1. Certain offences can be tried by an ordinary Criminal Court having jur

Certain offences can be tried by an ordinary Criminal Court having jurisdiction in the matter, if the prescribed authority under whose jurisdiction the offence was committed so requires. Which of the following offences do not fall in this category?

Offences committed while the offender is absent from duty
When the offence is not connected with the offender's duties as an enrolled member of the CISF
When the offence is connected with the offender's duties as an enrolled member of the CISF but is a petty offence
When the offence is of such a nature that the Commandant invested with the powers of the Magistrate to try the offence considers it appropriate to recuse himself/herself
This question was previously asked in
UPSC CISF-AC-EXE – 2020
The question asks which offences *do not* fall in the category where the prescribed authority *requires* them to be tried by an ordinary Criminal Court. Offences not connected with the offender’s duties as an enrolled member (B) are generally already under the jurisdiction of ordinary criminal courts by default, not by specific requirement of the CISF authority to *send* it there.
The CISF Act typically provides for internal trial (by Commandants with Magistrate powers or other internal mechanisms) for offences committed by members, especially those related to duty or discipline. However, it also allows for serious offences or those unrelated to duty to be tried by ordinary criminal courts. The provision allowing the prescribed authority to *require* trial by an ordinary court usually applies to offences that *could* have been tried internally but are deemed more suitable for external trial.
Offences committed while absent from duty (A) or those connected with duties but petty (C) are often disciplinary in nature and could potentially be tried internally or, depending on rules, sent to ordinary courts. Option D describes a scenario where the internal mechanism is unavailable, necessitating trial by an ordinary court. Option B represents offences outside the scope of the member’s official duties, which are naturally subject to the general criminal law and jurisdiction of ordinary courts. The CISF authority would hand over the person to the police, not *require* the ordinary court to try it; that’s its inherent jurisdiction.

2. Which one of the following statements is correct ?

Which one of the following statements is correct ?

During the period of suspension, a member of the CISF continues to be subjected to the same responsibilities to which he would have been subject, if he were on duty.
A person temporarily ceases to be a member of the CISF during suspension.
The certificate of appointment is not required to be surrendered when a person ceases to be an 'enrolled' member of the CISF.
Clothing articles furnished to him need not be surrendered when one ceases to be an 'enrolled' member of the CISF.
This question was previously asked in
UPSC CISF-AC-EXE – 2020
During the period of suspension, a member of the CISF is relieved from active duty but remains under the administrative control and discipline of the force. They are still bound by the rules, regulations, and code of conduct of the CISF, even if they are not performing operational duties.
Suspension is a temporary removal from active duty, not a termination of membership. A suspended member is still subject to the disciplinary authority and rules of the force.
Option B is incorrect as suspension does not cease membership. Options C and D are incorrect; upon cessation of membership (e.g., by dismissal, resignation), official documents like the certificate of appointment and articles furnished by the force (uniforms, etc.) must be surrendered.

3. Any member of the CISF making an arrest under the provisions of the Ce

Any member of the CISF making an arrest under the provisions of the Central Industrial Security Force Act, 1968

may detain the person up to a maximum of 10 days for the purpose of completing the preliminary investigation.
may obtain the person for a maximum of 48 hours for the purpose of interrogation.
must immediately hand over the person to the Security Officer of the industrial undertaking being protected by the CISF.
shall hand over the person to a police officer without unnecessary delay.
This question was previously asked in
UPSC CISF-AC-EXE – 2020
Section 11 of the Central Industrial Security Force Act, 1968, states that any member of the Force making an arrest shall, without unnecessary delay, hand over the person so arrested to a police officer.
The primary role of the CISF is security, not comprehensive law enforcement investigation. Therefore, persons arrested by the CISF for criminal offences are to be transferred to the police for further investigation and legal process.
The police officer receiving the arrested person will then proceed according to the Code of Criminal Procedure, which includes producing the person before a Magistrate within 24 hours (excluding journey time) if further detention is required. Options A, B, and C describe procedures that are not standard legal procedures for handling arrested persons by security forces like CISF.

4. Which one of the following statements is correct ?

Which one of the following statements is correct ?

No member of the CISF has any authority to carry out any search without a warrant.
Searches can be carried out after obtaining a search warrant from the Sector Inspector General.
There is no blanket prohibition on carrying out searches without a warrant.
Searches can be carried out without a warrant by any member of CISF in the presence of the local police.
This question was previously asked in
UPSC CISF-AC-EXE – 2020
Security forces like the CISF are generally empowered under their governing act to carry out searches without a warrant under certain specific circumstances (e.g., hot pursuit, searching for stolen property within a protected area, searching suspects under reasonable suspicion), meaning there is no blanket prohibition on warrantless searches.
While searches typically require a warrant, security forces and police are usually provided powers for warrantless searches in specific, urgent situations or within defined areas under their protection, balancing security needs with individual rights.
The specific conditions and limitations for warrantless searches by the CISF would be detailed in the Central Industrial Security Force Act, 1968, and its associated rules. Option A is too absolute and unlikely for a security force. Options B and D describe specific procedures but do not negate the possibility of warrantless searches under statutory exceptions.

5. Which one of the following statements is *not* correct ? “Industrial U

Which one of the following statements is *not* correct ?
“Industrial Undertaking in Public Sector” means an industrial undertaking owned, controlled or managed by

a government company as defined in the Companies Act.
a corporation established by or under a Central Act which is controlled by the Government.
a company set up by a member or members of the general public.
a corporation set up by or under a State Act which is controlled by the Government.
This question was previously asked in
UPSC CISF-AC-EXE – 2020
An “Industrial Undertaking in Public Sector” is defined by its ownership, control, or management by the government or government-controlled entities. A company set up by members of the general public falls under the private sector.
Public sector undertakings (PSUs) are enterprises owned by the government (either Central or State) or government companies/corporations, while private sector companies are owned and controlled by individuals or private entities.
Definitions of government companies, corporations established by acts of Parliament or State Legislatures, and public sector undertakings are provided in relevant legal frameworks like the Companies Act and acts establishing specific corporations.

6. Which one of the following statements is correct ? The term “Force Cus

Which one of the following statements is correct ?
The term “Force Custody” means

custody of confiscated goods by the CISF.
arrest of suspects by the CISF.
building and other infrastructure held by the CISF.
arrest or confinement of a member of the CISF.
This question was previously asked in
UPSC CISF-AC-EXE – 2020
In the context of a uniformed force like the CISF, “Force Custody” typically refers to the arrest or confinement of a member of the force by the force authorities themselves for disciplinary or legal reasons.
Force custody is an internal disciplinary or punitive measure applied to members of the force, distinct from the custody of civilians or goods.
Provisions related to force custody are usually outlined in the act or rules governing the specific force (like the CISF Act, 1968). It allows the force to detain its own members under specific circumstances, subject to rules and limitations.

7. Which one of the following is *not* a vector image format ?

Which one of the following is *not* a vector image format ?

CGM
PNG
SVG
SWF
This question was previously asked in
UPSC CISF-AC-EXE – 2020
PNG (Portable Network Graphics) is a raster image format, meaning it represents images as a grid of pixels.
Vector image formats use mathematical equations to describe shapes, lines, and curves, making them scalable without loss of quality. Raster formats store images as a fixed grid of pixels, which can lose quality when scaled.
CGM (Computer Graphics Metafile), SVG (Scalable Vector Graphics), and SWF (Shockwave Flash, often used for vector animations) are examples of vector image formats. Other common raster formats include JPEG, GIF, and BMP.

8. Which one of the following languages is interpreter ?

Which one of the following languages is interpreter ?

FORTRAN
Pascal
Python
C++
This question was previously asked in
UPSC CISF-AC-EXE – 2020
Python is an interpreted language, unlike FORTRAN, Pascal, and C++, which are primarily compiled languages.
Interpreted languages execute code line by line using an interpreter, while compiled languages translate the entire code into machine code before execution.
FORTRAN (Formula Translation), Pascal, and C++ are widely considered compiled languages. Python, while sometimes using compilation steps (like bytecode generation), is fundamentally executed through an interpreter. Other interpreted languages include Ruby, JavaScript, PHP, etc.

9. Convert F(A, B, C) = (A + $\bar{B}$) ($\bar{B}$ + C) into canonical Pr

Convert F(A, B, C) = (A + $\bar{B}$) ($\bar{B}$ + C) into canonical Product of Sum form.

(A + B + C) (A + B + $ar{C}$) (A + $ar{B}$ + C)
(A + B + C) ($ar{A}$ + B + $ar{C}$) ($ar{A}$ + $ar{B}$ + $ar{C}$)
(A + $ar{B}$ + C) (A + $ar{B}$ + $ar{C}$) ($ar{A}$ + B + $ar{C}$)
(A + B + $ar{C}$) ($ar{A}$ + $ar{B}$ + $ar{C}$) (A + $ar{B}$ + C)
This question was previously asked in
UPSC CISF-AC-EXE – 2020
The canonical Product of Sums (POS) form is a product of maxterms, where a maxterm is a sum containing every variable in either complemented or uncomplemented form. The maxterms included in the canonical POS form are those for which the function evaluates to 0.
The given function is $F(A, B, C) = (A + \bar{B}) (\bar{B} + C)$.
We can find the minterms where F is 0 by finding where $(A + \bar{B})=0$ OR $(\bar{B} + C)=0$.
$(A + \bar{B}) = 0$ if and only if $A=0$ AND $\bar{B}=0$, which means $A=0$ and $B=1$. For three variables, this corresponds to minterms 010 ($m_2$) and 011 ($m_3$).
$(\bar{B} + C) = 0$ if and only if $\bar{B}=0$ AND $C=0$, which means $B=1$ and $C=0$. For three variables, this corresponds to minterms 010 ($m_2$) and 110 ($m_6$).
So, F=0 for the union of these minterms: $\{m_2, m_3\} \cup \{m_2, m_6\} = \{m_2, m_3, m_6\}$.
The canonical POS form is the product of the corresponding maxterms $M_2, M_3, M_6$.
The maxterm $M_i$ corresponds to the binary representation of $i$, where a 0 corresponds to the uncomplemented variable and a 1 corresponds to the complemented variable in the sum term.
$M_2$ from 010: $(A + \bar{B} + C)$
$M_3$ from 011: $(A + \bar{B} + \bar{C})$
$M_6$ from 110: $(\bar{A} + \bar{B} + C)$
The canonical POS form is $(A + \bar{B} + C)(A + \bar{B} + \bar{C})(\bar{A} + \bar{B} + C)$.
Comparing this derived form to the options, Option C is $(A + \bar{B} + C) (A + \bar{B} + \bar{C}) (\bar{A} + B + \bar{C})$.
Option C has the first two terms correct (M2 and M3). However, the third term in Option C is $(\bar{A} + B + \bar{C})$, which is $M_5$ (from 101). The correct third term should be $(\bar{A} + \bar{B} + C)$, which is $M_6$ (from 110).
There appears to be an error in the provided options as none exactly matches the derived canonical POS form. However, option C contains two out of the three correct maxterms and is the closest match structurally. Assuming a likely typo in the third term of Option C, it is the most probable intended answer.
– Canonical POS is a product of maxterms.
– Maxterms correspond to the minterms where the function is 0.
– For a variable in a maxterm, it is uncomplemented if its value is 0 in the corresponding minterm binary representation, and complemented if its value is 1.
The original function simplifies to $\bar{B} + AC$. Its minterms are $\sum m(0, 1, 4, 5, 7)$, and maxterms are $\prod M(2, 3, 6)$. This confirms the derived maxterms.

10. Which OSI layer is *not* part of TCP/IP model ?

Which OSI layer is *not* part of TCP/IP model ?

Application layer
Session layer
Network layer
Physical layer
This question was previously asked in
UPSC CISF-AC-EXE – 2020
The OSI (Open Systems Interconnection) model has seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
The TCP/IP model is typically described with four layers: Network Interface (or Link), Internet, Transport, and Application. Sometimes a five-layer model is used, splitting the Network Interface layer into Physical and Data Link.
Comparing the models:
– OSI Physical and Data Link correspond to TCP/IP Network Interface/Link (or Physical and Data Link).
– OSI Network corresponds to TCP/IP Internet.
– OSI Transport corresponds to TCP/IP Transport.
– OSI Application corresponds to TCP/IP Application, but the TCP/IP Application layer encompasses the functions of the OSI Session, Presentation, and Application layers.
The OSI Session layer and Presentation layer do not have distinct corresponding layers in the standard TCP/IP model; their functions are integrated into other layers (primarily the Application layer). Among the options provided, the Session layer is the one from the OSI model that is not a separate layer in the TCP/IP model.
– OSI has 7 layers, TCP/IP has 4 or 5 layers.
– TCP/IP combines functions of some OSI layers into its own layers.
– OSI Session and Presentation layers are not distinct layers in the TCP/IP model.
While TCP/IP is the dominant model for the internet, the OSI model is still valuable for understanding networking concepts and relationships between different functions.