PPSC Lecturer Computer Science Mock Test 2 A.J. Bhatti October 3, 2020 Welcome to your PPSC Lecturer Computer Science Mock Test 2 Name Email The name of First Computer invented Abacus P4 P5 Core to due who is the owner of Microsoft Mark Zuker Burg Bilgates Trump Vijay Disai 2 ............ Provides basic computer computing resources(CPU,IO devices) Hardware Software Application Programs None of Them Q 47 : Quaid e Azam solar park is in: Lahore Sheikhupura Larkana Bahawalpur 3.............. Manages the use of hardware among various application programs among various users. Hardware Software Operating System I/O Devices How many categories of peoples are entitled to receive Zakat: 1 2 4 8 4. ......... Defines the ways in which system resources are used to solve the computing problems of the users Hardware I/O Devices Application Programs Users Who wrote truce Hudebiya: Hazrat Umer Hazrat Ali Hazrat Zaid bin Haris Hazrat Bilal In ghazwa e khandaq which salats were combined by holy prophet? Zuhr and Asr Zuhr and Magrib Asar and Magrib Magrib and Isha 5.The Term User in Operating System can be defined as .......... users people computers All of them 6 . How many control units a CPU have ? 3 2 1 5 Sahi bukhari and Sahih Muslim combined called: Sahihan Sahih Sahi All of these The New Version of C language Known as C++ was invented in ...... 1980's by Microsoft 1970's By Google 1980's By Yahoo 1980's by Bell Labs The Main Limitation of Structured Programming is the Data its requires to Process Lies Outside the program Inside the program Between the program Both A and B Type of Structure Programming in Which a program is divided in Small units and then converted them into Functions Single Entry Single Exist Structured Programming Top-Down Structured Programming Divide and Conquer Structure Programming Simple Structured Programming The First High Level Language after assemble Language is .......... Add description here! C++ language Machine Language C language PHP Language C Language was Developed By Scientist of Bell Labs in........ 1970 1971 1965 1972 A less restrictive type of real time system is a soft ...........system, where a critical real-time task gets priority over other tasks, and retains that priority until it completes Real time Time sharing time shared all of them A real time system has well defined, ....... time constraints Fixed Unfixed Temporary Permanent Real time systems come in two flavors: Which are hard and Fixed Fixed and soft Fixed and Flexible hard and soft A .......... real time system guarantees that critical tasks be completed on time Hard Real Soft Both B & C A less restrictive type of real time system is a ............. real time system, where a critical real-time task gets priority over other tasks, and retains that priority until it completes hard Soft Fixed Unfixed Data Abstraction refers to , Providing only Essential Information to the ............. and Hiding there ............information Background,outside the world Outside the World ,Background Inside the World , Backround Background, Insaide Is it Possible to access Public Data members from outside the Class Add description here! Yes No Is it Possible to access Private Data Members of a class from outside Add description here! Yes No Abstraction can be accessed by .......... Access Specifiers Private Specifiers Public Specifiers None of Above Which of the one is not an Access Specifier?? Public Private Protected Lifo and Fifo ..............provide the interface between a process and the OS. These calls are generally available as assembly language instructions System Calls CPU Calla Process Calls All of them Just like any other software, the operating system code can be structured in different ways. True or False True False In the Layered Approach , The bottom layer is the hardware; and the highest layer (layer N) is the ............... Graphical Interface user interface Multi-User Interface All of them In Layered Approach , A typical OS layer (layer-M) consists of data structures and a set of routines that can be invoked by .......... layers Low-Level High Level Middle level higher-level The method Which structures the operating system by removing all non-essential components from the kernel and implementing as system and user level programs is known as Mini Kernals Micro Kernal s Macro Kernals short Kernals Each process is represented in the operating system by a process control block (PCB) – also called a Process control Board Task Control Board PCB TCUB All of the Above Process state: The state may be new, ready, running, waiting, halted and so on .........TRUE or FALSE Yes True No False ALl of the above None of the above The counter indicates the address of the next instruction to be executed for this process Process State Program Counter CPU Register CPU Scheduling information Micro kernels typically provide minimum process and ............. management in addition to a communication facility memory management Project management Process Management All of the above The main Disadvantages of Flat File Database System Duplication of Data inconsistency of Data Vulnerability All of Above What is Database? Add description here! A shared collection of logically related data, designed to meet the information needs of multiple users in an organization. A Private collection of logically related data, designed to meet the information needs of multiple users in an organization. A Protected collection of logically related data, designed to meet the information needs of multiple users in an organization. None of These Among the options below , Which is not an advantage of a Modern Database Data Sharing Consistency Inconsistency Data Integrity The data for different applications or subsystems is placed at the same place data Sharing data Independence Controlled Redundancy data Integrity The Process in which once change in the Data has no or minimum effect on other File or Data is known as Data Sharing Data Retundacy Data Integrity Data Independence The advantages of cooperating processes are Information Sharing Computation Speed Up Modularity All Of the above If we want a particular task to run faster, we must break it into subtasks each of which will be running in parallel with the others. Such a speedup can be obtained only if the computer has multiple processing elements (such as CPU’s or I/O channels. This process is known as Modularity Computation Speed up Information Sharing Both A & B We may want to construct the system in a modular fashion, dividing the system functions into separate processes or threads. This Process is Known as Modularity Computation Speed Up Information Speedup Information Sharing Even an individual user may have many tasks on which to work at one time. For instance, a user may be editing, printing, and compiling in parallel. This Process is known as information sharing modularity computation speed up convenience A producer process produces information that is consumed by a .......... process consumer Retailer Parent Child Q No 1 :The Word Mapping is Used for ............. in Database Conversion Diversion intrusion Both A & B Q No 2: The data independence is that type of independence that provides us changes transparency between the conceptual and internal levels Physical Data Independence Logical Data independence Conceptual Data Independence External Data independence Q No 3: The Functions Of DBMS are............... A user accessible Catalog Transaction Support Concurrency Control Services All of the Above Q no 4 : Which of the following is not the function of Database Management System Data Processing Data Duplication Recovery Services Authorization Services Q No 5 :Two important functions that the DBMS performs are: User management Data management Application management Both A & B Whenever the CPU becomes idle, the operating system must select ............ of the processes in the ready queue to be executed Five One Two More Then One The ................. scheduler (i.e., the CPU scheduler) selects a process to give it the CPU Long-term Medium-term short-term Very Long Term Q No 1:The Relationships in E-R Diagram are shown in Diamond Shape Circle Shape Rectangle Shape None of the Above Q No 2:IN E-R Diagram ..................... Relationship is an ENTITY TYPE linked with itself, also called recursive relationship Unary Relationship Binary Relationship Ternary Relationship Both A & B The ........... in the ready queue are generally the process control blocks (PCBs) of processes Process (nodes) Fifo (nodes) Queue (nodes) records (nodes) Q No 3 : In E-R Diagram A.............relationship is the one that links two entities sets e.g. STUDENT-CLASS. Relationships can be formally described in an ordered pair form. Unary Binary Ternary All of the above A ready queue can be implemented as a ........ queue, a tree, or simply an unordered linked list FIFO LIFO TIFO All of the above The ................ is a kernel module that takes control of the CPU from the current process and gives it to the process selected by the short-term scheduler CPU dispatcher Process dispatcher dispatcher short-term scheduler CPU scheduler Q No 4:A mapping R from X to Y is ................ if each entity in X is associated with at most one entity in Y and vice versa. One-to-one One-to-many Many-to-many Both A & B Q NO 5 : A mapping R from X to Y is .................. if each entity in X is associated with at most one entity in Y but each entity in Y is associated with many entities in X. On -to-one many-to-many many-to-one one to many The process that requests the CPU first (i.e., enters the ready queue first) is allocated the CPU first is known as FIFO LIFO FCFS FCLS The implementation of an FCFS policy is managed with a ........... LIFO queue TIFO queue FIFO queue FCFS Queue Selection of memory-management method for a specific system depends on many factors especially on the .............design of the system hardware design Software Design Both Hardware and Software Application Software Memory consists of a large array of words or bytes, each with its ........... other address own address more then other Previous CPU fetches instructions from memory according to the value of its program counter and other memory management registers such as ................... in Intel CPUs segment registers segment bits segment memory segment bytes 1. Which normal form is considered adequate for relational database design? 2NF 3NF 4NF BCNF 2:Which of the following option is correct? Consider the relational table with a single record for each registered student with the following attributes: Registration_Num: unique registration of each registered student UID: Unique Identity Num,Uniques for each citizen(national level) BankAccount_Num:unique account number ate the bank.a student can have multiple accounts or joint accounts.this attribute stores the primary account number Name: name of the student Hostel_room: room number of the hostel a. BankAccount_num is a candidate key. b. Registration_num can be a primary key c. UID is a candidate key if all students are from same country d. If S is a super key such that S ∩ UID is NULL then S ꓴ UID is also a super key 3:Which of the following is used to denote the selection operation in relational algebra? Pi (Greek) Sigma (Greek) Lambda (Greek) Omega (Greek) 4:For select operation the ________ appear in the subscript and the ___________ argument appears in the paranthesis after the sigma. Predicates, relation Relation, Predicates Operation, Predicates Relation, Operation 5. Which is a join condition contains an equality operator: a) Equijoins b) Cartesian c) Natural d) Left 1. SQL permits attribute names to be repeated in the same relation. (True or False) A. FALSE B. TRUE 2. Which operator is used to compare a value to a specified list of values? A.BETWEEN B.ANY C.IN D.ALL 3.The virtual table that its created by data from the result of an SQL 'Select' statement is called _________ A.View B.Synonym C.Sequence D.Transaction 4. Which of the following is a legal expression in SQL? A.SELECT NULL FROM SALES B.SELECT NAME FROM SALES C.SELECT * FROM SALES WHEN PRICE = NULL D.SELECT # FROM SALES 5. Which data type can store unstructured data in a column? A.RAW B.CHAR C.NUMERIC D.VARCHAR Microsoft Office is (A) Desktop applications (B) Operating system (C) Command window D) N(one of these The very first version of Microsoft Office was released for (A) Windows operating system (B) Apple Macintosh OS (C) Unix (D) None of these The first version of MS Office to be released for the Microsoft Windows operating system is (A) Microsoft Office 3.0 (C) Microsoft Office 2007 (B) Microsoft Office 2003 (D) Microsoft Office XP In Microsoft Word to cut something the following shortcut is used (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these In Microsoft Word shortcut CTRL+Z is for (A) Undo something (B) Delete something (C) Paste something (D) None of these In Excel default header for a worksheet is (A) Your name (B) The date and time (C) None (D) The sheet tab name In Excel you can copy data or formulas (A) With the copy, paste and cut commands on the edit menu (C) With buttons on the standard toolbar (D) All of the above (B) With commands on a shortcut menu Which area in an excel window allows entering values and formulas ? (A) Title bar (B) Menu bar (C) Formula bar (D) Standard toolbar In Excel Hyperlinks can be (A) Text (B) Drawing objects (C) Pictures (D) All of above In Excel to activate the previous cell in a preselected range, press (A) The Alt key (B) The Tab key (C) The Enter key (D) None of the above In Microsoft PowerPoint to add a header or footer to your handout, you can use (A) The title master (B) The slide master (C) The handout master (D) All of above In Microsoft PowerPoint best way to insert a new slide in a presentation is to use the (A) Normal view (B) Special view (C) Slide show view (D) Slide sorter view In Microsoft PowerPoint the handout master contains placeholders fro all of the following except (A) Slide number (B) Title (C) Footer (D) Header Power Point is a Graphical Software True False In Microsoft PowerPoint the option can be used to create a new slide show with the current slides but presented in a different order (A) Rehearsal (B) Custom slider show (C) Slide show setup (D) Slide show view The most Famous software mostly used for the development of presentation is Powerpoint Word Excel Spread Sheat What is the Range of CAT 7 which is the latest Cable used in Networking 80 Feet 100 Feet 70 Feet 90 Feet How we can secure our institutional network By Using Authentication By Using Verification By Using Firewall System By Using Network Security The Network which connects computers between two buildings having a small distance between them is known as Inter Network Intra Network Wireless Network Cloud Network Ping is a computer network administration software utility used to .......... the reachability of a host on an Internet Protocol (IP) network Reduce Enhance Maintain test Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets? Ring Local area Hierarchical Star What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences? Unshielded twisted pair Optical fiber Coaxial cable Microwave Author: A.J. Bhatti