Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
77 views
30 pages
HPPSC Computer Programmer (Jal Shakti Vibhag) 2021
Uploaded by
Ankit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save HPPSC Computer Programmer (Jal Shakti Vibhag) 2021 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
77 views
30 pages
HPPSC Computer Programmer (Jal Shakti Vibhag) 2021
Uploaded by
Ankit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save HPPSC Computer Programmer (Jal Shakti Vibhag) 2021 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 30
Search
Fullscreen
[Question Paper with Final (Revised) [Computer Programmer in Jai Shakti jheld on 23-08- |Answer Key for the Post of \Vibhag 12021 Itemcode : €31001 1: Given the following two statements S1: Arelation R = {A, B, C, D, E, F} Is given with following set of functional dependencies: F = (AD + E, BE = F, BC} and candidate key is ABD 2: Every table with two single-valued attributes is in INF, 2NF, 3NF and BCNF. Which one of the following is true? a [Si Is false, S2 Is false ip [S2is true, St is false ¢ [Si is true, $2 is true p [Si is true, S2is false Correct Ans: © Memcode : ©1002 92: Block-level striping with distributed parity is known as ‘5 [RAID 4 5 [RAIDS [RAID 6 |None of the above Correct Ans: B emeoge : €31003 'Q3: Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true with reference to the examples of integrity constraints? S1) An instructor Id. No. cannot be null, provided Instructor Id No. being primary key. 'S2) No two citizens have same Aadhar-Id. 'S3) Budget of 2 company must be zero. ‘a [$1 and $2 are true but $3 Is false B (Si, $2, and S3 are true ¢ [S1, $2, and 3 are false [51 is false but S2 and $3 are true Correct Ans: A emeode : €31004 Let R and S be two relations with the following schema R (P,Q,R1,R2,R3) and S (P,Q,S1,S2) respectively Where{P, Q} Is the key for both schemas. Which of the following queries are equivalent? L TRDGS} 1. n,)Da1,(8) TL nh (,(R)AT, (5) IV. 1H, (The (R)~(1h,c(R)-M,(S}}} ‘a [Land IIT only [Land IV only ¢ [I Tand Ii only [1 Ul and IV only Correct Ans: D Iemeode : €31005 Q5: Consider the following schedules involving two transactions: $4: r1(X); r1(¥); r20X); r2(Y); w2(¥); W100) and S2z r1(X); r2(X); F2(¥); w2(¥); -1(¥); A(X) Which of the following statement is true? ‘a [Both Si and S2 are conflict serializable p [Both S1 and $2 are not conflict serializable ¢ [S1 is conflict serializable S2 is not conflict serializable p (5: not conflict serializable S2 is conflict serializable Correct Ans: B Iemcode : €31006 Match the following algorithms with their appropriate data structures. List! List Il A) BFS ) Union Find 8) DFS ii) Queue C)_Knuskal’s Minimum Spanning Tree tl) Prionty Queue D) _Prim’s Minimum Spanning Tree iy) Stack a [Acty, Bui, C-i, D+ p [Aci B-iv, Cl, Dai p [Atl Bev, Ci, D4 Correct Ans: D Memende : €21007 '@7: Which of the following lines completes the code and what is the output of the following code?Hinclude=stdio.h> int find_max(inta, intb) {iff@> B) retum a relumb:) int knapsack(int W, int “wt, int*val.intn) tansin + 1][W + 1] intitm w; for(itm = 0; tim<= n; itms+) ansfitm]{0] = 0, or(w = O.w <= W, w+) ans[Ow] = 0: forgim = 1; itm<= n; itm++) {_ fortw=1,.w <= W. wes) ‘Qftwafitm - 1] <= w) ansfitmifw] = find_max(ans{itm— ‘Tw — wit — 11] + vallitm — 1], ansfitm — 1IwD), else anslitmifw| = ansiitm - 4 Ilwl, + fetum ans[n]W], {10,20,30}, vl] = 460, 100, 120}, W= 50; apsack(W, W,¥, 3) printi("%d",ans); retum 0,} 220 100 c 130 ° None of the above Correct Ans: A Memeode : €31008 gs: The elements 32, 15, 20, 30, 12, 25, 16 are inserted one by one in the given order into a Max Heap. Then what Is resultant level by level order of this Max Heap? a 32 25 30 12 15 20 16 32 30 25 15 12 20 16 ce 32 30 25 15 12 16 20 > 32 25 30 12 15 16 20 Correct Ans: B Iemcode : €31009 3: If matching tuples are not found, the kind of OUTER JOIN operation which keeps all the tuples of first relation ut of the two relations is classified as a [UPWARD JOIN DOWNWARD JOIN c LEFT OUTER JOIN RIGHT OUTER JOIN Correct Ans: €Memeode : €31010 (10: Suppose that we have numbers between 1 and 100 in a binary search tree and want to search for the number 55. Which of the following sequences CANNOT be the sequence of nodes examined? ‘a |{10, 85, 64, 42, 60, 57, 55} a |{100,20,69,34,62,45,55} ¢ [£9,85,47,68,43,57,55) p [All of the above Correct Ans: Memeode : ©4011 Q14: People in the village construct houses on the same side of the lane. A robber is planning on robbing the village. Without having the chance of being caught, he needs the full sum of money. The villagers realize, by any way, that their adjacent house is being raided or not and so they become alert. So a robber cannot rob two adjoining houses. Since the robber understands the sum of money deposited in each house and the path is straightforward and there Is no turning. Which Is the most powerful algorithmic technique used to solve this problem? ‘a [Dynamic Programming [Brute Force ¢ [Backtracking [Divide and Conquer Correct Ans: A Memcode : €32012 Q12: Simplify Y= ABCD + ABCD + ABCD + ABCD + A’B'C'D’ a [BC + ABCD" B [BC’ + ABCD’ ¢ [D(B' + ABC) p [8D +ABCD' Correct Ans: D Mamcode : €23013 ‘245: Wynat happens when a bit-string is XORed with itself n-times as shown [BB BS (866 ntimes) | ‘a [Complements when n is even 'B [Complements when n is odd ¢ [Divides by 2n always [Remains unchanged when n is even Correct Ans: $ __($ Denotes question scrapped and no credit to Candidates.) Memcode : 1014 G14: Let fw, x, y, 2) = (0, 4, 5, 7, 8, 9, 13, 15). Which of the following expressions are NOT equivalent to f?A |xy'z! + whey! + wy'2 + x2 wy) + wey! + xz cc [Wy'Z) + wry! + xyz + xy'z p [xyz + wx’ + wy Correct Ans: D Memcode : €32015 Q15: Dependency between statements I1: add ri, r2, 3. and 12: mul r4, r2, r5 is ‘a [Flow dependency ip [Anti-dependency ¢ [Output dependency p [Loop dependency Correct Ans: $ _($ Denotes question scrapped and no credit to Candidates.) Itemcode : €31016 Q16: The minimum number of fip flops required for a mod 10 ripple counter is? p [10 Correct Ans: B Itemeode : €31017 @17: Match the following links with their output List List I A) Unwisited Links |) Purple in colorand underlined B) Visited Links ii) Blue in color and underlined €) Active Links, ) Red in color and underlined Ja [Aci Boll, Coli code : €31018 (Q18: Identify the following statements as true/false 1) An XML application of HTML is defined as XHTML li) SVG is a followed XML format which is used to create vector graphics with the support for interactivity and animationili) You can add comments to your HTML source by using the following syntax. ‘<1 White your comments here > iv) Canvas is a not a pixel-based graphics la [TT TE ip TFFF ¢ [TFTF p [All are faise Correct Ans: A Iemeode : €32019 Q19: Which of the following statement(s) is/are true with reference to the way of describing XML data? S1) XML uses DTD to describe the data 82) XML uses XSL to describe the data 83) XML uses a description node to describe the data Codes: Ja [Si only B [S2 only ¢ [Stand s3 p [Si and s2 Correct Ans: € Iemcode : ©2020 (920: How to add a background image and background color using CSS. Identify the correct option given below: body { backgroundimage: url paper.at | background color lightoiue } body { background-image: ur("paper gif"); 8 | background.color lighiblue, qd body ( backgroundimage = url("paper.gif"), © | background color= lightbiue; bi body { p | backgroundimage = url(?paper.gif); backaround-color=lightblue, } Correct Ans: B Memcode : ©102121: How to define an anonymous function in Java Script var display inction() ‘a alert("Anonymous Function is invoked"); display(); ‘var display=Function() 8 |Document.writein(*Anonymous Function is invoked"); Risplay(; both Vvar display=function() Jalert("Anonymous Function is invoked"); } isplay(); ¢ [and var display: ¢ Document. writeln("Anonymous Function is invoked"); inction() 3
Intmaind ( float sum = 0.0, j while (i/) > 0.082) { d=i+i printf(’%fn", sum) reltum 0} ‘The number of times variable sum will be printed when the above program is executed is, a4 a [5 c [6 b(z Correct Ans: © Memcode : €31025 25: Consider the following C program: aincludesstaio n> int maind ( intall = 12, 4, 6, 8, 10}; inti, sum=0,*b=a+ 4: for (= 0, 1<5, i++) sum=sum + (*b -i)- "(0 -i), printf("@6dn", sum); retum 0; } ‘The output of above C program is a [10 B [22 ¢ [30 p [38 Correct Ans: A Memsode : €31026 926: Which one of the following is non-vectored interrupt? [TRAP 5 |INTR ¢ [RST7S p [RST 6.5 Correct Ans: B itemeoge | €31027927: For 5 = {a, b}, let us consider the regular language L = {x | x = a3 + 4K or x = b!t + 13k, k > 0}, Which one of the following can be a pumping length (the constant guaranteed by the pumping lemma) for L? a [3 fag c [9 p [14 Correct Ans: D Memcode : €31028 ‘28: Which one of the following statements is True? ‘a [Context-free grammar can be used to specify both lexical and syntax rules 8 [High-level language programs can be translated to different Intermediate Representations. (¢ [Arguments to a function can be passed using the program stack. [All of the above, Correct Ans: B emcode : ©1029 929: Consider the following languages. L @rbrceds| m+ p=n+q, where m,n, 9,420) IL fatb*cPd] m =n and p=q, where m,n, p,q 0} IL f@mbrced 4 m p and +a, where m,n, p, a20) IV.{aPoreed?imn =p +a, where m,n, p,4 0} ‘Which of the above languages are context-free? a [Land iv fp [land it ¢ [iland tir p [I and Iv code 31030 (930: Consider the following problems. L(G) denotes the language generated by a grammar G. L(M) denotes the language accepted by a machine M 1) For an unrestricted grammar G and a string w, whether weL(G) ii) Given a Turing machine M, whether L(M) is regular )) Given two grammar Gy and Gp, whether L(G: = (G2)Iv) Given an NFA N, whether there is 2 deterministic PDA P such that N and P accept the same language Which of the following is correct about above four statements? ‘a [/and il are undecidable fs [ills undecidable ¢ [in li, and iit are undecidable [iand Iv are undecidable Correct Ans: € Memcode : ©2031 Q31: Let L = {a? | pis a prime). Then which of the following is true? ‘a [It is regular but not context free fa [It is context free but not regular ¢ [It is not accepted by a Turing machine p [Itis neither regular nor context free but accepted by Turing machine Correct Ans: D Memcode : €31032, 952: A particular BNF definition fora "word" is given by the following rules. ‘
= =
|
|
-
~ =
|
«=
|
== al blc|d| lylz ainteger == 01112131 19 Which of he following lexical entries can be derived from < word >? i. pick i. picksili. c44 a [and it |lionly ¢ li and ti |i ti and it Correct Ans: € Memeode : €31033, 933: Which of the following is FALSE? ‘a [The grammar SaS|aSbSle, where S is the only non-terminal symbol, and ¢ is the null string, is ambiguous. In some programming languages, an identifier is permitted to be a letter followed by any number of letters or © |cigits. IF Land D denotes the set of letters and digit respectively then (L+D)* defines an identifier ¢ [Compliment of every context-free language is recursive. 1p [Pumping lemma is commonly used by regular language to prove that a grammar is not regular. Correct Ans: B Memcode : €32034934: Consider the intermeciate code given below: List 2jat Bt]5*i 4euts 5.3452 6.t4= 13 7. atta] Bjaj+t 9. if} <= 5 goto(3) 10.1141 11, Ifi< 5 goto(2) ‘The number of nodes and edges in the control-flow-graph constructed for the above code, respectively, are ‘a [Sand6 B [6 and7 ¢ [Zande p [Sando Correct Ans: B code : 31035, (935: Which grammar rules breach an operator's grammar requirements? LA+QR WA+Qs5R Ane A+ QtRe A [iitonly. [iand ji only ¢ [land iii only [ill and iv only Correct Ans: B Itemeode : €31036 936: In computers, subtraction is carried out usually by ‘a [1's complement method 8 [2's complement method € [Signed magnitude method'p [BCD subtraction method Correct Ans: B Memcode : €31037 937: Given the following expression grammar: AS ACBIB+AIB B+ B-Blid Which of the following is true? ‘a |* has higher precedence than + 8 |+ has lower precedence than * ¢ |* and - have same precedence p [All the statements given above are false Correct Ans: D Memcode : €21038 '@38: How much memory is required to implement z-buffer algorithm for a 512 x 512 x 24 bit-plane image? a [15 MB B [15GB ¢ [1.6 MB p [1.668 Correct Ans: A Memcode : €31039, 939: Which of the following are side effects of scan conversion? i) Unequal intensity of diagonal lines Local or Global aliasing iit) Over striking in photographic applications, iv) Aliasing a [iand it only ip [iland iv only [ii ii, and iv only. 1p [All of the mentioned above Correct Ans: B emcode : €31040 940: Match the following:List 1 List 1) The direction of projection is chosen so that there is no. foreshortening of lines eeiSneen perpendicular to the xy plane i) The direction of projection is chosen so that lines. perpendicular to the xy planes are a foreshortened by half their lengths. it) The direction of projection makes equal ©) Isometic Projection angles with al of the principal axis, iv) Projections are charactenzed by the fact D) Orthographic Projection thal the direction of projection is perpendicular to the view plane a [A+1 B= ii, Cl, Div p [A-ii, B~i, C-il, D-iv cc [A-18 i, Cv, D = tit p [A-li, B-i, C-Wv, O- il Correct Ans: A itemeoge €31041, 941: __are those which have the property of a shape that has the same degree of roughness no matter how much it is magnified? a [Key frame systems fp (Fractals ¢ [Turtle Graphics 1p [Quadric Surfaces Correct Ans: B Memeode : €31042, 942: Identify the correct answer: S1) Transformation of object shape from one form to another is known as morphing 'S2) Tweening is the process, which applies to animation objects defined by a sequence of points, and that change shape from frame to frame. ‘a [Si is False, S2 is True p [Si is Tue, S2 is Tue ¢ [Si Is False, 2 is False p [Si is True, 52 is False Correct Ans: B amends : €21043 943: Determine the output of the following Java code snippet public class Myclass¢public static void main(Stringf] args) { System.out.printin(2+0+3+"CSE"+445); +d SCSES SCSE45 cc [SCSE p [CSE Correct Ans: B emcode : 2044 (944: Determine the output of the following Java code snippet. int x = 20; String str = (x < 15)? "small": (x < 22) ? "medium" : “large” System.out printin( str}; a [null [small ¢ [medium p [large Correct Ans: € Memeode : 1045 945: Determine the output of the following, if p=10 an¢ q=2. public int division(int p, int q) ty ¢ System.out print("“Try block, ") return p /-q; } catch (ArithmeticException e) { System.err:printin(*Catch block, "); return ~ ¥ finally ¢ ‘System.out.printin(*Finally block"); >> ‘a [Try block [Try block, Catch block ¢ [Try block, Catch block, Finally block [Try block, Finally block Correct Ans: D Iemcode : €31046 (Q46: If it takes 20ns to search the TLB and 100ns to access the memory and 70% is the hit ratio for TLB. What is the effective access time of memory? ‘a [140s B [50ns© |150ns p [4ons Correct Ans: © Iemeode : €31047 947: Consider the arrival and burst time for the processes P1, P2, P3, and P4, Calculate the waiting time of process 2 using shortest remaining time first (SRTF) algorithm. Process ‘Anrival Time Buisi Time Pt O 20 P2 15 25. P3, 30 10 Pa 45, 15 a [10 8 [40 ¢ [55 p [15 Correct Ans: D Itemcode : €31048, 948: The maximum number of processes executing the printf staternent is__in the following code snippet. main() { if (Fork()&& fork()){ fork(); > Printf("Operating System’ > p (8 Correct Ans: Memcode : 32049) 949: The of a process is shared by all the threads spawned by it. ‘a [Address Space [Program Counter ¢ [Registers p [Stack Correct Ans: A Hamcode : ©2050 950: Requests for a disc driver for cylinders in the order of 10, 22, 20, 2, 40, 6, and 38 arise at a time when the disc drive reads from cylinder 20. 4ms/cylinder is the seek time. If tne disc arm's scheduling algorithm is first-come-first-served, the cumulative seek time is. 582 ms [684 ms ¢ [584 ms p [682 ms Correct Ans: € Iemcode : €31051 951: A hash function H defined H(key)=key mod 7, with linear probing, is used to insert the keys 45, 44, 91, 55, 77, 18, 63 into a table indexed from 0 to 6. What will be the location of key 637 a |4 8 [5 c [6 pt Correct Ans: B Memcode : €32052 952: The following postfix expression with single digit operands is evaluated using a stack: 64254 /23*475"- Note that “ is the exponentiation operator. The top two elements of the stack after the second * is evaluated are a [5.7 B78 ¢ [35,8 p [None of the above Correct Ans: © Itemeode : €34053 953: What is the worst case time complexity for search, insert and delete operations in splay tree? ‘a [O(n) in all the cases 8 [O(logn) for all ¢ [O(logn) for search & insert, O(n) for delete 1p [O(logn) for search and O(n) for insert & delete Correct Ans: B Memcode : €32054 954: Randomized quick sort effectively solved by ‘a [Las Vegas Algorithm 8 [Monte Carlo Algorithm© Greedy Approach [Dynamic Programming Correct Ans: A Itemeode : €31055 955: The following numbers are inserted into an empty binary search tree in the given order: 100, 512, 1001, 85, 78, 2, 55, 717, 853, 900, 17. What is the height of the binary search tree (H=L+1; L=0), number of nodes in left subtree, and number of nodes in right subtree? a [5.5.5 8 [56,4 c [67,3 [65,5 Correct Ans: D Memeode : €31056 956: 1) Consider an example of AVL tree where 8 is at the root and 11 is in the right of 8, 10 Is in the left of 11, Consider another example of an AVL tree where 8 is at the root and 5 is in the left of &, 4 is in the left of 5. Now after RL rotation in case (i) and LL rotation in case (i), who will become the new root of AVL tree? a [115 p [10,6 ¢ [114 p [10,5 Correct Ans: D Memcode : €32057, 957: The Unified Process is described by. and maintained By...nu.e ‘a [Jelnski Moranda; 1BM p [James Martin; IBM ¢ [I Jacobson, G. Booch, and J. Rambaugh ; Rational Software Corporation [None of the above Correct Ans: € Iemeode : €31058 958: Calculate the Cyclomatic Complexity of the following code snippetBincludexstdio.h> int main() t intni=9,n2=1, n3,i, number, printf( Enter the number of elements”), scant("%ed" &numbery, printt("in%d %d",n1.n2)iprintingQ and 4 for(=2;
using namespace std, class Base public: virtual void show.) cout=<"Welcome to Exam", + ye Glass Derived public Base { public: void show() t cout<<"Welcome to the Campus”, 3 k intmaing) { Base" b. Derived d 8d: b->show(): relum 0; 3 ’a [Welcome to Exam, 'p [Welcome to the Exam Welcome to the Campus¢ [Welcome to the Campus Welcome to the Exam p [Welcome to the Campus Correct Ans: D Itemeode 11068 968: Choose the characteristics of friend function in C++ i) The friend function is not in the scope of the class in which it has been declared. li) Since it is not in the scope of the class, so it cannot be called by using the object of the class, lil) A friend function cannot access the private members directly; it has to use an object name and dot operator with each member name, iv) Friend function uses objects as arguments. a [lil iv only |i tv only list, Wv only piel lw Correct Ans: D Memeode : ©3106 969: Which of the following statement(s) is/are True S1) Function overtoading provides multiple definitions of the function by changing signature i.e. changing umber of parameters, change data type of parameters, return type doesn't pley any role. $2) Function overriding Is the redefinition of base class function in its derived class with same signature l.e. return type and parameters. a [Si is True, S2 is True [Si is True, 52 is False ¢ [51 is False, S2 is True p [Si is False, 52 is False Correct Ans: A Memcode : €31070 970: What will be the output of the following C++ code?include
include
Using namespace sid, Class Wel { inta, public: Virtual void func0=0, # class Come:public Wel { public: ‘void func(t cout<<'Class Come<
0 over the set of non-zero relational numbers Ra(2,b) iff | a+b |<=2 over the set of natural numbers Which of the following statement is correct? ‘a [Ri and Rp are equivalence relational, Rg and Rg are not iB [Ri and R3 are equivalence relational, Rz and Re are not ¢ [Ri and Rg are equivalence relational, Rz and Ry are not 1 [Ri, Ra, Rs, and Rq all are equivalence relational Correct Ans: B Itemcode : 31078 978: If the frame buffer has 11-bits per pixel and 8 bits are allocated for each of the R, G, and B components then what would be the size of the color lookup table(LUT) a [2419 bytes s [16384 bytes ¢ [88 bytes p [6144 bytes Correct Ans: B emeode : €31079 979: Which of the following statement is true? ‘a [DELETE does not free the space containing the table and TRUNCATE free the space containing the table 8 [Both DELETE and TRUNCATE free the space containing the table ¢ [Both DELETE and TRUNCATE does not free the space containing the table p [DELETE free the space containing the table and TRUNCATE does not free the space containing the table Correct Ans: A Memcode : €31080 (Q80: Let E1 and E2 be 2 entities in an E-R diagram with simple single-valued attributes, R1 and R2 are 2 relationships between E1 and E2, where R1 is one to many and R2 is many to many. Ri and R2 do not haveany attributes of their own. What is the minimum number of tables required to represent this situation in the relational model? c [3 p [2 Correct Ans: © Memeode : €31081 (981: Which of the following is correct about the geographical features of the district of Bilaspur of H.P.? (i) Its main rivers include the Satluj and the Beas. i) It is expanded on both sides of the river Satluj. It has only one natural lake. (iv) It has also a very few natural springs. a [Oa MD. | (il) & (ill). | (il) & (iv). [cil & (iv). Correct Ans: € Memeode : €31082 (982: Where does the Banganga river join the Beas river in H.P.?, ‘a [In the Manali Valley. p [In the Kullu Valley. ¢ [In the Mandi Valley. p [In the Kangra Valley, Correct Ans: D Memcode : ©1083, .Q83: Which of the following is correct about the Tribal Sub-Plan strategy under the Fifth Five Year Plan in Himachal Pradesh? (i) In the beginning, there were Six Tribal Development Blocks. (ii) Later on, three Integrated Tribal Development Projects (ITDPs) were constituted in place of Tribal Development Blocks. Still later, two new ITDPs were carved out by separating Spiti from Lahaul and Pangi from Bharmour (Chamba district), thereby increasing the number from three to five, a [8 C. 8 [Ci & (ill). ¢ (aa.D |( only. Correct Ans: B Memcode : €31084 .Q84: Which of the following is correct about the growth of Education in Himachal Pradesh in the Censuses of 2001 and 20117 (i) There is seen considerable increase in the Census of 2011 as compared to the Census of 2001. (i) The increase was very marginal, i.e, just less than 1%, (ill) 1t was above the national level. a (Gi). B [GR (). ¢ [di & (i. p | (il) only. Correct Ans: A Itemcode : 2085 .Q85: Which of the following is true about the literacy rate among the Scheduled Castes in Himachal Pradesh in the Census of 19917 (D) Five out of 12 districts show it about 70%. i) Only two districts show it above 70%. Not even a single district was above 70%, (iv) Only three districts were above 70%. 2 [Oa | (il) & (iv). | il) only, |{iv) only, Correct Ans: © emenge : €22086 86: In which of the following two districts of Himachal Pradesh the Forest Eco-Systems Climate Proofing Project is being set-up by about 20237 ‘a [Shimla and Kangra. B [Solan and Hamirpur ¢ [Chamba and Mandi p [Kangra and Chamba. Correct Ans: D emcode : €31087 (987: Of the following three broad sectors, namely the Primary sector (Agriculture, etc.), Secondary (Industry) sector and Tertiary (Services) sector, which has made the highest contribution to the GSDP of Himachal Pradesh for the year 2018-197a [The Primary Sector. [The Secondary Sector. ¢ |The Tertiary or the Service Sector. _p [Both The Primary Sector and The Tertiary or the Service Sector are bracketed. Correct Ans: B emcode : 32088 Find out the correct match of the following temples with the districts in which they are located in H.P : Temple District (i) Mascur Temple (a) Kula (i) Panchavaktra Temple (b) Kangra. (ii) Maheshwara Temple (c)__-Kinnaur. (iv) AdiBrahma Temple (d)- Mandi. A |G = ©; Gi) - (ad; Gil) - (A); iv) - ©). B [Ci =; (il) = ©; Mill) ~ @); ) - ©). © {Ci - (2); (il) ~ 4); (iid) ~ (©); iv) = (©). p [4i) = (); Gil) = (@ (il) - (©); Gv) - @). Correct Ans: D Iemcode : €31089 (989: Which of the following is true about the empowerment of women through the Himachal Pradesh State Women Commission? (i) The Women Commission was constituted under the Himachal Pradesh State Commission for Women Act, 1996. () Its aim is to furthering the Fundamental Rights guaranteed under the Indian Constitution to women. (ill) Tt aims to prepare women to participate in political life from the grassroot level to the national level a [8 (ii. 5 [ci & (ill) cc [Ma CD. | (ill) only, Correct Ans: € Memeode : €31090 990: The tiny Shimla Hall State of Dhami became a part of tehsil after it joined Himachal Pradesh in April, 1948 : ‘a [Nahan. | Kasumpati ¢ [Jubbal. p |Mahasu.Correct Ans: B Memcode : €31091 991: Which of the following Metropolitan City is located near the Coromandal Coast? in (Chennai. | Bangelury, ¢ [Hyderabad | Mysore. Correct Ans: A Memcode : €31092 (992: Before the British took over the Nicobar Islands, they were governed by : a [France, 8 [Portusal. c_ |The Dutch, p [Denmark Correct Ans: D Memcode : €31093, (993: Which of the following is correct about the working of the Constituent Assembly, elected in 19467 (i) Some non-Congress members were also elected on the Congress ticket. i) Sachchidanand Sinha was made its provisional President. It started functioning only after the Mountbatten Plan announced the Partition of India. a | & 0. (i) & (it). cc cil) 8D. | il) only. Correct Ans: A Memcode : €31094 (994: Which of the following is/are not correct about the process of Economic Reforms started by the Narasimha Rao government in 19917 (i) The country was on the edge of default of payments to the International lenders, so he took the extreme step for starting the reforms. i) Many harsh and unprecedented decisions were taken to streamline the economy, ‘The steps led to the growth of India’s GDP from 1991-92's mere less than 1% to 3.8% in 1992-93. A [Oa Ci. B (Ci) & (i). © [Ci & Cll)Cu) only. Correct Ans: D Memcode : €31095 (995: Find out the correct match of the following artists with their musical instruments : (i) Ramvatar Shastri (a) Flute (ii) Hari Prasad Chaurasia (b) Sarangi. (iii) S. Balachander (Veena. liv) Ala Ratha Khan (4) Tabla. ‘a |) = (A); (ii) ~ (©); (iil) ~ (2); (iv) - (0). |= ©: (i) ~ As (i) ~ (@); Civ) - (). | = (i ii) = (0): (i) = (©; Civ) ~ (@). D {Ci ~ (b); (ii) ~ (@); Gill) ~ (©); (iv) - @). Correct Ans: D Memcode : €31096 996: The Great Slave Lake is located in country: A c USA. Russia (canada, [Cambodia. Correct Ans: € Memeode : ©2097 987: Find out the correct match of the following International Organizations with their Head-quarters = () The African Union (a (i) The Interpol (b) (ii) North Atlantic Treaty Organization (¢} (i) Bank: for Intemational Settlements (d) Addis Ababa, Brussels. Basel Lyon. (i) - (@)i Kid) ~ (A); Git) ~ (©); v) = (©). () = @i fii) - (©; Ci) - (0); Civ) = (@). c (= ©; (I) = @); {ill ~ (A); (iv) = (0). > (i) = (2); Gil) = (8); Gi) = (©); iv) - (2). Correct Ans: A Itemcode : €31098 ‘The famous portrait of Mona Lisa is the creation of the great Renaissance painter : Qs a Lorenzo de MediciB | Giotto. ¢ [Leonardo da Vinci [Michelangelo, Correct Ans: © emeode : €21099 (999: Identify the first two countries of the world which allowed the women to vote in the national elections from the following pair. ‘a |New Zealand and Australia 8 [England and USA. ¢ [Canada and Finland, [Germany and France. Correct Ans: A Memeode : €1100 '@100: Which of the following pair of two countries of South-East Asia handled the situation very effectively during the COVID-19 pandemic in 20207 ‘a [Thalland and Malaysia. p [South Korea and Cambodia. ¢ [Vietnam and Thailand. 1p [South Korea and Vietnam. Correct Ans: D
You might also like
Ugc Papers With Ans
PDF
No ratings yet
Ugc Papers With Ans
171 pages
Flipkart Grid 6.0 Previous Year Questions Finaldocx
PDF
No ratings yet
Flipkart Grid 6.0 Previous Year Questions Finaldocx
34 pages
Capstone Questions 2024
PDF
No ratings yet
Capstone Questions 2024
24 pages
2015 QP
PDF
No ratings yet
2015 QP
37 pages
Assertion Based Cs Xii
PDF
No ratings yet
Assertion Based Cs Xii
38 pages
CS-GATE - Solved PYQ
PDF
No ratings yet
CS-GATE - Solved PYQ
38 pages
Solved ISRO Scientist or Engineer Computer Science 2018 Paper With Solutions
PDF
No ratings yet
Solved ISRO Scientist or Engineer Computer Science 2018 Paper With Solutions
24 pages
Bntrance PH.D.: Examinations
PDF
No ratings yet
Bntrance PH.D.: Examinations
17 pages
MR - Cooper Sample Questions
PDF
No ratings yet
MR - Cooper Sample Questions
29 pages
AMCAT-Programming Ability - IV
PDF
No ratings yet
AMCAT-Programming Ability - IV
18 pages
Accenture Solved'24
PDF
No ratings yet
Accenture Solved'24
25 pages
Vidyanidhi Info Tech Academy: PG DAC Question Bank
PDF
No ratings yet
Vidyanidhi Info Tech Academy: PG DAC Question Bank
23 pages
Not For Research
PDF
No ratings yet
Not For Research
11 pages
Ugcnet
PDF
100% (1)
Ugcnet
151 pages
Ugc Papers
PDF
No ratings yet
Ugc Papers
171 pages
Cs Gate Paper 2009
PDF
No ratings yet
Cs Gate Paper 2009
13 pages
Book Back All One Word Questions and Answers CSC
PDF
No ratings yet
Book Back All One Word Questions and Answers CSC
5 pages
CS - 2013 - by WWW - Learnengineering.in
PDF
No ratings yet
CS - 2013 - by WWW - Learnengineering.in
16 pages
CS - 2008 - by WWW - LearnEngineering.in
PDF
No ratings yet
CS - 2008 - by WWW - LearnEngineering.in
20 pages
Computer Science and Engineering - 2005 Full Paper
PDF
No ratings yet
Computer Science and Engineering - 2005 Full Paper
20 pages
Q. 1 - Q. 25 Carry One Mark Each.: GX X X HX X GHX HGX HX GX X GX HX X X
PDF
No ratings yet
Q. 1 - Q. 25 Carry One Mark Each.: GX X X HX X GHX HGX HX GX X GX HX X X
11 pages
New Technical AMCAT Q&A June 2019
PDF
No ratings yet
New Technical AMCAT Q&A June 2019
25 pages
CPET21 ComputerSc Set1
PDF
No ratings yet
CPET21 ComputerSc Set1
14 pages
Nodia and Company: Gate Solved Paper Computer Science Engineering 2008
PDF
No ratings yet
Nodia and Company: Gate Solved Paper Computer Science Engineering 2008
20 pages
Computer Science and Engineering - Full Paper - 2010
PDF
No ratings yet
Computer Science and Engineering - Full Paper - 2010
17 pages
Gate 2023 Cs PDF New 29
PDF
No ratings yet
Gate 2023 Cs PDF New 29
20 pages
2023 SSF JMI Final
PDF
No ratings yet
2023 SSF JMI Final
7 pages
Capstone Final Questions
PDF
No ratings yet
Capstone Final Questions
13 pages
Unilag-Msc Computer Sci 2014
PDF
No ratings yet
Unilag-Msc Computer Sci 2014
17 pages
Selection Test Prep - MCQ
PDF
No ratings yet
Selection Test Prep - MCQ
27 pages
June 2009 Ugc Net Computer Science Solved
PDF
No ratings yet
June 2009 Ugc Net Computer Science Solved
21 pages
Vvvsaas
PDF
No ratings yet
Vvvsaas
11 pages
HSST Computer Science SR For SCST
PDF
No ratings yet
HSST Computer Science SR For SCST
12 pages
USM's Shriram Mantri Vidyanidhi Info Tech Academy: Algorithm & Data Structure Question Bank
PDF
No ratings yet
USM's Shriram Mantri Vidyanidhi Info Tech Academy: Algorithm & Data Structure Question Bank
38 pages
Data Structure Feb18
PDF
No ratings yet
Data Structure Feb18
23 pages
ADA1
PDF
No ratings yet
ADA1
9 pages
2024 Quiz 12
PDF
No ratings yet
2024 Quiz 12
3 pages
Answer:c: Loop Loo P
PDF
No ratings yet
Answer:c: Loop Loo P
37 pages
Ugc Net-August 2016 Paper-II
PDF
No ratings yet
Ugc Net-August 2016 Paper-II
10 pages
C 100 For I 1 To N Do For J 1 To N Do (Temp A (I) (J) + C A (I) (J) A (J) (I) A (J) (I) Temp - C) For I 1 To N Do For J 1 To N Do Output (A (I) (J) )
PDF
No ratings yet
C 100 For I 1 To N Do For J 1 To N Do (Temp A (I) (J) + C A (I) (J) A (J) (I) A (J) (I) Temp - C) For I 1 To N Do For J 1 To N Do Output (A (I) (J) )
5 pages
GATE 2005 CS
PDF
No ratings yet
GATE 2005 CS
4 pages
Ugc Net - January 2017 Paper-II
PDF
No ratings yet
Ugc Net - January 2017 Paper-II
11 pages
CS 2008 Gate Key
PDF
No ratings yet
CS 2008 Gate Key
25 pages
Ugc Net Solved
PDF
No ratings yet
Ugc Net Solved
39 pages
Computer Science
PDF
40% (5)
Computer Science
10 pages
Cs 352
PDF
No ratings yet
Cs 352
6 pages
UGC NET Computer Science Solved Paper - III Dec2012: (B) Building Internet Market
PDF
No ratings yet
UGC NET Computer Science Solved Paper - III Dec2012: (B) Building Internet Market
19 pages
2012 December UGC NET Paper III
PDF
No ratings yet
2012 December UGC NET Paper III
16 pages
Ugc Cs Paper 2017
PDF
No ratings yet
Ugc Cs Paper 2017
13 pages
Compiler Questions
PDF
No ratings yet
Compiler Questions
11 pages
Gate Cse 2005
PDF
No ratings yet
Gate Cse 2005
22 pages
Computer Science Gcet Question Papers-2005
PDF
No ratings yet
Computer Science Gcet Question Papers-2005
10 pages
Yahoo Inc Placement Process Details
PDF
No ratings yet
Yahoo Inc Placement Process Details
12 pages