Azad Jammu & Kashmir Public Service Commission, Muzaffarabad
Post Name: Lecturer Computer Science (BS-17)
Total Marks: 100
Time Allowed: 100 Minutes
Note: Fill the correct answers on the OMR sheet.
1. In a linked list, there are no NULL links in:
(A) Single linked list
(B) Linear doubly linked list
(C) Circular linked list
(D) None of the above
2. In a stack, the command to access the nth element from the top of the stack is:
(A) S[Top + n]
(C) None of the above
(B) S[Top + n]+ 1]
(D) S[Top – n
3. What is the time complexity of binary search tree (BST) (best, worst)?
(A) N, N+1
(B) log N, N
(C) 1, log N
(D) None of the above
4. Which of the following algorithms swaps adjacent entries?
(A) Insertion sort
(B) Bubble sort
(C) Shell sort
(D) Quick sort
5. What does O(n) mean?
(A) n nested loops
(B) n times slower
(C) Time proportional to n
(D) n statements
6. BFS uses:
(A) Queue
(B) Linked list
(C) Graph
(D) Stack
7. Which of the following is not a linear data structure?
(A) Array
(B) Linked List
(C) None of the above
(D) Both a & b
8. Evaluate the prefix expression: * / b + - d a c (a=3, b=6, c=1, d=5)
(A) 10
(B) 5
(C) 0
(D) 15
9. Prim’s algorithm is based on:
(A) Divide and conquer
(B) Dynamic programming
(C) Greedy method
(D) Branch and bound
10. The physical layer is concerned with:
(A) Port to port delivery
(B) Process to process delivery
(C) Application to application delivery
(D) Bit-by-bit delivery
11. Time sharing is best suited for transmission of data in:
(A) Simplex mode
(B) Half duplex mode
(C) Full duplex mode
(D) None of the above
12. A coaxial cable has conductors with ________
(A) None of the above
(B) Equal resistance
(C) The same diameter
(D) A common axis
13. The area of coverage of a satellite radio beam is called its ________
(A) Beam width
(B) Circular polarization
(C) Footprint
(D) None of the above
14. Buffering is the process of ________
(A) A method for reducing routing overhead
(B) A method for reducing cross talk
(C) Temporarily storing data to allow for small variations in device speed
(D) None of the above
15. Which of the following is not applicable for IP protocol?
(A) Connectionless
(B) Offers reliable service
(C) Offers unreliable service
(D) None of the above
16. Which field helps to check rearrangement of fragments?
(A) Identifier
(B) Flag
(C) TTL
(D) Offset
17. In asymmetric key cryptography, the private key is held by
(A) Sender
(B) All devices connected to the network
(C) Both sender and receiver
(D) Receiver
18. When was the first operating system developed?
(A) 1949
(B) 1948
(C) 1950
(D) 1951
19. In a time-sharing operating system, when the time slot given to a process is completed, the process goes from running state to
(A) Suspended state
(B) Blocked state
(C) Ready state
(D) Terminated state
20. Which one of the following is a synchronization tool?
(A) Thread
(B) Semaphore
(C) Pipe
(D) Socket
21. Operating system maintains the page table for
(A) Each instruction
(B) Each thread
(C) Each process
(D) Each address
22. Because of the concept of virtual memory, the memory can be shared among
(A) None of the above
(B) Data
(C) Instructions
(D) Processes
23. Which one of the following address is generated by a CPU?
(A) Physical address
(B) Logical address
(C) Absolute address
(D) None of the above
24. Memory fragmentation results in
(A) Stack overflow
(B) Page faults
(C) Poor memory utilization
(D) Better memory utilization
25. An edge from process Pi to process Pj in a wait-for graph implies that
(A) Process Pj is waiting for a resource held by process Pi
(B) Process Pi is waiting for a resource held by process Pj
(C) Process Pi is waiting for a resource held by process Pi
(D) None of the above
26. Which of the following is the feature of a good software?
(A) Modularity
(B) Accessibility
(C) All of these
(D) Portability
27. CASE stands for
(A) Computer Assisted Software Engineering
(B) Computer Aided Software Engineering
(C) Computer Adaptive Software Engineering
(D) None of the above
28. The activity that distributes estimated effort across the planned project duration by allocating the effort to specific software engineering tasks is called
(A) Project scheduling
(B) Project tracking
(C) Project milestone
(D) None of the above
29. Which of the following is part of the manifesto for agile software development?
(A) Customer collaboration
(B) Individuals and interactions
(C) All of the above
(D) Working software
30. Which of the following document contains the user system requirements?
(A) SRS
(B) STD
(C) SRD
(D) SDD
31. In UML, a domain model is built after
(A) Design class diagram
(B) None of the above
(C) System sequence diagrams
(D) Interaction diagrams
32. The include relationship in a use case diagram captures
(A) Optional behaviour
(B) Mandatory behaviour
(C) Tertiary behaviour
(D) System behaviour
33. Which one of the following is not part of a UML design class diagram?
(A) Class name
(B) None of the above
(C) Class functions
(D) Class attributes
34. Aggregation is a type of relationship in which
(A) A child class can exist independently of the parent class
(B) A child class cannot exist independently of the parent class
(C) A parent class is dependent on the child class
(D) None of the above
35. The circuit used to store one bit of data is known as
(A) Register
(B) Flip-flop
(C) Encoder
(D) Decoder
36. Which of the following code used in present day computing was developed by IBM?
(A) ASCII
(B) Hollerith Code
(C) None of the above
(D) EBCDIC Code
37. Memory access in RISC architecture is limited to instructions
(A) STA and LDA
(B) PUSH and POP
(C) CALL and RET
(D) MOV and JMP
38. A collection of lines that connects several devices is called
(A) Peripheral connection wires
(B) Bus
(C) Both a & b
(D) None of the above
39. A program counter (PC) is also called
(A) Instruction pointer
(B) Data pointer
(C) Memory pointer
(D) None of the above
40. In Assembly language programming, the minimum number of operands required by an instruction is/are
(A) Zero
(B) One
(C) Two
(D) Both b & c
41. A nibble is a group of ______ bits
(A) 4
(B) 2
(C) 8
(D) 16
42. In a vectored Interrupt
(A) The branch address is assigned to a fixed location in memory
(B) The interrupting source supplies the branch information to the processor through an interrupt vector
(C) The branch address is obtained from a register in the processor
(D) None of the above
43. A computer network permits sharing of
(A) Resources
(B) Both a & b
(C) Information
(D) None of the above
44. ATM stands for
(A) Automated teller machine
(B) Automatic teller machine
(C) Automatic take money
(D) None of the above
45. ATM networks are
(A) Connectionless
(B) Satellite based
(C) Connection oriented
(D) None of the above
46. DHCP stands for
(A) Dynamic Host Configuration Protocol
(B) Digital Host Communication Provider
(C) Dynamic High Computing Processor
(D) Digital Host Communication Protocol
47. To deliver a message to the correct application program running on a host, the ______ address must be consulted
(A) Physical
(B) IP
(C) Port
(D) Tunnel
48. What is the main purpose of a data link layer?
(A) Requests network services
(B) Encryption
(C) Adds physical addresses (MAC addresses)
(D) Establishes communication sessions
49. IPv6 uses ______ bit addresses
(A) 32
(B) 64
(C) 128
(D) 256
50. Session layer checkpoints
(A) Control the addition of headers
(B) Allow just a portion of a file to be resent
(C) Detect and recover errors
(D) Are involved in dialog control
51. Power set of empty set has exactly ______ subset
(A) Zero
(B) Two
(C) One
(D) None of the above
52. For an inverse to exist it is necessary that a function be a
(A) Bijection
(B) Injection
(C) Surjection
(D) None of the above
53. Which of the following can only be used in disproving statements?
(A) Direct proof
(B) Contrapositive proof
(C) Mathematical induction
(D) Counterexample
54. Which one of the following is a proposition?
(A) Get me a glass of milk
(B) The only odd prime number is 2
(C) What time is it now?
(D) God bless you
55. How many bit strings of length 4 contain two zeros and two ones
(A) 4
(B) 5
(C) 2
(D) 6
56. Let P and Q be two logical statements then P → Q is logically equivalent to
(A) ¬P ∧ Q
(B) ¬P ∨ Q
(C) ¬P ∧ ¬Q
(D) P ∨ Q
57. Two sets are called disjoint if their ______ is empty
(A) Intersection
(B) Union
(C) Power set
(D) Cartesian product
58. Let P(x) denote the statement x > 7 then which of these has truth value true?
(A) P(1)
(B) P(9)
(C) P(2)
(D) P(7)
59. HTML is what type of language?
(A) Scripting language
(B) Markup language
(C) Programming language
(D) Protocol
60. Fundamental HTML block is known as
(A) HTML element
(B) HTML tag
(C) HTML attribute
(D) HTML body
61. What is a CMS in web design?
(A) Content mixing system
(B) Creative management system
(C) Content management system
(D) Creative managerial system
62. Which protocol is used for WWW?
(A) SMTP
(B) HTTP
(C) TCP
(D) FTP
63. A web cookie is
(A) Sent from root server to all servers
(B) Sent from browser to server and stored there
(C) Sent from website and stored in browser
(D) None of the above
64. ______ is an FTP search tool
(A) Google
(B) AltaVista
(C) Archie
(D) Gopher
65. An email message is broken into
(A) Packets
(B) Frames
(C) Bytes
(D) Hyper text
66. Which is the correct HTML tag for inserting a line break?
(A)