Order PDF of any content from our website with a little minor Fee to donate for hard work. 
For details: contact whatsapp +923028700085
Important notes based PDF Books are available in very little price, starting from 500/-PKR;
Order Now:  contact whatsapp +923028700085

Computer Science Past Papers AJK PSC – Assistant Professor Held November 2025

100 min Score: 0 Attempted: 0/100 Subscribe
1. Circular Queue is also known as




2. Which one of the following is NOT a type of queue?




3. The data structure used to check if an expression contains balanced parentheses is




4. The data structure required for Breadth First Traversal (BFS) is




5. ______ data structure is used for implementing recursion.




6. ______ tree data structure is NOT a strictly balanced binary tree.




7. Algorithm used in the top-tree data structure is




8. In ______ data structure, elements can be inserted or deleted from both ends but not in the middle.




9. Assuming β€œint” is 4 bytes, the size of β€œint arr[10]” will be**




10. A Process Control Block (PCB) does NOT contain




11. Which one of the below is NOT a CPU Scheduling algorithm?




12. A process is selected from the ______ queue by the ______ scheduler, to be executed.




13. Concurrent access to shared data may result in




14. In paging, program divides memory into fixed-size blocks called




15. After completion of I/O operation, the state of process changes from β€œBlocked” to




16. ______ affects other executing processes in the system.




17. Banker’s algorithm is used for deadlock




18. The number of processes the operating system creates during program execution




19. Mathematical simulations are which type of process?




20. ______ system call creates a new process in Unix/Linux OS.




21. The physical layer of the OSI model is responsible for




22. ______ is NOT the function of network layer.




23. Data link layer takes packets from the ______ layer and encapsulates them into frames for transmission.




24. ______ network extends a private network across public networks.




25. ______ layer is responsible for process-to-process delivery in general network model.




26. ______ is the network layer protocol for the internet.




27. Name the network topology that requires a central controller or hub.




28. ______ allows connecting and logging in to a remote computer.




29. Standard TCP port ______ is used for SSH servers.




30. The network layer is concerned with ______ of data.




31. The registers, ALU and the interconnection between them are collectively called as




32. The addressing mode where we directly specify the operand value is




33. To reduce the memory access time we generally make use of




34. The VLIW architecture follows ______ approach to achieve parallelism.




35. The flash memory modules designed to replace hard disk functions are




36. During write-operation, if the required block is not in cache, a ______ occurs.




37. For zero-address instructions, operands are taken from




38. ______ memory is used to increase the speed of main memory.




39. In bus organization, all registers are called as




40. In a system with 32 registers, register ID field is




41. Each attribute of a relation has a set of permitted values called the ______ of that attribute.




42. The term ______ is used to refer to a row.




43. Records of a relation are also called as




44. Which of the following is an example of DBMS?




45. Information about data is called




46. The ability to query, insert, delete and alter tuples is offered by




47. ______ is a set of attributes taken collectively to uniquely identify a record.




48. ______ command is used to remove a relation from SQL.




49. Which of the following is NOT a DBMS utility?




50. Which normal form is adequate for a normal RDBMS design?




51. ______ model is not suitable for accommodating any change.




52. Which of the following is NOT a software process quality?




53. AGT Model is a set of




54. Quality Management is also known as




55. Which document contains user system-requirements?




56. ______ specification is also known as SRS document.




57. There are ______ scenarios in elicitation activities.




58. Which one of the following is NOT an agile method?




59. Efficiency in a software product does NOT include




60. Constraints in UML can be represented by ______.




61. The value of an automatic variable in C/C++ that is declared but not initialized is




62. ______ is NOT a type of loop statement.




63. What does debugging in programming refer to?




64. A conditional statement in programming




65. ______ loop guarantees at least one execution even if condition is false.




66. ______ is used as address-of operator in C/C++.




67. A programming language that can generate new data types is called




68. ______ statement is used to come out of any loop in C/C++.




69. What is the index number of the last element of an array with 9 elements?




70. What type of pointer is used to pass void pointer to void?




71. If a class serves as base class, then the members of base class are ______.




72. How many objects can be created from an abstract class?




73. Which feature of OOP indicates code reusability?




74. Adding new concept or class is known as




75. Identify the feature achieved using encapsulation.




76. The object cannot be ______.




77. How many classes can be inherited by a single class in Java?




78. In multilevel inheritance one class inherits ______ class.




79. Which among the following can restrict class members to get inherited?




80. There are ______ tuples in a finite state machine.




81. Language of finite automata is




82. In Moore machine, output is produced on change of




83. Mealy and Moore machines can be categorized as




84. Regular Expression R and the language it describes can be represented as ______.




85. Which of the following is a type of cybersecurity?




86. Cloud Security, Network Security, and Application Security are collectively known as:




87. An attempt to harm, damage, or cause threat to a system or network is called:




88. Existence of weakness in a system or network is known as:




89. The term used for both white-hat and black-hat hackers is:




90. ______ can diminish the chance of data leakage.




91. Which programming language is commonly used for server-side scripting in web development?




92. Which HTML tag is used to create an ordered list on a webpage?




93. Which HTML tag is used to create a hyperlink?




94. Which CSS property controls the positioning of an element?




95. React.js is written in which of the following languages?




96. Which of the following is a branch of Artificial Intelligence?




97. Which of the following is a component of Artificial Intelligence?




98. Which of the following is not an application of Artificial Intelligence?




99. How many informed search methods are there in Artificial Intelligence?




100. What is the total number of quantifications available in Artificial Intelligence?



All Copyrights Reserved 2025 Reserved by T4Tutorials