0% found this document useful (0 votes)
25 views45 pages

1-2039-It QP 7

Uploaded by

Shivadarsh R S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views45 pages

1-2039-It QP 7

Uploaded by

Shivadarsh R S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

General English

1.

Choose the correct antonym of the given word “Grandiose”

(A)

Heavy

(B)

Proud

(C)

Simple

(D)

Clumsy

Ans:: Simple

2.

Choose the correct synonym of the given word: “Candid”

(A)
Anxious

(B)
Frank

(C)
Experienced

(D)
Secretive

Ans:: Frank

3.
My relations Suganya are good.
(A)
against

(B)
with

(C)
on

(D)
to

Ans:: with

4.
Many young men were at street corners for the coffee bar to open.

(A)
hanging about

(B)
hanging on

(C)
hanging back

(D)
hanging out

Ans:: hanging about

5.

The doctor had examined him.

(A)

He was examined by the doctor.

(B)

He had been examined by the doctor.

(C)
He has been examined by the doctor.

(D)

He have been examined by the doctor.

Ans:: He had been examined by the doctor.

6.
To beat about the bush

(A)
To avoid coming to the point

(B)
To boast about oneself

(C)
To punish an innocent person

(D)
Get to the point

Ans:: To avoid coming to the point

7.

Anathematise

(A)

Locate

(B)

Deceive

(C)

Bless
(D)

Radiate

Ans:: Bless

8.

He was quite sure that none of them were aware of the truth.

(A)

had aware of

(B)

were beware of

(C)

was aware of

(D)

were aware from

Ans:: was aware of

9.

Habits : Instinct :: :

(A)

Work : Play

(B)

Birds : Animals
(C)

Training : Heredity

(D)

Learning : Force

Ans:: Training : Heredity

10.

In each of the following questions, four words are given of which two words are nearly
the same or opposite in meaning.
(A) Interminable (B) Long (c) Endless (D) Interfering

(A)

A-C

(B)

B-C

(C)

D-C

(D)

B-D

Ans:: A-C

11.

Choose the correctly spelt word?


(A)

Achievement

(B)

Achevement

(C)

Achievment

(D)

Acheivment

Ans:: Achievement

12.

Choose the mis-spelt word?

(A)

Contingency

(B)

Contemporery

(C)

Contemplate

(D)

Controversial

Ans:: Contemporery
13.

Though he was only a child


(P) he often worked much harder
(Q) than was either necessary
(R) in order to please his parents
(S) or good for him

(A)

RQSP

(B)

RPQS

(C)

PRSQ

(D)

PRQS

Ans:: RPQS

14.

He always stammers in public meetings, but his today’s speech

(A)

was not received satisfactorily

(B)

was not liked by the audience

(C)

was fairly audible to everyone present in the hall

(D)
was surprisingly fluent

Ans:: was surprisingly fluent

15.

I said to my friend, "Can you swim"?

(A)

I asked my friend whether he could swim.

(B)

I asked my friend whether he can be swim.

(C)

I asked my friend whether he can swim.

(D)

I asked my friend whether he could be swim.

Ans:: I asked my friend whether he could swim.

Numerical Ability

16.

The average of a group of men is increased by 5 years when a person aged of 18


years is replaced by a new person of aged 38 years. How many men are there in the
group?

(A)

(B)
4

(C)

(D)

Ans:: 4

17.

The speed of a boat in still water in 15 km/hr and the rate of current is 3 km/hr. The
distance travelled downstream in 12 minutes is:

(A)

1.2 km

(B)

1.8 km

(C)

2.4 km

(D)

3.6 km

Ans:: 3.6 km

18.
At what time between 5:30 and 6 will the hands of a clock be at right angles?

(A)

5
43 𝑚𝑖𝑛. 𝑝𝑎𝑠𝑡 5
11

(B)

7
43 𝑚𝑖𝑛. 𝑝𝑎𝑠𝑡 5
11

(C)

40 min. past 5

(D)

45 min. past 5

𝟕
Ans:: 𝟒𝟑 𝟏𝟏 𝒎𝒊𝒏. 𝒑𝒂𝒔𝒕 𝟓

19.
. 009
= .01
?

(A)
.0009

(B)
.09

(C)

.9
(D)

Ans:: .9

20.

The angle of elevation of the top of a tower from a certain point is 30°. If the
observed moves 20 m towards the tower, the angle of elevation the angle of
elevation of top of the tower increases by 15°. The height of the tower is

(A)

17.3 m

(B)

21.9 m

(C)

27.3 m

(D)

30 m

Ans:: 27.3 m

21.

What is the difference between the simple interest on a principal of Rs. 500 being
calculated at 5% per annum for 3 years and 4% per annum for 4 years?

(A)
Rs. 5

(B)

Rs. 10

(C)

Rs. 20

(D)

Rs. 40

Ans:: Rs. 5

22.

7 - 6 , where n is an integer >0, is divisible by

(A)

13

(B)

127

(C)

559

(D)

34

Ans:: (D)
23.

The cost of an article was Rs.75. The cost was first increased by 20% and later on it
was reduced by 20%. The present cost of the article is:

(A)

Rs. 72

(B)
Rs. 60

(C)

Rs. 75

(D)

Rs. 76

Ans:: Rs. 72

24.

Six years ago, the ratio of the ages of Kunal and Sagar was 6 : 5. Four years hence,
the ratio of their ages will be 11 : 10. What is Sagar's age at present?

(A)

16 years

(B)

18 years

(C)

20 years

(D)
25 years

Ans:: 16 years

25.

Two trains of equal length are running on parallel lines in the same direction at 46
km/hr and 36 km/hr. The faster train passes the slower train in 36 seconds. The
length of each train is:

(A)

50 m

(B)

72 m

(C)

80 m

(D)

82 m

Ans:: 50 m

26.

A shopkeeper marks his goods 30% above his cost price but allows a discount of
10% at the time of sale. His gain is:

(A)
21%
(B)

20%

(C)

18%

(D)

17%

Ans:: 17%

27.

If the fifth term of a GP is 81 and first term is 16, what will be the 4 term of the GP?

(A)

36

(B)

18

(C)

54

(D)

24

Ans:: 54

28.

If A : B = 2 : 3 and B : C = 4 : 5 then A : B : C is

(A)

2:3:5
(B)

5:4:6

(C)

8 : 12 : 15

(D)

6:4:5

Ans:: 8 : 12 : 15

29.

Ravi and Ajay start simultaneously from a place A towards B 60 km apart. Ravi's
speed is 4km/h less than that of Ajay. Ajay, after reaching B, turns back and meets
Ravi at a places 12 km away from (B) Ravi's speed is:

(A)

12 km/h

(B)
10 km/h

(C)

8 km/h

(D)

6 km/h

Ans:: 8 km/h

30.

If 10 men can do a piece of work in 12 days, the time taken by 12 men to do the
same piece of work will be:
(A)

12 days

(B)

10 days

(C)

9 days
(D)

8 days

Ans:: 10 days

General Knowledge

31.
Which Union Ministry is associated with ‘Endorsements Know-hows! Guidelines’?

(A)
Ministry of Consumer Affairs

(B)

Ministry of Agriculture and Farmers welfare

(C)

Ministry of Home Affairs

(D)

Ministry of Corporate Affairs

Ans:: Ministry of Consumer Affairs

32.

‘Incident Management Services’ is associated with which Union Ministry?

(A)
Ministry of Home Affairs
(B)
Ministry of Road Transport and Highways

(C)
Ministry of Housing and Urban Affairs

(D)
Ministry of Agriculture and Farmers welfare

Ans:: Ministry of Housing and Urban Affairs

33.

Which bank unveiled its ‘Next-gen Contact Center’ for personalised customer
experience?

(A)
Canara Bank

(B)
State Bank of India

(C)
Punjab National Bank

(D)
Axis Bank

Ans:: State Bank of India

34.

Port Tanjung Benoa, where INS Sumedha visited recently for a Maritime Partnership
Exercise, is located in which country?

(A)
Bangladesh

(B)
Indonesia

(C)
Vietnam
(D)
Oman

Ans:: Indonesia

35.

Which institution released the “How is India Adapting to Heatwaves?” report?

(A)
NITI Aayog

(B)
Centre for Policy Research

(C)
IEA

(D)
UNEP

Ans:: Centre for Policy Research

36.

‘Yaya Tso’ is a bio-diversity site located in which state/UT?

(A)
Arunachal Pradesh

(B)
Ladakh

(C)
Assam

(D)
Sikkim

Ans:: Ladakh

37.

Who is the first woman IAF officer to receive a gallantry medal?


(A)
Avani Chaturvedi

(B)
Bhawana Kant

(C)
Deepika Misra

(D)
Mohana Singh

Ans:: Deepika Misra

38.

Khuvsgul lake National Park, which was recently added to UNESCO World Network
of Biosphere Reserves, is located in which country?

(A)
Ukraine

(B)
Mongolia

(C)
Chile

(D)
Mexico

Ans:: Mongolia

39.

‘Transforming Literacy Learning Spaces’ is the theme of which special day


celebrated on September 8?

(A)
International Education Day

(B)
International Literacy Day
(C)
International Culture Day

(D)
International Community Learning Day

Ans:: International Literacy Day

40.

Which racing driver won the Miami Grand Prix title in 2023?

(A)
Charles Leclerc

(B)
Max Verstappen

(C)
Sergio Perez

(D)
Lewis Hamilton

Ans:: Max Verstappen

41.

Which country’s plant mycologist is the first person in the world to contract a plant
fungal disease?

(A)
India

(B)
China

(C)
Japan

(D)
USA
Ans:: India

42.

Which city is the host of the Indian wind industry’s biennial exhibition-cum-
conference ‘Windergy’?

(A)
Chennai

(B)
Jaipur

(C)
Ahmedabad

(D)
Bengaluru

Ans:: Chennai

43.

Manuela Roka Botey has been appointed as the first female Prime Minister of which
country?

(A)
Finland

(B)
Equatorial Guinea

(C)
Norway

(D)
Sweden

Ans:: Equatorial Guinea

44.

Tagin language is prevalently spoken in which state/UT?


(A)
Assam

(B)
Sikkim

(C)
Arunachal Pradesh

(D)
Meghalaya

Ans:: Arunachal Pradesh

45.

Fintech Platform PhonePe launched its first green data centre in India in which
state/UT?

(A)
Karnataka

(B)
Maharashtra

(C)
Tamil Nadu

(D)
Gujarat

Ans:: Maharashtra

46.

Which institution released the ‘Status of Women in Agrifood Systems’ Report?

(A)
FAO

(B)
UNICEF

(C)
NABARD
(D)
NITI Aayog

Ans:: FAO

47.

The ‘Greentech Safety Award 2023’ was awarded to which organisation?

(A)
REC

(B)
RINL

(C)
PFC

(D)
SAIL

Ans:: RINL

48.
Rhythm Sangwan, who was seen in the news, plays which sports?

(A)
Wrestling

(B)
Cricket

(C)
Shooting

(D)
Hockey

Ans:: Shooting

49.

‘Riding out the multicrisis’ is the theme of which summit being held in 2022?
(A)
COP-27

(B)
India-ASEAN Summit

(C)
Paris Peace Forum

(D)
UNSC Anti-terrorism Summit

Ans:: Paris Peace Forum

50.
A celt, belonging to the neolithic period, was recently discovered in which state/UT?

(A)
Kerala

(B)
Karnataka

(C)
Tamil Nadu

(D)

Andhra Pradesh

Ans:: Tamil Nadu

Computer Knowledge

51.

What is required when more than one person uses a central computer at the same
time?

(A)

Light pen

(B)
Mouse

(C)
Digitizer

(D)
Terminal

Ans:: Terminal

52.
Which of the following is the first computer to use Stored Program Concept?

(A)
UNIVAC

(B)
ENIAC

(C)
EDSAC

(D)
IBM SSEC

Ans:: EDSAC

53.

The term gigabyte refers to

(A)
1024 bytes

(B)
1024 kilobytes

(C)
1024 megabytes

(D)
1024 gigabyte

Ans:: 1024 megabytes

54.
in which year was UK’s premier computing event called ?The which computer?
started?
(A)
1980

(B)
1985

(C)
1986

(D)
1987

Ans:: 1980

55.
Once you load the suitable program and provide required data, computer does not
needhuman intervention. This feature is known as

(A)
Accuracy

(B)
Reliability

(C)
Versatility

(D)
Automatic

Ans:: Automatic

56.
What is a brand?

(A)
The name of companies that made computers

(B)
The name of product a company gives to identify its product in market

(C)
A name of class to indicate all similar products from different companies
(D)
The Company Sell the Product

Ans:: The name of product a company gives to identify its product in market

57.
Registers, which are partially visible to users and used to hold conditional, are known
as

(A)
PC

(B)
Memory address registers

(C)
Flags

(D)
General purpose register

Ans:: General purpose register

58.
A byte consists of

(A)
One bit

(B)
Four bits

(C)
Eight bits

(D)
Sixteen bits

Ans:: Eight bits

59.
Modern Computers are very reliable but they are not
(A)
Fast

(B)
Powerful

(C)
Infallible

(D)
Cheap

Ans:: Infallible

60.
What is the date when Babbage conceived Analytical engine

(A)
1642

(B)
1837

(C)
1880

(D)
1850

Ans:: 1837
61.
What was the expected feature of fifth generation computers when Japan started
FGCS?

(A)
Operating Systems

(B)
Paralled Processing

(C)
ULSI

(D)
Sequence Processing

Ans:: Paralled Processing


62.
Which of the following memory medium is not used as main memory system?

(A)
Magnetic core

(B)
Semiconductor

(C)
Magnetic tape

(D)
Semiconductor and magnetic tape

Ans:: Magnetic tape

63.
The storage subsystem in a microcomputer consists mainly of or media with varying
capacities

(A)
Memory or video

(B)
Magnetic or optical

(C)
Optical or memory

(D)
Video or magnetic

Ans:: Magnetic or optical

64.
Programs designed to perform specific tasks is known as

(A)
system software

(B)
application software

(C)
utility programs

(D)
operating system

Ans:: application software

65.
UNIVAC is

(A)
Universal Array Computer

(B)
Universal Automatic Computer

(C)
Unique Automatic Computer

(D)
Unvalued Automatic Computer

Ans:: Universal Automatic Computer

66.
Which of the following is not a type of computer on the basis of operation?

(A)
Digital

(B)
Analog

(C)
Hybrid

(D)
Remote

Ans:: Remote

67.
Which of the following type of computer is mostly used for automatic operations?

(A)
analog

(B)
digital

(C)
hybrid
(D)
remote

Ans:: hybrid

68.
Which of the following invention gave birth to the much cheaper microcomputers?

(A)
PDAs

(B)
Microprocessors

(C)
Microcomputers

(D)
Mainframes

Ans:: Microprocessors

69.

Which of the following computers are lower than mainframe computers in terms of
speed and storage capacity?

(A)
Mainframes

(B)
Hybrid

(C)
Mini

(D)
Super

Ans:: Mini

70.

Which of the following is the first neural network computer?

(A)
AN

(B)
AM
(C)
RFD

(D)
SNARC

Ans:: SNARC

71.
For real time operating systems, interrupt latency should be

(A)
zero

(B)
minimal

(C)
maximum

(D)
dependent on the scheduling

Ans:: minimal

72.

Personnel who design, program, operates and maintains computer equipment refers
to

(A)
Console-operator

(B)
Programmer

(C)
System Analyst

(D)
Peopleware

Ans:: Peopleware
73.The priority of a process will if the scheduler assigns it a static priority.

(A)
depends on the operating system

(B)
change

(C)
remain unchanged

(D)
Variable

Ans:: remain unchanged

74.
RJ45 UTP cable has Cables.

(A)
2 pair

(B)
3 pair

(C)
4 pair

(D)
5 pair

Ans:: 5 pair

75.
What are the characteristics of stack based IDS?

(A)
It is programmed to interpret a certain series of packets

(B)
It models the normal usage of the network as a noise characterization

(C)
They are integrated closely with the TCP/IP stack and watch packets

(D)
The host operating system logs in the audit information

Ans:: They are integrated closely with the TCP/IP stack and watch packets

76.
8000 Machine consists of 16-bit general-purpose register.

(A)
Eighteen

(B)
Sixteen

(C)
Twenty
(D)
Nineteen

Ans:: Sixteen

77.
In which machine every register is a general-purpose register.

(A)
z8000

(B)
MC 68000

(C)
Intel 8085

(D)
Intel 8086

Ans:: Intel 8086

78.
The fetched instruction is stored in the CPU register known as.

(A)
IRC Instruction register
(B)
PC Program counter

(C)
MARC Memory address Register

(D)
MDRC memory Data Register

Ans:: IRC Instruction register

79.
instruction specifies the requirements of execution is tattere(D)

(A)
Control

(B)
CPU-memory transfer

(C)
CPU-I/O transfer

(D)
IRC Instruction register

Ans:: Control

80.
site that distributes the source code of the software

(A)
SsourceForge.net

(B)
FreeSoftware.org

(C)
OpenSource.org

(D)
OpenSourceSoftware.net

Ans:: SsourceForge.net
81.
Which was written by Larry Mavoy was chosen by Torvalds to use for version control
for the LINUX Kernal.

(A)
Configuration Directories

(B)
Source Safe

(C)
Bitkeeper

(D)
Multiple Repositories

Ans:: Bitkeeper

82.
requires that any promise to contribute back any changes or addition to the
software.

(A)
Reciprocal licenses

(B)
Academic licenses

(C)
General Public license

(D)
Software Licenses

Ans:: Reciprocal licenses

83.
Usually require just acknowledgement of the original owners work on the software

(A)
Reciprocal licenses

(B)
Academic licenses

(C)
General Public license

(D)
Software Licenses

Ans:: Academic licenses

84.
Dual licensing is also called as

(A)
tri-licensing

(B)
business licensing

(C)
multi licensing

(D)
software licensing

Ans:: multi licensing

85.
Which of the following DDoS in mobile systems wait for the owner to trigger the
cyber attack?

(A)
botnets

(B)
programs

(C)
virus

(D)
worms
Ans:: botnets

86.
Which of the following is the least strong security encryption standard?

(A)
WPA3

(B)
WPA2

(C)
WPA

(D)
WEP

Ans:: WEP

87.
Which of the following is a Stuxnet?

(A)
Trojan

(B)
Antivirus

(C)
Worm

(D)
Virus

Ans:: Worm

88.
Which of the following ethical hacking technique is used for determining which
operating system (OS) is running on a remote computer?

(A)
Operating System fingerprinting
(B)
Operating System penetration testing

(C)
Digital-printing

(D)
Machine printing

Ans:: Operating System fingerprinting

89.
Which of the following can diminish the chance of data leakage?

(A)
Steganography

(B)
Chorography

(C)
Cryptography

(D)
Authentication

Ans:: Steganography

90.
is the part of malware such as worms or viruses which performs the
malicious action; deleting data, sending spam or encrypting data.

(A)
Payload

(B)
Spamming

(C)
Exploits

(D)
Scams
Ans:: Payload

91.
is the action of recording the keys struck on a keyboard, typically
covertly, so that the person using the keyboard is unaware that their actions are
being monitored.

(A)
Keylogging

(B)
Spamming

(C)
Denial of service

(D)
Exploits

Ans:: Keylogging

92.
The attack that focuses on capturing small packets from the network transmitted by
other computers and reading the data content in search of any type of information is

(A)
Eavesdropping

(B)
Exploits

(C)
Scams

(D)
Denial of service

Ans:: Eavesdropping
93.
are computer programs that are designed by attackers to gain root or
administrative access to your computer.

(A)
Backdoors

(B)
Rootkits

(C)
Malware

(D)
Antiware

Ans:: Rootkits

94.
What is the software called which when get downloaded on computer scans your
hard drive for personal information and your internet browsing habits?

(A)
Spyware

(B)
Antiware

(C)
Backdoors

(D)
Malware

Ans:: Spyware

95.
Protection from of source code means alloting the right to edit the source
code to authorized persons only.
(A)
disclosure
(B)
alteration

(C)
destruction

(D)
log of changes (whois making request)

Ans:: log of changes (whois making request)

96. Protection from of source code means protection of any individual


from destroying the software source code.

(A)
Disclosure

(B)
Alteration

(C)
Destruction

(D)
log of changes (whose making request)

Ans:: Disclosure

97.

Protection from of source code means recording all changes made to the
source code and the person making such changes.

(A)
disclosure

(B)
alteration

(C)
destruction

(D)
log of changes (whois making request)

Ans:: alteration

98.
of access rights in source code development means verification of role
before permitting access to source code.
(A)
verification

(B)
maintaining historical records

(C)
error handling

(D)
log of changes (whois making request)

Ans:: error handling

99.

in source code development means verification of role before permitting


access to source code.

(A)
verification

(B)
maintaining historical records

(C)
error handling

(D)
log of changes (whois making request)

Ans:: verification

100.
The processing required for a single instruction is called .
(A)
Fetch cycle

(B)
Execution cycle

(C)
Instruction cycle

(D)
Branch cycle

Ans:: Instruction cycle

You might also like