0% found this document useful (0 votes)
20 views

FinalModelQuestionCumAnsKey_ComputerScience

The document is a question paper for a Computer Science exam scheduled for January 19, 2025, covering various topics including energy consumption in India, mathematical problems, and general knowledge questions. It consists of multiple-choice questions with passages and scenarios to analyze, focusing on data interpretation, problem-solving, and reasoning skills. Each question is followed by the correct answer options, indicating the expected knowledge level of the examinees.

Uploaded by

Yashwanth Yash
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

FinalModelQuestionCumAnsKey_ComputerScience

The document is a question paper for a Computer Science exam scheduled for January 19, 2025, covering various topics including energy consumption in India, mathematical problems, and general knowledge questions. It consists of multiple-choice questions with passages and scenarios to analyze, focusing on data interpretation, problem-solving, and reasoning skills. Each question is followed by the correct answer options, indicating the expected knowledge level of the examinees.

Uploaded by

Yashwanth Yash
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

QUESTION PAPER

Computer Science [SHIFT - 1]

Exam Date : 19/01/2025 Time : 10:00 AM - 12:00 PM

Part I - Aptitude

Question 1 Question Id : 251


Directions: Study the following passage to answer the question that follows.

Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.

Which of the following styles has been adopted by the author in writing the passage?
Answer : Option Id
(A) Data-based, objective, positive, solution-oriented 251001
(B) Data-based, but coloured by socialism 251002
(C) Highly subjective with bias for poor people 251003
(D) Objective, descriptive, lacking clarity 251004

Right Answer : Right Option Id : 251001


Data-based objective positive solution-oriented

Question 2 Question Id : 252


Directions: Study the following passage to answer the question that follows.

Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.

The author feels that increasing per capita use of energy is


Answer : Option Id
(A) not at all desirable. 252001
(B) a matter of meticulous planning. 252002
(C) not easy but certainly achievable. 252003
(D) rather difficult, but not impossible. 252004

Right Answer : Right Option Id : 252002


a matter of meticulous planning.

Question 3 Question Id : 253


Directions: Study the following passage to answer the question that follows.

Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.

Which of the following statements is true?


Answer : Option Id
(A) Industrial sector uses 50% of total energy used in India. 253001
(B) Energy consumption in India is 26% of world consumption. 253002
(C) The household sector has shown considerable increase in energy use. 253003
(D) Use of oil has increased from 40% to 80%. 253004

Right Answer : Right Option Id : 253001


Industrial sector uses 50% of total energy used in India.

Question 4 Question Id : 254


Directions: Study the following passage to answer the question that follows.

Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.

Which of the following has been suggested by the author as the best possible solution to overcome energy crisis?
Answer : Option Id
(A) Exploration of oil reserves 254001
(B) Maximization of renewable sources 254002
(C) Importing large quantities of coal 254003
(D) Reducing share of bulk users 254004

Right Answer : Right Option Id : 254002


Maximization of renewable sources

Question 5 Question Id : 255


Directions: Study the following passage to answer the question that follows.

Passage
In terms of the total energy consumed, the largest consumer is understandably the industrial sector which accounts for nearly half the total energy used in the country today. This is
followed by the transport sector which consumes about 25%, the household sector (about 14%) and the agricultural sector (about 9%), in that order. This last sector has shown
considerable increase in energy use over the last four decades. Among the primary fuels, the relative proportion of coal has dropped from nearly 80% to 40% and that of oil has gone
up from 17% to 44% over the same period.
Total consumption of energy in India today is equivalent to 291 million tons of oil. Of this 26% comes from wood. On a per capita basis it works out to about one litre of oil per day,
which is extremely low by international standards. The future energy demand depends upon the level of development envisaged and also on the sections of people affected by it.
There is clearly no escape from the utilisation of renewable energy sources in a big way if the gap between the desired levels of energy supply and available resources has to be kept
at the minimum.

Which of the following has been mentioned as a major hurdle in enhancing per capita consumption of energy in India?
Answer : Option Id
(A) Present level of development in India. 255001
(B) International norm of 1 litre of oil per day per person. 255002
(C) Disparity in use of energy in rural and urban areas. 255003
(D) None of these 255004

Right Answer : Right Option Id : 255004


None of these

Question 6 Question Id : 256


A Cricket team travelled by bus at 50 km per hour for 3 hours and 17 minutes. Then due to some fault in the bus, they decided to travel the remaining distance to reach their
destination by train which also took 3 hours 17 minutes. If the speed of the train is 60 km/hour, the average speed of the whole journey is _________.
Answer : Option Id
(A) 35 km/hr. 256001
(B) 45 km/hr. 256002
(C) 55 km/hr. 256003
(D) 50 km/hr. 256004

Right Answer : Right Option Id : 256003


55 km/hr.

Question 7 Question Id : 257


A and B can separately do a piece of work in 20 and 15 days respectively. They worked together for 6 days, after which B was replaced by C. If the work was finished in next 4 days,
then the number of days in which C alone could do the work will be __________.
Answer : Option Id
(A) 60 days 257001
(B) 40 days 257002
(C) 35 days 257003
(D) 30 days 257004

Right Answer : Right Option Id : 257002


40 days

Question 8 Question Id : 258


Three girls are aged 2 years, 4 years and 8 years. They want to divide seventy rupees in the ratio of their ages. How much money would each get?
Answer : Option Id
(A) Rs.15, Rs.20, Rs.35 258001
(B) Rs.12, Rs.22, Rs.36 258002
(C) Rs.16, Rs.24, Rs.30 258003
(D) Rs.10, Rs.20, Rs.40 258004

Right Answer : Right Option Id : 258004


Rs.10 Rs.20 Rs.40

Question 9 Question Id : 259


While selling an electric fan, a dealer gives a discount of 5%. If he gives a discount of 8%, he earns Rs.36 less as profit. The marked price of the fan is _________.
Answer : Option Id
(A) Rs.1000 259001
(B) Rs.1200 259002
(C) Rs.800 259003
(D) Rs.600 259004

Right Answer : Right Option Id : 259002


Rs.1200

Question 10 Question Id : 260


The number of two-digit numbers which on being reversed (i.e., their digits exchanged the position) gives out perfect square two-digit numbers is/are __________.
Answer : Option Id
(A) 6 260001
(B) 4 260002
(C) 1 260003
(D) 10 260004

Right Answer : Right Option Id : 260001


6

Question 11 Question Id : 261


Find the odd one out.
F9G, G8H, H7I, I6J, I5K, K4L
Answer : Option Id
(A) G8H 261001
(B) I5K 261002
(C) I6J 261003
(D) K4L 261004

Right Answer : Right Option Id : 261002


I5K

Question 12 Question Id : 262


Seema is married to Vidu. Vidu is the brother-in-law of Amrita. Lokesh who is son of Vidu is a male cousin of Mukesh. Amit is the father of Seema’s only sister Amrita’s son. How is
Lokesh related to Amit?
Answer : Option Id
(A) Father-in-law 262001
(B) Brother-in-law 262002
(C) Nephew 262003
(D) Can’t be determined 262004

Right Answer : Right Option Id : 262004


Can’t be determined

Question 13 Question Id : 263


In a certain code, MOBILE is written as OMIBEL. How is TELEVISION written in that code?
Answer : Option Id
(A) ETELVIISNO 263001
(B) ETELVIISON 263002
(C) ETELIVISNO 263003
(D) ETLEVIISON 263004

Right Answer : Right Option Id : 263003


ETELIVISNO

Question 14 Question Id : 264


The present ages of A and B are in the ratio of 9:4. Seven years hence, the ratio of their ages will be 5:3. Find the present ages of A and B?
Answer : Option Id
(A) 18 and 8 264001
(B) 27 and 12 264002
(C) 45 and 20 264003
(D) 36 and 16 264004

Right Answer : Right Option Id : 264001


18 and 8

Question 15 Question Id : 265


In the last election, the ruling party got 55% of the total valid votes cast. 20% of the votes cast were invalid. If the total number of votes cast was 7500, what is the number of valid
votes that the other parties got?
Answer : Option Id
(A) 2250 265001
(B) 2700 265002
(C) 2750 265003
(D) 2800 265004

Right Answer : Right Option Id : 265002


2700

Question 16 Question Id : 266


Which of the following is a physical change?
Answer : Option Id
(A) Oxidation 266001
(B) Reduction 266002
(C) Sublimation 266003
(D) Decomposition 266004

Right Answer : Right Option Id : 266003


Sublimation

Question 17 Question Id : 267


Which of the following places in India is known as Jain Temple City?
Answer : Option Id
(A) Girnar 267001
(B) Varanasi 267002
(C) Prayagraj 267003
(D) None of these 267004

Right Answer : Right Option Id : 267001


Girnar
Question 18 Question Id : 268
Mahatma Gandhi started Satyagraha movement in 1919 in protest against the
Answer : Option Id
(A) Simon Commission. 268001
(B) Champaran wrongs. 268002
(C) proposed Rowlatt Act. 268003
(D) colonial exploitation of India. 268004

Right Answer : Right Option Id : 268003


proposed Rowlatt Act.

Question 19 Question Id : 269


Who appoints/elects the Chairman of Public Accounts Committee (PAC) of the Parliament?
Answer : Option Id
(A) Union Cabinet of India 269001
(B) Speaker of Lok Sabha 269002
(C) President of India 269003
(D) Members of PAC 269004

Right Answer : Right Option Id : 269002


Speaker of Lok Sabha

Question 20 Question Id : 270


In which of the following banks one cannot open a personal account?
Answer : Option Id
(A) Commercial Bank 270001
(B) Cooperative Bank 270002
(C) Scheduled Bank 270003
(D) Reserve Bank of India 270004

Right Answer : Right Option Id : 270004


Reserve Bank of India

Question 21 Question Id : 271


Directions: Study the following information and answer the question that follows.

In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.

In a day, how many units of machine component Q can be completed?


Answer : Option Id
(A) 20 271001
(B) 30 271002
(C) 40 271003
(D) 50 271004

Right Answer : Right Option Id : 271004


50

Question 22 Question Id : 272


Directions: Study the following information and answer the question that follows.

In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.

If 20 units of component Q are made in a day, how many units of component P can be made in the same day?
Answer : Option Id
(A) 10 272001
(B) 20 272002
(C) 40 272003
(D) 45 272004

Right Answer : Right Option Id : 272004


45

Question 23 Question Id : 273


Directions: Study the following information and answer the question that follows.

In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.

If 10 units of component P are made in a day, how many units of component Q can be made in the same day?
Answer : Option Id
(A) 45 273001
(B) 30 273002
(C) 17 273003
(D) 50 273004

Right Answer : Right Option Id : 273001


45

Question 24 Question Id : 274


Directions: Study the following information and answer the question that follows.

In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.

If one more Welding tool is added and 30 units of component Q are made in a day, how many units of component P can be made?
Answer : Option Id
(A) 10 274001
(B) 5 274002
(C) 2 274003
(D) 0 274004

Right Answer : Right Option Id : 274004


0

Question 25 Question Id : 275


Directions: Study the following information and answer the question that follows.

In a custom component making unit, two machine components P and Q are made using three different types of tools – for pressing, cutting and welding. The unit has 6 Presses, 10
Cutters and 5 Welding tools, all working for 10 hours a day.
One unit of part P needs 40 minutes on Press, 2 hours on Cutter, and 30 minutes on a Welding tool for its completion. Similarly, one unit of part Q needs 1 hour on Press, 30 minutes
on Cutter and 1 hour on Welding tool for its completion.

If only component Q is to be made, which type of single tool should be bought, so that there is a maximum increase in production capacity?
Answer : Option Id
(A) Press 275001
(B) Cutter 275002
(C) Welding tool 275003
(D) Any one 275004

Right Answer : Right Option Id : 275003


Welding tool

Part II - Technical

Question 26 Question Id : 276


Which method allows for continuous changes and is widely adopted for remote or distributed work?
Answer : Option Id
(A) Agile Method 276001
(B) Waterfall Method 276002
(C) Lean Method 276003
(D) Six Sigma 276004

Right Answer : Right Option Id : 276001


Agile Method

Question 27 Question Id : 277


What is a mathematical model for data types defined by their behavior and operations, rather than their implementation details?
Answer : Option Id
(A) Abstract Data Type (ADT) 277001
(B) Primitive Data Type 277002
(C) Composite Data Type 277003
(D) Object-Oriented Data Type 277004

Right Answer : Right Option Id : 277001


Abstract Data Type (ADT)

Question 28 Question Id : 278


What is an algorithm?
Answer : Option Id
(A) A programming language 278001
(B) A set of steps to complete a task 278002
(C) A type of software 278003
(D) A machine instruction 278004

Right Answer : Right Option Id : 278002


A set of steps to complete a task

Question 29 Question Id : 279


Which layer is responsible for controlling the operation of the subnet and managing packet routing in a network?
Answer : Option Id
(A) The Network Layer 279001
(B) The Transport Layer 279002
(C) The Data Link Layer 279003
(D) The Application Layer 279004

Right Answer : Right Option Id : 279001


The Network Layer

Question 30 Question Id : 280


What is the attack called where data is introduced into a DNS resolver's cache, causing it to return incorrect IP addresses and divert traffic?
Answer : Option Id
(A) DNS Spoofing 280001
(B) Phishing 280002
(C) Man-in-the-Middle Attack 280003
(D) IP Spoofing 280004

Right Answer : Right Option Id : 280001


DNS Spoofing

Question 31 Question Id : 281


What is a group of objects sharing common properties for data and program parts called in object-oriented programming?
Answer : Option Id
(A) Object 281001
(B) Method 281002
(C) Class 281003
(D) Attribute 281004

Right Answer : Right Option Id : 281003


Class
Question 32 Question Id : 282
What term refers to the process in which a method in Java calls itself continuously?
Answer : Option Id
(A) Recursion 282001
(B) Iteration 282002
(C) Exception Handling 282003
(D) Polymorphism 282004

Right Answer : Right Option Id : 282001


Recursion

Question 33 Question Id : 283


Which systems tolerate missed deadlines with degraded performance, rather than causing a disaster?
Answer : Option Id
(A) Hard Real-Time Systems 283001
(B) Embedded Systems 283002
(C) Time-Sharing Systems 283003
(D) Soft Real-Time Systems 283004

Right Answer : Right Option Id : 283004


Soft Real-Time Systems

Question 34 Question Id : 284


What term refers to a collection of related data items organized to represent meaningful information?
Answer : Option Id
(A) Field 284001
(B) Record 284002
(C) File 284003
(D) Tuple 284004

Right Answer : Right Option Id : 284002


Record

Question 35 Question Id : 285


Which type of computer is the smallest general-purpose processing system and includes desktops and portables?
Answer : Option Id
(A) Microcomputers 285001
(B) Mainframe Computers 285002
(C) Supercomputers 285003
(D) Minicomputers 285004

Right Answer : Right Option Id : 285001


Microcomputers

Question 36 Question Id : 286


What are the four practices of integrating design thinking in strategic innovation?
Answer : Option Id
(A) Reviewing, Simulating, Conversing, Collaborating 286001
(B) Designing, Prototyping, Testing, Implementing 286002
(C) Planning, Developing, Analyzing, Feedback 286003
(D) Ideating, Reflecting, Communicating, Collaborating 286004

Right Answer : Right Option Id : 286001


Reviewing Simulating Conversing Collaborating

Question 37 Question Id : 287


Which type of data structure uses pointers or links to associate elements sequentially, allowing dynamic memory allocation and flexible operations?
Answer : Option Id
(A) Array 287001
(B) Linked Lists 287002
(C) Stack 287003
(D) Queue 287004

Right Answer : Right Option Id : 287002


Linked Lists

Question 38 Question Id : 288


Which term refers to a high-level description of an algorithm, more structured than plain English but less detailed than a program?
Answer : Option Id
(A) Flowchart 288001
(B) Program 288002
(C) Pseudocode 288003
(D) Algorithm 288004

Right Answer : Right Option Id : 288003


Pseudocode

Question 39 Question Id : 289


Which layer is responsible for breaking data into smaller units, ensuring error-free delivery, and isolating upper layers from hardware changes?
Answer : Option Id
(A) The Network Layer 289001
(B) The Data Link Layer 289002
(C) The Transport Layer 289003
(D) The Application Layer 289004

Right Answer : Right Option Id : 289003


The Transport Layer

Question 40 Question Id : 290


Which type of attack uses a trial-and-error method to generate multiple guesses to obtain sensitive data like passwords?
Answer : Option Id
(A) Phishing 290001
(B) Brute Force 290002
(C) DNS Spoofing 290003
(D) Social Engineering 290004

Right Answer : Right Option Id : 290002


Brute Force

Question 41 Question Id : 291


What term refers to the stage where participants build and experiment with an idea, conduct surveys, and use tools like journey mapping to improve the design?
Answer : Option Id
(A) Testing 291001
(B) Prototype 291002
(C) Ideation 291003
(D) Implementation 291004

Right Answer : Right Option Id : 291002


Prototype

Question 42 Question Id : 292


What keyword in Java is used for memory management and belongs to the class rather than an instance of the class?
Answer : Option Id
(A) Final 292001
(B) Static 292002
(C) Abstract 292003
(D) Synchronized 292004

Right Answer : Right Option Id : 292002


Static
Question 43 Question Id : 293
What is the process that involves monitoring and managing errors in a system to prevent malfunctioning?
Answer : Option Id
(A) Debugging 293001
(B) Exception Handling 293002
(C) Fault Tolerance 293003
(D) Error Handling 293004

Right Answer : Right Option Id : 293004


Error Handling

Question 44 Question Id : 294


What is the highest level of abstraction in a database system, which describes only part of the database to simplify user interaction?
Answer : Option Id
(A) View Level 294001
(B) Logical Level 294002
(C) Physical Level 294003
(D) Conceptual Level 294004

Right Answer : Right Option Id : 294001


View Level

Question 45 Question Id : 295


Which type of computer is characterized by extremely large storage capacity, very high computing speeds, and is used for tasks like weather analysis?
Answer : Option Id
(A) Minicomputer 295001
(B) Microcomputer 295002
(C) Mainframe Computer 295003
(D) Supercomputer 295004

Right Answer : Right Option Id : 295004


Supercomputer

Question 46 Question Id : 296


According to the Theory of Thinking Modes, which thinking mode involves separating things from visible relationships in processes and production?
Answer : Option Id
(A) Analytical Thinking 296001
(B) Judicial Thinking 296002
(C) Synthetic Thinking 296003
(D) Critical Thinking 296004

Right Answer : Right Option Id : 296001


Analytical Thinking

Question 47 Question Id : 297


In a linked list, what does the pointer variable 'head' typically store?
Answer : Option Id
(A) The data value of the first node 297001
(B) The address of the last node 297002
(C) The total number of nodes in the list 297003
(D) The address of the first node 297004

Right Answer : Right Option Id : 297004


The address of the first node

Question 48 Question Id : 298


What term refers to the amount of memory an algorithm needs to complete its execution?
Answer : Option Id
(A) Time Complexity 298001
(B) Performance Evaluation 298002
(C) Algorithm Efficiency 298003
(D) Space Complexity 298004

Right Answer : Right Option Id : 298004


Space Complexity

Question 49 Question Id : 299


Which layer in the TCP/IP model is responsible for connecting the host to the network to send IP packets?
Answer : Option Id
(A) The Transport Layer 299001
(B) The Application Layer 299002
(C) The Network Layer 299003
(D) The Host-to-Network Layer 299004

markstoall

Question 50 Question Id : 300


Which type of malicious program disguises itself as a normal application but executes harmful code in the background when opened?
Answer : Option Id
(A) Ransomware 300001
(B) Spyware 300002
(C) Trojan Horse 300003
(D) Worm 300004

Right Answer : Right Option Id : 300003


Trojan Horse

Question 51 Question Id : 301


What is the process of wrapping up data and functions into a single unit in object-oriented programming called?
Answer : Option Id
(A) Data Encapsulation 301001
(B) Data Abstraction 301002
(C) Data Hiding 301003
(D) Data Integration 301004

Right Answer : Right Option Id : 301001


Data Encapsulation

Question 52 Question Id : 302


What are the modifiers in Java that specify the accessibility (scope) of a data member, method, constructor, or class?
Answer : Option Id
(A) Non-access Modifiers 302001
(B) Access Modifiers 302002
(C) Static Modifiers 302003
(D) Final Modifiers 302004

Right Answer : Right Option Id : 302002


Access Modifiers

Question 53 Question Id : 303


Which program in Linux acts as an interpreter to execute operating system commands and perform various operations?
Answer : Option Id
(A) Kernel 303001
(B) Terminal 303002
(C) Shell 303003
(D) GUI 303004

Right Answer : Right Option Id : 303003


Shell
Question 54 Question Id : 304
What term refers to the overall design of a database, which changes infrequently and defines the structure and types of data?
Answer : Option Id
(A) Instance 304001
(B) Schemas 304002
(C) Tables 304003
(D) Records 304004

Right Answer : Right Option Id : 304002


Schemas

Question 55 Question Id : 305


Which storage medium is an example of secondary memory used for storing large amounts of data and programs?
Answer : Option Id
(A) RAM 305001
(B) Cache Memory 305002
(C) Floppies 305003
(D) Registers 305004

Right Answer : Right Option Id : 305003


Floppies

Question 56 Question Id : 306


According to the Theory of Thinking Modes, which thinking mode focuses on combining ideas and concepts to create new processes or combinations?
Answer : Option Id
(A) Analytical Thinking 306001
(B) Judicial Thinking 306002
(C) Synthetic Thinking 306003
(D) Logical Thinking 306004

Right Answer : Right Option Id : 306003


Synthetic Thinking

Question 57 Question Id : 307


Which data structure follows the Last-In-First-Out (LIFO) principle, where elements are pushed and popped, and may experience overflow or underflow?
Answer : Option Id
(A) Queue 307001
(B) Stack 307002
(C) Linked List 307003
(D) Array 307004

Right Answer : Right Option Id : 307002


Stack

Question 58 Question Id : 308


What term describes the highest degree term of a formula for running time, focusing on how the running time grows as the input size increases?
Answer : Option Id
(A) Order of Growth 308001
(B) Time Complexity 308002
(C) Space Complexity 308003
(D) Execution Time 308004

Right Answer : Right Option Id : 308001


Order of Growth

Question 59 Question Id : 309


Which type of media provides a physical conduit for signals between devices and includes twisted-pair cable, coaxial cable, and fiber-optic cable?
Answer : Option Id
(A) Unguided Media 309001
(B) Wireless Media 309002
(C) Digital Media 309003
(D) Guided Media 309004

Right Answer : Right Option Id : 309004


Guided Media

Question 60 Question Id : 310


What is the method called that bypasses the normal authentication process, often created by developers for troubleshooting purposes?
Answer : Option Id
(A) Keylogger 310001
(B) Ransomware 310002
(C) Backdoors 310003
(D) Spyware 310004

Right Answer : Right Option Id : 310003


Backdoors

Question 61 Question Id : 311


In machine learning, which component involves creating general concepts and models from stored data?
Answer : Option Id
(A) Data Storage 311001
(B) Abstraction 311002
(C) Generalization 311003
(D) Evaluation 311004

Right Answer : Right Option Id : 311002


Abstraction

Question 62 Question Id : 312


In machine learning, which geometric model segments the instance space using geometric concepts like lines or planes to classify data?
Answer : Option Id
(A) Distance-based Models 312001
(B) Non-linear Models 312002
(C) Linear Models 312003
(D) Clustering Models 312004

Right Answer : Right Option Id : 312003


Linear Models

Question 63 Question Id : 313


What is the purpose of the elif keyword in shell scripting?
Answer : Option Id
(A) It defines a loop 313001
(B) It creates an alternative condition in an if statement 313002
(C) It terminates a script 313003
(D) It checks for multiple conditions 313004

markstoall

Question 64 Question Id : 314


What data model uses entities and relationships among these entities to represent real-world objects in database design?
Answer : Option Id
(A) Relational Model 314001
(B) Entity-Relationship Model 314002
(C) Network Model 314003
(D) Object-Oriented Model 314004

Right Answer : Right Option Id : 314002


Entity-Relationship Model
Question 65 Question Id : 315
What controls the timing of processor circuits and divides instruction execution into sequences of basic steps?
Answer : Option Id
(A) Instruction Register (IR) 315001
(B) Program Counter (PC) 315002
(C) Arithmetic Logic Unit (ALU) 315003
(D) Processor Clock 315004

Right Answer : Right Option Id : 315004


Processor Clock

Question 66 Question Id : 316


What term refers to a representative data point that is used in situations where the centroid is not applicable, such as in cases like image data?
Answer : Option Id
(A) Centroid 316001
(B) Mode 316002
(C) Medoid 316003
(D) Mean 316004

Right Answer : Right Option Id : 316003


Medoid

Question 67 Question Id : 317


Which data structure is commonly implemented using an array with two variables, front and rear, to manage insertion and deletion?
Answer : Option Id
(A) Queue 317001
(B) Stack 317002
(C) Linked List 317003
(D) Priority Queue 317004

Right Answer : Right Option Id : 317001


Queue

Question 68 Question Id : 318


What is the formal way to describe the growth rate of an algorithm's running time, focusing on its behavior as the input size increases?
Answer : Option Id
(A) Asymptotic Notation 318001
(B) Performance Evaluation 318002
(C) Time Complexity 318003
(D) Space Complexity 318004

Right Answer : Right Option Id : 318001


Asymptotic Notation

Question 69 Question Id : 319


Which type of cable uses a central core conductor enclosed in insulation and a metallic outer conductor that acts as both a shield against noise and the second conductor?
Answer : Option Id
(A) Twisted-Pair Cable 319001
(B) Fiber-Optic Cable 319002
(C) Coaxial Cable 319003
(D) Shielded Twisted-Pair Cable 319004

Right Answer : Right Option Id : 319003


Coaxial Cable

Question 70 Question Id : 320


What term refers to the protection of sensitive, private information from unauthorized access?
Answer : Option Id
(A) Integrity 320001
(B) Authentication 320002
(C) Availability 320003
(D) Confidentiality 320004

Right Answer : Right Option Id : 320004


Confidentiality

Question 71 Question Id : 321


In machine learning, which type of model forms a single global model over the entire instance space, as opposed to breaking it into segments or groups?
Answer : Option Id
(A) Decision Trees 321001
(B) K-Nearest Neighbors (KNN) 321002
(C) Grading Models 321003
(D) Grouping Models 321004

Right Answer : Right Option Id : 321003


Grading Models

Question 72 Question Id : 322


What type of learning involves an agent discovering which actions yield the most reward through trial and error, without being explicitly told how to correct mistakes?
Answer : Option Id
(A) Supervised Learning 322001
(B) Unsupervised Learning 322002
(C) Reinforcement Learning 322003
(D) Semi-supervised Learning 322004

Right Answer : Right Option Id : 322003


Reinforcement Learning

Question 73 Question Id : 323


What refers to the different stages that a process goes through during execution, based on its current activity?
Answer : Option Id
(A) Process Queues 323001
(B) Process States 323002
(C) Process Scheduling 323003
(D) Process Management 323004

Right Answer : Right Option Id : 323002


Process States

Question 74 Question Id : 324


What type of language enables users to access and manipulate data within a database, including retrieval, insertion, deletion, and modification?
Answer : Option Id
(A) Data Definition Language 324001
(B) Data Manipulation Language 324002
(C) Structured Query Language 324003
(D) Query Language 324004

Right Answer : Right Option Id : 324002


Data Manipulation Language

Question 75 Question Id : 325


Which method is used to obtain the 2's complement of a binary number?
Answer : Option Id
(A) Subtracting 1 from the binary number 325001
(B) Adding 1 to the 1's complement of the binary number 325002
(C) Reversing the order of all bits in the binary number 325003
(D) Doubling the binary number 325004

Right Answer : Right Option Id : 325002


Adding 1 to the 1's complement of the binary number
Question 76 Question Id : 326
What term refers to a language processor that directly executes operations specified in the source program, rather than producing a separate target program?
Answer : Option Id
(A) Compiler 326001
(B) Interpreter 326002
(C) Assembler 326003
(D) Linker 326004

Right Answer : Right Option Id : 326002


Interpreter

Question 77 Question Id : 327


Which sorting algorithm repeatedly compares successive elements and swaps them if they are out of order, often requiring many comparisons and swaps to sort the list?
Answer : Option Id
(A) Quick Sort 327001
(B) Merge Sort 327002
(C) Bubble Sort 327003
(D) Selection Sort 327004

Right Answer : Right Option Id : 327003


Bubble Sort

Question 78 Question Id : 328


What is the time complexity of the Merge Sort algorithm?
Answer : Option Id
(A) O(n) 328001
(B) O(n log n) 328002
2
(C) O(n ) 328003
(D) O(log n) 328004

Right Answer : Right Option Id : 328002


O(n log n)

Question 79 Question Id : 329


Which type of electromagnetic waves, used for communication, are unidirectional and require aligned sending and receiving antennas?
Answer : Option Id
(A) Radio Waves 329001
(B) Infrared Waves 329002
(C) X-Rays 329003
(D) Microwaves 329004

markstoall

Question 80 Question Id : 330


Which type of active attack involves an intruder pretending to be an authorized user to gain unauthorized access or privileges?
Answer : Option Id
(A) Masquerade 330001
(B) Phishing 330002
(C) Denial of Service (DoS) 330003
(D) Eavesdropping 330004

Right Answer : Right Option Id : 330001


Masquerade

Question 81 Question Id : 331


What component of a compiler reads characters from the source program and groups them into tokens?
Answer : Option Id
(A) Syntax Analyzer 331001
(B) Lexical Analyzer 331002
(C) Code Generator 331003
(D) Optimizer 331004

Right Answer : Right Option Id : 331002


Lexical Analyzer

Question 82 Question Id : 332


Which method in Java is used to request garbage collection for reclaiming unused memory?
Answer : Option Id
(A) gc() method 332001
(B) delete() method 332002
(C) free() method 332003
(D) finalize() method 332004

Right Answer : Right Option Id : 332001


gc() method

Question 83 Question Id : 333


What contains the information associated with a specific process, such as its state, program counter, CPU registers, and I/O status?
Answer : Option Id
(A) Process Scheduler 333001
(B) Process Control Block 333002
(C) Memory Management Unit 333003
(D) System Control Block 333004

Right Answer : Right Option Id : 333002


Process Control Block

Question 84 Question Id : 334


What term refers to the portion of DML used specifically for retrieving information from a database?
Answer : Option Id
(A) Data Definition Language 334001
(B) Query Language 334002
(C) Data Manipulation Language 334003
(D) Structured Query Language 334004

Right Answer : Right Option Id : 334002


Query Language

Question 85 Question Id : 335


Which flag in the 8086 microprocessor is set when there is a carry from the lower nibble?
Answer : Option Id
(A) Auxiliary Carry Flag (AC) 335001
(B) Zero Flag (Z) 335002
(C) Parity Flag (P) 335003
(D) Sign Flag (S) 335004

Right Answer : Right Option Id : 335001


Auxiliary Carry Flag (AC)

Question 86 Question Id : 336


Which command does the parser use to request the next token from the lexical analyzer during the token identification process?
Answer : Option Id
(A) getToken() 336001
(B) fetchToken() 336002
(C) nextToken() 336003
(D) getNextToken() 336004

Right Answer : Right Option Id : 336004


getNextToken()
Question 87 Question Id : 337
Which sorting algorithm selects the smallest element from the remaining list and swaps it with the current element until the entire list is sorted?
Answer : Option Id
(A) Quick Sort 337001
(B) Merge Sort 337002
(C) Selection Sort 337003
(D) Bubble Sort 337004

Right Answer : Right Option Id : 337003


Selection Sort

Question 88 Question Id : 338


What is the time complexity of the Quick Sort algorithm in the average case?
Answer : Option Id
(A) O(n log n) 338001
2
(B) O(n ) 338002
(C) O(log n) 338003
(D) O(n) 338004

Right Answer : Right Option Id : 338001


O(n log n)

Question 89 Question Id : 339


Which error-detection technique appends redundant bits to a data unit, making it divisible by a predetermined binary number?
Answer : Option Id
(A) Parity Check 339001
(B) Checksum 339002
(C) Hamming Code 339003
(D) Cyclic Redundancy Check (CRC) 339004

Right Answer : Right Option Id : 339004


Cyclic Redundancy Check (CRC)

Question 90 Question Id : 340


Which type of attack involves intercepting and listening to messages exchanged between two entities, especially if the data is unencrypted?
Answer : Option Id
(A) Spoofing 340001
(B) Eavesdropping (tapping) 340002
(C) Man-in-the-Middle Attack 340003
(D) Phishing 340004

Right Answer : Right Option Id : 340002


Eavesdropping (tapping)

Question 91 Question Id : 341


In the context of lexical analysis, which function is used to install a lexeme (pointed to by yytext) into the symbol table and return a pointer to it?
Answer : Option Id
(A) installID0() 341001
(B) installNum() 341002
(C) installToken() 341003
(D) addSymbol() 341004

Right Answer : Right Option Id : 341001


installID0()

Question 92 Question Id : 342


What term refers to a sequence of characters in the source program that matches the pattern for a token and is identified by the lexical analyzer?
Answer : Option Id
(A) Lexeme 342001
(B) Token 342002
(C) Syntax 342003
(D) Identifier 342004

Right Answer : Right Option Id : 342001


Lexeme

Question 93 Question Id : 343


What term describes the execution of multiple smaller tasks within a single process, allowing the program to continue running even when some threads are blocked?
Answer : Option Id
(A) Parallel Processing 343001
(B) Concurrency 343002
(C) Task Scheduling 343003
(D) Multithreading 343004

Right Answer : Right Option Id : 343004


Multithreading

Question 94 Question Id : 344


What term refers to ensuring that a value in one relation corresponds to a valid value in another relation, maintaining consistency between related data?

Answer : Option Id
(A) Entity Integrity 344001
(B) Domain Integrity 344002
(C) Referential Integrity 344003
(D) Data Integrity 344004

Right Answer : Right Option Id : 344003


Referential Integrity

Question 95 Question Id : 345


What term is used to describe the transfer of data between computer registers, such as MAR, PC, and IR?
Answer : Option Id
(A) Instruction Execution 345001
(B) Register Transfer 345002
(C) Memory Access 345003
(D) Data Bus Communication 345004

Right Answer : Right Option Id : 345002


Register Transfer

Question 96 Question Id : 346


In the context of the theory of computation, what type of proof consists of a sequence of statements leading from a hypothesis to a conclusion based on their truth?
Answer : Option Id
(A) Inductive Proof 346001
(B) Deductive Proof 346002
(C) Proof by Contradiction 346003
(D) Constructive Proof 346004

Right Answer : Right Option Id : 346002


Deductive Proof

Question 97 Question Id : 347


Which sorting algorithm uses the divide-and-conquer method, dividing the array into smaller sub-arrays based on pivot elements and recursively sorting them?
Answer : Option Id
(A) Merge Sort 347001
(B) Quick Sort 347002
(C) Bubble Sort 347003
(D) Selection Sort 347004

Right Answer : Right Option Id : 347002


Quick Sort
Question 98 Question Id : 348
Which algorithm adds the cheapest edge and the node it leads to, provided the node is not already in the spanning tree?
Answer : Option Id
(A) Dijkstra's Algorithm 348001
(B) Prim's Algorithm 348002
(C) Kruskal's Algorithm 348003
(D) Bellman-Ford Algorithm 348004

markstoall

Question 99 Question Id : 349


What is the technique called where an acknowledgment (ACK) frame is included in the header of a data frame traveling in the same direction?
Answer : Option Id
(A) Sliding Window 349001
(B) Piggybacking 349002
(C) Full Duplexing 349003
(D) Frame Interleaving 349004

Right Answer : Right Option Id : 349002


Piggybacking

Question 100 Question Id : 350


What type of malware remains dormant until triggered by a specific event or activity, such as a date or the launch of a program?
Answer : Option Id
(A) Worm 350001
(B) Trojan Horse 350002
(C) Ransomware 350003
(D) Logic Bomb 350004

Right Answer : Right Option Id : 350004


Logic Bomb

Question 101 Question Id : 351


What represents an instantaneous description of a system in finite automata, containing all the necessary information to determine future behavior?
Answer : Option Id
(A) Transition 351001
(B) Input 351002
(C) State 351003
(D) Output 351004

Right Answer : Right Option Id : 351003


State

Question 102 Question Id : 352


Which keyword in Java is used as a reference variable to refer to the immediate parent class object?
Answer : Option Id
(A) super 352001
(B) this 352002
(C) parent 352003
(D) base 352004

Right Answer : Right Option Id : 352001


super

Question 103 Question Id : 353


In which scheduling method is the CPU assigned to a process and not released until that process finishes?
Answer : Option Id
(A) Preemptive Scheduling 353001
(B) Round-Robin Scheduling 353002
(C) Non-Preemptive Scheduling 353003
(D) Priority Scheduling 353004

Right Answer : Right Option Id : 353003


Non-Preemptive Scheduling

Question 104 Question Id : 354


What term is used for an attribute that can be split into smaller components?
Answer : Option Id
(A) Simple Attribute 354001
(B) Derived Attribute 354002
(C) Composite Attribute 354003
(D) Key Attribute 354004

Right Answer : Right Option Id : 354003


Composite Attribute

Question 105 Question Id : 355


Which instruction adds two decimal numbers in Binary Coded Decimal (BCD) format?
Answer : Option Id
(A) ADDI 355001
(B) ADDF 355002
(C) ADDD 355003
(D) SUBD 355004

Right Answer : Right Option Id : 355003


ADDD

Question 106 Question Id : 356


What is a key characteristic of a Deterministic Finite Automaton (DFA)?

Answer : Option Id
(A) It can have multiple ways to process the input string. 356001
(B) It reads the input string one symbol at a time and has only one unique way to process it. 356002
(C) It processes the input string using a probabilistic model. 356003
(D) It accepts or rejects the input string based on random decisions. 356004

Right Answer : Right Option Id : 356002


It reads the input string one symbol at a time and has only one unique way to process
it.

Question 107 Question Id : 357


Which search algorithm uses backtracking to explore all nodes along a path before moving to the next path?
Answer : Option Id
(A) Breadth First Search (BFS) 357001
(B) Dijkstra's Algorithm 357002
(C) A* Search 357003
(D) Depth First Search (DFS) 357004

Right Answer : Right Option Id : 357004


Depth First Search (DFS)

Question 108 Question Id : 358


Which method is used for problems like job sequencing with deadlines, minimum cost spanning trees, and the 0/1 knapsack problem?
Answer : Option Id
(A) Dynamic Programming 358001
(B) Greedy Method 358002
(C) Backtracking 358003
(D) Divide and Conquer 358004

markstoall
Question 109 Question Id : 359
What technique improves bandwidth utilization by allowing the sender to transmit multiple frames before waiting for an acknowledgment?
Answer : Option Id
(A) Sliding Window 359001
(B) Full Duplexing 359002
(C) Piggybacking 359003
(D) Pipelining 359004

Right Answer : Right Option Id : 359004


Pipelining

Question 110 Question Id : 360


What is the act of obtaining secrets and information without permission or knowledge of the holder, often for personal, economic, political, or military advantage?
Answer : Option Id
(A) Phishing 360001
(B) Hacking 360002
(C) Cyber Espionage 360003
(D) Ransomware 360004

markstoall

Question 111 Question Id : 361


Which statement is used to access all elements of the standard C++ library without prefixing them with std::?
Answer : Option Id
(A) #include <iostream> 361001
(B) #include <stdlib.h> 361002
(C) int main() 361003
(D) using namespace std; 361004

Right Answer : Right Option Id : 361004


using namespace std;

Question 112 Question Id : 362


What in Java is used as a blueprint for a class, has static constants and abstract methods, and is used to achieve abstraction and multiple inheritance?
Answer : Option Id
(A) Abstract Class 362001
(B) Enum 362002
(C) Class 362003
(D) Interface 362004

Right Answer : Right Option Id : 362004


Interface

Question 113 Question Id : 363


What term refers to the number of jobs completed by the CPU within a specific time period?
Answer : Option Id
(A) Waiting Time 363001
(B) Turnaround Time 363002
(C) Throughput 363003
(D) Response Time 363004

Right Answer : Right Option Id : 363003


Throughput

Question 114 Question Id : 364


What type of relationship occurs when one entity is associated with multiple entities of another type, and vice versa, such as students enrolling in many courses and courses having
many students?
Answer : Option Id
(A) One-to-One 364001
(B) One-to-Many 364002
(C) Many-to-One 364003
(D) Many-to-Many 364004

Right Answer : Right Option Id : 364004


Many-to-Many

Question 115 Question Id : 365


Which method for designing a control unit uses trigger points activated after gaps of one T-state, avoiding the inefficiency of multiple delay elements?
Answer : Option Id
(A) Delay Element Method 365001
(B) Microprogrammed Control Method 365002
(C) Sequence Counter Method 365003
(D) Hardwired Flowchart Method 365004

Right Answer : Right Option Id : 365003


Sequence Counter Method

Question 116 Question Id : 366


In the context of a Deterministic Finite Automaton (DFA), which of the following symbols represents the set of input symbols or alphabet?
Answer : Option Id
(A) Q 366001
(B) Σ 366002
(C) δ 366003
(D) F 366004

Right Answer : Right Option Id : 366002


Σ

Question 117 Question Id : 367


What function is used to place data into a hash table and retrieve it using the same function, returning an integer called the hash key?
Answer : Option Id
(A) Sorting Function 367001
(B) Comparison Function 367002
(C) Search Function 367003
(D) Hash Function 367004

Right Answer : Right Option Id : 367004


Hash Function

Question 118 Question Id : 368


What term refers to a closed loop in a graph that visits each vertex exactly once and returns to the starting point?
Answer : Option Id
(A) Eulerian Cycle 368001
(B) Hamiltonian Cycle 368002
(C) Spanning Tree 368003
(D) Directed Acyclic Graph 368004

Right Answer : Right Option Id : 368002


Hamiltonian Cycle

Question 119 Question Id : 369


Which system coordinates access to a shared communication network by allowing nodes to transmit data whenever available, handling collisions when they occur?
Answer : Option Id
(A) CSMA/CD 369001
(B) Token Ring 369002
(C) TDMA 369003
(D) ALOHA 369004

Right Answer : Right Option Id : 369004


ALOHA
Question 120 Question Id : 370
Which framework provides a flexible and cost-effective approach to managing cybersecurity risks and is authorized by a global certifying body?
Answer : Option Id
(A) NIST Compliance 370001
(B) ISO 27001 370002
(C) GDPR Framework 370003
(D) COBIT 370004

Right Answer : Right Option Id : 370001


NIST Compliance

Question 121 Question Id : 371


Which statement in the main function is used to indicate successful execution of a C++ program?
Answer : Option Id
(A) int main() 371001
(B) cout << 'Hello'; 371002
(C) return 0; 371003
(D) using namespace std; 371004

Right Answer : Right Option Id : 371003


return 0;

Question 122 Question Id : 372


What is a group of similar types of classes, interfaces, and sub-packages in Java, and can be either built-in or user-defined?
Answer : Option Id
(A) Java Interface 372001
(B) Java Package 372002
(C) Java Class 372003
(D) Java Module 372004

Right Answer : Right Option Id : 372002


Java Package

Question 123 Question Id : 373


What is the formula for calculating average response time in scheduling algorithms?
Answer : Option Id
(A) Completion Time - Arrival Time 373001
(B) First Response Time - Arrival Time 373002
(C) Turnaround Time - Arrival Time 373003
(D) Waiting Time - Completion Time 373004

markstoall

Question 124 Question Id : 374


What term refers to a set of one or more attributes that collectively allow us to uniquely identify a tuple in a relation?
Answer : Option Id
(A) Candidate Key 374001
(B) Superkey 374002
(C) Foreign Key 374003
(D) Primary Key 374004

Right Answer : Right Option Id : 374002


Superkey

Question 125 Question Id : 375


Which type of semiconductor memory uses chalcogenide glass to store data by changing its state between amorphous and polycrystalline?
Answer : Option Id
(A) DRAM 375001
(B) SRAM 375002
(C) Flash Memory 375003
(D) P-RAM 375004

Right Answer : Right Option Id : 375004


P-RAM

You might also like