March 19, 2023
Dogar Brothers Download PPSC

Dogar Brothers Download PPSC

Dogar Brothers Download PPSC :

English MCQs

  1. Repetition of same vowel sound ?

Answer : Assonance

2. The poet who used extensive alliteration ?

Answer: Keats

3.Wuthering heights written by ?

Answer :Emily Brontë

4. The poem “Byzantium” is written about ?

Answer : Imaginary city

5.Carl sadburg born at ?

Answer: Illinois

6. T.S Eliot was ?

Answer : American by birth; British from 1927

7. Wasteland of Eliot is dedicated to ?

Answer :Ezra Pound

8. Shakespeare acted in one of plays of ?

Answer : Ben johnson

9. Elizabeth Sewell born in ?

Answer : England

10.Linguistics is combination of                 words ?

Answer : Two

Computer Science MCQs

(1) All of the following are examples of real security and privacy risks EXCEPT:

  • hackers.
  • spam.
  • viruses.
  • identity theft.
  • Answer: B

(2) A process known as                              is used by large retailers to study trends.

  • data mining
  • data selection
  • POS
  • data conversion
  • Answer: A

   (3)                          terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

  • Data
  • Point-of-sale (POS)
  • Sales
  • Query
  • Answer: B

(4) A(n)                       system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

  • PSS
  • POS
  • inventory
  • data mining
  • Answer: A

(5) The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:

  • robotics.
  • simulation.
  • computer forensics.
  • animation.

Answer: C

(6) Which of the following is NOT one of the four major data processing functions of a computer?

  • gathering data
  • processing data into information
  • analyzing the data or information
  • storing the data or information
  • Answer: C

(7) ______________________tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.

  • POS
  • RFID
  • PPS
  • GPS
  • Answer: B

(8) Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

  • robotics.
  • computer forensics.
  • simulation.
  • forecasting.
  • Answer: A

(9) Technology no longer protected by copyright, available to everyone, is considered to be:

  • proprietary.
  • open.
  • experimental.
  • in the public domain.
  • Answer: A

     (10) ____________________   is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

  • Nanoscience
  • Microelectrodes
  • Computer forensics
  • Artificial intelligence
  • Answer: A

Download Link For Full Book

Leave a Reply

Your email address will not be published.