EMRS Tier-2 Computer Science Mock Paper 2026

 

EMRS STAFF SELECTION EXAM (ESSE)-2025

ESSE 2025 Tier-2 Examination

TGT/PGT Computer Science (Mock Paper)

            

Time: 3 Hours                     Maximum Marks: 100               Syllabus Link : Check here



Instructions:
1. Section A consists of 40 Multiple Choice Questions (1 mark each).
2. Section B consists of 15 Descriptive Questions (4 marks each).
3. All questions are compulsory.


Section A: Multiple Choice Questions (40 × 1 = 40 Marks)

1. Which memory is fastest in a computer system?
(a) RAM
(b) Cache
(c) Hard Disk
(d) ROM

2. Which unit performs arithmetic and logical operations?
(a) Control Unit
(b) ALU
(c) Register
(d) Cache

3. 1 KB is equal to:
(a) 1000 bytes
(b) 1024 bytes
(c) 1024 bits
(d) 100 bits

4. Which software acts as an interface between user and hardware?
(a) Compiler
(b) OS
(c) Firmware
(d) BIOS

5. Which logic gate gives output 1 only when both inputs are 1?
(a) OR
(b) XOR
(c) AND
(d) NAND

6. De Morgan’s law converts AND into:
(a) OR
(b) NAND
(c) NOR
(d) XOR

7. Which number system uses digits 0–7?
(a) Binary
(b) Octal
(c) Decimal
(d) Hexadecimal

8. ASCII code uses how many bits?
(a) 5
(b) 6
(c) 7
(d) 8

9. UTF-8 is a type of:
(a) Compiler
(b) Encoding scheme
(c) OS
(d) Protocol

10. Which bus carries memory addresses?
(a) Data bus
(b) Control bus
(c) Address bus
(d) PCI bus

11. RISC architecture focuses on:
(a) Complex instructions
(b) Fewer instructions
(c) Large memory
(d) More registers only

12. Word processor is an example of:
(a) System software
(b) Utility software
(c) Application software
(d) Firmware

13. Which step comes first in problem solving?
(a) Coding
(b) Testing
(c) Analysis
(d) Debugging

14. Python is:
(a) Low-level language
(b) Assembly language
(c) High-level language
(d) Machine language

15. Which symbol is used for comments in Python?
(a) //
(b) #
(c) /* */
(d) —

16. Which data type is immutable?
(a) List
(b) Dictionary
(c) Tuple
(d) Set

17. Which operator checks membership?
(a) is
(b) ==
(c) in
(d) not

18. What is the output type of input() in Python?
(a) int
(b) float
(c) str
(d) bool

19. Which error occurs due to wrong indentation?
(a) Runtime
(b) Logical
(c) Syntax
(d) Semantic

20. Which loop is used when iterations are known?
(a) while
(b) for
(c) do-while
(d) infinite

21. Which function returns the length of a string?
(a) count()
(b) size()
(c) len()
(d) find()

22. Which list method adds an element at the end?
(a) insert()
(b) append()
(c) extend()
(d) add()

23. Tuples are stored in:
(a) Mutable form
(b) Immutable form
(c) Dynamic memory only
(d) Cache

24. Which method removes a key-value pair?
(a) pop()
(b) delete()
(c) remove()
(d) clearall()

25. Which module generates random numbers?
(a) math
(b) random
(c) statistics
(d) os

26. Which keyword defines a function?
(a) function
(b) def
(c) define
(d) fun

27. Which file mode appends data?
(a) r
(b) w
(c) a
(d) rb

28. Pickle module is used for:
(a) Text files
(b) CSV files
(c) Binary files
(d) HTML files

29. Digital footprint refers to:
(a) Virus
(b) Online trace
(c) Hardware fault
(d) License

30. Phishing is related to:
(a) Hardware theft
(b) Identity fraud
(c) Software piracy
(d) Virus

31. PAN stands for:
(a) Public Area Network
(b) Personal Area Network
(c) Private Area Network
(d) Primary Area Network

32. Which device connects different networks?
(a) Hub
(b) Switch
(c) Router
(d) Repeater

33. HTTP is a:
(a) Hardware
(b) Programming language
(c) Protocol
(d) Topology

34. URL stands for:
(a) Uniform Resource Locator
(b) Universal Resource Link
(c) Unique Resource Locator
(d) Unified Resource Link

35. Primary key can be:
(a) NULL
(b) Duplicate
(c) Unique
(d) Optional

36. Which SQL clause filters records?
(a) WHERE
(b) GROUP BY
(c) ORDER BY
(d) DISTINCT

37. AVG() is a:
(a) Text function
(b) Date function
(c) Aggregate function
(d) Math function

38. IoT refers to:
(a) Internet of Things
(b) Input Output Tool
(c) Internal Object Transfer
(d) Integrated Online Tech

39. AI system that generates text is an example of:
(a) Robotics
(b) Expert system
(c) Generative AI
(d) Automation

40. SaaS is a model of:
(a) Hardware
(b) Cloud service
(c) Network topology
(d) Database






Section B: Descriptive Questions (15 × 4 = 60 Marks)


1. Explain the basic organization of a computer system with a neat diagram.

A computer system consists of four main units:

Input Unit: Takes data from the user (keyboard, mouse).

CPU (Central Processing Unit):

ALU: Performs arithmetic and logical operations

Control Unit: Controls all activities

Memory Unit: Stores data and instructions

Output Unit: Displays results (monitor, printer)

@reference from geeksforgeeks


2. Differentiate between primary memory and secondary memory.

Primary Memory Secondary Memory
Fast access              Slower access
Volatile                     Non-volatile
Expensive               Cheaper
Example: RAM         Example: HDD, SSD


3. Explain Boolean logic and De Morgan’s laws with examples.

Boolean logic deals with values 0 and 1 using operators AND, OR, NOT.

De Morgan’s Laws:

¬(A AND B) = ¬A OR ¬B
¬(A OR B) = ¬A AND ¬B

Example:
If A=1, B=0
¬(A AND B) = ¬0 = 1
¬A OR ¬B = 0 OR 1 = 1

4. Convert (101101)₂ into decimal and hexadecimal.

Decimal:
= 1×32 + 0×16 + 1×8 + 1×4 + 0×2 + 1×1
= 45
Hexadecimal:
101101 → 0010 1101
= 2D

5. Explain RISC and CISC architectures.

RISC (Reduced Instruction Set Computer):
Fewer instructions
Faster execution
Example: ARM

CISC (Complex Instruction Set Computer):
More complex instructions
Slower but compact code
Example: Intel x86

6. Describe steps involved in problem solving using a flowchart.

Steps:
  1. Problem definition
  2. Analysis
  3. Algorithm design
  4. Flowchart
  5. Coding
  6. Testing & debugging
  7. Flowchart shows logic using symbols like oval, rectangle, diamond.



7. Explain Python data types with examples.
int: x = 10
float: y = 3.5
str: name = "Python"
list: [1,2,3]
tuple: (1,2,3)
dict: {"a":1}


8. Write a Python program to find factorial of a number.

n = int(input("Enter number: "))
fact = 1
for i in range(1, n+1):
    fact *= i
print(fact)

9. Explain string slicing and built-in string functions in Python.

Slicing:
str[start:end]
Example: "Python"[1:4] → yth

Functions:
-len()
-upper()
-lower()
-find()


10. Describe operations on lists and tuples with examples.


List operations:
append(), insert(), remove()
Example: lst.append(5)




Tuple operations:
Indexing, slicing
Immutable (cannot modify)





11. Explain types of keys in relational database.

  • Primary key: Unique, not null
  • Foreign key: Refers to primary key
  • Candidate key: Possible primary key
  • Composite key: Combination of columns


12. Write SQL commands to create a table and insert records.

CREATE TABLE Student (
  id INT,
  name VARCHAR(20)
);

INSERT INTO Student VALUES (1, 'Amit');


13. Explain cyber crimes and methods to prevent them.

Cyber crimes: Phishing, hacking, identity theft

Prevention:
  • Strong passwords
  • Antivirus
  • Avoid suspicious links
  • Two-factor authentication

14. Describe network topologies and types of networks.

Topologies:
  • Star - uses a central hub, making it easy to manage but reliant on the hub
  • Bus - uses one main cable (backbone) for all, simple but prone to collisions
  • Ring - connects devices in a circle, data flows one way, vulnerable to a single break
  • Mesh - connects every node to every other, offering high redundancy with many paths but complex cabling, commonly seen in WANs

Types of networks:

LAN (Local Area Network)
  • Coverage: Small area like a building, home, or campus.
  • Ownership: Typically private (e.g., a school, business).
  • Speed/Latency: High speed, low latency (quick data transfer).
  • Technology: Ethernet, Wi-Fi.
  • Example: Your home Wi-Fi network. 


MAN (Metropolitan Area Network)

  • Coverage: A city or large town, connecting LANs.
  • Ownership: Can be public or private (e.g., city Wi-Fi, telecom).
  • Speed/Latency: Moderate speed, moderate latency, more congestion than LAN.
  • Technology: Fiber optics, wireless links.
  • Example: A university campus network. 

WAN (Wide Area Network)
  • Coverage: Large geographical areas, countries, or continents.
  • Ownership: Often public or shared, not owned by a single entity.
  • Speed/Latency: Lower speeds, high latency, significant congestion.
  • Technology: Satellite, leased lines, fiber.
  • Example: The Internet. 

15. Explain Artificial Intelligence and its applications in daily life.

The application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data (AI enables machines to mimic human intelligence)

Applications:
    1. Voice assistants
    2. Recommendation systems
    3. Self-driving cars
    4. Chatbots
    5. Medical diagnosis






Answer Marking Scheme





























Comments

Popular posts from this blog

Wireless Communication Important Notes

Wireless Communication MID TERM 2022

Mobile Computing | Unit 3 & 4