You are on page 1of 54

Chapter1 :TYPICAL CONFIGURATION OF COMPUTER SYSTEM

1. is directly accessed and manipulated by the CPU during program execution


a. RAM b. Cache
c. Primary memory d. Registers
2. is known as CPU’s working memory
a. Cache b. Primary Memory
c. Register d. secondary memory
3. is referenced by the CPU without address.
a. RAM b. Primary Memory
c. hard disk c. Registers
4. Which component of computer co-ordinates overall functioning of the computer.
a. ALU b. CU
c. Registers c. North Bridge
5. The primary memory of a computer consists of
a. Only RAM b. Only ROM
c. Both a and b d. Flash drives
6. Which of the following is not a secondary memory
a. Magnetic Tape b. Hard disk
c. Optical Disk d. Cache memory
7. is a large printed circuit board having many chips, ports, controllers and otherelectronic components
mounted on it
a. Integrated Circuit b. Motherboard
c. Chip set d. Firewire
8. Which among the following are characteristics of motherboard?
a. only form factor b. only Chip set c. Only Processor Socket d. All of these
9. form factor refers to
a. Geometry b. Electrical requirements
c. Dimensions d. All of these
10. characteristic of motherboard should be considered to maximize thecomputers upgradability.
a. Form Factor b. Chip set
c. Processor socket d. All from (a) to (c)
11. Which of the following motherboard is old model mother board
a. AT b. ATX
c. XT d. Baby AT
12. Which of the following motherboard has no ports
a. AT b. ATX
c. XT d. Baby AT

13. Pentium -I, Pentium-II and Pentium – MMX processors used in type ofmotherboards
a. AT b. ATX
c. XT d. Baby AT
14. Pentium -III Processors are used in type of motherboards
a. ET b. ATX
c. XT d. Baby AT
15. Both Pentium III and Pentium IV processors are supported by motherboards
a. XT b. AT
c. Baby AT d. ATX
16. Processors supported by ATX mother board are
a. Only Pentium-IV, Dual Core
b. Only Dual Core and Core 2 Duo
c. Quad Core, i3, i5 and i7
d. All of the above
17. Which among the following motherboards have slot type and PGA type processorsockets
a. ATX motherboard
b. Baby AT motherboard
c. XT motherboard
d. AT motherboard
18. Choose the component not present in Baby AT motherboard
a. Slot type processor sockets and PGA processor sockets
b. SDRAM slots and DDRRAM slots
c. PCI slots and ISA slots
d. AGP slots
19. Which one of the following has 24-pin Power connector
a. AT motherboard
b. Baby AT motherboard
c. XT motherboard
d. ATX motherboard
20. XT motherboard has power pin connectors
a. 24 b. 12 c. 20 d. 20 and 24
21. MPGA processor sockets are found in type of motherboards
a. Baby AT b. ATX c. AT c. XT
22. Choose the very old motherboard model from the following
a. ATX b. XT c. Baby AT d. AT
23. Which of the following motherboard type consists of SATA connectors
a. AT motherboard
b. Baby AT motherboard
c. ATX motherboard
d. XT motherboard
24. One of the following is the main component of the motherboard
a. BUS b. BIOS c. CMOS d. Processor
25 ------------------ is the frequency with which a processor executes instructions.
a. Bus speed b. Clock speed
c. MHz d. GHz
26. The computers operating speed is linked to the speed of -------------
a. BUS b. Memory access
c. System Clock d. North Bridge
27. CPU’s performance is measured by the per second
a. Number of instructions decoded
b. Number of instructions loaded
c. Number of instructions executed
d. Number of programs executed
28. CPU is fabricated on a single IC chip is known as--------------
a. Multiprocessor c. graphic processor
b. Microprocessor d. microcomputer
29. _________establishes a communication path for movement of data between processor and memory
a. Cache b. Bus c. motherboard d. North Bridge
30. Which one of the following is the alternative name for North Bridge
a. Host Bridge b. south chipset
c. North Chipset d. Both (a) and (c) are correct
31. is responsible for control of high speed components like CPU, RAM and video card
a. South chipset b. south bridge
c. North Chipset d. Both (a) and (b)

32. is responsible for control of slower components.


a. South chipset b. north bridge
c. North Chipset d. Both (a) and (c)
33. The most common motherboard standard for desktop computers
a. AT b. ATX c. XT d. Baby ATX
34. Identify the devices which are not managed by North Bridge
a. RAM b. CPU
c. Video cards d. CD ROM drive
35. chipset manages data communication between low speed components
a. North Bridge b. South Bridge
c. IDE c. SATA
36. Which of the following performs POST
a. CMOS b. BIOS
c. Control unit d. ALU
37. Identify operation which are not part of BIOS
a. Holds instructions to load hardware settings
b. Performing POST
c. Invoking bootstrap loader
d. Storing date and time
38. Invoking boostrap loader is done by
a. BIOS b. CMOS
c. SMPS d. South Bridge
39. BIOS stand for
a. Basic input output system b. boot input output system
c. basic internal output system d. boot internal output system
39 is a type of memory chip to store the date, time and system setup parameters.
a. BIOS b. CMOS c. RAM d. ROM
40. BIOS and CMOS are powered by battery kept on the motherboard
a. Lithium Ion b. Sodium Ion c. Magnesium ion d Silicon Ion
41. PC cards are used in_______computers
a. Desktop b. Mini c. Smart Phones d. Laptop
42. is used to connect modem and input devices
a. ISA b. PCI c. AGP d. PCI Express
43. is used to connect graphic accelerator cards , sound cards, internal modems or scsicards
a. ISA b. PCI c. AGP d. PCI Express
42 Which among the following bus is the fastest
a. ISA b. PCI c. AGP d. PCI Express
43. Which one of the following is correct with respect to original Pentium motherboard toinstall memory
a. It has two 72-pin SIMM slots or one 168-pin DIMM slots
b. It has only four 72-pin SIMM slots
c. It has only two 168-pin DIMM slots
d. It has four 72-pin SIMM slots or two 168-pin DIMM slots
44. Disk controller is a circuit that enables communication between CPU and
a. Hard Disk b. Floppy Disk c. Any External disk drive d. All of the above
46. is a plug and play interface
a. Serial port b. parallel port c. USB d. AGP port

47. Number of devices supported in USB is -------------------


a. 64 b. 127 c. 128 d. 63
48. What is the basic speed of USB ------------
a. 12 Mbps b. 8 Mbps c.16 Mbps d. 32 Mbps
49. is the interface that directs and controls reading and writing to a computer’sfloppy disk
drive(FDD)
a. Hard Disk b)Floppy Disk controller c) Any External disk drive d)All of the above
50. are used to connect external device like printers keyboard or scanners to computer
a. ISA b. Ports and interfaces
c. AGP d. PCI Express
51. are used to connect communication devices.
a. Serial port b. parallel port c. USB d. AGP port
52. needs a single wire to transmit I bit of data
a. Serial port b. parallel port c. USB d. AGP port
53. are used to connect external input/output devices like printers or scanners
a. Serial port b. parallel port c. USB d. AGP port
54. CD-ROM drives or hard disk drives are connected to the motherboard through
a. Serial port b. parallel port c. USB d. IDE port
55. ports are also called as mouse ports
a. Serial port b. parallel port c. PS-2 port d. AGP port
56. port uses synchronous serial signals to communicate between the keyboard and amouse to the computer
a. Serial port b. parallel port c. PS-2 port d. AGP port
57. is used to connect to graphic card.
a. Serial port b. parallel port c. PS-2 port d. AGP port
58. port is used for adding external devices such as high speed hard disks, high endscanners CD-ROM drives
a. Serial port b. SCSI c. PS-2 port d. AGP port
59. connects monitor to computers video card
a. VGA b. parallel port c. PS-2 port d. AGP port
60. transfer large amount of data at very fast speed and connects camcorders andvideo equipment.
a. Serial port b. parallel port c. firewire port d. AGP port
61. connects PC’s modem to telephone network
a. Serial port b. parallel port c. modem d. AGP port
62. connects to a network and high speed internet and network cable to computer
a. Serial port b. ethernet port c. PS-2 port d. AGP port
63. are used to connect microphone, speakers to sound card.
a. Serial port b. parallel port c. sockets d. AGP port
64. is designed to transmit information between electronic musical instruments
a. Serial port b. MIDI c. PS-2 port d. AGP port
65. The different components of computer are connected to each other through
a. BUS b. CMOS c. BIOS d. South Bridge
66. connects major computer components like processor, memory and I/O
a. Internal bus b. external bus c. both a and b d. expansion bus
67. connects the different external devices , peripherals, slots ports to rest of computer
a. Internal bus b. external bus c. both a and b d. system bus
68. System bus and expansion bus consists of
a. data bus b. address bus c. control bus d. all of these
69. provides a path to transfer data between CPU and Memory
a. data bus b. address bus c. control bus d. all of these
70. connects CPU and RAM
a. data bus b. address bus c. control bus d. all of these
71. is used to control the access to and he use of the data and address line
a. data bus b. address bus c. control bus d. all of these
72. is referred to the electronic storing space for instructions and data
a. BIOS b. BUS c. CMOS d. memeory
73. includes registers, cache memory and primary memory
a. Internal memory b. secondary memory c. permanent memory d. main memory
74. works under the direction of CU to accepts, store and transfer instructions or dataand performs
arithmetic and logical comparisons at high speed.
a. BIOS b. BUS c. Cache d. register
75. is the high speed memory placed in between RAM and CPU
a. Secondary memory b. primary memory c. Cache d. register
76. stores the data that is used more often, temporarily and makes it available to CPU at fast rate.
a. Secondary memory b. primary memory c. Cache d. register
77. is also known as main memory
a. Secondary memory b. primary memory c. Cache d. register
78. has to be refreshed continuously to store information
a. SRAM b. primary memory c. DRAM d. register
79. RAM is synchronized to system clock
a. DDR-DRAM b. SRAM c. DRAM d. SDRAM
80. Access speed of SRAM ranges upto
a. 2 to 10ns b. 100 to 1000ns c. 10 to 100ns d. 10 to 50 ns
81. Access speed of DRAM ranges upto
a. 2 to 10ns b. 50 to 150 ns c. 100 to 1000ns d. 10 to 50 ns
82. is essential for computer to prevent them from failures, breakdowns orshutdown
a. Power supply b. software c. hardware d. user
83. converts Ac power to Dc power needed by system
a. UPS b. SRAM c. DRAM d. SMPS
84. converts 230v of AC to 5 to 12 v of DC
a. UPS b. SRAM c. DRAM d. SMPS
85. is a power supply that includes a battery to maintain power in the event of powerfailure.
a. UPS b. SRAM c. DRAM d. SMPS
86. avoids momentary power lapses by continuously providing power from its owninverter, evn when the
power line is functioning properly.
a. Off line UPS b. stand by UPS c. Online UPS d. SMPS
87. monitors the power line and switches to battery power as soon as it detects aproblem.
a. Power supply b. stand by UPS
c. Online UPS d. SMPS
88. is a process of setting up your hardware devices and assigning resources to themso that they work
together without problems
a. Computer configuration b. software
c. hardware d. power supply

********************
Chapter 2 - Boolean Algebra
1. In boolean algebra, the OR operation is performed by which properties?
a) Associative properties b) Commutative properties
c) Distributive propertiesd) d)All of the Mentioned
2. The expression for Absorption law is given by
a) A + AB = A b) A + AB = B c) AB + AA’ = A d) A + B = B + A
3. The involution of A is equal to
a) A b) A’ c) 1 d) 0
4. A(A + B) =?
a) AB b) 1 c) (1 + AB) d) A
5. (A + B)(A’ * B’) =?
a) 1 b) 0 c) AB d) AB’
6. Complement of the expression A’B + CD’ is
a) (A’ + B)(C’ + D) b) (A + B’)(C’ + D) c) (A’ + B)(C’ + D) d) (A + B’)(C + D’)
7. Simplify Y = AB’ + (A’ + B)C.
a) AB’ + C b) AB + AC c) A’B + AC’ d) AB + A
8. The boolean function A + BC is a reduced form of
a) AB + BC b) (A + B)(A + C) c) A’B + AB’C d) (A + C)B
9. The logical sum of two or more logical product terms is called
a) SOP b) POS c) OR operation d) NAND operation
10. The expression Y=AB+BC+AC shows the operation.
a) EX-OR b) SOP c) POS d) NOR
11. The expression Y=(A+B)(B+C)(C+A) shows the operation.
a) AND b) POS c) SOP d) NAND
12. The canonical sum of product form of the function y(A,B) = A + B is
a) AB + BB + A’A b) AB + AB’ + A’B c) BA + BA’ + A’B’ d) AB’ + A’B + A’B’
13. A variable on its own or in its complemented form is known as a
a) Product Term b) Literal c) Sum Term d) Word
14. Canonical form is a unique way of representing
a) SOP b) Minterm c) Boolean Expressions d) POS
15. Boolean algebra is also called
a) switching algebra B. arithmetic algebra C. linear algebra D. Algebra
16. To perform product of max terms Boolean function mustbe broughtinto
a. AND term b. OR terms c. NOT terms d.NAND terms
17. According to the Boolean algebra absorption law, which of the
following iscorrect?
a. x+xy=x b. (x+y)=xy c. xy+y=x d.x+y=y
18. The expression for Absorption law is given by
a. A + AB = A b. A + AB = B c. AB + AA' = A d. A + B = B + A
19. X*y = y*x is the
a. commutative law b. inverse property
c. associative law d. identityelement
20. There are minterms for 3 variables(a,b,c)
a. 0 b. 2 c. 8 d. 1
21. expressions are can be implemented using either (1) 2-level AND-OR
LOGIC CIRCUITS (2)2-LEVEL NAND logic circuits.
a. pos b. literals c. sop d. none of the above
22. the output of x-nor gate is 1 which input combination is correct.a.
a=1,b=0 b. a=0 b=1 c. a=0, b=0 d. a=0, b=1
23. odd parity of word can be conviently tested by
a. OR GATE b. AND GATE c. NAND GATE d. X-OR GATE

24. determine the values of a,b,c,d that make the sum term
A+B+C+D
a. a=1 b=0 c=0 d=0
b . a=1 b=0 c=1 d=0
c. a=0 b=1 c=0 d=0
d. a=1 b=0 c=1 d=1
25. which of the following expressions is in the sum-of- product(sop)form.
a. (a+b)(c+d) b. (a)b(cd) c. ab(cd) d. ab+cd
26. For the SOP expression , how many 1s are in the truth table'soutput
column?
a) 1 b) 2 c) 3 d) 5
27. A truth table for the SOP expression has how many input
combinations?
a) 1 b) 2 c) 4 d) 8

28. How many gates would be required to implement the following Booleanexpression
beforesimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5
29. How many gates would be required to implement the following Boolean expressionaftersimplification?
XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5
30. Determine the values of A, B, C, and D that make the product term equal to 1
a) A = 0, B = 1, C = 0, D = 1
b) A = 0, B = 0, C = 0, D = 1
c) A = 1, B = 1, C = 1, D = 1
d) A = 0, B = 0, C = 1, D = 0
31. What is the primary motivation for using Boolean algebra to simplify logicexpressions?
a) It may make it easier to understand the overall function of the circuit.
b) It may reduce thenumber of gates.
c) It may reduce the number of inputs required.
d) all of the above
32. Use Boolean algebra to find the most simplified SOPexpressionfor F = ABD + CD + ACD + ABC + ABCD.
a) F = ABD + ABC + CD b) F = CD + AD c) F = BC + AB d) F = AC + AD
33. In Boolean algebra the word ‘literal’ means
a. a product term b. all the variables in a Boolean expression
c. the inverse function d. a variable or it’s compliment
34. The truth table for sop expression AB+𝐵 ̅ C has how many input
combinations?
a. 1 b. 2 c. 4 d. 8
35. converting the Boolean expression LM+M(NO+PQ) to sop form , we get
a. LM+ MNOPQ
b. B. L+MNO+MPQ
c. LM+M +NO+MPQ
d. LM+MNO+MPQ
36. the product of sum is basically the oring of anded terms
A. TRUE B. FALSE C. May be both d. None of the above
42. By applying De Morgan's theorem to a NOR gate, two identical truthtables can be produced.
a) True b) False c) may be both d) answer not given
43. The process of reduction or simplification of combinational logic circuitsincreases
thecost of the circuit.
a) True b) False c) may be both d) answer not given
44. Most Boolean reductions result in an equation in only one form
. a) True b) False c) may be both d) answer not given
45. The binary value of 1010 is converted to the product term.
a) True b) False c) may be both d) answer not given
46. In the commutative law, in ORing and ANDing of two variables, the order inwhich thevariables are ORed or
ANDed makes no difference.
a) True b) False c) may be both d) answer not given
48. Determine the binary values of the variables for which the followingstandard POSexpression is equal to 0.
a) (0 + 1 + 0)(1 + 0 + 1) b) (1 + 1 + 1)(0 + 0 + 0) c) (0 + 0 + 0)(1 + 0 + 1)
d) (1 + 1 + 0)(1 + 0 + 0)
49. The expression W(X + YZ) can be converted to SOP form by applying which law?
a) associative law b) commutative law c) distributive law d) none of the above
50. Simplification of the Boolean expression AB + ABC + ABCD + ABCDE +ABCDEF yields which of the
following results?
A) ABCDEF B) AB + CD + EF C) A + B + C + D + E + F D) AB
51. Given that F = (A + B'+ C)(D + E), which of the following represents the only correct expression for F'?
a) F' = A'BC'+ D'+ E' b) F' =AB'C + DE c) F' = (A'+ B + C')(D'+ E') d) F' = A'BC' + D'E'
52. The product of sum canonical form also known as
A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
53 are the alternative form of canonical form.
A. SOP B. POS C. BOTH A AND B d. NONE OF THE ABOVE
54. The sum of product canonical form also known as
A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE

55 . One of De Morgan's theorems states that. Simply stated, this means that logicallythere is
nodifference between:
a) a NOR and an AND gate with inverted inputs
b) a NAND and an OR gate with invertedinputs.
c) an AND and a NOR gate with inverted inputs.
d) a NOR and a NAND gate with inverted inputs.

*********************
MCQs Chapter 3 - LOGIC GATES

1. Electronic circuits that operates on one or more input signals to producestandard


output
a. series circuits b. parallel circuits c. logic signals d. logic gate
2. logic gates are the building blocks of all circuits in a computer
A. TRUE B. FALSE C. may be both D. No answer given
3. A gate gives the output as 1 only if all the inputs signals are 1.
A. AND B. OR C. X-OR D. NOR
4. the Boolean expression of an or gate is
a. A.B b. A+B c. AA+B d. AB
5. The gate which is used to reverse the output obtained is
A. NOR B. NAND C. X-OR D. NOT
6. which of the following gate will give a 0 when both of it’s inputs are 1.
A. AND B. OR C. NAND D. X-OR
7. The universal gate that can be used to implement any Boolean expression is ……….. gate .
A. NAND B. X-OR C. OR D. AND
8. The gate which is called as inverter gate
A. NAND B. X-OR C.NOR D. NOT
9. The and gate is represented algebraically by
a. + b. * c. -- d. %
10. the only gate that has 1 input and 1 output
A. AND B. OR C. NOT D. X-OR
11. The universal gate is
A. NAND B. X-OR C. OR D. AND
12. what combination is a Nand gate
A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR
13. what combination is a NOR gate
A. NOT, AND B, NOT OR C, NOT NAND D, NOT NOR
14. A NAND gate has inputs and outputs
a. high input and high output b. high input and low output
c. low input and low output d. low input and high output
15. who invented the idea of logic gates
a. George boole b. barden c. calude shanon d. kornard zure
16. which of the following are the airthmatic logic gates?
a. X-ORB. X-NOR C. BOTH D. NONE OF THE ABOVE
17. which of the following is not a logic gate
a. AND B. OR C. IF D. NOT
******************
Chapter 4 : DATA STRUCTURES
1. is a specialized format for organizing and storing data
a) data structure b) primitive data structure c) sorting d)merging
2. is a method of storing the data in memory so that it can be used efficiently.
a) Array b)data structure c) sorting d)merging
3. Which operation is used to remove the data structure from memory space
a)create b)select c)update d)destroy
4. Which is the collection of homogeneous elements under the same name?
a) Array b)data structure c) stack d)queue
5. which data structure has linear relationship between data elements?
a) non linear b)linear c) stack d)queue
6. In which data structure every data item is connected to several other data items?
a) non linear b)linear c) stack d)queue
7. Array size should be_
a) negative number b)positive number c)null d)Zero
8. To find length of array we use
a)L=UB-LB+1 b)L=LB-UB+1 c)L=UB-LB d)L=LB-UB
9. The base address of an array is address of
a)UB b)LB c)UB-LB d)LB-UB
10. The formula to calculate address of an element of an array A is
a)loc(A[I])=base(I)+W(I-LB) b) loc(A[I])=base(A)+W(I-UB)
c) loc(A[I])=base(I)+W(I-UB) d) loc(A[I])=base(A)+W(I-LB)
11. Example for traversing in a linear array is
a)binary search b) linear search c)to find max element in an array
d)inserting an element at given position in an array
12. Binary search compares the element to be searched with element of an array
a) first element b) middle element c)last element d)all the element
13. In binary search method if search element is less then mid position then
a)high=mid-1 b)low=mid+1 c)high=mid+1 d)low=mid-1
14. Linear search compares the elements
a)one by one from beginning to end b) dividing array into two parts
c) only first and last position d) from low to mid position
15. In binary search the successful search is when_
a)A[mid]=ele b)A[i]=ele c)ele<A[mid] d) ele>A[mid]
16. for I=N-1 down to Pos is the loop for
a)deleting element in array b)inserting element in an array c) traversing d)both a and b
17. In operation all the elements are shifted into lower order position from the given position
a)deleting element in array b)inserting element in an array c) traversing d) binary searching
18. Which is not the sorting method?
a)heap sort b)quick sort c)shell sort d)linear sort
19. The memory address of element A[i][j] in row major order is
a)loc(A[i][j])=base(A)+W((i-LB)+n(j-LB)) b) loc(A[i][j])=base(A)+W(n(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+n(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+n(j-LB))
20. The memory address of elements A[i][j] in column major element is
a)loc(A[i][j])=base(A)+W((I-LB)+m(j-LB)) b) loc(A[i][j])=base(A)+W(m(j-LB)+(i-LB))
c) loc(A[j][i])=base(A)+W(n(I-LB)+m(j-LB)) d) loc(A[i][j])=base(A)+W((I-LB)+m(j-LB))
21. The base address of an array is address of the a)A[1] b)A[n-
1] c)A[0] d)both a and b
22. Which data structure is used to implement queues, trees, graphs
a)stack b)list c)array d)None
23. In which data structure addition and deletion of element takes place from same position
a)stack b)list c)array d)queue
24. In stack the end is commonly referred as
a)Top b)bottom c)rear d)front
25. In stack the end opposite is known as
a)Top b)base c)rear d)front
26. In stack which element is removed first
a) element inserted at first b)most recently added element c)middle element d)second element
27. In which position of the stack element will be in longest time?
a)A[0] b)base c)top d)both a and b
28. Stack perform the operation
a)last in first out b)last in last out c)last in fast out d)first in first out
29. In which operation stack is not modified
a))push(item) b)pop() c)peek() d)none
30. What is the function of Peek() operation
a)removes top item from stack b) test stack is empty or not
c)returns the number of items in stack d)returns top item from stack but does not remove.
31. Push operation in stack is
a) First increases top position and insert element
b) first insert element and then increases top position
c) first decreases top position and insert element
d) first insert element and decrease the top position
32. Which of the following is not an application of stack.
a) rearranging railroad cars b) runtime memory management
c) multiprogramming platform d) conversion of infix expression into postfix and prefix expression
33. Example for infix expression
a)+ab b)a+b c)ab+ d)none
34. The condition top=-1in stack indicates
a) stack is full b)stack has one element c)stack overflow d)stack is empty
35. The condition top=n-1 in stack indicates
a) stack is full b)stack has one element c)stack underflow d)stack is empty
36. In which data structure addition of new element and removal of element takes place at different end
a) non linear b)linear c) stack d)queue
37. In Queue items are inserted at end
a) Top b)front c)rear d)bottom
38. In queue items are removed at end
a) Top b)front c)rear d)bottom
39. In queue we remove the element which is
a)least recently added b)most recently added c)both a and b d)none
40. Queue is also called as
a) last in first out b) first in last out c)first in first out d)first in first in
41. In queue which operation is generally called as push
a) enqueue b) dequeue c)push d)pop
42. Which condition indicates queue is empty
a)front=null b)rear=N c) front=rare d)both a and b
43. Which condition indicates only one element in queue
a)front=null b)rear=N c) front=rare d)rear=N-1
44. Various application software is based on data structure
a) linked list b)graph c) stack d)queue
45. In which of the following application queue data structure is used
a)simulation b) type scheduling algorithm c) print server routine d)all ofthese
46. In which data structure element can be inserted and removed in any position
a)simple queue b)circular queue c)priority queue d)double ended queue
47. In which queue addition and deletion takes place at both the ends
a)simple queue b)circular queue c)priority queue d)double ended queue
48. The dis advantage of array is
a)static structure b)dynamic structure c) variable d)both a and b
49. In which operation array elements are shifted into higher order positions
a)deletion b)insertion c)searching d)sorting
50. In which operation array elements are shifted into lower order positions
a)deletion b)insertion c)searching d)sorting
51. In linked list the position start gives the location of node
a)first b)last c)middle d)second
52. In linked list the pointer start position is also called as
a)NULL b)head c)Tail d)none
53. The link field of last node contains
a)NULL b)head c)Tail d)none
54. In linked list link field of every node contains
a) data of the node b)data of next node c)address of last node d)address of next node
55. In doubly linked list which node points to the address of previous node?
a) info b)frowc)back d)head
56. Which operation is not possible in linked list
a)sorting b)searching c)merging d)inserting
57. Pointer=new type[number_of_elements] is syntax for
a)pointer declaration b)allocate memory for single element
c)allocate memory for block element d)structure.
58. In which data structure each node is connected to several other nodes
a) non linear b)linear c) stack d)queue
59. Which data structure represents hierarchical relationship
a) non linear b)linear c) stack d)queue
60. Each node in a tree has child node
a)zero b)more c) both a and b d)no
61. Root node in a tree is at position
a)top b)bottom c)middle d)right
62. From node all the operations commence in tree
a)leaf b)child c)root d)internal
63. The edges in a graph having directions is called
a) undirected graph b)arcs c)digraph d)all the above
64. prefix expression of (A+B)*(C+D) is
a)*+AB+CD b)+AB*+CD c)AB+Cd+* d)+*AB+CD
65. Prefix expression of 2*3/(2-1)+5*3 is
a)*23-21/-53*1 b)23*21+/53*+ b)21*23-/35*+ d)-/53*+23*21
66. ele=stack[top] is for
a)pushb)pop c)enqueue d)dequeue
67. Prefix expression ofA+(B*C-(D/E^F)) is
a)ABC^/DEF* b)ABC*DEF^/ c)^/ABC*DEF d)*ABC/DEF^
68. During conversion of infix to postfix pop is done when appears
a)( b)) c)~ d)::
69. Each operator in postfix string refers to its operand in a string
a)previous 3 b)next 3 c)next 2 d)previous 2
70. 10, 20, 25, 35, 30 40 for the list which searching technique can be applied
a)binary search b)linear search c)both a and b d)none
71. Which operation access each data element exactly once
a)traversal b)insertion c)searching d)sorting
72. Stack can be represented using
a)array b) linked list c)both a and b d)none
73. In binary search when the element is searched either right half or the left half of anarray
a) element is found b)search element comparison matches
c)comparison does not match d) low position is less than high position
74. In searching if (loc>=0) is
a)unsuccessful search b) binary search
c) linear search d) successful search
75. Array with one row or one column is a
a)1D array b)2d array c)multi dimensional array d)both a and b
76. Which operation is used to change data in data structure
a)create b)destroy c)select d)update
77. The study of data structure mainly deals with
a)implementation of structure on computers b)mathematical description of structure
c) to determine amount of space in memory d)all of these
78. is a set of vertices and edges
a)tree b)graph c)queue d)stack
79. Which node is farthest node from root node
a) child node b)top node c)leaf node d) middle node
80. list in linked list contains unused nodes
a)Avail b)head c)null d)start
81. Dynamic memory is allocated using operator
a)create b)null c)new d)pointer
82. In which linked list it is not possible to access preceding nodes
a)singly b)doubly c)circular d)all of these
83. A text can be reversed using
a)tree b)graph c)queue d)stack
84. While ((j>=1) and (A[j]<A[j-1])) is the logic for
a) inserting element b)sorting element b)deleting element d)searching element
85. for i=0 to N-1 If(A[i]==ele) is logic for
a) inserting element b)sorting element b)deleting element d)searching element
86. The method of collecting deleted nodes into free storage is called
a) heap memory b) free memory c)garbage collection d)dynamiccollection
87. In queue insertion and deletion performed according to
a) FIFO b)FILOc)LIFO d)all of these
88. Which of the following data structure does not have different types
a) array b)linked list c) stack d)queue
89. If we try to delete node from the linked list which is empty is called
a)overflow b)underflow c)inserting d)deleting
90. linked list is called as two way list a)singly
b)doubly c)circular d)none
91. As user navigate from web page to web page then the pages are placed on
a) array b)linked list c) stack d)queue
92. The operators in between two operands are called as expression
a)infix b)postfix c)prefix d)arthematic
93. If an operator precedes two operands it is called as expressiona)infix
b)postfix c)prefix d)arthematic
94. If an operator follows the two operands it is called as expression
a)infix b)postfix c)prefix d)arthematic
95. for i=lb to ub Process (A[i]) is logic for
a) inserting element b)sorting element b)deleting element d)traversing
96. Which data structure directly operates on machine level instructions
a)int b)array c)string d)trees
97. Which is not the operation on linear data structure
a) inserting b)sorting b)updating d)traversing
98. What is the statement to copy the top element into variable
a)s[top]=ele b)ele=s[top] c)s[++top]=ele d)both a and b
99. What is the statement to copy the variable element into rear position in queue
a)q[rear]=ele b)q[front]=ele c)ele=q[rear] d)ele=q[front]
100. tree is a tree which at most two decedents
a) binary tree b)sub tree c)b+ tree d)full
********************
Chapter 7: Classes and Objects
1. Programming Language which supports object oriented programming(OOP) is
(a) C++ (b) Visual Basic (c) C language (d) Fortran
2. Programming language support oop concept
(a) C++ and C# (b) java (c) python (d) All
3. Programming languages does not support oop concept
(a) C and PASCAL (b) COBOL (c) FORTRAN (d) All
4. Keyword used to create class is
(a) Classname (b) class (c) private (d) protected
5. Member function means
(a) Just a function (b) function which is member of class
(c) Both a and b (d) All the above
6. The data elements of a class are called
(a) Member Data (b) data (c) private members (d) All the above
7. The Data member of class defines
(a) Just data variables (b) variables
(c) characteristics of class (d) behavior of the send class
8. The member function of the class defines
(a) Functions of class (b) data functions
(c) characteristics (d) behavior of the class
9. A class combines and into single unit.
(a) Data members and member function
(b) Only data members of the class
(c) Only member function of the class
(d)All the above
10. A class definition is processes of
(a) Only naming the class
(b) Only includes writing interface operations
(c) Naming the class and methods and data members
(d) Only includes naming the data variables
11. A class can contain member functions
(a) Many
(b) Zero or more
(c) One or more
(d) Both b and
12. The Data member of a class describe of a class
(a) Behavior (b) characteristics
(b) Only a is correct (d) both a nd b is correct
13. Class body definition ends the symbol
(a) ; (b) : (c) :: (d) .
14. Class body is enclosed in a pair of
(a) ( ) (b) [ ] (c) { } (d) All the above
15. A object is defined to be an
(a) Instance of a class (b) copy of the class
(b) Both a and b (d) None of the above
16. The access specifiers of the class define
(a) Keywords (b) Data members
(c) member functions (d) Scope of the members
17. Private accesses specifiers means.
(a) members can be accessed only with in the class
(b) members can be accessed only outside the class
(c) members can be accessed both inside and outside the class d. all the above
18. The symbol used to define member function outside the class is
(a) @ (b) & (c) * (d) : :
19. The default access specifier is
(a) Private (b) protected (c) public (d) All the above
20. The members are accessible only inside the class
(a) Private (b) protected (c) public (d) friend
21. The feature of public access specifiers is
(a) Members are accessible only outside the class
(b) Members are access both inside and outside the class
(c) Members are accessible only inside the class
(d) All the above
22. One special feature of protected access specifier is
(a) Cannot be inherited from one to another
(b) Can be inherited from one class to another
(c) Can be used outside the class
(d) Can be accessed using . (dot) operator
23. The difference between private and protected is
(a) Private cannot be inherited and protected can be inherited
(b) Protected cannot be inherited and private can be inherited
(c) No difference between both
(d) Both can be accessed outside the class
24. Which operator is member selection operator?
(a) . (dot) (b) & (address) (c) || operator (d) ! (not operator)
25. The member can be accessed outside the class using dot(.) operator.
(a) Public (b) protected (c) private (d) friend
26. The class members can be accessed using operator
(a) :: (scope) (b) . (dot) (c) & (address) (d) * (pointer)
27. Inside member function means
(a) Both Declaration and Definition appear inside the class
(b) Only Declaration appears inside the class
(c) Only definition appears inside the class
(d) Both b and c
28. Syntax for memberfunction inside the class is
(a) return_type_specifier functionname(argument_list)
{
Statements;
…………
}
(b) void classname::input()
{
Statements;
…..}
(c) return_type_specifier classname::functionname()
(d) void input()
29. An example for member function inside class is
(a) Returntype functionname()
(b) void input()
{cout<<”Enter regno and name”<endl;
Cin>>regno>>name;
}
(c) both a and b
(d) only a is correct
30. syntax for member function outside class definition is
(a) return_type_specifier classname::functionname(arg_list)
{statements
………….}
(b) void student::input()
(c) void input()
(d) returntype functionname(arglist)
31. Example for outside class definition is
(a) void student::input()
{
Cout<<”Enter regno and name”<<endl;
Cin>>regno>>name;
}
(b) void input()
(c) Void display(arglist)
(d) All the above
32. Using which methods and object can be passed to function
(a) Using only pass by function
(b) Using pass by data members
(c) Pass by data and member function
(d) Using Pass by value and pass by reference
33. Member function can be defined in how many methods
(a) 2 (b) 1 (d) 3 (d) a and b
34. Member function can be defined using and _ methods
(a) Only outside the class
(b) Only inside the class
(c) Both inside and outside the class
(d) All the above
35. The class members can be
(a) Only private
(b) Only protected
(c) Only public
(d) Private , protected or public
36. Syntax for creating object is
(a) Classname objectname1,objectname2,…;
(b) Student obj1,obj2;
(c) Class classname objectname1, objectname2;
(d) Both a and c
37. The array of object is
(a) An array having classtype elements
(b) Array as a member of the class
(c) Array stores many values of same type
(d) All the above
38. The is an example for creating the objects
(a) Student obj1,obj2;
(b) Class student obj1,obj2;
(c) Both a and b
(d) Only a
39. How many methods are there to pass objects as argument to member function(a) 2 (b) 3
(c) 1 (d) 4
40. A class is of an object
(a) Blue print or prototype
(b) Defined using classname
(c) A group of students
(d) Class name defines the class
41. A class is collection of objects having
(a) Similar characteristics and behavior
(b) Only character
(c) Only behavior
(d) All the above
42. Is it possible to access the data outside the class?
(a) Yes , if it is under public
(b) No , if it is under private
(c) Both a and b
(d) Not possible
43. Set of interface operations that are performed on objects are called
(a) Member variable (b) class function
(b) Member function (d) class variable
44. The protected members of the class can be accessed by
(a) Member function of class but only inside the class
(b) Member function of the derived class
(c) Friend functions of the class
(d) All the above
45. What is the use of scope resolution operator?
(a) Link between class and member function
(b) To write member function definition outside the class
(c) Both a and b
(d) Only a
46. An Example for array of object is
(a) Student obj[10];
(b) Class student stu_obj[50];
(c) Employee emp[15];
(d) All the above
47. Example to pass object as function argument can be
(a) void total(Exam puc, Exam cet)
{
P=puc.p+cet.p;
C=puc.c+cet.c;
M=puc.m+cet.m;
}
(b) Returntype functionname(classname obj, classnae obj)
(c) Both and b
(d) All the above
48. The other names for member functions are

(a) Methods and Interfaces


(b) Only methods
(c) Only set of interface operations
(d) All the above
49. The member functions may be defined or of class
(a) Inside or outside
(b)Only outside
(c) Only inside
(d)All the above
50. members can be accessed inside or outside of class definition.
(a) Public (b) private (c) protected (d) all the above

*********
.
Chapter 8: Function Overloading
1. Function cannot be overloaded when -
(a) Function names are same
(b) Number of parameters are different
(c) Number of parameters are same
(d) Data types of parameters are different
2. Function can be overloaded when
(a) Function names are same (c) The data types of parameters are
(b) Number of parameters are different
different (d) All the above
3. Friend function is a
(a) Non member function of class (c) Both a and b
(b) Can access both private and (d) None of the above
protected members
4. C++ Implements polymorphism through
(a) Inline function
(b) Friend function

(c) Function overloading and operator overloading


(d) Both a and b
5. Need for function overloading is
(a) Code maintenance is easy
(b) Easy to understand the flow of information and debug
(c) Easier interface between program and real world objects
(d) All the above
6. The Restrictions on overloaded functions are
(a) Each function in a set of overloaded function must have different argument list
(b) If typedef is used for naming functions then the function is not considered as differenttype
(c) Both a and b
(d) None of the above
7. The other functions used in class are
(a) Overloaded functions (c) Friend function
(b) Inline functions (d) All the above
8. The inline function means
(a) Very long function (c) Short function
(b) Can contain too complicated code (d) Both a and b
9. The inline function can be
(a) Very short function

(b) The compiler replace function call with (c) Both a and b
function code (d) None of the above
10. The advantages of inline functions are
(a) Inline functions are compact (c) Very efficient code can be
function calls generated
(b) The size of object code is reduced (d) All the above
11. In which type of functions, the compiler replaces the function call statement with thefunction
code is
(a) Friend function b) Inline function c) Function overloading d) Both a and b
12. In which function category two or more function have same name but different in numberof argument
list and their data type.
(a) Function overloading (b)Inline function
(c) Friend function (d) All the above
13. The inline function cannot include the
(a) goto statement (b) looping (c) Recursive function body (d) all the above
14. The keyword to create the inline function is
(a) Friend (b) private (c) Class (d) inline
15. The friend function means
(a) A short function
(b) run little faster
(c) can access private and protected members outside the class.
(d) Both a and b
16. Using friend function members are accessed using following syntax
(a) Objectname.membername (c) Only membername
(b) Only object name (d) All the above

17. While defining friend function it does not use either keryword or __operator.
(a) & or . (b) friend or :: (c) objectname.membername or objectname (d) all theabove
18. How to accesses the member of the friend function
(a) Member are accessed directly using member names
(b) Specifying objectname.membername
(c) Any above method
(d) All the above methods
19. The friend function declaration in the class is of
(a) Only public scope
(b) Only private scope
(c) Only Protected scope
(d) Can be any scope in the class (private, protected, public)
20. A friend function is a of a class
(a) Non member function (c) Inline function
(b) Private function (d) Public function of a class

21. Use of friend function is rare since it violates the rule of


(a) Encapsulation (c) Both a and b
(b) Data hiding (d) None of the above
22. Function overloading is not possible when
(a) Function name are same
(b) Number of arguments are different

(c) Number and data types or arguments are same


(d) Data types of argument are different
23. Inline function may not work when
(a) Function has looping (c) Function has recursive function
(b) Function has switch or goto (d) All the above
24. Friend function can access members of class
(a) Private (c) Protected
(b) Public (d) All the above
25. How friend function can access members of class
(a) Using dot (.) operator

(b) Using objectname.membername with each membername


(objectname.membername)
(c) Using objectname’
(d) Using classname and object name
26. The Function overloading can include
(a) Ordinary functions
(b) Member function
c) Both a and b
d) Only member function
27. The disadvantage of inline functions can also be
(a) The size of the executable file increases and more memory needed
(b) The body of inline function is substituted in place of function call
(c) Both a and b
(d) None of the above

28. The feature of friend function may include


(a) These are normal external functions with special rights
(b) These are very common functions
(c) These are invoked like normal functions
(d) Both a and c
29. The inline functions are defined inside the class
(a) Member function (c) may contain goto and switch
(b) too complex functions (d) none of the above
30. The prefix used with friend functions is

(a) friend (b) inline (c) void (d) class


31. The friend function must be declared within with friend keyword
(a) Class (b) outside class (c) using :: operator (d)all the above
32. The friend function definition must be written without the prefix friend or :: operator.
(a) Outside the class
(b) Inside the class only
(c) Can be written both inside and outside
(d) All the above
33. The friend function can access the public data members like functions
(a) Non member (c) External function
(b) Member functions (d) None of the above
*********************************
Chapter 9 : CONSTRUCTORS AND DESTRUCTORS
1. Automatic initialization of object is carried out using a special member function called
a) constructors b) destructors c) friend functions d) inlinefunctions.
2. Constructors are called automatically when_
a) object is destroyed b) object is created c) class is created d)constructor iscreated
3. constructs the values of the data members of the class.
a) destructors b) constructors c) class d) member function
4. Constructors name is same as name.
a) class b) member function c)object d)member data
5. Constructors should be declared in
a) protected section b)private section c) public section d)anywhere inside class
6. There is no for constructors.
a) arguments b)parameters c) return-type d) object
7. makes implicit calls to the operators new and delete when memory allocation is required.
a)class b)object c)constructors d)member function
8. Default constructor is also called as
a)zero parameterized constructor b) copy constructors
c)parameterized constructor d)destructors
9. Which of the following is not a type of constructors.
a. default constructors b)parameterized constructors c) copy constructors
d)destructors
10. …………. are useful when the object are need to be created without having to type
initial values.
a)copy constructors b)default constructors
c)parameterized constructors d) destructors
11. When is declared for a class initialization of objects is done automatically.
a) constructors b)object c) destructorsd)interface
12. All objects of a class are initialized to same set of values by
a) copy constructors b)default constructors
c)parameterized constructors d)destructors
13.When user defined class does not contain an explicit constructors, compilers automatically invokes
__________ constructors.
a) copy b) default c) parameterized d)argument
14. Declaring constructors with argument it hides constructors.
a) default b)parameterized c)copy d)argument
15. It is no possible to initialize different objects with different initial values using
a) copy constructors b) parameterized constructors
c) default constructors d)destructors
16. A constructors that takes one or more arguments are called _ constructors
a) copy b)default c)parameterized d)zero argument
17. Using constructors it is possible to initialize different object with different values
a)copy b) parameterized c) default d)zero argument
18. constructors are invoked automatically when objects with arguments are created.
a) copy b)default c)zero parameterizedd)parameterized
19. constructors can be over loaded
a) parameterized b) default c)zero argument d)zero parameterized
20. constructors can have default arguments and default values.
a) default b) zero argument c)parameterized d) zero parameterized
21. Constructors can be invoked through
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) all of the above
22. declaration of an object is followed by assignment operator, constructor name and
argument list enclosed in parenthesis
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) none of the above
23. In declaration of an object is followed by argument list enclosed in parenthesis.
a) explicit call b. implicit call
b) initialization at the time of declaration with =operator d. none of the above
24. method is used for constructor with exactly one argument.
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) destructors
25. In declaration is followed by assignment operator and value to be initialized
a) explicit call b) implicit call
c)initialization at the time of declaration with =operator d) none of the above
26. Using constructors one object can be copied to another object.
a) copy b)default c)zero parameterized d)parameterized
27. constructors are used to initialize an object with values of already existing objects
a) copy b)default c)zero parameterized d)parameterized
28. constructors are used to return object as function values
a) copy b)default c)zero parameterized d)parameterized
29. constructors are used to state object as by value parameter of a function
a) default b)parameterized c)copyd)argument
30. Copy constructors is not invoked
a) explicitly b) implicitly c)initialization at the time of declaration with =operator d) normally
31. When a new object is declared and existing object is passes as a parameter to it in the declaration
constructors are invoked
a) default b)parameterized c)copy d)argument
32. is called automatically when the object is destroyed.
a)destructors b)constructors c)class d)interface
33. Which operator is used with destructors?
a) :: b)& c)~ d) *
34. is used to de-allocate memory that was allocated for the object by the constructors.
a)class b)interface c) destructors d)constructors
35. takes no arguments
a)parameterized constructors b)copy constructors
c)argument constructors d)destructors
Chapter 10 : INHERITANCE
1. provides the concept of Reusability
a) procedural programming b)inheritance c)class d)functions
2. allows the user to create a new class from an already existing class
a) inheritance b)classc)polymorphism d)binding
is the capability of one class to inherit properties from another class.
a)polymorphism b)binding c)overloading d)inheritance
3. is a class whose properties are inherited by another class
a)sub class b)base class c) derived class d)virtual class
4. is a class that inherits properties from base class
a)sub class b)base class c)super class d)virtual class
5. Base class is also called as
a)sub class b)derived class c)virtual classd)super class
6. Derived class is also called as
a)super class b)abstract class c)base class d)sub class
7. Which of the following is the advantage of inheritance.
a)reusing existing code b) faster development time c)memory utilizationd)all of
these
8. If no visibility mode is specified then by default the visibility mode is considered as

a) private b)protected c)public d)explicit


9. All the members of the class except members are inherited.
a) private b)protected c)public d)explicit
10. operator shows the derivation from the base class in inheritance.
a):: b)& c): d) *
11. specifies the features of base class are privately derived or publicly derived or protected
derived
a) visibility mode b) derivation c)inheritance d)polymorphism
12. controls the access specifiers to be for inheritable member of base class in the derived
class
a) overloading b) visibility mode c)inheritance d)polymorphism
13. In private inheritance the public members of base class becomes members of
derived class
a) private b)protected c)public d)not inherited
14. In private inheritance the protected members of base class becomes……membersof derived class
a) protected b)private c)public d)not inherited
15. In protected inheritance the public members of base class becomes ___membersof derived class.
a) private b)protected c)public d)not inherited
16. In protected inheritance the protected members of base class becomes
members of derived class.
a) protected b)private c)public d)not inherited
17. In public inheritance the public members of base class becomes members of
derived class.
a) protected b)private c)public d)not inherited
18. In public inheritance the protected members of base class becomes members
of derived class.
a) protected b)private c)public d)not inherited
19. In public inheritance the private members of base class becomes members of
derived class.
a) protected b)private c)public d)not inherited
20. If a class is derived from single base class it is inheritance
a)single level b)multilevel c)multiple d)hybrid
21. If a class is derived from an already derived class then it is inheritance
a)single level b)multilevel c)multiple d)hybrid
23. If class is derived from more than one base class then it is inheritance
a)single level b)multilevel c)multiple d)hybrid
24.If more than one class is derived from a single base class is called inheritance
a)single level b)multilevel c)multiple d)hierarchical
25. inheritance is a combination of hierarchical and multilevel inheritance
a)single level b)multilevel c)multiple d)hybrid
26. We can prevent multiple copies of base class being present in an object from thoseobjects by
declaring the base class as
a)virtual b) abstract c) derived d)private
27. class is one that is not used to create an object.
a)virtual b) abstract c) derived d)sub
28. When it is mandatory to have constructors in derived class.
a) no base class constructors takes any arguments
b) base class having constructors with one are more arguments
c) if the is default constructors in bas class d) if there is no constructors in baseclass
29. takes the responsibility of supplying initial values to its base class
a) super class b) virtual class c)derived class d)abstract class
*************
Chapter 11- POINTERS
1. Which of the following is a correct way to declare a pointer?
a) int *ptr b) int ptr
c) int &ptr d)all of the above

2. Allocating sufficient memory for data and instructions during compilation is called
a) dynamic memory b) static memory
c) heap memory d) stack memory

3. Which of the following is the pointer operator?


a) * b) & c) d) all of the above

4. Which of the following is the pointer address operator?


a) * b) & c) d) all of the above

5. operator returns the value located at the memory address specified by itsoperand.
a) * b) & c) d) new

6. static memory allocation is done at


a) compile time b) dynamic time
c) run time d) execution time

7. How do you declare a pointer?


a ) datatatype *pointer_variable; b) pointer_variable=&variable_name;
c) datatype &pointer_variable; d) datatype variable_name;

8. operator is used to allocate memory for objects during run time


a) new b) & c) delete d) *
9. Which of the following is not possible in the pointers?
a) adding an integer value to pointers
b) subtracting an integer value from pointer
c) addition of two pointers
d) incrementing and decrementing of pointer
10. Which operator returns the value located at the address specified by its operand
a) pointer operand b) delete operand
c) new operand c) address operand
11. A pointer is a variable which stores of another variable.
a) name b) value
c) address d) all of the above
12. Which of the following is not an advantage of pointer?
a) accessing array elements is faster
b) support dynamically allocated memory
c) it reduces program complexity
d) it decreases program execution speed
13. pointer initialization is the process of assigning address of a variable to a pointer variable
a) true b) false c) may be d) cant say
14. Which of the following is dereferencing operator?
a) & b) # c) * d)
15. Which of the following operator also known as value at address operator?
a) * b) c) & d) ::
16. & and * are two pointer operators which are
a) binary b) ternary
c) unary d) logical
17. The size of pointer variable is same for all type of pointers but the memory that will beaccessed
while dereferencing is different.
a) true b) false c) may be d) all of the above
18. Pointer arithmetic is somewhat different from ordinary arithmetic
a) true b) false c) may be d) all of the above
19. Which of the following type of address stored in pointer variable?
a) character b) float c) integer d) none of these
20. operator can be applied to pointer variable.
a) division b) multiplication c) logical d) casting
21. Which of the following is initialization of pointers (or) assignment of pointers
a) datatatype *pointer_variable;
b) datatype &pointer_variable;
c) pointer_variable=&variable_name;
d) pointer_variable=*variable_name;
22. A string is a array
a) float b) integer c) character d) none of these

23. pointer is used to store


a) memory address b) value c) data d) information
24. Which of the following is used to initialize pointer?
a) * b) & c) = d) ~
25. memory allocated during runtime is memory allocation.
a) compile time b) dynamic c) static d) none of the above
26. New operator is used to create memory during
a) compile time b) runtime
c) static time d) none of the above
27. operator is used to delete memory created during runtime.
a) new b) delete c) NOT d) AND
28. is the collection of addresses.
a) array of objects b) array of pointers
c) array of elements d) array of variables
29. is the built in pointer that hold the address of the object defined for a class.
a) this pointer b) New
c) delete d) AND
30. Pointers pointing to object of a class called
a) array of pointers b) class pointers
c) object pointer d) this pointer
31. is the structure that include an element that points to another structure of same type.
a) memory heap b) self referential structure c) structure d) memory pool
32. Dynamically allocated memory not deleted remains occupied called
a) orphaned memory b) memory pool c) stream d) structure
33. pool of unallocated memory used for dynamic memory allocation is
a) orphaned memory b) free store
c) allocated memory d) none of the above
34. Which of the following is not possible in pointers?
a) adding an integer to pointer c) comparing two pointers of same type
b) adding two pointers d) subtracting an integer from the pointer

35. An example for array of pointer declaration is


a) int a[10] (b) int *a[10] (c) both a and b (d) none of the above
36. The following can be considered as advantage of pointrs
a) memory is utilized properly c) Easy to deal with hardware components
b) Dynamically allocate & de allocate d) All the above
memory

37. To assign the a pointer to array the following statement is used


a) &a[0] (base address is assigned) b) a (just arrary name is used to assign
the base addres)
c) Both a and b d) None of the above
38. To process the structure members using pointers the following method is used
a) pointer_variable->struct_member c) Both a and b
b) (*pointer_variable).struct_member d) None of the above

39. To release dynamic memory function is used


a) delete (b) new (c) both a and b (d)only b
40. To free or release dynamic Array memory
a) delete function c) delete ptr_var;
b) delete []ptr_var; d) all the above
41. To free or release dynamic structure
a) delete structure_name c) delete pointer_variable
b) delete object_name d) All the above

42. The orphaned memory blocks when increase in number, bring adverse effect on system
, this situation is called
a) free store c) memory leak
b) Dynamic allocation d) may be a or b

43. The structure that include an element that is a pointer to another structure of the sametype is called
a) array structure c) self referential structure
b) Dynamic structure d) All the above

44. The objects are referenced using pointers using


a) objectname->membername c) Both a and b
b)(*objectname).membername d) None of the above

45. The following operation that cannot be performed over pointer:


a) Additon of two pointers
b) Multiplication of two pointers
c) Division of two pointers
d) All the above
46. Every object in C++ has access to its own address through an important pointer called..
a) this pointer
b) free pointer
c) object pointer
d) all the above
********
CHAPTER 13 :DATABASE CONCEPTS
Answer all the questions. Each question carries one mark.
I Select the correct answer from the choices given: (Repeated
answers will not be considered)
1. DBMS stands for
a) Data Base b) Dual Bus Mass c) Data Base d) Direct Based
Management Storage Management Memory Standard
system Series

2. In Relational modes, cardinality is termed as:


a) Number of b) Number of c) Number of d) Number of
tuples attributes tables constraints

3. The view of total database content is


a) Conceptual b) Internal View c) External View d) Physical View
View

4. Cartesian product in relational algebra is c) Ternary d) Not defined


a) Unary operator b) Binary operator
operator

5. DML is provided for


a) Description of b) Addition of new c) Manipulation & d) definition of
logical structure of structures in the processing of physical structure
database database system database of database system

6. Architecture of the database can be used viewed as


a) two level b) four levels c) three levels d) one level

7. In a relational model, relations are termed as


a) Tuples b) Attributes c) Tables d) Rows

8. In case of entity integrity, the primary key may be


a) not null b) Null c) both Null & not d) any value
Null

9. A logical schema
a) is the entire b) is a standard way of c) describes how d) Both (a) and
database organizing data is actually (b)

information into stored on disk


accessible parts

10. In the architecture of a database system external level is the


a) Physical level b) logical level c) conceptual level d) view level

11. In a Hierarchical model record are organized as


a) Graph b) List c) Links d) Tree

12. In an E-R diagram attributes are represented by


a) Rectangle b) Square c) ellipse d) Triangle
13. In an E-R diagram an entity set is represent by a
a) Rectangle b) Ellipse c) Diamond box d) Circle

14. A subschema expresses


a) Logical view b) Physical view c) External view d) All the above

15. Relational Algebra is


a) Data Definition b) Meta Language c) Procedural d) None of the
Language query Language above

16. What is a relationship called when it is maintained between two entities?


a) Unary b) Binary c) Ternary d) Quaternary

17. Which of the following operation is used if we are interested in one certain columns of
a table?
a) Projection b) Selection c) Union d) Join

18. A set of possible data values is called


a) Attribute b) Degree c) Tuple d) Domain

19. Which of the following is record based logical model?


a) Network b) Object oriented c) E-R Model d) None of these
Model model

20. The natural join is equal to


a) Cartesian b) Combination of c) Combination of d) Combination of
Product Union and cartesian selection and projection and
product cartesian product cartesian product

21. Hierarchical model is also called


a) Tree structure b) Plex structure c) Normalize d) Table Structure
Structure

22. In E-R diagram generalization is represented by


a) Ellipse b) Dashed ellipse c) Rectangle d) Triangle

23. A data manipulation commands the combines the records from one or more tables is
called
a) SELECT b) PROJECT c) JOIN d) PRODUCT

24. A table joined with itself is called


a) Join b) Self Join c) Outer Join d) Equi Join

25. Which of the following is not advantage of the database approach?


a) Increased b) Elimination of c) Ability to d) None of the
security data redundancy associated with above
relation data

26. Which of the following is another name for weak entity


a) child b) Owner c) dominant d) All the above

27. Which of the following database object does not physically exist?
a) base table b) index c) view d) none of the
above
28. In E-R Diagram relationship type is represented by
a) Ellipse b) Dashed ellipse c) Rectangle d) Diamond

29. In E-R diagram generalization is represented by


a) Ellipse b) Triangle c) Rectangle d) Diamond

30. Rows of a relation is called


a) Relation b) tuple c) data structure d) an entity

31. The primary goals of DBMS is/are to


a) provide an b) store the c) retrieve d) All the above
environment thatis information information
congenial to user

32. A in a table represent a relationship among a set of values


a) column b) key c) row d) entity

33. Which normal form is considered adequate for relational database design?
a) 2NF b) 3NF c) 4NF d) BCNF

34. In database table, the category of information is called


a) tuple b) record c) field d) All of the above

35. An advantage of the database management approach is


a) data is b) data redundancy c) data is d) None of the
dependent on increases integrated and above
programs can be accessedby
multiple
programs

36. A function is no partial dependencies are in form


a) 2NF b) 3NF c) 4NF d) BCNF

37. Which one is not an application of database


a) sales b) college c) Attendance d) Bank
Register
38. In a database, which one is not a data type?
a) Varchar b) Integer c) Date d) Float

39. The features of database system are


a) Data security b) Enforcing data c) Data sharing d) All of the
integrity above

40. Database architecture is logically divided into_ types.


a) Two b) Three c) Four d) Multi

41. Three tier architecture includes


a) Presentation b) Application tier c) database tier d) All of the
tier above

42. Mathematical set theory-based relations


a) Union - b) Deference – c) Both A and B d) None of the
Intersection Cartesian Product above

43. Advantages of data ware houses:


a) Enhance end- b) Increases c) Able to d) All of the
user access to productivity and combine data above
reports and decreases from different
analysis of computing costs. sources, in one
information. place.
44. The information processing cycle consists of five specific steps:
a) Five b) Four c) Three d) None
45. The collection of raw facts and figures is called
a) Information b) Data c) Processing d) Knowledge

46. A single entry in a table is called


a) Row b) Tuple c) Field d) All of the above

47. ODBC stands for


a) One data base b) Open data base c) oracle data base d) Order data base
collection connectivity connection connectivity

48. refers to maximum numbers of relationship in an entity.


a) Generalization b) Ordinality c) Cardinality d) Aggregation

49. Candidate keys which are not currently selected as primary key is called
a) Super key b) Composite key c) Alternate key d) foreign key

50. In which file organization data are stored in chronological order?


a) Serial file b) Random/direct c) Sequential file d) ISAM
organization file organization organization

II Fill in the blanks choosing the appropriate word/words from those given inbrackets.
(Repeated answers will not be considered)
1. is a collection of facts, figures, statistics. (Data)
2. is processed data with some definite meaning. (Information)
3. A collection of logically related data organised in way that data can be easily accessed
managed and updated is called (Database)
4. A single entry in table is called a (Record or Row)
5. Records are also called the (Tuple).
6. Each column is identified by a distinct header called (Attribute or field)
7. Set of values for an attribute in that column is called (Domain).
8. A is a software that allow creation, definition and manipulation of database.
(DBMS)
9. is a process of hiding unwanted or irrelevant details from the end user.
(Data abstraction)
10. People who require access to the database for querying updating and generating reports is
(End Users)
11. is an ability of a database to modify a schema definition at one level
without affecting a schema in the next higher level. (Data Independence)
12. Database architecture is logically divided into _ types. (Three)
13. architecture is used for user interface program and application programs
that runs on client side. (Two-tier client/server)
14. data model is abstract model that describes how the data is
represented and used. (Data model)
15. The process of applying a data model theory to create a data model instance I
known as (data modelling)
16. is the process of organizing data in a database. (Normalization)
17. An can be any object, place, person or class. (Entity)
18. An describes a property or characteristics of an entity. (Attribute)
19. A describes relation between entities. (Relationship)
20. A is any set of one or more columns whose combined values are unique
among all Occurrences. (Candidate key)
21. is a key that uniquely identify each record in a table. (Primary Key)
22. is a field in a relational table that matches the primary key column ofanother
table. (Foreign key)
23. Key that consists two or more attributes that uniquely identify an entity occurrence
is called (Composite Key)
24. The process of sharing data stored in database is among multiple users.
(data sharing)
25. is a process of analysing and picking out relevant information from data.(Data
Mining)
26. Data about data is . (Metadata)
27. is a set of values for an attribute in a column. (Domain)
28. An entry in a table is a . (Record)
29. Process of extracting knowledge from collected data is called (data
mining)
30. is a repository of an organization electronically stored data. (Data
warehouse)
31. describes how the data is represented and used. (Data model)
32. combines two lower-level entity of from higher level entity.
(Generalization)
33. Records are stored in chronological order in (serial file
organization.
34. refers to the minimum number of relationships in an entity.
(Cardinality)
35. The duplication of data is called . (Data redundancy)
36. Ability of a database to modify a schema definition at one level without affected is
. (Data independence)
37. Data sharing database is easy because of (centralized data
management).
38. Collection of rows and column is called . (table)
39. is a set of values for each column. (Primary Key).
40. is a DBMS software. (Oracle)

************
chapter 14: SQL commands
1. Which of the following attributes can be considered as a choice for primary key?
a) Name b) street c) Roll no d) subject
2. What is the full form of SQL?
a) Structured Query Language c) Simple Query Language?
b) Structured Query List d) none of these
3. What is the full form of DDL
a) Dynamic Data Language. c) Data Definition Language
b) Detailed Data Language d) Data derivation language
4. What does DML stand for?
a) Different Mode Level c) Data Mode Lane
b) Data Model Languahe d) Data Manipulation Language

5. Which of the following keywords will you use in the following query to display the uniquevalues of a
column dept_name! Select dept_name from company:
a) ALL c) Distinct
b) From d) Name

6. The clause of select query allows us to select only those rows in the result satisfy a specified
condition.
a) where c) having
b) from d) like

7. Consider following SQL statement. What type of statement is this? Select *


from employee;
a) DML c) DCL
b)DDL d) Integrating constraint

8. The term is used to refer to a field in a table


a) Attribute c) Row
b) Tuple d) Instance

9. By default, ORDER by Clause lists the results in order


a) Descending c) Ascending
b) Any d) Both 1 and 3
10 . The keyword eliminates redundant data
a) SELECT c) DISTINCT
b) WHERE d) None of these

11. The _constraint provides a default value to column when the Insert into statement does not
provide a specific value.
a) DEFAULT c) CHECK
b) UNIQUE d) NOT NULL

12. The constraint ensure that all values in a column are distinct
a) DEFAULT b)UNIQUE c)CHECK d)NOT NULL
13. Theconstraint ensures that all values in a column satisfy certain condition a)DEFAULT
b)UNIQUE C) CHECK d) NOT NULL
14 ----------- is used to identify each row in a table
a) FOREIGN KEY b) UNIQUE c)CHECK d) PRIMARY KEY
15. To delete some data from tables command is used.
a) DELETE b) SELECT c) UPDATE d)DROP
16. The command lets your drop a table from the database
a) DELETE b)SELECT c) UPDATE d) DROP
17. key is non-key column of a table that draws its values from primary key of another table (parent table)
a) FOREIGN KEY b) UNIQUE c)CHECK d)PRIMARY KEY

CHAPTER 15 : COMPUTER NETWORKS


1) The full form of OSI is?
a. Operating System interface
b. Optical System interconnection
c. Operating System Internet
d. Open system interconnection
2) What is a HUB?
a. Software
b. Computing device
c. Network device
d. Calculating device
3) What does a set of rules define?
a. SMTP
b. FTP
c. IMAP
d. Protocol
4) Identify among the following which is mainly used to host web site.
a. Mail server
b. Webserver
c. Database server
d. None
5) Identify the full form of HTTP?
a. Hypertext Transfer Protocol
b. Hypertext Transfer Package
c. Hyper Transfer Text Package
d. Hyper Transfer Text Practice
6) Identify the protocol primarily used for browsing data.
a. FTP
b. TCP
c. TFTP
d. HTTP
7) Identify the first network which was based on TCP/IP protocol.
a. ARPANET
b. HUB
c. Ethernet Card
d. Router
8) What does TCP/IP stand for?
a. Telephone control protocol / Internet Protocol
b. Transmission control protocol/Internet protocol
c. Transmission control protocol/International protocol
d. None
9) The collection of hyperlinked documents on the internet known as?
a. HTML
b. Email
c. WWW
d. Internet
10) The location of a resource on the internet given by
a. Email
b. IP
c. Protocol
d. URL
11) Identify the incorrect network topology,
a. Bus
b. Star
c. P2P
d. Ring
12) What is the protocol used when the main server sends mail to another mail server?
a. FTP
b. SMTP
c. TCP/IP
d. MIME
13)Identify among the following network device used to connect two dis-similar types ofnetworks.
a. Switch
b. Hub
c. Bridge
d. Gateway
14) Identify the device used to boost up a weak signal.
a. Modem
b. Repeater
c. Switch
d. Router
15)The arrangement where all data pass through a central computer is known as
a. Ring topology
b. Mesh topology
c. Star topology
d. Bus topology
16)The device used in the network layer?
a. Application gateway
b. Switch
c. Router
d. Repeaters
17) Which of the following topology arrangements is a point-to-point line configuration?
a. Ring
b. Mesh
c. Star
d. All of the above
18)Identify the device which links two homogeneous packed broadcast local networks.
a. Hub
b. Router
c. Bridge
d. Gateway
19) What does LAN stand for?
a. Local Array Network
b. Local Area Network
c. Local Area Net
d. None
20) Identify the switching method in which the message is divided into small packets.
a. Virtual switching
b. Packet switching
c. Message switching
d. None
21) Identify among the following servers which allow LAN users to share data.
a. Communication server
b. Point server
c. Data server
d. File server
22)The location of a resource on the internet is given by its?
a. Protocol
b. URL
c. E-mail address
d. ICQ
23) Which software prevents the external access to a system
a. Firewall
b. Gateway
c. Router
d. Virus checker
24) Which one of the following is the most common internet protocol?
a. HTML
b. NetBEUI
c. TCP/IP
d. IPX/SPX
25) The term FTP stands for?
a. File transfer program
b. File transmission protocol
c. File transfer protocol
d. File transfer protection
26) Which one of the following is not a network topology?
a. Star
b. Ring
c. Bus
d. Peer to Peer

27) The term WAN stands for?


a. Wide Area Net
b. Wide Access Network
c. Wide Area Network
d. Wide Access Net

28) The term MAN stand for?


a. Metropolitan Area Net
b. Metropolitan Area Network
c. Metropolitan Array Network
d. Metropolitan Array Net
29) Which of the through share the data of two computer?
a. Library
b. Network
c. Grouping
d. Integrated system
30) It is a computer program deliberately created to damage data and hamper the performance
of the computer
a. System software
b. Application software
c. Utility software
d. Virus
31) Virus spread very fast through network and infected
a. Mind
b. Pen drives
c. Keyboard
d. Mouse
32) It infects program files as these have simple format t which virus can be attached
a. Program virus
b. Boot virus
c. Multipartite virus
d. None of these
33) The virus that affects the boot sector of the hard disk and infects the operating system whichmake the hard
disk completely useless
a. Program virus
b. Boot virus
c. Stealth virus
d. None of these
34) Which of these are harmful effects of virus
a. Damages data files
b. Increasing the size of files
c. Slowing down processing speed
d. All of the above
35) Computer software used to identify and remove computer virus
a. Anti virus
b. Computer virus
c. Trojan horse
d. Worms
36) Quickheal, Norton, Smartdog, Mcaffee are the examples of
a. ComputerVirus
b. Worms
c. Antivirus
d. Trojan horse
37)Abbrevation of SIM
a. Subscriber identity module
b. Supplier information management
c. Singular information management
d. Source interlink media
38) How many forms in twisted pair cable?
a. 2
b. 4
c. 3
d. None
39)The following are the types in twisted pair cable.
a. Sheilded twisted pair
b. Unsheilded twisted pair
c. Both a and b
d. Twisted pair cable
40)UTP stands for…
a. unshielded transport pair cable
` b. unshielded twisted pair cable
c. unshielded transmission pair cable
d. unshielded twisted pair control
41)STP stands for…
a. shielded twisted pair cable
b. shielded twisted pair connectors
c. shielded transport pair cable
d. shielded transport pair connectors
42)How many types of coaxial cable?
a. 2
b. 3
c. 4
d. 5
43) Which of the following are coaxial cable types?
a. thinnet
b. thicknet
C. copper
D. A and B both
44) Thicknet can carry signal for meters.
a. 500m
b. 1000m
c. 100m
d. 200m
45) The maximum segment length of Thinnet coaxial cable is
a. 500 meters
b. 185 meters
c. 4 meters
d. None of the above
46) The main source in fiber optic communication?
a. light source
b. transmission medium
c. detector
d. all of the above
47) The core of an optical fiber is .
a. glass
b. plastic
c. metal
d. A and B
48) Which of the following isn’t a type of transmission mode?
a. physical
b. simplex
c. full duplex
d. half duplex
49) In the transmission mode, communication is unidirectional
a. Simplex
b. half duplex
c. full duplex
d. semi-duplex
50) A transmission mode that can transmit data in both the directions but only one direction at a time.
a. simplex
b. half duplex
c. full duplex
d. semi-duplex
51) Telephone networks operate in this mode.
a. simplex
b. half duplex
c. full duplex
d. semi-duplex
52) A walkie-talkie operates in
a. simplex
b. half duplex
c. full duplex
d. semi-duplex
53) The is an example for a simplex device
a. Repeater b. Tap c. Walkie talkie d. Keyboard
54) In the transmission mode each station can transmit but not at the same time
a. Simplex b. Half duplex c. full duplex d. b and c
55) In the transmission mode both station can transmit and receive at the same time
a. Simplex b. Half duplex c. full duplex d. b and c
56) A local telephone network is an example of a network.
a. Packet switching
b. Circuit switching
c. Bit switched
d. Line switched
57) What is the meaning of MODEM
a. Modulator and demodulator
b. Modern electronic machine
c. Modern development machine
d. Machine and convertor
58) Which device is used for to send and receive data over telephone line
a. Router
b. Hub
c. Switch
d. Modem
59) What is the name for to convert digital signal to analog signal
a. Modulation
b. De modulation
c. Bypass
d. Encapsulation
60) An example for unshielded twisted pair cable(UTP) is
a. cat1
b. cat2
c. cat3
d. All the above
61) example for guided media
a. twisted pair wires, coaxial cables, and optical fiber cables b radio
wave
c. micro wave
d. all the above
62) example for unguided media
a. microwave or radio links and infrared light and laser
b. twisted pair wires, coaxial cables, and optical fiber cables
c. both a and b
d. none of the above
63) The switching techniques are
a. circuit , message , and packet
b. simplex, half duplex and full duplex
c. both a and b
d. none of the above
*******
Chapter-16 INTERNET AND OPEN SOURCE CONCEPTS
1. OSS stands for
a) on system software b) open system software
c) open source software d) off system software
2. software whose source code is available to customers and it can be modified andredistributed
is called
a) freeware b) OSS c) FSF d) proprietary software
3. Software which is available free of cost , but it cannot be modified is
a) freeware b) OSS c) FSF d) proprietary software
4. means the software which is freely accessible and can be freely used, changed,improved,
copied and redistributed. (OR)
A software and coding which is freely available on internet is
a) freeware b) free software
c) Open Source Software d) proprietary software
5. is responsible for producing the software standards for world wide web(WWW).
a) B2C b) W2C c) WWW d) W3C
6. The software that is neither open nor freely available is
a) freeware b) free software
c) Open Source Software d) proprietary software
7. FSF stands for
a) free software foundation b) friend software foundation
c) federation of software for free d) free system federation
8. OSI stands for
a) over source initiative b) open source initiative
c) open source of India d) open system initiative

9. is a set of protocols that allows to access any document on the net through URLs.
a) WWW b) HTML c) TCP/IP d) open source
10. is an internet utility used earlier to log on to remote computers.
a) web b) browser c) server d) Telnet
11. navigates through the world wide web and displays web pages.
a) web server b) web browser c) shareware d) software
12. responds to the requests made by web browsers.
a) web server b) web browser c) shareware d) software
13. The documents residing on web sites are called
a) web browsers b) web pages c) web server d) web
14. URL stands for
a) Universal reformation level b) uniform resource locator
c) uniform resource level d) uniform remote locator
15. is the trade of goods and services with the help of telecommunications andinternet.
a) E-commerce b) computerized commerce
c) E-trade d) Internet trade
16. Which of the following is not a service/technology of E-commerce?
a) E-mail
b) Electronic fund transfer (EFT)
c) Electronic Benefit transfer (EBT)
d) FSF
17. Which of the following is not a criteria for OSS?
a) FLOSS b) free redistribution
c) source code available d) distribution of license
18. Which of the following is not a type of E-commerce?
a) B2B b) C2B c) C2C d) C2D
19. IPR stands for
a) internet protocol rights b) international property rights
c) intellectual property rights d) Indian property rights
20)A shareware software is one in which the
a) source code is not available
b) Modifications to the software is not allowed
c) Both a and b
d) Any one above
21) A FLOSS refers to and
a) Free libre and open source software and both free software and open source softwareb)Freelirve and
open source software and both free software and open source software c) Both a and b
d) only a is correct 22).
Expand W3C
a) World wide web Consortium
b) it is world wide web
c) wide three consortium
d) None of the above
23). are founders OSI.
a) Bruce Perens and Erics Raymond
b) timmberners lee
c) Richard Stallman
d) All the above
24). The founder of FSF or Free Software Foundation is
a) Richard Stallman
b) Bruce perens and Erics Raymond
c) Tim berners Lee
d) None of the above
25). The HTTP (hyper text transfer protocol )is used to request and send a document overthe
a) Internet
b) Telnet
c)Browsers
d) servers
26). E-Commerce means
a) The trade of goods and services through Internet
b) Email
c) Digital cash
d) all the above
27). An example for E-commerce service is
a) email
b) Bulletin Boards
c) digital cash
d) All the above
28). An Advantage of E-commerce is
a) Gobal participation
b) Improved market Intelligence and strategic planning
c) optimization of resources
d) All the above
29) IPR related issues in India like patents trademarks, copyright, designs and geographical indications
are governed by the -
a) patent Act 1970 and patent Rules 2003
b) Trademark Act 1999 and the Trademarks Rules 2002
c) Indian copyright Act 1957, design act 2000 and rules 2001
d) all the above
30) The domain Id’s .co and .mil are affiliation for and respectively
a) commerce and mills
b) company and military
c) commercial and military
d) all the above

*****
chapter 17 - Web designing
1. Html tags are surrounded by……………
a. Angle bracket c. Flower bracket
b. Braces d. Brackets
2. Take out the odd one
a. <br> b.<hr> c.<img> d.<ol>
3. The tag which encloses an entire html document
a. Html b. Head c. Title d. body
4. The tag which is having heading information
a. Html b. Head c. Title d. body
5.tag is used to insert the title
a. Html b. Head c. H1 d. title
6.tag is used to adding the document contents
a. <body> b. <title> c.<html> d.<li>
7. The tag which is not executable by html
a. Comment b. Html c.body d. p
8. <h3>describes a …level of heading
a. First b.second c. Third d. Fourth
9. The tag which display the bullets
a. <ul> b.<ol> c. <br> d.<p>
10. The tag which display the number listing.
a. <ul> b.<ol> c. <br> d.<p>
11. The tag which describes the paragraph
a. Html b. Head c. P d.h2
12. Take out the odd one
a. Adobe reader c. Microsoft expression web
b. Coffeecup html d. notepad
13. The html program should save with
a. .html b. html. C./html d.:html
14. The tag which link the address
a. <a> b.<br> c.<img> d.<hr>
15. Html forms contains
a. Text fields b. Checkboxes c. Radio buttons d. All the above
16. The tag which breaks the line
a. <a> b.<br> c.<img> d.<hr>
17. The tag which is used to create the table
a. Table tag b. Tabel tag c. <td> d. <hr>
18. The tag which is used to create the table row
a. <tr> b.<br> c.<td> d.<hr>
19.tag used to create the table data
a. <tr> b.<br> c.<td> d.<hr>

20.defines set of frames


a. <frameset> b. <frame> c.<form> d. <input>
21.creates the individual frame
A. <frameset> b. <frame> c.<form> d. <input>
22 ......................defines an input control
A. <input> b.<frame> c.<frameset> d.<output>
23. The format of text fields <input type=”text”>
24.The format of password fields <input type=”password”>
25. The format of radio button <input type=”radio”> 26.the
format of check box is <input type=”checkbox”> 27.the format of
submit button is <input type=”submit”> 28.textarea defines a
multiline input control
29. label defines a label for an <input>element
30. option defines an option in a drop down list
31. xml stands for extensible mark up language
32. Xml tags are case sensitive
33. Html is the mother tongue of the browser
34. Father of html is tim bernars li
35. expand DHTML Dynamic Hyper text markup language
********************************
KARNATAKA STATE PRE-UNIVERSITY EDUCATION
II PU Computer Science Blueprint
UNIT DESCRIPTION VSA SA LA E Total
(1 Mark) (2 Marks) (3 Marks) (5 Marks) Marks
Chapter 1 Typical
5 Hrs configuration of 1(mcq) ------ 1 ------- 4
Computer system
Chapter 2 Boolean algebra 1(mcq) 2 ----- 1 09+1
10 Hrs
Chapter 3 Logic Gates 1(mcq) ------ 1 ------- 04
5 Hrs
Chapter 4 Data structures 1(mcq) ------ 1 2 14
15 Hrs
Chapter 5 Review of C++ ------- ------- ------- ------ ----
3 Hrs covered in First PUC
Chapter 6 OOP concepts ---- 1 ---- 1 07
4 Hrs
Chapter 7 Classes and objects 1(mcq) ------ ----- 1 06
6 Hrs
Chapter 8 Function 1(mcq) ------ ------ 1 05+1
3 Hrs Overloading
Chapter 9 Constructors and 1(mcq) 1 ---- 1 07+1
8 Hrs Destructors
Chapter 10 Inheritance 1(mcq) ----- ------ 1 05+1
8 Hrs
Chapter 11 Pointers 1(mcq) ----- 1 ------ 04
7 Hrs
Chapter 12 Data File handling ------- 1 1 ------ 05
6 Hrs
Chapter 13 1(mcq)
8 Hrs Database concepts 5x1-Fill-in 1 1 1 11+5
blank
Chapter 14 SQL commands 1(mcq) 1 ----- 1 07+1
12 Hrs
Chapter 15 Networking 2(mcq) 1 ---- 1 9
10 Hrs Concepts
Chapter 16 Internet and Open 1(mcq) ---- 1 ----- 4
5 Hrs source concepts
Chapter 17 Web Designing 1(mcq) ----- 1 ------ 4
5 Hrs
Total Marks 10+10 16 24 55 115
Total No of 70/47
Questions to be 1x20=20 2x4/8=08 3x4/8=12 5x6/11=30
answered

NOTE: 1. Questions should be direct


2. The answers should be present in the prescribed textbook by PUE
3. 40% - Simple, 40% - Average and 20% - Difficult questions
4. Questions should be according to Blueprint
II PU COMPUTER SCIENCE – MODEL PAPER - 1

PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20

I Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which among the following is the fastest memory in a computer that holds information?
a) Register b) Cache
c) Main memory d) RAM
2. The other name of Boolean algebra is
a) Switching algebra b) Relational Algebra
c) Digital Algebra d) None of the above
3. The other name of NOT gate is
a) Neglect gate b) Inverter gate
c) XOR gate d) XNOR gate
4. The data structure that allows the insertion, as well as the deletion from both the ends, are:
a) String b) Linked List data structure
c) Stack data structure d) Dequeue data structure
5. What is the other name used for functions inside a class?
a) Member variables b) Member functions
c) Class functions d) Class variables
6. Function cannot be overloaded when
a) Function names are same b) Number of parameters are different
c) Number of parameters are same d) Data types of parameters are different
7. The symbol used with constructor is
a) $ b) &
c) Delta c) ~
8. Base class is
a) a sub class b) inherited class
c) Main class d) First class
9. Which of the following is the correct way to declare a pointer?
a) int *ptr b) int ptr
c) int &ptr d) All of the above
10. is called information.
a) Raw fact b) collection of data
c) Unprocessed data d) Processed data
11. SQL is .
a) Theoretical Language b) Procedural Language
c) Structured Language d) Unstructured Language

12. FTP stands for

a) Final Transistor Protocol b) File Transformation Protocol


c) File Transfer Protocol d) File Transaction Protocol
13. Which of the following is not a type of network?
a) LAN b) MAN
c) PAN d) VAN
14. A software and coding which is freely available on internet is .
a) Community Software b) Free Software
c) Open-Source Software d) Unlicensed Software
15. HTML stands for
a) Hyper Text Makeup Language b) Hyper Text Markup Language
c) Hyper Text Marking Language d) Hyper Text Marker Language
II Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)
16. Collection of rows and columns is called as
17. is a collection of interrelated data.
18. Data duplication is called as .
19. is a software for creating and managing databases.
20. Protection of data is the .
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove ̅X = X.
22. Define tautology and fallacy.
23. What is encapsulation? Give an example.
24. What is destructor? Give example for destructor.
25. Mention any two functions of ifstream and give their meaning.
26. Give any two advantages of database system.
27. Give the syntax and example for INSERT command in SQL.
28. Briefly explain circuit switching.

PART – C

Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12


29. Briefly explain any three types of mother board.
30. Write the logic diagram and the truth table for XOR gate.
31. Give the memory representation of stack data structure.
32. Mention any three advantages of pointers.
33. What is a data file? Differentiate between text and binary files.
34. Give the meaning for any three components of E-R diagram.
35. What is e-commerce? Explain any one type of e-commerce.
36. Explain any three table tags in HTML.
PART – D

Answer any SIX questions. Each question carries five marks. 5 x 6 = 30


37. Give the Boolean function F(A,B,C,D) = Σ(0,2,5,7,8,10,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any five operations performed on primitive data structure.
39. Write an algorithm to delete a data element from an array.
40. Give the differences between procedural programming and object-oriented programming.
41. With an example explain member function inside the class definition.
42. What is a friend function? Mention the characteristics of a friend function.
43. What is a parameterized constructor? Mention the advantages of parameterized constructor.
44. What is inheritance? Explain any two types of inheritance.
45. Differentiate between manual and electronic data processing.
46. Explain CREATE and UPDATE commands in SQL.
47. Explain the following:
i. SMS ii. E-mail iii. Voice mail iv. Chat v. Video conference

*****
Model Question Paper-2
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70

PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. CPU’s working memory is
a) Cache memory b) Register
c) Primary memory d) Secondary memory
2. Minterm of X̅ ̅Y=
a) m3 b) m2
c) m1 d) m0
3. The standard symbol represnts
a) OR gate b)AND gate
c) NAND gate d) NOR gate
4. is an example for non-primitive data structure
a) Integer b) Float
c) Stack d) Pointer
5. Which access specifier is implicitly used in class?
a) Private b) Public
c) Protected d) Friend
6. is although not a member function has full access right to the private andprotected members
of the class.
a) Overloaded function b) Inline function
c) Friend function d) Recursive function
7. In constructor, declaration of an object is followed by assignment operator, constructorname and argument list
enclosed in parenthesis is
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. The class that inherits properties from another class is
a) Base class b) Derived class
c) Virtual class d) Abstract class
9. Which of the following is the address operator?a) :: b)
.
c) * d) &
10. Set of values for an attribute in that table is
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DDL command:
a) Create b) Alter
c) Drop d) Delete
12. A hardware device used to connect several computers together is
a) Router b) Bridge
c) Switch d) Hub
13. CDMA stands for
a) Code Data Multiple Access
b) Code Division Multiple Access
c) Common Division Multiple Access
d) Common Data Multiple Access
14. The Software that is neither open nor freely available is called is
a) Free software b) Freeware
c) Proprietary software d) Open source software
15. is a text-based markup language.
a) HTML b) XML
c) DHTML d) PHP
II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
(ISAM, Database, Data mining, Key, Schema)
16. is a collection of logically related data organized in a way that data canbe easily accessed,
managed & updated.
17. is a set of one or more columns whose combined values are unique amongall occurrences in a given table.
18. is the hybrid between sequential and direct access file organization.
19. Database objects that contain data govern or perform operation on data is
20. A technique which is concerned with the analysis & picking out relevant informationis called

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X22.State
De Morgan’s theorems.
23. Write a note on polymorphism. Give an example.
24. Write any two features of parameterized constructors.
25. Differentiate between seekg( ) and seekp( ).
26. What is a candidate key & alternate key (secondary key)?
27. Write the syntax & example for alter command.
28. List the different applications of networking.
PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12 29.Explain the different types of
Motherboard.

30. Write the logic diagram and the truth table for XOR gate.
31. What are the advantages of arrays?
32. What is a pointer? Give the declaration and initialization of a pointer.
33. Mention different operations basic operation on binary file in C++.
34. Explain any three data types supported by DBMS.
35. Explain the technologies & services used in e-commerce.
36. What is web scripting? Mention the types.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
Boolean function F(A, B, C, D)= Σ(0,3,4,6,8,9,10,11,12,14).

Reduce the function F using K-map.


38. Explain the different operations performed on queue.
39. Write an algorithm to search an element in an array using binary search.
40. Write the advantages of object-oriented programming (OOP).
41. Explain how objects of a class can be defined with suitable example.
42. Explain inline functions with syntax and example.
43. Explain default constructor with syntax and example.
44. What is inheritance? Briefly explain multilevel and multiple inheritance.
45. Explain the applications of database system.
46. Explain any five character (text) built-in functions in SQL.
47. What is compute virus? Write the symptoms (characteristics) of computer

***********
Model Question Paper-3
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70

PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The CPU is fabricated as a single Integrated Circuit (IC) chip and is
a) Motherboard b) Microprocessor
c) Register d) Circuit board
2. Maxterm of X + Y + Z =
a) M3
Y +Z

b) M2
c) M1 d) M0
3. Standard symbol for XOR gate is
a) + b)
c) . d) x
4. is an ordered collection of items where the addition of newitems and the
removal of an existing item always takes place at the same end.
a) Queue b) Linked list
c) Stack d) Tree
5. operator is used to define the member function outside the class.
a) . b) ::
c) * d) &
6. Function Overloading is also known as
a) Compile time polymorphism b) Run time polymorphism.
c) Compile time encapsulation d) Run time encapsulation
7. In constructor, the declaration of the object is followed by argument list enclosed inparentheses.
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. class prevent multiple copies of the base class being present in anobject derived
from those objects.
a) Base class b) Derived class
c) Virtual base class d) Abstract class
9. is the collection of addresses.
a) Array of objects b) Array of address
c) Array of variables d) Array of pointers
10. A single entry in a table is
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DML command:
a) Create b) Insert
c) Update d) Delete
12. is an example for half duplex communication mode.
a) Radio b) Television
c) Walkie-Talkie d) Modern telephone system
13. is consists of a central node to which all other nodes are connectedby a single path.
a) Bus topology b) Star topology.
c) Ring topology d) Tree topology
14. URL stands for
a) Unique Resource Location b) Uniform Resource Location
c) Unique Resource Locator d) Uniform Resource Locator
15. refers to web content that changes each time it is viewed
a) HTML b) XML
c) DHTML d) PHP
II. Fill in the blanks choosing the appropriate word/words from those givenin brackets. (Repeated answers will
not be considered
(Physical data independence, Hierarchical data model, DBMS, One-tier architecture, ER Diagram)
16. allows creation, definition & manipulation of database.
17. is a visual representation of data that describes how data is related toeach other.
18. is an ability of a database to modify a schema definition at internal levelwithout affecting a
schema in the next level.
19. organizes the data in a tree like structure in which each child node canhave only one
parent node.
20. In , DBMS is the only entity where user directly sits on DBMS &uses it.

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that 1 + X = 1 using proof by perfect induction method.
22. Write any two basic postulates of Boolean algebra.
23. Write the disadvantages of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Differentiate between tellg( ) and tellp( ).
26. What is the difference between serial & direct access file organization?
27. Write the syntax & example for drop command.
28. List the goals for networking.
PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is a port? Explain serial port.
30. Write the logic diagram and the truth table for NAND gate.
31. What are the disadvantages of an arrays?
32. What is static memory allocation? Explain.
33. Mention the types of file. Explain any one.
34. Explain any three database users.
35. What are the advantages of e-commerce?
36. What is web hosting? Mention different types of web hosting.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= Σ(0, 4, 8, 9, 10, 11, 12, 13,
15) Reduce the function F using K-map.
38. Define: a. Root Node b. Leaf Node c. Height d. Depth e. Internal node.
39. Write an algorithm to insert a data element at the rear end of the queue.
40. Write a difference between procedural oriented programming & object-orientedprogramming (OOP).
41. Explain the class definition and declaration with syntax and example.
42. Define an inline function. Write the advantages & disadvantages of inline functions.
43. What is copy constructor? Explain with programming example.
44. What is single level inheritance? Explain with programming example.
45. Give the difference between manual & electronic file systems.
46. Explain the data types used in SQL.
47. Explain any five networking devices.

***********
Model Question Paper-4
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70

PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The parallel port can transfer bit of data at a time.
a) 1 b) 4
c) 8 d) 16
2. The X+XY = X is
a) Associative Law b) Involution law
c) Complementarity law d) Absorption Law
3. A logic gate with only one input signal and one output signal but the output state isalways opposite of the
input state is
a) AND gate b) OR gate
c) NOT gate d) NOR gate
4. is an example for linear data structure.
a) Integer b) Linked list
c) Graph. d) Tree
5. is an instance of a class.
a) Access specifiers b) Data members
c) Member functions d) Objects
6. The functions are compact function calls.
a) Overloaded b) Inline
c) Friend d) All of the above
7. The constructor must be declaring in section.
a) Private b) Public
c) Protected d) None of the above
8. is one that is not used to create objects.
a) Sub class b) Derived class
c) Virtual class d) Abstract class
9. operation can be performed on pointers.
a) Addition of two pointers
b) We can subtract one pointer from another pointer if both point tothe same array.
c) Subtraction of one pointer from another pointer when they do not pointto the same array.
d) Multiplication of two pointers
10. is a field in a one table that uniquely identifies the row of another table.
a) Primary key b) Foreign key
c) Candidate key d) Alternate key
11. Which command is used to modify an existing record in SQL?
a) Update b) Change
c) Modify d) Alter
12. A device that connects dissimilar networks is
a) Router b) Bridge
c) Gateway d) Hub
13. HTTP stands for
a) Hypertext Transistor Protocol b) Hypertext Transfer Protocol
c) Hypertest Transistor Protocol d) Hypertest Transfer Protocol
14. navigates though the world wide web(www) and displays web pages
a) Web browser b) Website
c) Web server d) URL
15. tag is used to create hyperlink.
a)<li> b) <a>
c) <h1> d) <b>
II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
(Specialization, Metadata, Data integrity, Attribute, Relational data model)
16. Each column is identified by a distinct header is called
17. refers to the validity of data & it can be compromised in a number of ways
18. In , there are no physical links.
19. is a top down approach in which one higher level entity can be brokendown into two lower level entities.
20. is used to inform operators and uses of the data warehouses aboutits status.

PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X
22. What is minterm and maxterm?
23. Write any two applications of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Mention the methods of opening file within C++ .
26. Mention the types of data independence.
27. Give the difference between char and varchar datatypes in SQL.
28. Name the different types of twisted pair cable.

PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain the characteristics of motherboard.
30. Write the logic diagram and the truth table for OR gate.
31. What are the applications of an arrays?
32. What is array of pointers? Give an example.
33. Differentiate between ifstream class and ofstream class.
34. Give the different notations for E-R diagram
35. Write any three criteria of open source software.
36. Give the features of DHTML?

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= m0 + m1 + m2 + m3 + m4 + m5 + m8 + m9
+ m10 + m11 + m13 + m15. Reduce the function F using K-map.
38. What is primitive data structure? Explain the different operations performed onprimitive data
structure.
39. Write an algorithm to search an element in an array using linear search method.
40. Explain the different characteristics of OOP.
41. Explain how do we define member function inside the class definition. Giveexample.
42. Explain friend functions with example.
43. What is copy constructor? Explain with programming example.
44. What is visibility mode? What is its role with respect to inheritance?
45. Explain ISAM with example.
46. What is data definition language? Explain create and select commands in SQL.
47. Explain the applications of networking?

***********
Model Question Paper-5
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70

PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. A slot which is used to connect modem and input devices is
a) AGP slot b) PCI slot
c) ISA slot d) Processor slot
2. According to Boolean law: X + 1 =
a) 0 b) 1
c) X d) X̅
3. Universal gates are:
a) AND and OR b)NAND and NOR
c) XOR and XNOR d) None
4. A queue follows:
a) LIFO b) FIFO
c) Linear tree d) Ordered array
5. Data members are accessed only by the member functions, friends of the class andalso by the member
functions derived from this class is
a) Private b) Public
c) Protected d) Friend
6. The inline function may not work some times for one of the following reasons:
a) The inline function definition is too long or too complicated
b) The inline function is recursive
c) The inline function has looping constructs
d) All of the above
7. A constructor that accepts parameters is called the default constructor.
a) No b) One
c) Two d) Three
8. The class whose properties are inherited by another class is
a) Base class b) Derived class
c) Virtual class d) Abstract class
9. Which of the following is the pointer operator?
a) :: b) .
c) * d) &
10. Each column is identified by a distinct header is
a) Tuple b) Entity
c) Attribute d) Domain
11. Which command is used to modify an existing table in SQL?
a) Update b) Change
c) Modify d) Alter
12. A set of rules and guidelines for communicating data is
a) Protocol b) Packet
c) Data gram d) Data channel
13. TCP/IP stands for
a) Telephone control protocol/Internet protocol
b) Transmission control protocol/Internet protocol
c) Telephone control protocol/ International protocol
d) Transmission control protocol/International protocol
14. The software whose source code is available to customers and it can be modifiedand redistributed
without any limitations is
a) Free software b) Freeware
c) Shareware d) Open source software
15. provides an object-oriented view of a Web page and its elements.
a) HTML b) XML
c) DHTML d) PHP

II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
(Domain, Normalization, Aggregration, Data warehouse, Data processing)
16. is series of actions or operations from input data to generate outputs.17.Set of values
for an attribute in that table is called as
18. A process when relation between two entities is treated as a single entity iscalled
19. The process of organizing the data in a database is called
20. A repository of an organization’s electronically stored data is called
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that XY+̅XY=X.
22. State the principles of duality theorems.
23. Explain data encapsulation.
24. What is a destructor? Give its syntax.
25. Write the member functions belonging to ifstream class.26.Define primary key & foreign key.
27.Write the syntax & example for delete command.
28.Explain simplex communication mode.

PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain cache memory.
30. Write the logic diagram and the truth table for AND gate.
31. Write the memory representation two-dimensional arrays in row-major order.
32. What are the advantages of pointer?
33. Explain any three file modes.
34. Explain any three components of E-R diagram.
35. What is e-commerce? Explain types of e-commerce.
36. Explain the structure of HTML.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)=Σ(0,1,2,3,4,5,6,7,8,9,10,11).
Reduce the function F using K-map.
38. Explain the different operations performed on linear data structure.
39. Write an algorithm for push and pop operation in stack using array.
40. Write the applications of object oriented programming (OOP).
41. Explain the member functions outside a class with an example.
42. Discuss overloaded functions with syntax and example.
43. What is a constructor? Write the rules for writing a constructor function.
44. What is inheritance? What are the advantages of inheritance?
45. Explain the features of database system.
46. Explain the various group functions in SQL.
47. What is network? Mention different network goals.
***********

You might also like