search anything
Monday, 9 December 2024
Monday, 21 October 2024
भारतीय संविधान एवं राजव्यवस्था
1. भारत के गणतंत्र दिवस समारोह के समापन को चिह्नित करने वाला समारोह क्या कहलाता है?
बीटिंग रीट्रिट समारोह
2. भारत का संविधान किसके द्वारा हस्तलिखित है?
प्रेम बिहारी नारायण रायजादा
3. संविधान सभा के सदस्यों ने कितनी तारीख को भारत के संविधान पर हस्ताक्षर किए?
24 जनवरी 1950
4. भारत में प्रतिवर्ष संविधान दिवस किस तारीख को मनाया जाता है?
26 नवंबर
5. किसी राज्य के राज्यपाल के रूप में नियुक्ति के लिये न्यूनतम आयु क्या है?
35 वर्ष
6. संविधान से सरकार द्वारा अनुच्छेद 370 कब हटाया गया?
05 अगस्त, 2019
7. विष्व का सबसे पुराना लिखित संविधान किस देष का है?
संयुक्त राज्य अमरीका का (1787 में)
8. विष्व का सबसे नया लिखित संविधान किस देष का है?
नेपाल का (2015)
9. भारतीय संविधान की एक मूल प्रति मध्यप्रदेष के किस शहर की सेंट्रल लायब्रेरी में रखी हुई है?
ग्वालियर
10. भारतीय संविधान का संरक्षक कौन है?
सुप्रीम कोर्ट
11. हाल ही हरियाणा में नायब सिंह सैनी को मुख्यमंत्री पद की शपथ दिलाने वाले राज्यपाल कौन हैं?
बंडारू दत्तात्रेय
12. राज्य सभा के सभापति कौन है?
जगदीप धनखड़
13. भारतीय संविधान के अनुच्छेद 371G में किस राज्य की स्थिति के लिये विषेष प्रावधान हैं?
मिजोरम
14. भोपाल का भारत में विलय किस तिथि व वर्ष को किया गया?
14 जून 1949 को
15. म.प्र. से पृथक होकर छत्तीसगढ़ राज्य का गठन कब हुआ?
1 नवंबर 2000
Sunday, 20 October 2024
Computer Science and Application MP Set Exam 2022 Q-141 to 150
141. When searching a graph using DFS and BFS, which of the following statements is true ?
(A) DFS always guarantees to find the shortest path between two nodes.
(B) BFS is more memory-efficient than DFS.
(C) DFS is non-recursive algorithm while BFS is recursive.
(D) BFS explores all the neighboring nodes before moving to the next level in the graph.
Answer: (D)
142. What is the primary purpose of a Hopfield Network ?
(A) Classification
(B) Associative memory
(C) Clustering
(D) Regression
Answer: (B)
143. Which of the following statements is true ?
(A) Hill climbing is a local search algorithm, meaning it focuses on improving the current solution by exploring neighbouring solutions.
(B) Hill climbing can be applied to both discrete and continuous optimization problems.
(C) Hill climbing is prone to getting trapped in local optima.
(D) All of the above are correct.
Answer: (D)
144. Which of the following operations is commonly used in Fuzzy set theoiy for combining Fuzzy sets ? (A) Cartesian product
(B) Union, intersection and complement
(C) Complement and Cartesian product
(D) Power set and Cartesian product
Answer: (B)
145. From the given below, which can be effectively used as a simple phonetic based spell checker ?
(A) A* algorithm
(B) Soundex algorithm
(C) Phonetic algorithm
(D) None of the above
Answer: (B)
146. A …………………. is a collection of written or spoken texts that serve as a source of linguistic data for analysis and study.
(A) N-Grams
(B) Dictionary
(C) Corpus
(D) Language model
Answer: (C)
147. Factors that influence backpropagation training :
(A) Bias
(B) Momentum
(C) Learning constants
(D) All of the above
Answer: (D)
148. The theoretical foundation of genetic algorithm rely on the binary string representation of solutions and the notion of schema. If 'r' is the number of 'don't care symbol' in the schema then every schema matches exactly………. strings.
(A) 2r
(B) 2'
(C) r2
(D) 2r – 1
Answer: (B)
149. The issue(s) involved with multi-agent planning is/are :
(i) Representing and planning for multiple simultaneous actions.
(ii) Cooperation, coordination and competition arising in true multiagent settings
(A) Only (i)
(B) Only (ii)
(C) Both (i) and (ii)
(D) Neither (i) nor (ii)
Answer: (C)
150. In a Horn clause, if the antecedent contains multiple literals, it is known as a :
(A) Definite clause
(B) Disjunctive clause
(C) Fact
(D) Rule
Answer: (D)
Saturday, 19 October 2024
Computer Science and Application MP Set Exam 2022 Q-131 to 140
131. Coaxial cable 10 base-2, used on ethenet can also be known as :
(A) Thick coaxial cable
(B) Thin coaxial cable
(C) Twisted pair cable
(D) None of the above
Answer: (B)
132. Which layer of OSI reference model is responsible for data compression ?
(A) Application layer
(B) Presentation layer
(C) Session layer
(D) Transport layer
Answer: (B)
133. The propagation speed of electromagnetic signals depends on the :
(A) Frequency of the signal
(B) Communication medium
(C) Both (A) and (B)
(D) None of the above
Answer: (C)
134. Which generation of cellular networks is completely based on packet switching technology ?
(A) 4G
(B) 3G
(C) 2G
(D) 1G
Answer: (A)
135. Which is an overlay network on the top of public networks but with most of the properties of private network?
(A) VPN
(B) Proxy
(C) DNS
(D) Radius
Answer: (A)
136. What is the semantics HTTP error status code related to Forbidden, when manipulating resources ? (A) 400
(B) 500
(C) 404
(D) 403
Answer: (D)
137. In data communication, data rate depends on :
(A) The available bandwidth
(B) The level of signal
(C) The level of noise
(D) All of the above
Answer: (D)
138. How long does downloading an uncompressed text file of 1 Mega bit over a 32 kilobites/sec modem take ?
(A) 312.5 sec
(B) 212.5 sec
(C) 350.5 sec
(D) 250.5 sec
Answer: (A)
139. In an IP packet, receiver discards the packet that received with first 8 bits as 01000010. What is the possible reason?
(A) Incorrect IP version and incorrect header length
(B) Incorrect IP version and correct header length
(C) Correct IP version and incorrect header length
(D) None of the above
Answer: (C)
140. Which mode of communication is utilized by ethernet using CSMA/CD protocol ?
(A) Full duplex
(B) Half duplex
(C) Simplex
(D) None of the above
Answer: (B)
Friday, 18 October 2024
Computer Science and Application MP Set Exam 2022 Q-121 to 130
121. What will be the value of n, if turing machines is defined using n-tuples ?
(A) 7
(B) 6
(C) 5
(D) 8
Answer: (A)
122. Consider the following CFG :
S ->■ aB I bA
A ^ b I aS I bAA
B -> b I bS I aBB.
Which of the following strings of termi nals generated by this CFG ?
(A) Odd numbers of a's and odd number of b's
(B) Equal number of a's and equal number of b's
(C) Even number of a's and even number of b's
(D) Odd numbers of a's even number of b's
Answer: Deleted
123. Turing machine accepts :
(A) Universal languages
(B) Recursive languages
(C) Recursively enumerable languages
(D) Non-recursive languages
Answer: (C)
124. Which of the following is not a
regular language?
(A) L = {an bn+3|n>=0}
(B) L = { an an+3|n>=0}
(C) L = { an an+3 an |n>=0}
(D) All of the above
Answer: (A)
125. A problem is NP-complete if:.
(A) Solution can be verified easily
(B) A quick algorithm to solve this problem can be used to solve all other NP problem quickly
(C) It can be solved in polynomial time
(D) All of the above
Answer: (D)
126. Consider the following grammar :
S à ABSc I Abc
BA-> AB
Bb -> bb
Ab -> ab
Aa -> aa
Which of the following statements can be derived by this grammar ?
(A) aab
(B) abc
(C) abcc
(D) abbe
Answer: (B)
127. Non-recursive predictive parsing is constructed using stack that contains :
(A) Parsing table
(B) Sequence of grammar symbols
(C) Only terminals
(D) E
Answer: (B)
128. A dangling reference occurs when there is a reference to storage that has been
(A) Allocated
(B) Reallocated
(C) Deallocated
(D) None of the above
Answer: (C)
129. Consider the following C-code segment:
a = b + c
c = a + I
d = b + c
f=d+1
g= e + +
Suppose this code segment is represented internally as directed acyclic graph, then the number of nodes in the DAG is :
(A) 4
(B) 5
(C) 6
(D) 3
Answer: Deleted
130. Which of the following represents intermediate codes ?
(A) Triples
(B) Quadriples
(C) Indirected Triples
(D) All of the above
Answer: (D)
Friday, 11 October 2024
Computer Science and Application MP Set Exam 2022 Q-111 to 120
111. What is the worst case time complexity • of a quicksort algorithm ?
(A) O (N)
(B) O (N log N)
(C) O (N2)
(D) O(logN)
Answer : (C)
112. What is an AVL tree ?
(A)- A tree which is balanced and is a height balanced tree
(B) A tree which is unbalanced and is a height balanced tree .
(C) A tree with three children
(D) A tree with at most three childrens
Answer : (A)
113. Which ofthe following design techniques is used in Quick Sort algorithm ?
(A) Greedy algorithm
(B) Divide and conquer algorithm
(C) Hash table
(D) Parsing
Answer : (B)
114. In the input restricted deque :
(A) insertion at only one end, rear end
(B) deletion at only one end, front end
(C) insertion at both ends, rear and front end
(D) All of the above
Answer : (A)
115. What is the number .of edges present in a complete graph having 'n' vertices ?
(A) (n*(n+1))/2
(B) {n*{n-1))/2
(C) n
(D) Information given is insufficient
Answer : (B)
116. Which of the following sorting algorithms has the lowest worst case complexity ?
(A) Merge sort
(B) Bubble sort
(C) Quick sort
(D) Selection sort
Answer : (A)
117. Suppose a circular queue of capacity (n- 1) elements is implemented with an array of n elements. Assume that the insertion and deletion operation are carried out using REAR and FRONT as array index variables, respectively. Initially REAR = FRONT = 0. The conditions to detect queue full and queue empty are :
(A) Full : (REAR +1) mod n = = FRONT
Empty : REAR ==FRONT == NULL
(B) Full : (REAR + 1) mod « = = FRONT
Empty : (FRONT + 1) mod n = = REAR
(C) Full : REAR = = FRONT
Empty : (REAR + 1) mod n = = FRONT
(D) Full ; (FRONT + 1) mod « = = REAR
Empty : REAR = FRONT
Answer : (A)
118. The best data structure to check whether an arithmetic expression has balanced parentheses is a : (A) Queue
(B) Stack
(C) Tree
(D) Graph
Answer : (B)
119. Which of the following is an application of stack ? –
(A) Finding factorial
(B) Tower of Hanoi
(C) Infix to post-fix
(D) All of the above
Answer : (D)
120. The pre-fix notation is also called as :
(A) Polish notation
(B) Infix notation
(C) Post-fix notation
(D) None of the above
Answer : (A)
Thursday, 10 October 2024
Computer Science and Application MP Set Exam 2022 Q-101 to 110
101. Requirements which specify the constraints imposed on the software are called :
(A) Domain requirements
(B) Functional requirements
(C) Non-functional requirements
(D) None of the above
Answer : (C)
102. Exchange of data between two modules in a structure chart is shown by :
(A) Data couple
(B) Flag
(C) Condition
(D) None of the above
Answer : (A)
103. If P is risk probability, L is loss, then Risk Exposure (RE) is computed as :
(A) RE = P/L
(B) RE = P * L
(C) RE = P + L
(D) RE = P * L/2
Answer : (B)
104. Cost of software mainjejiance-is very high. A large amount of software life cycle costs is expanded, in the maintenance activities. The maximum effort spent on which of the following maintenance activities ?
(A) Preventive maintenance
(B) Corrective maintenance
(C) Adaptive maintenance
(D) Perfective maintenance
Answer : (D)
105. All activities which are on critical i«th have slack time equal to :
(A) 0
(B) 1
(C) 2
(D) None of the above
Answer : (A)
106. Which of the following architectures is characteristized by a series of transformations on orderly defined set of input data ? .
(A) Data centered architecture
(B) Data flow architecture
(C) layer architecture
(D) Call and return architecture
Answer : (B)
107. If a program has two integer inputs on a machine with a 32-bit word, then how many, possible test cases does ;this program have ?
(A) 216
(B) 232
(C) 264
(D) 2128
Answer : (C)
108. Which of the following is a calculated value of programmer effort/COCOMO effort for an organic project under the category of application program with estimated size of 10 K Line of Code (LOC) ?
(A) 13.0
(B) 26.9
(C) 41.2
(D) 55.8
Answer : (B)
109. In basic COCOMO model, effort for, embedded system is given by :
(A) 2.4 * (KLOC)1.05
(B) 3.0 * (KLOC)1.120
(C) 3.6 * (KLOC)1.20
(D) None of the above
Answer : (C)
110. If the software had 5 failures in 100 tests during 10 days of testing, what would be a good estimate of the reliability of the software over the next day (assume 10 test per day, average from last 10 days) ?
(A) 0.05
(B) 0.027
(C) 0.005
(D) 0.598
Answer : (D)
Wednesday, 9 October 2024
Computer Science and Application MP Set Exam 2022 Q-91to 100
91. A system call is invoked by :
(A) Polling
(B) Software interrupt
(C) Instruction
(D) Jump
Answer: (B)
92. Suppose we have 12 identical resources and 3 processes Pj, P2 and P3. The maximum claims of the processes are 10, 5, 3 respectively. Currently, the process Pj holds 8 resources, P2 holds 2 resources and P3 holds 1 resource. Which of the following is/are correct ?
(i) The system is in safe state.
(ii) The system is in unsafe state.
(iii) The minimum one more resource is needed to make it safe state.
(iv) The unsafe system does not employ the existence of deadlock.
(A) (i) and (iv)
(B) (ii) and (iii)
(C) (ii) and (iv)
(D) (ii), (iii) and (iv)
Answer: (D)
93. One thread immediately terminates the target thread is called ;
(A) Asynchronous cancellation
(B) Deferred cancellation
(C) Synchronous cancellation
(D) None of the above
Answer: (A)
94. Consider the situation where several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place. The situation is called :-.
(A) Deadlock
(B) Process synchronization
(C) Race condition
(D) Unsafe condition
Answer: (C)
95. The TLB hit ratio is 98%. It takes 20 nanoseconds to search the TLB and 100 nanoseconds to access memory. What will be the effective memory access time ?
(A) 100 nanoseconds
(B) 122 nanoseconds
(C) 130 nanoseconds
(D) 140 nanoseconds
Answer: (B)
96. A computer system has 6 identical resources. There are n processes competing for them. Each process may need 2 resources. What will be the maximum value of n so that the system is deadlock free ?
(A) 2
(B) 3
(C) 4
(D) 5
Answer: (D)
97. A critical region is :
(A) One which is enclosed by a pair of P and V operations on semaphores.
(B) A program segment that has not been proved bug-free.
(C) A program segment that often causes unexpected system crashes.
(D) A program segment where shared resources are accessed.
Answer: (D)
98. A virus that mutates with every infection is :
(A) Stealth virus
(B) Metamorphic virus
(C) Polymorphic virus
(D) Ultramorphic virus
Answer: (C)
99. The represents a commonly used group of codes in a source programming language.
(A) Loop
(B) Branch Statements
(C) Macro
(D) Functions
Answer: (D)
100. A system uses paging and segmentation, the virtual address space consists of up to 8 segments where each segment can be up to 2^9 bytes long. The hardware page each segment into 256-byte pages. How many bits in the virtual address are needed for page numbers ?
(A) 3
(B) 8
(C) 32
(D) 21
Answer: (D)
Monday, 7 October 2024
Computer Science and Application MP Set Exam 2022 Q-81to 90
81. A collection of concepts that can be used to describe the structure of a database is :
(A) Data type
(B) Database
(C) Data model
(D) Data schema
Answer: (C)
82. To find the details of all employees where salary is above Rs. 50,000, which of the following tuple calculus expression is correct ?
(A) {t I EMPLOYEE (t) AND t. Salary > 50000}
(B) (Select EMPLOYEE (t) AND t. Salary > 50000}
(C) (Select EMPLOYEE AND Salary > 50000}
(D) All of the above
Answer: (A)
83. In ER-diagram, derived attributes are represented by :
(A) Dotted Oval
(B) Double Oval
(C) Double Dotted Oval
(D) Double Rectangle
Answer: (A)
84. Given the relational schenia R(A, B, C, D) and FDs A => B and BC => D. Determine which of the dependencies shown below cannot be derived from these FDs ?
(A) AC => D
(B) B => D
(C) AC => B
(D) Both (B) and (C)
Answer: (B)
85. A given population of events or items are partitioned into sets of similar elements is known as :
(A) Pattern with time series
(B) Clustering
(C) Classification Hierarchies
(D) Association Rules
Answer: (B)
86. A database which permits the database system to store history of changes and allows users to queiy both current and past states of the database is known as :
(A) Temporal database
(B) Spatial database
(C) Deductive database
(D) Expert database
Answer: (A)
87. Which of the following is also known as galaxy schema?
(A) Start schema
(B) Snow Flake schema
(C) Fact constellation schema
(D) Redundant schema
Answer: (C)
88. In data-warehouse data sources can be constructed using:
(A) Similar schema and data model
(B) Different schema and data model
(C) Similar schema and different data model
(D) All of the above
Answer: (D)
89. …………….. is the main file that drives the Map reduce process.
(A) Mapper
(B) Reducer
(C) Driver
(D) Executer
Answer: (C)
90. A database that has a set of associated triggers is known as :
(A) Active database
(B) Operational database
(C) Functional database
(D) Dynamic database
Answer: (A)
Sunday, 6 October 2024
Computer Science and Application MP Set Exam 2022 Q-71 to 80
71. OPEN GL was released by :
(A) Microsoft
(B) Silicon Graphics
(C) Apple
(D) Google
Answer: (B)
72. Scalable Vector Graphics (SVG) is :
(A) C language
(B) Java language
(C) C++ language
(D) XML language
Answer: (D)
73. Unified Modeling Language (UML) is a:
(A) Programming language
(B) Visual Modeling Tool
(C) Compiler
(D) Operating System
Answer: (B)
74. Constructors are not used in the :
(A) C language
(B) C++ language
(C) Java language
(D) C# language
Answer: (A)
75. In C-H-, short occupies two bytes gives range from :
(A) - 32768 to + 32768
(B) - 1024 to + 1024
(C) - 1 MB to + 1 MB
(D) - 2,147,483,648 to + 2,147,483,648
Answer: (A)
76. Which operator cannot be overloaded in C++ ?
(A) Arithmetic Operators
(B) Relational Operators
(C) Scope Resolution Operators
(D) Subscript Operators
Answer: (C)
77. The valid statement about XML :
(A) All XML elements must be properly closed
(B) All XML elements must be in lower case
(C) All XML documents must have a DTD
(D) All the statements are true
Answer: (A)
78. We want to assign 100 to first element of the following array, select not acceptable :
int a [] = {10, 20, 30, 40}, i = 1 :
(A) i - 1 [a] = 100;
(B) 0 [a] = 100;
(C) (i-l)[a]=100;
(D) [a] 0 = 100;
Answer: (D)
79. Which is not loop in C ?
(A) for
(B) while
(C) do-while
(D) until-repeat
Answer: (D)
80. Which of the following is Computer Graphics curve ?
(A) Bezier curves
(B) Implicit curves
(C) Explicit curves
(D) All of the above
Answer: (D)
Friday, 4 October 2024
Computer Science and Application MP Set Exam 2022 Q-61to70
61. Which logic gate is also known as inverter ?
(A) AND GATE
(B) OR GATE
(C) NOT GATE
(D) XOR GATE
Answer: (C)
62.The number of input to an n to 1 multiplexer is given by :
(A) n
(B) n + 1
(C) 2^n
(D) 2^(n-l)
Answer: (C)
63. The technology used to fabricate integrated circuits is called :
(A) Digital Signal Processing
(B) Microcontroller Programming
(C) VLSI (Very Large Scale Integration)
(D) FPGA (Field Programmble Gate Array)
Answer: (C)
64. Which error detection code is based on polynominal division ?
(A) Parity check
(B) Checksum
(C) CRC (Cyclic Redundancy Check)
(D) Hamming code
Answer: (C)
65. The hexadecimal number E5 in decimal is equal to :
(A) 229
(B) 197
(C) 2290
(D) 1970
Answer: (A)
66. Which register is responsible for temporarily storing the result of arithmetic and logical operations ?
(A) Program Counter (PC)
(B) Accumulator (ACC)
(C) Memory Address Register (MAR)
(D) Instruction Register (IR)
Answer: (B)
67. CPI recently became more important performance metric than the clock cycle rate for processor performance index, because :
(A) Increasing processor clock cycle rate is almost reaching the physical limit.
(B) CPI and clock cycle rate are the terms having exactly the same meaning.
(C) Processor clock cycle rate can be increased without any limit.
(D) CPI is always equal to 1 and clock cycle rate is same as CPI.
Answer: (A)
68. The microinstruction format in microprogrammed control is usually determined by the :
(A) Instruction set architecture
(B) Processor clock frequency
(C) Size of the control memory
(D) Type of the microprocessor used
Answer: (A)
69. Which of the following statements accurately describes Direct Memory Access (DMA) in computer system ?
(A) DMA is a technique used to improve the performance of a cache memory.
(B) DMA is a type of interrupt used for handling errors in data transmission.
(C) DMA allows peripheral devices to transfer data directly to and from memory without involving the CPU.
(D) DMA is a mechanism that enables multi-threading and parallel processing in a processor.
Answer: (C)
70. In a multiprocessor system with private cache, which of the following mechanism is commonly used to maintain cache coherence ?
(A) Write Back Protocol
(B) Snooping Protocol
(C) Exclusive Access Protocol
(D) Direct Memory Access (DMA)
Answer: (B)
Thursday, 3 October 2024
MPSET Exam 2022-2024 Questions with Answers
Computer Science & Application
1. The exclusive or of prepositions p and q (p⊕q) is true if :
(A) Both p and q are true
(B) Both p and q are false
(C) Exactly one of p and q is true
(D) All of the above
Answer : (C)
2. Which of the following is logically equivalent to ¬(p v(¬p^q)) ? :
(A) p^q
(B) ¬p^¬q
(C) ¬p^q
(D) p^¬q
Answer : (B)
3. For set A and B, A - B is equal to which of the following ?
(A) 120
(B) 720
(C) 5040
(D) 24
Answer : (A)
5. A simple path in a graph G that passes through every vertex exactly once is known as :
(A) Eulerian path
(B) Planner path
(C) Unique Node path
(D) Hamilton path
(A) [log(n-1)!]
(B) [logn!]
(C) [log(n-1)!]/n
(D) [log n!]/n
(A) Divides
(B) Multiplies
(C) Adds
(D) All of these
(A) 2n
(B) 2n-1
(C) 22n
(D) 22n-1
(A) Multiple optimal solution
(B) Feasible solution
(C) Infeasible solution
(D) Unbounded solution
Answer : (D)
10. In transportation model having m rows and « column, degeneracy is a condition where the number of positive variables in the basic solution is less than :
(A) m+n-1
(B) m+n-2
(C) m+n-3
(D) m+n-4
Answer : (A)