Directions(1-5): Study the following information carefully and answer the questions given below:
P, Q, R, S, T, V, W and Z are eight friends studying in three different engineering colleges – A, B and C in three disciplines – Mechanical, Electrical and Electronics with not less than two and not more than three in any college. Not more than three of them study in any of the three disciplines. W studies Electrical in college B with only T, who studies Mechanical. P and Z do not study in college C and study in the same discipline but not Electrical. R studies Mechanical in college C with V, who studies Electrical. S studies Mechanical and does not study in the same college where R studies. Q does not study Electronics.
Q1. Which of the following combinations of college-student-specialisation is correct?
1) C-R-Electronics 2) A-Z-Electrical 3) B-W-Electronics 4) B-W-Electrical 5) B-Z-Electronics
Q2. In which of the following colleges do two students study in Electrical discipline?
1) A only 2) B only 3) C only 4) Cannot be determined 5) None of these
Q3. In which discipline does Q study?
1) Electrical 2) Mechanical 3) Electrical or Mechanical 4) Data inadequate 5) None of these
Q4. In which of the colleges at least one student studies in Mechanical discipline?
1) A only 2) B only 3) C only 4) Both A and B 5) All A, B and C
Q5. S studies in which college?
1) A 2) B 3) A or B 4) Data inadequate 5) None of these
Direction(6-10): Study the given information carefully and answer the given questions:
In a certain code language “find a good home” is written as “dn co he rh”, “charity begins at home” is writen as ” rh na ek sa”, “find good charity store” is written as “na dn he ku” and ” a store at station” is written as “co ek ku ze”.( All codes are two letter only).
Q6. What does the code ‘ze’ stand for in the given code language?
1) good 2) station 3) find 4) store 5) begins
Q7. What does the code for ‘store’ in the given code language?
1) rh 2) ek 3) ku 4) ze 5) dn
Q8. What does the code ‘ek’stand for in the given language code?
1) store 2) at 3) charity 4) either ‘find’ or ‘good’ 5) a
Q9. In the given code language, which of the following possibly means ‘find good food’?
1) he dn ku 2) rh dn he 3) dn bk he 4) ku ek na 5) na rh ek
Q10.What is the code for ‘charity’ in the given code language?
1) na 2) ku 3) he 4) rh 5) dn
A P(Electronics), Z (Electronics), S(Mechanical)
B W (Electrical), T (Mechanical)
C R (Mechanical), V (Electrical), Q (Electrical)
1. 4 2. 3 3. 1 4. 5 5. 1 6. 2 7. 3 8. 2 9. 3 10.1
Directions: Questions(1 to 10)are article based questions and has 3 options in the form of a, an and the .Choose the appropriate use of article to fill the blanks.
My Father is (1) Ethics teacher and I am (2) student.My family lives in (3) village .I have (4) uncle ,who lives in (5) city. He is (6) honest man, he used to be a scientist, who serve (7) nation for 15 years.He told me that he once met (8) alien from the space , who didn’t have (9) nose and therefore he didn’t need (10) oxygen to live.He has many interseting stories like this.
Q1. 1. A 2. an 3. the
Q2. 1. a 2. an 3. the
Q3. 1. a 2. an 3. the
Q4. 1. a 2. an 3. the
Q5. 1. a 2. an 3. the
Q6. 1. a 2. an 3. the
Q7. 1. a 2. an 3. the
Q8. 1. a 2. an 3. the
Q9. 1. a 2. an 3. the
Q10. 1. a 2. an 3. theAnswers
1.2 2.1 3.3 4.2 5.3 6.2 7.3 8.2 9.1 10.2
Q1. What is the term used for measurement of how fast data moves from one place to another?
(a) data per unit (b) bits per second (c) bits per hour (e) ratio per bit (d) None of the above
Q2. Functions of keys F1, F2 and F3 are _____________ respectively.
(a) activating menu bar, search and renaming selected icon (b) search, reboot and activating menu bar
(c) activating help, renaming selected icon and search (d) reboot, activating help and refresh
(e) activating help, reboot, renaming selected icon
Q3. What type of monitoring file is commonly used on and accepted from Internet sites?
(a)Smartware (b) Phishes (c) Cookies (d) Trojans (e) None of the above
Q4. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
(a) Haptics (b) Caves (c) Biometrics (d) RFID (e) All of above
Q5. What is Disk operating system referred for?
(a) Memory management system
(b) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
(d) Both (b) and (c)
(e) None of these
Q6. What does the SMTP in an SMTP server stand for?
(a) Simple Mail Transfer Protocol (b) Serve Message Text Process (c) Short Messaging Text Process
(d) Short Messaging Transfer Protocol (e) Simple Messaging Text Process
Q7. Which among the following was the first graphical web browser?
(a) Mosaic (b) WAIS (c) CERN (d) Gopher (e) None of the above
Q8. What is JDBC?
(a) Utility Software (b) Application Software (c) Application Programming Interface (API)
(d) Programming Language (e) None of the above
Q9. Which of the following is any malicious computer program which is used to hack into a computer by misleading users of its true intent?
(a) Worm (b) Spyware (C) Trojan horse (d) Keylogger (e) VGA file
Q10. Which protocol is used to obtain an IP and other network configuration information from a server on local network?
(a) Transmission Control Protocol (b) User Datagram Protocol (c) Code division multiple access
(d) Dynamic Host Configuration Protocol (e) None of the above
Q11. Name the first widespread computer virus for MS-DOS?
(a) Brain (b) Handshake (c) Code Red (d) Melissa (e) Sasser
Q12. A string of eight 0s and 1s is called a _______.
(a) megabyte (b) byte (c) kilobyte (d) gigabyte (e) bit
Q13. Name the input device from the given options, that cannot be used to work in MS Office?
(a) Scanner (b) Mouse (c) Keyboard (d) Joy stick (e) All of the above
Q14. Which type of virus is generally scripted into common application programs like Excel and Word to infect the other documents and spreads to the other parts when the application is running.?
(a) Macro Viruses (b) File infector virus (c) Resident Viruses (d) Boot virus (e) Worms
Q15. Which of the following scrambles a message by applying a secret code?
(a) Audits (b) Encryption (c) UPS (d) Firewalls (e) Encapsulation
1.b 2.c 3.c 4.c 5.d 6.a 7.a 8.c 9.c 10.d 11.a 12.b 13.d 14.a 15.b