EMRS Tier-2 Computer Science Mock Paper 2026
EMRS STAFF SELECTION EXAM (ESSE)-2025
ESSE 2025 Tier-2 Examination
TGT/PGT Computer Science (Mock Paper)
Instructions:
1. Section A consists of 40 Multiple Choice Questions (1 mark each).
2. Section B consists of 15 Descriptive Questions (4 marks each).
3. All questions are compulsory.
Section A: Multiple Choice Questions (40 × 1 = 40 Marks)
1. Which memory is fastest in a computer system?
(a) RAM
(b) Cache
(c) Hard Disk
(d) ROM
2. Which unit performs arithmetic and logical operations?
(a) Control Unit
(b) ALU
(c) Register
(d) Cache
3. 1 KB is equal to:
(a) 1000 bytes
(b) 1024 bytes
(c) 1024 bits
(d) 100 bits
4. Which software acts as an interface between user and hardware?
(a) Compiler
(b) OS
(c) Firmware
(d) BIOS
5. Which logic gate gives output 1 only when both inputs are 1?
(a) OR
(b) XOR
(c) AND
(d) NAND
6. De Morgan’s law converts AND into:
(a) OR
(b) NAND
(c) NOR
(d) XOR
7. Which number system uses digits 0–7?
(a) Binary
(b) Octal
(c) Decimal
(d) Hexadecimal
8. ASCII code uses how many bits?
(a) 5
(b) 6
(c) 7
(d) 8
9. UTF-8 is a type of:
(a) Compiler
(b) Encoding scheme
(c) OS
(d) Protocol
10. Which bus carries memory addresses?
(a) Data bus
(b) Control bus
(c) Address bus
(d) PCI bus
11. RISC architecture focuses on:
(a) Complex instructions
(b) Fewer instructions
(c) Large memory
(d) More registers only
12. Word processor is an example of:
(a) System software
(b) Utility software
(c) Application software
(d) Firmware
13. Which step comes first in problem solving?
(a) Coding
(b) Testing
(c) Analysis
(d) Debugging
14. Python is:
(a) Low-level language
(b) Assembly language
(c) High-level language
(d) Machine language
15. Which symbol is used for comments in Python?
(a) //
(b) #
(c) /* */
(d) —
16. Which data type is immutable?
(a) List
(b) Dictionary
(c) Tuple
(d) Set
17. Which operator checks membership?
(a) is
(b) ==
(c) in
(d) not
18. What is the output type of input() in Python?
(a) int
(b) float
(c) str
(d) bool
19. Which error occurs due to wrong indentation?
(a) Runtime
(b) Logical
(c) Syntax
(d) Semantic
20. Which loop is used when iterations are known?
(a) while
(b) for
(c) do-while
(d) infinite
21. Which function returns the length of a string?
(a) count()
(b) size()
(c) len()
(d) find()
22. Which list method adds an element at the end?
(a) insert()
(b) append()
(c) extend()
(d) add()
23. Tuples are stored in:
(a) Mutable form
(b) Immutable form
(c) Dynamic memory only
(d) Cache
24. Which method removes a key-value pair?
(a) pop()
(b) delete()
(c) remove()
(d) clearall()
25. Which module generates random numbers?
(a) math
(b) random
(c) statistics
(d) os
26. Which keyword defines a function?
(a) function
(b) def
(c) define
(d) fun
27. Which file mode appends data?
(a) r
(b) w
(c) a
(d) rb
28. Pickle module is used for:
(a) Text files
(b) CSV files
(c) Binary files
(d) HTML files
29. Digital footprint refers to:
(a) Virus
(b) Online trace
(c) Hardware fault
(d) License
30. Phishing is related to:
(a) Hardware theft
(b) Identity fraud
(c) Software piracy
(d) Virus
31. PAN stands for:
(a) Public Area Network
(b) Personal Area Network
(c) Private Area Network
(d) Primary Area Network
32. Which device connects different networks?
(a) Hub
(b) Switch
(c) Router
(d) Repeater
33. HTTP is a:
(a) Hardware
(b) Programming language
(c) Protocol
(d) Topology
34. URL stands for:
(a) Uniform Resource Locator
(b) Universal Resource Link
(c) Unique Resource Locator
(d) Unified Resource Link
35. Primary key can be:
(a) NULL
(b) Duplicate
(c) Unique
(d) Optional
36. Which SQL clause filters records?
(a) WHERE
(b) GROUP BY
(c) ORDER BY
(d) DISTINCT
37. AVG() is a:
(a) Text function
(b) Date function
(c) Aggregate function
(d) Math function
38. IoT refers to:
(a) Internet of Things
(b) Input Output Tool
(c) Internal Object Transfer
(d) Integrated Online Tech
39. AI system that generates text is an example of:
(a) Robotics
(b) Expert system
(c) Generative AI
(d) Automation
40. SaaS is a model of:
(a) Hardware
(b) Cloud service
(c) Network topology
(d) Database
Section B: Descriptive Questions (15 × 4 = 60 Marks)
1. Explain the basic organization of a computer system with a neat diagram.
A computer system consists of four main units:
Input Unit: Takes data from the user (keyboard, mouse).
CPU (Central Processing Unit):
ALU: Performs arithmetic and logical operations
Control Unit: Controls all activities
Memory Unit: Stores data and instructions
Output Unit: Displays results (monitor, printer)
2. Differentiate between primary memory and secondary memory.
Primary Memory Secondary Memory
Fast access Slower access
Volatile Non-volatile
Expensive Cheaper
Example: RAM Example: HDD, SSD
3. Explain Boolean logic and De Morgan’s laws with examples.
Boolean logic deals with values 0 and 1 using operators AND, OR, NOT.
De Morgan’s Laws:
¬(A AND B) = ¬A OR ¬B
¬(A OR B) = ¬A AND ¬B
Example:
If A=1, B=0
¬(A AND B) = ¬0 = 1
¬A OR ¬B = 0 OR 1 = 1
4. Convert (101101)₂ into decimal and hexadecimal.
Decimal:
= 1×32 + 0×16 + 1×8 + 1×4 + 0×2 + 1×1
= 45
Hexadecimal:
101101 → 0010 1101
= 2D
5. Explain RISC and CISC architectures.
RISC (Reduced Instruction Set Computer):
Fewer instructions
Faster execution
Example: ARM
CISC (Complex Instruction Set Computer):
More complex instructions
Slower but compact code
Example: Intel x86
6. Describe steps involved in problem solving using a flowchart.
Steps:
- Problem definition
- Analysis
- Algorithm design
- Flowchart
- Coding
- Testing & debugging
- Flowchart shows logic using symbols like oval, rectangle, diamond.
7. Explain Python data types with examples.
int: x = 10
float: y = 3.5
str: name = "Python"
list: [1,2,3]
tuple: (1,2,3)
dict: {"a":1}
8. Write a Python program to find factorial of a number.
n = int(input("Enter number: "))
fact = 1
for i in range(1, n+1):
fact *= i
print(fact)
9. Explain string slicing and built-in string functions in Python.
Slicing:
str[start:end]
Example: "Python"[1:4] → yth
Functions:
-len()
-upper()
-lower()
-find()
10. Describe operations on lists and tuples with examples.
List operations:
append(), insert(), remove()
Example: lst.append(5)
Tuple operations:
Indexing, slicing
Immutable (cannot modify)
11. Explain types of keys in relational database.
- Primary key: Unique, not null
- Foreign key: Refers to primary key
- Candidate key: Possible primary key
- Composite key: Combination of columns
12. Write SQL commands to create a table and insert records.
CREATE TABLE Student (
id INT,
name VARCHAR(20)
);
INSERT INTO Student VALUES (1, 'Amit');
13. Explain cyber crimes and methods to prevent them.
Cyber crimes: Phishing, hacking, identity theft
Prevention:
- Strong passwords
- Antivirus
- Avoid suspicious links
- Two-factor authentication
14. Describe network topologies and types of networks.
Topologies:
- Star - uses a central hub, making it easy to manage but reliant on the hub
- Bus - uses one main cable (backbone) for all, simple but prone to collisions
- Ring - connects devices in a circle, data flows one way, vulnerable to a single break
- Mesh - connects every node to every other, offering high redundancy with many paths but complex cabling, commonly seen in WANs
Types of networks:
LAN (Local Area Network)
- Coverage: Small area like a building, home, or campus.
- Ownership: Typically private (e.g., a school, business).
- Speed/Latency: High speed, low latency (quick data transfer).
- Technology: Ethernet, Wi-Fi.
- Example: Your home Wi-Fi network.
- Coverage: A city or large town, connecting LANs.
- Ownership: Can be public or private (e.g., city Wi-Fi, telecom).
- Speed/Latency: Moderate speed, moderate latency, more congestion than LAN.
- Technology: Fiber optics, wireless links.
- Example: A university campus network.
- Coverage: Large geographical areas, countries, or continents.
- Ownership: Often public or shared, not owned by a single entity.
- Speed/Latency: Lower speeds, high latency, significant congestion.
- Technology: Satellite, leased lines, fiber.
- Example: The Internet.
15. Explain Artificial Intelligence and its applications in daily life.
The application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data (AI enables machines to mimic human intelligence)
Applications:
Comments
Post a Comment