232 2023
232 2023
4. Name the technology that allows the CPU to access the entire GPU memory at once?
(A) Resizable BAR (B) Bounce Buffering
(C) DOCP (D) XMP
6. The certification used to rate the energy efficiency of computer power supplies?
(A) VESA (B) 80 plus
(C) ROHS (D) CE
7. Which of the following is a system requirement for providing security against the firmware
attacks?
(A) TPM (B) DIMM
(C) SIMM (D) ETM
A 3
[P.T.O.]
8. Which cache replacement policy keeps track of the page usage in the last clock interval?
(A) LRU (B) NRU
(C) NFU (D) LFU
9. What is the least dense, and fastest type of cell technology used in flash modules for SSDs?
(A) SLC (B) MLC
(C) TLC (D) QLC
12. A hash table implemented using an array contains 10 buckets and uses linear probing to
resolve collisions. The key values are integers, and the hash function used is key % 10. If the
values 100, 23, 45, 2, 13, 33 are inserted in the table, in what location would the key value
33 be inserted?
(A) 3 (B) 4
(C) 5 (D) 6
13. For a Binary Search Tree, the result of postorder traversal is: 2, 1, 4, 3, 6, 8, 7, 5. The label of
the node which is farthest from the root is
(A) 2 (B) 4
(C) 5 (D) 8
14. Which of the following statements about symbols table and two-pass assembler is true?
(A) A symbol table is generated in the first pass
(B) A symbol table is generated in the second pass
(C) Only single-pass assemblers require a symbol table
(D) Only compilers require a symbol table and not assemblers
232/2023 4 A
15. How many tokens will be generated by the lexical analyzer of a C compiler for the following
statement?
x = x ∗ (a + b) − 5 ;
(A) 6 (B) 11
(C) 12 (D) 5
16. Which of the following C library functions will not invoke a system call when executed from a
process in a UNIX/Linux operating system?
P . exit
Q . malloc
R . strlen
(A) All of the above (B) R only
(C) Q and R (D) P and R
17. What does the term “Compaction” in Operating Systems refers to?
(A) A technique for arranging processes in ready state for execution
(B) A technique for dealing with external fragmentation problem in memory
(C) A technique for dealing with internal fragmentation problem in memory
(D) A technique for reducing the size of memory pages
18. What is the maximum file size limit for the FAT32 file system?
(A) 2 GB (B) 4 GB
(C) 16 GB (D) 32 GB
19. What is the difference between a hard link and a symbolic link with respect to a file?
(A) A hard link is a pointer to a file, while a symbolic link is a copy of a file
(B) A hard link can be created for directories, while a symbolic link cannot be created
for directories
(C) A hard link can only point to files on the same volume, while a symbolic link can
point to files on any volume
(D) All of the above
20. Which platform allows for the development of cross-platform mobile applications?
(A) AndroidX (B) RubyCross
(C) React Native (D) Swift
A 5 232/2023
[P.T.O.]
21. SQL query for finding the Cartesian product of relations R and S :
(A) Select all column from R, S
(B) Select * from R, S
(C) Select all columns from R natural join B
(D) Select * from R full outer join S
27. If a schedule S can be transformed into a schedule S ' by a series of swaps of non-conflicting
instructions, then S and S ' are
(A) Conflict equivalent (B) Non conflict equivalent
(C) Equal (D) Isolation equivalent
232/2023 6 A
28. Which one is not a recovery technique?
(A) Deferred Update (B) Immediate update
(C) Two Phase commit (D) Caching
31. For the kind of glass used in optic fibers, which formula calculates the attenuation of light
through fiber in decibels?
received power transmitted power
(A) 10 log10 (B) 100 log 2
transmitted power received power
transmitted power transmitted power
(C) 10 log10 (D) 2 log 10
received power received power
32. A 1000- bit block of data is to be transmitted between two computers. Determine the ratio of
the propagation delay to the transmission delay, a, for 12 km of coaxial cable and the
transmission rate is 10 Mbps. (Assume that the velocity of propagation of an electrical signal
within a cable is 2 × 108 ms-1)
(A) 5 × 10-2 (B) 6 × 10-2
(C) 6 × 10-5 (D) 6 × 10-1
34. Which generation of network is supposed to enable streaming multimedia, HDTV content,
Digital Video Broadcasting and ultra-broadband in Internet access?
(A) 5G (B) 4G
(C) 3G (D) 2G
A 7 232/2023
[P.T.O.]
35. Which frame is used in IEEE 802.11 standard to determine whether the station knows the
secret key of the authentication scheme being used?
(A) Challenge frame (B) Super frames
(C) Beacon frames (D) None of the above
37. Which of the following statements is / are correct about Bluetooth technology?
(i) Bluetooth network configuration called a piconet, consists of a master device and up to
7 slave devices.
(ii) Only the master can start to transmit in even-numbered slots and slave can start to
transmit in an odd-numbered slots.
(iii) A slave device can be parked; All parked slaves have a 16-bit Parked Member Address
(PMA).
(iv) Bluetooth operates in an unlicensed radio band at 2.45 GHz in a Time Division
Multiplexing manner.
(A) Only (ii) and (iii)
(B) Only (i) and (iv)
(C) All of the above (i), (ii), (iii) and (iv)
(D) Only (i) and (iii)
38. The Global Positioning system (24 GPS) is an example for which orbit satellite?
(A) Geostationary satellite (B) Low-Earth Orbit satellite
(C) Medium-Earth Orbit satellite (D) None of the above
39. In multimode stepped index fiber, the dispersion can be reduced by using :
(A) A core material that has a constant refractive index
(B) A core material that has a variable refractive index
(C) A cladding material that has a constant refractive index
(D) A cladding material that has a variable refractive index
232/2023 8 A
40. To increase the capacity of 5G base stations, they need to consider the factors such as a large
number of base stations, more spectrum and an increased spectral efficiency per cell;
meaning it has the principle of massive MIMO. The MIMO stands for
(A) Massive In Massive Out (B) Many Input Many Output
(C) Multiple In Multiple Out (D) Multiple Input Multiple Output
41. Poor performance of a machine learning model on both training and testing data indicates
which of the following?
(A) Overfitting (B) Variance
(C) Underfitting (D) Regularization
42. Which of the following is not true about Gradient Descent technique in machine learning?
(A) It is used when there is no analytical solution
(B) It is used to reach the maximum of the cost function
(C) It is used when the hypothesis space contains continuously parameterized
hypotheses
(D) It is an iterative optimization algorithm
44. Which of the following are true about Principal Component Analysis (PCA)?
(i) PCA minimizes the sum of squares of projection errors
(ii) It is an unsupervised method
(iii) It is a feature extraction method
(iv) PCA works when the data lies in a linear subspace
(A) (i), (ii) and (iii) (B) (i), (iii) and (iv)
(C) (ii) and (iii) (D) (i), (ii), (iii) and (iv)
A 9 232/2023
[P.T.O.]
46. What is the activation function represented by this equation : f (x ) = max (0, x )
(A) ReLu (B) Sigmoid
(C) Gaussion (D) Softmax
50. Who among the following created the large language model PaLM2?
(A) Google (B) OpenAI
(C) Microsoft (D) Meta
52. The streaming protocol designed for real-time communication and commonly used for video
conferencing and VoIP applications :
(A) SIP (B) HTTP
(C) RTSP (D) HLS
232/2023 10 A
53. –––––––––––– is the port number associated with SSH.
(A) 20 (B) 22
(C) 21 (D) 23
55. For an organization that has been allocated the IP address range 12.0.0.0/8 and intends to
establish 100 subnets, what subnet mask is required for this division?
(A) 255.0.0.0 (B) 255.100.0.0
(C) 255.254.0.0 (D) 255.240.0.0
A 11 232/2023
[P.T.O.]
60. The WAN technology that is known for its use of a permanent, dedicated connection,
typically offering consistent bandwidth and low latency
(A) DHCP (B) VPN
(C) Leased Line (D) MPLS
64. Which CSS property is used to make text appear in uppercase letters?
(A) ‘transform: uppercase;’ (B) ‘text-transform: uppercase;’
(C) ‘text-case: uppercase;’ (D) ‘uppercase: true;’
65. Which built-in method is used to display a dialog box with a specified message and an “OK”
button in JavaScript?
(A) alert( ) (B) prompt( )
(C) confirm( ) (D) display()
66. How can one include an external JavaScript file in an HTML document?
(A) Using the ‘<style>’ tag
(B) Using the ‘<script>’ tag with the ‘src’ attribute
(C) Using the ‘<link>’ tag
(D) Using the ‘<external>’ tag
232/2023 12 A
67. What is the primary use of JSON?
(A) To define HTML structure
(B) To create dynamic web pages
(C) To exchange data between a server and a client
(D) To add interactivity to a webpage
69. Which HTTP method is idempotent, meaning that multiple identical requests have the same
effect as a single request?
(A) GET (B) POST
(C) PUT (D) DELETE
70. What status code does a web server typically respond with when a requested resource is not
found?
(A) 200 OK (B) 302 Found
(C) 404 Not Found (D) 500 Internal Server Error
71. Which network security principle focuses on ensuring that each user is granted only the
permissions and access needed to perform their job functions?
(A) Least privilege (B) Defense in depth
(C) Redundancy (D) Encryption
72. In risk analysis, which of the following factors is considered in the assessment phase?
(A) Vulnerabilities and threats
(B) Security policies and procedures
(C) Network topology and architecture
(D) Incident response plan
A 13 232/2023
[P.T.O.]
73. Which type of firewall operates at the application layer of the OSI model, making filtering
decisions based on the content of the traffic?
(A) Packet filtering firewall (B) Stateful firewall
(C) Application layer firewall (D) Proxy firewall
74. Why is Unified Threat Management (UTM) considered a comprehensive security solution for
modern networks?
(A) Because UTM devices integrate various security features like firewall, antivirus,
intrusion detection, VPN, and more into a single device, simplifying management
and improving security posture
(B) Because UTM devices have faster processing capabilities than other firewall
types, allowing them to handle higher traffic loads
(C) Because UTM devices offer specialized protection for specific applications, making
them highly targeted and effective against advanced threats
(D) Because UTM devices are standalone security appliances that do not require
regular updates or maintenance
77. When conducting a forensic investigation, which step is typically performed first?
(A) Collection of evidence
(B) Preservation of evidence
(C) Analysis of evidence
(D) Identification of potential digital evidence sources
232/2023 14 A
78. Why is regular patch management crucial in server hardening?
(A) To increase system complexity
(B) To fix vulnerabilities and bugs
(C) To lower security awareness
(D) To decrease system stability
79. How does an application layer firewall differ from a packet filtering firewall in terms of
functionality and security?
(A) Application layer firewalls operate at a higher layer of the OSI model and analyze
traffic content, while packet filtering firewalls operate at lower layers and filter
based on headers
(B) Application layer firewalls primarily filter based on packet headers, while packet
filtering firewalls inspect packet contents for security decisions
(C) Application layer firewalls provide faster performance compared to packet
filtering firewalls due to their specialized hardware
(D) Application layer firewalls are less secure than packet filtering firewalls due to
their limited access control capabilities
80. Which of the following is a key feature of an effective endpoint security solution?
(A) Centralized management and monitoring
(B) Biometric authentication only
(C) External device blocking without exceptions
(D) Limited scalability for small organizations
81. Which of the following is not an essential characteristic defined by the NIST model of cloud
computing?
(A) Measured Usage (B) Resiliency
(C) Ubiquitous Access (D) Elasticity
83. How does Application Service Provider (ASP) differ from Software-as-a-Service (SaaS)?
(A) ASP supports multi-tenancy
(B) Customization is easier in ASP
(C) Applications are not scalable in ASP
(D) Both (A) and (B)
A 15 232/2023
[P.T.O.]
84. The –––––––––––– model provides all hardware components in virtual mode, such as a
virtual processor, virtual storage, virtual switches, etc.
(A) IaaS (B) PaaS
(C) SaaS (D) Desktop-as-a-Service
85. The hypervisor used in the bare metal approach for machine virtualization is called
(A) Type 1 hypervisor (B) Type 2 hypervisor
(C) Hosted hypervisor (D) Both (B) and (C)
86. Which one of the following virtualization techniques provides a high level of security?
(A) Hardware-Assisted Virtualization
(B) Full Virtualization
(C) Para-Virtualization
(D) OS-Assisted Virtualization
87. The guest operating system plays an important role in which of the following virtualization
techniques?
(A) Hardware-Assisted Virtualization (B) Full Virtualization
(C) Para-Virtualization (D) Native Virtualization
88. Which of the following is not a Database-as-a-Service (DBaaS) offered by Amazon Web
Services (AWS)?
(A) SimpleDB (B) Amazon RDS
(C) DocumentDB (D) DynamoDB
232/2023 16 A
90. Identify the correct service offerings on Google Cloud.
(i) IaaS (1) Google App Engine
(ii) PaaS (2) Google Drive
(iii) SaaS (3) Google Compute Engine
(A) (i)-(1), (ii)-(3), (iii)-(2)
(B) (i)-(3), (ii)-(1), (iii)-(2)
(C) (i)-(3), (ii)-(2), (iii)-(1)
(D) (i)-(2), (ii)-(3), (iii)-(1)
94. Which among the following is not true about Hard Fork in Ethereum?
(A) A hard fork is creating new rules to improve the existing protocol
(B) All Ethereum clients need not upgrade during hard work
(C) A hard fork which makes previously invalid blocks/transactions valid, or
vice-versa
(D) A hard fork is not backwards compatible
A 17 232/2023
[P.T.O.]
95. What is Bitcoin Mining?
(A) Validating the bitcoin transactions over the Bitcoin network
(B) Collecting bitcoin transactions over the Bitcon network
(C) Adding bitcoin to your account over the Bitcoin network
(D) Accessing bitcoin transactions over the Bitcoin network
98. Which among the following is not true about Apache Hadoop?
(A) Open source software (B) Supports distributed computing
(C) Supports centralized computing (D) Reliable and Scalable
232/2023 18 A
SPACE FOR ROUGH WORK
A 19 232/2023
[P.T.O.]
SPACE FOR ROUGH WORK
232/2023 20 A