QUESTION PAPER
Computer Science [SHIFT - 1]
Exam Date : 19/01/2025 Time : 10:00 AM - 12:00 PM
Part I - Aptitude
Question 1 Question Id : 251
Directions: Study the following passage to answer the question that follows.
Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.
Which of the following styles has been adopted by the author in writing the passage?
Answer : Option Id
(A) Data-based, objective, positive, solution-oriented 251001
(B) Data-based, but coloured by socialism 251002
(C) Highly subjective with bias for poor people 251003
(D) Objective, descriptive, lacking clarity 251004
Right Answer : Right Option Id : 251001
Data-based objective positive solution-oriented
Question 2 Question Id : 252
Directions: Study the following passage to answer the question that follows.
Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.
The author feels that increasing per capita use of energy is
Answer : Option Id
(A) not at all desirable. 252001
(B) a matter of meticulous planning. 252002
(C) not easy but certainly achievable. 252003
(D) rather difficult, but not impossible. 252004
Right Answer : Right Option Id : 252002
a matter of meticulous planning.
Question 3 Question Id : 253
Directions: Study the following passage to answer the question that follows.
Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.
Which of the following statements is true?
Answer : Option Id
(A) Industrial sector uses 50% of total energy used in India. 253001
(B) Energy consumption in India is 26% of world consumption. 253002
(C) The household sector has shown considerable increase in energy use. 253003
(D) Use of oil has increased from 40% to 80%. 253004
Right Answer : Right Option Id : 253001
Industrial sector uses 50% of total energy used in India.
Question 4 Question Id : 254
Directions: Study the following passage to answer the question that follows.
Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.
Which of the following has been suggested by the author as the best possible solution to overcome energy crisis?
Answer : Option Id
(A) Exploration of oil reserves 254001
(B) Maximization of renewable sources 254002
(C) Importing large quantities of coal 254003
(D) Reducing share of bulk users 254004
Right Answer : Right Option Id : 254002
Maximization of renewable sources
Question 5 Question Id : 255
Directions: Study the following passage to answer the question that follows.
Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.
Which of the following has been mentioned as a major hurdle in enhancing per capita consumption of energy in India?
Answer : Option Id
(A) Present level of development in India. 255001
(B) International norm of 1 litre of oil per day per person. 255002
(C) Disparity in use of energy in rural and urban areas. 255003
(D) None of these 255004
Right Answer : Right Option Id : 255004
None of these
Question 6 Question Id : 256
A Cricket team travelled by bus at 50 km per hour for 3 hours and 17 minutes. Then due to some fault in the bus, they decided to travel the remaining distance to reach their
destination by train which also took 3 hours 17 minutes. If the speed of the train is 60 km/hour, the average speed of the whole journey is _________.
Answer : Option Id
(A) 35 km/hr. 256001
(B) 45 km/hr. 256002
(C) 55 km/hr. 256003
(D) 50 km/hr. 256004
Right Answer : Right Option Id : 256003
55 km/hr.
Question 7 Question Id : 257
A and B can separately do a piece of work in 20 and 15 days respectively. They worked together for 6 days, after which B was replaced by C. If the work was finished in next 4 days,
then the number of days in which C alone could do the work will be __________.
Answer : Option Id
(A) 60 days 257001
(B) 40 days 257002
(C) 35 days 257003
(D) 30 days 257004
Right Answer : Right Option Id : 257002
40 days
Question 8 Question Id : 258
Three girls are aged 2 years, 4 years and 8 years. They want to divide seventy rupees in the ratio of their ages. How much money would each get?
Answer : Option Id
(A) Rs.15, Rs.20, Rs.35 258001
(B) Rs.12, Rs.22, Rs.36 258002
(C) Rs.16, Rs.24, Rs.30 258003
(D) Rs.10, Rs.20, Rs.40 258004
Right Answer : Right Option Id : 258004
Rs.10 Rs.20 Rs.40
Question 9 Question Id : 259
While selling an electric fan, a dealer gives a discount of 5%. If he gives a discount of 8%, he earns Rs.36 less as profit. The marked price of the fan is _________.
Answer : Option Id
(A) Rs.1000 259001
(B) Rs.1200 259002
(C) Rs.800 259003
(D) Rs.600 259004
Right Answer : Right Option Id : 259002
Rs.1200
Question 10 Question Id : 260
The number of two-digit numbers which on being reversed (i.e., their digits exchanged the position) gives out perfect square two-digit numbers is/are __________.
Answer : Option Id
(A) 6 260001
(B) 4 260002
(C) 1 260003
(D) 10 260004
Right Answer : Right Option Id : 260001
6
Question 11 Question Id : 261
Find the odd one out.
F9G, G8H, H7I, I6J, I5K, K4L
Answer : Option Id
(A) G8H 261001
(B) I5K 261002
(C) I6J 261003
(D) K4L 261004
Right Answer : Right Option Id : 261002
I5K
Question 12 Question Id : 262
Seema is married to Vidu. Vidu is the brother-in-law of Amrita. Lokesh who is son of Vidu is a male cousin of Mukesh. Amit is the father of Seema’s only sister Amrita’s son. How is
Lokesh related to Amit?
Answer : Option Id
(A) Father-in-law 262001
(B) Brother-in-law 262002
(C) Nephew 262003
(D) Can’t be determined 262004
Right Answer : Right Option Id : 262004
Can’t be determined
Question 13 Question Id : 263
In a certain code, MOBILE is written as OMIBEL. How is TELEVISION written in that code?
Answer : Option Id
(A) ETELVIISNO 263001
(B) ETELVIISON 263002
(C) ETELIVISNO 263003
(D) ETLEVIISON 263004
Right Answer : Right Option Id : 263003
ETELIVISNO
Question 14 Question Id : 264
The present ages of A and B are in the ratio of 9:4. Seven years hence, the ratio of their ages will be 5:3. Find the present ages of A and B?
Answer : Option Id
(A) 18 and 8 264001
(B) 27 and 12 264002
(C) 45 and 20 264003
(D) 36 and 16 264004
Right Answer : Right Option Id : 264001
18 and 8
Question 15 Question Id : 265
In the last election, the ruling party got 55% of the total valid votes cast. 20% of the votes cast were invalid. If the total number of votes cast was 7500, what is the number of valid
votes that the other parties got?
Answer : Option Id
(A) 2250 265001
(B) 2700 265002
(C) 2750 265003
(D) 2800 265004
Right Answer : Right Option Id : 265002
2700
Question 16 Question Id : 266
Which of the following is a physical change?
Answer : Option Id
(A) Oxidation 266001
(B) Reduction 266002
(C) Sublimation 266003
(D) Decomposition 266004
Right Answer : Right Option Id : 266003
Sublimation
Question 17 Question Id : 267
Which of the following places in India is known as Jain Temple City?
Answer : Option Id
(A) Girnar 267001
(B) Varanasi 267002
(C) Prayagraj 267003
(D) None of these 267004
Right Answer : Right Option Id : 267001
Girnar
Question 18 Question Id : 268
Mahatma Gandhi started Satyagraha movement in 1919 in protest against the
Answer : Option Id
(A) Simon Commission. 268001
(B) Champaran wrongs. 268002
(C) proposed Rowlatt Act. 268003
(D) colonial exploitation of India. 268004
Right Answer : Right Option Id : 268003
proposed Rowlatt Act.
Question 19 Question Id : 269
Who appoints/elects the Chairman of Public Accounts Committee (PAC) of the Parliament?
Answer : Option Id
(A) Union Cabinet of India 269001
(B) Speaker of Lok Sabha 269002
(C) President of India 269003
(D) Members of PAC 269004
Right Answer : Right Option Id : 269002
Speaker of Lok Sabha
Question 20 Question Id : 270
In which of the following banks one cannot open a personal account?
Answer : Option Id
(A) Commercial Bank 270001
(B) Cooperative Bank 270002
(C) Scheduled Bank 270003
(D) Reserve Bank of India 270004
Right Answer : Right Option Id : 270004
Reserve Bank of India
Question 21 Question Id : 271
Directions: Study the following information and answer the question that follows.
In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.
In a day, how many units of machine component Q can be completed?
Answer : Option Id
(A) 20 271001
(B) 30 271002
(C) 40 271003
(D) 50 271004
Right Answer : Right Option Id : 271004
50
Question 22 Question Id : 272
Directions: Study the following information and answer the question that follows.
In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.
If 20 units of component Q are made in a day, how many units of component P can be made in the same day?
Answer : Option Id
(A) 10 272001
(B) 20 272002
(C) 40 272003
(D) 45 272004
Right Answer : Right Option Id : 272004
45
Question 23 Question Id : 273
Directions: Study the following information and answer the question that follows.
In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.
If 10 units of component P are made in a day, how many units of component Q can be made in the same day?
Answer : Option Id
(A) 45 273001
(B) 30 273002
(C) 17 273003
(D) 50 273004
Right Answer : Right Option Id : 273001
45
Question 24 Question Id : 274
Directions: Study the following information and answer the question that follows.
In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.
If one more Welding tool is added and 30 units of component Q are made in a day, how many units of component P can be made?
Answer : Option Id
(A) 10 274001
(B) 5 274002
(C) 2 274003
(D) 0 274004
Right Answer : Right Option Id : 274004
0
Question 25 Question Id : 275
Directions: Study the following information and answer the question that follows.
In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.
If only component Q is to be made, which type of single tool should be bought, so that there is a maximum increase in production capacity?
Answer : Option Id
(A) Press 275001
(B) Cutter 275002
(C) Welding tool 275003
(D) Any one 275004
Right Answer : Right Option Id : 275003
Welding tool
Part II - Technical
Question 26 Question Id : 276
Which method allows for continuous changes and is widely adopted for remote or distributed work?
Answer : Option Id
(A) Agile Method 276001
(B) Waterfall Method 276002
(C) Lean Method 276003
(D) Six Sigma 276004
Right Answer : Right Option Id : 276001
Agile Method
Question 27 Question Id : 277
What is a mathematical model for data types defined by their behavior and operations, rather than their implementation details?
Answer : Option Id
(A) Abstract Data Type (ADT) 277001
(B) Primitive Data Type 277002
(C) Composite Data Type 277003
(D) Object-Oriented Data Type 277004
Right Answer : Right Option Id : 277001
Abstract Data Type (ADT)
Question 28 Question Id : 278
What is an algorithm?
Answer : Option Id
(A) A programming language 278001
(B) A set of steps to complete a task 278002
(C) A type of software 278003
(D) A machine instruction 278004
Right Answer : Right Option Id : 278002
A set of steps to complete a task
Question 29 Question Id : 279
Which layer is responsible for controlling the operation of the subnet and managing packet routing in a network?
Answer : Option Id
(A) The Network Layer 279001
(B) The Transport Layer 279002
(C) The Data Link Layer 279003
(D) The Application Layer 279004
Right Answer : Right Option Id : 279001
The Network Layer
Question 30 Question Id : 280
What is the attack called where data is introduced into a DNS resolver's cache, causing it to return incorrect IP addresses and divert traffic?
Answer : Option Id
(A) DNS Spoofing 280001
(B) Phishing 280002
(C) Man-in-the-Middle Attack 280003
(D) IP Spoofing 280004
Right Answer : Right Option Id : 280001
DNS Spoofing
Question 31 Question Id : 281
What is a group of objects sharing common properties for data and program parts called in object-oriented programming?
Answer : Option Id
(A) Object 281001
(B) Method 281002
(C) Class 281003
(D) Attribute 281004
Right Answer : Right Option Id : 281003
Class
Question 32 Question Id : 282
What term refers to the process in which a method in Java calls itself continuously?
Answer : Option Id
(A) Recursion 282001
(B) Iteration 282002
(C) Exception Handling 282003
(D) Polymorphism 282004
Right Answer : Right Option Id : 282001
Recursion
Question 33 Question Id : 283
Which systems tolerate missed deadlines with degraded performance, rather than causing a disaster?
Answer : Option Id
(A) Hard Real-Time Systems 283001
(B) Embedded Systems 283002
(C) Time-Sharing Systems 283003
(D) Soft Real-Time Systems 283004
Right Answer : Right Option Id : 283004
Soft Real-Time Systems
Question 34 Question Id : 284
What term refers to a collection of related data items organized to represent meaningful information?
Answer : Option Id
(A) Field 284001
(B) Record 284002
(C) File 284003
(D) Tuple 284004
Right Answer : Right Option Id : 284002
Record
Question 35 Question Id : 285
Which type of computer is the smallest general-purpose processing system and includes desktops and portables?
Answer : Option Id
(A) Microcomputers 285001
(B) Mainframe Computers 285002
(C) Supercomputers 285003
(D) Minicomputers 285004
Right Answer : Right Option Id : 285001
Microcomputers
Question 36 Question Id : 286
What are the four practices of integrating design thinking in strategic innovation?
Answer : Option Id
(A) Reviewing, Simulating, Conversing, Collaborating 286001
(B) Designing, Prototyping, Testing, Implementing 286002
(C) Planning, Developing, Analyzing, Feedback 286003
(D) Ideating, Reflecting, Communicating, Collaborating 286004
Right Answer : Right Option Id : 286001
Reviewing Simulating Conversing Collaborating
Question 37 Question Id : 287
Which type of data structure uses pointers or links to associate elements sequentially, allowing dynamic memory allocation and flexible operations?
Answer : Option Id
(A) Array 287001
(B) Linked Lists 287002
(C) Stack 287003
(D) Queue 287004
Right Answer : Right Option Id : 287002
Linked Lists
Question 38 Question Id : 288
Which term refers to a high-level description of an algorithm, more structured than plain English but less detailed than a program?
Answer : Option Id
(A) Flowchart 288001
(B) Program 288002
(C) Pseudocode 288003
(D) Algorithm 288004
Right Answer : Right Option Id : 288003
Pseudocode
Question 39 Question Id : 289
Which layer is responsible for breaking data into smaller units, ensuring error-free delivery, and isolating upper layers from hardware changes?
Answer : Option Id
(A) The Network Layer 289001
(B) The Data Link Layer 289002
(C) The Transport Layer 289003
(D) The Application Layer 289004
Right Answer : Right Option Id : 289003
The Transport Layer
Question 40 Question Id : 290
Which type of attack uses a trial-and-error method to generate multiple guesses to obtain sensitive data like passwords?
Answer : Option Id
(A) Phishing 290001
(B) Brute Force 290002
(C) DNS Spoofing 290003
(D) Social Engineering 290004
Right Answer : Right Option Id : 290002
Brute Force
Question 41 Question Id : 291
What term refers to the stage where participants build and experiment with an idea, conduct surveys, and use tools like journey mapping to improve the design?
Answer : Option Id
(A) Testing 291001
(B) Prototype 291002
(C) Ideation 291003
(D) Implementation 291004
Right Answer : Right Option Id : 291002
Prototype
Question 42 Question Id : 292
What keyword in Java is used for memory management and belongs to the class rather than an instance of the class?
Answer : Option Id
(A) Final 292001
(B) Static 292002
(C) Abstract 292003
(D) Synchronized 292004
Right Answer : Right Option Id : 292002
Static
Question 43 Question Id : 293
What is the process that involves monitoring and managing errors in a system to prevent malfunctioning?
Answer : Option Id
(A) Debugging 293001
(B) Exception Handling 293002
(C) Fault Tolerance 293003
(D) Error Handling 293004
Right Answer : Right Option Id : 293004
Error Handling
Question 44 Question Id : 294
What is the highest level of abstraction in a database system, which describes only part of the database to simplify user interaction?
Answer : Option Id
(A) View Level 294001
(B) Logical Level 294002
(C) Physical Level 294003
(D) Conceptual Level 294004
Right Answer : Right Option Id : 294001
View Level
Question 45 Question Id : 295
Which type of computer is characterized by extremely large storage capacity, very high computing speeds, and is used for tasks like weather analysis?
Answer : Option Id
(A) Minicomputer 295001
(B) Microcomputer 295002
(C) Mainframe Computer 295003
(D) Supercomputer 295004
Right Answer : Right Option Id : 295004
Supercomputer
Question 46 Question Id : 296
According to the Theory of Thinking Modes, which thinking mode involves separating things from visible relationships in processes and production?
Answer : Option Id
(A) Analytical Thinking 296001
(B) Judicial Thinking 296002
(C) Synthetic Thinking 296003
(D) Critical Thinking 296004
Right Answer : Right Option Id : 296001
Analytical Thinking
Question 47 Question Id : 297
In a linked list, what does the pointer variable 'head' typically store?
Answer : Option Id
(A) The data value of the first node 297001
(B) The address of the last node 297002
(C) The total number of nodes in the list 297003
(D) The address of the first node 297004
Right Answer : Right Option Id : 297004
The address of the first node
Question 48 Question Id : 298
What term refers to the amount of memory an algorithm needs to complete its execution?
Answer : Option Id
(A) Time Complexity 298001
(B) Performance Evaluation 298002
(C) Algorithm Efficiency 298003
(D) Space Complexity 298004
Right Answer : Right Option Id : 298004
Space Complexity
Question 49 Question Id : 299
Which layer in the TCP/IP model is responsible for connecting the host to the network to send IP packets?
Answer : Option Id
(A) The Transport Layer 299001
(B) The Application Layer 299002
(C) The Network Layer 299003
(D) The Host-to-Network Layer 299004
markstoall
Question 50 Question Id : 300
Which type of malicious program disguises itself as a normal application but executes harmful code in the background when opened?
Answer : Option Id
(A) Ransomware 300001
(B) Spyware 300002
(C) Trojan Horse 300003
(D) Worm 300004
Right Answer : Right Option Id : 300003
Trojan Horse
Question 51 Question Id : 301
What is the process of wrapping up data and functions into a single unit in object-oriented programming called?
Answer : Option Id
(A) Data Encapsulation 301001
(B) Data Abstraction 301002
(C) Data Hiding 301003
(D) Data Integration 301004
Right Answer : Right Option Id : 301001
Data Encapsulation
Question 52 Question Id : 302
What are the modifiers in Java that specify the accessibility (scope) of a data member, method, constructor, or class?
Answer : Option Id
(A) Non-access Modifiers 302001
(B) Access Modifiers 302002
(C) Static Modifiers 302003
(D) Final Modifiers 302004
Right Answer : Right Option Id : 302002
Access Modifiers
Question 53 Question Id : 303
Which program in Linux acts as an interpreter to execute operating system commands and perform various operations?
Answer : Option Id
(A) Kernel 303001
(B) Terminal 303002
(C) Shell 303003
(D) GUI 303004
Right Answer : Right Option Id : 303003
Shell
Question 54 Question Id : 304
What term refers to the overall design of a database, which changes infrequently and defines the structure and types of data?
Answer : Option Id
(A) Instance 304001
(B) Schemas 304002
(C) Tables 304003
(D) Records 304004
Right Answer : Right Option Id : 304002
Schemas
Question 55 Question Id : 305
Which storage medium is an example of secondary memory used for storing large amounts of data and programs?
Answer : Option Id
(A) RAM 305001
(B) Cache Memory 305002
(C) Floppies 305003
(D) Registers 305004
Right Answer : Right Option Id : 305003
Floppies
Question 56 Question Id : 306
According to the Theory of Thinking Modes, which thinking mode focuses on combining ideas and concepts to create new processes or combinations?
Answer : Option Id
(A) Analytical Thinking 306001
(B) Judicial Thinking 306002
(C) Synthetic Thinking 306003
(D) Logical Thinking 306004
Right Answer : Right Option Id : 306003
Synthetic Thinking
Question 57 Question Id : 307
Which data structure follows the Last-In-First-Out (LIFO) principle, where elements are pushed and popped, and may experience overflow or underflow?
Answer : Option Id
(A) Queue 307001
(B) Stack 307002
(C) Linked List 307003
(D) Array 307004
Right Answer : Right Option Id : 307002
Stack
Question 58 Question Id : 308
What term describes the highest degree term of a formula for running time, focusing on how the running time grows as the input size increases?
Answer : Option Id
(A) Order of Growth 308001
(B) Time Complexity 308002
(C) Space Complexity 308003
(D) Execution Time 308004
Right Answer : Right Option Id : 308001
Order of Growth
Question 59 Question Id : 309
Which type of media provides a physical conduit for signals between devices and includes twisted-pair cable, coaxial cable, and fiber-optic cable?
Answer : Option Id
(A) Unguided Media 309001
(B) Wireless Media 309002
(C) Digital Media 309003
(D) Guided Media 309004
Right Answer : Right Option Id : 309004
Guided Media
Question 60 Question Id : 310
What is the method called that bypasses the normal authentication process, often created by developers for troubleshooting purposes?
Answer : Option Id
(A) Keylogger 310001
(B) Ransomware 310002
(C) Backdoors 310003
(D) Spyware 310004
Right Answer : Right Option Id : 310003
Backdoors
Question 61 Question Id : 311
In machine learning, which component involves creating general concepts and models from stored data?
Answer : Option Id
(A) Data Storage 311001
(B) Abstraction 311002
(C) Generalization 311003
(D) Evaluation 311004
Right Answer : Right Option Id : 311002
Abstraction
Question 62 Question Id : 312
In machine learning, which geometric model segments the instance space using geometric concepts like lines or planes to classify data?
Answer : Option Id
(A) Distance-based Models 312001
(B) Non-linear Models 312002
(C) Linear Models 312003
(D) Clustering Models 312004
Right Answer : Right Option Id : 312003
Linear Models
Question 63 Question Id : 313
What is the purpose of the elif keyword in shell scripting?
Answer : Option Id
(A) It defines a loop 313001
(B) It creates an alternative condition in an if statement 313002
(C) It terminates a script 313003
(D) It checks for multiple conditions 313004
markstoall
Question 64 Question Id : 314
What data model uses entities and relationships among these entities to represent real-world objects in database design?
Answer : Option Id
(A) Relational Model 314001
(B) Entity-Relationship Model 314002
(C) Network Model 314003
(D) Object-Oriented Model 314004
Right Answer : Right Option Id : 314002
Entity-Relationship Model
Question 65 Question Id : 315
What controls the timing of processor circuits and divides instruction execution into sequences of basic steps?
Answer : Option Id
(A) Instruction Register (IR) 315001
(B) Program Counter (PC) 315002
(C) Arithmetic Logic Unit (ALU) 315003
(D) Processor Clock 315004
Right Answer : Right Option Id : 315004
Processor Clock
Question 66 Question Id : 316
What term refers to a representative data point that is used in situations where the centroid is not applicable, such as in cases like image data?
Answer : Option Id
(A) Centroid 316001
(B) Mode 316002
(C) Medoid 316003
(D) Mean 316004
Right Answer : Right Option Id : 316003
Medoid
Question 67 Question Id : 317
Which data structure is commonly implemented using an array with two variables, front and rear, to manage insertion and deletion?
Answer : Option Id
(A) Queue 317001
(B) Stack 317002
(C) Linked List 317003
(D) Priority Queue 317004
Right Answer : Right Option Id : 317001
Queue
Question 68 Question Id : 318
What is the formal way to describe the growth rate of an algorithm's running time, focusing on its behavior as the input size increases?
Answer : Option Id
(A) Asymptotic Notation 318001
(B) Performance Evaluation 318002
(C) Time Complexity 318003
(D) Space Complexity 318004
Right Answer : Right Option Id : 318001
Asymptotic Notation
Question 69 Question Id : 319
Which type of cable uses a central core conductor enclosed in insulation and a metallic outer conductor that acts as both a shield against noise and the second conductor?
Answer : Option Id
(A) Twisted-Pair Cable 319001
(B) Fiber-Optic Cable 319002
(C) Coaxial Cable 319003
(D) Shielded Twisted-Pair Cable 319004
Right Answer : Right Option Id : 319003
Coaxial Cable
Question 70 Question Id : 320
What term refers to the protection of sensitive, private information from unauthorized access?
Answer : Option Id
(A) Integrity 320001
(B) Authentication 320002
(C) Availability 320003
(D) Confidentiality 320004
Right Answer : Right Option Id : 320004
Confidentiality
Question 71 Question Id : 321
In machine learning, which type of model forms a single global model over the entire instance space, as opposed to breaking it into segments or groups?
Answer : Option Id
(A) Decision Trees 321001
(B) K-Nearest Neighbors (KNN) 321002
(C) Grading Models 321003
(D) Grouping Models 321004
Right Answer : Right Option Id : 321003
Grading Models
Question 72 Question Id : 322
What type of learning involves an agent discovering which actions yield the most reward through trial and error, without being explicitly told how to correct mistakes?
Answer : Option Id
(A) Supervised Learning 322001
(B) Unsupervised Learning 322002
(C) Reinforcement Learning 322003
(D) Semi-supervised Learning 322004
Right Answer : Right Option Id : 322003
Reinforcement Learning
Question 73 Question Id : 323
What refers to the different stages that a process goes through during execution, based on its current activity?
Answer : Option Id
(A) Process Queues 323001
(B) Process States 323002
(C) Process Scheduling 323003
(D) Process Management 323004
Right Answer : Right Option Id : 323002
Process States
Question 74 Question Id : 324
What type of language enables users to access and manipulate data within a database, including retrieval, insertion, deletion, and modification?
Answer : Option Id
(A) Data Definition Language 324001
(B) Data Manipulation Language 324002
(C) Structured Query Language 324003
(D) Query Language 324004
Right Answer : Right Option Id : 324002
Data Manipulation Language
Question 75 Question Id : 325
Which method is used to obtain the 2's complement of a binary number?
Answer : Option Id
(A) Subtracting 1 from the binary number 325001
(B) Adding 1 to the 1's complement of the binary number 325002
(C) Reversing the order of all bits in the binary number 325003
(D) Doubling the binary number 325004
Right Answer : Right Option Id : 325002
Adding 1 to the 1's complement of the binary number
Question 76 Question Id : 326
What term refers to a language processor that directly executes operations specified in the source program, rather than producing a separate target program?
Answer : Option Id
(A) Compiler 326001
(B) Interpreter 326002
(C) Assembler 326003
(D) Linker 326004
Right Answer : Right Option Id : 326002
Interpreter
Question 77 Question Id : 327
Which sorting algorithm repeatedly compares successive elements and swaps them if they are out of order, often requiring many comparisons and swaps to sort the list?
Answer : Option Id
(A) Quick Sort 327001
(B) Merge Sort 327002
(C) Bubble Sort 327003
(D) Selection Sort 327004
Right Answer : Right Option Id : 327003
Bubble Sort
Question 78 Question Id : 328
What is the time complexity of the Merge Sort algorithm?
Answer : Option Id
(A) O(n) 328001
(B) O(n log n) 328002
2
(C) O(n ) 328003
(D) O(log n) 328004
Right Answer : Right Option Id : 328002
O(n log n)
Question 79 Question Id : 329
Which type of electromagnetic waves, used for communication, are unidirectional and require aligned sending and receiving antennas?
Answer : Option Id
(A) Radio Waves 329001
(B) Infrared Waves 329002
(C) X-Rays 329003
(D) Microwaves 329004
markstoall
Question 80 Question Id : 330
Which type of active attack involves an intruder pretending to be an authorized user to gain unauthorized access or privileges?
Answer : Option Id
(A) Masquerade 330001
(B) Phishing 330002
(C) Denial of Service (DoS) 330003
(D) Eavesdropping 330004
Right Answer : Right Option Id : 330001
Masquerade
Question 81 Question Id : 331
What component of a compiler reads characters from the source program and groups them into tokens?
Answer : Option Id
(A) Syntax Analyzer 331001
(B) Lexical Analyzer 331002
(C) Code Generator 331003
(D) Optimizer 331004
Right Answer : Right Option Id : 331002
Lexical Analyzer
Question 82 Question Id : 332
Which method in Java is used to request garbage collection for reclaiming unused memory?
Answer : Option Id
(A) gc() method 332001
(B) delete() method 332002
(C) free() method 332003
(D) finalize() method 332004
Right Answer : Right Option Id : 332001
gc() method
Question 83 Question Id : 333
What contains the information associated with a specific process, such as its state, program counter, CPU registers, and I/O status?
Answer : Option Id
(A) Process Scheduler 333001
(B) Process Control Block 333002
(C) Memory Management Unit 333003
(D) System Control Block 333004
Right Answer : Right Option Id : 333002
Process Control Block
Question 84 Question Id : 334
What term refers to the portion of DML used specifically for retrieving information from a database?
Answer : Option Id
(A) Data Definition Language 334001
(B) Query Language 334002
(C) Data Manipulation Language 334003
(D) Structured Query Language 334004
Right Answer : Right Option Id : 334002
Query Language
Question 85 Question Id : 335
Which flag in the 8086 microprocessor is set when there is a carry from the lower nibble?
Answer : Option Id
(A) Auxiliary Carry Flag (AC) 335001
(B) Zero Flag (Z) 335002
(C) Parity Flag (P) 335003
(D) Sign Flag (S) 335004
Right Answer : Right Option Id : 335001
Auxiliary Carry Flag (AC)
Question 86 Question Id : 336
Which command does the parser use to request the next token from the lexical analyzer during the token identification process?
Answer : Option Id
(A) getToken() 336001
(B) fetchToken() 336002
(C) nextToken() 336003
(D) getNextToken() 336004
Right Answer : Right Option Id : 336004
getNextToken()
Question 87 Question Id : 337
Which sorting algorithm selects the smallest element from the remaining list and swaps it with the current element until the entire list is sorted?
Answer : Option Id
(A) Quick Sort 337001
(B) Merge Sort 337002
(C) Selection Sort 337003
(D) Bubble Sort 337004
Right Answer : Right Option Id : 337003
Selection Sort
Question 88 Question Id : 338
What is the time complexity of the Quick Sort algorithm in the average case?
Answer : Option Id
(A) O(n log n) 338001
2
(B) O(n ) 338002
(C) O(log n) 338003
(D) O(n) 338004
Right Answer : Right Option Id : 338001
O(n log n)
Question 89 Question Id : 339
Which error-detection technique appends redundant bits to a data unit, making it divisible by a predetermined binary number?
Answer : Option Id
(A) Parity Check 339001
(B) Checksum 339002
(C) Hamming Code 339003
(D) Cyclic Redundancy Check (CRC) 339004
Right Answer : Right Option Id : 339004
Cyclic Redundancy Check (CRC)
Question 90 Question Id : 340
Which type of attack involves intercepting and listening to messages exchanged between two entities, especially if the data is unencrypted?
Answer : Option Id
(A) Spoofing 340001
(B) Eavesdropping (tapping) 340002
(C) Man-in-the-Middle Attack 340003
(D) Phishing 340004
Right Answer : Right Option Id : 340002
Eavesdropping (tapping)
Question 91 Question Id : 341
In the context of lexical analysis, which function is used to install a lexeme (pointed to by yytext) into the symbol table and return a pointer to it?
Answer : Option Id
(A) installID0() 341001
(B) installNum() 341002
(C) installToken() 341003
(D) addSymbol() 341004
Right Answer : Right Option Id : 341001
installID0()
Question 92 Question Id : 342
What term refers to a sequence of characters in the source program that matches the pattern for a token and is identified by the lexical analyzer?
Answer : Option Id
(A) Lexeme 342001
(B) Token 342002
(C) Syntax 342003
(D) Identifier 342004
Right Answer : Right Option Id : 342001
Lexeme
Question 93 Question Id : 343
What term describes the execution of multiple smaller tasks within a single process, allowing the program to continue running even when some threads are blocked?
Answer : Option Id
(A) Parallel Processing 343001
(B) Concurrency 343002
(C) Task Scheduling 343003
(D) Multithreading 343004
Right Answer : Right Option Id : 343004
Multithreading
Question 94 Question Id : 344
What term refers to ensuring that a value in one relation corresponds to a valid value in another relation, maintaining consistency between related data?
Answer : Option Id
(A) Entity Integrity 344001
(B) Domain Integrity 344002
(C) Referential Integrity 344003
(D) Data Integrity 344004
Right Answer : Right Option Id : 344003
Referential Integrity
Question 95 Question Id : 345
What term is used to describe the transfer of data between computer registers, such as MAR, PC, and IR?
Answer : Option Id
(A) Instruction Execution 345001
(B) Register Transfer 345002
(C) Memory Access 345003
(D) Data Bus Communication 345004
Right Answer : Right Option Id : 345002
Register Transfer
Question 96 Question Id : 346
In the context of the theory of computation, what type of proof consists of a sequence of statements leading from a hypothesis to a conclusion based on their truth?
Answer : Option Id
(A) Inductive Proof 346001
(B) Deductive Proof 346002
(C) Proof by Contradiction 346003
(D) Constructive Proof 346004
Right Answer : Right Option Id : 346002
Deductive Proof
Question 97 Question Id : 347
Which sorting algorithm uses the divide-and-conquer method, dividing the array into smaller sub-arrays based on pivot elements and recursively sorting them?
Answer : Option Id
(A) Merge Sort 347001
(B) Quick Sort 347002
(C) Bubble Sort 347003
(D) Selection Sort 347004
Right Answer : Right Option Id : 347002
Quick Sort
Question 98 Question Id : 348
Which algorithm adds the cheapest edge and the node it leads to, provided the node is not already in the spanning tree?
Answer : Option Id
(A) Dijkstra's Algorithm 348001
(B) Prim's Algorithm 348002
(C) Kruskal's Algorithm 348003
(D) Bellman-Ford Algorithm 348004
markstoall
Question 99 Question Id : 349
What is the technique called where an acknowledgment (ACK) frame is included in the header of a data frame traveling in the same direction?
Answer : Option Id
(A) Sliding Window 349001
(B) Piggybacking 349002
(C) Full Duplexing 349003
(D) Frame Interleaving 349004
Right Answer : Right Option Id : 349002
Piggybacking
Question 100 Question Id : 350
What type of malware remains dormant until triggered by a specific event or activity, such as a date or the launch of a program?
Answer : Option Id
(A) Worm 350001
(B) Trojan Horse 350002
(C) Ransomware 350003
(D) Logic Bomb 350004
Right Answer : Right Option Id : 350004
Logic Bomb
Question 101 Question Id : 351
What represents an instantaneous description of a system in finite automata, containing all the necessary information to determine future behavior?
Answer : Option Id
(A) Transition 351001
(B) Input 351002
(C) State 351003
(D) Output 351004
Right Answer : Right Option Id : 351003
State
Question 102 Question Id : 352
Which keyword in Java is used as a reference variable to refer to the immediate parent class object?
Answer : Option Id
(A) super 352001
(B) this 352002
(C) parent 352003
(D) base 352004
Right Answer : Right Option Id : 352001
super
Question 103 Question Id : 353
In which scheduling method is the CPU assigned to a process and not released until that process finishes?
Answer : Option Id
(A) Preemptive Scheduling 353001
(B) Round-Robin Scheduling 353002
(C) Non-Preemptive Scheduling 353003
(D) Priority Scheduling 353004
Right Answer : Right Option Id : 353003
Non-Preemptive Scheduling
Question 104 Question Id : 354
What term is used for an attribute that can be split into smaller components?
Answer : Option Id
(A) Simple Attribute 354001
(B) Derived Attribute 354002
(C) Composite Attribute 354003
(D) Key Attribute 354004
Right Answer : Right Option Id : 354003
Composite Attribute
Question 105 Question Id : 355
Which instruction adds two decimal numbers in Binary Coded Decimal (BCD) format?
Answer : Option Id
(A) ADDI 355001
(B) ADDF 355002
(C) ADDD 355003
(D) SUBD 355004
Right Answer : Right Option Id : 355003
ADDD
Question 106 Question Id : 356
What is a key characteristic of a Deterministic Finite Automaton (DFA)?
Answer : Option Id
(A) It can have multiple ways to process the input string. 356001
(B) It reads the input string one symbol at a time and has only one unique way to process it. 356002
(C) It processes the input string using a probabilistic model. 356003
(D) It accepts or rejects the input string based on random decisions. 356004
Right Answer : Right Option Id : 356002
It reads the input string one symbol at a time and has only one unique way to process
it.
Question 107 Question Id : 357
Which search algorithm uses backtracking to explore all nodes along a path before moving to the next path?
Answer : Option Id
(A) Breadth First Search (BFS) 357001
(B) Dijkstra's Algorithm 357002
(C) A* Search 357003
(D) Depth First Search (DFS) 357004
Right Answer : Right Option Id : 357004
Depth First Search (DFS)
Question 108 Question Id : 358
Which method is used for problems like job sequencing with deadlines, minimum cost spanning trees, and the 0/1 knapsack problem?
Answer : Option Id
(A) Dynamic Programming 358001
(B) Greedy Method 358002
(C) Backtracking 358003
(D) Divide and Conquer 358004
markstoall
Question 109 Question Id : 359
What technique improves bandwidth utilization by allowing the sender to transmit multiple frames before waiting for an acknowledgment?
Answer : Option Id
(A) Sliding Window 359001
(B) Full Duplexing 359002
(C) Piggybacking 359003
(D) Pipelining 359004
Right Answer : Right Option Id : 359004
Pipelining
Question 110 Question Id : 360
What is the act of obtaining secrets and information without permission or knowledge of the holder, often for personal, economic, political, or military advantage?
Answer : Option Id
(A) Phishing 360001
(B) Hacking 360002
(C) Cyber Espionage 360003
(D) Ransomware 360004
markstoall
Question 111 Question Id : 361
Which statement is used to access all elements of the standard C++ library without prefixing them with std::?
Answer : Option Id
(A) #include <iostream> 361001
(B) #include <stdlib.h> 361002
(C) int main() 361003
(D) using namespace std; 361004
Right Answer : Right Option Id : 361004
using namespace std;
Question 112 Question Id : 362
What in Java is used as a blueprint for a class, has static constants and abstract methods, and is used to achieve abstraction and multiple inheritance?
Answer : Option Id
(A) Abstract Class 362001
(B) Enum 362002
(C) Class 362003
(D) Interface 362004
Right Answer : Right Option Id : 362004
Interface
Question 113 Question Id : 363
What term refers to the number of jobs completed by the CPU within a specific time period?
Answer : Option Id
(A) Waiting Time 363001
(B) Turnaround Time 363002
(C) Throughput 363003
(D) Response Time 363004
Right Answer : Right Option Id : 363003
Throughput
Question 114 Question Id : 364
What type of relationship occurs when one entity is associated with multiple entities of another type, and vice versa, such as students enrolling in many courses and courses having
many students?
Answer : Option Id
(A) One-to-One 364001
(B) One-to-Many 364002
(C) Many-to-One 364003
(D) Many-to-Many 364004
Right Answer : Right Option Id : 364004
Many-to-Many
Question 115 Question Id : 365
Which method for designing a control unit uses trigger points activated after gaps of one T-state, avoiding the inefficiency of multiple delay elements?
Answer : Option Id
(A) Delay Element Method 365001
(B) Microprogrammed Control Method 365002
(C) Sequence Counter Method 365003
(D) Hardwired Flowchart Method 365004
Right Answer : Right Option Id : 365003
Sequence Counter Method
Question 116 Question Id : 366
In the context of a Deterministic Finite Automaton (DFA), which of the following symbols represents the set of input symbols or alphabet?
Answer : Option Id
(A) Q 366001
(B) Σ 366002
(C) δ 366003
(D) F 366004
Right Answer : Right Option Id : 366002
Σ
Question 117 Question Id : 367
What function is used to place data into a hash table and retrieve it using the same function, returning an integer called the hash key?
Answer : Option Id
(A) Sorting Function 367001
(B) Comparison Function 367002
(C) Search Function 367003
(D) Hash Function 367004
Right Answer : Right Option Id : 367004
Hash Function
Question 118 Question Id : 368
What term refers to a closed loop in a graph that visits each vertex exactly once and returns to the starting point?
Answer : Option Id
(A) Eulerian Cycle 368001
(B) Hamiltonian Cycle 368002
(C) Spanning Tree 368003
(D) Directed Acyclic Graph 368004
Right Answer : Right Option Id : 368002
Hamiltonian Cycle
Question 119 Question Id : 369
Which system coordinates access to a shared communication network by allowing nodes to transmit data whenever available, handling collisions when they occur?
Answer : Option Id
(A) CSMA/CD 369001
(B) Token Ring 369002
(C) TDMA 369003
(D) ALOHA 369004
Right Answer : Right Option Id : 369004
ALOHA
Question 120 Question Id : 370
Which framework provides a flexible and cost-effective approach to managing cybersecurity risks and is authorized by a global certifying body?
Answer : Option Id
(A) NIST Compliance 370001
(B) ISO 27001 370002
(C) GDPR Framework 370003
(D) COBIT 370004
Right Answer : Right Option Id : 370001
NIST Compliance
Question 121 Question Id : 371
Which statement in the main function is used to indicate successful execution of a C++ program?
Answer : Option Id
(A) int main() 371001
(B) cout << 'Hello'; 371002
(C) return 0; 371003
(D) using namespace std; 371004
Right Answer : Right Option Id : 371003
return 0;
Question 122 Question Id : 372
What is a group of similar types of classes, interfaces, and sub-packages in Java, and can be either built-in or user-defined?
Answer : Option Id
(A) Java Interface 372001
(B) Java Package 372002
(C) Java Class 372003
(D) Java Module 372004
Right Answer : Right Option Id : 372002
Java Package
Question 123 Question Id : 373
What is the formula for calculating average response time in scheduling algorithms?
Answer : Option Id
(A) Completion Time - Arrival Time 373001
(B) First Response Time - Arrival Time 373002
(C) Turnaround Time - Arrival Time 373003
(D) Waiting Time - Completion Time 373004
markstoall
Question 124 Question Id : 374
What term refers to a set of one or more attributes that collectively allow us to uniquely identify a tuple in a relation?
Answer : Option Id
(A) Candidate Key 374001
(B) Superkey 374002
(C) Foreign Key 374003
(D) Primary Key 374004
Right Answer : Right Option Id : 374002
Superkey
Question 125 Question Id : 375
Which type of semiconductor memory uses chalcogenide glass to store data by changing its state between amorphous and polycrystalline?
Answer : Option Id
(A) DRAM 375001
(B) SRAM 375002
(C) Flash Memory 375003
(D) P-RAM 375004
Right Answer : Right Option Id : 375004
P-RAM