Previous Exams

Tradesman-Computer,Technical Education - 2016

 

Time Remaining :
1. Which command is used to remove a file?
remove
rom
mv
del
2. Which of the following is considered as DBMS?
Foxpro
Oracle
Ms Access
All of the above
3. Which of the following is not a type of constructor?
Copy constructor
Friend Constructor
Default Constructor
Parameterized Constructor
5. Which of the following System software resides in the main memory always?
Text Editor
Assembler
Linker
Loader
6. When was Apple Macintosh II micro computer introduced in the market?
1964
1970
1983
1986
7. FDDI is a:
Ring Network
Mesh Network
Star Network
Bus Network
8. Which command is used to display the top of the file?
Cat
Head
More
Grep
9. Which of the following device is used to connect two systems,especially if the systems use different protocols?
Hub
Bridge
Gateway
Repeater
9. EBCDIC can code up to how many different characters:
8
32
64
256
11. Which 32-bit microprocessor is used in IBM’s PS/2 model-80 computer?
8088
80286
80386
80486
12. The Boolean expression X=A+B+C+is logically equivalent to what single gate:
NAND
NOR
AND
OR
13. What php stands for?
Pre Hypertext processor
Hyper text processor
Pre Hyper processor
Pre Hyper text process
14. Which of the following statement is correct?
Class is an instance of object
Object is an instance of a class
Class is an instance of data type
Object is an instance of data type
15. Which of the following is an abstract data type?
Int
Double
String
Class
16. Which of the following is the address of the router?
The IP address
The TCP address
The subnet mask
The default gateway
17. The --------layer is the layer closes to the transmission medium.
Transport
Network
Physical
Datalink
18. ASCII stands for:
All purpose Scientific Code for Information Interchange
American Standard Code for information Interchange
American Security Code for Information Interchange
American Scientific Code for Information Interchange
19. 1024 Kilobytes represent a:
1 MB
1 GB
1 KB
None of these
20. The ASCII code for the character J is:
10010001
1001 1010
0100 1010
1010 0001
21. Which of the following is not a function of DBA?
Network maintenance
Routine Maintenance
Schema Definition
Authorisation for data access
22. A system program that combines the separately compiled modules of a program into a form suitable for execution:
Assembler
Linking Loader
Cross compiler
Load and Go
23. The software used to convert source program instructions to object instruction is known as:
Compiler
Assembler
Interpreter
Language Processor
24. To copy the hidden system files of DOS to mother disk you can use the command:
Copy
Ren
Sys
Diskcopy
25. Which of the following is a group of one or more attributes that uniquely identifies a row?
Key
Domain
Tuple
Relation
26. A full binary tree with 2n+1 nodes contain:
n leaf nodes
n non leaf nodes
n-1 leaf nodes
n-1 non leaf nodes
27. What does Belay Anomaly related to?
Page Replacement Algorithm
Memory Management Algorithm
Deadlock prevention Algorithm
Disk scheduling Algorithm
28. In Which year the first operating system was developed:
1910
1940
1950
1980
29. The geostationary satellite used for communication systems:
Rotates with the earth
Remains stationary relative on the earth
Is positioned over equator
All of the above
30. What is the port number of POP3?
80
110
90
49
31. A relation is in this form if it is in BCNF and has no multivalued dependencies:
Second normal form
Third normal form
Fourth normal form
Domain/Key normal form
32. Who programmed the first computer game spacewar in 1962?
Steve Russell
Konard Zuse
Alan Emtage
Tim Berners-lee
33. Which access method is used for obtaining a record from a cassette tap?
Direct
Sequential
Random
All of the above
34. A technique for direct search is:
Binary search
Linear search
Tree search
Hashing
35. The postfix form of the expression:(A+B)*(C*D-E)*F/G is
AB+CD*E-FG/**
AB+CD*E-F**G/
AB+CD*E-*F*G/
AB+CDE*-*F*G/
36. What does PPTP stands for?
Point to Point Transmission Protocol
Point to Point Transfer Protocol
Point to Point Tunneling Protocol
Point to Point Traffic Protocol
37. Which of the following statement is correct
C++ allows static type checking
C++ allows dynamic type checking
C++ allows static member function be of type const
Both A and B
38. Which is a reserved word in the Java Programming language?
Method
Native
Reference
Subclass
39. The communication mode that supports two-way traffic but only one direction at time is:
Simplex
Duplex
Half duplex
Multiplex
40. What is thrashing?
A high paging activity is called thrashing
A high executing activity is called thrashing
A extremely long process is called thrashing
A extremely long virtual memory is called thrashing
41. Linux Torvalds develop which operating system:
Windows
Mac OS
UNIX
Linux
42. Which operating system is developed and used by Apple Inc?
Windows
Android
iOS
UNIX
43. Which one is the current fastest super computer in India?
Param Padma
SAGA-220
PARAM YUVA II
EKA
45. One solution to the multivalued dependency constraint problem is to:
Split the relation into two relations each with a single theme
Change the theme
Create a new theme
Add a composite key
46. Which of the following algorithm solves the all pair shortest path problem?
Floyd- Warshall algorithm
Warshall’s algorithm
Prim’s algorithm
Dijkstra’s algorithm
47. Which of the following is an invalid visibility label while inheriting a class?
Public
Private
Protected
Friend
48. What does SSL stands for?
System Socket Layer
Secure System Login
Secure Socket Layer
Secure System Layer
49. What hardware architectures are not supported by Red Hat?
SPARC
IBM-COMPATIBLE
Alpha
Macintosh
50. How many types of Polymorphism are supported by C++?
1
2
3
4
51. Which address is the loop back address?
0.0.0.1
127.0.0.0
127.0.0.1
255.255.255.255
52. Process are classified into different group in:
Multilevel queue scheduling algorithm
Priority scheduling algorithm
Round Robin scheduling algorithm
Shortest job scheduling algorithm
53. Which keys can be used to pressed quit without saving in DOS?
Ctrl+A
Ctrl+B
Ctrl+D
Ctrl+C
54. The OS of a computer may periodically collect all the free memory space to form continuous block of free space.This is called:
Garbage collection
Concatenation
Collision
Dynamic Memory Allocation
55. Who was the father of Punched Card Processing?
J.Prosper Eckert
Charles Babbage
Dr.Herman Hollerith
Blaise Pascal
56. What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers?
16
9
8
4
57. India’s first super computer param 8000 was installed in:
1988
1982
1995
1991
58. The number of interchanges required to sort 5,1,6,2,4 in asceding order using Bubble sort is:
6
5
7
8
59. Modem is used data transmission when was it invented and in which country:
1963,USA
1965,Germany
1950,USA
1950,Japan
60. In Php variable name starts with:
!
&
#
$
61. The person contributes the idea of the stored program was:
Charles Babbage
Howard Aiken
Jon Von Neuman
Winton Cerf
62. Father of Java Programming language
Dennis Richi
James Goslin
Simer Crey
James Russel
63. A semaphore:
Is a binary mutex
Must be accessed from only one process
Can be accessed from mulitiple process
None of these
64. In OSI Model,which of the following layer provides error-free delivery of data
Data link
Network
Transport
Session
65. Which of the following is not a level 0 data abstraction?
Physical layer
Critical layer
Logical layer
View level
66. ISP exchanges internet traffic between their networks by:
Internet exchange point
Subscriber end point
ISP end point
None of the above
67. What are the most commonly used transmission speeds in BPS used in data communication
300
1200
2400
9600
68. The average successful search time or sequential search on ‘n’ items is:
n/2
(n-1)/2
(n+2)/2
log(n)+1
69. Which of the following is a data model?
Entity-Relationship model
Relational data model
Object Based data model
All of the above
70. What is the default subnet mask for a class is A network?
127.0.0.1
255.0.0.0
255.255.255.0.0
255.255.255.0
71. How many instances of an abstract class can be created?
1
4
10
0
72. Which of the following is the 2’s compliment of 1011?
1010
0101
1100
0111
73. Which of the following commands is used to update access and modification?
Grep
We
Touch
Cat
74. A high speed device used in CPU for temporary storage during processing is called:
A Register
A Bus
A Data bus
All of the above
75. Which of the following statement is correct?
Base class pointer cannot point to derived class
Derived class pointer cannot point to base class
Pointer to derived class cannot be created
Pointer to base class cannot be created
76. Bottom up parshing involves:
Shift reduce
Handle Pruning
Operator check
A and B
77. Which of the following cannot be friend?
Function
Class
Object
Operator Function
78. Which is a valid keyword in Java?
Interface
String
Float
Unsigned
79. The Average time necessary for the correct sector of a disk to arrive at the read write head is:
Down time
Seek time
Latency time
Access time
80. Type checking is normally done during
Lexical analysis
Syntax Analysis
Code Generation
Syntax direct translation
81. ”Yachana Yathra”to enable the poor children to get educated was led by:
A.K.Gopalan
V.T.Bhattathirippad
K.Kelappan
T.K.Madhavan
82. Who is known as the Jhansi of Travancore?
Arya Pallam
Anna Chandi
Lalitha Prabhu
Akkamma Cheriyan
83. Which organization led Kalpathi Revolts?
Sahodrasangham
SNDP
Aryasamaj
Yogakshemasabha
84. The prefix “Mahakavi”awarded to Kumaranasan by Madras University in the year:
1922
1918
1924
1920
85. In which temple Sree Narayana Guru installed mirror?
Aruvippuram
Karamukku
Sivagiri
Kalavamkodam
86. Who won the Nobel Prize in literature in 2015?
Patric Modiano
Svetlana Alexievich
Alice Munro
Mo Yan
87. India’s first space research observatory ,ASTROSAT successfully launched in to the orbit from Sreeharikota:
2015 September 25
2015 September 30
2015 September 28
2015 September 27
88. Who is the brand ambassador of the programme”Pradhan Mantri Jan-Dhan Yojana?”
Shahrukh Khan
Amitabh Bachchan
Shilpa Shetty
Ankit Fadia
89. Who painted “The Potato Eaters”?
Piccaso
Leonardo da vinci
Vincent Van Gogh
Raja Ravi Varma
90. Gandhiji learned about civil disobedience movement from:
Hermann Kallenbach
Henry David Thoreau
Martine Luther King
Leo Tolstoy
91. From where have been Indian constitution inspired the idea of federal government with a strong centre and a different State government?
Constitution of Canada
Constitution of USA
Constitution of Britain
Constitution of Australia
92. Out of 543 elected Loksabha members,how many members represented the Union Territories?
8
10
15
20
93. In which year NOTA (None of the above)implemented in India?
2010
2012
2013
2014
94. ”The spirit of democracy is not a mechanical think to be adjusted by abolition of form.I required change of heart “-Who says this?
Abraham Lincoln
Mahatma Gandhi
Rabindranath Tagore
Subhas Chandra Bose
95. Which parliamentary committee in India is normally chaired by a prominent member of the opposition?
Privileges Committee
Estimates Committee
Public Accounts Committee
Committee on Government Assurances
96. National Food Security Mission(NFSM)launched in the year:
2008
2005
2010
2007
97. Which of the following is the scheme for prevention of Trafficking and Rescue,Rehabilitation and Re-integration of Victims of Trafficking for Commercial Sexual exploitation?
Ujjawala
Swadhar
Kishori Sakthi Yojana
Integrated Child Development Services
98. Right to Information Act(RTI)passed in the year:
2004
2005
2007
2008
99. Which of the following award is given for individual’s working for child welfare?
Kishori Shakthi Yojana
Vayoshreshtha Samman Award
Rajeev Gandhi Manav Seva Award
None of the above
100. The Food for work programme was renamed as:
Rural Landless Employment
Integrated Rural Development Programme(IRDP)
Jawahar Rozgar Yojana(JRY)
National Rural Employment Programme(NREP)