus Data Both B & C Q no 16 :In a Client Server System An End User is Directly Connected with ........... Server Administerator Client Remote offices One measure of work is the number of processes completed per time, called, CPU Utilization Turnaround Time Through Put Waiting Time The interval from the time of submission to the time of completion is the ........ CPU Utilization Throughput waiting time turnaround time Turnaround time is the sum of the periods spent waiting to get into memory, waiting in the ready queue, .......................... and doing I/O ready queue executing on the CPU I/O Processes Waiting time is the time spent waiting in the ............ Waiting queue Process Queue Ready Queue Waiting queue Q No 13 : All of the Strong and Current Database Management Systems like Oracle, Fox Base , Microsoft Access are.......... Relational Database Systems Conceptual Database Systems Strong Database Systems All of the above Hazrat Muhammad (SAW) gave the key of Baitullah permanently to: Usama Bin Zaid R.A Hazrat Ali R.A Usman Bin Talha Hazrat Usama bin Zaid Q No 14 : A Relational Database is ............... Dimensional Two Three Four One Q No 15 : In a Relational Data Base Each cell of a table must contains atomic/single value . Is it True? True False Q No 16 : In Relational Database The values of the attributes did not come from the same domain True False if you know at compile where the process will reside in memory, the absolute addresses can be assigned to instructions and data by the compiler....This process is known as ... Load Time Compile Time Execution Time Memory Management if it is not known at compile time where the process will reside in memory, then the compiler must generate re-locatable code. In this case the final binding is delayed until ....... Compile Time Execution Time load time Memory management if the process can be moved during its execution from one memory segment to another, then binding must be delayed until run time. This process is known as ..... Execution Time Compile Time Load Time Memory Management In case of compile and load time binding, a program may not be moved around in memory ............ at run time Load Time Compile Time Execution Time 13. Compute π C, D (S). Which of the following records will be in the result? (a) (5, 1) (b) (4, 3) (c) (3, 3) (d) (3, 5) 14.Compute π B, C (R ⋈ S). Which of the following records will be in the result? Add description here! (a) (6, 4) (b) (4, 3) (c) (5, 1) (d) (5, 3) 15.Compute π B (R) - π B (S). Which of the following records will be in the result? (a) (6) (b) (4) (c) (1) (d) (5) 16.Compute π B (R) ∩ π B (S). Which of the following records will be in the result? (a) (6) (b) (1) (c) (2) (d) (5) 13. @@NESTLEVEL function falls under which of the following category? a) Configuration functions b) Cursor functions c) Mathematical functions d) Date and Time Data Functions 14. Exact Numeric data type is ___________ a) bigint b) int c) smallmoney d) all of the mentioned 15. ntext data type falls under which category? a) Exact numerics b) Character strings c) Unicode character strings d) None of the mentioned 16. Advantages of View are A. Security B. Query re-usability C. Abstraction – hiding data D. All Neptune takes ......... Earth years to get around the sun 100 165 170 175 Saturn is a very windy place! Winds can reach up to 1,200 miles per hour 1,100 miles per hour 1,400 miles per hour 1,500 miles per hour Uranus has........ moons Uranus has 15 moons Uranus has 10 moons Uranus has 12 moons Uranus has 13 moons If Jupiter were hollow, you could fit ........ earths inside 1200 1300 900 1000 . ....... of all the ice in the world in on Antarctica 80 % 85% 90 % 93 % . Antarctica is COLDEST continent, averaging minus ...... degrees in the winter 75 74 77 76 Every dolphin has its own signature whistle to distinguish it from other ........., much like a human fingerprint animals species fishes dolphins The world’s largest mammal, the blue whale, weighs ........ 20 tons 30 tons 40 tons 50 tons The largest bird egg in the world today is that of the ostrich Hen Duck Lion Ostrich eggs are from ........ inches long 4 to 8 3 to 8 2to 8 6 to 8 An elephant can smell water ........ away Four miles three miles Five miles Seven miles The world’s tallest woman is .......... She is 2.35m (7 ft. 7 in.) Sandy Allen Sandy Robert Sandy David Sandy Pouch The only 2 animals that can see behind themselves without turning its head are the rabbit and the parrot the parrot rabbit lions India never invaded any country in her last ......years of history 1000 100 10 10000 A hippopotamus can run faster than a...... man lion Deer kangroo Ostriches can kick with tremendous force, but only ......... Don’t Mess with them backword forward Middle Upword A person can live without food for about a month, but only about a week without ......... water rest sleep walk The smallest bird in the world is the Sparrow Hummingbird owl fly The highest kangaroo leap recorded is 10 ft and the longest is 100ft 40ft 70ft 42 ft Dolphins sleep with ........ open both eye one eye left eye right eye Digitizer is an input device (A) Used to convert graphic and pictorial data into binary inputs for a digital computer (B) Used to convert graphic and pictorial data into analog inputs for a digital computer. (C) Used for debugging (D) None of these A pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow and processing steps of a system is referred as (A) Flowchart (B) Algorithm (C) Program (D) None of these A flat, circular plate coated with a magnetic material on which data can be stored by magnetization of portions of the flat surface is (A) Disk (B) Tape (C) Pen drive (D) None of these Automatic execution of high-priority computer programs that have been designed to preempt the use of computer resources is referred as (A) Foreground processing (B) background processing (C) black processing (D) white processing A spoofing attack is (A) a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. White hat is (A) hacker breaks security for altruistic or at least non-malicious reasons. (B) hacker of ambiguous ethics and/or borderline legality, often frankly admitted. (C) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. (D) None of these Grey hat is (A) hacker breaks security for altruistic or at least non-malicious reasons. (B) hacker of ambiguous ethics and/or borderline legality, often frankly admitted. (C) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. (D) None of these Blue hat is (A) hacker breaks security for altruistic or at least non-malicious reasons. (B) hacker of ambiguous ethics and/or borderline legality, often frankly admitted. (C) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. (D) None of these Black hat is (A) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these The field that covers a variety of computer networks, both public and private, that are used in everyday jobs. a) Artificial Intelligence b) ML c) Network Security d) IT Network Security provides authentication and access control for resources. a) True b) False Which is not an objective of network security? a) Identification b) Authentication c) Access control d) Lock Which of these is a part of network identification? a) UserID b) Password c) OTP d) fingerprint The process of verifying the identity of a user. a) Authentication b) Identification c) Validation d) Verification A concern of authentication that deals with user rights. a) General access b) Functional authentication c) Functional authorization d) Auto verification Security features that control that can access resources in the OS. a) Authentication b) Identification c) Validation d) Access control Author: A.J. Bhatti