General English
1. Choose the correct antonym of the given word “Grandiose”
(A) Heavy
(B) Proud
(C) Simple
(D) Clumsy
Ans:: Simple
2. Choose the correct synonym of the given word: “Candid”
(A) Anxious (B) Frank
(C) Experienced
(D) Secretive
Ans:: Frank
3. My relations Suganya are good.
(A) against
(B) with
(C) on
(D) to
Ans:: with
4. Many young men were at street corners for the coffee bar to open.
(A) hanging about
(B) hanging on
(C) hanging back
(D) hanging out
Ans:: hanging about
5. The doctor had examined him.
(A) He was examined by the doctor.
(B) He had been examined by the doctor.
(C) He has been examined by the doctor.
(D) He have been examined by the doctor.
Ans:: He had been examined by the doctor.
6. To beat about the bush
(A) To avoid coming to the point
(B) To boast about oneself
(C) To punish an innocent person
(D) Get to the point
Ans:: To avoid coming to the point
7. Anathematise
(A) Locate
(B) Deceive
(C) Bless
(D) Radiate
Ans:: Bless
8. He was quite sure that none of them were aware of the truth. (A) had aware of (B) were beware of
(C) was aware of
(D) were aware from
Ans:: was aware of
9. Habits : Instinct :: :
(A) Work : Play
(B) Birds : Animals
(C) Training : Heredity
(D) Learning : Force
Ans:: Training : Heredity
10. In each of the following questions, four words are given of which two words are nearly the same or opposite in meaning.
(A) InterminableÂ
(B) LongÂ
(c) EndlessÂ
(D) Interfering
(A) A-C
(B) B-C
(C) D-C
(D) B-D
Ans:: A-C
11. Choose the correctly spelt word?
(A) Achievement
(B) Achevement
(C) Achievment
(D) Acheivment
Ans:: Achievement
12. Choose the mis-spelt word?
(A) Contingency
(B) Contemporery
(C) Contemplate
(D) Controversial
Ans:: Contemporery
13. Though he was only a child
(P) he often worked much harder
(Q) than was either necessary
(R) in order to please his parents
(S) or good for him
(A) RQSP
(B) RPQS
(C) PRSQ
(D) PRQS
Ans:: RPQS
14. He always stammers in public meetings, but his today’s speech
A) was not received satisfactorily
(B) was not liked by the audience
(C) was fairly audible to everyone present in the hall
(D) was surprisingly fluent
Ans:: was surprisingly fluent
15. I said to my friend, “Can you swim”?
(A) I asked my friend whether he could swim.
(B) I asked my friend whether he can be swim.
(C) I asked my friend whether he can swim.
(D) I asked my friend whether he could be swim.
Ans:: I asked my friend whether he could swim.
Numerical Ability
16. The average of a group of men is increased by 5 years when a person aged of 18 years is replaced by a new person of aged 38 years. How many men are there in the group?
(A) 3
(B) 4
(C) 5
(D) 6
Ans:: 4
17. The speed of a boat in still water in 15 km/hr and the rate of current is 3 km/hr. The distance travelled downstream in 12 minutes is:
(A) 1.2 km
(B) 1.8 km
(C) 2.4 km
(D) 3.6 km
Ans:: 3.6 km
18. At what time between 5:30 and 6 will the hands of a clock be at right angles?
(A) 43 5 11 𝑚𝑖𝑛. 𝑝𝑎𝑠𝑡 5
(B) 43 7 11 𝑚𝑖𝑛. 𝑝𝑎𝑠𝑡 5
(C) 40 min. past 5
(D) 45 min. past 5
Ans:: 𝟒𝟑 𝟕 𝟏𝟏 𝒎𝒊𝒏. 𝒑𝒂𝒔𝒕 𝟓
19. . 009 ? = .01
(A) .0009
(B) .09
(C) .9
(D) 9
Ans:: .9
20. The angle of elevation of the top of a tower from a certain point is 30°. If the observed moves 20 m towards the tower, the angle of elevation the angle of elevation of top of the tower increases by 15°. The height of the tower is
(A) 17.3 m
(B) 21.9 m
(C) 27.3 m
(D) 30 m
Ans:: 27.3 m
21. What is the difference between the simple interest on a principal of Rs. 500 being calculated at 5% per annum for 3 years and 4% per annum for 4 years?
(A) Rs. 5
(B) Rs. 10
(C) Rs. 20
(D) Rs. 40
Ans:: Rs. 5
22. 7 – 6 , where n is an integer >0, is divisible by
(A) 13
(B) 127
(C) 559
(D) 34
Ans:: (D)
23. The cost of an article was Rs.75. The cost was first increased by 20% and later on it was reduced by 20%. The present cost of the article is:
(A) Rs. 72
(B) Rs. 60
(C) Rs. 75
(D) Rs. 76
Ans:: Rs. 72
24. Six years ago, the ratio of the ages of Kunal and Sagar was 6 : 5. Four years hence, the ratio of their ages will be 11 : 10. What is Sagar’s age at present?
(A) 16 years
(B) 18 years
(C) 20 years
(D) 25 years
Ans:: 16 years
25. Two trains of equal length are running on parallel lines in the same direction at 46 km/hr and 36 km/hr. The faster train passes the slower train in 36 seconds. The length of each train is:
(A) 50 m
(B) 72 m
(C) 80 m
(D) 82 m
Ans:: 50 m
26. A shopkeeper marks his goods 30% above his cost price but allows a discount of 10% at the time of sale. His gain is:
(A) 21%
(B) 20%
(C) 18%
(D) 17%
Ans:: 17%
27. If the fifth term of a GP is 81 and first term is 16, what will be the 4 term of the GP?
(A) 36
(B) 18
(C) 54
(D) 24
Ans:: 54
28. If A : B = 2 : 3 and B : C = 4 : 5 then A : B : C is
(A) 2 : 3 : 5
(B) 5 : 4 : 6
(C) 8 : 12 : 15
(D) 6 : 4 : 5
Ans:: 8 : 12 : 15
29. Ravi and Ajay start simultaneously from a place A towards B 60 km apart. Ravi’s speed is 4km/h less than that of Ajay. Ajay, after reaching B, turns back and meets Ravi at a places 12 km away from (B) Ravi’s speed is:
(A) 12 km/h
(B) 10 km/h
(C) 8 km/h
(D) 6 km/h
Ans:: 8 km/h
30. If 10 men can do a piece of work in 12 days, the time taken by 12 men to do the same piece of work will be:
(A) 12 days
(B) 10 days
(C) 9 days
(D) 8 days
Ans:: 10 days
General Knowledge
31. Which Union Ministry is associated with ‘Endorsements Know-hows! Guidelines’?
(A) Ministry of Consumer Affairs
(B) Ministry of Agriculture and Farmers welfare
(C) Ministry of Home Affairs
(D) Ministry of Corporate Affairs
Ans:: Ministry of Consumer Affairs
32. ‘Incident Management Services’ is associated with which Union Ministry?
(A) Ministry of Home Affairs
(B) Ministry of Road Transport and Highways
(C) Ministry of Housing and Urban Affairs
(D) Ministry of Agriculture and Farmers welfare
Ans:: Ministry of Housing and Urban Affairs
33. Which bank unveiled its ‘Next-gen Contact Center’ for personalised customer experience?
(A) Canara Bank
(B) State Bank of India
(C) Punjab National Bank
(D) Axis Bank
Ans:: State Bank of India
34. Port Tanjung Benoa, where INS Sumedha visited recently for a Maritime Partnership Exercise, is located in which country?
(A) Bangladesh
(B) Indonesia
(C) Vietnam
(D) Oman
Ans:: Indonesia
35. Which institution released the “How is India Adapting to Heatwaves?” report?
(A) NITI Aayog
(B) Centre for Policy Research
(C) IEA
(D) UNEP
Ans:: Centre for Policy Research
36. ‘Yaya Tso’ is a bio-diversity site located in which state/UT?
(A) Arunachal Pradesh
(B) Ladakh
(C) Assam
(D) Sikkim
Ans:: Ladakh
37. Who is the first woman IAF officer to receive a gallantry medal?
(A) Avani Chaturvedi
(B) Bhawana Kant
(C) Deepika Misra
(D) Mohana Singh
Ans:: Deepika Misra
38. Khuvsgul lake National Park, which was recently added to UNESCO World Network of Biosphere Reserves, is located in which country?
(A) Ukraine
(B) Mongolia
(C) Chile
(D) Mexico
Ans:: Mongolia
39. ‘Transforming Literacy Learning Spaces’ is the theme of which special day celebrated on September 8?
(A) International Education Day
(B) International Literacy Day
(C) International Culture Day
(D) International Community Learning Day
Ans:: International Literacy Day
40. Which racing driver won the Miami Grand Prix title in 2023?
(A) Charles Leclerc
(B) Max Verstappen
(C) Sergio Perez
(D) Lewis Hamilton
Ans:: Max Verstappen
41. Which country’s plant mycologist is the first person in the world to contract a plant fungal disease?
(A) India
(B) China
(C) Japan
(D) USA
Ans:: India
42. Which city is the host of the Indian wind industry’s biennial exhibition-cum conference ‘Windergy’?
(A) Chennai
(B) Jaipur
(C) Ahmedabad
(D) Bengaluru
Ans:: Chennai
43. Manuela Roka Botey has been appointed as the first female Prime Minister of which country?
(A) Finland
(B) Equatorial Guinea
(C) Norway
(D) Sweden
Ans:: Equatorial Guinea
44. Tagin language is prevalently spoken in which state/UT?
(A) Assam
(B) Sikkim
(C) Arunachal Pradesh
(D) Meghalaya
Ans:: Arunachal Pradesh
45. Fintech Platform PhonePe launched its first green data centre in India in which state/UT?
(A) Karnataka
(B) Maharashtra
(C) Tamil Nadu
(D) Gujarat
Ans:: Maharashtra
46. Which institution released the ‘Status of Women in Agrifood Systems’ Report?
(A) FAO
(B) UNICEF
(C) NABARD
(D) NITI Aayog
Ans:: FAO
47. The ‘Greentech Safety Award 2023’ was awarded to which organisation?
(A) REC
(B) RINL
(C) PFC
(D) SAIL
Ans:: RINL
48. Rhythm Sangwan, who was seen in the news, plays which sports?
(A) Wrestling
(B) Cricket
(C) Shooting
(D) Hockey
Ans:: Shooting
49. ‘Riding out the multicrisis’ is the theme of which summit being held in 2022?
(A) COP-27
(B) India-ASEAN Summit
(C) Paris Peace Forum
(D) UNSC Anti-terrorism Summit
Ans:: Paris Peace Forum
50. A celt, belonging to the neolithic period, was recently discovered in which state/UT?
(A) Kerala
(B) Karnataka
(C) Tamil Nadu
(D) Andhra Pradesh
Ans:: Tamil Nadu
Computer Knowledge
51. What is required when more than one person uses a central computer at the same time?
(A) Light pen
(B) Mouse
(C) Digitizer
(D) Terminal
Ans:: Terminal
52. Which of the following is the first computer to use Stored Program Concept?
(A) UNIVAC
(B) ENIAC
(C) EDSAC
(D) IBM SSEC
Ans:: EDSAC
53. The term gigabyte refers to
(A) 1024 bytes
(B) 1024 kilobytes
(C) 1024 megabytes
(D) 1024 gigabyte
Ans:: 1024 megabytes
54. in which year was UK’s premier computing event called ?The which computer? started?
(A) 1980
(B) 1985
(C) 1986
(D) 1987
Ans:: 1980
55. Once you load the suitable program and provide required data, computer does not need human intervention. This feature is known as
(A) Accuracy
(B) Reliability
(C) Versatility
(D) Automatic
Ans:: Automatic
56. What is a brand?
(A) The name of companies that made computers
(B) The name of product a company gives to identify its product in market
(C) A name of class to indicate all similar products from different companies
(D) The Company Sell the Product
Ans:: The name of product a company gives to identify its product in market.
57. Registers, which are partially visible to users and used to hold conditional, are known as
(A) PC
(B) Memory address registers
(C) Flags
(D) General purpose register
Ans:: General purpose register
58. A byte consists of
(A) One bit
(B) Four bits
(C) Eight bits
(D) Sixteen bits
Ans:: Eight bits
59. Modern Computers are very reliable but they are not
(A) Fast
(B) Powerful
(C) Infallible
(D) Cheap
Ans:: Infallible
60. What is the date when Babbage conceived Analytical engine
(A) 1642
(B) 1837
(C) 1880
(D) 1850
Ans:: 1837
61. What was the expected feature of fifth generation computers when Japan started FGCS?
(A) Operating Systems
(B) Paralled Processing
(C) ULSI
(D) Sequence Processing
Ans:: Paralled Processing
62. Which of the following memory medium is not used as main memory system?
(A) Magnetic core
(B) Semiconductor
(C) Magnetic tape
(D) Semiconductor and magnetic tape
Ans:: Magnetic tape
63. The storage subsystem in a microcomputer consists mainly of or media with varying capacities
(A) Memory or video
(B) Magnetic or optical
(C) Optical or memory
(D) Video or magnetic
Ans:: Magnetic or optical
64. Programs designed to perform specific tasks is known as
(A) system software
(B) application software
(C) utility programs
(D) operating system
Ans:: application software 65. UNIVAC is
(A) Universal Array Computer
(B) Universal Automatic Computer
(C) Unique Automatic Computer
(D) Unvalued Automatic Computer
Ans:: Universal Automatic Computer
66. Which of the following is not a type of computer on the basis of operation?
(A) Digital
(B) Analog
(C) Hybrid
(D) Remote
Ans:: Remote
67. Which of the following type of computer is mostly used for automatic operations?
(A) analog
(B) digital
(C) hybrid
(D) remote
Ans:: hybrid
68. Which of the following invention gave birth to the much cheaper microcomputers?
(A) PDAs
(B) Microprocessors
(C) Microcomputers
(D) Mainframes
Ans:: Microprocessors
69. Which of the following computers are lower than mainframe computers in terms of speed and storage capacity?
(A) Mainframes
(B) Hybrid
(C) Mini
(D) Super
Ans:: Mini
70. Which of the following is the first neural network computer?
(A) AN
(B) AM
(C) RFD
(D) SNARC
Ans:: SNARC
71. For real time operating systems, interrupt latency should be
(A) zero
(B) minimal
(C) maximum
(D) dependent on the scheduling
Ans:: minimal
72. Personnel who design, program, operates and maintains computer equipment refers to
(A) Console-operator
(B) Programmer
(C) System Analyst
(D) Peopleware
Ans:: Peopleware
73.The priority of a process will if the scheduler assigns it a static priority. (A) depends on the operating system
(B) change
(C) remain unchanged
(D) Variable
Ans:: remain unchanged
74. RJ45 UTP cable has Cables.
(A) 2 pair
(B) 3 pair
(C) 4 pair
(D) 5 pair
Ans:: 5 pair
75. What are the characteristics of stack based IDS?
(A) It is programmed to interpret a certain series of packets
(B) It models the normal usage of the network as a noise characterization
(C) They are integrated closely with the TCP/IP stack and watch packets
(D) The host operating system logs in the audit information
Ans:: They are integrated closely with the TCP/IP stack and watch packets
76. 8000 Machine consists of 16-bit general-purpose register.
(A) Eighteen
(B) Sixteen
(C) Twenty
(D) Nineteen
Ans:: Sixteen
77. In which machine every register is a general-purpose register.
(A) z8000
(B) MC 68000
(C) Intel 8085
(D) Intel 8086
Ans:: Intel 8086
78. The fetched instruction is stored in the CPU register known as.
(A) IRC Instruction register
(B) PC Program counter
(C) MARC Memory address Register
(D) MDRC memory Data Register
Ans:: IRC Instruction register
79. instruction specifies the requirements of execution is tattere(D)
(A) Control
(B) CPU-memory transfer
(C) CPU-I/O transfer
(D) IRC Instruction register
Ans:: Control
80. site that distributes the source code of the software
(A) SsourceForge.net
(B) FreeSoftware.org
(C) OpenSource.org
(D) OpenSourceSoftware.net
Ans:: SsourceForge.net
81. Which was written by Larry Mavoy was chosen by Torvalds to use for version control for the LINUX Kernal.
(A) Configuration Directories
(B) Source Safe
(C) Bitkeeper
(D) Multiple Repositories
Ans:: Bitkeeper
82. requires that any promise to contribute back any changes or addition to the software.
(A) Reciprocal licenses
(B) Academic licenses
(C) General Public license
(D) Software Licenses
Ans:: Reciprocal licenses
83. Usually require just acknowledgement of the original owners work on the software (A) Reciprocal licenses
(B) Academic licenses
(C) General Public license
(D) Software Licenses
Ans:: Academic licenses
84. Dual licensing is also called as
(A) tri-licensing
(B) business licensing
(C) multi licensing
(D) software licensing
Ans:: multi licensing
85. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
(A) botnets
(B) programs
(C) virus
(D) worms
Ans:: botnets
86. Which of the following is the least strong security encryption standard?
(A) WPA3
(B) WPA2
(C) WPA
(D) WEP
Ans:: WEP
87. Which of the following is a Stuxnet?
(A) Trojan
(B) Antivirus
(C) Worm
(D) Virus
Ans:: Worm
88. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
(A) Operating System fingerprinting
(B) Operating System penetration testing
(C) Digital-printing
(D) Machine printing
Ans:: Operating System fingerprinting
89. Which of the following can diminish the chance of data leakage?
(A) Steganography
(B) Chorography
(C) Cryptography
(D) Authentication
Ans:: Steganography
90. is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
(A) Payload
(B) Spamming
(C) Exploits
(D) Scams
Ans:: Payload
91. is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
(A) Keylogging
(B) Spamming
(C) Denial of service
(D) Exploits
Ans:: Keylogging
92. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is
(A) Eavesdropping
(B) Exploits
(C) Scams
(D) Denial of service
Ans:: Eavesdropping
93. are computer programs that are designed by attackers to gain root or administrative access to your computer.
(A) Backdoors
(B) Rootkits
(C) Malware
(D) Antiware
Ans:: Rootkits
94. What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
(A) Spyware
(B) Antiware
(C) Backdoors
(D) Malware
Ans:: Spyware
95. Protection from of source code means allotting the right to edit the source code to authorized persons only.
(A) disclosure
(B) alteration
(C) destruction
(D) log of changes (who is making request)
Ans:: log of changes (who is making request)
96. Protection from of source code means protection of any individual from destroying the software source code.
(A) Disclosure
(B) Alteration
(C) Destruction
(D) log of changes (whose making request)
Ans:: Disclosure
97. Protection from of source code means recording all changes made to the source code and the person making such changes.
(A) disclosure
(B) alteration
(C) destruction
(D) log of changes (who is making request)
Ans:: alteration
98. of access rights in source code development means verification of role before permitting access to source code.
(A) verification
(B) maintaining historical records
(C) error handling
(D) log of changes (who is making request)
Ans:: error handling
99. in source code development means verification of role before permitting access to source code.
(A) verification
(B) maintaining historical records
(C) error handling
(D) log of changes (who is making request)
Ans:: verification
100. The processing required for a single instruction is called .
(A) Fetch cycle
(B) Execution cycle
(C) Instruction cycle
(D) Branch cycle
Ans:: Instruction cycle