Technical Officer
Technical Officer
अनुदेश (INSTRUCTIONS)
1. प्रश्न पत्र केवल कंप्यूटर स्रीन पर प्रदगशित ककया जाएिा।
The Question Paper will be displayed only on the Computer Screen.
2. 100 अंकों के 100 बहुववकल्पीय प्रश्न होंिे।
There shall be 100 Multiple Choice Based Questions of 100 marks.
3. प्रत्येक बहुववकल्पीय प्रश्न में चार प्रगतकरयाएँ (ववकल्प) शागमल हैं । आप उस उत्तर का चयन करें िे जजसे
आप उत्तर पुजस्तका (ओ एम आर) पर अंककत करना चाहते हैं । ककसी भी जस्थगत में, प्रत्येक प्रश्न के गलए
केवल एक उत्तर चुनें।
Each Multiple Choice Based Questions Question comprises four responses (options).
You will select the response which you want to mark on the Answer Sheet (OMR). In any
case, choose ONLY ONE response for each question.
4. आपको अपने सभी बहुववकल्पीय प्रश्न के उत्तरों को उपलब्ि कराई िई उत्तर पुजस्तका (ओ एम आर) पर
ही अंककत करना होिा।
You must mark all your responses for Multiple Choice Based Questions only on the
separate Answer Sheet (OMR) provided.
5. सभी बहुववकल्पीय प्रश्नों के अंक समान हैं ।
All Multiple Choice Based Questions carry equal marks.
6. इससे पहले कक आप उत्तर पुजस्तका (ओ एम आर) में ववगभन्न प्रश्नों के उत्तर के गलए आिे बढें , आपको
उत्तर पुजस्तका (ओ एम आर) में वववरण भरने होंिे।
Before you proceed to answer the various questions in the answer sheet (OMR), you
must fill in the details in the answer sheet (OMR).
7. उत्तर पुजस्तका में अपने सभी उत्तर भरने के बाद और परीक्षा समाप्त होने पर, आपको उत्तर पुजस्तका
(ओएमआर) परीक्षक को सौंपनी होिी।
After you have completed filling in all your responses on the Answer Sheet and on
conclusion of the examination, you must handover the Answer Sheet (OMR) to the
invigilator.
8. िलत उत्तर के गलए कोई नकारात्मक अंकन नहीं है ।
There is no negative marking for wrong answer.
___________________________________________________________________
Page 1 of 25
TECHNICAL OFFICER
Q1: Out of 100 pens sold on Thursday, 30% are blue ink pen. Out of remaining 30% are red ink pen
and remaining are black in pen. Find total number of blue and black ink pen sold on Thursday?
(A) 82
(B) 49
(C) 79
(D) 65
Q 2: In a box there are 12 blue ball, X red balls & 30 green balls. Probability of choosing one red
ball from the given box is 1/3. Then find the sum of red and blue balls in the box?
(A) 20
(B) 52
(C) 25
(D) 33
Q 3: Two types of ornaments are prepared by using gold and copper in two different proportions.
In first ornaments, 6 gram gold is mixed with 4 gram copper and in second ornament 1 gram gold
is mixed with 1 gram copper. If total quantity of gold and copper is 18 gram and 14 gram
respectively then how many ornaments are prepared of second type?
(A) 6
(B) 4
(C) 7
(D) 10
Q 4: Length of train A is 800 meters and length of train B is ‘x’ meters more than train A. If speed
of both train A & B is equal and they cross a pole in 32 sec and 40 secs respectively, then in what
time train ‘B’ will cross 400 m long platform.
(A) 56 sec
(B) 35 sec
(C) 62 sec
(D) 71 sec
Reasoning
Read the following information carefully to answer the questions 5 and 6 given below.
Fourteen persons i.e. A, B, C, D, E, F, G, M, N, O, P, Q, R and S are sitting in two parallel rows such
that A, B, C, D, E, G and F sits in row 1 faces towards south direction and M, N, O, P, Q, R and S
sits in the row 2 such that all are facing north direction. Person sitting in the row 1 faces the person
sitting in row 2. A sit third to the right of B. Either B or A sits at the end of the row. N sits third to the
right of O. Neither N nor O Faces A and B. The one who faces C sits third to the right of M. None of
the immediate neighbour B Faces O. C sits third to the left of F. O does not face F. One of the
immediate neighbour of F Faces Q, who does not sit at the end of the row. D is not the immediate
neighbour of C. G sits on the left of E but not on the immediate left. P does not face G and C. S
Page 2 of 25
does not face C. R and S are immediate neighbours. E does not sit at the end of the row. D does
not face P.
(A) D
(B) A
(C) F
(D) G
(A) Two
(C) Three
(D) One
Q 7. There are nine members i.e., H, R, D, W, K, T, F, X and A live in a family. F is mother of R who
is the only son of X. H is sister-in-law of A who is mother of both K and T. H is married to D who is
parent of W. K is only grandson of X. Neither W nor X has any sibling. W is the niece of R. How is F
related to T?
(A) Mother
(B) Aunt
(C) Daughter-in-law
(D) Grandmother
Q 8. More than 10 persons were sitting in a circular row facing the centre. B is 3rd to the left of C.
Two person are sitting between D and B. A sits immediate right of E. One person is sitting between
C and E. Less than two person are sitting between D and A. A does not sit second to the right of
B. How many persons are sitting in between D and C?
(A) 4
(B) 6
(C) 7
(D) 8
Q 9. Which of the following words has the meaning which is SIMILAR to the meaning ‘discordant’?
(A) Ugly
(B) Concur
(C) Accord
(D) Clashing
Page 3 of 25
Q10. Select the phrase/connector from the given three options which can be used to form a single
sentence from the two sentences given below, implying the same meaning as expressed in the
statement sentences.
RBI is concerned about the risk of investing in mutual funds. RBI is likely to ask banks to reduce
their investments in mutual funds.
Q11. In this question, out of four alternatives, choose the one which is opposite in the meaning
of the given word.
Fulmination
(A) obloquy
(B) denunciation
(C) compliment
(D) diatribe
Q12. Colours bounced around in her head. They mixed and threaded themselves together. Even
colours that had no business being together. They were all one, yet distinctly separate at the
same time. Her mind was forming ___________________________vision on her head.
(A) delusional
(B) transfusion
(C) kaleidoscopic
(D) emmetropic
Q 13. Swapnil Kusale recently won a bronze medal in which sports event at Paris Olympics 2024?
(A) Shooting
(B) Boxing
(C) Wrestling
(D) Badminton
Q14. Recently, who achieved India’s first rowing quota for Paris Olympics?
Q16. Which Indian has won the 2023 Ramon Magsaysay award?
Q17. Which of the following memory allocation schemes does not suffer from external
fragmentation?
(A) Segmentation
(B) Paging
Q18. In MS Word, which feature allows you to create a consistent layout for documents that share
similar formatting and structure?
(B) Template
(C) Macro
Q 20. What is the primary advantage of heuristic-based antivirus detection over signature-based
detection?
Page 5 of 25
Q 21. What will be the output of the following C code?
#include <stdio.h>
*(p + i) += i;
int main() {
func(arr, n);
return 0;
(A) 1 2 3 4 5
(B) 2 4 6 8 10
(C) 1 3 5 7 9
(D) 1 2 3 4 5 6
#include <stdio.h>
#define MAX(a, b) ((a) > (b) ? (a) : (b))
int main() {
int x = 5;
int y = 10;
return 0;
(A) 6 11 5
(B) 6 11 10
(C) 5 10 11
(D) 6 12 11
Page 6 of 25
Q 23. What will be the output of the following C code?
#include <stdio.h>
*a = *a + *b;
*b = *a - *b;
*a = *a - *b;
}
int main() {
func(&x, &y);
return 0;
(A) 10 20
(B) 20 10
(C) 30 -10
(D) -10 30
#include <stdio.h>
*p = 20;
p = NULL;
int main() {
int a = 10;
change(ptr);
printf("%d\n", *ptr);
return 0;
(A) NULL
(B) 10
(C) 20
Page 7 of 25
Q 25. What will be the output of the following C code?
#include <stdio.h>
#define MAX 10
void func() {
#undef MAX
#define MAX 20
int main() {
(A) 10 20 10
(B) 10 20 20
(C) 20 10 20
(D) 20 20 20
if (str == str2) {
System.out.println("str == str2");
} else {
System.out.println("str != str2");
if (str.equals(str2)) {
} else {
Page 8 of 25
}
A) str == str2
B) str != str2
C) str == str2
D) str != str2
interface Animal {
System.out.println("Some sound");
System.out.println("Bark");
dog.sound();
(B) Bark
Page 9 of 25
Q 28. What will be the output of the following Java code?
import java.util.*;
System.out.println(list);
try {
int data = 50 / 0;
} catch (ArithmeticException e) {
} finally {
try {
methodA();
} catch (Exception e) {
System.out.println("Caught in main");
try {
} catch (Exception e) {
System.out.println("Caught in methodA");
throw e;
} finally {
System.out.println("Finally in methodA");
A) Caught in methodA
Finally in methodA
Caught in main
B) Caught in methodA
Finally in methodA
C) Finally in methodA
Caught in methodA
Caught in main
D) Finally in methodA
Caught in main
Page 11 of 25
Q 31. Given the infix expression a + b * (c / d) + (e * f), what is its equivalent postfix notation?
(A) a b c d / * e f * + +
(B) a b c d / * + e f * +
(C) a b c d / * e f * + \
(D) a b c d / e f * * + +
Q 32. In a multi-level linked list where each node has a next pointer and a down pointer to another
linked list, what is the worst-case time complexity for finding a specific element if the height of
the list is ‘h’ and the average width is ‘w’?
(A) O(h⋅w)
(B) O(h+w)
(C) O(h⋅logw)
(D) O(h⋅logh)
Q 33. In a queue with a maximum size of 50 elements, if there are 30 elements enqueued and the
queue operates in a circular manner with the index starting from 0, what is the index of the rear
element if the front index is at position 10 and the rear is positioned 15 elements from the front?
(A) 24
(B) 25
(C) 26
(D) 27
Q 34. A binary search tree has 100 nodes. What is the minimum possible height of the tree
(considering the height of a tree with a single node is 0)?
(A) 6
(B) 7
(C) 8
(D) 9
Q 35. In a binary search tree, the number of nodes in the left subtree of the root is m, and the
number of nodes in the right subtree is n. What is the maximum height of the tree?
(A) max(m,n)
(B) m+n
(C) log2(m+n)
(D) 1+max(m,n)
Page 12 of 25
Q 36. Given a graph G with 12 vertices and 21 edges, the graph is guaranteed to be connected if:
Q 37. Consider two processors P1 and P2 executing the same instruction set. Assume that under
identical conditions, for the same input, a program running on P2 takes 30% less time but incurs
25% more CPI (clock cycles per instruction) as compared to the program running on P1. If the
clock frequency of P1 is 1GHz, then the clock frequency of P2 (in GHz) is _________.
Q 38. In a deadlock detection algorithm, what is the time complexity to check for the presence of
a cycle in the resource allocation graph, where V is the number of vertices and E is the number of
edges?
(A) O(V)
(B) O(V + E)
(C) O(V2)
(D) O(VE)
Q 39. A system uses a two-level page table where the first-level page table contains 1024 entries
and each second-level page table also contains 1024 entries. If the page size is 4 KB, what is the
size of the virtual address space?
(A) 4 GB
(B) 16 GB
(C) 1 GB
(D) 64 GB
Q 40. Which of the following algorithms is generally considered to have the worst page fault rate?
Q 41. In a Unix-like file system, what is the primary role of the superblock?
(C) To keep information about the file system structure and metadata
Page 13 of 25
Q 42. In a system where processes use message passing for IPC, what is the primary difference
between synchronous and asynchronous message passing?
(A) Synchronous message passing requires processes to be in the same network, while
asynchronous does not.
(B) Synchronous message passing blocks the sender until the message is received, while
asynchronous does not.
(C) Asynchronous message passing blocks the sender until the message is received, while
synchronous does not.
Q 43. In a file system with an inode-based directory structure, what information is typically stored
in an inode?
Q 44. In a file system that uses a file allocation table (FAT) directory structure, how is the directory
entry for a file typically identified?
Q 45. Which of the following file system types is not typically supported in UNIX?
(A) ext4
(B) XFS
(C) NTFS
(D) ZFS
Q 46. If a file system supports 512-byte blocks and a file is 600 bytes in size, how many blocks are
required to store the file, and what will be the total amount of slack space?
Q 47. In a memory system with a 2-to-4 address decoder, what is the maximum number of
addressable memory units if each unit is 1 KB?
(A) 4 KB
(B) 8 KB
(C) 16 KB
(D) 32 KB
Page 14 of 25
Q 48. In the context of interrupts, what is the main difference between maskable and non-
maskable interrupts?
(A) Maskable interrupts can be disabled by the processor, while non-maskable interrupts cannot
be disabled.
(B) Maskable interrupts are always higher priority than non-maskable interrupts.
(C) Non-maskable interrupts are generated by software, while maskable interrupts are hardware-
generated.
(D) Maskable interrupts are used for system initialization, while non-maskable interrupts are
used for error handling.
Q 49. In which DMA mode does the DMA controller transfer data in a burst, and then return control
to the CPU until the next transfer?
Q 50. In which category of memory devices does EEPROM (Electrically Erasable Programmable
Read-Only Memory) fall?
Name VARCHAR(50),
DeptID INT
);
DeptName VARCHAR(50)
);
FROM Employees e
Page 15 of 25
WHERE d.DeptName IS NOT NULL;
(A) Lists all employees and their department names, including those without a department.
(B) Lists only employees who have a department and their corresponding department names.
(C) Lists all department names and their employees, including those with no employees.
(D) Lists all department names and their employees, including departments with no employees.
SaleID INT,
SaleDate DATE,
Amount DECIMAL(10, 2)
);
FROM Sales
GROUP BY SaleDate
SELECT AVG(SUM(Amount))
FROM Sales
GROUP BY SaleDate
);
(A) Lists each date where the total sales amount is greater than the average amount of all dates.
(B) Lists each date where the number of sales is greater than the average number of sales across
all dates.
(C) Lists the dates where the average sale amount is greater than the total sales amount for that
date.
(D) Lists each date where the total sales amount is less than the average amount of all dates.
Q 53. Given two relations, A and B, where A has attributes (A1, A2) and B has attributes (B1, B2),
which relational algebra operation will yield a relation that includes tuples where A1 = B1 and A2
= B2?
A) A ∪ B
B) A - B
C) A ⨝ B
D) A × B
Page 16 of 25
Q 54. Given an E-R diagram with an entity ‘Employee’ and a relationship ‘WorksFor’ connecting
‘Employee’ to ‘Department’. The ‘WorksFor’ relationship has attributes ‘StartDate’ and ‘EndDate’.
Which of the following statements correctly represents the E-R model for this scenario?
A) ‘WorksFor’ is a weak entity, and ‘StartDate’ and ‘EndDate’ are attributes of ‘Employee’.
C) ‘Employee’ is a weak entity, and ‘WorksFor’ has ‘StartDate’ and ‘EndDate’ as attributes.
Q 55. A FAT (file allocation table) based file system is being used and the total overhead of each
entry in the FAT is 4 bytes in size. Given a 100 x 108 bytes disk on which the file system is stored
and data block size is 103 bytes, the maximum size of a file that can be stored on this disk in units
of 108 bytes is ____________.
(C) 95 to 98.5
Q 56. In a B-tree of order 5, if there are 200 keys in the tree and each node is filled to its maximum
capacity, how many nodes are required to store these keys?
(A) 40
(B) 25
(C) 60
(D) 50
Q 58. Which of the following bootloaders is commonly used for managing dual-boot
configurations on Linux systems?
(A) GRUB
(B) NTLDR
(C) LILO
(D) MBR
Page 17 of 25
Q 59. Why is it important to reserve space for a swap partition in a Linux installation?
Q 61. In an HTTP request, which status code would be relevant if an email server responds with
an error indicating that the user's mailbox is full, and the action cannot be completed?
Q 62. In a Class B IP network, what is the maximum number of hosts that can be accommodated
in a subnet with a subnet mask of 255.255.252.0?
(A) 510
(B) 1022
(C) 2046
(D) 4094
Q 63. Encryption, and compression are some of the duties of the …………………..in the OSI model
A) IEEE 80.2.11
B) IEEE 802.11 g
C) IEEE 802.11 b
D) IEEE 802.11 i
Page 18 of 25
Q 65. Which of the following is true about the differences between TCP and UDP in terms of their
layer-specific functionalities?
(A) TCP provides error recovery and flow control, while UDP does not guarantee delivery or order.
(B) UDP provides error recovery and flow control, while TCP does not guarantee delivery or order.
(C) TCP and UDP both guarantee data integrity and delivery order but use different methods for
encryption.
(D) TCP operates at the Network Layer, while UDP operates at the Transport Layer.
Q 66. The computation of the shortest path in OSPF is usually done by ____________
Q 67. In Wi Fi, Access Point has following layer of 4 layers of TCO/IP protocol stack( Layer 1: Link
Layer (Physical Layer + Data Link Layer), Layer 2: Network Layer, Layer 3: Transport Layer, Layer
4: Application?
(C) Layer 1
Q 68. You need to configure a server that is on the subnet 192.168.19.24/29. The router has the
first available host address. Which of the following should you assign to the server?
Q 69. A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the figure. Ping attempts between the hosts are unsuccessful. What can
be done to provide connectivity between the hosts?
(A) 1 only
(B) 2 only
(A) Star
(B) Ring
(C) Bus
Q 71. In RSA encryption, if the public key e=7 and n=33, what is the ciphertext when encrypting
the plaintext message M=4?
(A) 16
(B) 21
(C) 31
(D) 29
Q 72. When a Certificate Authority (CA) signs a digital certificate, what cryptographic operation is
performed?
(A) The CA encrypts the certificate with the user's public key.
(B) The CA hashes the certificate and encrypts the hash with its private key.
(C) The CA decrypts the certificate with its public key.
(D) The CA encrypts the certificate with the user's private key.
Q 73. In the context of firewalls, what does the term "demilitarized zone (DMZ)" refer to?
D) A subnet that is accessible from both the internal network and the internet
(A) To serve as a random value used to ensure that old communications cannot be reused
Page 20 of 25
Q 75. In a certificate revocation list (CRL), what information is typically included?
(A) Information about certificates that have been revoked before their expiration date
Q 76. In a multi-threaded server, what is the primary advantage of using thread pools instead of
creating a new thread for each client request?
Q 77. What is the main difference between Layer 2 and Layer 3 switches in terms of packet
forwarding?
(A) Layer 2 switches use IP addresses to forward packets, while Layer 3 switches use MAC
addresses.
(B) Layer 3 switches use IP addresses to forward packets, while Layer 2 switches use MAC
addresses.
(C) Both Layer 2 and Layer 3 switches use IP addresses for forwarding.
(D) Both Layer 2 and Layer 3 switches use MAC addresses for forwarding.
Q 78. In a 3-tier network architecture, which layer is responsible for aggregating data from
multiple access layer switches and routing it to the core layer?
Q 79. In a 2-tier network topology, which component typically connects end devices to the
network and provides access to the rest of the network?
Q 80. In a SOHO environment, which type of cloud service model would most likely be used for
hosting a website and handling email services?
(A) Cat 5e
(B) Cat 6
(C) Cat 6a
(D) Cat 7
Q 82. In fiber optics, what does the term "modal dispersion" refer to?
(B) The delay spread caused by different light paths in a multimode fiber
Q 83. Which PoE standard introduces support for 4-pair power delivery, allowing for higher power
levels?
Q 84. Which Ethernet standard primarily utilizes point-to-point links and is designed for high-
speed communication in data centers and enterprise networks?
(A) 10BASE-T
(B) 100BASE-TX
(C) 1000BASE-SX
(D) 10GBASE-LR
Q 85. Which of the following principles is most crucial for ensuring that a website is accessible to
users with disabilities?
Q 86. In the context of database connectivity, what is the primary purpose of an Object-Relational
Mapping (ORM) tool?
(A) To map database tables to application objects and simplify database interactions
Page 22 of 25
Q 87. In HTML5, which attribute is used to specify that a form should not be submitted if it
contains invalid input?
(A) required
(B) novalidate
(C) validate
(D) formnovalidate
Q 88. Which CSS property is used to control the spacing between lines of text?
(A) line-height
(B) letter-spacing
(C) word-spacing
(D) text-indent
Q 89. What will be the output of the following JavaScript code snippet?
(A) true
(B) undefined
(C) false
(D) NaN
Q 91. In a Management Information System, what is typically the role of a Data Warehouse?
Q 93. Consider a software program that is artificially seeded with 200 faults. While testing this
program, 300 faults are detected, out of which 125 faults are from those artificially seeded faults.
Assuming that both real and seeded faults are of the same nature and have the same distribution,
what is the estimated number of undetected real faults?
(A) 50
(B) 75
(C) 100
(D) 105
Page 23 of 25
Q 94. In the context of process change management, which tool is used to analyse the driving and
restraining forces that affect a change initiative?
Q 95. Consider a software project with the following information domain characteristics:
(A) 746
(B) 752
(C) 760
(D) 762
Q 96. What is the main difference between a formal design review and an informal design review?
(A) Formal reviews are typically unstructured, while informal reviews follow a strict agenda.
(B) Formal reviews involve detailed documentation and follow a structured process, whereas
informal reviews are more flexible and less documented.
(C) Formal reviews are conducted by junior developers, while informal reviews are done by senior
developers.
(D) Formal reviews focus on code quality, while informal reviews focus on design quality.
Q 97. Which section of the Software Design Document (SDD) typically includes detailed
descriptions of data structures and their relationships?
Q 98. Which design pattern is characterized by providing a surrogate or placeholder for another
object to control access to it?
(A) Proxy
(B) Adapter
(C) Composite
(D) Flyweight
Page 24 of 25
Q 99. What is the term used for a technique that involves customizing ERP software to fit specific
business needs and processes?
(A) Configuration
(B) Integration
(C) Personalization
(D) Customization
Q 100. Which ERP system benefit is most directly associated with streamlining operational
efficiency?
Page 25 of 25