PPSC Lecturer Computer Science Past Papers MCQs | Lecturer Computer Science Paper 2

Print/Downlaod pdf

PPSC recently announced many lecturer computer science posts 2022. From this platform you will get all the PPSC lecturer computer science past papers mcqs which are solved as well. We are providing best preparation of PPSC Lecturer Computer Science for the aspirant of PPSC and Live couching from our experienced staff. To Learn or Read some past papers of PPSC Lecturer Computer Science is not a big deal but to learn and under stand the major concepts of the core subjects is a big deal which will leads you to success. Moreover to learn some mcqs or some PPSC Lecturer Computer Science Past Papers instead of understanding the Topic or subject is disastrous. If you learn or under stand the topic from a good teacher then you will able to attempt any conceptual as well as technical mcq in your exam and on the other side if you learn only some mcq’s of a topic then you will ultimately not be able to solve any new mcq given in the paper.

PPSC Lecturer Computer Science Past Paper 1PPSC Lecturer Computer Science Past Paper 2
PPSC Lecturer Computer Science Past Paper 3PPSC Lecturer Computer Science Past Paper 4
PPSC Lecturer Computer Science Past Paper 5PPSC Lecturer Computer Science Past Paper 6
PPSC Lecturer Computer Science Past Paper 7PPSC Lecturer Computer Science Past Paper 8
PPSC Lecturer Computer Science Past Paper 9PPSC Lecturer Computer Science Past Paper 10
PPSC Lecturer Computer Science Past Papers MCQs | PPSC Past Papers Solved MCQ’s

101. The network layer concerns with

a) bits

b) frames

c) packets

d) none of the mentioned

102. Which one of the following is not a function of network layer?

a) routing

b) inter-networking

c) congestion control

d) none of the mentioned

103. The 4 byte IP address consists of

a) network address

b) host address

c) both (a) and (b)

d) none of the mentioned

104. In virtual circuit network each packet contains

a) full source and destination address

b) a short VC number

c) both (a) and (b)

d) none of the mentioned

105. Which one of the following routing algorithm can be used for network layer design?

a) shortest path algorithm

b) distance vector routing

c) link state routing

d) all of the mentioned

106. Two devices are in network if

a) a process in one device is able to exchange information with a process in another

device

b) a process is running on both devices

c) PIDs of the processes running of different devices are same

107. In computer network nodes are

a) the computer that originates the data

b) the computer that routes the data

c) the computer that terminates the data

d) all of the mentioned

108. Communication channel is shared by all the machines on the network in

a) broadcast network

b) unicast network

c) multicast network

109. Bluetooth is an example of

a) personal area network

b) local area network

c) virtual private network

110. A _____ is a device that forwards packets between networks by processing the

routing information included in the packet.

a) bridge

b) firewall

c) router

d) all of the mentioned

111. A list of protocols used by a system, one protocol per layer, is called

a) protocol architecture

b) protocol stack

c) protocol suit

d) none of the mentioned

112. Network congestion occurs

a) in case of traffic overloading

b) when a system terminates

c) when connection between two nodes terminates

d) none of the mentioned

1113. Which one of the following extends a private network across public networks?

a) local area network

b) virtual private network

c) enterprise private network

d) storage area network

114. Which module gives control of the CPU to the process selected by the short-term

scheduler?

a) dispatcher

b) interrupt

c) scheduler

d) none of the mentioned

1115. The processes that are residing in main memory and are ready and waiting to

execute are kept on a list called

a) job queue

b) ready queue

c) execution queue

d) process queue

116. The interval from the time of submission of a process to the time of completion is

termed as

a) waiting time

b) turnaround time

c) response time

d) throughput

117. Which scheduling algorithm allocates the CPU first to the process that requests the

CPU first?

a) first-come, first-served scheduling

b) shortest job scheduling

c) priority scheduling

118. In priority scheduling algorithm

a) CPU is allocated to the process with highest priority

b) CPU is allocated to the process with lowest priority

c) equal priority processes can not be scheduled

d) none of the mentioned

119. In priority scheduling algorithm, when a process arrives at the ready queue, its

priority is compared with the priority of

a) all process

b) currently running process

c) parent process

d) init process

120. Time quantum is defined in

a) shortest job scheduling algorithm

b) round robin scheduling algorithm

c) priority scheduling algorithm

d) multilevel queue scheduling algorithm

121.ASCII and EBCDIC are the popular character coding systems. What does

EBCDIC stand for?

A) Extended Binary Coded Decimal Interchange Code

B) Extended Bit Code Decimal Interchange

C) Extended Bit Case Decimal Interchange

D) Extended Binary Case Decimal Interchange

122.  UNIVAC is Code

A) Universal Automatic Computer

B) Universal Array Computer Code

C) Unique Automatic Computer

D) Unvalued Automatic Computer Code

123.The basic operations performed by a computer are:

A) Arithmetic operation

B) Logical operation

C) Storage and relative

D) All the above

124. The brain of any computer system is

A) ALU

B) Memory

C) CPU

D) Control unit

125. The two major types of computer chips are

A) External memory chip on

B) Primary memory chip

C) Microprocessor chip

D) Both b and c

126. Storage capacity of magnetic disk depends

A) tracks per inch of surface

B) bits per inch of tracks

C) disk pack in disk surface

D) All of above

127. 4. Microprocessors as switching devices are for  which generation computers?

A) First Generation

B) Second Generation

C) Third Generation

D) Fourth Generation

128. The two kinds of main memory are:

A) Primary and secondary

 B) Random and sequential

C) ROM and RAM

D) All of above

129. What is the main difference between a mainframe and a super computer?

A) Super computer is much larger than mainframe computers

B) Super computers are much smaller than mainframe computers

C) Supercomputers are focused to execute few  programs as fast as possible while mainframe  uses its power to execute as many programs concurrently.

D) Supercomputers are focused to execute as  many programs as possible while mainframe boardroom. We call it uses its power to execute few programs as fast as  possible.

130. A storage area used to store data to a  than compensate for the difference in speed at  which the different units can handle data is?

A)Memory

B) Buffer

C) Accumulator

D) Address

131. Computer is free from tiresome and boardroom. We call it

A) Accuracy

B) Reliability

C) Diligence

D) Versatility

132. Integrated Circuits (ICs) are related to (hardcopy) in color, you would want to use

which generation of computers? a/n

A) First generation

B) Second generation

C) Third generation

D) Fourth generation

133. To produce high quality graphics

A) RGB monitor

B) Plotter

C) Ink-jet printer

 D) Laser printer

134.  CD-ROM is a

A) Semiconductor memory

B) Memory register

C) Magnetic memory

D) None of above

135. What are the stages in the compilation process?

A) Feasibility study, system design and testing

B) Implementation and documentation

C) Lexical Analysis, syntax analysis, and code

D) None of the above

136.A hybrid computer

A) Resembles digital computer

B) Resembles analogue computer

C) Resembles both a digital and analogue computer

D) None of the above

137.Which of the following IC was used in third generation of computers?

A) SSI

B) MSI

C) LSI

D) Both a and b

138. Which type of computers uses the 8-bit code called EBCDIC?

A) Minicomputers

B) Microcomputers

C) Mainframe computers

D) Super computer

139. The ALU of a computer responds to the  commands coming from

A) Primary memory

B) Control section

C) External memory

D) Cache memory

140. A dumb terminal has

A) an embedded microprocessor

B) extensive memory

C) independent processing capability

D) a keyboard and screen

141.Chief component of first generation computer was:

A) Transistors

b)Vacuum Tubes and Valves

C) Integrated Circuits

D) None of above

142. One millisecond is

A) 1 second

B) 10th of a seconds

C) 1000th of a seconds

D) 10000th of a seconds Visit

143. 24. The output quality of a printer is measured by could store _____ of data.

A) Dot per sq. inch

B) Dot per inch

C) Dots printed per unit time

D) All of the above

144. A high quality CAD system uses the following for printing drawing and graphs

A) Dot matrix printer

B) Digital plotter

C) Line printer

D) All of the above

145. What was the computer invented by Attanasoff and Clifford?

A) Mark

B) ABC

C) Z3

D) None of above

146.Which of the following is not an input device?

A) OCR

B) Optical scanners

C) Voice recognition device

D) COM (Computer Output to Microfilm)

147.Algorithm and Flow chart help us to

A) Know the memory capacity

B) Identify the base of a number system

C) Direct the output to a printer

D) Specify the problem completely and clearly148.. The network layer concerns with

a) bits

b) frames

c) packets

d) none of the mentioned


149.Which one of the following is not a function of network layer?

a) routing

b) inter-networking

c) congestion control

d) none of the mentioned


150. The 4 byte IP address consists of

a) network address

b) host address

c) both (a) and (b)

d) none of the mentioned

151. In virtual circuit network each packet contains

a) full source and destination address

b) a short VC number

c) both (a) and (b)

d) none of the mentioned

152. Which one of the following routing algorithm can be used for network layer design?

a) shortest path algorithm

b) distance vector routing

c) link state routing

d) all of the mentioned





153. Two devices are in network if

a) a process in one device is able to exchange information with a process in another device

b) a process is running on both devices

c) PIDs of the processes running of different devices are same

d) none of the mentioned

154.. In computer network nodes are

a) the computer that originates the data

b) the computer that routes the data

c) the computer that terminates the data

d) all of the mentioned

155. Communication channel is shared by all the machines on the network in

a) broadcast network

b) unicast network

c) multicast network

d) none of the mentioned


156. Bluetooth is an example of

a) personal area network

b) local area network

c) virtual private network

d) none of the mentioned


157. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.

a) bridge

b) firewall

c) router

d) all of the mentioned



158. A list of protocols used by a system, one protocol per layer, is called

a) protocol architecture

b) protocol stack

c) protocol suit

d) none of the mentioned

159. Network congestion occurs

a) in case of traffic overloading

b) when a system terminates

c) when connection between two nodes terminates

d) none of the mentioned


160. Which one of the following extends a private network across public networks?

a) local area network

b) virtual private network

c) enterprise private network

d) storage area network


161. Which module gives control of the CPU to the process selected by the short-term scheduler?

a) dispatcher

b) interrupt

c) scheduler

d) none of the mentioned


162. The processes that are residing in main memory and are ready and waiting to execute are kept on a list called

a) job queue

b) ready queue

c) execution queue

d) process queue

163. The interval from the time of submission of a process to the time of completion is termed as

a) waiting time

b) turnaround time

c) response time

d) throughput

164. Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?

a) first-come, first-served scheduling


b) shortest job scheduling

c) priority scheduling

d) none of the mentioned


165. In priority scheduling algorithm

a) CPU is allocated to the process with highest priority

b) CPU is allocated to the process with lowest priority

c) equal priority processes can not be scheduled

d) none of the mentioned




166. In priority scheduling algorithm, when a process arrives at the ready queue, its priority is compared with the priority of

a) all process

b) currently running process

c) parent process

d) init process

167. Time quantum is defined in

a) shortest job scheduling algorithm

b) round robin scheduling algorithm

c) priority scheduling algorithm

d) multilevel queue scheduling algorithm


168.. Process are classified into different groups in

a) shortest job scheduling algorithm

b) round robin scheduling algorithm

c) priority scheduling algorithm

d) multilevel queue scheduling algorithm

169. In multilevel feedback scheduling algorithm

a) a process can move to a different classified ready queue

b) classification of ready queue is permanent

c) processes are not classified into groups

d) none of the mentioned




170. Which one of the following can not be scheduled by the kernel?

a) kernel level thread

b) user level thread

c) process

d) none of the mentioned



171. A memory page containing a heavily used variable that was initialized very early and is in constant use is removed, then the page replacement algorithm used is :

a) LRU

b) LFU

c) FIFO

d) None of these


172. Users _______ that their processes are running on a paged system.

a) are aware

b) are unaware

c) None of these



173) The aim of creating page replacement algorithms is to :

a) replace pages faster

b) increase the page fault rate

c) decrease the page fault rate

d) to allocate multiple pages to processes




174. A FIFO replacement algorithm associates with each page the _______

a) time it was brought into memory

b) size of the page in memory

c) page after and before it

d) All of these



175.Optimal page – replacement algorithm is :

a) Replace the page that has not been used for a long time

b) Replace the page that has been used for a long time

c) Replace the page that will not be used for a long time

d) None of these


176.) Optimal page – replacement algorithm is difficult to implement, because :

a) it requires a lot of information

b) it requires future knowledge of the reference string

c) it is too complex

d) it is extremely expensive


177) LRU page – replacement algorithm associates with each page the ______

a) time it was brought into memory

b) the time of that page’s last use

c) page after and before it

d) All of these

178. For 3 page frames, the following is the reference string :

7 0 1 2 0 3 0 4 2 3 0 3 2 1 2 0 1 7 0 1

i) How many page faults does the LRU page replacement algorithm produce ?

a) 10

b) 15

c) 11

d) 12

179. Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code).

a) 100-200

b) 200-400

c) 400-1000

d) above 1000

180. RAD stands for

a) Relative Application Development

b) Rapid Application Development

c) Rapid Application Document


181. Which one of the following models is not suitable for accommodating any change?

a) Build & Fix Model

b) Prototyping Model

c) RAD Model

d) Waterfall Model

182. Which one of the following is not a phase of Prototyping Model?

a) Quick Design

b) Coding

c) Prototype Refinement

d) Engineer Product

183. RAD Model has

a) 2 phases

b) 3 phase

c) 5 phases

d) 6 phases

184. What is the major drawback of using RAD Model?

a) Highly specialized & skilled developers/designers are required.

b) Increases re-usability of components.

c) Encourages customer/client feedback.

d) Both a & c.

185. SDLC stands for

a) Software Development Life Cycle

b) System Development Life cycle

c) Software Design Life Cycle

d) System Design Life Cycle


186. Which model can be selected if user is involved in all the phases of SDLC?

a) Waterfall Model

b) Prototyping Model

c) RAD Model

d) both b & c

This set of Database Questions & Answers focuses on “Relational Database and Database Schema”



187. A relational database consists of a collection of

a) Tables

b) Fields

c) Records

d) Keys



188. A ________ in a table represents a relationship among a set of values.

a) Column

b) Key

c) Row

d) Entry

189. The term _______ is used to refer to a row.

a) Attribute

b) Tuple

c) Field

d) Instance


190. The term attribute refers to a ___________ of a table.

a) Record

b) Column

c) Tuple

d) Key

191. For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.

a) Domain


b) Relation

c) Set

d) Schema


192. Which forms has a relation that possesses data about an individual entity:

a) 2NF

b) 3NF

c) 4NF

d) 5NF


193. Which forms are based on the concept of functional dependency:

a) 1NF

b) 2NF

c) 3NF

d) 4NF

 The table is in 3NF if every non-prime attribute of R is non-transitively dependent (i.e. directly dependent) on every superkey of R.

194. _____________ can help us detect poor E-R design.

a) Database Design Process

b) E-R Design Process

c) Relational scheme

d) Functional dependencies



195. Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set.

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) Both a and b



196. In which of the following , a separate schema is created consisting of that attribute and the primary key of the entity set.

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) Both a and b

197. What is the best way to represent the attributes in a large database?

a) Relational-and

b) Concatenation

c) Dot representation

d) All of the above

198. Designers use which of the following to tune performance of systems to support time-critical operations?

a) Denormalization

b) Redundant optimization

c) Optimization

d) Realization

199. The lexical analyzer takes_________as input and produces a stream of_______as output.

a) Source program, tokens

b) Token, source program

c) Either of the two

d) None of the mentioned

200.Parsing is also known as

a) Lexical Analysis

b) Syntax Analysis

c) Semantic Analysis

d) Code Generation