101. Which of the following is used to define the members of a class externally in C++?

(A) :

(B) : :

(C) #

 (D) More than one of the above

(E) None of the above

102. Which concept of C++ is used to reuse the written code?

(A) Polymorphism

 (B) Inheritance

(C) Encapsulation

 (D) More than one of the above

(E) None of the above

103. What will be the output of the following program fragment?

(A) 30,10

 (B) 30,20

(C) 20,30

 (D) More than one of the above

 (E) None of the above

104. Choose the correct statement about inline function in C++.

 (A) It speeds up the execution.

(B) It slows down the execution.

 (C) It decreases the code size.

(D) More than one of the above

 (E) None of the above

105. What will be the output of the following?

 (A) FIRST 52 SECOND

(B) FIRST 20 SECOND

 (C) SECOND 25 FIRST

(D) More than one of the above

(E) None of the above

106. cout in C++ stands for

(A) class output

 (B) character output

(C) common output

 (D) More than one of the above

 (E) None of the above

107. Group of instructions that directs a computer is called

(A) memory

(B) storage

 (C) program

 (D) More than one of the above

 (E) None of the above

108. A computer program consists of

(A) system flowchart

(B) program flowchart

 (C) algorithms written in computer language

 (D) More than one of the above

 (E) None of the above

109. The topology with highest reliability is

(A) star

 (B) ring

 (C) mesh

(D) More than one of the above

 (E) None of the above

110. End-to-end connectivity is provided from host-to-host in

(A) network layer

(B) transport layer

 (C) session layer

(D) More than one of the above

 (E) None of the above

111. The _____ measures the number of lost or garbled messages as a fraction of the total sent in the sampling period.

(A) residual error rate

 (B) transfer failure probability

(C) connection release failure probability

(D) More than one of the above

(E) None of the above

112. A high-speed communication equipment typically would not be needed for

 (A) e-mail

 (B) transferring large volume of data

 (C) supporting communication between nodes in a LAN

(D) More than one of the above (

  1. E) None of the above

113. A _____ topology uses a single connection to connect all devices together.

 (A) bus

 (B) star

 (C) ring

 (D) More than one of the above

(E) None of the above

114. A _____ is used to connect networking devices that are in a very close geographic area such as a floor of a building.

 (A) WAN

(B) LAN

 (C) MAN

 (D) More than one of the above

 (E) None of the above

115. In computer network, what is the size of IP address in IPv4?

 (A) 8 bits

(B) 16 bits

 (C) 32 bits

 (D) More than one of the above

 (E) None of the above

116. What is the size of MAC address in computer network?

 (A) 32 bits

(B) 16 bits

 (C) 48 bits

(D) More than one of the above

 (E) None of the above

117. What is the name given to the act of gaining illegal entry to computer files through remote terminals or microcomputers?

 (A) Hacking

(B) Decoding

 (C) Beating the system

 (D) More than one of the above

 (E) None of the above

118. A computer virus is a software program which has the essential ability to

(A) damage data

(B) damage program

(C) clone itself

(D) More than one of the above

 (E) None of the above

119. Copying computer program/ software without the permission of its authors is called

 (A) larceny

(B) software piracy

(C) highway robbery

 (D) More than one of the above

  1. E) None of the above

120. A hard disk becomes totally inaccessible when a computer virus corrupts

 (A) partition table

(B) file allocation table

 (C) root directory

 (D) More than one of the above

(E) None of the above

121. An attribute of one table matching the primary key of another table is called as

(A) foreign key

(B) secondary key

(C) candidate key

(D) More than one of the above

 (E) None of the above

  1. If every non-key attribute is fully dependent on the primary key, then the relation will be in

 (A) First Normal Form (1NF)

 (B) Second Normal Form (2NF)

(C) Third Normal Form (3NF)

(D) More than one of the above

(E) None of the above

123. In relational database, the data type of values in each column of a table is called

 (A) attribute

 (B) domain

(C) relation

(D) More than one of the above

(E) None of the above

  1. In relational database, the number of attributes of a relation is called the _____ of relation.

 (A) domain

 (B) degree

 (C) cardinality

 (D) More than one of the above

(E) None of the above

125. Which of the following SQL commands is used to change the attribute values of one or more rows in a table?

 (A) Update

 (B) Insert

 (C) Alter

 (D) More than one of the above

 (E) None of the above

 126. To retrieve information from a database, which of the following SQL commands is used?

 (A) Display

 (B) Show

(C) Select

(D) More than one of the above

 (E) None of the above

 127. Which of the following SQL commands is used to modify the structure of a table?

 (A) Alter

(B) Modify

 (C) Update

 (D) More than one of the above

 (E) None of the above

128. Which of the following SQL keywords is used to display data from a table based on certain pattern?

(A) IN

 (B) LIKE

 (C) BETWEEN

 (D) More than one of the above

 (E) None of the above

 129. Degree and cardinality of a relation in relational database are 4 and 3 respectively. If 3 attributes and 4 tuples are added to the relation, what will be its new cardinality and degree?

(A) 7, 6

 (B) 7, 7

(C) 8, 6

 (D) More than one of the above

 (E) None of the above

130. Which SQL command is used to remove a table from a database?

(A) DELETE

 (B) DROP

(C) ERASE

 (D) More than one of the above

 (E) None of the above

131. The register that contains the address of the next instruction to be executed is called

 (A) program counter

(B) instruction register

 (C) accumulator

(D) More than one of the above

(E) None of the above

 132. The register that contains the instruction that is being executed is called

(A) accumulator

 (B) program counter

 (C) instruction register

(D) More than one of the above

(E) None of the above

133. The register which holds the address of location of memory to and from which data are to be transferred is known as

(A) index register

(B) memory address register

(C) memory buffer register

 (D) More than one of the above

(E) None of the above

134. A storage device used to compensate the difference in flow of data is known as

 (A) main memory

 (B) auxiliary memory

(C) buffer

(D) More than one of the above

(E) None of the above

 135. Memory in which any location can be reached in a fixed amount of time after specifying its address is called

 (A) Sequential Access Memory

 (B) Random Access Memory

 (C) Secondary Memory

 (D) More than one of the above

(E) None of the above

136. If then the values of X and Y are

 (A) 4, 3

(B) 3, 3

 (C) 4, 4

(D) More than one of the above

 (E) None of the above

  1. The range of the numbers that can be represented in 8-bit using 2’s complement representation is

(A) –128 to +128

(B) –127 to +127

 (C) –128 to +127

(D) More than one of the above

 (E) None of the above

138. If, then the values of X and Y are

 (A) 5, 1

 (B) 5, 7

 (C) 3, 1

(D) More than one of the above

 (E) None of the above

139. Which of the following 4-bit numbers equals its 2’s complement?

(A) 1010

(B) 0101

 (C) 1000

(D) More than one of the above

 (E) None of the above

140. The number of 1’s in the binary representation of the value of the decimal expression of

 is

 (A) 15

(B) 9

 (C) 12

(D) More than one of the above

(E) None of the above

141. The Boolean expression x+ x’ y  equals

(A) x+ y

(B) x+ xy

 (C) y+ yx

 (D) More than one of the above

 (E) None of the above

 142. The Boolean expression AB+ AB’+ A’C+AC is independent of Boolean variable

(A) A

 (B) B

 (C) C

 (D) More than one of the above

 (E) None of the above

143. The Boolean expression A+ BC equals

 (A) (A’+B)(A’+C)

 (B) (A+B ) (A’+C)

(C) (A+B ) (A+C)

(D) More than one of the above

 (E) None of the above

144. The Boolean expression will be equal to

 (A) x

(B) y

(C) x+y

 (D) More than one of the above

(E) None of the above

 145. The Boolean expression is equal to

 (A) x

 (B) y

 (C) xy

(D) More than one of the above

 (E) None of the above

146. If x is a Boolean variable, then (((x’)‘)’)’ will be

 (A) x’

 (B) x

 (C) x+x’

 (D) More than one of the above

 (E) None of the above

147. In two-valued Boolean algebra, the maximum number of Boolean functions for two variables will be

 (A) 8

(B) 12

 (C) 16

(D) More than one of the above

(E) None of the above

148. Simplified Boolean function of Boolean function F =A’C+A’B+ AB’C+BC is

(A) F =C+A’B

 (B) F =A’B+B’C

 (C) F =BC+A’B

(D) More than one of the above

 (E) None of the above

149. Which of the following logic gates is called universal gate?

 (A) AND

 (B) OR

 (C) NAND

(D) More than one of the above

 (E) None of the above

 150. The minimum number of NAND gates required to implement Boolean function f =x’y+xy’ is

(A) 3

 (B) 4

 (C) 6

(D) More than one of the above

 (E) None of the above

Scroll to Top
सरकारी नौकरी के परीक्षा में इस तरह के प्रश्न पूछे जाते हैं ये प्रसन्न कर डाला तो जीवन झिंगालाला इस तरह के सवाल पढ़ लीजिए तो नौकरी पक्की ! BPSC TRE 1 GS में पुछे गये सवाल Seven Easy Steps For Cracking Govt Job Exam-yahan se padho