HPPSC
Assistant Engineer IT (2014)
Time Allowed:
2 Hours Maximum Marks: 100
Important
Note:-
There
are three parts of Question Paper and the candidate holding degree either in Information
& Technology or Computer Science Engineering may opt Part-A(Question Nos. 1
to 80) and the candidate holding degree Electronics & Communication
Engineering may opt Part –B(Question No’s 1 to 80). Whereas Part-C comprising
question Nos. 81 to 100 are compulsory and common for all the candidates.
Therefore, the candidate may opt either Part-A or Part-B of the Question paper
and encode the relevant part (Opted) in place of ‘BOOKLET SERIES’ in the
answer-sheet.
PART A
COMMON FOR COMPUTER SCIENCE
AND INFORMATION AND TECHNOLOGY
1. Suppose
instead of using 16 bits for the network part of a class B IPv4 address, 20
bits have been used. How many class B sub-networks will be there?
a) 6
b) 16
c) 4
d)
14
2. A capacitor is charged by constant
current of 4 mA and results in a voltage increase of 12 V in a 13 seconds
interval. Value of capacitance is :
a)
36.9
mF
b)
4.33
mF
c)
39
mF
d)
3.69
mF
3. If a switch has 12 ports, each with a
maximum line speed of 1000 Mbps, how fast (minimum) does the switching fabric
need to be in order to prevent queuing/blocking for full duplex operation?
a)
12
Gbps
b)
24
Gbps
c)
1000
Mbps
d)
2000
Mbps
4.
A
method of ensuring electronic document integrity :
a.
Firewall
b.
SSL
c.
Authentication
d.
Digital
Signature
5.
Given
that AB+A`C+BC=AB+A`C, then (A`+C)(B+C)(A+B) is equivalent to :
a.
(A`+B)(A+C)
b.
(A+B)(A`+C)
c.
(A+B`)(A`+C)
d.
(A+B`)(A`+C`)
6.
IPv6 address is ……………….bits long.
a.
128
b.
64
c.
32
d.
16
7.
The
signal x(t)=e-4tu(t) is a :
a.
Power
signal with P =1/4
b.
Power
signal with P=0
c.
Energy
signal with E=1/4
d.
Energy
signal with E=0
8.
An
analog signal is sampled at 36 kHz and quantized into 256 levels. The time
duration of a bit of binary coded signal is :
a.
5.78
us
b.
3.47
us
c.
6.43
ms
d.
7.86
ms
9.
Pick the odd one out :
a.
Virus
b.
Trojan
Horse
c.
WWW
d.
Worm
10. Consider the following function in C :
Test
int (t1)
{
If
(t1 == 0)
Return
0;
Else
Return
t1 + = Test(t1-1);
}
When
the above function is called with a non-zero positive value, it always returns
value of :
a.
t1
b.
t1-1
c.
t1*(t1+1)/2
d.
Zero
11. What will be the output for the following ‘C’
code snippet
For
(int i=3; i< 15; i+=3)
{
Printf(‘%d”,i);
++I;
}
a.
3
6 9 12
b.
3
6 9 12 15
c.
3
7 11 15
d.
3
7 11
12. Order the following list by their asymptotic
growth (fastest to slowest)
I.
N
II.
nn
III.
log
n
IV.
n!
V.
n
log n
a)
(iii),(i),(v),(iv),(ii)
b)
(ii),(i),
(v),(iv),(iii)
c)
(iii),(i),(v),(ii),(iv)
d)
(iii),(v),(i),(iv),(ii)
13. Which of the following is correct sequence of
stages of program development ?
a)
Write-compile-link-test
b)
Write-compile-document-run
c)
Write-link-compile-run
d)
Write-compile-link-document
14. In a digital communication system employing
Frequency Shift Keying(FSK), the 0 and 1 bit are represented by sine waves of
10 kHz and 25 kHz respectively. These waveforms will be orthogonal for a bit
interval of :
a)
45
usec
b)
200
usec
c)
50
usec
d)
250
usec
15. Which of the following is not an infinite loop
?
a)
While
(1) { }
b)
For(;;) { }
c)
x=0;
do { ………………} while (x == 0);
d)
#define
TRUE 0
While(TRUE) { …… }
16. If seek time for the disk=10ms, Latency time=
5ms, then calculate access time to access the data from the disk. Assume time
to transmit the information back to processor = 1 ms
a)
15
ms
b)
16
ms
c)
14
ms
d)
06
ms
17. If a table ‘clients’ has a column
‘name’ filled with names of the clients of a electricity board and you want to
find all clients that have an “S” somewhere in its name, you can do that via
this SQL command :
a)
Select
* from clients where name =’$S$’
b)
Select
* from clients where name =’%S%’
c)
Select
* from clients where name like ’$S$%’
d)
Select
* from clients where name like ’%S%’
18. With SQL, how can you insert “HP Electricity”
as the “Deptt_Name” in the “Departments” table ?
a)
INSERT
INTO Departments(Deptt_Name) VALUES(‘HP Electricity’)
b)
INSERT
(‘HP Electricity’) INTO Departments(Deptt_Name)
c)
INSERT
INTO Departments (Deptt_Name)(‘HP Electricity’)
d)
INSERT
INTO Departments (‘HP Electricity’) INTO Deptt_Name
19. Consider the tables T1(Staff_ID, Staff_NAME)
and T2(Item_ID, Item_NAME,Staff_ID). Query to find out those staff members who
have ordered “Poles”.
a)
Select
Staff_NAME form T1,T2 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’
b)
Select
Staff_NAME form T2 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’
c)
Select
Staff_NAME form T1,T2 where Item_NAME=’Poles’
d)
Select
Staff_NAME form T1 where T1.Staff_ID = T2.Staff_ID and Item_NAME=’Poles’
20. Which of the following operating systems is
available in free/open source domain ?
a)
Mac
OS
b)
SUN
Solaris
c)
Windows
XP
d)
Linux
21. Most important difference in the
performance between main memory and secondary memory as :
a)
Power
consumption
b)
Most
secondary storage devices are to big to fit into the CPU
c)
Most
Secondary storage is mostly bi-state, but main memory is mostly tri-state.
d)
Speed
of access; secondary storage is much slower.
22. Basic purpose of Microprocessor is to
:
a)
Store
information
b)
Print
Data
c)
Compute
data
d)
Send
an e-mail
23. Which of the following binary
expressions is not correct ?
a)
(x
+ y)`= x`.y`
b)
(x`+y`)`=x.y
c)
(x`.y`)`
= x+y
d)
(x`+y`)`
= x`.y`
24. Which of the following is not condition having
a deadlock resource previous granted can be forcibly taken away from a process
?
a)
Resources
need to be used in mutually exclusion fashion
b)
Process
can request new resources, as they continue to hold on to old ones.
c)
Here
is a cycle in the resource allocation graph
d)
None
of the above.
25. CPU Scheduling refers to :
a)
Allowing
multiple processes to use a processor
b)
Management
of processes in main memory
c)
Swapping
processes form secondary to main memory
d)
Switch
off the power of processor.
Direction
(Q. Nos. 26 and 27 ): Concern the following database :
Seller(SellerId,
Name, Address, City, State, Zip)
Item(SellerId, ModelNumber,
Description, Weight, Price)
SellerId foreign key to
‘Item’ table
26. In the database immediately above, the
relationship between ‘Seller’ and ‘Item’ is best described as ……………………
Many-to-many
a)
One-to-many
, with ‘Seller’ as the “many”
b)
One-to-many,
with ‘Seller’ as the “many”
c)
One-to-many,
with ‘Seller’ as the “many”
d)
Not
allowed. If the primary key and a foreign key overlap, they must be identical.
27. In the database immediately above, the
table ‘Item’……………..
a)
Has
two primary keys, SellerID and Modelnumber
b)
Has
an improperly constructed primary key. If the primary key and a foreign key
overlap, they must be identical
c)
Has
two candidate keys
d)
Has
as single composite primary key consisting of the fields SellerID and
ModelNumber- a table has only one primary key, but it can be a composite of multiple
fields.
28. Cache access time is 100 nano-sec., main
memory access time is 800 nano-sec if the hit ratio is 95%, what is effective
access time?
a)
135
nano-sec
b)
855
nano-sec
c)
45
nan-sec
d)
765
nano-sec
29. When the following sequence is inserted in the
binary search tree, number of nodes in left and right sub-trees :
52
86 64 20 3 25 14 9 85
a)
Left
Nodes = 3 and Right nodes = 6
b)
Left
Nodes = 6 and Right nodes = 3
c)
Left
Nodes = 3 and Right nodes = 5
d)
Left
Nodes = 5 and Right nodes = 3
30. The order of algorithm to merge the two sorted
lists of lengths m and n is :
a)
O(m)
b)
O(n)
c)
O(m+n)
d)
O(log(m)
+ log(n))
31. In 2085 microprocessor, after
execution of the following instructions :
Load
a
Mul
a
Store
t1
Load
b
Mul
b
Store
t2
Mul
t2
Add
t1
What
will be the content in accumulator ?
a)
a*a+b*b*b*b
b)
a+b
c)
2*a*b
d)
a+b*b
32. A graphic representation of
information flow of some system is called :
a)
Hippo
Diagram
b)
Flow
Chart
c)
Data
Flow Diagram
d)
None
of these
33. What can be the complexity of an algorithm if
the time equation is 3*log(n) + log(log n) ?
a)
Log(n)
b)
Log(Log(n))
c)
3*Log(n)
d)
n3
34. Which of the following scheduling algorithms
is based on time-sharing ?
a)
Shortest-Job-First
Scheduling
b)
First-Come-First-Served
Scheduling
c)
Priority
Scheduling
d)
Round-Robin
Scheduling
35. System software :
a)
Provides
computer with instructions necessary to operate the system
b)
Is
necessary to start your computer
c)
Permits
you to use application software
d)
All
of the above.
36. The register which contains the memory
address of the current instruction being executed is known as :
a)
Memory
address register
b)
Program
counter
c)
Index
register
d)
Instruction
register
37. What will be the output of the following :
#include<stdio.h>
Main()
{
Int
i=8,j,k;
++i=++j=++k=8;
Printf(“\n
%d \t %d \t %d”, I,j,k);
}
a)
10
9 8
b)
8
9 10
c)
8
8 8
d)
11
11 11
38. In 8085 microprocessor which of the following
modifies the contents of program counter ?
a)
ADD
Instruction
b)
JMP
and CALL instructions
c)
CMA
Instruction
d)
MOV
Instruction
39. The range of number which can be stored in a
sixteen bit register(with left bit for sign) :
a)
0
to 65535
b)
-128
to +127
c)
-32768
to + 32767
d)
0
to 255
40. In some systems, when there is no more free
memory, the system automatically determines what is in use and reorganizes
memory so that the available memory is in one big contiguous block. This
process is known as :
a)
Garbage
Collection
b)
Formatting
c)
Linking
d)
Memory
Leak
41. What is the correct HTML for referring to an
external style sheet ?
a)
<link
rel=”stylesheet” type=”text/css” href=”mystyle.css”>
b)
<style
src=”mystyle.css”>
c)
<external>mystyle.css</external>
d)
<stylesheet>mystyle.css<stylesheet>
42. Let P(E) denotes the probability of the event
E. Given P(A)=1, P(B)=1/2, the values of P(A/B) and P(B/A) respectively are :
a)
1/4,1/2
b)
1/2,1
c)
1,1/2
d)
1/2,
¼
43. Consider the experiment of tossing 2
dice. Let A be the vent that the numbers appearing on top are equal, and B be
the even that both numbers are even. How many outcomes will the event A () B
consists of?
a)
1
b)
3
c)
4
d)
6
44. The cyclomatic complexity metric provides the software designer with
information regarding the number of :
a)
Independent
logic paths in the program
b)
Cycles
in the program
c)
Errors
in the program
d)
Statements
in the program
45. The Nyquist sampling interval, for the signal
sin c(700t) + sin c(500t) is :
a)
1/350
sec
b)
Ï€/350
sec
c)
1/700
sec
d)
Ï€/175
sec
46. A voice channel takes 40 kHz including
a guard band that provides protection against small drifts in transmission
frequency. If we divide listening area into hexagonal cells, so that no two
adjacent cells use the same frequency bands, how many concurrent calls,
approximately, can the 28 MHz spectrum support in a city with 300 cells?
a)
4000
b)
21000
c)
30000
d)
550000
47. Suppose a Web server application generates
messages consisting of 200 bytes of data to be sent. Message gets encapsulated
in a TCP segment and then an IPv4 datagram. There are no options added in the
TCP or IP headers. What is percentage of IP datagram size consisting of
application data?
a)
83.33%
b)
60.66%
c)
75.66%
d)
50.33%
48. How many address lines are needed to address
each memory location into 2048x4 memory chip?
a)
10
b)
11
c)
12
d)
4
49. A single array A[1..MAXSIZE] is used to implement
two stacks. The two stacks grow form opposite ends of the array. Variables top1
and top2 (top1 < top2) point to the locations of the topmost element in each
of the stacks. If the space is to be used efficiently, the conditions for “Stack
full” is :
a)
(top1
= MAXSIZE/2) and (top2=MAXSIZE/2+1)
b)
top1
+ top2 = MAXSIZE
c)
(top1
= MAXSIZE/2) or (top2=MAXSIZE)
d)
Top1
= top2-1
50. The velocity of sound is the least in
which of the following medium?
a)
Air
b)
Water
c)
Wood
d)
Vacuum
51. An AM signal is detected using an envelope
detector. The carrier frequency and modulating signal frequency are 1 MHz and 2
kHz respectively. An appropriate value for the time constant of the envelope
detector is :
a)
500
usec
b)
20
usec
c)
0.2
usec
d)
1
usec
52. Nyquist theorem specifies :
a)
Properties
of an arbitrary, unfiltered signal
b)
Relation
between achievable data rate and channel noise
c)
That
data rate depends linearly on number of discrete signal levels use to encode
information
d)
That
maximum data rate is function of medium-bandwidth and number of discrete signal
levels used to encode information.
53. If We use x4+x2+1
polynomial standard, what would be the cyclic redundancy check if the original
data component was 11011 ?
a)
1010
b)
1101
c)
1001
d)
0101
54. Select the most appropriate data
structure to implement the storage of the addresses of recently visited
websites in a web Browser for the operation of “Back” button :
a)
Queue
b)
Link
List
c)
Array
d)
Stack
55. Find the number of comparisons using
binary search method required to search 1000 in array A = {19,25,30,35,37,45,52,69,900}
a)
4
b)
9
c)
0
d)
Binary
search cannot be performed on this data
56. The noise at the input to an ideal
frequency detector is white. The detector is operating above threshold. The
power spectral density of the noise at the output is :
a)
Raised-cosine
b)
Flat
c)
Parabolic
d)
Gaussain
57. How many memory chips of (128x8) are needed to
provide a memory capacity of 2048x16?
a)
128
b)
64
c)
32
d)
16
58. Suppose one IPv6 router wants to send
a datagram to another IPv6 router, but the two are connected together via an
intervening IPv4 router. If the two routers use tunneling, then :
a)
Sending
IPv6 router creates an IPv4 datagram and puts it in data field of an IPv6
datagram
b)
Sending
IPv6 router creates one or more IPv6 fragments, none of which is larger than
the maximum size of an IPv4 datagram.
c)
Sending
IPv6 router creates an IPv6 datagram and puts it in data field of IPv4 datagram.
d)
Sending
IPv6 router creates IPv6 datagram and intervening IPv4 router rejects this datagram.
59. Ten signals, each of 4000 Hz, are
multiplexed on to a single channel using FDM. How much minimum bandwidth is required
for multiplexed channel ? Guard bands are 400 Hz wide.
a)
44
kHz
b)
4.4
kHz
c)
4.36
kHz
d)
43.6
kHz
60. Assume that one-slot frame in
Bluetooth lasts for 600 microseconds(ms). Hopping and control mechanisms need
250 ms. Ho many bits of data a three slot frame can carry ? Assume bandwidth of
1 MHz and 1 bit per Hz.
a)
1050
b)
1550
c)
1650
d)
2150
61. If log2 16 = n, then the value of n
is :
a)
6
b)
4
c)
2
d)
8
62. Three of the following numbers are the
same. Which one is different ?
a)
12210.14
b)
644.18
c)
420.2510
d)
1A4.416
63. Let A=656, B=473 and c= 1351, then in
which of the following number systems is the equation A+B=C satisfied?
a)
Octal
b)
Decimal
c)
Hexadecimal
d)
Binary
64. Function points provide an objective
measure of the application system…………… that can be used to compare different kinds
of application systems.
a)
Size
b)
Complexity
c)
Performance
d)
Operation
ease
65. Using the Hard Disk as an extension of
RAM is a feature of :
a)
Virtual
memory
b)
Cache
c)
Direct
Memory Access(DMA)
d)
Virtual
Reality
66. What is the type of modulation adopted
for the chrominance signal in TV ?
a)
Amplitude
modulation
b)
Frequency
modulation
c)
Phase
modulation
d)
Quadrature
amplitude modulation
67. Which of the following optical transducers is
an active transducer?
a)
Photoemissive
cell
b)
Photodiode
c)
Phototransistor
d)
Photovoltaic
cell
68. Communication between a computer and a
keyboard involves……….. transmission.
a)
Simplex
b)
Half-duplex
c)
Full-duplex
d)
Automatic
69. You want to use multiple operating
system like Linux, windows etc. concurrently on single machine. The best way to
achieve this is :
a)
Make
machine multiple bootable like using GRUB
b)
Use
virtualization software like VMWare
c)
It
is not possible
d)
None
of the above.
70. Today’s desktop computers have
typically ‘X’ amount of main memory, ‘Y’ speed of processor and ‘Z’ amount of
hard-disk memory. Approximately X,Y,Z can be respectively 4 GB, 3 kHz, 1000 GB
4
MB, 3 MHz, 1000 MB
4
GB, 3 GHz, 1000 KB
4
GB, 3.3 GHz, 1000 GB
71. In order to enhance performance of the
computer , Disk defragmenter j:
a)
Consolidates
parts of files lying at different locations on computer’s hard disk
b)
Deletes
temporary files related to Internet
c)
Deletes
temporary files related to backup
d)
All
of the above.
72. In UNIX operating system, command used
for backups and achieves is :
a)
Tar
b)
Backup
c)
Achieve
d)
None
of these
73. Match the following :
(a) HTML
(i)
Protocol for sending electronic mail on the internet
(b) HTTP
(ii)
Company that charges a fee to enable organizations to connect to internet
(c) ISP (iii) Set of tags and related rules that are
used to create web pages
(d) SMTP (iv)
Internet standard that supports exchange of information on Web.
a)
(a)-(iv),(b)-(i),(c)-(ii),(d)-(iii)
b)
(a)-(iv),(b)-(i),(c)-(iii),(d)-(ii)
c)
(a)-(iii),(b)-(ii),(c)-(iv),(d)-(i)
d)
(a)-(iii),(b)-(iv),(c)-(ii),(d)-(i)
74. Optical fiber is one of the most attractive
physical layer media to use for high speed networks because :
a)
It
offers immense transmission bandwidth
b)
It
has extremely low error rates
c)
It
can cover relatively large geographic distances before requiring repeaters
d)
All
of the above.
75. How can you make an e-mail link in HTML ?
a)
<mail>xxx@yyy</mail>
b)
<mail
href =”xxx@yyy”>
c)
<a
href=”xxx@yyy”>
d)
<a
href=”mailto:xxx@yyy”>
76. A program is written to turn on/off a
switch. The switch is switched off once the temperature falls below 18 and them
it is turned on when the temperature is more than 21. To test this program,
identify the equivalence values which belong to the same class
a)
12,16,22
b)
24,27,17
c)
22,23,24
d)
14,15,19
77. All of the following are types of
communication and collaboration done in real time, except :
a)
Blogging
b)
Webinars
c)
Instant
messaging
d)
VoIP
78. An attempt to slow down or stop a computer
system or network by flooding the system with requests for information is
called as :
Virus
Worm
Denial-of-service
attack
Trojan
horse
79. Which of the following would best fit
the following description-software is coped and given to a friend without the
permission of the copyright owner?
a)
Freeware
b)
Piracy
c)
Shareware
d)
Public
domain
80. You wish to install a hardware device
that is not plug and play. Which of the following is commonly the first
instruction given in help manual to install this device?
a)
Install
the driver
b)
Install
the device
c)
Turn
the power off
d)
Disconnect
the monitor
PART C
COMPULSORY AND COMMON FOR ALL
CANDIDATES
81. Which
of the following states of India did not witness Assembly Elections in the winter
months of 2013?
a)
Madhya
Pradesh
b)
Chattisgarh
c)
Rajasthan
d)
Tripura
82. Sheikh Hasina, the prime minister of
Bangladesh is the leader of which political party ?
a)
Awami
League
b)
Bangladesh
Nationalist party
c)
Jatiya
party
d)
Jamaat-e-Islami
83. The three member committee set up by
the Government of India in December, 2012 to review the laws dealing with
sexual assaults against women was headed by :
a)
Justice
J.S Verma
b)
Justice
Leila Seth
c)
Gopal
Subramanium
d)
Justice
Sujata Manohar
84. Black soil is ideal for cultivation of
Cotton as :
a)
Its
colour is black
b)
It
is found in the coastal region
c)
It
can retain moisture
d)
It
is found in the plateau region of India
85. Under the National rural Employment
Guarantee Act, anyone who is willing to do manual labor at the statutory
minimum wage is entitled to being employed on local public works:
Within
15 days, subject to a limit of 100 days a household a year
Within
one months, subject to a limit of 90 day a household a year
Within
30 days, subject to a limit of 100 days a household a year
Within
three months, subject to a limit of 100 days a household a year
86. Which one of the following set is not
correctly matched ?
a)
POTA:
Prevention of terrorism Act
b)
TADA:
Terrorist and Disruptive Activates act
c)
UAPA:
Unlawful Activates Prevention Act
d)
MISA:
Maintenance of International Security Act.
87. Who among the following has been winner of
Magsaysay Award ?
a)
Arvind
Kejriwal
b)
Shashi
Tharoor
c)
Aruna
Roy
d)
Both
(A) and (B)
88. The Indain National Calendar was
adopted on the basis of the Meghnand Saha Report in :
a)
1947
b)
1950
c)
1957
d)
1934
89. The rate at which the heart in a human
being beats per minute in an adult average :
a)
62
b)
72
c)
84
d)
60
90. Which of the following statements is correct?
a)
Plants
carry on photosynthesis all the time
b)
Plants
carry on photosynthesis during the night and respiration during the day.
c)
Plants
carry on photosynthesis during the day and respiration all the time
d)
Plants
carry on photosynthesis and respiration alternatively all the time.
91. Ancient art of Himachal Pradesh can be
divided into three groups. Choose the wrong one :
a)
Khasha
art
b)
Indo-Aryan
art
c)
Indo-Tibetan
art
d)
Indo-Kushan
art
92. The river Satluj rises form :
a)
Rakas
Tal
b)
Riwalsar
c)
Rohtang
Pass
d)
Bhimgasutree
93. In Himachal Pradesh, State Council of
Education Research and Training is located at :
a)
Solan
b)
Mandi
c)
Shimla
d)
Dharampur
94. Which of the following tribal communities
is not found in Himachal Pradesh ?
a)
Kinners
b)
Gaddis
c)
Gujjars
d)
Mundas
95. Famous Gaiety theater in Shimla city
was designed on the pattern of Royal Albert Hall, London was designed by :
a)
Henry
Irwin
b)
Marquis
of Ripon
c)
Patrick
Gerard
d)
Herbert
Grant
96. Which of the following Hydel Power
Projects is located in Himachal Pradesh ?
a)
Nathpa
Jhakri Hydel Project
b)
Kol
Dam Project
c)
Binwa
Hydel Project
d)
All
of these
97. Who among the following was the first
Chief Minister of Himachal Pradesh ?
a)
Shanta
Kumar
b)
Y.S.
Parmar
c)
Virbhadra
Singh
d)
Pandit
Sukh Ram
98. When did the princely state of Kangra
fully come under the possession of the British colonial regime?
a)
After
1857 AD Revolt
b)
After
1856 AD under Doctrine of Lapse
c)
After
1863 AD as a result of the abdication of the then King
d)
After
1773 AD
99. In which year Shimla became the summer
capital of British India ?
a)
1864
AD
b)
1882
AD
c)
1900
AD
d)
1912
AD
100. Who among the following
Artists/Painters has not been associated with Himachal Pradesh with regard to
their work?
a)
Nicolas
Roerich
b)
Sobha
Singh
c)
Amrita
Shergill
d)
M.
F. Hussain
For more question
paper keep checking http://www.adhiraj.in
for this question paper thanks a lot....
ReplyDelete#ineerajthakur