KEMBAR78
Computer | PDF | Control Flow | Pointer (Computer Programming)
0% found this document useful (0 votes)
27 views10 pages

Computer

The document consists of multiple-choice questions related to computer science concepts, covering topics such as programming languages, data types, algorithms, and computer architecture. Each question has four options, with the correct answer indicated. The document appears to be a test or quiz format for assessing knowledge in computer science for students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views10 pages

Computer

The document consists of multiple-choice questions related to computer science concepts, covering topics such as programming languages, data types, algorithms, and computer architecture. Each question has four options, with the correct answer indicated. The document appears to be a test or quiz format for assessing knowledge in computer science for students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

OMPUTER ScIENCE

/ functions intc a
12 The wrapping up of data and operation

SET I single unit is known as-

(2) Modularity,
(1) Encapsulation,
COMPUTER SCIENCE (3) Abstraction, (4) None of these.
Ans.(1)

Time: 1 Hour] or data to be processcd in


Full Marks- 40 13 . .is the ability for a messagc
more than one form.
General Imisrructions- (1) Polymorphism,
(2) Inheritance,
(a) All questions arc compulsory. (4) Nonc of these. Ans.(1)
(3) Modularity,
(b) There are 40 Multiple choice Questions in all.
14 A word having special meaning
reservcd by programming
(c) Eacn question carries I marks. language is a-
(d) T'our options are given for cach quesiion. Choose the (1) Keyword, (2) Literals,
correct option and indicate it by bluckening the appropriate (4) None of thesc. Ans.(1)
(3) Identifier,
circle I ] in the answer shect. 15 cout«< is uscs to-

The lirt commercial computer delivered to a business (1) Execule, (2) Result,
client is- (4) None of these. Ans.(3)
(3) Print,
(1) UNIVAC, (2) ENIAC, 16 The ASCII valuce of "d' is-
(3) EISAC, (4) None of these. Ans.(1) (1) 68, (2) 99,
Magrvctic tapes, floPpy disks, optical disk, flash memory (3) 100, (4) None of these. Ans.(3)
and hand disks are examples of- 17 REEMA\n" has size-
(1) Prinnary memory, (2) Auxiliury memory, (1) 8, (2) 7,
(3) Cuche memory. (4) Fiash memory. Ans.(2) (4) None of thesc. Ans.(2)
(3) 9,
3 A coin puter language is / are 18 . . . are used for generic programming.
(1 Miachine language, (1) Virtual Functions, (2) Inheritance,
(2) As sembly language, (3) Templates, (4) None of thesc. Ans.(3)
(3) Higgh-level language. 19 Where does the execution of the program start ?
(4) All of these. Ans.(1) (1) Main function, (2) User-defined function,
4 The sy mbol that is represented using rectangle in a (3) Void function, (4) None of these. Ans.(1)
flowch: art is- 20 Syntax error comes when-
(1) Ter minal, (2) Decision, (1) rules of a programming language are violated,
(3) Activity / Process, (4) Input /Output. Ans.(3) (2) when program statements are not meaningful,
S I n C++ programming strcmp () function is used for-
(3) when program is not saved,
(1) con vierting String to Char, (4) None of thesc. Ans.(1)
(2) cop1yi ng two strings, 21 The && and || operators-
(3) comp aring two strings, (1) combine two boolean values,
(4) Non: of these., Ans.(3) (2) compare two boolean values,
6 In C++ programming 'la' is used for (3) combine two numeric values,
(1) Fom1 feed, (2) Line Brake, (4) compare two numeric values.
Ans.(3)
(3) Seleci All, (4) Alarm. Ans.(4) 22 Operator that takes two operands is
the of' variable ?
called
Which f the following is not type (1) Binary operator, (2) Ternary operator,
(1) Ex teern, (2) Register, (3) Unary operator, (4) None of these.
(4) None of these. Ans.(4) 23 A set of Relational
Ans.(1)
(3) Global Operators is-
8 T14 in coctal is . . . . in decimal. (1)+, - . *, 7, 8 (2) ==, !=, <, >,
(1) 460, (2) 406, (3) &&, I|. (4) None of these.
Ans.(2)
(4) 506. Ans.(1) 24 A relational operator
(3) 560,
9 TASE" ir1 Hexadecimal is .. in decimal. (1) Logically combines two
operands,
(2) 7650, (2) Compares two operands,
(1) 6750,
(4) 5067. Ans.(1) (3) Yields a Boolean
(3) 567, (logical) result,
use on punched cards is- (4) Assign one operand to another.
The cocce that is casier to
(2) EBCDIC, 25 UTF refers to Ans.(4)
(1) ASCI1,
(4) BCD. Ans.(1) (1) Union Translation Format.
(3) Excess-3,
in a single instruction- (2) Unicode Transformation Format.
T h e nunmber of bits processed
(2) Bandwidth, (3) Unicode Transformation
(1) Cloc:k speed, Format.
(4) All of these. Ans.(2) (4) Union Transformation
(3) Instt uction set, Format.
Ans.(2)
[178] CoMPUTER ScIENcE h r m a T e d a y CHAPTER WIsE CLASS - XI (SCI ENCE)

26 The repetition of a set-of-statements depending upon a


condition test is know as- SET- II
(1) Selection, (2) Iteration, COMPUTER SCIENCE
(3) Sequence, (4) None of these. Ans.(2) Full iAarks- 40
Time: 1 Hour|
27 Which operation can be used as an alternative to if
statement ?
For General Instruction see SET-IL
() && (2) (3) (4) Ans.(3) T h e first generation computer uscd . . . . r interna
28 At least how many times docs a while loop execute
operation.
(1) Four time, (2) Three time,
(1) Vacuum tubes, (2) Transistors,
(3) Two time, (4) One time. Ans.(4) Ans.(1)
(3) Integrated circuit, (4) None of these.
29 The keyword break' cannot be simply used within- 2 The brain of the computer is the-
(1) While, (2) For, (1) Control Unit, (2) ALU,
(3) If-clse, (4) do-while. Ans.(3) (3) CPU, (4) All of thesc. Ans.(3)
30 An array of an array is called- Performance wise digital computers are how nainy types?
( ) Multi casting array. 3) 2, (4) 1. Ans.(2)
(1) 6, (2) 4,
(2) Uni-casting array, 4 Using ASCII, how many bits are required for 1 character ?
(3) Multi dimensional array,
(1)4 (2) 8 (3) 12, (4) 16. Ans.(2)
(4) Onc-dimensional array. Ans.(3) 5 F3Al in Hexadecimal is . in Octal.
31 Full form of UPS is- (1) 171641, (2) 176141,
(1) Uninterrupted Power Supply, (3) 174161, (4) 171461. Ans.(1)
(2) Unifom Power Supply, Which of the following is not a part of control panel ?
6
(3) Uninterrupted Power Step, (2) Add and remove program,
(1) Display,
(4) Uniform Power Step. Ans.(1) 3) My document, (4) Date and Time. Ans.(33)
32 Binary search algorithm uses- Which one of the following keys is used to ire fresh the

(1) Divide and conquer method, active window ?

(1) F5, (2) F9, ( 3 ) F8, (4) F7. Ans.(1)


(2) Bubble sorting technique,
8 Which special character is used in wild card?
(3) Linear way to search values,
(4) None of these. Ans.(1) (1) * (2)
33 The 8-bit encoding format used to store data in a computer (3) (1) and (2) both, (4) None of these. Ans.(3
IS- 9 Full form of CDR is-

(1) ASCI1, (2) EBCDIC, (1) Compact Disc Recordable,

(4) USCIL. Ans.(2) (2) Compact Disc Readers,


(3) ANCI,
34 Which of the following correctly declares an array ? (3) Compact Disc Rewritable,

(1) int array[10]: (2) array array[I0J;


(4) None of these. Ans.(1)
(4) int array 'Ans.(1) 10 Concentric circle on the magnetized surface ofthi2 magnetic
(3) arrayl10]; disks is known as-
35 Which data type is used to represent the absence of
parameters ? (1) magnetic media, (2) sector,
(3) track, (4) optical media. Ans.(3)
(1) int, (2) short,
(4) float. 11 The wrapping up of data and functions togethe er in a single
(3) void, Ans.(3)
unit is called-
36 Which is more effective while calling the functions?
(2) Call by reference,
(1) inheritance, (2) polymorphism,
(1) Call by value,
(3) encapsulation, (4) None of these. Ans.(3)
(3) Call by pointer, (4) None of these. Ans.(2)
12 C++ was developed by-
37 What will happen when we use void in argument passing?
(1) Narendra Modi, (2) Denis Ritchie,
(1) It will not return value to its caller,
(3) Bjarne Stroustrup, (4) Bill Gates. Ans.(3)
(2) It will return value to its caller,
13 Which ofthe following is designed to control th e operations
(3) May or may not return any value to its caller, ofa computer ?
(4) None of these. Ans.(1) (1) System Software, (2) Application Softwa.re,
38 Which of the following is not a process state ?
(3) Utility Software, 4) User. Ans.(1)
(1) Terminated, (2) Running. 14 The smallest individual unit in a program is k.nown as-
(3) Blocked, (4) Execution. Ans.(3) (1) Token, (2) Operator,
39 A byte is a group of. . . bits. (4) Data. Ans.(1)
(3) File.
(1) 2, (2) 4, (3) 8, (4) 16. Ans.(3) 15 A' is-
40 What is the range of the floating point numbers ? (2) character literal,
(1)-3.4E +38 to + 3.4E +38,
(1)-integer literal,
(3) string literal, (4) bool literal. Ans.(2)
(2) -3.4E +38 to +3.4E +34, 16 Floating constant is also known as
(3)-3.4E +38 to + 3.4E +36, (1) Real constant, (2) Exponent constant,
(4) -3.4E +38 to +3.4E +32. Ans.(1) (3) Fractional constant, (4) All of these. Ans.(1)
Verma' Today CHAPTER Wise CLAss XI
17 A character constant in C++ must
contain-
(SCIENCE) CoMPUTER SCIENCE [i79]
(1) One character, 35 Which from the following is used for invoking a function ?
(2) Must be inclosed in (1) Call-by-value, (2) Call-by-reference,
single quotation marks, (3) (1) and (2) both, (4) Call-by-function. Ans.(3)
(3) (1) and (2) both,
36 Unary scope resolution operator is denoted by-
(4) None of thesc.
18 To identify the Ans.(1) (1) (2) (3) 88 (4) !! Ans.(1)
type of data and associatcd operations of 37 Which language provides uses of free formation style ?
handling it is known as-
(1) Data function. (1) Python, (2) vb.net,
(2) Data type,
(3) Data handing. (3) C++ (4) None of these. Ans.(3)
(4) None of these. Ans.(2)
19 Binary search 38 Syntax crror are called-
algorithm uses-
(1) Divide and conquer method, () Compilation error, (2) Runtime r,

(2) Bubble sorting technique,. (3) Compile error, (4) (1) and (3) both. Ans.(4)
(3) Lincar way to scarch, 39 Aggregate data type built using data of other types is called
as
(4) None of these.
Ans.(1) (1) Structure, (2) Pointer,
20 ASCil value of A is-
(3) Element, (4) Function. Ans.(1)
(1) 64, (2) 65. (3) 96, (4) 97. Ans.(2)
21 Which operator is used to string 40 How many types of macros are there in C++?
together several (3) 2, (4) 1. Ans.(3)
expressions ? ( ) 4, (2) 3,
(1) Comma operator, (2) Arithmetic operator,
(3) Relational operator. (4) Conditional operator. Ans.(1)
22 How many relational operator are offered by C++? SET- III
(1) 6, (2) 5, (3) 4, (4)2. Ans.(1) COMPUTER SCIENCE
23 A set of Arithmetic Operators is-
Time: 1 Hour| IFull Marks- 40
(1) - *,, 3 (2) ==, =, <, >=, K=

(3)&&, ||. (4) None of these. Ans.(1) For General Instruction see SETL
24 How many logical operators provide C++ lo combine
existing expression ? IFirst generation computers-
(1) 4, (1) Stored programs in the memory of the computer,
(2) 3, (3) 2, (4) 1. Ans.(2)
25 What is the range of unsigned char ? (2) Were built in 19th century.
(3) Used vacuum tubes instead of switches and relays.
(1) 127 to 127, (2) 0 to 255,
(3) I to 255, (4) 128 to 127. Ans.(2) (4) All of these. Ans.(3)
26 Who gives the instruction to the computer to perform any 2 The brain of the computer is the
kind of action ? (1) Control Unit, (2) ALU,
(1) Iteration, (2) Selection, (3) CPU, (4) All of thesc. Ans.(3)
(3) Sequence, (4) Statement. Ans.(4) Raw facts and figures are called
27 Destination specified by a label within statement is called (1) information, (2) loop,
(1) For each loop, (2) For loop, (3) data, (4) None of these. Ans.(3)
(3) Go to statement, (4) While loop Ans.(3) 4 Cray X-MP-14 is a-
28 Break statement is used in- (1) Super computer, (2) Mainframe computer,
(1) For each loop, (2) Switch statement, (3) Mini computer, (4) Micro computer. Ans.(1)
(3) For loop, (4) None of these. Ans.(2) Which of the following is an operating system software ?
29 How many choices are poss ible when using a single (1) MS-DOS, (2) UNIX,
if-else statement ? * (3) (1) and (2) both, (4) None of these. Ans.(3)
(1) 4, (2)3, (3) 2 (4) 1. Ans.(3) 6 Which one of these is a Hardware ?
30 jump statement(s) is/are- (1) Integrated circuit, (2) Procedure for inputting data,
(1) go to, (2) continue,
(3) Compiler, (4) Fortran. Ans.(1)
(3) break, (4) All of these. Ans.(1) The complete sequence of binary numbers-
31 1f an array is declared as int A [6] [6] then how may
100, 101, 110, .
documents can it store ?
(1) 111, 101, (2) 111, 001
(1) 0, (2) 6, (3) 36, (4) 12. Ans.(3)
(3) 7, 8, (4) 111, 1000. Ans.(4)
32 What are mandatory parts in the function declaration ?
8 A nibble is a group of . . . bits.
(1) returm type, function namne,
(1) 2, (2)4, (3)8, (4) 16. Ans.(2)
(2) parameters, function name,
9 EPROM stands for-
(3) return type, function name, parameters,
(1) External Programmable Read Only Memory
(4) None of these. Ans.(1)
(2) Erasable Programmable Read Only Memory.
33 Which header file belongs to the function isupper ()? (3) Electronic Programmable Read Only Memory,
(1) math.h, (2) string.h,
(4) conio.h. Ans.(3) (4) None of these. Ans.(2)
(3) ctype.h, 10 Which device permanently stores memory ?
34 Which function is known as standard library function?
(1) RAM, (2) Static RAM,
(1) Void, (2) Sqrt,
(4) Maths. Ans.(3) (3) ROM. (4) None of these. Ans.(3)
(3) Main,
[180] CoMPUTER SCIENCE rmaD1eday CHAPTER Wise CLAss XI (SCIENCE)
28 What is the starting point of C program execution 7
11 Which one is an output device?
(2) Microphone, (1) void main() (2) Opening curly braces '
(1) Monitors,
(3) Mouse, (4) Keyboard. Ans.(1) (3) #include (4) Nonc of these. Ans.(1)
29 In C++, array index always starts from-
12 refers to the act of representing essential features
without including the background detail or explanation. (4) 3. Ans.(1)
(1) 0, (2) 1, (3) 2,
(1) Encapsulation, (2) Modulacity, 30 Sequence of objects that have the same type is called-

(3) Abstraction, (4) Nonce of these. Ans.(3) (2) Array.


(1) Stack,
13 A class whose properties arce inheritcd by other classes is (3) Operators, (4) Function. Ans.(2)
known as- 31 How many kinds of elements can an array havee?
(1) Base class. (2) Derive class, (1) Only char type,
(3) Sub class, (4) None of these. Ans.(1) (2) Only int type,
14 In C++ programming execution of the program starts and
(3) Char and int type,
ends a - Ans.(4)
(4) All of them have same type.
(1) clrscr () (2) getch ()
32 A one diinensional array is aiways considered as-

(3) main () (4) None of these. Ans.(3)


(1) Sequential, (2) Linear,
15 The smallest individual unit in a program is-
(3) (1) and (2) both, (4) Complex. Ans.(3)
(1) Appendix, (2) Token, 33 Which C++ function is used for finding absolute values?
(3) (1) and (2) both, (4) None of these. Ans.(2)
(1) exp() (2) fabs ()
16 Which symbol is used for pointer declaration ?
(3) pow ( (4) atan() Ans.(2)
(1) (2) (3) (4) # Ans.(2) 34 A computer program that converts assembly language to
17 Underscore L)counts as a-
machine language is
(1) Letter, (2) Symbol, (2) Assembler,
(3) (1) and (2) both, (4) None of these. Ans.(1) (1) Compiler,
(3) Interpreter, (4) Comparator. Ans.(2)
18 Which of the following is not a user defined derived data 35 Loading the operating system file into main memory is
types ?
(1) Union, (2) Structure, called
(1) looping (2) Jocking,
(3) Class, (4) Function. Ans.(4)
(3) booting, (4) filing. Ans.(3)
19 Which of these describes all the properties ofa data type?
36 Which one is a impact printers ?
(1) Structure, (2) Main,
(4) Class. Ans.(4) (1) Dot matrix printer, (2) Electromagnetic printer,
(3) Object, Ans.(1)
20 Variable which holds a memory address- (3) ThermaB prinier, (4) Inkjet printer.
37 The pointing device among the following i s
(1) Pointer, (2) Array.
(4) None of these. Ans.(1) (1) Keyboard, (2) Barcode reader,
(3) Function,
21 A variable that holds memory address is called- (3) Joystick, (4) Touch screen. Ans.(3)
(2) Class, 38 (B2F)16= (?)s
(1) AITay,
(3) Function, (4) Pointer. Ans.(4) (1) 5352, (2) 5457,
22 In C++ every statement ends with- (3) 5754, (4) None of these. Ans.(2)
Or, Every executable statement in C++must be terminated 39 DBMS stands for-
by a- (1) Database Management System,
(1) colon (:), (2) comma (.), (2) Data Manipulation System,
(3) semicolon (;), (4) dot (.). Ans.(3) (3) Database Multiple System,
A set of logical operators is- (4) None of these. Ans.(1)
(1) +, *,/, %, (2) >, < , , <5 =, 40 2's complement of a binary number is calculated by-
(3) &&,ll. !, (4) ? Ans.(3) (1) adding 2 to its 1's complement,
24 The prefíx incremen/decrement operators follow the rule (2) adding 1 to its 1's complement,
(1) change-then-use, (2) use-then-change, (3) subtracting 1 from its 1's complement,
(3) save-and-delete, (4) None of these. Ans.(1) (4) None of these. Ans.(2)
25 In C++. cin and cout are the predefined stream-

(1) operators, (2) functions,


(3) data type, (4) objects. Ans.(4) SET- IV
26 In C++ programming s t r c a t () function is used for
(1) count length of a string, COMPUTER SCIENCE
Time: 1 Hourl IFull Marks- 40
(2) converting string to character,
(3) comparing two strings,
For General Instruction see SET-I.
(4) concatenating two strings. Ans.(4)
correct statement ? Second generation computer used
27 Which of the following is the
must start with underscore, (1) Transistor instead of vacuum tubes,
(1) Variable n a m e
have digits, (2) Integrated circuitry,
(2) Variable must
must have white space, (3) Vacuum tubes instead of electromechanical device,
(3) Variable name
c a n n o t be a variable
name. Ans.(4) (4) None of these. Ans.(1)
(4) Keyword
rma'iToday CHAPTER WIsE CLASS XI (SCIENCE) CoMPUTER SCzENCE [181]
2 Who invented the adding machine? 20 The minimum range of unsigned char i s

(1) Gottfried Leibnitz, (2) Blaise Pascal, ( ) 0 to 255, (2) 0 to 244,


(3) John Napier, None of these. Ans.(1
(4) None of these. Ans.(2) (3) -128 to 127, (4)
constanis and
3 The first electronic computer was Any valid combination of operators,
developed in the ycar 21
(1) 1966, (2) 1946, variables is known as-
(1) Expressions, (2) Modifier,
(3) 1876, (4) 1846. Ans.(2)
(4) Data type. Ans.(1)
4 How many unique symbols are there Hexadecimal number (3) Structure,
starts
system ? 22 Which of the following C++operators' associativity
from right side ?
(1) 16, (2) 12, (3) 10, (4) 8. Ans.(1)
How many bytes are these in I kilobyte? (1) Bit shift operator <<

(1) 90, (2) 145, (3) 8, (4) 1024. Ans.(4) (2) Subtract operator-
(3) Simple assignment operator
=

Which of the following is tiie default start mnode for


windows ? (4) Add operator+. Ans.(3)
23 Which of the following is a relational operator ?
(1) Safe mode, (2) Normal mode,
(1) (2) (3) (4) + Ans.(2)
(3) Command prompt, (4) None of these. Ans.(2)
24 Which concept does the pre increment use ?
7 The file system 'NTFS' stands for (1) Call by reference, (2) Queue,
(1) Non Terminated File System,
(2) New Technology File System, (3) Call by value, (4) None of these. Ans.(1)
(3) Never Terminate File System, 25 What is the range of unsigned int ?
(1) 0 to 65535, (2) 0 to 65534,
(4) New Type File System. Ans.(2)
Microsoft Windows is an- (3) 0 to 65537, (4) 0 to 65532. Ans.()
(1) Database program, (2) Word processing, 26 The braces 0 are not necessary when the loop body
contains a-
(3) Graphic progran, (4) Operating system. Ans.(4)
9 Which of the following device can store large amounts of (1) Double Statement, (2) Single Statement,
data 2 3) (1) and (2) both, (4) Triple Statement Ans.(2)
(1) Zip Disk, (2) CD Rom, 27 For loop is a-
(3) Hard Disk, (4) Floppy Disk. Ans.(3) (1) Exis. controlled loop,
10 Which one is a non-impact printer ? (2) Entry controlled loop,
(1) Drum printer, (2) Dot printer, (3) Count controlled loop,
3) Thermal printer, (4) Line printer. Ans.(3) (4) All of these. Ans.(3)
1 Who can display information in computer? 28 while is a/an-
(1) Screen, (2) Monitor, (1) Exist controlled loop,
(3) (1) and (2) both, (4) None of these. Ans.(3) (2) Entry controlled loop,
12 Identifiable entity with same characteristics and behaviour (3) Count controlled loop,
is known as- (4) None of these. Ans.(2)
(1) Sub class, (2) Object, 29 Which keyword is used to end a single iteration of the
(4) None of these. loop ?
(3) Class, Ans.(2)
13 A . is a identifiable piece of code within a program (1) Continue, (2) Return,
with a set of inputs and outputs. (3) Break,. (4) None of these. Ans.(1
(1) Module, (2) Main program, 30 Array that are declared static are initialized when-
(3) Paradigm, (4) None of these. Ans.(1) (1) Program is about to end,
14 In C++, (| D symbol is used to- (2) The first element is zero,
(1) Comment, (2) Execute, (3) Program is loaded into the memory,
(3) Compile, (4) None of these. Ans.(1) (4) None of these. Ans.(3)
15 How many way are there to inseit comments in C++ 31 Which from the following techniques is used for finding a
programming ? value in an array?

(1) 4, (2)3, ) 2, (4) 1 Ans.(3) (1) Binary search algorithm,


16 A sequence of bytes is called a- (2) Linear search algorithm,
(1) ostream, (2) istream, (3) Bubble sort,
(3) stream, (4) None of these. Ans.(3) (4) All of these.
Ans.(4)
17 C++ allows how many types of integer constants- 32 Objeet of an array is called a_-

(1) 5, (2)4, (3) 3, (4) 2. Ans.(3) (1) Functions of' an array,


18 A memory location that is shared by two or more different (2) Indexes of an array,
variables is known as- (3) Elements of an array,
(1) Enurneration, (2) Union, (4) All of these.
Ans.(3
(3) Structure, (4) Class. Ans.(2) 33 Pre-defined funetion and other program elements are
19 Sequence of objects that have the same type is called- accessed through--
1) Stack, (2) Array, () Classes, (2) Operator,
(3) Operator, (4) Function. Ans.(2) (3) Header files, (4) All of these. Ans.(3
[182] CoMPUTER ScIENCE Hrma'Today CHAPTER VWISE CLASS X I (SCIENCE)
34 Void function is also called as- 9 A microprocessor is also known a s

() Subroutine (2) Procedure, (1) GPU, (2) Harddisk,


(3) (1) and (2) both, (4) Terminator. Ans.(3 (3) CPU, (4) None of thesc. Ans.(3)
35 Which function is provided by C++ for reducing function 10 Thc sct o f instructions that the microprocessor can execute

call overhead ? is known as-


(1) Online function, (2) Inline function, (1) Instruction set, (2) Instruction cxccution,
(3) Control function, (4) Endline function. Ans.(2) (3) (4) None of these.
Instruction process, Ans.(1)
36 A function that needs no return valuc is
called 11 The full form of USB is
(1) Finite function, (2) Void function (1) Universal Size Bus, (2)) Universal Serial Bus,
(3) Infinite function, (4) All of these. Ans.(2) (3) Unique Sizc Bus, (4) None of thesc. Ans.(2)
37 The set of rules which gives the mcaning of a statementis 12 PCI stands for-
known as-
(1) Peripheral Component Interconnect,
(1) Scmantics, (2) Protocol,
(2) Peripheral Computer Internct,
(3) Syntax (4) None of thesc. Ans.(1) (3) Processor Computer Interconnect,
38 The logical scquence of precise steps that solve a given
(4) Processor Cable Interconnect. Ans.(1)
problem is called-
13 Which memory device is generally made of
(1) Algorithm. (2) Protocol,
semiconductors ?
(3) Design, (4) None of these. Ans.(1)
(2) Hard disk,
39 How many clements we can have in any structure?
(1) RAM,
(3) Floppy disk, (4) CD. Ans.(1)
(1) 256, (2) 1024,
14 Assembler is used as a translator for
(3) 128, (4) None of these. Ans.(1)
40 In an array, clement may be- (1) Low level language,
(2) High level language,
(1) complex, (2) cither simple or complex,
(3) simple, (4) None of these. Ans.(2) (3) COBOL,
(4)C. Ans.(1)
15 Object oriented programming employs
SET- V programining approach.
(1) Top-down, (2) Bottom-up,
COMPUTER SCIENCE (3) Procedural, (4) All of these. Ans.(2)
Time: 1 Hour] Full Marks- 40 16 What type of structure is the following ?

For General Instruction see SET-.

Third generation computers


(1) used transistors instead of vacuum tubes,
(2) were the first to use integrated circuitry,
(3) were the first to use built-in error detecting devices,
(4) None of these. Ans.(2)
(1) sequence, (2) case,
What represents the physical and tangible components of
a computer ?
(3) repetition, (4) process. Ans.(4)
17 Classes in CPP are-
(1) Hardware, (2) Software,
(4) None of these.
(1) derived data types, (2) user defined data types
(3) (1) and (2) both, Ans.(1)
3 The language processors are-
(3) built-in data types, (4) All of these. Ans.(2)
18 In CPP, members of a class are . . . . by default.
(1) Compiler, (2) Assembler and Interpreter,
(3) (1) and (2) both, (4) None of these. Ans.(3) () Public, (2) Private,
How text are represented by the computer ? (3) Protected, (4) Static. Ans.(2)
19 The binary system uscd powers of-
(1) Unicode, (2) Bitmap,
(3) ASCIl, (1)2, (2) 4. (3) 8, (4) 16. Ans.(1)
20 Which part interprets program instruetions and initiate
(4) Floating point representation. Ans.(3)
5 How many different character can ASCII represent ? control operations?

(1) 32, (2) 64, (3) 128, (4) 256. Ans.(3) (1) Input,' (2) Storage Unit,
6 Which of the following is default location of saving and (3) Logic Unit, (4) Control Unit. Ans.(4)
opening file ? 21 The section of the CPU that selects, interprets and sees to
(1) My Computer, (2) My document, the execution of program instructions is-

(3) Desktop, (4) All of these. Ans.(2) (1) Memory, (2) Register Unit,
7 Which of 1he key is used to close the active windows? (3) Control Unit, (4) ALU. Ans.(3)
(1) Cirl+ F5, (2) Alt+ F6, 22 Example of open source operating system is
(3) Ctrl+F4, (4) None of these. Ans.(3) (1D UNIX, (2) LINUX,
window is the It (3) WINDOWS,
The topmost bar in any applicalion . . .

(4) (1) and (2) both. Ans.(2)


.

8
displaythe name of the document o r application. 23 Which operator has highest precedence ?

(1) Title bar, (2) Status bar, (1) i (2) ?


(4) Menu bar. Ans.(1)
(3) Tool bar, (3) (4) ++ Ans.(4)
rmx' Today" CHAPTER W1sE CLAs XI (SCIENCE) COMPUTER ScIENCE [183]
24 Controller of computer system transfers data from device
to SET- VI
(1) Bitlers, (2) Cache, COMPUTER SCIENCE
(3) Rgisters, (4) Indcxes. Ans.(1) Full Marks- 40
25 To stairt an 1/0 operation device driver loads appropriate Time: 1 Hour]
register into- For General Instruction see SET-I.
(1) Mei nory, (2) Secondary Storage,
(3) Dv ice Controlic: (4) Arrays. Fourth generation computers-
Ans.(3) (1) were built after 1970,
26 In coniputers, subtraction is generally carried out by-
(2) include microprocessor,
(1) 9's Complement, (2) 10's Complement,
(3) were the first to use microproccssor,
(3) 1'sComplement, (4) 2's Complement. Ans.(4) Ans.(4)
(4) All of thesc.
27 Floati ngs point representation is used to store- ?
2 The ALU performs which arithmetical operation
(1) Beolean valuces, (2) whole numbers,
(1) (+ -, *, 1).
(3) real integers, (4) integcrs. Ans.(3)
(2) (&, ||, &&).
28 The tei:hinology uscd in manufacture of sccond gencration > < >),
>, =,
compu tc:rs is- (3)(<, =, =,

(4) All of these. Ans.()


(1) Va.:uum Tube, (2) Transistors,
3 A microprocessor is-
(3) ICs, (4) None of these. Ans.(2) (1) Capable of performing arithmetical operation,
29 The tinmc taken to initiate a transfer is called
(2) Capable of performing logical operation,
(1) Sec:k time, (2) Rotational delay,
(3) A solid state device,
(3) Dat a transfer rate, (4) Disk latency. Ans.(4)
(4) All of these. Ans.(4)
30 What will be the output of the following condition
4 10010 in binary is . in Decimal.
stateme"it A = 10>= 10? 100 : 200?
(1) 1410 (2) 1610 (3) 1810 (4) 2010 Ans.(3)
(1) 10. (2) 100, How many unique symbols in the decimal number system ?
5
(3) 200 (4) None of these. Ans.(2)
(1)8, (2) 10, (3) 4, (4) 2. Ans.(2)
31 Which ol'the following concepts make extensive usc of
6 Which of the following Windows version support
arrays ?
64-bit processor ?
(1) Spa1.ial locality, (2) Scheduling of processes,
(1) Windows 95, (2) Windows XP,
(3) Cac hing, (4) Binary trees. Ans.(1)
3) Windows 2000, (4) Windows 98. Ans.(2)
Which an nong the following is Volatile ?
Which of the following is an example of utility ?
(1) RAM, (2) ROM,
(1) Data Recovery, (2) Operating system,
(3) PROIM, (4) EPROM. Ans.(1)
(3) Word, (4) Anti-virus. Ans.(4)
33 A funct.ion is invoked by a-
(2) An object call,
3 . is the layer of a computer system between the
(1) Ope retor call, hardware and the user.
(3) Functi on call, (4) None of these. Ans.(3)
(1) Operating system,
34 How many storage class specifiers are offered by C++?
(2) System environment,
(1) 3. (2) 4, (3) Operating environment,
(3) 5, (4) 2. Ans.(3) (4) None of these. Ans.(1)
35 Module:s in C++ are called- Full form of AGP is-
(1) Clasi:S:S, (2) Function, (1) Acceleration Graphics Port,
(3) (1) and (2) both, (4) Programs. Ans.(3) (2) Acceleration Graphic Port
36 Which of the following functions return no value ? (3) Accelerated Graphics Port,
(1) cos () (2) log() (4) All of these. Ans.(3)
(3) sqrt. ( (4) printdata () Ans.(4) 10 Blue-Ray is a-
37 Omittingg semicolon at end of a statement is called- (1) USB memory, (2) Pen drive,
(1) Logical error, (2) Execution time error,
(3) Optical disc, (4) None of these. Ans.(3)
(3) Syntax error, (4) Runtime error Ans.(3) 11 Which ofthe following does not represent an /O device?
s8 A variab le name in C++ can be any valid identifier but the
(1) ALU, (2) Mouse,
have length of-
identifier n ust a
(3) CPU, (4) Speaker which beeps. Ans.(3)
(1) 31 characters, (2) 30 characters, 12 A . is a template/blue-print representing a group of
(3) 15 chàracters, (4) 10 characters. Ans.(1) object that share common properties and relationships.
39 In place cfssiructure which other data type can be usecd in ?
() object, (2) class,
(1) Enum, (2) Class, (3) header file, (4) None of these. Ans.(2
(3) Float, (4) Int. Ans.(2) 13 Which generation language is machine-level programming
W h a t is the mandatory preprocessor directive for C++? language?
(1) #inc ucle <iostream (1) 4th Generation progranming language,
(2) #undef <iostream> (2) 3rd Generation programming language,
(3) #defina <iostream> (3) 2nd Generation programming language,
(4) None ot these. Ans.(1) (4) Ist Generation programming language. Ans.(4)
[184] CoMPUTER SciENCE HrmaPToday CHAPTER WISE CLAss XI (sc:ENCE)
library file <stdib.h> is used fcor
-

14 Which error occurs during execution of a program ? 33 Standard C


(1) Exccution crror, (2) Run-time error, (1) Declares data function,
(3) (1) and (2) both,. (4) Logical error. Ans.(3) (2) Declares time function,
15 The extension of C++ is- (3) Declares a mathematical function,

(1) C4+ (2) CPP (3) CP (4) C. Ans.(2) (4) Declares a utility function. Ans.(4)
16 All header files cnd with- 34 Which of the following is not a math functiomm ?

() n (2) .h (1) pow( (2) 1og()


(3) hd (4) None of these. Ans.(2) (3) time() (4) exp() Ans.(3)
35 A program which tells of funcition, type of
compiler name
17 Symbol of block comment is-
function and about function parameters-
(1) */, (2) ./,
(1) void function, (2) stdio filc,
(3)//. (4) None of these. Ans.(1)
function prototype, (4) None of these. Ans.(3)
18 Which ofthe following has no reference ? (3)
How many ways are there to invoke a functior1 in C++ ?
(2) Pointer, 36
(1) Array.
(4) All of thesc. (1) 4, (2) 3, (3) 2, (4) 1. Ans.(3)
(3) Reference, Ans.(4)
19 Which is a type of data type ? 37 The process of finding errors in a program is. known as-

(1) Derived types, (2) Fundamental type, (1) Debugging, (2) Test,
(3) (1) and (2) both. (4) None of thesc. Ans.(3) (3) Testing, (4) None of these. Ans.(3)
20 The data type that is not composed of other data types is 38 The error when ru!es of a programming language are
known as- misused
(1) Derived data types, (1) Logical error, (2) Syntax error,
(2) Composed data types, (3) Semantics error, (4) None of these. Ans.(2)
39 The data elements in structure are also known as-
(3) Fundamental data types,
(4) None of these. Ans.(3) (1) Members,. (2) Object,
21 How many types are there in increment/decrement operators ? (3) Data, (4) None of these. Ans.(1)
(3) 2, (4) 1. Ans.(3) 40 Which header file belongs to the function islower ()?
(1) 4, (2) 3,
22 Logical operator AND is denoted by- (1) math.h, (2) string.h,
(1) (2) (3) & (4) && Ans.(4) (3) ctype.h, (4) conio.h. Ans.(3)
23 Which operator has lowest precedence?
(1) (2) (3) ? (4)+ Ans.(2)
24 Which operator is having the highest precedence ? OTHER IMPORTANT QUESTIONS
(1) Equality, (2) Shift,
(4) Postfix. Ans(4) 1 Which ofthe following is not a mode in starting windows ?
(3) Unary,
25 What is the range of signed (one's complement) integral ? (1) Turbo mode, (2) Normal mode,
(1) 32767 to 32867, (2) 32767 to 32867, (3) Safe mode, (4) Command prornpt. Ans.(1)
(3) -32768 to 32767, (4) - 32767 to 32767. Ans.(4) 2 Which of the following uses only arithmetic e xpressions?
26 Which test can not be handled by switch statement ? (2) a b + c- i
(1) j8k
(1) Character test, (2) Floating point test, (3) ch=40 (4) i+j-k Ans.(4)
(3) Integer test, (4) None of these. Ans.(2) 3 What will be used when terminating a struct.ure ?
27 A loop containing another loop in its loop-body is called (1) (2) (3) (4) Ans.(2)
(1) Nested loop, (2) Combine loop, 4 Which symbol is used to declare the preprocessor
(3) Loop ladder, (4) All of these. Ans.(1) directives ?
28 Label in go to statement is same like- (1) (2) *
(3) $ (4) # Ans.(4)
(1) Initialization in for loop, Which symbol is used to denote condiiional operator ?
(2) Case in switch statement, (1) (2)? (3) ? (4) Ans.(3)
(3) Continuation condition in for loop, 6 92 in hexadecimal is . . . in decimal.
(4) All of these. Ans.(2) (1) 146, (2) 5C,
29 do-while is a/an- (3) 148, (4) None of thes . Ans.(1)
(1) Exist controlled loop, 7 x =++y + 2y evaluates to ( i f y = 6)

(2) Entry controlled loop, (1) 18, (2) 21,


(3) Count controlled loop, (3) 20, (4) None of these. Ans.(2)
(4) None of these. Ans.(1) Which arithmetic operators are oflered by C++?
30 Assuming int of 4 bytes, what is the size ofint arr [ 15); ? (1) Divide, (2) Remainder %,
(1) 60, (2) 11, (3) 19, (4) 15. Ans.(1) (3) Negative, (4) All of these. Ans.(4)
31 Referring element outside array bounds is a- 9 Which from the following is a jump stateinient ?
(1) Syntax error, (2) Execution time error, (1) Continue statement, (2) Switch statement,
(4) (2) and (3) both. Ans.(4) (3) Break statement, (4) All of these.
(3) Logical error, Ans.(4)
32 A character array can be initialized using- 10 A constant with a name-

(1) Integer value, (2) A string literal, (1) Nanme constant, (2) Char constar1t,
(4) None of these. Ans.(2) (3) Symbolic constant, (4) None of these:. Ans.(3)
(3) Floats value,
erma'PTeday CHAPTER WIsE CLASS -
XI
(SCIENCE)
CoMPUTER ScIENCE [185]
1l Which keyword is uscd to define the
macros in C++? 29 The Binary number system has base-
(1) Define, (2) # Define,
(3) Macro,
(1) 2 (2)8
(4) Nonc of the method. Ans.(2) (3) 10 None of these. Ans.(1)
12 C++ is a/an . (4)
language. 30 The Octal number system has base
(1) machine (2) assembly (1) 2 (2)8
(3) high-level (4) None of thesc. Ang.( 2)
Ans.(3) (3) 10 (4) None of these.
13 Every C++ program must have...... function. 31 The Decimal number system has base
(1) main () (3) pow () (1) 2 (2) 8
(2) getch ) (4) None of thesc. (4) None of thesec. Ans.( 3)
Ans.(1) (3) 10
14 Multiple use
of input/ output operators in
is called-
a single statcment 32 207 in decimal i s . . . . . in octal.
(1) 1000010 (2) 317
(1) initialization (2) declaration Ans.(2)
(3) 207 (4) None of these.
(3) cascading (4) Nonc of these. Ans.(3) 33 'A is an cxamplc of-
15 Information is
(1) integer literal (2) character literal
(1) Input data (2) Raw fact and figure, (4) bool literal. Ans.(2)
(3) real literal
(3) Meaningful data (4) Nonc of thesc. Ans.(3) 34 In C++ programming ' \ t ' is used for-
16 What is the full form of CPU ?
(1) Line change (2) Horizontal tab
(1) Chip Process Unit (2) Connected Processing Unit (4) None of these. Ans.(2)
(3) Vertical tab
(3) Chat Process Unit (4) None of these. Ans.(4) 35 In C+t+ programming '\v is used for-
17 Memory is mcasured in which unit ?
(1) Form fecd, (2) Line brake,
(1) kilogram (2) metre (3) Vertical tab, (4) Alarm. Ans.(3)
(3) bytes (4) Nence of these. Ans.(3) 36 Data items that never change their value during program
18 The Third generation computer used for intcrnal
.. run are called-
operations. (1) Keywords (2) Identifiers
(1) Vacuun tubes (2) Transistors (4) None of these. Ans.(3)
(3) Literals
(3) Integrated circuit (4) None of thesse. Ans.(3) 37 Identify the correct statement
19 Analog computers take input in the form o f
(1) Keywords are the user defincd names.
(1) digits 0 and 1 (2) Volts, Ampere, Celsius etc. (2) Keywords are the reserved words.
(3) Electrons (4) None of these. Ans.(1) (3) Keywords may be written in upper case also.
20 Which of the following is not a system software ?
(4) None of these. Ans.(2)
(1) Operating system (2) Language processor 38 Main memory of computer system is known to be-
(3) Word processing (4) None of these. Ans.(3) (1) Non-volatile, (2) Volatile
21 Windows Vista is a
operating system.
. . . . .

(3) Reserved, (4) Restricted. Ans.(2)


(1) single user (2) single user, multi-tasking 39 Which from the following is not a relational operator ?
(3) multi-user (4) None of these. Ans.(3) (1)>= (2)
22 Interpreter is used to translate. language. (3) (4) None of these. Ans.(4)
(1) Low level (2) Assembly 40 Increment and Decrement operators respectively are
(3) High level (4) None of these. Ans.(3) ( ) + +a n d - -
(3) and --
23 Choose odd one from the following- (2) and - (4) + and
+ Ans.(1)
(1) Speed (2) Accuracy 41 A set of Conditional/Ternary Operator(s) is/are-
(3) 1Q zero (4) Versatility. Ans.(1) (1) << (2) (3) (4) >> Ans.(3)
24 BIOS is an example o f 42 Which of the following is known
insertion operator?
as

(i) Englisn program (2) Prewritten program (1) (2) v (3) << (4) >> Ans.(3)
(3) Live ware (4) None of these. Ans.(2) 43 Which of the following is extraction operator in C++?
25 The evolution of computer starled with the first computing (1) (2) v (3) << (4) >» Ans.(4)
machine called- 44 Which of the following is not valid relational
a
operator?
(1) Abacus (2) Mark-I (1)== (2) => (3) > (4) Ans.(2)
(3) Microcprocessor (4) None of these. Ans.(1) 45 Which of the following is an operating system software?
26 s a pictorial representation ofstep-by-step solution (1) MS-DOs (2) UNIX
of a problem. (3) Both (1) and (2) (4) None of these. Ans.(3)
(1) Flowchart (2) Algorithm 46 Run-time error occurs during the-
(3) Eror (4) None of these. Ans.(1) (1) compilation of a program
27 Rhombus symbol is used in flowchart to indicate- (2) execution of a program
(1) Input (2) Process (3) writing of a program
(3) Decision (4) None of these. Ans.(3) (4) None of these. Ans.(2)
28 Compile-Time error is/are 47 PDP-I1, VAX, 7500 MAGNUM are
1) Syntax error (2) Semantics error
(1) Micro-computer (2) Mainframe computers
(3) Both (1) and (2) (4) None of these. Ans.(3) (3) Mini-computers (4) Super computers. Ans.(3)
[186] CoMPUTER ScIENCE o r m a ' P Today CHAPTER W1sE CLASS - XI (SCIENCE)
48 To develop a good program, which of the following numbers is called-
0 organized way of representing
An
guidelines should we follow ? Ans. Number system
(1) Modular approach to programming 70 Mouse was invented in-
(2) Meaningful names for identificrs Ans. 1963
(3) Usc comment and indentation receive a byte (8 bit) at a time ?
Which ports scnd or
7 can

(4) All of these. Ans.(4) Ans. Parallel Port


49 is a program that accepts data values in tabular form. 72 Bitwise complcment is a
( ) Graphic softwarc Ans. Unary operator
(2) Prescntation software 73 Symbol of Ellipsis is-
(3) Electronic spreadsheet Ans.
(4) None of thesc. Ans.(3) 74 Unary operator means that-
50 Scroll bar is used to Ans. Operator takes only onc operand
(1) Seroll Right and Left, 75 Statement that causes control program to jump over other
(2) Scroll Up and Down, statements, is called
(3) (1) and (2) both, Ans. Jump statement
(4) All of these. Ans.(3) be used for coming out of recursion ?
76 Which keyword can
S1 A one-dimensional array of one-dimensional array is
Ans. Return
called 77 The program arca inside which a variable can be accessed
(1) Three-dimensional array, is called
(2) Two-dimensional array, Ans. Variable's scope
(3) Multi-casting array. 78 For finding an object in an array starting from beginning
(4) Multi-dimensional array. Ans.(2) and inspecting each element one after other, until object is
52 First-In-First-Out (FIFO) scheduling is- found is called as-
(1) Deadline scheduling, Ans. Linear search algorithm
(2) Fair share scheduling, 79 Tables or arrays that require two subscripts to identify a
(3) Preemptive scheduling. particular element are called-
(4) Non preemptive scheduling. Ans.(4) Ans. Double subscripted array
53 The ASCII value of A' is- 80 Default return type for every function is-
Ans. 65 Ans. int.
54 The ASCII value of 'B' is- 81 A variable that is declared inside a block is called-
Ans. 66 Ans. Local variable
55 The ASCII value of 'C' is- 82 A collection of sub programs used to develop other
Ans. 67 programs and software is known as-
56 The ASCII value of 'D' is- Ans. Library
Ans. 68
57 The ASCII value of 'a' is-
83 strand function is used
for-
Ans. Getting randomizing effect
Ans. 97 84 When a structure contains another structure, it is called-
58 The ASCII value of 'b' is- Ans. Structure assignment
Ans. 98 85 Can we initialize a structure's elements in the structure
59 The ASCII value of 'c' is- itself?
Ans. 99 Ans. No
60 The ASCII value of 'd' is- 86 Can we declare a structure inside a structure
Ans. 100 Ans. Yes
61 Smallest unit of memory is ? 87 The declaration of structure is also
known as-
Ans. Bit Ans. Structure specifier,
62 Storage of Ikb the
means
following number of bytes 88 A structure
brings together a group of-
Ans. 1024 Ans. Variables
63 All minimized program in computer are shown in-
89 Multiple of
Ans. Task bar
use
input / output operator in a single statement
is called-
64 BIOS is stored in- Ans. Cascading
Ans. ROM 90 The logical sequence of
65 How many bit form a byte? step by step solution for a given
problem is called-
Ans. 8 bit Ans. Algorithm
66 Mini computer is also know as- 91 In order for a
peripheral to operate correctly, its . . . . must
Ans. Mid-range computer be installed.
67 How many bits are there in 1 byte? Ans. device driver
Ans. 8 92 The while
loop evaluates a test
68 What digits are used to store numbers, letters etc. into the loop. expression...... entry
Ans. 0-1 Ans. before.

You might also like