You are on page 1of 10

1.

A diode for which you can vary the revese bias, and thus vary the capacitance is called a. Varactor diode b. Tunnel diode c. Zener diode d. Switching diode Ans- varactor diode 2. A non-volatile type of memory that can be programmed and erased in sectors, r ather than one byte at atime is a. Flash memory b. EPROM c. EEPROM d. MPROM Ans-EEPROM 3. To get a negative source voltage in a self biased JFET circuit, one must use a a. Voltage divider b. Source resistor c. Bleeder resistor d. Negative gate supply voltage ANS- SOURCE RESISTOR 4. An amplifier with resistive negative feed back has two left half planes poles in its open-loop transfer function. The amplifier a. Will always be unstable at high frequency b. Will be stable for all frequency c. May be unstable, depending upon the feed back factor d. Will oscillate at low frequency Ans- will be stable for all frequency 5. In the h-parameter model of representing a transistor the input and output se ctions are modelled as a. Voltage source b. Current source c. Input section as voltage source, and output section as current source

d. Input section as current source and output section as voltage source Ans-input section as voltage and out put section as current source 6. A differential amplifier is invariably used in the input stage of all op-amp. This is done basically to provide the op-amp a very high a. CMRR b. Band width c. Slew rate d. Open-loop gain Ans-open-loop gain 7. In the amplifier, transistor inter-junction capacitance causes a. Phase shift b. Harmonic distortion c. Noise d. Parasitic oscillation Ans-parasitic oscillation 8. The loss in signal power as light travels through the optical fiber is called a. Attenuation b. Propagation c. Scat****ng d. Interruption Ans-attenuation 9. The upper cut-off frequency of a transistor amplifier depends upon a. Coupling and emitter bypass capacitance b. Junction and wiring capacitance c. Coupling and wiring capacitance d. Junction and emitter bypass capacitance Ans-coupling and wiring capacitance 10. The process of converting analog signals into digital signals so that they c an be processed by a receiving computer is referred to as a. Modulation b. Demodulation

c. Synchronization d. Digitizing Ans-digitizing 11. The number of messages required to close a TCP connection operating in a ful l duplex mode is a. 2 b. 3 c. 4 d. 5 Ans-4 12. For an 8khz sample rate and 8 bit PCM code, the line speed is a. 8000bps b. 1000bps c. 64000bps d. 640bps Ans-64000bps 13. AI can be defined as abranch of computer science a. Concerened with creating computer system exhibiting intelligence b. Used for creating databases c. Dealing with graph theory d. Dealing with artificial data structurers Ans- a 14. A prescribed set of well defined rules or processes for the solution of a pr oblem in a series of steps is a. Flow chart b. Program c. Algorithm d. System analysis Ans-algorithm 15. One of the main features that distinguish microprocessors from microcomputer s is

a. Words are usually large in microprocessor b. Word are shorter in microprocessor c. Microprocessor does not contain I/O devices d. Microcessor is not fully integrated Ans-c 16. What is the principal advantage of using address multiplexing with DRAM memo ry? a. Reduced memory access time b. Reduced requierement for constant refreshing of the memory contents c. Reduced pin count and decrease in package size d. No requirement for chip-select input line, thereby reducing pin count Ans-d 17. The computer language LOGO is based on another powerful list processing lang uage for robotics and artificial intelligence. That language is a. GSP b. LISP c. PASCAL d. PROLOG ANS-b 18. The term zero defect is associated with a. Maintenance b. Quality control c. Production d. Raw ma****als Ans-b 19. The main objective of maintenance is to achieve a. Increased efficiency of the system b. Maximum profit from the system c. Reliability of the system d. Reduced cost Ans-a

20. Communication is a process of receiving messages whereas, the process throug h which we fix meanings to the received message is known as a. Perception b. Anchorage c. Semantics d. Proxemics Ans-c 21. Modulation is the process a. Generating constant frequency radio waves b. Combining audio and radio frequency waves at the transmitting end of a commun ication system c. Reducing distortion in RF amplitude d. Improving thermal stability of a transistor Ans-b 22. The bus which is used to transfer data from main memory to peripheral device is the a. Data bus b. Input bus c. DMA bus d. Output bus Ans-c 23. Which one of the following statements referring to an interpreter is correct ? a. It has rapid turn around b. It is faster than complier c. It occupies less memory space d. It is preferred for complex calculation Ans-d 24. Which one of the following is non-verbal communication s**ll? a. Writing b. Eye contact c. Spea**ng

d. Reading Ans-b 25. Which of the following is the defective stage in a TV receiver if their exis ts a keystone effect in the raster? a. AGC circuit b. Horizontal and vertical output circuit c. Tuner and IF circuit d. Picture tube circuit Ans-b 26. A hot smoky product or device is often a sign of a. Short circuit b. Ground c. Open circuit d. Both ground and open circuit Ans-a 27. An ac signal at the base of previous transistor is normal, but it is zero at the base of the stage under test. All transistors are normal and dc voltages ar e normal and dc voltages are normal. What is the likely fault? (a) bias is faulty (b) emitter bypass capacitor open (c) decoupling capacitor open (d) coupling capacitor open ANS-a 28. When an electronics device which was functioning well malfunctions, what ist he first operation to be done for servicing? a. check the fuse b. check the power supply c. switch off and on thus doing a hardware reset d. check if the device is hot ANS-A 29. NDM-1 is a a. virus b. vaccine c. serum d. super bug ANS-D 30. Acid rain is caused due to the emission of which of the following into the a tmosphere? a. ozone and carbon monoxide b. carbon monoxide and carbon dioxide c. oxides of nitrogen and sulphur d. carbonated of calcium and magnesium ANS-C

31. The phenomenon of causing the formation of rainbow is a. dispersion of light b. interference of light c. diffraction of light d. reflection of light ANS-A 32. which type of cell is used in cell phone? a. copper-zinc cell b. nickel-cadmium cell c. lithium cell d. lead acid cell ANS-B 33. In the context of blood transfusion, what happens to a person who receives t he wrong type of blood? a. the red blood cells agglutinate b.the white blood cells agglutinate c. the arteries constrict d. the arteries dilate ANS-A 34. Aedes mosquito is rampant in a particular area. A person who is living there will not suffer from one of the following diseases as a result of mosquito bite: a. chickungunya b. dengue c. kala azar d. yellow fever ANS-A 35. for the visualization of internal structure of human body, computed tomograp hy employs a. magnetic resonance b. radioisotopes c. sound waves d.X- ray Ans-a 36. what is the purpose of establishing gene banks? a. to facilitate the transfer of biotechnology processes from one country to ano ther b. to preserve the genetic information of plants and animal species c. to preserve certain select genes for utilising in the biotechnology process d. to facilitate the production of vaccine ANS-B 37. on a clear night, with the half moon showing, it is possible to see the outl ine and perhaps very slight detail of the dark portion of the moon. Where is the light coming from that illuminates the dark side of the moon? a. star b. moon c. Earth d. eye ANS-A 38. A virtual image is produced by which of the following? a. an ordinary camera b. a motion picture projector c. duplicating camera

d. simple magnifier ANS-D 39. How many words are there in message digest of SHA-1(secure hash algorithm)?E ach word is of 32 bits. a. 4 words b. 5 words c. 6 words d. 7 words ANS-B 40. The term used to describe harmful stress associated with computer use is a. techno stress b. cyber stress c. compustress d. repetitive stress injury ANS-A 41. Which of the following would best fit the following description: software is copied and given to a friend without the permission of the copyright owner? a. free ware b. piracy c. share ware d. public domain ANS-B 42. which of the following techniques is required to hijack a TCP session? a. SYN-Flooding b. message replay c. sequence number prediction d. port number prediction ANS-B 43. WHICH of the following are application level encryption protocols that onewo uld most likel;y use to secure online banking? a. SSL & SET b. verisign & SHA 1 c. READY, SET & GO d. PGP,PEM & SSL ANS-C (DOUBT IF U KNOW MAIL ME) 44. which of the following g encryption technique is unconditionally secure? A. Advance encryption standard (AES)-128-bit keys b. XOR based encryption using one-time padding key 128-bit c. triple-data encryption standard (3-DES) WITH 112-BIT key d. public key based encryption with 2048-bit length ANS-B 45. which of the following is the correct description of a chosen cipher-text at tack? a. the attacker has a plain text m and the corresponding cipher-text x b. the attacker has a cipher text x c. the attacker has temporary access to the encryption device d. the attacker has temporary access to the decryption device. ANS-D 46.WHAT will be the sensitivity of a 200microampere meter movement which is to b e used as a dc voltmeter? a. 200kohm/v b. 5 kohm/v c. 50kohm/v

d. 20kohm/v ANS-B 47. an signal of 10mv at 75mhz frequencyis to be measured. The most suitable ins trument that could be used is a. VTVM b. MI VOLTMETER C.CRO d. Digital multimeter ANS-C 48. the deflection sensitivity of a CRO is 0.01mm/v. When an unknown voltage is applied to the horizontal plates, the spot on the screen shifts by 4mm, towards right in the horizontal direction. The value of the unknown voltage is a. 4v b. 4ov c. 400v d. 4000v ANS-C 49. the voltage across an impendance z is measured with a voltmeter whose inputi mpendance is equal to z. The resulting error in such measurement is known as a. gross error b. systematic error c. loading effect error d. random error ANS-C 50. I n load cell, strain gauge acts as a a. protective device b. comparator c. primary transducer d. secondary transducer ANS-C 51. manganese nodules containg manganese, cobalt and nickel are available natura lly in india at a. Himalayan river valley b. deccan plateau c. costal regions of east cost d. central Indian ocean basin ANS-B 52. Which is the best method to detect tsunami? a. using bottom pressure recorders at the subduction zone in ocean b. using satellite to measure ocean current c. using land based radar to measure ocean current d. using acoustic instrument to measure the sound during under sea earth quake. ANS-C (DOUBT) 53. the release of one of the following into ponds and wells helps in controllin g the mosquitoes? a. crab b. dogfish c. gambusia fish d. snail ANS-C 54. Mixture of which one of the following pair of gases is the causes of occurre nce of most of the explosion in mines?

a. carbon dioxide and hydrogen b. hydrogen and oxygen c. methane and air d. oxygen and acetylene ANS-C 55. WHICH of the following elements were primarily responsible for the origin of life on earth? a. argon,oxygen and iron b. carbon, hydrogen and nitrogen c. calcium, magnesium and sodium d. oxygen, hydrogen and potassium ANS-B 56. water pipes are apt to burst in cold weather because a. water expands and pipe shrinks b. water shrinks and pipe expands c. both water and pipe shrink in volume d. both water and pipe expand ANS-A 57. radioactive iodine is used for treatment of which of the following diseases? a. skin diseases b. bone diseases c. blood cancer d. thyroid diseases ANS-D 58. IF A HOLE IS MADE along the diameter of the earth and a stone is dropped int o the hole, then the stone will a. reach the centre of the earth and stop there b. reach the other end of earth and stop there c. execute simple harmonic motion about the centre of the earth d.reach the other side of the earth and escape out the hole. ANS-C

You might also like