. Digital circuit can be made by the repeated use of the _________.
(A) NAND gate (B) NOR gate (C)
AND gate (D) More than one of the above (E) None of the above 72. Which of the following is correct
for Digital Circuits? (A) They use analog signals for communication (B) They process information
using continuous voltage levels (C) They are not suitable for high speed operations (D) More than
one of the above (E) None of the above 73. Which of the following is an example of a digital
Electronic? (A) Computers (B) Mobile phones (C) Digital cameras (D) More than one of the above (E)
None of the above PART - III (Computer Science) 74. An OR gate has 4 inputs. The number of words
in truth table will be _______. (A) 4 (B) 8 (C) 16 (D) More than one of the above (E) None of the
above 75. When does a negative level triggered flip-flop in Digital Electronics changes its state? (A)
When the clock is Negative (B) When the clock is Positive (C) When the inputs are all zero (D) More
than one of the above (E) None of the above 76. What is the result of the operation 1010 AND 1100
in binary? (A) 1000 (B) 1110 (C) 100 (D) More than one of the above (E) None of the above 77. In a
half-adder circuit, what are the outputs? (A) Sum and Carry (B) Difference and Borrow (C) Sum and
Difference (D) More than one of the above (E) None of the above 78. Which of the following is the
type of Read Only Memory (ROM)? (A) PROM (B) EPROM (C) MROM (D) More than one of the above
(E) None of the above 79. What is a PLA? (A) Programmable Logic Application (B) Programmable
Logic Array (C) Programmable Logic Architecture (D) More than one of the above (E) None of the
above 80. How many select lines are required for an 8-to-1 multiplexer? (A) 2 (B) 3 (C) 4 (D) More
than one of the above (E) None of the above 81. Convert the decimal number 1234 to binary, octal,
and hexadecimal. Which of the following options correctly represents these conversions? (A) Binary:
10011010010, Octal: 2322, Hexadecimal: 4D2 (B) Binary: 11001110010, Octal: 1712, Hexadecimal:
72A (C) Binary: 11100110010, Octal: 1642, Hexadecimal: 3CD (D) More than one of the above (E)
None of the above 82. What is Booth’s algorithm used for? (A) Binary to decimal conversion (B)
Decimal to binary conversion (C) Binary multiplication (D) More than one of the above (E) None of
the above 83. Which of the following is error detection code used in digital logic? (A) Hamming code
(B) Cyclic redundancy check (CRC) (C) Checksum (D) More than one of the above (E) None of the
above 13/HV/M-2024-26/HS-526-E 25 84. When performing BCD addition, what is the maximum
value that can be represented in a single BCD digit? (A) 2 (B) 10 (C) 15 (D) More than one of the
above (E) None of the above 85. Convert the binary number 1011.1101 to its decimal equivalent.
Which of the following is the correct decimal value? (A) 11.75 (B) 12.125 (C) 13.5 (D) More than one
of the above (E) None of the above 86. What is De Morgan’s theorem used for in digital logic? (A)
Simplifying Boolean expressions (B) Implementing NAND gates (C) Performing binary addition (D)
More than one of the above (E) None of the above 87. What is the purpose of the “don’t care”
condition in digital logic? (A) To indicate that the value of a variable does not affect the output (B) To
prioritize certain inputs over others (C) To ensure that all possible input combinations are covered in
truth tables (D) More than one of the above (E) None of the above 88. Which of the following data
structures stores elements in a non-linear relationship? (A) Stack (B) Queue (C) Array (D) More than
one of the above (E) None of the above 89. Which data structure is used for efficient searching,
insertion, and deletion of elements? (A) Stack (B) Queue (C) Hash Table (D) More than one of the
above (E) None of the 28 90. In a binary search tree, which subtree of a node contains elements that
are greater than the node’s value? (A) Left subtree (B) Right subtree (C) Both subtrees (D) More than
one of the above (E) None of the above 91. The result evaluating the postfix expression 10 5 + 60 6/
* 8 (A) 142 (B) 213 (C) 284 (D) More than one of the above (E) None of the above 92. In a balanced
binary tree, the height of two sub-trees of every node can not differ by more than (A) 2 (B) 1 (C) 0
(D) More than one of the above (E) None of the above 93. Write the output of the following
program: int a[ ] = {1,2,3,} *p; (A) Junk value (B) 3 (C) Runtime error (D) More than one of the above
(E) None of the above 94. A queue has configuration a, b, c, d. If you want to get the configuration d,
c, b, a, you need a minimum of _______. (A) 2 deletions and 3 additions (B) 3 deletions and 3
additions (C) 4 deletions and 4 additions (D) More than one of the above (E) None of the above 95.
The order of the binary search algorithm is _______. (A) N (B) N log n (C) N2 (D) More than one of
the above (E) None of the above 96. The preorder traversal of a binary search tree is 15, 10, 12,
11,20, 18, 16, 19. Which one of the following is the postorder traversal of the tree? (A) 20, 19, 18,
16, 15, 12, 11,10 (B) 11, 12, 10, 16,19,18,20,15 (C) 19, 16, 18,20,11,12,10,15 (D) More than one of
the above (E) None of the above 97. How many distinct binary search trees can be created out of 4
distinct keys? (A) 8 (B) 24 (C) 14 (D) More than one of the above (E) None of the as 4 bytes. What is
the output of above program? (A) 2 1 (B) 4 1 (C) 4 15 (D) More than one of the above (E) None of the
above 99. Which of the following statements is true about Big-O notation? (A) It represents the
lower bound of an algorithm’s runtime. (B) It represents the upper bound of an algorithm’s runtime
(C) It represents the average runtime of an algorithm. (D) More than one of the above (E) None of
the above 100. Which of the following is NOT a step in the Divide and Conquer algorithm? (A)
Combine (B) Conquer (C) Divide (D) More than one of the above (E) None of the above 101. Merge
Sort is an example of which algorithm design paradigm? (A) Greedy (B) Divide and Conquer (C)
Dynamic Programming (D) More than one of the above (E) None of the above 102. How many edges
does a spanning tree of a graph with N vertices have? (A) N (B) N-1 (C) N(N-l)/2 (D) More than one of
the above (E) None of the above 103. Which of the following is NOT a graph traversal algorithm? (A)
Greedy (B) Divide and Conquer (C) Dynamic Programming (D) More than one of the above (E) None
of the 104. Which of the following is NOT an NPComplete problem? (A) Traveling Salesman Problem
(B) Boolean Satisfiability Problem (C) Shortest Path Problem (D) More than one of the above (E)
None of the above 105. Which of the following is an advantage of using arrays? (A) Constant time
insertion and deletion (B) Ability to store elements of different data types (C) Random access to
elements using an index (D) More than one of the above (E) None of the above 106. Which of the
following is NOT a basic operation performed on a data structure? (A) Encryption (B) Deletion (C)
Insertion (D) More than one of the above (E) None of the above 107. Which of the following is a type
of operating system? (A) Real-time operating system (B) Embedded operating system (C) Network
operating system (D) More than one of the above (E) None of the above 108. Which of the following
is NOT a memory management technique used by operating systems? (A) Paging (B) Segmentation
(C) Fragmentation (D) More than one of the above (E) None of the above 109. Which of the
following is a file system commonly used in operating systems? (A) NTFS (B) FAT32 (C) HFS+ (D) More
than one of the above (E) None of the above Which of the following is NOT a type of interrupt? (A)
Hardware interrupt (B) Memory interrupt (C) Software interrupt (D) More than one of the above (E)
None of the above 111. What is a page in paging? (A) A fixed-size block of virtual memory (B) A fixed-
size block of physical memory (C) A type of memory allocation (D) More than one of the above (E)
None of the above 112. In a system with a page size of 4 KB and a physical address space of 64 GB,
what is the number of bits required for the page offset? (A) 10 bits (B) 12 bits (C) 14 bits (D) More
than one of the above (E) None of the above 113. What is a segment base in segmentation? (A) The
starting address of a segment in physical memory (B) The starting address of a segment in virtual
memory (C) The ending address of a segment in physical memory (D) More than one of the above (E)
None of the above 114. What causes thrashing to occur? (A) Excessive paging activity (B) Insufficient
disk space (C) Hardware failures (D) More than one of the above (E) None of the above 115. Consider
a system with a total physical memory of 8 GB and total virtual memory of 16 GB. If the system is
using 6 GB of physical memory and 10 GB of virtual memory, how much memory is being swapped
out? (A) 2 GB (B) 4 GB (C) 6 GB (D) More than one of the above (E) None of the above 116. How is
the TLB typically organized? (A) As a direct-mapped cache (B) As an associative cache (C) As a set-
associative cache (D) More than one of the above (E) None of the above 117. Which of the following
is a common file operation? (A) Create (B) Delete (C) Rename (D) More than one of the above (E)
None of the 118. Consider a disk queue with requests for I/O to blocks on cylinders. 98 183 37 122
14 124 65 67 considering FCFS (First Come First Served) scheduling, the total number of head
movements is, if the disk head is initially at 53 is? (A) 640 (B) 620 (C) 630 (D) More than one of the
above (E) None of the above 119. Thread shares with other threads belonging to the same process
its (A) thread ID (B) program counter (C) code section and data section (D) More than one of the
above (E) None of the above 120. Which of the following is NOT a type of DBMS? (A) Relational
DBMS (B) Object-Oriented DBMS (C) Sequential DBMS (D) More than one of the above (E) None of
the above 121. In a relational database, what is a primary key? (A) A key used to uniquely identify
each record in a table (B) A key used to establish relationships between tables (C) A key used to sort
records in a table (D) More than one of the above (E) None of the above 122. Which normal form
ensures that every non-prime attribute in a table is fully functionally dependent on the primary key?
(A) First Normal Form (1NF) (B) Second Normal Form (2NF) (C) Third Normal Form (3NF) (D) More
than one of the above (E) None of the above 123. Which SQL command is used to add new rows to a
database table? (A) ADD (B) CREATE (C) INSERT (D) More than one of the above (E) None of the 124.
Which of the following is a disadvantage of using a distributed database system? (A) Improved data
accessibility (B) Increased data security (C) Data inconsistency (D) More than one of the above (E)
None of the above 125. What is the primary function of a router in a computer network? (A) To
connect devices within the same network (B) To connect multiple networks together (C) To filter
incoming traffic based on IP addresses (D) More than one of the above (E) None of the above 126. In
the OSI model, which layer is responsible for routing and forwarding data packets? (A) Data Link
Layer (B) Transport Layer (C) Physical Layer (D) More than one of the above (E) None of the above
127. Which device is used to connect multiple devices within the same local area network (LAN)? (A)
Router (B) Switch (C) Bridge (D) More than one of the above (E) None of the above 128. Which
protocol is used to send email over the Internet? (A) FTP (B) SMTP (C) HTTP (D) More than one of the
above (E) None of the above 129. What is the purpose of a subnet mask in TCP/IP networking? (A)
To identify the network portion of an IP address (B) To identify the host portion of an IP address (C)
To convert IP addresses into domain names (D) More than one of the above (E) None of the 130.
What is the maximum data rate of Bluetooth version 5.0? (A) 1 Mbps (B) 2 Mbps (C) 5 Mbps (D)
More than one of the above (E) None of the above 131. Which of the following is a software
development life cycle model? (A) Waterfall model (B) Agile model (C) Spiral model (D) More than
one of the above (E) None of the above 132. Which of the following is NOT a software development
requirement? (A) Functional requirements (B) System requirements (C) Physical requirements (D)
More than one of the above (E) None of the above 133. What is the main difference between
verification and validation in software testing? (A) Verification ensures that the software is bug-free,
while validation ensures that it meets the requirements. (B) Verification is done before coding, while
validation is done after coding. (C) Verification checks if the software is built right, while validation
checks if the right software is built. (D) More than one of the above (E) None of the above 134. What
is the purpose of a software prototype? (A) To serve as the final version of the software (B) To
replace detailed documentation (C) To speed up the software development process (D) More than
one of the above (E) None of the above 135. What is the primary goal of software engineering? (A)
To write code efficiently (B) To develop software that meets user requirements within budget and
schedule constraints (C) To develop software with the latest technologies (D) More than one of the
above (E) None of the above 13/HV/M-2024-26/HS-. Which of the following is a pillar of OOP? (A)
Inheritance (B) Encapsulation (C) Abstraction (D) More than one of the above (E) None of the above
137. Which keyword is used in Java to implement inheritance? (A) extends (B) inherits (C)
implements (D) More than one of the above (E) None of the above 138. What is the access specifier
used to make members of a class accessible only within the same package? (A) private (B) public (C)
package-private (D) More than one of the above (E) None of the above 139. Inheritance in OOP
allows a class to: (A) Inherit properties and behavior from another class (B) Create instances of
another class (C) Override methods of another class (D) More than one of the above (E) None of the
above 140. What is the purpose of HTML in a web application? (A) To define the structure of web
pages (B) To style web pages (C) To add interactivity to web pages (D) More than one of the above
(E) None of the above 141. Which of the following is an example of a server-side scripting language
commonly used in web applications? (A) HTML (B) CSS (C) C++ (D) More than one of the above (E)
None of the above 142. What is the computational complexity of the halting problem? (A) O(1) (B)
O(n) (C) Not computable (D) More than one of the above (E) None of the above 143. Which of the
following is NOT a component of a Turing machine? (A) Input tape (B) Output tape (C) Control unit
(D) More than one of the above (E) None of the above 13/HV/M-2024-144. Which wireless
communication technology is commonly used in IoT devices for short-range communication? (A)
Bluetooth (B) Wi-Fi (C) 4G LTE (D) More than one of the above (E) None of the above 145. Which of
the following is an example of an IoT protocol used for device communication? (A) HTTP (B) FTP (C)
MQTT (D) More than one of the above (E) None of the above 146. Which of the following is a
subfield of AI? (A) Machine Learning (B) Robotics (C) Natural Language Processing (D) More than one
of the above (E) None of the above 147. Which of the following is a supervised learning algorithm?
(A) Decision Tree (B) K-means Clustering (C) Reinforcement Learning (D) More than one of the above
(E) None of the above 148. Which of the following is NOT a common type of E-Commerce model? (A)
Business-to-Consumer (B2C) (B) Consumer-to-Business (C2B) (C) Consumer-to-Consumer (C2C) (D)
More than one of the above (E) None of the above 149. Which of the following is an example of a
B2C E-Commerce website? (A) Alibaba (B) Amazon (C) Google (D) More than one of the above (E)
None of the above 150. Which of the following is a multimedia authoring tool? (A) Microsoft Word
(B) Adobe Photoshop (C) Adobe Flash (D) More than one of the above (E) None of the above