PPSC Quiz OS . SE . DBMS . DATA MINING .DS Mock Test 11 A.J. Bhatti October 21, 2020 Welcome to your PPSC Quiz OS . SE . DBMS . DATA MINING .DS Mock Test 11 Name Email Following is not the state of Five-State process model (A) Ready (B) Running (C) Not Running (D) New. Memory table is used (A) To allocate main memory to processes (B) To allocate secondary memory to processes (C) To manage virtual memory (D) A, B and C are true. . 8. I/O tables are used (A) To assign I/O devices of computer (B) To manage I/O devices of computer system (C) A and B both true (D) A and B both false. The operating system control tables maintains file table, because (A) These tables manage I/O devices and channels of the computer system. (B) These tables provide information about the existence of files, their location on secondary memory and their current status. (C) These tables provide information to manage process. (D) None of these. Processor in computer (A) Controls the operations of the computer/ processes data functions. (B) Stores data and program. (C) Moves data between computer and its external environment. (D) None of these Memory buffer register (MBR) contains (A) Data that is to be written into memory (B) A particular I/O device. (C) Exchange data between I/O module and the processor. (D) The instruction most recently fetched. 12. I/O modules move data (A) Between external environment and computer. (B) In the computer main memory. (C) In Processors (D) None of these. 13. I/O OBR (I/O Buffer register) is (A) Used for the exchange of data between an I/O module and the processor . (B) Specifies particular I/O device. (C) (A) and (B) both true. (D) (A) and (B) both false. User-visible register (A) Enables machine language programmer to minimize main memory reference by optimizing register use. (B) Enables assembly language programmer to minimize main memory reference by optimizing register use. (C) A and B both true. (D) A and B both false. The operations of the processor are supervised by (A) Control and Status register (B) Data register . (C) Address register. User-Visible register Which of the following do not support GUI (Graphical User Interface) (A) DOS (B) WINDOWS (C) Linux (D) None of these. In the given operating system match the correct (i) Thread (ii) Process (A) The unit of resource ownership. (B) The unit of dispatching. (A) (i) A and (ii) B (C) (i) B and (ii) A (D) (i) A, B (E) (ii) A, B. 18. The MS-DOS an operating system supports (A) Single user process and multiple threads (B) Multiple user process and single thread (C) Single user process and single thread (D) Multiple user processes and multiple threads. 19. The UNIX, an operating system supports (A) Multiple user processes and single thread per process. (B) Multiple user processes and multiple threads per process. (C) Single user process and single thread per process. (D) Single user process and multiple threads per process. The Java run time environment is an example of (A) Single user process with multiple threads (B) Multiple user processes with single thread per process. (C) Multiple user processes with multiple threads per process. (D) None of these. 21. The Windows 2000, operating system supports (A) Multiple user processes with single thread per process. (B) Multiple processes with multiple thread per process. (C) Single process with single thread. (D) Single process with multiple threads. In the pure User Level Threads (ULT) (i) Thread management is done by application, (ii) Thread management is done by kernel, (iii) Kernel is not aware of the existence of thread, (iv) Application program interface (API) to the kernel thread facility. (A) i, iii are true (B) i, ii and iii are true (C) All are false (D) None of these are true The Window 2000 (W2K) and Linux are the example of (A) User Level Thread (ULT) (B) Kernel Level Thread (KLT) (C) A and B both (D) None of these. The following is not an advantage of User Level Threads (ULT). (A) Thread switching does not requires kernel mode privileges because all of the thread management are within the user address space of a single process. (B) Here scheduling can be application specific. (C) ULT can be run an any operating system . (D) When ULT executes a system call, not only that thread blocked, but all of the threads within the process are blocked. The Linux operating system supports (A) Single thread per process and single process. (B) Multiple thread per process and single process. (C) Single thread per process and multiple processes. (D) Multiple thread per process and multiple processes Quality plan describes (A) Quality procedure and standards (B) Approaches, resources and schedules (C) Configuration management and structure (D) None of these Which one is not true for risk analysis ? (A) It estimate risks (B) It removes risks (C) It reduces risks (D) It develops risks Project schedule can be illustrated in (A) Bar-charts (B) Activity-networks (C) Figures (D) None of these Change in technology is a (A) Technology risk (B) People risk (C) Tool risk (D) Implementation risk Under estimate of cost is (A) Technology risk (B) People risk (C) Estimation risk (D) Organizational risk Maintenance plan describes (A) Quality procedure (B) Schedule procedure (C) Maintenance procedure (D) Configuration procedure Failure of schedule is (A) People risk (B) Organizational risk (C) Estimation risk (D) Requirement risk Risk planning involves (A) Avoidance strategies (B) Minimization strategies (C) Contingency plan (D) All the above Which is not the part of scheduling process? (A) Creating project chart (B) Defining roles/activities (C) Estimating failures (D) Selling product Use of Email instead of post & telegraph is due to (A) Technology changes (B) Requirement changes (C) Users access (D) All the above Using P-IV instead of P-I is due to (A) Requirement change (B) Faster access (C) Technology improvement (D) All the above The term user requirements (A) Are statements, made in natural language and diagrams of services that system is expected to provide and the constrains on the system (B) The system services and details, can serve as contract between buyer and software developers (C) An abstract description of software design (D) None of these Software design specification (A) Are statements, made in natural language to specify the system specification and constraints (B) An abstract description of software design, which is an extension of system requirement specification (C) Discusses the market policy of the system (D) None of these Software consists of (A) Computer program only (B) Computer program and associated documentations (C) Documentation only (D) Hardware Software engineering deals with (A) Software development (B) Hardware development (C) System development (D) Network development System engineering deals with (A) Software development only (B) Hardware development only (C) Software and Hardware development (D) Network development Work flow model includes (A) Inputs (B) Out puts (C) Dependencies (D) All the above Rules are (A) Constraints define for system models (B) Input data (C) Out put data (D) Activities in involved in the system Hardware represents (A) Documentations (B) Programs (C) Computer systems (D) Rules Adaptive system management is (A) It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations (B) Computational procedure that takes some value as input and produces some value as output. (C) Science of making machines performs tasks that would require intelligence when performed by humans (D) None of these 2. Algorithm is (A) It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations (B) Computational procedure that takes some value as input and produces some value as output (C) Science of making machines performs tasks that would require intelligence when performed by humans (D) None of these 3. Background knowledge referred to (A) Additional acquaintance used by a learning algorithm to facilitate the learning process (B) A neural network that makes use of a hidden layer. (C) It is a form of automatic learning. (D) None of these 4. Back propagation networks is (A) Additional acquaintance used by a learning algorithm to facilitate the learning process (B) A neural network that makes use of a hidden layer (C) It is a form of automatic learning. (D) None of these 5. Bayesian classifiers is (A) A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation (D) None of these 6. Bias is (A) A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these 7. Case-based learning is (A) A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these 8. Binary attribute are (A) This takes only two values. In general, these values will be 0 and 1 and they can be coded as one bit (B) The natural environment of a certain species (C) Systems that can be used without knowledge of internal operations (D) None of these 9. Biotope are (A) This takes only two values. In general, these values will be 0 and 1 and they can be coded as one bit. (B) The natural environment of a certain species (C) Systems that can be used without knowledge of internal operations (D) None of these 10. Black boxes (A) This takes only two values. In general, these values will be 0 and 1 and they can be coded as one bit. (B) The natural environment of a certain species (C) Systems that can be used without knowledge of internal operations (D) None of these 11. Artificial intelligence is (A) It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations (B) Computational procedure that takes some value as input and produces some value as output. (C) Science of making machines performs tasks that would require intelligence when performed by humans (D) None of these 12. Cache is (A) It is a memory buffer that is used to store data that is needed frequently by an algorithm in order to minimize input/ output traffic (B) The number of different values that a given attribute can take (C) Symbolic representation of facts or ideas from which information can potentially be extracted (D) None of these 13. Cardinality of an attribute is (A) It is a memory buffer that is used to store data that is needed frequently by an algorithm in order to minimize input/ output traffic (B) The number of different values that a given attribute can take (C) A mathematical conception of space where the location of a point is given by reference to its distance from two or three axes intersecting at right angles (D) None of these 14. Cartesian space is (A) It is a memory buffer that is used to store data that is needed frequently by an algorithm in order to minimize input/ output traffic (B) The number of different values that a given attribute can take (C) A mathematical conception of space where the location of a point is given by reference to its distance from two or three axes intersecting at right angles (D) None of these 15. Classification is (A) A subdivision of a set of examples into a number of classes (B) A measure of the accuracy, of the classification of a concept that is given by a certain theory (C) The task of assigning a classification to a set of examples (D) None of these 16. Classification accuracy is (A) A subdivision of a set of examples into a number of classes (B) Measure of the accuracy, of the classification of a concept that is given by a certain theory (C) The task of assigning a classification to a set of examples (D) None of these 17. Cluster is (A) Group of similar objects that differ significantly from other objects (B) Operations on a database to transform or simplify data in order to prepare it for a machine-learning algorithm M.C.Qs. on Computer | 117 (C) Symbolic representation of facts or ideas from which information can potentially be extracted (D) None of these (D) None of these 18. Data is (A) Group of similar objects that differ significantly from other objects (B) Operations on a database to transform or simplify data in order to prepare it for a machine-learning algorithm (C) Symbolic representation of facts or ideas from which information can potentially be extracte(D) (D) None of these 19. A definition of a concept is——if it recognizes all the instances of that concept. (A) Complete (B) Consistent (C) Constant (D) None of these 20. A definition or a concept is ———————if it does not classify any examples as coming within the concept (A) Complete (B) Consistent (C) Constant (D) None of these 21. Classification task referred to (A) A subdivision of a set of examples into a number of classes (B) A measure of the accuracy, of the classification of a concept that is given by a certain theory (C) The task of assigning a classification to a set of examples (D) None of these 22. Database is (A) Large collection of data mostly stored in a computer system (B) The removal of noise errors and incorrect input from a database (C) The systematic description of the syntactic structure of a specific database. It describes the structure of the attributes the tables and foreign key relationships. (D) None of these 23. Data cleaning is (A) Large collection of data mostly stored in a computer system (B) The removal of noise errors and incorrect input from a database (C) The systematic description of the syntactic structure of a specific database. It describes the structure of the attributes the tables and foreign key relationships. (D) None of these 24. Data dictionary is (A) Large collection of data mostly stored in a computer system (B) The removal of noise errors and incorrect input from a database (C) The systematic description of the syntactic structure of a specific database. It describes the structure of the attributes the tables and foreign key relationships. (D) None of these 25. Data mining is (A) The actual discovery phase of a knowledge discovery process (B) The stage of selecting the right data for a KDD process ][ (C) A subject-oriented integrated timevariant non-volatile collection of data in support of management (D) None of these 26. Data selection is (A) The actual discovery phase of a knowledge discovery process (B) The stage of selecting the right data for a KDD process (C) A subject-oriented integrated timevariant non-volatile collection of data in support of management (D) None of these 27. Data warehouse is (A) The actual discovery phase of a knowledge discovery process (B) The stage of selecting the right data for a KDD process (C) A subject-oriented integrated timevariant non-volatile collection of data in support of management (D) None of these 28. Coding is (A) Group of similar objects that differ significantly from other objects (B) Operations on a database to transform or simplify data in order to prepare it for a machine-learning algorithm (C) Symbolic representation of facts or ideas from which information can potentially be extracted (D) None of these 29. DB/2 is (A) A family of relational database management systems marketed by IBM (B) Interactive systems that enable decision makers to use databases and models on a computer in order to solve illstructured problems (C) It consists of nodes and branches starting from a single root node. Each node represents a test, or decision. (D) None of these 30. Decision support systems (DSS) is (A) A family of relational database management systems marketed by IBM (B) Interactive systems that enable decision makers to use databases and models on a computer in order to solve illstructured problems (C) It consists of nodes and branches starting from a single root node. Each node represents a test, or decision . (D) None of these 1. The computers communicate by sending each other small ————of data (A) Packets (B) Bags (C) Bunch (D) None of these 2. Every computer in the network can communicate (A) directly with every other computer in the network (B) indirectly with other computer in the network (C) only to some computers in network (D) none of these 3. Every computer in a network has a network address, often called a (A) hardware address (B) software address (C) computer address (D) none of these 4. A computer can be joined to more than one network through (A) Gateways (B) Passages (C) Connector (D) None of these 5. The examples of TCP/IP are (A) HTTP (Hyper-Text Transfer Protocol) (B) FTP (File Tranfer Protocol), (C) SSH (Secure SHell) (D) All the above 6. It refers to a particular family of standards for expressing the structured data that represent electronic commerce transactions; and ‘electronic auctions for a particular set of mechanisms for setting prices. (A) Electronic data interchange (EDI) (B) Electronic Publishing (C) Electronic Services Delivery (ES(D ) (D) None of these 7. Electronic Business referred to (A) The conduct of business with the assistance of telecommunications and telecommunications-based tools (B) The conduct of commerce in goods and services, with the assistance of telecommunications and telecommunications-based tools (C) It refers to means whereby sellers can communicate their offerings to potential buyers. (D) None of these 8. Electronic Commerce referred to (A) The conduct of business with the assistance of telecommunications and telecommunications-based tools (B) The conduct of commerce in goods and services, with the assistance of telecommunications and telecommunications-based tools (C) It refers to means whereby sellers can communicate their offerings to potential buyers. (D) None of these 9. Electronic catalogues referred to (A) The conduct of business with the assistance of telecommunications and telecommunications-based tools (B) The conduct of commerce in goods and services, with the assistance of telecommunications and telecommunications-based tools (C) It refers to means whereby sellers can communicate their offerings to potential buyers (D) None of these 10. It is an electronic commerce in digital goods and services, intended for consumption by the human senses. It encompasses a range of formats, including text, structured data, image, raster/bit-map and vector, moving image (animation and video), sound, and combinations of the above (multimedi(A). (A) Electronic data interchange (EDI) (B) Electronic Publishing (C) Electronic Services Delivery (ESD) (D) None of these . how many Shaba were martyred in the battle of Badar? 12 14 16 80 the book "Indian Musalmans" published in 1971 was written by? Sir Syed Ahmed Khan William Wilson Hunter Rudyard Kipling justice Amir Ali On 18 May 19 74 india exploded first nuclear device under the code name of? Operation Blue Star Rakshak operation Gibraltar operation smiling Buddha operation first satellite Spuntnik 1 was launched in October 1957 , indicate the date 2 October 1957 4 October 1957 6 October 1957 8 October 1957 Turnip is not described as napiform fusiform Couical Tubrous the father of modern science fiction is Bertrand Russell H G Wells Aldous Huxley Maupassant The one who won Grand Slam in tennis twice? Leo hoad Roy Emerson Road Lavar Jimmy Connors Indian Railway started operation in? 1847 1849 1853 1861 the cash balance of the company is more than the cash balance of US? Apple Microsoft Bechtel DuPont when ayub Khan took over power in 1958 the prime minister of Pakistan was Muhammad Ali Bogra Husnain Shahid soharwardy Malik Feroz Khan noon Chaudhari Muhammad Ali the captain of Pakistan cricket team which defeated England at the oval in the 1954 was? Fazal Mahmood Hanif Mohammed Abdul Hafeez kardar Khan Mohammed US President Barack Obama father was and? Indonesian Nigerian Egyptian Kenyan the US Congress and Senate raised the Dept limit of US government by 500 billion dollars 1500 billion dollars 1500 billion 2000 billion dollar Who was not the member of first cabinet of the Pakistan? Sardar Abdul Rab Nishtar Hussain shahid soharwardi Jogendra Nath Mandal Malik Ghulam Muhammad Moorish Kingdom of Granada (Spain) surrendered to Christians in the year ? 1453 1492 1526 1556 the annual average flow of water in Indus River system is 130 MAF 110 MAF 100 MAF 1969 MAF the highest mountain peak Mount Everest has been named after george Everest was was Commandant of first mountain infantry unit a political agent of nwfp A Commander of Golsha Brigade serveyor general of India Nobel Prize in physics was awarded to doctor abdul Salam in the year 1969 1975 1979 1980 how far is the Dead Sea before Mediterranean? 250 metres 300 metres 400 meters 1000 metres Insulin in human body is produced in liver kidney pancreas none of these Author: A.J. Bhatti