You are here: Home > Competitive Exams
All posts from

www.nestexam.in NEST : Previous Question Paper

Name of the Organization : National Institute of Science Education and Research
Name of the Examination : National Entrance Screening Test (NEST)
Subject : General/ Biology/ Chemistry/ Mathematics/ Physics
Website : nestexam.in
Document Type : Model Question Paper

Download NEST Question Papers :
NEST-2007 : https://www.pdfquestion.in/uploads/124-NEST-07.pdf
NEST-2008 : https://www.pdfquestion.in/uploads/124-NEST-08.pdf
NEST-2009 : https://www.pdfquestion.in/uploads/124-NEST-09.pdf
NEST-2010 : https://www.pdfquestion.in/uploads/124-NEST-10.pdf
NEST-2011 : https://www.pdfquestion.in/uploads/124-NEST-11.pdf
NEST-2012 : https://www.pdfquestion.in/uploads/124-NEST-12-A.pdf
NEST-2013 : https://www.pdfquestion.in/uploads/124-NEST-13-A.pdf
NEST-2014 : https://www.pdfquestion.in/uploads/124-NEST2014_A.pdf

NEST Exam Model Question Paper

SET A
Total Marks: 200
Time: 3 hours

Related : Institute of Science Education and Research National Entrance Screening Test Question Paper 2017 : www.pdfquestion.in/13863.html

General Instructions

1. This question booklet contains five sections. Each section carries 50 marks.

2. Section 1 is the General section. Sections 2 to 5 are for the subjects Biology, Chemistry, Mathe- matics and Physics, respectively. Attempt the General section and any three of the four subjectsections.

3. Read the instructions given at the beginning of each section carefully.
4. Calculators, cell phones, log tables, etc. are NOT permitted in the examination hall.
5. Answers to the questions are to be marked on the OMR sheet provided.
6. Please make sure that the question booklet code (A or B or C or D) matches with the OMR sheet code (A or B or C or D). In case of discrepancy, please inform the invigilator immediately.
7. Return the OMR sheet to the invigilator at the end of the examination.

Instructions for writing on OMR sheet :
1. Read and follow the instructions given on the OMR sheet.
2. As far as possible, fill in the answers only after you are sure that you do not need to change them. In case you do have to change the answer after filling, erase the mark completely so that no black spot is left inside the bubble.
3. Check that you are filling the correct answers for the correct section on the OMR sheet.
4. Your roll number (as given in the admit card) MUST BE ENTERED CORRECTLY. If entered incorrectly or not entered at all, the OMR sheet will be taken to be invalid and will not be graded.

Sample Questions

1. The word ‘conspecifics’ refers to :
(A) Birds with a specific period of development.
(B) Birds displaying appropriate behaviour in the presence of adults.
(C) Birds of the same species.
(D) Bird species not needing any special prompting or learning.

2. The pattern of development in Greylag Geese demonstrates that :
(A) The hatching at an advanced stage is critical for imprinting.
(B) The capacity to recognise an adult of its own species is necessarily inherited.
(C) Rearing by humans does not alter the object of the behavioural routine.
(D) Geese reared by humans cannot be taught to respond to its own species.

3. Which of the following was an insight of Darwin :
(A) Behavioural animal routines need to be regarded as the animal’s environ- mental adaptation.
(B) Behavioural animal routines are more significant than the anatomical structure in
the animal’s environmental adaptation.
(C) Behavioural animal routines are not related to environmental adaptation.
(D) Behavioural animal routines are always instinctive in their origin.

Read the following passage carefully and answer questions 1.4 to 1.6.
Cryptography is the practice and study of techniques for secure communication. Appli- cations of cryptography include coded military messages, ATM cards and computer pass- words. In cryptography, “encryption” is the process of converting ordinary messages (or laintext) into unintelligible text (or ciphertext). “Decryption” is the reverse, i.e. con- verting the ciphertext back to plaintext. The method to encode and decode a message is called a “cipher”. The cipher is controlled by a “key”. The key can be in the form of a string of either characters or numbers and is the additional input necessary for encoding or decoding the message.

1.4 In the public key cryptography, number of keys required for secure communication between n parties will be,
(A) (n – 1)2
(B) 2n
(C) n(n + 1) 2
(D) n(n –

1.5 In a particular cipher, each character of the message is conveyed to the other party as a string of numbers indicating a page number of a previously agreed book, a line number on that page and the position of a character in that line. Choose the correct statement.
(A) The book in this example acts as a public key.
(B) The string of numbers in this example is a symmetric key.
(C) The text from the book is plaintext.
(D) This is an example of a symmetric key stream cipher.

1.6 In a particular cipher, 1st, 5th, 9th, …, character in the text is replaced by the 4th letter of the alphabet after that character and 4th, 8th, 12th, …, character is replaced the 3rd letter of thealphabet prior to that character. This is an example of,
(A) Symmetric key stream cipher.
(B) Symmetric key block cipher.
(C) Public key cipher.
(D) Information not sufficient.

1.7 Given the statement “All the students in a class passed the examination” is false, consider the following four statements :
I. All the students in the class failed the examination.
II. There are some students in the class who failed the examination.
III. No student in the class passed the examination.
IV. Not all the students in the class passed the examination.
Which of the above statements are always true?
(A) I and III only.
(B) I and II only.
(C) II and IV only.
(D) III and IV only.

1.8 Contour maps are used in Geography to show the heights at various locations. In a contour map, each line (contour) denotes a specific height. The map on the right is a contour map of a mountain. Four climbers (P, Q, R and S) reach four different points at the foot of the mountain. Which of these four is facing the steepest side of the mountain?
(A) P
(B) Q
(C) R
(D) S

1.9 If a, b and c are three natural numbers, which of the following can never be true?
(A) a2 – b2 = c2
(B) a2 + b2 = c3
(C) a3 + b3 = c3
(D) a3 + b3 = c2

1.10 The practice of alternating pulses (like moong, peas, gram) with cereals (like rice, wheat) by farmers is an example of crop rotation. The primary reason for this practice is to
(A) Replenish the soil microbes.
(B) Avoid competition among pollinating agents.
(C) Protect themselves against price fluctuation of cereals.
(D) Maintain the water table in the field.

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap