HTET PGT Computer Science Question Paper 2020

All students can find here Haryana Teacher Eligibility Test (HTET) Environmental Studies (EVS) Solved Question Papers for the post (Teachers for classes XI & XII) examination to be held in 2020. All these question sample papers will help you for better exam preparation.

HTET PGT Computer Science Solved Paper (Part I)


1. ___________ is not a physical tag.
a) <B>
b) <S>
c) <Small>
d) None of these

2. ____________ first proposed the process of normalization.
a) Edward Stephen
b) Edward Codd
c) Edgar W. Codd
d) Edgar F. Codd

3. A ____________ uses physical addresses.
a) Router
b) Repeater
c) Gateway
d) Bridge

4. C++ was developed by__________
a) Dennis Ritchie
b) Edgard Codd
c) Ivan Bayross
d) Bjarne Stroustrup

5. ____________ is also called class interface.
a) Member function
b) Program access level
c) Data Member
d) Class tagname

6. ____________ is an example of Half Duplex System.
a) Keyboard
b) Monitor
c) Telephone
d) Walkie-Talkie

7. _____________ shortcut key is used to insert a new slide in the document presentation.
a) Ctrl + N
b) Ctrl + O
c) Ctrl + M
d) Ctrl + F

8. A file which contains readymade styles that can be used in a presentation is called __________.
a) Auto style
b) Template
c) Wizard
d) Pre formatting

9. _____________ are data items that never change the values during a program run.
a) Integers
b) Variables
c) Literals
d) Float

10. ______________is a way to bind the data & its associated functions together which allows

them to be hidden.
a) Structure
b) Enum
c) Class
d) None of these

11. Overall System architecture is derived in _______________ phase.
a) Coding
b) Design
c) Testing
d) Maintenance
12. When two enteries about same data do not agree, the database is said to be ________.
a) Inconsistent
b) Unsecured
c) Intended
d) Integrated
13. _______________ sorting smallest key is taken again and again in unsorted array.
a) Insertion
b) Selection
c) Bubble
d) Heap
14. TCP connection is available at port _____________ on HTTP.
a) 80
b) 60
c) 70
d) 92
15. Which gate does the following circuit represent?
a) OR
b) AND
c) XOR
d) NAND
16. ___________ function gives the total number of rows in a table.
a) Variance
b) Max
c) Sum
d) Count
17. What is an operating System?
a) Application software
b) Utility program
c) Program Development tool
d) System software
18. What is the last column of a worksheet?
a) AV
b) IV
c) VI
d) VA
19. Encapsulation is a way to implement ____________.,
a) Inheritance
b) Polymorphism
c) Data abstraction
d) Overloading
20. A CPU’s processing power is measured in ______________.
a) IPS
b) CIPS
c) MIPS
d) Nanosecond
21. Macros are run or executed from ____________ menu.
a) Tools
b) Insert
c) Format
d) Data
22. In _____________ insertion & deletion takes place only at top.
a) Queue
b) Sorting
c) Link List
d) Stack
23. A numbered list can be created by
a) <ul>
b) <list>
c) <li>
d) <ol>
24. If every ‘non-key’ attribute is functionally dependent on primary “key”, then the relation is in
a) 3 NF
b) 2 NF
c) 4 NF
d) BCNF
25. Microprocessor based computers started in ______________ generations.
a) 1st
b) 2nd
c) 3rd
d) 4th
26. ____________ is a Universal gate
a) AND
b) NOT
c) NOR
d) XOR
27. In SQL decimal data type, _________indicates the number of significant digits the number is to have.
a) Precision
b) Scale
c) Float
d) None
28. The number of attributes in a relation is called _______________.
a) Degree
b) Domain
c) Cardinality
d) String
29. _____________ is not a type of formatting in MS-Word.
a) Character
b) Paragraph
c) Document
d) Line
30. _____________ command gives virtual table with no data, but can be operated like any other table.
a) SELECT
b) CREATE
c) CREATE VIEW
d) None of these

HTET PGT Computer Science Solved Paper (Part II)


31. ____________ tag is used for adding comments.
a) ! – -
b) //
c) – -!
d) * *
32. A _____________ operates at the highest layer of network abstraction.
a) Gateway
b) Repeater
c) Router
d) Bridge
33. A GUI is a ___________
a) Hardware
b) Language interpreter
c) Software interface
d) Operating system
A Graphical User Interface (GUI) is a human-computer interface (i.e., a way for humans to interact with
computers) that uses windows, icons and menus and which can be manipulated by a mouse (and often
to a limited extent by a keyboard as well).
34. In CREATE TABLE SQL command, each table must have atleast ___________ column.
a) 0
b) 2
c) 3
d) 1
35. ____________ function is used to read string.
a) getch( )
b) getc( )
c) getstr( )
d) gets( )
36. The requested files used by web are stored in ________________ memory.
a) RAM
b) ROM
c) Cache
d) None of these
37. ___________ generation of computers was rhe first to store instruction in their own memory.
a) 2nd
b) 3rd
c) 4th
d) 5th
38. ______________ document acts as a contract between the developer and the customer.
a) SDD
b) DFD
c) SRS
d) None of these
SRS = A Software Requirements Specification (SRS) is a comprehensive description of the intended
purpose and environment for software under development.
39. ______________ is a collection of data sent as a single message.
a) Datagram
b) Protocol
c) Switch
d) None of these
40. ____________command is used to move to a particular page number in a file.
a) Move
b) Go
c) Go to
d) Move to
41. Which feature help to insert the contents of clipboard as text without any formatting?
a) Paste special
b) Format painter
c) Page set up
d) Style
42. The multiple use of input or output operators in one statement is called ___________.
a) Overriding
b) Overloading
c) Cascading
d) None of these
43. When a function is defined inside a class, it is called ____________.
a) Inside function
b) Inline function
c) Class function
d) None of these
44. The problem of variable delay in video conferencing is removed using _____________.
a) Packet filter
b) Timestamp
c) Gateway
d) None of these
45. The ability to modify the data structure and not have to change the program using data is called:
a) Data Independence
b) Data dictionary
c) Data integrity
d) Refrential integrity
46. Decimal Conversion of (11A.62)16 gives ___________.
a) (182.282)10
b) (202.382)10
c) (182.382)10
d) (282.382)10
47. _________ is a pool of values from which the actual values appearing in a given column are drawn.
a) String
b) Domain
c) Cardinality
d) Degree
48. What function display row data in a column & column data in row?
a) Hyperlink
b) Index
c) Row invert
d) Transpose
49. ______________ is a file that contains data about data.
a) Object
b) Database
c) Data dictionary
d) None
50. FTP is a ____________ layer mechanism of TCP/IP.
a) Application
b) Physical
c) Data link
d) Network
51. To introduce special effects in a slide show ___________ is used.
a) Overheads
b) Letters
c) Slide transition
d) Slide animation
52. The size of 1-D array with UB as upperbound and LB as lowerbound is given by _________.
a) Array size (length) = UB – LB + 1
b) Array size (length) = UB - LB
c) Array size (length) = UB + LB - 1
d) Array size (length) = UB - LB - 1
53. A _____________ is a set of rules that are applicable for a network.
a) Data
b) Protocol
c) Message
d) Receiver
54. ____________ refer to names of variable, function, array and Class created by the programmer.
a) Identifier
b) Keyword
c) Constraint
d) String
55. Two similar structures can have only _____________ assignments.
a) ==
b) =
d) !=
d) =!
= is the assignment operator.
== is the equality operator. it returns true if the left side is equal to the right side, and returns false if they are not equal.
56. _____________ generations of computers started the use of operating systems.
a) 1st
b) 2nd
c) 3rd
d) 4th
57. When a user does not enter a value for a column, a value is automatically inserted in the field
using _______________ constraint.
a) Unique
b) Primary
c) Check
d) Default
58. _____________ is an exit-controlled loop.
a) do-while
b) while-do
c) for
d) if then
59. Which of the following characters is used as punctuator?
a) #
b) <
c) %
d) ++
60. ______________ keyword eliminates duplicate rows from the results of SELECT statement.
a) ORDER BY
b) DISTINCT
c) ALL
d) WHERE

2 comments:

Powered by Blogger.