У нас вы можете посмотреть бесплатно CSS Past Paper 2024 MCQs Computer Science Paper-II | Answers for CSS Aspirants | FPSC или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
1. Which of the following are computer architectures different from conventional von Neumann architecture? (A) MIT architecture (B) Harvard architecture (C) Turing architecture Network traffic estimation is not impossible (contradicting option A). It is not easily computable via simple linear equations (option B) as it often requires more complex models. While AI techniques can be used, they are not the only solution (contradicting option C), as traditional statistical and time-series models can also estimate traffic. Thus, none of the provided options fully capture the reality, making option D the most accurate choice. 2. A computer is in System mode when: (A) CPU is executing a program which is part of the operating system (B) The process execution is halted to listen to device inputs (C) The system is switching between processes 3. Making a system store data in memory contiguously would: (A) Results in lesser computation while searching for data (B) Results in more computation while searching data (C) Makes storing data very easy as one doesn’t have to search for available memory to store 4. Network traffic estimation is: (A) Impossible (B) Easily computable via linear equations (C) Can only be solved using AI techniques Option (D) None of these is correct because network traffic estimation is possible, not easily solved by linear equations, and doesn't require only AI techniques. 5. The time complexity of finding a shortest path in a network is: (A) Fairly low with Dijkstra’s algorithm (B) Very efficient with A* search given spatial heuristics (C) Better than the above two using some randomization mechanism in large networks 6. Which of the following is the most efficient encoding to send data via networks? Also consider the reasoning in your answer. (A) 3-Excess codes because it is not weighted (B) Binary, because its representation can be done simply with zeros and ones (C) Decimal, because a decimal requires lesser space to represent the same number 7. Which is better, Time slicing or time sharing? (A) Time slicing is better because it deals with process allocation at the CPU level (B) Time sharing is better because it gives multiple users the illusion of each having his own processor (C) The comparison is not possible because one is part of the other 8. Which type of algorithms are applicable to scheduling resources in operating systems? (A) State space search (B) Machine learning (C) Bayesian learning (D) None of these 9. Which of the following are/is true? (A) In the era of platform independence all Operating systems can be made without considering low level details of machines (B) Operating systems can be made without using assembly languages (C) Operating systems aren’t needed because everything can run on the internet (D) None of these 10. In the RISC architecture, the _____ is updated whenever a function is called: (A) Frame pointer and Return address registger (B) Stack pointer (C) Both (A) & (B) (D) None of these 11. A child entity in ER diagrams is: (A) The entity on the one side of a one to many relationship (B) Entity that inherits attributes and relations from another entity (C) A row of a table (D) None of these 12. Boyce Codd Normal Form: (A) Addresses certain type of multivalued dependencies (B) Makes sure that data in each column is atomic (C) Makes sure that every determinant is a candidate key (D) None of these 13. DDL is used to: (A) Represent the database structure (B) Define and manage the structure of a database (C) Deals with manipulation of data stored in the database (D) None of these 14. Dynamic range in image processing is: (A) Refers to span of wavelengths covered by a particular band in a multispectral image (B) Maximum or minimum values present in an image (C) Range of values spanned by grey scale (D) None of these 15. Which of the following is true? (A) Brightness gives a measure of degree to which a pure color is diluted by white light (B) Saturation gives a measure of degree to which a pure color is diluted by white light (C) Hue gives a measure of degree to which a pure color is diluted by white light (D) None of these 16. SIFT is: (A) An image deblurring algorithm (B) Basic edge detection algorithm (C) Used to identify and define local features (D) None of these 17. Optical character recognition: (A) Cannot be done without non deterministic algorithms (B) Can be done without non deterministic algorithms (C) Can be done more efficiently and robustly with deterministic algorithms (D) None of these 18. Which of the following statement/s are true about PHP? (A) Echo and print are same (B) Echo takes a single parameter (C) Both (A) & (B) (D) None of these 19. Which of the following are true about the Weiner filter? (A) It is a deterministic algorithm (B) It minimizes the quadratic error (C) It uses the binary cross entropy (D) None of these 20. Php allows dynamic code execution using: (A) Eval() (B) Reflection API (C) File Manipulation (D) None of these