UPSC STUDYMATERIALS
  • HOME
    • OVERVIEW OF UPSC
    • UPSC PRELIMINARY EXAM SYLLABUS
    • UPSC MAIN EXAM SYLLABUS >
      • UPSC EXAM SYLLABUS- AGRICULTURE
      • UPSC EXAM SYLLABUS- ANIMAL HUSBANDRY AND VETERINARY SCIENCE
      • UPSC EXAM SYLLABUS- ANTHROPOLOGY
      • UPSC EXAM SYLLABUS- BOTANY
      • UPSC EXAM SYLLABUS- CHEMISTRY
      • UPSC EXAM SYLLABUS- GEOLOGY
      • UPSC EXAM SYLLABUS- CIVIL ENGINEERING
      • UPSC EXAM SYLLABUS- GEOGRAPHY
      • UPSC EXAM SYLLABUS- COMMERCE AND ACCOUNTING
      • UPSC EXAM SYLLABUS- ECONOMICS
      • UPSC EXAM SYLLABUS- ELECTRICAL ENGINEERING
      • UPSC EXAM SYLLABUS- HISTORY
      • UPSC EXAM SYLLABUS- LAW
      • UPSC EXAM- FREQUENTLY ASKED QUESTIONS (FAQs)
      • UPSC EXAM SYLLABUS- MANAGEMENT
      • UPSC EXAM SYLLABUS- MATHEMATICS
      • UPSC EXAM SYLLABUS- MECHANICAL ENGINEERING
      • UPSC EXAM SYLLABUS- MEDICAL SCIENCE
      • UPSC EXAM SYLLABUS- PHILOSOPHY
      • UPSC EXAM SYLLABUS- PHYSICS
      • UPSC EXAM SYLLABUS- POLITICAL SCIENCE AND INTERNATIONAL RELATIONS
      • UPSC EXAM SYLLABUS- PSYCHOLOGY
      • UPSC EXAM SYLLABUS- PUBLIC ADMINISTRATION
      • UPSC EXAM SYLLABUS- SOCIOLOGY
      • UPSC EXAM SYLLABUS- STATISTICS
      • UPSC EXAM SYLLABUS- ZOOLOGY
    • THE COMBINED GEOSCIENTIST AND GEOLOGIST EXAMINATION SYLLABUS
    • COMBINED MEDICAL SERVICES EXAMINATION SYLLABUS
    • JOINT ENTRANCE EXAMINATION
    • OPTIONAL SUBJECTS OF UPSC EXAM TOPPERS
    • UPSC- EXAM CENTRES
    • UPSC EXAM TIMETABLE/ PATTERN
    • UPSC EXAM BEGINNERS TIPS
    • COMBINED GRADUATE LEVEL EXAMINATION- SSC
    • OVERVIEW OF GATE EXAM
    • UPSC INDIAN FOREST SERVICE >
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- AGRICULTURE
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- AGRICULTURAL ENGINEERING
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- ANIMAL HUSBANDRY AND VETERINARY SCIENCE
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- BOTANY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- CHEMISTRY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- CHEMICAL ENGINEERING
      • GEN. STUDIES- INDIA PAGE 5
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- CIVIL ENGINEERING
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- FORESTRY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- GEOLOGY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- MATHEMATICS
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- MECHANICAL ENGINEERING
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- PHYSICS
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- STATISTICS
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- ZOOLOGY
  • SITEMAP
  • OPTIONAL
    • ACCOUNTANCY
    • AGRICULTURE
    • ANIMAL HUSBANDARY AND VETERINARY SCIENCE
    • ANTHROPOLOGY
    • GEOLOGY
    • LAW
    • MANAGEMENT
    • MATHEMATICS
    • PHILOSOPHY
    • POLITICAL SCIENCE AND INTERNATIONAL RELATIONS
    • PSYCHOLOGY
    • PUBLIC ADMINISTRATION
    • SOCIOLOGY
  • GENERAL MEDICINE
  • ENGINEERING
    • PRINTING TECHNOLOGY
  • EARN MONEY ONLINE
  • COMPUTER
  • OVERVIEW OF UGC NET
    • ADULT EDUCATION
    • ARAB CULTURE AND ISLAMIC STUDIES
    • ARCHAEOLOGY
    • COMPARATIVE LITERATURE
    • COMPARATIVE STUDY OF RELIGIONS
    • CRIMINOLOGY
    • DANCE
    • DEFENCE AND STRATEGIC STUDIES
    • DRAMA
    • FOLK LITERATURE
    • HUMAN RIGHTS AND DUTIES
    • INDIAN CULTURE
    • INTERNATIONAL AND AREA STUDIES
    • LINGUISTICS
    • MUSEOLOGY AND CONSERVATION
    • PERFORMING ARTS- DANCE/DRAMA/THEATRE
    • POPULATION STUDIES
    • TRIBAL AND REGIONAL LANGUAGE
    • VISUAL ARTS
    • WOMEN STUDIES
  • GEN SUBJECTS
    • ARITHMETIC AND MENTAL ABILITY
    • BOTANY
    • BIOLOGY
    • ECONOMICS
    • GENERAL ENGLISH
    • PHYSICS
    • GENERAL KNOWLEDGE
    • INDIAN HISTORY
    • INDIAN GEOGRAPHY
    • ZOOLOGY
  • GEN. STUDIES
  • GENERAL ARTICLES
  • OTHER SUBJECTS
    • AYURVEDA
    • BUSINESS
    • COOPERATION
    • DAIRY SCIENCE AND TECHNOLOGY
    • FISHERIES SCIENCE
    • FORENSIC MEDICINE
    • FORENSIC SCIENCE
    • FORESTRY
    • GENERAL MICROBIOLOGY
    • HOMEOPATHY
    • HOME SCIENCE
    • LABOUR WELFARE
    • LIBRARY SCIENCE
    • MASS COMMUNICATION AND JOURNALISM
    • NUTRITION
    • OFFICE SECRETARYSHIP
    • PERCUSSION
    • SERICULTURE
    • SIDDHA
    • TAILORING
    • TEACHING AND RESEARCH APTITUDE
    • TOURISM ADMINISTRATION AND MANAGEMENT
    • TYPEWRITING
    • UNANI
  • STATES/ UT
  • LANGUAGES
  • BRILLIANCE TUITION CENTRE
    • COMPLETED MATH WORKSHEETS
  • TEAM MEMBERS
  • MEMBERSHIP
  • SHOP ONLINE
  • GROUP STUDY
  • TERMS OF USE
  • PRIVACY POLICY
  • ABOUT US
  • CONTACT US

COMPUTER SCIENCE - PAGE 7

1. A software metric that is a measure of the average length of words and sentences in documents is caused ­
1) Fan­in
2) Fan­out
3) Cyclomatic Complexity
4) Fog Index

Ans: 4

2. Which of the following software process model gives explicit recognition of risk ?
1) Waterfall Model
2) Incremental Development Model
3) Spiral Model
4) Prototyping Model

Ans: 3

3. In software project risk management, accessing the likelihood and consequences of identified risks is called ­
1) Risk Identification
2) Risk analysis
3) Risk Planning
4) Risk Monitoring

Ans: 2

4. COCOMO model stands for ?
1) Common Cost Model
2) Constructive Cost Model
3) Cost Constructive Comprehensive Model
4) Comprehensive Cost Model

Ans: 2

5. In context of software testing, which of the following is not a type of user testing ?
1) Performance Testing
2) Alpha Testing
3) Beta Testing
4) Acceptance Testing

Ans: 1

6. Which model in system modeling indicate " how software will respond to external event" ?
1) Context Model
2) Data Model
3) Behavior Model
4) Object Model

Ans: 3

7. Which of the following is a functional requirement ?
1) Maintainability
2) Portability
3) Robustness
4) None of these

Ans: 4

8. Which of these is not an element of requirement model ?
1) Behavior element
2) Usage based element
3) Flow oriented element
4) All of these

Ans: 2

9. Which model of software development is best suited if requirements are frequently changing ?
1) Incremental Model
2) Spiral Model
3) Prototype Model
4) RAD Model

Ans: 3

10. Which of the following is not a category of maintenance ?
1) Corrective
2) Effective
3) Adaptive
4) Perfective

Ans: 2

11. Which of the following is the method of black box testing ?
1) Boundary value analysis
2) Basic path testing
3) Code path testing
4) None of these

Ans: 1

12. RAD Model is not suitable when ­
1) Technical risks are high
2) Testing is not needed
3) Technical risks are high and testing is not needed
4) None of these

Ans: 1

13. Which of the following is fault base technique?
1) Unit Testing
2) Beta Testing
3) Stress Testing
4) Mutation Testing

Ans: 4

14. Which one is not a system testing ?
1) Deployment testing
2) Stress testing
3) Safety Testing

4) Security Testing
Ans: 3

15. Which of the following is not a decomposition method of software project estimation ?
1) COCOMO model estimation
2) LOC estimation
3) FP estimation
4) All of these

Ans: 1

16. Which one is not a part of software quality attribute FURPS developed by Hewlett­Packard ?
1) Functionality
2) Portability
3) Reliability
4) Supportability

Ans: 2

17. Which of the following activities is not involved in configuration management of a software system product ?
1) Change Management
2) Version Management
3) Release Management
4) Quality Management

Ans: 4

18. UML stands for ?
1) Uniform Modeling Language
2) Unified Modeling Language
3) Universal Modeling Language
4) None of these

Ans: 2

19. A data store in DFD represents ?
1) Sequential file
2) Disk store
3) Repository of data
4) Random access memory

Ans: 3

20. Data flow in DFD must have : A ) An arrow showing direction of flow of data. B ) A meaningful name. C ) A
label such as : xyz D ) no arrow as they are confusing
1) A and B
2) A and C
3) B and D
4) C and D

Ans: 1

21. Statement 1 : Corrective maintenance is universally used to refer to maintenance for fault repair.
Statement 2 : Perfective Maintenance sometimes means perfecting the software by implementing new requirement.
Which of the following is correct ?
1) Statement 1 is true and Statement 2 is false
2) Statement 1 is false and Statement 2 is true
3) Statement 1 is true and Statement 2 is true
4) Statement 1 is false and Statement 2 is false
Ans: 3

22. Software feasibility study is based on :
1) Business and resource constraint only
2) Scope , business constraint only
3) Scope, technology, time constraint only
4) Technology, finance, time , resource constraint only

Ans: 4

23. The degree of interaction between two modules is known as :
1) Cohesion
2) Coupling
3) Strength
4) All of these

Ans: 2

24. Which is not a size metric ?
1) Program Length
2) Cyclomatic Complexity
3) LOC ( Line of Code )
4) FP ( Function Point )

Ans: 2

25. Effort is measured in terms of :
1) Person­-months
2) Persons
3) Rupees
4) Months

Ans: 1

​26:-Which one of the following is an associative container ?
 A:-list
 B:-queue
 C:-map
 D:-string
Ans: C

27:-Which one of the following is a sequence container ?
 A:-stack
 B:-deque
 C:-queue
 D:-set
Ans: B

28:-What does the acronym BCPL stands for ?
 A:-Basic Combined Programming Language
 B:-Basic Compiler Programming Language
 C:-Beginners Combined Programming Language
 D:-None of the above
Ans: A

29:-What was Ken Thompson's version of C called ?
 A:-C++
 B:-B
 C:-P
 D:-None of the above
Ans: B

30:-What does the fopen() function return ?
 A:-address
 B:-pointer
 C:-file pointer
 D:-all of the above
Ans: C

31:-Recursive algorithms are based on
 A:-Divide and conquer approach
 B:-Top-down approach
 C:-Bottom-up approach
 D:-Hierarchical approach
Ans: C

32:-The Sorting method which is used for external sort is
 A:-Bubble sort
 B:-Quick sort
 C:-Merge sort
 D:-Radix sort
Ans: C

33:-Worst case efficiency of binary search is
 A:-`log_(2) n + 1`
 B:-n
 C:-`2^(n)`
 D:-log n
Ans: D

34:-What is the type of the algorithm used in solving the 8 Queens problem ?
 A:-Dynamic
 B:-Backtracking
 C:-Branch and Bound
 D:-None of the above
Ans: B

35:-The time taken by NP-class sorting algorithm is
 A:-O(1)
 B:-O(log n)
 C:-`O(n^(2))`
 D:-O(n)
Ans: D

36:-How many nodes are there in a full state space tree with n = 6 ?
 A:-65
 B:-64
 C:-63
 D:-32
Ans: C

37:-Prims algorithm is based on __________ method.
 A:-Divide and conquer method
 B:-Greedy method
 C:-Dynamic programming
 D:-Branch and bound
Ans: B

38:-Graph Colouring is which type of algorithm design stratergy
 A:-Backtracking
 B:-Greedy
 C:-Branch and Bound
 D:-Dynamic programming
Ans: A

39:-The asymptotic notation for defining the average time complexity is
 A:-Equivalence
 B:-Symmetric
 C:-Reflexive
 D:-All of the above
Ans: A

40:-The complexity of merge sort algorithm is
 A:-O(n)
 B:-`O(n^(2))`
 C:-O(log n)
 D:-O(n log n)
Ans: D
41:-Dijkstra's banking algorithm in an operating system, solves the problem of
 A:-Deadlock recovery
 B:-Mutual exclusion
 C:-Deadlock avoidance
 D:-None of these
Ans: C

42:-Interval between the time of submission and completion of the job is called
 A:-Waiting time
 B:-Response time
 C:-Throughput
 D:-Turnaround time
Ans: D

43:-The example of non-preemptive scheduling is
 A:-First-Come-First-Served
 B:-Round Robin
 C:-Last-In-First-Out
 D:-Shortest-Job-First
Ans: A

44:-__________ is a process-to-process protocol that adds only port addresses, checksum, error control and length information to the data from the upper layer.
 A:-TCP
 B:-UDP
 C:-IP
 D:-None of the above
Ans: B

45:-The RSA algorithm uses a ___________ cryptography method.
 A:-Public Key
 B:-Private Key
 C:-Symmetric Key
 D:-All the above
Ans: A

46:-The __________ attack is related to confidentiality.
 A:-Fabrication
 B:-Interception
 C:-Modification
 D:-Interruption
Ans: B

47:-The cryptography method in which the plaintext BBBB becomes the ciphertext BCDE. This is probably
 A:-Transposition cipher
 B:-Monoalphabetic substitution cipher
 C:-Polyalphabetic substation cipher
 D:-None of the above
Ans: C

48:-The following service is not provided by digital signature
 A:-Integrity
 B:-Authentication
 C:-Nonrepudiation
 D:-Confidentiality
Ans: D

49:-_________ is a technique of temporarily removing inactive programs from the memory of computer system.
 A:-Swapping
 B:-Spooling
 C:-Semaphore
 D:-Scheduling
Ans: A

50:-Fence register is used for
 A:-CPU protection
 B:-Memory protection
 C:-File protection
 D:-Processor protection
Ans: B

51:-The __________ clause is used to list the attributes desired in the result of a query.
 A:-where
 B:-from
 C:-select
 D:-having
Ans: C

52:-We express queries in QBE by
 A:-Datalog
 B:-Skeleton tables
 C:-Entity sets
 D:-SQL
Ans: B

53:-_________ is a set of permitted values for each attribute.
 A:-Domain
 B:-Entity
 C:-Constraints
 D:-Relationship
Ans: A

54:-Minimal super keys are called
 A:-Primary key
 B:-Foreign key
 C:-Candidate key
 D:-Unique
Ans: C

55:-A relation is in __________, every non-key attribute is irreducibly dependent on the primary key.
 A:-1NF
 B:-2NF
 C:-3NF
 D:-4NF
Ans: B

56:-A statement that the system executes automatically when a database related event occurs.
 A:-View
 B:-Alter
 C:-Assertion
 D:-Trigger
Ans: D

57:-An index record appears for every Search key value in the file
 A:-Dense index
 B:-Sparse index
 C:-Hash index
 D:-Single-key index
Ans: A

58:-In hashing, we use the term to denote a unit of storage that can store one or more records.
 A:-Field
 B:-Hash function
 C:-Index
 D:-Bucket
Ans: D

59:-The number of transactions executed in a given amount of time is called
 A:-Response time
 B:-Waiting time
 C:-Throughput
 D:-Performance
Ans: C

60:-_________ is a predicate expressing a condition that we wish the database always to satisfy.
 A:-Authorization
 B:-Deadlock
 C:-QBE
 D:-Assertion
Ans: D

61:-A variation in the representation of the waterfall model is called
 A:-Classic life cycle
 B:-V-model
 C:-Incremental process model
 D:-Spiral model
Ans: B

62:-The most common manifestation of separation of software into separately named and addressable components is called
 A:-Concern
 B:-Pattern
 C:-Modularity
 D:-Independence
Ans: C

63:-________ is an indication of the relative interdependence among modules.
 A:-Coupling
 B:-Cohesion
 C:-Hiding
 D:-Refactoring
Ans: A

64:-The diagram which help you to determine the functionality and features of the software from the user's perspective.
 A:-Class diagram
 B:-Deployment diagram
 C:-Sequence diagram
 D:-Use-case diagram
Ans: D

65:-__________ testing is focuses on the functional requirements of the software.
 A:-White-box testing
 B:-Black-box testing
 C:-Condition testing
 D:-Unit testing
Ans: B

66:-The software metric that provides a quantitative measure of the logical complexity of a program.
 A:-Cylcomatic complexity
 B:-Defect removal efficiency
 C:-Object-oriented metrics
 D:-LOC
Ans: A

67:-________ is the most widely used strategy for statistical quality assurance in industry.
 A:-Pareto principle
 B:-CMM
 C:-Six Sigma
 D:-IEEE
Ans: C

68:-__________ is an agile software development approach.
 A:-Extreme programming
 B:-Quality function deployment
 C:-PSPEC
 D:-Unified process
Ans: A

69:-________ provide a notation that translates actions and conditions described in a use case into a tabular form.
 A:-Decision tree
 B:-Pattern
 C:-Linear structures
 D:-Decision tables
Ans: D

70:-________ is a project scheduling method.
 A:-PERT
 B:-Scrum model
 C:-UML
 D:-RAD
Ans: A

71:-The bus carries bits between
 A:-Microprocessor and Memory
 B:-Microprocessor and I/Os
 C:-Memory and I/Os
 D:-Microprocessor, Memory and I/Os
Ans: D

72:-The Gray code for the binary number `(101110)_(2)` is
 A:-111101
 B:-111001
 C:-111011
 D:-111010
Ans: B

73:-Simplify the expression AB + A(B + C) + B(B + C) using Boolean algebra techniques is
 A:-C + AC
 B:-A + AC
 C:-B + AC
 D:-B + AB
Ans: C

74:-How many 74154 4-line-to-16-line decoders are necessary to decode a six-bit binary number ?
 A:-One
 B:-Two
 C:-Three
 D:-Four
Ans: B

75:-The binary equivalent for the BCD number 10000101 is
 A:-`(1010100)_(2)`
 B:-`(1000100)_(2)`
 C:-`(1110100)_(2)`
 D:-`(1010101)_(2)`
Ans: D

76:-How many states are there in an eight-bit Johnson counter sequence ?
 A:-4
 B:-8
 C:-16
 D:-32
Ans: C

77:-How many clock pulses are required to serially enter a byte of data into an eight-bit shift register ?
 A:-8
 B:-16
 C:-32
 D:-64
Ans: A

78:-How many address bits are required for a 2048-bit memory ?
 A:-10 bits
 B:-11 bits
 C:-12 bits
 D:-13 bits
Ans: B

79:-How many tracks are there on a typical 5`1/2` inch floppy disk ?
 A:-64
 B:-67
 C:-77
 D:-87
Ans: C
​
80:-Visual cryptography is mainly used for
 A:-Text encryption
 B:-Video encryption
 C:-Audio encryption
 D:-Image encryption
Ans: D
81:-The buffer overflow attack is caused by
 A:-Vulnerability in the design of a networking protocol
 B:-Vulnerability in the implementation of a networking protocol
 C:-Vulnerability in human behaviour
 D:-Vulnerability in software
Ans: D

82:-Which of the following is not valid IPv4 addresses ?
 A:-192.10.14.3
 B:-201.172.275.33
 C:-65.90.11.00
 D:-193.20.250.10
Ans: B

83:-Address resource records are associated with
 A:-Routing tables in Internet routers
 B:-ARP aches in LAN workstations
 C:-DNS servers
 D:-None of the above
Ans: C

84:-Which is the legal ways to access a class data member using this pointer ?
 A:-this.x
 B:-*this.x
 C:-*(this.x)
 D:-(*this).x
Ans: D

85:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
 A:-xy
 B:-gcd(x, y)
 C:-xy/gcd(x, y)
 D:-None of these
Ans: D

86:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following 
 A:-Caesar cipher
 B:-Vigenere cipher
 C:-Hill cipher
 D:-One time pad
Ans: A

87:-A product cipher is constructed using a combination of
 A:-Symmetric and asymmetric ciphers
 B:-Substitution and transposition ciphers
 C:-Monoalphabetic and polyalphabetic ciphers
 D:-Stream and block ciphers
Ans: B

88:-Which of the following characteristics is most widely used in fingerprint recognition ?
 A:-Number and coordinates of arch patterns
 B:-Number and coordinates of loop patterns
 C:-Coordinates and orientations of fingerprint minutiae
 D:-Number and coordinates of whorl patterns
Ans: C

89:-During the initial stages of an attack by a new internet scanning worm, the number of infected machines increases
 A:-Exponentially with time
 B:-Logarithmically with time
 C:-Polynomially with time
 D:-At a constant rate
Ans: A

90:-Use privileges in windows are stored in
 A:-DACL
 B:-ACE
 C:-Access token
 D:-SID
Ans: C

91:-Probabilistic packet marking is technique used in support of
 A:-DDoS prevention
 B:-IP traceback
 C:-DDoS detection
 D:-Worm detection
Ans: B

92:-The role of the payment gateway is
 A:-A proxy to the merchant
 B:-A financial service provider
 C:-A government regulator
 D:-A proxy to the bankcard network
Ans: D

93:-What type of parameters are used in transcendental functions in Java ?
 A:-double
 B:-long
 C:-byte
 D:-int
Ans: A

94:-In what format is Java's character set represented ?
 A:-16 bits ASCII
 B:-16 bits unicode
 C:-16 bits EBC
 D:-None of the above
Ans: B

95:-Basic futures of structured programming
 A:-Sequence
 B:-Looping
 C:-Branching
 D:-All of the above
Ans: D

96:-In which year Java was developed ?
 A:-1989
 B:-1990
 C:-1991
 D:-1992
Ans: C

97:-What feature of C++ was dropped in Java ?
 A:-Virtual function
 B:-Abstract class
 C:-Inheritance
 D:-Pointers
Ans: D

98:-What type of storage class is involved when we pass by value in function ?
 A:-External
 B:-Automatic
 C:-Static
 D:-Register
Ans: B

99:-What is Java equivalent of const in C++ ?
 A:-const
 B:-#define
 C:-final
 D:-All of the above
Ans: C

100:-What is another name for semantic errors ?
 A:-Runtime errors
 B:-Compile time errors
 C:-Syntax errors
 D:-None of the above
Ans: A
​
  • Computer Application
  • Computer Application- Page 1
  • Computer Science
  • Computer Science- Page 1
  • ​Computer Science- Page 2
  • ​Computer Science- Page 3
  • ​Computer Science- Page 4
  • ​Computer Science- Page 5
  • ​Computer Science- Page 6
  • ​Computer Science- Page 7
  • ​Computer Science- Page 8
  • ​Computer Science- Page 9
  • Computer Science- Page 10
  • Computer Science- Page 11
  • Computer Science- Page 12
  • Computer Science- Page 13
  • Computer Science- Page 14
  • Computer Science- Page 15

UPSC Study Materials
​MCQs for Competitive Examinations

About Us
Terms of Use
​Privacy Policy
​
Follow Us
Facebook
Twitter
​Google Plus
Youtube​
Share this Page
Facebook
Twitter
​Google+
​Pinterest
​Linkedin
© upscstudymaterials.com   
​ALL RIGHTS RESERVED.


  • HOME
    • OVERVIEW OF UPSC
    • UPSC PRELIMINARY EXAM SYLLABUS
    • UPSC MAIN EXAM SYLLABUS >
      • UPSC EXAM SYLLABUS- AGRICULTURE
      • UPSC EXAM SYLLABUS- ANIMAL HUSBANDRY AND VETERINARY SCIENCE
      • UPSC EXAM SYLLABUS- ANTHROPOLOGY
      • UPSC EXAM SYLLABUS- BOTANY
      • UPSC EXAM SYLLABUS- CHEMISTRY
      • UPSC EXAM SYLLABUS- GEOLOGY
      • UPSC EXAM SYLLABUS- CIVIL ENGINEERING
      • UPSC EXAM SYLLABUS- GEOGRAPHY
      • UPSC EXAM SYLLABUS- COMMERCE AND ACCOUNTING
      • UPSC EXAM SYLLABUS- ECONOMICS
      • UPSC EXAM SYLLABUS- ELECTRICAL ENGINEERING
      • UPSC EXAM SYLLABUS- HISTORY
      • UPSC EXAM SYLLABUS- LAW
      • UPSC EXAM- FREQUENTLY ASKED QUESTIONS (FAQs)
      • UPSC EXAM SYLLABUS- MANAGEMENT
      • UPSC EXAM SYLLABUS- MATHEMATICS
      • UPSC EXAM SYLLABUS- MECHANICAL ENGINEERING
      • UPSC EXAM SYLLABUS- MEDICAL SCIENCE
      • UPSC EXAM SYLLABUS- PHILOSOPHY
      • UPSC EXAM SYLLABUS- PHYSICS
      • UPSC EXAM SYLLABUS- POLITICAL SCIENCE AND INTERNATIONAL RELATIONS
      • UPSC EXAM SYLLABUS- PSYCHOLOGY
      • UPSC EXAM SYLLABUS- PUBLIC ADMINISTRATION
      • UPSC EXAM SYLLABUS- SOCIOLOGY
      • UPSC EXAM SYLLABUS- STATISTICS
      • UPSC EXAM SYLLABUS- ZOOLOGY
    • THE COMBINED GEOSCIENTIST AND GEOLOGIST EXAMINATION SYLLABUS
    • COMBINED MEDICAL SERVICES EXAMINATION SYLLABUS
    • JOINT ENTRANCE EXAMINATION
    • OPTIONAL SUBJECTS OF UPSC EXAM TOPPERS
    • UPSC- EXAM CENTRES
    • UPSC EXAM TIMETABLE/ PATTERN
    • UPSC EXAM BEGINNERS TIPS
    • COMBINED GRADUATE LEVEL EXAMINATION- SSC
    • OVERVIEW OF GATE EXAM
    • UPSC INDIAN FOREST SERVICE >
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- AGRICULTURE
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- AGRICULTURAL ENGINEERING
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- ANIMAL HUSBANDRY AND VETERINARY SCIENCE
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- BOTANY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- CHEMISTRY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- CHEMICAL ENGINEERING
      • GEN. STUDIES- INDIA PAGE 5
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- CIVIL ENGINEERING
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- FORESTRY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- GEOLOGY
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- MATHEMATICS
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- MECHANICAL ENGINEERING
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- PHYSICS
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- STATISTICS
      • UPSC INDIAN FOREST SERVICE- SYLLABUS- ZOOLOGY
  • SITEMAP
  • OPTIONAL
    • ACCOUNTANCY
    • AGRICULTURE
    • ANIMAL HUSBANDARY AND VETERINARY SCIENCE
    • ANTHROPOLOGY
    • GEOLOGY
    • LAW
    • MANAGEMENT
    • MATHEMATICS
    • PHILOSOPHY
    • POLITICAL SCIENCE AND INTERNATIONAL RELATIONS
    • PSYCHOLOGY
    • PUBLIC ADMINISTRATION
    • SOCIOLOGY
  • GENERAL MEDICINE
  • ENGINEERING
    • PRINTING TECHNOLOGY
  • EARN MONEY ONLINE
  • COMPUTER
  • OVERVIEW OF UGC NET
    • ADULT EDUCATION
    • ARAB CULTURE AND ISLAMIC STUDIES
    • ARCHAEOLOGY
    • COMPARATIVE LITERATURE
    • COMPARATIVE STUDY OF RELIGIONS
    • CRIMINOLOGY
    • DANCE
    • DEFENCE AND STRATEGIC STUDIES
    • DRAMA
    • FOLK LITERATURE
    • HUMAN RIGHTS AND DUTIES
    • INDIAN CULTURE
    • INTERNATIONAL AND AREA STUDIES
    • LINGUISTICS
    • MUSEOLOGY AND CONSERVATION
    • PERFORMING ARTS- DANCE/DRAMA/THEATRE
    • POPULATION STUDIES
    • TRIBAL AND REGIONAL LANGUAGE
    • VISUAL ARTS
    • WOMEN STUDIES
  • GEN SUBJECTS
    • ARITHMETIC AND MENTAL ABILITY
    • BOTANY
    • BIOLOGY
    • ECONOMICS
    • GENERAL ENGLISH
    • PHYSICS
    • GENERAL KNOWLEDGE
    • INDIAN HISTORY
    • INDIAN GEOGRAPHY
    • ZOOLOGY
  • GEN. STUDIES
  • GENERAL ARTICLES
  • OTHER SUBJECTS
    • AYURVEDA
    • BUSINESS
    • COOPERATION
    • DAIRY SCIENCE AND TECHNOLOGY
    • FISHERIES SCIENCE
    • FORENSIC MEDICINE
    • FORENSIC SCIENCE
    • FORESTRY
    • GENERAL MICROBIOLOGY
    • HOMEOPATHY
    • HOME SCIENCE
    • LABOUR WELFARE
    • LIBRARY SCIENCE
    • MASS COMMUNICATION AND JOURNALISM
    • NUTRITION
    • OFFICE SECRETARYSHIP
    • PERCUSSION
    • SERICULTURE
    • SIDDHA
    • TAILORING
    • TEACHING AND RESEARCH APTITUDE
    • TOURISM ADMINISTRATION AND MANAGEMENT
    • TYPEWRITING
    • UNANI
  • STATES/ UT
  • LANGUAGES
  • BRILLIANCE TUITION CENTRE
    • COMPLETED MATH WORKSHEETS
  • TEAM MEMBERS
  • MEMBERSHIP
  • SHOP ONLINE
  • GROUP STUDY
  • TERMS OF USE
  • PRIVACY POLICY
  • ABOUT US
  • CONTACT US