Uppcl Ae 2022
Uppcl Ae 2022
.in
B . 00: Fetch Cycle
da
10: Indirect Cycle
ad
C . 00: Fetch Cycle
ns 01: Execute Cycle
Ans: D
Q.2 Consider the Grammar G (V-(S, A,B,C), T-(a,b),S,P) where V is a non-empty set of
w
A .aaa
B. ababbab
C.null string
D. bbb
Ans: B
Q.3Let F(x,y) denote the predicate ‘ y is a friend of x’. Which of the following correctly describes'
It is impossible that someone does not have any friends’?
.in
C. There exists x for all y (F(x, y))
da
Ans: D
ad
Q.4 2 doctors and 10 nurses attend a small conference. All 12 names are put in a hat and 4
names are randomly picked without replacement. The probability that 1 doctor and 3 nurses are
picked is: ns
tio
lu
so
w.
w
w
Ans: D
Q.5In a __________ graph, vertices can be partitioned into two subsets V1 and V2 suchthat no
edge has both endpoints in the same subset, and every possible edge that could connect
vertices in different subsets is part of the graph.
A. complete bipartite
B. clique
C. complete
D. bipartite
Ans: A
.in
Q.6 Let Grammar G(V=(5).T (ab)SP)stere V is a no-empty set of variables or non-terminals. T
is a set of terminals. S is a start symbol. λ is a null string and is a set of production rules. If na
da
(w), (w) nb represents the number of a's and b'a in string w, then the language derived from set
of production rules
ad
A.{W ∈ {a,b}* : na (w) = nb(w)}
A. constants
B. keywords
w.
C. identifiers
w
D. special characters
w
Ans: A
A .b + ca' = 1
B. ab + b'c=1
C. a+b' c
D. a'b + ac
Ans: D
.in
Q.9.Consider the following schema
da
(staff, name, street, city)
ad
company (c_name, city)
C.
so
D.
w.
Ans: D
w
w
A. data transfer
B. resource scheduling
C. disk scheduling
D. evaluation of expressions
Ans: D
Q.11. Which of the following principles is used by divide and conquer technique?
.in
D. Construct an optimal solution from computed information
Ans: B
da
Q.12. The number of elements in the adjacency matrix of a graph having 6 vertices is_______
ad
A. 36
B. 12
ns
C. 216
D. 24
tio
Ans: A
lu
Q.13 Find the combination of the inputs (X and Y) for which the Q output is set to 1 for the latch
so
as shown.
A. 1 ,0
w.
B. 1, 1
w
C. 0, 1
w
D . 0,0
Ans: B
Ans: C
.in
da
Q.15. For which of the following functions is Rolle’s theorem applicable?
ad
ns
tio
lu
A. f(x)=x³ in [1,2]
so
B .f(x)=x² in [-1,1]
D. f(x)=x¹³ in [−1,1] ⅓
Ans: B
w
w
B. Address register
Ans: B
Q.17. In which of the following gates, the output is 0 if and only if at least one input is 0?
A. NOR
.in
B. OR
C. XOR
da
D. AND
Ans: D
ad
Q.18. Which of the following is NOT a property of context free language that can be generated
ns
from context free grammar G ?
A.There are no productions of the form ABC where A and B are variables
tio
B. Each variable and each terminal of G appears in the derivation of some word in L.
C. There are no productions of the form A-→> B where A and B are variables
lu
Ans: A
w.
Q.19 In dynamic programming, the technique of storing the previously calculated values in
w
called:
D. Memorization
Ans: D
Q.20. For all sets A, B, C, which of the following does NOT hold?
A. (B ∩ C) ∪ A = (B ∪ A) ∩ (C ∪ A)
B. A ∩ B = B ∩ A
C. A ∪ (B ∪ C) = (A ∪ B) ∪ C
.in
D. A ∩ (B ∩ C) = (A ∩ B) ∪ C
Ans: D
da
Q.21 _______are very versatile and are a basic component of inter process and intersystem
ad
communication. They also provide point-to-point, two-way communication between two
processes.
A. Monitors
ns
B. Shared memories
C. Sockets
tio
D. Semaphores
Ans: C
lu
Q.22. The number 101010101010 is a 12-bit binary number in 2’s complement form. If it is
so
stored in a 16-bit register, with what would you fill bit 12 to bit 15 (4-bits), so that the value of the
number is unchanged?
A. 0101
w.
B. 0000
w
C. 1111
w
D. 1010
Ans: C
Q.23 The giver table describes the rate of economic growth (x) and the rate of return on the
S&P 500(y) of a sample. The covariance between these two is :
A. 1.36
.in
B. 1.53
C. 1.47
da
D. 1.27
ad
Ans: B
ns
Q.24. Which is the next step that comes after the intermediate code generator in the phases of
a compiler?
tio
A. Machine - independent code optimizer
B. Semantic analyzer
lu
D. Code generator
Ans: C
w.
B. I - A, II - D, III - B, IV - C
C. I - A, II - B, III - C, IV - D
D. I - A, II - C, III - B, IV - D
Ans: C
.in
Q.26.The identity elements of OR and AND operations are ______ and ______, respectively.
da
A. zero, zero
B. one, zero
ad
C. one, one
D. zero, one
ns
Ans: D
tio
A. x - x² = 1
B. x.x² = 0
so
C. x.x¹ = 1
w.
D. x - x = 0
Ans: B
w
w
(given k is constant)
.in
da
ad
Ans: C
ns
Q.29 Which of the following is a decidable problem?
A. Determine whether a language generated by Turing Machine M is finite. B.
tio
Determine whether a language L generated by Unrestricted Grammar is empty.
Ans: D
Q.30. The time complexity of constructing a single-tape Turing Machine and a two-tape Turing
Machine for the language L = {a"b": n ≥ 1), respectively, are:
w.
w
A.
w
B.
C.
D.
Ans: C
Q.31. Protocols in which the sender sends one frame and then waits for an acknowledgement before
proceeding are called protocols.
A. stop-and-wait
B. Go-back-n
C. store and forward
D. sliding window
.in
Ans: A
da
Q.32.A complete graph G with 5 vertices has___________spanning trees. Ans
A. 125
ad
B. 15
C. 3
D. 25
Ans: A
ns
tio
lu
so
w.
w
.in
da
ad
Ans: C ns
Q.35 The type of information stored in computer words______________
tio
A. is data only
D. is instruction only
so
Ans: B
w.
Q.36 Which of the following is a process that reduces computing time but increases the amount of
memory needed?
w
C. Re-rendering
D. Smaller code
Ans: A
Q.38 Find the minimum number of additions and multiplications needed to evaluate a degree 5
polynomial at any point x0.
A. 5 additions, 15 multiplications
.in
B. 5 additions, 5 multiplications
C. 5 additions, 4 multiplications
da
D. 4 additions, 15 multiplications
Ans: B
ad
Q.39 Using a dual 8:1 MUX, what are the extra logic gates required to implement a full- adder?
Ans: D
lu
so
B. 9x² + 4y² = 24
w.
c. x² + y² = 12
w
Ans: A
w
A. 12
B. 11
C. 10
D. 13
Ans: A
A. k
B. 2k+1
.in
C. 2k – 1
D. 2k
Ans: D
da
Q.43. Consider the indirect addressing mode instruction "Load RI. (M)"
The task of the instruction: Load the content of memory location MI to register RI. There are five control
ad
steps after fetch) that are required to execute the instruction "LOAD RI, (M)", as given below.
3._______
tio
4. WMFC
5. MDRout, Rin
lu
Which of the following fits appropriately in step 3 of the given set of instructions?
so
C. MDRout, MARin
D. MDRout, MARout
Ans: c
w
Ans: c
Q.45 Which of the following options is true in the case of a two-bus organisation?
.in
buses. The general-purpose register can only
write from both the buses. In this case, two
operands can be fetched at the same time
because of the two buses – one bus fetch
da
operand for ALU and another bus fetch for
register.
C. In a two-bus organisation, there are two
ad
buses. The general-purpose register can only
read from both the buses. In this case, two
operands can be fetched at the same time
because of the two buses – one bus fetch
nsoperand for ALU and another bus fetch for
register.
D. In a two-bus organisation, there are two
tio
buses. The general-purpose register can only
write from both the buses. In this case, two
operands can be fetched at the same time
lu
Ans: A
w.
w
w
Ans: B
Q.47 A binary search tree which provides the smallest possible search time for a given
sequence of accesses is:
.in
D. AVL tree
Ans: A
da
Q.48 ADD R1,R2 instruction is an example of which of the following addressing modes? Ans
ad
A.Direct addressing mode
A. (1 ,2 )
B. (0 ,1)
so
C. (2 ,3)
D. (-1, 0)
Ans: B
w.
Q.50. What is the space complexity of the following piece of code?for (int i=0;i< N;i++)
V.push_back(i);
w
A. O(loan)
w
B. O(n)
C. O(1)
D. O(nlogg)
Ans:B
Ans:C
Q.52 search terminates only when either an answer node is found or the entire state
space tree has been generated and searched.
.in
A. DFS
B. Least cost
da
C. FIFO
D. BFS
ad
Ans:B
C. C only (d)
D. (b) and (c)
Ans:C
so
Q.54 In ISO’s OSI model, which layer offers services like dialogue control, token management and
synchronization?
w.
A. Transport layer
B. Session layer
w
C. Presentation layer
D. Network layer
w
Ans:B
Q.55. Let 7(n)= cn²log n where c is some constant. Which of the following recurrence relations
can have T(n) as a
solution?
.in
da
ad
ns
Ans:C
tio
A. fork()
lu
B. fcntl()
so
C. pipe()
D. exec()
Ans :C
w.
Q.57 Which of the following computer architectures consists of a single shared memory for programs and
w
data (i.e., stored program concept) and a single bus for memory access, an arithmetic unit and a program
control unit?
A. Von Neumann architecture
w
B. FLYNN’s architecture
C. Harvard architecture
D. Multiprocessor architecture
Ans : A
Q.58 Consider the Grammar G (V-{S.A,B,C}.T= {a},S,P) where V is a non-empty set of variables or
noo-terminals. Tis a set of terminals, S is a start symbol and P is a set of production rules given as
follows:
S→A.A→B,B→C,C→a
The language generated by grammar G is:
A L(G) = {a": n ≥ 2}
B. L(G) = {a}
.in
c. L(G) = {a": n ≥ 1}
D. L(G) = {∅}
Ans : B
da
Q.59. What is the space complexity of the following piece of code?
ad
#include<stdio.h> int main()
{
int a = 5, b = 5, c;
c=a+b;
ns
printf("%d", c);
tio
}
A. O(n)
lu
B. O(1)
C. O(logn)
so
D. O(nlogn)
Ans : B
w.
C. QPSK modulation
w
da
ad
A. Type-
ns B. Type-
C. Type-0
D. Type-3
tio
Ans :A
Q.63. is the deadlock avoidance algorithm. Ans
A. Karn’s algorithm
lu
C. Round-robin algorithm
so
D. Banker’s algorithm
Ans :D
w.
C. A language is Context Free Language if and only if it can be accepted by Non- Deterministic
Pushdown Automata.
Ans :C
Q.65 In a stack data structure insertion and deletion takes place at:
A. front
B. at one end
C. rear and front
D. at any place
Ans :B
.in
A. 4
B. 8
da
C. 2
D. 1
ad
Ans :B
ns
tio
lu
so
w.
w
w
Ans : A
Q.68 is the time when a process enters into the ready state and is ready for its execution.
A. Arrival time
B. Turnaround time
C. Waiting time
D. Burst time
Ans : A
.in
B. UPDATE command is used to change the contents of the relation.
da
D. SET can be used with UPDATE command
Ans : C
ad
ns
tio
lu
Ans : B
so
A. 111
w.
B. 001
C. 110
w
D. 010
w
Ans : D
Q.72 To which of the following categories does UPDATE command belong? Ans
A. DCL
B. TCL
C. DDL
D. DML
Ans :D
A. biclique
B. clique
C. bipartite
.in
D. cartesian
Ans :D
da
Q.74 IEEE standard format contains a VLAN tag. Ans
A. 802.11
ad
B. 802.1Q
C. 802.16
D. 802.11/a
ns
Ans :B
Q.75 The sizes of address bus = 14 bit and data bus = 3 bits, hence the memory size will be: Ans
tio
A. 32K × 8 bits
B. 16K × 8 bits
lu
C. 14K × 8 bits
so
D. 64K ×8 bits
Ans :B
w.
w
w
.in
da
ad
Ans :A
C. A handle is a terminal that matches the body of a production and its reduction represents one
lu
D. A handle is a substring that matches the body of a production and its reduction represents one
so
Ans :A
w.
Q.78 Which of the following error-detecting codes includes a positional component, adding the product of
the data and its position to the runningsum?
w
A. Fletcher’s checksum
B. Parity Checking
w
C. Checksum
Ans :A
Q.79 Each bridge operates in the , that is, it accepts every frame transmitted by the
stations attached to each of its ports.
A. fragment-free mode
C. non-promiscuous mode
D. promiscuous mode
Ans :D
.in
da
ad
ns
A. 8.4
tio
B. 8
C. 4
D. 4.8
lu
Ans :D
so
Q.81 The defines what operations the layer(in OSI/TCP model) is prepared to perform on
behalf of its users, but it says nothing at all about how these operations are implemented.
A. channel
w.
B. interface
C. service
w
D. protocol
Ans :C
w
Q.82 For a string of 60 characters, if the input is ‘COVID-19’. At what position ‘-‘ will be stored if the gets()
function is used to take the input and the first character is at location 9021?
A. 9025
B. Error
C. 9026
D. 9031
Ans :C
.in
da
ad
ns
tio
lu
so
w.
Ans :A
Q.84 In , a special byte called escape character (Esc) is stuffed before every byte in the
message with the same pattern as the flag byte.
w
A. bit stuffing
w
B. flag stuffing
C. Esc stuffing
D. byte stuffing
Ans :D
Q.85 Calculate the number of bits required in the address for a memory having a size of 16 GB. Assume
the memory is 4-byte addressable.
A. 8 bits
B. 16 bits
C. 64 bits
D. 32 bits
Ans :D
Q.86 In , whenever the sender sends the data to the receiver, the receiver then
.in
sends the information back to the sender and permits the sender to send more data or informs
the sender about how the receiver is doing.
A. rate-based flow control
da
B. asynchronous flow control
C. feedback-based control
ad
D. synchronous flow control
Ans :C ns
Q.87 Which of the following methods returns the top element on the stack but does NOT remove it from the stack?
A. Push()
tio
B. Top()
C. Pop()
lu
D. Peek()
Ans :D
so
A. Front
B. Rear
w
C. Top
D. Pivot
w
Ans :A
Q.89 In Chomsky Hierarchy, the language generated by type-2 grammar is called: Ans
Ans :B
.in
da
ad
ns
tio
A. LCM of x and y
lu
B. GCD of x and y
C. Maximum of x and y
so
D. Minimum of x and y
Ans:B
w.
B. 4
ad
C. 4.8
D. 8.4
ns
Ans:A
Q.93 A system has 10 user processes, each requiring 3 units of resource R. The maximum number of
units of R such that deadlock will occur is .
tio
A. 20
B. 19
lu
C. 25
D. 21
so
Ans:A
Q.94 Find the 9’s complement of the decimal number 6789. Ans
w.
A. 3211
B. 3209
C. 3210
w
D. 3245
w
Ans:C
.in
da
ad
Ans :D
ns
Q.96 Which automata has memory in the form of stack? Ans
A. Linear Bounded
tio
Automata
C. Pushdown Automata
D. Turing Machine
so
Ans :C
Q.97 Calculate the size of the memory if its address consists of 22 bits and the memory is 2- byte
addressable.
w.
A. 8 MB
B. 16 KB
w
C. 16 MB
w
D. 8 KB
Ans :A
Q.98 Which of the following flag bits is set if the sum of two positive numbers yields a negative value?
A. Parity bit
B. Sign bit
C. Zero bit
D. Overflow bit
Ans :D
Q.99 If spammers want to send junk e- mails to many recipients, which type of communication can you
suggest?
A. Peer-to-peer communication
B. Connectionless communication
C. Synchronous communication
D. Connection-oriented communication
.in
Ans : B
Q.100 The three basic logical operations are AND, OR and NOT gates. Which of the following operations
da
when used repeatedly can simulate these logical operations?
A. XOR
B. X-NOR
ad
C. AND
D. NAND
ns
Ans : D
Q.101 The equivalent of 4-bit binary number 1010 in Gray code is . Ans
A. 1100
tio
B. 0101
C. 0011
lu
D. 1111
Ans : D
so
w.
w
w
A. -7 12 -8
B. 7 12 -8
C. 8 12 7
D. -8 12 7
Ans : B
Q.103 Let S be a set such that |S| = n. Find the total number of reflexive relations from S to S.
.in
da
ad
Ans : B
ns
tio
lu
so
A. O(logn)
w.
B. O(1)
C. O(n)
w
D. O(nlogn)
Ans : D
w
Q.105 What is the total number of input and select lines together in an 8:1 mux? Ans
A. 7
B. 5
C. 9
D. 11
Ans : D
Q.106 The number 0 is considered . Ans
A. positive
D. prime
Ans : B
Q.107 ADD 3030 is an example of a instruction. Ans
.in
A. zero-address
B. three-address
da
C. two-address
D. one-address
Ans :D
ad
ns
tio
lu
so
w.
w
.in
B. X->y, X->Z and YZ->X
C. X->Y
da
D. Z->y
Ans :A
ad
Q.110 What is communication protocol?
A. An agreement between the communicating parties
B. A step-by-step procedure to write a program
ns
C. A guidance to start communication
A. Arrival time
B. Waiting time
so
C. Turnaround time
D. Burst time
w.
Ans :D
Q.112 Which of the following CANNOT be created by ‘CREATE’ command? Ans
w
A. Procedure
B. Relation
w
C. Super key
D. Trigger
Ans :C
A. Regular Grammar
C. Unrestricted Grammar
.in
D. Context Free Grammar
Ans :C
da
Q.114 Find the solution to the given recurrence relation: T(1) = 0 , T(n) = 1 + T(floor(n/3)).
ad
ns
tio
lu
so
Ans :B
Q.115 If the length of a parse string is n , then the Running time of CYK membership algorithm is:
w.
w
w
Ans :D
Q.116 The 802.11 standard defines following three different classes of frames in the air:
.
A. data, control and security
.in
A. Maximum resources needed by each process
B. Maximum free available resources in the system
C. Currently allocated resources by each process
da
D. Number of processes in execution
Ans :D
ad
ns
tio
lu
so
Ans :B
w.
Q.120 The defines which primitive operations and services the lower layer makes available
to the upper one.
w
A. algorithm
B. interface
w
C. channel
D. protocol
Ans :B
.in
da
ad
A. contains
B. made-by
C. address
ns
D. order
Ans :D
tio
Q.122 Which of the following is a disadvantage of dynamic partitioning? Ans
A. Degree of multiprogramming is
lu
dynamic
process
C. No internal fragmentation
w.
D. External fragmentation
Ans :D
w
w
Ans :D
Q.124 Which number will come in place of the question mark in the given sequence?
2, 4, ?, 48, 240
A. 48
.in
B. 12
C. 36
da
D. 24
Ans :B
Q.125 Which part of the compiler sends the stream of tokens to the parser? Ans
ad
A. Code generator
D. Lexical analyzer
tio
Ans :B
Q.126 operate in the data link layer, so they examine the data link layer addresses to forward
lu
frames.
A. Repeaters
so
B. Gateways
C. Routers
w.
D. Bridges
Ans :D
w
B. INSERT
C. DELETE
D. UPDATE
Ans :A
Q.128 Consider a scenario in which 5 people deposit their bags at a security zone when entering a shop and then
come back and collect their bags. However, due to some error in the token system, the bags returned are random.
Which of the following events has a probability of 1/120?
A. Exactly four of the five people get back their own bag.
B. Exactly three of the five people get back their own bag.
D. At least four of the five people get back their own bag
Ans :D
.in
da
ad
ns
tio
lu
A. 2
so
B. 5
C. 4
w.
D. 3
w
Ans :B
w
.in
A. Indirect cycle
da
B. Interrupt cycle
C. Execute cycle
D. Fetch cycle
ad
Ans :D
ns
tio
lu
so
w.
w
Ans :A
w
Q.132 Which of the following data structures uses LIFO method of accessing elements? Ans
A. Linked list
B. Queue
C. Stack
D. Tree
Ans :C
Q.133 Which model does NOT distinguish between the physical and data link layers? Ans
A. TCP/IP model
B. Random network model
.in
Ans :A
Q.134 Given two relations, R1 and R2, where R1 contains N1 tuples, R2 contains N2 tuples and N2>N1>0,what is
the minimum and maximum possible sizes (in tuples) for the relation R1-R2?
da
A. N1-N2,N1-N2
B. 0,N1
C. N1-N2,N1
ad
D. N2,N1
Ans :B
ns
Q.135 In the paging technique, partitions in the main memory are called .
A. frames
tio
B. pages
C. partitions
lu
D. segments
Ans :B
so
Q.136 Source code can read character by character or line by line through input buffering in which way?
A. From right to left
w.
Ans :D
.in
A. n2
da
B. n
C. n3
ad
D. nlogn
Ans :A
ns
Q.138 The context free language is NOT closed under:
A. Complementation
B. Kleene Closure
tio
C. Concatenation
D. Inverse Homomorphism
lu
Ans :A
so
Q.139 Which of the following methods is used in pop() when stack is implemented using arrays?
A. Isfull()
w.
B. Isempty()
C. Nextitem()
w
D. Peek()
Ans :A
w
Q.140 Which of the following proof techniques will be most useful for proving that the square root of 11 is
irrational?
B. Vacuous proof
C. Proof by contradiction
D. Direct proof
Ans :C
.in
da
Ans :B
Q.142 If we have a procedure to determine whether a given element belongs to set X or not, then this set is called:
ad
A. recursive
B. recursive enumerable
ns
C. context free
D. complete
tio
Ans :B
Q.143 SQL for database queries is considered to be which generation language? Ans
lu
Ans :A
w
w
A. 7
B. 20
C. 12
D. 10
Ans :C
Q.145 Let G be a graph with n vertices where n is even. Which of the following conditions ensure that G is
connected?
.in
da
ad
ns
tio
Ans :D
lu
Q.146 Using the linked-list representation of disjoint sets and the weighted-union heuristic, a sequence of m
MAKE-SET, UNION, and FIND-SET operations, n of which are MAKE- SET operations, takes time.
so
A. O(n log m)
B. O(m+n logn)
w.
C. O(m+n)
D. O(n)
w
Ans :B
Q.147 Which of the following flag bits is set if the instruction SUB 1101,1101 is executed? Ans
w
A. Parity bit
B. Overflow bit
C. Sign bit
D. Zero bit
Ans :D
.in
A. 1230
da
B. 123
C. 1234
ad
D. 234
Ans :C ns
Q.149 A function in which f(n) is Ω(g(n)), if there exist positive values k and c such that f(n)>=c*g(n), for all n>=k.
This notation defines a lower bound for a function f(n):
A. Big Oh O(f)
tio
D. Small oh O(f)
so
Ans :B
w.
w
w
A. Zout, R1out
C. Zin, R1in
Q.1 What is the total number of reserve players in a kabaddi team? Ans
A. Three
B. Four
C. Two
.in
D. Five
Ans :D
da
Q.2 Which of the following is NOT an initiative of the Ministry of Education to bridge digital divide and reach the
unreached to bring greater inclusion in education through the use of technology?
A. Vidyakul
ad
B. SWAYAM
Ans :A
tio
Q.3 Which of the following options is arranged in the increasing order of the size of the halogen atoms?
Ans :B
w.
Q.4 Which of the following scientific principles/laws is related to flight in aeroplanes? Ans
A. Laws of thermodynamics
w
Q.6 In which year was the Pradhan Mantri Gram Sadak Yojna launched in India? Ans
A. 2002
B. 2003
C. 2000
.in
D. 2001
Ans :C
da
Q.7 The tenure of First Lok Sabha was from Ans
A. 23 March
1952 to 25 March
ad
1952
A. Basketball
lu
B. Volleyball
so
C. Handball
D. Football
Ans :B
w.
Q.9 The Supreme Court was established on 28th January 1950, under of the Constitution of India.
Ans :A
Q.10 In Tamil Nadu District has reported the highest Literacy rate as per 2011 census?
A. The Nilgiris
B. Thoothukudi
C. Kanyakumari
D. Dharmapuri
Ans :C
Q.11 Khilji dynasty was founded by JalaluddinKhilji in which of the following years?
A. 1286
B. 1290
.in
C. 1288
D. 1292
da
Ans :B
Q.12 What is the total number of reserve players in a volleyball team? Ans
ad
A. Five
B. Seven
C. Six
D. Eight
ns
Ans :C
tio
Q.13 In which of the following states has the Kathak dance originated?
A. Uttar Pradesh
lu
B. Tamil Nadu
C. Odisha
so
D. Kerala
Ans : A
Q.14 Where was the Kalpana Chawla centre for Research in Space and Technology inaugurated?
w.
A. Chandigarh
w
B. Madhya Pradesh
C. Punjab
w
D. Delhi
Ans : A
Q.15 Which of the following was authored by Minhaj-i Siraj Juzjani? Ans
A. Kitab-ul-Hind
B. Khazain-ul-Futuh
C. Shahnama
D. Tabaqat-i-Nasiri
Ans : D
Q.16 The slow and fast Khayals are usually followed by a . Ans
A. Dhrupad
B. Tarana
C. Thumri
.in
D. Tappa
Ans : B
da
Q.17 What is the full form of ‘IRDP’?
ad
C. Integrated Regional Development Programme
D. Integrated Regional Development Plan
ns
Ans : A
tio
Q.18 The Carnatic music is mainly associated with India. Ans
A. North
B. South
lu
C. West
so
D. East
Ans : B
w.
Q.19 In which year was a sub-committee formed to study issues and concerns in the microfinance sector under the
chairmanship of YH Malegam?
w
A. 2011
B. 2009
w
C. 2010
D. 2008
Ans : C
A. Fungi
B. Green algae
C. Angiosperm
D. Gymnosperm
Ans : A
.in
da
ad
ns
tio
lu
Ans :A
so
w.
w
w
Ans :D
.in
da
ad
Ans :A
ns
tio
lu
so
w.
w
Ans :C
w
Q.5 A situation is given followed by two possible reasons for the same. Read all the information carefully
and decide which of the given reasons follow(s).
Possible reasons:
.in
(II) : Unlike Country A, 90% of the people in Country B
drink their tea with milk. As per many studies, milk
interferes with the efficiency of the medicines for intestinal
diseases.
da
A. Both (I) and (II) can be possible reasons.
ad
C. Only (II) can be a possible reason.
Ans :A
w
Ans :D
w
w
w.
so
lu
tio
ns
ad
da
.in
Ans :A
.in
da
A. 230
B. 226
C. 230
ad
D. 238
Ans :A
ns
tio
lu
so
w.
w
w
Ans :A
.in
da
ad
ns
Ans :B
tio
Q.14 The given situation is followed by two conclusions. Read all the information carefully and decide
which of the given conclusions follow(s).
Situation:
On the basis of some studies, the management of
lu
Conclusions:
Ans :B
A. 623
B. 111
.in
C. 1067
D. 104
da
Ans :A
ad
Q.16 Select the correct answer regarding the following two statements labelled (A) and (B). (A): Sonu
deliberately hit his car on a wall to get the insurance claim.
ns
(B): The insurance company refused to pay the claim for the accident of Sonu’s car.
A. Both statements (A) and (B) are effects of independent causes.
tio
B. Statement (B) is the cause and statement (A) is its effect.
Ans :C
so
Q.17 Four boys Anand, Barun, Charan, Divedi and four girls, Pallavi, Archana, Richa and Soni are sitting
around a circular table, but not necessarily in the same order. Two boys and two girls are not facing the
centre. Charan is second to the left of Archana, who is not an immediate neighbour of Barun. Pallavi sits
w.
third to the left of Soni and one of them is not facing the centre. Anand is third to the right of Barun, who is
facing the centre. Richa and Divedi are facing each other, but both are not immediate neighbours of
Barun or Soni. No three girls can sit together. Divedi sits second to the right of Soni. Who among the
following sits exactly between Barun and Divedi?
w
A. Richa
w
B. Pallavi
C. Charan
D. Archana
Ans :C
Ans :D
Ans :C
w
w
w.
so
lu
tio
ns
ad
da
.in
.in
da
ad
ns
Ans :A
tio
B. सं%ावाचक िवशेषण
C. गण
ु वाचक िवशेषण
D. पfरमाणवाचक िवशेषण
Ans :C
Q.3"चोर की दाढ़ी म” ितनका होना" का सही अथ´ है ?
A. चोर की दाढ़ी होती है ।
B. अपराधी सशंिकत रहता है ।
C. दोहरा लाभ
D. अपराधी की दाढ़ी म” ितनका होता है ।
Ans :B
Q.4 "हे राम! यह ®ा हो रहा है ।" वा® म” कारक है :
A. करण कारक
B. अपादान कारक
C. संबध
ं कारक
.in
D. संबोधन कारक
Ans :D
da
Q.5 "मसण
ृ " का होगा?
िवलोम श
ad
A. कठोर
B. 7¶ ns
C. आ\
D. स£ªffण
tio
Ans :B
A. भलाई
B. ™ुित
w.
C. हष´
w
D. परिनfiा
Ans :B
w
Comprehension:
प7 ु षाथ´ दाश´िनक िवषय है , पर दश´न का जीवन से घिन स%E
है । वह थोड़े-से िव4ािथ´यों का पाª िवषय मा7 नहीं है । PÆेक
समाज को एक दाश´िनक मत ªीकार करना होता है । उसी के आधार
पर उसकी राजनीितक,
सामािजक और कौटु£%क व3था का ूह खड़ा
होता है । जो समाज अपने वैय£ªक और सामूिहक जीवन को के वल
Pतीयमान उपयोिगता के आधार पर चलाना चाहे गा उसको बड़ी
किठनाइयों का सामना करना पड़ेगा। एक
िवभाग के आदश´ द ू सरे िवभाग के आदश´ सेट कराएँ गे। जो बात एक ¶े7 म” ठीक जंचेगी वहीँ द ू सरे ¶े7 म”
.in
िववेकशील मन® ु को क होता है ।
SubQuestion No : 7
Q.7 समाज के िलए ®ा मह¾पण
ू ´ है ? Ans
da
Aसमशा™
B. दश´न
ad
C.पाfरव
क व3था
D. राजनीित
ns
Ans :B
tio
Comprehension:
प7 ु षाथ´ दाश´िनक िवषय है , पर दश´न का जीवन से घिन स%E
है । वह थोड़े-से िव4ािथ´यों का पाª िवषय मा7 नहीं है । PÆेक
समाज को एक दाश´िनक मत ªीकार करना होता है । उसी के आधार
lu
पर उसकी राजनीितक,
सामािजक और कौटु£%क व3था का ूह खड़ा
होता है । जो समाज अपने वैय£ªक और सामूिहक जीवन को के वल
so
िवभाग के आदश´ द ू सरे िवभाग के आदश´ सेट कराएँ गे। जो बात एक ¶े7 म” ठीक जंचेगी वहीँ द ू सरे ¶े7 म”
अनुिचत कह लाएगी और मन® ु के िलए अपना कत´ £3थर करना किठन होजाएगा। इस का तमाशा आज दीख
पड़ रहा है । चोरी करना बरु ा है , पर पराये दे श का शोषण करना बरु ा नही।ं झठू बोलना बरु ा है , पर राजनैितक ¶े7 म” सच
w
बोलने पर अड़े रहना मख ू ´ता है । घर वालों के साथ, दे श वािसयों के साथ और परदेिशयों के साथ बता´व करने के िलए
अलग-अलग आचार विलयाँ बन गई ह*। इससे िववेकशील मन® ु को क होता है ।
w
SubQuestion No : 8
A. दश´न और राजनीित
B. कौटु£%क व3था
Ans :C
Comprehension:
प7 ु षाथ´ दाश´िनक िवषय है , पर दश´न का जीवन से घिन स%E
है । वह थोड़े-से िव4ािथ´यों का पाª िवषय मा7 नहीं है । PÆेक
समाज को एक दाश´िनक मत ªीकार करना होता है । उसी के आधार
पर उसकी राजनीितक,
सामािजक और कौटु£%क व3था का ूह खड़ा
.in
होता है । जो समाज अपने वैय£ªक और सामूिहक जीवन को के वल
Pतीयमान उपयोिगता के आधार पर चलाना चाहे गा उसको बड़ी
किठनाइयों का सामना करना पड़ेगा। एक
da
िवभाग के आदश´ द ू सरे िवभाग के आदश´ सेट कराएँ गे। जो बात एक ¶े7 म” ठीक जंचेगी वहीँ द ू सरे ¶े7 म”
अनुिचत कह लाएगी और मन® ु के िलए अपना कत´ £3थर करना किठन होजाएगा। इस का तमाशा आज दीख
पड़ रहा है । चोरी करना बरु ा है , पर पराये दे श का शोषण करना बरु ा नही।ं झठू बोलना बरु ा है , पर राजनैितक ¶े7 म” सच
ad
बोलने पर अड़े रहना मख ू ´ता है । घर वालों के साथ, दे श वािसयों के साथ और परदेिशयों के साथ बता´व करने के िलए
अलग-अलग आचार विलयाँ बन गई ह*। इससे िववेकशील मन® ु को क होता है ।
SubQuestion No : 9
ns
Q.9 बड़ी किठनाइयों का सामना िकसे करना पड़ता है ? Ans
A.िववेकआधारपरचलने वाला समाज
tio
B. वैय£ªकता के आधार पर चलने वाला समाज
Ans :D
so
Comprehension:
प7 ु षाथ´ दाश´िनक िवषय है , पर दश´न का जीवन से घिन स%E
है । वह थोड़े-से िव4ािथ´यों का पाª िवषय मा7 नहीं है । PÆेक
समाज को एक दाश´िनक मत ªीकार करना होता है । उसी के आधार
w.
पर उसकी राजनीितक,
सामािजक और कौटु£%क व3था का ूह खड़ा
होता है । जो समाज अपने वैय£ªक और सामूिहक जीवन को के वल
w
िवभाग के आदश´ द ू सरे िवभाग के आदश´ सेट कराएँ गे। जो बात एक ¶े7 म” ठीक जंचेगी वहीँ द ू सरे ¶े7 म”
अनुिचत कह लाएगी और मन® ु के िलए अपना कत´ £3थर करना किठन होजाएगा। इस का तमाशा आज दीख
पड़ रहा है । चोरी करना बरु ा है , पर पराये दे श का शोषण करना बरु ा नही।ं झठू बोलना बरु ा है , पर राजनैितक ¶े7 म” सच
बोलने पर अड़े रहना मख ू ´ता है । घर वालों के साथ, दे श वािसयों के साथ और परदेिशयों के साथ बता´व करने के िलए
अलग-अलग आचार विलयाँ बन गई ह*। इससे िववेकशील मन® ु को क होता है ।
SubQuestion No : 10
Q.10 "कौटुß%क" का िवलोम शहै ? है ?
A. समाज
B. ª
C. पfरवार
D. एकल
Ans :D
.in
da
ad
ns
.
tio
lu
so
w.
w
w
w
w
w.
so
lu
tio
ns
ad
da
.in
w
w
w.
so
lu
tio
ns
ad
da
.in