NICNIELIT ScientistB 2020
Question 1 
Directions for question number 1 and 2:
Study the information below and answer questions based on it.
Five of India’s leading models are posing for a photograph promoting “World Peace and Understanding”. But then, Sachin Malhotra the photographer is having a tough time getting them to stand in a straight line, because Natasha refuses to stand next to Jessica since Jessica had said something about her in a leading gossip magazine. Rachel and Anna want to stand together because they are good friends. Ria on the other hand cannot get along well with Rachel, because there is some talk about Rachel scheming to get a contract already awarded to Ria. Anna believes her friendly astrologer who has asked her to stand at the extreme right for all group photographs. Finally, Sachin managed to pacify the girls and got a beautiful picture of five beautiful girls smiling beautifully in a straight line, promoting world peace.
Q1: If Natasha stands at the extreme left, who is standing second from left?
Cannot say  
Jessica  
Rachel  
Ria 
Question 2 
Directions for question number 1 and 2:
Study the information below and answer questions based on it.
Five of India’s leading models are posing for a photograph promoting “World Peace and Understanding”. But then, Sachin Malhotra the photographer is having a tough time getting them to stand in a straight line, because Natasha refuses to stand next to Jessica since Jessica had said something about her in a leading gossip magazine. Rachel and Anna want to stand together because they are good friends. Ria on the other hand cannot get along well with Rachel, because there is some talk about Rachel scheming to get a contract already awarded to Ria. Anna believes her friendly astrologer who has asked her to stand at the extreme right for all group photographs. Finally, Sachin managed to pacify the girls and got a beautiful picture of five beautiful girls smiling beautifully in a straight line, promoting world peace.
Q2: If Anna’s astrologer tells her to stand second from left and Natasha decides to stand second from right, then who is the girl standing at the extreme right?
Rachel  
Jessica  
Ria  
None of the options 
Question 2 Explanation:
Option C will be most appropriate among the given options.
Question 3 
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q3. If in the year 2018, population of F is increased by 10% and population of B is increased by 12% as compared to the previous year, then ______ is the ratio of population of F and B in 2017.
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q3. If in the year 2018, population of F is increased by 10% and population of B is increased by 12% as compared to the previous year, then ______ is the ratio of population of F and B in 2017.
42 : 55  
62 : 55  
42 : 11  
44 : 5 
Question 3 Explanation:
F 2018 = (15/100)*3276000
B 2018 = (20/100)*3276000
F increased by 10% in 2018.
B increases by 12% in 2018.
So, F 2017→ 1.1 times= 15*32760
B 2017→ 1.12 times = 20*32760
F 2017 : B2017 = [(15*3276)*10]/11 : [(20*32760)*100]/112
= 42:55
B 2018 = (20/100)*3276000
F increased by 10% in 2018.
B increases by 12% in 2018.
So, F 2017→ 1.1 times= 15*32760
B 2017→ 1.12 times = 20*32760
F 2017 : B2017 = [(15*3276)*10]/11 : [(20*32760)*100]/112
= 42:55
Question 4 
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q4. _______ is the percentage of total number of males in F, B and D together to the total population of all the given states.
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q4. _______ is the percentage of total number of males in F, B and D together to the total population of all the given states.
24%  
17.5%  
28.5%  
29.5% 
Question 4 Explanation:
Let population=X
Males of F in 2018 = (⅗)*15*(X/100) = 9X/100
Males of B in 2018 = (¾)*20*(X/100) = 15X/100
Males of D in 2018 = (⅜)*12*(X/100)=4.5X/100
Total=(28.5*X)/100
X=28.5%
Males of F in 2018 = (⅗)*15*(X/100) = 9X/100
Males of B in 2018 = (¾)*20*(X/100) = 15X/100
Males of D in 2018 = (⅜)*12*(X/100)=4.5X/100
Total=(28.5*X)/100
X=28.5%
Question 5 
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q5. The number of males in F in the year 2018 is ______.
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q5. The number of males in F in the year 2018 is ______.
294650  
294840  
301470  
301200 
Question 5 Explanation:
Males of F in 2018 = (9X/100) = (9/100)*3276000
=10’s digit is 4
So, OptionB is correct.
=10’s digit is 4
So, OptionB is correct.
Question 6 
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q6. _____ is the ratio of the number of females in G to the number of females in C.
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q6. _____ is the ratio of the number of females in G to the number of females in C.
16 : 5  
16 : 7  
15 : 11  
15 : 14 
Question 6 Explanation:
=327600*9*(4/7) : 327600*8*(3/5)
=(9*4)/7 * 5/(8*3)
= 15:14
=(9*4)/7 * 5/(8*3)
= 15:14
Question 7 
Directions for question number 3 to 7:
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q7. _____ is the total number of noneducated people in A and B in 2018.
Study the following and the table and answer the questions given below. (Data of different states regarding population of states in the year 2018)
Total population of the given States = 3276000
Q7. _____ is the total number of noneducated people in A and B in 2018.
1276040  
1032170  
1081550  
1161160 
Question 7 Explanation:
Non educated people= A 2018 + B 2018
= (7/9) * (25X/100) + ⅘ * (20X / 100) * 9/9
= 1161160
= (7/9) * (25X/100) + ⅘ * (20X / 100) * 9/9
= 1161160
Question 8 
The admission ticket for an Art Gallery bears a password which is changed after every clock hour based on set of words chosen for each day. The following is an illustration of the code and steps of rearrangement for subsequent clock hours.
The Time is 9 a.m. to 3 p.m. Day’s first password:
First Batch  9 a.m. to 10 a.m.
is not ready cloth simple harmony burning
Second Batch  10 a.m. to 11 a.m.
ready not is cloth burning harmony simple
Third Batch  11 a.m. to 12 noon
cloth is not ready simple harmony burning
Fourth Batch  12 noon to 1 p.m.
not is cloth ready burning harmony simple
Fifth Batch  1 p.m. to 2 p.m.
ready cloth is not simple harmony burning and so on.
If the password for 11 a.m. to 12 noon was  “soap shy miss pen yet the she”, what was the password for the First Batch?
The Time is 9 a.m. to 3 p.m. Day’s first password:
First Batch  9 a.m. to 10 a.m.
is not ready cloth simple harmony burning
Second Batch  10 a.m. to 11 a.m.
ready not is cloth burning harmony simple
Third Batch  11 a.m. to 12 noon
cloth is not ready simple harmony burning
Fourth Batch  12 noon to 1 p.m.
not is cloth ready burning harmony simple
Fifth Batch  1 p.m. to 2 p.m.
ready cloth is not simple harmony burning and so on.
If the password for 11 a.m. to 12 noon was  “soap shy miss pen yet the she”, what was the password for the First Batch?
pen miss shy soap she the yet  
shy miss pen soap yet the she  
soap pen miss shy she the yet  
miss shy soap pen she the yet 
Question 8 Explanation:
cloth is not ready simple harmony burning
Soap shy miss pen yet the she
is not ready cloth simple harmony burning
shy miss pen soap yet the she
Soap shy miss pen yet the she
is not ready cloth simple harmony burning
shy miss pen soap yet the she
Question 9 
There are 6 boxes numbered 1, 2, …...., 6. Each box is to be filled up either with a red or a green ball in such a way that at least 1 box contains a green ball and the boxes containing green balls are consecutively numbered. The total number of ways in which this can be done is:
18  
19  
20  
21 
Question 9 Explanation:
1G 5R → 6 ways
2G 4R → 5 ways
3G 3R → 4 ways
4G 2R → 3 ways
5G 1R → 2 ways
6G 0R → 1 way
Total = 21 ways
Question 10 
If a cube with length, height and width equal to 10 cm, is reduced to a smaller cube of height, length and width of 9 cm then reduction in volume is:
172 cm^{2}  
729 cm^{2}  
271 cm^{2}  
None of the options 
Question 10 Explanation:
= 10^{3}  9^{3}
= 271 cm^{3}
= 271 cm^{3}
Question 11 
If 09/12/2001 (DD/MM/YYYY) happens to be Sunday, then 09/12/1971 would have been a:
Wednesday  
Tuesday  
Saturday  
Thursday 
Question 11 Explanation:
In 30 years there are 22 non leap years and 8 leap years are there.
for every non leap year 1 odd day. and for leap year 2 odd days.
total no.of odd days = (22*1) + ( 8 * 2) = 38.
odd days = 38/7 = 3.
sunday  3 = Thursday.
Note: Might be you did sunday + 3 = wednesday. ( here we need to calculate 30 day previous day )
for every non leap year 1 odd day. and for leap year 2 odd days.
total no.of odd days = (22*1) + ( 8 * 2) = 38.
odd days = 38/7 = 3.
sunday  3 = Thursday.
Note: Might be you did sunday + 3 = wednesday. ( here we need to calculate 30 day previous day )
Question 12 
Select a suitable figure from the four alternatives that would complete the figure matrix.
Question 13 
What is the value of k for which the following system of equations has no solution:
2x  8y = 3 and kx + 4y = 10
2x  8y = 3 and kx + 4y = 10
2  
1  
1  
2 
Question 13 Explanation:
2X  8Y = 3
KX + 4Y = 10
(a1 / a2) = (b1 / b2) ≠ (c1/c2)
2/K = (8/4)
K= 1
KX + 4Y = 10
(a1 / a2) = (b1 / b2) ≠ (c1/c2)
2/K = (8/4)
K= 1
Question 14 
A player rolls a die and receives the same number of rupees as the number of dots on the face that turns up. What should the player pay for each roll if he wants to make a profit of one rupee per throw of the die in the long run?
₹ 2.50
 
₹ 2  
₹ 3.50  
₹ 4 
Question 15 
Gopal went to a fruit market with certain amount of money. With this money he can buy either 50 oranges or 40 mangoes. He retains 10% of the money for taxi fare. If he buys 20 mangoes, then the number of oranges he can buy with balance amount is:
25  
20  
18  
6 
Question 15 Explanation:
50 0range = 40 Mangoes = X
Orange = X/50
Mangoes = X/40
→ X  0.1 X  20 M
→ X  0.1 X  (20*(X/40))
→ 0.4 X
→ 0.4 * 50 Oranges
= 20 Oranges
Orange = X/50
Mangoes = X/40
→ X  0.1 X  20 M
→ X  0.1 X  (20*(X/40))
→ 0.4 X
→ 0.4 * 50 Oranges
= 20 Oranges
Question 16 
Number of letters repeated in the given word ‘MEASUREMENTS’ are indicated in front of each alternative. Identify the correct alternative.
M_{2}E_{2}A_{2}S_{2}U_{1}R_{1}N_{1}T_{1}  
M_{2}E_{3}A_{1}S_{1}U_{2}R_{1}N_{2}T_{1}
 
M_{2}E_{2}A_{1}S_{2}U_{1}R_{1}N_{1}T_{1}  
M_{2}E_{3}A_{1}S_{2}U_{1}R_{1}N_{1}T_{1} 
Question 16 Explanation:
Verify the options by counting the number of characters and matching with the subscript of the every character.
M_{2}E_{3}A_{1}S_{2}U_{1}R_{1}N_{1}T_{1}
M_{2}E_{3}A_{1}S_{2}U_{1}R_{1}N_{1}T_{1}
Question 17 
If X says that his mother is the only daughter of Y’s mother, then how is Y related to X?
Brother  
Son  
Uncle  
Father 
Question 18 
A solid cube of each side 8 cm, has been painted red, blue and black on pairs of opposite faces. It is then cut into cubical blocks of each side 2 cm. How many cubes have no face painted?
0  
4  
8  
12 
Question 18 Explanation:
8 → 3 face painted
24 → 2 face painted
24 → 1 face painted
8 → No face painted
24 → 2 face painted
24 → 1 face painted
8 → No face painted
Question 19 
Find out the alternative figure which contains the given figure as its part.
Question 20 
Identify the figure that completes the pattern.
Question 21 
A university library budget committee must reduce exactly five of eight areas of expenditure  I, J, K, K, M, N, O and P  in accordance with the following conditions:
If both I and O are reduced, P is also reduced.
If L is reduced, neither N nor O is reduced.
If M is reduced, J is not reduced.
Of the three areas J, K and N exactly two are reduced.
If both K and N are reduced, which one of the following is a pair of areas neither of which could be reduced?
If both I and O are reduced, P is also reduced.
If L is reduced, neither N nor O is reduced.
If M is reduced, J is not reduced.
Of the three areas J, K and N exactly two are reduced.
If both K and N are reduced, which one of the following is a pair of areas neither of which could be reduced?
I, L  
J, L  
J, M  
I, J 
Question 21 Explanation:
L i X reduced, Neither N or O are reduced.
K, N are reduced → J can’t be red.
So, the correct answer is J and L
Question 22 
Which of these statements reflects a contrast between two flowers?
This tulip is as colourful as a rose.  
This tulip does not smell as bad as a daffodil.  
This tulip turns towards light just like sunflower.  
This tulip is grown in bunches, like a lotus. 
Question 23 
Choose the missing terms out of the given alternatives.
EJO, TYD, INS, XCH, …….?
EJO, TYD, INS, XCH, …….?
NRW  
MRW  
MSX  
NSX 
Question 23 Explanation:
Question 24 
Choose which of the following will be sufficient to find: What time did the bus leave today?
Statements:
The bus normally leaves on time.
The scheduled departure is at 12:30.
Statements:
The bus normally leaves on time.
The scheduled departure is at 12:30.
I alone is sufficient while II alone is not sufficient  
II alone is sufficient while I alone is not sufficient  
Either I or II is sufficient  
Neither I nor II is sufficient 
Question 25 
In the following question below are given three statements followed by three conclusions numbered I, II and III. You have to take the two statements to be true even if they seem to be at variance from the commonly known facts. Read all the conclusions and then decide which of the given conclusions logically follow from the two given statements, disregarding commonly known facts.
Statements:
Some pigeons are eagles.
All eagles are sparrows.
Some sparrows are not pigeons.
Conclusions:
Some sparrows are pigeons.
All pigeons are sparrows.
All eagles are pigeons.
Statements:
Some pigeons are eagles.
All eagles are sparrows.
Some sparrows are not pigeons.
Conclusions:
Some sparrows are pigeons.
All pigeons are sparrows.
All eagles are pigeons.
Only I follows  
Only II follows  
Only III follows  
Both I and III follows 
Question 25 Explanation:
Question 26 
Find the odd one out in the given series:
ZA, RS, DE, JK, PR, LM, YZ, NO
ZA, RS, DE, JK, PR, LM, YZ, NO
JK  
LM  
ZA  
PR 
Question 26 Explanation:
Question 27 
In an office, 30% of the employees were women and 70% of the employees were above the age of 40 years, out of which 60% are men. Find the percentage of women employees who are above 40 years out of the total number of women employees.
96%  
93.33%  
70.44%  
80.66%

Question 27 Explanation:
30% Employee → Women
70% Employee → greater than 40 → 60% Men AND 40% Women
70% → Men
Percentage of women( > 40 out of total women) = [(0.4*0.7Employee)/0.3Employee]*100
= (28/3)*10
= 93.33%
70% Employee → greater than 40 → 60% Men AND 40% Women
70% → Men
Percentage of women( > 40 out of total women) = [(0.4*0.7Employee)/0.3Employee]*100
= (28/3)*10
= 93.33%
Question 28 
What is the next number
16, 30, 54, 88, 132
16, 30, 54, 88, 132
186  
188  
190  
206 
Question 28 Explanation:
Question 29 
Three squares are there as shown on the three sides of the triangle; find the area of the triangle from the respective areas of the squares.
15√5  
12√5  
2√5  
1 
Question 29 Explanation:
S=(a+b+c)/2
=(7+8+9)/2
=12
√(S(Sa)(Sb)(Sc))
√(12(5)(4)(3)
12√5
Question 30 
Two tapes A and B can fill a tank in 12 minutes and 15 minutes respectively. The tank can be emptied by a third tap C in 6 minutes. If A and B are kept open for 5 minutes in the beginning and then C is opened along with A and B being kept open, the time taken to empty the tank is:
60 minutes  
45 minutes  
30 minutes  
75 minutes 
Question 30 Explanation:
A → 12 min = 1/12
B → 15 min = 1/15
C → 6 min = (⅙)
=((1/12)+(1/15))*5
=((15+12)/(12*15))*5
=27/36
=¾
= (1/12) + (1/15)  (⅙)
= (15+12(15*2))/15*12
= 3 / (15*12)
= (1/60)
1 Tank → 60 min
¾ Tank → 45 min
B → 15 min = 1/15
C → 6 min = (⅙)
=((1/12)+(1/15))*5
=((15+12)/(12*15))*5
=27/36
=¾
= (1/12) + (1/15)  (⅙)
= (15+12(15*2))/15*12
= 3 / (15*12)
= (1/60)
1 Tank → 60 min
¾ Tank → 45 min
Question 31 
In a group of 24 members, each member drinks either tea or coffee or both. If 15 of them drink tea and 18 drink coffee, find the probability that a person selected from the group drinks both tea and coffee.
1/8  
3/8  
5/24  
None of the options 
Question 31 Explanation:
n(μ)=24
n(T)=15
n(C)=18
n(T U C) = n(T) + n(C)  n(T ∩ C)
24 = 15+18n(T∩C)
n(T∩C)=3324
=9
n(T ∩ C) / n(μ) = 9/24
=3/8
n(T)=15
n(C)=18
n(T U C) = n(T) + n(C)  n(T ∩ C)
24 = 15+18n(T∩C)
n(T∩C)=3324
=9
n(T ∩ C) / n(μ) = 9/24
=3/8
Question 32 
Arjun by car takes double the time taken by bus to travel from Delhi to Agra. What is the Speed of the Bus if the Speed of Car is 40 km/hr?
40 km/hr  
60 km/hr  
80 km/hr  
30 km/hr 
Question 32 Explanation:
T_{car} = 2T_{Bus}
D_{car} = D_{Bus}
S_{car} = D_{Bus} / 2T_{Bus} = S_{Bus} / 2
S_{Bus} = 2 S_{car}
= 2 * 40
= 80 kmph
Question 33 
Directions for question number 33 to 35:
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q33. How is B related to F?
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q33. How is B related to F?
Sister  
Grandmother  
Wife  
Data inadequate 
Question 33 Explanation:
B is grandmother of F
Question 34 
Directions for question number 33 to 35:
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q34. How is F related to A?
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q34. How is F related to A?
Brother  
Daughter  
Son  
None of the options 
Question 34 Explanation:
F is not related to A
Question 35 
Directions for question number 33 to 35:
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q35. Which of the following pairs is one of the married couples?
Read the following information carefully and then solve the questions given below:
A, B, C, D, E and F are six members of a family.
There are two married couples among them.
C is the mother of A and F.
E is the father of D.
A is the grandson of B.
The total number of female members in the family is three.
Q35. Which of the following pairs is one of the married couples?
E  F  
B  D  
E  B  
A  F 
Question 35 Explanation:
The pairs are EB and DC
Question 36 
Directions for question number 36 to 37:
Consists of a question and two statements, labelled (1) and (2), in which certain data are given. You have to decide whether the data given in the statements are sufficient for answering the question. Using the data given in the statements, plus your knowledge of mathematics and everyday facts.
Q36. How is R related to S?
Statement (1):
T, the wife of R’s only brother C does not have any siblings.
Statement (2):
S is T’s brotherinlaw’s wife.
Consists of a question and two statements, labelled (1) and (2), in which certain data are given. You have to decide whether the data given in the statements are sufficient for answering the question. Using the data given in the statements, plus your knowledge of mathematics and everyday facts.
Q36. How is R related to S?
Statement (1):
T, the wife of R’s only brother C does not have any siblings.
Statement (2):
S is T’s brotherinlaw’s wife.
Only Statement (1) is required for answering the question  
Only Statement (2) is required for answering the question  
Both Statement together are required to answer the question  
Answer cannot be ascertained with the given information 
Question 37 
Directions for question number 36 to 37:
Consists of a question and two statements, labelled (1) and (2), in which certain data are given. You have to decide whether the data given in the statements are sufficient for answering the question. Using the data given in the statements, plus your knowledge of mathematics and everyday facts.
Q37. What is the Standard Deviation (SD) of the four numbers A, B, C, D?
Statement (1):
The sum of A, B, C and D is 24.
Statement (2):
The sum of the squares of A, B, C and D is 224.
Consists of a question and two statements, labelled (1) and (2), in which certain data are given. You have to decide whether the data given in the statements are sufficient for answering the question. Using the data given in the statements, plus your knowledge of mathematics and everyday facts.
Q37. What is the Standard Deviation (SD) of the four numbers A, B, C, D?
Statement (1):
The sum of A, B, C and D is 24.
Statement (2):
The sum of the squares of A, B, C and D is 224.
Only Statement (1) is required for answering the question  
Only Statement (2) is required for answering the question  
Both Statement together are required to answer the question  
Answer cannot be ascertained with the given information 
Question 37 Explanation:
Standard Deviation of A,B,C,D
I) Σ(A,b,C,D) = 24
II) A^{2} + B^{2} + C^{2} + D^{2} = 224
μ = 24/4 = 6
S.D = √(Σ(Xμ)^{2})/4
= √(A^{2} + μ^{2}  2Aμ + B^{2} + μ^{2} 2μB + C^{2} + μ^{2}  2μC + D62 + μ^{2}  2μD) / 4
= √(A^{2} + B^{2} + C^{2} + D^{2} + 4μ^{2}  2μ ( A+B+C+D)/4)
= √(224 + 4 * 24^2  2*24 (4*24))/4
Combining I and II
= √808
I) Σ(A,b,C,D) = 24
II) A^{2} + B^{2} + C^{2} + D^{2} = 224
μ = 24/4 = 6
S.D = √(Σ(Xμ)^{2})/4
= √(A^{2} + μ^{2}  2Aμ + B^{2} + μ^{2} 2μB + C^{2} + μ^{2}  2μC + D62 + μ^{2}  2μD) / 4
= √(A^{2} + B^{2} + C^{2} + D^{2} + 4μ^{2}  2μ ( A+B+C+D)/4)
= √(224 + 4 * 24^2  2*24 (4*24))/4
Combining I and II
= √808
Question 38 
Directions for question number 38 to 40:
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q38. Assertion (A):
Ventilators are provided near the roof.
Reason (R):
Conduction takes place better near the roof.
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q38. Assertion (A):
Ventilators are provided near the roof.
Reason (R):
Conduction takes place better near the roof.
I  
II  
III  
IV 
Question 39 
Directions for question number 38 to 40:
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q39. Assertion (A):
Salt is added to cook food at higher altitudes.
Reason (R):
Temperature is lower at higher altitudes.
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q39. Assertion (A):
Salt is added to cook food at higher altitudes.
Reason (R):
Temperature is lower at higher altitudes.
I  
II  
III  
IV 
Question 40 
Directions for question number 38 to 40:
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q40. Assertion (A):
Moon cannot be used as a satellite for communication.
Reason (R):
Moon does not move in the equatorial plane of the Earth.
Answer the following questions on the basis of the directions given below:
Directions: For the Assertion (A) and Reason (R) below, choose the correct alternative from the following:
I. Both (A) and (R) are true and (R) is the correct explanation of (A).
II. Both (A) and (R) are true and (R) is not the correct explanation of (A).
III. (A) is true but (R) is false.
IV. (A) is false but (R) is true.
Q40. Assertion (A):
Moon cannot be used as a satellite for communication.
Reason (R):
Moon does not move in the equatorial plane of the Earth.
I  
II  
III  
IV 
Question 41 
Directions  Question number 41 and 42 are based on the diagram given below:
In a class there are 40 students who play at least one game out of Football, Cricket and Badminton.
Q41. What percentage of students play only one game?
Q41. What percentage of students play only one game?
50%  
60%  
65%  
70% 
Question 41 Explanation:
X(μ)= 40
X(μ)= 9+6+8+4+2+7+X(C ∩ F ∩ B)
40= 36 + X(C ∩ F ∩ B)
X(C ∩ F ∩ B) = 40=36
= 4
According to given data, Percentage of students who play only one game.
= [X(only C) + X(only F) + X(only B)] / X(μ)
= [(9 + 8 +7)/40]*100
= (24/40)*100
= 60%
Question 42 
Directions  Question number 41 and 42 are based on the diagram given below:
In a class there are 40 students who play at least one game out of Football, Cricket and Badminton.
Q42. What percentage of students play all the three games?
Q42. What percentage of students play all the three games?
4%  
5%  
8%  
10% 
Question 42 Explanation:
X(μ)= 40
X(μ)= 9+6+8+4+2+7+ X(C ∩ F ∩ B)
40= 36 + X(C ∩ F ∩ B)
X(C ∩ F ∩ B) = 40=36
= 4
According to given data, Percentage of X(C ∩ F ∩ B)
= [ X(C ∩ F ∩ B) / X(μ) ]*100
= (4/40)*100
=10%
Question 43 
Which of the following machine model can be used in a necessary and sufficient sense for lexical analysis in modern computer language?
Deterministic Push down Automata  
Finite Automata  
NonDeterministic Finite Automata  
Turing Machine 
Question 43 Explanation:
Lexical Analysis is implemented by using finite automata or Regular Expression
Question 44 
58000 LOC gaming software is developed with effort of 3 personyear. What is the productivity of personmonth?
1.9 KLOC  
1.6 KLOC  
4.8 KLOC  
4.2 KLOC 
Question 44 Explanation:
Productivity= KLOC/ effort
Productivity=58/12*3
=1.61 KLOC (approximately)
Productivity=58/12*3
=1.61 KLOC (approximately)
Question 45 
An instance of relational schema R(A, B, C) has distinct values of A including NULL values. Which one of the following is true?
A is a candidate key  
A is not a candidate key  
A is a primary key  
Both "A is a candidate key" and "A is a primary key" 
Question 45 Explanation:
Candidates key can take up NULL values so A should be true.
Question 46 
The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is:
BTree File  
Hashed File  
Indexed File  
Sequential File 
Question 46 Explanation:
Hash File organization method is the one where data is stored at the data blocks whose address is generated by using a hash function.
Question 47 
Debugger is a program that:
Allows to examine and modify the contents of registers  
Allows to set breakpoints, execute a segment of program and display contents of register  
Does not allow execution of a segment of program  
All the options 
Question 47 Explanation:
Debugger is a program that allows you to set breakpoints, execute a segment of a program and display contents of a register.
Question 48 
Which of the following Page Replacement Algorithm suffers from the belady’s anomaly?
LRU  
Optimal Page Replacement  
FIFO  
Both LRU and FIFO 
Question 48 Explanation:
FIFO Page Replacement Algorithm suffers from the belady’s anomaly.
Question 49 
Binary search tree contains the values 1, 2, 3, 4, 5, 6, 7, 8. The tree is traversed in preorder and the values are printed out. Which of the following sequences is a valid output?
53124786  
53126487  
53241678  
53124768 
Question 49 Explanation:
Preorder traversal means (Root, left, right)
Option D:
Let draw binary search tree for the given sequence,
After traversing through this tree we will get the same sequence.
Option D:
Let draw binary search tree for the given sequence,
After traversing through this tree we will get the same sequence.
Question 50 
Most NoSQL databases support automatic ________ meaning that you get high availability and disaster recovery.
Processing  
Scalability  
Replication  
All of the options 
Question 50 Explanation:
→ Most NoSQL databases support automatic Replication meaning that you get high availability and disaster recovery.
→ The storage environment is essentially virtualized from the developer’s perspective.
→ The storage environment is essentially virtualized from the developer’s perspective.
Question 51 
In an operating system, processors that are terminated but, for some reason must have its task structure in the process table are referred as _______.
Zombies  
Orphans  
Parent Process  
Child Process 
Question 51 Explanation:
In an operating system, processors that are terminated but, for some reason must have its task structure in the process table are referred as Zombies.
Question 52 
In _______, other nodes verify the validity of the block by checking that the hash of the data of the block is less than a present number.
Proof of Burn  
Proof of STAKE  
Proof of Work  
All of the options 
Question 52 Explanation:
In Proof of Work, other nodes verify the validity of the block by checking that the hash of the data of the block is less than a preset number.
Question 53 
Which of the following can be used when creating a pool of global addresses instead of the netmask command?
/ (slash notation)  
prefixlength  
no mask  
blocksize 
Question 53 Explanation:
Prefixlength can be used when creating a pool of global addresses instead of the netmask command.
Question 54 
Which of the following is a component of Hadoop?
YARN  
HDFS  
Map reduce  
All of the options 
Question 54 Explanation:
YARN, HDFS and Map reduce are components of Hadoop.
Question 55 
The __________ command will show you the translation table containing all the active NAT entries.
show ip nat translation  
show ip nat t1  
show ip nat states  
none of the options 
Question 55 Explanation:
The show ip nat translation command will show you the translation table containing all the active NAT entries.
Question 56 
Which of the following is correct ContentType header that a server side script should send for SSE in HTML5?
ContentType: text/eventstream  
ContentType: text/ applicationstream  
ContentType: text/datastream  
None of the options 
Question 57 
_________ is automatically loaded and operates as part of browser.
Addons  
Plugins  
Utilities  
Widgets 
Question 57 Explanation:
Plugins is automatically loaded and operate as part of the browser.
Question 58 
In an IPv6 header, the traffic class field is similar to the _______ field in the IPv4 header.
TOS field  
Fragmentation field  
Fast Switching  
Option field 
Question 58 Explanation:
In an IPv6 header, the traffic class field is similar to the TOS field in the IPv4 header.
Question 59 
_______ tells a firewall about how to reassemble a data stream that has been divided into packets.
The source routing feature  
The number in the header’s identification field  
The destination IP address  
The header checksum field in the packet header 
Question 59 Explanation:
The source routing feature provides a path address for the packet to help the firewall to reassemble the data stream that was divided into packets. After reassembling, the firewall can then filter the stream.
Question 60 
Match the following:
(1)(a), (2)(b), (3)(c), (4)(d)  
(1)(d), (2)(a), (3)(b), (4)(c)  
(1)(d), (2)(b), (3)(a), (4)(c)  
(1)(c), (2)(a), (3)(b), (4)(d) 
Question 60 Explanation:
Waterfall model → Inflexible partitioning of the project into stages
Evolutionary model → Specifications can be Developed incrementally
Componentbased software engineering → Reusability in development
Spiral development → Explicit recognition of risk
Evolutionary model → Specifications can be Developed incrementally
Componentbased software engineering → Reusability in development
Spiral development → Explicit recognition of risk
Question 61 
Which of the following property is related to a cryptographic hash functions?
One way Function  
Inversible  
NonDeterministic  
All of the options 
Question 61 Explanation:
A oneway function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here, "easy" and "hard" are to be understood in the sense of computational complexity theory, specifically the theory of polynomial time problems. Not being onetoone is not considered sufficient for a function to be called oneway.
Question 62 
In classful addressing, a large part of the available addresses are ______.
Dispersed  
Blocked  
Wasted  
Reserved 
Question 62 Explanation:
In classful addressing, a large part of the available addresses are Wasted.
Question 63 
To the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be ______.
5  
6  
10  
8 
Question 63 Explanation:
To guarantee detection of up to "t" errors in all cases, the minimum Hamming distance in a block code must be d_{min} = t + 1.
t=5
= 5+1
=6
t=5
= 5+1
=6
Question 64 
Which element is used to define discrete unit of content such as a blogpost, comment and so on?
section  
class  
article  
none of the options 
Question 65 
On computers where there are multiple operating system, the decision to load a particular one is done by ________.
PCB  
Inode  
File Control Block  
Boot Loader 
Question 65 Explanation:
On computers where there are multiple operating system, the decision to load a particular one is done by Boot Loader.
Question 66 
Which one of the following statements is incorrect?
The number of regions corresponds to the cyclomatic complexity.  
Cyclomatic complexity for a flow graph G is V(G) = N  E + 2, where E is the number of edges and N is the number of nodes in flow graph.  
Cyclomatic complexity for a flow graph G is V(G) = E  N + 2, where E is the number of edges and N is the number of nodes in flow graph.  
Cyclomatic complexity for a flow graph G is V(G) = P + 1, where P is the number of predicate nodes contained in the flow graph G.

Question 66 Explanation:
To find the cyclomatic complexity using three formulas.
The number of regions
Predicate(P) + 1 [ Predicate divides minimum 2 or more ]
EN+2
The number of regions
Predicate(P) + 1 [ Predicate divides minimum 2 or more ]
EN+2
Question 67 
Which type of linked list stores the address of the header node in the next field of the last node?
Singly linked list  
Circular linked list
 
Doubly linked list  
Hashed list 
Question 67 Explanation:
In the last node of a list, the link field often contains a null reference, a special value is used to indicate the lack of further nodes. A less common convention is to make it point to the first node of the list; in that case, the list is said to be 'circular' or 'circularly linked'; otherwise, it is said to be 'open' or 'linear'. It is a list where the last pointer points to the first node.
In the case of a circular doubly linked list, the first node also points to the last node of the list.
In the case of a circular doubly linked list, the first node also points to the last node of the list.
Question 68 
Which sorting algorithm sorts by moving the current data element past the already sorted values and repeatedly interchanges it with the preceding value until it is in its correct place?
Insertion sort  
Internal sort  
External sort  
Radix sort 
Question 68 Explanation:
Inserting sorting algorithm sorts by moving the current data element past the already sorted values and repeatedly interchanges it with the preceding value until it is in its correct place.
Question 69 
The resistance to be connected across terminal a, b for maximum power transfer to it is:
40Ω  
5Ω  
2.5Ω  
10Ω 
Question 70 
Which open addressing technique is free from Clustering problems?
Linear probing  
Quadratic probing  
Double hashing  
Rehashing 
Question 70 Explanation:
Linear probing suffers from primary clustering and Quadratic probing suffers from secondary clustering.
Question 71 
_______ is a partitioning of single physical server into multiple logical servers.
Virtualization  
Private cloud  
Hybrid cloud  
Public cloud 
Question 71 Explanation:
Virtualization is a partitioning of a single physical server into multiple logical servers.
Question 72 
The recurrence relation T(n) = 7T(n/7) + n has the solution:
O(n)  
O(logn)  
O(nlog(n))
 
O(n^{2}) 
Question 72 Explanation:
Apply masters theorem
a=7, b=7, k=1 and p=0
Case2: a=b^{k}
I: p>=1
=O(n logn)
a=7, b=7, k=1 and p=0
Case2: a=b^{k}
I: p>=1
=O(n logn)
Question 73 
________ has a feature of remote access through which a customer can access the data from anywhere and at any time with the help of internet connection.
IaaS  
PaaS  
NaaS  
SaaS 
Question 74 
A special PCM system uses 32 channels of data, one whose purpose is an identification (ID) and synchronization. The sampling rate is 4 kHz. The word length is 5 bits. Find the serial data rate.
1280 kHz
 
160 kHz  
320 kHz  
640 kHz 
Question 75 
Which of the following tag is used intended for navigation in HTML5?
nav  
footer  
section  
navigation tag 
Question 75 Explanation:
The < nav > tag defines a set of navigation links.
Notice that NOT all links of a document should be inside a < nav > element. The < nav > element is intended only for major blocks of navigation links.
Browsers, such as screen readers for disabled users, can use this element to determine whether to omit the initial rendering of this content.
Notice that NOT all links of a document should be inside a < nav > element. The < nav > element is intended only for major blocks of navigation links.
Browsers, such as screen readers for disabled users, can use this element to determine whether to omit the initial rendering of this content.
Question 76 
Contiguous memory allocation having variable size partition suffers from:
External Fragmentation  
Internal Fragmentation  
Both External and Internal Fragmentation  
None of the options 
Question 76 Explanation:
1. Each Fixed partitioning is suffer from internal as well as external fragmentation
2. Variable partitioning suffers from only external fragmentation but not internal that's why we went to the paging concept to avoid external fragmentation. External fragmentation is a more serious problem than internal fragmentation.
2. Variable partitioning suffers from only external fragmentation but not internal that's why we went to the paging concept to avoid external fragmentation. External fragmentation is a more serious problem than internal fragmentation.
Question 77 
Consider the algorithm that solves problems of size n by recursively solving two subproblems of size n1 and then and then combining the solutions in constant time. Then the running time of the algorithm would be:
O(n)  
O(logn)  
O(nlogn)  
O(n^{2})  
O(2^{n}) 
Question 77 Explanation:
The given explanations are wrong.
Observe that the number of subproblems doubles n times and each subproblem uses O(1) time.
When we call two times t(n1) then it becomes T(n1)+T(n1) = 2T(n1)+1
So, the complexity is O(2^{n}).
Observe that the number of subproblems doubles n times and each subproblem uses O(1) time.
When we call two times t(n1) then it becomes T(n1)+T(n1) = 2T(n1)+1
So, the complexity is O(2^{n}).
Question 78 
Let X_{1}, … X_{50} be independent random variables following N(0, 1) distribution.
Let
and E(Y) = a and Var(Y) = b. Then, the ordered pair (a, b) is :
(50, 100)  
(50, 50)  
(25, 50)  
(25, 100) 
Question 79 
Calculate the modulation percentage if the modulating signal is 8 V and carrier is of 12 V?
50  
67  
150  
33 
Question 79 Explanation:
Modulation index(m) = V_{m}/V_{c}
= (8/12)*100
= 66.66.
= (8/12)*100
= 66.66.
Question 80 
The program written for binary search, calculates the midpoint of the span as mid := (Low + High)/2. The program works well if the number of elements in the list is small (about 32,000) but it behaves abnormally when the number of elements is large. This can be avoided by performing the calculation as:
mid := (High  Low)/2 + Low  
mid := (High  Low + 1)/2  
mid := (High  Low)/2  
mid := (High + Low)/2 
Question 81 
Identify the odd one out.
Amazon web service  
Microsoft Azure  
Google cloud Platform  
Twitter Platform 
Question 81 Explanation:
Options A, B ,and C are provides cloud services to the user but not by Twitter platform
Question 82 
Considering binary relationships, possible cardinality ratios are:
one : one  
1 : N  
M : N  
All the options 
Question 83 
Typical time requirement for operations on queues is:
O(1)  
O(n)  
O(logn)  
O(n^{2}) 
Question 83 Explanation:
Typical time requirement for operations on queues is O(1).
Question 84 
In the congestion avoidance algorithm, the size of the congestion window increases _____ until congestion is detected.
Exponentially  
Additively  
Multiplicatively  
Suddenly 
Question 84 Explanation:
In the congestion avoidance algorithm, the size of the congestion window increases Additively until congestion is detected.
Question 85 
______ possible labels are allowed in the first level of generic domain.
10  
12  
16  
None of the options 
Question 86 
Which of the following techniques deals with sorting the data stored in the computer’s memory?
Distribution sort  
Internal sort  
External sort
 
Radix sort 
Question 86 Explanation:
Here internal and external means using additional space or not. External means using additional array space we can sort the elements. Internal space does not take any extra space. But Main memory is limited in space so it can take internal sort help.
Question 87 
How to specify the comment in the XML document?
< ?  >  
< ! ! >  
< !  >  
< /  > 
Question 87 Explanation:
The syntax for writing comments in XML is similar to that of HTML:
< ! This is a comment >
< ! This is a comment >
Question 88 
The preorder traversal of a tree given below is:
A B D F E C G I H J K L  
A B C D E G H F I J K L  
A B E D F C G H I J K L  
A B D F E C G I J H K L

Question 88 Explanation:
Preorder traversal means during the tree traversal the node which is first visited will print output first. In inorder traversal first it goes to left subtree then root and then right subtree. In post order traversal first it goes left then right subtree after that it visits root then prints output.
Preorder: A B D F E C G I H J K L
Preorder: A B D F E C G I H J K L
Question 89 
What is the basis of KVL?
Conservation of charge  
Conservation of energy  
Conservation of power  
All of the options 
Question 89 Explanation:
Kirchhoff’s Voltage Law
Kirchhoff’s Voltage Law (KVL) is Kirchhoff’s second law that deals with the conservation of energy around a closed circuit path.
Kirchhoff’s Voltage Law (KVL) is Kirchhoff’s second law that deals with the conservation of energy around a closed circuit path.
Question 90 
Limitations of the XML Data Type are:
It cannot be compared or sorted. This means an XML data type cannot be used in a GROUP BY statement.  
It cannot be used as a key column in an index.  
The value() method of the XML data type returns a scalar value, so it can be specified anywhere where scalar values are allowed.
 
All of the options. 
Question 90 Explanation:
Limitations of the xml Data Type:
Note the following general limitations that apply to the xml data type:
The stored representation of xml data type instances cannot exceed 2 GB.
It cannot be used as a subtype of a sql_variant instance.
It does not support casting or converting to either text or ntext. Use varchar(max) or nvarchar(max) instead.
It cannot be compared or sorted. This means an xml data type cannot be used in a GROUP BY statement.
It cannot be used as a parameter to any scalar, builtin functions other than ISNULL, COALESCE, and DATALENGTH.
It cannot be used as a key column in an index. However, it can be included as data in a clustered index or explicitly added to a nonclustered index by using the INCLUDE keyword when the nonclustered index is created.
XML elements can be nested up to 128 levels.
Note the following general limitations that apply to the xml data type:
The stored representation of xml data type instances cannot exceed 2 GB.
It cannot be used as a subtype of a sql_variant instance.
It does not support casting or converting to either text or ntext. Use varchar(max) or nvarchar(max) instead.
It cannot be compared or sorted. This means an xml data type cannot be used in a GROUP BY statement.
It cannot be used as a parameter to any scalar, builtin functions other than ISNULL, COALESCE, and DATALENGTH.
It cannot be used as a key column in an index. However, it can be included as data in a clustered index or explicitly added to a nonclustered index by using the INCLUDE keyword when the nonclustered index is created.
XML elements can be nested up to 128 levels.
Question 91 
In which modulation discrete values of carrier frequencies is used to transmit binary data?
Phase Shift Keying  
Amplitude Shift Keying  
Frequency Shift Keying  
Disk Shift Keying 
Question 91 Explanation:
Frequencyshift keying (FSK) is a frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier signal. The technology is used for communication systems such as telemetry, weather balloon radiosondes, caller ID, garage door openers, and low frequency radio transmission in the VLF and ELF bands. The simplest FSK is binary FSK (BFSK). BFSK uses a pair of discrete frequencies to transmit binary (0s and 1s) information. With this scheme, the "1" is called the mark frequency and the "0" is called the space frequency.
Question 92 
If one uses straight twoway merge sort algorithm to sort the following elements in ascending order 20, 47, 15, 8, 9, 4, 40, 30, 12, 17 then the order of these elements after the second pass of the algorithm is:
8, 9, 15, 20, 47, 4, 12, 17, 30, 40  
8, 15, 20, 47, 4, 9, 30, 40, 12, 17  
15, 20, 47, 4, 8, 9, 12, 30, 40, 17  
4, 8, 9, 15, 20, 47, 12, 17, 30, 40 
Question 92 Explanation:
Merge sort divides the node until the node itself is sorted. In the merging process two nodes are compared bcz of two way merge. Pass1:(20,47), (8,15), (4,9), (30,40), (12,17)
Pass2: (8,15,20,47), (4,9,30,40), (12,17)
Pass3: (4,8,9,15,20,30,40,47),(12,17)
Pass4: (4,8,9,12,15,17,20,30,40,47)
So within 4 passed we can sort all the elements
Pass2: (8,15,20,47), (4,9,30,40), (12,17)
Pass3: (4,8,9,15,20,30,40,47),(12,17)
Pass4: (4,8,9,12,15,17,20,30,40,47)
So within 4 passed we can sort all the elements
Question 93 
Consider the basic COCOMO model where E is the effort applied in personmonths, D is the development time in chronological months, KLOC is the estimated number of delivered lines of code (in thousands) and a_{b}, b_{b}, c_{b}, d_{b} have their usual meanings. The basic COCOMO equations are of the form.
E=a_{b}(KLOC) exp(b_{b}), D=c_{b}(E) exp(d_{b})  
D=a_{b}(KLOC) exp(b_{b}), E=c_{b}(D) exp(d_{b})  
E=a_{b} exp(b_{b}), D=c_{b}(KLOC) exp(d_{b})  
E=a_{b} exp(d_{b}), D=c_{b}(KLOC) exp(b_{b}) 
Question 93 Explanation:
The basic COCOMO equations are of the form.
E=a_{b}(KLOC) exp(b_{b}), D=c_{b}(E) exp(d_{b})
E=a_{b}(KLOC) exp(b_{b}), D=c_{b}(E) exp(d_{b})
Question 94 
If main memory access time is 400 μs, TLB access time 50 μs, considering TLB hit 90%, what will be the overall access time?
800 μs  
490 μs  
485 μs  
450 μs 
Question 94 Explanation:
Effective access time= Hit*(access of TLB+Main memory access) + Miss*(access of TLB+2*main memory access)
EAT=0.9*(50+400)+0.1(50+2*400)
=490
EAT=0.9*(50+400)+0.1(50+2*400)
=490
Question 95 
Consider a software project with the following information domain characteristic for calculation of function point metric.
Number of external inputs (I) = 30
Number of external output (O) = 60
Number of external inquiries (E) = 23
Number of files (F) = 08
Number of external interfaces (N) = 02
It is given that the complexity weighting factors for I, O, E, F and N are 4, 5, 4, 10 and 7, respectively. It is also given that, out of fourteen value adjustment factors that influence the development effort, four factors are not applicable, each of the other four factors have value 3, and each of the remaining factors have value 4.
The computed value of function point metric is ________.
612.06  
212.05  
305.09  
806.9 
Question 95 Explanation:
FP=UFP(unadjusted function point)+ VAF(variable adjustment point)
UFP=No.of inputs*(simple or avg or complex)+No.of outputs*(simple or avg or complex)+No.of inquiries*(simple or avg or complex)+No.of files*(simple or avg or complex)+No.of interfaces*(simple or avg or complex)
VAF=0.65+0.01*Summation of 14 factors
In given problem UFP=30*4+60*5+23*4+8*10+2*7
VAF=0.65+0.01*(4*0+4*3+6*4)
FP=UFP+VAF=612.06
UFP=No.of inputs*(simple or avg or complex)+No.of outputs*(simple or avg or complex)+No.of inquiries*(simple or avg or complex)+No.of files*(simple or avg or complex)+No.of interfaces*(simple or avg or complex)
VAF=0.65+0.01*Summation of 14 factors
In given problem UFP=30*4+60*5+23*4+8*10+2*7
VAF=0.65+0.01*(4*0+4*3+6*4)
FP=UFP+VAF=612.06
Question 96 
Consider a software program that is artificially seeded with 100 faults. While testing this program, 159 faults are detected, out of which 75 faults are from those artificially seeded faults. Assuming that both real and seeded faults are of same nature and have same distribution, the estimated number of undetected real faults is ______.
28  
175  
56  
84 
Question 96 Explanation:
Total faults detected = 159
Real faults detected among all detected faults = 159  75 = 84
Since probability distribution is same, total number of real faults is (100/75)*84 = 112
Undetected real faults = 112 84 = 28
Real faults detected among all detected faults = 159  75 = 84
Since probability distribution is same, total number of real faults is (100/75)*84 = 112
Undetected real faults = 112 84 = 28
Question 97 
A direct mapped cache is of size 32 KB and has block size 32 Bytes. CPU also generates 32 bit address. Number of bits needed for indexing the cache:
14  
15  
10  
17 
Question 97 Explanation:
Question 98 
Suppose we have to insert the following sequence of keys into an empty binary search tree:
5, 7, 45, 60, 50, 23, 15, 54
What would be the height of binary search tree?
3  
4  
5  
6 
Question 98 Explanation:
The explanation saying the tree height would be the number of edges in the longest simple downward path from root to leaf. According to this the height must be 5 for the given question.
BST with the elements is as follows
It is a very easy question. By default height starts from 0.
BST with the elements is as follows
It is a very easy question. By default height starts from 0.
Question 99 
An attribute(s) that is used to look up for records in a file is called a:
Function key  
Catalog key  
Access key  
Search key 
Question 100 
Consider a Simple Checkpointing protocol and the following set of operations in the log.
(start, T4); (write, T4, y, 2, 3); (start, T1);
(commit, T4); (write, T1, z, 5, 7);
(Checkpoint);
(start, T2); (write, T2, x, 1, 9);
(commit, T2); (start, T3); (write, T3, z, 7, 2);
if a crash happens now and the system tries to recover using both undo and redo operations, what are the contents of the undo list and the redo list?
Undo : T3, T1; Redo T2  
Undo : T3, T1; Redo T2, T4  
Undo : none; Redo T2, T4, T3 T1  
Undo : T3, T1, T4; Redo T2 
Question 100 Explanation:
As T_{1} & T_{3} are not yet committed they must be undone. The transactions which are after the latest checkpoint must be redone. So T_{2} must be redone. No need to redo the records which are before the last checkpoint, so T_{4} need not be redone.
Question 101 
Point out the wrong statement:
NonRelational databases require that schemas be defined before you can add data.  
NoSQL databases are built to allow the insertion of data without a predefined schema.  
NewSQL databases are built to allow the insertion of data without a predefined schema.  
All of the options.

Question 102 
In which of the following hash functions, do consecutive keys map to consecutive hash values?
Division method  
Multiplication method  
Folding method  
Midsquare method 
Question 102 Explanation:
Division method: X mod N. Here, X is key and N is the number of locations in the array. Here Number of locations are consecutive in nature bcz it acts as a reminder.
Question 103 
One disk queue with requests for I/O to blocks on cylinders. The Request are in the following manner:
98 183 37 122 14 124 65 67
Considering SSTF (shortest seek time first) scheduling, the total number of head movements is, if the disk head is initially at 53:
236  
246  
220  
240 
Question 103 Explanation:
=(6753)+(6714)+(18314)
=236
Question 104 
What is the advantage of bubble sort over other sorting techniques?
It is faster  
Consumes less memory  
Detects whether the input is already sorted
 
All of the options 
Question 104 Explanation:
The options are not appropriate.
OptionA is definitely FALSE.
OptionB is not an advantage when compared to other sorting techniques.
OptionC Bubble sort will give the best case O(n) when elements are in sorted order.
OptionA is definitely FALSE.
OptionB is not an advantage when compared to other sorting techniques.
OptionC Bubble sort will give the best case O(n) when elements are in sorted order.
Question 105 
Onemegabyte memory storage in the form of bytes is equal to ______.
1024 bytes  
1024^{2} bytes  
1024^{3} bytes  
1024^{4} bytes 
Question 105 Explanation:
1k=1024=2^{10}, 1M=2^{20}
Option B can written as (2^{10})^{2}=2^{20}= 1 MB
Option B can written as (2^{10})^{2}=2^{20}= 1 MB
Question 106 
Which table is used in MS DOS for linked list allocation?
TLB  
Page Table  
FAT  
Index Table 
Question 106 Explanation:
FAT table is used in MS DOS for linked list allocation
Question 107 
What is the best case complexity of QuickSort?
O(nlogn)  
O(logn)  
O(n)  
O(n^{2}) 
Question 107 Explanation:
In quick sort best case is possible when the pivot element can be placed in the middle of the elements on each pass.
T(n)=2T(n/2)+n
=O(nlogn)
T(n)=2T(n/2)+n
=O(nlogn)
Question 108 
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?
Data leak from stolen credentials from desk  
Data leak by partners  
Data leak by 3rd Party apps  
All of the options 
Question 108 Explanation:
The OptionC is not an example of an internal data leakage threat.
Question 109 
x.y’  
x.y’+z  
x.z’  
none of the options 
Question 109 Explanation:
Question 110 
______ uses a pretty good privacy algorithm.
Electronic mails  
File encryption  
Both Electronic mails and File encryption  
None of the options 
Question 110 Explanation:
Both Electronic mails and File encryption use pretty good privacy algorithms.
Question 111 
Set of key attributes that identify weak entities related to some owner entity is classified as:
Structural key  
String key  
Partial key  
Foreign key 
Question 112 
Given the truth table of a Binary Operation $ as follows:
Identify the matching Boolean Expression.
Identify the matching Boolean Expression.
X $ Y'  
X' $ Y
 
X' $ Y'  
None of the above 
Question 112 Explanation:
X$Y= X+Y'
So,
X $ ¬Y= X+Y
¬X $ Y= X' + Y'
¬X $ ¬Y= X' + Y
So,
X $ ¬Y= X+Y
¬X $ Y= X' + Y'
¬X $ ¬Y= X' + Y
Question 113 
An expression in the domain relational calculus is of the form:
{P(x1,x2,...,xn)  ⟨x1,x2,...,xn⟩}  
{x1,x2,...,xn  ⟨x1,x2,...,xn)}  
{x1,x2,...,xn  x1,x2,...,xn}  
⟨x1,x2,...,xn⟩  P(x1,x2,...,xn)} 
Question 113 Explanation:
Domain relational calculus (DRC) is a calculus that was introduced by Michel Lacroix and Alain Pirotte as a declarative database query language for the relational data model.
In DRC, queries have the form:
{(X1,X2,....,Xn)  p( X1,X2,....,Xn ) where each Xi is either a domain variable or constant, and p(X1,X2,....,Xn)} denotes a DRC formula. The result of the query is the set of tuples X1 to Xn that make the DRC formula true.
This language uses the same operators as tuple calculus, the logical connectives ∧ (and), ∨ (or) and ¬ (not). The existential quantifier (∃) and the universal quantifier (∀) can be used to bind the variables.
Question 114 
The best running time is defined as/obtained as/by:
the least or smallest of all the running times the algorithm takes, on inputs of a particular size.  
an input that requires maximum computations or resources  
averaging the different running times for all inputs of a particular kind.
 
none of the options. 
Question 114 Explanation:
The best running time is defined as/obtained as/by the least or smallest of all the running times the algorithm takes, on inputs of a particular size.
Question 115 
In ______ VMs do not simulate the underlying hardware.
Para Virtualization  
Full Virtualization  
HardwareAssisted Virtualization  
Network Virtualization 
Question 115 Explanation:
Paravirtualization is a virtualization technique that presents a software interface to the virtual machines which is similar, yet not identical to the underlying hardware–software interface.
Paravirtualization (PV) is an enhancement of virtualization technology in which a guest operating system (guest OS) is modified prior to installation inside a virtual machine (VM) in order to allow all guest OS within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment.
Full virtualization is a virtualization technique used to provide a VME that completely simulates the underlying hardware.
network virtualization is the process of combining hardware and software network resources and network functionality into a single, softwarebased administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.
Hardwareassisted virtualization is a platform virtualization approach that enables efficient full virtualization using help from hardware capabilities, primarily from the host processors
Question 116 
Consider a control unit generating the control signals. These control signals are divided into five mutually exclusive groups as shown below:
How many bits are saved using the Vertical Microprogrammed instead of Horizontal Microprogrammed control unit?
How many bits are saved using the Vertical Microprogrammed instead of Horizontal Microprogrammed control unit?
14  
34  
20  
None 
Question 116 Explanation:
In horizontal microprogramming we need 1 bit for every control word, therefore total bits in horizontal microprogramming
= 3 + 7 + 10 + 12 + 2
= 34
Now lets consider vertical microprogramming. In vertical microprogramming no. of bits required to activate 1 signal in group of N signals, is ⌈log_{2} N⌉. And in the question 5 groups contains mutually exclusive signals,
group 1 = ⌈log_{2} 3⌉ = 2
group 2 = ⌈log_{2} 7⌉ = 3
group 3 = ⌈log_{2} 10⌉ = 4
group 4 = ⌈log_{2} 12⌉ = 4
group 5 = ⌈log_{2} 2⌉ = 1
Total bits required in vertical microprogramming
= 2+ 3 + 4 + 4+ 1
= 14
So, number of bits saved is
= 34  14
= 20
= 3 + 7 + 10 + 12 + 2
= 34
Now lets consider vertical microprogramming. In vertical microprogramming no. of bits required to activate 1 signal in group of N signals, is ⌈log_{2} N⌉. And in the question 5 groups contains mutually exclusive signals,
group 1 = ⌈log_{2} 3⌉ = 2
group 2 = ⌈log_{2} 7⌉ = 3
group 3 = ⌈log_{2} 10⌉ = 4
group 4 = ⌈log_{2} 12⌉ = 4
group 5 = ⌈log_{2} 2⌉ = 1
Total bits required in vertical microprogramming
= 2+ 3 + 4 + 4+ 1
= 14
So, number of bits saved is
= 34  14
= 20
Question 117 
The number of tokens in the following C statement is
printf("i=%d, &i=%x", i, &i);
8  
4  
7  
10 
Question 117 Explanation:
Question 118 
The number of 4 digit numbers which contain not more than two different digits is:
576  
567  
513  
504 
Question 118 Explanation:
The first (nonzero) digit of the number thousands digit (A)can be any one of nine.
The second digit is hundred digit(B) which is used if there are two digits can be any one of the nine digits different from the first.
Now consider the Hundreds Tens and Units digits in the case that there are two digits used in the number.
We have two possibilities A or B to fill each place  but we exclude AAA as not involving two digits, so there are 23−1=7 possible patterns with exactly two different digits and 9×9 ways of choosing the pair of digits in the first place.
Then there are nine possibilities with just one digit.
Total possibilities are 9×9×7+9=576
Question 119 
You are working with a network that is 172.16.0.0 and would like to support 600 hosts per subnet. What subnet mask should you use?
255.255.192.0  
255.255.224.0  
255.255.252.0  
None of the options 
Question 119 Explanation:
Question 120 
PI in XML specification stands for _______.
priceless instruction  
processing instruction  
polymorphic inheritance  
primary instruction 
Question 120 Explanation:
A Processing Instruction (PI) is an SGML and XML node type, which may occur anywhere in the document, intended to carry instructions to the application.
Processing instructions are exposed in the Document Object Model as Node.PROCESSING_INSTRUCTION_NODE, and they can be used in XPath and XQuery with the 'processinginstruction()' command.
Processing instructions are exposed in the Document Object Model as Node.PROCESSING_INSTRUCTION_NODE, and they can be used in XPath and XQuery with the 'processinginstruction()' command.
There are 120 questions to complete.