Hello students Welcome To CSE Study247 , Today I am provide you DRDO CEPTAM-10 Computer Science Paper Solution : 12 Jan 2023 , That is very useful for next upcoming Exam of DRDO CEPTAM-11
About DRDO
Defence Research and Development Organisation is the premier agency under the Department of Defence Research and Development in Ministry of Defence of the Government of India, charged with the military’s research and development, headquartered in Delhi, India.
Today, DRDO is a network of more than 50 laboratories which are deeply engaged in developing defence technologies covering various disciplines, like aeronautics, armaments, electronics, combat vehicles, engineering systems, instrumentation, missiles, advanced computing and simulation, special materials, naval systems, life sciences, training, information systems and agriculture. Several major projects for the development of missiles, armaments, light combat aircrafts, radars, electronic warfare systems etc are on hand and significant achievements have already been made in several such technologies.
Q.11 Compiler,editors software come under which type of software ?
ANSWER= (C) System Software
Q.12 The output of NOR Gate is high when ?
ANSWER= (B) Both inputes are low
Q.13 Which of the following is not a binary operator
ANSWER= (B) Project
Q.14 Assembly language used code written as ?
ANSWER= (A) Mnemonic
Q.15 Which of the following is not an element of the X.509 Certificates ?
ANSWER= (B) Serial Modifier
Q.16 Cookies were originally designed for ?
ANSWER= (B) Client Side
Q.17 The logic family with the lowest power of dissipation is ?
ANSWER= (C) CMOS
Q.18 How many AND Gates are required for realize Y=CD
+EF+G ?
ANSWER= (A) 2
Q.19 Mapping of file managed by ?
ANSWER= (B) Metadata
Q.20 What is one the advantage of setting a DMZ with two firewalls ?
ANSWER= (A) You can do load balancing
Q.21 Which transmission media provides the highest transmission speed in a network ?
ANSWER= (C) Optical fiber
Q.22 Which of the following feature makes the AJAX unique ?
ANSWER= (D) It makes data requests asynchronously
Q.23 Which of the following statement is not true regarding javascript ?
ANSWER= (D) Javascript can not run in stand-alone mode (without a browser)
Q.24 Which of the following statement is true regarding HTTP ?
ANSWER= (B) It does no maintain any connection information on previous transaction
Q.25 PDU for the application layer is ?
ANSWER= (C) Message
Q.26 Function point computation is given by the formula ?
ANSWER= (B) fb=count total *[0.65+0.01*sum(fi)
Q.27 How many basic features of OOP are required for a programming language to be purely OOP ?
ANSWER= (A) 7
Q.28 What is the most expensive phase in SDLC ?
ANSWER= (C) Maintenance
Q.29 What is the process of finding and removing/correction of errors ?
ANSWER= (A) Debugging
Q.30 In V model,each and every development phase is associated with ?
ANSWER= (D) Testing Phase
Q.31 Memory address space of 8085 microprocessor ?
ANSWER= (B) 64 KB
Q.32 What is the most expensive phase in SDLC ?
ANSWER= (D) Maintenance
Q.33 Which of the following creates a temporary relation for the query on which it is defines ?
ANSWER= (A) With
Q.34 Consider a paging system with a page size of 4KB. If a process of size 38KB is in logical address space,find the internal fragmentation in Kbytes ?
ANSWER= (A) 2
Q.35 Let the time taken to switch from user mode to kernal mode of execution be T1 while time taken to switch between two user process be T2.What is correct
ANSWER= (B) T1
Q.36 A connected planer graph have 5 vertices and 7 edges that contains how manay region ?
A) 4 B) 3
C) 7 D) 11
ANSWER= (A) 4
Q.37 The Bandwidth of FDMA ?
A) Wide B) Long
C) Short D) Narrow
ANSWER= (D) Narrow
Q.38 The shielded twisted pair cables maximum data transfer rate around ?
A) 10 Mbps B) 20 Mbps
C) 50 Mbps D) 100 Mbps
ANSWER= (D) 100 Mbps
Q.39 Which of the following inforamtion security technology is use for avoiding browser based hacking ?
A) Anti-malware in browser B) Remote browser access
C) Adware removers in browsers D) Incognite mode in browsers
ANSWER= (B) Remote browser access
Q.40 Which of the following is used for add new row ?
A) Alter table B) Add row
C) Insert D) Append
ANSWER= (C) Insert
Q.41 What is the subtraction of 1010-101 ?
A) 01 B) 11
C) 10 D) 11
ANSWER= (A) 01
Q.42 Shell sort is based on ?
A) Insertion sort B) Quick Sort
C) Heap Sort D) Radix Sort
ANSWER= (A) Insertion sort
Q.43 A rectangle represents which of the following in an ERD ?
A) Attribute B) Entity
C) Relationship D) Primary key
ANSWER= (B) Entity
Q.44 Which gates in digital circuits are required to convert a NOR based SR latch to an SR flip-flop ?
A) Two 2 inputs AND gates B) Two 3 inputs AND gates
C) Two 2 inputs OR gates D) Two 3 inputs OR gates
ANSWER= (A) Two 2 inputs AND gates
Q.45 Divide and conquer method is used in ?
A) Insertion sort B) Quick sort
C) Heap sort D) Radix sort
ANSWER= (B) Quick sort
Q.46 The technique used for transferring large amount of data to and froma memory in a short time ?
A) DMAA B) Programmed I/O
C) Interrupt Driven I/O D) None of these
ANSWER= (A) DMAA
Q.47 Which of the following is true ?
A) X+1=0 B) X+0=1
C) X+X=X D) X.0=1
ANSWER= (C) X+X=X
Q.48 Which of the following is the correct way of implementing an interface salary by class ?
A) Class manager extends salary {}
B) Class Manager imports salary {}
C) Class manager implements salary {} D) None of these
ANSWER= (C) Class manager implements salary {}
Q.49 Cache memory is based on the the property of ?
A) Locality of references
B) Memory localization
C) Memory size D) All of these
ANSWER= (A) Locality of references
Q.50 Topology is the arrangement of network in ?
A) Logical
B) Physical
C) Both A & B D) None of these
ANSWER= (C) Both A & B
Q.51 How to access data members of a class ?
A) Dot arrow or dirct call
B) Dot Operator
C) Arrow operator D) Dot or arrow as required
ANSWER= (D) Dot or arrow as required
Q.52 The cost of storing a bit is minimum in
A) Cache
B) Register
C) RAM D) Magnetic tape
ANSWER= (D) Magnetic tape
Q.53 Half of a Byte is equal to ?
A) Nibble
B) Bit
C) Data D) Half byte
ANSWER= (A) Nibble
Q.54 Which among the following is not property of an object ?
A) Identity
B) Properties
C) Attributes D) Names
ANSWER= (D) Names
Q.55 The highest priority interrupt in 8085 is ?
A) TRAP
B) RST 6.5
C) INTR D) RST 7.5
ANSWER= (A) TRAP
Q.56 FOr Designing a normal RDBMS Which of the following normal from is considered adequate ?
A) 4NF
B) 3NF
C) 2NF D) 5NF
ANSWER= (B) 3NF
Q.57 Which phase is not available in software life cycle ?
A) Coding
B) Testing
C) Maintenance D) Abstraction
ANSWER= (D) Abstracti
Q.58 An n-bit microprocessor has ?
A) n-bit progarm counter
B) n-bit address register
C) n-bit ALU D) n-bit instructin register
ANSWER= (D) n-bit instructin register
Q.59 Which of the following data structure is non linear data structure ?
A) Linked list
B) Tree
C) Arrays D) Stack
ANSWER= (B) Tree
Q.60 Most packet switches use this principle ?
A) Stop and wait
B) Stored and forward
C) Store and wait D) Stp and forward
ANSWER= (B) Stored and forward
Q.61 Which of the following is not the phase of classical waterfall model ?
A) Feasibility study
B) Requirement Analysis
C) Building protype D) Maintenance
ANSWER= (C) Building protype
Q.62 Which of the following is used with BETWEEN ?
A) HAVING
B) SELECT
C) WHERE D) LIKE
ANSWER= (C) WHERE
Q.63 Which of the following is the single tasking operating system ?
A) Window B) UNIX C) MS-DOS D) Linux
ANSWER= (C) MS-DOS
Q.64 The number of tuples in a relation is called ?
A) Attributes B) Degree C) Cardinality
D) Domain
ANSWER= (C) Cardinality
Q.65 Extended ASCII Code has — bits ?
A) 7 B) 10 C) 8
D) 4
ANSWER= (C) 8
Q.66 The address 192.168.123.132 is a class of C address uses a subnet mask ?
A) 296.345.444.255 B) 255.255.255.240 C) 239.444.555.255
D) 255.255.255.0
ANSWER= (D) 255.255.255.0
Q.67 If there are N Devices(nodes) in a network, what is the number of cable links required for a fully connected mesh tology ?
A) N+1 B) N(N-1) C) N(N-1)/2
D) N-1
ANSWER= (C) N(N-1)/2
Q.68 Suppose that A has obtained a certificate from certification authority X1 and B has obtained Cetificate authority from CA X2. A can use a chain of certificates to obtain B’s public key.In notation of X.509,this chain is reprsented in the correct order as
A) X2 X1 X1 B B) X1 X1 X2 A C) X1 X2 X2 B
D) X1 X2 X2 A
ANSWER= (C) X1 X2 X2 B
Q.69 Which among the following , for a pure OOP Langauge is true ?
A) The langauge should follow 3 or more features of OOP B) The langauge should follow at least 1 features of OOP C) The langauge Must follow all the rules of OOP
D) The langauge must follow only 3 features of OOP
ANSWER= (C) The langauge Must follow all the rules of OOP
Q.70 Which features of the OOPS reduced the use of nested classes ?
A) Binding B) Abstraction C) Encapsulation
D) Inheritance