Practice Smart, Score High!
Preparing for the PGTRB Computer Science Exam 2025? Then you already know—practice is the key to success. That’s why we at Shiksha Class have launched a comprehensive Test Series tailored specifically for PGTRB Computer Science aspirants.
In this blog, discover why our test series is your best tool to boost confidence, reduce exam fear, and ensure high scores.

📈 Features of Our Test Series
- ✅ 5000+ High-Quality Questions
- Carefully prepared based on the updated PGTRB Computer Science syllabus.
- ✅195 + Topic-wise, Unit-wise & Full-Length Tests
- Covers the entire syllabus with a structured approach.
- ✅ Questions with Same Difficulty Level as PGTRB
- Designed to reflect the actual exam pattern and standards.
- ✅ Detailed Explanations for Every Question
- Each question is followed by a clear, exam-oriented explanation.
- ✅ Instant Results & Performance Analysis
- Get immediate feedback to identify strengths and focus areas.
- ✅ Accessible on Mobile and Laptop
- Practice anytime using the Shiksha Class App – compatible with all devices.
- ✅ Leaderboard & Progress Tracking
- Compete with fellow aspirants and monitor your improvement.Compete with fellow aspirants and monitor your improvement.
COMPUTER SCIENCE TEST SCHEDULE | |||
UNIT I COMPUTER SYSTEM ARCHITECTURE | |||
COURSE: PGTRB | |||
SUBJECT: COMPUTER SCIENCE | |||
TEST: TOPIC WISE TEST |
Test No | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
1 | 1 | Number Systems | Introduction to Number Systems | 1 | 40 |
2 | 1 | Conversion from One Number System to another and Weighted Binary Code, Non-Weighted Binary Code | 2 | 35 | |
3 | 1 | Digital Codes, Alphanumeric Code and Error Detection and Error Correction Codes | 3 | 35 | |
4 | 1 | Boolean Algebra | Introduction to Boolean Algebra | 4 | 40 |
5 | 1 | Boolean Logic, Boolean Operations and Operator Precedence | 5 | 30 | |
6 | 1 | Laws of Boolean Algebra, Representation of Boolean Functions and Simplification Methods in Boolean Algebra | 30 | ||
7 | 1 | Digital Logic Circuits and Components | Digital Computers, Logic Gates, Boolean Algebra,Map Simplifications, Combinational Circuits and Flip-Flops | 6 | 42 |
8 | 1 | Sequential Circuits, Integrated Circuits (ICs), Decoders, Multiplexers, Registers and Counters and Memory Unit | 7 | 42 | |
9 | 1 | Basic Computer Organization and Design and Programming the Basic Computer | Stored Program Organization and Instruction Codes, Computer Registers, Computer Instructions, Timing and Control and Instruction Cycle, | 8 | 35 |
10 | 1 | Memory-Reference Instructions, Input-Output, Interrupt, Machine Language and Assembly Language | 9 | 37 | |
11 | 1 | Programming the Basic Computer | Assembler, Program Loops, Subroutines, Input-Output Programming. | 10 | 32 |
12 | 1 | Central Processing Unit | General Register Organization and Stack Organization | 11 | 30 |
13 | 1 | Instruction Formats and Addressing Modes | 12 | 30 | |
14 | 1 | RISC Computer and CISC Computer | 13 | 30 | |
15 | 1 | Input-Output Organization and Memory Hierarchy | Peripheral Devices, Input-Output Interface, Asynchronous Data Transfer, Modes of Transfer | 14 | 32 |
16 | 1 | Priority Interrupt, DMA, Serial Communication and Main Memory | 15 | 38 | |
17 | 1 | Memory Hierarchy | Auxiliary Memory, Associative Memory, Cache Memory, Virtual Memory and Memory Management Hardware. | 16 | 30 |
UNIT II DATABASE MANAGEMENT SYSTEM | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | QUESTIONS |
18 | 2 | Database System Concepts and Architecture | Data Models, Schemas and Instances | 1 | 34 |
19 | 2 | Three-Schema Architecture and Data Independence, Database Languages and Interfaces | 2 | 34 | |
20 | 2 | Database System Concepts and Architecture and Data Modeling | Centralized and Client/Server Architectures for DBMS and Entity Relationship Diagrams | 3 | 32 |
21 | 2 | Data Modeling | Relational Model and Constraints | 4 | 30 |
22 | 2 | Languages and Design and Programming | 5 | 30 | |
23 | 2 | Relational Database Schemas and Relational Algebra and Relational Calculus | 6 | 30 | |
24 | 2 | Data Modeling and Normalization for Relational Databases | Codd Rules and Functional Dependencies and Normalization | 7 | 33 |
25 | 2 | Normalization for Relational Databases | Algorithms for Query Processing and Optimization and Transaction Processing | 8 | 36 |
26 | 2 | Concurrency Control Techniques and Database Recovery Techniques | 9 | 36 | |
27 | 2 | Object and Object-Relational Databases and Database Security and Authorization | 10 | 36 | |
28 | 2 | Constraints and Views | Constraints and its types and Integrity constraints | 11 | 30 |
29 | 2 | Check constraints and Referential constraints | 12 | 30 | |
30 | 2 | Introduction to views, updates on views | 13 | 30 | |
31 | 2 | Constraints and Views and Transaction management and Concurrency control | comparison between tables and views , Transaction management, ACID properties | 14 | 37 |
32 | 2 | Transaction management and Concurrency control | serializability and concurrency control, Lock based concurrency control (2PL, Deadlocks) and Time stamping methods | 15 | 33 |
33 | 2 | Transaction management and Concurrency control | optimistic methods, database recovery management | 16 | 24 |
UNIT III SYSTEM SOFTWARE AND OPERATING SYSTEM | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
34 | 3 | System Software | Machine, Assembly and High-Level Languages | 1 | 30 |
35 | 3 | Compilers and Interpreters, Loading, | 2 | 30 | |
36 | 3 | Linking and Relocation, Macros | 3 | 30 | |
37 | 3 | System Software and Basics of Operating Systems | Debuggers and Operating System Structure | 4 | 30 |
38 | 3 | Basics of Operating Systems | Operations and Services, System Calls | 5 | 30 |
39 | 3 | Operating-System Design and Implementation, System Boot | 6 | 30 | |
40 | 3 | Process Management | Process Scheduling and Operations, Inter-process Communication | 7 | 30 |
41 | 3 | Communication in Client-Server Systems, Process Synchronization | 8 | 30 | |
42 | 3 | Critical-Section Problem and Peterson’s Solution | 9 | 30 | |
43 | 3 | Semaphores and Synchronization | 10 | 30 | |
44 | 3 | Threads | Multicore Programming, Multithreading Models | 11 | 30 |
45 | 3 | Thread Libraries and Implicit Threading | 12 | 30 | |
46 | 3 | Threads and CPU Scheduling | Threading Issues and Scheduling Criteria and Algorithms | 13 | 30 |
47 | 3 | CPU Scheduling | Thread Scheduling and Multiple Processor Scheduling | 14 | 30 |
48 | 3 | CPU Scheduling and Deadlocks | Real-Time Scheduling and Deadlock Characterization | 15 | 30 |
49 | 3 | Deadlocks | Deadlock Characterization, Methods for Handling Deadlocks, | 16 | 30 |
50 | 3 | Deadlock Prevention, Avoidance and Detection | 17 | 30 | |
51 | 3 | Deadlocks and Memory Management | Recovery from Deadlock and Contiguous Memory Allocation | 18 | 30 |
52 | 3 | Memory Management | Swapping, Paging | 19 | 30 |
53 | 3 | Segmentation, Demand Paging | 20 | 30 | |
54 | 3 | Page Replacement, Allocation of Frames | 21 | 30 | |
55 | 3 | Thrashing, Memory-Mapped Files | 22 | 30 | |
UNIT IV DATA STRUCTURES AND ALGORITHMS | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
56 | 4 | Data Structures | Abstract data types, Arrays and their Applications | 1 | 40 |
57 | 4 | Sparse Matrix, Stacks | 2 | 40 | |
58 | 4 | Queues, Priority Queues | 3 | 40 | |
59 | 4 | Data Structures and Trees and Graphs | Linked Lists and Trees | 4 | 40 |
60 | 4 | Trees and Graphs | Forest, Binary Tree | 5 | 40 |
61 | 4 | Threaded Binary Tree, Binary Search Tree | 6 | 40 | |
62 | 4 | AVL Tree, B Tree | 7 | 40 | |
63 | 4 | B+ Tree, B* Tree | 8 | 40 | |
64 | 4 | Graphs, Sorting and Searching Algorithms | 9 | 40 | |
65 | 4 | Trees and Graphs and Performance Analysis of Algorithms and Recurrences | Hashing and Time and Space Complexities | 10 | 35 |
66 | 4 | Performance Analysis of Algorithms and Recurrences | Asymptotic Notation, Recurrence Relations | 11 | 30 |
67 | 4 | Design Techniques | Divide and Conquer, Dynamic Programming | 12 | 34 |
68 | 4 | Greedy Algorithms, Backtracking | 13 | 34 | |
69 | 4 | Design Techniques and Graph Algorithms | Branch and Bound Breadth-First Search | 14 | 35 |
70 | 4 | Graph Algorithms | Depth-First Search, Shortest Paths | 15 | 36 |
71 | 4 | Maximum Flow, Minimum Spanning Trees | 16 | 36 | |
72 | 4 | Advanced Algorithms | Parallel Algorithms for Sorting, Searching and Merging, | 17 | 40 |
73 | 4 | Approximation Algorithms, Randomized Algorithms. | 18 | 40 | |
UNIT V DATA COMMUNICATION AND COMPUTER NETWORKS | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
74 | 5 | Data Communication | Components of a Data Communication System, Simplex | 1 | 30 |
75 | 5 | Half Duplex and Duplex Modes of Communication, Analog and Digital Signals | 2 | 30 | |
76 | 5 | Noiseless and Noisy Channels, Bandwidth | 3 | 30 | |
77 | 5 | Throughput and Latency, Digital and Analog Transmission | 4 | 30 | |
78 | 5 | Data Encoding and Modulation Techniques, Broadband and Baseband Transmission | 5 | 30 | |
79 | 5 | Multiplexing, Transmission Media | 6 | 30 | |
80 | 5 | Transmission Errors, Error Handling Mechanisms | 7 | 30 | |
81 | 5 | Computer Networks | Network Topologies, Local Area Networks | 8 | 32 |
82 | 5 | Metropolitan Area Networks, Wide Area Network | 9 | 32 | |
83 | 5 | Wireless Networks, Internet | 10 | 32 | |
84 | 5 | Network Models | Layered Architecture, OSI Reference Model and its Protocols | 11 | 30 |
85 | 5 | TCP/IP Protocol Suite, Physical | 12 | 30 | |
86 | 5 | Logical, Port and Specific Addresses | 13 | 30 | |
87 | 5 | Network Models and Functions of OSI and TCP/IP Layers | Switching Techniques , Framing and Error Detection and Correction | 14 | 35 |
88 | 5 | Functions of OSI and TCP/IP Layers | Flow and Error Control, Sliding Window Protocol, HDLC | 15 | 30 |
89 | 5 | Multiple Access – CSMA/CD, CSMA/CA, Reservation | 16 | 30 | |
90 | 5 | Polling, Token Passing, FDMA and CDMA | 17 | 40 | |
91 | 5 | TDMA, Network Devices, Backbone Networks, Virtual LANs | 18 | 40 | |
92 | 5 | World Wide Web (WWW) | Uniform Resource Locator (URL), Domain Name Service (DNS), Mapping Names to Addresses and Addresses to Names | 19 | 45 |
93 | 5 | Electronic Mail Architecture, SMTP | 20 | 30 | |
94 | 5 | POP and IMAP, TELNET and FTP | 21 | 30 | |
UNIT VI PROGRAMMING WITH C++ | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
95 | 6 | Language Design and Translation Issues | Programming Language Concepts, Paradigms and Models | 1 | 40 |
96 | 6 | Programming Environments, Virtual Computers and Binding Times | 2 | 40 | |
97 | 6 | Programming Language Syntax, Stages in Translation | 3 | 40 | |
98 | 6 | Formal Transition Models | 4 | 30 | |
99 | 6 | Elementary Data Types | Properties of Types and Objects | 5 | 30 |
100 | 6 | Scalar and Composite Data Types | 6 | 30 | |
101 | 6 | Object Oriented Programming | Class, Object | 7 | 40 |
102 | 6 | Encapsulation, Inheritance | 8 | 40 | |
103 | 6 | Abstract Class, Polymorphism | 9 | 40 | |
104 | 6 | Basics of C++ | Tokens, Identifiers | 10 | 40 |
105 | 6 | Variables and Constants, Data types | 11 | 40 | |
106 | 6 | Operators, Control statements | 12 | 40 | |
107 | 6 | Functions | User-defined Functions, Parameter Passing | 13 | 40 |
108 | 6 | Functions and Class and Object | Virtual Functions and Constructors and Destructors | 14 | 40 |
109 | 6 | Class and Objects | Overloading, Inheritance | 15 | 40 |
110 | 6 | Class and Objects and Files and Event Handling | Templates and Streams and Files | 16 | 40 |
111 | 6 | Files and Event Handling | Multi-file Programs, Exception and Event Handling | 17 | 40 |
UNIT VII PYTHON PROGRAMMING | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
112 | 7 | Basics | Python interpreter and interactive mode | 1 | 40 |
113 | 7 | debugging, values | 2 | 40 | |
114 | 7 | types and int | 3 | 40 | |
115 | 7 | float, Boolean | 4 | 40 | |
116 | 7 | string and list | 5 | 40 | |
117 | 7 | variables, expressions | 6 | 40 | |
118 | 7 | statements, tuple assignment | 7 | 40 | |
119 | 7 | precedence of operators, comments | 8 | 40 | |
120 | 7 | Python libraries | Numpy, Pandas | 9 | 40 |
121 | 7 | Matplotlib, SciPy | 10 | 40 | |
122 | 7 | Conditionals | Boolean values and operators | 11 | 40 |
123 | 7 | conditional statements, Iteration | 12 | 40 | |
124 | 7 | statement, while | 13 | 40 | |
125 | 7 | for, break | 14 | 40 | |
126 | 7 | Conditionals and Functions | continue and Functions types | 15 | 40 |
127 | 7 | Functions | return values, parameters | 16 | 40 |
128 | 7 | local and global scope | 17 | 40 | |
129 | 7 | function composition, recursion | 18 | 40 | |
130 | 7 | Strings | string slices, immutability | 19 | 40 |
131 | 7 | string functions and methods | 20 | 40 | |
132 | 7 | string module, Lists as arrays | 21 | 40 | |
133 | 7 | Lists | list operations, list slices | 22 | 40 |
134 | 7 | list methods, list loop | 23 | 40 | |
135 | 7 | mutability, aliasing | 24 | 40 | |
136 | 7 | cloning lists, list parameters | 25 | 40 | |
137 | 7 | Tuples | tuple assignment, tuple as return value | 26 | 40 |
138 | 7 | Dictionaries: operations | 27 | 40 | |
139 | 7 | methods, advanced list processing | 28 | 40 | |
140 | 7 | Iterator and generator | 29 | 20 | |
UNIT VIII WEB DEVELOPMENT | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
141 | 8 | HTML | Introduction – Basic Tags | 1 | 40 |
142 | 8 | formatting and fonts | 2 | 40 | |
143 | 8 | HTML and Elements of HTML | Working with colour and Working with Tables | 3 | 40 |
144 | 8 | Elements of HTML | Working with Images, Working with Links | 4 | 40 |
145 | 8 | List and Tables | 5 | 40 | |
146 | 8 | Frame and Frameset | 6 | 40 | |
147 | 8 | Forms and Controls | 7 | 40 | |
148 | 8 | CSS | Introduction to Cascading Style Sheet | 8 | 40 |
149 | 8 | using CSS background images, colour | 9 | 40 | |
150 | 8 | properties, Manipulating texts using fonts | 10 | 40 | |
151 | 8 | border and boxes margins | 11 | 40 | |
152 | 8 | padding lists, positioning using CSS | 12 | 40 | |
153 | 8 | Menu and Division | Types of Style Sheets, Class | 13 | 40 |
154 | 8 | ID, selector | 14 | 40 | |
155 | 8 | Inline Menu, DIV | 15 | 40 | |
156 | 8 | Menu and Division and JavaScript | CSS layout and Introduction to JavaScript | 16 | 40 |
157 | 8 | JavaScript | Understanding Variables, Loops | 17 | 40 |
158 | 8 | Arrays, Functions | 18 | 40 | |
159 | 8 | Working with alert, confirm | 19 | 40 | |
160 | 8 | prompt boxes, Creating Rollover image | 20 | 40 | |
161 | 8 | Working with Operators, Events | 21 | 40 | |
UNIT IX PHP AND MYSQL | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
162 | 9 | Basics of PHP | Evaluation of PHP, Basic Syntax | 1 | 40 |
163 | 9 | Defining variable and constant | 2 | 40 | |
164 | 9 | PHP Data type, Operator | 3 | 40 | |
165 | 9 | Expression, Making Decisions | 4 | 40 | |
166 | 9 | Doing Repetitive task with looping, Mixing Decisions | 5 | 40 | |
167 | 9 | Basics of PHP and Functions | looping with HTML and Defining a function | 6 | 40 |
168 | 9 | Functions and String Handling | Call by value and Call by reference | 7 | 40 |
169 | 9 | Recursive function and Creating and accessing | 8 | 40 | |
170 | 9 | String Handling | String Searching and Replacing String | 9 | 40 |
171 | 9 | Formatting String, String Related Library functions | 10 | 40 | |
172 | 9 | Array | Anatomy of an Array, Index based | 11 | 40 |
173 | 9 | Associative array, Accessing array | 12 | 40 | |
174 | 9 | Element Looping with Index based array, Looping with associative array | 13 | 40 | |
175 | 9 | Working with file and Directories | Understanding file and directory , Opening and closing a file | 14 | 40 |
176 | 9 | Copying, renaming and deleting a file | 15 | 40 | |
177 | 9 | working with directories, Creating and deleting folder | 16 | 40 | |
178 | 9 | File uploading and downloading | 17 | 40 | |
179 | 9 | MySQL | MySQL database connection, Creating a table with key constraints, | 18 | 40 |
180 | 9 | dropping a table, adding | 19 | 40 | |
181 | 9 | retrieving, updating data | 20 | 40 | |
182 | 9 | deleting data, Performing additional queries (Joins and subqueries) | 21 | 40 | |
183 | 9 | Connecting to MySQL, Accessing MySQL using PHP | 22 | 40 | |
184 | 9 | Querying MySQL database with PHP | 23 | 20 | |
UNIT X CYBER SECURITY | |||||
SL.NO | UNIT | TOPIC | SUBTOPIC | TEST | NO.OF QUESTIONS |
185 | 10 | Cyber Crime | Introduction to Cyber Crime, Malware type | 1 | 40 |
186 | 10 | Cyber Crime and Cyber Security Techniques | Kinds of Cyber Crime and Authentication | 2 | 40 |
187 | 10 | Cyber Security Techniques | Encryption, Digital Signatures | 3 | 40 |
188 | 10 | Antivirus, Firewall | 4 | 40 | |
189 | 10 | Cyber Security Techniques and Password Management | Steganography and Guidelines for Secure Password | 5 | 40 |
190 | 10 | Password Management | Two Step verification, Generating Secure password | 6 | 40 |
191 | 10 | Using Password Manager, Enabling Two-step verification | 7 | 40 | |
192 | 10 | Password Management and Cryptography | Securing Computer using antivirus and Symmetric cipher model | 8 | 40 |
193 | 10 | Cryptography | cryptographic system, substitution techniques | 9 | 40 |
194 | 10 | Caesar cipher, mono alphabetic ciphers | 10 | 40 | |
195 | 10 | Hill ciphers, Transposition techniques | 11 | 40 | |
196 | 10 | steganography, Data encryption standard | 12 | 40 | |
197 | 10 | Cryptography and Attacks | The strength of DES and Investigating DoS Attacks | 13 | 40 |
198 | 10 | Attacks | Types of DoS Attacks, Classification of DoS Attacks | 14 | 40 |
199 | 10 | Techniques to Detect, DoS Attacks | 15 | 20 |
0 Comments