Header Ads Widget

FACT Plus 2018_Section-A_Part-2_Previous Year Question Paper

Part-1 CLICK HERE


Q 26.  In a microscope, for small values of numerical aperture of the objective, the depth of field 'd' varies with numerical aperture(NA), as?

A.      "d" is directly proportional to (NA)^(2)

B.      "d" is directly proportional to (NA)^(1/2)

C.      "d" is inversely proportional to (NA)^(2)

D.     "d" is inversely proportional to (NA)^(1/2)

ANSWER: C

Explanation


D= depth of field

λ= wavelength of illuminating light

n= refractive index of the medium

NA= numerical aperture

e= smallest distance that can be resolved by a detector that is placed in the image plane of the microscope objective, whose lateral magnification is M.

Q 27.  The technique of taking photographs through the microscope is called?

A.      Photomicrography

B.      Photomacrography

C.      Microphotography

D.     Macrophotography

ANSWER: A

Q 28.  For two events A and B, the Bayes' theorem is given by which of the following formulas, (P(A) ≠ 0) (symbols have their usual meanings)?

A.      P(B/A) = [P(B) x P(A/B)] / P(A)

B.      P(B/A) = P(A) / [P(B) x P(A/B)]

C.      P(B/A) = [P(B) + P(A/B)] / P(A)

D.     P(B/A) = P(A) / [P(B) + P(A/B)]

ANSWER: A

Explanation

Bayes theorem

  • A theorem in probability and statistics, named after the Reverend Thomas Bayes.
  • Theorem helps in determining the probability of an event that is based on some event that has already occurred.



Q 29.  "No person accused of an offence can be compelled to be a witness against himself" is covered under:

A.      Identification of Prisoners' Act

B.      Indian Constitution

C.      Code of Criminal Procedure, 1973

D.     Indian Evidence Act, 1872

ANSWER: B

Explanation

The Indian Constitution provides immunity to an accused against self-incrimination under Article 20(3)

Q 30.  In the electron microscope, the image of the object is formed by which of the following when a beam of electrons is directed at the object?

A.      X-rays

B.      Scattered electrons

C.      α - Rays

D.     UV-ray

ANSWER: B

Q 31.  If R and S are two independent events, then, with usual symbols, the probability that they will both occur, that is P(R and S) is given by which of the following formulas?

A.      P(R and S) = P(R) + P(S)

B.      P(R and S) = P(R) x P(S/R)

C.      P(R and S) = P(R) x P(S)

D.     P(R and S) = 1 - P(R) - P(S)

ANSWER: C

Q 32.  Consecutive number is always divisible by the largest possible number by which the product of five consecutive natural numbers can be divided by:

A.      160

B.      120

C.      180

D.     240

ANSWER: B

Q 33.  Big-Bang theory of the universe is related to:

A.      Study state theory

B.      Support heliocentric theory

C.      Support geocentric theory

D.     Evolutionary theory

ANSWER: D

Q 34.  A bag contains 8 green and 8 red balls. Find the probability that the ball drawn is red when one ball is selected at random:

A.      1 / 3

B.      1 / 6

C.      1 / 2

D.     5 / 6

ANSWER: C

 Q 35.  Two dice are rolled simultaneously. Find the probability of getting a multiple of 2 on one dice and multiple of three on the other dice:

A.      15 / 36

B.      25 / 36

C.      11 / 36

D.     5 / 6

ANSWER: C

Q 36.  Flammable ice is

A.      Dry ice

B.      Methane hydrate

C.      Ethane hydrate

D.     Nitrous oxide under high pressure

ANSWER: B

Explanation

Dry ice-solid form of carbon dioxide.

Q 37.  Carbon refers to diamond and then corundum refers to

A.      Pearl

B.      Phukraj

C.      Garnet

D.     Ruby

ANSWER: D

Explanation

Corundum:-naturally occurring aluminum oxide mineral (Al2O3) after diamond, the hardest known natural substance. Its finer varieties are the gemstones sapphire and ruby and its mixtures with iron oxides and other minerals are called emery.

Q 38.  World Ozone Day is celebrated on

A.      October, 16

B.      September, 16

C.      June, 16

D.     March, 16

ANSWER: B

Q 39.  Where the first chemical examiner laboratory was established?

A.      Bombay

B.      Calcutta

C.      Agra

D.     Madras

ANSWER: D

Q 40.  The preservative used for preservation of viscera in hydrochloric acid poisoning

A.      Sodium chloride

B.      Sodium hydroxide

C.      Ethyl alcohol

D.     Formaldehyde

ANSWER: C

Q 41. Forensic experts are authorized to conduct an examination of currency notes under section:

A.      293 CrPC

B.      290 CrPC

C.      292 CrPC

D.     280 CrPC

ANSWER: C

Q 42.  Which of the following microscope is most suitable for studying the sequence of strokes?

A.      Polarising microscope

B.      Comparison microscope

C.      Compound microscope

D.     Scanning Electron microscope

ANSWER: D

Q 43.  How would you distinguish a file having bad extension?

A.      By determining hash value

B.      By using metadata

C.      By using file signature

D.     Through cryptography

ANSWER: C

Q 44.  Specific type of memory that can be erased anytime is classified as

A.      BROM

B.      DROM

C.      EPROM

D.     EROM

ANSWER: C

Explanation

EPROM- Erasable programmable read-only memory

EROM- Erasable read only memory

DRAM- Dynamic random access memory

Q 45.  Which of the following is NOT a type of Volatile evidence?

A.      Routing tables

B.      Main memory

C.      Log files

D.     Cached data

ANSWER: C

Explanation

  • Routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed. All IP-enabled devices, including routers and switches, use routing tables
  • Cached data is information stored from a website or app that makes reopening that website or app faster.
  • Log file is a file that keeps a registry of events, processes, messages and communication between various communicating software applications and the operating system. These are present in executable software, operating systems and programs whereby all the messages and process details are recorded.

Q 46.  The size of the seized Hard Disk is 500 GB and it is having free space of 300 GB. What will be the size of the digital forensic raw image?

A.      200 GB

B.      300 GB

C.      500 GB

D.     400 GB

ANSWER: C

Explanation

The RAW image format is basically a bit-for-bit copy of the RAW data of either the disk or the volume stored in single or multiple files. There is no metadata (information that is part of or attached to some other more obvious piece of data) stored in the image files.

Q 47.  Which command will NOT show the MAC address of a computer?

A.      "netstat"

B.      "msconfig"

C.      "ipconfig"

D.     "getmac"

ANSWER: B

Explanation

msconfig command- troubleshoot the Microsoft Windows startup process

Media Access Control(MAC)

  • A unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.
  • MAC address a more reliable way to identify senders and receivers of data on the network, As dynamic IP address, can change time to time.

Q 48. What is the space on a drive called when a file is deleted?

A.      Disk space

B.      Un-allocated space

C.      Drive space

D.     Free space

ANSWER: B

Explanation

  • Disk space- Also called disk storage, disk capacity, or storage capacity, It is the maximum amount of data a disk, or drive is capable to hold.
  • Un-allocated space-  Any physical space in a hard drive that doesn't belong to a partition as unallocated. This means that no programs can write to the space. For all practical purposes, the space doesn't exist to the operating system.

Q 49. Which of the following commands CANNOT be used to collect the Volatile Data

A.      Date

B.      Path

C.      Dir

D.     Del

ANSWER: D

Explanation

Volatile data

  • Data stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off.
  • It resides in registries, cache, and random access memory (RAM).
  • Investigation of volatile data = live forensics

Q 50. Crossover cable is used to connect?

A.      Switch to Router

B.      Host to Host

C.      Hub to Router

D.     Hub to switch

ANSWER: B

Explanation

  • An Ethernet crossover cable, also known as a crossed cable, connects two Ethernet network devices.
  • These cables support temporary host-to-host networking in situations where an intermediate device, such as a network router, is not present.
  • A crossover cable connects two devices of the same type.


Post a Comment

0 Comments