PPSC Mock Test Preparation Quiz no 7 A.J. Bhatti October 17, 2020 Welcome to your PPSC Mock Test Preparation Quiz no 7 Email Name 18................increases CPU utilization by organizing jobs so that the CPU always has one to execute. Multi Programming Multi Programmed Systems Single user Multi User 19.In a ................................, the operating system simply switches to, and executes another job. When that job needs to wait, the CPU simply switches to another job and so on multiprogrammed system multiprogramming system Single programmed system multi programming system 20.In multi programmed systems All jobs that enter the system are kept in the ............ Swimming Pool Training Pool Stack Pool Job Pool 21.A time-sharing system is interactive system multi-user multi-process Both A ,b and C None of the above The Classes Which are not Exist in Real World are ....? Concrete Classes Abstract Classes Both A & B None of the Above Concrete Classes are used For .......... Class Creation Function Creation Object Creation All of Above Concrete Classes are...... Derived or Child Classes Main Classes Parent Classes None of Them The Main Function of Object Oriented Language is ........ Data Members + Member Functions Only Data Members Only Functions Only Classes ............................. is a large array of words or bytes (called memory locations), ranging in size from hundreds of thousands to billions Process Management Main Management Main memory Management Secondary Storage Management The OS is responsible for Which of the following activities in connection with memory management: Keeping track of free memory space Keeping track of which parts of memory are currently being used and by whom Deciding which processes are to be loaded into memory when memory space becomes available Deciding how much memory is to be allocated to a process Insuring that a process is not overwritten on top of another Allocating and deallocating memory space as needed All of these The OS is responsible for the following activities with respect to file management: Creating and deleting files Creating and deleting directories A general device-driver interface Drivers for specific hardware devices Both A & B Both B& C All of them None of them Which one of the following is not an characteristic of I/O Subsystem Managment A memory management component that includes buffering caching and spooling A general device-driver interface Drivers for specific hardware devices Supporting primitives (operations) for manipulating files and directories The process of Inheritance in which only one class is derived from one base class Inheritance Single Inheritance Multiple Inheritance Both b &c In Excel default header for a worksheet is (A) Your name (B) The date and time (C) None (D) The sheet tab name Base Class is also Known as ....... Parent class Child class concrete class Abstract class Both A & D In Excel you can copy data or formulas (A) With the copy, paste and cut commands on the edit menu (C) With buttons on the standard toolbar (D) All of the above (B) With commands on a shortcut menu In which process state , The process is waiting to be assigned to a processor. New Waiting Terminated Executed Ready In which process state ,The process has finished execution Finished Terminated Ready New Each process is represented in the operating system by a ............. Process Control Block Task Control Block Both A and B None of the above The Synonym of “Diligent” is--------------------? A. Hardworking B. Witty C. Deliberate D. Lazy The Term Data About the Data is use to specify which level of Data? Real Data Meta Data Existing Data None of above At some later time the process can be reintroduced at some later stage, this scheme is called ......... Processing Progressing swapping Sneeking All the Characteristics of Applicants of PPSC is an example of ........ Real World Data Mete Data Existing Data All of above The area on the disk where swapped out processes are stored is called the ........... swap space Process space Progress Space All of Above A single or many Database records related to any real world entity shows which level of Data ............ Real World Data Meta Data Existence of Data All of the above A process may create several ................. via a create-process system call during the course of its execution new processes old processes previous processes short processes How many types of Users can use a Database......... 2 3 1 all of the above The creating process is called a parent process while the new processes are called the ............ of that process children Father children parent Parent Childern UNIX and Linux operating systems provide many tools for ..................... interaprocess communication interprocess communication underprocess communication none of these A UNIX/Linux pipe can be used for IPC between ............. processes on a system Un-related processes Non-related processes Uni-related processes related processes Communicating processes typically have sibling or ............ relationship parent-child child parents-childs None of these Qno 17:In ................. Servers Each client of the network runs its own copy of the DBMS and the database resides in the Server Client Server File Server Client & File Server All of the above Find the Correct Spellings Victory Victery Victary None of these Q no 18 : A DBMS server machine which runs the DBMS and to this machine are connected the clients having application programs running for each user........ File Server Database Server Client Server Client File Server Q no 19:Which of the following is / are the rules or functions of Data Flow Diagram? DFDs show the flow of data between different processes o a specific system. DFDs are simple, and hide complexities. DFDs are Descriptive and links between processes describe the information flow All of the above Q no 20: Which of the following is / are considered as the limitation of DFD They do not provide us a way of expressing decision points. DFDs are focused on flow of information only There are a limited number of symbols which are used for design process in DFDs All of them FCFS stands for First-Come-First-Solved Scheduling First-Come-First-Schedule Scheduling First-Come-Last-Served (FCFS) Scheduling First-Come-First-Served (FCFS) Scheduling SJF stands for Shorted Job First Scheduling Shorted Job Forward Scheduling Shorted Job Front Scheduling Shorted Job Frame Scheduling SRTF Stands for Shortest Remaining Time First Scheduling Shortest Remaining Time Former Scheduling Shortest Remaining Time Frontier Scheduling Shortest Remaining Time Frame Scheduling Syed Ahmad Shaheed is burried at A. Jehlum B. Balakot C. Abbotabad D. Muzzafarabad Q No 17 :In a Relational Database If the order of the columns in a table is changed, the table still remains the .......... Change altered affected same Q No 18 :In a Relational Database If the order of the Record in a table or in Database is changed, then the data base will be affected or not? No ,There will be no any effect on the Database Yes , The Data Base will be affected Database duplicate the data None of the above Q no 19 : In a Relational Database, Two rows of a table cannot be same. The value of even a single attribute has to be different that makes the entire row distinct. True or False? False False in some aspects True in some aspects True Q No 20 : Which Database "Table Key " is responsible to stop duplication of the Data ? Foreign Key Primary Key Secondary Key All of the above An address generated by the CPU is commonly referred to as a logical address, where as an address seen by the memory unit–that is, the one loaded into the memory-address register of the memory–is commonly referred to as the .......... Logical Address Process Address physical address All of the above logical data refers to an instruction or data in the ...................... process address space Physical address space Logical address space Virtual address space where as the physical address refers to a main memory location where instruction or ................ data resides logical data resides Physical data resides Process data resides The compile time and load time binding methods generate identical logical and ............. physical addresses Data physical addresses Data addresses Virtual addresses 17. Compute R ⋈ S. Which of the following records will be in the result? Assume each record has the schema (A, B, C, D) Add description here! (a) (3, 3, 1, 6) (b) (6, 4, 4, 1) (c) (3, 5, 1, 6) (d) (3, 5, 3, 1) 18. Compute π B (R) U π B (S). Which of the following records will be in the result? Add description here! (a) (6) (b) (1) (c) (2) (d) (5) 19.Assume a relation R(A, B) with n unique records, and a relation S(B, C) with m unique records. When you compute the natural join between R and S you shall get r records as the result. Which of the following assumptions are correct in terms of (n, m, r)? Add description here! (a) (5, 4, 25) (b) (2, 3, 8) (c) (3, 3, 10) (d) (2, 3, 6) 20:Which functional dependency types is/are not present in the following dependencies? Empno -> EName, Salary, Deptno, DName DeptNo -> DName EmpNo -> DName a) Full functional dependency b) Partial functional dependency c) Transitive functional dependency d) Both B and C 17. Syntax to create stored procedure is/are A. CREATE PROCEDURE procedureName AS SQL statements B. CREATE PROCEDURE procedureName AS BEGIN SQL statements END C. CREATE PROC procedureName AS BEGIN SQL statements END D. B & C 18. A relational database contains two tables student and department in which student table has columns (roll_no, name and dept_id )and department table has columns (dept-id and dept-name). The following insert statements were executed successfully to populate the empty tables: Insert into department values (1, 'Mathematics'); Insert into department values(1, 'Physics'); Insert into department values(1, 'Navin', 1); Insert into student values (2, 'Ravi', 2); Insert into student values (3, `Gitu', 1); How many rows and columns will be retrived by the following SQL, statement? Select * from student, department; A. 0 row and 4 columns B. 3 rows and 4 columns C. 3 rows and 5 columns D. 6 rows and 5 columns Insert into student values (3, `Gitu', 1); Both A & B Consider the above tables A, B and C. How many tuples does the result of the following SQL query contains? SELECT A.id FROM A WHERE A.age > ALL (SELECT B.age FROM B WHERE B. name = "arun") Table A Id Name Age ---------------- 12 Arun 60 15 Shreya 24 99 Rohit 11 Table B Id Name Age ---------------- 15 Shreya 24 25 Hari 40 98 Rohit 20 99 Rohit 11 Table C Id Phone Area ----------------- 10 2200 02 99 2100 01 4 3 0 1 20. Consider a database table T containing two columns X and Y each of type integer. After the creation of the table, one record (X=1, Y=1) is inserted in the table. Let MX and My denote the respective maximum values of X and Y among all records in the table at any point in time. Using MX and MY, new records are inserted in the table 128 times with X and Y values being MX+1, 2*MY+1 respectively. It may be noted that each time after the insertion, values of MX and MY change. What will be the output of the following SQL query after the steps mentioned above are carried out? SELECT Y FROM T WHERE X=7; (A) 127 (B) 255 (C) 129 (D) 257 Tomb of Khwaja Fareed is is located in in Kot mithan lahore Sahiwal mianwali River Kabul joins Indus river near dera Ismail Khan Kala Bagh attock nowshara Objective Resolution was presented in the constituent assembly on 2nd March 1949 7 March 1949 12 March 1949 17 March 1949 Who was the first Muslim governor of Punjab sardar Abdur Rab Nashtar Mushtaq Gormani Feroz Khan Noon Iftikhar Husain The only Vice President of Pakistan was Noorul Amin Fazal Haq Fazal Ilahi Chaudhary Chaudhary Zaheer Ilahi Term of the office of election commissioner of Pakistan 3 years 4 years 5 years 6 years The British sold Kashmir to Gulab Singh Dogra under the treaty of Treaty of Amritsar Treaty of Lahore Instrument of accession Treaty of Kashmir The only Muslim woman who attended Round table conference was Begam Saima tassaduq Hussain Begum Shaista ikramullah Fatima Jinnah Begum Jahan Ara Shahnawaz The United Nations General Assembly has declared the decade 2021 to 2030 as The decade on ecosystem Restoration The decade for rehabilitation of refugees The decade of environmental changes The decade of peace and stability Famous Urdu writer Mushtaq Ahmad Yousuf by profession was Civil Servant Newscaster Banker Publisher The Quaid e Azam resigned from the membership of Imperial legislative council on account of Hindu Muslim riots Rowlett Act Internal differences of Muslim League Demand for independence Statue of liberty was given to USA by Britain Germany France Italy Wealth of nations was written by Adam Smith Karl Marx Max Weber Shakespeare International Monetary Fund IMF was created after the Malta conference London conference Round table conference Breton Woods conference the Article 3 of sustainable development goals SDGs of UN relates to Health Nutrition Environment Education :"Deal of the century" presented by US President Donald Trump related to US Iran relations US Russia relations Palestine issue US China trade The lengthiest written constitution of the word is British constitution Indian constitution Chinese constitution French constitution the word "REX" stands for The king The Crown The Court The Parliament Continental shelf limits of Pakistan is 12 nautical miles Hundred nautical miles 250 nautical miles 350 nautical miles Soviet Union was replaced by Russian Federation in October 1991 November 1991 December 1991 January 1992 Disk operating system is referred for (A) DOS (B) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage (C) Both A & B (D) None of these Document reader is (A) An optical input device used to read documents (B) A device that arrange the documents (C) A device that is used to edit document (D) None of these One or more identifying lines printed at the bottom of a page are referred as (A) Header (B) Footer (C) Index (D) None of these FORTRAN is (A) Formula Translation (B) A high-level mathematically oriented programming language (C) Both A & B (D) None of these A CPU designed specifically to handle the communications processing task with main purpose is to off-load communications processing task from the host computer so that the host computer can be dedicated for applications and data processing jobs. (A) Backend processor (B) Front-end processor (C) Node processor (D) None of these Script kiddie is (A) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these Hacktivism is (A) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others . (C) hacker who utilizes technology to announce a political message. (D) None of these It is a prepared application that takes advantage of a known weakness. (A) security exploit (B) vulnerability scanner (C) packet sniffer (D) rootkit It is a tool used to quickly check computers on a network for known weaknesses. (A) security exploit (B) vulnerability scanner (C) packet sniffer (D) rootkit It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (A) security exploit (B) vulnerability scanner (C) packet sniffer (D) rootkit It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (A) security exploit (B) vulnerability scanner (C) packet sniffer (D) rootkit Adaptive system management is (A) It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations (B) Computational procedure that takes some value as input and produces some value as output. (C) Science of making machines performs tasks that would require intelligence when performed by humans (D) None of these Algorithm is (A) It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations (B) Computational procedure that takes some value as input and produces some value as output (C) Science of making machines performs tasks that would require intelligence when performed by humans (D) None of these Background knowledge referred to (A) Additional acquaintance used by a learning algorithm to facilitate the learning process (B) A neural network that makes use of a hidden layer. (C) It is a form of automatic learning. (D) None of these Back propagation networks is (A) Additional acquaintance used by a learning algorithm to facilitate the learning process (B) A neural network that makes use of a hidden layer (C) It is a form of automatic learning. (D) None of these Bayesian classifiers is (A) A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these Bias is (A) A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these The computers communicate by sending each other small ————of data (A) Packets (B) Bags (C) Bunch (D) None of these Every computer in the network can communicate (A) directly with every other computer in the network (B) indirectly with other computer in the network (C) only to some computers in network (D) none of these Every computer in a network has a network address, often called a (A) hardware address (B) software address (C) computer address (D) none of these A computer can be joined to more than one network through (A) Gateways (B) Passages (C) Connector (D) None of these The examples of TCP/IP are (A) HTTP (Hyper-Text Transfer Protocol) (B) FTP (File Tranfer Protocol), (C) SSH (Secure SHell) (D) All the above It refers to a particular family of standards for expressing the structured data that represent electronic commerce transactions; and ‘electronic auctions for a particular set of mechanisms for setting prices. (A) Electronic data interchange (EDI) (B) Electronic Publishing (C) Electronic Services Delivery (ES(D) (D) None of these Electronic Business referred to (A) The conduct of business with the assistance of telecommunications and telecommunications-based tools (B) The conduct of commerce in goods and services, with the assistance of telecommunications and telecommunications-based tools (C) It refers to means whereby sellers can communicate their offerings to potential buyers. (D) None of these Author: A.J. Bhatti