Professional Documents
Culture Documents
5 6183716071069975962
5 6183716071069975962
Part-1/TT I
GENERAL HINDI (I to 25)/ TIHT f(1 d 25 ma)
(a) KTHZU
b) (a) 3r
(d (c) 3a
(d) r4T
(a) t T
HU (b)ctt - TTH (a) HE (b)
(d) - 3TH (d) T
THT
(c)
(c)
(d)
(b) 17. TP HEI TÍ-fasa -
(c)
(b) a7 + 8
5.
HHTH T faTTA T -
(c) a1+ BR (d) a7c5+aR
(a) HTE
(C) TH (b) 5TH 18.
(a) q44TH b)aHH
(a) (c) HITT (d) aHE
(b) 54R
7. (d)
(b) YUT I T
(a) eET
(d) TvI R
(b) OTT 20. t r a rE TTY -
8. (d) 5TSAT
(a) Tay
(d)
9.
a faHTT
b)
(c) TCTTE
10.1H ZT TYaTi - 22. aT7Rta TR HHII
(a) quT
(a) arHTT HHIH (b)7TRUFHTH
(C) 7RENT d) gait FHT7
(d)
23.
(a) THTT
(b)T
(d) (c) HETIOEI ET
12. (d) 37HTT YT|
(a) rTET
b)RTAT (b)ga
(d) 37u (a) uTY
(d) -
a) eTTRT (b) T
(d) TH a3RTa
(c)4ERIT
TETS21]-D Page 2 of 24
Page 3 of 24
[TETS21]-D
Part-I1/HTT II 30. Which of the following clause have 30. ffaT
COMPUTER SCIENCE-I (26to 125)/ ER
HIGH-I ( 26 H 125 a <group condition>? <group condition> 8?
(a) Select (a) Select
26. The minimum frame size required for a 26. TGbps YR TIci dlct
CSMA/CD ATTfRT
CSMA/CD
(b) From (b) From
CSMA/CD based computer network running
Group By (c) Group By
at Gbps on a 200 m cablé
l with a link speed RTT, 3FT d l cT 200 m ya f (d) Having (d) Having
of 2x10* m/sec is - ts 2x10 m/sec -
47. Which the GrT À T - T RYH yfoa reachable from each other is -
(a) 8
pubie kev ervplographic
is 47.
(a) 18 (b) 21
algornthm among the following?
(b) 21 (C) 23
he Diffie-Hellman key agreement 23
(a) fu-oT ayte uietia
protocol (d) None of the above
Hs fbI TT
b) An original intelligible message fed into the
52. YE 5 À yReH
Key generation algonthm 52.
Page 9 of 24
ITETS21]-D
TETS2 1]-D Page 8 of 24
icue (a) »}--1 fdru
used to epnsenl
a s4
54. A ciular linked
list is
to acces
IS Quene 9.
The indicates that the
subseriber 59.
P" is used
queue. A single
variable
identified in the certificate has sole
control
the queue To
which node
should T poini P and access to the private key
and
cnqueue (a) OAEP
such that both the operations
in
constant
TITf fTR cnqueue 3R
dequeue t b) Digital Signature
(a) OAEP
(bfrontnode following?
T ot possible with single pointer (a) Data and data relationship
node next to front (b)3Tafcra 3tR
(d (b) Data semantics and
55. n i i gi
I YC a T ae consistency
55 What ris the number of comparison required constraints
for finding fourth largest
by an algonthm
eiement in the given input list of 'n
ERT Data, data relationship, data
semantics and Consistency
eiements. constraints
(a) 2n 3
(a n3 (d) None of the above
(b) 2n-4
T2n 4
(c)2n-5 AHe7 F T TETR 9 H aeo
(C)n -S 61. Convert the following number to base 9 61.
(d) 2 (2n-5) (1 101222.201121)3- (1101222.201121)
(2n Si
(d
-
56. A utiirty used to specify who is allowed to 56. a5 YT HAIN 7H J1358.647 . a la 1358.647
coanect to a service over the network
and (b) 4172.647 (b) 4172.647
is 24
TETS21-D Page 10 of 24
Page 11of 24
TETS21)-D 2,2, 2.3
64. If relation R has X tuples and relation d has
say eyt, d join 3-T RaH RU As per 40-20-40 rule, the least 40-20-40 AUH 7
tuples, then the result tion R 70. amount of 70. THIR
of join on development etlort shall be spent on-
and S will have
upto . . .
(d) (d)-y
(a) 0<ps (a) 0<pSI
65. Code red is a 65. 3 E
(a) Anti vinus (a) e i qRNH (b) p> (b) p>
(b)Photo editing software pe(2.3,5,7,..) (c) pe (2, 3, 5,7, . )
Computer worm (d) PE{2,4,6, 8, . (d) Pe l2,4, 6, 8, ..
(d) Video editing software
72. A binary tree T has 64 leaf nodes. The 72.
66. Which of the following tem is used to 66. CEd H T5 T UT number of nodes of degree 2 in T is-
describe a threat origin and the path it takes
to reach a (a) 64
target? fy f TCT (a) 64
(a) Fraud (a) is log264 (b) loga64
(b) Espionage (c) 63
(b)gR (c) 63
(c) Malfunction (c) HTa5rTA (d) 32 d) 32
T Threat vectors
73. Thefollowing post fix expression with single 73. iTa r e iuks zT2 AAari UTE
67. A data bus 16 bits wide is accessed 67.
. . imes to read an instruction of
128 fat EI T Y16 faa a digit operands is evaluatedusing stack
823 /24 *+51* *
FTTT 7V fT
128 bits. A
823/24 +51 -
1
Note that is the exponentiation operator.
(a)
(a) 2 The top two elements of the stackk after the
(c) Kaspersky
(a) Finance (a) fa O2 (d) HTTEifTE Affd
Microsoft office
(b) Health (b)AT
84. SCM stands for- 84. YA. (SCM) H
Education (c) RIeHT
(a) Software Control Management
d Stock market
tb Software Configuration Management YAerA
Which one Afciea d (c) HTTEaTR 3FTERT
of the
following micro operation -
79. ALU 1-HI3D (c) Software Concept Management
in ALU causes overflow sometimes? (micro-operation) a71-51 (d) None of the above
HTTYTE (overflow) z5T RUI ITI E? HPI fT a3RÍ I
Logical shiftieft trees are possible 85. 8 H
85. How many different binary
b Arithmetic shift left with 8 nodes?
(a) 256
(C) Circular shift right
xL+t 256
(c) fXYTE KI^T b) 128
(b) 128
d) None of the above (c) 248 c) 248
80. Suppose in a TCP connection at any given 80. (d) 64
(u64
H A H 3R 3AYI3
time the receiver advertised window size is is the way to 86.
HH RHaR YSTEIEU fAst 1 TBR 20 kB 86. Which ofthe following
correct
5}
achieve flow control?
(b) int num { } ={2, 4, 12,5, 45. 5}
(b) int num { =
{2,4, 12.5. 45.
asg? (c)int num {6} = {2, 4, 12)
(a) 30 kB
(a) 30 kB (c) int num (6) {2,4, 12} =
5. 45, 5}
(b) 20 kB (d) int num (6) =
{2. 4, 12,
(b) 20 kB (d) intnum (6) {2,4, 12,5, 45, 5)
=
R TIAU
(c) 10 kB
(c) 10 kB 87. A hash table contains 10 buckets and uses 87. E TaT 10 ae
d Could be 10 kB or 20 kB or both
(d) 10 kB 20 kB qi B T I linear probing to resolve collisions. The key E I dTH (key values) UT
used
81. Suppose there Si and S2. Si is
are two servers 81. GTY ai TR Si TR S2 I values are integers and the hash function 34TT TR
UDP
S1, UDP values 43, 165,62. 123, 142
TR T5RT key%10
server and S2 is TCP server. Both is key%10. If the 43, 165, 62, 123. 142 T a7
in what location
ae dr
servers are
simultaneously maintaining 100 100-100 TATSE (Client) HTP session T are inserted in the table, 3I Ti, a dZ (key value) 142f
inserted?
sessions. each with different clients. The would the key value 142 be
V I S1 TR S2 GT A sockets HRI
number of sockets at both S1 and S2 are - (Assume the size of table 8) 8 HT GY-
-
ITETS21]-D Page 15 of 24
TETS21]-D Page 14 of 24
yIcei rie 1IP) B1 feu
88. Weak
cntity set to bemeanineful, it must 88. a
he the part of a - ider the DAG (Directed Acyclic 94. erfRara DAG (Directed Acyclie Graph)
94 Graph
(a) One
with V = {A. B. C. D, E, F} shown below
1 V= [A. B.C. D. E. F} HI faTR 6frg
to one relationship
One to many relationship
Many to many relationship
(d None of the above
89. 89. THE VYHder JEIEV Ë-
ompliment Accumulator' is an exampleof C
(a) Register of the
Addresing
Mode Which following is not a
topological
(b Implied Mode (b)HOIIEE HS order among the given options? order 18 8?
(cImmediateMode (a) ABCDEF (a) ABCDEF
[TETS21]-D Page 17 of 24
Which Iype of routing protocol HTH BTET
104 Ues the 104. f yBTR I IUEI uEml
99 Consider the following message
99. 1ub
(divisor
polynomial shortest path lirst algorithm?
Fa Distance vector
(h) Link state
(a) foteI ÀER
M = 10100I 101
Afefad (message) «hl ITSfa (c) Hybrid
(b) f E
The Cyeli Redundaney Check (CRC) T (c) ETsfas
me age using the diviso polvnoml (d) Sliding window
M 1010001101
+ + Iis 05. Which of the
following supports the
(a) 01110
(a) 0110 concept 105.
of hierarchical classification?
(b) 01011
b) 01011
(a) Polymorphism (a)ag5T
(c) 10101 (e) 1010
(b) Encapsulation (b) tBYUT
(d) 1010
d 10110 Abstraction
5 feYN G (c) (c) HfAI
tear down phase, switched 100. HHe Raa fby IN c
U of a cireuit Inheritance
(d)Tg5
nctwork. a signal is sent to relcase ne
What does f (250, 2) return? 106. f(250. 2) TAT afïtH arT 8?
rsources- 106.
(a to cach router
(m, n) f (m. n){
ans = ans = l;
b to cach switch count = 0 count = 0:
(c to each computer while (ans<= m) | while (ans< = m) |
101. Which one of the following is not NP-Hard 101. Amfaraa NT VI-IT YTRT T ans=ans n; ans = ans * n;
esus
d COMMIT and ROILLBACK
M t the praessor s read request (d) COMMIT YT ROLLBACK
time From the
the following, wha is the average case 116.
lolowing. what f a_a h r T f
cache ht The average read access time) B- 116.
From
average read access complexity for finding the
n a n o s e o n d s is -
10
imc
height of the Tar ETEH Ttfkiel (average case
(a) binary tree?
(a 10 time complexity) Fi 8?
(b)14 (a) h=0 (log log n)
1 (a) h=0(log log n)
h = 0 (n log n)
(c) (b) h 0(n log n)
(d) 12
(c) h=0 (n) (c) h=0(n)
d 12
AHAT À (d) h=0(log n) d) h 0(log n)
the 111. a P ys TET E, a
then which of value ot Floor(8.4) + Ceil (9.9) is 117. Floor (8.4) + Ceil (9.9) HT-
117. The
1a statement.
.
P
-
ETETiul 8?
folkowing IS a tautolog 8 (a) 18
(a) Pa F 19
a PAF (b) (b) 19
(b) PvF (C) 20 (c) 20
PvF d) 17
(c) Pv7P (d) 17
ic PP
7an= 0 hH
T PAT
(d) PaT
118. The recurrence relation a+- 7an =
0 with 118. Ro RGR an
HTYETUY HRYIT 7 EA DV ao= 7. n20 HHg ETTI=
compler software problems. the 112. e ao 7, n 20 is equivalentto -
(a) 46
(b) 47 b) 47
(c) 48 48
(c)
d 90 (d) 90
123 The statement in Java
programming 123. f r a T Java programming HTH Code
double varl =8/3: double varl = 8/3:
[TETS21]-D Page 22 of 24