PSC HSST Computer Science Model Questions and Answers – Part 3

Last Updated On: 30/04/2018

26. Not an Anti-virus software:
(A) McAfee (B) Norton
(C) AVG (D) TROJAN
Answer: D

27. The following IP address format refers to:
D31 – 1
D30 – 1
D29 – 0
D28-D8 – NETWORK
D7-D0 – HOST

(A) Class A Addresses (B) Class B Addresses
(C) Class C Addresses (D) Class D Addresses
Answer: C

28. In C++, a pointer that is automatically being passed to a member function during its invocation is:
(A) Base pointer (B) Derived pointer
(C) Virtual pointer (D) this pointer
Answer: D

29. With QBE, inserting records from one or more source tables into a single target table can be achieved by:
(A) Append action query (B) Update action query
(C) Insert action query (D) Make table action query
Answer: A

30. Not an example of a network debugging utility:
(A) ping (B) nslookup
(C) traceroute (D) telnet
Answer: D

31. A secure protocol for personal emails:
(A) SSL (B) PGP
(C) RSA (D) Kerberos
Answer: B

32. If f and g are functions, then f(n)=q(g(n)) if:
(A) f(n)=O(g(n))
(B) f(n)=W(g(n))
(C) f(n)=O(g(n)) or f(n)=W(g(n))
(D) f(n)=O(g(n)) and f(n)=W(g(n))
Answer: D

33. Simplified form of the Boolean expression Y=A’BC’D’+ABC’D’+A’BCD’+ABCD’ is:
(A) C’D’ (B) CD’
(C) BD’ (D) BC’
Answer: C
Explanation:
Y= A’BC’D’+ABC’D’+A’BCD’+ABCD’
=(A’+A)BC’D’+(A’+A)BCD’=BC’D’+BCD’=BD’(C’+C)=BD’

34. The postfix form of the expression (A+B)*C-D/E is:
(A) AB+C*DE/- (B) ABC*+DE/-
(C) ABCDE+*-/ (D) AB+C*DE-/
Answer: A

35. When a process is accessing shared modifiable data, the process is said to be in:
(A) Dead lock (B) Critical Section
(C) Multitasking (D) Context Switching
Answer: B

36. The first MPI function call made by every MPI process is the call to:
(A) MPI_Main() (B) MPI_Wtick()
(C) MPI_Init() (D) MPI_Bcast()
Answer: C

37. The output generated by the following C program does not include the value:

#include<stdio.h>
 main()
 {
 int n=3;
 while(n>1)
 {
 if((n%2)!=1)
 n=n/2;
 else
 n=3*n+1;
 printf(“%d\n”,n);
 }
 }

(A) 5 (B) 6
(C) 8 (D) 16
Answer: B

38. Boundary value analysis is a method for:
(A) White box testing (B) Black box testing
(C) Structural testing (D) Mutation testing
Answer: B

39. Dijkstra’s Banker’s algorithm is used for:
(A) Deadlock Prevention (B) Deadlock Detection
(C) Deadlock Recovery (D) Deadlock Avoidance
Answer: D

40.

 

 

is a famous law in logic known as:
(A) Euclidian Law (B) Karnaugh Law
(C) Turing’s Law (D) De Morgan’s Law
Answer: D

41. The language accepted by a Push down Automata:
(A) Type0 (B) Type1
(C) Type2 (D) Type3
Answer: C

42. In parallel algorithm design, the process of grouping tasks into larger tasks in order to improve performance:
(A) Agglomeration (B) Domain Decomposition
(C) Mapping (D) None of these
Answer: A

43. A system call in Linux operating system to create a new child process, which is a copy of the parent process:
(A) access (B) fork
(C) flock (D) exec
Answer: B

44. A preemptive type of process scheduling strategy:
(A) Highest Response Ratio Next Scheduling
(B) Shortest Job First Scheduling
(C) First in First out Scheduling
(D) Shortest Remaining Time Next Scheduling
Answer: D

45. The type of geometric transformation applied to an object for repositioning it along a straight line path from one location to another:
(A) Scaling (B) Rotation
(C) Translation (D) Reflection
Answer: C

46. Vigenere Cipher is a kind of:
(A) Stream Cipher (B) Mono alphabetic Cipher
(C) Poly alphabetic Cipher (D) Block Cipher
Answer: C

47. Recursive Descent Parsers are a type of:
(A) LL parsers (B) LR parsers
(C) LALR parsers (D) SLR parsers
Answer: A

48. The approach used for requirements elicitation in software design and development process:
(A) View Points (B) Interview
(C) Use-Cases (D) All of these
Answer: D

49. The output generated by the following C program

#include<stdio.h>
 int Update(int x)
 {
 static int y=10;
 y+=x;
 return(y);
 }
 main()
 {
 int a,count;
 for(count=0;count<3;++count)
 {
 a=Update(count);
 printf(“%d”,a);
 }
 }

(A) 10 11 12 (B) 10 11 13
(C) 0 1 3 (D) Compilation Error
Answer: B

50. Area on earth where signals of a satellite can be received:
(A) Foot-print (B) Coverage
(C) Range (D) Vicinity
Answer: A

       
Subscribe
Notify of
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
JOIN
0
Would love your thoughts, please comment.x
()
x