Kerala PSC HSST Computer Science Model Questions & Answers

Last Updated On: 30/04/2018

PSC HSST Computer Science Model Questions: Are you searching for Model Questions for Higher Secondary School Teacher Computer Science PSC examination? Here are the repeated questions for KPSC HSST Computer Science examination.

PSC HSST Computer Science Mock Test
Check Also: 

Kerala PSC HSST Computer Science Model Questions & Answers

1. The size of an ATM cell is ………….. bytes.
(A) 25
(B) 32
(C) 53
(D) 64
Answer: C

2. “Stored program concept is attributed to:
(A) Ken Thompson
(B) Dennis Ritchie
(C) Von Neumann
(D) Edsger Dijkstra
Answer: C

3. In a UNIX system, the macro htons is used to:
(A) Convert a short number from host to network order
(B) Convert a long number from host to network order
(C) Convert a short number from network to host order
(D) Convert a long number from network to host order
Answer: A
• htons(): reorder the bytes of a 16-bit unsigned value from processor order to network order. The macro name can be read “host to network short.”
• htonl(): reorder the bytes of a 32-bit unsigned value from processor order to network order. The macro name can be read “host to network long.”
• ntohs(): reorder the bytes of a 16-bit unsigned value from network order to processor order. The macro name can be read “network to host short.”
• ntohl(): reorder the bytes of a 32-bit unsigned value from network order to processor order. The macro name can be read “network to host long.”

4. The cache which is on the same chip as the processor is called :
(A) L1
(B) L2
(C) L3
(D) None of these
Answer: A

5. Which level of RAID uses mirroring to achieve redundancy?
(A) 0
(B) 1
(C) 2
(D) 3
Answer: B,D

6. Which IEEE standard is refers to fast Ethernet?
(A) 802.1
(B) 802.3b
(C) 802.3u
(D) 802.12
Answer: C

7. The new generation Intel processor with the IA-64 architecture is called
(A) Itanium
(B) Pentium 4
(C) Athlon
(D) Xeon
Answer: A

8. A MAC address is …………. bytes long:
(A) 4
(B) 6
(C) 8
(D) 12
Answer: B

9. RARP is used to convert:
(A) IP address to MAC address
(B) MAC address to IP address
(C) IP address to port number
(D) Port number to IP address
Answer: B

10. Which among the following is an NP-Complete problem?
(A) 3SAT Problem
(B) Travelling Salesman
(D) Graph 3-coloring
(D) All of the above
Answer: D
NP means Non-deterministic Polynomial time and P means deterministic Polynomial time.


11. The solution to the count-to-infinity problem in which a router never advertises the cost of a destination to its neighbour N, if N is the next hop to that destination, is called:
(A) Triggered update
(B) Source tracing
(C) Split-horizon
(D) Path vector
Answer: C

12. A compiler which runs on one machine and produces target code for another is called a:
(A) Bootstrapping compiler
(B) Just-in-time compiler
(C) Cross compiler
(D) Optimizing compiler
Answer: C

13. Which among the following is an interior routing protocol?
Answer: A

14. The maximum length (in bytes) of an IP packet:
(A) 255
(B) 1023
(C) 32767
(D) 65535
Answer: D

15. Which among the following is not a type of HTTP request?
Answer: C

16. Which among the following is not a real time operating system?
(A) RT-Linux
(B) VxWorks
(C) Solaris
(D) Lynx
Answer: C

17. What is returned by a fork() call to the child process?
(A) 0
(B) Process-id-pf parent
(C) Process-id of child
(D) -1
Answer: A
In the child process, the return value of fork() is 0, whereas the return value in the parent process is the PID of the newly created child process.

18. The degree of multi-programming is controlled primarily by?
(A) Short-term scheduler
(B) Medium-term scheduler
(C) Long-term scheduler
(D) Disk scheduler
Answer: C

19. Which of the following is a high-level synchronization concept?
(A) Interrupt
(B) Semaphore
(C) Mutex
(D) Monitor
Answer: D

20. Paging solves the problem of:
(A) Thrashing
(B) Page faults
(C) Internal fragmentation
(D) External Fragmentation
Answer: D


21. For some page–replacement algorithms, the page-fault rate may increase as the number of allocated frames increases. This is known as:
(A) Thrashing
(B) Swapping
(C) Belady’s anomaly
(D) Fragmentation
Answer: C

22. The Unix incode contains ……….. pointers to data blocks and ………….. pointers to indirect blocks.
(A) 10,3
(B) 10,5
(C) 12,3
(D) 15,5
Answer: C
inode : a data structure that contains information about files on the disk. Each file has an inode and is identified by an inode number.
The inode also contains 15 pointers to the disk blocks containing the file’s data contents. First 12 point to direct blocks. Next three point to indirect blocks.

23. Which of the following disk scheduling algorithms may result in starvation?
(B) Shortest-seek-time-first
Answer: B

24. An RPC uses …………… to execute a routine on a remote system.
Answer: D

25. ‘Location transparency’ in distributed systems means that:
(A) Name of the file does not reveal any hint of its physical storage location
(B) Name of the file does not need to be changed when the storage location changes
(C) The storage location can be understood from the name of the file
(D) Name of the file will change if the storage location changes
Answer: A

26. The BSD version of UNIX was developed by:
(A) Bell Labs
(C) University of Berkeley
(D) Sun Microsystems
Answer: C
BSD: Berkeley Software Distribution

27. An example of a file system whose contents are not actually stored anywhere, but are computed on demand is:
(C) proc
(D) ext3
Answer: C
procfs or the proc file system is a virtual file system in Unix like operating systems that resides in the kernels memory. It is an example of a file system whose contents are not actually stored anywhere but are computed on demand according to user file I/O requests.

28. Which among the following is a type of top-down parsing?
(A) Predictive parsing
(B) Shift-reduce parsing
(C) Operator precedence parsing
(D) LR parsing
Answer: A
In computer science, parsing means divide a computer language statement into smaller parts. Parsing is done by a parser is a program, usually part of a compiler.
Recursive-descent parsing is a top-down method of syntax analysis that executes a set of recursive procedure to process the input.
A predictive parsing is a special form of recursive-descent parsing, in which the current input token unambiguously determines the production to be applied at each step.

29. If r and s are regular expressions denoting languages L(r) and L(s), then (r)|(s) is a regular expression denoting:
(A) L(r) U L(s)
(B) L(r) L(s)
(C) {E}
(D) L(rs)
Answer: A

30. What will the following program fragment output?
Integer i=new integer (5);
Integer j=new Integer (5);
If (i==j)System.out.println(“Equal”);
else System.out.println(“Not equal”);
(A) Equal
(B) Not Equal
(C) Equal Not equal
(D) The program doesn’t compile= = can’t be used with references
Answer: B


31. A grammar with the property that no production right side has two adjacent non-terminals is called:
(A) Context-free grammar
(B) Context sensitive grammar
(C) Operator Grammar
(D) Regular grammar
Answer: C

32. Yacc is a:
(A) Lexical analyzer generator
(B) Parser generator
(B) Macro pre-processor
(D) Code optimizer
Answer: B

33. ………….. uses an FAT for file allocation.
(A) OS/2
(B) Linux
(C) Unix
(D) Solaris
Answer: A

34. Which among the following is true of LL (1) grammar?
(A) ambiguous
(B) not ambiguous
(D) sometimes ambiguous
(D) left-recursive
Answer: B

35. Apple Computer’s version of the high-performance serial bus used to connect devices to the personal computer is:
(A) Fire Wire
(B) High-Performance Parallel Interface
(C) Parallel sysplex
Answer: A

36. Which among the following is a set of ANSI parallel interfaces that allow personal computers to communicate with peripheral hardware?
(A) UpnP
Answer: B

37. Which among the following is false?
(A) A relation scheme can be in Third Normal Form but not in Boyce-Codd Normal Form (BCNF)
(B) Every BCNF relation scheme is in Third Normal Form.
(C) BCNF provides freedom from insertion and deletion anomalies.
(D) If a relation scheme has partial dependencies, it is in Second Normal Form.
Answer: D

38. A foreign key imposes a specific kind of integrity to related tables. What is the name of this integrity?
(A) Schema
(B) Referential
(C) Expatriate
(D) Data
Answer: B

39. Which among the following is a high-bandwidth interface between a computer and a hard disk or a tape device? The latest version of this interface supports RAID.
(A) Intelligent Peripheral interface
(B) Small Computer System Interface
(C) RS-232C
(D) Centronics parallel interface
Answer: A

40. The …………… consists of individual user views of portions of the database.
(A) User-level Schema
(B) Internal-level Schema
(C) External-level Schema
(D) Conceptual –level schema
Answer: C


41. An attribute that is used as a linkage from records in one table to a record in another table is specified as the …………..
(A) Pointer field
(B) Foreign Key
(C) Secondary Key
(D) Primary Key
Answer: B

42. Data is stored on computer systems in files. The two basic file types are:
(A) Master and Database
(B) Master and Transaction
(C) Transaction and DBMS
(D) Master File and Accounts Receivable File
Answer: B

43. Which of the following statements in not true with respect to the characteristics of the Master and the Transaction files?
(A) A transaction files contain records that hold the details of daily events affecting an attribute of the master file
(B) A master file should only contain data that are of a permanent or semi permanent nature
(C) A transaction file is similar to a ledger in a manual accounting system
(D) Records in the transaction file are used to update some of the data in the master
Answer: C

44. Which of the following cannot be blank (Null)?
(A) Foreign Key
(B) Secondary Key
(C) Primary Key
(D) Connecting Key
Answer: C

45. Every DBMS provides for the three basic functions of creating, modifying and querying the database. Sets of commands (languages) exist to perform each of the three functions. Select the option that matches the order of the languages to the order of the functions: querying, creating and modifying the database.
Answer: A

46. Third normal form is a tem used to describe:
(A) a database that is well structured
(B) a model that has been through three revisions.
(C) a table that has three columns
(D) a package containing the three levels of schema
Answer: A

47. A plug-and –play interface that allows you to add a new device such as a scanner or printer to your computer without having to add an adapter card or even having turn the computer off is:
(A) Audio/Modem Riser
(B) Universal Serial Bus
(D) Virtual device driver
Answer: B

48. The microchip that controls a computer’s interface to its attached serial devices is:
(A) Virtual Device driver
(B) Universal Asynchronous Receiver/Transmitter
(C) Serial presence detect
(D) Bus master
Answer: B

49. Anomalies can occur in a poorly designed database. One type of anomaly occurs when the removal of a record in the customer table inadvertently removes information about sales. What is the name of this anomaly?
(A) Erase anomaly
(B) Delete anomaly
(C) Update anomaly
(D) Insert anomaly
Answer: B

50. “Get me the date attribute of the third tuple in the sales order relation”. What is being requested?
(A) The person wants the value in the date field of the third table that is related to sales order
(B) The person wants the value in the date field in the third row of the sales order item table.
(C) The person wants the value in the date field of the third record in the sales order table.
(D) The person wants the value in the date field of the third sales order that is related to the sales order item table.
Answer: C

51. The file-oriented approach to data storage creates a set of files for each application program. The database approach combines all of the files in a database and lets the application programs get the data that they needs through a DBMS. Which of the following statements is correct?
(A) The database approach separates the logical view of data from the physical view
(B) The database approach reduces the amount of redundancy in an organization
(C) The database approach views data as an organizational resource that should be managed by the organization rather than by individual departments.
(D) All of the above are correct
Answer: D

52. When is the TTL field in an IP packet decremented?
(A) Each time the packet is forwarded
(B) Once every second
(C) When a packet reached destination
(D) When a packet is discarded.
Answer: A

53. Which protocol is used to carry error messages from the network to an IP source?
Answer: C

54. In which cache mapping method is it possible to load each main memory block to any line of the cache?
(A) Direct Mapping
(B) Associative mapping
(C) Set-associative mapping
(D) None of the above
Answer: B

55. The capacity of a double-sided dual- layer DVD-ROM is:
(A) 660MB
(B) 4.7GB
(C) 8.5GB
(D) 17 GB
Answer: D

56. Which among the following chips is a Programmable Peripheral Interface?
(A) 82C55A
(B) 82C59A
(C) 82C53
(D) 8257A
Answer: A

57. Which among the following is a little-endian machine?
(A) DEC Alpha
(B) IBM System 370
(D) Motorola 680×0
Answer: A

58. Hexadecimal equivalent of the decimal number 204.125 is:
(A) BD.201
(B) CC.201
(C) CC.1A
(D) CC.2
Answer: D

59. Decimal equivalent of the binary number 11100.101 is:
(A) 28.575
(B) 28.625
(C) 28.75
(D) 28.875
Answer: B

60. Which of the following is TRUE about the switch statement in Java?
(A) A default sends execution immediately to the end of the switch statement
(B) A break sends execution immediately to the end of the switch statement
(C) A case sends execution immediately to the end of the switch statement
(D) A break sends execution immediately to the end of the next case.
Answer: B

61. Among these Java expressions, which is of type String?
(A) “0”
(B) ”ab”+”cd”
(C) ’0’
(D) (A) and (b)
Answer: D

62. Which among the following is false?
(A) No LR(1) grammar can be ambiguous
(B) Every LL(1) grammar is an LR(1) grammar
(C) The regular expressions (a/b)* and (a*/b*)* are equivalent.
(D) Not all grammars can be converted to an equivalent operator grammar
Answer: D

63. The interface of a class refers to:
(A) the list of all of the fields and methods of the class
(B) the list of all of the public fields and public methods of the class
(C) the list of all of the private fields and public methods of the class
(D) the list of all of the private fields and private methods of the class
Answer: B

64. Consider the following Java code fragment.

Rectangle r1=new Rectangle();
Rectangle r2=r1;

After the above code is executed, what are the colors of r1 and r2 (in this order)?
Answer: A

65. What is the type and value of the following Java expression?
(A) int -5
(B) double -4.5
(C) int -4
(D) double -5.0
Answer: D

66. Consider the two Java methods(within the same class):

Public int foo(int a, String s)
{ s=”Yellow”;a=a+2;return a;)}
Public void bar()
{ int a =3;
String s=”Blue”;
A=foo(a,s); System.out.println(“a=”+a+”s=”+s);}

What is printed?
(A) a=3 s=Blue
(B) a=5 s=Yellow
(C) a=3 s=Yellow
(D) a=5 s=Blue
Answer: D

67. Using De Morgan’s law, how would you rewrite the following: Conditional statement? (i.e. rewrite the statement using && instead of || ) (c!=’n’ && z+2<=5)
(A) !(c!=’n’ || z+2<=5)
(B) !(c= =’n’ || z+2>=5)
(C) !(c!=’n’ || z+2<5)
(D) !(c==’n’ || z+2>5)
Answer: D

68. IEEE 802.11 standard is known as:
(C) Blue tooth
(D) Token bus
Answer: A

69. Which of the following protocols is used to share the same IP address among different computers (as long as they are not simultaneously active)?
Answer: B

70. Ipv6 uses …………… bit addresses.
(A) 32
(B) 64
(C) 128
(D) 256
Answer: C

71. Consider the following Java class definition:

Public class Myclass{
private int value;
public void setValue(int i){/*code*/}
//Other methods…}

The method setValue assigns the value of i to the instances field value. What could you write for the implementation of setValue?
(A) value=I;
(B) this.value=I;
(C) value= = I;
(D) (A) and (b)
Answer: D

72. Consider the following truth table for a logical operator “implies”:
P Q P implies Q
Which of the following java conditional expressions would reproduce the above truth table?
(A) P || Q
(B) (!P) &&(!Q)
(C) (!P) || Q
(D) P && (!Q)
Answer: C

73. Which among the following involves modifying your computer so that the microprocessor runs faster than the manufacturer-specified speed?
(A) thrashing
(B) debouncing
(C) stepping
(D) overclocking
Answer: D

74. Which was the first processor to be shipped with a 1 gigahertz clock speed?
(A) Athlon
(B) BeOS
(C) Crusoe
(D) Pentium
Answer: A

75. Which among the following involve the continuous and somewhat overlapped movement of instructions to the processor?
(A) flow control
(B) cyclic redundancy checking
(C) inverse multiplexing
(D) pipelining
Answer: D

76. The data path and physical interface between the processor and the L1 and L2 memory is called:
(A) Backlink
(B) Backside bus
(C) CardBus
(D) Virtual memory
Answer: B

77. A group of microchips designed to work as a unit to perform one or more related functions is called:
(A) Biochip
(B) Bus
(C) Chipset
(D) Diode
Answer: C

78. On a PC the keyboard and mouse are connected through ………….. interface.
(B) Serial
(D) Parallel
Answer: B

79. An interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation is:
(A) Peripheral Component Interconnect
(B) Input/Output Supervisor
(C) Jumper block
(D) 12C bus
Answer: A

80. A term for technologies in which human neural activity or states would effectively be an input peripheral for a computer is:
(A) Machine vision
(B) Wearable computer
(C) Artificial intelligence
(D) Brain-Machine interface
Answer: D


81. Which among the following is a boot loader?
Answer: A

82. Which among the following is the fastest sorting method?
(A) Heapsort
(B) Insertion sort
(C) Selection sort
(D) Bubble Sort
Answer: A

83. Who developed the concept of semaphores?
(A) Dekker
(B) Tanenbaum
(C) Kruskal
(D) Dijkstra
Answer: D

84. Which among the following is not object oriented?
(A) Java
(B) Smalltalk
(C) Delphi
Answer: D

85. Which among the following is used for file sharing among different platforms?
(C) ext3
Answer: D

86. Which among the following SQL commands is a projection operation?
Answer: B

87. Which among the following is a clipping algorithm?
(A) Kruskal’s
(B) Cohen-Sutherland
(C) Dijkstra’s
(D) Prim’s
Answer: B

88. Which is not a comparison based sort?
(A) Radix Sort
(B) Quick sort
(C) Heap Sort
(D) Merge Sort
Answer: A

89. The worst case time of Quick sort is?
(A) O(n log n)
(B) O(n2)
(C) O(n2 log n)
(D) O(n2)
Answer: D

90. The port number used by SMTP is:
(A) 21
(B) 23
(C) 25
(D) 80
Answer: C

91. Which among the following problems is undecidable?
(A) Given a grammar G and a string w, to determine whether w is in L(G)
(B) Given a grammar G1 and G2, to determine whether L(G1)=L(G2)
(C) For an arbitrary grammar G, to determine whether L(G) is empty.
(D) All of the above.
Answer: D

92. Which algorithm is used to form a minimum spanning tree?
(A) Prim’s algorithm
(B) Strassen’s algorithm
(C) Dijkstra’s algorithm
(D) Stirling’s formula
Answer: A

93. In linux, the daemon which runs user programs at periodic scheduled times is:
(A) named
(B) Ipd
(C) crond
(D) gated
Answer: C

94. Which of the following is a screen, attached externally to a monitor, that plugs into a serial or Universal Serial Bus(USB) port or a bus card installed inside the computer?
(A) digiboard
(B) patch panel
(C) Source-route transparent bridging
(D) touch screen
Answer: D

95. The designation for an electronics standard for connecting devices to your personal computer is:
(A) Universal Serial Bus
(B) IEEE 1394
(C) Universal Plug and Play
(D) Attachment unit interface
Answer: B

96. In a Java program, you read the following statement that compiles and executes:
Cookie cookie=new Cookie(“chocolate chips”);
What can you conclude?
(A) Cookie is the name of the class
(B) Cookie is a primitive type variable
(C) The Cookie class must have a constructor that has one formal parameter of type String
(D) (A) and (C)
Answer: D

97. You are programming a game of dice in Java. You need to generate a random integer that can be 1,2,3,4,5 or 6. Which of the following expression would you select?
(A) math.random( )*6
(B) ((int)Math.random( ))*6+1
(C) (int)(Math.random( )*6)+1
(D) (int)(Math.random( )+6)
Answer: C

98. Which among the following is not an e-mail protocol?
(A) POP3
Answer: D

99. In linux, what does runlevel 6 of init do?
(A) reboot
(B) single-user mode
(C) multi-user mode
(D) shutdown
Answer: A

100. Which among the following products is a proxy server?
(A) Squid
(B) Apache
(C) Pine
Answer: A

PSC HSST Computer Science Model Questions & Answers : Part 2

PSC HSST Computer Science Model Questions and Answers – Part 3

HSST Computer Science Model Questions and Answers – Part 4

PSC HSST Computer Science Model Questions and Answers – Part 5

PSC HSST Computer Science Model Questions and Answers – Part 6

Share This Post ↪
Home About Contact Privacy Disclaimer Advertise