PPSC Mock Test Preparation Quiz no 4 A.J. Bhatti October 7, 2020 Welcome to your PPSC Mock Test Preparation Quiz no 4 Name Email A program that remains in the memory while other programs are executing (A) Resident Program (B) Non-Resident Program (C) Permanent Program (D) None of these An automatic machine that is made to perform routine human tasks is (A) Computer (B) Robot (C) Tanker (D) None of these The time required to complete a single, continuous execution of an object program is called (A) Run time (B) Access time (C) Random time (D) Response time Computer network is a (A) A distributed data processing system (B) Multiple computers are linked together for the purpose of data communication and resource sharing (C) Both A & B are false (D) Both A & B are true An optical input device that is used to read documents printed in a special type font is known as (A) Document reader (B) Documentation (C) Printer (D) None of these For checking spelling one uses (A) Dictionary Disk (B) Index disk (C) Directory (D) None of these Process of finding/ correcting program errors is (A) Bugs (B) Debugging (C) Hacking (D) Cracking The term DBMS is referred to (A) Data Base Management system (B) The software used for the management, maintenance and retrieval of the data stored in a data base (C) Both A & B are true (D) None of these The time period during which a computer is malfunctioning or not operating correctly due to machine failures is referred as (A) Downtime (B) Uptime (C) Runtime (D) None of these A vulnerability scanner is (A) a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. These hacker breaks security for altruistic or at least non-malicious reasons. (A) White hat (B) Grey hat (C) Blue hat (D) None of these This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. (A) White hat (B) Grey hat (C) Blue hat (D) None of these It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents. (A) Keylogger (B) Worm (C) Virus (D) Cracker Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called? (A) Trojan horses (B) Keylogger (C) Worm (D) Cracker It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (A) Rootkit (B) Keylogger (C) Worm (D) Cracker Rootkit is (A) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these Security exploit is . (A) a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access 11. In Windows operating system to minimize all of the windows (A) Windows Logo (B) Windows Logo + BREAK (C) Windows Logo + D (D) Windows Logo + M In Windows operating system to move backward through the tabs (A) CTRL+TAB (B) CTRL+SHIFT+TAB (C) SHIFT+TAB (D) None of these In Windows operating system one press F1 key to (A) Display help (B) Cut ( (C) Paste (D) None of these In Windows operating system after you double-click a character on the grid of characters, keyboard shortcut PAGE UP is used for (A) Move up one screen at a time (B) Move down one screen at a time (C) Move to the beginning of the line (D) Move to the end of the line In Windows operating system after you double-click a character on the grid of characters, keyboard shortcut HOME is used for (A) Move up one screen at a time (B) Move down one screen at a time (C) Move to the beginning of the line (D) Move to the end of the line In Windows operating system shortcut for paste is (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these In Windows operating system Shortcut for copy is (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these In Windows operating system to paste something after cutting the following shortcut is used (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these In Windows operating system shortcut CTRL+C is used for (A) Cut (B) Paste (C) Copy (D) None of these In Windows operating system the shortcut key CTRL+B is used for (A) Open the Organize Favorites dialog box (B) Open the Search bar (C) Start the Find utility (D) Open the History bar Microsoft Office Document Imaging is (A) An application that supports editing scanned documents (B) A scanning and OCR application (C) Diagram and flowcharting software (D) None of these Microsoft Office Document Scanning is (A) An application that supports editing scanned documents (B) A scanning and OCR application (C) Diagram and flowcharting software (D) None of these Microsoft Office Groove is (A) A proprietary peer-to-peer software package aimed at businesses (B) An application that supports editing scanned documents (C) A scanning and OCR application (D) Diagram and flowcharting software Microsoft Office InterConnect is (A) Business-relationship database (B) An application that supports editing scanned documents (C) A scanning and OCR application (D) None of these Microsoft Office Picture Manager is (A) Basic photo management software (B) An application that supports editing scanned documents (C) A scanning and OCR application (D) None of these In Microsoft Word move the insertion point to the beginning of the next word (A) Shortcut CTRL+RIGHT ARROW (B) Shortcut CTRL+LEFT ARROW (C) Shortcut CTRL+DOWN ARROW (D) None of these In Microsoft Word move the insertion point to the beginning of the previous word (A) Shortcut CTRL+RIGHT ARROW (B) Shortcut CTRL+LEFT ARROW (C) Shortcut CTRL+DOWN ARROW (D) None of these In Microsoft Word move the insertion point to the beginning of the next paragraph (A) Shortcut CTRL+RIGHT ARROW (B) Shortcut CTRL+LEFT ARROW (C) Shortcut CTRL+DOWN ARROW (D) None of these In Microsoft Word move the insertion point to the beginning of the previous paragraph (A) CTRL+RIGHT ARROW (B) CTRL+LEFT ARROW (C) CTRL+DOWN ARROW (D) None of these In Microsoft Word move the insertion point to the beginning of the previous paragraph (A) CTRL+RIGHT ARROW (B) CTRL+LEFT ARROW (C) CTRL+DOWN ARROW (D) CTRL+UP ARROW In Microsoft Word using CTRL+SHIFT with any of the arrow keys (A) Highlight a block of text (B) Delete something (C) Paste something (D) None of these In Excel default header for a worksheet is (A) Your name (B) The date and time (C) None (D) The sheet tab name In Excel which of the following is not an option in the spelling dialog box (A) Edit (B) Ignore (C) Ignore all (D) Change In Excel you can quickly change the appearance of your work by choosing Auto Format from the ……….. Menu (A) Edit (B) View (C) Format (D) Tools In Excel….. is a group of cells that form a rectangle on the screen. (A) Calculation (B) Formula (C) Range (D) Range address In Excel following term describes explanatory text attached to a cell (A) Callout (B) Comment (C) Dialog (D) Extension In Excel the drag and drop method of copying or moving (A) Can be used between worksheets but not workbooks (B) Can be used between workbooks but not worksheets (C) Can be used between workbooks but not worksheets (D) None In Microsoft PowerPoint the following command select all object at one time when selecting multiple objects to be deleted (A) Alt + A (B) Ctrl + A (C) Shift + Enter (D) Edit, Select All In Microsoft PowerPoint to edit the text within the boxes of an organization chart, you (A) Select the box and text, then make changes (B) Select the box, then make the dchanges (C) Highlight the text, them make the changes (D) (A) and (B) both In Microsoft PowerPoint the following allow you to select more than one slide in a presentation (A) Alt + Click each slide (B) Shift + drag each slide (C) Shift + Click each slide (D) Ctrl + Click each slide In Microsoft PowerPoint the following options in the printer dialog box would you select to prit slides 5 and 12 in a presentation? (A) Slides (B) Custom shows (C) Current slide (D) All of the above In Microsoft PowerPoint the following toolbars provides different options in various master views (A) Common tasks toolbar (B) Drawing toolbar (C) Formatting toolbar (D) Standard toolbar In Microsoft PowerPoint you can tell when an object is active because (A) The object is highlighted (B) Eight small sizing handles appear surrounding the text (C) A box frame appears surrounding the text (D) (B) and (C) both In Access to Move down one page (A) F4 or ALT+DOWN ARROW (B) DOWN ARROW (C) PAGE DOWN (D) F9 When using Access Database, use this feature to have Access select only certain records in the database to prepare form letters. (A) Report (B) Table ( C) Query (D) Tools In Access to Move down one line (A) F4 or ALT+DOWN ARROW (B) DOWN ARROW (C) PAGE DOWN (D) F9 In Access press…………………….to Move the selected control to the left (except controls that are part of a layout) (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these In Access press …………………….to Move the selected control to the right (except controls that are part of a layout) (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these In Access press …………………….to Paste the contents of the Clipboard in the upperleft corner of the selected section (A) CTRL+C (B) CTRL+X (C) CTRL+V (D) None of these The main memory of the computer (A) Controls the operations of computer. (B) Performs data processing functions. (C) Stores data and programs. (D) None of these. Program counter (P(C) contains (A) Address of an instruction to be fetched (B) Instructions most recently fetched (C) Data to be written into memory (D) Data to be read from memory MAR (memory address register) (A) Contains data to be written into memory. (D) Contains data to be read from memory. (C) Specifies location in memory for next read/or writer. (D) Contains address of next instruction to be fetched. IR (Instruction register) (A) Contains the address of an instruction to be fetched. (B) Contains the instruction most recently fetched (C) Specifies memory addresses. (D) None of these. Which of the following is not an address register? (A) Index register (B) Segment pointer (C) Stack pointer (D) Data register. Following is not the state of Five-State process model (A) Ready (B) Running (C) Not Running (D) New. System architecture model identifies (A) Hardware components (B) Software components (C) Virtual components and software components (D) Hardware and software components both Which one is functional component ? (A) Reliability (B) Maintainability (C) Computation (D) Performance A class room in a school is a (A) System (B) Sub-system (C) Module (D) None of these Floating point process is a (A) Communication component (B) Computation component (C) Coordination component (D) Sensor component Digital-analog converter that converter digital input into analog output is a (A) Communication component (B) Computation component (C) Sensor component (D) Interface component In software system requirements, the functional requirement for the system describes (A) Services the system is expected to provide (B) Factors of system development (C) Reliability, response time or system capacity (D) None of these In software system requirements, the interface requirements are (A) Requirements that are derived from the interface of existing system (B) Requirements that are derived from the interface of proposed system (C) Requirements that are derived from the interface of existing and proposed systems (D) None of these Validation plan describes (A) Quality procedure (B) Schedule procedure (C) Management procedure (D) None of these Software requirement specification is (A) The official statement of what is required of the system developers (B) The non official statement of system interface (C) Non specified format of system working (D) None of these What is Ethnography (A) A graphic tool (B) Observational technique used to understand social and organizational requirements (C) A graph with nodes (D) None of these In Data Processing model (A) Here data-flow diagram show, how data is processed at different stages in the system. These are behavioral models (B) It registers all/ selected activities of a computer system. (C) Technique used to transform raw data into a more useful form. (D) Data is shifted to modern data base management system. Each data item in a record may be a group item composed of sub-items; those items which are indecomposable are called (A) Elementary items (B) Atoms (C) Scalars (D) All of above Which of the following statement is false ? (A) Arrays are dense lists and static data structure (D) Linked lists are collection of the nodes that contain information part and next pointer (B) Data elements in linked list need not be stored in adjacent space in memory (C) Pointers store the next data element of a list Binary search algorithm cannot be applied to (A) Sorted binary trees (B) Sorted linear array (C) Pointer array (D) Sorted linked list When new data are to be inserted into a data structure, but there is no available space; this situation is usually called (A) Housefull (B) Saturated (C) Underflow (D) Overflow The situation when in a linked list START=NULL is (A) Underflow (B) Overflow (C) Housefull (D) Saturated The following is two-way list (A) Grounded header list (B) Circular header list (C) Linked list with header and trailer nodes (D) None of above Saturn is a very windy place! Winds can reach up to 1,200 miles per hour 1,100 miles per hour 1,400 miles per hour 1,500 miles per hour Uranus has........ moons Uranus has 15 moons Uranus has 10 moons Uranus has 12 moons Uranus has 13 moons If Jupiter were hollow, you could fit ........ earths inside 1200 1300 900 1000 . ....... of all the ice in the world in on Antarctica 80 % 85% 90 % 93 % . Antarctica is COLDEST continent, averaging minus ...... degrees in the winter 75 74 77 76 Every dolphin has its own signature whistle to distinguish it from other ........., much like a human fingerprint animals species fishes dolphins The world’s largest mammal, the blue whale, weighs ........ 20 tons 30 tons 40 tons 50 tons The largest bird egg in the world today is that of the ostrich Hen Duck Lion Ostrich eggs are from ........ inches long 4 to 8 3 to 8 2to 8 6 to 8 An elephant can smell water ........ away Four miles three miles Five miles Seven miles The world’s tallest woman is .......... She is 2.35m (7 ft. 7 in.) Sandy Allen Sandy Robert Sandy David Sandy Pouch The only 2 animals that can see behind themselves without turning its head are the rabbit and the parrot the parrot rabbit lions India never invaded any country in her last ......years of history 1000 100 10 10000 A hippopotamus can run faster than a...... man lion Deer kangroo Ostriches can kick with tremendous force, but only ......... Don’t Mess with them backword forward Middle Upword A person can live without food for about a month, but only about a week without ......... water rest sleep walk The highest kangaroo leap recorded is 10 ft and the longest is 100ft 40ft 70ft 42 ft Dolphins sleep with ........ open both eye one eye left eye right eye Many spiders have seven eyes four eyes five eyes eight eyes About 10% of the world’s population is right handed left-handed right and left both a and b A chimpanzee can learn to recognize itself in a mirror, but ......... can’t rat monkey cat dog Hazrat Usman was chosen by: Haxzrat Ali Hazrat Umer Abdur Rahman bin Auf. Hazrat Usman The British government announced the annulment of partition of Bengal in........ 1910 1911 1912 1926 Habsha is the old name of ethopia Kenya Tanzania Uganda Author: A.J. Bhatti