PSC HSST Computer Science Model Questions and Answers – Part 6
51. Three address code involves
(A) Exactly three addresses (B) At least three addresses
(C) At most three addresses (D) None of the above
Answer: C
52. A basic block can be analyzed by
(A) A DAG (B) A graph which may involve cycles
(C) Flow graph (D) Cyclic graph
Answer: A
53. A compiler that run on one machine and produce target code for another machine is called
(A) Boot-strapping (B) Cross-compiler
(C) Loader (D) Linker
Answer: B
54. In LR(k) parsing technique k stands for
(A) Number of input symbols
(B) Number of output symbols
(C) Number of input symbols of look ahead
(D) A constant
Answer: C
55. Poor response times are usually caused by
(A) Process busy (B) High I/O rates
(C) High paging rates (D) Any of the above
Answer: D
56. Thrashing
(A) is a natural consequence of virtual memory system
(B) can be caused by poor paging algorithm
(C) always occur on large computers
(D) can be avoided by swapping
Answer: B
57. Which of the following Operating Systems do you choose to implement a Client-Server network?
(A) MS DOS (B) Windows 95
(C) Windows 98 (D) Windows 2000
Answer: D
58. Dijkstra’s banking algorithm in an operating system, solves the problem of
(A) Mutual exclusion (B) Context switching
(C) Dead lock avoidance (D) Dead lock recovery
Answer: C
59. Dirty bit is used to show the
(A) Least frequently used page
(B) Most recently used page
(C) Page with corrupted data
(D) Page that is modified after being loaded into the cache memory
Answer: D
60. Overlays are used
(A) to increase the size of physical memory
(B) to increase the logical address space
(C) to split a very large file
(D) then, the size of a process is not limited to the size of physical memory
Answer: D
61. Data entry can be performed with all of the following except
(A) OCR (B) OMR
(C) DDR (D) MICR
Answer: C
62. The principle of locality of reference justifies the use of
(A) Interrupts (B) Polling
(C) Status checking (D) Cache memory
Answer: D
63. EPROM consists of
(A) UJTs (B) Bipolar transistors
(C) MOSFETs (D) Diodes
Answer: B
64. The term P in semaphore means
(A) Wait (B) Signal
(C) Both (A) and (B) (D) None of the above
Answer: A
65. Probability of page fault is
(A) Nearly equal to 1 (B) Equal to zero
(C) Between 0 and 1 (D) None of the above
Answer: C
66. Which of the following is not a characteristic for Testability?
(A) Operability (B) Observability
(C) Simplicity (D) Robustness
Answer: D
67. Cyclomatic Complexity method comes under ………… testing method.
(A) White box (B) Black box
(C) Yellow box (D) Red box
Answer: A
68. In prototyping, the following are used
(A) Screen generators (B) Input generator
(C) Application generators (D) All of the above
Answer: D
69. In data flow diagrams, an originator or receiver of the data is usually designated by
(A) a circle (B) an arrow
(C) a square box (D) a rectangle
Answer: C
70. A structure chart is
(A) Error control diagram
(B) Data flow diagram
(C) A hierarchical partitioning of the program
(D) None of the above
Answer: B
71. A data flow diagram shows
(A) The flow of data (B) The processes
(C) Areas where they are stored (D) All of the above
Answer: D
72. Digital deferential analyzer is
(A) A routing algorithm (B) A modulation method
(C) A line drawing algorithm (D) A problem solving method
Answer: C
73. Which of the following is not true for shadow-mask CRT?
(A) Can display much wider range of colors
(B) Use in majority of color TV sets
(C) A shadow mask is used
(D) Uses a single electron gun
Answer: D
74. The depth buffer algorithm is
(A) A line drawing algorithm
(B) A point plotting algorithm
(C) A polygon generating algorithm
(D) A image space algorithm
Answer: D
75. The object-oriented paradigm includes which of the following properties?
I. Encapsulation
II. Inheritance
III. Recursion
(A) I only (B) II only
(C) I and II only (D) II and III only
Answer: C