COMPUTER PROGRAMMER - TECHNICAL EDUCATION -KERALA PSC PREVIOUS QUESTION PAPER
#1


.pdf   COMPUTER PROGRAMMER - TECHNICAL EDUCATION -ENGINEERING COLLEGES.pdf (Size: 1.42 MB / Downloads: 2)

1.Type of value stored'in a variable can be identified using____________of the variable.
 (A)Variable Name(B)Data Type
(C )Variable Size(D)None of these

2.Two main measures for the efficiency of an algorithm are :
(A)Processor and memory(B)Complexity and capacity.
(C )Time and space(D)Data and space

3.If two sets A and B have no common elements then such sets are known as :
(A)Union(B)Distinct
(C )Disjoin(D)Complement

4._________are used to over come the difference in data transfer speeds of various devices.
(A) Speed enhancing circuitry’(B)Bridge circuitsBridge circuits
(C ) Multiple buses(D)Buffer registers

5.Cache memory works on the principle of:
(A) Locality of data(B)Locality of memory
(C ) Locality of reference(D)Locality of reference and memoryLocality of reference and memory

6.If 110011012 is divided by 11O2 the remainder isl
(A) 101(B)11
(C ) 0(D)1

7.The program that brings the object code into memory for execution is :
(A) Loader(B)Fetcher •
(C ) Extractor(D)LinkerLinker

8.The order in which the return addresses are generated and used is :
(A) LIFO(B)FIFO
(C ) Random(D)Highest priorityHighest priority

9. The classification of BUSes into synchronous and asynchronous is based on :
(A)the devices connected to them(B)the type of data transfer
(C )the timing of data transfers(D)none of the abovenone of the above

10.Which is not a magnetic storage device?
(A)Hard disk(B)Tape drive
(C )Compact disk(D)All of these

11.In a digital representation of voltages using an8-bit binary code,how many values can be defined?binary code, how many values can be defined?
(A)128(B)256256
(C )6464(D)1616

12.The memory used to hold the address of data stored inthe cache is:
.(A)Associative memoryAssociative memory(B)Primary memory
(C )Secondary memorySecondary memory(D)RegisterRegister

13.— is a black box testing method.
(A)Basic path testing(B)Code path analysis
(C )Boundary value analysis(D)Recovery testing

14.The strategy of temporarily suspending the running process is called :
(A)First come first serve(B)Shortest job first Shortest job first
(C )Preemptive scheduling(D)Non-preemptive scheduling

15.Fork is:
(A)Creation of a new job(B)Dispatching of new taskDispatching of new task
(C )Creation of new processCreation of new process(D)Increasing priority of process

16.Resolution of externally defined symbol is done by :
(A)Linker(B)Loader
(C )Compiler(D)AssemblerAssembler

17.In_________________topology, whole network goes down, if a computer’s network cable is broken.
(A)RingRing(B)Star
(C )BusBus(D)Token ringToken ring

bits per symbol.
18.Baudot’code uses
(A)3(B) 5
• (C ) 6(D) 8

19.Which of the following problem js undecidable?
(A)Membership problem for CFL (C ) Fitness problem for FSAs
(B) Membership problem for regular sets (D) Ambiguity problem of CFGs

20.Image compression is :
(A)reducing the size of image to fit to screen
(B)making image look better
(C )reducing the redundancy of image data
(D)reducing degradation over image

21.Basic steps for filtering in the frequency domain :
(A)Fourier transform' (B) Filter function
(C ) Inverse Fourier transform(D) All of the above

22.What is the difference between a simulator and an emulator in embedded system development?
(A)Emulator runs in target system, simulator runs in development system
(B)Simulator runs in target system, emulator runs in development system
(C )Emulator is indented for assembly language testing, simulator intended for high level language testing
(D)Simulator is indented for assembly language testing, emulator intended for high level language testing

23.Type checking is normally done by : 
(A) Lexical analyzer (C ) Syntax analyzer
(B) Code optimizer (D) Linear analyzer

24.Producer consumer problem can be solved using :
(A) monitors(B) semaphores
(C ) event counters(D) all the above

25. Time To Live field in the ip header is used :
(A)to find the shortest path(B)to find alternate path
(C )to aviod infinite loopsto avoid infinite loops(D)to reduce the size of packetto reduce the size of packet

26.AGING is a technique used in :
(A)FCFS(B)Round RobinRound Robin
(C )Priority scheduling(D)Pre-emptive schedulingPre-emptive scheduling

27.The term used to refer to a row in database is :
(A)Field(B)TupleTuple
(C )Attribute(D)EntryEntry

28.In a microprocessor the register that keeps the results of arithmetic or logic operation
,(A)Program counter(B)Flag register
* (C )AccumulatorAccumulator(D)Stack register

29.Thrashing occurs when a :
(A)Computer's virtual memory subsystem is in a constant state of paging Computer’s virtual memory subsystem is in a constant state of paging
(B)Computer’s main memory got exhausted
(C )Computer's processes are in indefinite dead lockComputer’s processes are in indefinite dead lock
(D)None of the above None of the above

30.A systemprogram that sets up a program in main memory ready for execution is :
(A)Assembler(B)Linker
(C )EditorEditor(D)LoaderLoader

31.For largenetworks,_________topology is used.
(A)Bus(B)Star
 (C )RingRing(D)MeshMesh

32.ARPANET stands for :
(A)American Research Project Agency Network
(B)Asian Research Project Agency Network
(C )Ad-hoc Research Project Agency Network
(D)Advanced Research Project Agency Network

33.Every context sensitive language is :
(A)Recursive enumerable language (C ) Context free language
(B) Recursive language (D) Context sensitive language

34.The permitted values of each attributes of a relation is called its :
(A) Set .‘(B) Tuple
.(C ) Schema(D) Domain

35.The addressing mode in which you directly give the operand value is :
(A) Relative(B) Direct
(C ) Definite(D) Immediate

36.What is the value of j after the execution of the following code? intj=0; int iV=10;
while(j<N)
{
/=;+1;
(A) 0(B)9
(C ) 10(D)11

37.The address generated by CPU is : 
(A) Physical address(B)Absolute address
(C ) Logical address(D)Memory address

38.IEEE 802.11 standard for wireless LAN uses —____________________multiple access
(A) CDMA(B)ALOHA
(C ) CSMA/CA(D)All of theseAll of these

39.The worst-case complexity of heap sort is : 
(A) n log n(B)n2
(C ) Log n(D)N

40.A protocol used for secure sending of data overthe Internet is :
(A) SMTP(B)FTP
(C ) HTTPS(D)TCP/IP
A
7



41.The--------------method provides a one-time session key for two parties.
(A)Diffie- Hellman(B)Public key
(C )RSA(D)DES

42.How many root element an XMLdocument can have?
(A)Any number as required(B)One
(C )Two(D)Only limited by available memory

43.Which of the following is a goal of data mining?
(A)To extract some observed event or condition
(B)To analyze data for expected relationships
(C )To create new database
(D)None of the above

44.Critical path of the PERT chart is :
(A)Path which takes the longest time to complete the project
(B)Path which takes the shortest time to complete the project
(C )Path which takes the most appropriate time to complete the project
(D)None of the above

45.The language used by end users and programmers to manipulate data in a database is : 
(A) HTML(B) DML
(C ) XML(D) GML

46.Secret key encryption is also known as :
(A) Asymmetric encryption(B) Symmetric key cryptography
(C ) RSA(D) DSA

47.What is a firewall?
(A)Boundary of a network
(B)A routing software
(C )Software to prevent unauthorized access
(D)A web browsing software

48.Which normal form is based on multi-valued dependency?
(A) First(B) Second
(C ) Third(D) Fourth

49.mov ax, bx which addressing mode does this instruction use?
(A) Immediate(B) Indirect ,
(C ) Register(D) Direct

50.An RTP packet is encapsulated in : 
(A) a TCP segment (C ) an IP datagram
(B) a UDP datagram (D) a SMTP packet

51.To prevent______________ we can timestamp the packets.
(A) Error(B) Jitter
(C ) Loss(D) None of these

52.The complexity of Binary search algorithm is :
(A)O(n)(B)o(log n)
(C )o(n/2)(D)0(n log n)

53.If every node u in G is adjacent to every other node v in G, a graph is said to be :
(A)Isolated(B)Complete
(C )Finite(D)Strongly connected

54.To extend the connectivity of the processor bus we use :
(A)PCI bus(B)SCSI bus
(C )Controllers(D)Multiple bus

55.If 110011OO2 is divided by 1102 the quotient is :
(A)11011(B)1111
(C )100010(D)100001

56.Which data structure allows deleting data elements from front and inserting at rear?
(A)Stacks(B)Queues
(C )Deques(D)Binary search tree

57.Which of the following data structure is linear type?
(A)Strings(B)Lists
(C )Queues(D)All of above

58. Speed of a microprocessor is determined by :
(A) Address bus width(B)Data bus width
(C ) Clock(D)None of the above

59.How many gates would be required to implement the following Boolean expression after
simplification?
XY + X(X + Z) + Y(X + Z)
(A) 1(B)2
(C ) 3(D)4

60.With a 200 kHz clock frequency, 16 bits canbe serially entered into a shift register in
_________________time.,
(A) 4 ps(B)80 ps80 ps
(C ) 80 ms(D)8 ms

61.The principle of locality of reference is applied in the use of:
. (A) Virtual memory(B)Random access memory
(C ) Cache memory(D)Optical memory Optical memory

62.Parser is also known as :
(A) Lexical analyzer(B)Code optimizer
(C ) Syntax analyzer(D)Linear analyzerLinear analyzer

63.The operation in relational algebra for viewing a set of tuples is :
(A) Select(B)Project
(C ) UnionCD)Join

64.The average case complexity of linear search algorithm is :
(A) O(n)(B)0(log n)
(C ) 0(n2)(D)0(n log n)

65.Data Encryption standard is a :
(A) Stream cipher(B)Block cipherBlock cipher
(C ) Substitution cipher(D)None of theseNone of these

66.Data about data is :•
(A) Database(B)Mega-data
(C ) Metadata(D)SchemaSchema

67.No. of layers in OSI reference model: 
(A) Four (C ) Six
(B) Five (D) Seven

68.Routers are components of _____________layer?
(A) Physical layer (C ) Transport layer
layer in OSI reference layer.
(B)Network layer (D) Data link layer

69.mov al, [bx] which addressing mode docs this instruction use?
(A)Register indirect(B)Base index
(C )Base index plus displacement(D)Register

70.The number of attributes in a relation is called its :
(A)Cardinality(B)Size
(C )Schema(D)Degree

71.The operator used to concatenate two strings in ORACLE is :
(A)||(B)S
(C )#(D)%

72.A full-adder has a c, = 0. What are the SUM and the CW1 when A = 1 and B = 1'
(A)SUM = 0CM=0(B)SUM =()CM=1
(C )SUM = 1C„,= 0(D)SUM =IC„=l

73.For which inputs the output of an exclusive-NOR gate is 1?
(A)A = 0. B = 1(B)A = 1. B = 1
(C ) A = 0, B = 0’(D) None of these

74.The depth of a complete binary tree is given by :
(A)Dn = n iogl0n(B)Dn - n log2n + 1
(C )Dn = log2n(D)Dn=log2n + l-

75.Which of the following data structure is not linear data structure?
(A)Arrays(B)Linked lists
(C )Both of the above(D)None of the above

76.A binary tree whose every node has either zero or two children is called : 
(A) Complete binary tree(B) Binary search tree
(C ) Extended binary tree(D) None of the above

77.The WORST-CASE complexity of Bubble sort algorithm is :
(A) O(n)
(C ) 0(n2)
(B) 0(log n) (D) 0(n log n)

78.Which of the following is a web server?
(A) Apache (C ) Tomcat
(B) IIS
(D) All the above

79.Grammar recognized by a FSM is :
(A) Only context free grammar (C ) Only regular grammar
(B) Only context sensitive grammar (D) All of these

80. For efficient searching compilers use —
(A) Linear search tables (C ) Hash tables
(B) Binary search tables (D) Binary search trees

81.The Island Sivasamudram situated in which river?
(A) Krishna(B) Godavari
(C ) Kaveri(D) Damodar

82.Which of the following is not associated with the Lahore Session of the Congress December 1929?
(A)Council entry
(B)Poorna Swaraj
(C )Tricolour Flag hoisted
(D)First Independence Day January 26, 1930

83.Final approval of Indian Five Year Plans is given by :
(A) Planning Commission (B) National Development Council
(C ) Reserve Bank(D) President

84.Which of the following was not the centres of the Revolt of 1857?
(A) Delhi(B) Kanpur
(C ) Lucknow(D) Madras

85.The State in India where active diamond mining is done :
(A) Madhya Pradesh(B) Maharashtra
(C )Uttar Pradesh(D)Gujarat

86.In which year India honoured Dr. Nelson R. Mandela by awarding Bharat Ratna?
(A)1992(B)1994
(C )1990(D)1987

87.The Nobel Prize winner for Peace in 2013 :
(A)IAEA(B)OPCW
(C )UNRWA(D)UNCTAD •

88.Common Wealth Heads of Government Meeting 2013 (CHOGM) was held in :
(A)New Delhi(B)Dacca
(C )Islamabad(D)Colombo

89.Through which rocket was Mangalyan orbiter injected into earth’s orbit? 
(A) PSLV 16.(B) PSLV C25
(C ) PSLV C5(D) PSLV C9

90.Name the cyclonic storm that hits the coasts of Odisha recently : 
(A) Haiyan(B) Helen
(C ) Thane(D) Phailin

91.With which country India took part in joint military exercise “INDRA 2013”? 
(A) Russia(B) Japan
(C ) America-(D) China

92.Which of the following is not the tributaries of Bharatha Puzha?
(A) Gayatri Puzha(B) Kannadi Puzha
(C ) Chali Puzha(D) Kalpathi Puzha

93.Which is the predominant soil in Kerala mostly reddish brown to yellowish red in colour?
(A)Black soil(B)Alluvial soil
(C )Lateritic soil(D)Saline soil

94.The famous Pilgrim Centre Vaikom is situated on the banks of:
(A) Vembanad Lake•(B) Kayamkulam Lake
(C ) Ashtnmudi Lake(D) Sasthamcotta Lake

95.Trikalkudi rock-cut cave temple, Kaviyoor situated in which district of Kerala?
(A)Kottayam(B)Pathanamthitta
(C )Idukki(D)None

96.Through which poem Mahakavi Kumarnnasan raise his voice against caste barriers?
(A)Veenapoovu(B)Nalini
(C )Lila(D)Duravastha

97.Blessed Kuriakose Elias Chavara was born in which district?
(A)Alappuzha(B)Kollam
(C )Ernakulam(D)Kottayam

98.Which of the following is not associated with Vakkom Abdul Khadar Moulavi?
(A)Al-lslam(B)Swadesbhimani
(C ) Chirayankizh Muslim Samaj(D) Loyal Muhammadans of India

99.Who started the Dalit liberation Movement Prathyaksha Raksha Daiva Sabha [PRDS]?
(A)Ayya Vaikunda(B)K. Kelappan
(C )Kumara Gurudevan(D)Ayyankali

100.Which of the following is not related to K.P. Karuppan?
(A) Kalyanadayini Sabha(B) Ananda Maha Sabha
(C ) Jnanodayam Sabha(D) Sanmarga Pradeepa Sabha
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: emulator hq, role of computer in education ppt, waldorf microwave access programmer, microcontroller programmer, object oriented programmer, emulator hider, education computer software,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  LABORATORY TECHNICIAN GR II LABORATORY ASST - kerala psc previous question paper amrutha735 1 11,855 25-01-2018, 03:15 PM
Last Post: Guest
  BIO-MEDICAL ENGINEER - MEDICAL EDUCATION kerala psc previous question paper amrutha735 1 9,945 23-01-2018, 11:22 PM
Last Post: RamiGycle
  X-RAY TECHNICIAN GR-II -kerala psc previous question paper amrutha735 0 9,716 15-05-2017, 04:59 PM
Last Post: amrutha735
  WORKSHOP INSTRUCTORINSTUCTOR GARDE - kerala psc previous question paper amrutha735 0 8,821 15-05-2017, 04:57 PM
Last Post: amrutha735
  WORK SUPERVISOR - OVERSEER GRADE II - kerala psc previous question paper amrutha735 0 8,956 15-05-2017, 04:53 PM
Last Post: amrutha735
  WORK SUPERINTENDENT - AGRICULTURE - kerala psc previous question paper amrutha735 0 9,235 15-05-2017, 04:52 PM
Last Post: amrutha735
  VOCATIONAL TEACHER RECEPTION BOOK -kerala psc previous question paper amrutha735 0 8,827 15-05-2017, 04:50 PM
Last Post: amrutha735
  VOCATIONAL INSTRUCTOR IN GENERAL INSURANCE-kerala psc previous question paper amrutha735 0 8,950 15-05-2017, 04:49 PM
Last Post: amrutha735
  VOCATIONAL INSTRUCTOR IN COMPUTER APPLICATION-kerala psc previous question paper amrutha735 0 9,045 15-05-2017, 04:47 PM
Last Post: amrutha735
  VOCATIONAL INSTRUCTOR - CATERING -kerala psc previous question paper amrutha735 0 8,993 15-05-2017, 04:45 PM
Last Post: amrutha735

Forum Jump: