Lecturer Computer Science 2019 - Solved Paper

Friday, April 5, 2019

Lecturer Computer Science 2019

Lecturer Computer Science BS-17

Given Below is the past paper of Lecturer in Computer Science. This Computer Science past paper was taken by PPSC (Punjab Public Service Commission) in 2017. This post was for Male and Female both candidates. This was all over the Punjab job. Basic Pay Scale for this post was BS-17. Given below are a few questions from the past paper of computer science lecturer in Punjab.
To get Latest Papers in Your Inbox Click Here

past paper of computer science
1.       A FIFO replacement algorithm associates with each page the:
a)      The time it was brought into memory
b)      Size of the page In memory
c)       Page after and before it
d)      Allot these
2.       Optimal page - replacement algorithm is:
a)      Replace the page that has not been used for a long lime
b)      Replace the page that has been used for a long lime
c)       Replace the page that will not be used for a long time
d)      None of these
3.       Optimal page replacement algorithm is difficult to implement, because:
a)      It requires a lot of information
b)      It requires future knowledge of the reference string
c)       It is too complex
d)      It is extremely expensive
4.       LRU page - replacement algorithm associates with each page the:
a)      Time It was brought Into memory
b)      The time of that page s last use
c)       Page after and before it
d)      All of these
5.       For 3 page frames, the following is the reference string: 7 0 1  20 3 0 4 2 3 0 3 2 1 2 0 1 7 0 1; How many page faults does the LRU page replacement algorithm produce?
a)      10
b)      15
c)       11
d)      12
6.       CPU fetches the Instruction from memory according to the value of.
a)      Program counter
b)      Status register
c)       Instruction register
d)      Program status word
7.       A memory buffer used to accommodate a speed differential is called:
a)      Slack pointer
b)      Cache
c)       Accumulator
d)      Disk buffer
8.       Which one of the following is the address narrated by CPU?
a)      Physical Address
b)       Absolute address
c)       Logical address
d)      None of these
9.       Run time mapping from virtual to physical address is done by:
a)      Memory management unit
b)      CPU
c)       PCI
d)      None of these
10.   Memory management technique In which system stores and retrieves data from secondary storage for use In main memory is called:
a)      Fragmentation
b)      Paging
c)       Mapping
d)      None of these
11.   The Interrupt-request line is a part of the:
a)      Data Line
b)      Control Line
c)       Address line
d)      None of these
12.   The return address from the Interrupt-service routine is stored on the:
a)      System heap
b)      Processor register
c)       Processor stack
d)      Memory
13.   The signal Sent to the device from the processor to the device after receiving an Interrupt:
a)      Interrupt-acknowledge
b)      Return signal
c)       Service signal
d)      Permission signal
14.   A relational database consists of a collection of:
a)      Tables
b)      Fields
c)       Records
d)      Keys
15.   A _______ in a table represents a relationship among a set of values:
a)      Column
b)      Key
c)       Entry
d)      Row try
16.   The term ______ is used to refer to a row.
a)      Attribute
b)      Tuple
c)       Field
d)      instance
17.   The term attribute refers to a ______ of a table.
a)      Record
b)      Column
c)       Tuple
d)      Key
18.   For each attribute of a relation, there is a set of permitted values, called the _____of that attribute.
a)      Domain
b)      Relation
c)       Set
d)      Schema
19.   Which of the following is a fuels-generates dependency?
a)       Functional dependency
b)      Equality-generating dependencies
c)       Multi-valued dependencies
d)      Non-functional dependency
20.   The main task carded out in the _____ is to remove repeating attributes to separate tables.
a)      First Normal Form
b)      Second Normal Form
c)       Third Normal Form
d)       Fourth Normal Form
21.   Which of the normal form is based on multi-valued dependencies?
a)      First
b)      Second
c)       Third
d)      Fourth
22.   Which forms have a relation that possesses data about an Individual entity?
a)      2NF
b)      3NF
c)       4NF
d)      6NF
23.   Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set?
a)      A many-to-many relationship set
b)      A multi-valued attribute of an entity set
c)       One-to-many relationship set
d)      Both A and B
24.   In which of the following, a separate schema is created consisting of that attribute and the primary key of the entity set?
a)      A many-to-many relationship set
b)      A multi-valued attribute of an entity set
c)       A one-to-many relationship set
d)      Both A and B at
25.   In 2NF:
a)      No functional dependencies (FDs) exist
b)      No multi-valued dependencies (MVDs) exist
c)       No partial FDs axial
d)      No partial MVDs exist
26.   ______ can help us detect poor E-R design:
a)      A database Design Process
b)      E-R Design Process
c)       Relational scheme
d)      Functional dependencies
27.   Build and Fix Model is suitable for programming exercises of ______ LOC (Line of Code).
a)      100-200
b)      200-400
c)       400-1000
d)      Above 1000
28.   What is the best way to represent the attributes in a large database?
a)      Relational
b)      Concatenation
c)       Dot representation
d)      All of these
29.   Designers use which of the following to tune the performance of systems to support time-critical operations?
a)      Demoralization
b)      Redundant optimization
c)       Optimization
d)      Realization
30.   RAD stands for:
a)      Relative Application Development
b)      Rapid Application Development
c)       Rapid Application Document
d)      Rational Application Document

For Inspector in Cooperative Societies Click Here

No comments:

Post a Comment