0% found this document useful (0 votes)
34 views5 pages

CA_TYPE_D_EM

The document is a one-mark test for Class 12 students on Computer Applications, consisting of 50 multiple-choice questions covering various topics in computer science. It includes questions about vector images, audio file formats, DTP software, PHP programming, database management, and e-commerce concepts. An answer key is provided at the end of the document for grading purposes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views5 pages

CA_TYPE_D_EM

The document is a one-mark test for Class 12 students on Computer Applications, consisting of 50 multiple-choice questions covering various topics in computer science. It includes questions about vector images, audio file formats, DTP software, PHP programming, database management, and e-commerce concepts. An answer key is provided at the end of the document for grading purposes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SIVAGANGAI DISTRICT

ONE MARK TEST D


SUBJECT:- COMPUTER APPLICATIONS TIME: 30 Min
CLASS:- 12 50*1=50 Marks
CHOOSE THE CORRECT ANSWER:
1. What is a vector image?
a) a type of image made of pixels
b) a type of image made up of geometric shapes
c) a type of image made up of text
d) a type of image made up of sound waves
2. Which of the following is an audio file format?
a) MP3 b) AVI c) MPEG d ) PNG
3. DTP stands for ______________
(a) Desktop Publishing (b) Desktop Publication
(c) Doctor To Patient (d) Desktop Printer
4. ____________ is a DTP software.
(a) Lotus 1-2-3 (b) PageMaker (c) Maya (d) Flash
5. Which menu contains the New option?
(a) File menu (b) Edit menu (c) Layout menu (d) Type menu
6. _____ command is used to reverse the action of the last command?
a) redo b) cut c) undo d)copy
7. RDBMS stands for
a) Relative Data Management System b) Regional Database Management System
c) Relational Database Management System d) Regional Database Maintenance System
8. ODBMS means
a) Object Database Management Service b) Oracle Database Management System
c) Oracle Data Maintenance System d) Object Database Management System
9. A weak entity in an ER diagram is represented by
a) Simple rectangular box b) Double rectangular boxes
c) Rhombus d) Ellipse
10. The assignment operator is ___________
a) = b) == c) === d) !=
11. Which one of the following not a Server Side Validation
a) asp b) jsp c) c++ d) php
12. _________ operators perform an action to compare two values.
a) arithmetic b) comparison c) increment d) logical
13. Which of the following statements will produce the output Hello World?
a) print(“Hello World”) b) echo(“Hello World”); c)
c)$print(“Hello World”) d) printf(“Hello World”)
14. _____ is used to create a new line in php
a) \n b) /n c) \r d) /r
15. What is the index of the first element in an indexed array in PHP?
a) 0 b) 1 c) 2 d)
16. How do you access the elements of an indexed array in PHP?
a) By using the array index in square brackets
b) By using the array key in square brackets
c) By using the array index in curly braces
d) By using the array key in curly braces
17. Which keyword is used to create an array?
a) arr() b) array() c)arr{} d) arr#
18. Which of the following is NOT a type of conditional statement in PHP?
a) if b) if ... else c) if ... elseif ... else d) while
19. What happens if the condition in an “if” statement is false?
a) The code inside the curly braces is executed.
b) The code inside the curly braces is skipped.
c) The program terminates.
d) None of the above
20. What is the purpose of the ‘increment’ part of a for loop?
a) To initialize variables b) To update variables
c) To check the condition d) To execute the code block
21. What type of loop is “do...while loop” in PHP?
a) Entry-Check Loop b) Exit-Check Loop
c) Counter Loop d) Iteration Loop
22. PHP is a _________ programming language.
(a) Object side (b) server side (c) File side (d) client side
23. What form control allows the user to select multiple values?
a) text inputs b) buttons c) checkboxes d) radio buttons
24. In PHP ________ variables collect the data and prepares the response accordingly.
a) Method b) $_GET, $_POST (c) fread(), fwrite() d) All the above
25. Which is the correct function to execute the SQL queries in PHP ?
a) mysqli_query(“Connection Object”,”SQL Query”)
b) query(“Connection Object”,”SQL Query”)
c) mysql_query(“Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)
26. Which is the not a correct MySQL Function in PHP ?
a) Mysqli_connect() Function b) Mysqli_close() Function
c) mysqli_select_data() Function d) mysqli_affected_rows() Function
27. RFID stands for ________
a) Radio Free identification b) real Frequency identity
c) Radio Frequency indicators d) Radio Frequency Identification.
28. It guarantees the sending of data is successful and which checks error on operation at OSI layer is
________
a) Application layer b) Network layer c) Transport Layer d) Physical layer
29. Encryption and Decryption protocols occur in ______ layer.
a) Session layer b) presentation layer c) application layer d) network layer
30. How many bits are used in the IPv6 addresses?
a) 32 b) 64 c) 128 d) 16
31. n the domain name, the sequence of labels is separated by
a) semicolon (;) b) dot (.) c) colon (:) d) NULL
32. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Domain c) Resolver d) Name servers
33. Which cable is used in cable TV?
a) UTP cable b) Fibre optics c) Coaxial cable d) USB cable
34. Which of the following is a small peripheral device with a sim slot to connect the computers to
internet?
a)USB b) Dongles c) Memory card d) Mobiles
35. Which wiring standard is used for connecting two computers directly?
a) straight Through wiring b) Cross Over wiring c)Rollover wiring d) None
36. Which of the following is a open source network monitoring software?
a) C++ b) OPNET c) Open NMS d) OMNet++
37. Open NMS was released in …………………
a) 1999 b) 2000 c) 2003 d) 2004
38. Free software is a concept developed in the 1980s by an MIT computer science researcher____
a) Richard Stallman b) Paul V. Mogabatris
c) John Postel d) Elan musk
39. Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
40. Which of the following is a characteristics of E-Commerce
a) Products can be inspected physically before purchase.
b) Goods are delivered instantly.
c) Resource focus supply side
d) Scope of business is global.
41. _______ is Fusion of television, computer and telecom networking technologies.
a) Teleputer b) computer c) FinTech d) Fax
42. Assertion (A): Macro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
43. Which of the following is a online payment system for small payments.
a) Card based payment b) Micro electronic payment
c) Macro electronic payment d) Credit card payment
44. Which of the following is true about Virtual payment address (VPA)
a) Customers can use their e-mail id as VPA
b) VPA does not includes numbers
c) VPA is a unique ID
d) Multiple bank accounts cannot have single VPA
45. Expansion of UPI
a) Universal Payments Interface b) Unified Payments Interchange
c) Unified Payments Interface d) Universal Payroll Interface
46. PGP stands for
a) Pretty Good Privacy b) Pretty Good Person
c) Private Good Privacy d) Private Good Person
47. _______ protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET) b) Credit Card Verification
c) Symmetric Key Encryption d) Public Key Encryption
48. Who is called as the father of EDI?
a) Charles Babbage b) Ed Guilbert c) Pascal d) None
49. In 1985, UN created _______to assist with the global reach of technology in E-Commerce.
a) EFT b) TDCC c) UN/EDIFACT d) ANSI X12
50. Every EDI message consists of _______ English Alphabets.
a) 6 b) 7 c) 8 d) 5
SIVAGANGAI DISTRICT
ONE MARK TEST D
SUBJECT: COMPUTER APPLICATIONS CLASS: 12
KEY ANSWER
1. a) a type of image made of pixels
2. a) MP3
3. (a) Desktop Publishing
4. (b) PageMaker
5. (a) File menu
6. c) undo
7. c) Relational Database Management System
8. d) Object Database Management System
9. b) Double rectangular boxes
10. a) =
11. c) c++
12. b) comparison
13. b) echo(“Hello World”);
14. a) \n
15. a) 0
16. a) By using the array index in square brackets
17. b) array()
18. d) while
19. b) The code inside the curly braces is skipped.
20. b) To update variables
21. b) Exit-Check Loop
22. (b) server side
23. c) checkboxes
24. b) $_GET, $_POST
25. a) mysqli_query(“Connection Object”,”SQL Query”)
26. c) mysqli_select_data() Function
27. d) Radio Frequency Identification.
28. c) Transport Layer
29. b) presentation layer
30. c) 128
31. b) dot (.)
32. c) Resolver
33. c) Coaxial cable
34. b) Dongles
35. b) Cross Over wiring
36. c) Open NMS
37. a) 1999
38. a) Richard Stallman
39. d) Work outsourced to a third party outside its own country
40. b) Goods are delivered instantly.
41. a) Teleputer
42. a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
43. c) Macro electronic payment
44. a)VPA does not includes numbers
45. c) Unified Payments Interface
46. a) Pretty Good Privacy
47. a) Secure Electronic Transaction (SET)
48. b) Ed Guilbert
49. c) UN/EDIFACT
50. a) 6

You might also like