14
Sample Question Computer Science Q-No. Question Option A Option B Option C Option D Answer 1 A model of information retrieval in which we can pose any query in which search terms are combined with the operators AND, OR, and NOT Ad Hoc Retrieval Ranked Retrieval Model Boolean Information Model Proximity Query Model Boolean Information Model 2 A large repository of documents in IR is called as: Corpus Database Dictionary Collection Database 3 Permuterm indices are used for solving: Boolean queries Phrase queries Wildcard queries None Wildcard queries 4 Boolean retrieval model does not provide provision for: Ranked search Proximity search Phrase search Both proximity and ranked search Both proximity and ranked search 5 A data structure that maps terms back to the parts of a document in which they occur is called an Postings list Incidence Matrix Dictionary Inverted Index Inverted Index Sr. No. Question Option A Option B Option C Option D Answer 1 Wireless sensor networks are also known as_____ Processing subsystem Communicati on Subsystem Sensor Subsystem Distributed Network Distributed Network 2 A Life of sensor node depends on ___. Design Battery Life Data processing Software Battery Life 3 is one of the characteristic of WSN Processing subsystem Design Scalability Sensor Scalability 4 In WSN, Physical connectivity is supported over wireless radio link of_______. Topology Connectivity Sensor Subsystem One or multiple hops One or multiple hops 5 BS stands for : Basic system Battery Sensor Base Station Base Node Base Station Sr. No. Question Option A Option B Option C Option D Answer 1 Which of the following is a countermeasure for a buffer overflow attack? Filter user input Encryption Firewall Use of web forms Filter user input 2 Entering Password::blah’ or 1=1- into a web form in order to get a password is an example of what type of attack? Buffer overflow Heap-based overflow SQL injection Stack-based overflow SQL injection 3 What is the first step in a SQL injection attack? Enter arbitrary commands at a user prompt. Locate a user input field on a web page. Locate the return pointer. Enter a series of NOPs. Locate a user input field on a web page. 4 A type of malicious attack that usually comes from a single source and ties up a server with a flood of requests preventing legitimate users from being able to access the server. SQL injection CIA Triad Denial-of- Service (DoS) Social Engineering Denial-of- Service (DoS) 5 A weakness or gap in an IT security that could potentially be exploited by threats to attack or open access for unauthorized users to the system or data. Integrity Vulnerability Availability Confidentialit y Vulnerability Information Retrival (IR) WSN EH

Sample Question Computer Science Information Retrival (IR)devkibacollege.com/news_doc_file/SampleQuestion_Science.pdfDesign Battery Life Data processing Software Battery Life 3 is

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

  • Sample Question Computer Science

    Q-No. QuestionOption

    A

    Option

    B

    Option

    C

    Option

    DAnswer

    1

    A model of information retrieval in which we can pose

    any query in which search terms are combined with the

    operators AND, OR, and NOT

    Ad Hoc

    Retrieval

    Ranked

    Retrieval

    Model

    Boolean

    Information

    Model

    Proximity

    Query Model

    Boolean

    Information

    Model

    2 A large repository of documents in IR is called as: Corpus Database Dictionary Collection Database

    3 Permuterm indices are used for solving:Boolean

    queriesPhrase queries

    Wildcard

    queriesNone

    Wildcard

    queries

    4Boolean retrieval model does not provide provision

    for:

    Ranked

    search

    Proximity

    searchPhrase search

    Both

    proximity

    and ranked

    search

    Both

    proximity and

    ranked search

    5A data structure that maps terms back to the parts of a

    document in which they occur is called anPostings list

    Incidence

    MatrixDictionary

    Inverted

    Index

    Inverted

    Index

    Sr. No. Question Option A Option B Option C Option D Answer

    1 Wireless sensor networks are also known as_____Processing

    subsystem

    Communicati

    on Subsystem

    Sensor

    Subsystem

    Distributed

    Network

    Distributed

    Network

    2 A Life of sensor node depends on ___. Design Battery LifeData

    processingSoftware Battery Life

    3 is one of the characteristic of WSN Processing

    subsystemDesign Scalability Sensor Scalability

    4In WSN, Physical connectivity is supported over

    wireless radio link of_______.Topology Connectivity

    Sensor

    Subsystem

    One or

    multiple hops

    One or

    multiple hops

    5 BS stands for : Basic systemBattery

    SensorBase Station Base Node Base Station

    Sr. No. Question Option A Option B Option C Option D Answer

    1Which of the following is a countermeasure for a

    buffer overflow attack?

    Filter user

    inputEncryption Firewall

    Use of web

    forms

    Filter user

    input

    2

    Entering Password::blah’ or 1=1- into a web form in

    order to get a password is an example of what type of

    attack?

    Buffer

    overflow

    Heap-based

    overflowSQL injection

    Stack-based

    overflowSQL injection

    3 What is the first step in a SQL injection attack?

    Enter

    arbitrary

    commands at

    a user prompt.

    Locate a user

    input field on

    a web page.

    Locate the

    return pointer.

    Enter a series

    of NOPs.

    Locate a user

    input field on

    a web page.

    4

    A type of malicious attack that usually comes from a

    single source and ties up a server with a flood of

    requests preventing legitimate users from being able to

    access the server.

    SQL injection CIA TriadDenial-of-

    Service (DoS)

    Social

    Engineering

    Denial-of-

    Service (DoS)

    5

    A weakness or gap in an IT security that could

    potentially be exploited by threats to attack or open

    access for unauthorized users to the system or data.

    Integrity Vulnerability AvailabilityConfidentialit

    yVulnerability

    Information Retrival (IR)

    WSN

    EH

  • Sample Question Computer Science

    Sr. No. Question Option A Option B Option C Option D Answer

    1 The Expansion of PDF is ______ in uniform PFD?

    Post

    Derivation

    Function

    Portable

    Document

    Format

    Probability

    Density

    Function

    Previously

    Derive

    Function

    Probability

    Density

    Function

    2 Image segmentation is also based on morphology set theory extraction recognition morphology

    3 Image whose principle features are edges is called Orthogonal Isolated Edge Map Edge Normal Edge Map

    4 Lines in an image can be oriented at angle 0 230 30 50 0

    5 Locating the center of thick edges we use Discontinuityconstant

    intensitiescontinuity zero crossing zero crossing

    Sr. No. Question Option A Option B Option C Option D Answer

    1The collection ,Preservation,analysis and presentation

    of computer related evidence is called_______.

    Cyber

    Forensic

    Computer

    ForensicIntigrity

    Steganograph

    yComputer Forensic

    2The data hiding techniques are

    includes__________________.

    Encryption &

    Steganograph

    y

    Decryption &

    Steganograph

    y

    Detective

    workHiding data Encyption & Steganography

    3 Computer Forensic provide the service. Data recovery messages SecurityAuthenticatio

    nAuthentication

    4In which phase data are identify and extract the

    pertinent information ,using proper forensic tool.Collection Examination anaylsis Reporting Examination

    5In which phase the result of the examination phase are

    analyzed,using proper forensic tool.Collection Examination anaylsis Reporting Analysis

    DIP

    CF

  • Sr No. QUESTIONS OPTION 1 OPTION2 OPTION3 OPTION4

    (PAPER 2) 1 During E2 elimination reaction C1 and C2 changes from sp3 to wht type of hybridization? sp sp2d sp3 sp2

    2

    HOOC-CH2-CH(NH2)-COOH is the structure of____________.

    glutamic acid histidine glycine aspartic acid

    3

    A rearrangement of α-haloketones in presence of a basic catalyst to give a carboxylic acid or

    acid derivatives like ester or amide is called ? Beckmann rearrangement Favorski rearrangement Hoffmann rearrangement pinacol-pinacolone rearrangement

    4 D-Glucose and L-Glucose are example of which of the following? enantiomers diastereomers epimers anomers

    5

    Tetra methyl silane has how many equivalent proton, that makes it a good solvent in PNR

    spectroscopy? 3 6 9 12

    6 Complete the reaction. ? cis 1,3-dimethyl cyclohexane cis 1,2-dimethyl cyclohexene cis 1,2-dimethyl cyclohexane cis 1,3-dimethyl cyclohexene

    (PAPER2) 7 Colour of complex is better explained by...................... Crystal field theory valence bond theory Molecular orbital theory Ligand orbital theory

    8 Chelate is a ____ compound Ring Straight chain Branched Cross- linked

    9 Hyperfine splitting is mainly due to the interaction of __________.

    Paired electron spin with unpaired

    electron spin

    Nuclear spin of ligand with paired

    electron spin

    Unpaired electron spin with the nuclear

    spin of the ligand Only Nuclear spin

    10 The ground state term symbol for Ti3+ ion is____ 2d 3d 4f 3s

    11 In methylene insertion________ is used as a route to from a organometallic compound? THF electronegative element. diazomethane Wilkinson’s Catalyst

    12 A mineral is called ore, if ____________ A metal can be extracted from it.

    A metal can be extracted profitably

    from it A metal cannot be extracted from it. It contains metal

    13 Disease caused by high level of cobalt in blood____ Anemia Hemochromatosis Hemosiderosis Polycythemia

    14 Copper matte contains _______ sulphides of copper and iron Sulphates of copper and iron oxides of copper and iron carbonates of copper and iron

    15 Carboxypeptides contains _______ Zn (II) and hydrolysis CO2 Zn (II) and hydrolysis peptide bonds Mg (II) and hydrolysis peptide bonds Mg (II) and hydrolysis CO2

    16 The structure of XeO2F4 is ________ trigonal bipyramidal tetrahedral octahedral Square Planar

    17 The IUPAC name of Wilkinson's catalyst is?

    Chlorotris (triphenylphosphine) rhodium

    (I).

    Chlorotris (tetraphenylphosphine)

    rhodium (II).

    Chlorotris (triphenylphosphine) rhodium

    (II). Chlorotris (triphenylphosphine) rhodium (III).

    18 Higher the value of ∆o _____ greater extent of overlapping lesser extent of overlapping lesser the interaction of metal and ligand greater interaction amongst metal d- orbitals

    19 molecular orbital theory is effective in _____ Ionic bonding & Covalent bonding

    Ionic bonding & CoordinateCovalent

    bonding Ionic bonding & Hydrogen bonding Hydrogen bonding & Covalent bonding

    20 How many orbitals of metal are suitable for sigma bonding ? 6 9 10 8

    21 The complex with configuration of d4 is Co2+ Ni3+ Cr2+ Cu2+

    (PAPER1) 22 In polagraphic estimation unit of diffusion current is _______ A mA µA nA

    23 Minimum current in the polarographic curve is known as ________- Rising Current Resting Current Required Current Residual Current

    (PAPER 4) 24 Charge of an electron is ________ C. 1.602 x 10-19 1.602 x 10-20 1.602 x 10-21 1.602 x 10-22

    25 NMR Spectroscoy is abbreviation of ________ nuclear magnetic resonance natural magnetic resonance nuclear magnetic ratio nuclear mutual resonance

  • Dept: Mathematics. Subject: Paper I – Basic Complex Analysis – Sem VI Subject Code: USMT601 Sample Questions.

    Choose correct alternative in each of the following (10)

    1 lim𝑧 →0

    𝐼𝑚(𝑧)

    𝑧

    (a) 1 (b) i

    (c) – i (d) does not exist

    2 f(z) = 𝑧2+1

    𝑧3+ 9

    (a) 𝑓 is not continuously only at 0 (b) 𝑓 is continuous on ℂ

    (c) Neither continuous nor bounded in

    |𝑧|≤2 (d) Continuous and bounded everywhere

    3 F = (1−𝑖)23

    ( 3− 𝑖)13

    (a) 2− 3

    2 𝑒5𝑖𝜋

    12 (b) 𝑒5𝑖𝜋

    12

    (c) 2− 3

    2 (d) None of the above

    4 𝐹(𝑧)=𝑥3+3𝑥𝑦2+𝑖(𝑦3+3𝑥2𝑦) is analytic

    (a) only at 1,𝑖. (b) only at 0 .

    (c) only at 0,1,𝑖. (d) nowhere on *

    5 The image of a line under a fractional linear transformation is

    (a) a line (b) a circle

    (c) a line or a circle . (d) None of these

  • Dept: Mathematics. Subject: Paper II – Algebra – Sem VI Subject Code: USMT602 Sample Questions.

    Choose correct alternative in each of the following (10)

    1 If R is a ring and a, b are zero divisors in R, then

    (a) a + b is always a zero divisor (b) a + b is not a unit in R.

    (c) a + b may not be a zero divisor (d) None of these

    2 The number of ring homomorphisms from 𝑄 to itself is

    (a) 1 (b) 2

    (c) infinitely many (d) None of these

    3 The number of ring homomorphisms from 𝑍 to 𝑍 are

    (a) one (b) zero

    (c) two (d) infinitely many.

    4 Let H be a normal subgroup of a finite group G. If |H| = 2 and G has an element of order 3 then

    (a) G has a cyclic subgroup of order 6. (b) G has a non-abelian subgroup of order 6.

    (c) G has subgroup of order 4. (d) None of these

    5 Let G be a group of order 30. If Z(G) has order 5, then

    (a) 𝐺𝑍 𝐺

    is cyclic. (b) 𝐺

    𝑍 𝐺 is

    (c) abelian but not cyclic. (d) None of these

  • Dept: - Mathematics

    Sample:- Questions.

    Sem:VI

    Paper: Topology of metric space and real analysis. Subject code: - USMT 603.

    Dept: - Mathematics

    Choose correct alternative in each of the following (10)

    1 In ℝ2 with Euclidean metric, which of the following set is convex? (a) { 𝑥, 𝑦 ∈ ℝ2 ∶ 𝑥2 + 𝑦2 = 4} (b) { 𝑥, 𝑦 ∈ ℝ2 ∶ 𝑦 > 0 , 𝑦 < −1} (c) { 𝑥, 𝑦 ∈ ℝ2 ∶ 𝑥𝑦 = 0} (d) { 𝑥, 𝑦 ∈ ℝ2 ∶ 𝑥2 − 𝑦2 = 4} 2 If 𝐴 is connected subset of usual metric space (𝑋, 𝑑) then

    (a) 𝐴° and 𝜕𝐴 are connected (b)

    𝐴°may not be connected but 𝜕𝐴 is connected

    (c)

    𝐴°is connected but 𝜕𝐴 may not be connected

    (d)

    Both 𝐴° and 𝜕𝐴 may not be connected

    3 Let d be the usual distance in R. For any A ⊆ R, dA : R → R is defined by dA(x) = inf{d(x, a) : a ∈ A}. Then

    (a)

    χAiscontinuousonRifandonlyifAisano

    pensubsetofR (b)

    χAiscontinuousonRifandonlyifAisaclosedsu

    bsetofR

    (c) χAiscontinuousonRifandonlyifA=∅

    or A =R (d)

    χAiscontinuousonRifandonlyifA=𝜃 or A

    =R

    4 Consider the followingmaps:

    (i) f:R→Rsuchthatfisdifferentiableand|fJ(x)|≤M∀x∈R.

    (ii) A linear transformation T :Rn →Rm.

    (iii) Amapf:R→R satisfyingLipchitzconditionnamely∃M≥

    0suchthat|f(x)−f(y)|≤M|x−y| ∀ x, y ∈R.

    (a) i) and (iii) are uniformlycontinuous

    (b) (i), (ii) and (iii) are uniformlycontinuous.

    (c) only (iii) is uniformlycontinuous.

    (d) only (i) is uniformlycontinuous.

    4 (10) Let {fn}be a sequence of real valued functions on a set S converging

    uniformly to a function f . Then the following statement is nottrue.

    (a) Each fnis bounded on S ⇒ f is

    bounded onS. (b)

    Each fnis differential on S ⇒ fis

    differentiable on S

    (c) Each fnis continuous on S ⇒ f is

    continuous onS. (d) Each fnis integrable on S ⇒ f is

    integrable onS.

  • Sample Questions.

    Sem:VI

    Paper: Numerical Analysis Subject code: - USMT 6A4.

    Choose correct alternative in each of the following (10)

    1 The Lagrange’s quadratic interpolating polynomial obtained in two different ways

    (a) Are not identical at all (b)

    May be different in form but are identical otherwise

    (c) Always in the same form (d) Always different in the same form

    2 To find the derivative for the start value (lies between) of the table ______ formula is used.

    (a) Newton Forward Interpolation Formula (b) Newton Backward Interpolation Formula

    (c)

    Newton Forward Difference Formula (d)

    Newton Backward Difference Formula

    3 If f(1)=5, f(2)=7, f(3)=8, then

    (a) ∆𝑓 2 = 1, ∇ 𝑓 2 = 2 𝑎𝑛𝑑 𝐸𝑓 2 = 8 (b) ∆𝑓 2 = 2, ∇ 𝑓 2 = 1 𝑎𝑛𝑑 𝐸𝑓 2 = 8 (c) ∆𝑓 2 = 1, ∇ 𝑓 2 = 1 𝑎𝑛𝑑 𝐸𝑓 2 = 3 (d) ∆𝑓 2 = 5, ∇ 𝑓 2 = 7𝑎𝑛𝑑 𝐸𝑓 2 = 3 4 Given the following values of f(x) = log x

    X 2.0 2.2 2.6

    f(x) 0.6915 0.78846 0.95551

    error on upper bound for 𝑓 ′′ (2.0) using quadratic interpolation is…. (a) 0.0704 (b) 0.704

    (c) 0.007 (d) 0.005

    5 The Error value of 𝑑𝑥

    1+𝑥

    1

    0 by Trapezoidal rule is ….

    (a) 0.5685 (b) 0.6931

    (c) 0.75 (d) 0.65

  • sr.no. Questions OPTION A OPTION B OPTION C OPTION D

    1 Petromyzon is commonly known as ___________ Lamprey Salpa Agnatha Eurypterids

    2 Class ___________ includes living jawless fishes inhabiting seas and

    large rivers. Brachiostoma Larvaceae Osteacodermi Cyclostomata

    3 Protosome like annelids are animalsin which mouth arises from or near

    ____________ Pore Blastopore Outerpore Mesopore

    4 _____________ are the most diverse and largest of animal phyla. Chordates Acoelomate Coelomate Nonchordate

    5 Regeneration power in Chordates is usually ____________ Poor Very poor Strong Very strong

    6 Chordates are____________ coelomate animals. TRUE Pseudo Partial Diplo

    7 Proteomics refers to the study of __________.

    Set of proteins in a specific region of

    the cell Biomolecules Set of proteins Set of lipids

    8 Melatonin hormone secreted by ________gland.

    Set of proteins in a specific region of

    the cell Pineal Parathyroid Thymus

    9 Exopthalmicgoiter discovered by________ Starling jhonson Robert grave Addison B. Watson Hook

    10 The non-protein part of an enzyme is known as_____ Prosthetic group Active site Apoenzyme Holoenzyme

    11 Daniel koshland proposed______ Lock and key

    model Induced fit Model Burk plot Vmax and Kcat

    12 What do you mean by sterilization? Purification of

    products Recovery of

    products Elimination of contamination

    Formulation of media

    T.Y.B.Sc- Zoology Sample Paper MCQs ,SEM-6

  • 13 How long does it take for the autoclave to complete its cycle? 30-35 minutes 50 min to 1 hr 15-20 minutes 10-15 minutes

    14 Name the type of mutation in which the cause of mutation is not

    known? Spontaneous

    mutation Suppressor mutation

    Nonsense mutation

    Mis-sense mutation

    15 Insertion mutation is also knowns as ___________ Somatic mutation Chromosomal

    mutation Addition mutation Substitutional

    mutation

    16 Size of Pbr322 is _______ 100 kbp 200 kbp 329 kbp 4362 kbp

    17 Which of the following enzyme is responsible for making a DNA copy

    from RNA? Reverse

    transcriptase DNA polymerase RNA pol I RNA pol II

    18 The most common example of point mutation is found in a disease

    called_______________ Down’s syndrome sickle cell anaemia thalassaemia Night blindness

    19 __________________ is capacity to do work. Ability Energy Purpose Immunity

    20 Natural gas is a_________________ Fossil fuel Energy Toxic material Component

    21 Tarapur,Kota,Kalapakam and Naroura are____________ Power plant Nuclear power

    plant Electronic plant Energy Plant

    22 _________ is a process for converting oil to usable biodiesel. Esterification Solidification Transesterification Methylation

    23 Our planet is___% Water. 100% 70% 20% 40%

    24 _________ is phenomenon of increasing average air temperature near

    surface of earth over past 1 to 2 Centuries. Disaster Natural Disaster Acid rain Global warming

    25 Carcinogenic Waste causes_____________ Cancer Explosion Radiation Diabetes

  • With a JFET, a ratio of output current change against an input voltage change is called as ………..

    (a) transconductance

    (b) siemens

    (c) resistivity

    (d) gain

    A certain D-MOSFET is biased at VGS = 0V. Its data sheet specifies IDSS = 20 mA and VGS (off) = -5 V. The value of the drain current is _________

    (a) 20 mA

    (b) 0 mA

    (c) 40 mA

    (d) 10 mA

    If short circuit output current of OPAMP is 0.5 mA and β of the transistor is 100. What is the maximum current available with a voltage –controlled current source circuit?

    (a) 0.5mA

    (b) 5 mA

    (c) 50 mV

    (d) 50 mA

    A lag circuit has a phase angle that is ------

    (a) between 0 and +900

    (b) greater than 900

    (c) between 0 to – 900

    (d) the same as input voltage

    What is the function of the comparators in the 555 timer circuit?

    (a) to compare the output voltages to the internal voltage divider

    (b) to compare the input voltages to the internal voltage divider

    (c) to compare the output voltages to the external voltage divider

    (d) to compare the input voltages to the external voltage divider

    Speed of __________ is the appropriate limiting reference speed

    (a) Sound

    (b) Air

    (c) Light

    (d) Water

    On the surface of the Earth , do you think that a laboratory frame is really an inertial frame of reference?

    (a) Yes, as it is a Galilean frame.

    (b) No, because it is accelerated frame.

    (c) Yes, as it is independent of the Earth’s rotation on it’s axis

    (d) No, because it is accelerated due to the earth’s rotation on it’s axis and also revolution around the Sun.

    The optical device used in the Michelson-Morley experiment was ……..

    (a) Telescope

    (b) Plane Grating

    (c) Interferometer

    (d) Refracting glass prism

    A cube has a proper volume 1000cm3, What is the volume as determine by an observer who move at a velocity 0.8c relative to the cube in a direction parallel to one edge?

    (a) 600 cm3

    (b) 1000 cm3

    (c) 60 cm3

    (d) 6 cm3

    A rod of 1 meter long is moving along it’s length with a velocity 0.6c , then it’s length as it appears to an observer on the earth is……….

    (a) 0.8 m

    (b) 1 m

    (c) 0.08 m

    (d) 0.1 m

    The optical device used in the Michelson-Morley experiment was ……..

    (a) Telescope

    (b) Plane Grating

    (c) Interferometer

    (d) Refracting glass prism

    A central force is only function of

    (a) distance

    (b) velocity

    (c) acceleration

    (d) time

    Gravitational force is an example of

    (a) Fictitious force

    (b) Pseudoforce

    (c) Central force

    (d) Resistive force

    In case of Bounded Motion between two bodies, the distance between 2 interacting bodies _____

    (a) is infinite initially

    (b) always exceeds a finite limit

    (c) Never exceed a finite limit

    (d) Is infinite after interaction

    In case of unbounded Motion, distance between 2 interacting bodies is

    (a) infinite initially and finally

    (b) Always finite

    (c) Zero

    (d) Infinite initially but finite after collision.

    Angular Momentum about the origin of a particle moving under a central force is _____

    (a) Zero

    (b) Conserved

    (c) Varying

    (d) Function of position.

    Motion of a particle under central force is _____

    (a) 3 dimensional.

    (b) Translational

    (c) Planar

    (d) along a line

    The type of Motion (Bounded or Unbounded) can be predicted by the plot of __V_ v/s r. Here V is

    (a) Kinetic Energy

    (b) Effective Potential Energy

    (c) Total Energy

    (d) Potential energy

    A beta particle is also known as .

    (a) an electron.

    (b) a positron

    (c) a helium nucleus.

    (d) a photon.

    The isotope Cr–53 is produced by the beta decay of which of the following

    (a) 53Mn

    (b) 54Cr

    (c) 52Cr

    (d) 53V

    During the emission of a beta particle, the number of the element remains same.

    (a) Atomic

    (b) Mass

    (c) Charge

    (d) Neutron

    Range of Beta partical is the range of Alpha partical.

    (a) same as

    (b) less than

    (c) greater than

    (d) twice

    During the emission of a β- particle, number of the element increases by one unit.

    (a) Neutron

    (b) Mass

    (c) Charge

    (d) Atomic

    During the emission of a positron, number decreases by one unit.

    (a) Atomic

    (b) Neutron

    (c) Charge

    (d) Mass

    A certain radioactive nucleus emits a particle that leaves its mass unchanged, but increased its atomic number by one. The particle thus emitted is -- .

    (a) alpha partical.

    (b) Electron

    (c) gamma partical.

    (d) Positron

    9

    10

    11

    12

    1

    2

    3

    4

    5

    6

    25

    PHYSICS SAMPLE QUESTION SEM 6

    19

    20

    21

    22

    23

    24

    13

    14

    15

    16

    17

    18

    7

    8

  • Sr. No Question Option 1 Option 2 Option 3 Option 4

    1 Fir, Spruce, Deodar etc. are found in Temprate Montane Forests River Delta Tropical Dry Forests Alpine Forests2 Rhododendron and Birch are found in Moist Alpine Scrub Dry Alpine Scrub Tropical Dry Forests None of These3 GPS is defined as Global Positioning System General Positioning System Both None of These4 In which state of India Pitchavaram Mangrove Forest are found Tamilnadu Punjab Maharashtra Orissa5 A triose sugar is Glycerose Ribose Erythrose Fructose

    6 Fatty acids which contain only single bonds in their hydrocarbon chain known as Unsaturated fatty acids Saturated fatty acid Glycerol Cyclic fatty acid

    7 When both the recessive or the dominant alleles for two traits are on the same chromosome, it is called Cis Linkage Trans Linkage Cis trans Linkage Homologous

    8 Substitution Mutation involving the replacement of purine with pyrimidine or vice versa Transition Transversion Deletion mutation Substitution due to addition

    9 The naturally occurring form of amino acid in proteins L amino acids D amino acids only Both L & D amino acids Nucleic acid

    10 Fruit in Asclepiadaceae family is Nut Etaerio Capsule Follicles11 In which state of India Kannur Mangrove Forests are found Kerla Andhra Pradesh Maharashtra Rajasthan12 Glycosodic bond in Sucrose is α 1- 4 β 1-4 α 1- 2 β 1-2

    13 Genetic disorder that results from an inactivating mutation in the gene coding for the phenylalanine hydroxylase enzyme so unable to metabolize phenylalanine and convert it into tyrosine. Sickle cell anemia Phenylketonuria Albinism Tay - Sachs disease

    14 Which enzyme is used for the replication in case of Sanger’s method of sequencing? Polymerase I Smaller subunit polymerase I Polymerase III Larger subunit polymerase I

    15 The enzyme used in Maxam-Gilbert method for 32

    P labelling of the DNA at 3’end is Polynucleotide kinase Alkaline phosphatase Exonuclease Terminal nucleotidylTransferase

    16 The samples in Sanger’s method after reaction are separated using AGE PAGE PFGE 2-D gel electrophoresis

    17 Each record in a database is called an Entry File Record Ticket

    18 Symbiotic nitrogen-fixing cyanobacteria are not present in Azolla Gnetum Anthoceros Cycas

    19 The difference between the actual Y value and the predicted Y value found using a regression equation is called the slope residual outlier scatter plot

    20 Stigma in Cannaceae family is Basifixed Dorsifixed Oblique None21 Canna Indica belongs to the class Monocotydoneae Dicotyledoneae No Cotyledoneae None22 Which of the following is a fossil bryophyte? Riccia gangetica Naiadita Marchantia Funaria

    23 The bryophyte used as surgical pad is Funaria Sphagnum Polytrichum Pogonatum

    24 Name an edible bryophyte Polytrichum Funaria Marchentia Riccia

    25 Most economically important bryophyte is Marchantia Funaria Sphagnum Riccia

    Smt. Devkiba Mohansinhji Chauhan College of Commerce and Science

    University of Mumbai

    T. Y. B. Sc. Botany Semester VI Theory Examination, 2019-2020

    Sample Question Paper

    Total Marks: 50 Duration: 60mins.