KVS TGT and PRT Preliminary Examination Model Paper

96
KVS TGT and PRT Preliminary Examination Model Paper 2010 Question Paper containing 110 Questions of General Awareness, Current Affairs, General Science & Indian Constitution, Reasoning, Quantitative Aptitude and Teaching Aptitude etc. enjoy reading 1. Among the following Indian cities, which one is located most southward? a. Hyderabad b. Vishakhapatnam c. Panaji d. Belgaum 2. Match List- I (National Highway) with List-II (Connected Cities) and select the correct answer using the code given below the Lists: List-I List-II (National Highway) (Connected Cities) A. NH 3 1. Delhi – Lucknow B. NH 4 2. Agra- Bikaner C. NH 11 3. Agra-Mumbai D. NH 24 4. Chennai-Thane (Mumbai) Code: A B C D (1) 3 1 2 4 (2) 2 4 3 1 (3) 3 4 2 1 (4) 2 1 3 4 3. Match List- I (Defense Institute) with List- II (City) and select the correct answer using the code given below the Lists: List-I List-II (Defense Institute) (City) A. College of Defense Management 1. Pachmarhi 1 document.docx

description

KVS TGT and PRT Preliminary Examination Model Paper

Transcript of KVS TGT and PRT Preliminary Examination Model Paper

Page 1: KVS TGT and PRT Preliminary Examination Model Paper

KVS TGT and PRT Preliminary Examination Model Paper   2010 Question Paper containing  110 Questions  of  General Awareness, Current Affairs, General Science & Indian Constitution, Reasoning, Quantitative Aptitude and Teaching Aptitude etc. enjoy reading

1. Among the following Indian cities, which one is located most southward?a. Hyderabad b. Vishakhapatnamc. Panajid. Belgaum

2. Match List- I (National Highway) with List-II (Connected Cities) and select the correct answer using the code given below the Lists:List-I List-II(National Highway) (Connected Cities)A. NH 3                                               1. Delhi –LucknowB. NH 4                                               2. Agra-BikanerC. NH 11                                            3. Agra-MumbaiD. NH 24                                            4. Chennai-Thane (Mumbai)

Code: A B C D(1) 3 1 2 4(2) 2 4 3 1(3) 3 4 2 1(4) 2 1 3 4

3. Match List- I (Defense Institute) with List- II (City) and select the correct answer using the code given below the Lists:List-I                                          List-II(Defense Institute)                                        (City)A. College of Defense Management          1. PachmarhiB. Army Air Defense College              2. BangaloreC. Army Supply Corps (ASC) Centre and College    3.

SecunderabadD. Army Education Corps (AEC) Training College and Centre 4. Gopalpur

Code: A B C D(1) 3 4 2 1(2) 1 2 4 3(3) 3 2 4 1(4) 1 4 2 3

4. Which of the following are Defense Public Sector Undertakings?1. Goa Shipyard Limited2. The Bharat Dynamics Limited3. Mishra Dhatu Nigam Limited

1 document.docx

Page 2: KVS TGT and PRT Preliminary Examination Model Paper

Select the correct answer using the code given below.(1) 1 and 2(2) 2 and 3(3) l and 3(4) 1, 2 and 3

5. Match List- I (Young Indian Player) with List- II (Game/Sport) and select the correct answer using the code given below the Lists:List-I                                                      List-II(Young Indian Player)                              (Game/Sports)A. Armaan Ebrahim                              1. SquashB. Joshna Chinnappa                                    2. HockeyC. Adrian D’Souza                                         3. Lawn TennisD. Karan Rastogi                                           4. Auto Racing, Swimming

Code: A B C D(1) 2 3 5 1(2) 4 1 2 3(3) 2 1 5 3(4) 4 3 2 1

6. Match List- I (Person) with List- II (Organization) and select the correct answer using the code given below the Lists:List-I                                                               List-II(Person) (Organization)A. Shiv Nadar 1. Satyam ComputersB. Kumaramangalam Birla 2. Tata Consultancy ServicesC. R. Raju 3. Grasim IndustriesD. S. Ramadorai 4. HCL Technologies

Codes:A B C D

(1) 2 3 1 4(2) 4 1 3 2(3) 2 1 3 4(4) 4 3 1 2

7. Which one of the following pairs is not correctly matched?(1) Gol Gumbaz                       : Hyderabad(2) Tomb of Itmad-ud-daula      : Agra(3) Tomb of Sher Shah             : Sasaram(4) Tomb of Rani Rupmati        : Ahmedabad

8. Where is the Baglihar Hydroelectric Project located?(1) Ferozepur District of Punjab(2) Doda District of Jammu and Kashmir

2 document.docx

Page 3: KVS TGT and PRT Preliminary Examination Model Paper

(3) Faridkot District of Punjab(4) Baramulla District of Jammu and Kashmir

(For the next Five Items)ABC Ltd. presently has three Accounts Assistants (A. B and C) and five Accounts Officers (D, E, F, G and H). Its management is planning to-open a new office in another city using 3 Accounts Officers and 2 Accounts Assistants from its present staff. The following guidelines have been established to set up the new office.

1. A and C are constantly finding faults with each other and should not be sent as members of the same team.

2. C and E function well alone but not as a team. They should not be sent as members of the same team:

3. D and G do not enjoy good relations. They should not be sent as members of the same team

4. Since D and F have been competing for a promotion, they should not be sent as members of the same team.

Based upon the above, answer the next five items:

9. If C and F are moved to the new office, what is the number of different teams that can be formed?(1) 1(2) 2(3) 3(4) 4

10. If C is sent to the new office which member of the staff can not go with C?(1) H(2) G(3) F(4) D

11.Under the guidelines developed, which of the following must go to the office?(1) B(2) D(3) E(4) G

12.Under the guidelines developed, which one of the following is the possible number of different teams, which can be sent to the new office?(1) 15(2) 12(3) 8(4) 6

13. If D goes to the new office which of the following is/are correct?1. C cannot go.

3 document.docx

Page 4: KVS TGT and PRT Preliminary Examination Model Paper

2. A cannot go.3. H must also go.

Select the correct answer using the code given below:(1) 1 only(2) 2 only(3) l and 2(4) 1 and 3

14.Consider the following statements1. Megabyte (MB) is exactly equal to 2 20 bytes.2. A byte is a unit of data that is eight binary digits long.3. A bit has a single binary value, either 0 or 1.

Which of the statements given above is are correct?(1) 2 only(2) 3 only(3) 1 and 2(4) 1, 2, and 3

15.Consider the following statements.1. Bluetooth technology uses simulation of a given environment.2. Virtual reality uses short-range wireless connection for connecting mobile phones,

computers with each other.

Which of the statements given above is/are correct?(1) 1 only(2) 2 only(3) Both 1 and 2(4) Neither 1 nor 2

16.Match List -I (Temple/Cathedral) with List-II (Place) and select the correct answer using the code given below the list:List-I                                                        List-II(Temple/Cathedral)                                     (Place)A. Brihadeswara Temple                              1. GuwahatiB. Vishwanatha Temple                                2. ChennaiC. Kamakhya Temple                                   3. ThanjavurD. Santhome Cathedral                                4. Khajuraho

Codes:A B C D

(1) 3 2 1 4(2) 1 4 3 2(3) 3 4 1 2(4) 1 2 3 4

4 document.docx

Page 5: KVS TGT and PRT Preliminary Examination Model Paper

17.Match List -I (Scholar) with List- II (Work) and select the correct answer using the code given below the Lists:List-I                                        List-II(Scholar)                                 (Work)A. Panini                     1. BrihatsamhitaB. Varahamihira                       2. Vedanga JyotishaC. Lagdhacharya                     3. RajatraganiD. Kalhana                               4. Asthadhyayi

Codes:A B C D

(1) 4 1 2 3(2) 3 2 1 4(3) 4 2 1 3(4) 3 1 2 4

18.Match List -I (World Heritage Site) with List- II (State) and select the correct answer using the code given below the Lists:List-I                                                                 List-II(World Heritage Site)                                             (State)A. Manas Wildlife Sanctuary                                    1. BiharB. Mahabodhi Temple Complex                              2. UttranchalC. Group of Monuments, Pattadakal                       3. AssamD. Nandadevi National Park                                    4. Karnataka

Codes:A B C D(1) 2 4 1 3(2) 3 1 4 2(3) 2 1 4 3(4) 3 4 1 2

(For the next THREE items)

In a group of six men and women—A, B, C, D, and F there are two housewives who have not taken up a any job one lecturer, one architect, one accountant and one lawyer. Further,

1. There are two married couples in the group.2. The lawyer is married to D who is a housewife and she has not taken up any job3. No lady in the group is either an accountant or an architect4. C who is an accountant is married to F who is a lecturer5. A is married to D and E is not one of the two non-working housewives.

Based on the above, answer the next THREE items:

19.Which of the following is a married couple?(1) A-B(2) A-F

5 document.docx

Page 6: KVS TGT and PRT Preliminary Examination Model Paper

(3) C-E(4) None of the above.

20.What is E-working as?(1) Lawyer(2) Architect(3) Lecturer(4) Accountant

21.How many members of the group are males?(1) 2(2) 3(3) 4(4) Cannot be determined

22.Consider the following statements:1. Black soils occur mainly in Maharashtra, Western Madhya Pradesh, and Gujarat.2. Alluvial soils are confined mainly to the Northern plains

Which of the statements given above is/are correct?(1) l only(2) 2 only(3) Both l and 2(4) Neither 1 nor 2

23.Consider the following statements:1. India has an installed e1ectrlc power generation’ capacity of more than 1 lakh MW.2. The total hydroelectric power potential of India is estimated around. 1, 50,000MW.

Which of the statements given above is/ are correct?(1) 1 only(2) 2 only(3) Both 1 and 2(4) Neither 1 nor 2

24.Match List –I (Ore) with List-II (Metal) and select the correct answer using the code given below the Lists:

List-I                             List-II(Ore)                            (Metal)A. Magnetite              1. LeadB. Galena                       2. ZincC. Bauxite                 3. IronD. Sphalerite                  4. Aluminum

Codes:A B C D

(1) 3 4 1 2

6 document.docx

Page 7: KVS TGT and PRT Preliminary Examination Model Paper

(2) 2 1 4 3(3) 3 1 4 2(4) 2 4 1 3

25.Who among the following is the first to have taken 600 test cricket wickets?(1) Courtney Walsh(2) Glenn McGrath(3) Shane Warne(4) M. Murlitharan

26.Match List- I (Person) with List-II (Organization) and select the correct answer using the code given below the Lists:List-I List-II (Person) (Organization)A. E. Shreedharan 1. SEBIB. M. Damodaran 2. Atomic Energy CommissionC. A. Kakodkar 3. Nuclear Power Corporation of IndiaD. S. K. Jain 4. Delhi Metro Rail corporation

Code:A B C D

(1) 4 1 2 3(2) 2 3 4 1(3) 4 3 2 1(4) 2 1 4 3

27. 9 equally spaced points are shown in the figure given below.

Consider the following statements:1. The minimum number of straight lines that can be drawn by using a pencil and without

lifting the hand so as to touch all these 9 points is 52. The maximum number of squares that can be formed by joining these points ss 5.

Which of the statements given above is/are correct?(1) 1 only(2) 2 only(3) Both l and 2(4) Neither 1 nor 2

7 document.docx

Page 8: KVS TGT and PRT Preliminary Examination Model Paper

28.Three persons A, B, and C wore shirts of black, blue, and orange colours (not necessarily in that order) and pants of green, yellow arid orange colours (not necessarily in that order). No person wore shirt and pant of the same colour. Further, it is given that1. A did not wear shirt of black colour.2. B did not wear shirt of blue colour.3. C did not wear shirt of orange colour.4. A did not wear pant of green colour.5. B wore pant of orange colour. What were the colours of the pant and shirt worn, by C,

respectively?

(1) Orange and black(2) Green and blue(3) Yellow and blue(4) Yellow and black

29.A cube whose two adjacent faces are colored as cut into 64 identical small cubes. How many of these small cubes are not colored at all?(1) 24(2) 36(3) 48(4) 60

30.Match List -I (Temple) with List- II (Built Under) and select the correct answer using the code given below the Lists:List-I (Temple) List-II (Built Under)A. Badami Cave temples 1. ChalukyasB. Ellora 2. ChandellasC. Khajuraho 3. PallavasD. Mahabalipuram 4. Rashtrakutas

Codes:A  B C D

(1) 2 3 1 4(2) 1 4 2 3(3) 2 4 1 3(4) 1 3 2 4

31.At which one of the following places did Gautama Buddha attain Par nirvana?(1) Gaya(2) Kushinagar(3) Rajgir(4) Shravasti

32.Consider the following statements:1. Nadir Shah invaded India during the rule of the Mughal Emperor Muhammad Shah.2. The Third Battle of Panipat was fought during the reign of Akbar Shah II.

8 document.docx

Page 9: KVS TGT and PRT Preliminary Examination Model Paper

Which of the statements given above is/are correct?(1) 1 only(2) 2 only(3) Both l and 2(4) Neither 1 nor 2

33.Who among the following was a contemporary of the famous poet Amir Khusro?(1) Iitutmish(2) Ala-ud-din Khalji(3) Ibrahim Lodi(4) Akbar

34.Who among the following Delhi Sultans made Agra the capital of his Empire?(1) Iitutmish(2) Balban(3) Feroz Shah Tughluq(4) Sikander Lodi

35.Which one of the following wars was fought earliest?(1) First Anglo-Burmese War(2) First Anglo-Afghan War(3) First Anglo-Maratha War(4) First Anglo-Sikh War

36.S1 = a + b + cS2 = d + e + f.S3 = g + h + i,S4 = a + d + g

S5 = b + e + h,S6 = c + f + iP = (a) ( e) ( i)

If the numerical values of S1, S2, S3, S4, S, S6 and P are known, what is the minimum number of values of the lower case letters that must be given such that values of all the lower case letters become known?(1) 2(2) 3(3) 4(4) 5

37.Seven players A, B, C, D, E, F and G are to be seated such that.(i) B must always occupy the second position(ii) F must always occupy the sixth position(iii) D and E must be seated adjacent to each other

In how many different ways can they be seated?(1) 8(2) 12

9 document.docx

Page 10: KVS TGT and PRT Preliminary Examination Model Paper

(3) 24(4) None of the above

38.There are 24 equally spaced points lying on circumference of a circle. What is the maximum number of equilateral triangles that can be drawn by taking sets of three points and joining the three points of each set?(1) 4(2) 8(3) 6(4) 12

39.A has a few 5 rupee notes only; B has a few 10 rupee notes only while C has a few 20 rupee notes only. Each of them gives two notes to the other two. After doing so, they end up having the same amount of money. Which one of the following combinations of the number of notes possessed by A, B and C initially is not possible?

A               B               C(1) 51 notes   27 notes   15 notes(2) 31 notes   17 notes   10 notes(3) 39 notes   21 notes   12 notes(4) 70 notes   37 notes   20 notes

40. In Indian history, Lord Macaulay is known for his contribution to which one of the following areas?(1) Army(2) Land revenue(3) Railways(4) Education

41.Who is the author of the book—Tryst With Destiny?(1) Jawaharlal Nehru(2) K.P.S. Menon(3) K. M. Munshi(4) S. Gopalan

42.Match List -I with List -II and select the correct answer using the code given below the Lists:List-I List-IIA. Poona Act 1. Subhas Chandra BoseB. Indian Association 2. M. G. RandeC. Poona Sarvajanik Sabha 3. Dr. B. R. AmbedkarD. Forward Block 4. Surendra Nath Banerjee

Codes:A B C D

(1) 2 1 3 4(2) 3 4 2 1(3) 2 4 3 1(4) 3 1 2 4

10 document.docx

Page 11: KVS TGT and PRT Preliminary Examination Model Paper

43.At which one of the following Congress Sessions, did Dadabhai Naoroji announce that the Swaraj was the goal of India’s political efforts?(1) Karachi Session(2) Lahore Session(3) Lucknow Session(4) Calcutta Session

44.Who among the following was not associated with the Indigo Rebellion?(1) Harishchandra Mukherjee(2) Digambar Biswas(3) Dinbandhu Mitra(4) Keshabchahdra Sen

45.Who was the President of the Indian National Congress at the time of partition of India?(1) Rajendra Prasad(2) Jawaharlal Nehru(3) J. B. Kriplani(4) Vallabhbhai Patel

46.Match List- I (Centre of Handicrafts) with List -II (State) and select the correct answer using the code given below the Lists:List-I (Centre of Handicraft)        List-II (State)A. Bankura                                     1. Andhra PradeshB. Gadwal                                      2. BiharC. Madhubani                                3. OrissaD. Phulbani                                    4. West Bengal

Codes:A B C D

(1) 4 2 1 3(2) 3 1 2 4(3) 4 1 2 3(4) 3 2 1 4

47.Consider the following series:A B C D…X Y Z | Y X…..B A? B C D…..YZ |Y X ….C B A |B C…..Y Z….

Which letter occupies the 1000th position in the above series?(1) Y

(2) X(3) C(4) B

48. What is the minimum number of different colours required to paint the figure given above such that no two adjacent regions have the same colour?

11 document.docx

Page 12: KVS TGT and PRT Preliminary Examination Model Paper

(1) 3(2) 4(3) 5(4) 6

49. In how many different ways can 7 identical coins be placed on a chessboard (containing 64 identical squares) so that all of them lie along the same line (Each of the 7 coins is to be placed In a different square)?(1) 49(2) 64(3) 124(4) 148

50.Which one of the following does not share boundaries with Arunachal Pradesh?(1) Assam(2) Nagaland(3) Meghalaya(4) Bhutan

51.Which pne among the following is the largest natural lake?(1) Aral Sea(2) Caspian Sea(3) Lake Victoria(4) Lake Huron

52.Which one among the following regions has the tropical rain forests?(1) Chota Nagpur Plateau(2) Coromandel Coast(3) Malwa region(4) Western Ghats

53.Which one of the following pairs is not correctly matched?(1) Chitrakote Falls : Chhattisgarh(2) Gokak Falls : Karnataka(3) Dhuandhar Falls : Madhya Pradesh.(4) Duduma Falls : Assam

54.Which of the following pairs of countries border Lake Victoria?(1) Zambia and Tanzania(2) Zambia and Botswana(3) Botswana and Mozambique(4) Tanzania and Uganda

12 document.docx

Page 13: KVS TGT and PRT Preliminary Examination Model Paper

55.Which one of the following is the most abundant gas in. the earth’s atmosphere other than nitrogen and oxygen?(1) Argon(2) Carbon dioxide(3) Hydrogen(4) Methane

56.Match list-I (Desert) with List -II (Territory) and select the correct answer with the code given below the Lists:List-I (Desert) List-II (Territory)A. Chihuahuan 1. USAB Kara Kum 2. SudanC. Nubian 3.TurkémenlstanD. Sonoran

Codes:A B C D

(1) 2 3 3 1(2) 1 1 2 3(3) 1 3 2 1(4) 2 1 3 3

57.Five friendsF1, F2, F 3, F 4, and F 5 have Rs. 100 each. F 1 gives Rs. 12 to F 3 who also borrows Rs. 10 from F2 who in turn takes Rs. 15 from F 5 while F 5 gives is. 18 to F 4 and Rs.12 to F 1. F1 borrows Rs. 20 from F 4.What is the amount of money left with F 2?(1) Rs. 120(2) Rs. 122(3) Rs. 105(4) Rs. 97

58.Four-digit numbers are to be formed using the digits 1, 2, 3 and  4, and none of these four digits are repeated in any number. Further,1. 2 and 3 are not to immediately follow each other.2. 1 is not to be immediately followed by 3.3. 4 is not to appear at the last place.4. 1 is not to appear at the first place.

How many different numbers can be formed ?(1) 6(2) 8(3) 9(4) None of the above

59.While writing all the numbers from 700 to 1000. . how many numbers occur in which the first digit is greater than the second digit, and the second digit is greater than the third digit?(1) 61

13 document.docx

Page 14: KVS TGT and PRT Preliminary Examination Model Paper

(2) 64(3) 85(4) None of the above

60. If 2nd and 4th Saturdays, and all the Sundays are taken as holidays for an office, what would be the minimum number of possible working days of any month of any year?(1) 20(2) 21(3) 22(4) 23

61.Which one of the following is surrounded by the belt of volcanoes called the Ring of Fire.(1) Atlantic Ocean(2) Arctic Ocean(3) Mediterranean Sea(4) Pacific Ocean

62.Match List-I (Place of Tourist Interest) with List -II (State) and select the correct answer using the code given below the Lists:

List-I List-II(Place of Tourist Interest) (State)A. Dalhousie 1. Tamil NaduB. Alibagh 2. Himachal PradeshC. Kalimpong 3. MaharashtraD. Ooty 4. West Bengal

5. KarnatakaCodes:

A B C D(1) 4 1 2 3(2) 2 3 4 1(3) 4 3 2 1(4) 2 1 4 5

63.Match List -I (Organization) with List -II (Headquarters) and select the correct answer using the code given below the Lists:List-I List-II(Organization) (Headquarters)A. International Monetary Fund 1. GenevaB. International Labour Organization 2. MontrealC. International Atomic Energy Agency 3. ViennaD. International Civil Aviation Organization 4. Washington D.C.

Codes:A B C D

(1) 4 1 3 2(2) 3 2 4 1(3) 4 2 3 1

14 document.docx

Page 15: KVS TGT and PRT Preliminary Examination Model Paper

(4) 3 1 4 2

64.Match List-I (Tourist Place) with List -II (State) and select the correct answer using the code given below the Lists:List-I List-II(Tourist Place) (State)A. Kalakad 1. KeralaB. Jwalamukhi 2. Himachal PradeshC. Munnar 3. UttranchalD. Valley of Flowers 4. Tamil Nadu

Codes:A B C D

(1) 4 1 2 3(2) 3 2 1 4(3) 4 2 1 3(4) 3 1 2 4

65.Match List -I (Industrial Town) with List- II (State) and select the correct answer with the code given below:List-I List-II(Industrial Town) (State)A. Bhadravati 1. Tamil NaduB, Ratnagiri 2. KarnatakaC. Tirupur 3. ChhattisgarhD. Korba 4. Maharashtra

5.Madhya PradeshCodes:

A B C D(1) 1 4 2 3(2) 2 3 1 5(3) 1 3 2 5(4) 2 4 1 3

66.Which one of the following (Equivalent ranks in the. Indian Army, Indian Navy and Indian Air Force) is not correct?

Army Navy Air force

(1) Brigadier Commodore Air Commodore

(2) Lt Colonel Commander Wing Commander

(3) MajorGeneral RearAdmiral Air ViceMarshal

Rear Admiral Air Vice Marshal

(4) Colonel Lt. Commander

Squadron Leader

15 document.docx

Page 16: KVS TGT and PRT Preliminary Examination Model Paper

67.Which one of the following pairs is not correctly matched?(1) Janjira Fort : Maharashtra(2) Asirgarh Port : Madhya Pradesh(3) Daulatabad Fort : Rajasthan(4) Girigee Fort : Tamil Nadu

68.Which one of the following is not a characteristic of convectional rainfall?(1) Afternoon rain(2) Drizzling(3) Lightning and thunder(4) Torrential rain

69.Which one among the following States has the largest amount ofcoal reserves in India?(1) Andhra Pradesh(2) Chhattisgarh(3) Jharkhand(4) Orissa

70.Which one of the following places is situated most western ward among them?(1) Bikaner(2) Diu(3) Jaiselmer(4) Porbandar

71.Where is the Headquarters for the Northwestern Railway zone located?’(1) Udaipur(2) Jodhpur(3) Ajmer(4) Jaipur

72.Which state among the following has the highest percentage of the Scheduled Tribes of its population in comparison to the other three States?(1) Arunachal Pradesh(2) Madhya Pradesh(3) Manipur(4) Tirpura

73.Which Schedule Of the Constitution of India includes the emoluments payable to the President and the Governors?(1) First(2) Second(3) Third(4) Fourth

74.Consider the following statements:1. Until the Parliament by-law provides otherwise, all proceedings in the Supreme Court and

every High Court are to be the English.

16 document.docx

Page 17: KVS TGT and PRT Preliminary Examination Model Paper

2. The authoritative texts of all bills, amendments, acts, ordinances, orders, rules, regulations, and by-laws at the Union and State levels have to be in English only.

Which of the’ statements given above is/are correct?(1) l only(2) 2 only(3) Both 1and 2(4) Neither 1 nor 2

75.Match List-I (Committee/Commission) with List-II (Subject) and select the correct answer using the code given below the Lists:List-I List-II(Committee/Commission) (Subject)A. Narasimhan Committee 1. Constitutional reformsB. Raja Chelliah Committee 2. Finance sector reformsC. Sarkaria Commission 3. Taxation reformsD. Venkatachaliah Commission 4. Centre State relationsCode:

A B C D(1) 4 1 2 3(2) 2 3 4 1(3) 4 3 2 1(4) 2 1 4 3

76.Who among the following was the first woman Chief Minister of an Indian State?(1) Sucheta Kriplani(2) Sarojini  Naidu(3) Nandini Satpathy(4) Vijayalakshmi Pandit

77.How can the Legislative Council in a State in India be created or abolished?(1) By the President of India on the recommendation of the Governor of the concerned State(2) By the Union Home Ministry on the advice of the State Government.(3) By the Parliament after the State Legislative Assembly passes a resolution to that

effect(4) By the Governor on the advice of the State Government

78.Where is the headquarters of the Amnesty International located?(1) Paris(2) Vienna(3) London(4) Geneva

79.Consider the following statements:1. India is a founder member of both GATT and WTO.2. The Ministerial Conference of the WTO is mandated to be held at least once in two years.

Which of the statements given above is/are correct?

17 document.docx

Page 18: KVS TGT and PRT Preliminary Examination Model Paper

(1) 1 only(2) 2 only(3) Both 1 and 2(4) Neither 1 nor2

80.Match List -I (Book) and List- II (Author) and select the correct answer using the code given below the Lists:List-I (Book) List-II (Author)A. Conquest of Self 1. Chandra ShekharB. Prison Diary 2. Jayaprakash NarayanC. Dynamics of Social Change 3. K.P.S MenonD. Yesterday and Today 4. Mahatma GandhiCode:

A B C D(1) 4 3 1 2(2) 1 2 4 3(3) 4 2 1 3(4) 1 3 4 2

81.The power to make any provision with respect to all matters relating to citizenship of India rests with(1) Parliament(2) Union Ministry of External Affairs(3) Union Ministry of Law and Justice(4) Union Ministry of Home Affairs

82.What is the use of small particles of silica gel often found in the packages of medicine?(1) It destroys fungal spores(2) It kills bacteria(3) It prevents oxidation of medicine(4) It absorbs moisture in the package

83.Polyhydroxy derivatives of aldehydes or ketoens are(1) Carbohydrates(2) Fats(3) Proteins(4) Steroids

84.Azurite is an ore of(1) Aluminum(2) Copper(3) Gold(4) Mercury

85.Rayon fiber is made from(1) Cellulose(2) Isoprene(3) Polyethylene

18 document.docx

Page 19: KVS TGT and PRT Preliminary Examination Model Paper

(4) Polyvinyl chloride

86.Which of the following parts/spectra of solar radiation is/are mostly absorbed by the leaves of green plants?(1) Infrared(2) Red and blue(3) Violet, Indigo, and orange(4) U1tra-violet, green and orange

87.Consider the following statements:1. Unlike blood, lymph-flows only in one direction.2. Lymph carries digested fat.

Which of the statements given above is/are correct?(1) 1 only(2) 2 only(3) Both 1 and 2(4) Neither l nor 2

88.What are soaps chemically?(1) Mild acids(2) Mild alkalis(3) Paraffins(4) Salts

89.Which one of the following effects is employed in the instruments used by the police to detect the over speeding of vehicles?(1) Doppler effect(2) Kerr effect(3) Thompson effect(4) Seebeck effect

90.Which one of the following is not a good source of nutritional iron?(1) Jaggery(2) Nuts(3) Fish(4) Milk

91.What is the cause of the disease ‘myxoedema’ in adult human beings?(1) Hyperthyroidism(2) Hypothyroidism(3) Hyperparathyroidism(4) Hyperparathyroidism

92.Which one of the following causes the infectious disease Anthrax?(1) Bacteria(2) Fungi(3) Protozoa

19 document.docx

Page 20: KVS TGT and PRT Preliminary Examination Model Paper

(4) Virus

93.Which one of the following is not an alloy?(1) 18 carat gold(2) Soldering metal(3) Steel(4) Graphite

94.Match List -I (Invention/Discovery) with List-II (Inventor/Discoverer) and select the correct answer using the code given below the Lists:

List-I List-II (Invention/Discovery) (Inventor/Discoverer)A. Pendulum clock 1. Christian HuygensB. Machine gun 2. Antoine BacquerelC. Radioactivity 3. Richard GallingD. X-rays 4. W. K Rontgen

Code: A B C D

(1) 2 4 1 3(2) 1 3 2 4(3) 2 3 1 4(4) 1 4 2 3

95.Which one of the following is the predominant raw material used in the manufacture of cement?(1) Alumina(2) Limestone(3) Gypsum(4) Magnesia

96.Which of the following can be taken as a reflection of meaningful learning?(1) A good score in the examination(2) A high degree of retention(3) The capability of transferring/using learning in different situations(4) The ability to recall as and when needed

97.The most important thing for a student to gain a better insight in the subject is / are?(1) the notes given by the subject teacher in the class(2) the discussion facilitated by the teacher and held by the students for comprehending

various aspects of the topic under reference(3) the source material arranged by the teacher for the students(4) the scholarship of the teacher

98.Schools should arrange co-curricular activities for the students, because?(1) curricular experiences are incomplete without supplements

20 document.docx

Page 21: KVS TGT and PRT Preliminary Examination Model Paper

(2) interplay of curricular and co-curricular experiences gives a better insight into the content and its context

(3) everybody wants co curricular activities these days(4) co-curricular activities make the school’s program attractive.

99.You are teaching in your class and it is almost the end of your session. A child of your class comes late and seeks your permission to enter the class. Being a good teacher, you will?(1) not permit the child, as it makes little sense coming to class so late(2) get annoyed, as you are disturbed(3) ask the child to explain his/her position before you take an appropriate decision(4) allow him/her to enter and ask him/her the reasons for being so late when the class

gets over

100. You enter your regular class to discover the children not in a mood to study that particular day. You will(1) value the child’s precious time and world, therefore, teach as per your plan(2) feel disturbed seeing the reluctance of the children to study(3) ask the children to mend their ways(4) allow students the freedom to come up with what they want and gradually

connect them to your plan

101. The teacher who has developed an interest in teaching?(1) Studies problem of student behaviour(2) Compares different types of tests(3) Refuses to be guided by the rules of thumb(4) Cannot deal with children effectively

102. Find the odd one out?(1) Recall(2) Recognition(3) Trace(4) Remembering

103. Motivation should be followed by?(1) Reward(2) Reproof(3) Knowledge of result(4) Incentive

104. Learning which involves motor organ is called?(1) Sensory learning(2) Motor learning(3) Verbal learning(4) Sensory motor learning

105. Which of the following is an audio-visual aid?(1) Radio

21 document.docx

Page 22: KVS TGT and PRT Preliminary Examination Model Paper

(2) Tape-recorder(3) Television(4) Projector

106. Do the children of intelligent parents always shine in studies?(1) Yes(2) No(3) Psychology(4) It depends on God

107. Children’s fantasy reflects their?(1) Love for imagination(2) Inherent talent(3) Age-specific traits(4) Hidden frustrations

108. I prefer teachting young children because?(1) I love playing with them(2) It is easy to manage them(3) It does not take extra reading on my part(4) This is the best time to develop values and skills

109. Today’s parents exert a lot of pressure for achievement on their children as?(1) they want to fulfill their dreams through their children(2) they are scared about their children’s future(3) the world is getting competitive everyday(4) social status is gained only through good grades

110. An effective teacher(1) can manage his/her class well(2) knows his/her subject very well(3) cares for his / her students(4) helps his/her students to be authentic learners

General Aptitude Question Answers for All   Examinations

1. The largest copper producing country in the World is1. Chile2. Russia3. South Africa4. China

2. If the radius of a circle is diminished by 10%, then its area is diminished by:1. 10%2. 19%3. 20%4. 36%

22 document.docx

Page 23: KVS TGT and PRT Preliminary Examination Model Paper

3. A boat travels 20 kms upstream in 6 hrs and 18 kms downstream in 4 hrs.Find the speed of the boat in still water and the speed of the water current?1. 1/2 kmph2. 7/12 kmph3. 5 kmph4. none of these

4. At what time after 4.00 p.m. is the minutes hand of a clock exactly aligned with the hour hand?1. 4:21:49.52. 4:27:49.53. 3:21:49.54. 4:21:44.5

5. A shop keeper sold a T.V set for Rs.17,940 with a discount of 8% and earned a profit of 19.6%.What would have been the percentage of profit earned if no discount was offered?

1. 24.8%2. 25%3. 26.4%4. Cannot be determined5. None of these

6. If (2x-y)=4 then (6x-3y)=?1. 152. 123. 184. 10

7. A clock is set right at 8 a.m. The clock gains 10 minutes in 24 hours. What will be the true time when the clock indicates 1 p.m. on the following day?1. 48 min. past 122. 38 min. past 123. 28 min. past 124. 25 min. past 12

8. What is the missing number in this series? 8 2 14 6 11 ? 14 6 18 121. 162. 93. 154. 6

9. Dinesh travelled 1200 km by air which formed 2/5 of his trip. One third of the whole trip, he travelled by car and the rest of the journey he performed by train. What was the distance travelled by train?1. 600Km2. 700Km3. 800Km

23 document.docx

Page 24: KVS TGT and PRT Preliminary Examination Model Paper

4. 900Km

10. A train which travels at a uniform speed due to some mechanical fault after traveling for an hour goes at 3/5th of the original speed and reaches the destination 2 hrs late.If the fault had occurred after traveling another 50 miles the train would have reached 40 min earlier. What is distance between the two stations?1. 3002. 3103. 3204. 305

11. The average between a two digit number and the number obtained by interchanging the digits is 9. What is the difference between the two digits of the number?1. 82. 23. 54. Cannot be determined

12. Pipe A can fill in 20 minutes and Pipe B in 30 mins and Pipe C can empty the same in 40 mins.If all of them work together, find the time taken to fill the tank1. 17 1/7 mins2. 20 mins3. 8 mins4. none of these

13. A person has 4 coins each of different denomination. What is the number of different sums of money the person can form (using one or more coins at a time)?1. 162. 153. 124. 11

14. The simple interest on a certain sum of money for 3 years is 225 and the compound interest on the same sum at the same rate for 2 years is 153 then the principal invested is1. 15002. 22503. 30004. 1875

15. A cow is tethered in the middle of a field with a 14 feet long rope. If the cow grazes 100 sq. ft. per day, then approximately what time will be taken by the cow to graze the whole field?1. 2 days2. 6 days3. 18 days4. 24 days5. None of these

24 document.docx

Page 25: KVS TGT and PRT Preliminary Examination Model Paper

16. 2 hours after a freight train leaves Delhi a passenger train leaves the same station travelling in the same direction at an average speed of 16 km/hr. After travelling 4 hrs the passenger train overtakes the freight train. The average speed of the freight train was?1. 402. 303. 804. 60

17. The two colors seen at the extreme ends of the pH chart are:1. Red and Blue2. Red and Green3. Green and Blue4. Orange and Green

18. 8 15 24 35 48 63 _?1. 702. 803. 754. 88

19. One of Mr. Horton, his wife, their son, and Mr. Horton’s mother is a doctor and another is a lawyer.a) If the doctor is younger than the lawyer, then the doctor and the lawyer are not blood

relatives.b) If the doctor is a woman, then the doctor and the lawyer are blood relatives.c) If the lawyer is a man, then the doctor is a man. Whose occupation you know?

1. Mr. Horton: he is the doctor2. Mr. Horton’s son: she is the lawyer3. Mr. Horton: he is the doctor4. Mr. Horton’s mother: she is the doctor

20. In the given figure, PA and PB are tangents to the circle at A and B respectively and the chord BC is parallel to tangent PA. If AC = 6 cm, and length of the tangent AP is 9 cm, then what is the length of the chord BC?1. 4 cm2. 8 cm3. 6 cm4. 5 cm

21. Union Information and Broadcasting ministry recently gave an indication to change which of the following laws on a larger scale, as the existing provisions of the Act are inadequate to cater to the phenomenal growth of the print media in view of the liberalization of the government policies?1. Press & Registration of Books Act, (PRB Act) 18672. The Delivery Of Books ‘And Newspapers’ (Public Libraries) Act, 19543. Indian Press (Emergency Powers ) Act 1931

25 document.docx

Page 26: KVS TGT and PRT Preliminary Examination Model Paper

4. None

22. 2 numbers differ by 5.If their product is 336,then the sum of the 2 numbers is:1. 212. 513. 284. 37

23. Which number is the odd one out? 9678 4572 5261 3527 77681. 77682. 35273. 45724. 96785. 5261

24. Which one among the following has the largest shipyard in India1. Kolkata2. Kochi3. Mumbai4. Visakhapatnam

25. If x=y=2z and xyz=256 then what is the value of x?1. 82. 33. 54. 6

26. A radio when sold at a certain price gives a gain of 20%. What will be the gain percent, if sold for thrice the price?1. 2802. 2703. 2904. 260

27. x% of y is y% of ?1. x/y2. 2y3. X4. can’t be determined

28. If the value of x lies between 0 & 1 which of the following is the largest?1. x2. x23. –x4. 1/x

29. The tutor of Alexander the great was1. Darius

26 document.docx

Page 27: KVS TGT and PRT Preliminary Examination Model Paper

2. Cyrus3. Socrates4. Aristotle

30. Thirty men take 20 days to complete a job working 9 hours a day. How many hour a day should 40 men work to complete the job?1. 8 hrs2. 71/2 hrs3. 7 hrs4. 9 hrs

31. Goitre caused by the deficiency of ………1. Vitamin D2. Iron3. VItamin A4. Iodine

32. Who invented Napier’s Bones1. John Napier2. William Oughtred3. Charles Babbage4. Napier Bone

33. The mass number of a nucleus is1. Always less than its atomic number2. Always more than its atomic number3. Sometimes more than and sometimes equal to its atomic number4. None of the above

34. A and B can do a piece of work in 45 days and 40 days respectively. They began to do the work together but A leaves after some days and then B completed the remaining work n 23 days. The number of days after which A left the work was1. 92. 113. 124. 155. 16

35. Sam and Mala have a conversation. Sam says I am certainly not over 40 Mala Says I am 38 and you are at least 5 years older than me · Now Sam says you are at least 39 all the statements by the two are false. How old are they really?1. Mala = 38 yrs, Sam =31 yrs.2. Mala = 38 yrs, Sam = 41 yrs3. Mala = 31 yrs, Sam = 41 yrs.4. Mala = 45yrs, Sam = 41 yrs

36. What is the code name for Windows Vista?1. Longhorn2. Longhund

27 document.docx

Page 28: KVS TGT and PRT Preliminary Examination Model Paper

3. Stackspray4. Pearl

37. On sports day, if 30 children were made to stand in a column, 16 columns could be formed. If 24 children were made to stand in a column, how many columns could be formed?1. 202. 303. 404. 50

38. The probability that a man will be alive for 25 years is 3/5 and the probability that his wife will be alive for 25 years is 2/3. Find the probability that only the man will be alive for 25 years.1. 2/52. 1/53. 3/54. 4/5

39. In a single throw of a dice, what is the probability of getting a number greater than 4?1. ½2. 2/33. ¼4. 1/3

40. If every alternative letter starting from B of the English alphabet is written in small letter, rest all are written in capital letters, how the month “September” be written. (1) SeptEMbEr (2) SEpTeMBEr (3) SeptembeR (4) SepteMber (5) None of the above1. (1)2. (2)3. (3)4. (5)5. (4)

41. After allowing a discount of 11.11% ,a trader still makes a gain of 14.28 % .at how many precent above the cost price does he mark his goods?1. 28.56%2. 35%3. 22.22%4. None of these

42. Pipe A can fill in 20 minutes and Pipe B in 30 mins and Pipe C can empty the same in 40 mins.If all of them work together, find the time taken to fill the tank1. 17 1/7 mins2. 20 mins3. None4. 50 mins

28 document.docx

Page 29: KVS TGT and PRT Preliminary Examination Model Paper

43. There are 3 triplet brothers. They look identical. The oldest is John, he always tells the truth. The second is Jack, he always tells a lie. The third is Joe, he either tells the truth or a lie. Jimmie Dean went to visit them one day. He was wondering who was who. So he asked each person a question. He asked the one who was sitting on the left: “Who is the guy sitting in the middle?”. The answer was “He is John.” He asked the one who was sitting in the middle: “What is your name?”. The answer was “I am Joe.” He asked the one who was sitting on the right: “What is the guy sitting in the middle?”. The answer was “He is Jack.” Jimmie Dean got really confused. Basically, he asked 3 same questions, but he got 3 different answers. which is not true?1. left most is joe2. middle is jack3. right is john4. middle is john

44. A / B = C; C > D then1. A is always greater than D2. C is always greater than D3. B is always less than D4. None

45. Consider the following statements: 1. The Administrative Reforms Commission (ARC) had recommended that the Department of Personnel of a State should be put under the charge of the Chief Secretary of the State. 2. Chief Secretary of a State is not involved in any manner in the promotion of State Civil officers to the All-India Services. Which of the statements given above is/are correct?1. Only 12. Only 23. Both 1 and 24. Neither 1 nor 2

46. The population of a town was 1,60,000 three years ago. If it increased by 3%, 2.5% and 5% respectively in the last three years, then the present population of the town is :1. 1,77,0002. 1,77,3663. 1,77,4614. 1,77,596

47. What is the population of India ?1. 98 crores2. More than 2 billion3. More than 1 billion4. Less than 96 crores5. 96 crores

48. Some green are blue. No blue are white.1. Some green are white2. No white are green3. No green are white

29 document.docx

Page 30: KVS TGT and PRT Preliminary Examination Model Paper

4. None of the above

49. What is the missing number in this series? 8 2 14 6 11 ? 14 6 18 121. 82. 63. 94. 11

50. Average age of students of an adult school is 40 years. 120 new students whose average age is 32 years joined the school. As a result the average age is decreased by 4 years. Find the number of students of the school after joining of the new students:1. 12002. 1203. 3604. 240

51. On sports day,if 30 children were made to stand in a column,16 columns could be formed. If 24 children were made to stand in a column , how many columns could be formed?1. 482. 203. 304. 165. 40

52. Which of the following numbers is divisible by 3? (i) 541326 (ii) 59670131. (ii) only2. (i) only3. (i) and (ii) both4. (i) and (ii) none

53. A square is divided into 9 identical smaller squares. Six identical balls are to be placed in these smaller squares such that each of the three rows gets at least one ball (one ball in one square only). In how many different ways can this be done?1. 812. 913. 414. 51

54. A man owns 2/3 of the market research beauro business and sells 3/4 of his shares for Rs.75000. What is the value of Business1. 1500002. 130003. 2400004. 34000

55. 1,2,6,24,_?1. 111

30 document.docx

Page 31: KVS TGT and PRT Preliminary Examination Model Paper

2. 1513. 1204. 125

56. The cost of 16 packets of salt,each weighing 900 grams is Rs.28.What will be the cost of 27 packets ,if each packet weighs 1Kg?1. Rs.52.502. Rs.563. Rs.58.504. Rs.64.75

57. Ronald and Michelle have two children. The probability that the first child is a girl, is 50%. The probability that the second child is a girl, is also 50%. Ronald and Michelle tell you that they have a daughter. What is the probability that their other child is also a girl?1. ½2. 1/33. ¼4. 1/5

58. Find the value of (21/4-1)( 23/4 +21/2+21/4+1)1. 12. 23. 3

59. The product of two fractions is 14/15 and their quotient is 35/24. the greater fraction is1. 4/52. 7/63. 7/54. 7/4

60. 500 men are arranged in an array of 10 rows and 50 columns according to their heights. Tallest among each row of all are asked to fall out. And the shortest among them is A. Similarly after resuming that to their original podsitions that the shortest among each column are asked to fall out. And the tallest among them is B. Now who is taller among A and B ?1. A2. B3. Both are of same height

61. Choose the pair of numbers which comes next 75 65 85 55 45 85 351. 25 152. 25 853. 35 254. 35 855. 25 75

31 document.docx

Page 32: KVS TGT and PRT Preliminary Examination Model Paper

62. A three digit number consists of 9,5 and one more number. When these digits are reversed and then subtracted from the original number the answer yielded will be consisting of the same digits arranged yet in a different order. What is the other digit?1. 12. 23. 34. 4

63. ATP stands for:1. Adenine triphosphate2. Adenosine triphosphate3. Adenosine Diphosphate4. Adenosine tetraphosphate

64. Veselin Tapolev who became the World Champion recently, is associated with which of the following games/sports ?1. Chess2. Golf3. Snooker4. Badminton5. None of these

65. A piece of cloth cost Rs 35. if the length of the piece would have been 4m longer and each meter cost Re 1 less , the cost would have remained unchanged. how long is the piece?1. 102. 113. 12

66. In a journey of 15 miles two third distance was travelled with 40 mph and remaining with 60 mph.How muvh time the journey takes1. 40 min2. 30 min3. 120 min4. 20 min

67. Solid cube of 6 * 6 * 6. This cube is cut into to 216 small cubes. (1 * 1 * 1).the big cube is painted in all its faces. Then how many of cubes are painted at least 2 sides.1. 562. 453. 234. 28

68. Find the average of first 40 natural numbers.1. 402. 353. 30.64. 20.55. None of these

32 document.docx

Page 33: KVS TGT and PRT Preliminary Examination Model Paper

69. 1, 5, 14, 30, ?, 911. 452. 553. 604. 705. None of these

70. There is a shortage of tubelights, bulbs and fans in a village – Gurgaon. It is found thata) All houses do not have either tubelight or bulb or fan.b) Exactly 19% of houses do not have just one of these.c) Atleast 67% of houses do not have tubelights.d) Atleast 83% of houses do not have bulbs.e) Atleast 73% of houses do not have fans.

1. 42 %2. 46 %3. 50 %4. 54 %5. 57 %

71. If 9 engines consume 24 metric tonnes of coal, when each is working 8 hours a day; how much coal will be required for 8 engines, each running 13 hours a day, it being given that 3 engines of the former type consume as much as 4 engines of latter type.1. 22 metric tonnes.2. 27 metric tonnes.3. 26 metric tonnes.4. 25 metric tonnes.

72. To 15 lts of water containing 20% alcohol, we add 5 lts of pure water. What is % alcohol.1. 20%2. 34%3. 15%4. 14%

73. In page preview mode:1. You can see all pages of your document2. You can only see the page you are currently working3. Satyam BPO Services4. You can only see pages that do not contain graphics

74. A house wife saved Rs. 2.50 in buying an item on sale .If she spent Rs.25 for the item, approximately how much percent she saved in the transaction?1. 8%2. 9%3. 10%4. 11%

75. I have trouble _____.

33 document.docx

Page 34: KVS TGT and PRT Preliminary Examination Model Paper

1. to remember my password2. to remembering my password3. remember my password4. remembering my password

76. Superheroes Liza and Tamar leave the same camp and run in opposite directions. Liza runs 1 mile per second (mps) and Tamar runs 2 mps. How far apart are they in miles after 1 hour?1. 10800 mile2. 19008 mile3. 12300 mile4. 14000 mile

77. A = 5, B = 0, C = 2, D = 10, E = 2. What is then AB + EE – (ED)powerB + (AC)powerE = ?1. 1132. 1033. 934. 111

78. A man can row upstream at 8 kmph and downstream at 13 kmph.The speed of the stream is?1. 2.5 kmph2. 4.2 kmph3. 5 kmph4. 10.5 kmph

79. Find what is the next letter. Please try to find. O,T,T,F,F,S,S,E,N,_ What is that letter?1. B2. S3. Q4. T5. O

80. There are 3 societies A, B, C. A lent cars to B and C as many as they had Already. After some time B gave as many tractors to A and C as many as they have. After sometime c did the same thing. At the end of this transaction each one of them had 24. Find the cars each originally had.1. A had 21 cars, B had 39 cars & C had 12 cars2. A had 39 cars, B had 39 cars & C had 12 cars3. A had 39 cars, B had 21 cars & C had 19 cars4. A had 39 cars, B had 21 cars & C had 12 cars

81. A papaya tree was planted 2 years ago. It increases at the rate of 20% every year. If at present, the height of the tree is 540 cm, what was it when the tree was planted?1. 432 cm2. 324 cm3. 375 cm4. 400 cm

34 document.docx

Page 35: KVS TGT and PRT Preliminary Examination Model Paper

82. A boy has Rs 2. He wins or loses Re 1 at a time If he wins he gets Re 1 and if he loses the game he loses Re 1. He can loose only 5 times. He is out of the game if he earns Rs 5. Find the number of ways in which this is possible?1. 142. 233. 164. 125. 10

83. Five racing drivers, Alan, Bob, Chris, Don, and Eugene, enter into a contest that consists of 6 races. The results of all six races are listed below: Bob always finishes ahead of Chris. Alan finishes either first or last. Eugene finishes either first or last. There are no ties in any race. Every driver finishes each race. In each race, two points are awarded for a fifth place finish, four points for fourth, six points for third, eight points for second, and ten points for first. If Frank enters the third race and finishes behind Chris and Don, which of the following must be true of that race?1. Eugene finishes first.2. Alan finishes sixth.3. Don finishes second.4. Frank finishes fifth.5. Chris finishes third.

84. A is twice as good a workman as B and together they finish a piece of work in 18 days.In how many days will A alone finish the work?1. 272. 263. 254. 24

85. Daal is now being sold at Rs. 20 a kg. During last month its rate was Rs. 16 per kg. By how much percent should a family reduce its consumption so as to keep the expenditure fixed?1. 20 %2. 40 %3. 3%4. 2%

86. The sum of 5 successive odd numbers is 1075. What is the largest of these numbers?1. 2152. 2233. 2194. 217

87. A man sells two buffaloes for Rs. 7,820 each. On one he gains 15% and on the other, he loses 15%. His total gain or loss in the transaction is1. 2.5% gain2. 2.25% loss3. 2% loss

35 document.docx

Page 36: KVS TGT and PRT Preliminary Examination Model Paper

4. 5% loss5. None of these

88. One ship goes along the stream direction 28 km and in opposite direction 13 km in 5 hrs for each direction.What is the velocity of stream?1. 1.5 kmph2. 2.5 kmph3. 1.8 kmph4. 2 kmph

89. Which one of the words given below is different from others?1. Orange2. Grape3. Apricot4. Raspberry5. Mango

90. Complete the series: 5, 20, 24, 6, 2, 8, ?1. 122. 323. 344. 36

91. A can have a piece of work done in 8 days, B can work three times faster than the A, C can work five times faster than A. How many days will they take to do the work together\1. 3 days2. 8/9 days3. 4 days4. None of the above

92. 7 Pink, 5 Black, 11 Yellow balls are there. Minimum no. atleast to get one black and yellow ball1. 172. 133. 154. 19

93. (1/10)18 – (1/10)20 = ?1. 99/10202. 99/103. 0.94. none of these

94. Three friends divided some bullets equally. After all of them shot 4 bullets the total number of bullets remaining is equal to the bullets each had after division. Find the original number divided?1. 182. 203. 54

36 document.docx

Page 37: KVS TGT and PRT Preliminary Examination Model Paper

4. 8

95. A sum of Rs. 427 is to be divided among A, B and C in such a way that 3 times A’s share, 4 times B’s share and 7 times C’s share are all equal. The share of C is1. Rs.842. Rs.763. Rs.984. RS.34

96. There are 20 poles with a constant distance between each pole. A car takes 24 second to reach the 12th pole.How much will it take to reach the last pole.1. 41.45 seconds2. 40.45 seconds3. 42.45 seconds4. 41.00 seconds

97. An emergency vehicle travels 10 miles at a speed of 50 miles per hour. How fast must the vehicle travel on the return trip if the round-trip travel time is to be 20 minutes?1. 72 miles per hour2. 75 miles per hour3. 65 miles per hour4. 78 miles per hour

98. 12% of 580 + ? = 941. 24.42. 34.43. 54.44. 65.4

99. There is a certain relation between two given words on one side of : : and one word is given on another side of : : while another word is to be found from the given alternatives, having the same relation with this word as the given pair has. Select the best alternative. Horse : Jockey : : Car : ?1. Mechanic2. Chauffeur3. Steering4. Brake

100. Which of the following numbers should be added to 11158 to make it exactly divisible by 77?1. 92. 83. 74. 5

37 document.docx

Page 38: KVS TGT and PRT Preliminary Examination Model Paper

Bank IT officer   Quizs

1. Which is Computer Memory that does not forget ?Ans: ROM

2. The computer memory holds data and ?Ans: program

3. What is means by term RAM ?Ans: Memory which can be both read and written to

4. Which computer memory is esentially empty ?Ans: RAM

5. The bubbles in a bubble memory pack are created with the help of ?Ans: magnetic field

6. Virtual memory is –Ans: an illusion of an extremely large memory

7. Special locality refers to the problem that once a location is referencedAns: a nearby location will be referenced soon

8. An example of a SPOOLED deviceAns: A line printer used to print the output of a number of jobs

9. Page faults occurs whenAns: one tries to divide a number by 0

10.Overlay isAns: a single contiguous memory that was used in the olden days for running large programs by swapping

Operating System Question Answer

11.Concurrent processes are processes that –Ans: Overlap in time

12.The page replacement policy that sometimes leads to more page faults when the size of the memory is increased is –Ans: FIFO

13.The only state transition that is initiated by the user process itself is –Ans: Block

14.Fragmentation is –Ans: fragments of memory words unused in a page

15.Give Example of real time systemsAns: Aircraft control system, A process control system

PSU Papers for Computer Science

16.Dijkstra’s banking algorithm in an operating system solves the problem of –Ans: Deadlock Avoidance

17. In a paged memory system, if the page size is increased, then the internal fragmentation generally –Ans: Becomes more

18.An operating system contains 3 user processes each requiring 2 units of resources R. The minimum number of units of R such that no deadlock will ever occur is –Ans: 4

38 document.docx

Page 39: KVS TGT and PRT Preliminary Examination Model Paper

19.Critical region is –Ans: A set of instructions that access common shared resources which exclude one another in time

20.Kernel is –Ans: The set of primitive functions upon which the rest of operating system functions are built up

21.Necessary conditions for deadlock are –Ans: Non-preemption and circular wait, Mutual exclusion and partial allocation

22. In a time sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the –Ans: READY state

23.Supervisor call –Ans: Are privileged calls that are used to perform resource management functions, which are controlled by the operating system

24.Semaphores are used to solve the problem of –Ans: Mutual exclusion, Process synchronization

25. If the property of locality of reference is well pronounced in a program-Ans: The number of page faults will be less

Operating System Question Answer for Competitive Exams

26.Pre-emptive scheduling, is the strategy of temporarily suspending a running process-Ans: before the CPU time slice expires

27.Mutual exclusion problem occurs –Ans: among processes that share resources

28.Sector interleaving in disks is done by –Ans: the operating system

29.Disk scheduling involves deciding-Ans: the order in which disk access requests must be serviced

30.Dirty bit is used to show the –Ans: page that is modified after being loaded into cache memory

31.Fence register is used for-Ans: memory protection.

32.The first-fit, best-fit and worst-fit algorithm can be used for-Ans: contiguous allocation of memory

33.Give example of single-user operating systems-Ans: MS-DOS, XENIX

34. In Round Robin CPU Scheduling, as the time quantum is increased, the average turn around time-Ans: varies irregulary

35. In a multiprogramming environment-Ans: more than one process resides in the memory

36.The size of the virtual memory depends on the size of the –Ans: Address Bus

37.Give example of Scheduling Policies in which context switching never take place-Ans: Shortest Job First, First-cum-first-served

38.Suppose that a process is in ‘BLOCKED’ state waiting for some I/O service. When the service is completed, it goes to the-

39 document.docx

Page 40: KVS TGT and PRT Preliminary Examination Model Paper

Ans: READY State

Computer Awareness Solved Paper for Allahabad Bank PO   Exam

1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ….(A)software suites(B) integrated software packages(C)software processing packages(D)personal information managers(E) none of these

2. A data warehouse is which of the following ?(A) Can be updated by the end users(B) Contains numerous naming conventions and formats(C)Organized around important subject areas(D)Contains only current data(E) None of these

3. ______________ servers store and manages files for network users.(A) Authentication(B) Main(C) Web(D) File(E) None of these

4. All of the following are examples of real security and privacy risks Except _____(A) hackers(B) spam(C) viruses(D) identify theft(E) None of these

5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .(A) Data(B) Sales(C) Query(D) (Point-of-sale (POS)(E) None of these

6. The OSI model is divided into _______ processes called layers.(A) five(B) six(C) seven(D) eight(E) None of these

40 document.docx

Page 41: KVS TGT and PRT Preliminary Examination Model Paper

7. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.(A) management(B) processing(C) utility(D) application(E) None of these

8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.(A) Servers(B) Embedded computers(C) Robotic computers(D) Mainframes(E) None of these

9. The following are all computing devices , except………(A) notebook computers(B) cellular telephones(C) digital scanners(D) personal digital assistants(E) None of these

10. in a ring topology , the the computer in possession of the ______ can trasmit data(A) packet(B) data(C) access method(D) token(E) None of these

11.This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____(A) basic input/output system(B) secondary input/output system(C) peripheral input/output system(D) marginal input/output system(E) None of these

12.________ Viruses are often transmitted by a floppy disk left in the floppy drive(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb(E) None of these

13.________ controls the way in which the computer system functions and provides a means by which users can interact with the computer(A) The platform(B) Application software

41 document.docx

Page 42: KVS TGT and PRT Preliminary Examination Model Paper

(C) Operating system(D) The motherboard(E) None of these

14.Servers are computers that provide resources to other computers connected to a ___________(A) mainframe(B) network(C) supercomputer(D) client(E) None of these

15.A goal of data mining includes which of the following?(A) To explain some observed event or condition(B) To confirm that data exists(C) To analyze data for expected relationships(D) To create a new data warehouse(E) None of these

16.URL stands for ……..(A) Universal Research List(B) Universal Resource List(C) Uniform Resource Locator(D) Uniform Research Locator(E) None of these

17.A database management system (DBMS) is a …………(A) hardware system used to create , maintain and provide controlled access to a database(B) hardware system used to create, maintain, and provide uncontrolled access to a database.(C) software system used to create, maintain, and provide uncontrolled access to a database.(D) software system used to create, maintain, and provide controlled access to a

database.(E) None of these

18.A Proxy server is used for which of the following?(A) To provide security against unauthorized users(B) To process client requests for web pages(C) To process client requests for database access(D) To provide TCP/IP(E) None of these

19.When data changes in multiple lists and all lists are not updated, this causes:(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of these

42 document.docx

Page 43: KVS TGT and PRT Preliminary Examination Model Paper

20._____________ are words that a programming language has set aside for its own use.(A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of these

23.______ describe what is database fields.(A) Structures(B) Field markers(C) Field definition(D) Field names(E) None of these

24.You must install a (n) ____________ on a network if you want to share a broadband Internet connection.(A) router(B) modem(C) node(D) cable(E) None of these

25.A goal of normalization is to __________(A) minimize the number of relationships(B) minimize the number of entities(C) minimize the number of tables(D) minimize the number of redundancy(E) None of these

26.Granting an outside organization access to internet web pages is often implemented using a (n) ____(A) extranet(B) intranet(C) internet(D) hacker(E) None of these

27.Which term identifies a specific computer on the web and the main page of the entire site(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of these

28.The code that relational database management systems use to perform their database task is referred to as …..(A) QBE

43 document.docx

Page 44: KVS TGT and PRT Preliminary Examination Model Paper

(B) SQL(C) OLAP(D) Sequel Server(E) None of these

29.Chip is a common nickname for a (n):(A) transistor(B) resistor(C) integrated circuit(D) semiconductor(E) None of these

30.The purpose of the primary key in a database is to:(A) unlock the database(B) provide a map of the data(C) uniquely identify a record(D) establish constraints on database operations.(E) None of these

31.The design of the network is called the network:(A) architecture(B) server(C) transmission(D) type(E) None of these

32.The most frequently used instructions of a computer program are likely to be fetched from:(A) the hard disk(B) cache memory(C) RAM(D) Registers(E) None of these

33.The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.(A) data dictionary(B) data table(C) data record(D) data field(E) None of these

34.Personal logs or journal entries posted on the Web are known as:(A) listservs(B) Webcasts(C) Blogs(D) subject directories(E) None of these

44 document.docx

Page 45: KVS TGT and PRT Preliminary Examination Model Paper

35.A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.(A) command – based user interface(B) GUI(C) system utility(D) API(E) None of these

36.Which of the following is NOT a type of broadband Internet connection?(A) Cable(B) DSL(C) Dial-up(D) Satellite(E) None of these

37.Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:(A) spyware(B) adware(C) spam(D) malware(E) None of these

38.Making a field ______ means that it cannot be left blank.(A) numeric(B) required(C) calculated(D) validated(E) None of these

39.____________ are viruses that are triggered by the passage of time or on a certain date.(A) Boot-sector viruses(B) Macro viruses(C) Time bombs(D) Worms(E) None of these

40.Linux is a (n) ____________ operating system.(A) open-source(B) Microsoft(C) Windows(D) Mac(E) None of these

41.What is a backup?(A) Restoring the information backup(B) An exact copy of a system’s information(C) The ability to get a system up and running in the event of a system crash or failure

45 document.docx

Page 46: KVS TGT and PRT Preliminary Examination Model Paper

(D) All of these(E) None of these

42.Which of the following places the common data elements in order from smallest to largest(A) character, file, record, field, database(B) character, record, field, database, file(C) character, field, record, file, database(D) Bit, byte, character, record, field, file, database,(E) None of these

43.The internet is ……(A) a large network of networks(B) an internal communication system for a business(C) a communication system for the Indian government(D) All of these(E) None of these

44.____________ are lists of commands that appear on the screen.(A) GUIs(B) Icons(C) Menus(D) Windows(E) None of these

45.Which of the following statements is FALSE concerning file names?(A) Files may share the same name or the same extension but not both(B) Every file in the same folder must have a unique name(C) File extension is another name for file type(D) The file extension comes before the dot (.) followed by the file name(E) None of these

46.Verification of a login name and password is known as:(A) configuration(B) accessibility(C) authentication(D) logging in(E) None of these

47.Which of the following would most likely NOT be a symptom of a virus?(A) Existing program files and icons disappear.(B) The CD-ROM stops functioning.(C) The Web browser opens to an unusual home page.(D) Odd messages or images are displayed on the screen.(E) None of these

Computer Awareness For Bank PO Exams – Part   2

46 document.docx

Page 47: KVS TGT and PRT Preliminary Examination Model Paper

1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches.A. 20B. 75C. 85D. 99

2. The survey showed that these businesses lost more than ____________ due to security breaches.A. $100,000 eachB. $377 millionC. five employees eachD. $1 million

3. The typical computer criminal is a(n):A. young hacker.B. trusted employee with no criminal record.C. trusted employee with a long, but unknown criminal record.D. overseas young cracker.

4. The majority of computer crimes are committed by:A. hackers.B. insiders.C. overseas criminals.D. young teenage computer geniuses.

5. The common name for the crime of stealing passwords is:A. spooling.B. identity theft.C. spoofing.D. hacking.

Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime of:A. spooling.B. identity theft.C. spoofing.D. hacking.

7. Malicious software is known as:A. badware.B. malware.C. maliciousware.D. illegalware.

47 document.docx

Page 48: KVS TGT and PRT Preliminary Examination Model Paper

8. A program that performs a useful task while simultaneously allowing destructive acts is a:A. worm.B. Trojan horse.C. virus.D. macro virus.

Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:A. Trojan horse.B. virus.C. time bomb.D. time-related bomb sequence.

10. In 1999, the Melissa virus was a widely publicized:A. e-mail virus.B. macro virus.C. Trojan horse.D. Time bomb.

11. What type of virus uses computer hosts to reproduce itself?A. Time bombB. WormC. Melissa virusD. Macro virusAnswer: B12. The thing that eventually terminates a worm virus is a lack of:A. memory or disk space.B. time.C. CD drive space.D. CD-RW.Answer: A13. When a logic bomb is activated by a time-related event, it is known as a:A. time-related bomb sequence.B. virus.C. time bomb.D. Trojan horse.Answer: C14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:A. time-related bomb sequence.B. virus.C. time bomb.D. Trojan horse.Answer: C15. What is the name of an application program that gathers user information and sends it to someone through the Internet?

48 document.docx

Page 49: KVS TGT and PRT Preliminary Examination Model Paper

A. A virusB. SpybotC. Logic bombD. Security patchAnswer: B16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:A. more complicated.B. more difficult.C. easier.D. slower.Answer: C17. HTML viruses infect:A. your computer.B. a Web page in the HTML code.C. both a Web page and the computer that is viewing it.D. NoAnswer: B18. Software programs that close potential security breaches in an operating system are known as:A. security breach fixes.B. refresh patches.C. security repairs.D. security patches.Answer: D19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:A. a virus.B. a Trojan horse.C. cracking.D. a denial of service attack.Answer: D20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.A. BiometricsB. BiomeasurementC. Computer securityD. Smart weapon machineryAnswer: A21. What is the most common tool used to restrict access to a computer system?A. User loginsB. PasswordsC. Computer keysD. Access-control softwareAnswer: B22. The most common passwords in the U.S. or Britain include all EXCEPT:A. love.B. Fred.

49 document.docx

Page 50: KVS TGT and PRT Preliminary Examination Model Paper

C. God.D. 123.Answer: D23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):A. hacker-proof program.B. firewall.C. hacker-resistant server.D. encryption safe wall.Answer: B24. The scrambling of code is known as:A. encryption.B. a firewall.C. scrambling.D. password-proofing.Answer: A25. If you want to secure a message, use a(n):A. cryptology source.B. encryption key.C. encryption software package.D. cryptosystem.Answer: D Reference: How It Works: 10.2 Cryptography26. To prevent the loss of data during power failures, use a(n):A. encryption program.B. surge protector.C. firewall.D. UPS.Answer: D27. A(n) ____________ can shield electronic equipment from power spikes.A. encryption programB. surge protectorC. firewallD. UPSAnswer: B28. All of these are suggestions for safe computing EXCEPT:A. don’t borrow disks from other people.B. open all e-mail messages but open them slowly.C. download shareware and freeware with caution.D. disinfect your system.Answer: B29. Freeware ___________ encrypts data.A. encryptionB. firewall softwareC. PGPD. private and public keysAnswer: C30. ____________ is defined as any crime completed through the use of computer technology.A. Computer forensics

50 document.docx

Page 51: KVS TGT and PRT Preliminary Examination Model Paper

B. Computer crimeC. HackingD. CrackingAnswer: B31. Most computer systems rely solely on ___________ for authentication.A. loginsB. passwordsC. encryptionD. lock and keyAnswer: B32. Creating strong computer security to prevent computer crime usually simultaneously helps protect :A. privacy rights.B. personal ethics.C. the number of cookies downloaded to your personal computer.D. personal space.Answer: A33. Over ___________ was spent by businesses and government to repair problems in regard to Y2K.A. 20 million dollarsB. 100 million dollarsC. 1 billion dollarsD. 100 billion dollarsAnswer: D34. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making?A. Autonomous systemB. Missile defense auto-systemC. Smart weaponD. Independent systemAnswer: D35. Security procedures can:A. will eliminate all computer security risk.B. reduce but not eliminate risks.C. are prohibitively expensive.D. are inaccessible for the average home user.Answer: BFill in the Blank:36. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging37. Computer ____________ often goes unreported because businesses fear negative publicity.Answer: crime38. ____________ connections are the most frequent point of attack for Internet commerce.Answer: Internet39. ____________ is the most common form of computer crime.Answer: Theft

51 document.docx

Page 52: KVS TGT and PRT Preliminary Examination Model Paper

40. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.Answer: online auctions Reference: Identity Theft41. Theft of computers is most common for PDAs and ____________ computers.Answer: notebook42. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.Answer: virus Reference: Viruses Difficulty: Easy43. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.Answer: macro virus44. Both viruses and ____________ use computer hosts to replicate.Answer: worms45. ____________ programs search for and eliminate viruses.Answer: Antivirus46. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.Answer: nothing or free47. ____________ was once the word used for malicious computer wizardry.Answer: Hackers or hacking48. ____________ refers to electronic trespassing or criminal hacking.Answer: Cracking49. DoS stands for ___________.Answer: denial of service50. DDoS stands for ___________.Answer: distributed denial of service51. ____________ hijack Web pages and redirect users to other sites.Answer: Webjackers52. ___________ software monitors and records computer transactions.Answer: Audit-control53. Each individual who uses a public key cryptosystem has ___________ keys.Answer: two Reference: How It Works: 10.2 Cryptography54. PGP stands for ___________.Answer: Pretty Good Privacy55. Most operating systems, including Windows XP, assign each user a unique ___________.Answer: user identifier or user ID56. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.Answer: attachmentsMatching:57. Match the acts and centers with their purposes:I. Computer Fraud and Abuse Act A. created by Attorney General Janet Reno in 1998II. USA Patriot Act B. defines what kinds of communications are legal onlineIII. Digital Millennium Copyright Act C. created in 2001 as a response to the terrorist attacks of September 11, 2001IV. Telecommunications Act of 1996 D. provides instant information on crimes and criminalsV. Communications Decency Act E. declared unconstitutional by the Supreme CourtVI. National Infrastructure Protection Center F. created as a result of the first headline-making

52 document.docx

Page 53: KVS TGT and PRT Preliminary Examination Model Paper

wormVII. National Crime Information Center G. used to arrest a student for writing to crack an Adobe productAnswers: F, C, G, B, E, A, D58. Match the following rules of thumb about safe computing with the proper descriptions:I. share with care A. be aware of e-mail from what appear to be legitimate companiesII. handle e-mail carefully B. don’t choose a dictionary wordIII. disinfect regularly C. keep your disks in your own computerIV. take your password seriously D. copy, copy, copyV. if it’s important, back it up E. encryptVI. sensitive info over the Internet? F. use antivirus softwareAnswers: C, A, F, B, D, E

53 document.docx

Page 54: KVS TGT and PRT Preliminary Examination Model Paper

Computer Awareness For Bank PO ExamsPosted by Admin on March 13, 2010       27 Votes

1. All of the following are examples of real security and privacy risks EXCEPT:A. hackers.B. spam.C. viruses.D. identity theft.Answer: B2. A process known as ____________ is used by large retailers to study trends.A. data miningB. data selectionC. POSD. data conversionAnswer: A3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.A. DataB. Point-of-sale (POS)C. SalesD. QueryAnswer: B4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.A. PSSB. POSC. inventoryD. data miningAnswer: A5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:A. robotics.B. simulation.C. computer forensics.D. animation.Answer: C6. Which of the following is NOT one of the four major data processing functions of a computer?A. gathering dataB. processing data into informationC. analyzing the data or information

54 document.docx

Page 55: KVS TGT and PRT Preliminary Examination Model Paper

D. storing the data or informationAnswer: C7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.A. POSB. RFIDC. PPSD. GPSAnswer: B8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:A. robotics.B. computer forensics.C. simulation.D. forecasting.Answer: A9. Technology no longer protected by copyright, available to everyone, is considered to be:A. proprietary.B. open.C. experimental.D. in the public domain.Answer: A10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.A. NanoscienceB. MicroelectrodesC. Computer forensicsD. Artificial intelligenceAnswer: A11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.A. NanoscienceB. NanotechnologyC. SimulationD. Artificial intelligence (AI)Answer: D12. ____________ is data that has been organized or presented in a meaningful fashion.A. A processB. SoftwareC. StorageD. InformationAnswer: D13. The name for the way that computers manipulate data into information is called:A. programming.B. processing.C. storing.D. organizing.Answer: B

55 document.docx

Page 56: KVS TGT and PRT Preliminary Examination Model Paper

14. Computers gather data, which means that they allow users to ____________ data.A. presentB. inputC. outputD. storeAnswer: B15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:A. data.B. output.C. input.D. the process.Answer: B16. Computers use the ____________ language to process data.A. processingB. kilobyteC. binaryD. representationalAnswer: C17. Computers process data into information by working exclusively with:A. multimedia.B. words.C. characters.D. numbers.Answer: D18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:A. eight bytes.B. eight kilobytes.C. eight characters.D. eight bits.Answer: D19. The term bit is short for:A. megabyte.B. binary language.C. binary digit.D. binary number.Answer: C20. A string of eight 0s and 1s is called a:A. megabyte.B. byte.C. kilobyte.D. gigabyte.Answer: B21. A ____________ is approximately one billion bytes.A. kilobyteB. bitC. gigabyte

56 document.docx

Page 57: KVS TGT and PRT Preliminary Examination Model Paper

D. megabyteAnswer: C22. A ____________ is approximately a million bytes.A. gigabyteB. kilobyteC. megabyteD. terabyteAnswer: C23. ____________ is any part of the computer that you can physically touch.A. HardwareB. A deviceC. A peripheralD. An applicationAnswer: A24. The components that process data are located in the:A. input devices.B. output devices.C. system unit.D. storage component.Answer: C25. All of the following are examples of input devices EXCEPT a:A. scanner.B. mouse.C. keyboard.D. printer.Answer: D26. Which of the following is an example of an input device?A. scannerB. speakerC. CDD. printerAnswer: A27. All of the following are examples of storage devices EXCEPT:A. hard disk drives.B. printers.C. floppy disk drives.D. CD drives.Answer: B28. The ____________, also called the “brains†of the computer, is responsible for� processing data.A. motherboardB. memoryC. RAMD. central processing unit (CPU)Answer: D29. The CPU and memory are located on the:A. expansion board.B. motherboard.

57 document.docx

Page 58: KVS TGT and PRT Preliminary Examination Model Paper

C. storage device.D. output device.Answer: B30. Word processing, spreadsheet, and photo-editing are examples of:A. application software.B. system software.C. operating system software.D. platform software.Answer: A31. ____________ is a set of computer programs used on a computer to help perform tasks.A. An instructionB. SoftwareC. MemoryD. A processorAnswer: B32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.A. managementB. processingC. utilityD. applicationAnswer: D33. The PC (personal computer) and the Apple Macintosh are examples of two different:A. platforms.B. applications.C. programs.D. storage devices.Answer: A34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.A. languagesB. methodsC. CPUsD. storage devicesAnswer: C35. Servers are computers that provide resources to other computers connected to a:A. network.B. mainframe.C. supercomputer.D. client.Answer: A36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.A. supercomputersB. clientsC. laptopsD. mainframesAnswer: D

58 document.docx

Page 59: KVS TGT and PRT Preliminary Examination Model Paper

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.A. ServersB. SupercomputersC. LaptopsD. MainframesAnswer: B38. DSL is an example of a(n) ____________ connection.A. networkB. wirelessC. slowD. broadbandAnswer: D39. The difference between people with access to computers and the Internet and those without this access is known as the:A. digital divide.B. Internet divide.C. Web divide.D. broadband divide.Answer: A40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.A. NanotechnologyB. Micro-technologyC. Computer forensicsD. Artificial intelligenceAnswer: A41. Which of the following is the correct order of the four major functions of a computer?A. Process à Output à Input à StorageB. Input à Outputà Process à StorageC. Process à Storage à Input à OutputD. Input à Process à Output à StorageAnswer: D42. ____________ bits equal one byte.A. EightB. TwoC. One thousandD. One millionAnswer: A43. The binary language consists of ____________ digit(s).A. 8B. 2C. 1,000D. 1Answer: B44. A byte can hold one ____________ of data.A. bitB. binary digit

59 document.docx

Page 60: KVS TGT and PRT Preliminary Examination Model Paper

C. characterD. kilobyteAnswer: C45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.A. The platformB. The operating systemC. Application softwareD. The motherboardAnswer: B46. The operating system is the most common type of ____________ software.A. communicationB. applicationC. systemD. word-processing softwareAnswer: C47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.A. ServersB. Embedded computersC. Robotic computersD. MainframesAnswer: B48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:A. instructions.B. the operating system.C. application software.D. the system unit.Answer: A49. The two broad categories of software are:A. word processing and spreadsheet.B. transaction and application.C. Windows and Mac OS.D. system and application.Answer: D50. The metal or plastic case that holds all the physical parts of the computer is the:A. system unit.B. CPU.C. mainframe.D. platform.Answer: AFill in the Blank:-51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.Answer: Mac

60 document.docx

Page 61: KVS TGT and PRT Preliminary Examination Model Paper

52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.Answer: operating system53. The type of operating system software you use depends on your computer’s ____________.Answer: platform54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.Answer: Application55. ____________are the fastest and most expensive computers.Answer: Supercomputers56. A ____________ is approximately 1,000 bytes.Answer: kilobyte57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.Answer: instructions58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.Answer: stores59. The binary language consists of two digits: ____________ and ____________.Answer: 0 and 160. A string of ____________ 0s and 1s is called a byte.Answer: eight (8)61. The devices you use to enter data into a computer system are known as ____________ devices.Answer: input62. The devices on a computer system that let you see the processed information are known as ____________ devices.Answer: output63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.Answer: Software64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).Answer: Internet65. ____________ are computers that excel at executing many different computer programs at the same time.Answer: Mainframes66. ____________is the application of computer systems and techniques to gather legal evidence.Answer: Computer forensics67. ____________ is the science that attempts to create machines that will emulate the human thought process.Answer: Artificial intelligence (AI)68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.Answer: Microsoft Windows

61 document.docx

Page 62: KVS TGT and PRT Preliminary Examination Model Paper

69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.Answer: data mining70. Hard disk drives and CD drives are examples of ____________ devices.Answer: storage71. You would use ____________ software to create spreadsheets, type documents, and edit photos.Answer: application72. ____________ are computers that support hundreds or thousands of users simultaneously.Answer: Mainframes73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.Answer: Identity theft74. Surgeons are using ____________ to guide robots to perform delicate surgery.Answer: computers75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.Answer: simulatorsTrue and False76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.Answer: True77. Data can be a number, a word, a picture, or a sound.Answer: True78. Strictly defined, a computer is a data processing device.Answer: True79. The discrepancy between the “haves†and “have-nots†with regard to� � computer technology is commonly referred to as the digital society.Answer: False (digital divide)80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that posethreats to computer security.Answer: True81. Trend-spotting programs, developed for business, have been used to predict criminal activity.Answer: True82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.Answer: False83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.Answer: True84. Output devices store instructions or data that the CPU processes.Answer: False (memory)85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.Answer: True86. Nanostructures represent the smallest human-made structures that can be built.Answer: True

62 document.docx

Page 63: KVS TGT and PRT Preliminary Examination Model Paper

87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).Answer: True88. Being computer fluent means that you should be able to build a computer yourself.Answer: False89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.Answer: True90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.Answer: False (network adapter)91. With a wireless network, it is easier to relocate devices.Answer: True92. The most common type of memory that the computer uses to process data is ROM.Answer: False (RAM)Matching:93. Match the following terms with their approximate size:I. kilobyte A. one million bytesII. byte B. eight bitsIII. gigabyte C. one thousand bytesIV. megabyte D. one billion bytesV. terabyte E. one trillion bytesAnswer: C, B, D, A, E94. Match the following terms with their meanings:I. printer A. storage deviceII. scanner B. output deviceIII. RAM C. input deviceIV. CPU D. a type of memoryV. CD drive E. processorAnswer: B, C, D, E, A95. Match the following terms with their meanings:I. mainframe A. the most expensive computers that perform complex calculations extremely rapidlyII. supercomputer B. a computer that provides resources to other computers connected to a networkIII. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneouslyIV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature controlV. server E. a small mobile computing deviceAnswer: C, A, D, E, B96. Match the following terms with their meanings:I. software A. transforming data into informationII. hardware B. data that has been organized or presented in a meaningful fashionIII. operating system C. any part of the computer that you can physically touchIV. processing D. a set of computer programs that enables hardware to perform different tasksV. information E. the most common type of system software, it controls the way in which the

63 document.docx

Page 64: KVS TGT and PRT Preliminary Examination Model Paper

computer system functionsAnswer: D, C, E, A, B97. Match the following terms with their meanings:I. system software A. the set of programs that enables computer hardware devices and application software to work togetherII. application software B. the kind of operating system software you will use depends on thisIII. platform C. operating system software generally used on PCsIV. Microsoft Windows D. a set of programs used to accomplish a specific taskV. Mac OS E. operating system software used on the Apple MacintoshAnswer: A, D, B, C, E98. Match the following terms with their meanings:I. data A. the main circuit board in the system unitII. memory B. the representation of a fact or idea (unprocessed information)III. output C. processed data or informationIV. storage D. holds instructions or data that the CPU processesV. motherboard E. data or information that can be accessed againAnswer: B, D, C, E, A99. Match the following terms with their meanings:I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scaleII. binary language B. the case that contains the system componentsIII. instructions C. consists of 0s and 1sIV. system unit D. short for binary digitV. nanotechnology E. steps and tasks necessary to process data into usable informationAnswer: D, C, E, B, A100. Match the following fields to the related computer technology:I. medicine A. Internet research and virtual toursII. business B. data miningIII. law enforcement C. robotics and simulationIV. education D. computer forensicsV. archeology E. digital recreations of ruinsAnswer: C, B, D, A, E

64 document.docx

Page 65: KVS TGT and PRT Preliminary Examination Model Paper

Computer Awareness For Bank Clerical ExamPosted by Admin on November 1, 2009       30 Votes

1.Which among the following is not a security / privacy risk?(A)Spam(B)Hacking(C)Virus(D)Phishing(E)VishingAns.  Spam

2.Now a days Vishing has become a criminal practice of using social engineering over which of the following?(A)Social networking sites(B)Mobile Phones(C)E-mails(D)Cyber cafés(E)All of the aboveAns. Mobile Phones3.When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?(A)spam(B)hacking(C)Phishing(D)Vishing(E)SimulationAns. Phishing

4.Which among the following is a correct definition of “Digital Divide”?(A) gap between people having access to mobile and internet access(B) gap between people having access to internet /IT and no internet/IT(C) gap between people having access to broadband and narrowband internet(D) gap between people having access to internet banking and normal banking(E)Gap between the people having an email account and no email accountAns.  (B) gap between people having access to internet /IT and no internet/IT

5.Which among the following is the most common source of Viruses to the hard disk of your computer?(A)Incoming Email(B)Outgoing Email

65 document.docx

Page 66: KVS TGT and PRT Preliminary Examination Model Paper

(C)CD Roms(D)Websites(E)MobileAns. (A) Incoming Email

6.What is the fullform of W3C?(A)World Wide Web Consortium(B)World Wide Web Company(C)World Wide Web Center(D)World Wide Web Command(E)None of themAns. (A) World Wide Web Consortium

7.Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?(A)Version(B)Update(C)Help(D)Patch(E)SyntaxAns. (D) Patch

8.What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order?(A)ATM SafetyPIN(B)ATM SafetyPro(C)ATM SafetyCode(D)ATM SafetySign(E)ATM SafetyDigitAns. (A) ATM SafetyPIN

9.In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?(A)City(B)Bank(C)Branch(D)Account Type(E)None of the aboveAns.  first three digits represent the city, the next three indicate the bank and the last three digits signify the branch

10.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?(A)Virtual keyboard(B)Finger Touching(C)Touchscreen

66 document.docx

Page 67: KVS TGT and PRT Preliminary Examination Model Paper

(D)ShapeWriter(E)DasherAns. (A) Virtual Keyboard

11.ADSL data communications technology uses which of the following for faster data transmission ?(A)Voiceband modem(B)Wireless Modem(C)Copper telephone Lines(D)Sockets(E)None of the aboveAns. (C) Copper telephone Lines

12.While working on Microsoft World , which among the following is the command for “Undo”?(A)Cntrl +A(B)Cntrl +Z(C)Cntrl +Y(D)Cntrl +C(E)Cntrl +VAns. (B) Cntrl + Z

13.While browsing the internet , which of the following key is used for full screen view?(A)F3(B)F5(C)F11(D)F9(E)F10Ans. (C) F11

14.Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuits (ASICs), programmable logic devices, etc.?(A)Hardware(B)Software(C)Firmware(D)Malware(E)LivewareAns. (C) Firmware

15.Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markup language) from document presentation, including elements such as the layout, colors, and fonts. What is full form?(A)Cascading Style Software(B)Clear Style Sheet(C)Cascading Style Sheet(D)Common Style Sheet(E)Conditional Style Sheet

67 document.docx

Page 68: KVS TGT and PRT Preliminary Examination Model Paper

Ans. (C) Cascading Style Sheet

16.What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?(A)Reduce Power consumption(B)Back Up(C)To write contents of RAM to hard disc(D)To improve download speed(E)None of the aboveAns. (A) Deduce Power Consumption

17.Which of the following device is a volatile storage?(A)RAM(B)Hard Disc(C)Magnetic Tape(D)Floppy Disc(E)ROMAns. (A) RAM

18.Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC?(A)IBM(B)Microsoft(C)Intel(D)Google(E)AppleAns. (B) Microsoft

19.What is Office Open XML?(A)A file format(B)A software(C)A electronic device(D)An international standard(E)None of the aboveAns. (A) A file format

20.What is the ultimate purpose of Defragmentation?(A)Make the PC faster(B)Create More Free Space(C)Delete temporary files(D)Reduce Power consumption(E)All of the aboveAns. (B) Create More Free Space is the main purpose however performance is also improved in most cases.

68 document.docx

Page 69: KVS TGT and PRT Preliminary Examination Model Paper

GATE Sample papers for Computer SciencePosted by Admin on October 1, 2009       3 Votes

Computer Science Engineering Sample Papers1 The problems 3-SAT and 2-SAT areA) both in PB) both NP-completeC) NP-complete and in P respectivelyD) undecidable and NP-complete respectivelyAnswer : (C)2 Consider the following relation schema pertaining to a students database:Student (rollno, name, address)Enroll (rollno, courseno, coursename)where the primary keys are shown underlined. The number of tuples in the Student and Enroll tables are 120 and 8 respectively. What are the maximum and minimum number of tuples that can be present in (Student * Enroll), where ‘*’denotes natural join?A) 8, 8B) 120, 8C) 960, 8D) 960, 120Answer : (C)3 Consider a relation scheme R = (A, B, C, D, E, H) on which the following functional dependencies hold : (A -> B, BC -> D, E -> C, D -> A). What are the candidate keys of R?A) AE, BEB) AE, BE, DEC) AEH, BEH, BCHD) AEH, BEH, DEHAnswer : (D)4 The goal of structured programming is toA) have well indented programsB) be able to infer the flow of control from the compiled codeC) be able to infer the flow of control from the program textD) avoid the use of GOTO statementsAnswer : (C)5 The tightest lower bound on the number of comparisons, in the worst ease, for comparison-based sorting is of the order ofA) nB) n 2C) n log n

69 document.docx

Page 70: KVS TGT and PRT Preliminary Examination Model Paper

D) n log2 nAnswer : (B)6 A circuit outputs a digit in the form of 4 bits. 0 is represented by 0000,1 by 0001,…, 9 by 1001. A combinational circuit is to be designed which takes these 4 bits as input and outputs 1 if the digit ³ 5, and 0 otherwise. If only AND, OR and NOT gates may be used, what is the minimum number of gates requiredA) 2B) 3C) 4D) 5Answer : (C)7 WA and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both A and B attempt to transmit a frame, collide, and A wins the first backoff race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probability that A wins the second backoff race isA) 0.5B) 0.625C) 0.75D) 1.0Answer : (A)8 If 73x (in base-x number system) is equal to 54y (in base-y number system), the possible values of x and y areA) 8, 16B) 10, 12C) 9, 13D) 8, 11Answer : (D)9 In a packet switching network, packets are routed from source to destination along a single path having two intermediate nodes. If the message size is 24 bytes and each packet contains a header of 3 bytes, then the optimum packet size isA) 4B) 6C) 7D) 9Answer : (D)10 A Priority-Queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal of the heap is given below: 10, 8,5,3,2 Two new elements 1 and 7 are inserted in the heap in that order. The level-order traversal of the heap after the insertion of the elements isA) 10,8,7,5,3,2,1B) 10,8,7,2,3,1,5C) 10,8,7,1,2,3,5D) 10,8,7,3,2,1,5Answer : (D)11 Consider an operating system capable of loading and executing a single sequential user process at a time. The disk head scheduling algorithm used is First Come First Served (FCFS). If FCFS is replaced by Shortest Seek Time First (SSTF), claimed by the vendor to give 50% better benchmark results, what is the expected improvement in the I/O performance of user programs ?A) 50%

70 document.docx

Page 71: KVS TGT and PRT Preliminary Examination Model Paper

B) 40%C) 25%br> D) 0%Answer : (D)12 How many distinct binary search trees can be created out of 4 distinct keys?A) 5B) 14C) 24D) 42Answer : (B)

71 document.docx

Page 72: KVS TGT and PRT Preliminary Examination Model Paper

GATE Information Technology Sample PapersPosted by Admin on October 1, 2009       Good

Information Technology Sample Paper – I1 A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? A) 14B) 30C) 62D) 126Answer : (C)2 Which one of the following is NOT shared by the threads of the same process ? A) StackB) Address SpaceC) File Descriptor TableD) Message QueueAnswer : (A)3 Let G be a weighted undirected graph and e be an edge with maximum weight in G. Suppose there is a minimum weight spanning tree in G containing the edge e. Which of the following statements is always TRUE? A) There exists a cutset in G having all edges of maximum weight.B) There exists a cycle in G having all edges of maximum weight.C) Edge e cannot be contained in a cycle.D) All edges in G have the same weight.Answer : (C)4 A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technology Change Management in order to achieve Level 5 ? A) Defect DetectionB) Defect PreventionC) Defect IsolationD) Defect PropagationAnswer : (B)5 Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffle-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is A) 3B) 4C) 5

72 document.docx

Page 73: KVS TGT and PRT Preliminary Examination Model Paper

D) 6Answer : (C)6 Consider the following message M = 1010001101. The cyclic redundancy check (CRC) for this message using the divisor polynomial x5 + x4 + x2 + 1 is : A) 01110B) 01011C) 10101D) 10110Answer : (C)7 Which of the following statements is FALSE regarding a bridgeA) Bridge is a layer 2 deviceB) Bridge reduces collision domainC) Bridge is used to connect two or more LAN segmentsD) Bridge reduces broadcast domainAnswer : (D)8 What is the availability of a software with the following reliability figures?Mean Time Between Failure (MTBF) = 25 daysMean Time To Repair (MTTR) = 6 hoursA) 1%B) 24%C) 99%D) 99.009%Answer : (B)9 A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms. The channel uses stop and wait protocol. The transmission time of the acknowledgement frame is negligible. To get a channel efficiency of at least 50%, the minimum frame size should beA) 80 bytesB) 80 bitsC) 160 bytesD) 160 bitsAnswer : (D)10 In a depth-first traversal of a graph G with n vertices, k edges are marked as tree edges. The number of connected components in G is A) kB) k+1C) n-k-lD) n-kAnswer : (C)11 Which of the following statements is TRUE about CSMA/CD A) IEEE 802.11 wireless LAN runs CSMA/CD protocolB) Ethernet is not based on CSMA/CD protocolC) CSMA/CD is not suitable for a high propagation delay network like satellite networkD) There is no contention in a CSMA/CD networkAnswer : (C)12 Which one of the following regular expressions is NOT equivalent to the regular expression (a + b + c)* ? A) (a* + b* + c*)*B) (a*b*c*)*

73 document.docx

Page 74: KVS TGT and PRT Preliminary Examination Model Paper

C) ((ab)* + c*)*D) (a*b* + c*)*Answer : (C)Information Technology Sample Paper – II1 In a population of N families, 50% of the families have three children, 30% of the families have two children and the remaining families have one child. What is the probability that a randomly picked child belongs to a family with two children?A) 3/23B) 6/23C) 3/10D) 3/5Answer : (B)2 Which one of the following is NOT shared by the threads of the same process ?A) StackB) Address SpaceC) File Descriptor TableD) Message QueueAnswer : (A)3 A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?A) 14.B) 30C) 62D) 126Answer : (C)4 A software organization has been assessed at SEI CMM Level 4. Which of the following does the organization need to practice beside Process Change Management and Technology Change Management in order to achieve Level 5 ?A) Defect DetectionB) Defect PreventionC) Defect IsolationD) Defect PropagationAnswer : (B)5 Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffle-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is A) 3B) 4C) 5D) 6Answer : (C)6 We have two designs D1 and D2 for a synchronous pipeline processor. D1 has 5 pipeline stages with execution times of 3 nsec, 2 nsec, 4 nsec, 2 nsec and 3 nsec while the design D2 has 8 pipeline stages each with 2 nsec execution time. How much time can be saved using design D2 over design D1 for executing 100 instructions? A) 214 nsecB) 202 nsec

74 document.docx

Page 75: KVS TGT and PRT Preliminary Examination Model Paper

C) 86 nsecD) -200 nsecAnswer : (A)7 Which of the following statements is FALSE regarding a bridgeA) Bridge is a layer 2 deviceB) Bridge reduces collision domainC) Bridge is used to connect two or more LAN segmentsD) Bridge reduces broadcast domainAnswer : (D)8 What is the availability of a software with the following reliability figures?Mean Time Between Failure (MTBF) = 25 daysMean Time To Repair (MTTR) = 6 hoursA) 1%B) 24%C) 99%D) 99.009%Answer : (B)9 In a particular Unix OS, each data block is of size 1024 bytes, each node has 10 direct data block addresses and three additional addresses: one for single indirect block, one for double indirect block and one for triple indirect block. Also, each block can contain addresses for 128 blocks. Which one of the following is approximately the maximum size of a file in the file system?A) 512 MBB) 2 GBC) 8 GBD) 16 GBAnswer : (D)10 On a TCP connection, current congestion window size is Congestion Window = 4 KB. The window size advertised by the receiver is Advertise Window = 6 KB. The last byte sent by the sender is LastByteSent = 10240 and the last byte acknowledged by the receiver is LastByteAcked = 8192. The current window size at the sender is A) 2048 bytesB) 4096 bytesC) 6144 bytesD) 8192 bytesAnswer : (B)11 Which of the following statements is TRUE about CSMA/CD A) IEEE 802.11 wireless LAN runs CSMA/CD protocolB) Ethernet is not based on CSMA/CD protocolC) CSMA/CD is not suitable for a high propagation delay network like satellite networkD) There is no contention in a CSMA/CD networkAnswer : (C)12 How many pulses are needed to change the contents of a 8-bit upcounter from 10101100 to 00100111 (rightmost bit is the LSB)? A) 134B) 133C) 124

75 document.docx

Page 76: KVS TGT and PRT Preliminary Examination Model Paper

D) 123Answer : (B)

76 document.docx