Order PDF of any content from our website with a little minor Fee to donate for hard work. Online MCQs are fully free but PDF books are paid. For details: contact whatsapp +923028700085 Important notes based PDF Books are available in very little price, starting from 500/-PKR; Order Now: contact whatsapp +923028700085

AJK PSC Lecturer Computer Science Past paper held 1st April 2026

Azad Jammu & Kashmir Public Service Commission, Muzaffarabad
Post Name: Lecturer Computer Science (BS-17)
Total Marks: 100
Time Allowed: 100 Minutes
Note: Fill the correct answers on the OMR sheet.

100 min
Score: 0
Attempted: 0/100
Subscribe
1. In a linked list, there are no NULL links in:



2. In a stack, the command to access the nth element from the top of the stack is:



3. What is the time complexity of binary search tree (BST) (best, worst)?



4. Which of the following algorithms swaps adjacent entries?



5. What does O(n) mean?



6. BFS uses:



7. Which of the following is not a linear data structure?



8. Evaluate the prefix expression: * / b + - d a c (a=3, b=6, c=1, d=5)



9. Prim’s algorithm is based on:



10. The physical layer is concerned with:



11. Time sharing is best suited for transmission of data in:



12. A coaxial cable has conductors with ________



13. The area of coverage of a satellite radio beam is called its ________



14. Buffering is the process of ________



15. Which of the following is not applicable for IP protocol?



16. Which field helps to check rearrangement of fragments?



17. In asymmetric key cryptography, the private key is held by



18. When was the first operating system developed?



19. In a time-sharing operating system, when the time slot given to a process is completed, the process goes from running state to



20. Which one of the following is a synchronization tool?



21. Operating system maintains the page table for



22. Because of the concept of virtual memory, the memory can be shared among



23. Which one of the following address is generated by a CPU?



24. Memory fragmentation results in



25. An edge from process Pi to process Pj in a wait-for graph implies that



26. Which of the following is the feature of a good software?



27. CASE stands for



28. The activity that distributes estimated effort across the planned project duration by allocating the effort to specific software engineering tasks is called



29. Which of the following is part of the manifesto for agile software development?



30. Which of the following document contains the user system requirements?



31. In UML, a domain model is built after



32. The include relationship in a use case diagram captures



33. Which one of the following is not part of a UML design class diagram?



34. Aggregation is a type of relationship in which



35. The circuit used to store one bit of data is known as



36. Which of the following code used in present day computing was developed by IBM?



37. Memory access in RISC architecture is limited to instructions



38. A collection of lines that connects several devices is called



39. A program counter (PC) is also called



40. In Assembly language programming, the minimum number of operands required by an instruction is/are



41. A nibble is a group of ______ bits



42. In a vectored Interrupt



43. A computer network permits sharing of



44. ATM stands for



45. ATM networks are



46. DHCP stands for



47. To deliver a message to the correct application program running on a host, the ______ address must be consulted



48. What is the main purpose of a data link layer?



49. IPv6 uses ______ bit addresses



50. Session layer checkpoints



51. Power set of empty set has exactly ______ subset



52. For an inverse to exist it is necessary that a function be a



53. Which of the following can only be used in disproving statements?



54. Which one of the following is a proposition?



55. How many bit strings of length 4 contain two zeros and two ones



56. Let P and Q be two logical statements then P β†’ Q is logically equivalent to



57. Two sets are called disjoint if their ______ is empty



58. Let P(x) denote the statement x > 7 then which of these has truth value true?



59. HTML is what type of language?



60. Fundamental HTML block is known as



61. What is a CMS in web design?



62. Which protocol is used for WWW?



63. A web cookie is



64. ______ is an FTP search tool



65. An email message is broken into



66. Which is the correct HTML tag for inserting a line break?

67. The operator % in C language is known as



68. Which is correct array initialization in C?



69. What will be the output of the following code? (sum of array 1,2,3,4)



70. What will be the output of the expression 2 + 4/2 + 6*2



71. How can you access the third element of an array using pointer notation?



72. The declaration int x:8 indicates



73. The printf(β€œHello”) returns



74. What will be the output of the following code?



75. Constructor has



76. Objects are created using new operator at



77. The relationship between a base class and derived class is known as



78. Which function is inherited from base class?



79. Which operator is used to access class members?



80. Virtual functions are primarily defined in



81. A virtual function should be



82. Which function is used for dynamic memory allocation?



83. Late binding is implemented using



84. Which of the following is not a backtracking algorithm?



85. The number of nodes in a full k-ary tree with n internal nodes is



86. The time complexity of Floyd-Warshall algorithm is



87. Which of the following is a key characteristic of Dynamic Programming?



88. Quick sort comparisons



89. Merge sort follows



90. Prefix expression of A + (B - C) * D is



91. Majority element can be found in



92. Minimum operations to evaluate polynomial



93. Set concept is used in



94. Relational algebra is



95. In a relation



96. Derived attributes in ER diagram are represented by



97. Distinct A including NULL is



98. Which is not true for a view?



99. Which SQL command is used to delete a column?



100. Operation used for selecting columns in relational algebra is




Contents Copyrights Reserved By T4Tutorials