Create Account
Sign In
Toggle navigation
Home
Practice Exams
Board Exams
Learn
BISE Courses
Blog
About Us
Contact Us
00
:
35
:
00
Q:
1
/
75
🤖
Evaluating Your Answers
Please wait while our AI system evaluates your descriptive answers...
This may take a few moments.
⏳ Processing...
We're using advanced AI to provide detailed feedback on your answers.
PAF IT Branch Initial Test
Exam Duration:
00:35:00
PAF IT Branch Initial Test
: Question
1
of 75
Pipeline hazards cause:
1 Mark(s)
Your Answer:
Speed up
Speed up
Stalls
Stalls
Errors
Errors
Heat
Heat
Type casting `(int) 3.14` results in:
1 Mark(s)
Your Answer:
3
3
4
4
3.14
3.14
Error
Error
The width of the data bus determines:
1 Mark(s)
Your Answer:
Memory capacity
Memory capacity
Word size
Word size
Processing speed
Processing speed
Clock rate
Clock rate
Which register is used for arithmetic operations?
1 Mark(s)
Your Answer:
Accumulator
Accumulator
PC
PC
IR
IR
MAR
MAR
Which data structure is used for Undo operation?
1 Mark(s)
Your Answer:
Stack
Stack
Queue
Queue
Tree
Tree
Graph
Graph
Which command shows the path packets take to a destination?
1 Mark(s)
Your Answer:
ping
ping
ipconfig
ipconfig
tracert
tracert
netstat
netstat
Wireless LANs follow which standard?
1 Mark(s)
Your Answer:
IEEE 802.11
IEEE 802.11
IEEE 802.3
IEEE 802.3
IEEE 802.5
IEEE 802.5
IEEE 802.15
IEEE 802.15
A tree where every node has at most 2 children is:
1 Mark(s)
Your Answer:
AVL Tree
AVL Tree
B-Tree
B-Tree
Binary Tree
Binary Tree
Red-Black Tree
Red-Black Tree
Which constructor is called when an object is copied to another?
1 Mark(s)
Your Answer:
Default Constructor
Default Constructor
Copy Constructor
Copy Constructor
Parameterized Constructor
Parameterized Constructor
Static Constructor
Static Constructor
The standard input stream in C++ is:
1 Mark(s)
Your Answer:
cin
cin
stdin
stdin
input
input
scan
scan
`TRUNCATE` is faster than `DELETE` because:
1 Mark(s)
Your Answer:
It doesn't log row deletions
It doesn't log row deletions
It uses less CPU
It uses less CPU
It is DML
It is DML
It sorts data
It sorts data
Agile methodology emphasizes:
1 Mark(s)
Your Answer:
Documentation
Documentation
Iterative development
Iterative development
Strict planning
Strict planning
Waterfall model
Waterfall model
The length of an IPv4 address is:
1 Mark(s)
Your Answer:
16 bits
16 bits
32 bits
32 bits
64 bits
64 bits
128 bits
128 bits
The NOT gate is also called a:
1 Mark(s)
Your Answer:
Buffer
Buffer
Inverter
Inverter
Converter
Converter
Diverter
Diverter
Which port is used by RDP (Remote Desktop)?
1 Mark(s)
Your Answer:
22
22
23
23
445
445
3389
3389
Virtual functions are used to achieve:
1 Mark(s)
Your Answer:
Compile-time polymorphism
Compile-time polymorphism
Run-time polymorphism
Run-time polymorphism
Encapsulation
Encapsulation
Data Hiding
Data Hiding
Which technology creates a virtual version of a resource?
1 Mark(s)
Your Answer:
Virtualization
Virtualization
Cloud
Cloud
Grid
Grid
Cluster
Cluster
CSMA/CD is used in:
1 Mark(s)
Your Answer:
Ethernet LAN
Ethernet LAN
Wireless LAN
Wireless LAN
WAN
WAN
Bluetooth
Bluetooth
The complexity of accessing an element in an array is:
1 Mark(s)
Your Answer:
O(1)
O(1)
O(n)
O(n)
O(log n)
O(log n)
O(n^2)
O(n^2)
A full binary tree with N leaves has how many nodes?
1 Mark(s)
Your Answer:
2N - 1
2N - 1
2N
2N
2N + 1
2N + 1
N log N
N log N
What is a Trie used for?
1 Mark(s)
Your Answer:
Prefix search
Prefix search
Sorting
Sorting
Graph traversal
Graph traversal
Numeric calculation
Numeric calculation
The layer responsible for routing packets is:
1 Mark(s)
Your Answer:
Physical
Physical
Data Link
Data Link
Network
Network
Transport
Transport
In C++, `std::unique_ptr` represents:
1 Mark(s)
Your Answer:
Exclusive ownership
Exclusive ownership
Shared ownership
Shared ownership
Weak reference
Weak reference
Null pointer
Null pointer
Which protocol is used for secure shell access?
1 Mark(s)
Your Answer:
SSH
SSH
Telnet
Telnet
FTP
FTP
HTTP
HTTP
Adjacency Matrix uses memory:
1 Mark(s)
Your Answer:
O(V)
O(V)
O(E)
O(E)
O(V^2)
O(V^2)
O(V+E)
O(V+E)
A linked list consists of:
1 Mark(s)
Your Answer:
Blocks
Blocks
Nodes
Nodes
Indexes
Indexes
Vectors
Vectors
IoT stands for:
1 Mark(s)
Your Answer:
Input of Technology
Input of Technology
Internet of Things
Internet of Things
Intranet of Tools
Intranet of Tools
Integrated on Time
Integrated on Time
Which isolation level prevents 'Dirty Reads'?
1 Mark(s)
Your Answer:
Read Uncommitted
Read Uncommitted
Read Committed
Read Committed
Serializable
Serializable
Repeatable Read
Repeatable Read
The `diamond problem` in inheritance is solved in C++ using:
1 Mark(s)
Your Answer:
Multiple Inheritance
Multiple Inheritance
Friend Classes
Friend Classes
Virtual Inheritance
Virtual Inheritance
Abstract Classes
Abstract Classes
Postfix expression is also known as:
1 Mark(s)
Your Answer:
Reverse Polish Notation
Reverse Polish Notation
Polish Notation
Polish Notation
Infix Notation
Infix Notation
Prefix Notation
Prefix Notation
A multiplexer with n selection lines has:
1 Mark(s)
Your Answer:
n inputs
n inputs
$2^n$ inputs
$2^n$ inputs
$n^2$ inputs
$n^2$ inputs
2n inputs
2n inputs
Which join returns all rows from the right table?
1 Mark(s)
Your Answer:
Left Join
Left Join
Right Join
Right Join
Inner Join
Inner Join
Cross Join
Cross Join
DNS maps Domain Names to:
1 Mark(s)
Your Answer:
IP Addresses
IP Addresses
MAC Addresses
MAC Addresses
Port Numbers
Port Numbers
URL
URL
The 'Heart' of the OS is called:
1 Mark(s)
Your Answer:
Kernel
Kernel
Shell
Shell
GUI
GUI
Driver
Driver
Hypervisor Type 1 runs on:
1 Mark(s)
Your Answer:
Bare Metal
Bare Metal
Host OS
Host OS
Cloud
Cloud
Network
Network
Which mode allows data transmission in both directions but only one at a time?
1 Mark(s)
Your Answer:
Simplex
Simplex
Half-Duplex
Half-Duplex
Full-Duplex
Full-Duplex
Multiplex
Multiplex
A thread is a:
1 Mark(s)
Your Answer:
Lightweight process
Lightweight process
Heavy process
Heavy process
System call
System call
Hardware unit
Hardware unit
Which of the following is a DDL command?
1 Mark(s)
Your Answer:
CREATE
CREATE
INSERT
INSERT
SELECT
SELECT
UPDATE
UPDATE
In 1NF, tables must have:
1 Mark(s)
Your Answer:
Primary keys
Primary keys
Atomic values
Atomic values
Foreign keys
Foreign keys
Two columns
Two columns
Which attack involves flooding a network with traffic?
1 Mark(s)
Your Answer:
DDoS
DDoS
Phishing
Phishing
Spoofing
Spoofing
Sniffing
Sniffing
Which operator cannot be overloaded as a friend function?
1 Mark(s)
Your Answer:
=
=
+
+
-
-
<<
<<
The default isolation level in SQL Server is:
1 Mark(s)
Your Answer:
Serializable
Serializable
Read Committed
Read Committed
Read Uncommitted
Read Uncommitted
Snapshot
Snapshot
Which sorting algorithm has O(n^2) best case?
1 Mark(s)
Your Answer:
Bubble Sort
Bubble Sort
Selection Sort
Selection Sort
Insertion Sort
Insertion Sort
Quick Sort
Quick Sort
Linear Probing is a technique for:
1 Mark(s)
Your Answer:
Sorting
Sorting
Collision Resolution
Collision Resolution
Searching
Searching
Indexing
Indexing
In binary, 1 + 1 =
1 Mark(s)
Your Answer:
1
1
10
10
11
11
2
2
The speed of Supercomputers is measured in:
1 Mark(s)
Your Answer:
FLOPS
FLOPS
MIPS
MIPS
GHz
GHz
RPM
RPM
A transaction that has completed successfully is called:
1 Mark(s)
Your Answer:
Committed
Committed
Aborted
Aborted
Active
Active
Rolled back
Rolled back
The memory address of the first element of an array is called:
1 Mark(s)
Your Answer:
First address
First address
Index 0
Index 0
Base address
Base address
Reference
Reference
Which Java collection stores unique elements only?
1 Mark(s)
Your Answer:
List
List
Set
Set
Vector
Vector
Map
Map
Push and Pop operations are associated with:
1 Mark(s)
Your Answer:
Stack
Stack
Queue
Queue
List
List
Graph
Graph
USB stands for:
1 Mark(s)
Your Answer:
Universal Serial Bus
Universal Serial Bus
Unified System Bus
Unified System Bus
Universal System Board
Universal System Board
Unique Serial Bus
Unique Serial Bus
`try-catch-finally` is used for:
1 Mark(s)
Your Answer:
File Handling
File Handling
Memory Mgmt
Memory Mgmt
Exception Handling
Exception Handling
Thread Mgmt
Thread Mgmt
The complexity of Binary Search is:
1 Mark(s)
Your Answer:
O(n)
O(n)
O(n log n)
O(n log n)
O(log n)
O(log n)
O(1)
O(1)
A function inside a class is generally called a:
1 Mark(s)
Your Answer:
Procedure
Procedure
Subroutine
Subroutine
Method
Method
Variable
Variable
The default access modifier for interface members in Java is:
1 Mark(s)
Your Answer:
public
public
private
private
protected
protected
default
default
Degree of a relation is:
1 Mark(s)
Your Answer:
Number of rows
Number of rows
Table size
Table size
Number of columns
Number of columns
Number of keys
Number of keys
A 4-bit binary number is called a:
1 Mark(s)
Your Answer:
Nibble
Nibble
Byte
Byte
Bit
Bit
Word
Word
BGP is an:
1 Mark(s)
Your Answer:
EGP
EGP
IGP
IGP
Distance Vector
Distance Vector
Link State
Link State
The maximum number of nodes at level 'L' in a binary tree is:
1 Mark(s)
Your Answer:
$2L$
$2L$
$2^L$
$2^L$
$2^{L-1}$
$2^{L-1}$
$L^2$
$L^2$
OSI Model has how many layers?
1 Mark(s)
Your Answer:
4
4
5
5
7
7
9
9
Which layer of OSI does IPSec operate?
1 Mark(s)
Your Answer:
Application
Application
Transport
Transport
Network
Network
Data Link
Data Link
Deadlock prevention strategy:
1 Mark(s)
Your Answer:
Deny necessary condition
Deny necessary condition
Kill process
Kill process
Add memory
Add memory
Ignore it
Ignore it
The keyword `static` inside a class means the member belongs to:
1 Mark(s)
Your Answer:
The Class
The Class
The Object
The Object
The Thread
The Thread
The OS
The OS
Floyd-Warshall algorithm complexity:
1 Mark(s)
Your Answer:
O(V^2)
O(V^2)
O(E log V)
O(E log V)
O(V^3)
O(V^3)
O(V+E)
O(V+E)
Which topology is most expensive to implement?
1 Mark(s)
Your Answer:
Bus
Bus
Star
Star
Ring
Ring
Mesh
Mesh
The `WHERE` clause is used to:
1 Mark(s)
Your Answer:
Sort records
Sort records
Filter records
Filter records
Group records
Group records
Join tables
Join tables
Which cable protects best against EMI (Interference)?
1 Mark(s)
Your Answer:
UTP
UTP
Coaxial
Coaxial
STP
STP
Fiber Optic
Fiber Optic
Which deadlock handling method kills a process?
1 Mark(s)
Your Answer:
Avoidance
Avoidance
Prevention
Prevention
Detection/Recovery
Detection/Recovery
Ignore
Ignore
Stored Procedures reside in the:
1 Mark(s)
Your Answer:
Database Server
Database Server
Client App
Client App
Web Server
Web Server
File System
File System
The root of a heap is always:
1 Mark(s)
Your Answer:
Middle
Middle
Random
Random
Max/Min
Max/Min
Leaf
Leaf
What is a Dirty Read?
1 Mark(s)
Your Answer:
Reading uncommitted data
Reading uncommitted data
Reading committed data
Reading committed data
Writing data
Writing data
Deleting data
Deleting data
The command `REVOKE` is part of:
1 Mark(s)
Your Answer:
DDL
DDL
DML
DML
TCL
TCL
DCL
DCL
Which data structure is best for Breadth First Search?
1 Mark(s)
Your Answer:
Stack
Stack
Queue
Queue
Heap
Heap
Hash Map
Hash Map
The keyword `virtual` is used to:
1 Mark(s)
Your Answer:
Prevent overriding
Prevent overriding
Enable dynamic binding
Enable dynamic binding
Make function static
Make function static
Hide function
Hide function
Which loop is best for iterating through a collection?
1 Mark(s)
Your Answer:
While
While
Do-While
Do-While
For
For
For-each
For-each
Previous
Mark For Review & Next
Next
Clear Answer
Finish
© Copyright © 2020 ALGOPK . All Rights Reserved.