PSC Computer Programmer Engineering Colleges Model Questions and Answers

Last Updated On: 30/04/2018

26. AGING is a technique used in:
(A) FCFS (B) Round Robin
(C) Priority scheduling (D) Pre-emptive scheduling
Answer: C

27. The term used to refer to a row in database is:
(A) Field (B) Tuple
(C) Attribute (D) Entry
Answer: B

28. In a microprocessor the register that keeps the results of arithmetic or logic operation is:
(A) Program counter (B) Flag register
(C) Accumulator (D) Stack register
Answer: C

29. Thrashing occurs when a:
(A) Computer’s virtual memory subsystem is in a constant state of paging
(B) Computer’s main memory got exhausted
(C) Computer’s processes are in indefinite dead lock
(D) None of the above
Answer: A

30. A system program that sets up a program in main memory ready for execution is:
(A) Assembler (B) Linker
(C) Editor (D) Loader
Answer: D

31. For large networks, …………… topology is used.
(A) Bus (B) Star
(C) Ring (D) Mesh
Answer: B

32. ARPANET stands for:
(A) American Research Project Agency Network
(B) Asian Research Project Agency Network
(C) Ad-hoc Research Project Agency Network
(D) Advanced Research Project Agency Network
Answer: D

33. Every context sensitive language is:
(A) Recursive enumerable language
(B) Recursive language
(C) Context free language
(D) Context sensitive language
Answer: X

34. The permitted values of each attributes of a relation is called its:
(A) Set (B) Tuple
(C) Schema (D) Domain
Answer: D

35. The addressing mode in which you directly give the operand value is:
(A) Relative (B) Direct
(C) Definite (D) Immediate
Answer: D

36. What is the value of j after the execution of the following code?

int j = 0;
 int N = 10;

(A) 0 (B) 9
(C) 10 (D) 11
Answer: C

37. The address generated by CPU is:
(A) Physical address (B) Absolute address
(C) Logical address (D) Memory address
Answer: C

38. IEEE 802.11 standard for wireless LAN uses …………… multiple access technique.
(C) CSMA/CA (D) All of these
Answer: C

39. The worst case complexity of heap sort is:
(A) n log n (B) n2
(C) Log n (D) N
Answer: A

40. A protocol used for secure sending of data over the Internet is:
Answer: C

41. The …………….. method provides a one-time session key for two parties.
(A) Diffie-Hellman (B) Public key
Answer: A

42. How many root element an XML document can have?
(A) Any number as required
(B) One
(C) Two
(D) Only limited by available memory
Answer: B

43. Which of the following is a goal of data mining?
(A) To extract some observed event or condition
(B) To analyze data for expected relationships
(C) To create new database
(D) None of the above
Answer: A

44. Critical path of the PERT chart is:
(A) Path which takes the longest time to complete the project
(B) Path which takes the shortest time to complete the project
(C) Path which takes the most appropriate time to complete the project
(D) None of the above
Answer: A

45. The language used by end users and programmers to manipulate data in a database is:
Answer: B

46. Secret key encryption is also known as:
(A) Asymmetric encryption (B) Symmetric key cryptography
Answer: B

47. What is a firewall?
(A) Boundary of a network
(B) A routing software
(C) Software to prevent unauthorized access
(D) A web browsing software
Answer: C

48. Which normal form is based on multi-valued dependency?
(A) First (B) Second
(C) Third (D) Fourth
Answer: D

49. mov ax, bx. Which addressing mode does this instruction use?
(A) Immediate (B) Indirect
(C) Register (D) Direct
Answer: C

50. An RTP packet is encapsulated in:
(A) a TCP segment (B) a UDP datagram
(C) an IP datagram (D) a SMTP packet
Answer: B

Sharing is caring
Notify of
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x