Вы находитесь на странице: 1из 24

Question 1:

is a type of processor architecture that utilize a small, highly optimized set of instructions.
Response:

CISC
RISC
VISC
LISC

Question 2:
. is a 32-bit number, normally expressed as four octets between the periods.
Response:

Port
Domain name
IP address
None of these

Question 3:
Firewalls are used to protect a communication network system against
Response:

Unauthorized attacks
Virus attacks
Data-driven attacks
Fire-attacks

Question 4:
If BAT is coded as 283, CAT is coded as 383 and ARE is coded as 801, then the code for BETTER is
Response:

213310
213301
123301
012334

Question 5:
If Amits father is Billoos fathers only son and Billoo has neither a brother nor a daughter. What is the relationship between Amit and Billoo?
Response:

UncleNephew
FatherDaughter
FatherSon
GrandfatherGrandson

NCO syllabus
CLASS-12
Total Questions : 50
Time : 1 hr
Syllabus
Section 1 :Verbal and Non-Verbal Reasoning.( 10 marks)
Section 2 :

Programming in C++
Database Concepts
SQL
Boolean Algebra
MS-Word 2010
MS-Excel 2010
HTML
Networking & Topologies
Network Security Concepts
Cyber ethics
Viruses and Antiviruses
Open Source Terminologies
Windows 7 (35 marks)

Section 3 :Higher Order Thinking Questions - Syllabus as per Section 2. (15


marks)
Question 6:
A functional dependency between two or more non-key attribute is called
Response:

Transitive dependency
Partial transitive dependency
Functional dependency
Partial functional dependency

Question 7:
If a datagram router goes down then ..............
Response:

all packets will suffer


only those packets which are queued in
the router at that time will suffer

only those packets which are not queued


in the router at that time will suffer
no packets will suffer

Question 8:
Which type of switching uses the entire capacity of a dedicated link?
Response:

circuit switching
datagram packet switching
virtual circuit packet switching
message switching

Question 9:
Introducing a lady Rohan said, Her mother is the only daughter of my mother in law. How is Rohan related with that lady?
Response:

Brother
Uncle
Husband
Father

Question 10:
There is a statement or short paragraph followed by two conclusions I and II. Assuming the statement to be true mark the correct option.
Statement: Since, the feeling of superiority is built in wherever there is social development, there is a little that can be done to arrest it except at the cost of social development.
Con. I To maintain social development complex should be allowed to continue.
Con. II social development and complex run side by side.
Response:

Only conclusion I follows


Only conclusion II follows
Both I and II follow
Neither I nor II follows

Question 11:
Which one of the following is not a linear data structure?
Response:

Array
Binary Tree
Queue
Stack

Question 12:

In MS Access, after creating the table which of the following is correct?


Response:

Fields cannot be added


Fields cannot be deleted
Fields can added but only once
Fields can added and deleted as needed

Question 13:
A set of rules that govern all aspects of information communication is called
Response:

Server
Internet
Protocol
OSI Model

Question 14:
If P denotes +, Q denotes - , R denotes and S denotes then which of the following equations is correct?
Response:

36 R 4 S 8 Q 7 P 4 =10
16 R 12 P 49 S 7 Q 9= 200
32 S 8 R 9 = 160 Q 12 R 12
8 R 8 P 8 S 8 Q 8 = 57

Question 15:
Group the given figures into three classes using each figure only once.

Response:

1,2,5 ; 3,7,8 ; 4,6,9


1,7,2 ; 3,9,6 ; 4,5,8
2,3,8 ; 4,6,9 ; 1,5,7
5,6,9 ; 3,4,1 ; 2,7,8

Question 16:
IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following:
Response:

Number of bits required for IPv4 address


is more than number of bits required for
IPv6 address.
Number of bits required for IPv4 address
is same as number of bits required for
IPv6 address.
Number of bits required for IPv4 address
is less than number of bits required for
IPv6 address.
Number of bits required for IPv4 address
is 64.

Question 17:
Which of the following is a wrong direction to guard against a Phishing attack?
Response:

Log on to a site by typing the proper URL


in the address bar
Ensure that the URL of the login page
starts with http:// and not https://
Give user id and password only at
authenticated login page
Look for the lock sign/icon and Verisign
certificate

Question 18:
Each of data files has a _____ that describe the way the data is stored in the file.
Response:

File structure
Records
Fields
Database

Question 19:
Select a suitable figure from the Answer Figures that would replace the question mark(?).

Response:

1
2
3
4

Question 20:
Rita told Mani, The girl I met yesterday at the beach was the youngest daughter of the brother in law of my friends mother.
How is the girl related to Ritas friend?
Response:

Cousin
Daughter
Niece
Friend

Question 21:
In MS Excel, Which of the following option is not available in Paste Special dialog box?
Response:

Add
Subtract
Divide
SQRT

Question 22:
Which operator performs pattern matching in SQL?
Response:

BETWEEN operator
LIKE operator
EXISTS operator
None of these
Question 23:
What is function?
Response:

Function is a block of statements that


perform some specific task.
Function is the fundamental modular unit.
A function is usually designed to perform
a specific task.
Function is a block of code that performs
a specific task. It has a name and it is

reusable.
All of the above

Question 24:
Find out from amongst the four alternatives as to how the pattern would appear when the transparent sheet is folded at the dotted line.

Response:

1
2
3
4

Question 25:
If CONTRIBUTE is written as ETBUIRNTOC, which letter will be in the sixth place when counted from the left if POPULARISE is written in that code ?
Response:

L
A
I

R
Question 26:
Which of the following is not a field in the Ethernet Message packet?
Response:

Type
Data
Pin-code
Address

Question 27:
Which Disk Format can access by MS-Dos 6.0?
Response:

OSX
FAT
NTFS
EXT2

Question 28:
In Computer Architecture a Bus is ____.
Response:

Collection of various software


Collection of various computers
Collection of shared communication
wires
Collection of chairs where the user sits

Question 29:
Kailash remembers that his brother Deepaks birthday falls after 20 th May but before 28th May, while
Geeta remembers that Deepaks birthday falls before 22 nd may but after 12th May. On what date
Deepaks birthday falls?
Response:

20th May
21st May
22nd May
Cannot be determined

Question 30:
Choose the correct alternative from the following:
Assertion (A): Downpour of rain lessens the humidity in the atmosphere.
Reason(R): Rains are caused when atmosphere cannot hold more moisture.
Response:

Both A and R are true and R is the correct


explanation of A.

Question 56:

Which hole is used to mark the location of the first sector in a soft sectored disk?
Response:

Address
Location
Index
Label

Question 57:
The ability of a subsystem to be substituted for the originally designated equipment is
Response:

Versatility
Compatibility
Reliability
Computability

Question 58:
A machine associated with card based data processing is
Response:

Codomain
Collator
Cartridge
Digitizer

Question 59:
Two cars start from the opposite places of a main road, 150km apart. First car runs for 25 km and takes a right turn and then runs 15 km. It then turns and then runs for another 35 km and then takes the
direction back to reach the main road. In the meantime, due to minor break down the other car has run only 35 km along the main road. What would be the distance between two cars at this point?
Response:

65 km
75 Km
80 km
85 Km

Question 60:
In a game of eight players lasting for 70 minutes, six substitutes alternate with each player. This means that all players, including the substitutes, are on the pitch for the same length of time. For how long?
Response:

55 minutes
45 minutes
40 minutes
30 minutes

Question 61:
Which is a programming language for military applications?
Response:

COBOL
CORAL
C
FORTRAN

Question 62:
Which among the following has been standardized in the IEEE 803 specifications?
Response:

Bluetooth
Ethernet
WiMAX
All of the above

Question 63:
State the correct external command?
Response:

Chkdsk.exe
Attrib.exe
Restore.exe
Backup.exe

Question 64:
Information: Dev, Kumar, Nilesh, Ankur and Pintu are standing facing to the North in a playground such as given below:
1. Kumar is at 40 m to the right of Ankur.
2. Dev is are 60 m in the south of kumar.
3. Nilesh is at a distance of 25 m in the west of Ankur.
4. Pintu is at a distance of 90 m in the North of Dev.
Which one is in the North-East of the person who is to the left of Kumar?
Response:

Dev
Nilesh
Ankur
Pintu

Question 65:
In a certain code language, 3a, 2b, 7c means Truth is Eternal; 7c, 9a, 8b, 3a means Enmity is not Eternal and 9a, 4d, 2b, 8b means Truth does not perish.
Which of the following means enmity in that language?
Response:

3a
7c
8b
9a

Question 65:
Which of the following device is used to read information given on a credit card?
Response:

Numeric keypad
Graphic tablet
Bar code reader
Magnetic strip reader

Question 66:
If A + B means A is the mother of B; A - B means A is the brother B; A % B means A is the father of B and A x B means A is the sister of B, which of the following shows that P is the maternal uncle of Q?
Response:

P-M+NxQ
Q-N+MxP
P+SxN-Q

Q-S%P
Question 67:
Project management will be made a separate division on the basis of:
Response:

Inter dependencies among departments


Sharing of resource
Size of the project
All of the above
Question 68:
Which of the following is logical statement?
Response:

Not gate is also called inverter


Try to run fast
Dont tell lie
All of these
Question 69:
A full binary tree with n non leaf nodes contain ____.
Response:

Iog2n nodes
n+1 nodes
2n nodes
2n+1 nodes
Question 70:
Kunal asn Vikram start from a fixed point. Kunal moves 4 Km to the South, then turns left and
moves 3 Km. Vikram moves 3 Km towards west, then turns right and moves 4 Km further. How far
apart are they now?
Response:

7 Km
13 Km
10 Km
14 Km
Question 71:
If X is the brother of the son of Ys son, then how is X related to Y?
Response:

Son
Brother
Nephew
Grandson

Question 102:

A logical schema
Response:

Is the entire database.


Describe data in terms of relational tables
and columns, object-oriented classes, and
XML tags.
Describes how data is actually stored on
disk.
Both (A) and (C)
Question 103:
The way a particular application views the data from the database that the application uses is a
Response:

Module
Relational model
Schema
Sub schema
Question 104:
The relational model feature is that there
Response:

Is no need for primary key data


Is much more data independence than
some other database models
Are explicit relationships among records
Are tables with many dimensions
Question 105:
Four usual dice are thrown on the ground. The total of numbers on the top faces of these four dice is 13 as the top faces showed 4, 3, 1 and 5 respectively. What is the total of the faces touching the
ground?
Response:

12
13
15
Cannot be determined
Question 106:
Identify the figure that completes the pattern.

Response:

1
2
3
4

Question 107:
Reusability is a desirable feature of a language as it
Response:

decreases the testing time


lowers the maintenance cost
reduces the compilation time
Both (a) and (b)
Question 108:
A DBMS query language is designed to
Response:

Support end users who use English-like


commands
Support in the development of complex
applications software
Specify the structure of a database.
All of the above.
Question 109:
Which among following is responsible for finding and loading operating system into RAM?
Response:

Bootstrap Loader
CMOS
BIOS
DMOS
Question 110:
Find the missing number in the series.
2, 10, 30, 68, 130, ?
Response:

231

190
214
222
Question 111:
In a row of boys, Amrith is seventh from the left and Amar is twelfth from the right. If they interchange their positions, Amrith becomes 22 ndfrom the left. How many boys are there in the row?
Response:

19
31
33
34
Question 112:
When the inheritance is private, the private methods in base class are.................. in the derived class (in C++).
Response:

Inaccessible
Accessible
Protected
Public
Question 113:
Which of the following is not a property of fibre optic cabling?
Response:

Transmits at faster speeds than copper


cabling
Easier to capture a signal from than
copper cabling
Very resistant to interference
Carries signals as light waves
Question 114:
What is the primary difference between a pivot table report and a cross tab query?
Response:

A pivot table report can contain sums,


counts, and averages while a cross tab
query cannot
You can't pivot a cross tab query
A cross tab query lets you group similar
items. A pivot table report does not
All of the above

Question 115:
If stands for addition , + for multiplication, for subtraction and for division, which one of the following equations is wrong ?
Response:

5 2 + 12 6 2 = 27
5 + 2 12 6 2 = 13
5 + 2 12 6 2 = 10
5 2 + 12 6 - 2 = 3
Question 116:
Count the number of cubes in the figure.

Response:

6
8
9
10

Question 117:
What are lines, curve, freeform and scribble?
Response:

Emphasis effects that can be applied to


animations
Types of custom motion paths
Predefined entrance and exit
effects
All of the above
Question 118:
You've been told about radio frequency eavesdropping and want to protect your network from this threat. Which of the following media types would you choose in this situation?
Response:

UTP
STP
Coax
Fibre
Question 119:

What is a Grouped report?


Response:

A type of report that can be generated by


the report wizard
A report that displays data that has been
sorted in ascending or descending order
A report that displays data grouped by
fields you specify
All of the above
Question 120:
The divisor is 25 times the quotient and 5 times the remainder. If the quotient is 16, the dividend is
Response:

6400
6480
400
480
Question 121:
In a certain code FAVOUR is written as ECURTV. How is FOSTER written in that code?
Response:

GPTUFS
ENRSDS
OFTSRE
EQRWDV
Question 122:
Which statement is valid about interpreter?
Response:

It translates one instruction at a time


Object code is saved for future use
Repeated interpretation is not necessary
All of above
Question 123:
What does the disk drive of a computer do?
Response:

Rotate the disk

Read the disk


Load a program from the disk into the
memory
Both b and c
Question 124:
Who designed the first electronics computer? ENIAC
Response:

Von Neumann
Joseph M Jacquard
J. P. Eckert and J. W. Mauchly
All of above
Question 125:
While sitting in a park, you observe that a smart young man comes to the place on a scooter, leaves it there and goes away with someone else on a motorbike. You would
Response:

Call back the person


Remain engaged in your enjoyment
Chase the person
Inform the police at the nearby booth.
Question 126:
Find the next number in the given series.
14, 22, 32, 44,
Response:

50
48
58
62

Question 127:
Four girls are sitting on a bench to be photographed. Shikha is to the left of Reena. Manju is to the right of Reena. Rita is between Reena and Manju. Who would be second from the left in the photograph?
Response:

Reena
Shikha
Manju

Rita
Question 128:
Select a figure from amongst the Answer Figures which will continue the same series as established by the five problem Figures.

Response:

1
2
3
4
Question 129:
Identify this device

Response:

Router
Bridge
Hub
Modem
Question 130:
In C++, a derivation of a class from a base class is possible even if the base class's source code is not available.

True/false
Question 131:
EEPROM is also known as Flash memory

True/false
Question 132:
Which of this is NOT a phase in network security?
Response:

Inspection
Detection
Protection
Formulation
Question 133:
In C++ , Constants are always passed by value to a function.

False

True

Question 134:
The encryption and decryption algorithms are referred as_________
Response:

Blowfish
Ciphers
Private key
Ciptext
Question 135:
Find out the alternative figure which contains figure (X) as its part.

Response:

1
2
3
4
Question 136:
If a clock takes seven seconds to strike seven, how long will take to strike ten ?
Response:

7 seconds
9 seconds
10 seconds
None of these

Question 137:
Which of the following statements about C++ are true
Statement 1 : C++ was developed by Bjarne Stroustrup in early 1980s
Statement 2 : C++ provides following tokens (smallest individual unit in program) : keywords, identifiers,
literals, punctuator, operators
Statement 3 : C++ allows following literals: integerconstant
(Decimal, Octal, Hexadecimal), characterconstant,
floatingconstant,
stringliteral
Statement 4 : C++ provides two types of data types: fundamental and derived data types.
Response:

1 and 2 only
1 only
1, 3 and 4 only
All of these
Question 138:
Which of the following is NOT a firewall technique?
Response:

Proxy server
Data server
Packet filter
Application gateway
Question 139:
The original/initial name of Google is RIM.
Response:

False

False

Question 140:
In following alphabet series, one term missing as shown by question mark(?). Choose missing term from options .
U,O,I,?,A
Response:

E
C
S
G
Question 141:
If the girl is facing west and turns 270 0 in a clockwise direction, in which direction will she be facing ?
Response:

South East
West
North
South
Question 142:
If table is of size 365 72, what is the cardinality of a table?
Response:

365
26280
72
5
Question 143:
Marburg is an example of ____________ virus.
Response:

Polymorphic virus
Macro virus
Parasitic virus
Multi parasitic virus.
Question 144:
0101001 is the 2s complement of which of the following binary number?
Response:

1010111
0001001
0101000
1101001
Question 145:
Which of the following answer figure will complete the following pattern?

Response:

A
B
E
D
Question 146:
Study the following arrangement carefully and answer the questions given below:-B #AR 5 8 E % M F 4 J 1 U @ H 2 9 TI 6 * W 3 P # K 7 $ Y
How many such numbers are there in the above arrangement each of which is immediately preceded by a consonant and also immediately followed by a symbol?
Response:

One
Two
Three

More than three

Question 147:
Which of the following is a network topology in which each node has two communicating subordinates but there is no master node for controlling other nodes?
Response:

Ring
Star
Hybrid
Bus
Question 148:
Which of the following statement(s) is/are correct?
(a) A non-key attribute, whose values are derived from the primary key of some other table is a foreign key.
(b) Derivation of values from the primary key of some other table is termed as Referential integrity.
Response:

Only (a)
Only (b)
Both (a) and (b)
Neither (a) nor (b)
Question 149:
Match the given SQL command in column I with their function given in column II.
Response:

Match

Correct
Answer

User
answer

Feedback

Match

Correct
Answer

User
answer

Feedback

Drop

Removes
all the
tables
rows,
indexes
and
privilege
s

Removes
all the
tables
rows,
indexes
and
privilege
s

Comman
d is used
to
remove
rows
from a
table
using
where

Comman
d is used
to
remove
rows
from a
table
using
where

Delete

Correct
Answer

User
answer

clause

clause

Truncat
e

Removes
all rows
from a
table not
table
structure

Removes
all rows
from a
table not
table
structure

Count
(*)

Gives
number
of rows

Gives
number
of rows

Match

Feedback

Question 150:
The divisor is 25 times the quotient and 5 times the remainder. If the quotient is 16, the dividend is
Response:

6400
6480
400
480
Question 151:
In a certain code FAVOUR is written as ECURTV. How is FOSTER written in that code?
Response:

GPTUFS
ENRSDS
OFTSRE
EQRWDV

Вам также может понравиться