CSE Questions
CSE Questions
B form of representation
D none of these
Correct Alternative :- B
2. The process of finding data objects with behaviours that are very different from expectation is called
_______.
A Anomalies finding
B Anomalies
C Outlier finding
D Outlier detection
Correct Alternative :- D
3. “All non-empty subsets of a frequent itemset must also be frequent”. The above is ______
A Frequent property
B Itemset property
1
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
C Apriori property
D C4.5 property
Correct Alternative :- C
A Accurary
B Volability
C Completeness
D Consistency
Correct Alternative :- B
5. _______ is an objective measure which helps to assess the degree of certainty of the detected
association.
A Correlation
B Regression
C Support
D Confidence
2
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
A represented in rectangle
Correct Alternative :- C
7. Name the technique that transforms numeric data by mapping values to intervals or concept labels.
A Data mapping
B Data transformation
C Data mining
D Data discretization
Correct Alternative :- D
3
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A Functional modularization
C Localization of errors
D Centralized processing
Correct Alternative :- A
C On-line system
D Expert system
Correct Alternative :- B
A Market analysis
B Mining analysis
4
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- C
11. Given two attributes an analysis performed for nominal data, that how one attribute implies the
other.
A Chi-Square test
B Correlation Coefficient
C Co-variance
D Pearson Product
Correct Alternative :- A
A Hierarchical methods
D Partitioning methods
Correct Alternative :- D
5
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A Data design
B Architectural design
C Procedural design
D Interface design
Correct Alternative :- A
14. The system conversion technique of totally removing the existing system and immediately
implementing the new system is called as
A Phased conversion
B Pilot conversion
C Parallel run
D Crash conversion
Correct Alternative :- D
Correct Alternative :- C
A Compression
B Masking
C Classless Addressing
Correct Alternative :- C
17. ____________ feature of fast ethernet allows two devices to negotiate the mode or data rate of
operation.
A Handshake
B Auto negotiation
C Pre commit
D Protocol
7
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- B
18. _______ is an individual who is not authorized to use the computer and who penetrate a system’s
access controls to exploit a legitimate user’s account.
A Clandestine User
B Misfeasor
C Malicious coder
D Masquerader
Correct Alternative :- D
C 768 kbps
D 25 - 55 mbps
Correct Alternative :- D
8
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A RFC 3963
B RFC 3621
C RFC 3376
D None of these
Correct Alternative :- A
21. A digital transmission system is capable of transmitting signals with a bandwidth of 4 MHz. It
transmits binary data as square wave. Assume f=2 MHz. What is the achievable data rate?
A 2 Mbps
B 4 Mbps
C 8 Mbps
D 1 Mbps
Correct Alternative :- B
A 30 µs
B 30 ms
C 30 ns
9
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
D 30 sec
Correct Alternative :- A
A CCA
D All of these
Correct Alternative :- D
24. Inelastic traffic does not easily adapt to changes in ___________ and ___________ across the internet.
Correct Alternative :- C
10
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
25. Applications like _______ can be installed after gaining access to the computer systems that enable
the hacker to become super users of the system.
A Dumpster diving
B Honey pots
C Traceroute
D None of these
Correct Alternative :- D
26. The category of hackers who work with computer security consulting firms to bug test a system prior
to its launch, looking for exploits so they can be closed.
A Black Hats
B White Hats
C Grey Hats
D Blue Hats
Correct Alternative :- D
A Nyquist formula
11
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
B Shannon’s formula
C Schaller’s formula
D Bell’s formula
Correct Alternative :- A
Correct Alternative :- A
29. Which of the cabling technique is considered best between buildings for establishing LANs?
A 10 Base-2
B 10 Base-5
C 10 Base-F
D 10 Base-T
12
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- C
A 4A:30:10:21:10:1A
B 47:20:1B:2E:08:EE
C 48:20:30:21:10:EE
D FF:FF:FF:FF:FF:FF
Correct Alternative :- B
Correct Alternative :- C
32. Five channels, each with 100 - KHz bandwidth are to be multiplexed together. What is the minimum
bandwidth of the link if there is a need for a guard band of 10KHz between the channels to prevent
13
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
interference.
A 10 KHz
B 100 KHz
C 540 KHz
D 540 Hz
Correct Alternative :- C
33. Decryption and encryption of data are the responsibility of the _____ layer.
A Physical
B Data link
C Network
D Presentation
Correct Alternative :- D
A Active hub
B Passive hub
14
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
C Router
D Bridge
Correct Alternative :- A
D none of these
Correct Alternative :- A
B Interweaving Technique
Correct Alternative :- B
15
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A Command signals
B Transfer signals
C Timing signals
D Communication signals
Correct Alternative :- C
38. Which one of the following accessing mode, a word is retrieved based on a position of its content
rather than its address?
A Random Access
B Associative
C Direct access
D Sequential access
Correct Alternative :- B
16
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- A
A Exponent overflow
B Exponent underflow
C Significand underflow
D Significand overflow
Correct Alternative :- A
41. Which of the following is not a basic phase of floating point arithmetic?
17
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
42. Identify the data types used for two 64 bit quad words packed into a 128 bit double quad word,
interpreted as a bit field or as an integer.
Correct Alternative :- A
A Branch instruction
B Skip instruction
Correct Alternative :- A
18
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- A
Correct Alternative :- A
46. The substraction of two n-digit unsigned numbers M - N in base r can be done mathematically as
A M - (rn+N) = M - N + rn
B M + (rn+N) = M - N + rn
C M - (rn- N) = M - N + rn
19
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
D M + (rn- N) = M - N + rn
Correct Alternative :- D
A i and iii
B i and ii
C ii and iv
D iii and iv
Correct Alternative :- A
48. Which one of the following expression does not represent exclusive NOR of X and Y?
20
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
49. What is the decimal and hexadecimal equivalent of the largest binary that can be expressed with 12
digits
A 4081, FFF
B 4095, 777
C 4095, FFF
D 4081, 77F
Correct Alternative :- C
50.
21
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A Half Adder
B Half Subtractor
C Full Adder
D Full Subtractor
Correct Alternative :- D
Correct Alternative :- A
22
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A F=Σm (0,1,3,5,9,10,14)
B F=Σm (2,3,5,7,8,12,13)
C F=Σm (1,2,4,5,11,14,15)
D F=Σm (2,3,5,7,8,9,12)
Correct Alternative :- D
23
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
54. How many 2-input AND and OR gates are required to realize Y=CD+EF+G?
A 2,2
24
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
B 2,3
C 3,3
D 2,1
Correct Alternative :- A
55. Which of the following combinations cannot be combined into k-map groups?
C Diagonal corners
D Overlapping combinations
Correct Alternative :- C
A I and II
B II and III
25
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
C I, II and III
D III and I
Correct Alternative :- C
57. Given a binary tree whose in order and pre order traversal are given by
In order: EICFBGDJHK
Pre-order: BCEIFDGHJK
The post order traversal of the above binary tree is
A IEFCGJKHDB
B IEFCJGKHDB
C IEFCGKJHDB
D IEFCGJKDBH
Correct Alternative :- A
A bf= height of the left sub-tree (hL) + height of the right sub-tree(hR)
B bf= height of the left sub-tree (hL) - height of the right sub-tree(hR)
C bf= height of the right sub-tree(hR) - height of the left sub-tree (hL)
26
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
D bf= height of the right sub-tree (hR) * height of the left sub-tree(hL)
Correct Alternative :- B
59. In a binary tree, certain null entries are replaced by special pointers which point to nodes higher in
the tree for efficiency. These special pointers are called
A Leaf
B Branch
C Parent
D Thread
Correct Alternative :- D
60. If five items A, B, C, D and E are pushed in a stack, are after the other starting from A. The stack is
popped four times and each element is inserted in a queue. Then two elements are deleted from the
queue and pushed back on the stack. Now, one item is popped from the stack. The popped item is
A A
B B
C E
D D
Correct Alternative :- D
27
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A n
B n(n-1)/2
C n(n+1)/2
D n2/2
Correct Alternative :- B
A Arrays
B Linked list
C Queue
D Sets
Correct Alternative :- D
63. For every node, X, in the tree, the values of all the keys in its left sub-tree are smaller than the key
value in X, and the values of all the keys in its right sub-tree are larger than the key value in X is
called
28
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
B AVL tree
C Red-Black tree
D Heap
Correct Alternative :- A
A ABC++DE*+FG/
B ABC+DE+F*+G/+
C ABC+DE+*F/G+
D ABC+DE+F+*G/+
Correct Alternative :- B
65. In which sort, an element is to pass through the file sequentially several times?
A Insertion sort
B Heap sort
C Quick sort
29
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
D Bubble sort
Correct Alternative :- D
66. A binary search tree contains values 1 2 3 4 5 6 7 and 8. The tree is traversed in preorder and the
values are printed. Which of the following is a valid output?
A 53124786
B 53126497
C 53241678
D 53124768
Correct Alternative :- D
A O(n)
B O(n2)
C O(n log n)
D O( log n)
Correct Alternative :- D
30
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A Root node
B Parent node
C Child node
D Sibling node
Correct Alternative :- A
D None of these
Correct Alternative :- A
A 1
B 0
31
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
C -1
D 2
Correct Alternative :- C
71. The 'Quincy system' of learning, a child-centered progressive approach to education was developed
by _____________.
A A.S.Neill
B John Dewey
C Francis W.Parker
D W.H.Kilpatrick
Correct Alternative :- C
72. Arun from socially deprived and Asha from socially uplifted family show different behaviour when
they enter school life. Which of the following principle of development explains this?
A Principle of interaction
B Principle of predictability
C Principle of interrelation
D Principle of continuity
32
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- C
73. Which one of the following is not a component under indirect influence in the Flander's interaction
Analysis category system?
C Asking questions
D Accepts feelings
Correct Alternative :- A
74. To make a child eat food, the parent provides a favorite toy. Identify the drive and incentive.
Correct Alternative :- A
A Secunderabad
33
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
B Kolkata
C Dehradun
D Chennai
Correct Alternative :- B
76. Radha is reading a book when her favorite music starts playing. She continues reading as well as
listens to the music. Which phrase describes this behaviour?
A shifting of attention
B division of attention
C span of attention
D sustained attention
Correct Alternative :- B
77. The theory of teaching from known to unknown is based on Piaget's concept of __________________.
A Assimilation
B Accomadation
C Scheme formation
34
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
D Equilibration
Correct Alternative :- A
78. Ram tasted ice cream from a cup. When he is offered ice cream with fruits he recognizes it. Name the
learning obtained.
A Perceptual
B Conceptual
C Imagery
D Readjusting
Correct Alternative :- A
79. The dual-track approach of promoting simultaneously the Universalization of Elementary Education
(UEE) and ___________________ should continue to inform educational planning, is one of the
review made by the Janardhana Reddy Committee (1992).
A Adult Literacy
C Secondary Education
D Higher Education
Correct Alternative :- A
35
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
80. Ram goes to a shop to buy many things but forgets to buy few. What strategy will help him to recall
it?
A grouping items
Correct Alternative :- A
A Starvation
B Dead lock
C Mutex
D Critical section
Correct Alternative :- A
36
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- B
83. The problem of guaranteeing that no information initially held in an object can migrate outside of its
execution environment is called the
B Confinement problem
D Encapsulate problem
Correct Alternative :- B
A Circular wait
B No preemption
D Mutual exclusion
37
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
A The set of primitive functions upon which the rest of operating system functions are built up
Correct Alternative :- A
Correct Alternative :- A
87. Wasting of memory within a partition due to a difference in size of a partition and of the object
resident within it is called _________
38
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A fragmentation
B compaction
C external fragmentation
D internal fragmentation
Correct Alternative :- D
88. In memory placement algorithm, which technique chooses the block that is closest in size to the
request?
A Best fit
B First fit
C Next fit
D Worst fit
Correct Alternative :- A
89. We cannot allocate more than a total number of available frames except
B Page sharing
39
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- B
A A part of the operating system which is not allowed to be accessed by any process
B A set of instructions that access common shared resource which exclude one another in time
C The portion of the main memory which can be accessed only by one process at a time
D None of these
Correct Alternative :- C
91.
Correct Alternative :- B
92. Who wrote the book "Poverty and unBritish Rule in India"?
A Gokhale
B Dadabhai Naoroji
C Tilak
D S.N.Banerjee
Correct Alternative :- B
93. Asoka's war with kalinga and its effects are described in the
B Pillar Edicts II
C Rock Edicts II
41
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
A Right to Equality
D Right to Freedom
Correct Alternative :- C
95. According to Central Pollution Control Board (CPCB) the amount of Particulate Matter presence in
an atmosphere can causing the greatest harm to human is ____________.
Correct Alternative :- B
42
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
96.
Correct Alternative :- D
97. Read the following statements and select the correct option stating which are True (T) and which
one's are False (F)
43
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- A
Reason (R) :
Iodine react with amino acid to form amino acid - Iodine complex which is blue black in colour and it
indicates the presence of amino acid in the food item potato.
C A is False, R is True
D A is True, R is False
Correct Alternative :- D
99. An unconscious patient is rushed into the emergency room and needs a fast blood transfusion.
Because there is no time to check her medical history or determine her blood type, Which type of
blood should you as her doctor, give her?
A A-
B AB
C O+
44
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
D O-
Correct Alternative :- C
100. Excess glucose is converted into insoluble glycogen and is stored in liver and muscles for the
future. This process is in the presence of which hormone?
A Insulin
B Glucogon
C Vassopressin
D All of these
Correct Alternative :- A
A person=(first_name, last_name)
B person='raja', last_name
C person first_name="raja";
person last_name="kumar"
D person=first_name, last_name
45
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- C
Correct Alternative :- A
103. Which of the following is true with respect to constructor function in C++?
Correct Alternative :- D
A for x in y:
block
46
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
B for : x in y:
block
C for x in y
block
D for x in y:
block:
Correct Alternative :- A
105. Manipulating a pointer with the indirection operator which is also known as
A Direction operator
B Dereference operator
C Reference operator
D Indirect operator
Correct Alternative :- B
A ios :: in
B ios :: binary
47
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
C ios :: text
D ios :: out
Correct Alternative :- C
107.
C p is pointer to function
Correct Alternative :- A
A ios::ate
B ios::no create
C ios::no replace
D ios::truncate
48
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
A for
B while
C do…… while
D all of these
Correct Alternative :- C
A Function overloading
B Operator overloading
C Virtual functions
Correct Alternative :- D
111. When a method in a subclass has the same name and type signature as a method in the super
class, then the method in the sub class _____ the method in the super class.
A Overloads
49
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
B Friend class
C Inherits
D Overrides
Correct Alternative :- D
A ++
B ::
C --
D *
Correct Alternative :- B
113. If a derived class C is derived from class B which is derived from class A, all through public
inheritance, then a class C member function can access
50
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
Correct Alternative :- B
115. Modules design is used to maximize cohesion and minimize coupling. Which of the following is the
key to implement this rule?
A Inheritance
B Polymorphism
C Encapsulation
D Abstraction
Correct Alternative :- C
51
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
116. If p1 and p2 are properly declared and initialized pointers, then which of the following statements
is invalid?
A *p2=*p2+15;
B y=*p1 **p2;
C a=6*(-*p2/*p1);
D x=6*(*p2/p1);
Correct Alternative :- B
117.
A 22
B 37
C 7
Correct Alternative :- B
ptr="Welcome";
cout<<*ptr;
What will be the output?
A Wel come
D W
Correct Alternative :- D
119. A function in a derived class that has the same name as a function in the parent class
Correct Alternative :- A
A create an array of type pointer-to-base class that can hold pointers to derived classes
53
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
C group objects of different classes so they can all be accessed by the same function code
D use the same function call to execute member functions of objects from different classes
Correct Alternative :- D
121. Let R(a,b,c) and S(d,e,f) be two relations in which d is the foreign key of S that refers to the
primary key of R. Consider the following four operations on R and S
I. Insert into R
II. Insert into S
III. Delete from R
IV. Delete from S
Which of the following is true about the referential integrity constraint above?
Correct Alternative :- D
54
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- C
Correct Alternative :- B
55
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- C
125.
A NOT in 2 NF
B In 2 NF but not 3 NF
C In 3 NF but not 2 NF
D In both 2 NF and 3 NF
Correct Alternative :- D
126.
56
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- A
A 8, 8
B 120, 8
C 960, 8
D 960, 120
Correct Alternative :- A
57
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
129.
Correct Alternative :- B
Correct Alternative :- D
A in-line style
D all of these
Correct Alternative :- C
132.
A url, name
B name, href
C href, url
D all of these
59
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- B
C Both In the place of a graphic in a non-graphic browser and if browser takes lot of time to load a
picture
Correct Alternative :- C
A URL
B URN
C URI
D None of these
Correct Alternative :- C
135. Which one of the following is true about method attribute in form tag?
60
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A Value in the method = Get means getting inputs from the user
C More number of data can be send to the server using post method than Get method
Correct Alternative :- C
136. What are the possible values of VALIGN parameter in table tag can hold?
A left, top
B left, middle
C middle, bottom
D center, right
Correct Alternative :- C
61
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
137.
Correct Alternative :- D
D All of these
62
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
Correct Alternative :- D
139. Which one of the following is not true about server side includes while building the Asp page?
Correct Alternative :- C
140. What is the role of response. write method of the response object?
A Add information into the HTTP response stream being sent to the client
B Add error message into the HTTP response stream being sent to the server
C Add error message into the HTTP response stream being sent to the client
D Add information into the HTTP response stream being sent to the server
Correct Alternative :- A
141. Which are the events that have default actions that can be cancelled by event handlers?
Correct Alternative :- C
142. Removing blank space or “dead air” at the beginning or end of a recording is called as
A Quieting
B Pre-rolling
C Quantizing
D Trimming
Correct Alternative :- D
143. Which of these formats does not change the image quality when the image is saved
A TIFF
B JPEG
C PNG
64
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
D GIF
Correct Alternative :- A
A Ctrl + J
B Ctrl + T
C Ctrl + N
D Ctrl + D
Correct Alternative :- A
145. Drop shadow, inner glow and level are examples of ______ you need to use with text.
A Filters
B Blending options
C Image adjustments
D Layer modes
Correct Alternative :- B
65
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
B Select Filters -> Filter Gallery -> then choose the desired filter from the available options
D Choose the Filter icon from the tools menu then use the options bar at the top of the screen to choose the
desired filter
Correct Alternative :- B
After execution, what are the values present in a[1] and a[2].
D Error
Correct Alternative :- B
148. The file size of a five- second recording sampled at 22 kHz, 16-bit stereo (two tracks) would be
about
66
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
A 110,000 bytes
B 220,000 bytes
C 440,000 bytes
D 880,000 bytes
Correct Alternative :- C
149. The slower a user’s connection, the longer he must wait for enough of the sound to download so
that the entire file will have downloaded by the time the sound reaches the end. This effect is called
A Streaming latency
B Post-processing
C Compression
D Multitap delay
Correct Alternative :- A
67
TEACHERS RECRUITMENT BOARD
Post Graduate Computer Instructor Grade – 1
Question Paper – 27.06.2019
150. Which of these statements regarding the MIDI audio format is not true?
D Files are generally smaller than the same digital audio sound
Correct Alternative :- C
68