KPPSC Assistant Director IT PAST PAPER 2022

KPPSC Assistant Director IT 2022 MCQs for ASSISTANT DIRECTOR IT in KPPSC test preparation in KPPSC.

KPPSC ASSISTANT DIRECTOR IT PAST PAPER MCQs 2022

Which of the following is not a looping statement of C++?
  1. Do
  2. For
  3. While
  4. Until
The relationship between a derived class (or subclass) and base class is referred to as:
  1. Association
  2. Inheritance
  3. Polymorphism
  4. Aggregation
  5. All of these
In OOP, a constructor function is called whenever
  1. An object is declared
  2. An object is used
  3. A class is declared
  4. A class is used
Which topology is the most expensive to implement?
  1. Star Topology
  2. Mesh Topology
  3. Bus Topology
  4. Ring Topology
Network layer firewall works as:
  1. Packet Filter
  2. Frame Filter
  3. Both A & B
  4. None of these
WPA is used for the security of?
  1. Bluetooth
  2. Ethernet
  3. Wi-Fi
  4. None of these
Under mark parity, each parity bit is:
  1. Alternated between 0 & 1
  2. Always set to 0
  3. Always set to 1
  4. Not used
A packet that is sent by a node to the source to inform it of congestion is called
  1. Change Packet
  2. Congestion Packet
  3. Control Packet
  4. Choke Packet
Which one is not an arithmetic instruction?
  1. JMP
  2. SUB
  3. MUL
  4. DIV
The amount of time that a job waits in a ready queue for getting selected by the CPU is called?
  1. Waiting time
  2. Turnaround time
  3. Completion time
  4. Submission Time
Computer errors caused due to incorrect input data or unreliable programs are often referred to as
  1. IPO
  2. GIGO
  3. ABC
  4. None of these
3×8 decoder will have:
  1. 4 outputs
  2. 5 outputs
  3. 6 outputs
  4. 8 outputs
What minimum number of bits is required to store the Hexadecimal number FF?
  1. 16
  2. 12
  3. 8
  4. 19
  5. 4
Data Integrity means:
  1. Correctness
  2. Consistency
  3. Redundancy
  4. Both A & B
Storing same data on multiple locations is called:
  1. Integrity
  2. Security
  3. Redundancy
  4. None of these
In a table composite key consists of _______ attribute (s).
  1. More than one
  2. One
  3. Two
  4. One & Two
____ normal form removes transitive dependency.
  1. First
  2. Third
  3. Second
  4. BCNF
  5. None of these
Which join refers from the write table that have no matching key in the left table are included in the result set?
  1. Left Outer Join
  2. Right Outer Join
  3. Full Outer Join
  4. Half Outer Join
_________ rollback requires the system to maintain additional information about the state of all the running transactions.
  1. Partial
  2. Total
  3. Time
  4. Commit
  5. All of these
Which of these is a non-profit domain?
  1. .org
  2. .in
  3. .com
  4. all of these
  5. none of these
People to whom a copy of the email will be delivered but they are notified will all the addresses the message is sent to is called:
  1. Blind Carbon Copy
  2. Carbon Copy
  3. Draft
  4. All of these
Which of the following data structures is a non-linear type?
  1. Strings
  2. Lists
  3. Slacks
  4. Graph
  5. All of these
When in-order traversing a tree resulted in E A C K F H D B G; the preorder traversal would return?
  1. FAEKCDHGB
  2. FAEKCDBHG
  3. EAFKHDCBG
  4. FEAKDCHBG
Binary search algorithm cannot be applied to:
  1. Sorted Linked List
  2. Sorted Linear Array
  3. Pointer Array
  4. Sorted Binary Trees
  5. All of these
In which communication mode the data can be sent and received in both directions but not at the same time?
  1. Full-duplex
  2. Duplex
  3. Half-duplex
  4. Simplex
  5. All of these
Which of the following models does not necessitate defining requirements at the earliest in the lifecycle?
  1. Spiral Prototyping
  2. RAD & Waterfall
  3. Prototyping Waterfall
  4. Spiral & RAD
The agile software development model is built based on:
  1. Incremental Development
  2. Linear Development
  3. Iterative Development
  4. Both incremental & Iterative development
Data in ________ bytes size is called Big Data.
  1. Meta
  2. Peta
  3. Giga
  4. Tera
  5. All of these
Which of the following is the benefit of Big Data Processing?
  1. Time Reduction
  2. Cost Reduction
  3. Smarter Business Decisions
  4. All of these
What is a VLOG?
  1. Video Blog
  2. Video Log
  3. Log of blog activity
  4. a software testing tool
  5. all of these
Which of the following technologies was used in fifth generation computer??
  1. Vacum Tubes
  2. Transistors
  3. Integrated circuits
  4. Artificial intelligence
Which of the following tag makes the text bold?
  1. <Fat>
  2. <Emp>
  3. <Black>
  4. <Strong>
Which of the following is a volatile memory ?
  1. RAM
  2. ROM
  3. BIOS
  4. PROM
ROM stands for______
  1. random only memory
  2. read only memory
  3. read only
  4. None
The time factor when determining the efficiency of the algorithm is measured by:
  1. Counting Microseconds
  2. Counting the number of key operations
  3. Counting the number of statements
  4. Counting the kilobytes of algorithm
Hard Disk is an example of:
  1. Optical Storage
  2. Magnetic Storage
  3. Solid-State Device
  4. None of these
Computer Virus operates by:
  1. Dormancy
  2. Replication
  3. Both A & B
  4. None of these
Compact Disc is an example of:
  1. Optical Storage
  2. Magnetic Storage
  3. Solid-state device
  4. None of these
What is the full form of URL?
  1. Uniform routing locator
  2. Universal resource locator
  3. Uniform resource locator
  4. Uniform router locator

Also ReadKPPSC Past Papers MCQs for all previous years online

Leave a Comment

× PPSC FPSC NTS WhatsApp Group