search anything

Monday, 21 October 2024

भारतीय संविधान एवं राजव्यवस्था

  1. भारत के गणतंत्र दिवस समारोह के समापन को चिह्नित करने वाला समारोह क्या कहलाता है?

बीटिंग रीट्रिट समारोह

2. भारत का संविधान किसके द्वारा हस्तलिखित है?

प्रेम बिहारी नारायण रायजादा

3. संविधान सभा के सदस्यों ने कितनी तारीख को भारत के संविधान पर हस्ताक्षर किए?

24 जनवरी 1950

4. भारत में प्रतिवर्ष संविधान दिवस किस तारीख को मनाया जाता है? 

26 नवंबर

5. किसी राज्य के राज्यपाल के रूप में नियुक्ति के लिये न्यूनतम आयु क्या है? 

35 वर्ष

6. संविधान से सरकार द्वारा अनुच्छेद 370 कब हटाया गया?  

05 अगस्त, 2019

7. विष्व का सबसे पुराना लिखित संविधान किस देष का है?   

संयुक्त राज्य अमरीका का (1787 में)

8. विष्व का सबसे नया लिखित संविधान किस देष का है?   

नेपाल का (2015)

9. भारतीय संविधान की एक मूल प्रति मध्यप्रदेष के किस शहर की सेंट्रल लायब्रेरी में रखी हुई है? 

ग्वालियर

10. भारतीय संविधान का संरक्षक कौन है? 

सुप्रीम कोर्ट

11. हाल ही हरियाणा में नायब सिंह सैनी को मुख्यमंत्री पद की शपथ दिलाने वाले राज्यपाल कौन हैं?  

बंडारू दत्तात्रेय 

12. राज्य सभा के सभापति कौन है?     

जगदीप धनखड़

13. भारतीय संविधान के अनुच्छेद 371G में किस राज्य की स्थिति के लिये विषेष प्रावधान हैं?    

मिजोरम

14. भोपाल का भारत में विलय किस तिथि व वर्ष को किया गया?    

14 जून 1949 को

15. म.प्र. से पृथक होकर छत्तीसगढ़ राज्य का गठन कब हुआ?    

1 नवंबर 2000


Sunday, 20 October 2024

Computer Science and Application MP Set Exam 2022 Q-141 to 150

 141. When searching a graph using DFS and BFS, which of the following statements is true ?

(A) DFS always guarantees to find the shortest path between two nodes.

(B) BFS is more memory-efficient than DFS.

(C) DFS is non-recursive algorithm while BFS is recursive.

(D) BFS explores all the neighboring nodes before moving to the next level in the graph.

Answer: (D)

142. What is the primary purpose of a Hopfield Network ?

(A) Classification

 (B) Associative memory

(C) Clustering

(D) Regression

Answer: (B)

143. Which of the following statements is true ?

(A) Hill climbing is a local search algorithm, meaning it focuses on improving the current solution by exploring neighbouring solutions.

(B) Hill climbing can be applied to both discrete and continuous optimization problems.

(C) Hill climbing is prone to getting trapped in local optima.

(D) All of the above are correct.

Answer: (D)

144. Which of the following operations is commonly used in Fuzzy set theoiy for combining Fuzzy sets ? (A) Cartesian product

(B) Union, intersection and complement

(C) Complement and Cartesian product

(D) Power set and Cartesian product

Answer: (B)

145. From the given below, which can be effectively used as a simple phonetic based spell checker ?

(A) A* algorithm

(B) Soundex algorithm

(C) Phonetic algorithm

(D) None of the above

Answer: (B)

146. A …………………. is a collection of written or spoken texts that serve as a source of linguistic data for analysis and study.

(A) N-Grams

(B) Dictionary

(C) Corpus

(D) Language model

Answer: (C)

147. Factors that influence backpropagation training :

(A) Bias

(B) Momentum

(C) Learning constants

(D) All of the above

Answer: (D)

148. The theoretical foundation of genetic algorithm rely on the binary string representation of solutions and the notion of schema. If 'r' is the number of 'don't care symbol' in the schema then every schema matches exactly………. strings.

(A) 2r

(B) 2'

(C) r2

(D) 2r – 1

Answer: (B)

149. The issue(s) involved with multi-agent planning is/are :

(i) Representing and planning for multiple simultaneous actions.

(ii) Cooperation, coordination and competition arising in true multiagent settings

(A) Only (i)

(B) Only (ii)

(C) Both (i) and (ii)

(D) Neither (i) nor (ii)

Answer: (C)

150. In a Horn clause, if the antecedent contains multiple literals, it is known as a :

(A) Definite clause

(B) Disjunctive clause

(C) Fact

(D) Rule

Answer: (D)

Saturday, 19 October 2024

Computer Science and Application MP Set Exam 2022 Q-131 to 140

 131. Coaxial cable 10 base-2, used on ethenet can also be known as :

(A) Thick coaxial cable

(B) Thin coaxial cable

(C) Twisted pair cable

(D) None of the above

Answer: (B)

132. Which layer of OSI reference model is responsible for data compression ?

(A) Application layer

(B) Presentation layer

(C) Session layer

(D) Transport layer

Answer: (B)

133. The propagation speed of electromagnetic signals depends on the :

(A) Frequency of the signal

(B) Communication medium

(C) Both (A) and (B)

(D) None of the above

Answer: (C)

134. Which generation of cellular networks is completely based on packet switching technology ?

(A) 4G

(B) 3G

(C) 2G

(D) 1G

Answer: (A)

135. Which is an overlay network on the top of public networks but with most of the properties of private network?

(A) VPN

(B) Proxy

(C) DNS

(D) Radius

Answer: (A)

136. What is the semantics HTTP error status code related to Forbidden, when manipulating resources ? (A) 400

(B) 500

(C) 404

(D) 403

Answer: (D)

137. In data communication, data rate depends on :

(A) The available bandwidth

(B) The level of signal

(C) The level of noise

(D) All of the above

Answer: (D)

138. How long does downloading an uncompressed text file of 1 Mega bit over a 32 kilobites/sec modem take ?

(A) 312.5 sec

(B) 212.5 sec

(C) 350.5 sec

(D) 250.5 sec

Answer: (A)

139. In an IP packet, receiver discards the packet that received with first 8 bits as 01000010. What is the possible reason?

(A) Incorrect IP version and incorrect header length

(B) Incorrect IP version and correct header length

(C) Correct IP version and incorrect header length

(D) None of the above

Answer: (C)

140. Which mode of communication is utilized by ethernet using CSMA/CD protocol ?

(A) Full duplex

(B) Half duplex

(C) Simplex

(D) None of the above

Answer: (B)

Friday, 18 October 2024

Computer Science and Application MP Set Exam 2022 Q-121 to 130

 121. What will be the value of n, if turing machines is defined using n-tuples ?

(A) 7

(B) 6

(C) 5

(D) 8

Answer: (A) 

122. Consider the following CFG :

S -> aB I bA

A ^ b I aS I bAA

B -> b I bS I aBB.

Which of the following strings of termi nals generated by this CFG ?

(A) Odd numbers of a's and odd number of b's

(B) Equal number of a's and equal number of b's

(C) Even number of a's and even number of b's

(D) Odd numbers of a's even number of b's

Answer: Deleted

123. Turing machine accepts :

(A) Universal languages

(B) Recursive languages

(C) Recursively enumerable languages

(D) Non-recursive languages

Answer: (C) 

124. Which of the following is not a

 regular language?

(A) L = {an bn+3|n>=0}

(B) L = { an an+3|n>=0}

(C) L = { an an+3 an |n>=0}

(D) All of the above

Answer: (A) 

125. A problem is NP-complete if:.

(A) Solution can be verified easily

(B) A quick algorithm to solve this problem can be used to solve all other NP problem quickly

(C) It can be solved in polynomial time

(D) All of the above

Answer: (D) 

126. Consider the following grammar :

S à ABSc I Abc

BA-> AB

Bb -> bb

Ab -> ab

Aa -> aa

Which of the following statements can be derived by this grammar ?

(A) aab

(B) abc

(C) abcc

(D) abbe

Answer: (B) 

127. Non-recursive predictive parsing is constructed using stack that contains :

(A) Parsing table

(B) Sequence of grammar symbols

(C) Only terminals

(D) E

Answer: (B) 

128. A dangling reference occurs when there is a reference to storage that has been

(A) Allocated

(B) Reallocated

(C) Deallocated

(D) None of the above

Answer: (C) 

129. Consider the following C-code segment:

a = b + c

c = a + I

d = b + c

f=d+1

g= e + +

Suppose this code segment is represented internally as directed acyclic graph, then the number of nodes in the DAG is :

(A) 4

(B) 5

(C) 6

(D) 3

Answer: Deleted

130. Which of the following represents intermediate codes ?

(A) Triples

(B) Quadriples

(C) Indirected Triples

(D) All of the above

Answer: (D) 

Friday, 11 October 2024

Computer Science and Application MP Set Exam 2022 Q-111 to 120

 111. What is the worst case time complexity • of a quicksort algorithm ?

(A) O (N)

(B) O (N log N)

(C) O (N2)

(D) O(logN)

Answer :  (C)

112. What is an AVL tree ?

(A)- A tree which is balanced and is a height balanced tree

(B) A tree which is unbalanced and is a height balanced tree .

(C) A tree with three children

(D) A tree with at most three childrens

Answer :  (A)

113. Which ofthe following design techniques is used in Quick Sort algorithm ?

(A) Greedy algorithm

(B) Divide and conquer algorithm

(C) Hash table

(D) Parsing

Answer :  (B)

114. In the input restricted deque :

(A) insertion at only one end, rear end

(B) deletion at only one end, front end

(C) insertion at both ends, rear and front end

(D) All of the above

Answer :  (A)

115. What is the number .of edges present in a complete graph having 'n' vertices ?

(A) (n*(n+1))/2

(B) {n*{n-1))/2

(C) n

(D) Information given is insufficient

Answer :  (B)

116. Which of the following sorting algorithms has the lowest worst case complexity ?

(A) Merge sort

(B) Bubble sort

(C) Quick sort

(D) Selection sort

Answer :  (A)

117. Suppose a circular queue of capacity (n- 1) elements is implemented with an array of n elements. Assume that the insertion and deletion operation are carried out using REAR and FRONT as array index variables, respectively. Initially REAR = FRONT = 0. The conditions to detect queue full and queue empty are :

(A) Full : (REAR +1) mod n = = FRONT

Empty : REAR ==FRONT == NULL

(B) Full : (REAR + 1) mod « = = FRONT

Empty : (FRONT + 1) mod n = = REAR

(C) Full : REAR = = FRONT

Empty : (REAR + 1) mod n = = FRONT

(D) Full ; (FRONT + 1) mod « = = REAR

Empty : REAR = FRONT

Answer :  (A)

118. The best data structure to check whether an arithmetic expression has balanced parentheses is a : (A) Queue

(B) Stack

(C) Tree

(D) Graph

Answer :  (B)

119. Which of the following is an application of stack ? –

(A) Finding factorial

(B) Tower of Hanoi

(C) Infix to post-fix

(D) All of the above

Answer :  (D)

120. The pre-fix notation is also called as :

(A) Polish notation

(B) Infix notation

(C) Post-fix notation

(D) None of the above

Answer :  (A)