0% found this document useful (0 votes)
16 views

10 RPSC Programmer Computech

question paper with solution for exam rpsc programmer by solving these questions one can trst himself of his or her knowledge about their preparation of programmers examination

Uploaded by

a20meena
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

10 RPSC Programmer Computech

question paper with solution for exam rpsc programmer by solving these questions one can trst himself of his or her knowledge about their preparation of programmers examination

Uploaded by

a20meena
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

COMPUTECH ACADEMY BY-SUNIL YADAV SIR 1

COMPUTECH
120 Test Date 01-09-2024
100
100 RPSC Programmer Paper -10
13 (Mock Test Paper – 10)

Instructions For Candidates


1. All questions carry equal marks.
1. 2. Give only one answer to each question.
2. 3. If more than one answer is given, the answer to
3. the question would be treated as wrong.

4. OMR 4. Four options are given for each question. On the


OMR answer sheet, the candidate should fill only
one of the circles or bubbles with blue or black
ball point pen indicating the correct answer.

5. 5. 1/3 part of the mark(s) of each question will be


deducted for each wrong answer. (A wrong
answer means an incorrect answer or more
than one answer for any question)
6. 6. Please correctly fill your mobile number and
other required information carefully on the OMR
sheet. Filling up of incorrect or incomplete
information can result in deduction of 5 marks
from the total marks or withholding of result for
which the candidate will be solely responsible.

Warnining: If a candidate is caught copying or any


unauthorized materaial is found in his/her
possession, then action can be taken against that
candidate under various rules and provisions.

Do not open this Test Booklet Untile you are asked to do so.

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 2

1. The PING utility uses which of the 4. Accounting management


following protocol to check for 5. Performance management
network connectivity to an IP 6. Security management
address and request format ? 7. Backup Management
(a) UDP as echo request (a) 1, 2, 3, 5, 6 (b) 1, 2, 4, 5, 6
(b) IGMP as echo request (c) 1, 2, 4, 5, 7 (d) 2, 3, 5, 6, 7
(c) TCP as echo request 6. How many channel has 5GHz
(d) ICMP as echo request frequency band ?
2. This is an Internet Protocol (IP)- (a) 10 (b) 13
based storage networking standard (c) 14 (d) 24
for linking data storage facilities 7. IP Header Error Detection at the
that can be used over existing Network layer is achieved by ?
Ethernet networks. (a) Hamming code
(a) NAT (b) RAID (b) Cyclic redundancy check
(c) iSCSI (d) NIC (c) Checksum
3. Simple Network Management (d) Bit Stuffing
Protocol (SNMP), uses the services
8. Which of the following extends a
of UDP on which port number?
(a) 161,162 (two well know port) private network across public
(b) 161,162,163 (three well know port) networks to extends more security
(c) 163,164 (two well know port ) and secure tunnel between data
(d)163,164,165 (three well know port) exchange device ?
4. Match the IEEE standard with (a) Secure channel network
name (b) Virtual private network
IEEE Standard Protocol (c) Firewall secure network
(a) 802.2 (1) WPAN – Bluetooth (d) Storage secure network
(b) 802.3 (2) WiMAX 9. The router of the Network Address
(c) 802.11 (3) Ethernet Translation (NAT) that connects
(d) 802.15.1 (4) LR-WPANs the network to the global address
(e) 802.15.4 (5) LLC uses to the global address uses
(f) 802.16 (6) Wireless LAN (a) only global address
Choose the correct sequence of given (b) only private address
below (c) only local address
(a) a-5, b-3, c-6, d-4, e-1, f-2 (d) one private address and one
(b) a-5, b-3, c-6, d-1, e-2, f-4 global address
(c) a-3, b-5, c-6, d-4, e-1, f-2 10. In multicast address of IPv6, the
(d) a-5, b-3, c-6, d-1, e-4, f-2 value of the prefix and The first
5. According to the International octet is
Organization for Standardization (a) FF00::/8 and 10101010
(ISO), a network management (b) F100::/8 and 11110000
system can be divided into five (c) FF00::/8 and 11111111
functional areas. Choose the (d) FFFF::/8 and 11111111
correct five network management 11. A few leftmost bits in each address
system in given below of the IPv6 address define its
1. Fault management category and IPv6 addresses are
2. Configuration management categorized as ?
3. Risk Management

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 3

(a) Prefix : unicast, anycast, broadcast 4. BGP4 is based on the path


(b)Prefix : unicast, anycast , multicast vector routing algorithm.
(c) Reserved : unicast, anycast, 5. RIP is based on link state
broadcast algorithm
(d)Reserved : unicast, anycast , Choose the correct answer from
multicast the option given below
12. In IPv6 addresses, the addresses (a) 1, 2 and 5 only
start with eight 0s are called (b) 1 and 5 only
(a) Unicast addresses (c) 1 and 2 only
(d) 2, 3 and 5 only
(b) Multicast addresses
17. The work done by UDP is/are
(c) Anycast addresses 1. Congestion control
(d) Reserved addresses 2. Flow control
13. In IPv4, the value of the Maximum 3. Retransmission
Transfer Unit (MTU) depends on 4. Segments transmission
the 5. Error detection
(a) Physical network protocol Choose the correct answer from
the option given below
(b) Data Link network protocol
(a) 1 and 4 only (b) 3 only
(c) UD protocol
(c) 4 only (d) 4 and 5 only
(d) Transport network protocol
18. Which of the following statement
14. In IPv4, the service type of the
is/are NOT CORRECT ?
service in the header field, the first
1. In a Go-Back-N ARQ, if the
3 bits are called
window size is 63, the range of
(a) Type of service (b) Code bits
sequence numbers is 0-64
(c) Sync bits (d) Precedence bits
2. Checksums use one's
15. An IPv4 datagram is fragmented
complement arithmetic
into three smaller datagrams.
arithmetic.
Which of the following is true?
3. In Go-Back-N ARQ, if frames 4,
(a) The do not fragment bit is set to 1
5, and 6 are received
for all three datagrams.
successfully, the receiver may
(b) The more fragment bit is set to 0
send an ACK 6 to the sender
for all three datagrams.
4. In character oriented protocols,
(c) The identification field is the same
we use byte stuffing.
for all three datagrams.
5. Stop-and-Wait ARQ is a special
(d) Both a and c.
case of Go-Back-N ARQ in which
16. Which of the following statement
the size of the send window is
is/are NOT CORRECT ?
1.
1. OSPF is based on distance-
Choose the correct answer from
vector routing protocol
the option given below
2. In link state routing, after the
(a) 1, 2 and 3 only
construction of link state
(b) 1, 3 and 4 only
packets new routes are
(c) 1, 2, 3 and 4 only
computed using Dijkstra's
(d) 1 and 3 only
algorithm
19. Which of the following is not a
3. Both link state and distance
field in TCP Header
vector routing are based on the
1. Sequence number
least cost goal.
2. Checksum

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 4

3. Fragmentation offset 22. Given below are two statement :


4. window size Statement (I) : in “bit stuffing” each
5. Urgent pointer 6. Service type frame begins and ends with a bit
(a) 3 and 4 only pattern in Hexadecimal Ox7E
(b) 2, 3 and 6 only Statement (II) : When the receiver sees
(c) 3 and 6 only five consecutive incoming '1' bits
(d) 3, 5 and 6 only followed by a '0' bit it
20. Arrange the following steps in the automatically destuffs 0 in bit
correct order for a DHCP Client to stuffing.
renew its IP lease with a DHCP In the light of the above
server: statement, choose the most
(A) DHCP client sends a appropriate answer from the
DHCPREQUEST message option given below ?
(B) DHCP server acknowledge the (a) Both statement I and II are correct
renewal with a DHCPACK (b) Both statement I and II are
message incorrect
(C) DHCP client checks the local (c) Statement I is correct but II is
lease timer and initiates incorrect
renewal (d) Statement I is incorrect but II is
(D) DHCP server updates its lease correct
database 23. IP datagram has arrived with the
(a) (A), (B), (C), (D) following partial information in the
(b) (A), (D), (B), (A) header HLEN bits 1010 and total
(c) (C), (B), (A), (D) length field is 0000001010101010
(d) (C), (A), (B), (D) then what is the actual header
21. Given below are two statements: length and payload size?
Statement (I): In datagram (a) 40 byte , 672 byte
network-routers hold state (b) 40 byte, 632 byte
information about connections (c) 40 byte, 602 bytes
Statement (II): In virtual circuit (d) 40 bytes, 652 byte
network-each virtual circuit 24. A TCP server application is
requires router table space per programmed to listen on port P on
connection. host S. A TCP client is connected
In the light of the above to the TCP server over the
statements, choose the most network. Consider that while TCP
appropriate answer from the connection is active the server is
options given below; crashed and rebooted. Assume that
(a) Both Statement I and Statement II the client does not use TCP
are correct keepalive timer. Which of the
(b) Both Statements I and Statements following behaviour/s is/are
II are incorrect possible?
(c) Statement I is correct but Statement I: The TCP application
Statement II is incorrect server on S can listen on P after
(d) Statement I is incorrect but reboot.
Statement II is correct Statement II: If client sends a
packet after the server reboot. It
will receive the RST segment.

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 5

In the light of the above (iii) Accessing mechanism for


statements. Choose the correct multiple transmitter over a
answer from the options given single channel
below. (iv) It is a cellular technology that
(a) Both Statement I and Statement employs hybrid of FDMA and
II are true TDMA
(b) Both Statement I and Statement Choose the correct answer from
II are false the options given below
(c) Statement I is true but Statement (a) A-III, B-IV, C-II, D-I
II is false (b) A-III, B-IV, C-I, D-II
(d) Statement I is false but (c) A-II, B-III, C-IV, D-I
Statement II is true (d) A-II, B-I, C-IV, D-III
25. Match List I with List II 27. Which one of the following
List-I statements is NOT correct about
A. Physical Layer I HTTP cookies?
B. Data Link Layer II (a) A cookies is a piece of code that
C. Network Layer III has the potential to compromise
D. Transport Layer IV the security of an Internet user
List II (b) A cookie gains entry to the user’s
(i) Transforming the raw bits in the work area through an HTTP
form of frame for transmission header
(ii) Control and monitoring of (c) A cookie has an expiry date and
subnet time
(iii) Transmission of raw bits over (d) Cookies can be used to track the
communication channel browsing pattern of a user at a
(iv) Datagrams transmission data particular site
through connection oriented or 28. You have sent a file from Host A to
connectionless using datagram Host B, in which format that file
Choose the correct answer from will be received at Application
the options given below layer?
(a) A-III, B- II, C- I, D- IV (a) Packets (b) Segments
(b) A-II, B- III, C- I, D- IV (c) Data (d) Frames
(c) A-III, B- I, C- II, D- IV 29. Given below are two statement
(d) A-II, B- IV, C- I, D- III about Application layer :
26. Match List I with List II Statement (I): Application layer is also
List –I said to be a Service layer .
A. CDMA I Statement (II) : During an FTP session
B. GSM II the control connection is opened 2
C. UMTS III times.
D. WiFi IV Statement (III) : During an FTP session
List-II the data connection is opened as
(i) It provides mobile internet many times as necessary
connection with faster data In the light of the above
transfer rates statement, choose the most
(ii) It allows user to connect to a appropriate answer from the
network or to other devices option given below ?
over wireless channel

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 6

(a) statement I, II and III are correct (a) Security procedure


(b) statement I, II and III are (b) Log-on procedure
incorrect (c) Safeguard procedure
(c) Statement I, III are correct but II (d) Identification procedure
is incorrect 34. In Circuit Switching, resources
(d) Statement I, II are incorrect but need to be reserved during the
III is correct (a) Data transfer phase
30. Given below are two statement (b) Teardown phase
about Application layer : (c) Setup phase
Statement (I): In FTP, there are three (d) ropagation phase
types of transmission modes : 35. Consider two hosts P and Q are
stream, block, and compressed. connected through a router R. The
Statement (II) : In FTP, ASCII, EBCDIC, maximum transfer unit (MTU)
and image define an attribute value of the link between P and R
called file type is 1500 bytes and between R and Q
Statement (III) : The message contains in is 820 bytes. A TCP segment of
each layer the header and the body size of 1400 bytes is transferred
part. front P to Q through R with IP
In the light of the above identification value of 0xi1234.
statement, choose the most Assume that IP header size is 20
appropriate answer from the bytes. Futher the packet is allowed
option given below ? to be fragmented that is Don‟t
(a) statement I, II and III are correct Fragment (DF) flag in the IP Header
(b) statement I, II and III are incorrect is not set by P. Which of the
(c) Statement I, III are correct but II is following statement is/are true.
incorrect A. Two fragments are created at R
(d) Statement I, II are incorrect but and IP datagram size carrying
III is correct the second fragment is 620
31. The protocol used to provide bytes
security to e-mails? B. If the second fragment is lost
(a) POP (b) PGP then R resend the fragment
(c) SNMP (d) HTTP with IP Identification value of
32. ………….transform message into 0x1234
format (cyber text) that cannot be C. If the second fragment lost then
read by hackers. P required to resend the entire
(a) Decryption (b) Encryption TCP segment
(c) Transformation (d) None of these D. TCP destination port can be
33. When you connect to an online determined by analysing the
information service, you are asked second fragment only
to provide some kind of Choose the correct answer from
identification such as your name, the options given below:
an account number and a (a) A, B and C Only
password. What is the name given (b) A and C Only
to this brief dialog ? (c) C and D Only
(d) B and D Only

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 7

36. The Solution to Silly Window (a) A-1, B-2, C-3 (b) A-2, B-3, C-1
Syndrome problem is/are: (c) A-3, B-1, C-2 (d) A-2, B-1, C-3
A. Nagle‟s Algorithm 40. The direct broadcast address of the
B. Clark‟s Algorithm IP address 205. 18. 136. 187 with
C. Jacobson‟s Algorithm subnet Mask 255.255.255.240 is
D. Piggy backing Algorithm (a) 205.18.136.187 (b) 205.18.255.255
Choose the correct answer from (c) 205.18.136.255 (d) 205.18.136.191
the options given below: 41. Database application were build
(a) A and B only (b) A and C only directly on top of file system to
(c) C and D only (d) B and D only overcome the following drawbacks
37. Match List I with List of conventional file- system
LIST I 1. Data redundancy and inconsistency
A. Dijkstra‟s algorithm 2. Difficulty in accessing data
B. Prim‟s algorithm 3. Data isolation problem
C. Warshall‟s algorithm 4. Concurrent Access Anomalies
D. Kruskal‟s algorithm 5. Cost reduced
List-II (a) 1, 2, 3 only
I. Calculate path matrix (b) 1, 2, 3, 4 only
II. Stores minimum cost edge (c) 2, 3, 4, 5 only
III. Stores the total cost from a (d) 1, 2, 3, 4, 5 only
source mode to the current 42. Isolation of the transaction in
mode database is ensured by ____
IV. Find minimum spaning tree (a) Transaction manager
Choose the correct answer from (b) Application programmer
the options given below: (c) Concurrency control
(a) A-I, B-II, C-III, D-IV (d) Recovery manager
(b) A-III, B-II, C-I, D-IV 43. In Database system indices are
(c) A-II, B-I, C-IV, D-III important for
(d) A-III, B-IV, C-II, D-I (a) Provide a quicker way to store
38. In remote procedure call, the data
client program must be bound with (b) Efficient processing of
a small library procedure called transaction
................... (c) Decrement the amount of disk
(a) Server stub (b) Marshalling space utilized
(c) Client hub (d) Client stub (d) Increase the cost of
39. Match the following implementation
List – I (Packets 44. What is data integrity ?
Source IP Destination IP (a) It is the contained in database
A Data 250.255.255.255 40.40.40.40 that is non redundant
B Data 22.21.23.24 255.255.255.255 (b) It is the data contained in
C Data 24.23.22.21 24.22.25.24 database that is accurate and
List – II consistent
1. Unicast packet within network (c) It is the data contained in
2. This packet never exists database that is secured
3. Limited broadcasting (d) It is the data contained in
Codes: database that is shared

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 8

45. Which of these following account Choose the correct answer from
are created automatically when the option given below.
you install Oracle Database and (a) (A)-(III), (B)-(II), (C)-(I), (D)-(IV)
granted the DBA role ? (b) (A)-(IV), (B)-(I), (C)-(II), (D)-(III)
1. SYS: An administrative user (c) (A)-(II), (B)-(III), (C)-(IV), (D)-(I)
account (d) (A)-(IV), (B)-(I), (C)-(III), (D)-(II)
2. SYSBACKUP : The account used 49. Which of the following cannot be
to perform backup and recovery used to modify the data in a
tasks. database
3. SYSTEM: An administrative (a) Update (b) Insert
user account (c) Delete (d) Drop
(a) 1 and 2 only (b) 1 and 3 only 50. Which one of the following
(c) 2 and 3 only (d) 1, 2 and 3 only statements is NOT correct about
46. Consider the following valid the B* tree data structure used for
Database users authentication by creating an index of a relation
Oracle database table?
1. Authentication by the (a) Each leaf node has a pointer to
Operating System the next leaf node
2. Authentication by the Network (b) Non-leaf nodes have pointers to
using SSL data records
3. Authentication Using Third- (c) B* Tree is a height-balanced tree
Party Services like- PKI, (d) Key values in each node are kept
RADIUS is sorted order
4. Password authentication in 51. A related database contains two
database table Student and Performance as
Choose the correct one or more shown below:
statement in given below ?
(a) 1, 2 and 4 only (b) 1 and 4 only
(c) 4 only (d) 1, 2, 3 and 4 only
47. Which of the following is a
compare operator in SQL ?
(a) != (b) Like
(c)Not In (d) all of the above The primary key of the Student
48. Match List-I with List-II table is Roll_no. For the
List – I List II Performance table, the columns
(A) BCNF iff (i) every ID is implied Roll_no and Subject_code together
by the candidate keys from the primary key. Consiquery
(B) 5 NF iff (ii) all underlying given below:
domains contain SELECT S.Student_name, sum
scalar values only (P.Mark)
(C) 1 NF iff (iii) every MVD is FROM Student S, Performance P
implied by the Where P.Marks > 84
candidate keys GROUP BY S.Student_name;
(D) 4 NF iff (IV) every FD is The number of rows returned by
implied by the the above SQL query is ___
candidate keys (a) 0 (b) 9
(c) 7 (d) 5

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 9

52. Consider the following statements: 55. DML is provided for


Statement I: Composite attributes (a) Description of logical structure of
can not be divided into smaller database
(b) Addition of new structures in the
subparts.
database system
Statement II: Complex attributes is (c) Mainpulation & processing of
formed by nesting composite database
attributes and multi-valued (d) Definition of physical structure of
attributes in an arbitrary way. database system
Statement III: A derived attribute 56. Consider the following entity set
in an attribute whose values are
computed from other attribute
(a) Statement I, II and III are true
(b) Statement I, II and III false
(c) Statement I, II are true and
statement III false
(d) Statement I false and Statement
II, III are true
53. Match List I with List II:
List I List II
(A) BCNF (I) It remove multivalued (i) How many minimum tables
dependency required which satisfy 1 NF?
(a) 1 (b) 2
(B) 3NF (II) It is not always
(c) 3 (d) 4
dependency preserving 57. Let R = (A, B, C, D, E, F) be a
(C) 2NF (III) It removes transitive relation scheme with following
dependency dependencies C → F, E → A, EC → D
(D) 4NF (IV) It removes partial and A → B
functional dependency Which of the following is a key for
Choose the correct answer from R?
the options given below: (a) CD (b) AE
(c) AC (d) None of these
(a) (A)-(III), (B)-(II), (C)-(IV), (D)-(I) 58. Consider the relation r (A, B, C, D,
(b) (A)-(II), (B)-(IV), (C)-(I), (D)-(III) E) and the set F = {AB → CE, E →
(c) (A)-(II), (B)-(III), (C)-(IV), (D)-(I) AB, C → D}. What is the highest
normal form of this relation?
(d) (A)-(II), (B)-(I), (C)-(IV), (D)-(III)
(a) 1NF (b) 2NF
54. Which of the following is not part
of Data Definition Language (DDL) (c) 3NF (d) BCNF
1. Deleting relations 59. Relation R has atleast one simple
candidate key and is in BCNF.
2. Defining
Which of the following statement
3. Specifying the security and true?
authorization for relation.
(a) R m not be in 4NF
4. Inserting tuples, deleting tuples.
(b) R in 4NF also
5. Physical storage structure
(c) R in BCNF but not 4NF
information.
(a) 3 and 5 (b) 1, 4 both (d) Can not conclude from given
(c) 4 only (d) 3 and 2 information

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 10

60. Which –one of the following 64. Which of the following is not a
statement about normal forms is built in aggregate function in SQL?
FALSE? (a) Avg (b) Max
(a) BCNF is stricter than 3NF (c) Total (d) Count
65. Observe the given SQL query and
(b) Loss less, dependency-preserving
choose the correct option.
decomposition into 3NF is always
SELECT branch_name, COUNT
possible
(DISTINCT customer_name)
(c) Loss less, dependency-preserving FROM depositor, account
decomposition into BCNF is WHERE depositor.account_number
always possible = account.account_number
(d) Any relation with two attributes in GROUP BY branch_id
BCNF (a) The query is syntactically correct
61. A given relation is known to be in but gives the wrong answer
third normal from. Select the (b) The query is syntactically wrong
statement which can be inferred (c) The query is syntactically correct
from this. and gives the correct answer
(d) The query contains one or more
(a) All attributes contribute to the wrongly named clauses.
primary key 66. Choose the correct command to
(b) Each non-key attribute determine delete an attribute A from a
the primary key relation R
(c) Each non-key attribute is (a) alter table R delete A
determine by the primary key (b) alter table R drop A
(c) alter table drop A from R
(d) Every determinant is a candidate
(d) delete A from R
key
67. create table apartment(ownerID
62. In the following, T1 and T2 are varchar (5), ownername
transactions and A is an object. varchar(25), floor numeric(4,0),
Which of the following has the primary key (ownerID));
potential of making T2 Choose the correct option
irrecoverable? regarding the above statement
(a) T2 writes A after T1 wrote A; T1 is (a) The statement is syntactically
uncommitted wrong
(b) T2 reads A after T1 wrote A; T1 is (b) It creates a relation with three
uncommitted attributes ownerID, ownername,
floor in which floor cannot be
(c) T2 write A after T1 wrote A; T1 is null.
committed (c) It creates a relation with three
(d) T2 reads A after T1 read A; T1 is attributes ownerID, ownername,
uncommitted floor in which ownerID cannot be
63. Amongest the ACID properties of a null.
transaction, the „Durability‟ (d) It creates a relation with three
property requires that the changes attributes ownerID, ownername,
made to the database by a floor in which ownername must
successful transaction persist. consist of at least 25 characters.
68. What does the following query do?
(a) Except in case of an Operating
select name, ID, branch
System crash
from student, department
(b) Except in case of a Disk crash where student.branch =
(c) Except in case of a power failure department.branch;
(d) Always, even if there is a failure of
any kind

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 11

(a) It gives all values of name, ID, 74. ____ means that the data used
branch from both the relations during the execution of a
only if all those attributes are transaction cannot be used by a
second transaction until the first
present in both
one is completed.
(b) It gives all values of name, ID, (a) Consistency (b) Atomicity
branch from their respective (c) Durability (d) Isolation
relations 75. The type of data organization
(c) It gives the values of name, ID, which does not allow cross block
branch from their respective boundaries is called
relations where the values in the (a) unspanned organization
branch attribute are same (b) spanned organization
(d) It gives the values of name, ID, (c) factor organization
branch from their respective (d) indexed organization
relations where all the values are 76. If B is an attribute and A→B, Then
matching with each other B is said to be ________ by a.
69. The type of data in SQL which (a) Logically implied
includes TIME and DATE fields (b) Functionally implied
plus six positions for other decimal (c) Logically determined
fractions is classified as (d) Functionally determined
(a) Timestamp 77. Fifth Normal form is concerned
(b) interval stamp with
(c) Boolean stamp (a) Functional dependency
(d) literal string stamp (b) Multivalued dependency
(c) Join dependency
70. The data type DATE consists of ten
(d) Domain-key
positions where as the data type 78. What are the desirable properties
TIME consists of of a decomposition ?
(a) four positions (b) five positions (a) Partition constraint
(c) eight positions (d) ten positions (b) Dependency preservation
71. Which of the following database (c) Redundancy
model. We have a parent-child (d) Security
relationship? 79. The join operations that do not
A. Hierarchical databases retain mismatched tuples are
B. Network databases called as _________ operations
C. Relational databases (a) outer join (b) natural join
Choses the correct answer from
the options below: (c) full outer join (d) inner join
(a) A, B (b) A, C (c) B, C (d) A, B, C 80. Consider the following statement
72. A transaction that has not been about PL/SQL
completed successfully is called as 1. Triggers
_______ 2. Packages
(a) Compensating transaction
(b) Aborted transaction 3. Functions
(c) Active transaction Which of the following is/are a part
(d) Partially committed transaction of PL/SQL
73. Which of the following has “all-or- (a) 1 and 2 only (b) 2 and 3 only
none” property ?
(c) 1 and 3 only (d) 1, 2 and 3 only
(a) Atomicity
(b) Durability 81. प्रथम आधु ननक ओलंनिक खेल ं की मेजबानी
(c) Isolation नकस शहर ने की थी?
(d) All of the mentioned

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 12

(a) पेररस (b) एथें स 90. सूिी- I क सूिी - II से सुमेनलत करते हुए सही
(c) लंदन (d) रोम कूि का ियन कीनजए-
82. राजस्थान में "अबू झ सावा" नकस नदन मनाते
हैं ?
(a) गणगौर (b) बसंत पंचमी
(c) कार्तिक पूर्णिमा (d) आखा तीज
83. नित्तौड़गढ़ के 'नवजय स्तंभ' िर िहला स्मारक
डाक निकि नकस वर्ष जारी नकया गया था?
(a) (A)-(i), (B)-(ii), (C)-(ii), (D)-(iv)
(a) 1949 (b) 1056
(b) (A)-(iv), (B)-(ii), (C)-(iii), (D)-(i)
(c) 1974 (d) 1086
(c) (A)-(ii), (B)-(iii), (C)-(iv), (D)-(i)
84. 'गीतांजनल' िु स्तक के लेखक कौन हैं ?
(d) (A)-(iv), (B)-(iii), (C)-(ii), (D)-(i)
(a) र्िक्रम सेठ (b) रर्िंद्रनाथ टै गोर
(91-93) ननदे श: ननम्ननलखखत जानकारी का
(c) हररिंशराय बच्चन (d) गंगा दास
ध्यानिूवषक अध्ययन करें और आगे नदए गए
85. ओलंनिक खेल ं में िहली बार मनहलाओं की
प्रश् ं के उत्तर दें ।
प्रनतय नगताएं नकस वर्ष शानमल की गईं?
नीिे दी गई जानकारी तीन अलग-अलग
(a) 1900 (b) 1920
िरीक्षाओं A, B और C में उिखस्थत छात्र ं की
(c) 1960 (d) 1984
संख्या के संबंध में है िार अलग-अलग वर्ों
86. हाल ही में केंद्रीय नवत्त मंत्री ननमषला सीतारमण
2015, 2016, 2017 और 2018 में।
ने राजस्थान के नकस शहर में नए जीएसिी
2015 में:
भवन का उद् घािन नकया है ?
िरीक्षा A में उिखस्थत नवद्यानथषय ं की संख्या
(a) जयपुर (b) बीकाने र
िरीक्षा B में उिखस्थत नवद्यानथषय ं की तुलना में
(c) जोधपुर (d) उदयपुर
द गु नी थी। तीन िरीक्षाओं में सखिनलत
87. स्वनिल कुसाले ने हाल ही में िे ररस ओलंनिक
नवद्यानथषय ं की कुल संख्या 1640 थी। िरीक्षा B
2024 में नकस खेल प्रनतय नगता में कांस्य िदक
में उिखस्थत नवद्यानथषय ं की संख्या िरीक्षा C में
जीता?
उिखस्थत नवद्यानथषय ं की तुलना में 40 अनधक
(a) शू र्टं ग (b)मु क्केबाजी
थी।
(c) कुश्ती` (d)बैडर्मं टन
2016 में:
88. हाल ही में खबर ं में रहा 'INS SHALKI' क्या
िरीक्षा B में उिखस्थत छात्र ं की संख्या िरीक्षा
है ?
(a) Diesel Electric Submarine A में उिखस्थत छात्र ं की तुलना में 40% अनधक
(b)Aircraft carrier (c)Stealth Destroyer थी, जबनक िरीक्षा C में उिखस्थत छात्र ं की
(d) Recovery vessel संख्या िरीक्षा B में उिखस्थत छात्र ं की तुलना
89. ननम्ननलखखत में से नकसने सल्तनत काल के द में 20% अनधक थी। तीन ं िरीक्षाओं में
बु ननयादी नसक्के (िांदी का िं का और तांबे का नमलाकर कुल छात्र 2448 थे।
जीतल) जारी नकए? 2017 में:
(a) अलाउद्दीन खखलजी (b) इल्तु तर्मश िरीक्षा A और िरीक्षा B में उिखस्थत छात्र ं का
(c) इब्राहीम लोदी (d) कुतुबुद्दीन ऐबक अनुिात 7:9 था। िरीक्षा C में उिखस्थत छात्र ं
की संख्या िरीक्षा B में उिखस्थत छात्र ं की
तुलना में 25% अनधक थी। तीन ं िरीक्षाओं में
कुल नमलाकर 2180 छात्र उिखस्थत हुए।

JOIN OFFLINE TEST CONTACT @ 9694473047


COMPUTECH ACADEMY BY-SUNIL YADAV SIR 13

2018 में: 97. एक घड़ी में नमनि और घं िे की सुई क उनके


िरीक्षा A और B में उिखस्थत छात्र ं का औसत स्थान नवननमय करने के नलए नकतना समय
560 था। िरीक्षा C में उिखस्थत छात्र ं का लगे गा। (घू मने का केवल एक ही तरीका अथाषत
दनक्षणावतष या वामावतष)।
औसत 600 था। िरीक्षा A और िरीक्षा C में
(a) 720/13 min (b) 360/13 min
उिखस्थत छात्र ं का अनुिात 4: 5 था।
(c) 720/36 min (d) 60 min
91. 2015 में िरीक्षा A में उिखस्थत ह ने वाले
98. 'A' अिने घर से शुरू हुआ और 20 मीिर िू वष
लड़क ं की तुलना में लड़नकय ं की संख्या का
की ओर िला, जहां उसका द स्त 'B' उसके
अनुिात 5: 7 था और 2017 में िरीक्षा C में
साथ शानमल ह गया। वे एक साथ एक ही
उिखस्थत कुल छात्र ं में से 35% लड़के थे। नदशा में 10 मीिर िले। नफर 'A' बाएं मुड़ गया
2015 में िरीक्षा A और 2017 में िरीक्षा C में जबनक 'B' दाएं मुड़ गया और क्रमशः 2 मीिर
उिखस्थत लड़क ं की संख्या का य ग क्या है ? और 8 मीिर की यात्रा की। नफर से 'B' अिने
(a) 835 (b) 825 कायाषलय तक िहुं िने के नलए 4 मीिर की यात्रा
(c) 805 (d) 845 करने के नलए बाएं मुड़ता है और उसके बाद
92. सभी िार वर्ों में सभी तीन िरीक्षाओं में अिने दाईं ओर 5 मीिर की यात्रा करता है । A
उिखस्थत छात्र ं की कुल संख्या ज्ञात कीनजए। दाएं मुड़ा और अिने कायाष लय तक िहुं िने के
नलए 12 मीिर की यात्रा की। द न ं कायाषलय ं
(a) 7424 (b) 7828
के बीि न्यू नतम दू री क्या है ?
(c) 7684 (d) 7988
93. 2017 में, िरीक्षा A, B और C में उिखस्थत ह ने (a) 15 m (b) 17 m
वाले 10%, 20% और 20% छात्र ं ने संबंनधत (c) 19 m (d) 20 m

िरीक्षाओं में सफलता प्राि्त की, जबनक 2018 99. नदए गए कथन ं क सत्य मानें और ननणषय लें
नक कौन सा ननष्कर्ष तानकषक रूि से कथन ं
में इसका प्रनतशत 20%, 10% और 40% था।
का अनु सरण करता है ।
इन द वर्ों में नकतने छात्र ं ने तीन ं िरीक्षाएं
कथन: क ई भी लड़की कूद नही ं सकती। कुछ
उत्तीणष की ं?
लड़नकयााँ तैराक हैं
(a) 750 (b) 780
ननष्कर्ष I: िु रुर् तैराक कूद सकते हैं ।
(c) 840 (d) 860
ननष्कर्ष II: कुछ तैराक कूद सकते हैं ।
94. Insect, 'Entomology' से उसी प्रकार
(a) न तो 1 और न ही 2 अनु सरण करता है
संबंनधत है नजस प्रकार
'Fungi',_____________से संबंनधत है ? (b) केिल र्नष्कर्ि 1 अनु सरण करता है
(a) फाइकोलॉजी (b) साइटोलॉजी (c) 1 और 2 दोनों अनु सरण करते हैं
(c) िायरोलॉजी (d) माइकोलॉजी (d) केिल र्नष्कर्ि 2 अनु सरण करता है
95. ननम्ननलखखत प्रश् में, वह नवकल्प ज्ञात कीनजए 100. एक नननित क ड में, TOUCH क 68 नलखा
ज प्रश् निह्न का स्थान लेगा। जाता है । उस क ड में ERROR कैसे नलखा
Pediatricians: Children :: Podiatrists:? जाएगा?
(a) Ankle (b) Intestine (a) 61 (b) 54
(c) Uterus (d) Liver (c) 59 (d) 55

96. ननम्ननलखखत प्रश् में नदए गए नवकल्प ं में से


संबंनधत संख्या का ियन करें ।
643: 9 :: 441:7:: 324:?
(a) 6 (b) 3
(c) 9 (d) 2

JOIN OFFLINE TEST CONTACT @ 9694473047

You might also like