EMRS Tier-2 Computer Science Mock Paper 2

 

EMRS STAFF SELECTION EXAM (ESSE)-2025

ESSE 2025 Tier-2 Examination

TGT/PGT Computer Science (Mock Paper 2)

            

Time: 3 Hours                     Maximum Marks: 100               Mock 1 : Check Here 



Instructions:
1. Section A consists of 40 Multiple Choice Questions (1 mark each).
2. Section B consists of 15 Descriptive Questions (4 marks each).
3. All questions are compulsory.



Section A: Multiple Choice Questions (40 × 1 = 40 Marks)


Q1. What are the two types of digital footprints?

a) Active and Passive
b) Intentional and Unintentional
c) Direct and Indirect
d) Personal and Professional

Note : 
Active footprints are created knowingly (posts, forms)
Passive footprints are created unknowingly (cookies, tracking)


Q2. What is a digital society?

a) A community based on physical interactions
b) A society that relies heavily on digital technologies
c) A society that avoids using the Internet
d) A community that only exists online



Q3. What is an example of sensitive data?

a) Social media posts
b) Public email address
c) Biometric information
d) Internet cookies



Q4. What is a tuple in Python?

a) An immutable ordered sequence of elements of different data types
b) A mutable ordered sequence of elements of different data types
c) An unordered collection of unique elements
d) A mutable unordered collection of elements



Q5. How are elements of a tuple accessed?

a) Using keys
b) Using indexing and slicing
c) Using loops only
d) Using a function

Note : fruits = ("apple", "banana", "cherry", "date")
first_fruit = fruits[0]


Q6. What will be the output of the following code?

tuple1 = (2, 4, 6, 8, 10) print(tuple1[3])

a) 6
b) 8
c) 4
d) 10

Note : Indexing starts from 0, so index 3 is the 4th element.



Q7. Which of the following is a valid way to create a list in Python?

a) [2, 4, 6, 8, 10, 12]
b) {2, 4, 6, 8, 10, 12}
c) (2, 4, 6, 8, 10, 12)
d) "2, 4, 6, 8, 10, 12"



Q8. Lists in Python are:

a) Mutable
b) Immutable
c) Static
d) Fixed



Q9. What will be the output of the following code?

list1 = [2, 4, 6, 8, 10, 12] print(list1[3])

a) 8
b) 4
c) 6
d) 10




Q10. What is the output of str1[::-1] if str1 = "Hello World!"?

a) Hello World!
b) World Hello!
c) !dlroW olleH
d) !Hello World

Note : [::-1] reverses the string.


Q11. What is the result of str1[1:5] if str1 = "Hello World!"?

a) Hell
b) ello
c) World
d) o Wor



Q12. Which method capitalizes the first letter of every word?

a) lower()
b) upper()
c) title()
d) capitalize()




Q13. Dividing a program into independent blocks is called:

a) Functional programming
b) Modular programming
c) Structured programming
d) Object-oriented programming

Note : Modular programming improves readability and reuse.


Q14. Purpose of functions in programming is to:

a) Make code longer
b) Reduce readability
c) Achieve modularity and reusability
d) Increase complexity



Q15. Which statement is true about functions?

a) Called only once
b) Cannot have parameters
c) Can be called repeatedly
d) Must always return a value




Q16. Order of execution of statements is called:

a) Execution flow
b) Control flow
c) Program flow
d) Sequence



Q17. Python supports which control structures?

a) Sequence and iteration
b) Selection and iteration
c) Selection and repetition
d) Sequence and selection

Note : decision-making and loops.


Q18. Python groups statements using:

a) Curly brackets
b) Parentheses
c) Indentation
d) Semicolon

Note : Indentation defines blocks in Python.



Q19. Is Python case-sensitive?

a) Yes
b) No
c) Machine dependent
d) None

Note: Var and var are different.


Q20. What is a program?

a) Machine language instructions
b) Hardware components
c) Ordered set of instructions
d) A high-level language

Note: Programs tell computers what to do.


Q21. Which is invalid?

a) _a = 1
b) __a = 1
c) str = 1
d) None








Q22. First step in problem solving is:

a) Testing
b) Coding
c) Analyzing the problem
d) Debugging



Q23. What is an algorithm?

a) Set of exact steps
b) Programming language
c) Hardware
d) Debugging method

Note : Algorithm is a step-by-step solution.


Q24. Computerization refers to:

a) Using computers to automate tasks
b) Hardware parts
c) Debugging
d) Networking




Q25. What is Artificial Intelligence?

a) Software
b) Simulation of human intelligence
c) Robot
d) Programming language



Q26. Application of AI is:

a) Internet browsing
b) Traffic management
c) Email
d) Tagging

Note: AI optimizes traffic flow.


Q27. Machine Learning allows computers to:

a) Work without humans
b) Learn from data
c) Operate systems
d) Calculate fast

Note: ML learns patterns from data.



Q28. Base of binary system is:

a) 2
b) 8
c) 10
d) 16



Q29. Encoding for almost all languages is:

a) ASCII
b) ISCII
c) UTF-8
d) UNICODE

Note: Unicode supports global characters.


Q30. ASCII uses how many bits?

a) 7
b) 8
c) 16
d) 32

Note: Standard ASCII uses 7 bits.



Q31. CPU stands for:

a) Central Processing Unit
b) Central Programming Unit
c) Computer Personal Unit
d) Centralized Processing Unit



Q32. High-speed memory between CPU and RAM is:

a) Cache
b) Secondary
c) RAM
d) ROM



Q33. Role of memory controller is to:

a) Manage data flow to memory
b) Control CPU speed
c) Power supply
d) External storage




Q34. Full form of OSI is:

a) Operating System Interface
b) Optical System Interconnection
c) Operating System Internet
d) Open System Interconnection

Note: The OSI (Open Systems Interconnection) model is a 7-layer framework created by the International Organization for Standardization (ISO) to standardize how computer systems communicate over a network.


Q35. What is a HUB?

a) Software
b) Computing device
c) Network device
d) Calculator

Note: A network hub is a basic, "dumb" hardware device that connects multiple Ethernet devices in a Local Area Network (LAN) and acts as a central connection point, but instead of intelligently directing data, it simply repeats (broadcasts) incoming data to all other connected ports, making it inefficient and outdated compared to switches


Q36. A set of rules defines:

a) SMTP
b) FTP
c) IMAP
d) Protocol




Q37. SQL is a:

a) Theoretical language
b) Procedural language
c) Structured language
d) Unstructured language



Q38. Conceptual schema is defined by:

a) DDL
b) DML
c) DCL
d) DQL

Note: Data Definition Language (DDL) is the formal language used by database administrators and designers to define the conceptual schema of a database. ex : CREATE, ALTER, DROP


Q39. Physical characteristics of records are defined by:

a) DDL
b) DML
c) DCL
d) DQL

Note: DDL is responsible for describing the overall database structure or schema, which includes specifying the physical implementation details such as table structures, data types, column constraints, and indexes.


Q40. Collection of facts and figures is called:

a) Data
b) Information
c) Database
d) DBMS

Note: Data is raw facts used to generate information (i.e  processed, organized data).





Section B: Descriptive Questions (15 × 4 = 60 Marks)



Q1. Differentiate between the following statements in SQL : 

(i) ALTER and UPDATE

(ii) DELETE and DROP


Ans. 






Q2. Explain different types of function arguments in Python.

Ans. Python supports different types of function arguments:

  1. Positional Arguments – Values are passed in the same order as parameters.
    Example: add(2, 3)

  2. Keyword Arguments – Values are passed using parameter names.
    Example: add(a=2, b=3)

  3. Default Arguments – Parameters have default values if not provided.
    Example: def add(a, b=5)

  4. Variable-length Arguments – Allows passing multiple values.
    *args for non-keyword, **kwargs for keyword arguments.

    Example - 

    def sum_all_numbers(*args)  -- print(sum_all_numbers(10, 20, 30, 40))

    def display_user_info(**kwargs) --  display_user_info(name="Alice", age=30, city="New York")



Q3. Explain Boolean logic gates AND, OR, NOT, NAND, and XOR using truth tables.

A logic gate is a device that acts as a building block for digital circuits. Logic gates perform basic logical functions fundamental to digital circuits. Most electronic devices we use today have some form of logic gate in them.

  • AND: True if both inputs are true (1 if
    A=1cap A equals 1
    and
    B=1cap B equals 1
    ).
  • OR: True if at least one input is true (1 if
    A=1cap A equals 1
    or
    B=1cap B equals 1
    or both).
  • NOT: True if the input is false (inverts input; 1 becomes 0, 0 becomes 1).
  • NAND: False only if both inputs are true
  • XOR (Exclusive OR): True if inputs are different (1 if
    ABcap A is not equal to cap B
    ).
     
  • AB    AND OR   NAND XOR
    00    0          0   10
    01    0 1         11
    10    0 1           11
    11    1 1   00

    NOT Gate:

    A=0 → Output=1

    A=1 → Output=0




    Q4. Explain the IT Act of India and its objectives.

    Ans. 

    • The Information Technology Act, 2000 (IT Act) is India's primary law regulating cyber activities, e-commerce, and digital signatures.
    • Enacted on October 17, 2000, it provides legal recognition to electronic records, facilitating e-governance and combating cybercrimes like hacking and data theft. 
    • It serves as the legal foundation for India's digital economy. 

    Here are the key objectives of the IT Act, 2000:

    1. To grant legal validity to electronic data interchange and digital/electronic signatures for authentication.

    2.  To facilitate online transactions and provide a legal framework for electronic commerce, reducing reliance on paper-based methods.

    3. To enable the filing of documents with government agencies in electronic form.

    4. To define and penalize cybercrimes, including hacking, data theft, identity theft, and publishing obscene content.

    5. To provide legal safeguards against the misuse of personal information, requiring consent for data collection.

    6. To establish a framework for the Controller of Certifying Authorities (CCA) to manage digital signature certificates. 




    Q5. Describe Python tokens and explain variables, l-value, r-value, and comments.

    Tokens are the smallest, individual & meaningful units of a program that the interpreter reads to understand the code, similar to words or punctuation in a sentence.

    Python divides code into five main types of tokens: 

    1. Keywords: Reserved words with special meanings that cannot be used as variable names ( if, else, while, def, True, False, import).

    2. Identifiers: Names given to variables, functions, classes, or objects. They must start with a letter (A-Z, a-z) or an underscore (_), followed by letters, digits, or underscores. They are case-sensitive.

    3. Literals: Fixed, raw data values directly written in the code (example -> 10 (integer), 3.14 (float), "Hello" (string), None).

    4. Operators: Symbols that perform operations on variables and values (ex ->  +, -, *, /, ==, !=, =).

    5. Punctuators (Delimiters): Symbols used to structure code and organize syntax ( ( ), [ ], { }, ,, :, ., =). 


    The variables are named labels that refer to objects stored in memory. They are used to store data, and unlike other languages, Python variables do not require explicit type declaration. 

    * Creation: Created after we assign a value to them using the = operator (like age = 25)

    * Dynamic Typing: A variable can change its data type if assigned a new value of a different type (like x = 10 followed by x = "Hello")

    * Object Reference: Python variables act as pointers to data rather than containers holding the data directly. 


    R & L Value are the concepts relate to what can appear on either side of an assignment operator (=). 

    L-Value (Left-hand Value): Refers to an object/variable that occupies a specific, identifiable location in memory. It is the destination of an assignment. In Python, variables are typical L-values.

    R-Value (Right-hand Value): Represents the data value or expression that is assigned to an L-value. It is the value being stored. Literals and expressions are R-values. 

    Example: x = 10 + 5

    x is the L-value (the container).

    10 + 5 is the R-value (the value to be stored). 


    Comments are lines in the code that are ignored by the Python interpreter and are used to explain or document the code. 

    Single-line comments: Start with the hash sign (#).

    # This is a comment
    print("Hello")

    Multi-line comments: Python does not have a specific multi-line comment symbol, but programmers use triple quotes (''' or """) for multiline strings, which are ignored if not assigned to a variable. 

    """
    This is a multi-line comment.
    It explains the code.

    """




    Q6. Expand the following:

    (a) ARPANET

    (b) MAC

    (c) ISP

    (d) URI

    Ans . 

    (a) ARPANET (Advanced Research Projects Agency Network)

    • ARPANET was the first operational packet-switching network developed by the U.S. Department of Defense in the late 1960s.
    • It laid the foundation of the modern Internet by introducing technologies like TCP/IP and resource sharing.

    (b) MAC (Media Access Control) Address

    • A MAC address is a unique 48-bit physical address assigned to a network interface by the manufacturer.
    • It works at the Data Link Layer and helps identify devices within a local area network.


    (c) ISP (Internet Service Provider)

    • An ISP is a company that provides internet access to users for personal or business use.
    • It connects users to the internet using technologies such as fiber, DSL, cable, or satellite.


    (d) URI (Uniform Resource Identifier)

    • A URI is a unique identifier used to name or identify resources on the internet.
    • It includes both URLs and URNs and provides a standard way to reference resources.





    Q7. Write a short note on different methods of malware identification used by antivirus software.

    Ans. 

    The different methods of malware identification used by antivirus software are as follows :

    Signature-based detection

    In this method, an antivirus works with the help of a signature database known as "Virus Definition File (VDF)". This file consists of virus signatures and is updated continuously on a real-time basis. This makes the regular update of the antivirus software a must.

    Sandbox detection 

    In this method, a new application or file is executed in a virtual environment (sandbox) and its behavioural fingerprint is observed for a possible malware. Depending on its behaviour, the antivirus engine determines if it is a potential threat or not and proceeds accordingly.

    Heuristics  

    Often, a malware infection follows a certain pattern. Here, the source code of a suspected program is compared to viruses that are already known and are in the heuristic database. If the majority of the source code matches with any code in the heuristic database, the code is flagged as a possible threat.

    Real-time protection 

    Some malware remains dormant or gets activated after some time. Such malware needs to be checked on a real-time basis. In this technique, the anti-malware software keeps running in the background and observes the behavior of an application or file for any suspicious activity while it is being executed i.e. when it resides in the active (main) memory of the computer system.





    Q8. Create a menu-driven program using user-defined functions to implement a calculator that performs the following:

    Basic arithmetic operations(+, -, *, /)


    Ans : 







    Q9. Explain the major functions of an operating system and the concept of OS user interface.

    An operating system acts as an interface between the user and computer hardware and controls the overall functioning of the computer. It manages system resources, runs applications, and provides a user interface for interaction.

    Major functions of an Operating System:
    • The operating system manages the processor by scheduling processes and allowing multitasking.
    • It manages memory by allocating RAM to programs and preventing interference between them.
    • The operating system controls file storage by organizing data into files and folders.
    • It manages input and output devices using device drivers.
    • The operating system provides security by controlling user access and protecting data.

    Concept of OS User Interface:
    The user interface is the part of the operating system that allows users to interact with the computer easily.

    • A Graphical User Interface (GUI) uses windows, icons, menus, and pointers for user interaction.
    • A Command Line Interface (CLI) allows users to interact with the system by typing text commands.

    Credits : GeeksforGeeks





    Q10. Explain the role of encoding schemes in data security.

    Encoding schemes convert data into a standard and safe format for correct transmission and storage. Encoding does not hide data but helps protect it from corruption and misuse.

    Role of encoding in data security :

    • Encoding ensures system compatibility by preventing data corruption, for example using UTF-8 to display text correctly across different systems.

    • Encoding prevents web attacks by converting special characters, for example HTML encoding changes <script> to safe text to prevent XSS attacks.

    • Encoding supports encryption by converting data into a readable format, for example Base64 is used before encrypting binary data.

    • Encoding ensures safe data transfer by replacing unsafe characters, for example URL encoding converts spaces into %20.




    Q11. Discuss different approaches to solving a problem using algorithms.

    Ans. Problem solving is a systematic process of understanding a problem, designing an algorithm, and implementing the solution. 

    An algorithm is a finite, step-by-step procedure used to solve a problem. Various approaches are as follows : 

    Decomposition breaks a complex problem into smaller parts, for example dividing a billing system into input, calculation, and output steps.

    Sequence executes instructions one after another, for example reading a number and then printing it.

    Selection uses decision-making statements, for example using an if-else condition to check whether a number is even or odd.

    Repetition repeats steps using loops, for example using a while loop to print numbers from 1 to 10.

    Algorithms are represented using :
    1. 
    flowcharts (graphical form) or
    2. pseudocode (plain language steps). 

    The main steps include problem analysis, algorithm design, verification, and implementation using a programming language.




    Q12. Analyze the characteristics of Big Data and their implications.


    Big Data refers to very large and complex data sets that cannot be processed using traditional systems. It is characterized by five key features known as the five Vs.



    Volume refers to the huge amount of data generated

    Velocity refers to the high speed at which data is produced, collected, and processed in real time.

    Variety means data exists in different formats such as text, images, audio, and video.

    Veracity refers to the accuracy and reliability of data, which requires proper data cleaning.

    Value represents the ability to extract meaningful and useful insights from Big Data despite high storage and processing costs.





    Q13. Explain the role of memory management in an operating system.

    Ans. 
    Memory management is an important function of an operating system that controls the use of primary memory (RAM). It ensures efficient use of memory and supports multitasking and system stability.

    • Allocation and DeallocationThe operating system allocates memory to processes when they start and deallocates it after execution is completed.
    • Tracking UsageIt keeps track of used and free memory spaces to avoid conflicts between programs.
    • Memory Protection - Memory management provides protection by preventing one process from accessing another process’s memory.
    • Virtual Memory/SwappingIt uses virtual memory and swapping to run large programs even when physical memory is limited.





    Q14. Differentiate between text file and binary file.

    Ans.

    Text File

    Binary File

    A text file consists of human readable characters, which can be opened by any text editor.

    A binary file is made up of non-human readable characters and symbols, which require specific programs to access its contents.

    A text file is a file that stores information in the form of a stream of ASCII or Unicode characters.

    A binary file is a file that stores the information in the form of a stream of bytes.

    In text files, each line of text is terminated with a special character known as EOL (End of Line) character.

    In a binary file, there is no delimiter for a line and no character translations occur here.

    Files with extensions like .txt, .py, .csv etc are some examples of text files.

    Files with extensions like .jpg, .pdf etc are some examples of binary files.





    Q15. When are the following built-in exceptions raised? Give examples to support your answers.

    1. ImportError
    2. IOError
    3. NameError
    4. ZeroDivisionError


    Ans. 

    i) ImportError — It is raised when the requested module definition is not found.

    Example :

    import module

    Output

    ModuleNotFoundError: No module named 'module'


    ii) IOError — It is raised when the file specified in a program statement cannot be opened.

    Example :

    file = open("file1.txt", "r")

    Output

    FileNotFoundError: [Errno 2] No such file or directory: 'file1.txt''


    iii) NameError — It is raised when a local or global variable name is not defined.

    Example :

    print(var+40)

    Output

    NameError: name 'var' is not defined.


    iv) ZeroDivisionError — It is raised when the denominator in a division operation is zero.

    Example :

    print(50/0)

    Output

    ZeroDivisionError: division by zero






    Get fully solved 5-set of sample papers for Tier-2 Exam: 


     













    Comments

    Popular posts from this blog

    EMRS Tier-2 Computer Science Mock Paper 2026

    EMRS Tier-2 Computer Science 5 Mock Papers 2026

    Wireless Communication Important Notes