HTET Level 3 PGT Computer Science Answer Key Exam held on 02.01.2021
91.The solitary purpose of NOT gate which of the following ?
(1) To stop signal
(2) Invert input signal
(3) Act as a universal gate
(4) None of the three
Ans. (2) Invert input signal
92. What is the alternate name for white box testing ?
(1) Graph Testing
(2) Basic Path Testing
(3) Glass Box Testing
(4) Dataflow Testing
Ans. (3) Glass Box Testing
93. Which of the following is not a valid deadlock prevention scheme ?
(1) Release all resources before requesting a new resource.
(2) Number the resources uniquely and never request a lower numbered resource than the last one requested.
(3) Never request a resource after releasing any resource.
(4) Request and all required resources be allocated before execution.
Ans. (3) Never request a resource after releasing any resource.
94. What do a peripheral device generate if it needs immediate attention from the operating system ?
(1) Interrupt
(2) Spool
(3) Stack
(4) Page File
Ans. (1) Interrupt
95. Who is known as the father of C Language ?
(1) Bjarne Stroustrup
(2) Dennis Ritchie
(3) James A. Gosling
(4) Dr. E. F. Codd
Ans. (2) Dennis Ritchie
96. In MS-Excel what do we drag or double-click for adjustment of the width of a column ?
(1) Cell pointer
(2) Column marker
(3) Fill handle
(4) Formula bar
Ans. (2) Column marker
97. Which of the following is not one of PowerPoint's views ?
(1) Slide show view
(2) Slide view
(3) Presentation view
(4) Outline view
Ans. (3) Presentation view
98. In the context of computers and internet, choose the odd one out from the following:
(1) Code Red
(2) Melissa
(3) I LOVE YOU
(4) Comodo
Ans. (3) I LOVE YOU
99. Which of the following command interface is normally used for windows operating system ?
(1) Menu driven interface
(2) Command line interface
(3) Graphical user interface
(4) Icon interface
Ans. (3) Graphical user interface
100. Which tool do we use to find a similar or alternative word in a MS Word document ?
(1) Finder
(2) Thesaurus
(3) Dictionary
(4) Grammar checker
Ans. (2) Thesaurus
101. In C program, variable can not start with :
(1) An alphabet
(2) A number
(3) A special symbol other than underscore
(4) A number and A special symbol other than underscore
Ans. (4) A number and A special symbol other than underscore
102. Which is the component of Microsoft Windows that provides the ability to view and change system settings ?
(1) Control panel
(2) Start button
(3) Windows Powershell
(4) Command prompt
Ans. (1) Control panel
103. In MS Excel, fine-tuning an input value to acquire precise outcome is
called :
(1) Goal seek
(2) Charting
(3) Sorting
(4) Validation
Ans : (1) Goal seek
104. Which of the following is not covered by the vital philosophies of software engineering ?
(1) Software security
(2) Software reuse
(3) Software processes
(4) Software validation
Ans : (1) Software security
105. Which key combination is pressed simultaneously to minimize all the currently open windows on your desktop ?
(1) Alt + M
(2) Shift + M
(3) Windows Key + M
(4) Ctrl + D
Ans : (3) Windows Key + M
106. If all the inputs of a NAND gate are connected together then the consequential circuit is
(1) NOR gate
(2) AND gate
(3) NOT gate
(4) None of the three
Ans : (3) NOT gate
107. In MS Excel, creating resulting 'what-if conditions based on several uncertain future conditions is called :
(1) Pivot table
(2) Scenario
(3) Goal seek
(4) Decision Table
Ans : (2) Scenario
108. Which of the following is responsible for extending commands to Arithmetic Logic Unit of a computer ?
(1) Primary memory
(2) Control Unit
(3) External Memory
(4) Cache Memory
Ans : (2) Control Unit
109. Which Key combination can be used in MS-Word to maximize or restore a selected active window ?
(1) Ctrl + F7
(2) Ctrl + F8
(3) Ctrl + F9
(4) Ctrl + F10
Ans : (4) Ctrl + F10
110. In process swapping in operating system, what is the residing location
of swap space ?
(1) RAM
(2) Disk
(3) ROM
(4) On-chip cache
Ans : (2) Disk
111. The key processing component of "Fourth generation computers" comprise of which of the following ?
(1) VLSI Microprocessor
(2) Vacuum Tubes
(3) Diodes
(4) Transistors
Ans : (1) VLSI Microprocessor
112. EBCDIC stands for:
(1) Extended Binary Coded Decimal Interchange Code
(2) Extended Bit Code Decimal Interconversion Code
(3) Extended Bit Case Decimal Interconversion Code
(4) Extended Binary Case Decimal Interchange Code
Ans : (1) Extended Binary Coded Decimal Interchange Code
113. Match the term in Column-I to its description in Column-II :
Column-1 Column-II
i. Ribbon a. Includes the Slide, Notes, and Slide Panes.
ii. Normal view b. Displays commands for managing files.
iii. Current slide c. The slide you are editing.
iv. Backstage view d. A Ribbon tool that opens a dialog box.
v. Dialog box in. e. A toolbar that presents tools in related groups.
launcher
(1) i-d, ii-a, iii-c, iv-b, v-e
(2) i-e, ii-a, iii-c, iv-b, v-d
(3) i-d, ii-c, iii-a, iv-b, v-e
(4) i-d, ii-a, iii-c, iv-e, v-b
Ans : (2) i-e, ii-a, iii-c, iv-b, v-d
114. Microprocessor memory and other parts of the microcomputer are physically connected through which of the following ?
(1) Route
(3) Path
(2) Cache memory
(4) Address bus
Ans : (4) Address bus
115. Software Requirement Specifications Document (SRSD) does not include which of the following ?
(1) Algorithms for Software Implementation
(2) Non-Functional Requirements
(3) Functional Requirements
(4) Goals of Implementation
Ans : (1) Algorithms for Software Implementation
116. In MS-Word which key combination is used to make the selected character superscripted ?
(1) Ctrl + =
(2) Ctrl + Shift + =
(3) Alt + Ctrl + Shift + =
(4) None of the three
Ans : (2) Ctrl + Shift + =
117. In Binary to Octal Number System Conversion, what is the octal equivalent for binary number
(1) 125
(2) 137
(3) 152
(4) 155
Ans : (3) 152
118. (929.19)10 = ?
(1) (1640.41)8,
(2) (1641.141)8,
(3) (1632.141)8,
(4) (1543.34)8
Ans : (2) (1641.141)8,
119. Which key combination shall insert a new slide in current presentation in MS PowerPoint ?
(1) Ctrl + N
(2) Ctrl + M
(3) Ctrl + S
(4) All of the three
Ans : (2) Ctrl + M
120. In context of Operating System File Management Function what is the
full form of FAT ?
(1) File Attribute Table
(2) File Allocation Table
(3) Format All Tabs
(4) File Attribute Type
Ans : (2) File Allocation Table
121. Primary author of HTML (Hyper Text Markup Language) is ?
(1) Brendan Eich
(2) Tim Berners-Lee
(3) Google
(4) Peter Norton
Ans : (2) Tim Berners-Lee
122. Which of the following protocol used to transmit information on the World Wide Web ?
(1) HTT
(3) HTTP
(2) HPP
(4) HPPT
Ans : (3) HTTP
123. Which of the following is the most commonly used data structure for implementing Dijkstra's Algorithm ?
(1) Max priority queue
(2) Stack
(3) Circular queue
(4) Min priority queue
Ans : (4) Min priority queue
124. What tag is used for adding Images to HTML Web Documents ?
(1) picture
(2) pic
(3) img
(4) src
Ans : (3) img
125. Which SQL Query is used to remove a table and all its data from the database ?
(1) Create Table
(2) Alter Table
(3) Drop Table
(4) None of three
Ans : (3) Drop Table
126. Which of the following term is used for a computer network that typically connects personal computers within a limited geographical area, usually within a single building ?
(1) LAN
(3) MAN
(2) WAN
(4) BAN
Ans : (1) LAN
127. Which database normal form is considered satisfactory for relational database design ?
(1) 1 NF
(2) 2 NF
(3) 3 NF
(4) 4 NF
Ans : (3) 3 NF
128. A Database Management System (DBMS) is :
(1) Collection of interrelated data
(2) Collection of programs to access data
(3) Collection of data describing one particular enterprise
(4) All of the three
Ans : (4) All of the three
129. From which of the following is HTML derived ?
(1) URL
(2) TCP/IP
(3) SGML
(4) XML
Ans : (3) SGML
130. In DBMS when a transaction completes its execution it is said to be :
(1) Saved
(2) Loaded
(3) Rolled
(4) Committed
Ans : (4) Committed
131. The outcome of a SQL SELECT statement is a:
(1) File
(2) Table
(3) Report
(4) Form
Ans : (2) Table
132. Socket address is :
(1) IPv4 address translated to IPv6 address
(2) Combination of IP address and port address
(3) Combination of MAC address and domain address
(4) Application layer address
Ans : (2) Combination of IP address and port address
133. What is ACID properties of DBMS Transactions ?
(1) Atomicity. Consistency, Isolation, Database
(2) Atomicity, Consistency, Isolation, Durability
(3) Atomicity. Consistency, Inconsistent, Durability
(4) Automatically, Concurrency Isolation, Durability
Ans : (2) Atomicity, Consistency, Isolation, Durability
134. In C program, what is the right syntax to access value of structure variable book {price, page}?
(1) printf("%d%d", book.price, book. page);
(2) printf("%d%d". price.book page. book):
(3) printf("%d%d", price:book, page :: book):
(4) printf("%d%d", price->book, page->book):
Ans : (1) printf("%d%d", book.price, book. page);
135. Which of the following terms is used to represent "a set of rules" in computer networks ?
(1) Resource locator
(2) Protocol
(3) Domain
(4) URL
Ans : (2) Protocol
136. Which of the following refers to the correctness and completeness of the data in a database ?
(1) Data security
(2) Data integrity
(3) Data constraint
(4) Data independence
Ans: (2) Data integrity
137. Which type of best first search algorithm was used to predict the closeness of the end of path and its solution ?
(1) Greedy BFS
(2) Divide and Conquer
(3) Heuristic BFS
(4) Combinatorial
Ans : (1) Greedy BFS
138. In context of C++, which of the following is valid statement ?
(1) Friend function of class is always a member function of that class.
(2) Value of static data member cannot be manipulated once assigned
(3) Static data member of a class can be accessed only by static member function of that class.
(4) Keywords private, protected and public may appear in any order and any number of times in a class.
Ans : (4) Keywords private, protected and public may appear in any order and any number of times in a class.
139. Which one of the following is the most important quality of a good computer teacher ?
(1) Punctuality
(2) Accepting that computer field is so vast that noboby can have complete or perfect knowledge
(3) Content mastery
(4) Sociable
Ans : (2) Accepting that computer field is so vast that noboby can have complete or perfect knowledge
Or
(3) Content mastery
140. Which device is needed to connect two computer systems, if the systems use different protocols ?
(1) Repeater
(2) Gateway
(3) Bridge
(4) Hub
Ans: (2) Gateway
Ans: (2) Gateway
141, SQL query and modification commands are represented in which of the following ?
(1) DDL
(2) DML
(3) HTML
(4) XML
Ans. (2) DML
142. Which of the following is the best description of the word internet ?
(1) a personal communication system
(2) a corporate communication system
(3) Indian Government communication system
(4) a large network of networks
Ans : (4) a large network of networks
143. In context of internet, deals with rules of framing messages that will not hurt orther users of internet.
(1) Amazon
(2) Net Neutrality
(3) Netiquette
(4) eQuality
Ans : (3) Netiquette
144. Which one of the following is used to sort rows in SQL ?
(1) SORTBY
(2) ALIGNBY
(3) ORDERBY
(4) GROUPBY
Ans : (3) ORDERBY
Ans : (3) ORDERBY
145. The root tag in HTML document is called :
(1) HTML
(2) BODY
(3) TITLE
(4) HEAD
Ans: (1) HTML
146. Who is the founder of Facebook social networking website ?
(1) Bill Gates
(2) Mark Zuckerberg
(3) Martin Cooper
(4) Orkut Buyukkokten
Ans: (2) Mark Zuckerberg
147. Which one of the following is not a valid reserved keyword in C++ ?
(1) explicit
(2) public
(3) implicit
(4) private
Ans : (3) implicit
148. Which of the following networks is considered as the first network that initiated the internet ?
(1) ARPANET
(2) UUCPNET
(3) AOL
(4) PTRINET
Ans : (1) ARPANET
149. What is the right approach to deal with student errors in computer programming ?
(1) There should be zero errors even at stage I.
(2) Having errors means student does not know programming.
(3) Errors are part of a programmer's daily life.
(4) Should scold the student whenever there is an error.
Ans : (3) Errors are part of a programmer's daily life.
150. OCR stands for :
(1) Online Character Rendering
(2) Optical Character Recognition
(3) Online Character Restoration
(4) Optical Character Re-organization
Ans: (2) Optical Character Recognition
For Answer key part-1 Click here