You are on page 1of 78

SRI VANI PRE-UNIVERSITY COLLEGE , DODDABALLAPUR

BANGALORE RURAL .
Chapter1 :TYPICAL CONFIGURATION OF COMPUTER SYSTEM
1. ____________is directly accessed and manipulated by the CPU during program
execution
a. RAM b. Cache
c. Primary memory d. Registers
2. __________is known as CPU’s working memory
a. Cache b. Primary Memory
c. Register d. secondary memory
3.__________is referenced by the CPU without address.
a. RAM b. Primary Memory
c. hard disk c. Registers
4. Which component of computer co-ordinates overall functioning of the computer.
a. ALU b. CU
c. Registers c. North Bridge
5. The primary memory of a computer consists of
a. Only RAM b. Only ROM
c. Both a and b d. Flash drives
6. Which of the following is not a secondary memory
a. Magnetic Tape b. Hard disk
c. Optical Disk d. Cache memory
7. ____________is a large printed circuit board having many chips, ports, controllers and other
electronic components mounted on it
a. Integrated Circuit b. Motherboard
c. Chip set d. Firewire
8. Which among the following are characteristics of motherboard?
a. only form factor b. only Chip set c. Only Processor Socket d. All of these
9. form factor refers to________
a. Geometry b. Electrical requirements
c. Dimensions d. All of these
10. ____________ characteristic of motherboard should be considered to maximize the
computers upgradability
a. Form Factor b. Chip set
c. Processor socket d. All from (a) to (c)
11. Which of the following motherboard is old model mother board
a. AT b. ATX
c. XT d. Baby AT
12. Which of the following motherboard has no ports
a. AT b. ATX
c. XT d. Baby AT

MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR


13. Pentium -I, Pentium-II and Pentium – MMX processors used in ________ type of
motherboards
a. AT b. ATX
c. XT d. Baby AT
14. Pentium -III Processors are used in type of motherboards
a. ET b. ATX
c. XT d. Baby AT
15. Both Pentium III and Pentium IV processors are supported by ________ motherboards
a. XT b. AT
c. Baby AT d. ATX
16. Processors supported by ATX mother board are
a. Only Pentium-IV, Dual Core
b. Only Dual Core and Core 2 Duo
c. Quad Core, i3, i5 and i7
d. All of the above
17. Which among the following motherboards have slot type and PGA type processor
sockets
a. ATX motherboard
b. Baby AT motherboard
c. XT motherboard
d. AT motherboard
18. Choose the component not present in Baby AT motherboard
a. Slot type processor sockets and PGA processor sockets
b. SDRAM slots and DDRRAM slots
c. PCI slots and ISA slots
d. AGP slots
19. Which one of the following has 24-pin Power connector
a. AT motherboard
b. Baby AT motherboard
c. XT motherboard
d. ATX motherboard
20. XT motherboard has power pin connectors
a. 24 b. 12 c. 20 d. 20 and 24
21. MPGA processor sockets are found in type of motherboards
a. Baby AT b. ATX c. AT c. XT
22. Choose the very old motherboard model from the following
a. ATX b. XT c. Baby AT d. AT
23. Which of the following motherboard type consists of SATA connectors
a. AT motherboard
b. Baby AT motherboard
c. ATX motherboard
d. XT motherboard
24. One of the following is the main component of the motherboard

MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR


a. BUS b. BIOS c. CMOS d. Processor
25. ----------------is the frequency with which a processor executes instructions.
a. Bus speed b. Clock speed
c. MHz d. GHz
26.The computers operating speed is linked to the speed of -------------
a. BUS b. Memory access
c. System Clock d. North Bridge
27. CPU’s performance is measured by the ________per second
a. Number of instructions decoded
b. Number of instructions loaded
c. Number of instructions executed
d. Number of programs executed
28. CPU is fabricated on a single IC chip is known as--------------
a. Multiprocessor c. graphic processor
b. Microprocessor d. microcomputer
30 establishes a communication path for movement of data between
processor and
memory
a. Cache
b. Bus
c. motherboard
d. North Bridge
31. Which one of the following is the alternative name for North Bridge
a. Host Bridge b. south chipset
c. North Chipset d. Both (a) and (c) are correct
32. _______ is responsible for control of high speed components like CPU, RAM and video card
a. South chipset b. south bridge
c. North Chipset d. Both (a) and (b)
33. _______ is responsible for control of slower components.
a. South chipset b. north bridge
c. North Chipset d. Both (a) and (c)
34. The most common motherboard standard for desktop computers
a. AT b. ATX
c. XT d. Baby ATX
35. Identify the devices which are not managed by North Bridge
a. RAM b. CPU
c. Video cards d. CD ROM drive
36. _________ chipset manages data communication between low speed components
a. North Bridge b. South Bridge
c. IDE c. SATA
36. Which of the following performs POST
a. CMOS b. BIOS
c. Control unit d. ALU
37. Identify operation which are not part of BIOS

MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR


a. Holds instructions to load hardware settings
b. Performing POST
c. Invoking bootstrap loader
d. Storing date and time
38. Invoking boostrap loader is done by
a. BIOS b. CMOS
c. SMPS d. South Bridge
39. BIOS stand for
a. Basic input output system b. boot input output system
c. basic internal output system d. boot internal output system
39 is a type of memory chip to store the date, time and system setup parameters.
a. BIOS b. CMOS
c. RAM d. ROM
40. BIOS and CMOS are powered by battery kept on the motherboard
a. Lithium Ion b. Sodium Ion
b. Magnesium ion d Silicon Ion
41. PC cards are used in computers
a. Desktop b. Mini
c. Smart Phones d. Laptop
42. ______ is used to connect modem and input devices
a. ISA b. PCI
c. AGP d. PCI Express

43. ______ is used to connect graphic accelerator cards , sound cards, internal modems or scsi
cards
a. ISA b. PCI
c. AGP d. PCI Express
42 Which among the following bus is the fastest
a. ISA b. PCI
c. AGP d. PCI Express
43. Which one of the following is correct with respect to original Pentium motherboard to
install memory
a. It has two 72-pin SIMM slots or one 168-pin DIMM slots
b. It has only four 72-pin SIMM slots
c. It has only two 168-pin DIMM slots
d. It has four 72-pin SIMM slots or two 168-pin DIMM slots
44. Disk controller is a circuit that enables communication between CPU and
a. Hard Disk
b. Floppy Disk
c. Any External disk drive
d. All of the above
46. ___________ is a plug and play interface
a. Serial port b. parallel port
c. USB d. AGP port
47. Number of devices supported in USB is -------------------

MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR


a. 64 b. 127 c. 128 d. 63
48. What is the basic speed of USB ------------
a. 12 Mbps b. 8 Mbps c.16 Mbps d. 32 Mbps
49._______ is the interface that directs and controls reading and writing to a computer’s
floppy disk drive(FDD)
a. Hard Disk c)Floppy Disk controller
b. Any External disk drive d)All of the above
50.__________ are used to connect external device like printers keyboard or scanners to
computer
a. ISA b. Ports and interfaces
c. AGP d. PCI Express
51._______ are used to connect communication devices.
a. Serial port b. parallel port
c. USB d. AGP port
52.______ needs a single wire to transmit I bit of data
a. Serial port b. parallel port
c. USB d. AGP port
53._______ are used to connect external input/output devices like printers or scanners
a. Serial port b. parallel port
c. USB d. AGP port
54.CD-ROM drives or hard disk drives are connected to the motherboard through ______
a. Serial port b. parallel port
c. USB d. IDE port
55.______ ports are also called as mouse ports
a. Serial port b. parallel port
c. PS-2 port d. AGP port
56.________port uses synchronous serial signals to communicate between the keyboard and a
mouse to the computer
a. Serial port b. parallel port
c. PS-2 port d. AGP port
57._______ is used to connect to graphic card.
a. Serial port b. parallel port
c. PS-2 port d. AGP port
58.______ port is used for adding external devices such as high speed hard disks, high end
scanners CD-ROM drives
a. Serial port b. SCSI
c. PS-2 port d. AGP port
59._______ connects monitor to computers video card
a. VGA b. parallel port
c. PS-2 port d. AGP port
60._______ transfer large amount of data at very fast speed and connects camcorders and
video equipment.
a. Serial port b. parallel port
c. firewire port d. AGP port
61.____ connects PC’s modem to telephone network
a. Serial port b. parallel port
MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR
c. modem d. AGP port
62.______ connects to a network and high speed internet and network cable to computer
a. Serial port b. ethernet port
c. PS-2 port d. AGP port
63._______ are used to connect microphone, speakers to sound card.
a. Serial port b. parallel port
c. sockets d. AGP port
64. _______ is designed to transmit information between electronic musical instruments
a. Serial port b. MIDI
c. PS-2 port d. AGP port
65.The different components of computer are connected to each other through
a. BUS b. CMOS
c. BIOS d. South Bridge
66._____ connects major computer components like processor, memory and I/O
a. Internal bus b. external bus
c. both a and b d. expansion bus
67._____ connects the different external devices , peripherals, slots ports to rest of computer
a. Internal bus b. external bus
c. both a and b d. system bus
68.System bus and expansion bus consists of
a. data bus b. address bus
c. control bus d. all of these
69.____ provides a path to transfer data between CPU and Memory
a. data bus b. address bus
c. control bus d. all of these
70.______connects CPU and RAM
a. data bus b. address bus
c. control bus d. all of these
71.________ is used to control the access to and he use of the data and address line
a. data bus b. address bus
c. control bus d. all of these
72._________ is referred to the electronic storing space for instructions and data
a. BIOS b. BUS
c. CMOS d. memeory
73._______ includes registers, cache memory and primary memory
a. Internal memory b. secondary memory
c. permanent memory d. main memory
74.______ works under the direction of CU to accepts, store and transfer instructions or data
and performs arithmetic and logical comparisons at high speed.
a. BIOS b. BUS
c. Cache d. register

75._______ is the high speed memory placed in between RAM and CPU
a. Secondary memory b. primary memory
c. Cache d. register
76.______ stores the data that is used more often, temporarily and makes it available to CPU
MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR
at fast rate.
a. Secondary memory b. primary memory
c. Cache d. register
77._______ is also known as main memory
a. Secondary memory b. primary memory
c. Cache d. register
78.______ has to be refreshed continuously to store information
a. SRAM b. primary memory
c. DRAM d. register
79._____ RAM is synchronized to system clock
a. DDR-DRAM b. SRAM
c. DRAM d. SDRAM
80.Access speed of SRAM ranges upto _____
a. 2 to 10ns b. 100 to 1000ns
c. 10 to 100ns d. 10 to 50 ns
81.Access speed of DRAM ranges upto _____
a. 2 to 10ns b. 50 to 150ns
c. 100 to 1000ns d. 10 to 50 ns
82.________ is essential for computer to prevent them from failures, breakdowns or
shutdown
a. Power supply b. software
c. hardware d. user
83._______ converts Ac power to Dc power needed by system
a. UPS b. SRAM
c. DRAM d. SMPS
84._______ converts 230v of AC to 5 to 12 v of DC
a. UPS b. SRAM
c. DRAM d. SMPS
85._____ is a power supply that includes a battery to maintain power in the event of power
failure.
a. UPS b. SRAM
c. DRAM d. SMPS
86.______ avoids momentary power lapses by continuously providing power from its own
inverter, evn when the power line is functioning properly.
a. Off line UPS b. stand by UPS
c. Online UPS d. SMPS
87. ______ monitors the power line and switches to battery power as soon as it detects a
problem.
a. Power supply b. stand by UPS
c. Online UPS d. SMPS
88.______ is a process of setting up your hardware devices and assigning resources to them
so that they work together without problems
a. Computer configuration b. software
c. hardware d. power supply

********************
MR. DANIAL , SRI VANI PUC, PALANAJOGIHALLI., DBPUR
Hoysala Pre university college,
Bangalore Rural Dist.,
Chapter 2 - Boolean Algebra

1. In boolean algebra, the OR operation is performed by which properties?


a) Associative properties b) Commutative properties
c) Distributive propertiesd) All of the Mentioned
2. The expression for Absorption law is given by _________
a) A + AB = A b) A + AB = B c) AB + AA’ = A d) A + B = B + A
3. The involution of A is equal to _________
a) A b) A’ c) 1 d) 0

4. A(A + B) =?
a) AB b) 1 c) (1 + AB) d) A
5. (A + B)(A’ * B’) =?
a) 1 b) 0 c) AB d) AB’
6. Complement of the expression A’B + CD’ is _________
a) (A’ + B)(C’ + D) b) (A + B’)(C’ + D) c) (A’ + B)(C’ + D) d) (A + B’)(C + D’)
7. Simplify Y = AB’ + (A’ + B)C.
a) AB’ + C b) AB + AC c) A’B + AC’ d) AB + A
8. The boolean function A + BC is a reduced form of ____________
a) AB + BC b) (A + B)(A + C) c) A’B + AB’C d) (A + C)B
9. The logical sum of two or more logical product terms is called __________
a) SOP b) POS c) OR operation d) NAND operation
10. The expression Y=AB+BC+AC shows the _____________ operation.
a) EX-OR b) SOP c) POS d) NOR
11. The expression Y=(A+B)(B+C)(C+A) shows the _____________ operation.
a) AND b) POS c) SOP d) NAND
12. The canonical sum of product form of the function y(A,B) = A + B is __________
a) AB + BB + A’A b) AB + AB’ + A’B c) BA + BA’ + A’B’ d) AB’ + A’B + A’B’
13. A variable on its own or in its complemented form is known as a __________
a) Product Term b) Literal c) Sum Term d) Word
14. Canonical form is a unique way of representing ____________
a) SOP b) Minterm c) Boolean Expressions d) POS
Pushpavathi b m : Hoysala pu college, Bangalore Rural Dist.,
15. Boolean algebra is also called

A. switching algebra B. arithmetic algebra C. linear algebra D. Algebra

16. To perform product of max terms Boolean function must


be broughtinto
a. AND term b. OR terms c. NOT terms d.NAND terms

17. According to the Boolean algebra absorption law, which of the


following iscorrect?
a. x+xy=x b. (x+y)=xy c. xy+y=x d.x+y=y

18. The expression for Absorption law is given by

a. A + AB = A b. A + AB = B c. AB + AA' = A d. A + B = B + A

19. X*y = y*x is the

a. commutative law

b. inverse property

c. associative law

d. identityelement

20. There are ___________ minterms for 3 variables(a,b,c)

a. 0 b. 2 c. 8 d. 1

21. ___________ expressions are can be implemented using either(1) 2-level AND-
OR LOGICCIRCUITS (2)2-LEVEL NAND logic circuits.

a. pos b. literals c. sop d. none of the above

22. the output of x-nor gate is 1 which input combination is correct.

a. a=1,b=0 b. a=0 b=1 c. a=0, b=0 d. a=0, b=1

23. odd parity of word can be conviently tested by


a. OR GATE b. AND GATE c. NAND GATE d. X-OR GATE

24.determine the values of a,b,c,d that make the sum term

A+B+C+D

a. a=1 b=0 c=0 d=0

b . a=1 b=0 c=1 d=0

Pushpavathi b m : Hoysala pu college, Bangalore Rural Dist.,


c. a=0 b=1 c=0 d=0

d. a=1 b=0 c=1 d=1

25. which of the following expressions is in the sum-of- product(sop)form.

a. (a+b)(c+d) b. (a)b(cd) c. ab(cd) d. ab+cd


26. For the SOP expression , how many 1s are in the truth table's
output column?
a) 1 b) 2 c) 3 d) 5

27. A truth table for the SOP expression has how many input
combinations?

a) 1 b) 2 c) 4 d) 8

28. How many gates would be required to implement the following Boolean
expression beforesimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5

29. How many gates would be required to implement the following Boolean
expressionaftersimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5

30. Determine the values of A, B, C, and D that make the product term equal to 1
a) A = 0, B = 1, C = 0, D = 1
b) A = 0, B = 0, C = 0, D = 1
c) A = 1, B = 1, C = 1, D = 1
d) A = 0, B = 0, C = 1, D = 0

31. What is the primary motivation for using Boolean algebra to simplify logic
expressions?
a) It may make it easier to understand the overall function of the circuit.
b) It may reduce thenumber of gates.
c) It may reduce the number of inputs required.
d) all of the above

32. Use Boolean algebra to find the most simplified SOP


expressionfor F = ABD + CD + ACD + ABC + ABCD.
a) F = ABD + ABC + CD b) F = CD + AD c) F = BC + AB d) F = AC + AD

33. In Boolean algebra the word ‘literal’ means_______


a. a product term b. all the variables in a Boolean expression
c. the inverse function d. a variable or it’s compliment
34. The truth table for sop expression AB+𝐵 ̅ C has how many input
combinations?
a. 1 b. 2 c. 4 d. 8
35. converting the Boolean expression LM+M(NO+PQ) to sop form , we get ______

Pushpavathi b m : Hoysala pu college, Bangalore Rural Dist.,


a. LM+ MNOPQ
b. B. L+MNO+MPQ
c. LM+M +NO+MPQ
d. LM+MNO+MPQ

36. applying demargon’s theoream to the expression (w + 𝗑 + 𝑦)z, we get __________


a. w𝗑𝑦z b. w𝗑𝑦 z c. wxy z̅ d. 𝗑
̅w
̅ 𝑦̅ +z̅

37. the product of sum is basically the oring of anded terms __________
A. TRUE B. FALSE C. May be both d. No answer given

42. By applying De Morgan's theorem to a NOR gate, two identical truth


tables can beproduced.
a) True b) False c) may be both d) answer not given
43. The process of reduction or simplification of combinational logic circuits
increases thecost of the circuit.
a) True b) False c) may be both d) answer not given
44. Most Boolean reductions result in an equation in only one form
. a) True b) False c) may be both d) answer not given
45. The binary value of 1010 is converted to the product term.
a) True b) False c) may be both d) answer not given
46. In the commutative law, in ORing and ANDing of two variables, the order in
which thevariables are ORed or ANDed makes no difference.
a) True b) False c) may be both d) answer not given
48. Determine the binary values of the variables for which the following
standard POSexpression is equal to 0.
a) (0 + 1 + 0)(1 + 0 + 1) b) (1 + 1 + 1)(0 + 0 + 0) c) (0 + 0 + 0)(1 + 0 + 1)
d) (1 + 1 + 0)(1 + 0 + 0)
49. The expression W(X + YZ) can be converted to SOP form by applying which law?
a) associative law b) commutative law c) distributive law d) none of the above

50. Simplification of the Boolean expression AB + ABC + ABCD + ABCDE +


ABCDEF yieldswhich of the following results?
a) ABCDEF B) AB + CD + EF C) A + B + C + D + E + F
D) AB
51. Given that F = (A + B'+ C)(D + E), which of the following represents the
only correctexpression for F'? a) F' = A'BC'+ D'+ E' b) F' =
AB'C + DE
c) F' = (A'+ B + C')(D'+ E') d) F' = A'BC' + D'E'
52. The product of sum canonical form also known as __________________
A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
53 ____________ are the alternative form of canonical form.
A. SOP B. POS C. BOTH A AND B d. NONE OF THE ABOVE
Pushpavathi b m : Hoysala pu college, Bangalore Rural Dist.,
54. The sum of product canonical form also known as __________________
A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE

55 . One of De Morgan's theorems states that. Simply stated, this means that logically
there is nodifference between:
a) a NOR and an AND gate with inverted inputs
b) a NAND and an OR gate with invertedinputs.
c) an AND and a NOR gate with inverted inputs.
d) a NOR and a NAND gate with inverted inputs.

*********************
MCQs Chapter 3 - LOGIC GATES

1. Electronic circuits that operates on one or more input signals to produce


standard output_____________

a. series circuits b. parallel circuits c. logic signals d. logic gate

2. logic gates are the building blocks of all circuits in a computer______________

A. TRUE B. FALSE C. may be both D. No answer given

3. A__________ gate gives the output as 1 only if all the inputs signals are 1.

A. AND B. OR C. X-OR D. NOR

4. the Boolean expression of an or gate is _________________


b. A.B b. A+B c. AA+B d. AB
5. The gate which is used to reverse the output obtained is____________________

A. NOR B. NAND C. X-OR D. NOT

6. which of the following gate will give a 0 when both of it’s inputs are 1.

A. AND B. OR C. NAND D. X-OR

7. The universal gate that can be used to implement any Boolean expression is________________ gate .

A. NAND B. X-OR C. OR D. AND

8. The gate which is called as inverter gate ____________

A. NAND B. X-OR C.NOR D. NOT

Pushpavathi b m : Hoysala pu college, Bangalore Rural Dist.,


9. The and gate is represented algebraically by

a. + b. * c. -- d. %

10. the only gate that has 1 input and 1 output________________

A. AND B. OR C. NOT D. X-OR

11. The universal gate is __________

A. NAND B. X-OR C. OR D. AND

12. what combination is a Nand gate___________

A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR

13. what combination is a NOR gate___________

A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR

14. A NAND gate


___________inputs
has and ________________ outputs

a. high input and high output b. high input and low output

c. low input and low output d. low input and high output

15.who invented the idea of logic gates ____________

a. George boole b. barden c. calude shanon d. kornard zure

16. which of the following are the airthmatic logic gates?

A. X-ORB. X-NOR C. BOTH D. NONE OF THE ABOVE

17. which of the following is not a logic gate

A. AND B. OR C. IF D. NOT
******************

Pushpavathi b m : Hoysala pu college, Bangalore Rural Dist.,


SRI VANI PRE UNIVERSITY COLLEGE
Doddaballapur, Bangalore Rural Dist.,
Chapter 4 : DATA STRUCTURES
1. ________ is a specialized format for organizing and storing data
a) data structure b) primitive data structure c) sorting d)merging
2. ______ is a method of storing the data in memory so that it can be used efficiently.
a) Array b)data structure c) sorting d)merging
3. Which operation is used to remove the data structure from memory space
a)create b)select c)update d)destroy
4. Which is the collection of homogeneous elements under the same name?
a) Array b)data structure c) stack d)queue
5. which data structure has linear relationship between data elements?
a) non linear b)linear c) stack d)queue
6.In which data structure every data item is connected to several other data items?
a) non linear b)linear c) stack d)queue
7. Array size should be_______
a) negative number b)positive number c)null d)Zero
8. To find length of array we use ______
a)L=UB-LB+1 b)L=LB-UB+1 c)L=UB-LB d)L=LB-UB
9. The base address of an array is address of_________
a)UB b)LB c)UB-LB d)LB-UB
10. The formula to calculate address of an element of an array A is______
a)loc(A[I])=base(I)+W(I-LB) b) loc(A[I])=base(A)+W(I-UB)
c) loc(A[I])=base(I)+W(I-UB) d) loc(A[I])=base(A)+W(I-LB)
11. Example for traversing in a linear array is____
a)binary search b) linear search c)to find max element in an array
d)inserting an element at given position in an array
12. Binary search compares the element to be searched with_______ element of an array
a) first element b) middle element c)last element d)all the element
13. In binary search method if search element is less then mid position then___
a)high=mid-1 b)low=mid+1 c)high=mid+1 d)low=mid-1
14. Linear search compares the elements
a)one by one from beginning to end b) dividing array into two parts
c) only first and last position d) from low to mid position
15. In binary search the successful search is when_____
a)A[mid]=ele b)A[i]=ele c)ele<A[mid] d) ele>A[mid]
16. for I=N-1 down to Pos is the loop for
a)deleting element in array b)inserting element in an array c) traversing d)both a
and b
17. In________ operation all the elements are shifted into lower order position from the
given position

Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 1
a)deleting element in array b)inserting element in an array c) traversing
d)binary searching
18. Which is not the sorting method?
a)heap sort b)quick sort c)shell sort d)linear sort
19. The memory address of element A[i][j] in row major order is
a)loc(A[i][j])=base(A)+W((i-LB)+n(j-LB)) b) loc(A[i][j])=base(A)+W(n(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+n(j-LB)) d) loc(A[i][j])=base(A)+W((I-
LB)+n(j-LB))
20. The memory address of elements A[i][j] in column major element is
a)loc(A[i][j])=base(A)+W((I-LB)+m(j-LB)) b) loc(A[i][j])=base(A)+W(m(j-LB)+(i-
LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+m(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+m(j-
LB))
21. The base address of an array is address of the____
a)A[1] b)A[n-1] c)A[0] d)both a and b
22. Which data structure is used to implement queues, trees, graphs
a)stack b)list c)array d)None
23. In which data structure addition and deletion of element takes place from same
poition
a)stack b)list c)array d)queue
24. In stack the end is commonly referred as
a)Top b)bottom c)rear d)front
25. In stack the end opposite is known as
a)Top b)base c)rear d)front
26. In stack which element is removed first
a) element inserted at first b)most recently added element c)middle element
d)second element
27. In which position of the stack element will be in longest time?
a)A[0] b)base c)top d)both a and b
28. Stack perform the operation
a)last in first out b)last in last out c)last in fast out d)first in first out
29. In which operation stack is not modified
a))push(item) b)pop() c)peek() d)none
30. What is the function of Peek() operation
a)removes top item from stack b) test stack is empty or not
c)returns the number of items in stack d)returns top item from stack but does not
remove
31.Push operation in stack is____
a) First increases top position and insert element
b)first insert element and then increases top position
c) first decreases top position and insert element
d) first insert element and decrease the top position

Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 2
32. Which of the following is not an application of stack
a) rearranging railroad cars b) runtime memory management
c) multiprogramming platform d) conversion of infix expression into postfix and
prefix expression
33. Example for infix expression___
a)+ab b)a+b c)ab+ d)none
34. The condition top=-1in stack indicates
a) stack is full b)stack has one element c)stack overflow d)stack is empty
35. The condition top=n-1 in stack indicates
a) stack is full b)stack has one element c)stack underflow d)stack is empty
36. In which data structure addition of new element and removal of element takes place
at different end
a) non linear b)linear c) stack d)queue
37. In Queue items are inserted at______ end
a) Top b)front c)rear d)bottom
38. In queue items are removed at _______ end
a) Top b)front c)rear d)bottom
39. In queue we remove the element which is
a)least recently added b)most recently added c)both a and b d)none
40. Queue is also called as
a) last in first out b) first in last out c)first in first out d)first in first in
41. In queue which operation is generally called as push
a) enqueue b) dequeue c)push d)pop
42. Which condition indicates queue is empty
a)front=null b)rear=N c) front=rare d)both a and b
43. Which condition indicates only one element in queue
a)front=null b)rear=N c) front=rare d)rear=N-1
44. Various application software is based on _____ data structure
a) linked list b)graph c) stack d)queue
45. In which of the following application queue data structure is used
a)simulation b) type scheduling algorithm c) print server routine d)all of
these
46. In which data structure element can be inserted and removed in any position
a)simple queue b)circular queue c)priority queue d)double ended queue
47. In which queue addition and deletion takes place at both the ends
a)simple queue b)circular queue c)priority queue d)double ended queue
48. The dis advantage of array is
a)static structure b)dynamic structure c) variable d)both a and b
49. In which operation array elements are shifted into higher order positions
a)deletion b)insertion c)searching d)sorting
50. In which operation array elements are shifted into lower order positions
a)deletion b)insertion c)searching d)sorting

Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 3
51. In linked list the position start gives the location of ______ node
a)first b)last c)middle d)second
52. In linked list the pointer start position is also called as
a)NULL b)head c)Tail d)none
53. The link field of last node contains
a)NULL b)head c)Tail d)none
54. In linked list link field of every node contains
a) data of the node b)data of next node c)address of last node d)address of next
node
55. In doubly linked list which node points to the address of previous node?
a) info b)frow c)back d)head
56. Which operation is not possible in linked list
a)sorting b)searching c)merging d)inserting
57. Pointer=new type[number_of_elements] is syntax for
a)pointer declaration b)allocate memory for single element
c)allocate memory for block element d)structure.
58. In which data structure each node is connected to several other nodes
a) non linear b)linear c) stack d)queue
59. Which data structure represents hierarchical relationship
a) non linear b)linear c) stack d)queue
60. Each node in a tree has ___ child node
a)zero b)more c) both a and b d)no
61. Root node in a tree is at ____ position
a)top b)bottom c)middle d)right
62. From _____ node all the operations commence in tree
a)leaf b)child c)root d)internal
63. The edges in a graph having directions is called
a) undirected graph b)arcs c)digraph d)all the above
64. prefix expression of (A+B)*(C+D) is
a)*+AB+CD b)+AB*+CD c)AB+Cd+* d)+*AB+CD
65. Prefix expression of 2*3/(2-1)+5*3 is
a)*23-21/-53*1 b)23*21+/53*+ b)21*23-/35*+ d)-/53*+23*21
66. ele=stack[top] is for
a)push b)pop c)enqueue d)dequeue
67. Prefix expression ofA+(B*C-(D/E^F)) is
a)ABC^/DEF* b)ABC*DEF^/ c)^/ABC*DEF d)*ABC/DEF^
68. During conversion of infix to postfix pop is done when ____ appears
a)( b)) c)~ d)::
69. Each operator in postfix string refers to its ______ operand in a string
a)previous 3 b)next 3 c)next 2 d)previous 2
70. 10, 20, 25, 35, 30 40 for the list which searching technique can be applied
a)binary search b)linear search c)both a and b d)none

Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 4
71. Which operation access each data element exactly once
a)traversal b)insertion c)searching d)sorting
72. Stack can be represented using
a)array b) linked list c)both a and b d)none
73. In binary search when the element is searched either right half or the left half of an
array
a) element is found b)search element comparison matches
c)comparison does not match d) low position is less than high position
74. In searching if (loc>=0) is _____
a)unsuccessful search b) binary search c) linear search
d)successful search
75. Array with one row or one column is a
a)1D array b)2d array c)multi dimensional array d)both a and b
76. Which operation is used to change data in data structure
a)create b)destroy c)select d)update
77. The study of data structure mainly deals with
a)implementation of structure on computers b)mathematical description of
structure
c) to determine amount of space in memory d)all of these
78.________ is a set of vertices and edges
a)tree b)graph c)queue d)stack
79. Which node is farthest node from root node
a) child node b)top node c)leaf node d) middle node
80. ______ list in linked list contains unused nodes
a)Avail b)head c)null d)start
81.Dynamic memory is allocated using _____ operator
a)create b)null c)new d)pointer
82. In which linked list it is not possible to access preceding nodes
a)singly b)doubly c)circular d)all of these
83. A text can be reversed using ____
a)tree b)graph c)queue d)stack
84. While ((j>=1) and (A[j]<A[j-1])) is the logic for
a) inserting element b)sorting element b)deleting element d)searching element
85. for i=0 to N-1
If(A[i]==ele) is logic for
a) inserting element b)sorting element b)deleting element d)searching element
86. The method of collecting deleted nodes into free storage is called
a) heap memory b) free memory c)garbage collection d)dynamic
collection
87. In queue insertion and deletion performed according to___
a) FIFO b)FILOc)LIFO d)all of these
88. Which of the following data structure does not have different types

Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 5
a) array b)linked list c) stack d)queue
89. If we try to delete node from the linked list which is empty is called
a)overflow b)underflow c)inserting d)deleting
90. ______ linked list is called as two way list
a)singly b)doubly c)circular d)none
91. As user navigate from web page to web page then the pages are placed on_____
a) array b)linked list c) stack d)queue
92. The operators in between two operands are called as ______ expression
a)infix b)postfix c)prefix d)arthematic
93. If an operator precedes two operands it is called as _______ expression
a)infix b)postfix c)prefix d)arthematic
94. If an operator follows the two operands it is called as _____ expression
a)infix b)postfix c)prefix d)arthematic
95. for i=lb to ub
Process (A[i]) is logic for ____
a) inserting element b)sorting element b)deleting element d)traversing
96. Which data structure directly operates on machine level instructions
a)int b)array c)string d)trees
97. Which is not the operation on linear data structure
a) inserting b)sorting b)updating d)traversing
98. What is the statement to copy the top element into variable
a)s[top]=ele b)ele=s[top] c)s[++top]=ele d)both a and b
99. What is the statement to copy the variable element into rear position in queue
a)q[rear]=ele b)q[front]=ele c)ele=q[rear] d)ele=q[front]
100. _______ tree is a tree which at most two decedents
a) binary tree b)sub tree c)b+ tree d)full
********************

Prepared by, A N Basava kumar lect. In CS Shree Vani P U College doddaballapur, Bangaore
rural Dist., Page 6
SRI DEVARAJ URS PRE UNIVERSITY COLLEGE

DODDABALLAPUR, BANGALORE RURAL DIST.

Chapter 7: Classes and Objects

1. Programming Language which support object oriented programming(OOP) is ____


(a) C++ (b) Visual Basic (c) C language (d) Fortran
2. Programming language support oop concept _____
(a) C++ and C# (b) java (c) python (d) All
3. Programming languages does not support oop concept
(a) C and PASCAL (b) COBOL (c) FORTRAN (d) All
4. Keyword used to create class is ________
(a) Classname (b) class (c) private (d) protected
5. Member function means ________
(a) Just a fumction (b) function which is member of class
(c) Both a and b (d) All the above
6. The data elements of a class are called _________
(a) Member Data (b) data (c) private members (d) All the above
7. The Data member of class defines _______
(a) Just data variables (b) variables
(c) characteristics of class (d) behavior of the send class
8. The member function of the class defines _____
(a) Functions of class (b) data functions
(c) characteristics (d) behavior of the class
9. A class combines __________ and ________ into single unit.
(a) Data members and member function
(b)Only data members of the class
(c) Only member function of the class
(d)All the above

10. A class definition is processes of ________


(a) Only naming the class
(b) Only includes writing interface operations
(c) Naming the class and methods and data members
(d) Only includes naming the data variables
11. A class can contain ________ member functions
(a) Many
(b) Zero or more
(c) One or more
(d) Both b and
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
12. The Data member of a class describe ___________ of a class
(a) Behaviour (b) characteristics
(b) Only a is correct (d) both a nd b is correct
13. Class body definition ends the symbol ______
(a) ; (b) : (c) :: (d) .
14. Class body is enclosed in a pair of ______
(a) ( ) (b) [ ] (c) { } (d) All the above
15. A object is defined to be an ____
(a) Instance of a class (b) copy of the class
(b) Both a and b (d) None of the above
16. The access specifiers of the class define ____
(a) Keywords (b) Data members
(c) member functions (d) Scope of the members
17. Private accesses specifiers means ______________
(a) members can be accessed only with in the class
(b) members can be accessed only outside the class
(c) members can be accessed both inside and outside the class
(d) all the above
18. The symbol used to define member function outside the class is ____
(a) @ (b) & (c) * (d) : :
19. The default access specifier is ______
(a) Private (b) protected (c) public (d) All the above
20. The _______ members are accessable only inside the class
(a) Private (b) protected (c) public (d) friend
21. The feature of public access specifiers is ____
(a) Members are accessible only outside the class
(b) Members are access both inside and outside the class
(c) Members are accessable only inside the class
(d) All the above
22. One special feature of protected access specifier is ___
(a) Cannot be inherited from one to another
(b) Can be inherited from one class to another
(c) Can be used outside the class
(d) Can be accessed using . (dot) operator
23. The difference between private and protected is ___
(a) Private cannot be inherited and protected can be inherited
(b) Protected cannot be inherited and private can be inherited
(c) No difference between both
(d) Both can be accessed outside the class

Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
24. Which operator is member selection operator___
(a) . (dot) (b) & (address) (c) || operator (d) ! (not operator)
25. The ____ member can be accessed outside the class using dot(.) operator
(a) Public (b) protected (c) private (d) friend
26. The class members can be accessed using ____ operator
(a) :: (scope) (b) . (dot) (c) & (address) (d) * (pointer)
27. Inside member function means _____
(a) Both Declaration and Definition appear inside the class
(b) Only Declaration appears inside the class
(c) Only definition appears inside the class
(d) Both b and c
28. Syntax for memberfunction inside the class is _____
(a) return_type_specifier functionname(argument_list)
{
Statements;
…………
}
(b) void classname::input()
{
Statements;
…..}
(c) return_type_specifier classname::functionname()
(d) void input()
29. An example for member function inside class is ___
(a) Returntype functionname()
(b) void input()
{cout<<”Enter regno and name”<endl;
Cin>>regno>>name;
}
(c) both a and b
(d) only a is correct
30. syntax for member function outside class definition is ___
(a) return_type_specifier classname::functionname(arg_list)
{statements
………….}
(b) void student::input()
(c) void input()
(d) returntype functionname(arglist)
31. Example for outside class definition is ___

Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
(a) void student::input()
{
Cout<<”Enter regno and name”<<endl;
Cin>>regno>>name;
}
(b) void input()
(c) Void display(arglist)
(d) All the above
32. Using which methods and object can be passed to function
(a) Using only pass by function
(b) Using pass by data members
(c) Pass by data and member function
(d) Using Pass by value and pass by reference
33. Member function can be defined in how many methods
(a) 2 (b) 1 (d) 3 (d) a and b
34. Member function can be defined using ___ and ___ methods
(a) Only outside the class
(b) Only inside the class
(c) Both inside and outside the class
(d) All the above
35. The class members can be_______
(a) Only private
(b) Only protected
(c) Only public
(d) Private , protected or public
36. Syntax for creating object is _____
(a) Classname objectname1,objectname2,…;
(b) Student obj1,obj2;
(c) Class classname objectname1, objectname2;
(d) Both a and c
37. The array of object is _____
(a) An array having classtype elements
(b) Array as a member of the class
(c) Array stores many values of same type
(d) All the above
38. The ____ is an example for creating the objects
(a) Student obj1,obj2;
(b) Class student obj1,obj2;
(c) Both a and b

Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
(d) Only a
39. How many methods are there to pass objects as argument to member function
(a) 2 (b) 3 (c) 1 (d) 4
40. A class is ____of an object
(a) Blue print or prototype
(b) Defined using classname
(c) A group of students
(d) Classname defines the class
41. A class is collection of objects having _____
(a) Similar characteristics and behavior
(b) Only character
(c)Only behaviour
(d) All the above
42. Is it possible to access the data outside the class?
(a) Yes , if it is under public
(b) No , if it is under private
(c) Both a and b
(d) Not possible
43. Set of interface operations that are performed on objects are called ___
(a) Member variable (b) class function
(b) Member function (d) class variable
44. The protected members of the class can be accessed by____
(a) Member function of class but only inside the class
(b) Member function of the derived class
(c) Friend functions of the class
(d) All the above
45. What is the use of scope resolution operator?
(a) Link between class and member function
(b) To write member function definition outside the class
(c) Both a and b
(d) Only a
46. An Example for array of object is ___
(a) Student obj[10];
(b) Class student stu_obj[50];
(c) Employee emp[15];
(d) All the above
47. Example to pass object as function argument can be____
(a) void total(Exam puc, Exam cet)
{

Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
P=puc.p+cet.p;
C=puc.c+cet.c;
M=puc.m+cet.m;
}
(b) Returntype functionname(classname obj, classnae obj)
(c) Both and b
(d) All the above
48. The other names for member functions are ____
(a) Methods and Interfaces
(b) Only methods
(c) Only set of interface operations
(d) All the above
49. The member functions may be defined _____ or ____ of class
(a) Inside or outside
(b) Only outside
(c) Only inside
(d) All the above
50. ____ members can be accessed inside or outside of class definition
(a) Public (b) private (c) protected (d) all the above
****************

Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.
SRI DEVARAJ URS PRE UNIVERSITY COLLEGE
DODDABALLAPUR, BANGALORE RURAL.
Chapter 8: Function Overloading
1. Function cannot be overloaded when____-
(a) Function names are same
(b) Number of parameters are different
(c) Number of parameters are same
(d) Data types of parameters are different
2. Function can be overloaded when_______
(a) Function names are same (c) The data types of parameters are
(b) Number of parameters are different
different (d) All the above
3. Friend function is a __________
(a) Non member function of class (c) Both a and b
(b) Can access both private and (d) None of the above
protected members
4. C++ Implements polymorphism through _______
(a) Inline function
(b) Friend function
(c) Function overloading and operator overloading
(d) Both a and b
5. Need for function overloading is ____
(a) Code maintenance is easy
(b) Easy to understand the flow of information and debug
(c) Easier interface between program and real world objects
(d) All the above
6. The Restrictions on overloaded functions are______
(a) Each function in a set of overloaded function must have different argument list
(b) If typedef is used for naming functions then the function is not considered as different
type
(c) Both a and b
(d) None of the above
7. The other functions used in class are _____
(a) Overloaded functions (c) Friend function
(b) Inline functions (d) All the above
8. The inline function means ____
(a) Very long function (c) Short function
(b) Can contain too complicated code (d) Both a and b
9. The inline function can be ____
(a) Very short function

Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR , BANGALORE RURAL.


(b) The compiler replace function call (c) Both a and b
with function code (d) None of the above
10. The advantages of inline functions are
(a) Inline functions are compact (c) Very efficient code can be
function calls generated
(b) The size of object code is reduced (d) All the above
11. In which type of functions the compiler replaces the function call statement with the
function code is _______
(a) Friend function (c) Function overloading
(b) Inline function (d) Both a and b
12. In which function category two or more function have same name but different in number
of argument list and their data type.
(a) Function overloading (c) Friend function
(b) Inline function (d) All the above
13. The inline function cannot include the ____
(a) goto statement (b) looping construct
(c) Recursive function body (d) all the above
14. The keyword to create the inline function is ____
(a) Friend (b) private (c) Class (d) inline
15. The friend function means____
(a) A short function
(b) run little faster
(c) can access private and protected members outside the class.
(d) Both a and b
16. Using friend function members are accessed using following syntax
(a) Objectname.membername (c) Only membername
(b) Only object name (d) All the above
17. While defining friend function it does not use either keryword ___ or __operator.
(a) & or . (b) friend or :: (c) objectname.membername or objectname (d) all the
above
18. How to accesses the member of the friend function
(a) Member are accessed directly using member names
(b) Specifying objectname.membername
(c) Any above method
(d) All the above methods
19. The friend function declaration in the class is of _____
(a) Only public scope
(b) Only private scope
(c) Only Protected scope
(d) Can be any scope in the class (private, protected, public)
20. A friend function is a ______ of a class
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR , BANGALORE RURAL.
(a) Non member function (c) Inline function
(b) Private function (d) Public function of a class
21. Use of friend function is rare since it violates the rule of
(a) Encapsulation (c) Both a and b
(b) Data hiding (d) None of the above
22. Function overloading is not possible when _____
(a) Function name are same
(b) Number of arguments are different
(c) Number and data types or arguments are same
(d) Data types of argument are different
23. Inline function may not work when _____
(a) Function has looping (c) Function has recursive function
(b) Function has switch or goto (d) All the above
24. Friend function can access _____members of class
(a) Private (c) Protected
(b) Public (d) All the above
25. How friend function can access members of class
(a) Using dot (.) operator
(b) Using objectname.membername with each membername
(objectname.membername)
(c) Using objectname’
(d) Using classname and object name
26. The Function overloading can include___
(a) Ordinary functions (c) Both a and b
(b) Member function (d) Only member function
27. The disadvantage of inline functions can also be____
(a) The size of the executable file increases and more memory needed
(b) The body of inline function is substituted in place of function call
(c) Both a and b
(d) None of the above
28. The feature of friend function may include____
(a) These are normal external functions with special rights
(b) These are very common functions
(c) These are invoked like normal functions
(d) Both a and c
29. The inline functions are _______ defined inside the class
(a) Member function (c) may contain goto and switch
(b) too complex functions (d) none of the above
30. The prefix used with friend functions is ____
(a) friend (b) inline (c) void (d) class
31. The friend function must be declared within _____ with friend keyword
Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR , BANGALORE RURAL.
(a) Class (b) outside class (c) using :: operator (d)all the above
32. The friend function definition must be written _____ without the prefix friend or :: operator.
(a) Outside the class
(b) Inside the class only
(c) Can be written both inside and outside
(d) All the above
33. The friend function can access the public data members like ____ functions
(a) Non member (c) External function
(b) Member functions (d) None of the above
*********************************

Name : Jyothi.B SRI DEVARAJ URS PUC, DBPUR , BANGALORE RURAL.


SRI VANI PRE UNIVERSITY COLLEGE
Doddaballapur, Bangalore Rural Dist.,
Chapter 9 : CONSTRUCTORS AND DESTRUCTORS
1. Automatic initialization of object is carried out using a special member function
called_____
a) constructors b) destructors c) friend functions d) inline
functions.
2. Constructors are called automatically when_____________
a) object is destroyed b) object is created c) class is created d)constructor is
created
3. ________ constructs the values of the data members of the class.
a) destructors b) constructors c) class d) member function
4. Constructors name is same as __________ name.
a) class b) member function c)object d)member data
5. Constructors should be declared in ___________
a) protected section b)private section c) public section d)anywhere inside class
6. There is no _____________ for constructors.
a) arguments b)parameters c) return-type d) object
7. ___________makes implicit calls to the operators new and delete when memory
allocation is required.
a)class b)object c)constructors d)member function
8. Default constructor is also called as_______
a)zero parameterized constructor b) copy constructors
c)parameterized constructor d)destructors
9. Which of the following is not a type of constructors.
a. default constructors b)parameterized constructors c) copy constructors
d)destructors
10. _______ are useful when the object are need to be created without having to type
initial values.
a)copy constructors b)default constructors
c)parameterized constructors d) destructors
11. When ________ is declared for a class initialization of objects is done automatically.
a) constructors b)object c) destructors d)interface
12. All objects of a class are initialized to same set of values by_________
a) copy constructors b)default constructors
c)parameterized constructors d)destructors
13.When user defined class does not contain an explicit constructors, compilers
automatically invokes __________ constructors.
a) copy b) default c) parameterized d)argument
14. Declaring constructors with argument it hides ___________constructors.
a) default b)parameterized c)copy d)argument

Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
15. It is no possible to initialize different objects with different initial values using_____
a) copy constructors b) parameterized constructors
c) default constructors d)destructors
16. A constructors that takes one or more arguments are called _________ constructors
a) copy b)default c)parameterized d)zero argument
17. Using _________ constructors it is possible to initialize different object with different
values
a)copy b) parameterized c) default d)zero argument
18. _________ constructors are invoked automatically when objects with arguments are
created.
a) copy b)default c)zero parameterized
d)parameterized
19. ____________constructors can be over loaded
a) parameterized b) default c)zero argument d)zero parameterized
20. ____________ constructors can have default arguments and default values.
a) default b) zero argument c)parameterized d) zero parameterized
21. Constructors can be invoked through
a) explicit call b) implicit call c)initialization at the time of declaration with
=operator d) all of the above
22. ____________declaration of an object is followed by assignment operator, constructor
name and argument list enclosed in parenthesis
a) explicit call b) implicit call c)initialization at the time of declaration with
=operator d) none of the above
23. In ___________ declaration of an object is followed by argument list enclosed in
parenthesis.
a) explicit call
b) implicit call
c)initialization at the time of declaration with =operator
d) none of the above
24. __________ method is used for constructor with exactly one argument.
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d)
destructors
25. In __________ declaration is followed by assignment operator and value to be
initialized
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) none of the above
26. Using __________ constructors one object can be copied to another object.
a) copy b)default c)zero parameterized d)parameterized
27._______constructors are used to initialize an object with values of already existing
objects

Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
a) copy b)default c)zero parameterized d)parameterized

28. __________ constructors are used to return object as function values


a) copy b)default c)zero parameterized d)parameterized
29. ___________ constructors are used to state object as by value parameter of a function
a) default b)parameterized c)copyd)argument
30. Copy constructors is not invoked_________
a) explicitly b) implicitly c)initialization at the time of declaration with =operator d)
normally
31. When a new object is declared and existing object is passes as a parameter to it in
the declaration ____________ constructors are invoked
a) default b)parameterized c)copyd)argument
32. ___________ is called automatically when the object is destroyed.
a)destructors b)constructors c)class d)interface
33. Which operator is used with destructors?
a):: b)& c)~ d) *
34. ________ is used to de-allocate memory that was allocated for the object by the
constructors.
a)class b)interface c) destructors d)constructors
35. _________ takes no arguments
a)parameterized constructors b)copy constructors
c)argument constructors d)destructors

Chapter 10 : INHERITANCE
1. ___________ provides the concept of Reusability
a) procedural programming b)inheritance c)class d)functions
2. _______ allows the user to create a new class from an already existing class
a) inheritance b)classc)polymorphism d)binding
3. ________ is the capability of one class to inherit properties from another class.
a)polymorphism b)binding c)overloading d)inheritance
4. __________ is a class whose properties are inherited by another class
a)sub class b)base class c) derived class d)virtual class
5. __________ is a class that inherits properties from base class
a)sub class b)base class c)super class d)virtual class
6. Base class is also called as_______
a)sub class b)derived class c)virtual class d)super class
7. Derived class is also called as________
a)super class b)abstract class c)base class d)sub class
8. Which of the following is the advantage of inheritance.
a)reusing existing code b) faster development time c)memory utilization
d)all of these

Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
9. If no visibility mode is specified then by default the visibility mode is considered as
_______
a) private b)protected c)public d)explicit
10. All the members of the class except ________ members are inherited.
a) private b)protected c)public d)explicit
11. _______ operator shows the derivation from the base class in inheritance.
a):: b)& c): d) *
12._________ specifies the features of base class are privately derived or publicly derived
or protectedly derived
a) visibility mode b) derivation c)inheritance d)polymorphism
13.____________ controls the access specifiers to be for inheritable member of base class in
the derived class
a) overloading b) visibility mode c)inheritance d)polymorphism
14. In private inheritance the public members of base class becomes _______ members of
derived class
a) private b)protected c)public d)not inherited
15. In private inheritance the protected members of base class becomes _______ members
of derived class
a) protected b)private c)public d)not inherited
16. In protected inheritance the public members of base class becomes _______ members
of derived class.
a) private b)protected c)public d)not inherited
17. In protected inheritance the protected members of base class becomes _______
members of derived class.
a) protected b)private c)public d)not inherited
18. In public inheritance the public members of base class becomes _______ members of
derived class.
a) protected b)private c)public d)not inherited
19. In public inheritance the protected members of base class becomes _______ members
of derived class.
a) protected b)private c)public d)not inherited
20. In public inheritance the private members of base class becomes _______ members of
derived class.
a) protected b)private c)public d)not inherited
21. If a class is derived from single base class it is _________ inheritance
a)single level b)multilevel c)multiple d)hybrid
22. If a class is derived from an already derived class then it is ________ inheritance
a)single level b)multilevel c)multiple d)hybrid
23 If class is derived from more than one base class then it is __________ inheritance
a)single level b)multilevel c)multiple d)hybrid
24.If more than one class is derived from a single base class is called ______ inheritance
a)single level b)multilevel c)multiple d)hierarchical

Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
25. ____ inheritance is a combination of hierarchical and multilevel inheritance
a)single level b)multilevel c)multiple d)hybrid
26. We can prevent multiple copies of base class being present in an object from those
objects by declaring the base class as____
a)virtual b) abstract c) derived d)private
27. _________ class is one that is not used to create an object.
a)virtual b) abstract c) derived d)sub
28. When it is mandatory to have constructors in derived class.
a) no base class constructors takes any arguments
b) base class having constructors with one are more arguments
c) if the is default constructors in bas class d) if there is no constructors in base
class
29. ________ takes the responsibility of supplying initial values to its base class
a) super class b) virtual class c)derived class d)abstract class
*************

Prepared by, DANIEL D Lect. In Computer science, Shree Vani PU College, Doddaballapur,
Bangalore Rural Dist.,
SRI DEVARAJ URS PRE UNIVERSITY COLLEGE
Kodigehalli, Dbpur, Bangalore Rural Dist.,

Chapter 11- POINTERS

1. Which of the following is a correct way to declare a pointer?


a) int *ptr b) int ptr
c) int &ptr d)all of the above

2. Allocating sufficient memory for data and instructions during compilation is called
a) dynamic memory b) static memory
c) heap memory d) stack memory

3. Which of the following is the pointer operator?


a) * b) & c)  d) all of the above

4. Which of the following is the pointer address operator?


a) * b) & c)  d) all of the above

5. ________ operator returns the value located at the memory address specified by its
operand.
a) * b) & c)  d) new

6. static memory allocation is done at _________


a) compile time b) dynamic time
c) run time d) execution time

7. How do you declare a pointer?


a ) datatatype *pointer_variable; b) pointer_variable=&variable_name;
c) datatype &pointer_variable; d) datatype variable_name;

8. _____ operator is used to allocate memory for objects during run time
a) new b) & c) delete d) *
9. Which of the following is not possible in the pointers?
a) adding an integer value to pointers
b) subtracting an integer value from pointer
c) addition of two pointers
d) incrementing and decrementing of pointer

Prepared by:Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.,
10. Which operator returns the value located at the address specified by its operand
a) pointer operand b) delete operand
c) new operand c) address operand
11. A pointer is a variable which stores ________ of another variable.
a) name b) value
c) address d) all of the above
12. Which of the following is not an advantage of pointer?
a) accessing array elements is faster
b) support dynamically allocated memory
c) it reduces program complexity
d) it decreases program execution speed
13. pointer initialization is the process of assigning address of a variable to a pointer
variable
a) true b) false c) may be d) cant say
14. Which of the following is dereferencing operator?
a) & b) # c) * d) 
15. Which of the following operator also known as value at address operator?
a) * b)  c) & d) ::
16. & and * are two pointer operators which are _________
a) binary b) ternary
c) unary d) logical
17. The size of pointer variable is same for all type of pointers but the memory that will be
accessed while dereferencing is different.
a) true b) false c) may be d) all of the above
18. Pointer arithmetic is somewhat different from ordinary arithmetic
a) true b) false c) may be d) all of the above
19. Which of the following type of address stored in pointer variable?
a) character b) float c) integer d) none of these
20. ________ operator can be applied to pointer variable.
a) division b) multiplication c) logical d) casting
21. Which of the following is initialization of pointers (or) assignment of pointers
a) datatatype *pointer_variable;
b) datatype &pointer_variable;
c) pointer_variable=&variable_name;
d) pointer_variable=*variable_name;
22. A string is a ________ array
a) float b) integer c) character d) none of these

23. pointer is used to store _________


Prepared by:Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.,
a) memory address b) value c) data d) information
24. Which of the following is used to initialize pointer?
a) * b) & c) = d) ~
25. memory allocated during runtime is __________ memory allocation.
a) compile time b) dynamic c) static d) none of the above
26. New operator is used to create memory during ____________
a) compile time b) runtime
c) static time d) none of the above
27. __________ operator is used to delete memory created during runtime.
a) new b) delete c) NOT d) AND
28. ____________ is the collection of addresses.
a) array of objects b) array of pointers
c) array of elements d) array of variables
29. _________ is the built in pointer that hold the address of the object defined for a class.
a) this pointer b) New
c) delete d) AND
30. Pointers pointing to object of a class called ________
a) array of pointers b) class pointers
c) object pointer d) this pointer
31. _________ is the structure that include an element that points to another structure of
same type.
a) memory heap b) self referential structure c) structure d) memory pool
32. Dynamically allocated memory not deleted remains occupied called
a) orphaned memory b) memory pool c) stream d) structure
33. pool of unallocated memory used for dynamic memory allocation is________
a) orphaned memory b) free store
c) allocated memory d) none of the above
34. Which of the following is not possible in pointers?
a) adding an integer to pointer c) comparing two pointers of same type
b) adding two pointers d) subtracting an integer from the pointer
35. An example for array of pointer declaration is ________
a) int a[10] (b) int *a[10] (c) both a and b (d) none of the above
36. The following can be considered as advantage of pointrs
a) memory is utilized properly c)Easy to deal with hardware components
b) Dynamically allocate & de allocate d) All the above
memory
37. To assign the a pointer to array the following statement is used______
a) &a[0] (base address is assigned) b) a (just arrary name is used to assign
the base addres)
Prepared by:Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.,
c) Both a and b d) None of the above
38. To process the structure members using pointers the following method is used
a) pointer_variable->struct_member c) Both a and b
b) (*pointer_variable).struct_member d) None of the above
39. To release dynamic memory ____ function is used
a) delete (b) new (c) both a and b (d)only b
40. To free or release dynamic Array memory
a) delete function c) delete ptr_var;
b)delete []ptr_var; d) all the above
41. To free or release dynamic structure
a) delete structure_name c)delete pointer_variable
b) delete object_name d) All the above
42. The orphaned memory blocks when increase in number, bring adverse effect on system
, this situation is called____
a) free store c) memory leak
b) Dynamic allocation d) may be a or b
43. The structure that include an element that is a pointer to another structure of the same
type is called___
a) array structure c)self referential structure
b)Dynamic structure d) All the above
44. The objects are referenced using pointers using ___
a) objectname->membername c)Both a and b
b)(*objectname).membername d) None of the above
45. The following operation that cannot be performed over pointer:
a) Additon of two pointers
b) Multiplication of two pointers
c) Division of two pointers
d) All the above
46. Every object in C++ has access to its own address through an important pointer called..
a) this pointer
b) free pointer
c) object pointer
d) all the above
********

Prepared by:Jyothi.B SRI DEVARAJ URS PUC, DBPUR, BANGALORE RURAL DIST.,
KSVK PU COLLEGE
BANGALORE RURAL DIST.,

CHAPTER 13 :DATABASE CONCEPTS


Answer all the questions. Each question carries one mark.
I Select the correct answer from the choices given:
(Repeated answers will not be considered)
1. DBMS stands for
a) Data Base b) Dual Bus Mass c)Data Base d)Direct Based
Management Storage Management Memory Standard
system Series

2. In Relational modes, cardinality is termed as:


a) Number of b) Number of c) Number of d) Number of
tuples attributes tables constraints

3. The view of total database content is


a) Conceptual b) Internal View c) External View d) Physical View
View

4. Cartesian product in relational algebra is


a) Unary operator b) Binary c) Ternary d) Not defined
operator operator

5. DML is provided for


a) Description of b) Addition of new c) Manipulation & d) definition of
logical structure structures in the processing of physical
of database database system database structure of
database system

6. Architecture of the database can be used viewed as


a) two level b) four levels c) three levels d) one level

7. In a relational model, relations are termed as


a) Tuples b) Attributes c) Tables d) Rows

8. In case of entity integrity, the primary key may be


a) not null b) Null c) both Null & not d) any value
Null

9. A logical schema
a) is the entire b) is a standard way c) describes how d) Both (a) and
database of organizing data is actually (b)

Prepared By: Sunil D N , KSVK PU COLLEGE , BANGALORE RURAL DIST.


information into stored on disk
accessible parts

10. In the architecture of a database system external level is the


a) Physical level b) logical level c) conceptual level d) view level

11. In a Hierarchical model record are organized as


a) Graph b) List c) Links d) Tree

12. In an E-R diagram attributes are represented by


a) Rectangle b) Square c) ellipse d) Triangle

13. In an E-R diagram an entity set is represent by a


a) Rectangle b) Ellipse c) Diamond box d) Circle

14. A subschema expresses


a) Logical view b) Physical view c) External view d) All the above

15. Relational Algebra is


a) Data Definition b) Meta Language c) Procedural d) None of the
Language query Language above

16. What is a relationship called when it is maintained between two entities?


a) Unary b) Binary c) Ternary d) Quaternary

17. Which of the following operation is used if we are interested in one certain
columns of a table?
a) Projection b) Selection c) Union d) Join

18. A set of possible data values is called


a) Attribute b) Degree c) Tuple d) Domain

19. Which of the following is record based logical model?


a) Network b) Object oriented c) E-R Model d) None of these
Model model

20. The natural join is equal to


a) Cartesian b) Combination of c) Combination of d) Combination
Product Union and selection and of projection and
cartesian product cartesian product cartesian

Prepared By: Sunil D N , KSVK PU COLLEGE , BANGALORE RURAL DIST.


product

21. Hierarchical model is also called


a) Tree structure b) Plex structure c) Normalize d) Table Structure
Structure

22. In E-R diagram generalization is represented by


a) Ellipse b) Dashed ellipse c) Rectangle d) Triangle

23. A data manipulation commands the combines the records from one or more
tables is called
a) SELECT b) PROJECT c) JOIN d) PRODUCT

24. A table joined with itself is called


a) Join b) Self Join c) Outer Join d) Equi Join

25. Which of the following is not advantage of the database approach?


a) Increased b) Elimination of c) Ability to d) None of the
security data redundancy associated with above
relation data

26. Which of the following is another name for weak entity


a) child b) Owner c) dominant d) All the above

27. Which of the following database object does not physically exist?
a) base table b) index c) view d) none of the
above

28. In E-R Diagram relationship type is represented by


a) Ellipse b) Dashed ellipse c) Rectangle d) Diamond

29. In E-R diagram generalization is represented by


a) Ellipse b) Triangle c) Rectangle d) Diamond

30. Rows of a relation is called


a) Relation b) tuple c) data structure d) an entity

31. The primary goals of DBMS is/are to


a) provide an b) store the c) retrieve d) All the above
environment that information information
is congenial to
user

Prepared By: Sunil D N , KSVK PU COLLEGE , BANGALORE RURAL DIST.


32. A _____ in a table represent a relationship among a set of values
a) column b) key c) row d) entity

33. Which normal form is considered adequate for relational database design?
a) 2NF b) 3NF c) 4NF d) BCNF

34. In database table, the category of information is called


a) tuple b) record c) field d) All of the above

35. An advantage of the database management approach is


a) data is b) data redundancy c) data is d) None of the
dependent on increases integrated and above
programs can be accessed
by multiple
programs

36. A function is no partial dependencies are in ________ form


a) 2NF b) 3NF c) 4NF d) BCNF

37. Which one is not an application of database


a) sales b) college c) Attendance d) Bank
Register

38. In a database, which one is not a data type?


a) Varchar b) Integer c) Date d) Float

39. The features of database system are _____


a) Data security b) Enforcing data c) Data sharing d) All of the
integrity above

40. Database architecture is logically divided into_____ types.


a) Two b) Three c) Four d) Multi

41. Three tier architecture includes


a) Presentation b) Application tier c) database tier d) All of the
tier above

42. Mathematical set theory-based relations


a) Union - b) Deference – c) Both A and B d) None of the

Prepared By: Sunil D N , KSVK PU COLLEGE , BANGALORE RURAL DIST.


Intersection Cartesian Product above

43. Advantages of data ware houses:


a) Enhance end- b) Increases c) Able to d) All of the
user access to productivity and combine data above
reports and decreases from different
analysis of computing costs. sources, in one
information. place.

44. The information processing cycle consists of five specific steps:


a) Five b) Four c) Three d) None

45. The collection of raw facts and figures is called


a) Information b) Data c) Processing d) Knowledge

46. A single entry in a table is called


a) Row b) Tuple c) Field d) All of the above

47. ODBC stands for


a) One data base b) Open data base c) oracle data d) Order data base
collection connectivity base connection connectivity

48. _______ refers to maximum numbers of relationship in an entity.


a) Generalization b) Ordinality c) Cardinality d) Aggregation

49. Candidate keys which are not currently selected as primary key is called _________
a) Super key b) Composite key c) Alternate key d) foreign key

50. In which file organization data are stored in chronological order?


a) Serial file b) Random/direct c) Sequential file d) ISAM
organization file organization organization
II Fill in the blanks choosing the appropriate word/words from those given in
brackets.
(Repeated answers will not be considered)
1. _______ is a collection of facts, figures, statistics. (Data)
2. __________ is processed data with some definite meaning. (Information)
3. A collection of logically related data organised in way that data can be easily
accessed managed and updated is called__________ (Database)
4. A single entry in table is called a __________ (Record or Row)
5. Records are also called the _________ (Tuple).

Prepared By: Sunil D N , KSVK PU COLLEGE , BANGALORE RURAL DIST.


6. Each column is identified by a distinct header called _________ (Attribute or field)
7. Set of values for an attribute in that column is called _______ (Domain).
8. A _________ is a software that allow creation, definition and manipulation of
database. (DBMS)
9. _________________ is a process of hiding unwanted or irrelevant details from the end
user. (Data abstraction)
10. People who require access to the database for querying updating and generating
reports is ___________ (End Users)
11. __________________ is an ability of a database to modify a schema definition at one
level without affecting a schema in the next higher level. (Data Independence)
12. Database architecture is logically divided into _________ types. (Three)
13. ____________ architecture is used for user interface program and application
programs that runs on client side. (Two-tier client/server)
14. ____________ data model is abstract model that describes how the data is
represented and used. (Data model)
15. The process of applying a data model theory to create a data model instance I
known as _____________ (data modelling)
16. ______________ is the process of organizing data in a database. (Normalization)
17. An _________ can be any object, place, person or class. (Entity)
18. An ___________ describes a property or characteristics of an entity. (Attribute)
19. A ____________ describes relation between entities. (Relationship)
20. A ____________ is any set of one or more columns whose combined values are
unique among all Occurrences. (Candidate key)
21. ___________ is a key that uniquely identify each record in a table. (Primary Key)
22. ____________ is a field in a relational table that matches the primary key column of
another table. (Foreign key)
23. Key that consists two or more attributes that uniquely identify an entity
occurrence is called ___________ (Composite Key)
24. The process of sharing data stored in database is _________among multiple users.
(data sharing)
25. __________is a process of analysing and picking out relevant information from data.
(Data Mining)
26. Data about data is _________. (Metadata)

Prepared By: Sunil D N , KSVK PU COLLEGE , BANGALORE RURAL DIST.


27. ___________is a set of values for an attribute in a column. (Domain)
28. An entry in a table is a __________. (Record)
29. Process of extracting knowledge from collected data is called _________ (data
mining)
30. ____________ is a repository of an organization electronically stored data. (Data
warehouse)
31. ____________ describes how the data is represented and used. (Data model)
32. __________ combines two lower-level entity of from higher level entity.
(Generalization)
33. Records are stored in chronological order in _____________(serial file
organization.
34. _________ refers to the minimum number of relationships in an entity.
(Cardinality)
35. The duplication of data is called ______________. (Data redundancy)
36. Ability of a database to modify a schema definition at one level without affected is
___________. (Data independence)
37. Data sharing database is easy because of ________________ (centralized data
management).
38. Collection of rows and column is called ______. (table)
39. __________ is a set of values for each column. (Primary Key).
40. __________ is a DBMS software. (Oracle)

************

Prepared By: Sunil D N , KSVK PU COLLEGE , BANGALORE RURAL DIST.


chapter 14: SQL commands
1. Which of the following attributes can be considered as a choice for primary key?
a) Name b) street c) Roll no d) subject

2. What is the full form of SQL?


a) Structured Query Language c) Simple Query Language?
b) Structured Query List d) none of these
3. What is the full form of DDL
a) Dynamic Data Language. c) Data Definition Language
b) Detailed Data Language d) Data derivation language
4. What does DML stand for?
a) Different Mode Level c) Data Mode Lane
b) Data Model Languahe d) Data Manipulation Language
5. Which of the following keywords will you use in the following query to display the unique
values of a column dept_name!
Select ____ dept_name from company:
a) ALL c) Distinct
b) From d) Name
6. The _____clause of select query allows us to select only those rows in the result satisfy a
specified condition.
a) where c) having
b) from d) like
7. Consider following SQL statement. What type of statement is this?
Select * from employee;
a) DML c) DCL
b)DDL d) Integrating constraint
8. The term ____is used to refer to a field in a table
a) Attribute c) Row
b) Tuple d) Instance
9. By default, ORDER by Clause lists the results in ____order
a) Descending c) Ascending
b) Any d) Both 1 and 3
10 . The ____keyword eliminates redundant data
a) SELECT c) DISTINCT
b) WHERE d) None of these
11. The____ _constraint provides a default value to column when the Insert into statement
does not provide a specific value.
a) DEFAULT c) CHECK
b) UNIQUE d) NOT NULL
12. The ______constraint ensure that all values in a column are distinct
a) DEFAULT b)UNIQUE c)CHECK d)NOT NULL
13. The ____constraint ensures that all values in a column satisfy certain condition
a)DEFAULT b)UNIQUE C) CHECK d) NOT NULL
14. --------- is used to identify each row in a table
a) FOREIGN KEY b) UNIQUE c)CHECK d) PRIMARY KEY
15. To delete some data from tables _____ command is used.
a) DELETE b) SELECT c) UPDATE d)DROP
16. The ____ command lets your drop a table from the database
a) DELETE b)SELECT c) UPDATE d) DROP
17. ____ key is non-key column of a table that draws its values from primary key of another
table (parent table)
a) FOREIGN KEY b) UNIQUE c)CHECK d)PRIMARY KEY

*****************************************
LAVANYA COMPOSITE PU COLLEGE (BB0127)
SRI RAMANANDA ASHRAAM, DODDABALLAPURA – 561203
BANGALORE RURAL DIST.,

CHAPTER 15 : COMPUTER NETWORKS


1) The full form of OSI is?
a. Operating System interface
b. Optical System interconnection
c. Operating System Internet
d. Open system interconnection
2) What is a HUB?
a. Software
b. Computing device
c. Network device
d. Calculating device
3) What does a set of rules define?
a. SMTP
b. FTP
c. IMAP
d. Protocol
4) Identify among the following which is mainly used to host web site.
a. Mail server
b. Webserver
c. Database server
d. None
5) Identify the full form of HTTP?
a. Hypertext Transfer Protocol
b. Hypertext Transfer Package
c. Hyper Transfer Text Package
d. Hyper Transfer Text Practice
6) Identify the protocol primarily used for browsing data.
a. FTP
b. TCP
c. TFTP
d. HTTP
7) Identify the first network which was based on TCP/IP protocol.
a. ARPANET
b. HUB
c. Ethernet Card
d. Router
8) What does TCP/IP stand for?
a. Telephone control protocol / Internet Protocol
b. Transmission control protocol/Internet protocol
c. Transmission control protocol/International protocol
d. None
9) The collection of hyperlinked documents on the internet known as?
a. HTML
b. Email
c. WWW
d. Internet
10) The location of a resource on the internet given by______
a. Email
b. IP
PREPARED BY: PADMA , LAVANYA COMPOSITE PUC, DBPUR, BANGALORE RURAL
c. Protocol
d. URL
11) Identify the incorrect network topology,
a. Bus
b. Star
c. P2P
d. Ring
12) What is the protocol used when the main server sends mail to another mail server?
a. FTP
b. SMTP
c. TCP/IP
d. MIME
13) Identify among the following network device used to connect two dis-similar types of
networks.
a. Switch
b. Hub
c. Bridge
d. Gateway
14) Identify the device used to boost up a weak signal.
a. Modem
b. Repeater
c. Switch
d. Router
15)The arrangement where all data pass through a central computer is known as
a. Ring topology
b. Mesh topology
c. Star topology
d. Bus topology
16)The device used in the network layer?
a. Application gateway
b. Switch
c. Router
d. Repeaters
17) Which of the following topology arrangements is a point-to-point line configuration?
a. Ring
b. Mesh
c. Star
d. All of the above
18)Identify the device which links two homogeneous packed broadcast local networks.
a. Hub
b. Router
c. Bridge
d. Gateway
19) What does LAN stand for?
a. Local Array Network
b. Local Area Network
c. Local Area Net
d. None
20) Identify the switching method in which the message is divided into small packets.
a. Virtual switching
PREPARED BY: PADMA , LAVANYA COMPOSITE PUC, DBPUR, BANGALORE RURAL
b. Packet switching
c. Message switching
d. None
21) Identify among the following servers which allow LAN users to share data.
a. Communication server
b. Point server
c. Data server
d. File server
22)The location of a resource on the internet is given by its?
a. Protocol
b. URL
c. E-mail address
d. ICQ
23)Which software prevents the external access to a system
a. Firewall
b. Gateway
c. Router
d. Virus checker
24)Which one of the following is the most common internet protocol?
a. HTML
b. NetBEUI
c. TCP/IP
d. IPX/SPX
25)The term FTP stands for?
a. File transfer program
b. File transmission protocol
c. File transfer protocol
d. File transfer protection
26)Which one of the following is not a network topology?
a. Star
b. Ring
c. Bus
d. Peer to Peer

27)The term WAN stands for?


a. Wide Area Net
b. Wide Access Network
c. Wide Area Network
d. Wide Access Net

28)The term MAN stand for?


a. Metropolitan Area Net
b. Metropolitan Area Network

PREPARED BY: PADMA , LAVANYA COMPOSITE PUC, DBPUR, BANGALORE RURAL


c. Metropolitan Array Network
d. Metropolitan Array Net
29)Which of the through share the data of two computer?
a. Library
b. Network
c. Grouping
d. Integrated system

30) It is a computer program deliberately created to damage data and hamper the
performance of the computer
a. System software
b. Application software
c. Utility software
d. Virus

31)Virus spread very fast through network and infected


a. Mind
b. Pen drives
c. Keyboard
d. Mouse
32)It infects program files as these have simple format t which virus can be attached
a. Program virus
b. Boot virus
c. Multipartite virus
d. None of these
33)The virus that affects the boot sector of the hard disk and infects the operating system which
make the hard disk completely useless
a. Program virus
b. Boot virus
c. Stealth virus
d. None of these
34)Which of these are harmful effects of virus
a. Damages data files
b. Increasing the size of files
c. Slowing down processing speed
d. All of the above
35)Computer software used to identify and remove computer virus
a. Anti virus
b. Computer virus
c. Trojan horse
d. Worms
36)Quickheal, Norton, Smartdog, Mcaffee are the examples of
a. ComputerVirus
b. Worms
c. Antivirus
d. Trojan horse
37)Abbrevation of SIM
a. Subscriber identity module
b. Supplier information management
PREPARED BY: PADMA , LAVANYA COMPOSITE PUC, DBPUR, BANGALORE RURAL
c. Singular information management
d. Source interlink media
38) How many forms in twisted pair cable?
a. 2
b. 4
c. 3
d. None
39)The following are the types in twisted pair cable.
a. Sheilded twisted pair
b. Unsheilded twisted pair
c. Both a and b
d. Twisted pair cable
40)UTP stands for…
a. unshielded transport pair cable
` b. unshielded twisted pair cable
c. unshielded transmission pair cable
d. unshielded twisted pair control
41)STP stands for…
a. shielded twisted pair cable
b. shielded twisted pair connectors
c. shielded transport pair cable
d. shielded transport pair connectors
42)How many types of coaxial cable?
a. 2
b. 3
c. 4
d. 5
43)Which of the following are coaxial cable types?
a. thinnet
b. thicknet
C. copper
D. A and B both
44)Thicknet can carry signal for_____meters.
a. 500m
b. 1000m
c. 100m
d. 200m
45)The maximum segment length of Thinnet coaxial cable is_________
a. 500 meters
b. 185 meters
c. 4 meters
d. None of the above
46)The main source in fiber optic communication?
a. light source
b. transmission medium
c. detector
d. all of the above

PREPARED BY: PADMA , LAVANYA COMPOSITE PUC, DBPUR, BANGALORE RURAL


47)The core of an optical fiber is_____.
a. glass
b. plastic
c. metal
d. A and B
48)Which of the following isn’t a type of transmission mode?
a. physical
b. simplex
c. full duplex
d. half duplex
49) In the__________ transmission mode, communication is unidirectional
a. Simplex
b. half duplex
c. full duplex
d. semi-duplex
50) A transmission mode that can transmit data in both the directions but only one direction at a
time.
a. simplex
b. half duplex
c. full duplex
d. semi-duplex
51)Telephone networks operate in this mode.
a. simplex
b. half duplex
c. full duplex
d. semi-duplex
52)A walkie-talkie operates in ____________
a. simplex
b. half duplex
c. full duplex
d. semi-duplex
53) The ______________ is an example for a simplex device
a. Repeater
b. Tap
c. Walkie talkie
d. Keyboard
54) In the ________ transmission mode each station can transmit but not at the same time
a. Simplex
b. Half duplex
c. full duplex
d. b and c
55) In the ________ transmission mode both station can transmit and receive at the same time
a.Simplex
b. Half duplex
c. full duplex
d. b and c

PREPARED BY: PADMA , LAVANYA COMPOSITE PUC, DBPUR, BANGALORE RURAL


56) A local telephone network is an example of a _______ network.
a. Packet switching
b. Circuit switching
c. Bit switched
d. Line switched
57) What is the meaning of MODEM
a. Modulator and demodulator
b. Modern electronic machine
c. Modern development machine
d. Machine and convertor
58) Which device is used for to send and receive data over telephone line
a. Router
b. Hub
c. Switch
d. Modem
59) What is the name for to convert digital signal to analog signal
a. Modulation
b. De modulation
c. Bypass
d. Encapsulation
60) An example for unshielded twisted pair cable(UTP) is____
a. cat1
b. cat2
c. cat3
d. All the above
61) example for guided media____
a. twisted pair wires, coaxial cables, and optical fiber cables
b radio wave
c. micro wave
d. all the above
62) example for unguided media______
a. microwave or radio links and infrared light and laser
b. twisted pair wires, coaxial cables, and optical fiber cables
c. both a and b
d. none of the above
63) The switching techniques are_________
a. circuit , message , and packet
b. simplex, half duplex and full duplex
c. both a and b
d. none of the above
*******

PREPARED BY: PADMA , LAVANYA COMPOSITE PUC, DBPUR, BANGALORE RURAL


SRI DEVARAJ URS PRE UNIVERSITY COLLEGE
Kodigehalli, DBPUR, Bangalore rural Dist.,
Chapter-16 INTERNET AND OPEN SOURCE CONCEPTS

1. OSS stands for

a) on system software b) open system software

c) open source software d) off system software

2. software whose source code is available to customers and it can be modified and
redistributed is called

a) freeware b) OSS c) FSF d) proprietary software

3. Software which is available free of cost , but it cannot be modified is

a) freeware b) OSS c) FSF d) proprietary software

4. ________ means the software which is freely accessible and can be freely used, changed,
improved, copied and redistributed. (OR)

A software and coding which is freely available on internet is

a) freeware b) free software

c) Open Source Software d) proprietary software

5. __________ is responsible for producing the software standards for world wide web
(WWW).

a) B2C b) W2C c) WWW d) W3C

6. The software that is neither open nor freely available is

a) freeware b) free software

c) Open Source Software d) proprietary software

7. FSF stands for

a) free software foundation b) friend software foundation

c) federation of software for free d) free system federation

8. OSI stands for

Prepared by :Jyothi.B , SDUPUC, DBPUR Bangalore Rural Dist.


a) over source initiative b) open source initiative

c) open source of India d) open system initiative

9. ________ is a set of protocols that allows to access any document on the net through URLs.

a) WWW b) HTML c) TCP/IP d) open source

10. _________ is an internet utility used earlier to log on to remote computers.

a) web b) browser c) server d) Telnet

11. __________ navigates through the world wide web and displays web pages.

a) web server b) web browser c) shareware d) software

12. __________ responds to the requests made by web browsers.

a) web server b) web browser c) shareware d) software

13. The documents residing on web sites are called ____________

a) web browsers b) web pages c) web server d) web

14. URL stands for_____

a) Universal reformation level b) uniform resource locator

c) uniform resource level d) uniform remote locator

15. ____________ is the trade of goods and services with the help of telecommunications and
internet.

a) E-commerce b) computerized commerce

c) E-trade d) Internet trade

16. Which of the following is not a service/technology of E-commerce?

a) E-mail

b) Electronic fund transfer (EFT)

c) Electronic Benefit transfer (EBT)

Prepared by :Jyothi.B , SDUPUC, DBPUR Bangalore Rural Dist.


d) FSF

17. Which of the following is not a criteria for OSS?

a) FLOSS b) free redistribution

c) source code available d) distribution of license

18. Which of the following is not a type of E-commerce?

a) B2B b) C2B c) C2C d) C2D

19. IPR stands for

a) internet protocol rights b) international property rights

c) intellectual property rights d) Indian property rights

20)A shareware software is one in which the___

a) source code is not available

b) Modifications to the software is not allowed

c) Both a and b

d)Any one above

21) A FLOSS refers to ____ and ____

a) Free libre and open source software and both free software and open source software

b)Freelirve and open source software and both free software and open source software

c) Both a and b

d) only a is correct

22). Expand W3C_____

a) World wide web Consortium

b)it is world wide web

c) wide three consortium

d) None of the above

Prepared by :Jyothi.B , SDUPUC, DBPUR Bangalore Rural Dist.


23)._______ are founders OSI.

a) Bruce Perens and Erics Raymond

b) timmberners lee

c) Richard Stallman

d) All the above

24). The founder of FSF or Free Software Foundation is ____

a) Richard Stallman

b) Bruce perens and Erics Raymond

c) Tim berners Lee

d) None of the above

25). The HTTP (hyper text transfer protocol )is used to request and send a document over
the _____

a) Internet

b) Telnet

c)Browsers

d) servers

26). E-Commerce means___

a) The trade of goods and services through Internet

b)Email

c) Digital cash

d) all the above

27). An example for E-commerce service is______

a) email

b)Bulletin Boards

Prepared by :Jyothi.B , SDUPUC, DBPUR Bangalore Rural Dist.


c) digital cash

d)All the above

28). An Advantage of E-commerce is ____

a) Gobal participation

b) Improved market Intelligence and strategic planning

c) optimization of resources

d) All the above

29)IPR related issues in India like patents trademarks, copyright, designs and geographical
indications are governed by the __________-

a) patent Act 1970 and patent Rules 2003

b) Trademark Act 1999 and the Trademarks Rules 2002

c) Indian copyright Act 1957, design act 2000 and rules 2001

d) all the above

30) The domain Id’s .co and .mil are affiliation for ____and ____ respectively

a) commerce and mills

b) company and military

c)commercial and military

d) all the above

*****

Prepared by :Jyothi.B , SDUPUC, DBPUR Bangalore Rural Dist.


Jgpuc, Bangalore

chapter 17 - Web designing

1. Html tags are surrounded by……………


a. Angle bracket c. Flower bracket
b. Braces d. Brackets
2. Take out the odd one
a. <br> b.<hr> c.<img> d.<ol>
3. The tag which encloses an entire html document
a. Html b. Head c. Title d. body
4. The tag which is having heading information
a. Html b. Head c. Title d. body
5. …………….tag is used to insert the title
a. Html b. Head c. H1 d. title
6. ………………tag is used to adding the document contents
a. <body> b. <title> c.<html> d.<li>
7. The tag which is not executable by html
a. Comment b. Html c.body d. p
8. <h3>describes a …level of heading
a. First b.second c. Third d. Fourth
9. The tag which display the bullets
a. <ul> b.<ol> c. <br> d.<p>
10. The tag which display the number listing.
a. <ul> b.<ol> c. <br> d.<p>
11. The tag which describes the paragraph
a. Html b. Head c. P d.h2
12. Take out the odd one
a. Adobe reader c. Microsoft expression web
b. Coffeecup html d. notepad
13. The html program should save with
a. .html b. html. C./html d.:html
14. The tag which link the address
a. <a> b.<br> c.<img> d.<hr>
15. Html forms contains
a. Text fields b. Checkboxes c. Radio buttons d. All the above
16. The tag which breaks the line
a. <a> b.<br> c.<img> d.<hr>
17. The tag which is used to create the table

Prepared by :Chaithra G , Jgpuc , bangalore


a. Table tag b. Tabel tag c. <td> d. <hr>
18. The tag which is used to create the table row
a. <tr> b.<br> c.<td> d.<hr>
19. ………….tag used to create the table data
a. <tr> b.<br> c.<td> d.<hr>

20. ………….defines set of frames

a. <frameset> b. <frame> c.<form> d. <input>

21. ………………creates the individual frame

A. <frameset> b. <frame> c.<form> d. <input>

22. ………………defines an input control

A. <input> b.<frame> c.<frameset> d.<output>

23. The format of text fields <input type=”text”>

24.The format of password fields <input type=”password”>

25. The format of radio button <input type=”radio”>

26.the format of check box is <input type=”checkbox”>

27.the format of submit button is <input type=”submit”>

28.textarea defines a multiline input control

29. label defines a label for an <input>element

30. option defines an option in a drop down list

31. xml stands for extensible mark up language

32. Xml tags are case sensitive

33. Html is the mother tongue of the browser

34. Father of html is tim bernars li

35. expand DHTML Dynamic Hyper text markup language

********************************

Prepared by :Chaithra G , Jgpuc , bangalore


KARNATAKA STATE PRE-UNIVERSITY EDUCATION
II PU Computer Science Blueprint
VSA SA LA E Total
UNIT DESCRIPTION
(1 Mark) (2 Marks) (3 Marks) (5 Marks) Marks
Typical
Chapter 1
configuration of ------ 1 ------- 4
5 Hrs 1(mcq)
Computer system
Chapter 2
Boolean algebra 1(mcq) 2 ----- 1 09+1
10 Hrs
Chapter 3
Logic Gates 1(mcq) ------ 1 ------- 04
5 Hrs
Chapter 4
Data structures 1(mcq) ------ 1 2 14
15 Hrs
Chapter 5 Review of C++ covered in
First PUC ------- ------- ------- ------ ----
3 Hrs
Chapter 6
OOP concepts ---- 1 ---- 1 07
4 Hrs
Chapter 7
Classes and objects 1(mcq) ------ ----- 1 06
6 Hrs
Chapter 8 Function
1(mcq) ------ ------ 1 05+1
3 Hrs Overloading
Chapter 9 Constructors and
1(mcq) 1 ---- 1 07+1
8 Hrs Destructors
Chapter 10
Inheritance 1(mcq) ----- ------ 1 05+1
8 Hrs
Chapter 11
Pointers 1(mcq) ----- 1 ------ 04
7 Hrs
Chapter 12
Data File handling ------- 1 1 ------ 05
6 Hrs
1(mcq)
Chapter 13
Database concepts 5x1-Fill-in 1 1 1 11+5
8 Hrs
blank
Chapter 14
SQL commands 1(mcq) 1 ----- 1 07+1
12 Hrs
Chapter 15 Networking
2(mcq) 1 ---- 1 9
10 Hrs Concepts
Chapter 16 Internet and Open
1(mcq) ---- 1 ----- 4
5 Hrs source concepts
Chapter 17
Web Designing 1(mcq) ----- 1 ------ 4
5 Hrs
Total Marks 10+10 16 24 55 115
Total No of
Questions to be 1x20=20 2x4/8=08 3x4/8=12 5x6/11=30 70/47
answered

NOTE: 1. Questions should be direct


2. The answers should be present in the prescribed textbook by PUE
3. 40% - Simple, 40% - Average and 20% - Difficult questions
4. Questions should be according to Blueprint
II PU COMPUTER SCIENCE – MODEL PAPER

PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20

I Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which among the following is the fastest memory in a computer that holds information?
a) Register b) Cache
c) Main memory d) RAM
2. The other name of Boolean algebra is _____________
a) Switching algebra b) Relational Algebra
c) Digital Algebra d) None of the above
3. The other name of NOT gate is ___________
a) Neglect gate b) Inverter gate
c) XOR gate d) XNOR gate
4. The data structure that allows the insertion, as well as the deletion from both the ends, are:
a) String b) Linked List data structure
c) Stack data structure d) Dequeue data structure
5. What is the other name used for functions inside a class?
a) Member variables b) Member functions
c) Class functions d) Class variables
6. Function cannot be overloaded when ________________
a) Function names are same b) Number of parameters are different
c) Number of parameters are same d) Data types of parameters are different
7. The symbol used with constructor is ________
a) $ b) &
c) Delta c) ~
8. Base class is ___________
a) a sub class b) inherited class
c) Main class d) First class
9. Which of the following is the correct way to declare a pointer?
a) int *ptr b) int ptr
c) int &ptr d) All of the above
10. ____________ is called information.
a) Raw fact b) collection of data
c) Unprocessed data d) Processed data
11. SQL is _______________________.
a) Theoretical Language b) Procedural Language
c) Structured Language d) Unstructured Language
-2-
12. FTP stands for _______________
a) Final Transistor Protocol b) File Transformation Protocol
c) File Transfer Protocol d) File Transaction Protocol
13. Which of the following is not a type of network?
a) LAN b) MAN
c) PAN d) VAN
14. A software and coding which is freely available on internet is ______________.
a) Community Software b) Free Software
c) Open-Source Software d) Unlicensed Software
15. HTML stands for ____________________________________
a) Hyper Text Makeup Language b) Hyper Text Markup Language
c) Hyper Text Marking Language d) Hyper Text Marker Language
II Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)
16. Collection of rows and columns is called as ___________
17. ___________ is a collection of interrelated data.
18. Data duplication is called as ____________________.
19. _____________is a software for creating and managing databases.
20. Protection of data is the _________________.

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove ̿X = X.
22. Define tautology and fallacy.
23. What is encapsulation? Give an example.
24. What is destructor? Give example for destructor.
25. Mention any two functions of ifstream and give their meaning.
26. Give any two advantages of database system.
27. Give the syntax and example for INSERT command in SQL.
28. Briefly explain circuit switching.
-3-
PART – C

Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12


29. Briefly explain any three types of mother board.
30. Write the logic diagram and the truth table for XOR gate.
31. Give the memory representation of stack data structure.
32. Mention any three advantages of pointers.
33. What is a data file? Differentiate between text and binary files.
34. Give the meaning for any three components of E-R diagram.
35. What is e-commerce? Explain any one type of e-commerce.
36. Explain any three table tags in HTML.
PART – D

Answer any SIX questions. Each question carries five marks. 5 x 6 = 30


37. Give the Boolean function F(A,B,C,D) = Σ(0,2,5,7,8,10,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any five operations performed on primitive data structure.
39. Write an algorithm to delete a data element from an array.
40. Give the differences between procedural programming and object-oriented programming.
41. With an example explain member function inside the class definition.
42. What is a friend function? Mention the characteristics of a friend function.
43. What is a parameterized constructor? Mention the advantages of parameterized constructor.
44. What is inheritance? Explain any two types of inheritance.
45. Differentiate between manual and electronic data processing.
46. Explain CREATE and UPDATE commands in SQL.
47. Explain the following:
i. SMS ii. E-mail iii. Voice mail iv. Chat v. Video conference

*****
Annual Examination-2023
Model Question Paper-II
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. CPU’s working memory is __________
a) Cache memory b) Register
c) Primary memory d) Secondary memory
2. Minterm of ̅X ̅Y = ________
a) m3 b) m2
c) m1 d) m0
3. The standard symbol represnts_____________
a) OR gate b)AND gate
c) NAND gate d) NOR gate
4. ________________ is an example for non-primitive data structure
a) Integer b) Float
c) Stack d) Pointer
5. Which access specifier is implicitly used in class?
a) Private b) Public
c) Protected d) Friend
6. _________ is although not a member function has full access right to the private and
protected members of the class.
a) Overloaded function b) Inline function
c) Friend function d) Recursive function
7. In constructor, declaration of an object is followed by assignment operator, constructor
name and argument list enclosed in parenthesis is___________
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. The class that inherits properties from another class is_____________
a) Base class b) Derived class
c) Virtual class d) Abstract class
9. Which of the following is the address operator?
a) :: b) .
c) * d) &
10. Set of values for an attribute in that table is ______________
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DDL command:
a) Create b) Alter
Prepared by: Ramachandra
c) Drop d) Delete
12. A hardware device used to connect several computers together is__________
a) Router b) Bridge
c) Switch d) Hub
13. CDMA stands for _______________
a) Code Data Multiple Access
b) Code Division Multiple Access
c) Common Division Multiple Access
d) Common Data Multiple Access
14. The Software that is neither open nor freely available is called is ________
a) Free software b) Freeware
c) Proprietary software d) Open source software
15. _________ is a text-based markup language.
a) HTML b) XML
c) DHTML d) PHP

II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered)
(ISAM, Database, Data mining, Key, Schema)
16. __________ is a collection of logically related data organized in a way that data can
be easily accessed, managed & updated.
17. ________is a set of one or more columns whose combined values are unique among
all occurrences in a given table.
18. __________is the hybrid between sequential and direct access file organization.
19. Database objects that contain data govern or perform operation on data is __________
20. A technique which is concerned with the analysis & picking out relevant information
is called ___________

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X
22.State De Morgan’s theorems.
23. Write a note on polymorphism. Give an example.
24. Write any two features of parameterized constructors.
25. Differentiate between seekg( ) and seekp( ).
26. What is a candidate key & alternate key (secondary key)?
27. Write the syntax & example for alter command.
28. List the different applications of networking.

Prepared by: Ramachandra


PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12 29.
Explain the different types of Motherboard.

30. Write the logic diagram and the truth table for XOR gate.
31. What are the advantages of arrays?
32. What is a pointer? Give the declaration and initialization of a pointer.
33. Mention different operations basic operation on binary file in C++.
34. Explain any three data types supported by DBMS.
35. Explain the technologies & services used in e-commerce.
36. What is web scripting? Mention the types.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
Boolean function F(A, B, C, D)= Σ(0,3,4,6,8,9,10,11,12,14).

Reduce the function F using K-map.


38. Explain the different operations performed on queue.
39. Write an algorithm to search an element in an array using binary search.
40. Write the advantages of object-oriented programming (OOP).
41. Explain how objects of a class can be defined with suitable example.
42. Explain inline functions with syntax and example.
43. Explain default constructor with syntax and example.
44. What is inheritance? Briefly explain multilevel and multiple inheritance.
45. Explain the applications of database system.
46. Explain any five character (text) built-in functions in SQL.
47. What is compute virus? Write the symptoms (characteristics) of computer

***********
Annual Examination-2023
Model Question Paper-III
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The CPU is fabricated as a single Integrated Circuit (IC) chip and isis __________
a) Motherboard b) Microprocessor
c) Register d) Circuit board
̅ ̅

2. Maxterm of X + Y +Z
= ________
a) M3 b) M2
c) M1 d) M0
3. Standard symbol for XOR gate is _____________
a) + b) +
c) . d) x
4. ________________ is an ordered collection of items where the addition of new
items and the removal of an existing item always takes place at the same end.
a) Queue b) Linked list
c) Stack d) Tree
5. ________________ operator is used to define the member function outside the class.
a) . b) ::
c) * d) &
6. Function Overloading is also known as_________________
a) Compile time polymorphism b) Run time polymorphism.
c) Compile time encapsulation d) Run time encapsulation
7. In constructor, the declaration of the object is followed by argument list enclosed in
parentheses.
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. ________class prevent multiple copies of the base class being present in an
object derived from those objects.
a) Base class b) Derived class
c) Virtual base class d) Abstract class
9. ________is the collection of addresses.
a) Array of objects b) Array of address
c) Array of variables d) Array of pointers
10. A single entry in a table is ______________
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DML command:
Prepared by: Ramachandra
a) Create b) Insert
c) Update d) Delete
12. __________ is an example for half duplex communication mode.
a) Radio b) Television
c) Walkie-Talkie d) Modern telephone system
13. _______________ is consists of a central node to which all other nodes are connected
by a single path.
a) Bus topology b) Star topology.
c) Ring topology d) Tree topology
14. URL stands for______________
a) Unique Resource Location b) Uniform Resource Location
c) Unique Resource Locator d) Uniform Resource Locator
15. _________ refers to web content that changes each time it is viewed
a) HTML b) XML
c) DHTML d) PHP

II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered
(Physical data independence, Hierarchical data model, DBMS,
One-tier architecture, ER Diagram)
16. __________ allows creation, definition & manipulation of database.
17. ________is a visual representation of data that describes how data is related to
each other.
18. __________is an ability of a database to modify a schema definition at internal level
without affecting a schema in the next level.
19. ___________ organizes the data in a tree like structure in which each child node can
have only one parent node.
20. In_______________, DBMS is the only entity where user directly sits on DBMS &
uses it.

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that 1 + X = 1 using proof by perfect induction method.
22. Write any two basic postulates of Boolean algebra.
23. Write the disadvantages of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Differentiate between tellg( ) and tellp( ).
26. What is the difference between serial & direct access file organization?
27. Write the syntax & example for drop command.
28. List the goals for networking.

Prepared by: Ramachandra


PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is a port? Explain serial port.
30. Write the logic diagram and the truth table for NAND gate.
31. What are the disadvantages of an arrays?
32. What is static memory allocation? Explain.
33. Mention the types of file. Explain any one.
34. Explain any three database users.
35. What are the advantages of e-commerce?
36. What is web hosting? Mention different types of web hosting.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= Σ(0, 4, 8, 9, 10, 11, 12, 13,
15) Reduce the function F using K-map.
38. Define: a. Root Node b. Leaf Node c. Height d. Depth e. Internal node.
39. Write an algorithm to insert a data element at the rear end of the queue.
40. Write a difference between procedural oriented programming & object-oriented
programming (OOP).
41. Explain the class definition and declaration with syntax and example.
42. Define an inline function. Write the advantages & disadvantages of inline functions.
43. What is copy constructor? Explain with programming example.
44. What is single level inheritance? Explain with programming example.
45. Give the difference between manual & electronic file systems.
46. Explain the data types used in SQL.
47. Explain any five networking devices.

***********

Prepared by: Ramachandra


Annual Examination-2023
Model Question Paper-IV
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The parallel port can transfer ___________ bit of data at a time.
a) 1 b) 4
c) 8 d) 16
2. The X+XY = X is ________
a) Associative Law b) Involution law
c) Complementarity law d) Absorption Law
3. A logic gate with only one input signal and one output signal but the output state is
always opposite of the input state is _____________
a) AND gate b) OR gate
c) NOT gate d) NOR gate
4. ________________ is an example for linear data structure.
a) Integer b) Linked list
c) Graph. d) Tree
5. ________________ is an instance of a class.
a) Access specifiers b) Data members
c) Member functions d) Objects
6. The___________functions are compact function calls.
a) Overloaded b) Inline
c) Friend d) All of the above
7. The constructor must be declaring in _____________ section.
a) Private b) Public
c) Protected d) None of the above
8. ___________ is one that is not used to create objects.
a) Sub class b) Derived class
c) Virtual class d) Abstract class
9. __________operation can be performed on pointers.
a) Addition of two pointers
b) We can subtract one pointer from another pointer if both point to
the same array.
c) Subtraction of one pointer from another pointer when they do not point
to the same array.
d) Multiplication of two pointers
10. ____________is a field in a one table that uniquely identifies the row of another table.

Prepared by: Ramachandra


a) Primary key b) Foreign key
c) Candidate key d) Alternate key
11. Which command is used to modify an existing record in SQL?
a) Update b) Change
c) Modify d) Alter
12. A device that connects dissimilar networks is__________
a) Router b) Bridge
c) Gateway d) Hub
13. HTTP stands for________________
a) Hypertext Transistor Protocol b) Hypertext Transfer Protocol
c) Hypertest Transistor Protocol d) Hypertest Transfer Protocol
14. ________ navigates though the world wide web(www) and displays web pages
a) Web browser b) Website
c) Web server d) URL
15. _________ tag is used to create hyperlink.
a)<li> b) <a>
c) <h1> d) <b>

II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered)
(Specialization, Metadata, Data integrity, Attribute, Relational data model)
16. Each column is identified by a distinct header is called________________
17. ________ refers to the validity of data & it can be compromised in a number of ways
18. In _______________, there are no physical links.
19. __________ is a top down approach in which one higher level entity can be broken
down into two lower level entities.
20. ___________ is used to inform operators and uses of the data warehouses about
its status.

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X
22. What is minterm and maxterm?
23. Write any two applications of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Mention the methods of opening file within C++ .
26. Mention the types of data independence.
27. Give the difference between char and varchar datatypes in SQL.
28. Name the different types of twisted pair cable.

PART – C
Prepared by: Ramachandra
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain the characteristics of motherboard.
30. Write the logic diagram and the truth table for OR gate.
31. What are the applications of an arrays?
32. What is array of pointers? Give an example.
33. Differentiate between ifstream class and ofstream class.
34. Give the different notations for E-R diagram
35. Write any three criteria of open source software.
36. Give the features of DHTML?

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= m0 + m1 + m2 + m3 + m4 + m5 + m8 + m9
+ m10 + m11 + m13 + m15. Reduce the function F using K-map.
38. What is primitive data structure? Explain the different operations performed on
primitive data structure.
39. Write an algorithm to search an element in an array using linear search method.
40. Explain the different characteristics of OOP.
41. Explain how do we define member function inside the class definition. Give
example.
42. Explain friend functions with example.
43. What is copy constructor? Explain with programming example.
44. What is visibility mode? What is its role with respect to inheritance?
45. Explain ISAM with example.
46. What is data definition language? Explain create and select commands in SQL.
47. Explain the applications of networking?

***********

Prepared by: Ramachandra


Annual Examination-2023
Model Question Paper-I
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. A slot which is used to connect modem and input devices is __________
a) AGP slot b) PCI slot
c) ISA slot d) Processor slot
2. According to Boolean law: X + 1 = ________
a) 0 b) 1
̅

c) X d) X

3. Universal gates are:


a) AND and OR b)NAND and NOR
c) XOR and XNOR d) None
4. A queue follows:
a) LIFO b) FIFO
c) Linear tree d) Ordered array
5. Data members are accessed only by the member functions, friends of the class and
also by the member functions derived from this class is__________
a) Private b) Public
c) Protected d) Friend
6. The inline function may not work some times for one of the following reasons:
a) The inline function definition is too long or too complicated
b) The inline function is recursive
c) The inline function has looping constructs
d) All of the above
7. A constructor that accepts __________ parameters is called the default constructor.
a) No b) One
c) Two d) Three
8. The class whose properties are inherited by another class is_____________
a) Base class b) Derived class
c) Virtual class d) Abstract class
9. Which of the following is the pointer operator?
a) :: b) .
c) * d) &
10. Each column is identified by a distinct header is ______________
a) Tuple b) Entity
c) Attribute d) Domain
11. Which command is used to modify an existing table in SQL?
Prepared by: Ramachandra
a) Update b) Change
c) Modify d) Alter
12. A set of rules and guidelines for communicating data is__________
a) Protocol b) Packet
c) Data gram d) Data channel
13. TCP/IP stands for _______________
a) Telephone control protocol/Internet protocol
b) Transmission control protocol/Internet protocol
c) Telephone control protocol/ International protocol
d) Transmission control protocol/International protocol
14. The software whose source code is available to customers and it can be modified
and redistributed without any limitations is ________
a) Free software b) Freeware
c) Shareware d) Open source software
15. _________provides an object-oriented view of a Web page and its elements.
a) HTML b) XML
c) DHTML d) PHP

II.Fill in the blanks choosing the appropriate word/words from those given
in brackets. (Repeated answers will not be considered)
(Domain, Normalization, Aggregration, Data warehouse, Data processing)
16. __________ is series of actions or operations from input data to generate outputs.
17.Set of values for an attribute in that table is called as___________
18. A process when relation between two entities is treated as a single entity is
called___________
19. The process of organizing the data in a database is called__________
20. A repository of an organization’s electronically stored data is called ___________

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that XY+̅XY=X.
22.State the principles of duality theorems.
23.Explain data encapsulation.
24.What is a destructor? Give its syntax.
25.Write the member functions belonging to ifstream class.
26.Define primary key & foreign key.
27.Write the syntax & example for delete command.
28.Explain simplex communication mode.

Prepared by: Ramachandra


PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain cache memory.
30. Write the logic diagram and the truth table for AND gate.
31. Write the memory representation two-dimensional arrays in row-major order.
32. What are the advantages of pointer?
33. Explain any three file modes.
34. Explain any three components of E-R diagram.
35. What is e-commerce? Explain types of e-commerce.
36. Explain the structure of HTML.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
Boolean function F(A, B, C, D)=Σ(0,1,2,3,4,5,6,7,8,9,10,11).

Reduce the function F using K-map.


38. Explain the different operations performed on linear data structure.
39. Write an algorithm for push and pop operation in stack using array.
40. Write the applications of object oriented programming (OOP).
41. Explain the member functions outside a class with an example.
42. Discuss overloaded functions with syntax and example.
43. What is a constructor? Write the rules for writing a constructor function.
44. What is inheritance? What are the advantages of inheritance?
45. Explain the features of database system.
46. Explain the various group functions in SQL.
47. What is network? Mention different network goals.

***********

Prepared by: Ramachandra

You might also like