0% found this document useful (0 votes)
118 views13 pages

CSL Previous Year Question Paper 2020

Uploaded by

aravind.shine15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views13 pages

CSL Previous Year Question Paper 2020

Uploaded by

aravind.shine15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?

exam=Y3NsZGVjMDIyMDIw

Subject Code : 101

Subject Exam Q Answer


Questions
Code Date Id Key

IIoT stands for

(A) Industrial Internet of Things


02-
101 12- 1 (B) Internet Internet of Things (A)
2020
(C) Intelligence Internet of Things

(D) Internal Internet of Things

Which bank has become the most popular central bank on Twitter with 1
million followers worldwide?

(A) State Bank of India


02-
101 12- 2 (D)
(B) UBI
2020
(C) PNB

(D) Reserve Bank of India

Which city became first in India to get ISO certification for Faecal Sludge
and Septage Management (FSSM) service?

(A) Kolkata
02-
101 12- 3 (C)
(B) Jaipur
2020
(C) Bhubaneswar

(D) Ahmedabad

Who among the following is considered as the 'Father of Artificial


Intelligence'?

(A) Charles Babbage


02-
101 12- 4 (D)
(B) Lee De Forest
2020
(C) JP Eckert

(D) John McCarthy

101 02- 5 When is the International Yoga Day celebrated? (A)


12-
2020 (A) June 21

(B) March 21

(C) April 22

202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 1/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

(D) May 31

Synonym for "AMATEURISH "

(A) skilled
02-
101 12- 6 (B) trained (C)
2020
(C) unprofessional

(D) seasoned

Fill up with the correct option:

A ____ of Japanese artists stepped off the coach amidst warm welcome.

02- (A) bank


101 12- 7 (D)
2020 (B) gang

(C) troop

(D) troupe

Find out whether there is any Grammatical error in below sentence. If yes,
that part of the sentence shall be indicated as the answer among the given
options. If no error, choose option "No error":

Our new computer come/ with a 90 days warranty/ on all components.


02-
101 12- 8 (A) Our new computer come (A)
2020
(B) with a 90 days warranty

(C) on all components

(D) No error

Out of the four alternatives, choose the one which can be substituted for the
given words.

A person who readily believes others


02-
(A) Credulous
101 12- 9 (A)
2020
(B) Sensitive

(C) Sensible

(D) Credible

101 02- 10 In the following question, the sentence is split into four parts and named P, (D)
12- Q, R and S. These four parts are not given in their proper order. Read the
2020 sentence and find out which of the four combinations is correct.

"Until they have come (P)/ some take no thought (Q)/ to the end of it
(R)/ of the value of time (S)."
202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 2/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

(A) PSRQ

(B) QPSR

(C) RQPS

(D) QSPR

From stations M and N, two trains start moving towards each other at speed
125 km/h and 75 km/h respectively. When does the two trains meet each
other?

02- (A) 190 km


Question
101 12- 11
Withdrawn
2020 (B) 200 km

(C) 145 km

(D) 225 km

The average of three consecutive odd numbers is 12 more than one third of
the first of these numbers. What is the last of the three numbers?

(A) 19
02-
101 12- 12 (A)
(B) 16
2020
(C) 15

(D) 17

A, B and C can do a piece of work in 20, 30 and 60 days respectively. In


how many days can A do the work if he is assisted by B and C on every
third day?

02- (A) 12 days


101 12- 13 (B)
2020 (B) 15 days

(C) 16 days

(D) 18 days

A vendor bought toffees at 6 for a rupee. How many for a rupee must he sell
to gain 20%?

(A) 3
02-
101 12- 14 (C)
(B) 4
2020
(C) 5

(D) 6

101 02- 15 The ratio of length and breadth of rectangle is 5:2 respectively. The (C)
12- respective ratio of its perimeter and area is 1:3 (irrespective of the unit).
2020 What is the length of the rectangle?
202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 3/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

(A) 27 units

(B) 32 units

(C) 21 units

(D) 18 units

"The prevention of accidents makes it necessary not only that safety devices
be used to guard exposed machinery but also that mechanics be instructed in
safety rules which they must follow for their own protection, and that
lighting in the plant be adequate."

The passage best supports the statement that industrial accidents –


02-
101 12- 16 (D)
(A) are always avoidable
2020
(B) may be due to ignorance

(C) cannot be entirely overcome

(D) can be eliminated with the help of safety rules

In the following question, four words are given. Which of them will come
last if all of them are arranged alphabetically as in a dictionary?

(A) Asbestos
02-
101 12- 17 (D)
(B) Assistant
2020
(C) Assessment

(D) Asterisk

Deepak is brother of Ravi. Rekha is sister of Atul. Ravi is son of Rekha.


How is Deepak related to Rekha?

(A) Brother
02-
101 12- 18 (B)
(B) Son
2020
(C) Father

(D) Nephew

From the given alternatives select the word which cannot be formed using
the letters of the given word.

SPECIFICATION
02-
(A) FAINTING
101 12- 19 (A)
2020
(B) PACIFIC

(C) FACTION

(D) TONIC

202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 4/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

101 02- 20 Two motorcyclists P and Q start from the same point. P rides 11 km West, (A)
12- then turns South and rides 16 km, then turns to his right and rides 14 km. Q
2020 rides 30 km South then turns to his right and rides 25km, where is Q with
respect to P now?

(A) 14 km South

(B) 44 km South

(C) 44 km North

(D) 14 km North

If I can prove who the sender of a message is, which of the following
services does my system provide?

(A) Availability
02-
101 12- 21 (D)
(B) Confidentiality
2020
(C) Integrity

(D) Non-repudiation

The process of extracting previously unknown valid and actionable


information from large data to make crucial business and strategic decisions
is called

02- (A) Data Management


101 12- 22 (C)
2020 (B) Database

(C) Data Mining

(D) Meta Data

Which of the following is NOT an ERP?

(A) SAP
02-
101 12- 23 (B) JD Edwards (C)
2020
(C) Sybase

(D) PeopleSoft

What is the range of bluetooth radio wave information transmission system?

(A) 30 feet
02-
101 12- 24 (B) 30 yards (A)
2020
(C) 30 miles

(D) 30 meters

101 02- 25 Which command is used to remove a table from the database in SQL? (D)
202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 5/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

12-
2020 (A) Delete table

(B) Erase table

(C) Unattach table

(D) Drop table

Which of the following correctly lists computer memory types from highest
to lowest speed?

(A) Secondary Storage; Main Memory (RAM); Cache Memory; CPU


Registers
02-
(B) CPU Registers; Cache Memory; Secondary Storage; Main Memory
101 12- 26 (C)
(RAM)
2020
(C) CPU Registers; Cache Memory; Main Memory (RAM); Secondary
Storage

(D) Cache Memory; CPU Registers; Main Memory (RAM); Secondary


Storage

Representation of data structure in memory is known as

(A) Recursive
02-
101 12- 27 (B) Abstract data type (B)
2020
(C) Storage structure

(D) File structure

Which type of phishing is related to file sharing sites like Dropbox or


Google drive?

(A) Spear phishing


02-
101 12- 28 (B)
(B) Shared document phishing
2020
(C) Pharming

(D) Whaling

In a public key encryption system, if A encrypts a message using his private


key and sends it to B,

(A) Even if B knows who sent the message it cannot be decrypted


02-
101 12- 29 (C)
(B) It cannot be decrypted at all as no one knows A's private key
2020
(C) If B knows it is from A he can decrypt it using A's public key

(D) A should send the public key with the message

101 02- 30 A packet of information that travels between a browser and web service is (D)
12- called
202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 6/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

2020
(A) Malware

(B) Spyware

(C) Adware

(D) Cookie

Technology which is NOT related to ERP is

(A) Business Process Re-engineering


02-
101 12- 31 (B) Data Warehousing (D)
2020
(C) Data Mining

(D) Manufacturing Resource Planning

What is data?

(A) Raw and unorganised facts or figures


02-
101 12- 32 (B) Information (A)
2020
(C) Organised facts and figures

(D) All of the options

_____________is a type of malicious software designed to block access to a


computer system until a sum of money is paid.

(A) Ransomware
02-
101 12- 33 (A)
(B) Cryptojacking
2020
(C) Code red

(D) Fleeceware

Which editor is used by the UNIX system to edit files?

(A) nt
02-
101 12- 34 (B) notepad (D)
2020
(C) wrd

(D) vi

101 02- 35 What is the main programming language code developed by Eclipse? (B)
12-
2020 (A) C

(B) JAVA

(C) C++

202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 7/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

(D) VB

Which one of the following offers CPUs as integrated memory or peripheral


interfaces?

(A) Microcontroller
02-
101 12- 36 (A)
(B) Microprocessor
2020
(C) Embedded system

(D) Memory system

Which of the statements are not true to classify VPN systems?

(A) Protocols used for tunnelling the traffic


02-
101 12- 37 (B) Whether VPNs are providing site-to-site or remote access connection (C)
2020
(C) Securing the network from bots and malwares

(D) Levels of security provided for sending and receiving data privately

What does RPA stand for ?

(A) Robotic Procedure Automation


02-
101 12- 38 (B) Robotic Process Automation (B)
2020
(C) Robotic Plan Automation

(D) Robotic Practical Automation

Which of the following is the port number for SMTP service?

(A) 29
02-
101 12- 39 (B) 27 (C)
2020
(C) 25

(D) 23

A firewall protects which of the following attacks?

(A) Phishing
02-
101 12- 40 (B) Dumpster diving (C)
2020
(C) Denial of Service (DoS)

(D) Shoulder surfing

101 02- 41 VLOOKUP function in MS Excel is a/an (C)


12-
2020 (A) Math and Financial function
202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 8/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

(B) Logical function

(C) Index Match function

(D) Date and Time function

How is memory accessed in RISC architecture?

(A) opcode instruction


02-
101 12- 42 (B) load and store instruction (B)
2020
(C) memory instruction

(D) bus instruction

Which switching technology reduces the size of a broadcast domain?

(A) ISL
02-
101 12- 43 (B) 802.1Q (C)
2020
(C) VLAN

(D) STP

Point out the correct statement.

(A) The use of the word “cloud” makes reference to the two essential
concepts
02-
101 12- 44 (B)
(B) Cloud computing abstracts systems by pooling and sharing resources
2020
(C) Cloud computing is nothing more than the Internet

(D) All of the options

_______is a database using in-memory technology

(A) IBM DB2


02-
101 12- 45 (B) HANA (B)
2020
(C) MaxDB

(D) SAP Sybase

101 02- 46 ________ is an attack technique occurs when excess data gets written to a (C)
12- memory block.
2020
(A) Over buffering

(B) Buffering

(C) Buffer overflow

(D) Memory full


202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 9/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

________________ is an ethical hacking technique used for determining


what operating system (OS) is running on a remote computer.

(A) Footprinting
02-
101 12- 47 (D)
(B) Cyber-printing
2020
(C) OS penetration testing

(D) OS fingerprinting

Which of the following feature allows certain hardware subsystems to


access main system memory independent of the central processing unit

(A) Polling
02-
101 12- 48 (D)
(B) Programmed IO
2020
(C) Direct cache mapping

(D) Direct Memory Access

The famous encryption specification AES (Advanced Encryption Standard)


was developed by

(A) National Institute of Standards and Technology


02-
101 12- 49 (A)
(B) HP
2020
(C) IBM

(D) IEEE

The IP address of a host is 231.1.2.3.

Which of the following is correct?

02- (A) The host is 1.2.3


101 12- 50 (B)
2020 (B) This is a class D IP address

(C) The net is 231

(D) All of the options

In object oriented principles, encapsulation helps in

(A) Information hiding


02-
101 12- 51 (B) Low coupling (D)
2020
(C) High cohesion

(D) All of the options

101 02- 52 The number of binary trees with 3 nodes which when traversed in post order (C)
202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 10/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

12- gives the sequence X,Y,Z is


2020
(A) 3

(B) 4

(C) 5

(D) 6

____________ requires that a foreign key must have a matching primary


key or it must be null.

(A) Entity constraint


02-
101 12- 53 (B)
(B) Referential integrity constraint
2020
(C) Both referential integrity and entity constraints

(D) None of the options

In the software applications development, which includes modifications and


updations done in order to correct or fix the problems, that are either
discovered by user or concluded by user error reports?

02- (A) Adaptive maintenance


101 12- 54 (B)
2020 (B) Corrective maintenance

(C) Perfective maintenance

(D) Preventive maintenance

In software engineering development cycle, the state transition diagram is


used

(A) To indicate the system reactions to external events


02-
101 12- 55 (A)
(B) To depict the functions that transform the data flow
2020
(C) To show the relationships among data objects

(D) To show how data is transformed by system

In computer networks, the technique of temporarily delaying outgoing


acknowledgements so that they can be hooked onto the next outgoing data
frame is known as

02- (A) Bit stuffing


101 12- 56 (C)
2020 (B) Pipelining

(C) Piggy backing

(D) None of the options

101 02- 57 The hexadecimal representation of the decimal value 2020 is (B)
12-
202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 11/12
12/10/2020 202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw

2020 (A) 7F8

(B) 7E4

(C) 7D2

(D) 898

02-
101 12- 58 (A)
2020

(A) (5,2), (7,2) and (9,5)

(B) (3,4) and (6,4)

(C) (5,2) and (7,2)

(D) (3,4), (4,3) and (6,4)

Which of the following statements is FALSE ?

(A) An ambiguous grammar can never be LR(k) for any k


02-
101 12- 59 (B) An LL(1) parser is a top-down parser (D)
2020
(C) LALR is more powerful than SLR

(D) An unambiguous grammar has same leftmost and rightmost derivation

In an IPv4 datagram, which of the following fields is not related to


fragmentation?

(A) Type of service


02-
101 12- 60 (A)
(B) Fragment offset
2020
(C) Flags

(D) Identification

202.191.132.32/postExam/qp_check_dashboard.php?exam=Y3NsZGVjMDIyMDIw 12/12

You might also like