PSC HSST Computer Science Model Questions and Answers – Part 3
26. Not an Anti-virus software:
(A) McAfee (B) Norton
(C) AVG (D) TROJAN
Answer: D
27. The following IP address format refers to:
D31 – 1
D30 – 1
D29 – 0
D28-D8 – NETWORK
D7-D0 – HOST
(A) Class A Addresses (B) Class B Addresses
(C) Class C Addresses (D) Class D Addresses
Answer: C
28. In C++, a pointer that is automatically being passed to a member function during its invocation is:
(A) Base pointer (B) Derived pointer
(C) Virtual pointer (D) this pointer
Answer: D
29. With QBE, inserting records from one or more source tables into a single target table can be achieved by:
(A) Append action query (B) Update action query
(C) Insert action query (D) Make table action query
Answer: A
30. Not an example of a network debugging utility:
(A) ping (B) nslookup
(C) traceroute (D) telnet
Answer: D
31. A secure protocol for personal emails:
(A) SSL (B) PGP
(C) RSA (D) Kerberos
Answer: B
32. If f and g are functions, then f(n)=q(g(n)) if:
(A) f(n)=O(g(n))
(B) f(n)=W(g(n))
(C) f(n)=O(g(n)) or f(n)=W(g(n))
(D) f(n)=O(g(n)) and f(n)=W(g(n))
Answer: D
33. Simplified form of the Boolean expression Y=A’BC’D’+ABC’D’+A’BCD’+ABCD’ is:
(A) C’D’ (B) CD’
(C) BD’ (D) BC’
Answer: C
Explanation:
Y= A’BC’D’+ABC’D’+A’BCD’+ABCD’
=(A’+A)BC’D’+(A’+A)BCD’=BC’D’+BCD’=BD’(C’+C)=BD’
34. The postfix form of the expression (A+B)*C-D/E is:
(A) AB+C*DE/- (B) ABC*+DE/-
(C) ABCDE+*-/ (D) AB+C*DE-/
Answer: A
35. When a process is accessing shared modifiable data, the process is said to be in:
(A) Dead lock (B) Critical Section
(C) Multitasking (D) Context Switching
Answer: B
36. The first MPI function call made by every MPI process is the call to:
(A) MPI_Main() (B) MPI_Wtick()
(C) MPI_Init() (D) MPI_Bcast()
Answer: C
37. The output generated by the following C program does not include the value:
#include<stdio.h> main() { int n=3; while(n>1) { if((n%2)!=1) n=n/2; else n=3*n+1; printf(“%d\n”,n); } }
(A) 5 (B) 6
(C) 8 (D) 16
Answer: B
38. Boundary value analysis is a method for:
(A) White box testing (B) Black box testing
(C) Structural testing (D) Mutation testing
Answer: B
39. Dijkstra’s Banker’s algorithm is used for:
(A) Deadlock Prevention (B) Deadlock Detection
(C) Deadlock Recovery (D) Deadlock Avoidance
Answer: D
40.
is a famous law in logic known as:
(A) Euclidian Law (B) Karnaugh Law
(C) Turing’s Law (D) De Morgan’s Law
Answer: D
41. The language accepted by a Push down Automata:
(A) Type0 (B) Type1
(C) Type2 (D) Type3
Answer: C
42. In parallel algorithm design, the process of grouping tasks into larger tasks in order to improve performance:
(A) Agglomeration (B) Domain Decomposition
(C) Mapping (D) None of these
Answer: A
43. A system call in Linux operating system to create a new child process, which is a copy of the parent process:
(A) access (B) fork
(C) flock (D) exec
Answer: B
44. A preemptive type of process scheduling strategy:
(A) Highest Response Ratio Next Scheduling
(B) Shortest Job First Scheduling
(C) First in First out Scheduling
(D) Shortest Remaining Time Next Scheduling
Answer: D
45. The type of geometric transformation applied to an object for repositioning it along a straight line path from one location to another:
(A) Scaling (B) Rotation
(C) Translation (D) Reflection
Answer: C
46. Vigenere Cipher is a kind of:
(A) Stream Cipher (B) Mono alphabetic Cipher
(C) Poly alphabetic Cipher (D) Block Cipher
Answer: C
47. Recursive Descent Parsers are a type of:
(A) LL parsers (B) LR parsers
(C) LALR parsers (D) SLR parsers
Answer: A
48. The approach used for requirements elicitation in software design and development process:
(A) View Points (B) Interview
(C) Use-Cases (D) All of these
Answer: D
49. The output generated by the following C program
#include<stdio.h> int Update(int x) { static int y=10; y+=x; return(y); } main() { int a,count; for(count=0;count<3;++count) { a=Update(count); printf(“%d”,a); } }
(A) 10 11 12 (B) 10 11 13
(C) 0 1 3 (D) Compilation Error
Answer: B
50. Area on earth where signals of a satellite can be received:
(A) Foot-print (B) Coverage
(C) Range (D) Vicinity
Answer: A