KPSC - QP - 103 - 2022
KPSC - QP - 103 - 2022
2. Consider a vocabulary with only four prepositions A, B, C and D. How many models are there
for the following sentence? B ∨ C
(A) 10 (B) 12
(C) 15 (D) 16
5. Let P : This is a good question paper. Q : You should not come back here. Then ‘This is a
great question paper and you should come back here’. is best represented by
(A) ~ P ∨ ~ Q (B) P ∧ ~ Q
(C) P ∨Q (D) P ∧Q
6. In a Group of 200 people, 50 can speak Hindi and 199 can speak English. How many can
speak both Hindi and English?
(A) 49 (B) 50
(C) 1 (D) none of these
A 3
[P.T.O.]
8. A number is chosen at random among the first 120 natural numbers (1, 2, 3,...,120). The
probability of the number chosen being a multiple of 5 or 15 :
1 1
(A) (B)
8 5
1 1
(C) (D)
16 24
9. An urn contains 6 red balls and 6 black balls. In the first draw, one ball is picked at random
and discarded without noticing its colour. The probability to get a red ball in the second draw
is :
13 9
(A) (B)
22 22
1 1
(C) (D)
2 24
10. Three companies A, B and C supply 25%, 35% and 40% of the notebooks to a school. Past
experience shows that 5%, 4% and 2% of the notebooks produced by these companies are
defective. If a notebook was found to be defective, what is the probability that the notebook
was supplied by A?
43 13
(A) (B)
69 22
25 7
(C) (D)
69 24
13. A circular queue of characters is implemented using a linear array whose first index is 1. The
array currently contains the elements d, –, –, a, b, c starting from index 1. Here ‘–’ denotes
empty slot. If two elements are deleted and three are added, what are the new positions of
rear and front?
(A) 6, 1 (B) 4, 6
(C) 5, 3 (D) 3, 5
103/2022 4 A
15. The maximum degree of any vertex in a simple graph with n vertices is :
(A) n +1 (B) n −1
(C) 2n −1 (D) n
16. Given, the hash function h ( k ) = k mod 3 , what is the number of collisions to store the
following sequence of keys? 15, 11, 34, 10, 98, 51, 37, 14, 16, 47
(A) 2 (B) 3
(C) 9 (D) 7
17. A hash function f defined as f (key) = key mod 7, with linear probing used to resolve
collisions. Insert the keys 37, 38, 72, 48, 98 and 11 into the table indexed from 0 to 6. What
will be the location of 11?
(A) 3 (B) 5
(C) 4 (D) 6
18. What is the maximum height of any AVL tree with 7 nodes? Assume that the height of a tree
with a single node is 0 :
(A) 2 (B) 3
(C) 4 (D) 5
A 5 103/2022
[P.T.O.]
21. Which of the following statement is correct for switch controlling expression:
(A) only int can be used in switch controlling expression
(B) only int and char can be used in switch controlling expression
(C) only int, char and float can be used in switch controlling expression
(D) switch controlling expression can be empty also
25. The simplified function in sum of products of Boolean function F(P, Q, R, S) = Σ(0, 2, 5, 7, 8,
10, 13, 15), where the minterms 2, 7, 8 and 13 are don’t care terms:
(A) QS’ + Q’S
(B) Q’S’ + QS
(C) Q’R’S’ + Q’RS’ + QR’S + QRS
(D) P’Q’S’ + P’QS + PQS + PQ’S’
103/2022 6 A
26. Given code word 1110001010 to be transmitted with an even parity check bit. The encoded
word to be transmitted for this code is :
(A) 11100010101 (B) 11100010100
(C) 1110001010 (D) 111000101
27. The minimum number of flip flops required to design a decade counter is:
(A) 3 (B) 4
(C) 5 (D) 6
29. Which addressing mode is used in the given 8086 instruction = MOV AX, [1234H]?
(A) Immediate Addressing Mode (B) Base Addressing Mode
(C) Indexed Addressing Mode (D) Direct Addressing Mode
33. A counting semaphore is initialized to 4. Then 8 P(wait) and 3 V (signal) operations are
performed on the semaphore. The final value of the semaphore is :
(A) –1 (B) 1
(C) 2 (D) –2
34. A system supports a virtual address space of 4096 pages each with 512 bytes. If the main
memory has 1024 flames, the number of bits in physical address is :
(A) 20 (B) 23
(C) 21 (D) 19
A 7 103/2022
[P.T.O.]
35. The method for updating the main memory as soon as a word is removed from the Cache is
called :
(A) write-through (B) write-back
(C) protected write (D) cache-write
36. If the disk head is located initially at 32, find the number of disk moves required with FCFS
if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65 and 72 :
(A) 319 (B) 326
(C) 338 (D) 360
37. The interrupt servicing mechanism in which the requesting device identifies itself to the
processor to be serviced is :
(A) polling (B) vectored interrupts
(C) interrupt nesting (D) simultaneous requesting
41. The web server uses —————— to store client information in a web browser.
(A) xml (B) event
(C) cookie (D) log
43. Choose the correct html element for the largest heading :
(A) <h1> (B) <h6>
(C) <head> (D) <large>
103/2022 8 A
44. Which tag is used to contain javascript code?
(A) <js> (B) <jscript>
(C) <script> (D) <javascript>
46. Which of the following function used for the unset variables in PHP?
(A) delete (B) block
(C) unset (D) pop
50. Which of the following tag is used to add rows in the table?
(A) <th> (B) <td>
(C) <tr> (D) <tp>
52. Which of the following methods will put the current thread on wait until the thread on which
it is called is completed?
(A) sleep (B) join
(C) resume (D) suspend
53. Destructor has the same name as the constructor and it is preceded by —————— in C++ :
(A) $ (B) ~
(C) ! (D) @
A 9 103/2022
[P.T.O.]
55. Which of the following statements is/are TRUE regarding JAVA?
(1) Static variables are called instance variables
(2) A class can only inherit one class but can implement multiple interfaces
(A) only 1 is true (B) only 2 is true
(C) Both 1 and 2 are true (D) Neither 1 nor 2 are true
56. Which of these is a super class of all errors and exceptions in the Java language?
(A) Throwable (B) Checked Exceptions
(C) Runtime Exception (D) Try
60. When an expression consists of int, double, long, float, then the entire expression will get
promoted into a data type that is :
(A) int (B) float
(C) double (D) long
62. Which of the following methods is used to get the priority of the thread?
(A) getP() (B) getPrior()
(C) getPriority() (D) getThread()
64. Which of the following is an attribute that can uniquely identify a row in a table?
(A) tuple (B) index
(C) candidate key (D) none of the above
103/2022 10 A
65. Which of the following concurrency control protocols ensure both conflict serializability and
freedom from deadlock?
(A) 2 phase locking (B) Time stamp ordering
(C) Both (A) and (B) (D) None of the above
68. Consider a schema R(w, x, y, z) with functional dependancies w --> x and y --> z. The
decomposition of R into R1(w, x) and R2(y, z) is :
(A) dependancy preserving but not lossless join
(B) lossless join but not dependancy preserving
(C) dependancy preserving and lossless join
(D) neither dependancy preserving nor lossless join
A 11 103/2022
[P.T.O.]
72. Number of tuples in a relation is referred to as :
(A) attributes (B) keys
(C) entity (D) cardinality
73. Which of the following is NOT part of ACID properties of database transaction?
(A) Atomicity (B) Consistency
(C) Interdependance (D) Durability
76. How long does it take to transmit an uncompressed image that is 4000 × 3000 pixels with
3 bytes/pixel over 100 Mbps Ethernet?
(A) 120 sec (B) 2.880 sec
(C) 120 msec (D) 2880 sec
77. What is the maximum bit rate possible in a noiseless channel with a bandwidth of 2500 Hz
transmitting signals with four signal levels?
(A) 25 kbps (B) 5 kbps
(C) 10 kbps (D) 1 kbps
103/2022 12 A
83. In RSA cryptosystem the sender A uses two prime numbers p = 3 and q = 11 to generate
public and private keys. If the public key of A is 7, what is the private key of A?
(A) 3 (B) 7
(C) 13 (D) 11
85. In RMI, the process of passing parameters to a remote method from client to server and
vice-versa is called :
(A) Encryption and Decryption
(B) Multiplexing and Demultiplexing
(C) Marshalling and Unmarshalling
(D) Uploading and Downloading
87. In a —————— HTTP connection, a single TCP connection is used to send and receive
multiple HTTP requests/responses.
(A) Persistent (B) Non Persistent
(C) Both (A) and (B) (D) None of the above
89. —————— is an evolutionary software process model that couples the iterative nature of
proto-typing with the controlled and systematic aspects of the waterfall model.
(A) Spiral Model (B) V Model
(C) Incremental Model (D) None of the above
90. In the context of an integration test strategy, —————— is the re execution of some subset
of tests that have already been conducted to ensure that changes have not propagated
unintended side effects.
(A) Smoke Testing (B) Regression Testing
(C) Stress Testing (D) Configuration Testing
91. The —————— model indicates how software will respond the external events or stimuli.
(A) System (B) Context
(C) Behaviour (D) Data
A 13 103/2022
[P.T.O.]
92. —————— is a system whose operation is degraded if results are not produced according to
the specified timing requirements.
(A) Embedded system (B) Distributed system
(C) Hard real time system (D) Soft real time system
94. Risk-driven specification is an approach that has been widely used by ——————
developers.
(A) Operating system
(B) Critical system
(C) Database Management system
(D) None of the above
96. The feature of object oriented design that enables code reusability is :
(A) Encapsulation (B) Polymorphism
(C) Abstraction (D) Inheritance
98. —————— are used to model a system's behavior in response to internal to external
events.
(A) Use case diagram (B) State diagram
(C) Activity diagram (D) Timing diagram
100. —————— is a working model of the system that is developed to test the concepts and
assumptions about the system.
(A) V-model (B) DFD
(C) E-R model (D) Prototype
————————
103/2022 14 A
SPACE FOR ROUGH WORK
A 15 103/2022
[P.T.O.]
SPACE FOR ROUGH WORK
103/2022 16 A