Professional Documents
Culture Documents
BANGALORE RURAL .
Chapter1 :TYPICAL CONFIGURATION OF COMPUTER SYSTEM
1. ____________is directly accessed and manipulated by the CPU during program
execution
a. RAM b. Cache
c. Primary memory d. Registers
2. __________is known as CPU’s working memory
a. Cache b. Primary Memory
c. Register d. secondary memory
3.__________is referenced by the CPU without address.
a. RAM b. Primary Memory
c. hard disk c. Registers
4. Which component of computer co-ordinates overall functioning of the computer.
a. ALU b. CU
c. Registers c. North Bridge
5. The primary memory of a computer consists of
a. Only RAM b. Only ROM
c. Both a and b d. Flash drives
6. Which of the following is not a secondary memory
a. Magnetic Tape b. Hard disk
c. Optical Disk d. Cache memory
7. ____________is a large printed circuit board having many chips, ports, controllers and other
electronic components mounted on it
a. Integrated Circuit b. Motherboard
c. Chip set d. Firewire
8. Which among the following are characteristics of motherboard?
a. only form factor b. only Chip set c. Only Processor Socket d. All of these
9. form factor refers to________
a. Geometry b. Electrical requirements
c. Dimensions d. All of these
10. ____________ characteristic of motherboard should be considered to maximize the
computers upgradability
a. Form Factor b. Chip set
c. Processor socket d. All from (a) to (c)
11. Which of the following motherboard is old model mother board
a. AT b. ATX
c. XT d. Baby AT
12. Which of the following motherboard has no ports
a. AT b. ATX
c. XT d. Baby AT
43. ______ is used to connect graphic accelerator cards , sound cards, internal modems or scsi
cards
a. ISA b. PCI
c. AGP d. PCI Express
42 Which among the following bus is the fastest
a. ISA b. PCI
c. AGP d. PCI Express
43. Which one of the following is correct with respect to original Pentium motherboard to
install memory
a. It has two 72-pin SIMM slots or one 168-pin DIMM slots
b. It has only four 72-pin SIMM slots
c. It has only two 168-pin DIMM slots
d. It has four 72-pin SIMM slots or two 168-pin DIMM slots
44. Disk controller is a circuit that enables communication between CPU and
a. Hard Disk
b. Floppy Disk
c. Any External disk drive
d. All of the above
46. ___________ is a plug and play interface
a. Serial port b. parallel port
c. USB d. AGP port
47. Number of devices supported in USB is -------------------
75._______ is the high speed memory placed in between RAM and CPU
a. Secondary memory b. primary memory
c. Cache d. register
76.______ stores the data that is used more often, temporarily and makes it available to CPU
MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR
at fast rate.
a. Secondary memory b. primary memory
c. Cache d. register
77._______ is also known as main memory
a. Secondary memory b. primary memory
c. Cache d. register
78.______ has to be refreshed continuously to store information
a. SRAM b. primary memory
c. DRAM d. register
79._____ RAM is synchronized to system clock
a. DDR-DRAM b. SRAM
c. DRAM d. SDRAM
80.Access speed of SRAM ranges upto _____
a. 2 to 10ns b. 100 to 1000ns
c. 10 to 100ns d. 10 to 50 ns
81.Access speed of DRAM ranges upto _____
a. 2 to 10ns b. 50 to 150ns
c. 100 to 1000ns d. 10 to 50 ns
82.________ is essential for computer to prevent them from failures, breakdowns or
shutdown
a. Power supply b. software
c. hardware d. user
83._______ converts Ac power to Dc power needed by system
a. UPS b. SRAM
c. DRAM d. SMPS
84._______ converts 230v of AC to 5 to 12 v of DC
a. UPS b. SRAM
c. DRAM d. SMPS
85._____ is a power supply that includes a battery to maintain power in the event of power
failure.
a. UPS b. SRAM
c. DRAM d. SMPS
86.______ avoids momentary power lapses by continuously providing power from its own
inverter, evn when the power line is functioning properly.
a. Off line UPS b. stand by UPS
c. Online UPS d. SMPS
87. ______ monitors the power line and switches to battery power as soon as it detects a
problem.
a. Power supply b. stand by UPS
c. Online UPS d. SMPS
88.______ is a process of setting up your hardware devices and assigning resources to them
so that they work together without problems
a. Computer configuration b. software
c. hardware d. power supply
********************
MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR
Hoysala Pre university college,
Bangalore Rural Dist.,
Chapter 2 - Boolean Algebra
4. A(A + B) =?
a) AB b) 1 c) (1 + AB) d) A
5. (A + B)(A’ * B’) =?
a) 1 b) 0 c) AB d) AB’
6. Complement of the expression A’B + CD’ is _________
a) (A’ + B)(C’ + D) b) (A + B’)(C’ + D) c) (A’ + B)(C’ + D) d) (A + B’)(C + D’)
7. Simplify Y = AB’ + (A’ + B)C.
a) AB’ + C b) AB + AC c) A’B + AC’ d) AB + A
8. The boolean function A + BC is a reduced form of ____________
a) AB + BC b) (A + B)(A + C) c) A’B + AB’C d) (A + C)B
9. The logical sum of two or more logical product terms is called __________
a) SOP b) POS c) OR operation d) NAND operation
10. The expression Y=AB+BC+AC shows the _____________ operation.
a) EX-OR b) SOP c) POS d) NOR
11. The expression Y=(A+B)(B+C)(C+A) shows the _____________ operation.
a) AND b) POS c) SOP d) NAND
12. The canonical sum of product form of the function y(A,B) = A + B is __________
a) AB + BB + A’A b) AB + AB’ + A’B c) BA + BA’ + A’B’ d) AB’ + A’B + A’B’
13. A variable on its own or in its complemented form is known as a __________
a) Product Term b) Literal c) Sum Term d) Word
14. Canonical form is a unique way of representing ____________
a) SOP b) Minterm c) Boolean Expressions d) POS
Pushpavathi b m : Hoysala pu college, Bangalore Rural Dist.,
15. Boolean algebra is also called
a. A + AB = A b. A + AB = B c. AB + AA' = A d. A + B = B + A
a. commutative law
b. inverse property
c. associative law
d. identityelement
a. 0 b. 2 c. 8 d. 1
21. ___________ expressions are can be implemented using either(1) 2-level AND-
OR LOGICCIRCUITS (2)2-LEVEL NAND logic circuits.
A+B+C+D
27. A truth table for the SOP expression has how many input
combinations?
a) 1 b) 2 c) 4 d) 8
28. How many gates would be required to implement the following Boolean
expression beforesimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5
29. How many gates would be required to implement the following Boolean
expressionaftersimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5
30. Determine the values of A, B, C, and D that make the product term equal to 1
a) A = 0, B = 1, C = 0, D = 1
b) A = 0, B = 0, C = 0, D = 1
c) A = 1, B = 1, C = 1, D = 1
d) A = 0, B = 0, C = 1, D = 0
31. What is the primary motivation for using Boolean algebra to simplify logic
expressions?
a) It may make it easier to understand the overall function of the circuit.
b) It may reduce thenumber of gates.
c) It may reduce the number of inputs required.
d) all of the above
37. the product of sum is basically the oring of anded terms __________
A. TRUE B. FALSE C. May be both d. No answer given
55 . One of De Morgan's theorems states that. Simply stated, this means that logically
there is nodifference between:
a) a NOR and an AND gate with inverted inputs
b) a NAND and an OR gate with invertedinputs.
c) an AND and a NOR gate with inverted inputs.
d) a NOR and a NAND gate with inverted inputs.
*********************
MCQs Chapter 3 - LOGIC GATES
3. A__________ gate gives the output as 1 only if all the inputs signals are 1.
6. which of the following gate will give a 0 when both of it’s inputs are 1.
7. The universal gate that can be used to implement any Boolean expression is________________ gate .
a. + b. * c. -- d. %
a. high input and high output b. high input and low output
c. low input and low output d. low input and high output
A. AND B. OR C. IF D. NOT
******************
Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 1
a)deleting element in array b)inserting element in an array c) traversing
d)binary searching
18. Which is not the sorting method?
a)heap sort b)quick sort c)shell sort d)linear sort
19. The memory address of element A[i][j] in row major order is
a)loc(A[i][j])=base(A)+W((i-LB)+n(j-LB)) b) loc(A[i][j])=base(A)+W(n(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+n(j-LB)) d) loc(A[i][j])=base(A)+W((I-
LB)+n(j-LB))
20. The memory address of elements A[i][j] in column major element is
a)loc(A[i][j])=base(A)+W((I-LB)+m(j-LB)) b) loc(A[i][j])=base(A)+W(m(j-LB)+(i-
LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+m(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+m(j-
LB))
21. The base address of an array is address of the____
a)A[1] b)A[n-1] c)A[0] d)both a and b
22. Which data structure is used to implement queues, trees, graphs
a)stack b)list c)array d)None
23. In which data structure addition and deletion of element takes place from same
poition
a)stack b)list c)array d)queue
24. In stack the end is commonly referred as
a)Top b)bottom c)rear d)front
25. In stack the end opposite is known as
a)Top b)base c)rear d)front
26. In stack which element is removed first
a) element inserted at first b)most recently added element c)middle element
d)second element
27. In which position of the stack element will be in longest time?
a)A[0] b)base c)top d)both a and b
28. Stack perform the operation
a)last in first out b)last in last out c)last in fast out d)first in first out
29. In which operation stack is not modified
a))push(item) b)pop() c)peek() d)none
30. What is the function of Peek() operation
a)removes top item from stack b) test stack is empty or not
c)returns the number of items in stack d)returns top item from stack but does not
remove
31.Push operation in stack is____
a) First increases top position and insert element
b)first insert element and then increases top position
c) first decreases top position and insert element
d) first insert element and decrease the top position
Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 2
32. Which of the following is not an application of stack
a) rearranging railroad cars b) runtime memory management
c) multiprogramming platform d) conversion of infix expression into postfix and
prefix expression
33. Example for infix expression___
a)+ab b)a+b c)ab+ d)none
34. The condition top=-1in stack indicates
a) stack is full b)stack has one element c)stack overflow d)stack is empty
35. The condition top=n-1 in stack indicates
a) stack is full b)stack has one element c)stack underflow d)stack is empty
36. In which data structure addition of new element and removal of element takes place
at different end
a) non linear b)linear c) stack d)queue
37. In Queue items are inserted at______ end
a) Top b)front c)rear d)bottom
38. In queue items are removed at _______ end
a) Top b)front c)rear d)bottom
39. In queue we remove the element which is
a)least recently added b)most recently added c)both a and b d)none
40. Queue is also called as
a) last in first out b) first in last out c)first in first out d)first in first in
41. In queue which operation is generally called as push
a) enqueue b) dequeue c)push d)pop
42. Which condition indicates queue is empty
a)front=null b)rear=N c) front=rare d)both a and b
43. Which condition indicates only one element in queue
a)front=null b)rear=N c) front=rare d)rear=N-1
44. Various application software is based on _____ data structure
a) linked list b)graph c) stack d)queue
45. In which of the following application queue data structure is used
a)simulation b) type scheduling algorithm c) print server routine d)all of
these
46. In which data structure element can be inserted and removed in any position
a)simple queue b)circular queue c)priority queue d)double ended queue
47. In which queue addition and deletion takes place at both the ends
a)simple queue b)circular queue c)priority queue d)double ended queue
48. The dis advantage of array is
a)static structure b)dynamic structure c) variable d)both a and b
49. In which operation array elements are shifted into higher order positions
a)deletion b)insertion c)searching d)sorting
50. In which operation array elements are shifted into lower order positions
a)deletion b)insertion c)searching d)sorting
Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 3
51. In linked list the position start gives the location of ______ node
a)first b)last c)middle d)second
52. In linked list the pointer start position is also called as
a)NULL b)head c)Tail d)none
53. The link field of last node contains
a)NULL b)head c)Tail d)none
54. In linked list link field of every node contains
a) data of the node b)data of next node c)address of last node d)address of next
node
55. In doubly linked list which node points to the address of previous node?
a) info b)frow c)back d)head
56. Which operation is not possible in linked list
a)sorting b)searching c)merging d)inserting
57. Pointer=new type[number_of_elements] is syntax for
a)pointer declaration b)allocate memory for single element
c)allocate memory for block element d)structure.
58. In which data structure each node is connected to several other nodes
a) non linear b)linear c) stack d)queue
59. Which data structure represents hierarchical relationship
a) non linear b)linear c) stack d)queue
60. Each node in a tree has ___ child node
a)zero b)more c) both a and b d)no
61. Root node in a tree is at ____ position
a)top b)bottom c)middle d)right
62. From _____ node all the operations commence in tree
a)leaf b)child c)root d)internal
63. The edges in a graph having directions is called
a) undirected graph b)arcs c)digraph d)all the above
64. prefix expression of (A+B)*(C+D) is
a)*+AB+CD b)+AB*+CD c)AB+Cd+* d)+*AB+CD
65. Prefix expression of 2*3/(2-1)+5*3 is
a)*23-21/-53*1 b)23*21+/53*+ b)21*23-/35*+ d)-/53*+23*21
66. ele=stack[top] is for
a)push b)pop c)enqueue d)dequeue
67. Prefix expression ofA+(B*C-(D/E^F)) is
a)ABC^/DEF* b)ABC*DEF^/ c)^/ABC*DEF d)*ABC/DEF^
68. During conversion of infix to postfix pop is done when ____ appears
a)( b)) c)~ d)::
69. Each operator in postfix string refers to its ______ operand in a string
a)previous 3 b)next 3 c)next 2 d)previous 2
70. 10, 20, 25, 35, 30 40 for the list which searching technique can be applied
a)binary search b)linear search c)both a and b d)none
Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 4
71. Which operation access each data element exactly once
a)traversal b)insertion c)searching d)sorting
72. Stack can be represented using
a)array b) linked list c)both a and b d)none
73. In binary search when the element is searched either right half or the left half of an
array
a) element is found b)search element comparison matches
c)comparison does not match d) low position is less than high position
74. In searching if (loc>=0) is _____
a)unsuccessful search b) binary search c) linear search
d)successful search
75. Array with one row or one column is a
a)1D array b)2d array c)multi dimensional array d)both a and b
76. Which operation is used to change data in data structure
a)create b)destroy c)select d)update
77. The study of data structure mainly deals with
a)implementation of structure on computers b)mathematical description of
structure
c) to determine amount of space in memory d)all of these
78.________ is a set of vertices and edges
a)tree b)graph c)queue d)stack
79. Which node is farthest node from root node
a) child node b)top node c)leaf node d) middle node
80. ______ list in linked list contains unused nodes
a)Avail b)head c)null d)start
81.Dynamic memory is allocated using _____ operator
a)create b)null c)new d)pointer
82. In which linked list it is not possible to access preceding nodes
a)singly b)doubly c)circular d)all of these
83. A text can be reversed using ____
a)tree b)graph c)queue d)stack
84. While ((j>=1) and (A[j]<A[j-1])) is the logic for
a) inserting element b)sorting element b)deleting element d)searching element
85. for i=0 to N-1
If(A[i]==ele) is logic for
a) inserting element b)sorting element b)deleting element d)searching element
86. The method of collecting deleted nodes into free storage is called
a) heap memory b) free memory c)garbage collection d)dynamic
collection
87. In queue insertion and deletion performed according to___
a) FIFO b)FILOc)LIFO d)all of these
88. Which of the following data structure does not have different types
Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 5
a) array b)linked list c) stack d)queue
89. If we try to delete node from the linked list which is empty is called
a)overflow b)underflow c)inserting d)deleting
90. ______ linked list is called as two way list
a)singly b)doubly c)circular d)none
91. As user navigate from web page to web page then the pages are placed on_____
a) array b)linked list c) stack d)queue
92. The operators in between two operands are called as ______ expression
a)infix b)postfix c)prefix d)arthematic
93. If an operator precedes two operands it is called as _______ expression
a)infix b)postfix c)prefix d)arthematic
94. If an operator follows the two operands it is called as _____ expression
a)infix b)postfix c)prefix d)arthematic
95. for i=lb to ub
Process (A[i]) is logic for ____
a) inserting element b)sorting element b)deleting element d)traversing
96. Which data structure directly operates on machine level instructions
a)int b)array c)string d)trees
97. Which is not the operation on linear data structure
a) inserting b)sorting b)updating d)traversing
98. What is the statement to copy the top element into variable
a)s[top]=ele b)ele=s[top] c)s[++top]=ele d)both a and b
99. What is the statement to copy the variable element into rear position in queue
a)q[rear]=ele b)q[front]=ele c)ele=q[rear] d)ele=q[front]
100. _______ tree is a tree which at most two decedents
a) binary tree b)sub tree c)b+ tree d)full
********************
Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 6
SRI DEVARAJ URS PRE UNIVERSITY COLLEGE
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
24. Which operator is member selection operator___
(a) . (dot) (b) & (address) (c) || operator (d) ! (not operator)
25. The ____ member can be accessed outside the class using dot(.) operator
(a) Public (b) protected (c) private (d) friend
26. The class members can be accessed using ____ operator
(a) :: (scope) (b) . (dot) (c) & (address) (d) * (pointer)
27. Inside member function means _____
(a) Both Declaration and Definition appear inside the class
(b) Only Declaration appears inside the class
(c) Only definition appears inside the class
(d) Both b and c
28. Syntax for memberfunction inside the class is _____
(a) return_type_specifier functionname(argument_list)
{
Statements;
…………
}
(b) void classname::input()
{
Statements;
…..}
(c) return_type_specifier classname::functionname()
(d) void input()
29. An example for member function inside class is ___
(a) Returntype functionname()
(b) void input()
{cout<<”Enter regno and name”<endl;
Cin>>regno>>name;
}
(c) both a and b
(d) only a is correct
30. syntax for member function outside class definition is ___
(a) return_type_specifier classname::functionname(arg_list)
{statements
………….}
(b) void student::input()
(c) void input()
(d) returntype functionname(arglist)
31. Example for outside class definition is ___
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
(a) void student::input()
{
Cout<<”Enter regno and name”<<endl;
Cin>>regno>>name;
}
(b) void input()
(c) Void display(arglist)
(d) All the above
32. Using which methods and object can be passed to function
(a) Using only pass by function
(b) Using pass by data members
(c) Pass by data and member function
(d) Using Pass by value and pass by reference
33. Member function can be defined in how many methods
(a) 2 (b) 1 (d) 3 (d) a and b
34. Member function can be defined using ___ and ___ methods
(a) Only outside the class
(b) Only inside the class
(c) Both inside and outside the class
(d) All the above
35. The class members can be_______
(a) Only private
(b) Only protected
(c) Only public
(d) Private , protected or public
36. Syntax for creating object is _____
(a) Classname objectname1,objectname2,…;
(b) Student obj1,obj2;
(c) Class classname objectname1, objectname2;
(d) Both a and c
37. The array of object is _____
(a) An array having classtype elements
(b) Array as a member of the class
(c) Array stores many values of same type
(d) All the above
38. The ____ is an example for creating the objects
(a) Student obj1,obj2;
(b) Class student obj1,obj2;
(c) Both a and b
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
(d) Only a
39. How many methods are there to pass objects as argument to member function
(a) 2 (b) 3 (c) 1 (d) 4
40. A class is ____of an object
(a) Blue print or prototype
(b) Defined using classname
(c) A group of students
(d) Classname defines the class
41. A class is collection of objects having _____
(a) Similar characteristics and behavior
(b) Only character
(c)Only behaviour
(d) All the above
42. Is it possible to access the data outside the class?
(a) Yes , if it is under public
(b) No , if it is under private
(c) Both a and b
(d) Not possible
43. Set of interface operations that are performed on objects are called ___
(a) Member variable (b) class function
(b) Member function (d) class variable
44. The protected members of the class can be accessed by____
(a) Member function of class but only inside the class
(b) Member function of the derived class
(c) Friend functions of the class
(d) All the above
45. What is the use of scope resolution operator?
(a) Link between class and member function
(b) To write member function definition outside the class
(c) Both a and b
(d) Only a
46. An Example for array of object is ___
(a) Student obj[10];
(b) Class student stu_obj[50];
(c) Employee emp[15];
(d) All the above
47. Example to pass object as function argument can be____
(a) void total(Exam puc, Exam cet)
{
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
P=puc.p+cet.p;
C=puc.c+cet.c;
M=puc.m+cet.m;
}
(b) Returntype functionname(classname obj, classnae obj)
(c) Both and b
(d) All the above
48. The other names for member functions are ____
(a) Methods and Interfaces
(b) Only methods
(c) Only set of interface operations
(d) All the above
49. The member functions may be defined _____ or ____ of class
(a) Inside or outside
(b) Only outside
(c) Only inside
(d) All the above
50. ____ members can be accessed inside or outside of class definition
(a) Public (b) private (c) protected (d) all the above
****************
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
SRI DEVARAJ URS PRE UNIVERSITY COLLEGE
DODDABALLAPUR, BANGALORE RURAL.
Chapter 8: Function Overloading
1. Function cannot be overloaded when____-
(a) Function names are same
(b) Number of parameters are different
(c) Number of parameters are same
(d) Data types of parameters are different
2. Function can be overloaded when_______
(a) Function names are same (c) The data types of parameters are
(b) Number of parameters are different
different (d) All the above
3. Friend function is a __________
(a) Non member function of class (c) Both a and b
(b) Can access both private and (d) None of the above
protected members
4. C++ Implements polymorphism through _______
(a) Inline function
(b) Friend function
(c) Function overloading and operator overloading
(d) Both a and b
5. Need for function overloading is ____
(a) Code maintenance is easy
(b) Easy to understand the flow of information and debug
(c) Easier interface between program and real world objects
(d) All the above
6. The Restrictions on overloaded functions are______
(a) Each function in a set of overloaded function must have different argument list
(b) If typedef is used for naming functions then the function is not considered as different
type
(c) Both a and b
(d) None of the above
7. The other functions used in class are _____
(a) Overloaded functions (c) Friend function
(b) Inline functions (d) All the above
8. The inline function means ____
(a) Very long function (c) Short function
(b) Can contain too complicated code (d) Both a and b
9. The inline function can be ____
(a) Very short function
Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
15. It is no possible to initialize different objects with different initial values using_____
a) copy constructors b) parameterized constructors
c) default constructors d)destructors
16. A constructors that takes one or more arguments are called _________ constructors
a) copy b)default c)parameterized d)zero argument
17. Using _________ constructors it is possible to initialize different object with different
values
a)copy b) parameterized c) default d)zero argument
18. _________ constructors are invoked automatically when objects with arguments are
created.
a) copy b)default c)zero parameterized
d)parameterized
19. ____________constructors can be over loaded
a) parameterized b) default c)zero argument d)zero parameterized
20. ____________ constructors can have default arguments and default values.
a) default b) zero argument c)parameterized d) zero parameterized
21. Constructors can be invoked through
a) explicit call b) implicit call c)initialization at the time of declaration with
=operator d) all of the above
22. ____________declaration of an object is followed by assignment operator, constructor
name and argument list enclosed in parenthesis
a) explicit call b) implicit call c)initialization at the time of declaration with
=operator d) none of the above
23. In ___________ declaration of an object is followed by argument list enclosed in
parenthesis.
a) explicit call
b) implicit call
c)initialization at the time of declaration with =operator
d) none of the above
24. __________ method is used for constructor with exactly one argument.
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d)
destructors
25. In __________ declaration is followed by assignment operator and value to be
initialized
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) none of the above
26. Using __________ constructors one object can be copied to another object.
a) copy b)default c)zero parameterized d)parameterized
27._______constructors are used to initialize an object with values of already existing
objects
Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
a) copy b)default c)zero parameterized d)parameterized
Chapter 10 : INHERITANCE
1. ___________ provides the concept of Reusability
a) procedural programming b)inheritance c)class d)functions
2. _______ allows the user to create a new class from an already existing class
a) inheritance b)classc)polymorphism d)binding
3. ________ is the capability of one class to inherit properties from another class.
a)polymorphism b)binding c)overloading d)inheritance
4. __________ is a class whose properties are inherited by another class
a)sub class b)base class c) derived class d)virtual class
5. __________ is a class that inherits properties from base class
a)sub class b)base class c)super class d)virtual class
6. Base class is also called as_______
a)sub class b)derived class c)virtual class d)super class
7. Derived class is also called as________
a)super class b)abstract class c)base class d)sub class
8. Which of the following is the advantage of inheritance.
a)reusing existing code b) faster development time c)memory utilization
d)all of these
Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
9. If no visibility mode is specified then by default the visibility mode is considered as
_______
a) private b)protected c)public d)explicit
10. All the members of the class except ________ members are inherited.
a) private b)protected c)public d)explicit
11. _______ operator shows the derivation from the base class in inheritance.
a):: b)& c): d) *
12._________ specifies the features of base class are privately derived or publicly derived
or protectedly derived
a) visibility mode b) derivation c)inheritance d)polymorphism
13.____________ controls the access specifiers to be for inheritable member of base class in
the derived class
a) overloading b) visibility mode c)inheritance d)polymorphism
14. In private inheritance the public members of base class becomes _______ members of
derived class
a) private b)protected c)public d)not inherited
15. In private inheritance the protected members of base class becomes _______ members
of derived class
a) protected b)private c)public d)not inherited
16. In protected inheritance the public members of base class becomes _______ members
of derived class.
a) private b)protected c)public d)not inherited
17. In protected inheritance the protected members of base class becomes _______
members of derived class.
a) protected b)private c)public d)not inherited
18. In public inheritance the public members of base class becomes _______ members of
derived class.
a) protected b)private c)public d)not inherited
19. In public inheritance the protected members of base class becomes _______ members
of derived class.
a) protected b)private c)public d)not inherited
20. In public inheritance the private members of base class becomes _______ members of
derived class.
a) protected b)private c)public d)not inherited
21. If a class is derived from single base class it is _________ inheritance
a)single level b)multilevel c)multiple d)hybrid
22. If a class is derived from an already derived class then it is ________ inheritance
a)single level b)multilevel c)multiple d)hybrid
23 If class is derived from more than one base class then it is __________ inheritance
a)single level b)multilevel c)multiple d)hybrid
24.If more than one class is derived from a single base class is called ______ inheritance
a)single level b)multilevel c)multiple d)hierarchical
Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
25. ____ inheritance is a combination of hierarchical and multilevel inheritance
a)single level b)multilevel c)multiple d)hybrid
26. We can prevent multiple copies of base class being present in an object from those
objects by declaring the base class as____
a)virtual b) abstract c) derived d)private
27. _________ class is one that is not used to create an object.
a)virtual b) abstract c) derived d)sub
28. When it is mandatory to have constructors in derived class.
a) no base class constructors takes any arguments
b) base class having constructors with one are more arguments
c) if the is default constructors in bas class d) if there is no constructors in base
class
29. ________ takes the responsibility of supplying initial values to its base class
a) super class b) virtual class c)derived class d)abstract class
*************
Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
SRI DEVARAJ URS PRE UNIVERSITY COLLEGE
Kodigehalli, Dbpur, Bangalore Rural Dist.,
2. Allocating sufficient memory for data and instructions during compilation is called
a) dynamic memory b) static memory
c) heap memory d) stack memory
5. ________ operator returns the value located at the memory address specified by its
operand.
a) * b) & c) d) new
8. _____ operator is used to allocate memory for objects during run time
a) new b) & c) delete d) *
9. Which of the following is not possible in the pointers?
a) adding an integer value to pointers
b) subtracting an integer value from pointer
c) addition of two pointers
d) incrementing and decrementing of pointer
Prepared by:Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.,
10. Which operator returns the value located at the address specified by its operand
a) pointer operand b) delete operand
c) new operand c) address operand
11. A pointer is a variable which stores ________ of another variable.
a) name b) value
c) address d) all of the above
12. Which of the following is not an advantage of pointer?
a) accessing array elements is faster
b) support dynamically allocated memory
c) it reduces program complexity
d) it decreases program execution speed
13. pointer initialization is the process of assigning address of a variable to a pointer
variable
a) true b) false c) may be d) cant say
14. Which of the following is dereferencing operator?
a) & b) # c) * d)
15. Which of the following operator also known as value at address operator?
a) * b) c) & d) ::
16. & and * are two pointer operators which are _________
a) binary b) ternary
c) unary d) logical
17. The size of pointer variable is same for all type of pointers but the memory that will be
accessed while dereferencing is different.
a) true b) false c) may be d) all of the above
18. Pointer arithmetic is somewhat different from ordinary arithmetic
a) true b) false c) may be d) all of the above
19. Which of the following type of address stored in pointer variable?
a) character b) float c) integer d) none of these
20. ________ operator can be applied to pointer variable.
a) division b) multiplication c) logical d) casting
21. Which of the following is initialization of pointers (or) assignment of pointers
a) datatatype *pointer_variable;
b) datatype &pointer_variable;
c) pointer_variable=&variable_name;
d) pointer_variable=*variable_name;
22. A string is a ________ array
a) float b) integer c) character d) none of these
Prepared by:Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.,
KSVK PU COLLEGE
BANGALORE RURAL DIST.,
9. A logical schema
a) is the entire b) is a standard way c) describes how d) Both (a) and
database of organizing data is actually (b)
17. Which of the following operation is used if we are interested in one certain
columns of a table?
a) Projection b) Selection c) Union d) Join
23. A data manipulation commands the combines the records from one or more
tables is called
a) SELECT b) PROJECT c) JOIN d) PRODUCT
27. Which of the following database object does not physically exist?
a) base table b) index c) view d) none of the
above
33. Which normal form is considered adequate for relational database design?
a) 2NF b) 3NF c) 4NF d) BCNF
49. Candidate keys which are not currently selected as primary key is called _________
a) Super key b) Composite key c) Alternate key d) foreign key
************
*****************************************
LAVANYA COMPOSITE PU COLLEGE (BB0127)
SRI RAMANANDA ASHRAAM, DODDABALLAPURA – 561203
BANGALORE RURAL DIST.,
30) It is a computer program deliberately created to damage data and hamper the
performance of the computer
a. System software
b. Application software
c. Utility software
d. Virus
2. software whose source code is available to customers and it can be modified and
redistributed is called
4. ________ means the software which is freely accessible and can be freely used, changed,
improved, copied and redistributed. (OR)
5. __________ is responsible for producing the software standards for world wide web
(WWW).
9. ________ is a set of protocols that allows to access any document on the net through URLs.
11. __________ navigates through the world wide web and displays web pages.
15. ____________ is the trade of goods and services with the help of telecommunications and
internet.
a) E-mail
c) Both a and b
a) Free libre and open source software and both free software and open source software
b)Freelirve and open source software and both free software and open source software
c) Both a and b
d) only a is correct
b) timmberners lee
c) Richard Stallman
a) Richard Stallman
25). The HTTP (hyper text transfer protocol )is used to request and send a document over
the _____
a) Internet
b) Telnet
c)Browsers
d) servers
b)Email
c) Digital cash
a) email
b)Bulletin Boards
a) Gobal participation
c) optimization of resources
29)IPR related issues in India like patents trademarks, copyright, designs and geographical
indications are governed by the __________-
c) Indian copyright Act 1957, design act 2000 and rules 2001
30) The domain Id’s .co and .mil are affiliation for ____and ____ respectively
*****
********************************
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which among the following is the fastest memory in a computer that holds information?
a) Register b) Cache
c) Main memory d) RAM
2. The other name of Boolean algebra is _____________
a) Switching algebra b) Relational Algebra
c) Digital Algebra d) None of the above
3. The other name of NOT gate is ___________
a) Neglect gate b) Inverter gate
c) XOR gate d) XNOR gate
4. The data structure that allows the insertion, as well as the deletion from both the ends, are:
a) String b) Linked List data structure
c) Stack data structure d) Dequeue data structure
5. What is the other name used for functions inside a class?
a) Member variables b) Member functions
c) Class functions d) Class variables
6. Function cannot be overloaded when ________________
a) Function names are same b) Number of parameters are different
c) Number of parameters are same d) Data types of parameters are different
7. The symbol used with constructor is ________
a) $ b) &
c) Delta c) ~
8. Base class is ___________
a) a sub class b) inherited class
c) Main class d) First class
9. Which of the following is the correct way to declare a pointer?
a) int *ptr b) int ptr
c) int &ptr d) All of the above
10. ____________ is called information.
a) Raw fact b) collection of data
c) Unprocessed data d) Processed data
11. SQL is _______________________.
a) Theoretical Language b) Procedural Language
c) Structured Language d) Unstructured Language
-2-
12. FTP stands for _______________
a) Final Transistor Protocol b) File Transformation Protocol
c) File Transfer Protocol d) File Transaction Protocol
13. Which of the following is not a type of network?
a) LAN b) MAN
c) PAN d) VAN
14. A software and coding which is freely available on internet is ______________.
a) Community Software b) Free Software
c) Open-Source Software d) Unlicensed Software
15. HTML stands for ____________________________________
a) Hyper Text Makeup Language b) Hyper Text Markup Language
c) Hyper Text Marking Language d) Hyper Text Marker Language
II Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)
16. Collection of rows and columns is called as ___________
17. ___________ is a collection of interrelated data.
18. Data duplication is called as ____________________.
19. _____________is a software for creating and managing databases.
20. Protection of data is the _________________.
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove ̿X = X.
22. Define tautology and fallacy.
23. What is encapsulation? Give an example.
24. What is destructor? Give example for destructor.
25. Mention any two functions of ifstream and give their meaning.
26. Give any two advantages of database system.
27. Give the syntax and example for INSERT command in SQL.
28. Briefly explain circuit switching.
-3-
PART – C
*****
Annual Examination-2023
Model Question Paper-II
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. CPU’s working memory is __________
a) Cache memory b) Register
c) Primary memory d) Secondary memory
2. Minterm of ̅X ̅Y = ________
a) m3 b) m2
c) m1 d) m0
3. The standard symbol represnts_____________
a) OR gate b)AND gate
c) NAND gate d) NOR gate
4. ________________ is an example for non-primitive data structure
a) Integer b) Float
c) Stack d) Pointer
5. Which access specifier is implicitly used in class?
a) Private b) Public
c) Protected d) Friend
6. _________ is although not a member function has full access right to the private and
protected members of the class.
a) Overloaded function b) Inline function
c) Friend function d) Recursive function
7. In constructor, declaration of an object is followed by assignment operator, constructor
name and argument list enclosed in parenthesis is___________
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. The class that inherits properties from another class is_____________
a) Base class b) Derived class
c) Virtual class d) Abstract class
9. Which of the following is the address operator?
a) :: b) .
c) * d) &
10. Set of values for an attribute in that table is ______________
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DDL command:
a) Create b) Alter
Prepared by: Ramachandra
c) Drop d) Delete
12. A hardware device used to connect several computers together is__________
a) Router b) Bridge
c) Switch d) Hub
13. CDMA stands for _______________
a) Code Data Multiple Access
b) Code Division Multiple Access
c) Common Division Multiple Access
d) Common Data Multiple Access
14. The Software that is neither open nor freely available is called is ________
a) Free software b) Freeware
c) Proprietary software d) Open source software
15. _________ is a text-based markup language.
a) HTML b) XML
c) DHTML d) PHP
II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered)
(ISAM, Database, Data mining, Key, Schema)
16. __________ is a collection of logically related data organized in a way that data can
be easily accessed, managed & updated.
17. ________is a set of one or more columns whose combined values are unique among
all occurrences in a given table.
18. __________is the hybrid between sequential and direct access file organization.
19. Database objects that contain data govern or perform operation on data is __________
20. A technique which is concerned with the analysis & picking out relevant information
is called ___________
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X
22.State De Morgan’s theorems.
23. Write a note on polymorphism. Give an example.
24. Write any two features of parameterized constructors.
25. Differentiate between seekg( ) and seekp( ).
26. What is a candidate key & alternate key (secondary key)?
27. Write the syntax & example for alter command.
28. List the different applications of networking.
30. Write the logic diagram and the truth table for XOR gate.
31. What are the advantages of arrays?
32. What is a pointer? Give the declaration and initialization of a pointer.
33. Mention different operations basic operation on binary file in C++.
34. Explain any three data types supported by DBMS.
35. Explain the technologies & services used in e-commerce.
36. What is web scripting? Mention the types.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
Boolean function F(A, B, C, D)= Σ(0,3,4,6,8,9,10,11,12,14).
***********
Annual Examination-2023
Model Question Paper-III
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The CPU is fabricated as a single Integrated Circuit (IC) chip and isis __________
a) Motherboard b) Microprocessor
c) Register d) Circuit board
̅ ̅
2. Maxterm of X + Y +Z
= ________
a) M3 b) M2
c) M1 d) M0
3. Standard symbol for XOR gate is _____________
a) + b) +
c) . d) x
4. ________________ is an ordered collection of items where the addition of new
items and the removal of an existing item always takes place at the same end.
a) Queue b) Linked list
c) Stack d) Tree
5. ________________ operator is used to define the member function outside the class.
a) . b) ::
c) * d) &
6. Function Overloading is also known as_________________
a) Compile time polymorphism b) Run time polymorphism.
c) Compile time encapsulation d) Run time encapsulation
7. In constructor, the declaration of the object is followed by argument list enclosed in
parentheses.
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. ________class prevent multiple copies of the base class being present in an
object derived from those objects.
a) Base class b) Derived class
c) Virtual base class d) Abstract class
9. ________is the collection of addresses.
a) Array of objects b) Array of address
c) Array of variables d) Array of pointers
10. A single entry in a table is ______________
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DML command:
Prepared by: Ramachandra
a) Create b) Insert
c) Update d) Delete
12. __________ is an example for half duplex communication mode.
a) Radio b) Television
c) Walkie-Talkie d) Modern telephone system
13. _______________ is consists of a central node to which all other nodes are connected
by a single path.
a) Bus topology b) Star topology.
c) Ring topology d) Tree topology
14. URL stands for______________
a) Unique Resource Location b) Uniform Resource Location
c) Unique Resource Locator d) Uniform Resource Locator
15. _________ refers to web content that changes each time it is viewed
a) HTML b) XML
c) DHTML d) PHP
II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered
(Physical data independence, Hierarchical data model, DBMS,
One-tier architecture, ER Diagram)
16. __________ allows creation, definition & manipulation of database.
17. ________is a visual representation of data that describes how data is related to
each other.
18. __________is an ability of a database to modify a schema definition at internal level
without affecting a schema in the next level.
19. ___________ organizes the data in a tree like structure in which each child node can
have only one parent node.
20. In_______________, DBMS is the only entity where user directly sits on DBMS &
uses it.
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that 1 + X = 1 using proof by perfect induction method.
22. Write any two basic postulates of Boolean algebra.
23. Write the disadvantages of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Differentiate between tellg( ) and tellp( ).
26. What is the difference between serial & direct access file organization?
27. Write the syntax & example for drop command.
28. List the goals for networking.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= Σ(0, 4, 8, 9, 10, 11, 12, 13,
15) Reduce the function F using K-map.
38. Define: a. Root Node b. Leaf Node c. Height d. Depth e. Internal node.
39. Write an algorithm to insert a data element at the rear end of the queue.
40. Write a difference between procedural oriented programming & object-oriented
programming (OOP).
41. Explain the class definition and declaration with syntax and example.
42. Define an inline function. Write the advantages & disadvantages of inline functions.
43. What is copy constructor? Explain with programming example.
44. What is single level inheritance? Explain with programming example.
45. Give the difference between manual & electronic file systems.
46. Explain the data types used in SQL.
47. Explain any five networking devices.
***********
II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered)
(Specialization, Metadata, Data integrity, Attribute, Relational data model)
16. Each column is identified by a distinct header is called________________
17. ________ refers to the validity of data & it can be compromised in a number of ways
18. In _______________, there are no physical links.
19. __________ is a top down approach in which one higher level entity can be broken
down into two lower level entities.
20. ___________ is used to inform operators and uses of the data warehouses about
its status.
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X
22. What is minterm and maxterm?
23. Write any two applications of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Mention the methods of opening file within C++ .
26. Mention the types of data independence.
27. Give the difference between char and varchar datatypes in SQL.
28. Name the different types of twisted pair cable.
PART – C
Prepared by: Ramachandra
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain the characteristics of motherboard.
30. Write the logic diagram and the truth table for OR gate.
31. What are the applications of an arrays?
32. What is array of pointers? Give an example.
33. Differentiate between ifstream class and ofstream class.
34. Give the different notations for E-R diagram
35. Write any three criteria of open source software.
36. Give the features of DHTML?
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= m0 + m1 + m2 + m3 + m4 + m5 + m8 + m9
+ m10 + m11 + m13 + m15. Reduce the function F using K-map.
38. What is primitive data structure? Explain the different operations performed on
primitive data structure.
39. Write an algorithm to search an element in an array using linear search method.
40. Explain the different characteristics of OOP.
41. Explain how do we define member function inside the class definition. Give
example.
42. Explain friend functions with example.
43. What is copy constructor? Explain with programming example.
44. What is visibility mode? What is its role with respect to inheritance?
45. Explain ISAM with example.
46. What is data definition language? Explain create and select commands in SQL.
47. Explain the applications of networking?
***********
c) X d) X
II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered)
(Domain, Normalization, Aggregration, Data warehouse, Data processing)
16. __________ is series of actions or operations from input data to generate outputs.
17.Set of values for an attribute in that table is called as___________
18. A process when relation between two entities is treated as a single entity is
called___________
19. The process of organizing the data in a database is called__________
20. A repository of an organization’s electronically stored data is called ___________
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that XY+̅XY=X.
22.State the principles of duality theorems.
23.Explain data encapsulation.
24.What is a destructor? Give its syntax.
25.Write the member functions belonging to ifstream class.
26.Define primary key & foreign key.
27.Write the syntax & example for delete command.
28.Explain simplex communication mode.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
Boolean function F(A, B, C, D)=Σ(0,1,2,3,4,5,6,7,8,9,10,11).
***********