Professional Documents
Culture Documents
Ii Pu CS MCQ - Key Answer-2022-23
Ii Pu CS MCQ - Key Answer-2022-23
II PU
COMPUTER SCIENCE
CHAPTER WISE
MCQ -2022-23
2. Which of the following are the two main components of the CPU?
a). Control Unit and Registers b). Registers and Main Memory
3. Personal computers used a number of chips mounted on a main circuit board. What
is the common name for such boards?
a). Daughterboard b). Motherboard c). Father board d). Child board
6. VGA is
a). Video Graphics Array b). Visual Graphics Adapter
c) Visual Graph Array d) Visual Gate Array
7. UPS stands for:
a) Universal Power Supply b) Uninterrupted Power Supply
c) Universal Power system d) Uninterrupted power System
a) b) c) d)
a) = X b) X.X = X c) X+X=X d) =0
19. _________ is not a De’ Morgan’s Theorem
a) b) c) d) xyz = x.y.z
20. Choose the concept which does not belongs to the group
a) OR to AND b) AND to OR c) . to + d) + to |
a) b) c) d)
a) b) c) d)
a) X + X = X b) X + Y = X c) X . X = 0 d) X + X = 1
a) b) c) X + Y = X Y d)
a) x + y = y + x b) x . y = y . x c) x + y = y . x c) 2 + 3 = 3 + 2
a) m1 b) m3 c) m4 d) m5
a) m1 b) m3 c) m5 d) m7
a) M0 b) M1 c) M2 d) M3
36. How many variables we get in the reduced form for pair reduction in K-Map
a) 3 b) 2 c) 4 d) 1
40. How many variables we get in the reduced form for Octet reduction in K-Map
a) 3 b) 2 c) 1 d) 4
KEY ANSWER
1 2 3 4 5 6 7 8 9 10
a c b a a b b a a a
11 12 13 14 15 16 17 18 19 20
a b a a c c b a d d
21 22 23 24 25 26 27 28 29 30
a b d a a a a c a
31 32 33 34 35 36 37 38 39 40
a d d a a a b a b c
42. ___________is the process of accessing each data item at least once to perform some
operation.
43. The process of adding a new data item into the given collection of data items is
called ________.
44. The process of removing an existing data item from the given collection of data
items is called ________________.
48. An array in which array elements are accessed with two subscripts is known as
_____________.
49. ____________ordered collection of items where an item is inserted at one end called
“rear end “and an item is removed at the other end called “front end”.
56. A name given to the programming elements such as variables, arrays, functions etc.is a
57. A function call is not known until the time of the call at runtime is the
58. In one of the following feature, function can take multiple forms based on the type
c) Inheritance d) class
60. Permitting the user to use on object without knowing its internal working is called
64. The processing of data in object oriented programming is carried out by sending
messages to object is
a) Class b) object c) message passing d) abstraction
65. The object can contain data and code to ____the data
66. The data and functions are combined into a single unit class by_____
41 42 43 44 45 46 47 48 49 50
C a b c a b a b a c
51 52 53 54 55 56 57 58 59 60
a b d d b a b a c c
60 61 62 63 64 65 66 67 68 69
a) $ b) # c)~ d) @
74. _________is the class whose properties are inherited by another class.
75. _________is the class that inherits properties from base class (es).
77. A derived class with only one base class is known as____________________.
78. The class can also be derived from the classes that are already derived is called____.
a) constructor. b) Destructor
69 70 71 72 73 74 75 76 77 78
a b b d c a b c a b
79 80 81 82 83 84 85 86 87 88
a b d a b c c c d d
Chapter-10: Inheritance
88. Capability of one class acquiring properties from another class is called___
(a) :: (b) ;
(c) . (d) :
97. In private inheritance public members of base class becomes members of derived
class.
108. ____is the built in pointer that hold the address of the object defined for a class
110. is the structure that include an element that points to another structure of same
type
88 89 90 91 92 93 94 95 96 97
d b A B B D D A c c
a d a a a c b a b a
a d b a
120. A row of a table that represents a complete information about a particular entity is
called as a ______________
137. SELECT command is used for querying or retrieving data from a table in the
database.
ALTER b) CREATE c) DROP d) INSERT
a) Take back privileges granted from the user b) Gives a privileges to user.
c) Take back and delete from the user d) All of the above
112 113 114 115 116 117 118 119 120 121
d b a d a b d a a d
122 123 124 125 126 127 128 129 130 131
a d a b c a a b b a
132 133 134 135 136 137 138 139 140 141
d c d b a d b b a
142 143 144 145 146 147 148 149 150 151
d c d a b c d c a b
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
(Data Abstraction, Internal level, Physical level, Conceptual level, view level.)
called ______________.
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
174. Person who have the authorization to access, monitor data base is_________
176. Extracting and discovery of knowledge from large amount of data is called ______
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
177. _________keys are the keys which are not currently selected as primary key.
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
191. Process of cleaning, standardized and loading data in data warehouse is called___
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
193. ________is the architecture where users directly sit on DBMS and uses it.
196. Ability database to modify schema at one level without affecting it on another level
is__
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
database?
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
206. Ability database to modify schema at one level without affecting it on another level
is _
Fill in the blanks choosing the appropriate word/words from those given in
216. Which of the following keywords will you use in the following query to display the
unique values of a column dept_name!
217. The _______clause of select query allows us to select only those rows in the result that
satisfy a specified condition
a) where b) from c) having d) like
222. The _________constraint provides a default value to column when the Insert into
statement does not provide a specific value.
223. The __________constraint ensures that all values in a column are distinct.
224. The ___________constraint ensures that all values in column satisfy certain conditions.
227. The _________command lets your drop a table from the database.
228. _____________Key is non-key column of a table (child table) that draws its values form
212 213 214 215 216 217 218 219 220 221
c a c d c a a a d c
222 223 224 225 226 227 228 229 230 231
a b c d a b d
232. ___________is the process of efficiently selecting a path in a network along which
233. _______Address refers to the unique physical address to each NIC card assigned by
NIC manufacture.
237. ________is a phenomenon that connects the things (smart devices) to the internet
a) FM b) RFID c) IoT d) AM
240. __________ is host computer that requests for some services from a server
241. __________ is a computer on the network that facilitate the sharing of data,
242. A work station that can be doubled up as a server and client is known as________
a) Client b) server
244. A__________ refers to a pre-decided set of rules using which all parties of a network
247. The networks spread across countries or on a very big geographical area
248. ______refers to all the legal and regulatory aspects of Internet and World Wide Web.
249. Server exclusively used for serving files related requests are called _______.
CHAPTER -16 & 17: - Internet & Open source _Web designing
250. ___________ is a collection of computer networks all over the world.
a) Intranet b) Internet c) computer d) interspace
251. ___________ is a software application that enables the user to interact with web
page information
a) Computer b) server c) Browser d) all the above
256. ___________ is a program which has the potential to harm the computer system.
a) Virus b) OS c) Thread d) word
257. ___________ is an email which can be used to send unsolicited messages and
unwanted advertisements.
a) Inbox b) sent c) draft d) Spam
265. ___________ is a web document which is suitable for WWW and accessed by a web
browser.
a) Image b) Text Page c) Webpage d) Graph
229 230 231 232 233 234 235 236 237 238
b a b a c d d a c b
239 240 241 242 243 244 245 246 247 248
a c d c a b d c b a
249 250 251 252 253 254 255 256 257 258
c b c a d c d a d b
259 260 261 262 263 264 265 266 267 268
a b c a c d c b c d
269 270 271 272 273 274 275 276 277 278
d c b c a a
NETWORKING CONCEPTS
1. Interconnection of autonomous computer is called _________
8. __________ Layer is to accept data from above layer and split it up into smaller units
9. IC stands for
a) Interconnection b) Independent
c) Interspace d) Internet
15. Server can be of ________ types dedicated server and non – dedicated server
a) 2 b) 4 c) 3 d) 5
17. The networks spread across the countries are known as _________
19. _________ topology consists of a single length of transmission medium into which
the various nodes are attached.
21. _________ refer to the computer that are attached to a network and are seeking to
share the resource of the network.
22. ______ is an application level protocol with the lightness and speed necessary for
distributed, collaborative, hypermedia information system.
24. The _________ layer allows users on different machines to establish sessions
between them.
29. A ____ is a device that lets you link two similar type networks together
36. _______ is a device that amplifies a signal being transmitted on the network
40. Wimax can provide broadband wireless access upto 30 miles for ______
41. __________ are messages that a web server transmits to a web browser so that a web
server can keep track of the user’s activity on a specific web site.
42. The _______ are malicious programmers who break into secure systems.
43. __________ is a malicious program that requires a host and is designed to make a
system sick
44. Wi – Fi refer
50. A __________ is a live, visual connection between two or more people residing in
separate locations for the purpose of communication.
a) Wi – fi b) Chat c) VC d) Wi Max
52. The GSM standard for digital cell phones was established in Europe in the mid
________
53. The ________ in wireless networks refers to the “generation” of the underlying
wireless technology.
a) G b) B c) M d) N
a) 2G b) 4G c) 3G d) 5G
57. In India the cyber laws are contained in the information technology act, 2000 which
was notified on __________ October 2000.
a) 15 b) 17 c) 20 d) 10
58. _____ virus use protocols and commands of computer network to spread themselves
on the network.
59. __________ is more commonly known today is a computing platform widely used by
IT service companies.
60. __________ form of coaxial cable is thinner and it can have maximum segment
length of 185 meters.
61. __________ is the basis for most internal office telephone wiring.
63. The purpose of a _________ is also sharing of the hardware and the software
resources among its users.
65. __________ was the first protocol for relaying the IP packets over dial – up lines.
67. A __________ is a unit of data, which is what the protocols deal with
69. ____________ sharing provides sharing and grouping of data files over the network.
70. The _________ layer is used to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer.
1. d) Network
4. d) Physical layer
5. d) Application layer
6. a) Presentation
7. c) Network
8. a) Transport
9. a) Internet protocol
11. a) FTP
14. c) Interspace
15. a) 2
17. c) WANs
18. b) Network
19. d) Bus
20. c) Tree
21. b) Nodes
22. c) HTTP
23. a) IP
24. d) Session
28. b) Switch
29. d) Hub
34. c) Gateway
35. d) Hub
36. a) Repeater
38. d) 16 to 64kb
41. c) Cookies
42. a) Crackers
45. c) Wavelength
46. d) Laser
47. a) Modem
48. b) Gateway
49. a) WLL
50. d) VC
51. a) Wi – fi
52. c) 1980
53. a) G
54. d) 5G
57. b) 17
58. c) Network
61. a) VGM
62. b) Tree
63. c) MAN
64. c) File
65. b) SLIP
66. d) Packet
68. a) TCP
69. c) Email
70. b) Physical