Computer System Configuration Quiz
Computer System Configuration Quiz
17. Which among the following motherboards have slot type and PGA type processorsockets
1. is directly accessed and manipulated by the CPU during program execution a. ATX motherboard
a. RAM b. Cache b. Baby AT motherboard
c. Primary memory d. Registers c. XT motherboard
2. is known as CPU’s working memory d. AT motherboard
a. Cache b. Primary Memory 18. Choose the component not present in Baby AT motherboard
c. Register d. secondary memory a. Slot type processor sockets and PGA processor sockets
3. is referenced by the CPU without address. b. SDRAM slots and DDRRAM slots
a. RAM b. Primary Memory c. PCI slots and ISA slots
c. hard disk c. Registers d. AGP slots
4. Which component of computer co-ordinates overall functioning of the computer. 19. Which one of the following has 24-pin Power connector
a. ALU b. CU a. AT motherboard
c. Registers c. North Bridge b. Baby AT motherboard
5. The primary memory of a computer consists of c. XT motherboard
a. Only RAM b. Only ROM d. ATX motherboard
c. Both a and b d. Flash drives 20. XT motherboard has power pin connectors
6. Which of the following is not a secondary memory a. 24 b. 12 c. 20 d. 20 and 24
a. Magnetic Tape b. Hard disk 21. MPGA processor sockets are found in type of motherboards
c. Optical Disk d. Cache memory a. Baby AT b. ATX c. AT c. XT
7. is a large printed circuit board having many chips, ports, controllers and otherelectronic components 22. Choose the very old motherboard model from the following
mounted on it a. ATX b. XT c. Baby AT d. AT
a. Integrated Circuit b. Motherboard 23. Which of the following motherboard type consists of SATA connectors
c. Chip set d. Firewire a. AT motherboard
8. Which among the following are characteristics of motherboard? b. Baby AT motherboard
a. only form factor b. only Chip set c. Only Processor Socket d. All of these c. ATX motherboard
9. form factor refers to d. XT motherboard
a. Geometry b. Electrical requirements 24. One of the following is the main component of the motherboard
c. Dimensions d. All of these a. BUS b. BIOS c. CMOS d. Processor
10. characteristic of motherboard should be considered to maximize thecomputers upgradability. 25 ------------------ is the frequency with which a processor executes instructions.
a. Form Factor b. Chip set a. Bus speed b. Clock speed
c. Processor socket d. All from (a) to (c) c. MHz d. GHz
11. Which of the following motherboard is old model mother board 26. The computers operating speed is linked to the speed of -------------
a. AT b. ATX a. BUS b. Memory access
c. XT d. Baby AT c. System Clock d. North Bridge
12. Which of the following motherboard has no ports 27. CPU’s performance is measured by the per second
a. AT b. ATX a. Number of instructions decoded
c. XT d. Baby AT b. Number of instructions loaded
c. Number of instructions executed
13. Pentium -I, Pentium-II and Pentium – MMX processors used in type ofmotherboards d. Number of programs executed
a. AT b. ATX 28. CPU is fabricated on a single IC chip is known as--------------
c. XT d. Baby AT a. Multiprocessor c. graphic processor
b. Microprocessor d. microcomputer
14. Pentium -III Processors are used in type of motherboards
29. _________establishes a communication path for movement of data between processor and memory
a. ET b. ATX
a. Cache b. Bus c. motherboard d. North Bridge
c. XT d. Baby AT
30. Which one of the following is the alternative name for North Bridge
15. Both Pentium III and Pentium IV processors are supported by motherboards
a. Host Bridge b. south chipset
a. XT b. AT
c. North Chipset d. Both (a) and (c) are correct
c. Baby AT d. ATX
31. is responsible for control of high speed components like CPU, RAM and video card
16. Processors supported by ATX mother board are a. South chipset b. south bridge
a. Only Pentium-IV, Dual Core c. North Chipset d. Both (a) and (b)
b. Only Dual Core and Core 2 Duo
c. Quad Core, i3, i5 and i7 32. is responsible for control of slower components.
d. All of the above a. South chipset b. north bridge
c. North Chipset d. Both (a) and (c)
33. The most common motherboard standard for desktop computers 51. are used to connect communication devices.
a. AT b. ATX c. XT d. Baby ATX a. Serial port b. parallel port c. USB d. AGP port
34. Identify the devices which are not managed by North Bridge 52. needs a single wire to transmit I bit of data
a. RAM b. CPU a. Serial port b. parallel port c. USB d. AGP port
c. Video cards d. CD ROM drive 53. are used to connect external input/output devices like printers or scanners
35. chipset manages data communication between low speed components a. Serial port b. parallel port c. USB d. AGP port
a. North Bridge b. South Bridge 54. CD-ROM drives or hard disk drives are connected to the motherboard through
c. IDE c. SATA a. Serial port b. parallel port c. USB d. IDE port
36. Which of the following performs POST 55. ports are also called as mouse ports
a. CMOS b. BIOS a. Serial port b. parallel port c. PS-2 port d. AGP port
c. Control unit d. ALU 56. port uses synchronous serial signals to communicate between the keyboard and amouse to the computer
37. Identify operation which are not part of BIOS a. Serial port b. parallel port c. PS-2 port d. AGP port
a. Holds instructions to load hardware settings 57. is used to connect to graphic card.
b. Performing POST a. Serial port b. parallel port c. PS-2 port d. AGP port
c. Invoking bootstrap loader 58. port is used for adding external devices such as high speed hard disks, high endscanners CD-ROM drives
d. Storing date and time a. Serial port b. SCSI c. PS-2 port d. AGP port
38. Invoking boostrap loader is done by 59. connects monitor to computers video card
a. BIOS b. CMOS a. VGA b. parallel port c. PS-2 port d. AGP port
c. SMPS d. South Bridge 60. transfer large amount of data at very fast speed and connects camcorders andvideo equipment.
39. BIOS stand for a. Serial port b. parallel port c. firewire port d. AGP port
a. Basic input output system b. boot input output system 61. connects PC’s modem to telephone network
c. basic internal output system d. boot internal output system a. Serial port b. parallel port c. modem d. AGP port
39 is a type of memory chip to store the date, time and system setup parameters. 62. connects to a network and high speed internet and network cable to computer
a. BIOS b. CMOS c. RAM d. ROM a. Serial port b. ethernet port c. PS-2 port d. AGP port
40. BIOS and CMOS are powered by battery kept on the motherboard 63. are used to connect microphone, speakers to sound card.
a. Lithium Ion b. Sodium Ion c. Magnesium ion d Silicon Ion a. Serial port b. parallel port c. sockets d. AGP port
64. is designed to transmit information between electronic musical instruments
41. PC cards are used in_______computers
a. Serial port b. MIDI c. PS-2 port d. AGP port
a. Desktop b. Mini c. Smart Phones d. Laptop
65. The different components of computer are connected to each other through
42. is used to connect modem and input devices
a. BUS b. CMOS c. BIOS d. South Bridge
a. ISA b. PCI c. AGP d. PCI Express
66. connects major computer components like processor, memory and I/O
43. is used to connect graphic accelerator cards , sound cards, internal modems or scsicards a. Internal bus b. external bus c. both a and b d. expansion bus
a. ISA b. PCI c. AGP d. PCI Express 67. connects the different external devices , peripherals, slots ports to rest of computer
42 Which among the following bus is the fastest a. Internal bus b. external bus c. both a and b d. system bus
a. ISA b. PCI c. AGP d. PCI Express 68. System bus and expansion bus consists of
43. Which one of the following is correct with respect to original Pentium motherboard toinstall memory a. data bus b. address bus c. control bus d. all of these
a. It has two 72-pin SIMM slots or one 168-pin DIMM slots 69. provides a path to transfer data between CPU and Memory
b. It has only four 72-pin SIMM slots a. data bus b. address bus c. control bus d. all of these
c. It has only two 168-pin DIMM slots 70. connects CPU and RAM
d. It has four 72-pin SIMM slots or two 168-pin DIMM slots a. data bus b. address bus c. control bus d. all of these
44. Disk controller is a circuit that enables communication between CPU and 71. is used to control the access to and he use of the data and address line
a. Hard Disk b. Floppy Disk c. Any External disk drive d. All of the above a. data bus b. address bus c. control bus d. all of these
46. is a plug and play interface 72. is referred to the electronic storing space for instructions and data
a. Serial port b. parallel port c. USB d. AGP port a. BIOS b. BUS c. CMOS d. memeory
73. includes registers, cache memory and primary memory
47. Number of devices supported in USB is ------------------- a. Internal memory b. secondary memory c. permanent memory d. main memory
a. 64 b. 127 c. 128 d. 63 74. works under the direction of CU to accepts, store and transfer instructions or dataand performs
48. What is the basic speed of USB ------------ arithmetic and logical comparisons at high speed.
a. 12 Mbps b. 8 Mbps c.16 Mbps d. 32 Mbps a. BIOS b. BUS c. Cache d. register
49. is the interface that directs and controls reading and writing to a computer’sfloppy disk 75. is the high speed memory placed in between RAM and CPU
drive(FDD) a. Secondary memory b. primary memory c. Cache d. register
a. Hard Disk b)Floppy Disk controller c) Any External disk drive d)All of the above 76. stores the data that is used more often, temporarily and makes it available to CPU at fast rate.
50. are used to connect external device like printers keyboard or scanners to computer a. Secondary memory b. primary memory c. Cache d. register
a. ISA b. Ports and interfaces 77. is also known as main memory
c. AGP d. PCI Express a. Secondary memory b. primary memory c. Cache d. register
Chapter 2 - Boolean Algebra
1. In boolean algebra, the OR operation is performed by which properties?
a) Associative properties b) Commutative properties
78. has to be refreshed continuously to store information c) Distributive propertiesd) d)All of the Mentioned
a. SRAM b. primary memory c. DRAM d. register
79. RAM is synchronized to system clock
2. The expression for Absorption law is given by
a) A + AB = A b) A + AB = B c) AB + AA’ = A d) A + B = B + A
a. DDR-DRAM b. SRAM c. DRAM d. SDRAM
80. Access speed of SRAM ranges upto 3. The involution of A is equal to
a. 2 to 10ns b. 100 to 1000ns c. 10 to 100ns d. 10 to 50 ns a) A b) A’ c) 1 d) 0
81. Access speed of DRAM ranges upto 4. A(A + B) =?
a. 2 to 10ns b. 50 to 150 ns c. 100 to 1000ns d. 10 to 50 ns a) AB b) 1 c) (1 + AB) d) A
82. is essential for computer to prevent them from failures, breakdowns orshutdown 5. (A + B)(A’ * B’) =?
a. Power supply b. software c. hardware d. user a) 1 b) 0 c) AB d) AB’
83. converts Ac power to Dc power needed by system 6. Complement of the expression A’B + CD’ is
a. UPS b. SRAM c. DRAM d. SMPS a) (A’ + B)(C’ + D) b) (A + B’)(C’ + D) c) (A’ + B)(C’ + D) d) (A + B’)(C + D’)
84. converts 230v of AC to 5 to 12 v of DC 7. Simplify Y = AB’ + (A’ + B)C.
a. UPS b. SRAM c. DRAM d. SMPS a) AB’ + C b) AB + AC c) A’B + AC’ d) AB + A
85. is a power supply that includes a battery to maintain power in the event of powerfailure. 8. The boolean function A + BC is a reduced form of
a. UPS b. SRAM c. DRAM d. SMPS a) AB + BC b) (A + B)(A + C) c) A’B + AB’C d) (A + C)B
86. avoids momentary power lapses by continuously providing power from its owninverter, evn when the 9. The logical sum of two or more logical product terms is called
power line is functioning properly. a) SOP b) POS c) OR operation d) NAND operation
a. Off line UPS b. stand by UPS c. Online UPS d. SMPS 10. The expression Y=AB+BC+AC shows the operation.
87. monitors the power line and switches to battery power as soon as it detects aproblem. a) EX-OR b) SOP c) POS d) NOR
a. Power supply b. stand by UPS 11. The expression Y=(A+B)(B+C)(C+A) shows the operation.
c. Online UPS d. SMPS a) AND b) POS c) SOP d) NAND
88. is a process of setting up your hardware devices and assigning resources to themso that they work 12. The canonical sum of product form of the function y(A,B) = A + B is
together without problems a) AB + BB + A’A b) AB + AB’ + A’B c) BA + BA’ + A’B’ d) AB’ + A’B + A’B’
a. Computer configuration b. software 13. A variable on its own or in its complemented form is known as a
c. hardware d. power supply a) Product Term b) Literal c) Sum Term d) Word
14. Canonical form is a unique way of representing
******************** a) SOP b) Minterm c) Boolean Expressions d) POS
15. Boolean algebra is also called
a) switching algebra B. arithmetic algebra C. linear algebra D. Algebra
16. To perform product of max terms Boolean function mustbe broughtinto
a. AND term b. OR terms c. NOT terms d.NAND terms
17. According to the Boolean algebra absorption law, which of the
following iscorrect?
a. x+xy=x b. (x+y)=xy c. xy+y=x d.x+y=y
18. The expression for Absorption law is given by
a. A + AB = A b. A + AB = B c. AB + AA' = A d. A + B = B + A
19. X*y = y*x is the
a. commutative law b. inverse property
c. associative law d. identityelement
20. There are minterms for 3 variables(a,b,c)
a. 0 b. 2 c. 8 d. 1
21. expressions are can be implemented using either (1) 2-level AND-OR
LOGIC CIRCUITS (2)2-LEVEL NAND logic circuits.
a. pos b. literals c. sop d. none of the above
22. the output of x-nor gate is 1 which input combination is correct.a.
a=1,b=0 b. a=0 b=1 c. a=0, b=0 d. a=0, b=1
23. odd parity of word can be conviently tested by
a. OR GATE b. AND GATE c. NAND GATE d. X-OR GATE
24. determine the values of a,b,c,d that make the sum term
A+B+C+D
a. a=1 b=0 c=0 d=0
b . a=1 b=0 c=1 d=0
c. a=0 b=1 c=0 d=0
d. a=1 b=0 c=1 d=1
25. which of the following expressions is in the sum-of- product(sop)form.
a. (a+b)(c+d) b. (a)b(cd) c. ab(cd) d. ab+cd
26. For the SOP expression , how many 1s are in the truth table'soutput 51. Given that F = (A + B'+ C)(D + E), which of the following represents the only correct expression for F'?
column? a) F' = A'BC'+ D'+ E' b) F' =AB'C + DE c) F' = (A'+ B + C')(D'+ E') d) F' = A'BC' + D'E'
a) 1 b) 2 c) 3 d) 5 52. The product of sum canonical form also known as
27. A truth table for the SOP expression has how many input A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
combinations? 53 are the alternative form of canonical form.
a) 1 b) 2 c) 4 d) 8 A. SOP B. POS C. BOTH A AND B d. NONE OF THE ABOVE
54. The sum of product canonical form also known as
28. How many gates would be required to implement the following Booleanexpression A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
beforesimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5 55 . One of De Morgan's theorems states that. Simply stated, this means that logicallythere is
29. How many gates would be required to implement the following Boolean expressionaftersimplification? nodifference between:
XY + X(X + Z) + Y(X + Z) a) a NOR and an AND gate with inverted inputs
a) 1 b) 2 c) 4 d) 5 b) a NAND and an OR gate with invertedinputs.
30. Determine the values of A, B, C, and D that make the product term equal to 1 c) an AND and a NOR gate with inverted inputs.
a) A = 0, B = 1, C = 0, D = 1 d) a NOR and a NAND gate with inverted inputs.
b) A = 0, B = 0, C = 0, D = 1
c) A = 1, B = 1, C = 1, D = 1 *********************
d) A = 0, B = 0, C = 1, D = 0
31. What is the primary motivation for using Boolean algebra to simplify logicexpressions?
a) It may make it easier to understand the overall function of the circuit.
b) It may reduce thenumber of gates.
c) It may reduce the number of inputs required.
d) all of the above
32. Use Boolean algebra to find the most simplified SOPexpressionfor F = ABD + CD + ACD + ABC + ABCD.
a) F = ABD + ABC + CD b) F = CD + AD c) F = BC + AB d) F = AC + AD
33. In Boolean algebra the word ‘literal’ means
a. a product term b. all the variables in a Boolean expression
c. the inverse function d. a variable or it’s compliment
34. The truth table for sop expression AB+𝐵 ̅ C has how many input
combinations?
a. 1 b. 2 c. 4 d. 8
35. converting the Boolean expression LM+M(NO+PQ) to sop form , we get
a. LM+ MNOPQ
b. B. L+MNO+MPQ
c. LM+M +NO+MPQ
d. LM+MNO+MPQ
36. the product of sum is basically the oring of anded terms
A. TRUE B. FALSE C. May be both d. None of the above
42. By applying De Morgan's theorem to a NOR gate, two identical truthtables can be produced.
a) True b) False c) may be both d) answer not given
43. The process of reduction or simplification of combinational logic circuitsincreases
thecost of the circuit.
a) True b) False c) may be both d) answer not given
44. Most Boolean reductions result in an equation in only one form
. a) True b) False c) may be both d) answer not given
45. The binary value of 1010 is converted to the product term.
a) True b) False c) may be both d) answer not given
46. In the commutative law, in ORing and ANDing of two variables, the order inwhich thevariables are ORed or
ANDed makes no difference.
a) True b) False c) may be both d) answer not given
48. Determine the binary values of the variables for which the followingstandard POSexpression is equal to 0.
a) (0 + 1 + 0)(1 + 0 + 1) b) (1 + 1 + 1)(0 + 0 + 0) c) (0 + 0 + 0)(1 + 0 + 1)
d) (1 + 1 + 0)(1 + 0 + 0)
49. The expression W(X + YZ) can be converted to SOP form by applying which law?
a) associative law b) commutative law c) distributive law d) none of the above
50. Simplification of the Boolean expression AB + ABC + ABCD + ABCDE +ABCDEF yields which of the
following results?
A) ABCDEF B) AB + CD + EF C) A + B + C + D + E + F D) AB
MCQs Chapter 3 - LOGIC GATES Chapter 4 : DATA STRUCTURES
1. is a specialized format for organizing and storing data
1. Electronic circuits that operates on one or more input signals to producestandard a) data structure b) primitive data structure c) sorting d)merging
output
2. is a method of storing the data in memory so that it can be used efficiently.
a. series circuits b. parallel circuits c. logic signals d. logic gate a) Array b)data structure c) sorting d)merging
2. logic gates are the building blocks of all circuits in a computer 3. Which operation is used to remove the data structure from memory space
A. TRUE B. FALSE C. may be both D. No answer given
a)create b)select c)update d)destroy
3. A gate gives the output as 1 only if all the inputs signals are 1.
4. Which is the collection of homogeneous elements under the same name?
A. AND B. OR C. X-OR D. NOR
a) Array b)data structure c) stack d)queue
4. the Boolean expression of an or gate is 5. which data structure has linear relationship between data elements?
a. A.B b. A+B c. AA+B d. AB
a) non linear b)linear c) stack d)queue
5. The gate which is used to reverse the output obtained is 6. In which data structure every data item is connected to several other data items?
A. NOR B. NAND C. X-OR D. NOT
a) non linear b)linear c) stack d)queue
6. which of the following gate will give a 0 when both of it’s inputs are 1. 7. Array size should be_
A. AND B. OR C. NAND D. X-OR
a) negative number b)positive number c)null d)Zero
7. The universal gate that can be used to implement any Boolean expression is ……….. gate . 8. To find length of array we use
A. NAND B. X-OR C. OR D. AND
a)L=UB-LB+1 b)L=LB-UB+1 c)L=UB-LB d)L=LB-UB
8. The gate which is called as inverter gate 9. The base address of an array is address of
A. NAND B. X-OR C.NOR D. NOT
a)UB b)LB c)UB-LB d)LB-UB
9. The and gate is represented algebraically by 10. The formula to calculate address of an element of an array A is
a. + b. * c. -- d. %
a)loc(A[I])=base(I)+W(I-LB) b) loc(A[I])=base(A)+W(I-UB)
10. the only gate that has 1 input and 1 output c) loc(A[I])=base(I)+W(I-UB) d) loc(A[I])=base(A)+W(I-LB)
A. AND B. OR C. NOT D. X-OR
11. Example for traversing in a linear array is
11. The universal gate is a)binary search b) linear search c)to find max element in an array
A. NAND B. X-OR C. OR D. AND d)inserting an element at given position in an array
12. what combination is a Nand gate 12. Binary search compares the element to be searched with element of an array
A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR a) first element b) middle element c)last element d)all the element
13. what combination is a NOR gate 13. In binary search method if search element is less then mid position then
A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR a)high=mid-1 b)low=mid+1 c)high=mid+1 d)low=mid-1
14. A NAND gate has inputs and outputs 14. Linear search compares the elements
a. high input and high output b. high input and low output a)one by one from beginning to end b) dividing array into two parts
c. low input and low output d. low input and high output c) only first and last position d) from low to mid position
15. who invented the idea of logic gates 15. In binary search the successful search is when_
a. George boole b. barden c. calude shanon d. kornard zure a)A[mid]=ele b)A[i]=ele c)ele<A[mid] d) ele>A[mid]
16. which of the following are the airthmatic logic gates? 16. for I=N-1 down to Pos is the loop for
a. X-ORB. X-NOR C. BOTH D. NONE OF THE ABOVE a)deleting element in array b)inserting element in an array c) traversing d)both a and b
17. which of the following is not a logic gate 17. In operation all the elements are shifted into lower order position from the given position
a. AND B. OR C. IF D. NOT a)deleting element in array b)inserting element in an array c) traversing d) binary searching
******************
18. Which is not the sorting method?
a)heap sort b)quick sort c)shell sort d)linear sort
19. The memory address of element A[i][j] in row major order is
a)loc(A[i][j])=base(A)+W((i-LB)+n(j-LB)) b) loc(A[i][j])=base(A)+W(n(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+n(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+n(j-LB))
20. The memory address of elements A[i][j] in column major element is
a)loc(A[i][j])=base(A)+W((I-LB)+m(j-LB)) b) loc(A[i][j])=base(A)+W(m(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+m(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+m(j-LB))
21. The base address of an array is address of the a)A[1] b)A[n-
1] c)A[0] d)both a and b
22. Which data structure is used to implement queues, trees, graphs
a)stack b)list c)array d)None
23. In which data structure addition and deletion of element takes place from same position
a)stack b)list c)array d)queue
24. In stack the end is commonly referred as
a)Top b)bottom c)rear d)front
25. In stack the end opposite is known as 51. In linked list the position start gives the location of node
a)Top b)base c)rear d)front a)first b)last c)middle d)second
26. In stack which element is removed first 52. In linked list the pointer start position is also called as
a) element inserted at first b)most recently added element c)middle element d)second element a)NULL b)head c)Tail d)none
27. In which position of the stack element will be in longest time? 53. The link field of last node contains
a)A[0] b)base c)top d)both a and b a)NULL b)head c)Tail d)none
28. Stack perform the operation 54. In linked list link field of every node contains
a)last in first out b)last in last out c)last in fast out d)first in first out a) data of the node b)data of next node c)address of last node d)address of next node
29. In which operation stack is not modified 55. In doubly linked list which node points to the address of previous node?
a))push(item) b)pop() c)peek() d)none a) info b)frowc)back d)head
30. What is the function of Peek() operation 56. Which operation is not possible in linked list
a)removes top item from stack b) test stack is empty or not a)sorting b)searching c)merging d)inserting
c)returns the number of items in stack d)returns top item from stack but does not remove. 57. Pointer=new type[number_of_elements] is syntax for
31. Push operation in stack is a)pointer declaration b)allocate memory for single element
a) First increases top position and insert element c)allocate memory for block element d)structure.
b) first insert element and then increases top position 58. In which data structure each node is connected to several other nodes
c) first decreases top position and insert element a) non linear b)linear c) stack d)queue
d) first insert element and decrease the top position 59. Which data structure represents hierarchical relationship
32. Which of the following is not an application of stack. a) non linear b)linear c) stack d)queue
a) rearranging railroad cars b) runtime memory management 60. Each node in a tree has child node
c) multiprogramming platform d) conversion of infix expression into postfix and prefix expression a)zero b)more c) both a and b d)no
33. Example for infix expression 61. Root node in a tree is at position
a)+ab b)a+b c)ab+ d)none a)top b)bottom c)middle d)right
34. The condition top=-1in stack indicates 62. From node all the operations commence in tree
a) stack is full b)stack has one element c)stack overflow d)stack is empty a)leaf b)child c)root d)internal
35. The condition top=n-1 in stack indicates 63. The edges in a graph having directions is called
a) stack is full b)stack has one element c)stack underflow d)stack is empty a) undirected graph b)arcs c)digraph d)all the above
36. In which data structure addition of new element and removal of element takes place at different end 64. prefix expression of (A+B)*(C+D) is
a) non linear b)linear c) stack d)queue a)*+AB+CD b)+AB*+CD c)AB+Cd+* d)+*AB+CD
37. In Queue items are inserted at end 65. Prefix expression of 2*3/(2-1)+5*3 is
a) Top b)front c)rear d)bottom a)*23-21/-53*1 b)23*21+/53*+ b)21*23-/35*+ d)-/53*+23*21
38. In queue items are removed at end 66. ele=stack[top] is for
a) Top b)front c)rear d)bottom a)pushb)pop c)enqueue d)dequeue
39. In queue we remove the element which is 67. Prefix expression ofA+(B*C-(D/E^F)) is
a)least recently added b)most recently added c)both a and b d)none a)ABC^/DEF* b)ABC*DEF^/ c)^/ABC*DEF d)*ABC/DEF^
40. Queue is also called as 68. During conversion of infix to postfix pop is done when appears
a) last in first out b) first in last out c)first in first out d)first in first in a)( b)) c)~ d)::
41. In queue which operation is generally called as push 69. Each operator in postfix string refers to its operand in a string
a) enqueue b) dequeue c)push d)pop a)previous 3 b)next 3 c)next 2 d)previous 2
42. Which condition indicates queue is empty 70. 10, 20, 25, 35, 30 40 for the list which searching technique can be applied
a)front=null b)rear=N c) front=rare d)both a and b a)binary search b)linear search c)both a and b d)none
43. Which condition indicates only one element in queue 71. Which operation access each data element exactly once
a)front=null b)rear=N c) front=rare d)rear=N-1 a)traversal b)insertion c)searching d)sorting
44. Various application software is based on data structure 72. Stack can be represented using
a) linked list b)graph c) stack d)queue a)array b) linked list c)both a and b d)none
45. In which of the following application queue data structure is used 73. In binary search when the element is searched either right half or the left half of anarray
a)simulation b) type scheduling algorithm c) print server routine d)all ofthese a) element is found b)search element comparison matches
46. In which data structure element can be inserted and removed in any position c)comparison does not match d) low position is less than high position
a)simple queue b)circular queue c)priority queue d)double ended queue 74. In searching if (loc>=0) is
47. In which queue addition and deletion takes place at both the ends a)unsuccessful search b) binary search
a)simple queue b)circular queue c)priority queue d)double ended queue c) linear search d) successful search
48. The dis advantage of array is 75. Array with one row or one column is a
a)static structure b)dynamic structure c) variable d)both a and b a)1D array b)2d array c)multi dimensional array d)both a and b
49. In which operation array elements are shifted into higher order positions 76. Which operation is used to change data in data structure
a)deletion b)insertion c)searching d)sorting a)create b)destroy c)select d)update
50. In which operation array elements are shifted into lower order positions
a)deletion b)insertion c)searching d)sorting
77. The study of data structure mainly deals with
a)implementation of structure on computers b)mathematical description of structure
c) to determine amount of space in memory d)all of these
78. is a set of vertices and edges Chapter 7: Classes and Objects
a)tree b)graph c)queue d)stack 1. Programming Language which supports object oriented programming(OOP) is
79. Which node is farthest node from root node (a) C++ (b) Visual Basic (c) C language (d) Fortran
a) child node b)top node c)leaf node d) middle node 2. Programming language support oop concept
80. list in linked list contains unused nodes (a) C++ and C# (b) java (c) python (d) All
a)Avail b)head c)null d)start 3. Programming languages does not support oop concept
81. Dynamic memory is allocated using operator (a) C and PASCAL (b) COBOL (c) FORTRAN (d) All
a)create b)null c)new d)pointer 4. Keyword used to create class is
82. In which linked list it is not possible to access preceding nodes (a) Classname (b) class (c) private (d) protected
a)singly b)doubly c)circular d)all of these 5. Member function means
83. A text can be reversed using (a) Just a function (b) function which is member of class
a)tree b)graph c)queue d)stack (c) Both a and b (d) All the above
84. While ((j>=1) and (A[j]<A[j-1])) is the logic for 6. The data elements of a class are called
a) inserting element b)sorting element b)deleting element d)searching element (a) Member Data (b) data (c) private members (d) All the above
85. for i=0 to N-1 If(A[i]==ele) is logic for 7. The Data member of class defines
a) inserting element b)sorting element b)deleting element d)searching element (a) Just data variables (b) variables
86. The method of collecting deleted nodes into free storage is called (c) characteristics of class (d) behavior of the send class
a) heap memory b) free memory c)garbage collection d)dynamiccollection 8. The member function of the class defines
87. In queue insertion and deletion performed according to (a) Functions of class (b) data functions
a) FIFO b)FILOc)LIFO d)all of these (c) characteristics (d) behavior of the class
88. Which of the following data structure does not have different types 9. A class combines and into single unit.
a) array b)linked list c) stack d)queue (a) Data members and member function
89. If we try to delete node from the linked list which is empty is called (b) Only data members of the class
a)overflow b)underflow c)inserting d)deleting (c) Only member function of the class
90. linked list is called as two way list a)singly (d)All the above
b)doubly c)circular d)none 10. A class definition is processes of
91. As user navigate from web page to web page then the pages are placed on (a) Only naming the class
a) array b)linked list c) stack d)queue (b) Only includes writing interface operations
92. The operators in between two operands are called as expression (c) Naming the class and methods and data members
a)infix b)postfix c)prefix d)arthematic (d) Only includes naming the data variables
93. If an operator precedes two operands it is called as expressiona)infix 11. A class can contain member functions
b)postfix c)prefix d)arthematic (a) Many
94. If an operator follows the two operands it is called as expression (b) Zero or more
a)infix b)postfix c)prefix d)arthematic (c) One or more
(d) Both b and
95. for i=lb to ub Process (A[i]) is logic for
a) inserting element b)sorting element b)deleting element d)traversing 12. The Data member of a class describe of a class
96. Which data structure directly operates on machine level instructions (a) Behavior (b) characteristics
(b) Only a is correct (d) both a nd b is correct
a)int b)array c)string d)trees
97. Which is not the operation on linear data structure 13. Class body definition ends the symbol
a) inserting b)sorting b)updating d)traversing (a) ; (b) : (c) :: (d) .
98. What is the statement to copy the top element into variable 14. Class body is enclosed in a pair of
a)s[top]=ele b)ele=s[top] c)s[++top]=ele d)both a and b (a) ( ) (b) [ ] (c) { } (d) All the above
99. What is the statement to copy the variable element into rear position in queue 15. A object is defined to be an
a)q[rear]=ele b)q[front]=ele c)ele=q[rear] d)ele=q[front] (a) Instance of a class (b) copy of the class
100. tree is a tree which at most two decedents (b) Both a and b (d) None of the above
a) binary tree b)sub tree c)b+ tree d)full 16. The access specifiers of the class define
******************** (a) Keywords (b) Data members
(c) member functions (d) Scope of the members
17. Private accesses specifiers means.
(a) members can be accessed only with in the class
(b) members can be accessed only outside the class
(c) members can be accessed both inside and outside the class d. all the above
18. The symbol used to define member function outside the class is 30. syntax for member function outside class definition is
(a) @ (b) & (c) * (d) : : (a) return_type_specifier classname::functionname(arg_list)
19. The default access specifier is {statements
(a) Private (b) protected (c) public (d) All the above ………….}
20. The members are accessible only inside the class (b) void student::input()
(a) Private (b) protected (c) public (d) friend (c) void input()
21. The feature of public access specifiers is (d) returntype functionname(arglist)
(a) Members are accessible only outside the class 31. Example for outside class definition is
(b) Members are access both inside and outside the class (a) void student::input()
(c) Members are accessible only inside the class {
(d) All the above Cout<<”Enter regno and name”<<endl;
22. One special feature of protected access specifier is Cin>>regno>>name;
(a) Cannot be inherited from one to another }
(b) Can be inherited from one class to another (b) void input()
(c) Can be used outside the class (c) Void display(arglist)
(d) Can be accessed using . (dot) operator (d) All the above
23. The difference between private and protected is 32. Using which methods and object can be passed to function
(a) Private cannot be inherited and protected can be inherited (a) Using only pass by function
(b) Protected cannot be inherited and private can be inherited (b) Using pass by data members
(c) No difference between both (c) Pass by data and member function
(d) Both can be accessed outside the class (d) Using Pass by value and pass by reference
24. Which operator is member selection operator? 33. Member function can be defined in how many methods
(a) . (dot) (b) & (address) (c) || operator (d) ! (not operator) (a) 2 (b) 1 (d) 3 (d) a and b
25. The member can be accessed outside the class using dot(.) operator. 34. Member function can be defined using and _ methods
(a) Public (b) protected (c) private (d) friend (a) Only outside the class
26. The class members can be accessed using operator (b) Only inside the class
(a) :: (scope) (b) . (dot) (c) & (address) (d) * (pointer) (c) Both inside and outside the class
(d) All the above
27. Inside member function means
(a) Both Declaration and Definition appear inside the class 35. The class members can be
(b) Only Declaration appears inside the class (a) Only private
(c) Only definition appears inside the class (b) Only protected
(d) Both b and c (c) Only public
(d) Private , protected or public
28. Syntax for memberfunction inside the class is
(a) return_type_specifier functionname(argument_list) 36. Syntax for creating object is
{ (a) Classname objectname1,objectname2,…;
Statements; (b) Student obj1,obj2;
………… (c) Class classname objectname1, objectname2;
} (d) Both a and c
(b) void classname::input() 37. The array of object is
{ (a) An array having classtype elements
Statements; (b) Array as a member of the class
…..} (c) Array stores many values of same type
(c) return_type_specifier classname::functionname() (d) All the above
(d) void input() 38. The is an example for creating the objects
29. An example for member function inside class is (a) Student obj1,obj2;
(a) Returntype functionname() (b) Class student obj1,obj2;
(b) void input() (c) Both a and b
{cout<<”Enter regno and name”<endl; (d) Only a
Cin>>regno>>name; 39. How many methods are there to pass objects as argument to member function(a) 2 (b) 3
} (c) 1 (d) 4
(c) both a and b 40. A class is of an object
(d) only a is correct (a) Blue print or prototype
(b) Defined using classname
(c) A group of students
(d) Class name defines the class
41. A class is collection of objects having
(a) Similar characteristics and behavior Chapter 8: Function Overloading
(b) Only character 1. Function cannot be overloaded when -
(c) Only behavior (a) Function names are same
(d) All the above (b) Number of parameters are different
42. Is it possible to access the data outside the class? (c) Number of parameters are same
(a) Yes , if it is under public (d) Data types of parameters are different
(b) No , if it is under private 2. Function can be overloaded when
(c) Both a and b (a) Function names are same (c) The data types of parameters are
(d) Not possible (b) Number of parameters are different
43. Set of interface operations that are performed on objects are called different (d) All the above
(a) Member variable (b) class function 3. Friend function is a
(b) Member function (d) class variable (a) Non member function of class (c) Both a and b
(b) Can access both private and (d) None of the above
44. The protected members of the class can be accessed by
(a) Member function of class but only inside the class protected members
(b) Member function of the derived class 4. C++ Implements polymorphism through
(c) Friend functions of the class (a) Inline function
(d) All the above (b) Friend function
45. What is the use of scope resolution operator?
(a) Link between class and member function (c) Function overloading and operator overloading
(b) To write member function definition outside the class (d) Both a and b
(c) Both a and b 5. Need for function overloading is
(d) Only a (a) Code maintenance is easy
46. An Example for array of object is (b) Easy to understand the flow of information and debug
(a) Student obj[10]; (c) Easier interface between program and real world objects
(b) Class student stu_obj[50]; (d) All the above
(c) Employee emp[15]; 6. The Restrictions on overloaded functions are
(d) All the above (a) Each function in a set of overloaded function must have different argument list
47. Example to pass object as function argument can be (b) If typedef is used for naming functions then the function is not considered as differenttype
(a) void total(Exam puc, Exam cet) (c) Both a and b
{ (d) None of the above
P=puc.p+cet.p; 7. The other functions used in class are
C=puc.c+cet.c; (a) Overloaded functions (c) Friend function
M=puc.m+cet.m; (b) Inline functions (d) All the above
} 8. The inline function means
(b) Returntype functionname(classname obj, classnae obj) (a) Very long function (c) Short function
(c) Both and b (b) Can contain too complicated code (d) Both a and b
(d) All the above 9. The inline function can be
48. The other names for member functions are (a) Very short function
(a) Methods and Interfaces (b) The compiler replace function call with (c) Both a and b
(b) Only methods function code (d) None of the above
(c) Only set of interface operations 10. The advantages of inline functions are
(d) All the above (a) Inline functions are compact (c) Very efficient code can be
49. The member functions may be defined or of class function calls generated
(a) Inside or outside (b) The size of object code is reduced (d) All the above
(b)Only outside 11. In which type of functions, the compiler replaces the function call statement with thefunction
(c) Only inside code is
(d)All the above (a) Friend function b) Inline function c) Function overloading d) Both a and b
50. members can be accessed inside or outside of class definition. 12. In which function category two or more function have same name but different in numberof argument
(a) Public (b) private (c) protected (d) all the above list and their data type.
(a) Function overloading (b)Inline function
(c) Friend function (d) All the above
*********
.
Chapter 10 : INHERITANCE 23. If class is derived from more than one base class then it is inheritance
1. provides the concept of Reusability a)single level b)multilevel c)multiple d)hybrid
a) procedural programming b)inheritance c)class d)functions 24.If more than one class is derived from a single base class is called inheritance
a)single level b)multilevel c)multiple d)hierarchical
2. allows the user to create a new class from an already existing class
25. inheritance is a combination of hierarchical and multilevel inheritance
a) inheritance b)classc)polymorphism d)binding
a)single level b)multilevel c)multiple d)hybrid
is the capability of one class to inherit properties from another class.
26. We can prevent multiple copies of base class being present in an object from thoseobjects by
a)polymorphism b)binding c)overloading d)inheritance
declaring the base class as
3. is a class whose properties are inherited by another class a)virtual b) abstract c) derived d)private
a)sub class b)base class c) derived class d)virtual class
27. class is one that is not used to create an object.
4. is a class that inherits properties from base class a)virtual b) abstract c) derived d)sub
a)sub class b)base class c)super class d)virtual class 28. When it is mandatory to have constructors in derived class.
5. Base class is also called as a) no base class constructors takes any arguments
a)sub class b)derived class c)virtual classd)super class
b) base class having constructors with one are more arguments
6. Derived class is also called as c) if the is default constructors in bas class d) if there is no constructors in baseclass
a)super class b)abstract class c)base class d)sub class
29. takes the responsibility of supplying initial values to its base class
7. Which of the following is the advantage of inheritance. a) super class b) virtual class c)derived class d)abstract class
a)reusing existing code b) faster development time c)memory utilizationd)all of *************
these
8. If no visibility mode is specified then by default the visibility mode is considered as
43. The structure that include an element that is a pointer to another structure of the sametype is called 6. Architecture of the database can be used viewed as
a) array structure c) self referential structure a) two level b) four levels c) three levels d) one level
b) Dynamic structure d) All the above
7. In a relational model, relations are termed as
44. The objects are referenced using pointers using a) Tuples b) Attributes c) Tables d) Rows
a) objectname->membername c) Both a and b
b)(*objectname).membername d) None of the above
8. In case of entity integrity, the primary key may be
a) not null b) Null c) both Null & not d) any value
45. The following operation that cannot be performed over pointer: Null
a) Additon of two pointers
b) Multiplication of two pointers
c) Division of two pointers
d) All the above 9. A logical schema
46. Every object in C++ has access to its own address through an important pointer called..
a) is the entire b) is a standard way of c) describes how d) Both (a) and
a) this pointer
database organizing data is actually (b)
b) free pointer
c) object pointer information into stored on disk
d) all the above accessible parts
********
13. In an E-R diagram an entity set is represent by a 29. In E-R diagram generalization is represented by
a) Rectangle b) Ellipse c) Diamond box d) Circle a) Ellipse b) Triangle c) Rectangle d) Diamond
16. What is a relationship called when it is maintained between two entities? 32. A in a table represent a relationship among a set of values
a) Unary b) Binary c) Ternary d) Quaternary a) column b) key c) row d) entity
17. Which of the following operation is used if we are interested in one certain columns of 33. Which normal form is considered adequate for relational database design?
a table? a) 2NF b) 3NF c) 4NF d) BCNF
a) Projection b) Selection c) Union d) Join
34. In database table, the category of information is called
18. A set of possible data values is called a) tuple b) record c) field d) All of the above
a) Attribute b) Degree c) Tuple d) Domain
35. An advantage of the database management approach is
19. Which of the following is record based logical model? a) data is b) data redundancy c) data is d) None of the
a) Network b) Object oriented c) E-R Model d) None of these dependent on increases integrated and above
Model model programs can be accessedby
multiple
programs
20. The natural join is equal to
a) Cartesian b) Combination of c) Combination of d) Combination of 36. A function is no partial dependencies are in form
Product Union and cartesian selection and projection and a) 2NF b) 3NF c) 4NF d) BCNF
product cartesian product cartesian product
37. Which one is not an application of database
a) sales b) college c) Attendance d) Bank
21. Hierarchical model is also called Register
a) Tree structure b) Plex structure c) Normalize d) Table Structure
38. In a database, which one is not a data type?
Structure a) Varchar b) Integer c) Date d) Float
22. In E-R diagram generalization is represented by 39. The features of database system are
a) Ellipse b) Dashed ellipse c) Rectangle d) Triangle a) Data security b) Enforcing data c) Data sharing d) All of the
integrity above
23. A data manipulation commands the combines the records from one or more tables is
called 40. Database architecture is logically divided into_ types.
a) SELECT b) PROJECT c) JOIN d) PRODUCT a) Two b) Three c) Four d) Multi
24. A table joined with itself is called 41. Three tier architecture includes
a) Join b) Self Join c) Outer Join d) Equi Join a) Presentation b) Application tier c) database tier d) All of the
tier above
25. Which of the following is not advantage of the database approach?
a) Increased b) Elimination of c) Ability to d) None of the 42. Mathematical set theory-based relations
security data redundancy associated with above a) Union - b) Deference – c) Both A and B d) None of the
relation data Intersection Cartesian Product above
44. The information processing cycle consists of five specific steps: 25. is a process of analysing and picking out relevant information from data.(Data
a) Five b) Four c) Three d) None Mining)
45. The collection of raw facts and figures is called 26. Data about data is . (Metadata)
a) Information b) Data c) Processing d) Knowledge 27. is a set of values for an attribute in a column. (Domain)
28. An entry in a table is a . (Record)
46. A single entry in a table is called 29. Process of extracting knowledge from collected data is called (data
a) Row b) Tuple c) Field d) All of the above mining)
30. is a repository of an organization electronically stored data. (Data
47. ODBC stands for warehouse)
a) One data base b) Open data base c) oracle data base d) Order data base 31. describes how the data is represented and used. (Data model)
collection connectivity connection connectivity
32. combines two lower-level entity of from higher level entity.
(Generalization)
48. refers to maximum numbers of relationship in an entity. 33. Records are stored in chronological order in (serial file
a) Generalization b) Ordinality c) Cardinality d) Aggregation organization.
34. refers to the minimum number of relationships in an entity.
49. Candidate keys which are not currently selected as primary key is called (Cardinality)
a) Super key b) Composite key c) Alternate key d) foreign key
35. The duplication of data is called . (Data redundancy)
36. Ability of a database to modify a schema definition at one level without affected is
50. In which file organization data are stored in chronological order?
. (Data independence)
a) Serial file b) Random/direct c) Sequential file d) ISAM
organization file organization organization
37. Data sharing database is easy because of (centralized data
management).
II Fill in the blanks choosing the appropriate word/words from those given inbrackets. 38. Collection of rows and column is called . (table)
(Repeated answers will not be considered) 39. is a set of values for each column. (Primary Key).
1. is a collection of facts, figures, statistics. (Data) 40. is a DBMS software. (Oracle)
2. is processed data with some definite meaning. (Information)
************
3. A collection of logically related data organised in way that data can be easily accessed
managed and updated is called (Database)
4. A single entry in table is called a (Record or Row)
5. Records are also called the (Tuple).
6. Each column is identified by a distinct header called (Attribute or field)
7. Set of values for an attribute in that column is called (Domain).
8. A is a software that allow creation, definition and manipulation of database.
(DBMS)
9. is a process of hiding unwanted or irrelevant details from the end user.
(Data abstraction)
10. People who require access to the database for querying updating and generating reports is
(End Users)
11. is an ability of a database to modify a schema definition at one level
without affecting a schema in the next higher level. (Data Independence)
12. Database architecture is logically divided into _ types. (Three)
13. architecture is used for user interface program and application programs
that runs on client side. (Two-tier client/server)
14. data model is abstract model that describes how the data is
represented and used. (Data model)
15. The process of applying a data model theory to create a data model instance I
known as (data modelling)
16. is the process of organizing data in a database. (Normalization)
17. An can be any object, place, person or class. (Entity)
18. An describes a property or characteristics of an entity. (Attribute)
19. A describes relation between entities. (Relationship)
20. A is any set of one or more columns whose combined values are unique
among all Occurrences. (Candidate key)
21. is a key that uniquely identify each record in a table. (Primary Key)
22. is a field in a relational table that matches the primary key column ofanother
table. (Foreign key)
23. Key that consists two or more attributes that uniquely identify an entity occurrence
is called (Composite Key)
24. The process of sharing data stored in database is among multiple users.
(data sharing)
15. To delete some data from tables command is used.
a) DELETE b) SELECT c) UPDATE d)DROP
16. The command lets your drop a table from the database
a) DELETE b)SELECT c) UPDATE d) DROP
chapter 14: SQL commands 17. key is non-key column of a table that draws its values from primary key of another table (parent table)
1. Which of the following attributes can be considered as a choice for primary key? a) FOREIGN KEY b) UNIQUE c)CHECK d)PRIMARY KEY
a) Name b) street c) Roll no d) subject
2. What is the full form of SQL?
a) Structured Query Language c) Simple Query Language? CHAPTER 15 : COMPUTER NETWORKS
b) Structured Query List d) none of these 1) The full form of OSI is?
3. What is the full form of DDL a. Operating System interface
a) Dynamic Data Language. c) Data Definition Language b. Optical System interconnection
b) Detailed Data Language d) Data derivation language c. Operating System Internet
4. What does DML stand for? d. Open system interconnection
a) Different Mode Level c) Data Mode Lane
d) Data Manipulation Language 2) What is a HUB?
b) Data Model Languahe
a. Software
5. Which of the following keywords will you use in the following query to display the uniquevalues of a b. Computing device
column dept_name! Select dept_name from company: c. Network device
a) ALL c) Distinct d. Calculating device
b) From d) Name 3) What does a set of rules define?
a. SMTP
6. The clause of select query allows us to select only those rows in the result satisfy a specified b. FTP
condition. c. IMAP
a) where c) having d. Protocol
b) from d) like
4) Identify among the following which is mainly used to host web site.
a. Mail server
7. Consider following SQL statement. What type of statement is this? Select *
from employee; b. Webserver
a) DML c) DCL c. Database server
b)DDL d) Integrating constraint d. None
5) Identify the full form of HTTP?
8. The term is used to refer to a field in a table a. Hypertext Transfer Protocol
a) Attribute c) Row b. Hypertext Transfer Package
b) Tuple d) Instance c. Hyper Transfer Text Package
d. Hyper Transfer Text Practice
9. By default, ORDER by Clause lists the results in order 6) Identify the protocol primarily used for browsing data.
a) Descending c) Ascending
a. FTP
b) Any d) Both 1 and 3
10 . The keyword eliminates redundant data b. TCP
a) SELECT c) DISTINCT c. TFTP
b) WHERE d) None of these d. HTTP
7) Identify the first network which was based on TCP/IP protocol.
11. The _constraint provides a default value to column when the Insert into statement does not a. ARPANET
provide a specific value. b. HUB
a) DEFAULT c) CHECK c. Ethernet Card
b) UNIQUE d) NOT NULL d. Router
8) What does TCP/IP stand for?
12. The constraint ensure that all values in a column are distinct
a) DEFAULT b)UNIQUE c)CHECK d)NOT NULL
a. Telephone control protocol / Internet Protocol
13. Theconstraint ensures that all values in a column satisfy certain condition a)DEFAULT b. Transmission control protocol/Internet protocol
b)UNIQUE C) CHECK d) NOT NULL c. Transmission control protocol/International protocol
14 ----------- is used to identify each row in a table d. None
a) FOREIGN KEY b) UNIQUE c)CHECK d) PRIMARY KEY 9) The collection of hyperlinked documents on the internet known as?
a. HTML
b. Email
c. WWW
d. Internet
10) The location of a resource on the internet given by
a. Email
b. IP b. Point server
c. Protocol c. Data server
d. URL d. File server
11) Identify the incorrect network topology, 22)The location of a resource on the internet is given by its?
a. Bus a. Protocol
b. Star b. URL
c. P2P c. E-mail address
d. Ring d. ICQ
12) What is the protocol used when the main server sends mail to another mail server? 23) Which software prevents the external access to a system
a. FTP a. Firewall
b. SMTP b. Gateway
c. TCP/IP c. Router
d. MIME d. Virus checker
13)Identify among the following network device used to connect two dis-similar types ofnetworks. 24) Which one of the following is the most common internet protocol?
a. Switch a. HTML
b. Hub b. NetBEUI
c. Bridge c. TCP/IP
d. Gateway d. IPX/SPX
14) Identify the device used to boost up a weak signal. 25) The term FTP stands for?
a. Modem a. File transfer program
b. Repeater b. File transmission protocol
c. Switch c. File transfer protocol
d. Router d. File transfer protection
15)The arrangement where all data pass through a central computer is known as 26) Which one of the following is not a network topology?
a. Ring topology a. Star
b. Mesh topology b. Ring
c. Star topology c. Bus
d. Bus topology d. Peer to Peer
16)The device used in the network layer?
27) The term WAN stands for?
a. Application gateway
b. Switch a. Wide Area Net
c. Router b. Wide Access Network
d. Repeaters c. Wide Area Network
17) Which of the following topology arrangements is a point-to-point line configuration? d. Wide Access Net
a. Ring 28) The term MAN stand for?
b. Mesh a. Metropolitan Area Net
c. Star b. Metropolitan Area Network
d. All of the above c. Metropolitan Array Network
18)Identify the device which links two homogeneous packed broadcast local networks. d. Metropolitan Array Net
a. Hub 29) Which of the through share the data of two computer?
b. Router a. Library
c. Bridge b. Network
d. Gateway c. Grouping
19) What does LAN stand for? d. Integrated system
a. Local Array Network 30) It is a computer program deliberately created to damage data and hamper the performance
b. Local Area Network of the computer
c. Local Area Net a. System software
d. None b. Application software
20) Identify the switching method in which the message is divided into small packets. c. Utility software
a. Virtual switching d. Virus
b. Packet switching 31) Virus spread very fast through network and infected
c. Message switching a. Mind
d. None b. Pen drives
21) Identify among the following servers which allow LAN users to share data. c. Keyboard
a. Communication server d. Mouse
32) It infects program files as these have simple format t which virus can be attached 43) Which of the following are coaxial cable types?
a. Program virus a. thinnet
b. Boot virus b. thicknet
c. Multipartite virus C. copper
d. None of these D. A and B both
33) The virus that affects the boot sector of the hard disk and infects the operating system whichmake the hard 44) Thicknet can carry signal for meters.
disk completely useless a. 500m
a. Program virus b. 1000m
b. Boot virus c. 100m
c. Stealth virus d. 200m
d. None of these 45) The maximum segment length of Thinnet coaxial cable is
34) Which of these are harmful effects of virus a. 500 meters
a. Damages data files b. 185 meters
b. Increasing the size of files c. 4 meters
c. Slowing down processing speed d. None of the above
d. All of the above 46) The main source in fiber optic communication?
35) Computer software used to identify and remove computer virus a. light source
a. Anti virus b. transmission medium
b. Computer virus c. detector
c. Trojan horse d. all of the above
d. Worms 47) The core of an optical fiber is .
36) Quickheal, Norton, Smartdog, Mcaffee are the examples of a. glass
a. ComputerVirus b. plastic
b. Worms c. metal
c. Antivirus d. A and B
d. Trojan horse 48) Which of the following isn’t a type of transmission mode?
37)Abbrevation of SIM a. physical
a. Subscriber identity module b. simplex
b. Supplier information management c. full duplex
c. Singular information management d. half duplex
d. Source interlink media 49) In the transmission mode, communication is unidirectional
38) How many forms in twisted pair cable? a. Simplex
a. 2 b. half duplex
b. 4 c. full duplex
c. 3 d. semi-duplex
50) A transmission mode that can transmit data in both the directions but only one direction at a time.
d. None
a. simplex
39)The following are the types in twisted pair cable.
b. half duplex
a. Sheilded twisted pair
c. full duplex
b. Unsheilded twisted pair
d. semi-duplex
c. Both a and b
51) Telephone networks operate in this mode.
d. Twisted pair cable
a. simplex
40)UTP stands for…
a. unshielded transport pair cable b. half duplex
` b. unshielded twisted pair cable c. full duplex
c. unshielded transmission pair cable d. semi-duplex
d. unshielded twisted pair control 52) A walkie-talkie operates in
41)STP stands for… a. simplex
a. shielded twisted pair cable b. half duplex
b. shielded twisted pair connectors c. full duplex
c. shielded transport pair cable d. semi-duplex
d. shielded transport pair connectors 53) The is an example for a simplex device
42)How many types of coaxial cable? a. Repeater b. Tap c. Walkie talkie d. Keyboard
a. 2 54) In the transmission mode each station can transmit but not at the same time
b. 3 a. Simplex b. Half duplex c. full duplex d. b and c
c. 4 55) In the transmission mode both station can transmit and receive at the same time
d. 5 a. Simplex b. Half duplex c. full duplex d. b and c
Model Question Paper-2 II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
Second PUC Computer Science (Repeated answers will not be considered)
Time: 3.15 Hours Max marks: 70 (ISAM, Database, Data mining, Key, Schema)
16. is a collection of logically related data organized in a way that data canbe easily accessed,
PART – A managed & updated.
Answer all the questions. Each question carries one mark. 1x20 = 20 17. is a set of one or more columns whose combined values are unique amongall occurrences in a given table.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) 18. is the hybrid between sequential and direct access file organization.
1. CPU’s working memory is 19. Database objects that contain data govern or perform operation on data is
a) Cache memory b) Register 20. A technique which is concerned with the analysis & picking out relevant informationis called
c) Primary memory d) Secondary memory
2. Minterm of X̅ ̅Y= PART – B
a) m3 b) m2 Answer any FOUR questions. Each question carries two marks. 2x4=8
c) m1 d) m0 21. Prove algebraically X (X + Y) = X22.State
3. The standard symbol represnts De Morgan’s theorems.
a) OR gate b)AND gate 23. Write a note on polymorphism. Give an example.
c) NAND gate d) NOR gate 24. Write any two features of parameterized constructors.
4. is an example for non-primitive data structure 25. Differentiate between seekg( ) and seekp( ).
a) Integer b) Float 26. What is a candidate key & alternate key (secondary key)?
c) Stack d) Pointer 27. Write the syntax & example for alter command.
5. Which access specifier is implicitly used in class?
28. List the different applications of networking.
a) Private b) Public PART – C
c) Protected d) Friend Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12 29.Explain the different types of
6. is although not a member function has full access right to the private andprotected members Motherboard.
of the class.
a) Overloaded function b) Inline function 30. Write the logic diagram and the truth table for XOR gate.
c) Friend function d) Recursive function
7. In constructor, declaration of an object is followed by assignment operator, constructorname and argument list
31. What are the advantages of arrays?
enclosed in parenthesis is 32. What is a pointer? Give the declaration and initialization of a pointer.
a) Implicit call b) Explicit call 33. Mention different operations basic operation on binary file in C++.
c) Function call d) Initialized at the time of declaration using = 34. Explain any three data types supported by DBMS.
8. The class that inherits properties from another class is 35. Explain the technologies & services used in e-commerce.
a) Base class b) Derived class 36. What is web scripting? Mention the types.
c) Virtual class d) Abstract class
9. Which of the following is the address operator?a) :: b) PART – D
. Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
c) * d) & Boolean function F(A, B, C, D)= Σ(0,3,4,6,8,9,10,11,12,14).
10. Set of values for an attribute in that table is
a) Tuple b) Entity Reduce the function F using K-map.
c) Attribute d) Domain 38. Explain the different operations performed on queue.
11. Following is not a DDL command: 39. Write an algorithm to search an element in an array using binary search.
a) Create b) Alter 40. Write the advantages of object-oriented programming (OOP).
c) Drop d) Delete
12. A hardware device used to connect several computers together is 41. Explain how objects of a class can be defined with suitable example.
a) Router b) Bridge 42. Explain inline functions with syntax and example.
c) Switch d) Hub 43. Explain default constructor with syntax and example.
13. CDMA stands for 44. What is inheritance? Briefly explain multilevel and multiple inheritance.
a) Code Data Multiple Access 45. Explain the applications of database system.
b) Code Division Multiple Access 46. Explain any five character (text) built-in functions in SQL.
c) Common Division Multiple Access 47. What is compute virus? Write the symptoms (characteristics) of computer
d) Common Data Multiple Access
14. The Software that is neither open nor freely available is called is
a) Free software b) Freeware ***********
c) Proprietary software d) Open source software
15. is a text-based markup language.
a) HTML b) XML
c) DHTML d) PHP
Model Question Paper-3 II. Fill in the blanks choosing the appropriate word/words from those givenin brackets. (Repeated answers will
Second PUC Computer Science not be considered
Time: 3.15 Hours Max marks: 70 (Physical data independence, Hierarchical data model, DBMS, One-tier architecture, ER Diagram)
PART – A
16. allows creation, definition & manipulation of database.
Answer all the questions. Each question carries one mark. 1x20 = 20 17. is a visual representation of data that describes how data is related toeach other.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) 18. is an ability of a database to modify a schema definition at internal levelwithout affecting a
1. The CPU is fabricated as a single Integrated Circuit (IC) chip and is schema in the next level.
a) Motherboard b) Microprocessor 19. organizes the data in a tree like structure in which each child node canhave only one
c) Register d) Circuit board parent node.
2. Maxterm of X + Y + Z = 20. In , DBMS is the only entity where user directly sits on DBMS &uses it.
a) M3
Y +Z
b) M2 PART – B
c) M1 d) M0 Answer any FOUR questions. Each question carries two marks. 2x4=8
3. Standard symbol for XOR gate is 21. Prove that 1 + X = 1 using proof by perfect induction method.
a) + b) 22. Write any two basic postulates of Boolean algebra.
c) . d) x
23. Write the disadvantages of object-oriented programming (OOP).
4. is an ordered collection of items where the addition of newitems and the
24. Write any two features of destructor.
removal of an existing item always takes place at the same end.
a) Queue b) Linked list
25. Differentiate between tellg( ) and tellp( ).
c) Stack d) Tree 26. What is the difference between serial & direct access file organization?
5. operator is used to define the member function outside the class. 27. Write the syntax & example for drop command.
a) . b) :: 28. List the goals for networking.
c) * d) & PART – C
6. Function Overloading is also known as Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
a) Compile time polymorphism b) Run time polymorphism. 29. What is a port? Explain serial port.
c) Compile time encapsulation d) Run time encapsulation 30. Write the logic diagram and the truth table for NAND gate.
7. In constructor, the declaration of the object is followed by argument list enclosed inparentheses. 31. What are the disadvantages of an arrays?
a) Implicit call b) Explicit call 32. What is static memory allocation? Explain.
c) Function call d) Initialized at the time of declaration using = 33. Mention the types of file. Explain any one.
8. class prevent multiple copies of the base class being present in anobject derived 34. Explain any three database users.
from those objects. 35. What are the advantages of e-commerce?
a) Base class b) Derived class 36. What is web hosting? Mention different types of web hosting.
c) Virtual base class d) Abstract class
9. is the collection of addresses. PART – D
a) Array of objects b) Array of address Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
c) Array of variables d) Array of pointers 37. Given Boolean function F(A, B, C, D)= Σ(0, 4, 8, 9, 10, 11, 12, 13,
10. A single entry in a table is 15) Reduce the function F using K-map.
a) Tuple b) Entity 38. Define: a. Root Node b. Leaf Node c. Height d. Depth e. Internal node.
c) Attribute d) Domain 39. Write an algorithm to insert a data element at the rear end of the queue.
11. Following is not a DML command: 40. Write a difference between procedural oriented programming & object-orientedprogramming (OOP).
a) Create b) Insert 41. Explain the class definition and declaration with syntax and example.
c) Update d) Delete 42. Define an inline function. Write the advantages & disadvantages of inline functions.
12. is an example for half duplex communication mode. 43. What is copy constructor? Explain with programming example.
a) Radio b) Television 44. What is single level inheritance? Explain with programming example.
c) Walkie-Talkie d) Modern telephone system 45. Give the difference between manual & electronic file systems.
13. is consists of a central node to which all other nodes are connectedby a single path. 46. Explain the data types used in SQL.
a) Bus topology b) Star topology. 47. Explain any five networking devices.
c) Ring topology d) Tree topology
14. URL stands for
a) Unique Resource Location b) Uniform Resource Location ***********
c) Unique Resource Locator d) Uniform Resource Locator
15. refers to web content that changes each time it is viewed
a) HTML b) XML
c) DHTML d) PHP
Model Question Paper-4 II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
Second PUC Computer Science (Repeated answers will not be considered)
Time: 3.15 Hours Max marks: 70 (Specialization, Metadata, Data integrity, Attribute, Relational data model)
16. Each column is identified by a distinct header is called
PART – A 17. refers to the validity of data & it can be compromised in a number of ways
Answer all the questions. Each question carries one mark. 1x20 = 20 18. In , there are no physical links.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) 19. is a top down approach in which one higher level entity can be brokendown into two lower level entities.
1. The parallel port can transfer bit of data at a time. 20. is used to inform operators and uses of the data warehouses aboutits status.
a) 1 b) 4
c) 8 d) 16 PART – B
2. The X+XY = X is Answer any FOUR questions. Each question carries two marks. 2x4=8
a) Associative Law b) Involution law 21. Prove algebraically X (X + Y) = X
c) Complementarity law d) Absorption Law 22. What is minterm and maxterm?
3. A logic gate with only one input signal and one output signal but the output state isalways opposite of the 23. Write any two applications of object-oriented programming (OOP).
input state is 24. Write any two features of destructor.
a) AND gate b) OR gate 25. Mention the methods of opening file within C++ .
c) NOT gate d) NOR gate 26. Mention the types of data independence.
4. is an example for linear data structure. 27. Give the difference between char and varchar datatypes in SQL.
28. Name the different types of twisted pair cable.
a) Integer b) Linked list
c) Graph. d) Tree
5. is an instance of a class.
a) Access specifiers b) Data members PART – C
c) Member functions d) Objects Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
6. The functions are compact function calls. 29. Explain the characteristics of motherboard.
a) Overloaded b) Inline 30. Write the logic diagram and the truth table for OR gate.
c) Friend d) All of the above 31. What are the applications of an arrays?
7. The constructor must be declaring in section. 32. What is array of pointers? Give an example.
a) Private b) Public 33. Differentiate between ifstream class and ofstream class.
c) Protected d) None of the above 34. Give the different notations for E-R diagram
8. is one that is not used to create objects. 35. Write any three criteria of open source software.
36. Give the features of DHTML?
a) Sub class b) Derived class
c) Virtual class d) Abstract class
PART – D
9. operation can be performed on pointers.
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
a) Addition of two pointers 37. Given Boolean function F(A, B, C, D)= m0 + m1 + m2 + m3 + m4 + m5 + m8 + m9
b) We can subtract one pointer from another pointer if both point tothe same array. + m10 + m11 + m13 + m15. Reduce the function F using K-map.
c) Subtraction of one pointer from another pointer when they do not pointto the same array. 38. What is primitive data structure? Explain the different operations performed onprimitive data
d) Multiplication of two pointers structure.
10. is a field in a one table that uniquely identifies the row of another table. 39. Write an algorithm to search an element in an array using linear search method.
40. Explain the different characteristics of OOP.
a) Primary key b) Foreign key 41. Explain how do we define member function inside the class definition. Giveexample.
c) Candidate key d) Alternate key 42. Explain friend functions with example.
11. Which command is used to modify an existing record in SQL? 43. What is copy constructor? Explain with programming example.
a) Update b) Change 44. What is visibility mode? What is its role with respect to inheritance?
c) Modify d) Alter 45. Explain ISAM with example.
12. A device that connects dissimilar networks is 46. What is data definition language? Explain create and select commands in SQL.
a) Router b) Bridge 47. Explain the applications of networking?
c) Gateway d) Hub
13. HTTP stands for
a) Hypertext Transistor Protocol b) Hypertext Transfer Protocol
c) Hypertest Transistor Protocol d) Hypertest Transfer Protocol ***********
14. navigates though the world wide web(www) and displays web pages
a) Web browser b) Website
c) Web server d) URL
15. tag is used to create hyperlink.
a)<li> b) <a>
c) <h1> d) <b>
Model Question Paper-5
Second PUC Computer Science
14. The software whose source code is available to customers and it can be modifiedand redistributed
without any limitations is
Time: 3.15 Hours Max marks: 70
a) Free software b) Freeware
PART – A c) Shareware d) Open source software
Answer all the questions. Each question carries one mark. 1x20 = 20 15. provides an object-oriented view of a Web page and its elements.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) a) HTML b) XML
1. A slot which is used to connect modem and input devices is c) DHTML d) PHP
a) AGP slot b) PCI slot
c) ISA slot d) Processor slot II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
2. According to Boolean law: X + 1 = (Domain, Normalization, Aggregration, Data warehouse, Data processing)
a) 0 b) 1 16. is series of actions or operations from input data to generate outputs.17.Set of values
c) X d) X̅ for an attribute in that table is called as
3. Universal gates are: 18. A process when relation between two entities is treated as a single entity iscalled
19. The process of organizing the data in a database is called
a) AND and OR b)NAND and NOR 20. A repository of an organization’s electronically stored data is called
c) XOR and XNOR d) None PART – B
4. A queue follows: Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that XY+̅XY=X.
a) LIFO b) FIFO
22. State the principles of duality theorems.
c) Linear tree d) Ordered array
23. Explain data encapsulation.
5. Data members are accessed only by the member functions, friends of the class andalso by the member 24. What is a destructor? Give its syntax.
functions derived from this class is 25. Write the member functions belonging to ifstream class.26.Define primary key & foreign key.
a) Private b) Public 27.Write the syntax & example for delete command.
c) Protected d) Friend 28.Explain simplex communication mode.
6. The inline function may not work some times for one of the following reasons:
a) The inline function definition is too long or too complicated PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
b) The inline function is recursive
29. Explain cache memory.
c) The inline function has looping constructs
30. Write the logic diagram and the truth table for AND gate.
d) All of the above
31. Write the memory representation two-dimensional arrays in row-major order.
7. A constructor that accepts parameters is called the default constructor.
32. What are the advantages of pointer?
a) No b) One
c) Two d) Three 33. Explain any three file modes.
8. The class whose properties are inherited by another class is 34. Explain any three components of E-R diagram.
a) Base class b) Derived class 35. What is e-commerce? Explain types of e-commerce.
c) Virtual class d) Abstract class 36. Explain the structure of HTML.
9. Which of the following is the pointer operator?
a) :: b) . PART – D
c) * d) & Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)=Σ(0,1,2,3,4,5,6,7,8,9,10,11).
10. Each column is identified by a distinct header is Reduce the function F using K-map.
a) Tuple b) Entity 38. Explain the different operations performed on linear data structure.
c) Attribute d) Domain
39. Write an algorithm for push and pop operation in stack using array.
11. Which command is used to modify an existing table in SQL?
40. Write the applications of object oriented programming (OOP).
a) Update b) Change
c) Modify d) Alter 41. Explain the member functions outside a class with an example.
12. A set of rules and guidelines for communicating data is 42. Discuss overloaded functions with syntax and example.
a) Protocol b) Packet 43. What is a constructor? Write the rules for writing a constructor function.
c) Data gram d) Data channel 44. What is inheritance? What are the advantages of inheritance?
13. TCP/IP stands for 45. Explain the features of database system.
a) Telephone control protocol/Internet protocol 46. Explain the various group functions in SQL.
b) Transmission control protocol/Internet protocol 47. What is network? Mention different network goals.
c) Telephone control protocol/ International protocol
***********
d) Transmission control protocol/International protocol