Exam Details
Subject | ||
Paper | ||
Exam / Course | ||
Department | ||
Organization | Kerala Public Service Commission | |
Position | computer operator | |
Exam Date | 14, July, 2015 | |
City, State | kerala, |
Question Paper
132/2015
Maximum: 100 marks Time 1 hour and 15 minutes
1. For Intel Core i3 processor, GMCH is integrated with:
South Bridge GPU
North Bridge FCH
2. In order to perform a critical task in timeliness, a mUltimedia system may use which of the following disk scheduling?
SSTF SATF
Elevator Real Time
3. An omega switching network with n CPU and n memories requires how many switches?
(nlog2n)/2 log2
log2 n log2 n/2
4. The minimum pit length for a single layer DVD is
500 400
·600 250
5. A pipelining system with n segments takes 50 sub operations in a sequence. The time taken to complete a sub operation in each segment is 8 nsec. If the task is completed in 424 nsec, what is the value of
4
6. In multiprocessor system, a processor generated signal that serves to prevent other processors from using the system bus as long as the signal is active can be called as
Semaphore Pipe
Hardware Lock Critical Session
At the beginning of an instruction cycle, the content of the Instruction Register is 5 and that of Program Counter is 320. When the instruction is read, the address part of the instruction is the number 7. Then the effective address in relative address mode is
328 327
325 342'
A 3
[P.T.O.)
8. The return address from a subroutine call is arranged as
Round Robin FIFO
LIFO Queue
9. The Bootstrap Loader resides in
Hard Disk Any bootable device
RAM ROM
10. The IRQ commonly assigned to Hard Disk Controller is:
11 12
13 14
11. For DDR2 type RAM with 8 internal blocks and clock speed 533 MHz, the maximum average periodic refresh rate can be
4.5 7.8
33.3 17.5
12. An operating system written as a set of procedures in which, each can call any other without any reservation is
Virtual System Layered System
Distributed System Monolithic System
13. A program in execution state is called as
Shell Process
Task Thread
14. A situation in which a multiprogramming system spends more time in page I/O
Starvation Dead Lock
Fragmentation Thrashing
15. Calculate the average access time for the sector of a disk with 512 bytes per sector and 10 ms of average seek time. The disk rotates at a speed of 7200 rpm and transfers data at a rate 4 ME/Sec. The controller overhead is 1 ms. Assume that there is no service time
19.6 ms 16.2 ms
15.3 ms 10.3 ms
16. When a process wants to print a file, it writes the file name in a directory called:
Spooler Buffer
Daemon Log
132/2015 4 A
17. In a demand paging system, M is the time to access memory, F is the average time to service a page fault. P is the probability of page fault. Then the effective access time is
P • M • F M • F
• M P • F • P
18. Externally defined symbols are resolved by
Compiler Linker
Loader Lexical Analyser
19. The initial value of a semaphore that ensures only one of the many processes enter the critical session is
0 1
2
20. Debugging a kernel code is a difficult task, because of:
kernel code cannot be executed easily under a debugger
bugs in a kernel code cannot be traced easily, because it is a set of procedures related to a separate process and there will be a little evidence to track the errors
errors may be hard to reproduce and may collapse the entire system
all the above reasons
21. Which of the following HTML tag has an attribute called Frame?
<INPUT> <FORM>
<FRAMESET> <TABLE>
22. The HTML DOM Event that is triggered automatically when a user enters a web page is
OnLoad OnFocus
OnOpen OnShow
23. CORBA programmers can develop distributed applications in using:
Orbix OpalOrb
GlOP . EJB
24. XML captures Hypertext information using:
XLL
XLS DTD
25. In DHCP, the UDP port number for sending data to the server is
60 62
65 . 67
A 5 132/2015 [p.:r.O.]
26. Which of the following statement is false?
It is not possible to convert an HTML document into an XML document
Both XML and HTML are subset of SGML
A well formatted XML document need not require DTD
CSS works better with XML than with HTML
27; In a style sheet, the style rule from another CSS file can be loaded using:
@include @import
@attach @load
28. The easiest method for a Web Server program to store the client information in a web
I
browser for future use is
Applet Cookie
Template Log file
29. A form of address spoofing resulting in denial of service attack:
Session Hijacking Island Hopping
Sniffing War Dialing
30. Which of the following is a JavaScript debugging method?
window.alert console.log
document:write document.getElementById
31. Which of the following statement is false?
Samba can play a number of server roles such as File Server, Print Server, Primary Domain Controller etc.
Samba allows to share files with windows host
SWAT requires no web server running
SWAT interface cannot be directly accessed from web browser
32. Simplest way to pass data between two Linux programs running in a system is
Socket Pipe
Semaphore RPC
33. The Linux command that can be used to search for a pattern matching string in a file
find which
grep search
132/2015 6 A
34. In Redhat Linux, the powerful and secure method for network configuration is
NetBios Netstart
IPSec Apache
35. The file system that is the best choice for new installations of Linux is
NTFS EX2
EX4 JFS
36. In a Linux kernel, two mapping registers are simultaneously used as compatibly mapped buffers for CPU and peripherals. Then the DMA Mapping is
Consistent Mapping Mapping
Streaming Mapping Scatter Mapping
37. A format that can only archive a group related files into a single file and cannot perform any compression by itself:
rar bz2
tar gz
38. GNOME Display Manager can be configured by editing:
gdm.conf GNOMKconf
Xserver.conf . XDM.conf
39. The powerful online help system of Linux is
who man
more how
40. A Linux tool that can be used to create hard disk partitions only at the time of Linux installation:
fdisk cfdisk
Disk Mount DRUID
41. The average time required to perform a successful sequential search for an element in a array with n elements:
n/2
42. Each node in a tree has a value greater than all values in the left subtree and has a value less than all values in the right subtree. Then the tree is
Binary search tree Complete tree
Balanced tree Threaded tree
7 132/2015 [P.T.a.]
43. The sort method that switches the adjacent elements, if needed after comparison is
Heap sort Quick sort
Insertion sort Bubble sort
44. Minimum number of queues needed to implement the priority queue is
1 2
45. After a sequence of steps in an algorithm, a linked list reaches the following step,
START NULL
Then the situation is,
overflow underflow
initialisation saturation
46. The result of following expression in polish notation is 432+·84/
13 12
18 34
47. The data structure that can implement a recursive procedure is:
Tree Linked List
Queue Stack
48. For a sorted linked list of length the worst case time required to search a given element is
.O(n)
O(lOg2 O(log2 2n)
49. The characteristic of the elements that is maximum utilised in binary search is
Length of the list Number of elements in the list
Order of the list Highest value in the list
50. For a binary tree with nine nodes, the result of inorder traversal is DBA G E C H F 1. And that of postorder traversal is D B G E H I F C A Then the result of preorder traversal
IS
ABDCEGFHI AB DECFGHI
ADBCEFGHI ADBEFCGHI
132/2015 8 A
51. The communication device that uses spanning tree algorithm to avoid loops:
Router Gateway
Bridge Switch
52. Delaying an outgoing control frame in order to hook onto the next outgoing data frame is called:
Packet Sniffing Compounding
Optimal Routing Piggy Backing
53. Dijkstra's algorithm facilitates:
Multipathing Shortest Path Routing
Isolated Routing Centralised Routing
54. The OSI Layer in which the auto negation resides is
Physical Network
Transport Data Link
• 55. The transmission media that uses BNC connector is
Coaxial Cable UTP
.
STP Optical Fiber
56. The mode of communication used in a serial communication channel is
Simplex Half Duplex
Full Duplex Both and
57. The communication standard for a wireless network is specified by
802.11 802.21
802.8 802.12
58. The FDDI network is an example of:
Bus. Star
Ring Mesh
59. A standard protocol for packet switching is
POTS SMTP
PSTN X.25
A9 132/2015 [P.T.O.]
•
60. The number of bits in a MAC Address is
32 48
64 128
61. Which of the following is not a relational operator?
Difference Addition
Division Selection
62. In DBMS, the front end application performs:
Storage function Access control
Processing function All of the above
63. In a table, the among a set of values are represented by
Tuple Attribute
Entity Key
64. The Schema that provides a standard way of organising information into accessible parts:
logical physical
external storage level
65. The physical location of a database record is determined by a key transformation in
Index Random
Hash Pointer
66. Which of the following is not a set operator in SQL?
UNION UNION ALL
MINUS LIKE
67. Which one of the following is a procedural language?
Domain relational calculus System-R
Query language Relational algebra
68. A buffer that has been changed in database buffer memory, but not yet written to disk is
Swap space Latch
Redo Log Dirty Block
69. The timestamp ordering that makes no distinction between the Read and Write access so that only a single value is required for each granule is
Partial timestamp ordering Total timestamp ordering
Multi version timestamp ordering Optimal timestamp ordering
132/2015 10 A
70. The constraint specifying that account number must be in between 50000 and 80000 is a Integrity constraint Referential constraint Default constraint Key constraint
71. In a Java program, the length in pixel of a string can be. obtained using the method: stringwidth strlength length strwidth
72. Select the correct statement from the following: char p (char*)malloc(100); char p (malloc(100»; char (char) ma:lloc(lOO); char (char*)malloc(100);
73. The statement that is least preferred in C programs in general is Recursion Nesting of different type of loops Double pointer Unconditional Jump to a label
74. What will be the output offollowing program? #include<iostream.h> void main char *cp="computer"; cout«cp; jJuter nputer mputer quter
75. What will be the output of following program? #include<iostream.h> void main int cout«z; 15 17 .. 16 18 •
A 11 132/2015
[P.T.a.)
76. In order to get the MIME type of a file, a Servelt may use the methods defined in the interface:
servlet Info servlet container
Servlet Config servlet context
77. Java method that can be used to pause the current thread execution until and unless another thread completes its execution:
sleep yield
join CD) suspend
78. Which Java interface can be used to store objects using a key-value pair, avoiding duplicate values?
Java.util.Collection Java.util.Set
Java.util.List CD) Java.util.Map
79. Which of the following statementis false for programs?
Throw cannot be executed, from a function called from a try block
Unhandled throw results in an abnormal program termination
Throw is a keyword for newer versions of compiler CD) Catch block may be selected by matching data type with the value given in throw
80. .Which of the following data type be used along with switch statement for comparison, in
(int double
enum CD) struct
81. 67th can Golden plan for best film given for:
Goodbye to language The Wonders
Mister Turn CD) Winter Sleep
82. The 'Ring Spot Virus' is the most destructive disease of:
Papaya Banana
Mango CD) Coffee
83. The ratio of width of our National Flag to its length is
3:5 2:4
2:3 CD) 3:4
132/2015 12 A
1 _
84. Prime Minister Narendxa Modi sworn is as the: 16th Prime Minister 14th Prime Minister 15th Prime Minister 13th Prime Minister
85. The fourth Chief Minister of Kerala EMS R. Sankar Pattom Thanupillai A.K. Antony
86. Who is known as 'Indian Bismark? Kamaraj Sardar Vallabhai Patel Nehru Rajaji
87. Kerala Varma Pazhassi Raja was short to death in 1805, June 11 1805, October 30 1805, July 7 1805, November 30
88. Which of the following is a biography of the lady Mountbatten? Edwine Mountbatten Edwine Mountbatten life of her own Edwine Mountbatten -Her relationship with Nehru Mountbatten
89. Durant Cup is associated with: Volley ball Cricket Foot ball Hockey
90. National Maritime day follows on April5 October 5 93) June 5 September 5
91. The temple entry proclamation of Sree Chithira Thirunal was in the year: 1933 1935 1934 1936
92. The ozone layer restricts: Visible light Ultraviolet radiation Infrared radiation X-rays and Gamma rays
A 13 132/2015 [P.T.a.)
93. Each year World Red Cross and Red Crescent day is
May28 .
May 8
March 20
January 10
94. The proposed Ken-Betwa river linking project is in which state?
Odisha
Maharashtra
Madhya Pradesh
Gujar.at
95. The uprising of 1857 was described as the first war of Indian Independence by
E.G. Tilak V.D. Savarkar
S.N. Sen R.C. Majumdar
96. The title of 'Viceroy' was added to the office of the Governor General ofIndia for the first time in:
1856
1848
1862
1858'
97. Who among the following belong to Moderates?
B.G. Tilak W.C. Banerjee
Lala Lajpat Rai Bipin Chandra Pal
98. Cripps Mission arrived in India in the year:
1947 1946
1942 1940
The Indian who attended all the Three Round Table Conference was:99.
Dr.B.R.Ambedkar Mahatma Gandhi
Muhammad Ali Jinnah Annie Besant
100. Who is the father of English poetry? Wordsworth
Milton
Chaucer
Charles Dickens
A
14
132/2015
Maximum: 100 marks Time 1 hour and 15 minutes
1. For Intel Core i3 processor, GMCH is integrated with:
South Bridge GPU
North Bridge FCH
2. In order to perform a critical task in timeliness, a mUltimedia system may use which of the following disk scheduling?
SSTF SATF
Elevator Real Time
3. An omega switching network with n CPU and n memories requires how many switches?
(nlog2n)/2 log2
log2 n log2 n/2
4. The minimum pit length for a single layer DVD is
500 400
·600 250
5. A pipelining system with n segments takes 50 sub operations in a sequence. The time taken to complete a sub operation in each segment is 8 nsec. If the task is completed in 424 nsec, what is the value of
4
6. In multiprocessor system, a processor generated signal that serves to prevent other processors from using the system bus as long as the signal is active can be called as
Semaphore Pipe
Hardware Lock Critical Session
At the beginning of an instruction cycle, the content of the Instruction Register is 5 and that of Program Counter is 320. When the instruction is read, the address part of the instruction is the number 7. Then the effective address in relative address mode is
328 327
325 342'
A 3
[P.T.O.)
8. The return address from a subroutine call is arranged as
Round Robin FIFO
LIFO Queue
9. The Bootstrap Loader resides in
Hard Disk Any bootable device
RAM ROM
10. The IRQ commonly assigned to Hard Disk Controller is:
11 12
13 14
11. For DDR2 type RAM with 8 internal blocks and clock speed 533 MHz, the maximum average periodic refresh rate can be
4.5 7.8
33.3 17.5
12. An operating system written as a set of procedures in which, each can call any other without any reservation is
Virtual System Layered System
Distributed System Monolithic System
13. A program in execution state is called as
Shell Process
Task Thread
14. A situation in which a multiprogramming system spends more time in page I/O
Starvation Dead Lock
Fragmentation Thrashing
15. Calculate the average access time for the sector of a disk with 512 bytes per sector and 10 ms of average seek time. The disk rotates at a speed of 7200 rpm and transfers data at a rate 4 ME/Sec. The controller overhead is 1 ms. Assume that there is no service time
19.6 ms 16.2 ms
15.3 ms 10.3 ms
16. When a process wants to print a file, it writes the file name in a directory called:
Spooler Buffer
Daemon Log
132/2015 4 A
17. In a demand paging system, M is the time to access memory, F is the average time to service a page fault. P is the probability of page fault. Then the effective access time is
P • M • F M • F
• M P • F • P
18. Externally defined symbols are resolved by
Compiler Linker
Loader Lexical Analyser
19. The initial value of a semaphore that ensures only one of the many processes enter the critical session is
0 1
2
20. Debugging a kernel code is a difficult task, because of:
kernel code cannot be executed easily under a debugger
bugs in a kernel code cannot be traced easily, because it is a set of procedures related to a separate process and there will be a little evidence to track the errors
errors may be hard to reproduce and may collapse the entire system
all the above reasons
21. Which of the following HTML tag has an attribute called Frame?
<INPUT> <FORM>
<FRAMESET> <TABLE>
22. The HTML DOM Event that is triggered automatically when a user enters a web page is
OnLoad OnFocus
OnOpen OnShow
23. CORBA programmers can develop distributed applications in using:
Orbix OpalOrb
GlOP . EJB
24. XML captures Hypertext information using:
XLL
XLS DTD
25. In DHCP, the UDP port number for sending data to the server is
60 62
65 . 67
A 5 132/2015 [p.:r.O.]
26. Which of the following statement is false?
It is not possible to convert an HTML document into an XML document
Both XML and HTML are subset of SGML
A well formatted XML document need not require DTD
CSS works better with XML than with HTML
27; In a style sheet, the style rule from another CSS file can be loaded using:
@include @import
@attach @load
28. The easiest method for a Web Server program to store the client information in a web
I
browser for future use is
Applet Cookie
Template Log file
29. A form of address spoofing resulting in denial of service attack:
Session Hijacking Island Hopping
Sniffing War Dialing
30. Which of the following is a JavaScript debugging method?
window.alert console.log
document:write document.getElementById
31. Which of the following statement is false?
Samba can play a number of server roles such as File Server, Print Server, Primary Domain Controller etc.
Samba allows to share files with windows host
SWAT requires no web server running
SWAT interface cannot be directly accessed from web browser
32. Simplest way to pass data between two Linux programs running in a system is
Socket Pipe
Semaphore RPC
33. The Linux command that can be used to search for a pattern matching string in a file
find which
grep search
132/2015 6 A
34. In Redhat Linux, the powerful and secure method for network configuration is
NetBios Netstart
IPSec Apache
35. The file system that is the best choice for new installations of Linux is
NTFS EX2
EX4 JFS
36. In a Linux kernel, two mapping registers are simultaneously used as compatibly mapped buffers for CPU and peripherals. Then the DMA Mapping is
Consistent Mapping Mapping
Streaming Mapping Scatter Mapping
37. A format that can only archive a group related files into a single file and cannot perform any compression by itself:
rar bz2
tar gz
38. GNOME Display Manager can be configured by editing:
gdm.conf GNOMKconf
Xserver.conf . XDM.conf
39. The powerful online help system of Linux is
who man
more how
40. A Linux tool that can be used to create hard disk partitions only at the time of Linux installation:
fdisk cfdisk
Disk Mount DRUID
41. The average time required to perform a successful sequential search for an element in a array with n elements:
n/2
42. Each node in a tree has a value greater than all values in the left subtree and has a value less than all values in the right subtree. Then the tree is
Binary search tree Complete tree
Balanced tree Threaded tree
7 132/2015 [P.T.a.]
43. The sort method that switches the adjacent elements, if needed after comparison is
Heap sort Quick sort
Insertion sort Bubble sort
44. Minimum number of queues needed to implement the priority queue is
1 2
45. After a sequence of steps in an algorithm, a linked list reaches the following step,
START NULL
Then the situation is,
overflow underflow
initialisation saturation
46. The result of following expression in polish notation is 432+·84/
13 12
18 34
47. The data structure that can implement a recursive procedure is:
Tree Linked List
Queue Stack
48. For a sorted linked list of length the worst case time required to search a given element is
.O(n)
O(lOg2 O(log2 2n)
49. The characteristic of the elements that is maximum utilised in binary search is
Length of the list Number of elements in the list
Order of the list Highest value in the list
50. For a binary tree with nine nodes, the result of inorder traversal is DBA G E C H F 1. And that of postorder traversal is D B G E H I F C A Then the result of preorder traversal
IS
ABDCEGFHI AB DECFGHI
ADBCEFGHI ADBEFCGHI
132/2015 8 A
51. The communication device that uses spanning tree algorithm to avoid loops:
Router Gateway
Bridge Switch
52. Delaying an outgoing control frame in order to hook onto the next outgoing data frame is called:
Packet Sniffing Compounding
Optimal Routing Piggy Backing
53. Dijkstra's algorithm facilitates:
Multipathing Shortest Path Routing
Isolated Routing Centralised Routing
54. The OSI Layer in which the auto negation resides is
Physical Network
Transport Data Link
• 55. The transmission media that uses BNC connector is
Coaxial Cable UTP
.
STP Optical Fiber
56. The mode of communication used in a serial communication channel is
Simplex Half Duplex
Full Duplex Both and
57. The communication standard for a wireless network is specified by
802.11 802.21
802.8 802.12
58. The FDDI network is an example of:
Bus. Star
Ring Mesh
59. A standard protocol for packet switching is
POTS SMTP
PSTN X.25
A9 132/2015 [P.T.O.]
•
60. The number of bits in a MAC Address is
32 48
64 128
61. Which of the following is not a relational operator?
Difference Addition
Division Selection
62. In DBMS, the front end application performs:
Storage function Access control
Processing function All of the above
63. In a table, the among a set of values are represented by
Tuple Attribute
Entity Key
64. The Schema that provides a standard way of organising information into accessible parts:
logical physical
external storage level
65. The physical location of a database record is determined by a key transformation in
Index Random
Hash Pointer
66. Which of the following is not a set operator in SQL?
UNION UNION ALL
MINUS LIKE
67. Which one of the following is a procedural language?
Domain relational calculus System-R
Query language Relational algebra
68. A buffer that has been changed in database buffer memory, but not yet written to disk is
Swap space Latch
Redo Log Dirty Block
69. The timestamp ordering that makes no distinction between the Read and Write access so that only a single value is required for each granule is
Partial timestamp ordering Total timestamp ordering
Multi version timestamp ordering Optimal timestamp ordering
132/2015 10 A
70. The constraint specifying that account number must be in between 50000 and 80000 is a Integrity constraint Referential constraint Default constraint Key constraint
71. In a Java program, the length in pixel of a string can be. obtained using the method: stringwidth strlength length strwidth
72. Select the correct statement from the following: char p (char*)malloc(100); char p (malloc(100»; char (char) ma:lloc(lOO); char (char*)malloc(100);
73. The statement that is least preferred in C programs in general is Recursion Nesting of different type of loops Double pointer Unconditional Jump to a label
74. What will be the output offollowing program? #include<iostream.h> void main char *cp="computer"; cout«cp; jJuter nputer mputer quter
75. What will be the output of following program? #include<iostream.h> void main int cout«z; 15 17 .. 16 18 •
A 11 132/2015
[P.T.a.)
76. In order to get the MIME type of a file, a Servelt may use the methods defined in the interface:
servlet Info servlet container
Servlet Config servlet context
77. Java method that can be used to pause the current thread execution until and unless another thread completes its execution:
sleep yield
join CD) suspend
78. Which Java interface can be used to store objects using a key-value pair, avoiding duplicate values?
Java.util.Collection Java.util.Set
Java.util.List CD) Java.util.Map
79. Which of the following statementis false for programs?
Throw cannot be executed, from a function called from a try block
Unhandled throw results in an abnormal program termination
Throw is a keyword for newer versions of compiler CD) Catch block may be selected by matching data type with the value given in throw
80. .Which of the following data type be used along with switch statement for comparison, in
(int double
enum CD) struct
81. 67th can Golden plan for best film given for:
Goodbye to language The Wonders
Mister Turn CD) Winter Sleep
82. The 'Ring Spot Virus' is the most destructive disease of:
Papaya Banana
Mango CD) Coffee
83. The ratio of width of our National Flag to its length is
3:5 2:4
2:3 CD) 3:4
132/2015 12 A
1 _
84. Prime Minister Narendxa Modi sworn is as the: 16th Prime Minister 14th Prime Minister 15th Prime Minister 13th Prime Minister
85. The fourth Chief Minister of Kerala EMS R. Sankar Pattom Thanupillai A.K. Antony
86. Who is known as 'Indian Bismark? Kamaraj Sardar Vallabhai Patel Nehru Rajaji
87. Kerala Varma Pazhassi Raja was short to death in 1805, June 11 1805, October 30 1805, July 7 1805, November 30
88. Which of the following is a biography of the lady Mountbatten? Edwine Mountbatten Edwine Mountbatten life of her own Edwine Mountbatten -Her relationship with Nehru Mountbatten
89. Durant Cup is associated with: Volley ball Cricket Foot ball Hockey
90. National Maritime day follows on April5 October 5 93) June 5 September 5
91. The temple entry proclamation of Sree Chithira Thirunal was in the year: 1933 1935 1934 1936
92. The ozone layer restricts: Visible light Ultraviolet radiation Infrared radiation X-rays and Gamma rays
A 13 132/2015 [P.T.a.)
93. Each year World Red Cross and Red Crescent day is
May28 .
May 8
March 20
January 10
94. The proposed Ken-Betwa river linking project is in which state?
Odisha
Maharashtra
Madhya Pradesh
Gujar.at
95. The uprising of 1857 was described as the first war of Indian Independence by
E.G. Tilak V.D. Savarkar
S.N. Sen R.C. Majumdar
96. The title of 'Viceroy' was added to the office of the Governor General ofIndia for the first time in:
1856
1848
1862
1858'
97. Who among the following belong to Moderates?
B.G. Tilak W.C. Banerjee
Lala Lajpat Rai Bipin Chandra Pal
98. Cripps Mission arrived in India in the year:
1947 1946
1942 1940
The Indian who attended all the Three Round Table Conference was:99.
Dr.B.R.Ambedkar Mahatma Gandhi
Muhammad Ali Jinnah Annie Besant
100. Who is the father of English poetry? Wordsworth
Milton
Chaucer
Charles Dickens
A
14
132/2015
Other Question Papers
Subjects
- accounts and auditing
- arab culture and islamic studies
- arabic
- automobile engineering
- biomedical engineering
- chemical engineering
- chemistry
- commerce
- economics
- electrical
- electrical and electronics engineering
- electronics and communication engineering
- electronics and instrumentation
- english
- food science
- geography
- hindi
- history
- homescience
- information technology
- islamic history
- kannada
- language
- machanical engineering
- malayalam
- mathematics
- mechanical and production engineering
- mechanical engineering
- music
- philosophy
- physical education
- physics
- political science
- psychology
- public administration
- rural economics
- sanskrit
- sewing
- social education
- sociology
- statistics
- tamil
- technician
- tool and die engineering
- travel and tourism
- urdu
- women police constable
- women sub inspector of police
- work assistant
- work superintendent
- zoology