Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
513 views14 pages

Computer System Configuration Quiz

1. The document discusses different types of motherboards including AT, Baby AT, XT, and ATX motherboards. It describes the characteristics and components of each type. 2. Older processor types like Pentium I, II, and MMX were supported by AT motherboards while Pentium III processors were supported by ATX motherboards. Both Pentium III and IV processors could be used with ATX motherboards. 3. Newer multi-core and Intel Core processors require ATX motherboards. Questions ask about components, specifications, and capabilities of each motherboard type.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
513 views14 pages

Computer System Configuration Quiz

1. The document discusses different types of motherboards including AT, Baby AT, XT, and ATX motherboards. It describes the characteristics and components of each type. 2. Older processor types like Pentium I, II, and MMX were supported by AT motherboards while Pentium III processors were supported by ATX motherboards. Both Pentium III and IV processors could be used with ATX motherboards. 3. Newer multi-core and Intel Core processors require ATX motherboards. Questions ask about components, specifications, and capabilities of each motherboard type.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Chapter1 :TYPICAL CONFIGURATION OF COMPUTER SYSTEM 17.

17. Which among the following motherboards have slot type and PGA type processorsockets
1. is directly accessed and manipulated by the CPU during program execution a. ATX motherboard
a. RAM b. Cache b. Baby AT motherboard
c. Primary memory d. Registers c. XT motherboard
2. is known as CPU’s working memory d. AT motherboard
a. Cache b. Primary Memory 18. Choose the component not present in Baby AT motherboard
c. Register d. secondary memory a. Slot type processor sockets and PGA processor sockets
3. is referenced by the CPU without address. b. SDRAM slots and DDRRAM slots
a. RAM b. Primary Memory c. PCI slots and ISA slots
c. hard disk c. Registers d. AGP slots
4. Which component of computer co-ordinates overall functioning of the computer. 19. Which one of the following has 24-pin Power connector
a. ALU b. CU a. AT motherboard
c. Registers c. North Bridge b. Baby AT motherboard
5. The primary memory of a computer consists of c. XT motherboard
a. Only RAM b. Only ROM d. ATX motherboard
c. Both a and b d. Flash drives 20. XT motherboard has power pin connectors
6. Which of the following is not a secondary memory a. 24 b. 12 c. 20 d. 20 and 24
a. Magnetic Tape b. Hard disk 21. MPGA processor sockets are found in type of motherboards
c. Optical Disk d. Cache memory a. Baby AT b. ATX c. AT c. XT
7. is a large printed circuit board having many chips, ports, controllers and otherelectronic components 22. Choose the very old motherboard model from the following
mounted on it a. ATX b. XT c. Baby AT d. AT
a. Integrated Circuit b. Motherboard 23. Which of the following motherboard type consists of SATA connectors
c. Chip set d. Firewire a. AT motherboard
8. Which among the following are characteristics of motherboard? b. Baby AT motherboard
a. only form factor b. only Chip set c. Only Processor Socket d. All of these c. ATX motherboard
9. form factor refers to d. XT motherboard
a. Geometry b. Electrical requirements 24. One of the following is the main component of the motherboard
c. Dimensions d. All of these a. BUS b. BIOS c. CMOS d. Processor
10. characteristic of motherboard should be considered to maximize thecomputers upgradability. 25 ------------------ is the frequency with which a processor executes instructions.
a. Form Factor b. Chip set a. Bus speed b. Clock speed
c. Processor socket d. All from (a) to (c) c. MHz d. GHz
11. Which of the following motherboard is old model mother board 26. The computers operating speed is linked to the speed of -------------
a. AT b. ATX a. BUS b. Memory access
c. XT d. Baby AT c. System Clock d. North Bridge
12. Which of the following motherboard has no ports 27. CPU’s performance is measured by the per second
a. AT b. ATX a. Number of instructions decoded
c. XT d. Baby AT b. Number of instructions loaded
c. Number of instructions executed
13. Pentium -I, Pentium-II and Pentium – MMX processors used in type ofmotherboards d. Number of programs executed
a. AT b. ATX 28. CPU is fabricated on a single IC chip is known as--------------
c. XT d. Baby AT a. Multiprocessor c. graphic processor
b. Microprocessor d. microcomputer
14. Pentium -III Processors are used in type of motherboards
29. _________establishes a communication path for movement of data between processor and memory
a. ET b. ATX
a. Cache b. Bus c. motherboard d. North Bridge
c. XT d. Baby AT
30. Which one of the following is the alternative name for North Bridge
15. Both Pentium III and Pentium IV processors are supported by motherboards
a. Host Bridge b. south chipset
a. XT b. AT
c. North Chipset d. Both (a) and (c) are correct
c. Baby AT d. ATX
31. is responsible for control of high speed components like CPU, RAM and video card
16. Processors supported by ATX mother board are a. South chipset b. south bridge
a. Only Pentium-IV, Dual Core c. North Chipset d. Both (a) and (b)
b. Only Dual Core and Core 2 Duo
c. Quad Core, i3, i5 and i7 32. is responsible for control of slower components.
d. All of the above a. South chipset b. north bridge
c. North Chipset d. Both (a) and (c)

33. The most common motherboard standard for desktop computers 51. are used to connect communication devices.
a. AT b. ATX c. XT d. Baby ATX a. Serial port b. parallel port c. USB d. AGP port
34. Identify the devices which are not managed by North Bridge 52. needs a single wire to transmit I bit of data
a. RAM b. CPU a. Serial port b. parallel port c. USB d. AGP port
c. Video cards d. CD ROM drive 53. are used to connect external input/output devices like printers or scanners
35. chipset manages data communication between low speed components a. Serial port b. parallel port c. USB d. AGP port
a. North Bridge b. South Bridge 54. CD-ROM drives or hard disk drives are connected to the motherboard through
c. IDE c. SATA a. Serial port b. parallel port c. USB d. IDE port
36. Which of the following performs POST 55. ports are also called as mouse ports
a. CMOS b. BIOS a. Serial port b. parallel port c. PS-2 port d. AGP port
c. Control unit d. ALU 56. port uses synchronous serial signals to communicate between the keyboard and amouse to the computer
37. Identify operation which are not part of BIOS a. Serial port b. parallel port c. PS-2 port d. AGP port
a. Holds instructions to load hardware settings 57. is used to connect to graphic card.
b. Performing POST a. Serial port b. parallel port c. PS-2 port d. AGP port
c. Invoking bootstrap loader 58. port is used for adding external devices such as high speed hard disks, high endscanners CD-ROM drives
d. Storing date and time a. Serial port b. SCSI c. PS-2 port d. AGP port
38. Invoking boostrap loader is done by 59. connects monitor to computers video card
a. BIOS b. CMOS a. VGA b. parallel port c. PS-2 port d. AGP port
c. SMPS d. South Bridge 60. transfer large amount of data at very fast speed and connects camcorders andvideo equipment.
39. BIOS stand for a. Serial port b. parallel port c. firewire port d. AGP port
a. Basic input output system b. boot input output system 61. connects PC’s modem to telephone network
c. basic internal output system d. boot internal output system a. Serial port b. parallel port c. modem d. AGP port
39 is a type of memory chip to store the date, time and system setup parameters. 62. connects to a network and high speed internet and network cable to computer
a. BIOS b. CMOS c. RAM d. ROM a. Serial port b. ethernet port c. PS-2 port d. AGP port
40. BIOS and CMOS are powered by battery kept on the motherboard 63. are used to connect microphone, speakers to sound card.
a. Lithium Ion b. Sodium Ion c. Magnesium ion d Silicon Ion a. Serial port b. parallel port c. sockets d. AGP port
64. is designed to transmit information between electronic musical instruments
41. PC cards are used in_______computers
a. Serial port b. MIDI c. PS-2 port d. AGP port
a. Desktop b. Mini c. Smart Phones d. Laptop
65. The different components of computer are connected to each other through
42. is used to connect modem and input devices
a. BUS b. CMOS c. BIOS d. South Bridge
a. ISA b. PCI c. AGP d. PCI Express
66. connects major computer components like processor, memory and I/O
43. is used to connect graphic accelerator cards , sound cards, internal modems or scsicards a. Internal bus b. external bus c. both a and b d. expansion bus
a. ISA b. PCI c. AGP d. PCI Express 67. connects the different external devices , peripherals, slots ports to rest of computer
42 Which among the following bus is the fastest a. Internal bus b. external bus c. both a and b d. system bus
a. ISA b. PCI c. AGP d. PCI Express 68. System bus and expansion bus consists of
43. Which one of the following is correct with respect to original Pentium motherboard toinstall memory a. data bus b. address bus c. control bus d. all of these
a. It has two 72-pin SIMM slots or one 168-pin DIMM slots 69. provides a path to transfer data between CPU and Memory
b. It has only four 72-pin SIMM slots a. data bus b. address bus c. control bus d. all of these
c. It has only two 168-pin DIMM slots 70. connects CPU and RAM
d. It has four 72-pin SIMM slots or two 168-pin DIMM slots a. data bus b. address bus c. control bus d. all of these
44. Disk controller is a circuit that enables communication between CPU and 71. is used to control the access to and he use of the data and address line
a. Hard Disk b. Floppy Disk c. Any External disk drive d. All of the above a. data bus b. address bus c. control bus d. all of these
46. is a plug and play interface 72. is referred to the electronic storing space for instructions and data
a. Serial port b. parallel port c. USB d. AGP port a. BIOS b. BUS c. CMOS d. memeory
73. includes registers, cache memory and primary memory
47. Number of devices supported in USB is ------------------- a. Internal memory b. secondary memory c. permanent memory d. main memory
a. 64 b. 127 c. 128 d. 63 74. works under the direction of CU to accepts, store and transfer instructions or dataand performs
48. What is the basic speed of USB ------------ arithmetic and logical comparisons at high speed.
a. 12 Mbps b. 8 Mbps c.16 Mbps d. 32 Mbps a. BIOS b. BUS c. Cache d. register
49. is the interface that directs and controls reading and writing to a computer’sfloppy disk 75. is the high speed memory placed in between RAM and CPU
drive(FDD) a. Secondary memory b. primary memory c. Cache d. register
a. Hard Disk b)Floppy Disk controller c) Any External disk drive d)All of the above 76. stores the data that is used more often, temporarily and makes it available to CPU at fast rate.
50. are used to connect external device like printers keyboard or scanners to computer a. Secondary memory b. primary memory c. Cache d. register
a. ISA b. Ports and interfaces 77. is also known as main memory
c. AGP d. PCI Express a. Secondary memory b. primary memory c. Cache d. register
Chapter 2 - Boolean Algebra
1. In boolean algebra, the OR operation is performed by which properties?
a) Associative properties b) Commutative properties
78. has to be refreshed continuously to store information c) Distributive propertiesd) d)All of the Mentioned
a. SRAM b. primary memory c. DRAM d. register
79. RAM is synchronized to system clock
2. The expression for Absorption law is given by
a) A + AB = A b) A + AB = B c) AB + AA’ = A d) A + B = B + A
a. DDR-DRAM b. SRAM c. DRAM d. SDRAM
80. Access speed of SRAM ranges upto 3. The involution of A is equal to
a. 2 to 10ns b. 100 to 1000ns c. 10 to 100ns d. 10 to 50 ns a) A b) A’ c) 1 d) 0
81. Access speed of DRAM ranges upto 4. A(A + B) =?
a. 2 to 10ns b. 50 to 150 ns c. 100 to 1000ns d. 10 to 50 ns a) AB b) 1 c) (1 + AB) d) A
82. is essential for computer to prevent them from failures, breakdowns orshutdown 5. (A + B)(A’ * B’) =?
a. Power supply b. software c. hardware d. user a) 1 b) 0 c) AB d) AB’
83. converts Ac power to Dc power needed by system 6. Complement of the expression A’B + CD’ is
a. UPS b. SRAM c. DRAM d. SMPS a) (A’ + B)(C’ + D) b) (A + B’)(C’ + D) c) (A’ + B)(C’ + D) d) (A + B’)(C + D’)
84. converts 230v of AC to 5 to 12 v of DC 7. Simplify Y = AB’ + (A’ + B)C.
a. UPS b. SRAM c. DRAM d. SMPS a) AB’ + C b) AB + AC c) A’B + AC’ d) AB + A
85. is a power supply that includes a battery to maintain power in the event of powerfailure. 8. The boolean function A + BC is a reduced form of
a. UPS b. SRAM c. DRAM d. SMPS a) AB + BC b) (A + B)(A + C) c) A’B + AB’C d) (A + C)B
86. avoids momentary power lapses by continuously providing power from its owninverter, evn when the 9. The logical sum of two or more logical product terms is called
power line is functioning properly. a) SOP b) POS c) OR operation d) NAND operation
a. Off line UPS b. stand by UPS c. Online UPS d. SMPS 10. The expression Y=AB+BC+AC shows the operation.
87. monitors the power line and switches to battery power as soon as it detects aproblem. a) EX-OR b) SOP c) POS d) NOR
a. Power supply b. stand by UPS 11. The expression Y=(A+B)(B+C)(C+A) shows the operation.
c. Online UPS d. SMPS a) AND b) POS c) SOP d) NAND
88. is a process of setting up your hardware devices and assigning resources to themso that they work 12. The canonical sum of product form of the function y(A,B) = A + B is
together without problems a) AB + BB + A’A b) AB + AB’ + A’B c) BA + BA’ + A’B’ d) AB’ + A’B + A’B’
a. Computer configuration b. software 13. A variable on its own or in its complemented form is known as a
c. hardware d. power supply a) Product Term b) Literal c) Sum Term d) Word
14. Canonical form is a unique way of representing
******************** a) SOP b) Minterm c) Boolean Expressions d) POS
15. Boolean algebra is also called
a) switching algebra B. arithmetic algebra C. linear algebra D. Algebra
16. To perform product of max terms Boolean function mustbe broughtinto
a. AND term b. OR terms c. NOT terms d.NAND terms
17. According to the Boolean algebra absorption law, which of the
following iscorrect?
a. x+xy=x b. (x+y)=xy c. xy+y=x d.x+y=y
18. The expression for Absorption law is given by
a. A + AB = A b. A + AB = B c. AB + AA' = A d. A + B = B + A
19. X*y = y*x is the
a. commutative law b. inverse property
c. associative law d. identityelement
20. There are minterms for 3 variables(a,b,c)
a. 0 b. 2 c. 8 d. 1
21. expressions are can be implemented using either (1) 2-level AND-OR
LOGIC CIRCUITS (2)2-LEVEL NAND logic circuits.
a. pos b. literals c. sop d. none of the above
22. the output of x-nor gate is 1 which input combination is correct.a.
a=1,b=0 b. a=0 b=1 c. a=0, b=0 d. a=0, b=1
23. odd parity of word can be conviently tested by
a. OR GATE b. AND GATE c. NAND GATE d. X-OR GATE

24. determine the values of a,b,c,d that make the sum term
A+B+C+D
a. a=1 b=0 c=0 d=0
b . a=1 b=0 c=1 d=0
c. a=0 b=1 c=0 d=0
d. a=1 b=0 c=1 d=1
25. which of the following expressions is in the sum-of- product(sop)form.
a. (a+b)(c+d) b. (a)b(cd) c. ab(cd) d. ab+cd

26. For the SOP expression , how many 1s are in the truth table'soutput 51. Given that F = (A + B'+ C)(D + E), which of the following represents the only correct expression for F'?
column? a) F' = A'BC'+ D'+ E' b) F' =AB'C + DE c) F' = (A'+ B + C')(D'+ E') d) F' = A'BC' + D'E'
a) 1 b) 2 c) 3 d) 5 52. The product of sum canonical form also known as
27. A truth table for the SOP expression has how many input A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
combinations? 53 are the alternative form of canonical form.
a) 1 b) 2 c) 4 d) 8 A. SOP B. POS C. BOTH A AND B d. NONE OF THE ABOVE
54. The sum of product canonical form also known as
28. How many gates would be required to implement the following Booleanexpression A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
beforesimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5 55 . One of De Morgan's theorems states that. Simply stated, this means that logicallythere is
29. How many gates would be required to implement the following Boolean expressionaftersimplification? nodifference between:
XY + X(X + Z) + Y(X + Z) a) a NOR and an AND gate with inverted inputs
a) 1 b) 2 c) 4 d) 5 b) a NAND and an OR gate with invertedinputs.
30. Determine the values of A, B, C, and D that make the product term equal to 1 c) an AND and a NOR gate with inverted inputs.
a) A = 0, B = 1, C = 0, D = 1 d) a NOR and a NAND gate with inverted inputs.
b) A = 0, B = 0, C = 0, D = 1
c) A = 1, B = 1, C = 1, D = 1 *********************
d) A = 0, B = 0, C = 1, D = 0
31. What is the primary motivation for using Boolean algebra to simplify logicexpressions?
a) It may make it easier to understand the overall function of the circuit.
b) It may reduce thenumber of gates.
c) It may reduce the number of inputs required.
d) all of the above
32. Use Boolean algebra to find the most simplified SOPexpressionfor F = ABD + CD + ACD + ABC + ABCD.
a) F = ABD + ABC + CD b) F = CD + AD c) F = BC + AB d) F = AC + AD
33. In Boolean algebra the word ‘literal’ means
a. a product term b. all the variables in a Boolean expression
c. the inverse function d. a variable or it’s compliment
34. The truth table for sop expression AB+𝐵 ̅ C has how many input
combinations?
a. 1 b. 2 c. 4 d. 8
35. converting the Boolean expression LM+M(NO+PQ) to sop form , we get
a. LM+ MNOPQ
b. B. L+MNO+MPQ
c. LM+M +NO+MPQ
d. LM+MNO+MPQ
36. the product of sum is basically the oring of anded terms
A. TRUE B. FALSE C. May be both d. None of the above
42. By applying De Morgan's theorem to a NOR gate, two identical truthtables can be produced.
a) True b) False c) may be both d) answer not given
43. The process of reduction or simplification of combinational logic circuitsincreases
thecost of the circuit.
a) True b) False c) may be both d) answer not given
44. Most Boolean reductions result in an equation in only one form
. a) True b) False c) may be both d) answer not given
45. The binary value of 1010 is converted to the product term.
a) True b) False c) may be both d) answer not given
46. In the commutative law, in ORing and ANDing of two variables, the order inwhich thevariables are ORed or
ANDed makes no difference.
a) True b) False c) may be both d) answer not given
48. Determine the binary values of the variables for which the followingstandard POSexpression is equal to 0.
a) (0 + 1 + 0)(1 + 0 + 1) b) (1 + 1 + 1)(0 + 0 + 0) c) (0 + 0 + 0)(1 + 0 + 1)
d) (1 + 1 + 0)(1 + 0 + 0)
49. The expression W(X + YZ) can be converted to SOP form by applying which law?
a) associative law b) commutative law c) distributive law d) none of the above
50. Simplification of the Boolean expression AB + ABC + ABCD + ABCDE +ABCDEF yields which of the
following results?
A) ABCDEF B) AB + CD + EF C) A + B + C + D + E + F D) AB
MCQs Chapter 3 - LOGIC GATES Chapter 4 : DATA STRUCTURES
1. is a specialized format for organizing and storing data
1. Electronic circuits that operates on one or more input signals to producestandard a) data structure b) primitive data structure c) sorting d)merging
output
2. is a method of storing the data in memory so that it can be used efficiently.
a. series circuits b. parallel circuits c. logic signals d. logic gate a) Array b)data structure c) sorting d)merging
2. logic gates are the building blocks of all circuits in a computer 3. Which operation is used to remove the data structure from memory space
A. TRUE B. FALSE C. may be both D. No answer given
a)create b)select c)update d)destroy
3. A gate gives the output as 1 only if all the inputs signals are 1.
4. Which is the collection of homogeneous elements under the same name?
A. AND B. OR C. X-OR D. NOR
a) Array b)data structure c) stack d)queue
4. the Boolean expression of an or gate is 5. which data structure has linear relationship between data elements?
a. A.B b. A+B c. AA+B d. AB
a) non linear b)linear c) stack d)queue
5. The gate which is used to reverse the output obtained is 6. In which data structure every data item is connected to several other data items?
A. NOR B. NAND C. X-OR D. NOT
a) non linear b)linear c) stack d)queue
6. which of the following gate will give a 0 when both of it’s inputs are 1. 7. Array size should be_
A. AND B. OR C. NAND D. X-OR
a) negative number b)positive number c)null d)Zero
7. The universal gate that can be used to implement any Boolean expression is ……….. gate . 8. To find length of array we use
A. NAND B. X-OR C. OR D. AND
a)L=UB-LB+1 b)L=LB-UB+1 c)L=UB-LB d)L=LB-UB
8. The gate which is called as inverter gate 9. The base address of an array is address of
A. NAND B. X-OR C.NOR D. NOT
a)UB b)LB c)UB-LB d)LB-UB
9. The and gate is represented algebraically by 10. The formula to calculate address of an element of an array A is
a. + b. * c. -- d. %
a)loc(A[I])=base(I)+W(I-LB) b) loc(A[I])=base(A)+W(I-UB)
10. the only gate that has 1 input and 1 output c) loc(A[I])=base(I)+W(I-UB) d) loc(A[I])=base(A)+W(I-LB)
A. AND B. OR C. NOT D. X-OR
11. Example for traversing in a linear array is
11. The universal gate is a)binary search b) linear search c)to find max element in an array
A. NAND B. X-OR C. OR D. AND d)inserting an element at given position in an array
12. what combination is a Nand gate 12. Binary search compares the element to be searched with element of an array
A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR a) first element b) middle element c)last element d)all the element
13. what combination is a NOR gate 13. In binary search method if search element is less then mid position then
A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR a)high=mid-1 b)low=mid+1 c)high=mid+1 d)low=mid-1
14. A NAND gate has inputs and outputs 14. Linear search compares the elements
a. high input and high output b. high input and low output a)one by one from beginning to end b) dividing array into two parts
c. low input and low output d. low input and high output c) only first and last position d) from low to mid position
15. who invented the idea of logic gates 15. In binary search the successful search is when_
a. George boole b. barden c. calude shanon d. kornard zure a)A[mid]=ele b)A[i]=ele c)ele<A[mid] d) ele>A[mid]
16. which of the following are the airthmatic logic gates? 16. for I=N-1 down to Pos is the loop for
a. X-ORB. X-NOR C. BOTH D. NONE OF THE ABOVE a)deleting element in array b)inserting element in an array c) traversing d)both a and b
17. which of the following is not a logic gate 17. In operation all the elements are shifted into lower order position from the given position
a. AND B. OR C. IF D. NOT a)deleting element in array b)inserting element in an array c) traversing d) binary searching
******************
18. Which is not the sorting method?
a)heap sort b)quick sort c)shell sort d)linear sort
19. The memory address of element A[i][j] in row major order is
a)loc(A[i][j])=base(A)+W((i-LB)+n(j-LB)) b) loc(A[i][j])=base(A)+W(n(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+n(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+n(j-LB))
20. The memory address of elements A[i][j] in column major element is
a)loc(A[i][j])=base(A)+W((I-LB)+m(j-LB)) b) loc(A[i][j])=base(A)+W(m(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+m(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+m(j-LB))
21. The base address of an array is address of the a)A[1] b)A[n-
1] c)A[0] d)both a and b
22. Which data structure is used to implement queues, trees, graphs
a)stack b)list c)array d)None
23. In which data structure addition and deletion of element takes place from same position
a)stack b)list c)array d)queue
24. In stack the end is commonly referred as
a)Top b)bottom c)rear d)front

25. In stack the end opposite is known as 51. In linked list the position start gives the location of node
a)Top b)base c)rear d)front a)first b)last c)middle d)second
26. In stack which element is removed first 52. In linked list the pointer start position is also called as
a) element inserted at first b)most recently added element c)middle element d)second element a)NULL b)head c)Tail d)none
27. In which position of the stack element will be in longest time? 53. The link field of last node contains
a)A[0] b)base c)top d)both a and b a)NULL b)head c)Tail d)none
28. Stack perform the operation 54. In linked list link field of every node contains
a)last in first out b)last in last out c)last in fast out d)first in first out a) data of the node b)data of next node c)address of last node d)address of next node
29. In which operation stack is not modified 55. In doubly linked list which node points to the address of previous node?
a))push(item) b)pop() c)peek() d)none a) info b)frowc)back d)head
30. What is the function of Peek() operation 56. Which operation is not possible in linked list
a)removes top item from stack b) test stack is empty or not a)sorting b)searching c)merging d)inserting
c)returns the number of items in stack d)returns top item from stack but does not remove. 57. Pointer=new type[number_of_elements] is syntax for
31. Push operation in stack is a)pointer declaration b)allocate memory for single element
a) First increases top position and insert element c)allocate memory for block element d)structure.
b) first insert element and then increases top position 58. In which data structure each node is connected to several other nodes
c) first decreases top position and insert element a) non linear b)linear c) stack d)queue
d) first insert element and decrease the top position 59. Which data structure represents hierarchical relationship
32. Which of the following is not an application of stack. a) non linear b)linear c) stack d)queue
a) rearranging railroad cars b) runtime memory management 60. Each node in a tree has child node
c) multiprogramming platform d) conversion of infix expression into postfix and prefix expression a)zero b)more c) both a and b d)no
33. Example for infix expression 61. Root node in a tree is at position
a)+ab b)a+b c)ab+ d)none a)top b)bottom c)middle d)right
34. The condition top=-1in stack indicates 62. From node all the operations commence in tree
a) stack is full b)stack has one element c)stack overflow d)stack is empty a)leaf b)child c)root d)internal
35. The condition top=n-1 in stack indicates 63. The edges in a graph having directions is called
a) stack is full b)stack has one element c)stack underflow d)stack is empty a) undirected graph b)arcs c)digraph d)all the above
36. In which data structure addition of new element and removal of element takes place at different end 64. prefix expression of (A+B)*(C+D) is
a) non linear b)linear c) stack d)queue a)*+AB+CD b)+AB*+CD c)AB+Cd+* d)+*AB+CD
37. In Queue items are inserted at end 65. Prefix expression of 2*3/(2-1)+5*3 is
a) Top b)front c)rear d)bottom a)*23-21/-53*1 b)23*21+/53*+ b)21*23-/35*+ d)-/53*+23*21
38. In queue items are removed at end 66. ele=stack[top] is for
a) Top b)front c)rear d)bottom a)pushb)pop c)enqueue d)dequeue
39. In queue we remove the element which is 67. Prefix expression ofA+(B*C-(D/E^F)) is
a)least recently added b)most recently added c)both a and b d)none a)ABC^/DEF* b)ABC*DEF^/ c)^/ABC*DEF d)*ABC/DEF^
40. Queue is also called as 68. During conversion of infix to postfix pop is done when appears
a) last in first out b) first in last out c)first in first out d)first in first in a)( b)) c)~ d)::
41. In queue which operation is generally called as push 69. Each operator in postfix string refers to its operand in a string
a) enqueue b) dequeue c)push d)pop a)previous 3 b)next 3 c)next 2 d)previous 2
42. Which condition indicates queue is empty 70. 10, 20, 25, 35, 30 40 for the list which searching technique can be applied
a)front=null b)rear=N c) front=rare d)both a and b a)binary search b)linear search c)both a and b d)none
43. Which condition indicates only one element in queue 71. Which operation access each data element exactly once
a)front=null b)rear=N c) front=rare d)rear=N-1 a)traversal b)insertion c)searching d)sorting
44. Various application software is based on data structure 72. Stack can be represented using
a) linked list b)graph c) stack d)queue a)array b) linked list c)both a and b d)none
45. In which of the following application queue data structure is used 73. In binary search when the element is searched either right half or the left half of anarray
a)simulation b) type scheduling algorithm c) print server routine d)all ofthese a) element is found b)search element comparison matches
46. In which data structure element can be inserted and removed in any position c)comparison does not match d) low position is less than high position
a)simple queue b)circular queue c)priority queue d)double ended queue 74. In searching if (loc>=0) is
47. In which queue addition and deletion takes place at both the ends a)unsuccessful search b) binary search
a)simple queue b)circular queue c)priority queue d)double ended queue c) linear search d) successful search
48. The dis advantage of array is 75. Array with one row or one column is a
a)static structure b)dynamic structure c) variable d)both a and b a)1D array b)2d array c)multi dimensional array d)both a and b
49. In which operation array elements are shifted into higher order positions 76. Which operation is used to change data in data structure
a)deletion b)insertion c)searching d)sorting a)create b)destroy c)select d)update
50. In which operation array elements are shifted into lower order positions
a)deletion b)insertion c)searching d)sorting
77. The study of data structure mainly deals with
a)implementation of structure on computers b)mathematical description of structure
c) to determine amount of space in memory d)all of these
78. is a set of vertices and edges Chapter 7: Classes and Objects
a)tree b)graph c)queue d)stack 1. Programming Language which supports object oriented programming(OOP) is
79. Which node is farthest node from root node (a) C++ (b) Visual Basic (c) C language (d) Fortran
a) child node b)top node c)leaf node d) middle node 2. Programming language support oop concept
80. list in linked list contains unused nodes (a) C++ and C# (b) java (c) python (d) All
a)Avail b)head c)null d)start 3. Programming languages does not support oop concept
81. Dynamic memory is allocated using operator (a) C and PASCAL (b) COBOL (c) FORTRAN (d) All
a)create b)null c)new d)pointer 4. Keyword used to create class is
82. In which linked list it is not possible to access preceding nodes (a) Classname (b) class (c) private (d) protected
a)singly b)doubly c)circular d)all of these 5. Member function means
83. A text can be reversed using (a) Just a function (b) function which is member of class
a)tree b)graph c)queue d)stack (c) Both a and b (d) All the above
84. While ((j>=1) and (A[j]<A[j-1])) is the logic for 6. The data elements of a class are called
a) inserting element b)sorting element b)deleting element d)searching element (a) Member Data (b) data (c) private members (d) All the above
85. for i=0 to N-1 If(A[i]==ele) is logic for 7. The Data member of class defines
a) inserting element b)sorting element b)deleting element d)searching element (a) Just data variables (b) variables
86. The method of collecting deleted nodes into free storage is called (c) characteristics of class (d) behavior of the send class
a) heap memory b) free memory c)garbage collection d)dynamiccollection 8. The member function of the class defines
87. In queue insertion and deletion performed according to (a) Functions of class (b) data functions
a) FIFO b)FILOc)LIFO d)all of these (c) characteristics (d) behavior of the class
88. Which of the following data structure does not have different types 9. A class combines and into single unit.
a) array b)linked list c) stack d)queue (a) Data members and member function
89. If we try to delete node from the linked list which is empty is called (b) Only data members of the class
a)overflow b)underflow c)inserting d)deleting (c) Only member function of the class
90. linked list is called as two way list a)singly (d)All the above
b)doubly c)circular d)none 10. A class definition is processes of
91. As user navigate from web page to web page then the pages are placed on (a) Only naming the class
a) array b)linked list c) stack d)queue (b) Only includes writing interface operations
92. The operators in between two operands are called as expression (c) Naming the class and methods and data members
a)infix b)postfix c)prefix d)arthematic (d) Only includes naming the data variables
93. If an operator precedes two operands it is called as expressiona)infix 11. A class can contain member functions
b)postfix c)prefix d)arthematic (a) Many
94. If an operator follows the two operands it is called as expression (b) Zero or more
a)infix b)postfix c)prefix d)arthematic (c) One or more
(d) Both b and
95. for i=lb to ub Process (A[i]) is logic for
a) inserting element b)sorting element b)deleting element d)traversing 12. The Data member of a class describe of a class
96. Which data structure directly operates on machine level instructions (a) Behavior (b) characteristics
(b) Only a is correct (d) both a nd b is correct
a)int b)array c)string d)trees
97. Which is not the operation on linear data structure 13. Class body definition ends the symbol
a) inserting b)sorting b)updating d)traversing (a) ; (b) : (c) :: (d) .
98. What is the statement to copy the top element into variable 14. Class body is enclosed in a pair of
a)s[top]=ele b)ele=s[top] c)s[++top]=ele d)both a and b (a) ( ) (b) [ ] (c) { } (d) All the above
99. What is the statement to copy the variable element into rear position in queue 15. A object is defined to be an
a)q[rear]=ele b)q[front]=ele c)ele=q[rear] d)ele=q[front] (a) Instance of a class (b) copy of the class
100. tree is a tree which at most two decedents (b) Both a and b (d) None of the above
a) binary tree b)sub tree c)b+ tree d)full 16. The access specifiers of the class define
******************** (a) Keywords (b) Data members
(c) member functions (d) Scope of the members
17. Private accesses specifiers means.
(a) members can be accessed only with in the class
(b) members can be accessed only outside the class
(c) members can be accessed both inside and outside the class d. all the above

18. The symbol used to define member function outside the class is 30. syntax for member function outside class definition is
(a) @ (b) & (c) * (d) : : (a) return_type_specifier classname::functionname(arg_list)
19. The default access specifier is {statements
(a) Private (b) protected (c) public (d) All the above ………….}
20. The members are accessible only inside the class (b) void student::input()
(a) Private (b) protected (c) public (d) friend (c) void input()
21. The feature of public access specifiers is (d) returntype functionname(arglist)
(a) Members are accessible only outside the class 31. Example for outside class definition is
(b) Members are access both inside and outside the class (a) void student::input()
(c) Members are accessible only inside the class {
(d) All the above Cout<<”Enter regno and name”<<endl;
22. One special feature of protected access specifier is Cin>>regno>>name;
(a) Cannot be inherited from one to another }
(b) Can be inherited from one class to another (b) void input()
(c) Can be used outside the class (c) Void display(arglist)
(d) Can be accessed using . (dot) operator (d) All the above
23. The difference between private and protected is 32. Using which methods and object can be passed to function
(a) Private cannot be inherited and protected can be inherited (a) Using only pass by function
(b) Protected cannot be inherited and private can be inherited (b) Using pass by data members
(c) No difference between both (c) Pass by data and member function
(d) Both can be accessed outside the class (d) Using Pass by value and pass by reference
24. Which operator is member selection operator? 33. Member function can be defined in how many methods
(a) . (dot) (b) & (address) (c) || operator (d) ! (not operator) (a) 2 (b) 1 (d) 3 (d) a and b
25. The member can be accessed outside the class using dot(.) operator. 34. Member function can be defined using and _ methods
(a) Public (b) protected (c) private (d) friend (a) Only outside the class
26. The class members can be accessed using operator (b) Only inside the class
(a) :: (scope) (b) . (dot) (c) & (address) (d) * (pointer) (c) Both inside and outside the class
(d) All the above
27. Inside member function means
(a) Both Declaration and Definition appear inside the class 35. The class members can be
(b) Only Declaration appears inside the class (a) Only private
(c) Only definition appears inside the class (b) Only protected
(d) Both b and c (c) Only public
(d) Private , protected or public
28. Syntax for memberfunction inside the class is
(a) return_type_specifier functionname(argument_list) 36. Syntax for creating object is
{ (a) Classname objectname1,objectname2,…;
Statements; (b) Student obj1,obj2;
………… (c) Class classname objectname1, objectname2;
} (d) Both a and c
(b) void classname::input() 37. The array of object is
{ (a) An array having classtype elements
Statements; (b) Array as a member of the class
…..} (c) Array stores many values of same type
(c) return_type_specifier classname::functionname() (d) All the above
(d) void input() 38. The is an example for creating the objects
29. An example for member function inside class is (a) Student obj1,obj2;
(a) Returntype functionname() (b) Class student obj1,obj2;
(b) void input() (c) Both a and b
{cout<<”Enter regno and name”<endl; (d) Only a
Cin>>regno>>name; 39. How many methods are there to pass objects as argument to member function(a) 2 (b) 3
} (c) 1 (d) 4
(c) both a and b 40. A class is of an object
(d) only a is correct (a) Blue print or prototype
(b) Defined using classname
(c) A group of students
(d) Class name defines the class
41. A class is collection of objects having
(a) Similar characteristics and behavior Chapter 8: Function Overloading
(b) Only character 1. Function cannot be overloaded when -
(c) Only behavior (a) Function names are same
(d) All the above (b) Number of parameters are different
42. Is it possible to access the data outside the class? (c) Number of parameters are same
(a) Yes , if it is under public (d) Data types of parameters are different
(b) No , if it is under private 2. Function can be overloaded when
(c) Both a and b (a) Function names are same (c) The data types of parameters are
(d) Not possible (b) Number of parameters are different
43. Set of interface operations that are performed on objects are called different (d) All the above
(a) Member variable (b) class function 3. Friend function is a
(b) Member function (d) class variable (a) Non member function of class (c) Both a and b
(b) Can access both private and (d) None of the above
44. The protected members of the class can be accessed by
(a) Member function of class but only inside the class protected members
(b) Member function of the derived class 4. C++ Implements polymorphism through
(c) Friend functions of the class (a) Inline function
(d) All the above (b) Friend function
45. What is the use of scope resolution operator?
(a) Link between class and member function (c) Function overloading and operator overloading
(b) To write member function definition outside the class (d) Both a and b
(c) Both a and b 5. Need for function overloading is
(d) Only a (a) Code maintenance is easy
46. An Example for array of object is (b) Easy to understand the flow of information and debug
(a) Student obj[10]; (c) Easier interface between program and real world objects
(b) Class student stu_obj[50]; (d) All the above
(c) Employee emp[15]; 6. The Restrictions on overloaded functions are
(d) All the above (a) Each function in a set of overloaded function must have different argument list
47. Example to pass object as function argument can be (b) If typedef is used for naming functions then the function is not considered as differenttype
(a) void total(Exam puc, Exam cet) (c) Both a and b
{ (d) None of the above
P=puc.p+cet.p; 7. The other functions used in class are
C=puc.c+cet.c; (a) Overloaded functions (c) Friend function
M=puc.m+cet.m; (b) Inline functions (d) All the above
} 8. The inline function means
(b) Returntype functionname(classname obj, classnae obj) (a) Very long function (c) Short function
(c) Both and b (b) Can contain too complicated code (d) Both a and b
(d) All the above 9. The inline function can be
48. The other names for member functions are (a) Very short function

(a) Methods and Interfaces (b) The compiler replace function call with (c) Both a and b
(b) Only methods function code (d) None of the above
(c) Only set of interface operations 10. The advantages of inline functions are
(d) All the above (a) Inline functions are compact (c) Very efficient code can be
49. The member functions may be defined or of class function calls generated
(a) Inside or outside (b) The size of object code is reduced (d) All the above
(b)Only outside 11. In which type of functions, the compiler replaces the function call statement with thefunction
(c) Only inside code is
(d)All the above (a) Friend function b) Inline function c) Function overloading d) Both a and b
50. members can be accessed inside or outside of class definition. 12. In which function category two or more function have same name but different in numberof argument
(a) Public (b) private (c) protected (d) all the above list and their data type.
(a) Function overloading (b)Inline function
(c) Friend function (d) All the above
*********
.

27. The disadvantage of inline functions can also be


13. The inline function cannot include the (a) The size of the executable file increases and more memory needed
(a) goto statement (b) looping (c) Recursive function body (d) all the above (b) The body of inline function is substituted in place of function call
14. The keyword to create the inline function is (c) Both a and b
(a) Friend (b) private (c) Class (d) inline (d) None of the above
15. The friend function means
(a) A short function
(b) run little faster 28. The feature of friend function may include
(c) can access private and protected members outside the class. (a) These are normal external functions with special rights
(d) Both a and b (b) These are very common functions
16. Using friend function members are accessed using following syntax (c) These are invoked like normal functions
(a) Objectname.membername (c) Only membername (d) Both a and c
(b) Only object name (d) All the above 29. The inline functions are defined inside the class
(a) Member function (c) may contain goto and switch
17. While defining friend function it does not use either keryword or __operator. (b) too complex functions (d) none of the above
(a) & or . (b) friend or :: (c) objectname.membername or objectname (d) all theabove 30. The prefix used with friend functions is
18. How to accesses the member of the friend function
(a) Member are accessed directly using member names (a) friend (b) inline (c) void (d) class
(b) Specifying objectname.membername 31. The friend function must be declared within with friend keyword
(c) Any above method (a) Class (b) outside class (c) using :: operator (d)all the above
(d) All the above methods 32. The friend function definition must be written without the prefix friend or :: operator.
19. The friend function declaration in the class is of (a) Outside the class
(a) Only public scope (b) Inside the class only
(b) Only private scope (c) Can be written both inside and outside
(c) Only Protected scope (d) All the above
(d) Can be any scope in the class (private, protected, public) 33. The friend function can access the public data members like functions
20. A friend function is a of a class (a) Non member (c) External function
(a) Non member function (c) Inline function (b) Member functions (d) None of the above
(b) Private function (d) Public function of a class *********************************

21. Use of friend function is rare since it violates the rule of


(a) Encapsulation (c) Both a and b
(b) Data hiding (d) None of the above
22. Function overloading is not possible when
(a) Function name are same
(b) Number of arguments are different

(c) Number and data types or arguments are same


(d) Data types of argument are different
23. Inline function may not work when
(a) Function has looping (c) Function has recursive function
(b) Function has switch or goto (d) All the above
24. Friend function can access members of class
(a) Private (c) Protected
(b) Public (d) All the above
25. How friend function can access members of class
(a) Using dot (.) operator

(b) Using objectname.membername with each membername


(objectname.membername)
(c) Using objectname’
(d) Using classname and object name
26. The Function overloading can include
(a) Ordinary functions
(b) Member function
c) Both a and b
d) Only member function
Chapter 9 : CONSTRUCTORS AND DESTRUCTORS
24. method is used for constructor with exactly one argument.
1. Automatic initialization of object is carried out using a special member function called a) explicit call b) implicit call
a) constructors b) destructors c) friend functions d) inlinefunctions. c)initialization at the time of declaration with =operator d) destructors
2. Constructors are called automatically when_ 25. In declaration is followed by assignment operator and value to be initialized
a) object is destroyed b) object is created c) class is created d)constructor iscreated a) explicit call b) implicit call
3. constructs the values of the data members of the class. c)initialization at the time of declaration with =operator d) none of the above
a) destructors b) constructors c) class d) member function 26. Using constructors one object can be copied to another object.
4. Constructors name is same as name. a) copy b)default c)zero parameterized d)parameterized
a) class b) member function c)object d)member data 27. constructors are used to initialize an object with values of already existing objects
5. Constructors should be declared in a) copy b)default c)zero parameterized d)parameterized
a) protected section b)private section c) public section d)anywhere inside class 28. constructors are used to return object as function values
6. There is no for constructors. a) copy b)default c)zero parameterized d)parameterized
a) arguments b)parameters c) return-type d) object 29. constructors are used to state object as by value parameter of a function
7. makes implicit calls to the operators new and delete when memory allocation is required. a) default b)parameterized c)copyd)argument
a)class b)object c)constructors d)member function 30. Copy constructors is not invoked
8. Default constructor is also called as a) explicitly b) implicitly c)initialization at the time of declaration with =operator d) normally
a)zero parameterized constructor b) copy constructors 31. When a new object is declared and existing object is passes as a parameter to it in the declaration
c)parameterized constructor d)destructors constructors are invoked
9. Which of the following is not a type of constructors. a) default b)parameterized c)copy d)argument
a. default constructors b)parameterized constructors c) copy constructors 32. is called automatically when the object is destroyed.
d)destructors a)destructors b)constructors c)class d)interface
10. …………. are useful when the object are need to be created without having to type 33. Which operator is used with destructors?
initial values. a) :: b)& c)~ d) *
a)copy constructors b)default constructors
34. is used to de-allocate memory that was allocated for the object by the constructors.
c)parameterized constructors d) destructors
a)class b)interface c) destructors d)constructors
11. When is declared for a class initialization of objects is done automatically.
35. takes no arguments
a) constructors b)object c) destructorsd)interface
a)parameterized constructors b)copy constructors
12. All objects of a class are initialized to same set of values by c)argument constructors d)destructors
a) copy constructors b)default constructors
c)parameterized constructors d)destructors
13.When user defined class does not contain an explicit constructors, compilers automatically invokes
__________ constructors.
a) copy b) default c) parameterized d)argument
14. Declaring constructors with argument it hides constructors.
a) default b)parameterized c)copy d)argument
15. It is no possible to initialize different objects with different initial values using
a) copy constructors b) parameterized constructors
c) default constructors d)destructors
16. A constructors that takes one or more arguments are called _ constructors
a) copy b)default c)parameterized d)zero argument
17. Using constructors it is possible to initialize different object with different values
a)copy b) parameterized c) default d)zero argument
18. constructors are invoked automatically when objects with arguments are created.
a) copy b)default c)zero parameterizedd)parameterized
19. constructors can be over loaded
a) parameterized b) default c)zero argument d)zero parameterized
20. constructors can have default arguments and default values.
a) default b) zero argument c)parameterized d) zero parameterized
21. Constructors can be invoked through
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) all of the above
22. declaration of an object is followed by assignment operator, constructor name and
argument list enclosed in parenthesis
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) none of the above
23. In declaration of an object is followed by argument list enclosed in parenthesis.
a) explicit call b. implicit call
b) initialization at the time of declaration with =operator d. none of the above

Chapter 10 : INHERITANCE 23. If class is derived from more than one base class then it is inheritance
1. provides the concept of Reusability a)single level b)multilevel c)multiple d)hybrid
a) procedural programming b)inheritance c)class d)functions 24.If more than one class is derived from a single base class is called inheritance
a)single level b)multilevel c)multiple d)hierarchical
2. allows the user to create a new class from an already existing class
25. inheritance is a combination of hierarchical and multilevel inheritance
a) inheritance b)classc)polymorphism d)binding
a)single level b)multilevel c)multiple d)hybrid
is the capability of one class to inherit properties from another class.
26. We can prevent multiple copies of base class being present in an object from thoseobjects by
a)polymorphism b)binding c)overloading d)inheritance
declaring the base class as
3. is a class whose properties are inherited by another class a)virtual b) abstract c) derived d)private
a)sub class b)base class c) derived class d)virtual class
27. class is one that is not used to create an object.
4. is a class that inherits properties from base class a)virtual b) abstract c) derived d)sub
a)sub class b)base class c)super class d)virtual class 28. When it is mandatory to have constructors in derived class.
5. Base class is also called as a) no base class constructors takes any arguments
a)sub class b)derived class c)virtual classd)super class
b) base class having constructors with one are more arguments
6. Derived class is also called as c) if the is default constructors in bas class d) if there is no constructors in baseclass
a)super class b)abstract class c)base class d)sub class
29. takes the responsibility of supplying initial values to its base class
7. Which of the following is the advantage of inheritance. a) super class b) virtual class c)derived class d)abstract class
a)reusing existing code b) faster development time c)memory utilizationd)all of *************
these
8. If no visibility mode is specified then by default the visibility mode is considered as

a) private b)protected c)public d)explicit


9. All the members of the class except members are inherited.
a) private b)protected c)public d)explicit
10. operator shows the derivation from the base class in inheritance.
a):: b)& c): d) *
11. specifies the features of base class are privately derived or publicly derived or protected
derived
a) visibility mode b) derivation c)inheritance d)polymorphism
12. controls the access specifiers to be for inheritable member of base class in the derived
class
a) overloading b) visibility mode c)inheritance d)polymorphism
13. In private inheritance the public members of base class becomes members of
derived class
a) private b)protected c)public d)not inherited
14. In private inheritance the protected members of base class becomes……membersof derived class
a) protected b)private c)public d)not inherited
15. In protected inheritance the public members of base class becomes ___membersof derived class.
a) private b)protected c)public d)not inherited
16. In protected inheritance the protected members of base class becomes
members of derived class.
a) protected b)private c)public d)not inherited
17. In public inheritance the public members of base class becomes members of
derived class.
a) protected b)private c)public d)not inherited
18. In public inheritance the protected members of base class becomes members
of derived class.
a) protected b)private c)public d)not inherited
19. In public inheritance the private members of base class becomes members of
derived class.
a) protected b)private c)public d)not inherited
20. If a class is derived from single base class it is inheritance
a)single level b)multilevel c)multiple d)hybrid
21. If a class is derived from an already derived class then it is inheritance
a)single level b)multilevel c)multiple d)hybrid
Chapter 11- POINTERS
16. & and * are two pointer operators which are
1. Which of the following is a correct way to declare a pointer? a) binary b) ternary
a) int *ptr b) int ptr c) unary d) logical
c) int &ptr d)all of the above
17. The size of pointer variable is same for all type of pointers but the memory that will beaccessed
while dereferencing is different.
2. Allocating sufficient memory for data and instructions during compilation is called a) true b) false c) may be d) all of the above
a) dynamic memory b) static memory
18. Pointer arithmetic is somewhat different from ordinary arithmetic
c) heap memory d) stack memory
a) true b) false c) may be d) all of the above
19. Which of the following type of address stored in pointer variable?
3. Which of the following is the pointer operator? a) character b) float c) integer d) none of these
a) * b) & c) d) all of the above
20. operator can be applied to pointer variable.
a) division b) multiplication c) logical d) casting
4. Which of the following is the pointer address operator?
a) * b) & c) d) all of the above
21. Which of the following is initialization of pointers (or) assignment of pointers
a) datatatype *pointer_variable;
b) datatype &pointer_variable;
5. operator returns the value located at the memory address specified by itsoperand.
c) pointer_variable=&variable_name;
a) * b) & c) d) new
d) pointer_variable=*variable_name;
22. A string is a array
6. static memory allocation is done at a) float b) integer c) character d) none of these
a) compile time b) dynamic time
c) run time d) execution time
23. pointer is used to store
a) memory address b) value c) data d) information
7. How do you declare a pointer?
a ) datatatype *pointer_variable; b) pointer_variable=&variable_name;
24. Which of the following is used to initialize pointer?
a) * b) & c) = d) ~
c) datatype &pointer_variable; d) datatype variable_name;
25. memory allocated during runtime is memory allocation.
a) compile time b) dynamic c) static d) none of the above
8. operator is used to allocate memory for objects during run time
a) new b) & c) delete d) * 26. New operator is used to create memory during
a) compile time b) runtime
9. Which of the following is not possible in the pointers?
c) static time d) none of the above
a) adding an integer value to pointers
b) subtracting an integer value from pointer 27. operator is used to delete memory created during runtime.
c) addition of two pointers a) new b) delete c) NOT d) AND
d) incrementing and decrementing of pointer 28. is the collection of addresses.
10. Which operator returns the value located at the address specified by its operand a) array of objects b) array of pointers
a) pointer operand b) delete operand c) array of elements d) array of variables
c) new operand c) address operand 29. is the built in pointer that hold the address of the object defined for a class.
11. A pointer is a variable which stores of another variable. a) this pointer b) New
a) name b) value c) delete d) AND
c) address d) all of the above 30. Pointers pointing to object of a class called
12. Which of the following is not an advantage of pointer? a) array of pointers b) class pointers
a) accessing array elements is faster c) object pointer d) this pointer
b) support dynamically allocated memory 31. is the structure that include an element that points to another structure of same type.
c) it reduces program complexity a) memory heap b) self referential structure c) structure d) memory pool
d) it decreases program execution speed 32. Dynamically allocated memory not deleted remains occupied called
13. pointer initialization is the process of assigning address of a variable to a pointer variable a) orphaned memory b) memory pool c) stream d) structure
a) true b) false c) may be d) cant say 33. pool of unallocated memory used for dynamic memory allocation is
14. Which of the following is dereferencing operator? a) orphaned memory b) free store
a) & b) # c) * d) c) allocated memory d) none of the above
15. Which of the following operator also known as value at address operator? 34. Which of the following is not possible in pointers?
a) * b) c) & d) :: a) adding an integer to pointer c) comparing two pointers of same type
b) adding two pointers d) subtracting an integer from the pointer

35. An example for array of pointer declaration is


a) int a[10] (b) int *a[10] (c) both a and b (d) none of the above

CHAPTER 13 :DATABASE CONCEPTS


Answer all the questions. Each question carries one mark.
I Select the correct answer from the choices given: (Repeated
36. The following can be considered as advantage of pointrs
answers will not be considered)
a) memory is utilized properly c) Easy to deal with hardware components
b) Dynamically allocate & de allocate d) All the above 1. DBMS stands for
memory a) Data Base b) Dual Bus Mass c) Data Base d) Direct Based
Management Storage Management Memory Standard
37. To assign the a pointer to array the following statement is used system Series
a) &a[0] (base address is assigned) b) a (just arrary name is used to assign
the base addres) 2. In Relational modes, cardinality is termed as:
c) Both a and b d) None of the above a) Number of b) Number of c) Number of d) Number of
38. To process the structure members using pointers the following method is used tuples attributes tables constraints
a) pointer_variable->struct_member c) Both a and b
b) (*pointer_variable).struct_member d) None of the above 3. The view of total database content is
a) Conceptual b) Internal View c) External View d) Physical View
39. To release dynamic memory function is used View
a) delete (b) new (c) both a and b (d)only b
40. To free or release dynamic Array memory
a) delete function c) delete ptr_var; 4. Cartesian product in relational algebra is c) Ternary d) Not defined
b) delete []ptr_var; d) all the above a) Unary operator b) Binary operator
41. To free or release dynamic structure operator
a) delete structure_name c) delete pointer_variable
b) delete object_name d) All the above
5. DML is provided for
42. The orphaned memory blocks when increase in number, bring adverse effect on system a) Description of b) Addition of new c) Manipulation & d) definition of
, this situation is called logical structure of structures in the processing of physical structure
a) free store c) memory leak database database system database of database system
b) Dynamic allocation d) may be a or b

43. The structure that include an element that is a pointer to another structure of the sametype is called 6. Architecture of the database can be used viewed as
a) array structure c) self referential structure a) two level b) four levels c) three levels d) one level
b) Dynamic structure d) All the above
7. In a relational model, relations are termed as
44. The objects are referenced using pointers using a) Tuples b) Attributes c) Tables d) Rows
a) objectname->membername c) Both a and b
b)(*objectname).membername d) None of the above
8. In case of entity integrity, the primary key may be
a) not null b) Null c) both Null & not d) any value
45. The following operation that cannot be performed over pointer: Null
a) Additon of two pointers
b) Multiplication of two pointers
c) Division of two pointers
d) All the above 9. A logical schema
46. Every object in C++ has access to its own address through an important pointer called..
a) is the entire b) is a standard way of c) describes how d) Both (a) and
a) this pointer
database organizing data is actually (b)
b) free pointer
c) object pointer information into stored on disk
d) all the above accessible parts
********

10. In the architecture of a database system external level is the


a) Physical level b) logical level c) conceptual level d) view level

11. In a Hierarchical model record are organized as


a) Graph b) List c) Links d) Tree

12. In an E-R diagram attributes are represented by


a) Rectangle b) Square c) ellipse d) Triangle
28. In E-R Diagram relationship type is represented by
a) Ellipse b) Dashed ellipse c) Rectangle d) Diamond

13. In an E-R diagram an entity set is represent by a 29. In E-R diagram generalization is represented by
a) Rectangle b) Ellipse c) Diamond box d) Circle a) Ellipse b) Triangle c) Rectangle d) Diamond

30. Rows of a relation is called


14. A subschema expresses a) Relation b) tuple c) data structure d) an entity
a) Logical view b) Physical view c) External view d) All the above
31. The primary goals of DBMS is/are to
15. Relational Algebra is a) provide an b) store the c) retrieve d) All the above
a) Data Definition b) Meta Language c) Procedural d) None of the environment thatis information information
Language query Language above congenial to user

16. What is a relationship called when it is maintained between two entities? 32. A in a table represent a relationship among a set of values
a) Unary b) Binary c) Ternary d) Quaternary a) column b) key c) row d) entity

17. Which of the following operation is used if we are interested in one certain columns of 33. Which normal form is considered adequate for relational database design?
a table? a) 2NF b) 3NF c) 4NF d) BCNF
a) Projection b) Selection c) Union d) Join
34. In database table, the category of information is called
18. A set of possible data values is called a) tuple b) record c) field d) All of the above
a) Attribute b) Degree c) Tuple d) Domain
35. An advantage of the database management approach is
19. Which of the following is record based logical model? a) data is b) data redundancy c) data is d) None of the
a) Network b) Object oriented c) E-R Model d) None of these dependent on increases integrated and above
Model model programs can be accessedby
multiple
programs
20. The natural join is equal to
a) Cartesian b) Combination of c) Combination of d) Combination of 36. A function is no partial dependencies are in form
Product Union and cartesian selection and projection and a) 2NF b) 3NF c) 4NF d) BCNF
product cartesian product cartesian product
37. Which one is not an application of database
a) sales b) college c) Attendance d) Bank
21. Hierarchical model is also called Register
a) Tree structure b) Plex structure c) Normalize d) Table Structure
38. In a database, which one is not a data type?
Structure a) Varchar b) Integer c) Date d) Float
22. In E-R diagram generalization is represented by 39. The features of database system are
a) Ellipse b) Dashed ellipse c) Rectangle d) Triangle a) Data security b) Enforcing data c) Data sharing d) All of the
integrity above
23. A data manipulation commands the combines the records from one or more tables is
called 40. Database architecture is logically divided into_ types.
a) SELECT b) PROJECT c) JOIN d) PRODUCT a) Two b) Three c) Four d) Multi
24. A table joined with itself is called 41. Three tier architecture includes
a) Join b) Self Join c) Outer Join d) Equi Join a) Presentation b) Application tier c) database tier d) All of the
tier above
25. Which of the following is not advantage of the database approach?
a) Increased b) Elimination of c) Ability to d) None of the 42. Mathematical set theory-based relations
security data redundancy associated with above a) Union - b) Deference – c) Both A and B d) None of the
relation data Intersection Cartesian Product above

43. Advantages of data ware houses:


26. Which of the following is another name for weak entity a) Enhance end- b) Increases c) Able to d) All of the
a) child b) Owner c) dominant d) All the above user access to productivity and combine data above
reports and decreases from different
27. Which of the following database object does not physically exist? analysis of computing costs. sources, in one
a) base table b) index c) view d) none of the information. place.
above

44. The information processing cycle consists of five specific steps: 25. is a process of analysing and picking out relevant information from data.(Data
a) Five b) Four c) Three d) None Mining)
45. The collection of raw facts and figures is called 26. Data about data is . (Metadata)
a) Information b) Data c) Processing d) Knowledge 27. is a set of values for an attribute in a column. (Domain)
28. An entry in a table is a . (Record)
46. A single entry in a table is called 29. Process of extracting knowledge from collected data is called (data
a) Row b) Tuple c) Field d) All of the above mining)
30. is a repository of an organization electronically stored data. (Data
47. ODBC stands for warehouse)
a) One data base b) Open data base c) oracle data base d) Order data base 31. describes how the data is represented and used. (Data model)
collection connectivity connection connectivity
32. combines two lower-level entity of from higher level entity.
(Generalization)
48. refers to maximum numbers of relationship in an entity. 33. Records are stored in chronological order in (serial file
a) Generalization b) Ordinality c) Cardinality d) Aggregation organization.
34. refers to the minimum number of relationships in an entity.
49. Candidate keys which are not currently selected as primary key is called (Cardinality)
a) Super key b) Composite key c) Alternate key d) foreign key
35. The duplication of data is called . (Data redundancy)
36. Ability of a database to modify a schema definition at one level without affected is
50. In which file organization data are stored in chronological order?
. (Data independence)
a) Serial file b) Random/direct c) Sequential file d) ISAM
organization file organization organization
37. Data sharing database is easy because of (centralized data
management).
II Fill in the blanks choosing the appropriate word/words from those given inbrackets. 38. Collection of rows and column is called . (table)
(Repeated answers will not be considered) 39. is a set of values for each column. (Primary Key).
1. is a collection of facts, figures, statistics. (Data) 40. is a DBMS software. (Oracle)
2. is processed data with some definite meaning. (Information)
************
3. A collection of logically related data organised in way that data can be easily accessed
managed and updated is called (Database)
4. A single entry in table is called a (Record or Row)
5. Records are also called the (Tuple).
6. Each column is identified by a distinct header called (Attribute or field)
7. Set of values for an attribute in that column is called (Domain).
8. A is a software that allow creation, definition and manipulation of database.
(DBMS)
9. is a process of hiding unwanted or irrelevant details from the end user.
(Data abstraction)
10. People who require access to the database for querying updating and generating reports is
(End Users)
11. is an ability of a database to modify a schema definition at one level
without affecting a schema in the next higher level. (Data Independence)
12. Database architecture is logically divided into _ types. (Three)
13. architecture is used for user interface program and application programs
that runs on client side. (Two-tier client/server)
14. data model is abstract model that describes how the data is
represented and used. (Data model)
15. The process of applying a data model theory to create a data model instance I
known as (data modelling)
16. is the process of organizing data in a database. (Normalization)
17. An can be any object, place, person or class. (Entity)
18. An describes a property or characteristics of an entity. (Attribute)
19. A describes relation between entities. (Relationship)
20. A is any set of one or more columns whose combined values are unique
among all Occurrences. (Candidate key)
21. is a key that uniquely identify each record in a table. (Primary Key)
22. is a field in a relational table that matches the primary key column ofanother
table. (Foreign key)
23. Key that consists two or more attributes that uniquely identify an entity occurrence
is called (Composite Key)
24. The process of sharing data stored in database is among multiple users.
(data sharing)
15. To delete some data from tables command is used.
a) DELETE b) SELECT c) UPDATE d)DROP
16. The command lets your drop a table from the database
a) DELETE b)SELECT c) UPDATE d) DROP
chapter 14: SQL commands 17. key is non-key column of a table that draws its values from primary key of another table (parent table)
1. Which of the following attributes can be considered as a choice for primary key? a) FOREIGN KEY b) UNIQUE c)CHECK d)PRIMARY KEY
a) Name b) street c) Roll no d) subject
2. What is the full form of SQL?
a) Structured Query Language c) Simple Query Language? CHAPTER 15 : COMPUTER NETWORKS
b) Structured Query List d) none of these 1) The full form of OSI is?
3. What is the full form of DDL a. Operating System interface
a) Dynamic Data Language. c) Data Definition Language b. Optical System interconnection
b) Detailed Data Language d) Data derivation language c. Operating System Internet
4. What does DML stand for? d. Open system interconnection
a) Different Mode Level c) Data Mode Lane
d) Data Manipulation Language 2) What is a HUB?
b) Data Model Languahe
a. Software
5. Which of the following keywords will you use in the following query to display the uniquevalues of a b. Computing device
column dept_name! Select dept_name from company: c. Network device
a) ALL c) Distinct d. Calculating device
b) From d) Name 3) What does a set of rules define?
a. SMTP
6. The clause of select query allows us to select only those rows in the result satisfy a specified b. FTP
condition. c. IMAP
a) where c) having d. Protocol
b) from d) like
4) Identify among the following which is mainly used to host web site.
a. Mail server
7. Consider following SQL statement. What type of statement is this? Select *
from employee; b. Webserver
a) DML c) DCL c. Database server
b)DDL d) Integrating constraint d. None
5) Identify the full form of HTTP?
8. The term is used to refer to a field in a table a. Hypertext Transfer Protocol
a) Attribute c) Row b. Hypertext Transfer Package
b) Tuple d) Instance c. Hyper Transfer Text Package
d. Hyper Transfer Text Practice
9. By default, ORDER by Clause lists the results in order 6) Identify the protocol primarily used for browsing data.
a) Descending c) Ascending
a. FTP
b) Any d) Both 1 and 3
10 . The keyword eliminates redundant data b. TCP
a) SELECT c) DISTINCT c. TFTP
b) WHERE d) None of these d. HTTP
7) Identify the first network which was based on TCP/IP protocol.
11. The _constraint provides a default value to column when the Insert into statement does not a. ARPANET
provide a specific value. b. HUB
a) DEFAULT c) CHECK c. Ethernet Card
b) UNIQUE d) NOT NULL d. Router
8) What does TCP/IP stand for?
12. The constraint ensure that all values in a column are distinct
a) DEFAULT b)UNIQUE c)CHECK d)NOT NULL
a. Telephone control protocol / Internet Protocol
13. Theconstraint ensures that all values in a column satisfy certain condition a)DEFAULT b. Transmission control protocol/Internet protocol
b)UNIQUE C) CHECK d) NOT NULL c. Transmission control protocol/International protocol
14 ----------- is used to identify each row in a table d. None
a) FOREIGN KEY b) UNIQUE c)CHECK d) PRIMARY KEY 9) The collection of hyperlinked documents on the internet known as?
a. HTML
b. Email
c. WWW
d. Internet
10) The location of a resource on the internet given by
a. Email

b. IP b. Point server
c. Protocol c. Data server
d. URL d. File server
11) Identify the incorrect network topology, 22)The location of a resource on the internet is given by its?
a. Bus a. Protocol
b. Star b. URL
c. P2P c. E-mail address
d. Ring d. ICQ
12) What is the protocol used when the main server sends mail to another mail server? 23) Which software prevents the external access to a system
a. FTP a. Firewall
b. SMTP b. Gateway
c. TCP/IP c. Router
d. MIME d. Virus checker
13)Identify among the following network device used to connect two dis-similar types ofnetworks. 24) Which one of the following is the most common internet protocol?
a. Switch a. HTML
b. Hub b. NetBEUI
c. Bridge c. TCP/IP
d. Gateway d. IPX/SPX
14) Identify the device used to boost up a weak signal. 25) The term FTP stands for?
a. Modem a. File transfer program
b. Repeater b. File transmission protocol
c. Switch c. File transfer protocol
d. Router d. File transfer protection
15)The arrangement where all data pass through a central computer is known as 26) Which one of the following is not a network topology?
a. Ring topology a. Star
b. Mesh topology b. Ring
c. Star topology c. Bus
d. Bus topology d. Peer to Peer
16)The device used in the network layer?
27) The term WAN stands for?
a. Application gateway
b. Switch a. Wide Area Net
c. Router b. Wide Access Network
d. Repeaters c. Wide Area Network
17) Which of the following topology arrangements is a point-to-point line configuration? d. Wide Access Net
a. Ring 28) The term MAN stand for?
b. Mesh a. Metropolitan Area Net
c. Star b. Metropolitan Area Network
d. All of the above c. Metropolitan Array Network
18)Identify the device which links two homogeneous packed broadcast local networks. d. Metropolitan Array Net
a. Hub 29) Which of the through share the data of two computer?
b. Router a. Library
c. Bridge b. Network
d. Gateway c. Grouping
19) What does LAN stand for? d. Integrated system
a. Local Array Network 30) It is a computer program deliberately created to damage data and hamper the performance
b. Local Area Network of the computer
c. Local Area Net a. System software
d. None b. Application software
20) Identify the switching method in which the message is divided into small packets. c. Utility software
a. Virtual switching d. Virus
b. Packet switching 31) Virus spread very fast through network and infected
c. Message switching a. Mind
d. None b. Pen drives
21) Identify among the following servers which allow LAN users to share data. c. Keyboard
a. Communication server d. Mouse
32) It infects program files as these have simple format t which virus can be attached 43) Which of the following are coaxial cable types?
a. Program virus a. thinnet
b. Boot virus b. thicknet
c. Multipartite virus C. copper
d. None of these D. A and B both
33) The virus that affects the boot sector of the hard disk and infects the operating system whichmake the hard 44) Thicknet can carry signal for meters.
disk completely useless a. 500m
a. Program virus b. 1000m
b. Boot virus c. 100m
c. Stealth virus d. 200m
d. None of these 45) The maximum segment length of Thinnet coaxial cable is
34) Which of these are harmful effects of virus a. 500 meters
a. Damages data files b. 185 meters
b. Increasing the size of files c. 4 meters
c. Slowing down processing speed d. None of the above
d. All of the above 46) The main source in fiber optic communication?
35) Computer software used to identify and remove computer virus a. light source
a. Anti virus b. transmission medium
b. Computer virus c. detector
c. Trojan horse d. all of the above
d. Worms 47) The core of an optical fiber is .
36) Quickheal, Norton, Smartdog, Mcaffee are the examples of a. glass
a. ComputerVirus b. plastic
b. Worms c. metal
c. Antivirus d. A and B
d. Trojan horse 48) Which of the following isn’t a type of transmission mode?
37)Abbrevation of SIM a. physical
a. Subscriber identity module b. simplex
b. Supplier information management c. full duplex
c. Singular information management d. half duplex
d. Source interlink media 49) In the transmission mode, communication is unidirectional
38) How many forms in twisted pair cable? a. Simplex
a. 2 b. half duplex
b. 4 c. full duplex
c. 3 d. semi-duplex
50) A transmission mode that can transmit data in both the directions but only one direction at a time.
d. None
a. simplex
39)The following are the types in twisted pair cable.
b. half duplex
a. Sheilded twisted pair
c. full duplex
b. Unsheilded twisted pair
d. semi-duplex
c. Both a and b
51) Telephone networks operate in this mode.
d. Twisted pair cable
a. simplex
40)UTP stands for…
a. unshielded transport pair cable b. half duplex
` b. unshielded twisted pair cable c. full duplex
c. unshielded transmission pair cable d. semi-duplex
d. unshielded twisted pair control 52) A walkie-talkie operates in
41)STP stands for… a. simplex
a. shielded twisted pair cable b. half duplex
b. shielded twisted pair connectors c. full duplex
c. shielded transport pair cable d. semi-duplex
d. shielded transport pair connectors 53) The is an example for a simplex device
42)How many types of coaxial cable? a. Repeater b. Tap c. Walkie talkie d. Keyboard
a. 2 54) In the transmission mode each station can transmit but not at the same time
b. 3 a. Simplex b. Half duplex c. full duplex d. b and c
c. 4 55) In the transmission mode both station can transmit and receive at the same time
d. 5 a. Simplex b. Half duplex c. full duplex d. b and c

56) A local telephone network is an example of a network.


a. Packet switching
b. Circuit switching
c. Bit switched
d. Line switched
57) What is the meaning of MODEM Chapter-16 INTERNET AND OPEN SOURCE CONCEPTS
a. Modulator and demodulator 1. OSS stands for
b. Modern electronic machine a) on system software b) open system software
c. Modern development machine c) open source software d) off system software
d. Machine and convertor 2. software whose source code is available to customers and it can be modified andredistributed
58) Which device is used for to send and receive data over telephone line is called
a. Router a) freeware b) OSS c) FSF d) proprietary software
b. Hub 3. Software which is available free of cost , but it cannot be modified is
a) freeware b) OSS c) FSF d) proprietary software
c. Switch
4. means the software which is freely accessible and can be freely used, changed,improved,
d. Modem
copied and redistributed. (OR)
59) What is the name for to convert digital signal to analog signal A software and coding which is freely available on internet is
a. Modulation a) freeware b) free software
b. De modulation c) Open Source Software d) proprietary software
c. Bypass 5. is responsible for producing the software standards for world wide web(WWW).
d. Encapsulation a) B2C b) W2C c) WWW d) W3C
60) An example for unshielded twisted pair cable(UTP) is 6. The software that is neither open nor freely available is
a. cat1 a) freeware b) free software
b. cat2 c) Open Source Software d) proprietary software
c. cat3 7. FSF stands for
d. All the above a) free software foundation b) friend software foundation
61) example for guided media c) federation of software for free d) free system federation
a. twisted pair wires, coaxial cables, and optical fiber cables b radio 8. OSI stands for
wave a) over source initiative b) open source initiative
c. micro wave c) open source of India d) open system initiative
d. all the above
62) example for unguided media
a. microwave or radio links and infrared light and laser 9. is a set of protocols that allows to access any document on the net through URLs.
b. twisted pair wires, coaxial cables, and optical fiber cables a) WWW b) HTML c) TCP/IP d) open source
c. both a and b 10. is an internet utility used earlier to log on to remote computers.
d. none of the above a) web b) browser c) server d) Telnet
63) The switching techniques are 11. navigates through the world wide web and displays web pages.
a. circuit , message , and packet a) web server b) web browser c) shareware d) software
b. simplex, half duplex and full duplex 12. responds to the requests made by web browsers.
a) web server b) web browser c) shareware d) software
c. both a and b
13. The documents residing on web sites are called
d. none of the above a) web browsers b) web pages c) web server d) web
*******
14. URL stands for
a) Universal reformation level b) uniform resource locator
c) uniform resource level d) uniform remote locator
15. is the trade of goods and services with the help of telecommunications andinternet.
a) E-commerce b) computerized commerce
c) E-trade d) Internet trade
16. Which of the following is not a service/technology of E-commerce?
a) E-mail
b) Electronic fund transfer (EFT)
c) Electronic Benefit transfer (EBT)
d) FSF
17. Which of the following is not a criteria for OSS? c) optimization of resources
a) FLOSS b) free redistribution d) All the above
c) source code available d) distribution of license 29) IPR related issues in India like patents trademarks, copyright, designs and geographical indications
18. Which of the following is not a type of E-commerce? are governed by the -
a) B2B b) C2B c) C2C d) C2D a) patent Act 1970 and patent Rules 2003
19. IPR stands for b) Trademark Act 1999 and the Trademarks Rules 2002
a) internet protocol rights b) international property rights c) Indian copyright Act 1957, design act 2000 and rules 2001
c) intellectual property rights d) Indian property rights d) all the above
20)A shareware software is one in which the 30) The domain Id’s .co and .mil are affiliation for and respectively
a) source code is not available a) commerce and mills
b) Modifications to the software is not allowed b) company and military
c) Both a and b c) commercial and military
d) Any one above d) all the above
21) A FLOSS refers to and
a) Free libre and open source software and both free software and open source softwareb)Freelirve and *****
open source software and both free software and open source software c) Both a and b chapter 17 - Web designing
d) only a is correct 22). 1. Html tags are surrounded by……………
Expand W3C a. Angle bracket c. Flower bracket
a) World wide web Consortium b. Braces d. Brackets
b) it is world wide web 2. Take out the odd one
c) wide three consortium a. <br> b.<hr> c.<img> d.<ol>
d) None of the above 3. The tag which encloses an entire html document
23). are founders OSI. a. Html b. Head c. Title d. body
a) Bruce Perens and Erics Raymond
4. The tag which is having heading information
b) timmberners lee
c) Richard Stallman
a. Html b. Head c. Title d. body
d) All the above 5.tag is used to insert the title
24). The founder of FSF or Free Software Foundation is a. Html b. Head c. H1 d. title
a) Richard Stallman 6.tag is used to adding the document contents
b) Bruce perens and Erics Raymond a. <body> b. <title> c.<html> d.<li>
c) Tim berners Lee 7. The tag which is not executable by html
d) None of the above a. Comment b. Html c.body d. p
25). The HTTP (hyper text transfer protocol )is used to request and send a document overthe 8. <h3>describes a …level of heading
a) Internet a. First b.second c. Third d. Fourth
b) Telnet 9. The tag which display the bullets
c)Browsers a. <ul> b.<ol> c. <br> d.<p>
d) servers
10. The tag which display the number listing.
26). E-Commerce means
a) The trade of goods and services through Internet a. <ul> b.<ol> c. <br> d.<p>
b) Email 11. The tag which describes the paragraph
c) Digital cash a. Html b. Head c. P d.h2
d) all the above 12. Take out the odd one
27). An example for E-commerce service is a. Adobe reader c. Microsoft expression web
a) email b. Coffeecup html d. notepad
b) Bulletin Boards 13. The html program should save with
c) digital cash a. .html b. html. C./html d.:html
d) All the above 14. The tag which link the address
28). An Advantage of E-commerce is a. <a> b.<br> c.<img> d.<hr>
a) Gobal participation
15. Html forms contains
b) Improved market Intelligence and strategic planning

KARNATAKA STATE PRE-UNIVERSITY EDUCATION


II PU Computer Science Blueprint
UNIT DESCRIPTION VSA SA LA E Total
(1 Mark) (2 Marks) (3 Marks) (5 Marks) Marks
Chapter 1 Typical
a. Text fields b. Checkboxes c. Radio buttons d. All the above 5 Hrs configuration of 1(mcq) ------ 1 ------- 4
16. The tag which breaks the line Computer system
a. <a> b.<br> c.<img> d.<hr> Chapter 2 Boolean algebra 1(mcq) 2 ----- 1 09+1
17. The tag which is used to create the table 10 Hrs
a. Table tag b. Tabel tag c. <td> d. <hr> Chapter 3 Logic Gates 1(mcq) ------ 1 ------- 04
18. The tag which is used to create the table row 5 Hrs
a. <tr> b.<br> c.<td> d.<hr>
Chapter 4 Data structures 1(mcq) ------ 1 2 14
19.tag used to create the table data
15 Hrs
a. <tr> b.<br> c.<td> d.<hr>
Chapter 5 Review of C++ ------- ------- ------- ------ ----
20.defines set of frames 3 Hrs covered in First PUC
a. <frameset> b. <frame> c.<form> d. <input> Chapter 6 OOP concepts ---- 1 ---- 1 07
21.creates the individual frame 4 Hrs
A. <frameset> b. <frame> c.<form> d. <input> Chapter 7 Classes and objects 1(mcq) ------ ----- 1 06
22 ......................defines an input control
6 Hrs
A. <input> b.<frame> c.<frameset> d.<output>
23. The format of text fields <input type=”text”> Chapter 8 Function 1(mcq) ------ ------ 1 05+1
24.The format of password fields <input type=”password”> 3 Hrs Overloading
25. The format of radio button <input type=”radio”> 26.the Chapter 9 Constructors and 1(mcq) 1 ---- 1 07+1
format of check box is <input type=”checkbox”> 27.the format of 8 Hrs Destructors
submit button is <input type=”submit”> 28.textarea defines a Chapter 10 Inheritance 1(mcq) ----- ------ 1 05+1
multiline input control 8 Hrs
29. label defines a label for an <input>element
Chapter 11 Pointers 1(mcq) ----- 1 ------ 04
30. option defines an option in a drop down list
7 Hrs
31. xml stands for extensible mark up language
32. Xml tags are case sensitive Chapter 12 Data File handling ------- 1 1 ------ 05
33. Html is the mother tongue of the browser 6 Hrs
34. Father of html is tim bernars li Chapter 13 1(mcq)
35. expand DHTML Dynamic Hyper text markup language 8 Hrs Database concepts 5x1-Fill-in 1 1 1 11+5
******************************** blank
Chapter 14 SQL commands 1(mcq) 1 ----- 1 07+1
12 Hrs
Chapter 15 Networking 2(mcq) 1 ---- 1 9
10 Hrs Concepts
Chapter 16 Internet and Open 1(mcq) ---- 1 ----- 4
5 Hrs source concepts
Chapter 17 Web Designing 1(mcq) ----- 1 ------ 4
5 Hrs
Total Marks 10+10 16 24 55 115
Total No of 70/47
Questions to be 1x20=20 2x4/8=08 3x4/8=12 5x6/11=30
answered

NOTE: 1. Questions should be direct


2. The answers should be present in the prescribed textbook by PUE
3. 40% - Simple, 40% - Average and 20% - Difficult questions
4. Questions should be according to Blueprint
II PU COMPUTER SCIENCE – MODEL PAPER - 1 PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
PART – A 21. Prove ̅X = X.
Answer all the questions. Each question carries one mark. 1 x 20 = 20 22. Define tautology and fallacy.
23. What is encapsulation? Give an example.
I Select the correct answer from the choices given: (Repeated answers will not be considered) 24. What is destructor? Give example for destructor.
1. Which among the following is the fastest memory in a computer that holds information? 25. Mention any two functions of ifstream and give their meaning.
a) Register b) Cache 26. Give any two advantages of database system.
c) Main memory d) RAM 27. Give the syntax and example for INSERT command in SQL.
2. The other name of Boolean algebra is 28. Briefly explain circuit switching.
a) Switching algebra b) Relational Algebra
c) Digital Algebra d) None of the above PART – C
3. The other name of NOT gate is
a) Neglect gate b) Inverter gate Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
c) XOR gate d) XNOR gate 29. Briefly explain any three types of mother board.
4. The data structure that allows the insertion, as well as the deletion from both the ends, are: 30. Write the logic diagram and the truth table for XOR gate.
a) String b) Linked List data structure 31. Give the memory representation of stack data structure.
c) Stack data structure d) Dequeue data structure 32. Mention any three advantages of pointers.
5. What is the other name used for functions inside a class? 33. What is a data file? Differentiate between text and binary files.
a) Member variables b) Member functions 34. Give the meaning for any three components of E-R diagram.
c) Class functions d) Class variables 35. What is e-commerce? Explain any one type of e-commerce.
6. Function cannot be overloaded when 36. Explain any three table tags in HTML.
a) Function names are same b) Number of parameters are different PART – D
c) Number of parameters are same d) Data types of parameters are different
7. The symbol used with constructor is Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
a) $ b) & 37. Give the Boolean function F(A,B,C,D) = Σ(0,2,5,7,8,10,13,15).
c) Delta c) ~ Reduce it by using Karnaugh map (K-Map).
8. Base class is 38. Explain any five operations performed on primitive data structure.
a) a sub class b) inherited class 39. Write an algorithm to delete a data element from an array.
c) Main class d) First class 40. Give the differences between procedural programming and object-oriented programming.
9. Which of the following is the correct way to declare a pointer? 41. With an example explain member function inside the class definition.
a) int *ptr b) int ptr 42. What is a friend function? Mention the characteristics of a friend function.
c) int &ptr d) All of the above 43. What is a parameterized constructor? Mention the advantages of parameterized constructor.
10. is called information. 44. What is inheritance? Explain any two types of inheritance.
a) Raw fact b) collection of data 45. Differentiate between manual and electronic data processing.
c) Unprocessed data d) Processed data 46. Explain CREATE and UPDATE commands in SQL.
11. SQL is . 47. Explain the following:
a) Theoretical Language b) Procedural Language i. SMS ii. E-mail iii. Voice mail iv. Chat v. Video conference
c) Structured Language d) Unstructured Language

12. FTP stands for *****

a) Final Transistor Protocol b) File Transformation Protocol


c) File Transfer Protocol d) File Transaction Protocol
13. Which of the following is not a type of network?
a) LAN b) MAN
c) PAN d) VAN
14. A software and coding which is freely available on internet is .
a) Community Software b) Free Software
c) Open-Source Software d) Unlicensed Software
15. HTML stands for
a) Hyper Text Makeup Language b) Hyper Text Markup Language
c) Hyper Text Marking Language d) Hyper Text Marker Language
II Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)
16. Collection of rows and columns is called as
17. is a collection of interrelated data.
18. Data duplication is called as .
19. is a software for creating and managing databases.
20. Protection of data is the .

Model Question Paper-2 II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
Second PUC Computer Science (Repeated answers will not be considered)
Time: 3.15 Hours Max marks: 70 (ISAM, Database, Data mining, Key, Schema)
16. is a collection of logically related data organized in a way that data canbe easily accessed,
PART – A managed & updated.
Answer all the questions. Each question carries one mark. 1x20 = 20 17. is a set of one or more columns whose combined values are unique amongall occurrences in a given table.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) 18. is the hybrid between sequential and direct access file organization.
1. CPU’s working memory is 19. Database objects that contain data govern or perform operation on data is
a) Cache memory b) Register 20. A technique which is concerned with the analysis & picking out relevant informationis called
c) Primary memory d) Secondary memory
2. Minterm of X̅ ̅Y= PART – B
a) m3 b) m2 Answer any FOUR questions. Each question carries two marks. 2x4=8
c) m1 d) m0 21. Prove algebraically X (X + Y) = X22.State
3. The standard symbol represnts De Morgan’s theorems.
a) OR gate b)AND gate 23. Write a note on polymorphism. Give an example.
c) NAND gate d) NOR gate 24. Write any two features of parameterized constructors.
4. is an example for non-primitive data structure 25. Differentiate between seekg( ) and seekp( ).
a) Integer b) Float 26. What is a candidate key & alternate key (secondary key)?
c) Stack d) Pointer 27. Write the syntax & example for alter command.
5. Which access specifier is implicitly used in class?
28. List the different applications of networking.
a) Private b) Public PART – C
c) Protected d) Friend Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12 29.Explain the different types of
6. is although not a member function has full access right to the private andprotected members Motherboard.
of the class.
a) Overloaded function b) Inline function 30. Write the logic diagram and the truth table for XOR gate.
c) Friend function d) Recursive function
7. In constructor, declaration of an object is followed by assignment operator, constructorname and argument list
31. What are the advantages of arrays?
enclosed in parenthesis is 32. What is a pointer? Give the declaration and initialization of a pointer.
a) Implicit call b) Explicit call 33. Mention different operations basic operation on binary file in C++.
c) Function call d) Initialized at the time of declaration using = 34. Explain any three data types supported by DBMS.
8. The class that inherits properties from another class is 35. Explain the technologies & services used in e-commerce.
a) Base class b) Derived class 36. What is web scripting? Mention the types.
c) Virtual class d) Abstract class
9. Which of the following is the address operator?a) :: b) PART – D
. Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
c) * d) & Boolean function F(A, B, C, D)= Σ(0,3,4,6,8,9,10,11,12,14).
10. Set of values for an attribute in that table is
a) Tuple b) Entity Reduce the function F using K-map.
c) Attribute d) Domain 38. Explain the different operations performed on queue.
11. Following is not a DDL command: 39. Write an algorithm to search an element in an array using binary search.
a) Create b) Alter 40. Write the advantages of object-oriented programming (OOP).
c) Drop d) Delete
12. A hardware device used to connect several computers together is 41. Explain how objects of a class can be defined with suitable example.
a) Router b) Bridge 42. Explain inline functions with syntax and example.
c) Switch d) Hub 43. Explain default constructor with syntax and example.
13. CDMA stands for 44. What is inheritance? Briefly explain multilevel and multiple inheritance.
a) Code Data Multiple Access 45. Explain the applications of database system.
b) Code Division Multiple Access 46. Explain any five character (text) built-in functions in SQL.
c) Common Division Multiple Access 47. What is compute virus? Write the symptoms (characteristics) of computer
d) Common Data Multiple Access
14. The Software that is neither open nor freely available is called is
a) Free software b) Freeware ***********
c) Proprietary software d) Open source software
15. is a text-based markup language.
a) HTML b) XML
c) DHTML d) PHP
Model Question Paper-3 II. Fill in the blanks choosing the appropriate word/words from those givenin brackets. (Repeated answers will
Second PUC Computer Science not be considered
Time: 3.15 Hours Max marks: 70 (Physical data independence, Hierarchical data model, DBMS, One-tier architecture, ER Diagram)

PART – A
16. allows creation, definition & manipulation of database.
Answer all the questions. Each question carries one mark. 1x20 = 20 17. is a visual representation of data that describes how data is related toeach other.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) 18. is an ability of a database to modify a schema definition at internal levelwithout affecting a
1. The CPU is fabricated as a single Integrated Circuit (IC) chip and is schema in the next level.
a) Motherboard b) Microprocessor 19. organizes the data in a tree like structure in which each child node canhave only one
c) Register d) Circuit board parent node.
2. Maxterm of X + Y + Z = 20. In , DBMS is the only entity where user directly sits on DBMS &uses it.
a) M3
Y +Z

b) M2 PART – B
c) M1 d) M0 Answer any FOUR questions. Each question carries two marks. 2x4=8
3. Standard symbol for XOR gate is 21. Prove that 1 + X = 1 using proof by perfect induction method.
a) + b) 22. Write any two basic postulates of Boolean algebra.
c) . d) x
23. Write the disadvantages of object-oriented programming (OOP).
4. is an ordered collection of items where the addition of newitems and the
24. Write any two features of destructor.
removal of an existing item always takes place at the same end.
a) Queue b) Linked list
25. Differentiate between tellg( ) and tellp( ).
c) Stack d) Tree 26. What is the difference between serial & direct access file organization?
5. operator is used to define the member function outside the class. 27. Write the syntax & example for drop command.
a) . b) :: 28. List the goals for networking.
c) * d) & PART – C
6. Function Overloading is also known as Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
a) Compile time polymorphism b) Run time polymorphism. 29. What is a port? Explain serial port.
c) Compile time encapsulation d) Run time encapsulation 30. Write the logic diagram and the truth table for NAND gate.
7. In constructor, the declaration of the object is followed by argument list enclosed inparentheses. 31. What are the disadvantages of an arrays?
a) Implicit call b) Explicit call 32. What is static memory allocation? Explain.
c) Function call d) Initialized at the time of declaration using = 33. Mention the types of file. Explain any one.
8. class prevent multiple copies of the base class being present in anobject derived 34. Explain any three database users.
from those objects. 35. What are the advantages of e-commerce?
a) Base class b) Derived class 36. What is web hosting? Mention different types of web hosting.
c) Virtual base class d) Abstract class
9. is the collection of addresses. PART – D
a) Array of objects b) Array of address Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
c) Array of variables d) Array of pointers 37. Given Boolean function F(A, B, C, D)= Σ(0, 4, 8, 9, 10, 11, 12, 13,
10. A single entry in a table is 15) Reduce the function F using K-map.
a) Tuple b) Entity 38. Define: a. Root Node b. Leaf Node c. Height d. Depth e. Internal node.
c) Attribute d) Domain 39. Write an algorithm to insert a data element at the rear end of the queue.
11. Following is not a DML command: 40. Write a difference between procedural oriented programming & object-orientedprogramming (OOP).
a) Create b) Insert 41. Explain the class definition and declaration with syntax and example.
c) Update d) Delete 42. Define an inline function. Write the advantages & disadvantages of inline functions.
12. is an example for half duplex communication mode. 43. What is copy constructor? Explain with programming example.
a) Radio b) Television 44. What is single level inheritance? Explain with programming example.
c) Walkie-Talkie d) Modern telephone system 45. Give the difference between manual & electronic file systems.
13. is consists of a central node to which all other nodes are connectedby a single path. 46. Explain the data types used in SQL.
a) Bus topology b) Star topology. 47. Explain any five networking devices.
c) Ring topology d) Tree topology
14. URL stands for
a) Unique Resource Location b) Uniform Resource Location ***********
c) Unique Resource Locator d) Uniform Resource Locator
15. refers to web content that changes each time it is viewed
a) HTML b) XML
c) DHTML d) PHP

Model Question Paper-4 II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
Second PUC Computer Science (Repeated answers will not be considered)
Time: 3.15 Hours Max marks: 70 (Specialization, Metadata, Data integrity, Attribute, Relational data model)
16. Each column is identified by a distinct header is called
PART – A 17. refers to the validity of data & it can be compromised in a number of ways
Answer all the questions. Each question carries one mark. 1x20 = 20 18. In , there are no physical links.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) 19. is a top down approach in which one higher level entity can be brokendown into two lower level entities.
1. The parallel port can transfer bit of data at a time. 20. is used to inform operators and uses of the data warehouses aboutits status.
a) 1 b) 4
c) 8 d) 16 PART – B
2. The X+XY = X is Answer any FOUR questions. Each question carries two marks. 2x4=8
a) Associative Law b) Involution law 21. Prove algebraically X (X + Y) = X
c) Complementarity law d) Absorption Law 22. What is minterm and maxterm?
3. A logic gate with only one input signal and one output signal but the output state isalways opposite of the 23. Write any two applications of object-oriented programming (OOP).
input state is 24. Write any two features of destructor.
a) AND gate b) OR gate 25. Mention the methods of opening file within C++ .
c) NOT gate d) NOR gate 26. Mention the types of data independence.
4. is an example for linear data structure. 27. Give the difference between char and varchar datatypes in SQL.
28. Name the different types of twisted pair cable.
a) Integer b) Linked list
c) Graph. d) Tree
5. is an instance of a class.
a) Access specifiers b) Data members PART – C
c) Member functions d) Objects Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
6. The functions are compact function calls. 29. Explain the characteristics of motherboard.
a) Overloaded b) Inline 30. Write the logic diagram and the truth table for OR gate.
c) Friend d) All of the above 31. What are the applications of an arrays?
7. The constructor must be declaring in section. 32. What is array of pointers? Give an example.
a) Private b) Public 33. Differentiate between ifstream class and ofstream class.
c) Protected d) None of the above 34. Give the different notations for E-R diagram
8. is one that is not used to create objects. 35. Write any three criteria of open source software.
36. Give the features of DHTML?
a) Sub class b) Derived class
c) Virtual class d) Abstract class
PART – D
9. operation can be performed on pointers.
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
a) Addition of two pointers 37. Given Boolean function F(A, B, C, D)= m0 + m1 + m2 + m3 + m4 + m5 + m8 + m9
b) We can subtract one pointer from another pointer if both point tothe same array. + m10 + m11 + m13 + m15. Reduce the function F using K-map.
c) Subtraction of one pointer from another pointer when they do not pointto the same array. 38. What is primitive data structure? Explain the different operations performed onprimitive data
d) Multiplication of two pointers structure.
10. is a field in a one table that uniquely identifies the row of another table. 39. Write an algorithm to search an element in an array using linear search method.
40. Explain the different characteristics of OOP.
a) Primary key b) Foreign key 41. Explain how do we define member function inside the class definition. Giveexample.
c) Candidate key d) Alternate key 42. Explain friend functions with example.
11. Which command is used to modify an existing record in SQL? 43. What is copy constructor? Explain with programming example.
a) Update b) Change 44. What is visibility mode? What is its role with respect to inheritance?
c) Modify d) Alter 45. Explain ISAM with example.
12. A device that connects dissimilar networks is 46. What is data definition language? Explain create and select commands in SQL.
a) Router b) Bridge 47. Explain the applications of networking?
c) Gateway d) Hub
13. HTTP stands for
a) Hypertext Transistor Protocol b) Hypertext Transfer Protocol
c) Hypertest Transistor Protocol d) Hypertest Transfer Protocol ***********
14. navigates though the world wide web(www) and displays web pages
a) Web browser b) Website
c) Web server d) URL
15. tag is used to create hyperlink.
a)<li> b) <a>
c) <h1> d) <b>
Model Question Paper-5
Second PUC Computer Science
14. The software whose source code is available to customers and it can be modifiedand redistributed
without any limitations is
Time: 3.15 Hours Max marks: 70
a) Free software b) Freeware
PART – A c) Shareware d) Open source software
Answer all the questions. Each question carries one mark. 1x20 = 20 15. provides an object-oriented view of a Web page and its elements.
I. Select the correct answer from the choices given: (Repeated answers will not be considered) a) HTML b) XML
1. A slot which is used to connect modem and input devices is c) DHTML d) PHP
a) AGP slot b) PCI slot
c) ISA slot d) Processor slot II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
2. According to Boolean law: X + 1 = (Domain, Normalization, Aggregration, Data warehouse, Data processing)
a) 0 b) 1 16. is series of actions or operations from input data to generate outputs.17.Set of values
c) X d) X̅ for an attribute in that table is called as
3. Universal gates are: 18. A process when relation between two entities is treated as a single entity iscalled
19. The process of organizing the data in a database is called
a) AND and OR b)NAND and NOR 20. A repository of an organization’s electronically stored data is called
c) XOR and XNOR d) None PART – B
4. A queue follows: Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that XY+̅XY=X.
a) LIFO b) FIFO
22. State the principles of duality theorems.
c) Linear tree d) Ordered array
23. Explain data encapsulation.
5. Data members are accessed only by the member functions, friends of the class andalso by the member 24. What is a destructor? Give its syntax.
functions derived from this class is 25. Write the member functions belonging to ifstream class.26.Define primary key & foreign key.
a) Private b) Public 27.Write the syntax & example for delete command.
c) Protected d) Friend 28.Explain simplex communication mode.
6. The inline function may not work some times for one of the following reasons:
a) The inline function definition is too long or too complicated PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
b) The inline function is recursive
29. Explain cache memory.
c) The inline function has looping constructs
30. Write the logic diagram and the truth table for AND gate.
d) All of the above
31. Write the memory representation two-dimensional arrays in row-major order.
7. A constructor that accepts parameters is called the default constructor.
32. What are the advantages of pointer?
a) No b) One
c) Two d) Three 33. Explain any three file modes.
8. The class whose properties are inherited by another class is 34. Explain any three components of E-R diagram.
a) Base class b) Derived class 35. What is e-commerce? Explain types of e-commerce.
c) Virtual class d) Abstract class 36. Explain the structure of HTML.
9. Which of the following is the pointer operator?
a) :: b) . PART – D
c) * d) & Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)=Σ(0,1,2,3,4,5,6,7,8,9,10,11).
10. Each column is identified by a distinct header is Reduce the function F using K-map.
a) Tuple b) Entity 38. Explain the different operations performed on linear data structure.
c) Attribute d) Domain
39. Write an algorithm for push and pop operation in stack using array.
11. Which command is used to modify an existing table in SQL?
40. Write the applications of object oriented programming (OOP).
a) Update b) Change
c) Modify d) Alter 41. Explain the member functions outside a class with an example.
12. A set of rules and guidelines for communicating data is 42. Discuss overloaded functions with syntax and example.
a) Protocol b) Packet 43. What is a constructor? Write the rules for writing a constructor function.
c) Data gram d) Data channel 44. What is inheritance? What are the advantages of inheritance?
13. TCP/IP stands for 45. Explain the features of database system.
a) Telephone control protocol/Internet protocol 46. Explain the various group functions in SQL.
b) Transmission control protocol/Internet protocol 47. What is network? Mention different network goals.
c) Telephone control protocol/ International protocol
***********
d) Transmission control protocol/International protocol

You might also like