0% found this document useful (0 votes)
344 views13 pages

PPSC Lecturer of Computer Science Old Paper

This document provides information to help prepare for the PPSC test, including past papers for PPSC Lecturer positions. It covers topics like computer science, Islamiat, English, Urdu, commerce, journalism, history, Punjabi, Persian, economics, chemistry, botany, zoology, physics, philosophy, Pakistan studies, sociology, and geography. It also includes general knowledge questions about Islam, prophets, the Quran, prayers, charity, fasting, pilgrimage, battles, companions, and Islamic terms and places. Sample multiple choice questions are provided from past PPSC Lecturer exams in computer science.

Uploaded by

zeeshan tahir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
344 views13 pages

PPSC Lecturer of Computer Science Old Paper

This document provides information to help prepare for the PPSC test, including past papers for PPSC Lecturer positions. It covers topics like computer science, Islamiat, English, Urdu, commerce, journalism, history, Punjabi, Persian, economics, chemistry, botany, zoology, physics, philosophy, Pakistan studies, sociology, and geography. It also includes general knowledge questions about Islam, prophets, the Quran, prayers, charity, fasting, pilgrimage, battles, companions, and Islamic terms and places. Sample multiple choice questions are provided from past PPSC Lecturer exams in computer science.

Uploaded by

zeeshan tahir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Home

Contact Us
Privacy Policy
Site Map
About Us

Jobs Papers Select Language ​▼


PPSC Past Papers, ISSB Test Notes
PPSC Test Preparation Notes.

HOME
PPSC
PAST PAPERS
JOBS
ISSB TEST
FPSC
FIA
ARMY
O LEVEL

GENERAL KNOWLEDGE WORLD GENERAL KNOWLEDGE


WHO IS WHO PPSC TEST NOTES
PAK STUDIES

PPSC Lecturer Past PPSC Lecturer of Computer Science Past Who is Who and What is What
Papers Paper Questions
1. MOUNTAINS
1. PPSC Lecturer of Islamiat (1) AX register is also known as: 2. IMPORTANT MOUNTAIN PASSES
Past Paper (a) Accumulator 3. OCEANS
2. PPSC Lecturer of English 4. FAMOUS SEA PORTS
Past Paper (b) Collector 5. FAMOUS STRAITS
6. WORLD RIVERS
3. PPSC Lecturer of Urdu Past
(c) Distributor 7. FAMOUS ISLANDS
Paper
8. FAMOUS DESERTS
4. PPSC Lecturer of
(d) Counter 9. CITIES ON RIVER BANKS
Commerce Past Paper
10. GEOGRAPHICAL DISCOVERIES
5. PPSC Lecturer of Computer
(e) None of these 11. WORLD COUNTRIES
Science Past Paper
12. GENERAL KNOWLEDGE ABOUT
6. PPSC Lecturer of (2) In the Base + Offset addressing, Offset address is also known as: WORLD
Journalism Past Paper 13. IMPORTANT PHYSICAL
7. PPSC Lecturer of History (a) Physical Address PROPERTIES
Past Paper 14. Ten LARGEST COUNTRIES BY
8. PPSC Lecturer of Punjabi (b) Logical Address AREA
Past Paper 15. IMPORTANT ABBREVIATIONS
9. PPSC Lecturer of Persian (c) Actual Address 16. IMPORTANT UNITS OF
Past Paper MEASUREMENT
(d) Instruction Address 17. IMPORTANT INFORMATION
10. PPSC Lecturer of
ABOUT RAYS AND WAVES
Economics Past Paper
(e) None of these 18. IMPORTANT INFORMATION
11. PPSC Lecturer of
ABOUT UNIVERSE
Chemistry Past Paper
(3) The technique for allowing a unit to check the status of another 19. NOBLE PRIZE
12. PPSC Lecturer of Botany 20. NATIONAL EMBLEM
independently function unit is known as?
Past Paper 21. FAMOUS EPITHETS
13. PPSC Lecturer of zoology (a) Interrupt 22. IMPORTANT GEOGRAPHICAL
Past Paper LINES OF WORLD
14. PPSC Lecturer of Physics (b) System call About Islam
Past Paper 23. Hazrat Muhammad PBUH
15. PPSC Lecturer of (c) Polling 24. General Knowledge About Hazrat
Philosophy Past Paper Muhammad PBUH Life
16. PPSC Lecturer of Pakistan (d) Trape 25. Wifies of Hazrat Muhammad PBUH
Studies Past Paper 26. Important Islamic History Events
(e) None of these 27. Important points of The Holy Quran
17. PPSC Lecturer of sociology
28. Al-Quran MCQs
Past Paper
(4) The method for storing data temporarily such that the input-output 29. About SAHABA KARAM
18. PPSC Lecturer of
of the same job is overlapped with its own processing, is known as: 30. Namaz
Geography Past Paper
31. Zakat
Important Gernal (a) Spooling 32. Fasting (Roza)
Knowledge Questions 33. Imortant Article of Faith and
(b) Contention Fundamental of ISLAM
1. ABOUT ISLAM 34. Important Islamic terms and Places
2. ABOUT PROPHETS OF (c) I/O wait 35. Islamic Months of Years
ISLAM 36. General Knowledge-Heavenly Books
3. ABOUT PROPHET (d) Buffering 37. Important Angles
MUHAMMAD 38. Ashra-e-Mubrashra
4. ABOUT QURAN (e) None of these 39. Reign Of 4 Caliphates(Khulafa

5. ABOUT NAMAZ Rashideen)


(5) The DMA that uses Busses when CPU is not using them is termed as: 40. Famous Islamic Generals
6. ABOUT ZAKAT
41. Famous Islamic Battles
7. ABOUT FASTING
(a) Shared DMA 42. Important Personalities and Their
8. ABOUT HAJJ Titles in Islam
9. ABOUT ISLAMIC (b) Cycle Stealing 43. Famous Muslim Scientists
BATTLES 44. Important Questions about Islamic
10. ABOUT COMPANIONS (c) Channel Studies

PPSC Test Preparation (d) Transparent DMA PPSC GENERAL


Notes KNOWLEDGE
(e) None of these 45. PPSC PAST Papers General
Knowledge Questions
(6) _________ Scheduler deals with the decision as to whether to
admit another new job to the system.
About World
(a) High Level
46. World Records
(b) Medium Level 47. World Records (Guniees Book)
48. 7 Wonders of the World
(c) Low Level 49. Inventions and Inventors
50. Important Facts of Worlds
(d) Short term 51. Important Places Of World
52. Important Awards Of World
(e) None of these 53. Top 10 Languages of World
54. Highest Military Awards of World
7) When the process is in the states of Blocked Suspended or Ready 55. Important Geographical Lines of
Suspended, its relevant data is World
56. World Imortant National Days
stored in: 57. Importnat Religions of World
58. Important Political terms and
(a) Main Memory concepts
59. Important News Agency of the
(b) Hard Disk World
60. About UNO
(c) Magnetic Tape 61. Organs of UNO
62. Important Specialized agency of the
(d) Buffer UNO
63. World Country with Capitals &
(e) None of these Currency
64. Famous Name of Places(Country)
(8) Priority, P = (Time Waiting + Run Time) / Run Time is used to
calculate priority in __________ scheduling algorithm: About Pakistan
65. Basic Information About Pakistan
(a) Shortest Job First 66. Districts of Pakistan
67. RIVERS OF PAKISTAN
(b) Priority Scheduling 68. The Largest in Pakistan
69. The Longest and Tallest in Pakistan
(c) Longest Wait First 70. Mountain Passes in Pakistan
71. Chairman Senate and seats
(d) Highest Response Ratio Next Distibutions of Pakistan
72. Chief Justices of Pakistan
(e) None of these 73. Pakistan Affairs
74. Who is First in PAKISTAN
(9) HDLC Protocol stands for: 75. PAKISTAN GOVERNOR
GENERALS
(a) High-Level Data Link Control 76. PAKISTAN Presidents
77. PAKISTAN Prime Ministers
(b) High Level Development Protocol 78. Attorney Generals of Pakistan
79. State Bank Governors of pakista
(c) Huge Level Data Link Control 80. Army Chiefs of PAKISTAN
81. Federal Cabinet of PAKISTAN
(d) High Development Level Control 82. Location of important Metalic and
Non Metalic Minerals
(e) None of these 83. Constitutional Amedments Since
1973
(10) _________ is the generic name for a set of standards issued by the 84. Army,PAF and Navy Officer Ranks
International CommunicationsStandards Body CCITT, designed to About Science
support Message Handling Systems; i.e. Electronic Mail. 85. Basic Geometry Math Defination
86. Important Units of Measurments
(a) TCP/IP 87. Basic Scientific Questions

(b) ISDN

(c) X.400

(d) X.25

(e) None of these

(11) ________ layer is responsible for the transfer of a packet of data


along one link in the network. It organizes data into frames and detects
errors in transmission.

(a) Physical Layer

(b) Data Link Layer

(c) Network Layer

(d) Transport Layer

(e) None of these

(12) Encryption is the conversion of data in some intelligible format into


an unintelligible format called _________ to prevent the data from
being understood if read by an unauthorized party.

(a) Clear Text

(b) Encrypted Text

(c) Cipher Text

(d) Coded Text

(e) None of these

(13) Binary search requires about ______ comparisons with an initial


list of 1,000,000 elements.

(a) 10

(b) 20

(c) 35

(d) 100

(e) None of these


(14) A _________ header list is a header list where the last node
contains the null pointer.

(a) Grounded

(b) Circular

(c) One way

(d) Rooted

(e) None of these

(15) ________ are small applications that are accessed on an internet


server, transported over the internet, automatically installed and run as
part of a web document.

(a) Applets

(b) Java Bean

(c) Sockets

(d) Java Component

(e) None of these

(16) AWT stands for:

(a) Abstract Window Technique

(b) Abstract Window Toolkit

(c) Actual Window Technique

(d) Added Window Toolkit

(e) None of these

17) GIF images can have only upto _______ colors.

(a) 128

(b) 256

(c) 512

(d) 1024

(e) None of these

(18) ________ is stored on a client and contains state information of


the website visited.

(a) Cookies

(b) Servelet

(c) History

(d) Resident Page


(e) None of these

(19) In software Engineering KPA denotes.

(a) Key Process Audit

(b) Key Process Area

(c) Key Process Analysis

(d) Key Problem Area

(e) None of these

(20) The ________ Process Model defines a series of events that will
trigger transitions from state to state for each of software engineering
activities.

(a) Spiral

(b) Operational

(c) RAD

(d) Concurrent Development

(e) None of these

21. Which of the following best describes “virtual memory?”

(a)A portion of the hard disk considered as RAM

(b)Extended memory on the secondary storage thatis used whenever


physical memory is full

(c)The abstraction of separating logical memory–memory as seen by the


process–from physical

memory–memory as seen by the processor

(d)It is the page file in Windows folder (e)None of these

22. The ‘cmp’ instruction modifies the:

(a)Instruction register (b)Flags register (c)Segment register (d)None of


these

23. Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1,


2, 3, 7, 6, 3, 2, 1 Assuming there

are 4 page frames available and that all frames are initially empty, what
is the total number of page

faults that would occur for the page reference string above if the least-
recently-used (LRU) replacement

policy is used?

(a)6 (b)9 (c)10 (d)11 (e)None of these

24. The Banker’s algorithm is used to ____________.


(a)Rectify deadlock (b)Detect deadlock (c)Prevent deadlock

(d)Avoid deadlock (e)None of these

25. The necessary conditions needed before deadlock can occur are
______.

(a) No Mutual Exclusion, Hold and wait, Preemption, Circular Wait

(b) Mutual Exclusion, No Hold and wait, Preemption, Circular Wait

(c) Mutual Exclusion, Hold and wait, No Preemption, Circular Wait

(d) Mutual Exclusion, Hold and wait, Preemption, No Circular Wait


(e)None of these

26. Difference between data link layer and transport layer error detection
is that:

(a)Data link detects transmission errors while transport layer detects


segmentation faults

(b)Data link detects node‐to‐node errors while transport layer detects


end‐to‐end errors

(c)Data link detects end‐to‐end errors while transport layer detects node‐
to‐node errors

(d)Data link detects segmentation errors while transport layer detects bit
error (e)None of these

27. Phase shift keying (PSK.) method is used to modulate digital signals
at 9600 bps using 16 levels. The

line signals speed (i.e. modulation rate) will be:

(a) 1200 bands (b) 2400 bands (c) 4800 bands (d) 9600 bands (e)None
of these

28. Exception handling is a powerful technique that separates error-


handling code from ______ code.

(a)Buggy (b)Faulty (c)Normal (d)Exceptional (e)None of these

29. When a subroutine is called, the address of the instruction following


the CALL instructions stored in/on

the:

(a)Stack pointer (b)Accumulator (c)Program counter (d)Stack (e)None of


these

30. Binary tree “preorder” traversal isdefined recursively as follows:

(a)Traverse left subtree, visit th

e root, traverse right subtree

(b)Traverse right subtree, visit the root, traverse left subtree

(c)Visit the root, traverse leftsubtree, traverse right subtree


(d)Traverse left subtree, traverse right subtree , visit the root (e)None of
these

31. The advantages of creating a prototype are:

(a) It allows developers to experiment with number of different design


options

(b) It can serve as means of communication between developers and


customers

(c) It is better than water fall model (d) Both (a) and (b) (e)None of these

32. Choose the correct statement.

(a) Testing can show the presence of bugs but never their absence

(b) Testing can always find all the bugs

(c) Testing can always be exhaustive

(d) If we test enough then we can find all of the bugs (e)None of these

33. Which of the following operations need the participating relations to


be union compatible?

(a) UNION (b)INTERSECTION (c)DIFFERENCE (d)All of these (e)None


of these

34. The language used in application programs to requestdata from the


DBMS isreferred to as the:

(a)DML (b)DDL (c)VDL (d)SDL (e)None of these

35. What is the correct XHTML for a paragraph?

(a)

(b)

(c) (d)

(e)None of these

36. Which of the following HTML form method is suitable when you
need to send larger form

submissions?

(a) Get (b) Post (c) Both Get and Post (d) Ajax (e)None of these

37. (2,4) is a point on a circle that has center at the origin. Which of the
following points are also on circle?

(a) (2,-4) (b) (-2,4) (c) (4,-2) (d) All of above (e)None of these

38. In Bresenham’s algorithm, while generating a circle , it is easy to


generate?

(a) One octant first and other by successive reflection

(b) One octant first and other by successive rotation


(c) One octant first and other by successive translation

(d) All octants (e)None of these

(39) Object (also called ____) is a common data type that includes
photograph, audio, video, or a

document created in other applications.

(a) Number (b) BLOB (c) Integer (d) Binary (e) None of these

(40) In a database, a(n) ____ is a group of related fields.

(a) Table (b) Key (c) Record (d) Primary Field (e) None of these

(41) In a database, a(n) ____ field is a field that uniquely identifies each
record in a file.

(a) Main (b) Identifying (c) Master (d) Key (e) None of these

(42) If the lowest annual fee at a discount warehouse is Rs.2025 and the
highest is Rs. 5550, a(n) ____

on the Annual Fee field ensures it is a value between Rs. 2025 and Rs.
5550.

(a) Range Check (b) Completeness Check (c) consistency check

(d) alphabetic/numeric check (e) None of these

(43) A DBMS uses the ____ to perform validation checks.

(a) Data Server (b) data mart (c) data warehouse (d) data dictionary

(e) None of these

(44) _______ is a network technology that defines how messages are


routed from one end of a

network to the other, ensuring the data arrives correctly by dividing it


into packets.

(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) None of these

(45) When a computer sends data over the Internet, the data is divided
into small pieces, or ____.

(a) Bundles (b) Packets (c) Slices (d) Baskets (e) None of these

47) The amount of data, instructions, and information that can travel
over a communications channel

sometimes is called the ____.

(a) Broadband (b) Baseband (c) Latency (d) Bandwidth (e) None of these

(48) Fiber-optic cables have all of the following advantages over cables
that use wire except____.

(a) lower costs and easier installation and modification


(b) faster data transmission and smaller size

(c) less susceptible to noise from other devices

(d) better security for signals during transmission

(e) None of these

(49) A _________ is a network that connects computers and devices in


a limited geographical area,

such as a home, school computer laboratory, or office building.

(a) local area network (LAN) (b) metropolitan area network (MAN)

(c) wide area network (WAN) (d) variable area network (VAN) (e) None
of these

(50) With ____ memory, the operating system allocates a portion of a


storage medium, usually the

hard disk, to function as additional RAM.

(a) Virtual (b) Performance (c) Device (d) Managed (e) None of these

Computer Science Mcqs for Lecturer and Subject


Specialist PSC Exam

1. Our PC belongs to 4th generation


2. Bit means Binary Digit
3. 1 byte = 8 bits
4. Intel means Integrated Electronics
5. 1 worksheet contains 256 columns
6. G.W.Basic G.W stands for Gate Way
7. Super Computer was created by J.H.Van Tassel
8. CORBA is Common Object Request Broker Architecture
9. URL is Uniform or Universal Resource Locator
10. Intel invented RAM chip
11. 1 mega byte = 1048576 bytes
12. 1 kilo byte = 1024 bytes
13. A combination of 16 bits are called word.
14. A terabyte = 1 trillion bytes
15. Fred Cohen coined the word computer virus
16. First computer virus was created in 1970 at Bell laboratories
17. WORM means Write Once Read Many
18. Power of a super computer is measured in FLOPS (Floating Point
Operations per Second)
19. WWW/http: (hypertext transfer protocol) was created by Tim
Burner Lee in 1992
20. Information stored on disk as series of bumps on its shiny side.
21. DVDs hold more information than CDs. They use smaller bumps
and have two reflective layers
22. Recordable CDs do not have bumps. There are patches of color on
disk to change the reflected laser light
23. In 1951 Univac – 1, the world’s first commercial computer was
designed by John Mauchly and J. Presper Eckert. They built
ENIAC, the first electronic computer in 1946
24. In 1968 mainframe was built.
25. In 1976 first supercomputer the Cray-1 was developed
26. In 1981 IBM produce the IBM PC.
27. In 1998 IBM made quantum computer
28. Super computers uses parallel processing
29. In 1974, computer games were introduced.
30. PROM is the abbreviation of programmable read only memory
31.
32. What was the world’s first high level programming language 1957:
IBM FORTRAN
33. A JPEG is a picture file format – what does JPEG stand for: Joint
Photographic Experts Group
34. During World War II, IBM built the computers the Nazis used to
manage their death/concentration camps
35. Registers are temporary storage areas within the CPU.
36. First apple computer was built in garage.
37. The language of small talk is object oriented.
38. Shell is an operating environment.
39. Virtual memory is also known as virtual page.
40. NOS refer to operating systems for a network.
41. In EBCDIC each character is denoted by 8 bits.
42. Diodes are used in analog computer circuits as limiter.
43. Wetware stands for any organic intelligence.
44. GIGO stands for garbage in garbage out.
45. Application of flip-flap are counters, shift register and transfer
register.
46. Bootstrap is associated with computer.
47. FORTRAN stands for formula translator.
48. A group of character that is termed as a single entity is called
word.
49. Clip art is a computer prepared art.
50. Mark sensing is another term for OMR.
51. Authorization to make multiple software copies is called site
licensing.
52. Antivirus is also known as vaccines.
53. Free software is also known as public domain software.
54. In computer DFD stands for Data Flow Diagram.
55. Cyber Space is called to Virtual world of the computer.
56. What does the sun in SUN Microsystems stand for Stanford
University Network
57. What does Intel stand for- Integrated Electronics
58. All PCs have a BIOS what does bios stand for-Basic Input Output
System
59. What is the common name for an integrated circuit A Chip
60. In WWW terms what does i.e. mean on a domain name-Ireland
61. What company introduced the first commercial minicomputer 65
DEC
62. Name the first web browser publicly available NCSA Mosaic
63. The world’s most powerful super computer is called ASCI white.
64. World Wide Web was invented in 1993 by Tim Bareness Lee.
65. The B-programming language was developed by Ken Thompson.
66. The 1st commercially produced and sold computer (1951) was
UNIVAC.
67. The transformation from heavy computers to PCs was made
possible using microprocessors.
68. The first microprocessor was developed in 1971 by Intel.
69. A pentium 4 (P-4) employs roughly 40 million transistors.
70. Mark-1, Apple-1, and collossus were initial desktop computers.
71. Binary digits are briefed as bit.
72. A collection of bits is called byte.
73. The first home computer (1977), which was sold in millions of
units was Apple II.
74. ‘PARAM’ is a supercomputer.
75. Father of the Computer.. Charles Babbage
76. What does CMOS stand for in a computer- Complementary metal
Oxide semi-conductor
Computer Science Mcqs For Public Service
Commission Exams

1. Which of the following best describes “virtual memory”?

a. A portion of the hard disk considered as RAM.


b. Extended memory on the secondary storage that is used whenever
physical memory is full .
c. The abstraction of separating logical memory – memory as seen by the
process – from physical memory – memory as seen ny the processor.
d. It is the page file in Windows folder.
e. None of these.

2. The ‘cmp’ instruction modifies the:

a. Instruction register.
b. Flags register.
c. Segment register.
d. None of these.

3. Consider the following page reference string:


1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,. Assuming there are 4 page framess
available and that all frames are initially empty, what is the total number
of page faults that would occur for the page reference string above if the
least-recently-used (LRU) replacement policy is used?

a. 6
b. 9
c. 10
d. 11
e. None of these

4. The Banker’s algorithm is used to _________

a. Rectify deadlock
b. Detect deadlock
c. Prevent deadlock
d. Avoid deadlock
e. None of these

5. The necessary conditions needed before deadlock can occur are


________.

a. No Mutual Exclusion, Hold and wait, Preemption, Circular Wait.


b. Mutual Exclusion, No Hold and wait, Preemption, Circular Wait.
c. Mutual Exclusion, Hold and wait, No Preemption, Circular Wait.
d. Mutual Exclusion, Hold and wait, Preemption, No Circular Wait.

6. Differences between data lick layer and transport layer error detection
is that:

a. Data link detects transmission errors while transport layer detects


segmentation faults.
b. Data link detects node-to-node errors while transport layer detects
end-to-end errors.
c. Data link detects end-to-end errors while transport layer detects node-
to-node errors
d. Data link detects segmentation errors while transport layer detects bit
error.
e. None of theses

7. Phase Shift Keying (PSK) method is used to modulate digital signals at


9600bps using 16 levels. The line signals speed (i.e. modulation rate) will
be:
a. 1200 bands
b. 2400 bands
c. 4800 bands
d. 9600 bands
e. None of these

8. Exception handling is a powerful tenchnique that separates error-


handling code from ______ code

a. Buggy
b. Faulty
c. Normal
d. Exceptional
e. None of these

9. When a subroutine is called, the address of the instruction following


the CALL instructions stored in/on the:

a. Stack pointer
b. Accumulator
c. Programs counter
d. Stack
e. None of these

10. Binary tree “preorder” traversal is defined recursively as follows:

a. Traverse left subtree, visit the root, traverse right subtree


b. Traverse right subtree, visit the root, traverse left subtree
c. Visit the root, traverse left subtree, traverse right subtree
d. traverse left subtree, traverse right subtree, visit the root
e. None of these

11. What value will return to the operating system upon the successful
completion of a program?

a. -1
b. 1
c. 0
d. None of these

12. Which of the following is TRUE about given UML diagram?

a. Checking Accound is a generalization of Saving Account


b. Bank Account is composition of Checking Account and Saving Account
c. Saving Account can process Check
d. Checking Account has a balance?
e. None of theses

13. The advantages of creating a prototype are:

a. It allows developers to experiment with number of different design


options.
b. It can serve as means of communication between developers and
customers.
c. It is better than water fall model
d. Both a and b
e. None of these

14. Choose the correct statement:

a. Testing can show the presence of bugs but never their absence
b. Testing can always find all the bugs
c. Testing can always be exhaustive
d. If we test enough then we can find all of the bugs
e. None of these
15. Which of the following operations need the participating relations to
be union compatible?

a. UNION
b. INTERSECTION
c. DIFFERENCE
d. All of these
e. None of these

16. The language used in application programs to request data from the
DBMA is reffered to as the:

a. DML
b. DDL
c. VDL
d. SDL
e. None of these

17. What is the correct XHTML for a paragraph?

a. <P></p>
b. <P></P>
c. <p></p>
d. </p><p>
e. None of these

18. Which of the follwoing HTML form method is suitable when you
need to send larger form submission?

a. Get
b. Post
c. Both Get and Post
d. Ajax
e. None of these

19. (2,4) is a point on a circle that has senter at the origion. Which of the
follwoing points are also on circle?

a. (2,-4)
b. (-2,4)
c. (4,-2)
d. All of the above
e. None of these

20. In Bresenham’s algorithm, while generating a circle, it is easy to


generate?

a. One octant first and other by successive reflection


b. One octant first and other by successive rotation
c. One octant first and other by successive translation
d. All octants
e. None of these.

TEST PREPARATION MATERIAL

You might also like