Computer Science CSS Paper II 2019

FEDERAL PUBLIC SERVICE COMMISSION
COMPETITIVE EXAMINATION-2019
FOR RECRUITMENT TO POSTS IN BS-17
UNDER THE FEDERAL GOVERNMENT
COMPUTER SCIENCE, PAPER-II
TIME ALLOWED: THREE HOURS
PART-I(MCQS): MAXIMUM 30 MINUTES
PART-I (MCQS) MAXIMUM MARKS = 20
PART-II MAXIMUM MARKS = 80
NOTE: (i) Part-II is to be attempted on the separate Answer Book.
(ii) Attempt ONLY FOUR questions from PART-II by selecting TWO questions from EACH SECTION. ALL questions carry EQUAL marks.
(iii) All the parts (if any) of each Question must be attempted at one place instead of at different places.
(iv) Write Q. No. in the Answer Book in accordance with Q. No. in the Q.Paper.
(v) No Page/Space be left blank between the answers. All the blank pages of Answer Book must be crossed.
(vi) Extra attempt of any question or any part of the question will not be considered.

PART – II

SECTION-A

Q. No. 2. (a) Compare the main features of CISC and RISC architectures. Which type of architecture is suitable for pipelining? (8)
(b) Demonstrate use of superscalar approach to achieve instruction level parallelism using a suitable example. (6)
(c) List all basic functions of buses in the context of computer architecture. (6) (20)

Q. No. 3. (a) Show field by field comparison for IPv4 and IPv6 packets. (8)
(b) Explain the following routing techniques using suitable examples. (6)
(i) Link State Routing (ii) Distance Vector Routing
(c) Show step by step procedure of error detection using cyclic redundancy check method for a 7 bit code block “1001001”. Assume appropriate generator polynomial. (6) (20)

Q. No. 4. (a) Demonstrate step by step procedure for process swapping between main memory and secondary memory. (8)
(b) Show flow chart of a process scheduling mechanism using various queues. (6)
(c) Explain the difference between Sequential Access and Indexed Sequential Access in the context of file access using a suitable example. (6) (20)

Q. No. 5. (a) Demonstrate various types of multiplexing techniques in the context of computer networks using suitable examples. (8)
(b) Show step by step procedure to find MAC address of a node in a network using Address Resolution Protocol. (6)
(c) For transmission of voice signal in real time over the network, select a suitable switching technique. Justify your answer using an example. (6) (20)

SECTION-B

Q. No. 6. (a) Analyze the following noise models in the context of digital image processing. (8)
(i) Gaussian Noise Model (ii) Uniform Noise Model
(b) Compare RGB and HSI color models in the context of digital image processing. (6)
(c) Describe step by step process of application of compression based technique for image segmentation. (6) (20)

Q. No. 7. (a) A Medium advertising company is reviewing its IT requirements and is considering using a Cloud solution for web applications as opposed to investing in existing infrastructure. Is this an appropriate strategy? Justify your answer using an example. (8)
(b) Describe briefly the role of validation in requirement engineering process. (6)
(c) Explain the difference between functional and non-functional requirement in the context of web engineering using a suitable example. (6) (20)

Q. No. 8. (a) Demonstrate the use of ER Model in database designing process using an example. (8)
(b) Describe an appropriate security scheme for a database maintained by a bank. Justify your answer using an example. (6)
(c) Explain the difference between top-down and bottom-up approaches in the context of distributed database design using a suitable example. (6) (20)
************

906 Views