1
Find All CSS Past Papers Mcqs below form 2000 to 2015 we collecting all data from different forums groups and social website all CSS Computer Science Past Paper will be available here. 


CSS Past Paper 2000


CSS Past Paper 2000


(B) Please choose the most appropriate answer from the given set of answers to fill the blanks.

11. During the program execution, temporary/intermediate values are stored in _____________.
a. Registers
b. Peripherals
c. LAN
d. None of these

12. The objects can be inherited by _____________.
a. A single object only
b. Multiple objects
c. Both (a) and (b)
d. Either (a) or (a)

13. The operating system may perform _____________ operation to manage the memory while running a large program.
a. Sorting
b. Scheduling
c. Paging
d. None of these

14. When the LAN is arranged in such a way that each computer is connected directly to the HUB the configuration can be termed as _____________ network.
a. Bus
b. Star
c. Ring
d. None of these

15. To communicate with other computers over a telephone line the computer must have _____________ installed.
a. Telephone set
b. Modem
c. LAN Card
d. None of these

16. When each item of data in a database is directly linked with every other item of data, the database is called _____________.
a. Relational
b. Hierarchical
c. Network
d. None of these

17. _____________ is the most efficient method to reduce the duplication of data.
a. Duplication
c. Normalisation
c. Empty fields
d. None of these

18. The _____________ operation changes the coordinate values of objects being displayed.
a. Transformation
b. Windowing
c. Both (a) and (b)
d. None of these

19. A linear sequential software development model is also referred to as ____________ .
a. Prototype Model
b. RAD Model
c. Spiral Model
d. None of these

20. State Transition Diagram gives information of ___________.
a. Data Flow
b. Entry Relationship
c. Control Flow
d. None of these

CSS Past Paper 2002


8. (A) Write only True or False in the Answer Book. Do not reproduce the questions.

(1) The terms “type cast” and “type conversion” have different semantics i.e. they have different effects on the program execution.TRUE

(2) Alignment restrictions of modern RISC-architectures forces compilers to occasionally introduce “holes” and “padding” for record structures to ensure efficient access of record elements.

(3) In a language with garbage collection, the programmer need not worry about heap memory management.True

(4) In order to execute a program by interpretive execution, the interpreter needs to execute on the system on which the program is to be run.

(5) A GUI is a Graphical Utility Interface. False

(6) The study of algorithms began in the 1900s when electronic computers began to be used.

(7) A bus is a part of the computer that decides if a value should be stored as an integer or floating point.False
(8) Peripheral devices handle the coordination of a computer’s activities. True
(9) Get method in HTML forms is used for debugging.False
(10) “Pine” is an example of e-mail utility. TRue

(B) Please choose the most appropriate answer from the given set of answers.

(11) State Transition Diagram gives information of 
(a) Prototype Model
(b) RAD Model
(c) Spiral Model
(d) None of these

(12) The concept of meaning represented by an algorithm is known as its:
(a) Control Structure
(b) Sequence
(c) Semantics
(d) Syntax

(13) Each cell of memory is numbered and that number is referred to as the cell’s
(a) Block
(b) Identity 
(c) Address
(d) Size

(14) Main memory is called RAM because
(a) It is volatile, like a ram’s temper.
(b) The computer starts at address 0 and reads every byte until it reaches the correct address.
(c) It can Read all memory
(d) The memory is accessible randomly

(15) To use internet, the computer must have
(a) Telephone
(b) Modem
(c) ISP Connection 
(d) All of the above

CSS Past Paper 2003


8--(A) Write only True or False in the Answer Book. Do not reproduce the question. (1x10)

(1) A feature of an operating system that allows more than one program to run simultaneously is called Multitasking. Flase
(2) A trackball operates like a joystick on its back. It is extremely useful when there isn't enough space to use a mouse,False
(3) Digitizing Tablet is a'special Input device that is mainly used to digitize vector-oriented design or pictures. True not completely sure

(4) Dedicated line is a high speed cable line that is not permanently wired into the internet.
(5) A Router is a network device that helps LANs and WANs achieve interoperability and connectivity and thai can link LANs that have different netwoik topdldgies, such as Ethernet and Token Ring. true
(6) Internet Protocol is a routable protocol in the backbone that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets. True
(7) Telnet is an Internet connection that enables a user to terminate an active connection with a computer at a retoete site.
(8) ESD stands for Electronic Static Distance.False
(9) IRQ is Interrupt Request. TRue
(10) Copyright computer programs made available on trial basis are called shareware. True

(B) Please choose^he most appropriate answer from the given set of answers. . (.1x5)

(11) What is the long form of 'CMOS'?
(a) Complimentary Metal Oxide Semiconductor
(b) Complex Metal Oxide Semiconductor
(c) Controller Metal Oxide Semiconductor
(d) Complimentary Metal Oxide Sets.

(12) What is a Y-Connector? '
(a) A'Y-Shaped splitter cable that divides a source input into two output signals.
(b) A Y-Shaped splitter connector that divides a source input into two output signals.
(c) A Y-Shaped splitter card that divides'a source input into two output signals.
(d) None of the above.

(13) What do you mean by IBM-Compatible'?
(a) A computer that has a processor that is compatible vvith the original IBM PC.
(b) A computer that has a processor that is similar to original IBM PC
(c) A computer that has a casing that is similar original IBM PC.
(d) None of the above

(14) What do you mean by "virtual? Select'all that apply:
(a) In general, it distinguishes something that is merely conceptual from something that has physical reality,
(b) Real
(c) Not real. 
(d) None of the above

(15) Select correct statement describing a term 'stateless'?
(a) Having all information about what occurred previously
(b) Having some information aboot what occurred previously
(c) Having no information about what occurred previously
(d) Having new information about what occurred previously



CSS Past Paper 2004


i) When all access and processing is done in one location, a computer system is said to be 
(a) networked 
(b) distributed 
(c) centralized 
(d) linked

(ii) Tools to change PROM chips, called 
(a) chip kits 
(b) RAM burners
(c) PROM burners 
(d) none of
these

(iii) The type of modulation that changes the height of the single is called (a) frequency 
(b) phase 
(c) amplitude 
(d) prophase

(iv) A connection for similar network:
(a) satellite 
(b) bridge 
(c) gateway 
(d) fax

(v) The technology whereby part of the program is stored on disk and is brought into memory for execution as needed is called
(a) memory allocation
(b) virtual storage
(c) interrupts
(d) prioritized memory

(C) Write '"True" or "False" in your answer book about the following statements: (5)

(i) Application software may be either custom or packaged. True
(ii) RISC technology uses more instructions than traditional computers.False
(iii) A ring network has no central host computer.True
(iv) Satellites use line-of-sight transmission.False
(v) Time-sharing is both event-driven and time-drive


CSS Past Paper 2005


8. (A) For whom the following abbreviations stand for
(i) DNS : Domain Name System
(ii) CMOS : Complementary metal–oxide–semiconductor
(iii) OSI : Open Systems Interconnection
(iv) CASE : Computer Aided Software engineering
(v) DDE Dynamic Data Exchange

(B) Fill in the blanks with the most suitable options for the following statements:
(i) A data path to transfer data is called…………………Physical medium (not sure)
(ii) What is combination of I-time and E-time called.............................Machine Cycle
(iii) The process of applying a formula to a key is called……………….
(iv) Distortion in the received signals is called………………………
(v) DMA is a technique to transfer data between memory and ……………..IO devices

(C) Write “TRUE” or “FALSE”
(i) RISC technology used fewer instructions then traditional computers. True
(ii) Direct file organization is combination of sequential and indexed file organization.True
(iii) Fax is a connection of similar networks. True not sure
(iv) Let G=(V,E) be an undirected graph when G is a free tree.True
(v) An entity instance is a single occurrence of an entity True



CSS Past Paper 2006


Q.8 (A) Write the terms on your answer book for whom the following abbreviations stand for:

1) BIOS : Basic Input and output system
2) DOS Disk operating system
3) SIMM : single inline memory module
4) SCSI : Small Computer System Interface
5) DASD Direct Access storage device

(B) Choose the most appropriate answer from the given set of options:

6) The processor’s components are synchronized by:
a. Instructions 
b. Data
c. Information
d. Clock pulses
7) External devices are linked to a small computer system through:
a. Channels
b. Control units
c. Plugs
d. interfaces
8) Data on disk are recorded on a series of concentric circle called:
a. Sectors 
b. Cylinders
c. Blocks
d. Tracks

9) The simplest data structure is a:
a. File 
b. List
c. Record
d. Array

10) Several computers linked by communication lines for a:
a. Network
b. Distributed system
c. Time share system
d. Ring


(C) write true (T) or false (F) in your answer book about following statements:

11) programs are loaded into main memory by the operating system’s memory manager 
12) with sequential access, records can be accessed in any order False
13) the process of removing errors from a program is called compilation False
14) data flow over a bus is parallel 
15) one instruction is fetched and executed by computer during a single machine cycle True



CSS Past Paper 2008



SECTION --I
Q2. (a) Compare the TCP/IP and OSI network and describe the functionality of at least two Transport and two network layer protocols
(b)Differentiate between the message switching and packet switching. Which one is better for data networks?
(c)Describe various network Flow control protocol

Q3 (a)Differentiate between thread and process.Explain your answer through example
(b)Various operating systems((i.e WIN 2K,solaris) make use of pages virtual memory technique. Explain the paged virtual memory in general terms with the help of diagram


Q4 (a)
Differentiate between interrupt and trap?Explain two approaches that can be taken to deal with multiple interrupt?
(b)Differentiate between the Shortest process next (SPN) and shortest remaining Time (SRT) Uni processor scheduling techniques?




SECTION--II

Q5(a)What are view and how they are defined in SQL? Describe the rules pertaining to data updating through views
(b)Describe the process of Normalization and various Normal forms through examples.Also describe two integrity rule

Q6(a)Differentiate between Incremental and RAD models?Which one is better and why?
(b)Giving reasons for your answer based on the type pf system being developed. Suggest the most appropriate generic software process model,which might be used as a basis for managing the development of the following systems.
(i) A Virtual reality system to support software development
(ii) An interactive railway timetable system
(iii) A system to control Anti-lock breaking in a car
(iv) MSN messenger
Support your answer with necessary reasons. Clearly write down the assumptions you made.




SECTION --III


Q7 (a) Write note on various internal sorting algorithms. Develop the merge sort algorithm and develop the pseudo code for its implementation.
(b) Write a note onthe following data strtuctures:
(i) STACK
(ii) QUEUE
(iii) DE-QUEUE
Also describe various functions that can be performed on t hem and write the C++ code for implementaation of these functions.

Q8 (a) In the context of computer Graphics, describe various 2D and 3D Transformations. Also write a note on Color Theory in this Context.
(b) What is an Expert System? Describe the various methods for knowledge representation.
(c) Develop the C++ code to accomplish the following tasks:
(i) A function that returns TRUE if the string passed on to it is PLAINDROME otherwise it shall return FALSE.
(ii) Print the nth element of the Fibonicci series.

Post a Comment

  1. Use this diet hack to drop 2 lb of fat in just 8 hours

    At least 160 000 men and women are using a simple and SECRET "liquids hack" to burn 1-2 lbs each and every night while they sleep.

    It's simple and works on anybody.

    Here's how you can do it yourself:

    1) Get a clear glass and fill it with water half glass

    2) And then learn this amazing HACK

    you'll be 1-2 lbs thinner the very next day!

    ReplyDelete

 
Top