Computer Science CSS Paper 2005
FEDERAL PUBLIC SERVICE COMMISSION
COMPETITIVE EXAMINATION FOR RECRUITMENT TO POSTS
IN BPS – 17 UNDER THE FEDERAL GOVERNMENT, 2005.
COMPUTER SCIENCE
TIME ALLOWED: THREE HOURS MAXIMUM MARKS:100
NOTE: Attempt FIVE questions in all, including Question no 8 which is compulsory.
Select at least ONE question from each section. All question carry equal marks.
SECTION I
1. a) What is decentralized processing? Also explain distributed data processing.
b) How would shared memory be used to communicate data between two processes?
2. a) Explain different methods for processing of data files?
b) What are network protocols? Explain any two common LAN protocols?
3. a) Explain any three widely used media for wireless communication.
b) What is pipelining? Hence also explain the strategy of parallel processing.
SECTION II
- a) Explain the term Information Hiding. Also differentiate between Top-down design and Bottom-up design.
b) Discuss briefly the main characteristics of object oriented programming.
5 . a) Show that by removing at most O(lg n) edges, we can partition the vertices of any n-vertex tree into two sets A and B such that |A|=[n/2] and |B|=[n/2].
b) Give an efficient algorithm to determine if an undirected graph is bipartite.
SECTION III
- a) Differentiate between an operational database and a warehouse. What types of applications does each serve?
b) What is the difference between a data entity in second normal form (2NF) and third normal form (3NF)? Give an example of an entity in 2NF and show its conversion to 3NF. -
a) What is client side programming?
b) What are the tools to develop website fast and viewable?
COMPULSORY QUESTION
- (A) For whom the following abbreviations stand for
(i) DNS(ii) CMOS (iii) OSI (iv) CASE (v) DDE
(B) Fill in the blanks with the most suitable options for the following statements:
(i) A data path to transfer data is called…………………
(ii) What is combination of I-time and E-time called………………………..
(iii) The process of applying a formula to a key is called……………….
(iv) Distortion in the received signals is called………………………
(v) DMA is a technique to transfer data between memory and ……………..
(C) Write “TRUE” or “FALSE”
(i) RISC technology used fewer instructions then traditional computers.
(ii) Direct file organization is combination of sequential and indexed file organization.
(iii) Fax is a connection of similar networks.
(iv) Let G=(V,E) be an undirected graph when G is a free tree.
(v) An entity instance is a single occurrence of an entity
(D) Write short answers to the following
(i) Prototyping. (ii) FAT (iii) Virtual memory (iv) Deadlock (v) Abstraction
477489 249055Just wanna remark on few general things, The web site style is ideal, the topic matter is rattling excellent 738780
140730 544278I dugg some of you post as I cogitated they were very beneficial invaluable 119705
490325 470765I like this weblog its a master peace ! Glad I observed this on google . 625331
900435 851177This is a really exciting article, Im searching for this know how. So you recognize I established your web internet site when I was looking for sites like my own, so please appear at my web website someday and post me a opinion to let me know how you feel. 406544
893789 251831Thanks so a lot for yet another post. I be able to get that kind of info data. friend, and exactly. 456448
Hello it’s me, I am also visiting this website daily,
this web page is actually good and the users are really sharing nice thoughts.