Saturday, April 12, 2025

[MCQS] KRITI Publication Computer Science All Chapters

UNIT 1: Database Management System (DBMS)

 

Question 1: The key that uniquely identifies each record is called:

a. Primary Key

b. Key Record

c. Unique Key

d. Field Name

 

Question 2: A data dictionary is a repository that manages

a. Memory

b. Metadata

c. Spell Checker

d. Data Validator

 

Question 3: Which of the following is generally used for performing tasks like creating the structure of the relations, deleting relation?

a. DML(Data Manipulation Language)

b. Query

c. Relational Schema

d. DDL(Data Definition Language)  

 

Question 4: A Database Management System is a type of software

a. It is a type of system software

b. It is a kind of application software

c. It is a kind of general software

d. Both A and C  

 

Question 5: Which of the following refers to the level of data abstraction that describes exactly how the data actually stored?

a. Conceptual Level

b. Physical Level

c. File Level

d. Logical Level  

 

Question 6: In general, a file is basically a collection of all related

a. Rows & Columns

b. Fields

c. Database

d. Records

 

Question 7: The term "Data" refers to:

a. The electronic representation of the information (or data)

b. Basic information

c. Raw facts and figures

d. Both A and C

 

Question 8: The term "SQL" stands for

a. Standard query language

b. Sequential query language

c. Structured query language

d. Server-side query language  

 

Question 9: An ______________ is a set of entities of the same type that share the same properties, or attributes.

a. Entity set

b. Attribute set

c. Relation set

d. Entity model  

 

Question 10: Which of the following gives a logical structure of the database graphically?

a. Database diagram

b. Entity diagram

c. Architectural representation

d. Entity-Relationship diagram

 

Question 11: The entity relationship is represented in E-R diagram as

a. Undivided rectangles

b. Dashed lines

c. Diamond

d. Double diamonds

 

Question 12: In the ______________ normal form, a composite attribute is converted to individual attributes.

a. First

b. Second

c. Third

d. Fourth

 

Question 13: A table is on the many sides of a one to many or many to many relationships must:

a. Be in Second Normal Form (2NF)

b. Be in Third Normal Form (3NF)

c. Have a single attribute key

d. Have a composite key  

 

Question 14: Tables in second normal form (2NF):

a. Eliminate all hidden dependencies

b. Eliminate the possibility of a insertion anomalies

c. Have a composite key

d. Have all non-key fields depend on the whole primary key  

 

Question 15: Which one of the following statements about normal forms is FALSE?

a. BCNF is stricter than 3 NF

b. Lossless, dependency -preserving decomposition into 3 NF is always possible

c. Loss less, dependency - preserving decomposition into BCNF is always possible

d. Any relation with two attributes is BCNF  

 

Question 16: Functional Dependencies are the types of constraints that are based on ______________.

a. Key

b. Key revisited

c. Superset key

d. None of the mentioned  

 

Question 17: Which is a bottom-up approach to database design that design by examining the relationship between attributes:

a. Functional dependency

b. Database modelling

c. Normalization

d. Decomposition  

 

Question 18: Which forms simplifies and ensures that there are minimal data aggregates and repetitive groups:

a. 1NF

b. 2NF

c. 3NF

d. All of the mentioned  

 

Question 19: Which forms are based on the concept of functional dependency:

a. 1NF

b. 2NF

c. 3NF

d. 4NF

 

Question 20: A distributed database is a collection of data which belong ______________ to the same system but are spread over the ______________ of the network.

a. Logically, sites

b. Physically, sites

c. Database, DBMS

d. None of the above  

 

Question 21: In a distributed Database reduction of redundancy is obtained by ______________.

a. Data fragmentation

b. Data Replication

c. Data Sharing

d. None of the above  

 

Question 22: Which of the following is/are the main goals of a distributed database?

a. Interconnection of database

b. Incremental growth

c. Reduced communication overhead

d. All of the above  

 

Question 23: The server process that implements lock manager functionality, is called

a. Server Processes

b. Database Writer Process

c. Manager processes

d. Lock Manager Processes

 

Question 24: Storing a separate copy of the database at multiple locations is which of the following?

a. Data Replication

b. Horizontal Partitioning

c. Vertical Partitioning

d. Vertical Partitioning  

 

Question 25: Which of the following is a group of one or more attributes that uniquely identifies a row?

a. Key

b. Determinant

c. Tuple

d. Relation  

 

Question 26: A relationship is considered a:

a. Column

b. one-dimensional table

c. two-dimensional table

d. three-dimensional table

 

UNIT 2: Data Communication and Networking

 

Question 1: A computer network permits sharing of ______________.

a. Resources

b. Information

c. Both a and b

d. None of these

 

Question 2: ______________ is a network that connect sites that are in different locations.

a. LAN

b. MAN

c. WAN

d. None of these

 

Question 3: The technology that connects the computers and people within a small area is called ______________.

a. LAN

b. MAN

c. WAN

d. None of these

 

Question 4: ______________ is a network that covers geographic areas that are larger than a district or city.

a. LAN

b. MAN

c. WAN

d. None of these

 

Question 5: Which of the following is a collection of point-to-point links that may form a circle?

a. Bus Topology

b. Ring Topology

c. Mesh Topology

d. Star Topology

 

Question 6: Which protocol layer uses the protocols are WWW, HTTP, FTP, SMTP, e-mail, etc.?

a. Application Layer Protocol

b. Transport Layer Protocol

c. Internet Layer Protocol

d. None of these  

 

Question 7: Why was the OSI model developed?

a. Manufacturers disliked the TCP/IP protocol suite

b. The rate of data transfer was increasing exponentially

c. Standards were needed to allow any two systems to communicate

d. None of the above  

 

Question 8: Devices may be arranged in ______________ topology.

a. Mesh

b. Ring

c. Bus

d. All of the above

 

Question 9: The OSI model shows how the network functions of a computer ought to be organized.

a. CCITT

b. ISO

c. OSI

d. ANSI

 

Question 10: A ______________ is a collection of data among all the networking networks.

a. forum

b. standard

c. protocol

d. None of these

 

Question 11: The ______________ is the physical path over which a message travels.

a. protocol

b. medium

c. signal

d. None of these

 

Question 12: OSI model has ______________ layers.

a. five

b. six

c. seven

d. eight

 

Question 13: In OSI model what is the main function of the transport layer?

a. Node-to-node delivery

b. process-to-process message delivery

c. synchronization

d. routing and maintenance of routing tables  

 

Question 14: The ______________ is the layer in the OSI model encryption and decryption are handled by the layer.

a. transport

b. session

c. presentation

d. application

 

Question 15: Frequency of failure and network recovery time after a failure are measures of the ______________ of a network.

a. performance

b. reliability

c. security

d. feasibility  

 

Question 16: When a host on network A sends a message to a host on network B, which address does the router look at?

a. Physical

b. Logical

c. Port

d. None of these

 

Question 17: The maximum data rate in a communications system is given by its ______________.

a. bandwidth

b. throughput

c. latency

d. jitter

 

Question 18: Communication between a computer and a keyboard involves ______________ transmission.

a. simplex

b. half-duplex

c. full-duplex

d. automatic  

 

Question 19: The ______________ bit address is assigned to each host.

a. physical

b. IP

c. MAC

d. variable

 

Question 20: A television broadcast is an example of ______________ transmission.

a. Half-Duplex

b. Full-Duplex

c. Simplex

d. None of these

 

Question 21: The ______________ layer is responsible for moving frames from one node to the next.

a. physical

b. data link

c. transport

d. None of these

 

Question 22: In a ______________ connection, more than two devices can share a single link.

a. point-to-point

b. multipoint

c. primary

d. secondary

 

Question 23: The ______________ layer is responsible for the delivery of a message from one process to another.

a. physical

b. data link

c. transport

d. None of these

 

Question 24: The ______________ address is also known as the link address, or the address of a node as defined by its LAN or WAN.

a. IP

b. MAC

c. port

d. physical

 

Question 27: The seven-layer ______________ model provides guidelines for the development of universally compatible networking protocols.

a. OSI

b. ISO

c. IEEE

d. None of these  

 

Question 28: The physical, data link and network layers are the ______________ support layers.

a. user

b. network

c. both (a) and (b)

d. neither (a) nor (b)

 

Question 29: The session, presentation and application layers are the ______________ support layers.

a. user

b. network

c. both (a) and (b)

d. neither (a) nor (b)  

 

Question 30: The ______________ layer coordinates the functions required to transmit a bit stream over a physical medium.

a. transport

b. network

c. data link

d. physical  

 

Question 31: The ______________ layer is responsible for delivering data units from one station to the next without errors.

a. transport

b. network

c. data link

d. physical  

 

Question 32: The ______________ layer is responsible for the source-to-destination delivery of a packet across multiple network links.

a. transport

b. network

c. data link

d. physical  

 

Question 33: The ______________ layer establishes, maintains, and synchronizes the interactions between communicating devices.

a. transport

b. session

c. data link

d. physical

 

Question 34: The ______________ layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format.

a. transport

b. session

c. data link

d. presentation  

 

Question 35: The ______________ layer enables the users to access the network.

a. transport

b. application

c. data link

d. physical

 

UNIT 3:  Web technology II

 

Question 1: Dynamic web page

a. is same every time whenever it displays

b. generates on demand by a program or a request from browser

c. both (a) and (b)

d. none of above  

 

Question 2: What will be the output of following JavaScript code

int a==2;

int b=4;

int ans=a+b;

print(ans);

a. 2

b. 6

c. 0

d. error

 

Question 3: Among the following, which one is a ternary operator?

a. +

b. :

c. -

d. ?:

 

Question 4: What will be the output of the following JavaScript code?

int a=0;

for(a;a<5;a++);

console.log(a);

a. 0

b. error

c. 4

d. 5

 

Question 5: Which one of the following is the correct way for calling the JavaScript code?

a. Preprocessor

b. Triggering Event

c. RMI

d. Function/Method

 

Question 6: Which one of the following symbols is used for creating comments in the JavaScript symbol?

a. \

b. //

c. /* */

d. \``  

 

Question 7: Which one of the following keywords is used for defining the function in the JavaScript?

a. Void

b. init

c. Main

d. Function  

 

Question 8: How do you focus a particular part of the HTML page in JavaScript?

a. hover()

b. focus()

c. on()

d. focuson()

 

Question 9: Which of the following can't be done with client-side JavaScript?

a. Validating a form

b. Sending a form's contents by email

c. Storing the form's contents to a database file on the server

d. None of the above  

 

Question 10: What is the correct JavaScript syntax to write "Hello World"?

a. System.out.println("Hello World")

b. println ("Hello World")

c. document.write("Hello World")

d. response.write("Hello World")  

 

Question 11: Inside which HTML element do we put the JavaScript?

a. <js>

b. <scripting>

c. <script>

d. <javascript>

 

Question 12: Which types of image maps can be used with JavaScript?

a. Server-side image maps

b. Client-side image maps

c. Server-side image maps and Client-side image maps

d. None of the above  

 

Question 13: Which of the following event fires when the form element loses the focus:

a. onfocus

b. onblur

c. onclick

d. ondblclick

 

Question 14: JavaScript is interpreted by

a. Client

b. Server

c. Object

d. None of the above

 

Question 15: What will be the output of following code:

<script type="text/javascript">

x=4+”4”;

document.write(x);

</script>

a. 44

b. 8

c. 4

d. Error output

 

Question 16: Choose the correct option.

a. HTML form elements are used for taking user input.

b. HTML form elements are defined inside <form> tag.

c. HTML form elements can be of different types.

d. All of these.  

 

Question 17: Which of the following tag is used for drop down list?

a. <select>

b. <text>

c. <textarea>

d. <dropdown>

 

Question 18: Correct HTML Tag For The Largest Heading Is

a. <heading>

b. <h6>

c. <h1>

d. <head>

 

Question 19: What Tag Is Used To Display A Picture In A HTML Page?

a. Picture

b. Img

c. Src

d. Image

 

Question 20: PHP Stands for?

a. Hypertex Processor

b. Hyper Markup Processor

c. Hyper Markup Preprocessor

d. Hypertext Preprocessor

 

Question 21: PHP is an example of ______________ scripting language.

a. Server-side

b. Client-side

c. Browser-side

d. In-side

 

Question 22: PHP scripts are enclosed within ______________.

a. <php> ... </php>

b. <?php ... ?>

c. <?php ... ?php

d. <p> ... </p>

 

Question 23: Which of the following method sends input to a script via a URL?

a. Get

b. Post

c. Both

d. None

 

Question 24: PHP files have a default file extension of

a. .html

b. .xml

c. .php

d. .ph

 

Question 25: Which of the following looping statements is/are supported by PHP?

i. for loop

ii. while loop

iii. do-while loop

iv. foreach loop

a. (i)

b. (i) and (ii)

c. (i), (ii) and (iii)

d. All of the mentioned

 

Question 26: Which of the following php statement is correct to store the value of num variable

i. int $num = 15;

ii. int num = 15;

iii. $num = 15;

iv. 111 = $num;

a. Both (i) and (ii)

b. All of the mentioned.

c. Only (iii)

d. Only (i)

 

Question 27: What will be the output of the following php code list?<?php$num = 1;$num1 = 2;print "$num"."+".$num1 ;?>

a. 3

b. 1+2

c. .+

d. ERROR

 

Question 28: When you use the $_GET variable to collect data, the data is visible to...

a. none

b. only you

c. everyone

d. selected few

 

Question 29: Which one of the following should not be used while sending passwords or other sensitive information?

a. GET

b. POST

c. REQUEST

d. NEXT

 

Question 30: Which one of the following databases has PHP supported almost since the beginning?

a. Oracle Database

b. SQL

c. SQL+

d. MySQL

 

Question 31: Which one of the following statements is used to create a table?

a. CREATE TABLE table_name (column_name column_type);

b. CREATE table_name (column_type column_name);

c. CREATE table_name (column_name column_type);

d. CREATE TABLE table_name (column_type column_name);

 

Question 32: Which one of the following statements instantiates the mysqli class?

a. $mysqli = new mysqli();

b. mysqli = new mysqli[];

c. $mysqli ->new mysqli();

d. mysqli ::new mysqli();

 

Question 33: Which one of the following statements can be used to select the database?

a. mysqli_select_db('databasename');

b. mysqli->select_db('databasename');

c. mysqli_select_db("databasename");

d. $mysqli->select_db("databasename");

 

Question 34: Which one of the following methods is responsible for sending the query to the database?

a. query();

b. send_query();

c. sendquery();

d. query_send();

 

Question 35: Which one of the following method is used to retrieve the number of rows affected by an INSERT, UPDATE, or DELETE query?

a. num_rows()

b. affected_rows()

c. changed_rows()

d. new_rows()

 

Question 36: The ______________ statement is used to delete a table.

a. DROP TABLE

b. DELETE TABLE

c. DEL TABLE

d. REMOVE TABLE

 

Question 37: What is the full form of SQL?

a. Structured Query List

b. Structured Query Language

c. Sample Query Language

d. None of these

 

Question 38: Which of the following is not a DDL command?

a. TRUNCATE

b. ALTER

c. CREATE

d. UPDATE

 

Question 39: How many Primary keys can have in a table?

a. Only 1

b. Only 2

c. Depends on no of Columns

d. Depends on DBA

 

Question 40: Which command is used to change the definition of a table in SQL?

a. CREATE

b. UPDATE

c. ALTER

d. SELECT

 

UNIT 4: Programming in C

 

Question 1: The format identifier '%i' is also used for ______________ data type.

a. char

b. int

c. float

d. double

Note: %i and %d are both used to print integers in C.

Question 2: Is it possible to run program without main() function?

a. yes

b. No

c. Yes but wrong output

d. sometimes

 

Question 3: How many main() function we can have in our project?

a. 1

b. 2

c. No limit

d. Depends on compiler

 

Question 4: What is the size of an int data type?

a. 4 Bytes

b. 8 Bytes

c. Depends on the system/compiler

d. Cannot be determined

 

Question 5: What is the output of the below code snippet?

#include <stdio.h>

main()

{

int x = 5, *p;

p = &x;

printf("%u", *p);

}

a. Address of x

b. Address of y

c. Address of p

d. 5

Note:   x = 5 → x holds the value 5.

  p = &x → p holds the address of x.

  *p → This dereferences the pointer, so it gives the value stored at the address p, which is 5.

 

Question 6: The prototype of a function can be used to,

a. Define a function

b. Declare a function

c. Erase a function

d. None of the above  

 

Question 7: Which of the following is a logical OR operator?

a. &

b. &&

c. ||

d. None of the above

 

Question 8: Register variable is ______________?

a. stored in CPU

b. stored in cache memory

c. stored in main memory

d. stored in secondary memory

 

Question 9: Automatic variables are stored in ______________.

a. stack

b. data segment

c. register

d. heap

 

Question 10: What is the format identifier for float data type

a. %d

b. %c

c. %f

d. %s

 

Question 11: Which of the following is true for the static variable?

a. It can be called from another function

b. It exists even after the function ends

c. It can be modified in another function by sending it as a parameter

d. All of the mentioned  

 

Question 12: Which of the following are collections of different data types?

a. String

b. Structures

c. Char

d. None of the above

 

Question 13: Union differs from structure in the following way

a. All members are used at a time

b. Only one member can be used at a time

c. Union cannot have more members

d. Union initialized all members as structure  

 

Question 14: A function which calls itself is called a ______________ function.

a. Self-Function

b. Auto Function

c. Recursive Function

d. Static Function  

 

Question 15: The data structure used to implement recursive function calls -

a. Array

b. Linked list

c. Binary tree

d. Stack

 

Question 16: The default parameter passing mechanism is

a. call by value

b. call by reference

c. call by value result

d. None

 

Question 17: How many times "Hello" is printed?

int main()

{

while(1)

{

printf("Hello");

}}

a. 1 time

b. Compilation Error

c. Infinite times

d. Runtime Error

 

Question 18: A pointer is:

a. A variable that stores addresses of an instruction

b. A variable that stores address of another variable

c. A keyword used to create variables

d. None of these

 

Question 19: Is the NULL pointer same as an uninitialized pointer?

a. Yes

b. No

c. May Be

d. Can't Say

Note: A NULL pointer is a specific value (typically 0 or a macro that evaluates to 0) that indicates the pointer does not point to a valid memory location. An uninitialized pointer contains an indeterminate (garbage) address. They are not the same.

Question 20: Size of a union is determined by size of the.

a. First member in the union

b. Last member in the union

c. Sum of the sizes of all members

d. Biggest member in the union

 

Question 21: If there is any error while opening a file, fopen will return?

a. Nothing

b. EOF

c. NULL

d. Depends on compiler

 

Question 22: It is not possible to combine two or more file opening mode in fopen () method.

a. TRUE

b. FALSE

c. May Be

d. Can't Say

Note: It is possible to combine certain file opening modes (e.g., "r+" for reading and writing, "wb" for writing in binary). Therefore, the statement is FALSE.

Question 23: What is the function of the mode "w+"?

a. create text file for writing, discard previous contents if any

b. create text file for update, discard previous contents if any

c. create text file for writing, do not discard previous contents if any

d. create text file for update, do not discard previous contents if any  

Note: The mode "w+" opens a text file for both reading and writing. If the file exists, its contents are truncated (discarded). If the file does not exist, it is created. So, 'b' is the most accurate description among the options, as "update" implies both read and write capabilities. Option 'a' is close but doesn't explicitly mention reading.

Question 24: If the mode includes b after the initial letter, what does it indicates?

a. text file

b. big text file

c. binary file

d. blueprint text  

 

Question 25: What is the function of fputs()?

a. read a line from a file

b. read a character from a file

c. write a character to a file

d. write a line to a file  

Note: The fputs() function in C is used to write a string (a line of text) to a file stream.

Question 26: scanf() is a predefined function in ______________ header file.

a. stdlib.h

b. ctype.h

c. stdio.h

d. math.h

 

Question 27: What is the meaning of the following C statement?

scanf("%[^\n]", ch);

a. read all character except new line

b. read all characters

c. read only new line character

d. syntax error

 

Question 28: What is the following is invalid header file in C?

a. math.h

b. mathio.h

c. string.h

d. ctype.h

 

Question 29: Library function getch() belongs to which header file?

a. stdio.h

b. conio.h

c. stdlib.h

d. stdlib.io.h

 

Question 30: Library function pow() belongs to which header file?

a. mathio.h

b. math.h

c. square.h

d. stdio.h

Note: The pow() function (for calculating powers) is part of the standard C math library and is declared in the math.h header file.

Question 31: What is storage class for variable A in below code?

int main()

{

int A;

A = 10;

printf("%d", A);

return 0;

}

a. extern

b. auto

c. register

d. static

Note: When a local variable is declared inside a function without any explicit storage class specifier, its storage class is auto by default. This means its lifetime is limited to the function's execution, and it's stored on the stack.

Question 32: Can we declare function inside structure of C Programming?

a. Yes

b. No

c. Depends on compiler

d. Yes but runtime error

Note: In standard C, you cannot directly declare functions inside the definition of a struct. This is a feature of object-oriented languages like C++.

Question 33: What is the C function used to move current pointer to the beginning of file.?

FILE *fp;

a. rew(fp)

b. rewind(fp)

c. rew(fp)

d. wind(fp)

 

Question 34: What is the keyword used to declare a C file pointer?

a. file

b. FILE

c. FILEFP

d. filefp

 

Question 35: Where is a file temporarily stored before read or write operation?

a. Notepad

b. RAM

c. Hard disk

d. compiler

 

Question 36: What is the need for closing a file in C language.?

a. fclose() closes a file to release the memory used in opening a file.

b. Closing a file clears Buffer contents from RAM or memory.

c. Unclosed files occupy memory and PC hangs when on low memory.

d. All the above  

 

Question 37: If a FILE pointer is NULL what does it mean for the following code?

FILE *fp;

fp=fopen("abc.txt", "w");

a. Unable to open a file named abc.txt

b. abc.txt is not available on disk

c. Hard disk has hard ware problems.

d. All the above  

 

Question 38: A data of the file is stored in........

a. Ram

b. Hard disk

c. Rom

d. None

 

Question 39: The content of the file will be lost if it is opened in ........

a. a mode

b. w mode

c. r mode

d. a+ mode

Note: When a file is opened in "w" (write) mode, if the file exists, its contents are truncated (deleted). If it doesn't exist, a new empty file is created. Therefore, opening a file in "w" mode will lead to the loss of its original content.

Question 40: For a direct access file

a. there are restrictions on the order of reading and writing

b. there are no restrictions on the order of reading and writing

c. access is restricted permission wise

d. access is not restricted permission wise  

 

UNIT 5: Object- Oriented Programming (OOP)

 

Question 1: Which of the following best defines a class?

a. Parent of an object

b. Instance of an object

c. Blueprint of an object

d. Scope of an object  

 

Question 2: What is the additional functional feature in classes that was not in structures?

a. Data members

b. Member functions

c. Static data allowed

d. Public access specifier  

 

Question 3: Which is not feature of OOP in general definitions?

a. Code reusability

b. Encapsulation

c. Duplicate/Redundant data

d. Efficient Code

 

Question 4: Which Feature of OOP illustrated the code reusability?

a. Polymorphism

b. Abstraction

c. Encapsulation

d. Inheritance

 

Question 5: How many classes can be defined in a single program?

a. Only 1

b. Only 100

c. Only 999

d. As many as you want

 

Question 6: Which of the following two features match each other?

a. Inheritance and Encapsulation

b. Encapsulation and Polymorphism

c. Abstraction and Polymorphism

d. Abstraction and Encapsulation

 

Question 7: Which among the following best describes polymorphism?

a. It is the ability for a message/data to be processed in more than one form

b. It is the ability for a message/data to be processed in only 1 form

c. It is the ability for many messages/data to be processed in one way

d. It is the ability for undefined message/data to be processed in at least one way  

 

Question 8: If same message is passed to objects of several different classes and all of those can respond in a different way, what is this feature called?

a. Inheritance

b. Overriding

c. Polymorphism

d. Overloading  

 

Question 9: Which among the following best describes encapsulation?

a. It is a way of combining various member functions into a single unit

b. It is a way of combining various data members and member functions into a single unit

c. It is a way of combining various data members and member functions into a single unit which can operate on any data

d. It is a way of combining various data members and member functions that operate on those data members into a single unit  

 

Question 10: Which feature can be implemented using encapsulation?

a. Inheritance

b. Abstraction

c. Polymorphism

d. Overloading

 

Question 11: Using encapsulation data security is

a. Not ensured

b. Ensured to some extent

c. Entirely ensured

d. Very low

 

Question 12: Which definition best describes an object?

a. Instance of a class

b. Instance of itself

c. Child of a class

d. Overview of a class  

 

Comment: An object is a specific instance of a class, created in memory. 'a' is the correct answer.

Question 13: Which among the following best defines abstraction?

a. Hiding the implementation

b. Showing the important data

c. Hiding the important data

d. Hiding the implementation and showing only the features  

 

Question 14: Class is a ______________ abstraction.

a. Object

b. Logical

c. Real

d. Hypothetical

 

Question 15: Which feature of OOP indicates code reusability?

a. Encapsulation

b. Inheritance

c. Abstraction

d. Polymorphism

 

Question 16: Which among the following defines single level inheritance?

a. One base class derives another class

b. One derived class inherits from one base class

c. One base class inherits from one derived class

d. One derived class derives from another derived class  

 

Question 17: Which among the following defines multilevel inheritance?

a. A class derived from another derived class

b. Classes derived from other derived classes

c. Creating single level inheritance

d. Class which has more than one parent

 

UNIT 6: Software Process Model

 

Question 1: Which of the following are valid step in SDLC a framework?

a. Requirement Gathering

b. System Analysis

c. Software Design

d. All of the above

 

Question 2: The goal of requirement engineering is to develop and maintain sophisticated and descriptive ______________ document.

a. Feasibility Study

b. Requirement Gathering

c. Software Requirement Validation

d. System Requirements Specification  

 

Question 3: It is the process in which developers discuss with the client and end users and know their expectations from the software.

a. Requirements gathering

b. Organizing Requirements

c. Negotiation & discussion

d. Documentation  

  

Question 5: Which one is not considered during Technical Feasibility?

a. Expandability

b. Existence of technology

c. Suitability of technology

d. Human resource to use the technology  

 

Question 6: Which of the following is an example of Black Box and Functional Processing?

a. First Generation Language

b. Second Generation Language

c. Third Generation Language

d. Fourth Generation Language  

 

Question 7: System study involves

a. study of an existing system

b. documenting the existing system

c. identifying current deficiencies and establishing new goals

d. All of the above  

 

Question 8: Feasibility study is carried out by

a. managers of the organization

b. system analyst in consultation with managers of the organization

c. users of the proposed system

d. systems designers in consultation with the prospective users of the system  

 

Question 9: Final specifications are drawn up by

a. system analyst in consultation with the management of the organization

b. the managers of user organization

c. system analyst in consultation with programmers

d. system designers along with users  

 

Question 10: The final specifications are arrived at:

a. After feasibility study

b. during feasibility study

c. just before implementation phase

d. when the system is being designed  

 

Question 11: System design is carried out:

a. as soon as system requirements are determined

b. whenever a system analyst feels it is urgent

c. after final system specifications is approved by the organization

d. whenever the user management feels it should be done  

 

Question 12: The primary objective of system design is to

a. design the programs, databases and test plan

b. design only user interfaces

c. implements the system

d. finds out how the system will perform  

 

Question 13: The primary objective of system implementation is

a. to train users to operate the system

b. to implement designed system using computers

c. writes programs, create databases and test with live data

d. both a and c

 

Question 14: During system implementation the following are done

a. programs are written and tested with operational data

b. user documentation is created and users trained

c. the system is tested with operational data

d. All of the above

 

15. System evaluation is carried out

a. after the system has been operational for a reasonable time

b. during system implementation

c. whenever managers of user organization want it

d. whenever operational staff want it

 

16. Systems are modified whenever

a. user's requirements change

b. new computers are introduced in the market

c. new software tools become available in the market

d. other similar organization modify these system

 

17. System analysts have to interact with

a. managers of organizations

b. users in the organization

c. programming team

d. all of the above

 

18. The primary responsibility of a systems analyst is to

a. specify an information system which meets the requirements of an organization

b. write programs to meet specifications

c. maintain the system

d. meet managers of the organization regularly

 

19. The responsibilities of a system analyst include

a. defining and prioritizing information requirement of an organization

b. gathering data, facts and opinions of users in an organization

c. drawing up specifications of the system for an organization

d. all of the above

 

20. The most important attribute of a systems analyst is

a. excellent programming skills

b. very good hardware designing skills

c. very good technical management skills

d. very good writing skills

 

21. Among the attributes of a good systems analyst the following are essential

a. knowledge of organization

b. analytical mind

c. ability to communicate orally

d. all of the above

 

22. Among the attributes of a systems analyst the following are most important

a. knowledge of computer systems and currently available hardware

b. good interpersonal relations

c. broad knowledge about various organizations

d. All of the above

 

23. Changes made periodically to a system, after its implementation, is known as system

a. analysis

b. design

c. development

d. maintenance

 

24. During what phase, the requirement analysis is performed?

a. system design phase

b. system development phase

c. system analysis phase

d. system investigation phase

 

25. A feasibility study

a. includes a statement of the problems

b. considers a single solution

c. both (a) and (b)

d. a list of alternative solution considered

 

26. The make-or-buy decision is associated with the _________ step in the SDLC.

a. Problem/Opportunity Identification

b. Design

c. Analysis

d. Development and Documentation

 

27. Actual programming of software code is done during the _________ step in the SDLC.

a. Maintenance and Evaluation

b. Design

c. Analysis

d. Development and Documentation

 

28. The main ingredient of the report documenting the _________ is the cost benefit analysis.

a. System Analysis

b. Feasibility Study

c. System Design

d. System Design

 

UNIT 7: Recent Trends in Technology

 

1. Artificial Intelligence is about _________.

a. Playing a game on Computer

b. Making a machine intelligent

c. Programming on Machine with your Own Intelligence

d. Putting your intelligence in Machine  

 

2. The application/applications of Artificial Intelligence is/are:

a. Expert Systems

b. Gaming

c. Vision Systems

d. All of the above  

 

3. The main function of problem-solving agent is to _________.

a. Solve the given problem and reach the goal

b. Find out which sequence of action will get it to the goal state.

c. Both a & b

d. None of the above  

 

4. The characteristics of the computer system capable of thinking, reasoning and learning is known is:

a. machine intelligence

b. human intelligence

c. artificial intelligence

d. virtual intelligence

 

5. What is the name of the computer program that simulates the thought processes of human beings?

a. Human logic

b. Expert reason

c. Expert system

d. Personal information  

 

6. What type of computing technology refers to services and applications that typically run on a distributed network through virtualized resources?

a. Distributed Computing

b. Cloud Computing

c. Soft Computing

d. Parallel Computing  

 

7. Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as _________ resources to users.

a. Real

c. Virtual

b. Cloud

d. None of the mentioned  

 

8. Which one of the following cloud concepts is related to sharing and pooling the resources?

a. Polymorphism

b. Virtualization

c. Abstraction

d. None of the mentioned  

 

9. Which one of the following is Cloud Platform by Amazon?

a. Azure

b. AWS (Amazon Web Services)

c. Cloudera

d. All of the above

 

10. …………. is a combination of structured, semi structured and unstructured data collected by organizations that can be mined for information and used in machine learning projects, predictive modeling and other advanced analytics applications.

a. Small data

b. Medium data

c. Big data

d. None of the above  

 

11. How many V's of Big Data:

a. 2

b. 3

c. 4

d. 5

 

12. It is a mediated environment which creates the sensation in a user of being present in a (physical) surrounding.

a. WWW

b. VR (Virtual Reality)

c. HMD

d. GUI  

 

13. Which of the following describes e-commerce?

a. Doing business electronically

b. Doing business

c. Sale of goods

d. All of the above  

 

14. Which of the following is part of the four main types of e-commerce?

a. B2B

b. B2C

c. C2B

d. All of the above

 

15. Which segment do eBay, Amazon belong?

a. B2B

b. B2C

c. C2B

d. C2C

 

16. ________ is the use of information and communication technology to provide, enhance or speed up health care services by accessing linking clinics or physicians' offices to central hospitals.

a. e-commerce

b. e-governance

c. e-medicine

d. All of the above

 

17. ________ is the use of Information and Communications Technologies to transform the traditional government by making it easily accessible, transparent, effective and accountable to the general people

a. e-commerce

b. e-governance

c. e-medicine

d. All of the above

 

18. ________ is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.

a. Cloud Computing

b. Mobile Computing

c. e-medicine

d. None of the above  

 

19. Which of the following is the way in which an IoT device is associated with data?

a. Internet

b. Cloud

c. Automata

d. Network  

 

20. An IoT network is a collection of ________ devices.

a. Signal

b. Machine to Machine

c. Interconnected

d. Network to Network

 

21. Which of the following is not an application of IoT?

a. Arduino

b. Smart Home

c. Smart Car

d. All of the above

 

 

 

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home