PSC HSST Computer Science Model Questions and Answers – Part 3
HSST Computer Science Model Questions and Answers – Part 3
HSST Computer Science Solved Paper
Date of Exam : 19.09.2012
Category No. : 111.2010
Alpha Code : C
HSST Computer Science Model Questions and Answers – Part 1
HSST Computer Science Model Questions and Answers – Part 2
HSST Computer Science Model Questions and Answers – Part 4
PSC HSST Computer Science Model Questions and Answers – Part 5
PSC HSST Computer Science Model Questions and Answers – Part 6
1. A document preparation software:
(A) FOXPRO (B) ORACLE
(C) LATEX (D) MATLAB
Answer: C
2. A technique in which system resources are shared among multiple users:
(A) Multiplexing (B) Demultiplexing
(C) Modulation (D) Demodulation
Answer: A
3. Interaction modeling cannot be done using:
(A) State Diagrams (B) Use-Cases
(C) Sequence Diagrams (D) Activity Diagrams
Answer: A
4. The number of bits that can be transmitted over a network in a certain period of time:
(A) Latency (B) Delay
(C) Bandwidth (D) Baud
Answer: C
5. Which of these not a markup language?
(A) HTML (B) XML
(C) SGML (D) XGML
Answer: D
6. A network topology that combines features of linear bus and star topology:
(A) Mesh (B) Ring
(C) Tree (D) Cube
Answer: C
7. If language L={0,1}*, then the reversed language LR =
(A) {0,1}* (B) {}
(C) {0}* (D) {1}*
Answer: A
8. In Linux, the subdirectory that contains system configuration files including user passwords:
(A) /boot (B) /usr
(C) /etc (D) /proc
Answer: C
9. SQL command to delete a column from an existing table:
(A) Alter table (B) Drop table
(C) Delete table (D) Delete column
Answer: A
10. A technique not associated with data mining:
(A) Predictive Modeling (B) Link Analysis
(C) Database Segmentation (D) Dimensionality Modeling
Answer: D
11. Memory bank experiencing too much contention from processor:
(A) Fan-in (B) Hot-spot
(C) Thrash (D) Fan-out
Answer: C
12. The number of nodes in a complete binary tree of height n:
(A) 2n-1-1 (B) 2n-1+1
(C) 2n+1-1 (D) 2n+1+1
Answer: C
13. The science and art of breaking ciphers.
(A) Cryptography (B) Steganography
(C) Cryptanalysis (D) Steganalysis
Answer: C
14. A raster scan display system with 24 bits per pixel and a screen resolution of 1024×1024 requires a frame buffer size.
(A) 1 Mega Bytes (B) 3 Mega Bytes
(C) 8 Mega Bytes (D) 24 Mega Bytes
Answer: B
15. Not a parallel programming language.
(A) C* (B) SEQUENT C
(C) nCube C (D) C++
Answer: D
16. Process of mapping a network interface IP address to its hardware address:
(A) ARP (B) RARP
(C) ICMP (D) IGMP
Answer: A
17. For the following sample database table staff:
Staff no | Name | Designation | Branch | Salary |
---|---|---|---|---|
SL21 | John | Assistant | B003 | 30000 |
SG37 | Ann | Supervisor | B007 | 42000 |
SL25 | Julie | Assistant | B007 | 32000 |
SL52 | Susan | Manager | B003 | 51000 |
SG10 | David | Manager | B004 | 47000 |
The SQL query: SELECT COUNT(Staff no) AS mycount, SUM(Salary) AS mysum FROM Staff WHERE Designation=’Manager’
Returns the result
(A) mycount=2, mysal=47000
(B) mycount=2, mysal=98000
(C) mycount=5, mysal=47000
(D) mycount=5, mysal=98000
Answer: B
18. Linux partitions are created using the file system:
(A) FAT (B) FAT32
(C) EXT3 (D) NTFS
Answer: C
19. The local area network technology used in Ethernet.
(A) CSMA (B) CSMA/CD
(C) CSMA/CA (D) ALOHA
Answer: B
20. Data abstraction means:
(A) Objects of one class acquire properties of object of another class
(B) Insulation of data from direct access by programs
(C) Code associated with a procedure call is not known until run time
(D) Putting together essential features without including background details
Answer: D
21. A hardware interface that allows for the connection of several peripheral devices to a single PCI board.
(A) SCSI (B) SATA
(C) ATA (D) PCI
Answer: A
22. If n represents the dimension of cube and K, the radix (no. of nodes along each dimensions) then the number of nodes N of a k-ary n-cube network is:
(A) N=nk (B) N=logk n
(C) N=logn k (D) N=kn
Answer: D
23. The output generated by the following C program:
#include<stdio.h> main() { int v=3; int *pv; pv=&v; *pv=0; printf(“*pv=%d v=%d”,*pv,v); }
(A) *pv=0 v=0 (B) *pv=0 v=3
(C) *pv=3 v=3 (D) *pv=3 v=0
Answer: A
24. A famous technique used in data warehousing:
(A) OODM (B) OLTP
(C) OLAP (D) ODBC
Answer: C
25. The environment variable in Linux, that contain a list of directories the shell automatically recognizes.
(A) $PATH (B) $ENV
(C) $USER (D) $GREP
Answer: A