Friday, 18 April 2014

Assistant Engineer IT (2014) Question Paper


HPPSC
Assistant Engineer IT (2014)
Time Allowed: 2 Hours                                                                                 Maximum Marks: 100
Important Note:-
There are three parts of Question Paper and the candidate holding degree either in Information & Technology or Computer Science Engineering may opt Part-A(Question Nos. 1 to 80) and the candidate holding degree Electronics & Communication Engineering may opt Part –B(Question No’s 1 to 80). Whereas Part-C comprising question Nos. 81 to 100 are compulsory and common for all the candidates. Therefore, the candidate may opt either Part-A or Part-B of the Question paper and encode the relevant part (Opted) in place of ‘BOOKLET SERIES’ in the answer-sheet.

PART A
COMMON FOR COMPUTER SCIENCE
AND INFORMATION AND TECHNOLOGY

1.    Suppose instead of using 16 bits for the network part of a class B IPv4 address, 20 bits have been used. How many class B sub-networks will be there?
a)     6
b)    16
c)     4
d)    14

2.    A capacitor is charged by constant current of 4 mA and results in a voltage increase of 12 V in a 13 seconds interval. Value of capacitance is :
a)    36.9 mF
b)    4.33 mF
c)    39 mF
d)    3.69 mF             

3.    If a switch has 12 ports, each with a maximum line speed of 1000 Mbps, how fast (minimum) does the switching fabric need to be in order to prevent queuing/blocking for full duplex operation?
a)    12 Gbps
b)    24 Gbps
c)    1000 Mbps
d)    2000 Mbps

4.    A method of ensuring electronic document integrity :
a.    Firewall
b.    SSL
c.    Authentication
d.    Digital Signature

5.    Given that AB+A`C+BC=AB+A`C, then (A`+C)(B+C)(A+B) is equivalent to :
a.    (A`+B)(A+C)
b.    (A+B)(A`+C)
c.    (A+B`)(A`+C)
d.    (A+B`)(A`+C`)

6.     IPv6 address is ……………….bits long.
a.    128
b.    64
c.    32
d.    16

7.    The signal x(t)=e-4tu(t) is a :
a.    Power signal with P =1/4
b.    Power signal with P=0
c.    Energy signal with E=1/4
d.    Energy signal with E=0

8.    An analog signal is sampled at 36 kHz and quantized into 256 levels. The time duration of a bit of binary coded signal is :
a.    5.78 us
b.    3.47 us
c.    6.43 ms
d.    7.86 ms

9.     Pick the odd one out :
a.    Virus
b.    Trojan Horse
c.    WWW
d.    Worm

10.   Consider the following function in C :
Test int (t1)
{
If (t1 == 0)
Return 0;
Else
Return t1 + = Test(t1-1);
}
When the above function is called with a non-zero positive value, it always returns value of :
a.    t1
b.    t1-1
c.    t1*(t1+1)/2
d.    Zero

11.   What will be the output for the following ‘C’ code snippet
For (int i=3; i< 15; i+=3)
{
Printf(‘%d”,i);
++I;
}
a.    3 6 9 12
b.    3 6 9 12 15
c.    3 7 11 15
d.    3 7 11

12.   Order the following list by their asymptotic growth (fastest to slowest)
                      I.        N
                                II.            nn
                   III.        log n
                  IV.        n!
                    V.        n log n
a)    (iii),(i),(v),(iv),(ii)
b)    (ii),(i), (v),(iv),(iii)
c)    (iii),(i),(v),(ii),(iv)
d)    (iii),(v),(i),(iv),(ii)

13.   Which of the following is correct sequence of stages of program development ?
a)    Write-compile-link-test
b)    Write-compile-document-run
c)    Write-link-compile-run
d)    Write-compile-link-document

14.   In a digital communication system employing Frequency Shift Keying(FSK), the 0 and 1 bit are represented by sine waves of 10 kHz and 25 kHz respectively. These waveforms will be orthogonal for a bit interval of :
a)    45 usec
b)    200 usec
c)    50 usec
d)    250 usec

15.   Which of the following is not an infinite loop ?
a)    While (1) {            }
b)    For(;;)   {                  }
c)    x=0; do { ………………} while (x == 0);
d)    #define TRUE 0
            While(TRUE) { …… }

16.   If seek time for the disk=10ms, Latency time= 5ms, then calculate access time to access the data from the disk. Assume time to transmit the information back to processor = 1 ms
a)    15 ms
b)    16 ms
c)    14 ms
d)    06 ms

17.  If a table ‘clients’ has a column ‘name’ filled with names of the clients of a electricity board and you want to find all clients that have an “S” somewhere in its name, you can do that via this SQL command :
a)    Select * from clients where name =’$S$’
b)    Select * from clients where name =’%S%’
c)    Select * from clients where name like ’$S$%’
d)    Select * from clients where name like ’%S%’

18.   With SQL, how can you insert “HP Electricity” as the “Deptt_Name” in the “Departments” table ?
a)    INSERT INTO Departments(Deptt_Name) VALUES(‘HP Electricity’)
b)    INSERT (‘HP Electricity’) INTO Departments(Deptt_Name)
c)    INSERT INTO Departments (Deptt_Name)(‘HP Electricity’)
d)    INSERT INTO Departments (‘HP Electricity’) INTO Deptt_Name

19.   Consider the tables T1(Staff_ID, Staff_NAME) and T2(Item_ID, Item_NAME,Staff_ID). Query to find out those staff members who have ordered “Poles”.
a)    Select Staff_NAME form T1,T2 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’
b)    Select Staff_NAME form T2 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’
c)    Select Staff_NAME form T1,T2 where Item_NAME=’Poles’
d)    Select Staff_NAME form T1 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’

20.   Which of the following operating systems is available in free/open source domain ?
a)    Mac OS
b)    SUN Solaris
c)    Windows XP
d)    Linux

21.  Most important difference in the performance between main memory and secondary memory as :
a)    Power consumption
b)    Most secondary storage devices are to big to fit into the CPU
c)    Most Secondary storage is mostly bi-state, but main memory is mostly tri-state.
d)    Speed of access; secondary storage is much slower.

22.  Basic purpose of Microprocessor is to :
a)    Store information
b)    Print Data
c)    Compute data
d)    Send an e-mail

23.  Which of the following binary expressions is not correct ?
a)    (x + y)`= x`.y`
b)    (x`+y`)`=x.y
c)    (x`.y`)` = x+y
d)    (x`+y`)` = x`.y`

24.   Which of the following is not condition having a deadlock resource previous granted can be forcibly taken away from a process ?
a)    Resources need to be used in mutually exclusion fashion
b)    Process can request new resources, as they continue to hold on to old ones.
c)    Here is a cycle in the resource allocation graph
d)    None of the above.

25.  CPU Scheduling refers to :
a)    Allowing multiple processes to use a processor
b)    Management of processes in main memory
c)    Swapping processes form secondary to main memory
d)    Switch off the power of processor.

Direction (Q. Nos. 26 and 27 ): Concern the following database :
Seller(SellerId, Name, Address, City, State, Zip)
Item(SellerId, ModelNumber, Description, Weight, Price)
SellerId foreign key to ‘Item’ table
26.   In the database immediately above, the relationship between ‘Seller’ and ‘Item’ is best described as ……………………
Many-to-many
a)    One-to-many , with ‘Seller’ as the “many”
b)    One-to-many, with ‘Seller’ as the “many”
c)    One-to-many, with ‘Seller’ as the “many”
d)    Not allowed. If the primary key and a foreign key overlap, they must be identical.

27.  In the database immediately above, the table ‘Item’……………..
a)    Has two primary keys, SellerID and Modelnumber
b)    Has an improperly constructed primary key. If the primary key and a foreign key overlap, they must be identical
c)    Has two candidate keys
d)    Has as single composite primary key consisting of the fields SellerID and ModelNumber- a table has only one primary key, but it can be a composite of multiple fields.

28.   Cache access time is 100 nano-sec., main memory access time is 800 nano-sec if the hit ratio is 95%, what is effective access time?
a)    135 nano-sec
b)    855 nano-sec
c)    45 nan-sec
d)    765 nano-sec

29.   When the following sequence is inserted in the binary search tree, number of nodes in left and right sub-trees :
52 86 64 20 3 25 14 9 85
a)    Left Nodes = 3 and Right nodes = 6
b)    Left Nodes = 6 and Right nodes = 3
c)    Left Nodes = 3 and Right nodes = 5
d)    Left Nodes = 5 and Right nodes = 3

30.   The order of algorithm to merge the two sorted lists of lengths m and n is :
a)    O(m)
b)    O(n)
c)    O(m+n)
d)    O(log(m) + log(n))


31.  In 2085 microprocessor, after execution of the following instructions :
Load a
Mul a
Store t1
Load b
Mul b
Store t2
Mul t2
Add t1
What will be the content in accumulator ?
a)    a*a+b*b*b*b
b)    a+b
c)    2*a*b
d)    a+b*b

32.  A graphic representation of information flow of some system is called :
a)       Hippo Diagram
b)       Flow Chart
c)       Data Flow Diagram
d)       None of these

33.   What can be the complexity of an algorithm if the time equation is 3*log(n) + log(log n) ?
a)    Log(n)
b)    Log(Log(n))
c)    3*Log(n)
d)     n3

34.   Which of the following scheduling algorithms is based on time-sharing ?
a)    Shortest-Job-First Scheduling
b)    First-Come-First-Served Scheduling
c)    Priority Scheduling
d)    Round-Robin Scheduling

35.  System software :
a)    Provides computer with instructions necessary to operate the system
b)    Is necessary to start your computer
c)    Permits you to use application software
d)    All of the above.

36.  The register which contains the memory address of the current instruction being executed is known as :
a)    Memory address register
b)    Program counter
c)    Index register
d)    Instruction register

37.   What will be the output of the following :
#include<stdio.h>
Main()
{
Int i=8,j,k;
++i=++j=++k=8;
Printf(“\n %d \t %d \t %d”, I,j,k);
}
a)    10 9 8
b)    8 9 10
c)    8 8 8
d)    11 11 11

38.   In 8085 microprocessor which of the following modifies the contents of program counter ?
a)    ADD Instruction
b)    JMP and CALL instructions
c)    CMA Instruction
d)    MOV Instruction

39.   The range of number which can be stored in a sixteen bit register(with left bit for sign) :
a)    0 to 65535
b)    -128 to +127
c)    -32768 to + 32767
d)    0 to 255

40.   In some systems, when there is no more free memory, the system automatically determines what is in use and reorganizes memory so that the available memory is in one big contiguous block. This process is known as :
a)    Garbage Collection
b)    Formatting
c)    Linking
d)    Memory Leak

41.   What is the correct HTML for referring to an external style sheet ?
a)    <link rel=”stylesheet” type=”text/css” href=”mystyle.css”>
b)    <style src=”mystyle.css”>
c)    <external>mystyle.css</external>
d)    <stylesheet>mystyle.css<stylesheet>

42.   Let P(E) denotes the probability of the event E. Given P(A)=1, P(B)=1/2, the values of P(A/B) and P(B/A) respectively are :
a)    1/4,1/2
b)    1/2,1
c)    1,1/2
d)    1/2, ¼

43.  Consider the experiment of tossing 2 dice. Let A be the vent that the numbers appearing on top are equal, and B be the even that both numbers are even. How many outcomes will the event A () B consists of?
a)    1
b)    3
c)    4
d)    6

44.  The cyclomatic complexity  metric provides the software designer with information regarding the number of :
a)    Independent logic paths in the program
b)    Cycles in the program
c)    Errors in the program
d)    Statements in the program 

45.   The Nyquist sampling interval, for the signal sin c(700t) + sin c(500t) is :
a)    1/350 sec
b)    Ï€/350 sec
c)    1/700 sec
d)    Ï€/175 sec

46.  A voice channel takes 40 kHz including a guard band that provides protection against small drifts in transmission frequency. If we divide listening area into hexagonal cells, so that no two adjacent cells use the same frequency bands, how many concurrent calls, approximately, can the 28 MHz spectrum support in a city with 300 cells?
a)    4000
b)    21000
c)    30000
d)    550000

47.   Suppose a Web server application generates messages consisting of 200 bytes of data to be sent. Message gets encapsulated in a TCP segment and then an IPv4 datagram. There are no options added in the TCP or IP headers. What is percentage of IP datagram size consisting of application data?
a)    83.33%
b)    60.66%
c)    75.66%
d)    50.33%

48.   How many address lines are needed to address each memory location into 2048x4 memory chip?
a)    10
b)    11
c)    12
d)    4

49.   A single array A[1..MAXSIZE] is used to implement two stacks. The two stacks grow form opposite ends of the array. Variables top1 and top2 (top1 < top2) point to the locations of the topmost element in each of the stacks. If the space is to be used efficiently, the conditions for “Stack full” is :
a)    (top1 = MAXSIZE/2) and (top2=MAXSIZE/2+1)      
b)    top1 + top2 = MAXSIZE
c)    (top1 = MAXSIZE/2) or (top2=MAXSIZE)
d)    Top1 = top2-1

50.  The velocity of sound is the least in which of the following medium?
a)    Air
b)    Water
c)    Wood
d)    Vacuum

51.   An AM signal is detected using an envelope detector. The carrier frequency and modulating signal frequency are 1 MHz and 2 kHz respectively. An appropriate value for the time constant of the envelope detector is :
a)    500 usec
b)    20 usec
c)    0.2 usec
d)    1 usec

52.   Nyquist theorem specifies :
a)    Properties of an arbitrary, unfiltered signal
b)    Relation between achievable data rate and channel noise
c)    That data rate depends linearly on number of discrete signal levels use to encode information
d)    That maximum data rate is function of medium-bandwidth and number of discrete signal levels used to encode information.
53.  If We use x4+x2+1 polynomial standard, what would be the cyclic redundancy check if the original data component was 11011 ?
a)    1010
b)    1101
c)    1001
d)    0101

54.  Select the most appropriate data structure to implement the storage of the addresses of recently visited websites in a web Browser for the operation of “Back” button :
a)    Queue
b)    Link List
c)    Array
d)    Stack

55.  Find the number of comparisons using binary search method required to search 1000 in array A = {19,25,30,35,37,45,52,69,900}
a)    4
b)    9
c)    0
d)    Binary search cannot be performed on this data

56.  The noise at the input to an ideal frequency detector is white. The detector is operating above threshold. The power spectral density of the noise at the output is :
a)    Raised-cosine
b)    Flat
c)    Parabolic
d)    Gaussain

57.   How many memory chips of (128x8) are needed to provide a memory capacity of 2048x16?
a)    128
b)    64
c)    32
d)    16

58.  Suppose one IPv6 router wants to send a datagram to another IPv6 router, but the two are connected together via an intervening IPv4 router. If the two routers use tunneling, then :
a)    Sending IPv6 router creates an IPv4 datagram and puts it in data field of an IPv6 datagram
b)    Sending IPv6 router creates one or more IPv6 fragments, none of which is larger than the maximum size of an IPv4 datagram.
c)    Sending IPv6 router creates an IPv6 datagram and puts it in data field of IPv4 datagram.
d)    Sending IPv6 router creates IPv6 datagram and intervening IPv4 router rejects this datagram.
59.  Ten signals, each of 4000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for multiplexed channel ? Guard bands are 400 Hz wide.
a)    44 kHz
b)    4.4 kHz
c)    4.36 kHz
d)    43.6  kHz

60.  Assume that one-slot frame in Bluetooth lasts for 600 microseconds(ms). Hopping and control mechanisms need 250 ms. Ho many bits of data a three slot frame can carry ? Assume bandwidth of 1 MHz and 1 bit per Hz.
a)    1050
b)    1550
c)    1650
d)    2150

61.   If log2 16 = n, then the value of n is :
a)    6
b)    4
c)    2
d)    8

62.  Three of the following numbers are the same. Which one is different ?
a)    12210.14
b)    644.18
c)    420.2510
d)    1A4.416

63.  Let A=656, B=473 and c= 1351, then in which of the following number systems is the equation A+B=C satisfied?
a)    Octal
b)    Decimal
c)    Hexadecimal
d)    Binary

64.  Function points provide an objective measure of the application system…………… that can be used to compare different kinds of application systems.
a)    Size
b)    Complexity
c)    Performance
d)    Operation ease

65.  Using the Hard Disk as an extension of RAM is a feature of :
a)    Virtual memory
b)    Cache
c)    Direct Memory Access(DMA)
d)    Virtual Reality

66.  What is the type of modulation adopted for the chrominance signal in TV ?
a)    Amplitude modulation
b)    Frequency modulation
c)    Phase modulation
d)    Quadrature amplitude modulation

67.   Which of the following optical transducers is an active transducer?
a)    Photoemissive cell
b)    Photodiode
c)    Phototransistor
d)    Photovoltaic cell

68.  Communication between a computer and a keyboard involves……….. transmission.
a)    Simplex
b)    Half-duplex
c)    Full-duplex
d)    Automatic

69.  You want to use multiple operating system like Linux, windows etc. concurrently on single machine. The best way to achieve this is :
a)    Make machine multiple bootable like using GRUB
b)    Use virtualization software like VMWare
c)    It is not possible
d)    None of the above.

70.  Today’s desktop computers have typically ‘X’ amount of main memory, ‘Y’ speed of processor and ‘Z’ amount of hard-disk memory. Approximately X,Y,Z can be respectively 4 GB, 3 kHz, 1000 GB
4 MB, 3 MHz, 1000 MB
4 GB, 3 GHz, 1000 KB
4 GB, 3.3 GHz, 1000 GB

71.  In order to enhance performance of the computer , Disk defragmenter j:
a)    Consolidates parts of files lying at different locations on computer’s hard disk
b)    Deletes temporary files related to Internet
c)    Deletes temporary files related to backup
d)    All of the above.

72.  In UNIX operating system, command used for backups and achieves is :
a)    Tar
b)    Backup
c)    Achieve
d)    None of these

73.   Match the following :
(a)  HTML      (i) Protocol for sending electronic mail on the internet
(b)  HTTP      (ii) Company that charges a fee to enable organizations to connect to internet
(c)  ISP          (iii) Set of tags and related rules that are used to create web pages
(d)  SMTP      (iv) Internet standard that supports exchange of information on Web.

a)    (a)-(iv),(b)-(i),(c)-(ii),(d)-(iii)
b)    (a)-(iv),(b)-(i),(c)-(iii),(d)-(ii)
c)    (a)-(iii),(b)-(ii),(c)-(iv),(d)-(i)
d)    (a)-(iii),(b)-(iv),(c)-(ii),(d)-(i)

74.   Optical fiber is one of the most attractive physical layer media to use for high speed networks because :
a)    It offers immense transmission bandwidth
b)    It has extremely low error rates
c)    It can cover relatively large geographic distances before requiring repeaters
d)    All of the above.

75.   How can you make an e-mail link in HTML ?
a)    <mail>xxx@yyy</mail>
b)    <mail href =”xxx@yyy”>
c)    <a href=”xxx@yyy”>
d)    <a href=”mailto:xxx@yyy”>

76.  A program is written to turn on/off a switch. The switch is switched off once the temperature falls below 18 and them it is turned on when the temperature is more than 21. To test this program, identify the equivalence values which belong to the same class
a)    12,16,22
b)    24,27,17
c)    22,23,24
d)    14,15,19

77.  All of the following are types of communication and collaboration done in real time, except :
a)    Blogging
b)    Webinars
c)    Instant messaging
d)    VoIP

78.  An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called as :
Virus
Worm
Denial-of-service attack
Trojan horse

79.  Which of the following would best fit the following description-software is coped and given to a friend without the permission of the copyright owner?
a)    Freeware
b)    Piracy
c)    Shareware
d)    Public domain

80.  You wish to install a hardware device that is not plug and play. Which of the following is commonly the first instruction given in help manual to install this device?
a)    Install the driver
b)    Install the device
c)    Turn the power off
d)    Disconnect the monitor




PART C
COMPULSORY AND COMMON FOR ALL CANDIDATES

81.   Which of the following states of India did not witness Assembly Elections in the winter months of 2013?
a)    Madhya Pradesh
b)    Chattisgarh
c)    Rajasthan
d)    Tripura

82.  Sheikh Hasina, the prime minister of Bangladesh is the leader of which political party ?
a)    Awami League
b)    Bangladesh Nationalist party
c)    Jatiya party
d)    Jamaat-e-Islami

83.  The three member committee set up by the Government of India in December, 2012 to review the laws dealing with sexual assaults against women was headed by :
a)    Justice J.S Verma
b)    Justice Leila Seth
c)    Gopal Subramanium
d)    Justice Sujata Manohar

84.  Black soil is ideal for cultivation of Cotton as :
a)    Its colour is black
b)    It is found in the coastal region
c)    It can retain moisture
d)    It is found in the plateau region of India

85.  Under the National rural Employment Guarantee Act, anyone who is willing to do manual labor at the statutory minimum wage is entitled to being employed on local public works:
Within 15 days, subject to a limit of 100 days a household a year
Within one months, subject to a limit of 90 day a household a year
Within 30 days, subject to a limit of 100 days a household a year
Within three months, subject to a limit of 100 days a household a year

86.  Which one of the following set is not correctly matched ?
a)    POTA: Prevention of terrorism Act
b)    TADA: Terrorist and Disruptive Activates act
c)    UAPA: Unlawful Activates Prevention Act
d)    MISA: Maintenance of International Security Act.

87.   Who among the following has been winner of Magsaysay Award ?
a)    Arvind Kejriwal
b)    Shashi Tharoor
c)    Aruna Roy
d)    Both (A) and (B)

88.  The Indain National Calendar was adopted on the basis of the Meghnand Saha Report in :
a)    1947
b)    1950
c)    1957
d)    1934

89.  The rate at which the heart in a human being beats per minute in an adult average :
a)    62
b)    72
c)    84
d)    60

90.  Which of the following statements is correct?
a)    Plants carry on photosynthesis all the time
b)    Plants carry on photosynthesis during the night and respiration during the day.
c)    Plants carry on photosynthesis during the day and respiration all the time
d)    Plants carry on photosynthesis and respiration alternatively all the time.

91.  Ancient art of Himachal Pradesh can be divided into three groups. Choose the wrong one :
a)    Khasha art
b)    Indo-Aryan art
c)    Indo-Tibetan art
d)    Indo-Kushan art

92.  The river Satluj rises form :
a)    Rakas Tal
b)    Riwalsar
c)    Rohtang Pass
d)    Bhimgasutree

93.  In Himachal Pradesh, State Council of Education Research and Training is located at :
a)    Solan
b)    Mandi
c)    Shimla
d)    Dharampur

94.  Which of the following tribal communities is not found in Himachal Pradesh ?
a)    Kinners
b)    Gaddis
c)    Gujjars
d)    Mundas

95.  Famous Gaiety theater in Shimla city was designed on the pattern of Royal Albert Hall, London was designed by :
a)       Henry Irwin
b)       Marquis of Ripon
c)       Patrick Gerard
d)       Herbert Grant

96.  Which of the following Hydel Power Projects is located in Himachal Pradesh ?
a)    Nathpa Jhakri Hydel Project
b)    Kol Dam Project
c)    Binwa Hydel Project
d)    All of these

97.  Who among the following was the first Chief Minister of Himachal Pradesh ?
a)    Shanta Kumar
b)    Y.S. Parmar
c)    Virbhadra Singh
d)    Pandit Sukh Ram

98.  When did the princely state of Kangra fully come under the possession of the British colonial regime?
a)    After 1857 AD Revolt
b)    After 1856 AD under Doctrine of Lapse
c)    After 1863 AD as a result of the abdication of the then King
d)    After 1773 AD

99.  In which year Shimla became the summer capital of British India ?
a)    1864 AD
b)    1882 AD
c)    1900 AD
d)    1912 AD

100.   Who among the following Artists/Painters has not been associated with Himachal Pradesh with regard to their work?
a)    Nicolas Roerich
b)    Sobha Singh
c)    Amrita Shergill
d)    M. F. Hussain


For more question paper keep checking http://www.adhiraj.in

1 comment:

  1. for this question paper thanks a lot....

    #ineerajthakur

    ReplyDelete