Previous Exams

Tradesman-Computer,Technical Education - 2016

 

Time Remaining :
1. Which command is used to remove a file?
remove

rom

mv

del
2. Which of the following is considered as DBMS?
Foxpro

Oracle

Ms Access

All of the above
3. Which of the following is not a type of constructor?
Copy constructor

Friend Constructor

Default Constructor

Parameterized Constructor
5. Which of the following System software resides in the main memory always?
Text Editor

Assembler

Linker

Loader
6. When was Apple Macintosh II micro computer introduced in the market?
1964

1970

1983

1986
7. FDDI is a:
Ring Network

Mesh Network

Star Network

Bus Network
8. Which command is used to display the top of the file?
Cat

Head

More

Grep
9. Which of the following device is used to connect two systems,especially if the systems use different protocols?
Hub

Bridge

Gateway

Repeater
9. EBCDIC can code up to how many different characters:
8

32

64

256
11. Which 32-bit microprocessor is used in IBM’s PS/2 model-80 computer?
8088

80286

80386

80486
12. The Boolean expression X=A+B+C+is logically equivalent to what single gate:
NAND

NOR

AND

OR
13. What php stands for?
Pre Hypertext processor

Hyper text processor

Pre Hyper processor

Pre Hyper text process
14. Which of the following statement is correct?
Class is an instance of object

Object is an instance of a class

Class is an instance of data type

Object is an instance of data type
15. Which of the following is an abstract data type?
Int

Double

String

Class
16. Which of the following is the address of the router?
The IP address

The TCP address

The subnet mask

The default gateway
17. The --------layer is the layer closes to the transmission medium.
Transport

Network

Physical

Datalink
18. ASCII stands for:
All purpose Scientific Code for Information Interchange

American Standard Code for information Interchange

American Security Code for Information Interchange

American Scientific Code for Information Interchange
19. 1024 Kilobytes represent a:
1 MB

1 GB

1 KB

None of these
20. The ASCII code for the character J is:
10010001

1001 1010

0100 1010

1010 0001
21. Which of the following is not a function of DBA?
Network maintenance

Routine Maintenance

Schema Definition

Authorisation for data access
22. A system program that combines the separately compiled modules of a program into a form suitable for execution:
Assembler

Linking Loader

Cross compiler

Load and Go
23. The software used to convert source program instructions to object instruction is known as:
Compiler

Assembler

Interpreter

Language Processor
24. To copy the hidden system files of DOS to mother disk you can use the command:
Copy

Ren

Sys

Diskcopy
25. Which of the following is a group of one or more attributes that uniquely identifies a row?
Key

Domain

Tuple

Relation
26. A full binary tree with 2n+1 nodes contain:
n leaf nodes

n non leaf nodes

n-1 leaf nodes

n-1 non leaf nodes
27. What does Belay Anomaly related to?
Page Replacement Algorithm

Memory Management Algorithm

Deadlock prevention Algorithm

Disk scheduling Algorithm
28. In Which year the first operating system was developed:
1910

1940

1950

1980
29. The geostationary satellite used for communication systems:
Rotates with the earth

Remains stationary relative on the earth

Is positioned over equator

All of the above
30. What is the port number of POP3?
80

110

90

49
31. A relation is in this form if it is in BCNF and has no multivalued dependencies:
Second normal form

Third normal form

Fourth normal form

Domain/Key normal form
32. Who programmed the first computer game spacewar in 1962?
Steve Russell

Konard Zuse

Alan Emtage

Tim Berners-lee
33. Which access method is used for obtaining a record from a cassette tap?
Direct

Sequential

Random

All of the above
34. A technique for direct search is:
Binary search

Linear search

Tree search

Hashing
35. The postfix form of the expression:(A+B)*(C*D-E)*F/G is
AB+CD*E-FG/**

AB+CD*E-F**G/

AB+CD*E-*F*G/

AB+CDE*-*F*G/
36. What does PPTP stands for?
Point to Point Transmission Protocol

Point to Point Transfer Protocol

Point to Point Tunneling Protocol

Point to Point Traffic Protocol
37. Which of the following statement is correct
C++ allows static type checking

C++ allows dynamic type checking

C++ allows static member function be of type const

Both A and B
38. Which is a reserved word in the Java Programming language?
Method

Native

Reference

Subclass
39. The communication mode that supports two-way traffic but only one direction at time is:
Simplex

Duplex

Half duplex

Multiplex
40. What is thrashing?
A high paging activity is called thrashing

A high executing activity is called thrashing

A extremely long process is called thrashing

A extremely long virtual memory is called thrashing
41. Linux Torvalds develop which operating system:
Windows

Mac OS

UNIX

Linux
42. Which operating system is developed and used by Apple Inc?
Windows

Android

iOS

UNIX
43. Which one is the current fastest super computer in India?
Param Padma

SAGA-220

PARAM YUVA II

EKA
45. One solution to the multivalued dependency constraint problem is to:
Split the relation into two relations each with a single theme

Change the theme

Create a new theme

Add a composite key
46. Which of the following algorithm solves the all pair shortest path problem?
Floyd- Warshall algorithm

Warshall’s algorithm

Prim’s algorithm

Dijkstra’s algorithm
47. Which of the following is an invalid visibility label while inheriting a class?
Public

Private

Protected

Friend
48. What does SSL stands for?
System Socket Layer

Secure System Login

Secure Socket Layer

Secure System Layer
49. What hardware architectures are not supported by Red Hat?
SPARC

IBM-COMPATIBLE

Alpha

Macintosh
50. How many types of Polymorphism are supported by C++?
1

2

3

4
51. Which address is the loop back address?
0.0.0.1

127.0.0.0

127.0.0.1

255.255.255.255
52. Process are classified into different group in:
Multilevel queue scheduling algorithm

Priority scheduling algorithm

Round Robin scheduling algorithm

Shortest job scheduling algorithm
53. Which keys can be used to pressed quit without saving in DOS?
Ctrl+A

Ctrl+B

Ctrl+D

Ctrl+C
54. The OS of a computer may periodically collect all the free memory space to form continuous block of free space.This is called:
Garbage collection

Concatenation

Collision

Dynamic Memory Allocation
55. Who was the father of Punched Card Processing?
J.Prosper Eckert

Charles Babbage

Dr.Herman Hollerith

Blaise Pascal
56. What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers?
16

9

8

4
57. India’s first super computer param 8000 was installed in:
1988

1982

1995

1991
58. The number of interchanges required to sort 5,1,6,2,4 in asceding order using Bubble sort is:
6

5

7

8
59. Modem is used data transmission when was it invented and in which country:
1963,USA

1965,Germany

1950,USA

1950,Japan
60. In Php variable name starts with:
!

&

#

$
61. The person contributes the idea of the stored program was:
Charles Babbage

Howard Aiken

Jon Von Neuman

Winton Cerf
62. Father of Java Programming language
Dennis Richi

James Goslin

Simer Crey

James Russel
63. A semaphore:
Is a binary mutex

Must be accessed from only one process

Can be accessed from mulitiple process

None of these
64. In OSI Model,which of the following layer provides error-free delivery of data
Data link

Network

Transport

Session
65. Which of the following is not a level 0 data abstraction?
Physical layer

Critical layer

Logical layer

View level
66. ISP exchanges internet traffic between their networks by:
Internet exchange point

Subscriber end point

ISP end point

None of the above
67. What are the most commonly used transmission speeds in BPS used in data communication
300

1200

2400

9600
68. The average successful search time or sequential search on ‘n’ items is:
n/2

(n-1)/2

(n+2)/2

log(n)+1
69. Which of the following is a data model?
Entity-Relationship model

Relational data model

Object Based data model

All of the above
70. What is the default subnet mask for a class is A network?
127.0.0.1

255.0.0.0

255.255.255.0.0

255.255.255.0
71. How many instances of an abstract class can be created?
1

4

10

0
72. Which of the following is the 2’s compliment of 1011?
1010

0101

1100

0111
73. Which of the following commands is used to update access and modification?
Grep

We

Touch

Cat
74. A high speed device used in CPU for temporary storage during processing is called:
A Register

A Bus

A Data bus

All of the above
75. Which of the following statement is correct?
Base class pointer cannot point to derived class

Derived class pointer cannot point to base class

Pointer to derived class cannot be created

Pointer to base class cannot be created
76. Bottom up parshing involves:
Shift reduce

Handle Pruning

Operator check

A and B
77. Which of the following cannot be friend?
Function

Class

Object

Operator Function
78. Which is a valid keyword in Java?
Interface

String

Float

Unsigned
79. The Average time necessary for the correct sector of a disk to arrive at the read write head is:
Down time

Seek time

Latency time

Access time
80. Type checking is normally done during
Lexical analysis

Syntax Analysis

Code Generation

Syntax direct translation
81. ”Yachana Yathra”to enable the poor children to get educated was led by:
A.K.Gopalan

V.T.Bhattathirippad

K.Kelappan

T.K.Madhavan
82. Who is known as the Jhansi of Travancore?
Arya Pallam

Anna Chandi

Lalitha Prabhu

Akkamma Cheriyan
83. Which organization led Kalpathi Revolts?
Sahodrasangham

SNDP

Aryasamaj

Yogakshemasabha
84. The prefix “Mahakavi”awarded to Kumaranasan by Madras University in the year:
1922

1918

1924

1920
85. In which temple Sree Narayana Guru installed mirror?
Aruvippuram

Karamukku

Sivagiri

Kalavamkodam
86. Who won the Nobel Prize in literature in 2015?
Patric Modiano

Svetlana Alexievich

Alice Munro

Mo Yan
87. India’s first space research observatory ,ASTROSAT successfully launched in to the orbit from Sreeharikota:
2015 September 25

2015 September 30

2015 September 28

2015 September 27
88. Who is the brand ambassador of the programme”Pradhan Mantri Jan-Dhan Yojana?”
Shahrukh Khan

Amitabh Bachchan

Shilpa Shetty

Ankit Fadia
89. Who painted “The Potato Eaters”?
Piccaso

Leonardo da vinci

Vincent Van Gogh

Raja Ravi Varma
90. Gandhiji learned about civil disobedience movement from:
Hermann Kallenbach

Henry David Thoreau

Martine Luther King

Leo Tolstoy
91. From where have been Indian constitution inspired the idea of federal government with a strong centre and a different State government?
Constitution of Canada

Constitution of USA

Constitution of Britain

Constitution of Australia
92. Out of 543 elected Loksabha members,how many members represented the Union Territories?
8

10

15

20
93. In which year NOTA (None of the above)implemented in India?
2010

2012

2013

2014
94. ”The spirit of democracy is not a mechanical think to be adjusted by abolition of form.I required change of heart “-Who says this?
Abraham Lincoln

Mahatma Gandhi

Rabindranath Tagore

Subhas Chandra Bose
95. Which parliamentary committee in India is normally chaired by a prominent member of the opposition?
Privileges Committee

Estimates Committee

Public Accounts Committee

Committee on Government Assurances
96. National Food Security Mission(NFSM)launched in the year:
2008

2005

2010

2007
97. Which of the following is the scheme for prevention of Trafficking and Rescue,Rehabilitation and Re-integration of Victims of Trafficking for Commercial Sexual exploitation?
Ujjawala

Swadhar

Kishori Sakthi Yojana

Integrated Child Development Services
98. Right to Information Act(RTI)passed in the year:
2004

2005

2007

2008
99. Which of the following award is given for individual’s working for child welfare?
Kishori Shakthi Yojana

Vayoshreshtha Samman Award

Rajeev Gandhi Manav Seva Award

None of the above
100. The Food for work programme was renamed as:
Rural Landless Employment

Integrated Rural Development Programme(IRDP)

Jawahar Rozgar Yojana(JRY)

National Rural Employment Programme(NREP)