EMRS Tier-2 Computer Science Mock Paper 3
EMRS STAFF SELECTION EXAM (ESSE)-2025
ESSE 2025 Tier-2 Examination
TGT/PGT Computer Science (Mock Paper 3)
1. When two NOT gates are connected one after another, what is the resulting logic behavior?
(a) Inverter
(b) Buffer
(c) NAND gate
(d) NOR gate
Note: Two NOT operations cancel each other (A'') = A, so the output remains unchanged → acts as a buffer.
2. Which tool in Canva AI is used to turn a text-based document into an interactive quiz?
(a) Magic Media
(b) Brand Hub
(c) Magic Write (Generate Quiz)
(d) Animator
3. What is the purpose of a Virus Definition File (VDF) in antivirus software?
(a) Stores quarantined files
(b) Maintains known virus signatures for detection
(c) Tests suspicious files
(d) Encrypts user data
Note: VDF acts like a database that helps antivirus identify known threats.
4. If two tables with 10 and 5 records are combined using a cross join, how many rows will result?
(a) 15
(b) 5
(c) 10
(d) 50
Note: Cross join = all combinations → 10 × 5 = 50 rows.
5. What will be the output of modifying a list inside a tuple in Python?
(a) Error due to immutability
(b) (1, 2, [3, 4, 5])
(c) (1, 2, (7, 4, 5))
(d) (1, 2, [7, 4, 5])
Note: Tuple is immutable, but mutable elements (like lists) inside it can still change.
6. What is the correct binary representation of 99?
(a) (1100011)₂
(b) (1111011)₂
(c) (1101011)₂
(d) (1000011)₂
Note: 99 = 1100011 in binary.
7. Which SQL statement correctly inserts specific column values into a table?
(a) INSERT INTO Customer VALUES (...)
(b) INSERT Customer SET ...
(c) INSERT INTO Customer (CustomerID, Name, Product) VALUES (...)
(d) VALUES (...)
Note: Proper syntax requires specifying columns explicitly.
8. What will be the output after updating and summing dictionary values?
(b) 8
(c) 9
(d) 10
Note: After update → {'a':1, 'b':3, 'c':4} → sum = 8.
9. When is network snooping considered acceptable?
(a) By hackers
(b) For troubleshooting by administrators
(c) For spying
(d) For ad tracking
Note: Legitimate use includes monitoring networks for maintenance.
10. Which is NOT a valid file opening mode in Python?
(a) ab
(b) rw
(c) r+
(d) w+
Note: “rw” is not a valid mode in Python.
11. Which SQL command removes a table completely?
(a) alter
(b) delete
(c) drop
(d) update
Note: DROP deletes the entire table structure.
12. What range of values can be produced by randrange(100) + 1?
(a) 1 to 100
(b) 0 to 100
(c) 1 to 99
(d) 0 to 99
Note: randrange(100) → 0–99, +1 → 1–100.
13. What is DHCP used for?
(a) Address broadcasting
(b) Query-response system
(c) Acknowledgment system
(d) Automatic IP address assignment
Note: DHCP assigns IPs dynamically to devices.
14. What does cardinality represent in a database table?
(a) Number of rows (tuples)
(b) Number of tables
(c) Number of columns
(d) Number of constraints
Note: Cardinality = total number of records.
15. Which protocol maps IP addresses to physical addresses?
(a) RARP
(b) BOOTP
(c) ARP
(d) ICMP
Note: ARP translates IP → MAC address.
16. How many bits are present in an IPv4 address?
(a) 64
(b) 128
(c) 32
(d) 48
Note: IPv4 uses 32-bit addressing.
17. Which statement about first-generation computers is incorrect?
(a) High heat generation
(b) Vacuum tubes used
(c) Highly reliable
(d) Machine language used
Note: They were actually unreliable.
18. What is the role of buses in a computer system?
(a) Connect different hardware components
(b) Connect only RAM
(c) Run CMOS
(d) Increase CPU speed
Note: Buses enable communication between components.
19. Which of the following is considered a cybercrime?
(a) IPR violation
(b) Plagiarism
(c) Pornography
(d) All of the above
Note: All listed activities fall under cybercrime.
20. What is an ISP?
(a) A company providing internet access
(b) The web itself
(c) Local network
(d) Browser
Note: ISP gives users internet connectivity.
21. Which of the following is NOT a Python keyword?
(a) pass
(b) eval
(c) assert
(d) nonlocal
Note: eval() is a function, not a keyword.
22. What best defines blockchain technology?
(a) Centralized ledger
(b) Decentralized distributed ledger
(c) Class-based database
(d) None
23. Who developed ChatGPT?
(a) Google
(b) OpenAI
(c) Apple
(d) Microsoft
24. Which method writes a row into a CSV file in Python?
(a) writer
(b) writerow
(c) write
(d) writeline
Note: writerow() writes a single row.
25. What is the result of comparing 0.2 + 0.4 with 0.6 in Python?
(a) True
(b) False
(c) Error
(d) Depends
Note: Floating-point precision causes slight inaccuracy.
26. Which functions help in random file access?
(a) open & readlines
(b) seek & read
(c) seek & tell
(d) tell & read
Note: seek() moves pointer, tell() gives position.
27. Which device forwards data packets between networks?
(a) Modem
(b) Router
(c) Repeater
(d) USB
Note: Routers direct traffic between networks.
28. How do you correctly initialize an empty list in Python?
(a) emrs = list()
(b) emrs != list()
(c) emrs = list[]
(d) emrs = stacklist()
29. What is the output of the expression -
(a) -1024
(b) 32
(c) 0
(d) 1
30. Which is a proper net etiquette practice?
(a) Be precise, polite, credible
(b) Be ethical, precise, credible
(c) Be ethical, respectful, responsible
(d) Be secure, reliable, responsible
Note: Net etiquette focuses on respectful and responsible communication.
31.Which Python data structure internally uses hashing for storing elements?
Section B: Descriptive Questions (15 × 4 = 60 Marks)
- Clock speed refers to the number of cycles a CPU can perform per second (measured in GHz).
- Higher clock speed means faster execution of instructions.
- Cores refer to the number of processing units in a CPU.
- More cores allow the CPU to perform multiple tasks simultaneously (multitasking).
FROM Product
ORDER BY PName DESC, UPrice ASC;
* Memory sends data (e.g., 25) via data bus (two-way).
Comments
Post a Comment