PPSC - Lecturer Computer Science IT - Higher Education Department Punjab - 2017
Which of the following is the key characteristic of a hacker?
  • A. Afraid to say they don’t know the answer
  • B. Willing to find answers on their own
  • C. Not willing to find answers on their own
  • D. All of these
Which of the following focuses on the discovery of (previously) unknown properties on the data?
  • A. Data mining
  • B. Big data
  • C. Data wrangling
  • D. Machine learning
Which process model should be used in virtually all situations of web engineering?
  • A. Incremental model
  • B. Waterfall model
  • C. Spiral model
  • D. None of the
Which analysis is a part of Analysis model of the web engineering process framework?
  • A. Content analysis
  • B. Interaction analysis
  • C. Functional analysis
  • D. All of these
Which of the following statements are incorrect with reference to web-based systems?
  • A. Should be un-scalable
  • B. Must be able to cope with uncertain, random heavy demands on services
  • C. Must be secure
  • D. Are subject to assorted legal, social, and ethical scrutiny
What category of web-based system would you assign to electronic shopping?
  • A. Informational
  • B. Interactive
  • C. Transaction-oriented
  • D. Workflow-oriented
W3C stands for:
  • A. World wide web consortium
  • B. World wide web collaboration
  • C. World wide web community
  • D. None of these
Which of the following is not a NoSQL database?
  • A. Sql server
  • B. Mongodb
  • C. Cassandra
  • D. None of these
Which of the following is a NoSQL Database Type?
  • A. Sql
  • B. Document databases
  • C. Json
  • D. All of these
Which one of the following is an example of an operating System?
  • A. Microsoft word
  • B. Microsoft excel
  • C. Microsoft access
  • D. Microsoft windows