TRADESMAN - COMPUTER - TECHNICAL EDUCATION kerala psc previous question paper
#1


.pdf   TRADESMAN - COMPUTER - TECHNICAL EDUCATION.pdf (Size: 1.37 MB / Downloads: 1)

042/2016
Maximum : 100 marks
Time : 1 hour and 15 minutes


1.How many instances of an abstract class can be created?
(A)1
(B)4
(C )10
(D)0

2.Which of the following is the 2’s compliment of 1011?
(A)1010.
(B)0101
(C )1100
(D)0111

3.Which of the following commands is used to update access and modification? 

(A) grep
(B) wc
(C ) touch
(D) cat

4.A high speed device used in CPU for temporary storage during processing is 

called : 
(A) A Register
(B) A Bus
(C ) A Data bus
(D) All of the above

5.Which of the following statement is correct?
(A)Base class pointer cannot point to derived class
(B)Derived class pointer cannot point to base class
(C )Pointer to derived class cannot be created
(D)Pointer to base class cannot be created

6.Bottom up parsing involves : 
(A) Shift reduce (C ) Operator check
(B) Handle Pruning (D) (A) and (B)

7.Which of the following cannot be friend? 
(A) Function (C ) Object
(B) Class    (D) Operator Function


8. Which is a-valid keyword in Java?
(A) Interface
(B)String
(C ) Float
(D)Unsigned

9.The average time necessary for the correct sector of adisk to arrive at the 

read write
(A) Down time
(B)' Seek time
(C ) Latency time
(D)Access time

10.Type checking is normally done during :
(A) Lexical analysis
(B)Syntax Analysis
(C ) Code Generation
(D)Syntax directed translation

11.Which command is used to remove a file?
(A)remove
(B)rm
(C )inv
(D)del

12.Which of the following is considered as DBMS?
(A) Foxpro
(B)Oracle
(C ) MS Access
(D)All of the above

13.Which of the following is not a type of constructor?
(A) Copy constructor
(B)Friend Constructor
(C ) Default Constructor
(D)Parameterized Constructor

14.Appfying De Morgan’s theorem to the expression A +B+C+D:
(A) A B C D
(B)A+B+C+D
(C ) A+B+C+D
(D)A+B+C+D

15.Which of the following System software residesin the main memory always?
(A) Text Editor
(B)Assembler
(C ) Linker .
(D)Loader

16.When was Apple Macintosh 11 micro computer introduced in the market?
(A) 1964
(B)1970
(C ) 1983
(D)1986

17.FDDI is a :
(A)Ring Network
(B)MeshNetwork
(C )Star Network
(D)Bus Network

18.Which command is used to display the top of the file?
(A)Cat
(B)Head
(C )More
(D)Grep

19.Which of the following device is used to connect two systems, especially 

if the systems use different protocols?
(A) liub
(B)Bridge
(C ) Gateway
(D)Repeater

20.EBCDIC can code up to how many different characters :
(A) 8
(B)32
(C )61
(D)256 

21.Which 32-bit microprocessor is used in IBM’s PS/2 model-80 computer?
(A) 8088
(B)80286
(C ) 80386
(D)80486

22.The Boolean expression X = A + B + C + is logically equivalent to what 

single gate :
(A) NAND
(B)NOR
(C ) AND
(D)OR

23.What php stands for?
(A) Pre Hypertext processor
(B) Hyper text Preprocessor
(C ) Pre Hyper processor
(D)Pro Hyper text process

24.Which of the following statement is correct?
(A) Class is an instance of object
(B)Object is an instance of a class
(C ) Class is an instance of data' type
(D)Object is an instance of data type

25.Which of the following is an abstract data type?
(A) Int
(B)Double
(C ) String
(D)Class

26. Which of the following is the address of the router?
(A)The IP address
(B) The TCP address
(C )The subnet mask
(D) The default gateway

27. Thelayer is the layer closest to the transmission medium. *
(A)Transport
(B) Network
(C )Physical
(D) Datalink

28. ASCII stands for :
(A)All purpose Scientific Code for Information Interchange
(B)American Standard Code for Information Interchange
(C )American Security Code for Information Interchange.
(D)American Scientific Code for Information Interchange

29.1024 Kilobytes represent a :
(A)1 MB
(B)1GB
(C )1KB
(D)None of these

30.The ASCII code for the character J is :
(A)1001 0001
(B)1001 1010
(C )0100 1010
(D)1010 0001

31.Which of the following is not a function of DBA?
(A)Network maintenance
(B)Routine Maintenance
(C )Schema Definition
(D)Authorization for data access

32.A system program that combines the separately compiled modules of a 

program into a form suitable for execution :
(A)Assembler
(B) Linking Loader
(C ) Cross compiler
(D) Load and Go

33.The software used to convert source program instructions to object 

instruction is known as :
(A)Compiler
(B)Assembler
(C )Interpreter
(D)Language Processor

34. To copy the hidden .system files of DOS to another disk you can use the 

command :
(A) Copy
(B)Ren
(C ) Sys
(D)Diskcopy

35.Which of the following is a group of one or more attributes that uniquely 

identifies a row
(A) Key
(B)Domain
(C ) Tuple
(D)Relation

36.A full binary tree with 2n +1 nodes contain :
(A) ’ n leaf nodes
(B)n non leaf nodes
(C ) n -1 leaf nodes
(D)n -1 non leaf nodes

37.What does Belady’s Anomaly related to?
(A) Page Replacement Algorithm
(B)Memory Management Algorithm
(C ) Deadlock prevention Algorithm
(D)Disk scheduling Algorithm

38.In Which year the first operating system wasdeveloped :
(A) 1910
(B)1940
(C ) 1950
(D)1980

39.The geostationary satellite used for communication systems :
(A) Rotates with the earth
(B) Remains stationary relative to the earth
(C ) Is positioned over equator•
(D) All of the above

40.What is the port number of POP3?
(A) 80
(B)110
(C ) 90 
(D)49

41.A relation is in this form if it is in BCNF and has no multivalued 

dependencies :
(A) Second normal form
(B)Third normal form
(C ) Fourth normal form
(D)Domain/Key normal form

42.Who programmed the first computer game spaeewar inin 1962?
(A) Steel Russell
(B)Konard Zuse
(C ) Alan Emtage
(D)Tim Berners-lee

43.Which access method is used for obtaining a record from a cassette tap?
(A)Direct
(B) Sequential
(C ) Random
(D) All of the above

44.A technique for direct search is :
(A)Binary search (C ) Tree Search
(B) Linear search (D) Hashing

45.The postfix form of the expression : (A + B)*(C*D-E)*F/G is
(A) AB + CD*E-FG/**
(C ) AB + CD * E - *F * G/
(B) AB -r CD * E - F * *G/ 
(D) AB + CDE * - * F * G/

46.What does PPTP stands for?
(A) Point to Point Transmission Protocol 
(B) Point to Point Transfer Protocol 
(C ) Point to Point Tunneling Protocol
(D) Point to Point Traffic Protocol

47.Which of the following statement is correct?
(A)C++ allows static type checking
(B)C++allows dynamic type checking
(C )C++ allows static member function be of type const
(D) Both (A) and (B)

48.Which is a reserved word in the Java programming language?
(A)method
(B)native
(C )reference
(D)subclass

49.The communication mode that supports two-way traffic but only one 

direction at time is :
(A)Simplex
(B)Duplex
(C )hulfduplex
(D)multiplex

50.What is thrashing?
(A)A high paging activity is called thrashing
(B)A high executing activity is called thrashing 
(C ) A extremely long process is called thrashing
(D)A extremely long virtual memory is called thrashing

51.Iinux Torvalds develop which operating system :
(A)Window's
(B)Mac OS
(C )UNIX
(D)Linux

52.Which operating system is developed and used by Apple Inc?
(A)Windows
(B)Android
(C )iOS
(D)UNIX

53.Which one is the current fastest super computer in India?
(A)Param Padmn
(B)SAGA-220
(C )PARAM YUVAII
(D)EKA

54.Which of the following concepts means wrapping up of data and functions 

together?
(A)Abstraction
(B)Encapsulation
(C )Inheritance
(D)Polymorphism

55.One solution to the multivalued dependency constraint problem is to :
(A)Split the relation into two relations each with a single theme
(B)Change the theme
(C )Create a new theme
(D)Add a composite key

56.Which of the following algorithm solves the all pair shortest path 

problem?
(A)Floyd’s algorithm
(B)WarshaU’s algorithm
(C )Prim’s algorithm
(D)Dijkstra’s algorithm

57.Which of the following is an invalid visibility label while inheriting a 

class?
(A)Public
(B)Private
(C )Protected
(D)friend

58.What does SSL stands for?
(A) System Socket Layer 
(C ) Secure Socket Layer
(B) Secure System Login 
(D) Secure System Layer

59What hardware architectures are not supported by Red Hat?
(A) SPARC
(B) IBM-COMPATIBLE
(C ) Alpha
(D) Macintosh

60.How many types of Polymorphisms are supported by C++?
(A)1
(B)2
(C )3
(D)1

61.Which address is the loop back address?
(A)0.0.0.1
(B)127.0.0.0
(C )127.0.0.1
(D)255.255.255.255

62.Process are classified into different groups in :
(A) Multilevel queue scheduling algorithm
(B)Priority scheduling algorit hm
(C ) Round robin scheduling algorithm
(D)Shortest job scheduling algorithm

63.Which keys can be used to pressed quit without saving in DOS?
(A) Ctrl + A
(B)Ctrl + B
(C ) Ctrl + D
(D)Ctrl + C

64.The OS of a computer may periodically collect all the block of free space. 

This is called :free memory space to form continuous
(A) Garbage collection
(B)Concatenation
(C ) Collision
(D)Dynamic Memory Allocation

65.Who was the father of Punched Card processing?
(A) J. Presper Eckert
(B)Charles Babbage
(C ) Dr. Herman Hollerith
(D)Blaise Pascal

66.What is the usual number of bits transmitted simultaneously in parallel 

data transmission used by microcomputers?
(A)10
(B)9
(C )8
(D)1

67.India’s first super computer param 8000 was installedin:
(A) 1988
(B)1982
(C ) 1995
(D)1991

68.The number of interchanges required to sort 5, sort is:1. 6,2, 4 in 

ascending order using Bubble
(A)6
(B)5
(C )7
(D)8

69. Modem is used data transmission when was it invented and in which country 

(A) 1963, USA
(B) 1965, Germany
(C ) 1950, USA
(D) 1950, Japan

70.In Php variable name starts with : 
(A) !
(C ) #
(B) & 
(D) S

71.The person contributes the idea of the stored program was ;
(A) Charles Bablmge
(B) Howard Aiken
(C ) Jon Von Neuman
(D) Winton Ccrf

72.Father of Java programming language : 
(A) Dennis Richi (C ) Simer Crcy
(B) James Goslin (D) James Russel

73.A semaphore:
(A)Is a binary mutex
(B)Must be accessed fromonly one process
(C )Can be accessed frommultiple process
(D)None of these

74.In OSI model, which of the following layer provides error-free delivery of 

data :
(A)Data link
(B)Network
(C )Transport
(D)Session

75.Which of the following is not a level of data abstraction?
(A) Physical layer
(B) Critical level
(C )Logical level
(D)View level

76.ISP exchanges internet traffic between their networks by :
(A)Internet exchangepoint
(B)Subscriberendpoint
(C ) ISP end point
(D) None of the above

77.What arc the most commonly used transmission speeds in BPS used in data 

communication?
(A)300
(B)1200
(C )2400
(D)9600

78. The average successful search time for sequential search on W items is :
(n-l)
(A) n/2
(B)n-1/2
(C )(n + 2)
(D) log(n)+l

79.Which of the following is a data model?
(A) Entity-Relationship model (C ) Object Based data model
(B) Relational data model (D)  All of the above

80.What is the default subnet mask for a class A network?
(A)127.0.0.1
(B)255.0.0.0
(C )255.255,255.0.0
(D)255.255.255,0

81.From where have been Indian constitution inspired the idea of federal 

government with a strong centre and a different State government?
(A)Constitutionof Canada
(B)Constitution of USA
(C )Constitutionof Britain
(D)Constitution of Australia

82.Out of 543 elected Loksabha members, how many members represented the 

Union Territories?
(A)8
(B)10
(C )15
(D)20.

83.In which year NOTA (None of the above) implemented in India?
(A)2010
(B)2012
(C )2013
(D)2014

84.“The spirit of democracy is not a mechanical think to be adjusted by 

abolition of form. It required change of heart"- Who says this?
(A) Abraham Lincoln. 
(B) Mahatma Gandhi
(C )Rabindranath Tagore
(D)Subhas Chandra Bose

85.Which parliamentary committee in India is normally chaired by a prominent 

member of the opposition?
(A)Privileges Committee
(B)Estimates Committee
(C )Public Accounts Committee
(D)Committee on Government Assurances

86.National Food Security Mission (NFSM) launched in the year :
(A)2008.
(B)2005
(C )2010
(D)2007

87.Which of the following is the scheme for Prevention of Trafficking and 

Rescue/Rehabilitation and Re-integration of Victims of Trafficking for 

Commercial Sexual exploitation?
(A)Ujjawala
(B)Swadhar
(C )Kishori Saklhi Yojana
(D)Integrated ChildDevelopment Services

88.Right to Information Act (RT1) passed in the year :
(A)2004
(B)2005
(C )2007
(D)2008

89.Which of the following award is given for Individual's working for child 

welfare?
(A) Kishori Shakthi Yojana
(B) Vayoshreshtha Samman Award
(C ) Rajeev Gandhi Manav Seva Award
(D) None of the above

90.The Food for Work programme was renamed as :
(A)Rural Landless Employment Guarantee Programme (RLEGP)
(B)Integrated Rural Development Programme (IRDP)
(C )Jawahar Rozgar Yojana (JRY)
(D)National Rural Employment Programme (NREP)

91. rYachana Yathra" to enable the poor children to get educated was led by :
(A) A.K. Gopalan
(B)V.T. Bhattathirippad
(C ) K. Kelappan
(D)T.K. Madhavan

Who is known as the Jhansi of Travancore?
(A) Arya Pallam
(B)Anna Chandi
(C ) Lalitha Prabhu
(D)Akkamma Cheriyan

Which organisation led Kalpathi Revolt?
(A) Sahodarasangham
(B)SNDP
(C ) Aryasamaj
(D) Yogakshcmasabha

94.The prefix of “Mahakavi” awarded to Kumaranasan by Madras University in 

the year :
(A)19221
(B)1918
(C )1924
(D)1920

95.In which temple Sree Narayana Guru installed mirror?
(A)Aruvippuram
(B)Karamukku
(C )Sivagiri
(D)Kalavamkodam

96.Who won the Nobel Prize in literature in 2015?
(A) Patric Modiano
(B) Svetlana Alexievich
(C ) Alice Munro
(D) Mo Yan

97.India’s first space research observatory ASTROSAT successfully launched in 

to the orbit from Sreeharikota :
(A) 2015 September 25
(B) 2015 September 30
(C ) 2015 September 28
(D) 2015 September 27

98.Who is the brand ambassador of the programme “Pradhan Mantri Jan-Dhan 

Yojana”? 
(A) Shallrukh Khan
(B) Amitnhh Bachchan
(C ) Shilpa Shetty
(D) Ankit Fadia 

99.Who painted "The Potato Eaters'’?
(A)Piccaso
(B)Leonardo da Vinci
(C )Vincent Van Gogh
(D)Raja Ravi Varma

100.Gandhiji learned about civil disobedience movement from :
(A)Hermann Kallenbach
(B)Henry David Thoreau
(C )Martin Luther King
(D)Leo Tolstoy
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: importance of computer education topic, computer education and educational technology, technical education advantages, topic on technical education, uses of computer technology in education, purpose of technical education manager, impotance of computer education in india,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  LABORATORY TECHNICIAN GR II LABORATORY ASST - kerala psc previous question paper amrutha735 1 11,723 25-01-2018, 03:15 PM
Last Post: Guest
  BIO-MEDICAL ENGINEER - MEDICAL EDUCATION kerala psc previous question paper amrutha735 1 9,829 23-01-2018, 11:22 PM
Last Post: RamiGycle
  X-RAY TECHNICIAN GR-II -kerala psc previous question paper amrutha735 0 9,607 15-05-2017, 04:59 PM
Last Post: amrutha735
  WORKSHOP INSTRUCTORINSTUCTOR GARDE - kerala psc previous question paper amrutha735 0 8,707 15-05-2017, 04:57 PM
Last Post: amrutha735
  WORK SUPERVISOR - OVERSEER GRADE II - kerala psc previous question paper amrutha735 0 8,845 15-05-2017, 04:53 PM
Last Post: amrutha735
  WORK SUPERINTENDENT - AGRICULTURE - kerala psc previous question paper amrutha735 0 9,125 15-05-2017, 04:52 PM
Last Post: amrutha735
  VOCATIONAL TEACHER RECEPTION BOOK -kerala psc previous question paper amrutha735 0 8,718 15-05-2017, 04:50 PM
Last Post: amrutha735
  VOCATIONAL INSTRUCTOR IN GENERAL INSURANCE-kerala psc previous question paper amrutha735 0 8,838 15-05-2017, 04:49 PM
Last Post: amrutha735
  VOCATIONAL INSTRUCTOR IN COMPUTER APPLICATION-kerala psc previous question paper amrutha735 0 8,936 15-05-2017, 04:47 PM
Last Post: amrutha735
  VOCATIONAL INSTRUCTOR - CATERING -kerala psc previous question paper amrutha735 0 8,886 15-05-2017, 04:45 PM
Last Post: amrutha735

Forum Jump: