Series – A
1. The action of killing a king is :
- Fratricide
- Matricide
- Regicide
- Genocide
2. Find out the part of speech written in bold: Sit beside
- Preposition
- Conjunction
- Adverb
- Adjective
3. Select the pair which has the same relationship – indigent: wealthy
- Cultural : civilized
- Lrate : vexed
- Gawky : dignified
- Indigenous : aboriginal
4. Bolt from the blue:
- Thundering
- A complete surprise
- Inform something bad
- Unconcerned
5. Arrange the following words in order to complete the sentence: All such students…
- in every walk of life
- and get recognition
- who are diligent and honest
- flourish
- cdba
- abcd
- adcb
- cabd
6. Synonym of embezzle is :
- appropriate
- remunerate
- bequeath
- misappropriate
7. Kalam is known for his wisdom. Wisdom is a/an:
- proper noun
- abstract noun
- common noun
- material noun
8. The study on economic evaluation is an eye-opener and attempts to acquaint everyone with the problems of poor nations: Correct the sentence
- attempting to acquaint
- attempted to acquaint
- attempts at acquainting
- attempt to acquaint
9. Choose the correct meaning of the idiom given in bold: He just paid him a left-handed compliment:
- A well deserved
- An honest
- An insincere
- A flattering
10. Sheena was ……………. by her employees as she often …………. them for not working sincerely.
- Disregarded, applauded
- Revered, hounded
- Scolded, adored
- Despised, reprimanded
11. भाषा की सबसे छोटी सार्थक इकाई क्या है
- ध्वनि
- वर्ण
- शब्द
- वाक्य
12. निष्कपट का संधि विछेद है
- नि+ कपट
- निः+कपट
- निष् + कपट
- निस +कपट
13. ‘मेहनत करो ताकि सफलता आपके कदम चूमे ‘ वाक्य मे ताकि क्या है
- सबंध बोधक अव्य
- समानिधिकरण समुच्यबोधक
- वाधिकार समुच्यबोधक
- क्रियाविसेसण अव्य
14. ‘पुत्र को देख माता का चेहरा खिल गया ‘ वाक्य में विधेय है
- पुत्र को देखकर
- माता का चेहरा खिल उठा
- चेहरा खिल उठा पुत्र को
- पुत्र
15. वाक्य को तत्काल विषय देकर विचारो को क्रमवद्ध रूप से आयोजित कर प्रभारी रीती से प्रस्तुत करना, कहलाता है ?
- साक्षताकर देना
- आशुभाषण
- सभा – संचालन
- परिचर्चा
16. When was MukhyaMantri Gram KaushalYojna Started in HP?
- 6 January 2021
- 6 January 2020
- 21 July 2021
- 21 July 2020
17. Select the incorrect statement in respect of Seabuckthorn:
- Rich source of vitamins and minerals
- This is a shrub which produces edible berries of crimson colour
- Commonly known as chharma in HP
- Fruit berries are acidic in nature
18. The average elevation of PirPanjal Mountain Range is :
- 1400-4100m
- 4775-5585m
- 4225-4889m
- 4636-5565m
19. Which of the following Guler Ruler was named as ‘SherAfgan’ by Shahjahan?
- Vikram Singh
- Hari Chand
- Man Singh
- Prithvi Chander
20. Name the first player from HP state who won a medal in National Para Table Tennis?
- Nishad Kumar
- Piyush Sharma
- Varun
- Sharad
21. Select the right statement for the introduction of ‘Monk fruit’ in HP.?
- CSKHPKV in Palampur
- UHF in Kullu
- CSIR-IHBT in Kullu
- CSIR-IHBT in Mandi
22. By whom in HP, the ‘Veerangana Souvenir’ was released on International Women’s Day celebrated on 8 March 2021?
- Chief Minister
- Education Minister
- Health Minister
- Governor
23. Which of the following Mountain Pass connects Himachal with Tibet?
- Shingo La
- Baralacha La
- Shipki La
- Zoji La
24. Who wrote the book named ‘Himalayan Pilgrimage’?
- Kanchan Sharma
- Ram Rahul
- Yashpal
- BN Dataar
25. In which year National Great Himalayan Park, Kullu was listed under UNESCO World heritage?
- 2010
- 2011
- 2014
- 2013
26. Choose the correct statement :
- Optical Character Reader and optical Mark Recognition are examples of Input devices.
- Optical Character Reader and Optical Mark Recognition are examples of Output devices.
- Optical Character Reader is input device whereas Optical Mark Recognition is example of Output device.
- Optical Mark Recognition is example of input device whereas Optical Character Reader is output device.
27. Which among the following statements is wrong?
- Machine language and Assembly language are examples of High level Language
- Machine Language some – times also refers to Object code.
- Assembly language uses the Mnemonics to represent instructions.
- Java is platform independent language.
28. The data in excel sheet should be in which of the following format to use it in order to create a ‘Mail Merge’’ in Microsoft Word Document.
- Table format, without headers on each column only with the necessary information in each column.
- Table format, with headers on each column and then the necessary information in each column
- Both a and b
- None of these
29. Switching the CPU to another process requires:
- Saving the state of the new process and loading the saved state for the old process.
- Saving the state of the old process and lading the saved state for the new process.
- Saving the state of the old process and loading the saved state for the old process.
- Saving the state of the new process and loading the saved state for the new process.
30. With respect to the statement ‘MS Word is running on a Windows machine’, which of the following statement is correct?
- Application software load before system software
- Application software cannot load after System Software
- System software load before application Software
- System Software load after Application Software
31. ……………………….refers to a reversible step by step process in which a given set of relation is replaced by successive collections of relations that have a progressively simpler and more regular structure.
- Normalization
- Primary Key
- Pattern matching
- Table
32. Select the correct option for the Distance Vector Routing?
- Only distance vectors are exchanged. ‘next hop’ values are not exchanged. This is because it results in exchanging the large amount of data which consumes more bandwidth.
- While preparing a new routing table-A router takes into consideration only the distance vectors it has obtained from its neighboring routers. It does not take into consideration is old routing table.
- The algorithm keeps on repeating periodically and never stops. This is to update the shortest path in case any link goes down or topology changes.
- All above options are correct.
33. What is the full form of SMTP?
- Simplex Mail Transfer Protocol.
- Single Mail Transfer Protocol.
- Simple mail transfer Protocol.
- Simple Mail Transmission Protocol.
34. Consider following C Program:
#include <stdio.h>
Int main (){
Int arr[]={1,2,3,4,5,6,7,8,9,0,1,2,5}, *ip=arr+4;
printf(‘%d/n’,ip [2]);
Return 0;
}
The number that will be displayed on the execution of the program is ……………….
- 5
- 6
- 3
- 4
35. The command in LINUX OS to check the Bad Sectors in your pen drive is:
- Fsck-1/dev/sdc 1
- Fdisk-1
- Fscan/dev/sdc 1
- Fix-1 /dev/sdc1
36. Combination of multimedia and hyperlinks is called as :
- Hypertext
- Media
- Multitask
- Hyper task
37. The standard protocol of the Internet is :
- HTML
- Java
- TCP/IP
- Flash
38. Which escape character can be used to being a new line in C?
- /a
- /b
- m
- /n
39. The operator && is a ………………. Operator :
- Assignment
- Increment
- Logical
- Rational
40. The text color in a presentation should contrast with the colour if:
- Background
- Frame
- Stack
- None of these
41. Select the option which does not represent example of multicast:
- Sending a message to a particular group of people on WhatsApp
- Video conference or teleconference
- Class taken by a faculty using MS team/ google meet app
- Transmission of a television Channel
42. Select the correct option fro the given IP address 300. 1.2.3 :
- This is not a valid IP address.
- First and Last IP Address are reserved.
- This is because for any given IP Address, the range of its first octet is always [1,254].
- All above options are correct
43. The following statement is false with respect to Hamming Code:
- If there is a hamming distance between two codewords then it will require d single-bit errors to convert one into the other.
- The parity bit is chosen so that the number of 1 bits in the codeword is even (or odd)
- The bits that are powers of 2 (1,2,4,8,16, etc…..) are message bits.
- None of these
44. Given a message 1010000 with a generator p9lynomial x3+1, then what should be the transmitted message using this generator polynomial :
- 1010000001
- 101000011
- 1010000100
- 1010000101
45. If the bandwidth of the line is 1.5 Mbps, RTT is 45 msec and packet size is 1 KB, then find the link utilization in stop and wait flow control protocol:
- 8%
- 2%
- 3%
- 2%
46. The maximum window size for data transmission using the selective repeat protocol with n bit frame sequence number is:
- 2n
- 2(n-1)
- 2n-1
- 2(n-2)
47. Select the correct Option:
- Flooding is static routing algorithm in which every incoming packet is sent out on every outgoing line except the one it arrived on.
- Static algorithm do not take the current network load into account whereas Distance vector routing algorithms operate by having each router maintain a table (i.e.,a vector) giving the best-known distance to each destination and which line to use to get there.
- In flow control routing algorithm, the route is decided based on traffic. i.e. if traffic is heavy in a short path, then it is diverted to low traffic route even if it is longest path to reach the destination node.
- All above options are correct.
48. Let an array A is defined as int A[3][5]={1..5,6..10,11..15}, where an integer takes 4 bytes of memory. If the base address of A is 1000 then the memory location of A [1][4] will be:
- 1036
- 1032
- 1028
- 1020
49. What is the value of the postfix expression 6 3 2 4+-*:?
- 1
- 40
- 18
- -18
50. A graphics card has on board memory of MB. Which of the following modes can the card not support ?
- 1600x 400 resolution with 256 colors on a 17 inch monitor
- 1600x 400 resolution with 16 million colors on a 14 inch monitor
- 800x 400 resolution with 16 million colors on a 17 inch monitor
- 800x 800 resolution with 256 colors on a 14 inch monitor
51. The short cur to Add multiple rows/Columns above/ below of a row in a Microsoft we Document is :
- Select multiple ROWS/ COLUMNS then press right click mouse button are choose option Insert rows above/below
- CTRL+1
- CTRL+A
- CTRL+J
52. The ‘Mail Merge’ Option in Microsoft Word Document is found under which option?
- References
- View
- Review
- Mailings
53. The correct option for Primary Key and Unique Key is :
- Both are selected from candidate key
- The Primary Key can be only one for a table whereas Unique key can be more than one
- Both option (A) and (B) are True
- Either option (A) is True or (B) is True
54. Find the decimal equivalent of binary number:
- 12.437510
- 13.437510
- 13. 754310
- 12.754310
55. In ASP.net the ‘web.config’ file is used for which of the following?
- To store the global information and variable definitions for the application
- To configure the web server
- Configures the time that the server-side code behind the module is called
- To configure the web browser
56. The default web server used in LINUX OS based machines is :
- Gunicorn
- Apache
- IIS
- Kestrel
57. A IGHz CPU (Central Processing Unit) can carry how much maximum instructions per second:
- 1 billion
- 10 billion
- 1 million
- 10 million
58. The function sprint() works like printf() but operates on:
- Data in a file
- stderr
- stdin
- string
59. Which of the following command is used to delete a table from the database?
- Delete Audio
- Drop
- Alter
- Truncate
60. The core of the LINUX Operating System is called as :
- Kernel
- Shell
- Application
- System Utility
61. Which one of the following is not a part of network topologies?
- Bus
- Moon
- Tree
- Star
62. Maintaining and assuring the accuracy and consistency of data is called is:
- Data Cleansing
- Data Compiling
- Data Integrity
- Data Manipulation
63. What is the full form of AVI ?
- Video Interchange
- Audio Video Intercept
- Audio Video Intersect
- Audio Video Interleave
64. Which of the following shortcut key is used to set 1.5-line spacing in MS Word?
- Ctrl+1
- Ctrl+2
- Ctrl+5
- Ctrl+3
65. Which is not a part of unguided media?
- Microwave
- Satellite
- Wi-Fi
- Twisted Pair
66. The function that is created from a call to a template function is known as :
- generated
- inherited
- spawned
- declassified
67. Which of the following network protocols is used to send e-mail?
- STP
- SSH
- POP3
- SMTP
68. Difference computers are connected to LAN by a cable and ……….. :
- Modem
- Network Interface Card
- Special wires
- Telephone lines
69. Integer division in a ‘C’ program result in ……………… :
- Overflow
- Network Interface Card
- Special wires
- Telephone lines
70.…………….. denotes an error in a computer program :
- Bit
- Bug
- Spam
- Byte
71. CLR is NET equivalent of …………… ?
- Common type system
- Common runtime language
- Java Virtual Machine
- Common Language Specification
72. A video consists of a sequence of :
- Frames
- Signal
- Packets
- Slots
73. ‘IP’ of TCP/IP is :
- Connection-oriented protocol
- Connectionless protocol
- Breaks the data into packets
- Verifies the data
74. Select the incorrect option :
- Transmitting data from one source host to one destination host is called a Unicast
- Transmitting data from one source host to all other hosts residing in the same network is called a limited Broadcast.
- Transmitting data from one source host to a particular group of hosts having interest in receiving the data is called multicast.
- Multicast is a one-to-one transmission.
75. The cryptography techniques Encryption and Decryption works at which layer of OSI model :
- Physical Layer
- Network Layer
- Data Link Layer
- Presentation Layer
76. A physical path is established in all the way from sender to the receiver is known as :
- Message Switching
- Packet Switching
- Circuit Switching
- All above are True
77. Select the incorrect option :
- Both sender and receiver use a common key to encrypt and decrypt the massage in public key cryptography.
- If N people in the world wants to use symmetric key cryptography, then there needs to be N (N-1)/2 secret keys.
- In Asymmetric key cryptography the sender and receiver both use different keys to encrypt and decrypt the message.
- For n individuals to communicate by Asymmetric key cryptography, number of keys required = 2xn = 2n keys.
78. Consider following pseudo –code of data structure :
Struct node{
Int data;
Struct node *prev, struct node* next
};
- Single Linked List
- Doubly Linked List
- Circular Linked List
- STACK
79. In a stack, if a user tries to remove an element from empty stack it is called as :
- Underflow
- Empty collection
- Overflow
- Garbage Collection
80. The relation R (A,B,C,D) with functional dependencies as { A->B, A->C, C->D, C->A} is in following Normal Form (NF) ……………………. :
- BCNF
- 3NF but not BCNF
- Only 2nd NF
- 1st NF
81. By default, the ASP .net stores the session ID’s in …………………………. :
- Cache
- Cookies
- Database
- Global Variable
82. The LINUX OS command to give read, write, and execute permission to all i.e., user, group, and others is ………… :
- chmod 777
- chmod 767
- chmod 655
- chmod a+x
83. Arrays can be initialised provided they are :
- Automatic
- External
- Static
- Both B and C
84. Which of the following is not a DBMS Software ?
- MS Access
- MySQL
- Oracle
- MS Excel
85. Consider the following four process with arrival times (in milliseconds) and their length of CPU bursts (in milliseconds) as shown below :
Process | P1 | P2 | P3 | P4 |
Arrival time | 0 | 1 | 3 | 4 |
CPU burst time | 3 | 1 | 3 | Z |
These process are running on a single processor using preemptive Shortest Remaining Time First scheduling algorithm. If the average waiting time of the processes is I millisecond, then the value of Z is ________.
- 1
- 2
- 3
- 4