Professional Documents
Culture Documents
Bihar STET Previous Year Question Paper 2 Computer Science Shift 1 1
Bihar STET Previous Year Question Paper 2 Computer Science Shift 1 1
Subject Question
Question 1 Question Id : 1
What is the simplified expression for the Boolean function F(A, B, C, D) = Σ(0, 1, 2, 4, 5, 6, 8, 9, 10, 12, 13, 14) using the K-map method?
Answer : Option Id
(A) A'B'C'D' + A'B'C'D + A'BC'D + AB'C'D + ABCD
1001
Question 2 Question Id : 55
In a PLA, what components are used to implement the combinational logic functions?
Answer : Option Id
(A) AND gates and OR gates
55001
Question 3 Question Id : 54
Which type of register is primarily used to temporarily hold data during arithmetic and logical operations in a microprocessor?
Answer : Option Id
(A) Shift register
54001
Question 4 Question Id : 53
Which logic family uses both depletion and enhancement mode MOSFETs for its operation?
Answer : Option Id
(A) TTL
53001
(B) ECL
53002
(C) PMOS
53003
(D) CMOS
53004
(C) ROM is used for data storage, while RAM is used for program execution
52003
(D) ROM stores permanent data that cannot be changed, while RAM stores temporary data that can be read and written
52004
Question 6 Question Id : 51
Given a Boolean function F(A, B, C) = Σ(0, 1, 2, 3, 5), what is the expression in SOP form?
Answer : Option Id
(A) A'B' + AB' + AB + AC
51001
(B) A + B + C
51002
(D) A'B'C'
51004
Question 7 Question Id : 50
If the sum of two positive binary numbers is 11010 and there is a carry-out from the MSB, what should be done to obtain the correct result?
Answer : Option Id
(A) Discard the carry
50001
Question 8 Question Id : 49
In binary multiplication using the simple method, what is the first step after aligning the digits and preparing for multiplication?
Answer : Option Id
(A) Multiply the least significant bit (LSB) by the multiplier
49001
Question 9 Question Id : 48
What is the relationship between the distance between parity bits and their error detection and correction capability in Hamming Code?
Answer : Option Id
(A) Closer parity bits provide higher error correction capability
48001
(C) Distance between parity bits has no impact on error correction capability
48003
Question 10 Question Id : 47
To convert a Gray Code to its binary equivalent, which technique is commonly used?
Answer : Option Id
(A) Subtraction method
47001
Question 11 Question Id : 46
Which component of an ideal microcomputer is responsible for temporarily holding data and instructions during processing?
Answer : Option Id
(A) CPU
46001
(B) ALU
46002
(C) Memory
46003
Question 12 Question Id : 45
How is the width of the data bus typically measured in a microcomputer system?
Answer : Option Id
(A) In kilobytes (KB)
45001
(C) In bits
45003
Question 13 Question Id : 44
Microcontrollers find application in various fields. What is a typical application of microcontrollers in the automotive industry?
Answer : Option Id
(A) Operating systems for computers
44001
Question 14 Question Id : 43
Which data structure often results in a time-space tradeoff by using extra memory to speed up operations?
Answer : Option Id
(A) Arrays
43001
(D) Stacks
43004
Question 15 Question Id : 42
Which term refers to the strategy of optimizing an algorithm's use of resources, often by making sacrifices in one aspect for improvements in another?
Answer : Option Id
(A) Greedy algorithm
42001
(D) Tradeoff
42004
Question 16 Question Id : 41
Conditional asymptotic notation allows for a more nuanced analysis of algorithm behavior under specific conditions. This is particularly useful when:
Answer : Option Id
(A) Analyzing algorithms with constant time complexity
41001
Question 17 Question Id : 56
.If an algorithm's behavior is bounded by "o(f(n)) if g(n)", what notation does it become when the condition is removed?
Answer : Option Id
(A) o(f(n))
56001
(B) o(g(n))
56002
Question 19 Question Id : 58
Divide and Conquer is an algorithmic paradigm that solves problems by:
Answer : Option Id
(A) Iteratively solving subproblems
58001
Question 20 Question Id : 67
A threaded binary tree is a binary tree in which:
Answer : Option Id
(A) Each node has two children
67001
Question 21 Question Id : 73
Which traversal algorithm is typically implemented using a stack data structure?
Answer : Option Id
(A) DFS
73001
(B) BFS
73002
Question 22 Question Id : 72
In a directed graph, an edge that points from vertex A to vertex B is denoted as:
Answer : Option Id
(A) (A, B)
72001
(B) [A, B]
72002
(D) {A, B}
72004
Question 23 Question Id : 71
Separate chaining involves storing collided elements in separate data structures, typically in:
Answer : Option Id
(A) Linked lists
71001
(B) Arrays
71002
(C) Stacks
71003
(D) Queues
71004
Question 24 Question Id : 70
Which collision resolution technique involves placing collided elements in the next available empty slot in the hash table?
Answer : Option Id
(A) Linear probing
70001
Question 25 Question Id : 69
In the Tower of Hanoi problem with "n" disks, how many moves are required to solve the problem?
Answer : Option Id
(A) n
69001
(B) 2n
69002
(C) 2^n - 1
69003
(D) 2^n
69004
Question 26 Question Id : 68
The process of removing recursion involves replacing recursive function calls with:
Answer : Option Id
(A) More recursive function calls
68001
(B) Loops
68002
Question 27 Question Id : 66
A formal model of protection in an operating system provides:
Answer : Option Id
(A) A mathematical framework for analyzing resource allocation
66001
Question 28 Question Id : 59
In an operating system, a "buffer cache" is used to:
Answer : Option Id
(A) Store files in memory
59001
Question 29 Question Id : 65
File manipulation operations in an operating system include:
Answer : Option Id
(A) Allocating memory to files
65001
Question 30 Question Id : 64
The I/O subsystem in an operating system is responsible for:
Answer : Option Id
(A) Allocating memory for processes
64001
Question 32 Question Id : 62
The purpose of a page table in a paging system is to:
Answer : Option Id
(A) Store pages of memory
62001
Question 33 Question Id : 61
In multiprogramming with fixed partitions, if a process requires more memory than is available in a partition, it may lead to:
Answer : Option Id
(A) Fragmentation
61001
(B) Deadlock
61002
(D) Starvation
61004
Question 34 Question Id : 60
What is DBMS?
Answer : Option Id
(A) DBMS is a collection of queries
60001
Question 35 Question Id : 40
Which of the following is correct according to the technology deployed by DBMS?
Answer : Option Id
(A) Pointers are used to maintain transactional integrity and consistency
40001
Question 36 Question Id : 39
The term "NTFS" refers to which one of the following?
Answer : Option Id
(A) New Technology File System
39001
Question 37 Question Id : 38
Which of the following is a top-down approach in which the entity's higher level can be divided into two lower sub-entities?
Answer : Option Id
(A) Aggregation
38001
(B) Generalization
38002
(C) Specialization
38003
Question 38 Question Id : 37
The term "DFD" stands for?
Answer : Option Id
(A) Data file diagram
37001
Question 39 Question Id : 17
The term "FAT" is stands for_____
Answer : Option Id
(A) File Allocation Tree
17001
Question 40 Question Id : 16
The term "Data" refers to:
Answer : Option Id
(A) The electronic representation of the information(or data)
16001
Question 41 Question Id : 15
What is the primary function of routing in the network layer?
Answer : Option Id
(A) Data framing
15001
Question 42 Question Id : 14
What is a socket in the context of process-to-process communication?
Answer : Option Id
(A) A hardware device for data transmission
14001
Question 43 Question Id : 13
Data transmission using multiple pathways simultaneously is known as:
Answer : Option Id
(A) Parallel Transmission
13001
(B) Ring
12002
(C) Disk
12003
(D) Mesh
12004
Question 45 Question Id : 11
Contention-based MAC protocols are commonly used in:
Answer : Option Id
(A) Ethernet networks
11001
Question 46 Question Id : 10
Routing involves:
Answer : Option Id
(A) Dividing data into frames
10001
Question 47 Question Id : 9
What is the purpose of ARP (Address Resolution Protocol)?
Answer : Option Id
(A) To assign IP addresses to devices
9001
Question 48 Question Id : 8
Which software life cycle model allows for iterative development and incorporates risk analysis?
Answer : Option Id
(A) Waterfall model
8001
Question 49 Question Id : 7
What is the main goal of software quality assurance?
Answer : Option Id
(A) To eliminate all defects from the software
7001
(C) To establish and enforce standards and processes to improve software quality
7003
Question 50 Question Id : 6
Reverse engineering is primarily used for:
Answer : Option Id
(A) Creating new software from scratch
6001
Question 51 Question Id : 5
Which testing approach involves testing individual components or units of code?
Answer : Option Id
(A) Integration Testing
5001
Question 52 Question Id : 4
What is the main goal of System Testing?
Answer : Option Id
(A) Testing individual components in isolation
4001
Question 53 Question Id : 3
Which metric is used for estimating the size of a software project?
Answer : Option Id
(A) Cyclomatic Complexity
3001
Question 54 Question Id : 18
What is the purpose of staffing level estimation in software project management?
Answer : Option Id
(A) To determine the number of hardware components required
18001
Question 55 Question Id : 2
Which keyword is used to create an instance of a class in most programming languages?
Answer : Option Id
(A) alloc
2001
(B) new
2002
(C) create
2003
(D) instance
2004
Question 56 Question Id : 19
What is an abstract class in OOP?
Answer : Option Id
(A) A class with no methods
19001
Question 58 Question Id : 36
Which of the following best defines a class?
Answer : Option Id
(A) An instance of an object
36001
Question 59 Question Id : 35
Which principle ensures that only essential information is visible to the outside world?
Answer : Option Id
(A) Polymorphism
35001
(C) Encapsulation
35003
(D) Abstraction
35004
Question 60 Question Id : 34
What is the main purpose of inheritance in OOP?
Answer : Option Id
(A) To create instances of classes
34001
Question 61 Question Id : 33
What are abstract methods?
Answer : Option Id
(A) Methods that are inaccessible to the outside world
33001
Question 62 Question Id : 32
Which protocol is commonly used for sending emails?
Answer : Option Id
(A) .HTTPS
32001
(B) FTP
32002
(C) SMTP
32003
(D) TCP
32004
Question 63 Question Id : 31
What does CSS stand for?
Answer : Option Id
(A) Cascading Style System
31001
Question 64 Question Id : 30
Which library simplifies JavaScript tasks like HTML document traversal and manipulation?
Answer : Option Id
(A) JavaFX
30001
(B) Bootstrap
30002
(C) React
30003
(D) jQuery
30004
Question 65 Question Id : 29
What does AJAX stand for?
Answer : Option Id
(A) Asynchronous JavaScript and XML
29001
Question 66 Question Id : 28
How does the DOM tree structure reflect the hierarchy of HTML elements?
Answer : Option Id
(A) In alphabetical order
28001
Question 67 Question Id : 27
In XML, which attribute is used to uniquely identify an element?
Answer : Option Id
(A) id
27001
(B) class
27002
(C) name
27003
(D) tag
27004
Question 68 Question Id : 26
The Kleene Star operation accepts the following string of finite length over set A = {0,1} | where string s contains even number of 0 and 1.
Answer : Option Id
(A) 01, 0011,010101
26001
Question 69 Question Id : 25
A Language for which DFA exist is a________
Answer : Option Id
(A) Regular Language
25001
(B) v-1
24002
(C) u-1v-1
24003
(D) ε
24004
Question 71 Question Id : 23
For a DFA accepting binary numbers whose decimal equivalent is divisible by 3, what are all the possible remainders?
Answer : Option Id
(A) 0
23001
(B) 0,2
23002
(C) 0,1,2
23003
(D) 0,1,2,3
23004
Question 72 Question Id : 22
Minimum Number of states require to accept string ends with 101.
Answer : Option Id
(A) 3
22001
(B) 2
22002
(C) 1
22003
Question 73 Question Id : 74
If NFA of 5 states excluding the initial state is converted into DFA, maximum possible number of states for the DFA is?
Answer : Option Id
(A) 64
74001
(B) 32
74002
(C) 128
74003
(D) 187
74004
Question 74 Question Id : 20
The class of CFG is not closed under
Answer : Option Id
(A) Concatenation
20001
(B) Intersection
20002
(C) Union
20003
Question 75 Question Id : 75
Which among the following is not true about IoT?
Answer : Option Id
(A) IoT uses Micro Controllers
75001
Question 76 Question Id : 78
About IoT, which among the followings isnot correct?
Answer : Option Id
(A) Light sensor is analog
78001
Question 77 Question Id : 92
BLE stands for
Answer : Option Id
(A) Bluetooth large energy
92001
Question 78 Question Id : 93
WSN stands for?
Answer : Option Id
(A) Wireless Standard Protocol
93001
Question 79 Question Id : 94
A complex SCADA system has _______levels?
Answer : Option Id
(A) 6
94001
(B) 5
94002
(C) 3
94003
(D) 4
94004
Question 80 Question Id : 97
What is the role of the MISO pin in the RFID Module?
Answer : Option Id
(A) Master In Slave Out
97001
Question 81 Question Id : 96
Who is known as the father of AI?
Answer : Option Id
(A) Fisher Ada
96001
Question 82 Question Id : 91
Programming language commonly used for AI is___?
Answer : Option Id
(A) Lisp
91001
(B) Perl
91002
(C) Prolog
91003
(D) C++
91004
Question 84 Question Id : 99
Uniform-cost search expands the node n with the __________
Answer : Option Id
(A) Lowest path cost
99001
(B) Abstraction
100002
Question 86 Question Id : 95
What does a first order predicate logic contain?
Answer : Option Id
(A) Predicate and a subject
95001
Question 87 Question Id : 90
Which of the following can improve the performance of AI agent?
Answer : Option Id
(A) Precision
90001
(B) Learning
90002
(C) Observing
90003
Question 88 Question Id : 77
Which of the following is part of the four main types for e-commerce?
Answer : Option Id
(A) B2B
77001
(B) B2C
77002
(C) C2B
77003
Question 89 Question Id : 88
What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively
lower bids until there is only one seller left?
Answer : Option Id
(A) B2B Marketplace
88001
(B) Auction
88002
(D) Intranet
88004
Question 90 Question Id : 87
If it is easy for competitors to enter the market, the threat of new entrants is considered:
Answer : Option Id
(A) Low
87001
(B) High
87002
(C) Moderate
87003
(D) Negligible
87004
Question 91 Question Id : 89
Which of the following refers to creating products tailored to individual customers?
Answer : Option Id
(A) Customization
89001
(B) Adaptation
89002
(D) Auction
89004
Question 92 Question Id : 86
Which form of e-marketplace brings together buyers and sellers from the same industry?
Answer : Option Id
(A) Horizontal
86001
(B) Vertical
86002
(C) integrated
86003
(D) isolated
86004
Question 93 Question Id : 85
Which of the following is done by Secure Sockets Layers?
Answer : Option Id
(A) creates a secure, private connection to a web server
85001
Question 94 Question Id : 84
The delay that occur during the playback of a stream is called ___________
Answer : Option Id
(A) Stream delay
84001
(C) Jitter
84003
Question 95 Question Id : 76
In teardown state of real time streaming protocol is ___________
Answer : Option Id
(A) the server resources for client
76001
(B) layers
83002
(C) frames
83003
(D) packets
83004
Question 97 Question Id : 82
In Audio and Video Compression, voice is sampled at 8000 samples per second with_____________
Answer : Option Id
(A) 8 bits per sample
82001
Question 98 Question Id : 81
Audio compression can be used for____________
Answer : Option Id
(A) voice and data
81001
Question 99 Question Id : 80
Each ___ represents a particular colour.
Answer : Option Id
(A) Frame
80001
(B) Character
80002
(C) Drawing
79003
(D) Creativity
79004
Art Of Teaching
(C) discussion
121003
(D) illustration
121004
(C) playing
124003
(B) to show
119002
(C) to do
119003
(D) to act
119004
(B) froebel
127002
(C) Montessori
127003
(D) Dewey
127004
(B) teacher
128002
(C) student
128003
(D) I didn't get good marks because the teacher was biased.
108004
(B) Objectivity
118002
(C) Adventure
118003
(B) Walking
116002
(C) Playing
116003
(D) None of these
116004
(B) Application
105002
(C) Analysis
105003
(D) Understanding
105004
(C) Learner-Centered
103003
(D) Teacher-Centered
103004
(B) Creative
109002
(C) Conservative
109003
(D) Active
109004
(B) Castism
110002
(C) Regionalism
110003
(B) as a master
111002
(C) equally
111003
(D) personally
111004
(C) we know the reasons of failure and then being encouraged we work harder than before
112003
(B) Audio
113002
(C) Audio-Visual
113003
Other Skills
(B) Ahoms
149002
(D) Ramosi
149004
(B) 15%
147002
(C) 20%
147003
(D) 25%
147004
(C) JB Kriplani
146003
(B) Bihar
145002
(D) Odisha
145004
(B) 36
138002
(C) 28
138003
(D) 32
138004
(B) 200
137002
(C) 0
137003
(D) 50
137004
(B) 15
136002
(C) 0
136003
(D) -5
136004
(B) Saturday
134002
(C) August
134003
(D) Tuesday
134004
(B) Heart
133002
(C) Lung
133003
(D) Ear
133004
(B) 120
132002
(C) 140
132003
(D) 71/2
132004
(B) OSUV
140002
(C) OQVU
140003
(D) ORVW
140004
(B) Niece
150002
(C) Mother
150003
(D) Cousin
150004