SlideShare a Scribd company logo
DITISS Guess Paper Jun -Jul 2013 Page 1 of 1
CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING
Each question shall carry one mark. There will be a negative
marking i.e., quarter (0.25) mark will be deducted for every
wrong answer.
1. C – programming language is related to which of
the following generation?
1. Fourth
2. Third
3. Second
4. First
2. Who introduce the concept of Stored Program?
1. Charles Babbage
2. Howard A
3. Von Neumann
4. John Atanasoff
3. The primary advantage of key-to-tape data entry
system is___________.
1. A large percentage of editing can be
performed at the time of data entry.
2. Key verification is easily performed
3. The tape is reusable
4. Keying errors can be detected as they occur.
4. While inserting a diskette into the diskette drive of a
PC, the diskette’s label side should face_________.
1. East
2. North
3. South
4. Up
5. Firewire is usually used for__________.
1. Connecting to the internet
2. Downloading Digital Camera pictures
3. Connecting to the printer
4. Interfacing to a Digital Camcorder
6. What is USB?
1. A new Hard Disk standard
2. A new CD-ROM specification
3. A high-speed serial connection
4. A high-speed video connection
7. Where is your BIOS stored?
1. DRAM
2. SDRAM
3. Flash
4. Hard Disk
8. Where does your PC store your programs when
the power is off?
1. DRAM
2. Cache
3. Hard Disk Drive
4. Monitor
9. What type of character recognition technologies
used by the banking industry to process checks?
1. CIRT
2. OICR
3. MICR
4. SICR
10. Print resolution is measured in__________
1. PPM
2. DPI
3. Pixels
4. Fonts
11. Who created Pretty Good Privacy (PGP)?
1. Paul Zimmerman
2. Tim Berners-Lee
3. Marc Andreessen
4. Ken Thompson
12. Who co-founded Hotmail in 1996 and then sold the
company to Microsoft?
1. Shawn Fanning
2. Ada Byron Lovelace
3. Sabeer Bhatia
4. Ray Tomlinson
13. What is the max length for primary name of a
computer file under DOS?
1. 8
2. 12
3. 3
4. 16
14. Which of the following could be a valid DOS file
specification?
1. NOSFILE.POST
2. NOSFILE.P.OST
3. NOSFILE.DOC
4. NOST.FILEDOC
15. In which configuration, multiple computers are
connected to a host computer?
1. Star Networks
2. Rings Networks
3. Bus Networks
4. Hybrid Networks
16. What would be the best way to move around a 3-D
environment?
1. Use a space mouse
2. Use a tracker ball
3. Use a keyboard
4. Use touch screen
17. _________is capable of changing signals from one
form to another?
1. Converter
2. Transducer
3. Conductor
4. All of the above
18. When single medium is used to present
information is called as__________.
1. Unimedium presentation
2. Single medium Presentation
3. Both 1& 2
4. None of the above
19. In India first computer installed in _________.
1. Indian institute of Technology,
2. Indian Institute of Science,
3. Indian Iron & Steel Co. Ltd.
4. Indian Statistical Institute, Calcutta,
20. Main component of the CPU is __________
1. Control unit and registers
2. Registers and main memory
3. Control Unit and ALU
4. ALU and BUS
21. When a computer is first turned on or restarted, a
special type of absolute loader called ________ is
executed.
1. Compile and Go loader
2. Boot loader
3. Bootstrap loader
4. Relating loader
GUESSPAPERFORDITISSJUNJUL2013
,
Page 2 of 2
22. Why the virtual memory is used?
a. A process cannot be loaded and has to keep
waiting for its execution to start until sufficient
free memory for loading the entire process
become available.
b. A process cannot be loaded in a system
whose main memory size is less than the total
memory required by the process.
1. Only a
2. Only b
3. Both a and b
4. None of the above
23. Single-user operating system is __________.
1. MS-DOS
2. UNIX
3. OS/2
4. All of the above
24. The operating system creates _________from the
physical computer.
1. Virtual space
2. Virtual computers
3. Virtual device
4. None of the above
25. Which of the following OS does not implement
multi tasking truly _________.
1. Windows 98
2. Windows NT
3. Windows XP
4. MS DOS
26. Which of the following OS would you prefer to
implement a Client-Server architecture?
1. MS DOS
2. Windows 95
3. Windows 98
4. Windows 2000
27. In First-Come, First-Served scheduling policy, I/O
bound processes may have to wait long in the
ready queue waiting for a CPU bound job to finish.
This is known as __________.
1. Aging
2. Priority inversion
3. Priority inheritance
4. Convoy effect
28. The minimum number of page frames that must be
allocated to a running process in a virtual memory
environment is determined by
1. the instruction set architecture
2. page size
3. physical memory size
4. number of processes in memory
29. Which of the following is used to describe
interconnected computer configurations with two or
more CPUs.
1. Multitasking
2. Time Sharing
3. Multiprogramming
4. Multiprocessing
30. A ________ is an application or a process that
responds to a client request.
1. client
2. thread
3. server
4. All of the above
31. ________ is a protocol that enables applications to
exchange data in a variety of formats.
1. Dynamic data exchange
2. Component object model
3. Data copy
4. None of the above
32. _________ is an efficient way for two or more
processes on the same computer to share data.
1. File exchange
2. File sharing
3. File mapping
4. None of the above
33. Dirty bit is used to show the _________.
1. Page with corrupted data
2. The wrong page in the memory
3. Page that is less frequently accessed
4. Page that is modified after being loaded into
cache memory
34. The first-fit, best-fit and the worst-fit algorithm can
be used for _________.
1. Contiguous allocation of memory
2. Linked allocation of memory
3. Indexed allocation of memory
4. All of the above
35. In Round Robin CPU scheduling, as the time
quantum is increased, the average turn around
time _________.
1. Increases
2. Decreases
3. Remain constant
4. Varies irregularly
36. Page size is always
1. In powers of 2
2. One
3. In powers of 3
4. None of the above
37. Which of the following memory allocation scheme
suffers from External fragmentation?
1. Segmentation
2. Swapping
3. Pure demand paging
4. Paging
38. _________ page replacement algorithm suffers
from Belady's anomaly.
1. LRU
2. MRU
3. FIFO
4. LIFO
39. Which of the following could be considered an
advantage of Virtual Memory Management?
1. Thrashing may occur when a program
requires two or more pages.
2. Only a part of each page needs to be loaded
into memory.
3. Job size is no longer restricted to the size of
main memory
4. All of the above
40. Memory mapped I/O involves
1. transferring information between memory locations
2. transferring information between the CPU
and I/O devices in the same way as between
the CPU and memory.
3. transferring information between registers
and memory
4. transferring information between I/O devices
and memory
DITISS Guess Paper Jun -Jul 2013
Page 3 of 3
41. In demand paging, while initiating execution of
process _________ space is allocated on paging
device for its logical address, its code & data.
1. Logical
2. Swap
3. Virtual
4. Physical
42. File length _________.
1. Should always be fixed
2. Should always be variable
3. Depends upon the size of the file.
4. Should be chosen to match the data
character
43. What is internal backup?
1. Uses more tapes
2. Should be done each month
3. Saves only files that have recently changed
4. Saves all files
44. When should backup be done?
1. Daily for most installations
2. Weekly for most installations
3. As several images copies, followed by an
incremental
4. As several incremental, followed by an
image copy
45. I/O devices can be classified according to the
following criteria
1. Nature of access
2. Purpose
3. Data Transfer Mode
4. All of the above
46. To perform an output operation, data to be written
onto the I/O device is first transferred from the
memory to the DMA buffer.
1. True
2. False
3. Can’t say
4. None of the above
47. Tapes and disks are _________ devices
1. Block Mode
2. Character Mode
3. Both
4. None of the above
48. Which of the following statement is false regarding
deadlock?
1. Deadlock affects OS performance.
2. A deadlock involving OS performance can
not have more severe consequences.
3. OS handles only deadlocks caused by
sharing of resources.
4. Operating system uses resource allocation
policies.
49. A set of processes is deadlocked if each of
them_________.
1. does not waits for an event
2. waits for an event can be caused only by
processes in the set.
3. Both 1 & 2
4. None of the above
50. Is the following statement is true?
Various kinds of deadlocks can arise in an OS.
1. Yes
2. No
3. Can’t say
4. None of the above
51. What is SMTP?
1. Simple Mailer transport protocol
2. Simple Mail Transport protocol
3. Single Mail transport protocol
4. None of the above
52. An organization that share devices, saves_______.
1. Money
2. Time
3. Space
4. All of the above
53. Which of the following is not a guided medium?
1. Coaxial cable
2. Fiber-optic cable
3. Atmosphere
4. None of the above
54. What is the major factor that makes coaxial cable
less susceptible to noise?
1. Inner conductor
2. Diameter of cable
3. Outer conductor
4. Insulating material
55. A _________ operates at the upper levels of the OSI
model and translates information between two completely
different network architectures or data formats.
1. Router
2. Switch
3. Gateway
4. None of the above
56. Which of the following device is responsible for the
connection of Local Area Networks with Wide Area
Networks?
1. Hub
2. Bridge
3. Data switch
4. Gateway
57. Which of these is not part of the TCP/IP model?
1. Network access
2. Internet
3. Presentation
4. Application
58. Which of the following is not true for switching
technology?
1. Packet Switching
2. Link Switching
3. Packets are switched in the form of
datagram
4. Circuit Switching techniques
59. Which of the following statement is a true
description of fiber Optic Cable?
1. Fiber optic cables transfer data in a mesh
2. Fiber optic cables transfer data in light form
3. Fiber optic cables are similar to coaxial
cables
4. None of the above
60. Which of the following topologies is used for Ethernet?
1. Star
2. Bus
3. Ring
4. All of the above
61. Which of the following is not always necessary for
accessing the Web?
1. A Web browser
2. A connection to an Internet Access Provider
3. A computer
4. A modem
DITISS Guess Paper Jun -Jul 2013
Page 4 of 4
62. A word that looks underlined on a web page is
usually __________.
1. important word
2. the web address
3. a "link" to another web page
4. a mistake
63. How many stations can a fiber optic network
support?
1. 25000
2. 10000
3. 5000
4. 1000
64. Which layer translates between physical and
logical addresses?
1. the MAC sublayer of the data link layer
2. transport
3. physical
4. network
65. Which of the following layer is responsible for
transmitting raw bit streams between two nodes?
1. Transport Layer
2. Presentation Layer
3. Physical Layer
4. Data Link Layer
66. ISO OSI model is used in __________.
1. Stand alone PC
2. Network environment
3. Any where
4. None of the above
67. Which of the following switching methods accept
only the first 6 bytes of a frame?
1. store and forward
2. cut-through
3. tag
4. fast flag
68. Which of the following ISO level is more closely
related to the physical communications facilities?
1. Application
2. Session
3. Network
4. Data link
69. Which of the following are benefits of using a
layered network model?
1. it facilitates troubleshooting
2. it breaks the complex process of networking
into more manageable chunks
3. it allows layers developed by different
vendors to interoperate
4. All of the above
70. Which of the following are considered to be the
upper layer protocols?
1. presentation and session
2. application and presentation
3. application, presentation, and session
4. application, presentation, session, and transport
71. The purpose of the ________ layer is to transport
a raw bit stream from one machine to another.
1. Physical Layer
2. Transport Layer
3. Network
4. Data Link Layer
72. The physical layer is concerned with the movement
of _______ over the physical medium.
1. Programs
2. Dialogs
3. Protocols
4. Bits
73. Fiber optics is an example of ________ layer.
1. Physical Layer
2. Data Link Layer
3. Network layer
4. Application Layer
74. FDM in Networking stands for __________.
1. Frequency Division Multiplexing
2. Frequency Distribution Multiplexing
3. Frequency Division Methods
4. Frequency Distribution Methods
75. NIC stands for __________.
1. Network Internet Cable
2. Network Internet Card
3. Network Internal Card
4. None of the above
76. When a process wants to establish a TCP
connection with a remote process, it attaches itself
to an unused TCP port on its own machine. This is
called a _________ port.
1. Source
2. Destination
3. External
4. Internal
77. Which one of the following is a connectionless protocol?
1. UDP
2. Ethernet
3. IPX
4. All of the above
78. Which of the following application uses the UDP
protocol?
1. DNS
2. TFTP
3. RIP
4. All of the above
79. The HTTP request line contains a _________
method to request a document from the server.
1. Get
2. Post
3. Copy
4. Do
80. Which of the following protocols is unacknowledged?
1. TCP
2. UDP
3. SPX
4. All of the above
81. The inclusion of the checksum in the TCP segment
is _________.
1. Optional
2. Mandatory
3. at the discretion of the application program
4. None of the above
82. The value of window size is determined by _________.
1. the sender
2. the receiver
3. both the sender and receiver
4. None of the above
83. E-mail use ________ communication protocol.
1. SMTP
2. HTTP
3. ICMP
4. TCP/IP
84. What is the default port number for SMTP?
1. 21
2. 22
3. 28
DITISS Guess Paper Jun -Jul 2013
,
Page 5 of 5
4. 25
85. Current wireless MACs are based on _________.
1. CSMA/CD
2. CSMA/CA
3. Hybrid technique depending on traffic
4. Hybrid technique with fixed time partitions
86. Routers function in the _______ layers
1. physical and data link
2. physical, data link, and network
3. data link and network
4. None of the above
87. Which device act as a traffic cop?
1. Router
2. Hub
3. Switch
4. Modem
88. Any electronic device on a network is called _______.
1. Node
2. Hub
3. Router
4. Cable
89. ________ algorithm change their routing decisions
to reflect changes in the topology.
1. Routing
2. Session
3. Adaptive
4. Nonadaptive
90. Clients are the computers used by ________ users
for everyday work.
1. Individual
2. Group of
3. System administrator
4. None of the above
91. What does USB stand for in USB Port?
1. United System Booting
2. Universal System Bus
3. Universal Serial Bus
4. Universal System Booting
92. What data communications hardware converts
data from one standard to another?
1. Hub
2. Router
3. Repeater
4. Gateway
93. Which of the following is standard for transmitting a data?
1. Topology
2. Protocol
3. Packet
4. Token ring
94. Which of the following OSI layers is concerned with the
transmission of unstructured bit stream over a physical link?
1. 7
2. 1
3. 6
4. 2
95. What type of network architecture would be the
easiest to setup and maintain?
1. Local area network
2. Wide area network
3. Peer-to-peer network
4. Metropolitan network
96. What network is used at a military base?
1. Local area network
2. Wide area network
3. Campus area network
4. Office area network
97. What is the most widely used protocol for local
area networks?
1. HTML
2. TCP/IP
3. Ethernet
4. Token ring
98. At which layer does Flow control take place?
1. Physical
2. data link
3. Network
4. transport
99. At which layer error detection and recovery take
place?
1. transport
2. presentation
3. network
4. application
100. Which of the following statement is true about an
IP address?
1. IP address is based on your computer
network card
2. IP address is issued by a computer vendor
3. IP address is a Transport Protocol
4. IP address is not used on the internet
101. Which of the following words have correct spelling?
1. Vocabilary
2. Vocabullary
3. Vocabulary
4. Voccabulary
102. Which of the following is odd one?
1. Cow
2. Bull
3. Cock
4. Horse
103. Which of the following is synonymous to the word
’Disparity’?
1. Uniform
2. Equal
3. Par
4. Gap
104. Which of the following is synonymous to the word
’Deprivation’?
1. Scarcity
2. Control
3. Tenure
4. Custody
105. Which of the following is synonymous to the word
’Gleam’?
1. Atrocious
2. Nasty
3. Shimmer
4. Hide
106. Which of the following is synonymous to the word
’Compulsion’?
1. Obligation
2. Claim
3. Tribute
4. Recognize
107. Which of the following is synonymous to the word
’Ignoble’?
1. Remarkable
2. Splendid
3. Dastardly
4. Amazing
DITISS Guess Paper Jun -Jul 2013
Page 6 of 6
108. Adults differ a lot in their sleeping ________.
1. Manners
2. Time
3. Habits
4. Techniques
109. There should be ________of fresh air in the room.
1. Plenty
2. Much
3. more
4. Lots
110. If houses are made of wood, then they easily catch
________ fire.
1. to
2. on
3. the
4. with
111. The task calls ________ much effort.
1. at
2. specific
3. for
4. much
112. What is the antonym of the word ‘cyclic’?
1. Repeated
2. Recurring
3. Rare
4. Continual
113. What is the antonym of the word ‘Propel’?
1. Push
2. Drive
3. Force
4. Linger
114. Full : empty ::?
1. Chaos: water
2. Chaos: scattered
3. Chaos:frenzy
4. Chaos: order
115. Genuine: honest:: ?
1. Fraudulent :sensitive
2. Fraudulent :deceitful
3. Fraudulent :selfish
4. Fraudulent :truthful
116. The bus stops ________ the bus stop.
1. At
2. On
3. into
4. to
117. The clock ________ the wall is very old.
1. To
2. By
3. On
4. Over
118. 2,4,6,8,10, ________?
1. 13
2. 14
3. 12
4. 16
119. If PRIYA can coded as 15 then how can
TENDULKAR coded?
1. 108
2. 107
3. 106
4. 105
120. If DELETE is coded as 6 then how is INSERTED
coded?
1. 12
2. 13
3. 18
4. 14
121. C is the sister of F, B is the brother of E's husband,
D is the father of A and grandfather of F. There are
2 fathers, one mother and 3 brothers in the family.
Who is the mother?
1. A
2. B
3. C
4. E
122. 2(48)4, 3(74)7, 4(82)1, 3(___)2. What is the
missing number?
1. 64
2. 62
3. 66
4. 68
123. Which is the odd number, (33, 58), (66, 91), (42,
62), (55,80)?
1. (33, 58)
2. (66, 91)
3. (42, 62)
4. (55,80)
124. Sourav from his house walks towards north and
covers 15.5 km and then turns left and travels 7
km. He then turns left again and after traveling
31km, again turns left and stops after traveling
turns left and stops after traveling 7 km. How far is
he from his house?
1. 8.5 km
2. 46.5 km
3. 15.5 km
4. 60.5 km
125. Tarun walks towards east a distance of 120 m to
sell his product. Later he walks straight 70 m right
to sell his product. What would be approximately
the shortest distance between the two places?
1. 190
2. 138.9
3. 50
4. None of these
126. Sachin is 7th
from the left and Geeta is 5th
from the
right. When they interchange their positions Geeta
becomes 19
th
from the right. What is Sachin’s
position from the left?
1. 21st
2. 19
th
3. 23
th
4. 20
th
127. Flight to Mumbai leaves every 5 hrs. At the
information counter a man learnt that the flight took
off 25 min before. If the present time is 10:45 a.m.,
what is the time for the next flight?
1. 2:20 a.m.
2. 4:10 a.m.
3. 3:30 p.m.
4. 3:20 p.m.
128. If “Y% of 12 is 3 ” then what is ” H% of 50”?
1. 8
2. 4
3. 6
4. 2
DITISS Guess Paper Jun -Jul 2013
Page 7 of 7
129. If × means ‘addition’, - means ‘division’, ÷ means
‘subtraction’, and + means ‘multiplication’, what
would be the value of the following?
a) 18 × 5 ÷ 10 +4 –5
b) 18 +5 ÷ 10 × 4 – 5
1. 15,80
2. 815.8, 80.8
3. 15, 80.8
4. 15.5, 80.5
130. There are five friends A, B, K, D and E. K is taller
than B. B and D are of same height. A is taller than
E and there is only one shorter than A in the group.
Who is the taller in the group?
1. A
2. B
3. K
4. D
131. Swimming downstream in a river, you can swim 2
miles in 40 minutes, & in upstream 2 miles in 60
minutes. How long would it take you to swim a mile
in still water?
1. 25 Minutes
2. 23 Minutes
3. 24 Minutes
4. None of the above
132. If alternate letters are deleted from the following
series then which letter will divide the new series in
two equal parts?
ACEGIKMOQSUWY
1. N
2. M
3. K
4. O
133. If the following words are arranged according to
the dictionary order then which will be the second
word in that order?
1. youthful
2. yokel
3. young
4. youngster
134. How many times in a day the hands of a clock are
straight?
1. 22
2. 30
3. 44
4. None of the above
135. A sum of money doubles itself at compound
interest in 15 years. In how many years will it
become eight times?
1. 45 years
2. 40 years
3. 42 years
4. None of the above
136. Which is the greatest of the four least common
multiples of 3,5,7?
1. 1
2. 420
3. 315
4. 105
137. What will be the smallest one digit number to be
replaced by * in the number 6*106 so that the
number is exactly divisible by 11?
1. 4
2. 3
3. 2
4. 1
138. X began a business with Rs. 85,000. He was
joined afterwards by Y with Rs. 42,500. What will
be the profit ratio at the end of the year, if Y joins
after 4 months?
1. 1:2
2. 3:1
3. 2:1
4. 4:3
139. A student multiplied a number by 3/5 instead of
5/3. What is the percentage error in the
calculation?
1. 34%
2. 44%
3. 54%
4. 64%
140. How many words can be formed of the letters of
the word 'BANANA' be arranged so that the
consonants occupy the even places?
1. 36
2. 10
3. 3
4. 5
141. How many ways can 6 men be arranged in a
circle?
1. 720
2. 240
3. 120
4. None of the above
142. One pipe can fill a tank three times as fast as
another pipe. Together the two pipes can fill the
tank in 12 minutes, then in how many minutes the
slower pipe alone will be able to fill the tank?
1. 48 minutes
2. 81 minutes
3. 108 minutes
4. 192 minutes
143. Three taps P, Q and R can fill a tank in 12, 15 and
20 hours respectively. If P is open all the time and
Q and R are open for one hour each alternately, by
what time the tank will be full?
1. 6 hours
2. 7 hours 30 min
3. 6 hours 30 min
4. 7 hours
144. A bag contains 6 black and 8 white balls. One ball
is drawn at random. What is the probability that the
ball drawn is white?
1. 3/4
2. 4/7
3. 1/8
4. 3/7
145. There are 6 red shoes & 4 green shoes . If two of
red shoes are drawn what is the probability of
getting red shoes?
1. 1/3
2. 2/3
3. 3/5
4. 2/5
146. A shopkeeper expects a gain of 20 % on his cost
price. If in a week, his sale was of Rs. 360, what
was his profit?
1. 80
2. 72
3. 70
4. 60
DITISS Guess Paper Jun -Jul 2013
,
Page 8 of 8
147. A man buys a cycle for Rs. 1200 and sells it at a
loss of 10%. What is the selling price of the cycle?
1. Rs. 1080
2. Rs. 1160
3. Rs. 1202
4. Rs. 1190
148. If 40% of a number is equal to two-third of another
number, what is the ratio of first number to the
second number?
1. 2:5
2. 3:7
3. 5:3
4. 7:3
149. A sum of money at simple interest amounts to Rs.
815 in 3 years and to Rs. 854 in 4 years. What is
the sum?
1. Rs. 698
2. Rs. 690
3. Rs. 650
4. Rs. 700
150. A train can travel 50% faster than a car. Both start
from point A at the same time and reach point B 75
kms away from A at the same time. On the way,
however, the train lost about 12.5 minutes while
stopping at the stations. What is the speed of the
car?
1. 90 km/hr
2. 120 km/hr
3. 140 km/hr
4. 150 km/hr
DITISS Guess Paper Jun -Jul 2013

More Related Content

PDF
Oops Paper
PDF
DAC CCAT GUESS PAPER Jun-Jul 2013
PDF
C and data structure
PDF
Computer awareness
DOCX
GSP 125 Enhance teaching - snaptutorial.com
DOCX
GSP 125 Exceptional Education - snaptutorial.com
DOC
GSP 125 Education Specialist / snaptutorial.com
DOC
Gsp 125 Enthusiastic Study / snaptutorial.com
Oops Paper
DAC CCAT GUESS PAPER Jun-Jul 2013
C and data structure
Computer awareness
GSP 125 Enhance teaching - snaptutorial.com
GSP 125 Exceptional Education - snaptutorial.com
GSP 125 Education Specialist / snaptutorial.com
Gsp 125 Enthusiastic Study / snaptutorial.com

What's hot (15)

DOCX
GSP 125 Effective Communication/tutorialrank.com
DOCX
GSP 125 Enhance teaching/tutorialrank.com
DOCX
Gsp 125 Education Organization -- snaptutorial.com
DOCX
GSP 125 Entire Course NEW
PDF
Gsp 125 final exam guide
DOCX
Sample paper
PDF
GSP 125 Final Exam Guide
PDF
GSP 125 Final Exam Guide
DOCX
GSP 125 RANK Education for Service--gsp125rank.com
PDF
Nearest Prime Cipher for Data Confidentiality and Integrity
DOC
Gsp 125 Future Our Mission/newtonhelp.com
DOC
A01 assignment-1
PDF
A critical reassessment of
PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
PDF
Java implementation and performance evaluation of some
GSP 125 Effective Communication/tutorialrank.com
GSP 125 Enhance teaching/tutorialrank.com
Gsp 125 Education Organization -- snaptutorial.com
GSP 125 Entire Course NEW
Gsp 125 final exam guide
Sample paper
GSP 125 Final Exam Guide
GSP 125 Final Exam Guide
GSP 125 RANK Education for Service--gsp125rank.com
Nearest Prime Cipher for Data Confidentiality and Integrity
Gsp 125 Future Our Mission/newtonhelp.com
A01 assignment-1
A critical reassessment of
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Java implementation and performance evaluation of some
Ad

Viewers also liked (7)

PDF
DVLSI Guess paper for CDAC CCAT Jun- Jul 2013 Enterence examination
PDF
Some other Importent Question (Mix)
PDF
Some question for Section C (Embeded )
PDF
Oops Paper
PDF
Section c
PDF
CCAT Aug 2013 paper
PDF
GUESS FUNDAMENTAL PAPER FOE CCAT Feb 2014
DVLSI Guess paper for CDAC CCAT Jun- Jul 2013 Enterence examination
Some other Importent Question (Mix)
Some question for Section C (Embeded )
Oops Paper
Section c
CCAT Aug 2013 paper
GUESS FUNDAMENTAL PAPER FOE CCAT Feb 2014
Ad

Similar to Section b a (20)

DOC
Ibps specialist officer
PDF
Hsc computer science chap 1 Operating System (1).pdf
PDF
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
PDF
Computer awarness question bank
PDF
BIPARD answer.pdf diet chart for uric acid.pdf
PDF
MCQ on Computer and ICT
DOCX
Quiz bigdata
DOCX
Operating System And Data Storage
PDF
Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02
PDF
Computer question
PDF
Computer and information model test for bank exams
PDF
1500 mcq questions of computer knowledge for bank exams
DOCX
Sbi po computer quiz
DOCX
Completeosnotes
DOCX
Computer
DOCX
Complete Operating System notes
PPTX
Css midterm exam g12.pptx
PDF
PPTX
OS_module2. .pptx
PDF
INFORMATION TECH P2 MEMO SEPT2018_English.pdf
Ibps specialist officer
Hsc computer science chap 1 Operating System (1).pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Computer awarness question bank
BIPARD answer.pdf diet chart for uric acid.pdf
MCQ on Computer and ICT
Quiz bigdata
Operating System And Data Storage
Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02
Computer question
Computer and information model test for bank exams
1500 mcq questions of computer knowledge for bank exams
Sbi po computer quiz
Completeosnotes
Computer
Complete Operating System notes
Css midterm exam g12.pptx
OS_module2. .pptx
INFORMATION TECH P2 MEMO SEPT2018_English.pdf

More from prabhatjon (20)

PDF
Registration open for CCDAC AUG 2015 batch
PPT
C-CAT Exam Laptop Configuration
PDF
CDAC CCAT examination important question
PDF
Operating system and C++ paper for CCEE
PDF
Core java
PDF
Os paper
PDF
Cplus plus abd datastructure
PDF
Instructions to candidates For DASDM
PDF
PDF
Critical Aptitude Question
PDF
Cyber law ipc
PDF
Ccpp pune
PDF
Delta final paper
PDF
Aloha paper for cdac ccpp
PPTX
Diploma in Advanced Software Development Methodologies (DASDM)
PDF
Noida placement comp
PDF
New Address of CDAC
PDF
Course summary@bytes
PDF
Admission booklet pg diploma courses cdac-v4
PDF
Pg dst admissions-list
Registration open for CCDAC AUG 2015 batch
C-CAT Exam Laptop Configuration
CDAC CCAT examination important question
Operating system and C++ paper for CCEE
Core java
Os paper
Cplus plus abd datastructure
Instructions to candidates For DASDM
Critical Aptitude Question
Cyber law ipc
Ccpp pune
Delta final paper
Aloha paper for cdac ccpp
Diploma in Advanced Software Development Methodologies (DASDM)
Noida placement comp
New Address of CDAC
Course summary@bytes
Admission booklet pg diploma courses cdac-v4
Pg dst admissions-list

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Spectroscopy.pptx food analysis technology
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars

Section b a

  • 1. DITISS Guess Paper Jun -Jul 2013 Page 1 of 1 CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING Each question shall carry one mark. There will be a negative marking i.e., quarter (0.25) mark will be deducted for every wrong answer. 1. C – programming language is related to which of the following generation? 1. Fourth 2. Third 3. Second 4. First 2. Who introduce the concept of Stored Program? 1. Charles Babbage 2. Howard A 3. Von Neumann 4. John Atanasoff 3. The primary advantage of key-to-tape data entry system is___________. 1. A large percentage of editing can be performed at the time of data entry. 2. Key verification is easily performed 3. The tape is reusable 4. Keying errors can be detected as they occur. 4. While inserting a diskette into the diskette drive of a PC, the diskette’s label side should face_________. 1. East 2. North 3. South 4. Up 5. Firewire is usually used for__________. 1. Connecting to the internet 2. Downloading Digital Camera pictures 3. Connecting to the printer 4. Interfacing to a Digital Camcorder 6. What is USB? 1. A new Hard Disk standard 2. A new CD-ROM specification 3. A high-speed serial connection 4. A high-speed video connection 7. Where is your BIOS stored? 1. DRAM 2. SDRAM 3. Flash 4. Hard Disk 8. Where does your PC store your programs when the power is off? 1. DRAM 2. Cache 3. Hard Disk Drive 4. Monitor 9. What type of character recognition technologies used by the banking industry to process checks? 1. CIRT 2. OICR 3. MICR 4. SICR 10. Print resolution is measured in__________ 1. PPM 2. DPI 3. Pixels 4. Fonts 11. Who created Pretty Good Privacy (PGP)? 1. Paul Zimmerman 2. Tim Berners-Lee 3. Marc Andreessen 4. Ken Thompson 12. Who co-founded Hotmail in 1996 and then sold the company to Microsoft? 1. Shawn Fanning 2. Ada Byron Lovelace 3. Sabeer Bhatia 4. Ray Tomlinson 13. What is the max length for primary name of a computer file under DOS? 1. 8 2. 12 3. 3 4. 16 14. Which of the following could be a valid DOS file specification? 1. NOSFILE.POST 2. NOSFILE.P.OST 3. NOSFILE.DOC 4. NOST.FILEDOC 15. In which configuration, multiple computers are connected to a host computer? 1. Star Networks 2. Rings Networks 3. Bus Networks 4. Hybrid Networks 16. What would be the best way to move around a 3-D environment? 1. Use a space mouse 2. Use a tracker ball 3. Use a keyboard 4. Use touch screen 17. _________is capable of changing signals from one form to another? 1. Converter 2. Transducer 3. Conductor 4. All of the above 18. When single medium is used to present information is called as__________. 1. Unimedium presentation 2. Single medium Presentation 3. Both 1& 2 4. None of the above 19. In India first computer installed in _________. 1. Indian institute of Technology, 2. Indian Institute of Science, 3. Indian Iron & Steel Co. Ltd. 4. Indian Statistical Institute, Calcutta, 20. Main component of the CPU is __________ 1. Control unit and registers 2. Registers and main memory 3. Control Unit and ALU 4. ALU and BUS 21. When a computer is first turned on or restarted, a special type of absolute loader called ________ is executed. 1. Compile and Go loader 2. Boot loader 3. Bootstrap loader 4. Relating loader GUESSPAPERFORDITISSJUNJUL2013
  • 2. , Page 2 of 2 22. Why the virtual memory is used? a. A process cannot be loaded and has to keep waiting for its execution to start until sufficient free memory for loading the entire process become available. b. A process cannot be loaded in a system whose main memory size is less than the total memory required by the process. 1. Only a 2. Only b 3. Both a and b 4. None of the above 23. Single-user operating system is __________. 1. MS-DOS 2. UNIX 3. OS/2 4. All of the above 24. The operating system creates _________from the physical computer. 1. Virtual space 2. Virtual computers 3. Virtual device 4. None of the above 25. Which of the following OS does not implement multi tasking truly _________. 1. Windows 98 2. Windows NT 3. Windows XP 4. MS DOS 26. Which of the following OS would you prefer to implement a Client-Server architecture? 1. MS DOS 2. Windows 95 3. Windows 98 4. Windows 2000 27. In First-Come, First-Served scheduling policy, I/O bound processes may have to wait long in the ready queue waiting for a CPU bound job to finish. This is known as __________. 1. Aging 2. Priority inversion 3. Priority inheritance 4. Convoy effect 28. The minimum number of page frames that must be allocated to a running process in a virtual memory environment is determined by 1. the instruction set architecture 2. page size 3. physical memory size 4. number of processes in memory 29. Which of the following is used to describe interconnected computer configurations with two or more CPUs. 1. Multitasking 2. Time Sharing 3. Multiprogramming 4. Multiprocessing 30. A ________ is an application or a process that responds to a client request. 1. client 2. thread 3. server 4. All of the above 31. ________ is a protocol that enables applications to exchange data in a variety of formats. 1. Dynamic data exchange 2. Component object model 3. Data copy 4. None of the above 32. _________ is an efficient way for two or more processes on the same computer to share data. 1. File exchange 2. File sharing 3. File mapping 4. None of the above 33. Dirty bit is used to show the _________. 1. Page with corrupted data 2. The wrong page in the memory 3. Page that is less frequently accessed 4. Page that is modified after being loaded into cache memory 34. The first-fit, best-fit and the worst-fit algorithm can be used for _________. 1. Contiguous allocation of memory 2. Linked allocation of memory 3. Indexed allocation of memory 4. All of the above 35. In Round Robin CPU scheduling, as the time quantum is increased, the average turn around time _________. 1. Increases 2. Decreases 3. Remain constant 4. Varies irregularly 36. Page size is always 1. In powers of 2 2. One 3. In powers of 3 4. None of the above 37. Which of the following memory allocation scheme suffers from External fragmentation? 1. Segmentation 2. Swapping 3. Pure demand paging 4. Paging 38. _________ page replacement algorithm suffers from Belady's anomaly. 1. LRU 2. MRU 3. FIFO 4. LIFO 39. Which of the following could be considered an advantage of Virtual Memory Management? 1. Thrashing may occur when a program requires two or more pages. 2. Only a part of each page needs to be loaded into memory. 3. Job size is no longer restricted to the size of main memory 4. All of the above 40. Memory mapped I/O involves 1. transferring information between memory locations 2. transferring information between the CPU and I/O devices in the same way as between the CPU and memory. 3. transferring information between registers and memory 4. transferring information between I/O devices and memory DITISS Guess Paper Jun -Jul 2013
  • 3. Page 3 of 3 41. In demand paging, while initiating execution of process _________ space is allocated on paging device for its logical address, its code & data. 1. Logical 2. Swap 3. Virtual 4. Physical 42. File length _________. 1. Should always be fixed 2. Should always be variable 3. Depends upon the size of the file. 4. Should be chosen to match the data character 43. What is internal backup? 1. Uses more tapes 2. Should be done each month 3. Saves only files that have recently changed 4. Saves all files 44. When should backup be done? 1. Daily for most installations 2. Weekly for most installations 3. As several images copies, followed by an incremental 4. As several incremental, followed by an image copy 45. I/O devices can be classified according to the following criteria 1. Nature of access 2. Purpose 3. Data Transfer Mode 4. All of the above 46. To perform an output operation, data to be written onto the I/O device is first transferred from the memory to the DMA buffer. 1. True 2. False 3. Can’t say 4. None of the above 47. Tapes and disks are _________ devices 1. Block Mode 2. Character Mode 3. Both 4. None of the above 48. Which of the following statement is false regarding deadlock? 1. Deadlock affects OS performance. 2. A deadlock involving OS performance can not have more severe consequences. 3. OS handles only deadlocks caused by sharing of resources. 4. Operating system uses resource allocation policies. 49. A set of processes is deadlocked if each of them_________. 1. does not waits for an event 2. waits for an event can be caused only by processes in the set. 3. Both 1 & 2 4. None of the above 50. Is the following statement is true? Various kinds of deadlocks can arise in an OS. 1. Yes 2. No 3. Can’t say 4. None of the above 51. What is SMTP? 1. Simple Mailer transport protocol 2. Simple Mail Transport protocol 3. Single Mail transport protocol 4. None of the above 52. An organization that share devices, saves_______. 1. Money 2. Time 3. Space 4. All of the above 53. Which of the following is not a guided medium? 1. Coaxial cable 2. Fiber-optic cable 3. Atmosphere 4. None of the above 54. What is the major factor that makes coaxial cable less susceptible to noise? 1. Inner conductor 2. Diameter of cable 3. Outer conductor 4. Insulating material 55. A _________ operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats. 1. Router 2. Switch 3. Gateway 4. None of the above 56. Which of the following device is responsible for the connection of Local Area Networks with Wide Area Networks? 1. Hub 2. Bridge 3. Data switch 4. Gateway 57. Which of these is not part of the TCP/IP model? 1. Network access 2. Internet 3. Presentation 4. Application 58. Which of the following is not true for switching technology? 1. Packet Switching 2. Link Switching 3. Packets are switched in the form of datagram 4. Circuit Switching techniques 59. Which of the following statement is a true description of fiber Optic Cable? 1. Fiber optic cables transfer data in a mesh 2. Fiber optic cables transfer data in light form 3. Fiber optic cables are similar to coaxial cables 4. None of the above 60. Which of the following topologies is used for Ethernet? 1. Star 2. Bus 3. Ring 4. All of the above 61. Which of the following is not always necessary for accessing the Web? 1. A Web browser 2. A connection to an Internet Access Provider 3. A computer 4. A modem DITISS Guess Paper Jun -Jul 2013
  • 4. Page 4 of 4 62. A word that looks underlined on a web page is usually __________. 1. important word 2. the web address 3. a "link" to another web page 4. a mistake 63. How many stations can a fiber optic network support? 1. 25000 2. 10000 3. 5000 4. 1000 64. Which layer translates between physical and logical addresses? 1. the MAC sublayer of the data link layer 2. transport 3. physical 4. network 65. Which of the following layer is responsible for transmitting raw bit streams between two nodes? 1. Transport Layer 2. Presentation Layer 3. Physical Layer 4. Data Link Layer 66. ISO OSI model is used in __________. 1. Stand alone PC 2. Network environment 3. Any where 4. None of the above 67. Which of the following switching methods accept only the first 6 bytes of a frame? 1. store and forward 2. cut-through 3. tag 4. fast flag 68. Which of the following ISO level is more closely related to the physical communications facilities? 1. Application 2. Session 3. Network 4. Data link 69. Which of the following are benefits of using a layered network model? 1. it facilitates troubleshooting 2. it breaks the complex process of networking into more manageable chunks 3. it allows layers developed by different vendors to interoperate 4. All of the above 70. Which of the following are considered to be the upper layer protocols? 1. presentation and session 2. application and presentation 3. application, presentation, and session 4. application, presentation, session, and transport 71. The purpose of the ________ layer is to transport a raw bit stream from one machine to another. 1. Physical Layer 2. Transport Layer 3. Network 4. Data Link Layer 72. The physical layer is concerned with the movement of _______ over the physical medium. 1. Programs 2. Dialogs 3. Protocols 4. Bits 73. Fiber optics is an example of ________ layer. 1. Physical Layer 2. Data Link Layer 3. Network layer 4. Application Layer 74. FDM in Networking stands for __________. 1. Frequency Division Multiplexing 2. Frequency Distribution Multiplexing 3. Frequency Division Methods 4. Frequency Distribution Methods 75. NIC stands for __________. 1. Network Internet Cable 2. Network Internet Card 3. Network Internal Card 4. None of the above 76. When a process wants to establish a TCP connection with a remote process, it attaches itself to an unused TCP port on its own machine. This is called a _________ port. 1. Source 2. Destination 3. External 4. Internal 77. Which one of the following is a connectionless protocol? 1. UDP 2. Ethernet 3. IPX 4. All of the above 78. Which of the following application uses the UDP protocol? 1. DNS 2. TFTP 3. RIP 4. All of the above 79. The HTTP request line contains a _________ method to request a document from the server. 1. Get 2. Post 3. Copy 4. Do 80. Which of the following protocols is unacknowledged? 1. TCP 2. UDP 3. SPX 4. All of the above 81. The inclusion of the checksum in the TCP segment is _________. 1. Optional 2. Mandatory 3. at the discretion of the application program 4. None of the above 82. The value of window size is determined by _________. 1. the sender 2. the receiver 3. both the sender and receiver 4. None of the above 83. E-mail use ________ communication protocol. 1. SMTP 2. HTTP 3. ICMP 4. TCP/IP 84. What is the default port number for SMTP? 1. 21 2. 22 3. 28 DITISS Guess Paper Jun -Jul 2013
  • 5. , Page 5 of 5 4. 25 85. Current wireless MACs are based on _________. 1. CSMA/CD 2. CSMA/CA 3. Hybrid technique depending on traffic 4. Hybrid technique with fixed time partitions 86. Routers function in the _______ layers 1. physical and data link 2. physical, data link, and network 3. data link and network 4. None of the above 87. Which device act as a traffic cop? 1. Router 2. Hub 3. Switch 4. Modem 88. Any electronic device on a network is called _______. 1. Node 2. Hub 3. Router 4. Cable 89. ________ algorithm change their routing decisions to reflect changes in the topology. 1. Routing 2. Session 3. Adaptive 4. Nonadaptive 90. Clients are the computers used by ________ users for everyday work. 1. Individual 2. Group of 3. System administrator 4. None of the above 91. What does USB stand for in USB Port? 1. United System Booting 2. Universal System Bus 3. Universal Serial Bus 4. Universal System Booting 92. What data communications hardware converts data from one standard to another? 1. Hub 2. Router 3. Repeater 4. Gateway 93. Which of the following is standard for transmitting a data? 1. Topology 2. Protocol 3. Packet 4. Token ring 94. Which of the following OSI layers is concerned with the transmission of unstructured bit stream over a physical link? 1. 7 2. 1 3. 6 4. 2 95. What type of network architecture would be the easiest to setup and maintain? 1. Local area network 2. Wide area network 3. Peer-to-peer network 4. Metropolitan network 96. What network is used at a military base? 1. Local area network 2. Wide area network 3. Campus area network 4. Office area network 97. What is the most widely used protocol for local area networks? 1. HTML 2. TCP/IP 3. Ethernet 4. Token ring 98. At which layer does Flow control take place? 1. Physical 2. data link 3. Network 4. transport 99. At which layer error detection and recovery take place? 1. transport 2. presentation 3. network 4. application 100. Which of the following statement is true about an IP address? 1. IP address is based on your computer network card 2. IP address is issued by a computer vendor 3. IP address is a Transport Protocol 4. IP address is not used on the internet 101. Which of the following words have correct spelling? 1. Vocabilary 2. Vocabullary 3. Vocabulary 4. Voccabulary 102. Which of the following is odd one? 1. Cow 2. Bull 3. Cock 4. Horse 103. Which of the following is synonymous to the word ’Disparity’? 1. Uniform 2. Equal 3. Par 4. Gap 104. Which of the following is synonymous to the word ’Deprivation’? 1. Scarcity 2. Control 3. Tenure 4. Custody 105. Which of the following is synonymous to the word ’Gleam’? 1. Atrocious 2. Nasty 3. Shimmer 4. Hide 106. Which of the following is synonymous to the word ’Compulsion’? 1. Obligation 2. Claim 3. Tribute 4. Recognize 107. Which of the following is synonymous to the word ’Ignoble’? 1. Remarkable 2. Splendid 3. Dastardly 4. Amazing DITISS Guess Paper Jun -Jul 2013
  • 6. Page 6 of 6 108. Adults differ a lot in their sleeping ________. 1. Manners 2. Time 3. Habits 4. Techniques 109. There should be ________of fresh air in the room. 1. Plenty 2. Much 3. more 4. Lots 110. If houses are made of wood, then they easily catch ________ fire. 1. to 2. on 3. the 4. with 111. The task calls ________ much effort. 1. at 2. specific 3. for 4. much 112. What is the antonym of the word ‘cyclic’? 1. Repeated 2. Recurring 3. Rare 4. Continual 113. What is the antonym of the word ‘Propel’? 1. Push 2. Drive 3. Force 4. Linger 114. Full : empty ::? 1. Chaos: water 2. Chaos: scattered 3. Chaos:frenzy 4. Chaos: order 115. Genuine: honest:: ? 1. Fraudulent :sensitive 2. Fraudulent :deceitful 3. Fraudulent :selfish 4. Fraudulent :truthful 116. The bus stops ________ the bus stop. 1. At 2. On 3. into 4. to 117. The clock ________ the wall is very old. 1. To 2. By 3. On 4. Over 118. 2,4,6,8,10, ________? 1. 13 2. 14 3. 12 4. 16 119. If PRIYA can coded as 15 then how can TENDULKAR coded? 1. 108 2. 107 3. 106 4. 105 120. If DELETE is coded as 6 then how is INSERTED coded? 1. 12 2. 13 3. 18 4. 14 121. C is the sister of F, B is the brother of E's husband, D is the father of A and grandfather of F. There are 2 fathers, one mother and 3 brothers in the family. Who is the mother? 1. A 2. B 3. C 4. E 122. 2(48)4, 3(74)7, 4(82)1, 3(___)2. What is the missing number? 1. 64 2. 62 3. 66 4. 68 123. Which is the odd number, (33, 58), (66, 91), (42, 62), (55,80)? 1. (33, 58) 2. (66, 91) 3. (42, 62) 4. (55,80) 124. Sourav from his house walks towards north and covers 15.5 km and then turns left and travels 7 km. He then turns left again and after traveling 31km, again turns left and stops after traveling turns left and stops after traveling 7 km. How far is he from his house? 1. 8.5 km 2. 46.5 km 3. 15.5 km 4. 60.5 km 125. Tarun walks towards east a distance of 120 m to sell his product. Later he walks straight 70 m right to sell his product. What would be approximately the shortest distance between the two places? 1. 190 2. 138.9 3. 50 4. None of these 126. Sachin is 7th from the left and Geeta is 5th from the right. When they interchange their positions Geeta becomes 19 th from the right. What is Sachin’s position from the left? 1. 21st 2. 19 th 3. 23 th 4. 20 th 127. Flight to Mumbai leaves every 5 hrs. At the information counter a man learnt that the flight took off 25 min before. If the present time is 10:45 a.m., what is the time for the next flight? 1. 2:20 a.m. 2. 4:10 a.m. 3. 3:30 p.m. 4. 3:20 p.m. 128. If “Y% of 12 is 3 ” then what is ” H% of 50”? 1. 8 2. 4 3. 6 4. 2 DITISS Guess Paper Jun -Jul 2013
  • 7. Page 7 of 7 129. If × means ‘addition’, - means ‘division’, ÷ means ‘subtraction’, and + means ‘multiplication’, what would be the value of the following? a) 18 × 5 ÷ 10 +4 –5 b) 18 +5 ÷ 10 × 4 – 5 1. 15,80 2. 815.8, 80.8 3. 15, 80.8 4. 15.5, 80.5 130. There are five friends A, B, K, D and E. K is taller than B. B and D are of same height. A is taller than E and there is only one shorter than A in the group. Who is the taller in the group? 1. A 2. B 3. K 4. D 131. Swimming downstream in a river, you can swim 2 miles in 40 minutes, & in upstream 2 miles in 60 minutes. How long would it take you to swim a mile in still water? 1. 25 Minutes 2. 23 Minutes 3. 24 Minutes 4. None of the above 132. If alternate letters are deleted from the following series then which letter will divide the new series in two equal parts? ACEGIKMOQSUWY 1. N 2. M 3. K 4. O 133. If the following words are arranged according to the dictionary order then which will be the second word in that order? 1. youthful 2. yokel 3. young 4. youngster 134. How many times in a day the hands of a clock are straight? 1. 22 2. 30 3. 44 4. None of the above 135. A sum of money doubles itself at compound interest in 15 years. In how many years will it become eight times? 1. 45 years 2. 40 years 3. 42 years 4. None of the above 136. Which is the greatest of the four least common multiples of 3,5,7? 1. 1 2. 420 3. 315 4. 105 137. What will be the smallest one digit number to be replaced by * in the number 6*106 so that the number is exactly divisible by 11? 1. 4 2. 3 3. 2 4. 1 138. X began a business with Rs. 85,000. He was joined afterwards by Y with Rs. 42,500. What will be the profit ratio at the end of the year, if Y joins after 4 months? 1. 1:2 2. 3:1 3. 2:1 4. 4:3 139. A student multiplied a number by 3/5 instead of 5/3. What is the percentage error in the calculation? 1. 34% 2. 44% 3. 54% 4. 64% 140. How many words can be formed of the letters of the word 'BANANA' be arranged so that the consonants occupy the even places? 1. 36 2. 10 3. 3 4. 5 141. How many ways can 6 men be arranged in a circle? 1. 720 2. 240 3. 120 4. None of the above 142. One pipe can fill a tank three times as fast as another pipe. Together the two pipes can fill the tank in 12 minutes, then in how many minutes the slower pipe alone will be able to fill the tank? 1. 48 minutes 2. 81 minutes 3. 108 minutes 4. 192 minutes 143. Three taps P, Q and R can fill a tank in 12, 15 and 20 hours respectively. If P is open all the time and Q and R are open for one hour each alternately, by what time the tank will be full? 1. 6 hours 2. 7 hours 30 min 3. 6 hours 30 min 4. 7 hours 144. A bag contains 6 black and 8 white balls. One ball is drawn at random. What is the probability that the ball drawn is white? 1. 3/4 2. 4/7 3. 1/8 4. 3/7 145. There are 6 red shoes & 4 green shoes . If two of red shoes are drawn what is the probability of getting red shoes? 1. 1/3 2. 2/3 3. 3/5 4. 2/5 146. A shopkeeper expects a gain of 20 % on his cost price. If in a week, his sale was of Rs. 360, what was his profit? 1. 80 2. 72 3. 70 4. 60 DITISS Guess Paper Jun -Jul 2013
  • 8. , Page 8 of 8 147. A man buys a cycle for Rs. 1200 and sells it at a loss of 10%. What is the selling price of the cycle? 1. Rs. 1080 2. Rs. 1160 3. Rs. 1202 4. Rs. 1190 148. If 40% of a number is equal to two-third of another number, what is the ratio of first number to the second number? 1. 2:5 2. 3:7 3. 5:3 4. 7:3 149. A sum of money at simple interest amounts to Rs. 815 in 3 years and to Rs. 854 in 4 years. What is the sum? 1. Rs. 698 2. Rs. 690 3. Rs. 650 4. Rs. 700 150. A train can travel 50% faster than a car. Both start from point A at the same time and reach point B 75 kms away from A at the same time. On the way, however, the train lost about 12.5 minutes while stopping at the stations. What is the speed of the car? 1. 90 km/hr 2. 120 km/hr 3. 140 km/hr 4. 150 km/hr DITISS Guess Paper Jun -Jul 2013