UP Police Programmer Grade–2 2013 Question Paper Solve Part 4 (With Explanation)
Автор: Nivransh Chaudhary
Загружено: 2026-01-20
Просмотров: 26
Описание:
इस वीडियो में UP Police Programmer Grade–2 परीक्षा 2013 के प्रश्नपत्र (Part-4) को पूरी तरह हल (Solved) किया गया है।
यह कंटेंट विशेष रूप से उन अभ्यर्थियों के लिए उपयोगी है जो
UP Police Programmer, UPPSC Programmer, Computer Instructor और अन्य Computer आधारित प्रतियोगी परीक्षाओं की तैयारी कर रहे हैं।
UP Police Programmer Grade 2
UP Police Programmer 2013 Question Paper
Programmer Grade 2 Solved Paper
UP Programmer PYQ
Computer Questions with Explanation
UP Police Computer Exam Preparation
This video is very helpful for candidates preparing for:
Government Jobs
UP Police Programmer
Computer Competitive Exams
🔍 Topics Covered:
Computer Fundamentals
Operating System
DBMS
Computer Networking
Programming Basics
MCQs with Detailed Explanation
#UPPoliceProgrammer
#ProgrammerGrade2
#UPPolice2013
#ComputerPYQ
#GovernmentJob
#ComputerCompetitiveExam
#UPPoliceExam
#ProgrammerExam
#ComputerMCQ
#StudyWithNivransh
What will be the Output of following Javascript
script language=“Javascript”
javascript:function x(){
x=4+“4”;
document.write(x);
} x ( ) ;
script
(A) 44 (B) 8
(C) 4 (D) Error output
The last address of IP address represents
(A) Broadcast address (Correct)(B) Network address
(C) Unicast address (D) None of the above
What is the output produced by the following code ?
int a = 4; int b = a; int c = b;
a = a + 1; b = b + 2; c = c + 3;
b = a; a = b;
System.out.println(“a: ’’ + a + “ b: ’’ + b + “ c: ’’ + c);
(A) a : 5 b : 5 c : 7 (B) a : 5 b : 5 c : 5
(C) a : 7 b : 7 c : 7 (D) a : 6 b : 5 c : 7
_________ OSI Model layer best describes the data integrity service.
(A) Physical (B) Transport (Correct) (C) Session (D) Presentation
Self referential structures are used to implement
(A) Call by value mechanism (B) Call by reference mechanism
(C) Recursion (D) Linked lists
Consider a circular queue of size 4. What is the position of front and rear after the following
operations ?
Insert four elements A, B, C, D one after the other.
Delete element A and B and then insert element E.
(A) Front =0,rear=3(0 indicates first position) (B) Front =0,rear=4
(C) Front =1,rear=3 (D) Front =2,rear=0
In TCP, the path
(A) up to destination is allocated before the transmission of message begins
(B) up to next intermediate node is allocated before the transmission of message begins
(C) to be followed depends on the length of message
(D) none of the above
What is the output of the following code ?
String [ ] s = new String[ 3 ];
s [ 0 ] = new String(“zero”);
s [ 1 ] = new String(“one”);
s [ 2 ] = new String(“two”);
s [ 1 ] = s [ 2 ];
s [ 0 ] = s [ 1 ];
s [ 2 ] = s [ 0 ];
for(int i = 0; i s.length; i++) {
System.out.print(s[i] + “ ’’);
}
(A) zero one two (B) one two zero (C) two two two (D) two one zero
Encryption and decryption are functions of the _________ layer.
(A) Transport (B) Session
(C) Application (D) Presentation
A constructor
i) must have the same name as the class it is declared within
ii) is used to initialize objects
iii) may be declared private
(A) i), ii) & iii) are true (B) i) & ii) are true
(C) i) is true (D) all are false
What does the “sticky bit” do ?
(A) It prevents files from being deleted by anyone
(B) It marks files for deletion
(C) It prevents files from being deleted by nonowners except root
(D) It prevents files from being deleted by nonowners including root
__________ data communication method is used to transmit the data over a serial
communication link.
(A) Half-duplex (B) Full-duplex
(C) Both (A) and (B) (Correct) (D) None of the above
The value of a variable is retained across the function calls in ________ storage class.
(A) auto (B) static (C) register (D) It is not possible
Loss of data integrity means that the
(A) Data and system cannot be accessed by the users
(B) Invalid and corrupted data has been granted
(C) Loss of protecting or maintaining secrecy over critical data of the organization
(D) Loss of protecting data from individuals
What will be the output of the following code segment ?
int fn (int a [ ] , int n, int target) {
if (n 0)
return -1;
else if (target == a[n])
return n;
return fn(a, n-1, target);
}
main ( ) {
int a [ 10 ] = {85, 4, 23, 57, 10, 24, 81, 78, 92, 16} ;
printf (“%d”, fn (a, 10, 92)) ;
}
(A) –1 (B) 7 (C) 8 (D) 9
Which of the statement(s) in the following code segment will result in a syntax error ?
char a [ ] = “this”, b [ ] = “this”; // Line 1
while (*a != ‘ \0’ && *b != ‘\0’) { // Line 2
if (*a != *b) // Line 3
printf(“Not same”); // Line 4
++a ; // Line 5
++b ; // Line 6
}
if (*a == ‘\0’ && *b == ‘\0’) // Line 7
printf(“Same”); // Line 8
(A) All the lines (B) Line 1, Line 2 and Line 3
(C) Line 5 only (D) Line 5 and Line 6
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: