0% found this document useful (0 votes)
2K views11 pages

11th Computer Science EM Book Back 1 Mark Questions English Medium PDF Download

The document provides information about computer science concepts in the form of multiple choice questions. It contains 17 questions related to topics like input/output devices, memory types, binary, hexadecimal, logic gates and components of a computer. The questions are about identifying devices, conversions between numeric systems, properties of logic gates, memory types and parts of a microprocessor.

Uploaded by

suthannaagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views11 pages

11th Computer Science EM Book Back 1 Mark Questions English Medium PDF Download

The document provides information about computer science concepts in the form of multiple choice questions. It contains 17 questions related to topics like input/output devices, memory types, binary, hexadecimal, logic gates and components of a computer. The questions are about identifying devices, conversions between numeric systems, properties of logic gates, memory types and parts of a microprocessor.

Uploaded by

suthannaagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

ww.. ww..

wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N N e et t XI STANDARD COMPUTER SCIENCE N NeetCHAPTER
t
lalai .
i . l a
l ai .
i . 1 – 18
l a
l i
a
assaa 1. Identify aa aa
BOOK BACK ONE MARK TEST
the input device?
dda as s d a
d s
a s
a) Printer b) P
. . Paa
Mouse c) Plotter d)
. P
. P a
Projector a
2. Expansion for ASCII w w w w
www
a) American School
w Code for Information Interchange wwww
b) American Standard Code for Information Interchange
c) All Standard Code for Information Interchange

N Nett
e N Neett
d) American Society Code for Information Interchange

lalai.i.
3. Name the volatile memory?
l a
l i
a .i. l a
l i
a

et
assaa s aa
s s aa
s
a) ROM b) PROM c) RAM d) EPROM

aaddaa ad
a a
d a
4. How many characters can be handled in Binary Coded Decimal System?
. P
.P . P
. P

.N
a) 64
w w
w b) 255
ww
c) 256
w d) 128

a) F www
5. For 11012 what is the Hexadecimal equivalent?
b) E www
c) D d) B

lai
6. 2^50 is referred as
a) Kilo b) Tera c) Peta d) Zetta
eett
7. What is the 1‘s complement of 00100110?
N N N Neett
l a
l i
a .i. a) 00100110
l a
l i
a
b) 11011001 .i. c) 11010001
l a
l i
a d) 00101001
sa
assaa a) 645
aaddaasaa
s
8. Which amongst this is not an octal number?
b) 234 c) 876
aaddaassaa
d) 123

ww. P
. P w
w . P
. P
9. Which is a basic electronic circuit which operates on one or more signals?
w
www w
www
da

a) Boolean algebra b) Gate c) Fundamental gates d) Derived gates


10. Which gate is called as the logical inverter?
a) AND b) OR c) NOT d) XNOR
Pa

N N ett
11. A + A = ?
e N Neett
l a
l i
a .i. a) A b) O
l a
lai .i. c) 1
l a
l i
a
d) A

assaa aa aa
12. Which one of the following is the main memory?
a) ROM
ddaass
b) RAM
a
c) Flash drive
dd ass d) Hard disk
aa aa
w.

a) 1000
ww P P
13. How many bytes does 1 Kilo Byte contain?
. . b) 8
w
w
c) 4. P
. P d) 1024
w
www
14. NOR is a combination of? w
www
ww

a) NOT(OR) b)NOT(AND) c) NOT(NOT) d) NOT(NOR)


15. NAND is called as ________ Gate

N Neett
a) Fundamental Gate b) Derived Gate
N Neett c) Logical Gate d) Electronic gate

l a
l i
a .i. l lai.i.
16. Which of the following is said to be the brain of a computer?
a l a
l i
a
assaa aa aa
a) Input devices b) Output devices c) Memory device d) Microprocessor

ddaass d a
d
17. Which of the following is not the part of a microprocessor unit?s
a s
a) ALU
.P. Paab) Control unit
. P
. Paa
c) Cache memory d) register

w w
w w w
w
www www
18. How many bits constitute a word?
a) 8 b) 16 c) 32 d) determined by the processor used
19. Which generation of computer used IC‘s?
a) First b) Second c) Third d) Fourth

N Neett N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 1

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N Neett N Neett
lalai .i. l a
l i
a .i. l a
l i
20. Which of the following device identifies the location when address is placed in the memory address
a
assaa aa aa
register?
a) Locator
d aass
b) Encoder
d d aas
c) Decoder
d s d) Multiplexer

. P Paa
21. Which of the following is a CISC processor?
. .P.Paa
a) Intel P6
www b) AMD K6
w w
w c) Pentium III d) Pentium IV

a) Byte
www b) Nibble
www
22. Which refers to the number of bits processed by a computer‘s CPU?
c) Word length d) Bit
23. Which is the fastest memory?

N Nett
a) Hard disk
e b) Main memory
N Neett c) Cache memory d) Blue-Ray disc

lalai.i.
24. Identify the output device?
l a
l i
a .i. l a
l i
a

et
assaa aa aa
a) Keyboard b) Memory c) Monitor d) Mouse

ddas
a s d a
d s
a s
25. How many memory locations are identified by a processor with 8 bits address bus at a time?
a) 28
. P
.Paa b) 1024
. P
. Paa
c) 256 d) 8000

.N
w w
w www
www www
26. What is the capacity of 12cm diameter DVD with single sided and single layer?
a) 4.7 GB b) 5.5 GB c) 7.8GB d) 2.2 GB
27. What is the smallest size of data represented in a CD?

lai
a) Blocks b) Sectors c) Pits d) Tracks

Neett N Neett
28. _________ Output device is used for printing building plan, flex board, etc.
N
l a
l i
a .i.
a) Thermal printer
l a
b) Plotter
l i
a .i. c) Dot matrix
l a
l i
a d) Inkjet printer
sa
assaa saa
s ssaa
29. Display devices are connected to the computer through.
a) USB port
aaddaa
b) PS/2 port
a ddaa
c) SCSI port
a d) VGA connector
.
30. Operating system is a
ww P
. P w
w . P
. P
w
www w
www
da

a) Application Software b) Hardware c) System Software d) Component


31. Identify the usage of Operating Systems
a) Easy interaction between the human and computer b) Controlling input & output Devices
c) Managing use of main memory d) All the above
Pa

Neett N Neett
32. Which of the following is not a function of an Operating System?
N
l a
l i
a .i.
a) Process Management
l a
lai .i. l a
l i
a
b) Memory Management

assaa ssaa saa


s
c) Security management d) Complier Environment

ad
adaa aaddaa
w.

33. Which of the following OS is a commercially licensed Operating system?


a) Windows
ww. P
. P b) UBUNTU
w
w . P
. P
c) FEDORA d) REDHAT
w
www w
www
34. Which of the following Operating systems support Mobile Devices?
a) Windows 7 b) Linux c) BOSS d) iOS
ww

35. File Management manages


a) Files b) Folders c) Directory systems d) All the Above

N Neett N Neett
36. When a system restarts which type of booting is used?

l a
l i
a .i.
a) Warm booting
l a
lai.i.
b) Cold booting
l
c) Touch boot
a
l i
a d) Real boot.

assaa aasaa
s
37. Interactive Operating System provides
aadd
a) Graphics User Interface (GUI)
ad
a a
d s
a aa
s b) Data Distribution

w
w .P
c) Security Management. P w
w. P
. P d) Real Time Processing
w
www
38. An Example for single task operating system is
a) Linux b) Windows
w
www c) MS – DOS d) Unix
39. The File Management used by Linux is

N Neett
a) ext2 b) NTFS

N N e e tt
c) FAT d) NFTS

lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 2

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N Neett N Neett
lalai .i. l a
l i
a .i. l a
l i
40. From the options given below, choose the operations managed by the operating system.
a
assaa aa aa
a) Memory b) Processor c) I/O devices d) All of the above

ddaass d aass
41. Which is the default folder for many Windows Applications to save your file?
d
a) My Document
. P
. Paa b) My Pictures
.P Paa
c) Documents and Settings d) My Computer
.
www w w
w
42. Under which of the following OS, the option Shift + Delete – permanently deletes a file or folder?
a) Windows 7 www b) Windows 8 www
43. What is the meaning of "Hibernate" in Windows XP/Windows 7?
c) Windows10 d) None of the OS

a) Restart the Computer in safe mode

N Nett
b) Restart the Computer in hibernate mode
e N Neett
lalai.i. l l i
a .i.
c) Shutdown the Computer terminating all the running applications
a l a
l i
a

et
assaa aa aa
d) Shutdown the Computer without closing the running applications

ddas
a s
44. The Shortcut Key used to rename a file in Windows?
d a
d s
a s
a) F2
. P
.Paa b) F4
. P
. Paa
c) F5 d) F6

.N
w w
w www
www www
45. Which of the following activities is algorithmic in nature?
a) Assemble a bicycle. b) Describe a bicycle.
c) Label the parts of a bicycle. d) Explain how a bicycle works.

lai
46. Which of the following activities is not algorithmic in nature?

eett
a) Multiply two numbers.
N N N Neett b) Draw a kolam.

l a
l i
a .i.
c) Walk in the park.
l a
l i
a .i. l a
l i
ad) Swapping of Two Numbers
sa
assaa saa
s ssaa
47. Omitting details inessential to the task and representing only the essential features of the task is
known as
aaddaa aaddaa
a) Specification
ww. P
. P b) Abstraction
w
w . P
. P
c) Composition d) Decomposition
w
www w
www
da

48. Stating the input property and the as:-output relation a problem is known
a) Specification b) Statement c) Algorithm d) Definition
49. Ensuring the input-output relation is
a) The responsibility of the algorithm and the right of the user.
Pa

Neett N Neett
b) The responsibility of the user and the right of the algorithm.
N
l a
l i
a .i. l aai .i.
c) The responsibility of the algorithm but not the right of the user.
l l a
l i
a
assaa ssaa saa
s
d) The responsibility of both the user and the algorithm.

ad
adaa aaddaa
w.

50. If i = 5 before the assignment i := i-1 after the assignment, the value of i is
a) 5
ww. P
. P b) 4
w
w . P
. P
c) 3 d) 2
51. Expand POST w
www
a) Post on self Test
w
www
b) Power on Software Test c) Power on Self Test d) Power on Self Text
ww

52. If 0 < i before the assignment i := i-1 after the assignment, we can conclude that
a) 0 < i b) 0 ≤ i c) i = 0 d) 0 ≥i

N Neett N Neett
53. Suppose u, v = 10, 5 before the assignment. What are the values of u and v after the sequence of

l a
l i
a .i.
assignments?
l a
lai.i. l a
l i
a
assaa 1 u := v
2 v := u
aaddaasaa
s
ad
a a
d s
a aa
s
a) u, v = 5 ,5
w
w .P. P b) u, v = 5 ,10
w
w. P
. P
c) u, v = 10 ,5 d) u, v = 10 ,10
w
www w
www
54. Which of the following properties is true after the assignment (at line3)?
1 -- i+j = 0
2 i, j := i+1, j-1

N N ett
3 -- ?
e N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 3

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N N e e t
>0t
N N e et
=0 t
lalai . .a) i+j b) i+j < 0
55.i If C1 is false and C2 is true, the compound statement
l a
l ai .
i .
c) i+j d) i = j
l a
l i
a
assaa 12 ifS1C1 a ad da as aa
s
a a ddaassaa
w w . P. P w
w .P.P
3 else
4 if C2 w w ww w
w w
w
5 S2
6 else

N Nett
7 S3 executes
e N Neett
lalai.i. a) S1
l a
l i
a .
i
b) S2
. c) S3
d) none
l a
l i
a

et
assaa aa aa
56. If C is false just before the loop, the control flows through
1 S1
ddas
a s d d aa s s
2 while C
. P
.Paa . P
. P a a

.N
w w
w w w w
www wwwd) S1 ; S2 ; S2 ; S2 ; S3
3 S2
4 S3
a) S1 ; S3 b) S1 ; S2 ; S3 c)S1 ; S2 ; S2 ; S3

lai
57. If C is true, S1 is executed in both the flowcharts, but S2 is executed in

N Neett N Neett
l a
l i
a .i. l a
l i
a .i. l a
l i
a
sa
assaa aaddaasaa
s
aaddaassaa
ww. P
. P w
w . P
. P
w
www w
www
da
Pa

N Neett N N e e tt
l a
l i
a .i. l a
lai .i. l a
l i
a
assaa a) (1) only ab) d
a da as saa
aa d d a asaa
s
w.

(2) only c) both (1) and (2) d) neither (1) nor (2)

ww P. P
58. How many times the loop is.iterated?
w w . P. P
i := 0
ww w w w w w
w
ww

while i ≠ 5
i := i + 1

N Neett
a) 4 b) 5

N Neett c) 6 d) 0

l a
l i
a .i.
59. A loop invariant need not be true
l a
lai.i. l a
l i
a
assaa aa aa
a) At the start of the loop. b) At the start of each iteration

a
c) At the end of each iteration
dd ass d a
d s
a sd) At the start of the algorithm

.P. Paa . P
. Paa
60. We wish to cover a chessboard with dominoes, the number of black squares and the number of white

w w
w w w
w
squares covered by dominoes, respectively, placing a domino can be modeled by
a) b := b + 2
www b) w := w + 2
www c) b, w := b+1, w+1 d) b := w
61. If m x a + n x b is an invariant for the assignment a, b : = a + 8, b + 7, the values of m and n are
a) m = 8, n = 7 b) m = 7, n = -8 c) m = 7, n = 8 d) m = 8, n = -7

N Neett N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 4

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N Neett N Neett
lalai .i. l a
l i
a .i. l a
l i
62. Which of the following is not an invariant of the assignment? m, n := m+2, n+3
a
assaa aa aa
a) m mod 2 b) n mod 3 c) 3 X m - 2 X n d) 2 X m - 3 X n

d aass
63. If Fibonacci number is defined recursively as
d ddaass
{
. P
. Paa .P.Paa
0n=0
www w w
w
1n=1 www
F(n — 1) + F(n — 2) otherwise
www
F (n)= to evaluate F(4), how many times F() is applied?

N Nett
a) 3
e b) 4
N Neett c) 8 d) 9

lalai.i.
64. Using this recursive definition
l a
l i
a .i. l a
l i
a

et
assaa aa aa
{
1 if n = 0
ddas
a s d a
d s
a s
a x an -1 otherwise
. P
.Paa . P
. Paa

.N
w w
w www
www www
a n= how many multiplications are needed to calculate a10?
a) 11 b) 10 c) 9 d) 8
65. Who developed C++?

lai
a) Charles Babbage b) Bjarne Stroustrup c) Bill Gates d) Sundar Pichai

eett
66. What was the original name given to C++?
N N N Neett
l a
l i
a .i.
a) CPP
l a
l i
a .i.
b) Advanced C
a i
c) C with Classes
l l a d) Class with C
sa
assaa saa
s ssaa
67. Who coined C++?
a) Rick Mascitti
aaddaa b) Rick Bjarne
a ddaa
c) Bill Gates
a d) Dennis Ritchie

ww. P
. P
68. The smallest individual unit in a program is:
w
w . P
. P
w
www w
www
da

a) Program b) Algorithm c) Flowchart d) Tokens


69. Which of the following operator is extraction operator of C++?
a) >> b) << c) <> d) ^^
70. Which of the following statements is not true?
Pa

Neett N Neett
a) Keywords are the reserved words convey specific meaning to the C++ compiler.
N
l a
l i
a .i. l aai .i.
b) Reserved words or keywords can be used as an identifier name.
l l a
l i
a
assaa ssaa saa
s
c) An integer constant must have at least one digit without a decimal point.

ad
adaa aaddaa
w.

d) Exponent form of real constants consists of two parts

w . P
. P
71. Which of the following is a valid string literal?
w w
w . P
. P
a) ‗A‘ w
www b) ‗Welcome‘ w
www
72. A program written in high level language is called as
c) 1232 d) ―1232‖
ww

a) Object code b) Source code c) Executable code d) All the above


73. Assume a=5, b=6; what will be result of a&b?

N Ne
a) 4ett b) 5
N Neett c) 1 d) 0

l a
l i
a .i. l a
lai.i.
74. Which of the following is called as compile time operators?
l a
l i
a
assaa a) sizeof
aaddaasaa
s b) pointer
75. How many categories of data types available in C++? a s
a aa
s
c) virtual
ad
a d
d) this

a) 5
w
w .P. P b) 4
w
w. P
. P
c) 3 d) 2
w
www w
www
76. Which of the following data types is not a fundamental type?
a) signed b) int c) float d) char

N Neett N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 5

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N Neett N Neett
lalai .i.
char ch= ‗B‘; l l i
a .i.
77. What will be the result of following statement?
a l a
l i
a
assaa cout << (int) ch;
aaddaassaa
aaddaassaa
a) B
ww. P
. P b) b
w
w .P.P
c) 65 d) 66

a) F w b) C w
78. Which of the character is used as suffix to indicate a floating point value?
www www c) L d) D
79. How many bytes of memory allocates for the following variable declaration if you are using Dev
C++?

N Nett
short int x;
e N Neett
lalai.i.a) 2
l a
l i
b) 4
a .i. c) 6
l a
l i
a
d) 8

et
assaa aa aa
80. What is the output of the following snippet?
char ch = ‗A‘;
ddas
a s d a
d s
a s
ch = ch + 1;
. P
.Paa . P
. Paa

.N
w w
w www
www www
cout<<ch;
a) B b) A1 c) F d) 1A
81. Which of the following is not a data type modifier?

lai
a) signed b) int c) long d) short

Neett N Neett
82. Which of the following operator returns the size of the data type?
N
l a
l i
a .i.
a) sizeof( )
l a
l i
a .i.
b) int ( ) c) long ( )
l a
l i
a d) double ( )
sa
assaa saa
s ssaa
83. Which operator to be used to access reference of a variable?
a) $
aaddaa b) #
a
c) &
addaa d) !

ww. P
. P
84. This can be used as alternate to endl command:
w
w . P
. P
w
www w
www
da

a) \t b) \b c) \0 d) \n
85. What is the alternate name of null statement?
a) No statement b) Empty statement c) Void statement d) Zero statement
86. In C++, the group of statements should enclose within:
Pa

N Neett
a) { } b) [ ]
N Neett c) ( ) d) < >

l a
l i
a .i. l a
lai .i. l a i
a
87. The set of statements that are executed again and again in iteration is called as:
l
assaa ssaa saa
s
a) Condition b) Loop c) Statement d) Body of loop

ad
adaa aaddaa
w.

88. The multi way branching statement:


a) if
ww. P
. P b) if … else
w
w . P
. P
c) switch d) for
w
www
89. How many types of iteration statements?
a) 2 b) 3
w
www c) 4 d) 5
ww

90. How many times the following loop will execute? for (int i=0; i<10; i++)
a) 0 b) 10 c) 9 d) 11

N Neett N Neett
91. Which of the following is the exit control loop?

l a
l i
a .i.
a) For
l a
lai.i.
b) while
l
c) do…while
a
l i
a d) if…else

assaa a) Break
aaddaasaa
s
92. Identify the odd one from the keywords of jump statements:
b) Switch
ad
a a
d s
a
c) goto
aa
s d) continue

w
w .P. P
93. Which of the following is the entry control loop?
w
w. P
. P
a) do-while w
www b) for
94. A loop that contains another loop inside its body:
w
www c) while d) if-else

a) Nested loop b) Inner loop c) Inline loop d) Nesting of loop

N Neett N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 6

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N Neett N Neett
lalai .i. l a
l i
a .i. l a
l i
95. Which of the following header file defines the standard I/O predefined functions?
a
assaa aa aa
a) stdio.h b) math.h c) string.h d) ctype.h

ddaass d aass
96. Which function is used to check whether a character is alphanumeric or not.
d
a) isalpha()
. P
. Paa b) isdigit()
.P.Paa
c) isalnum() d) islower()

www
97. Which function begins the program execution?
w w
w
a) isalpha() www b) isdigit()www c) main()
98. Which of the following function is with a return value and without any argument?
d) islower()

a) x=display(int, int) b) x=display() c) y=display(float) d) display(int)

N Nett
e N Neett
99. Which is return data type of the function prototype of add(int, int);?

lalai.i.a) int
l a
l i
a .i.
b) float c) char
l a
l i
a
d) double

et
assaa aa aa
100. Which of the following is the scope operator?
a) >
ddas
a s b) &
d a
d
c) % s
a s d) ::

. P
.Paa . P
. Paa
101. Which of the following is the collection of variables of the same type that are referenced by a

.N
w w
w www
www www
common name?
a) int b) float c) Array d) class
102. int age[]={6,90,20,18,2}; How many elements are there in this array?

lai
a) 2 b) 5 c) 6 d) 4

Neett N Neett
103. cin>>n[3]; To which element does this statement accepts the value?
N
l a
l i
a .i.
a) 2
l a
l i
a .i.
b) 3 c) 4
l a
l i
a d) 5
sa
assaa saa
s ssaa
104. By default, the string ends with which character?
a)\0
aaddaa b) \t
a dd
c) \n
a aa d) \b

ww. P
. P
105. Structure definition is terminated by
w
w . P
. P
w
www w
www
da

a) : b) } c) ; d) ::
106. What will happen when the structure is declared?
a) It will not allocate any memory b) It will allocate the memory
c) It will be declared and initialized d) It will be only declared
Pa

eett
A structure declaration is given below.
N N N Neett
l a
l i
a .i.
struct Time
l a
lai .i. l a
l i
a
assaa ssaa saa
s
{

ad
adaa aaddaa
w.

int hours;
int minutes;
ww. P
. P w
w . P
. P
int seconds;
}t;
w
www w
www
ww

107. Using above declaration which of the following refers to seconds.


a) Time.seconds b) Time::seconds c) Seconds d) t. seconds

N Neett N Neett
108. Which of the following is a properly defined structure?

l a
l i
a .i.
a) struct {int num;}
l a
lai.i. l a
l i
a
b) struct sum {int num;} c) struct sum int sum; d)struct sum {int num;};

assaa aasaa
s
A structure declaration is given below.
struct employee
aadd ad
a a
d s
a aa
s
{
w
w .P. P w
w. P
. P
int empno;
char ename[10];
w
www w
www
}e[5];

N N ett N N e tt
109. Using above declaration which of the following statement is correct.
e e
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 7

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N N ee tt N N e e tb)tcout<<e[0].empno<<ename;
lalai .i.c)cout<<e[0]->empno<<e[0]->ename;
a) cout<<e[0].empno<<e[0].ename;
l a
l ai .i. d) cout<<e.empno<<e.ename; l a
l i
a
assaa 110.a) Structure d aa s
When accessing a structure member, the
a
b)a d saa to the left of the dot operator is the name ofaassaa
identifier
c) Structure Member d) Structureaad d
Variable
111. The term is used to w
w . P P Structure Tag
. a programming approach based on classes andwobjects
ww . P P
.is Function

a) OOP w w w describe
w b) POP c) ADT ww w d) SOP
112. The paradigm which aims more at procedures is _________.
a) Object Oriented Programming b) Procedural programming

N Nett
c) Modular programming
e N Neett d) Structural programming

lalai.i. l l i
a .i.
113. Which of the following is a user defined data type?
a l a
l i
a

et
assaa aa aa
a) Class b) Float c) Int d) Object

ddas
a s d a
d s
a s
114. The identifiable entity with some characteristics and behavior is.
a) Class
. P
.Paa b) Object
. P
. Paa
c) Structure d) Member

.N
w w
w www
www www
115. The mechanism by which the data and functions are bound together into a single unit is known as
a) Inheritance b) Encapsulation c) Polymorphism d) Abstraction
116. Insulation of the data from direct access by the program is called as

lai
a) Data hiding b) Encapsulation c) Polymorphism d) Abstraction

Neett N Neett
117. Which of the following concept encapsulate all the essential properties of the object that are to be
N
l a
l i
a .i.created?
l a
l i
a .i. l a
l i
a
sa
assaa saa
s ssaa
a) Class b) Encapsulation c) Polymorphism d) Abstraction

aaddaa a ddaa
118. Which of the following is the most important advantage of inheritance?
a
a) Data hiding
ww. P
. P w
w . P
. P
b) Code reusability c) Code modification d) Accessibility
w
www w
www
da

119. ―Write once and use it multiple time‖ can be achieved by


a) Redundancy b) Reusability c) Modification d) Composition
120. Which of the following supports the transitive nature of data?
a) Inheritance b) Encapsulation c) Polymorphism d) Abstraction
Pa

Neett N Neett
121. The variables declared inside the class are known as data members and the functions are known as
N
l a
l i
a .i.a) Data functions
l aai .i.
b) Inline functions
l l a i
a
c) Member Functions
l d) attributes

assaa ssaa saa


s
122. Which of the following statements about member functions are true or false?

ad
adaa aaddaa
w.

i) A member function can call another member function directly with using the dot operator.

ww. P
. P w . P
. P
ii) Member function can access the private data of the class.
w
w
www
a) i-True, ii-True w
www
b) i-False, ii-True c) i-True, ii-False d) i-False, ii-False
123. A member function can call another member function directly, without using the dot operator
ww

called as
a) Sub function b) Sub member

N Neett
c) Nesting of member function
N Neett d) Sibling of member function

l a
l i
a .i. l a
lai.i.
124. The member function defined within the class behave like
l a
l i
a
assaa a) Inline functions
aaddaasaa
s a s
a aa
s
b) Non inline function c) Outline function d) Data function
ad
a d
125. Which of the following Access Specifier protects data from inadvertent modifications?
a) Private
w
w .P. P b) Protected
w
w. P
. P
c) Public d) Global
class x
{
w
www w
www
int y;

N N ett
public:
e N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 8

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
Nx(inte
N ett N Neett
lalai .i.{ z)
l a
l i
a .i. l a
l i
a
assaa y=z; aaddaassaa
aaddaassaa
}
ww. P
. P w
w .P.P
} x1[4];
int main() w
www w
www
{
x x2[10];

N Nett
return 0;
e N Neett
lalai.i. }
l a
l i
a .i. l a
l i
a

et
assaa aa aa
126. How many objects are created for the above program
a) 10
ddas
a s b) 14
d a
d s
a s
c) 5 d) 2

. P
.Paa . P
. Paa
127. State whether the following statements about the constructor are true or false.

.N
w w
w www
www www
iii) Constructors should be declared in the private section.
iv) Constructors are invoked automatically when the objects are created.
a) True, True b) True, False c) False, True d) False, False

lai
128. Which of the following constructor is executed for the following prototype?

N eett
add display( add &); // add is a class name
N N Neett
l a
l i
a .i.a) Default constructor
l a
l i
a .i. a i
b) Parameterized constructor
l l a
sa
assaa saa
s ssaa
c) Copy constructor d) Non Parameterized constructor

aaddaa a ddaa
129. Which of the following refers to a function having more than one distinct meaning?
a
. P
.
a) Function overloading
ww P w
w . P
. P b) Member overloading
w
www w
www
da

c) Operator overloading d) Operations overloading


130. Which of the following reduces the number of comparisons in a program?
a) Operator overloading b) Operations overloading
c) Function overloading d) Member overloading
Pa

N eett
void dispchar(char ch=‘$‘,int size=10)
N N Neett
l a
l i
a .i.{
l a
lai .i. l a
l i
a
assaa ssaa saa
s
for(int i=1;i<=size;i++)

ad
adaa aaddaa
w.

cout<<ch;
}
ww. P
. P w
w . P
. P
w
www w
www
131. How will you invoke the function dispchar() for the following input?
To print $ for 10 times
ww

a) dispchar(); b) dispchar(ch,size); c) dispchar($,10); d)dispchar(‗$‘,10 times);


132. Which of the following is not true with respect to function overloading?

N Neett N Neett
a) The overloaded functions must differ in their signature.

l a
l i
a .i. l a
lai.i.
b) The return type is also considered for overloading a function.
l a
l i
a
assaa aaddaasaa
s
d) Destructor function cannot be overloaded.
ad
a a
d s
a aa
s
c) The default arguments of overloaded functions are not considered for Overloading.

w
w .P. P w
w. P
. P
133. Which of the following is invalid prototype for function overloading
w
www
a) void fun (intx);
void fun (char ch) ;
b) void fun (int x);
void fun (int y);
w
www
c) void fun (double d);
void fun (char ch);
d) void fun (double d);
void fun (inty);
134. Which of the following is the process of creating new classes from an existing class?

N Neett
a) Polymorphism b) Inheritance

N N e e tt
c) Encapsulation d) super class

lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 9

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N Neett N Neett
lalai .i. l a
l i
a .i. l a
l i
135. Which of the following derives a class student from the base class school?
a
assaa aa aa
a) school: student b) class student : public school
c) student : public school
ddaass ddaass d) class school : public student

. P
. Paa .P Paa
136. The type of inheritance that reflects the transitive nature is
.
www
a) Single Inheritance
w w
w
b) Multiple Inheritance c) Multilevel Inheritance d) Hybrid Inheritance
www www
137. Which visibility mode should be used when you want the features of the base class to be available
to the derived class but not to the classes that are derived from the derived class?
a) Private b) Public c) Protected d) All of these

N Nett
e N Neett
138. Inheritance is process of creating new class from

lalai.i.
a) Base class b) Abstract
l a
l i
a .i. c) Derived class
l a
l i
a
d) Function

et
assaa aa aa
139. A class is derived from a class which is a derived class itself, and then this is referred to as

ddas
a s d a
d s
a s
a) Multiple Inheritance b) Multilevel Inheritance c) Single Inheritance d) Double Inheritance

. P
.Paa
140. Which one of the following is used to in ATM Machines?
. P
. Paa

.N
w w
w www
www www
a) Touch Screen b) Speaker c) Monitor d) Printer
141. Which amongst the following is executed in the order of inheritance?
a) Destructor b) Member function c) Constructor d) Object

lai
142. Which of the following is true with respect to inheritance?

Neett N Neett
a) Private members of base class are inherited to the derived class with private
N
l a
l i
a .i. l a
l i
a .i. l a
l i
b) Private members of base class are not inherited to the derived class with private accessibility
a
sa
assaa saa
s ssaa
c) Public members of base class are inherited but not visible to the derived class

aaddaa a ddaa
d) Protected members of base class are inherited but not visible to the outside class
a
ww. P
. P w
w . P
. P
143. Based on the following class declaration answer the questions (from9.1 o 9.4)
w
www w
www
da

class vehicle
{
int wheels;
public:
Pa

eett
void input_data(float,float);
N N N Neett
l a
l i
a .i.
void output_data();
l a
lai .i. l a
l i
a
assaa ssaa saa
s
protected:

ad
adaa aaddaa
w.

int passenger;
};
ww. P
. P w
w . P
. P
w
www
class heavy_vehicle : protected vehicle
{
w
www
ww

int diesel_petrol;
protected:

N Neett
int load;
N Neett
l a
l i
a .i.
protected:
l a
lai.i. l a
l i
a
assaa int load;
public:
aaddaasaa
s
ad
a a
d s
a aa
s
w
w .P. P
void read_data(float,float)
w
w. P
. P
void write_data();
};
w
www w
www
class bus: private heavy_vehicle
{

N Neett N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 10

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]
ww.. ww..
wwww wwww
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL,


KUMBAKONAM – 612 001
N N e e tt N Neett
lalai .i.public:
charTicket[20];
l a
l i
a .i. l a
l i
a
assaa void fetch_data(char);
a ad d aa ssaa
aaddaassaa
void display_data();
w
w . P
. P w
w .P.P
};
}; w w w w w
w w
w
144. Which is the base class of the class heavy_vehicle?
a) bus b) heavy_vehicle c) vehicle d) both (a) and (c)

N Nett
e N Neett
146. The data member that can be accessed from the function displaydata()

lalai.i.a) passenger b) load


l a
l i
a .i. c) Ticket
l a
l i
a
d) All of these

et
assaa aa aa
147. The member function that can be accessed by an objects of bus Class is
a) input_data() ,
ddas
a s d a
d s
a s
b) read_data() ,output_data()write_data()

. P
.Paa
c) fetch_data(), display_data()
. P
. Paa
d) All of these

.N
w w
w www
www www
148. The member function that is inherited as public by Class Bus
a) input_data() , b) read_data() , output_data()write_data()
c) fetch_data(), display_data() d) None of these

lai
149. Which of the following deals with procedures, practices and values?

N Neett
a) Piracy b) Programs
N Neett c) Virus d) Computer ethics

l a
l i
a .i. l a
l i
a .i. l a
150. Commercial programs made available to the public illegally are known as
l i
a
sa
assaa saa
s ssaa
a) Freeware b) Warez c) Free software d) Software

aaddaa a ddaa
151. Which one of the following are self-repeating and do not require a computer program to attach
a
themselves?
ww. P
. P w
w . P
. P
w
www w
www
da

a) Viruses b) Worms c) Spyware d) Trojans


152. Which one of the following tracks a user visits a website?
a) Spyware b) Cookies c) Worms d) Trojans
153. Which of the following is not a malicious program on computer systems?
Pa

N Neett
a) Worms b) Trojans
N Neett c) Spyware d) Cookies

l a
l i
a .i. l a
lai .i. l a i
a
154. A computer network security that monitors and controls incoming and outgoing traffic is
l
assaa ssaa saa
s
a) Cookies b) Virus c) Firewall d) Worms

ad
adaa aaddaa
w.

155. The process of converting cipher text to plain text is called


a) Encryption
ww. P
. P b) Decryption
w
c) Key
w . P
. P d) Proxy server
w
www
156. E-commerce means
a) Electronic commerce
w
www b) Electronic data exchange
ww

c) Electric data exchange d) Electronic commercialization.


145. First generation computers used _________

N Neett
a) Vacuum tubes b) Transistors
N Neettc) Integrated circuits d) Microprocessors

l a
l i
a .i. l a
lai.i.
157. Distributing unwanted e-mail to others is called.
l a
l i
a
assaa a) Scam
a aasaa
s
b) Spam

add
c) Fraud
158. Legal recognition for transactions are carried out by
ad
a a
d s
a aa
s d) Spoofing

w
w .P. P
a) Electronic Data Interchange
w
w. P
. P b) Electronic Data Exchange
w
www
c) Electronic Data Transfer w
www d) Electrical Data Interchange

N Neett N N e e tt
lalai.i. l a
l i
a .i. l a
l i
a
assaa d d aas saa
CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334
daassaa Page 11

Kindly send me your PP a a


questions and answerkeys to us : PP da
[email protected]

You might also like