You are on page 1of 37

II PU COMPUTER SCIENCE MCQ-2022-23

II PU

COMPUTER SCIENCE

CHAPTER WISE

MCQ -2022-23

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Chapter-1: Typical configuration of Computer.


1. Secondary memory is also known as?
a) Second pass memory b) Dynamic memory
c) Auxiliary memory d) Temporary memory

2. Which of the following are the two main components of the CPU?

a). Control Unit and Registers b). Registers and Main Memory

c). Control unit and ALU d). ALU and bus

3. Personal computers used a number of chips mounted on a main circuit board. What
is the common name for such boards?

a). Daughterboard b). Motherboard c). Father board d). Child board

4. What is the Expansion of ISA?


a) Industrial Standard Architecture b) International Standard Architecture
c) Industrial Standard Auxiliary device d) International standard advice
5. ALU means
a). Arithmetic Logic Unit b). Array Logic Unit
c). Application Logic Unit d). None of above

6. VGA is
a). Video Graphics Array b). Visual Graphics Adapter
c) Visual Graph Array d) Visual Gate Array
7. UPS stands for:
a) Universal Power Supply b) Uninterrupted Power Supply
c) Universal Power system d) Uninterrupted power System

8. What is Cache Memory


a) High speed memory b) volatile Memory
c) Low speed memory d) Escape memory
9. How many bits of data are transferred in serial port?
a) One bit b) Two bits c) three bits d) four bits
10. Use of modem.
a) Modulates and demodulates signals b) emits the signals
c) Synchronizes the signals d) transfers the unwanted bits

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Chapter-2 & 3: Boolean algebra & Logic Gates

11. Who developed Boolean algebra?

a) George Boole b) Charles Babbage c) Herman Hollerith d) Blaise Pascal

12. The another name for Boolean algebra is __________

a) Digital Algebra b) Switching algebra

c) Binary algebra d) Postulate algebra

13. Which among the following is not a Basic gate?

a) AND gate b) OR gate C) NOT gate d) XOR gate

14. The other name Inverter gate is ___________

a) Not gate b) OR gate c) AND gate d) XOR gate

15. Venn diagram for AND gate is

a) b) c) d)

16. which gate takes maximum one input signal

a) AND gate b) OR gate c) NOT gate d) XNOR gate

17. Which among the following is not a Boolean Postulate?

a) X+X=X b) X. X=0 b) 0.X = 0 d) 0 + X = x

18. Involution law states that ____________

a) = X b) X.X = X c) X+X=X d) =0
19. _________ is not a De’ Morgan’s Theorem

a) b) c) d) xyz = x.y.z
20. Choose the concept which does not belongs to the group

a) OR to AND b) AND to OR c) . to + d) + to |

21. Minterm is ___________.

a) Product of n variables b) Sum of n variables

c) Division of n variables d) Mod of n variables

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
22. Maxterm is _____________.

a) Product of n variables b) Sum of n variables

c) Division of n variables d) Mod of n variables

23. Which one is not a Derived Gate?

a) NOR b) NAND c) XOR d) OR

24. Karnaugh Map is used to ____________.

a) Reduce the expression b) Increase the expression

c) Calculate the expression d) Format the expression

25. Venn diagram for OR gate is

a) b) c) d)

26. Venn diagram for NOT gate is

a) b) c) d)

27. Indempotence Law states that_________

a) X + X = X b) X + Y = X c) X . X = 0 d) X + X = 1

28. Complementarity Law states that_______

a) b) c) X + Y = X Y d)

29. Which among the following is not a commutative Law

a) x + y = y + x b) x . y = y . x c) x + y = y . x c) 2 + 3 = 3 + 2

30. Which one is the associative law?

a) x+(y+z) = (x+y)+z b) x+y+z = z+y+x b) x+yz = xy + xz d) yz = z+y

31. Distributive Law states that ______

a) x(y+z) = xy+xz b) x+(y+z) = (x+y)+z c) x(yz) = (xy)z d) x+y+z = z+y+x

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
32. Which among the following is not a Absorption Law

a) x+xy = x b) x.(x+y) = x c) d) x+y=y+x

33. Minterm notation of is____

a) m1 b) m3 c) m4 d) m5

34. Minterm notation of x y z is_____

a) m1 b) m3 c) m5 d) m7

35. Maxterm notation of x+y+z is ______

a) M0 b) M1 c) M2 d) M3

36. How many variables we get in the reduced form for pair reduction in K-Map

a) 3 b) 2 c) 4 d) 1

37. The X + X = X is ______

a) Involution Law b) Indempotence Law

c) Commutative Law c) Associative Law

38. Product of all the literals is called______

a) Minterm b) Maxterm c) K-Map d) Duality Form

39. Sum of all the Literals is called______

a) Minterm b) Maxterm c) K-Map d) Duality Form

40. How many variables we get in the reduced form for Octet reduction in K-Map

a) 3 b) 2 c) 1 d) 4

KEY ANSWER

1 2 3 4 5 6 7 8 9 10
a c b a a b b a a a
11 12 13 14 15 16 17 18 19 20
a b a a c c b a d d
21 22 23 24 25 26 27 28 29 30
a b d a a a a c a
31 32 33 34 35 36 37 38 39 40
a d d a a a b a b c

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Chapter-4: Data structure


41. A ___________ is a specialized format for organizing and storing data.

a) Data b) searching c) Data structure d) sorting.

42. ___________is the process of accessing each data item at least once to perform some
operation.

a) Traversing b) Insertion c) Deletion d) sorting.

43. The process of adding a new data item into the given collection of data items is
called ________.

a) Traversing b) Insertion c) Deletion d) sorting.

44. The process of removing an existing data item from the given collection of data
items is called ________________.

a) Traversing b) Insertion c) Deletion d) sorting

45. An _______ is a collection of elements of same type under same name.

a) Array b) Tree c) Graph d) structure

46. Stack works on the principle of _____________.

a) FIFO b) LIFO c) POP d) None of these

47. Queue works on the principle of _____________.

a) FIFO b) LIFO c) POP d) None of these

48. An array in which array elements are accessed with two subscripts is known as
_____________.

a) Single dimensional array b) Two-dimensional array


c) Multi-dimensional array d) Three-dimensional array.

49. ____________ordered collection of items where an item is inserted at one end called
“rear end “and an item is removed at the other end called “front end”.

a) Queue b) Stack c) Graph d) Tree

50. The term Push and Pop is related to ______________?

a) QUEUE b) ARRAY c) STACK d) STRING

51. Which is the pointer associated with the stack?

a) TOP b) SOP c) POP d) GAP

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
52. The operation performed on a stack are called _______?

a) FIFO b) LIFO c) SIFO d) None of these

53. Operations on stacks are ______________________.

a) Push b) Stack c) Pop d) All of these

Chapter-6 ,7 & 8: OOP’s, Classes & Objects, Function Overloading

54. One of the following is not characteristics of OOPs

a) Abstraction b) inheritance c) Dynamic binding d) Interpreter

55. A smallest individual unit in a program or lexical unit is

a) Identifier b) Token c) Keyword d) Constants

56. A name given to the programming elements such as variables, arrays, functions etc.is a

a) Identifier b) keyword c) Constant d) Token

57. A function call is not known until the time of the call at runtime is the

a) Message passing b) dynamic binding

c) Data hiding d) data abstraction

58. In one of the following feature, function can take multiple forms based on the type

of arguments, number of arguments and data type return value

a) Polymorphism b) data encapsulation

c) Inheritance d) class

59. A basic building blocks for assigning program is

a) Class b) data c) object d) function

60. Permitting the user to use on object without knowing its internal working is called

a) Data hiding b) Polymorphism c) Data abstraction d) all the above

61. Two type of overloading are

a) Operator overloading and function overloading


b) Function overloading and class overloading
c) Data overloading and class overloading
d) Operator overloading and class overloading

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
62. The reusability of code is performed in

a) Object b) Inheritance c) Polymorphism d) Encapsulation

63. Set of standards are not included in

a) OOP software b) POP software c) Both a and b d) None of these

64. The processing of data in object oriented programming is carried out by sending
messages to object is
a) Class b) object c) message passing d) abstraction

Fill in the blanks


(encapsulation (66), manipulate (65), data abstract (68), AI (67))

65. The object can contain data and code to ____the data

66. The data and functions are combined into a single unit class by_____

67. ____ is the one of object oriented programming application

68. The concept of separates object specification and object implementation__

41 42 43 44 45 46 47 48 49 50

C a b c a b a b a c

51 52 53 54 55 56 57 58 59 60

a b d d b a b a c c

60 61 62 63 64 65 66 67 68 69

c a b a c Manipue Encap AI Abstra

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Chapter-9: Constructor & Destructors


69. Constructor does not take any arguments is a _____________.

a) Zero arguments constructor b) Parametrized constructor

c) Copy constructor d) destructor

70. Constructor that takes one or more arguments is called _________.

a) Zero arguments constructor b) Parametrized constructor

c) Copy constructor d) destructor

71. ______constructor can be invoked by explicit or implicit call.

a) Zero arguments constructor b) Parametrized constructor

c) Copy constructor d) destructor

72. _____are being member functions that destroy an object automatically.

a) Zero arguments constructor b) Parametrized constructor

c) Copy constructor d) destructor

73. Destructor is preceded by a ______symbol.

a) $ b) # c)~ d) @

74. _________is the class whose properties are inherited by another class.

a) Base class b) derived class c) Both a & b d) none of these.

75. _________is the class that inherits properties from base class (es).

a) Base class b) derived class c) Both a & b d) None of these

76. _____is a default visibility mode in inheritance.

a) Public b) protected c) private d) none of these.

77. A derived class with only one base class is known as____________________.

a) Single inheritance b) Multilevel inheritance

c) Hierarchical inheritance d) Hybrid Inheritance

78. The class can also be derived from the classes that are already derived is called____.

a) Single inheritance b) Multilevel inheritance

c) Hierarchical inheritance d) Hybrid Inheritance

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

79. Which keyword define used to define the inline function.


a) Friend b) Inline c) While d) object.

80. Friend function is a ___________function.


a) Member b) Non-member c) inline. d) Different.

81. There are __________types of constructor.


a)2 b)4 c)5 d) 3
82. A___________is a special member function that is used in classes to initialize the

objects of a class automatically.

a) constructor. b) Non-member c) Inline d) Friend.

83. ________ are member functions that destroy an object automatically.


a) constructor. b) Destructor c) Inline d) Friend.
84. A constructor that does not take any arguments is a______________.

a) constructor. b) Destructor

c) Default constructor d) copy constructor

85. A constructor that takes one or more arguments is a called___________.

a) Default constructor d) copy constructor

c) Parameterized constructor d) None of the above

86. Parameterized constructor can be invoked by ____________.


a) Explicit. b) Implicit c) Both a and b d) Only a

87. constructor should have either ________ access

a) Public b) protected c) only b d) a or b

69 70 71 72 73 74 75 76 77 78

a b b d c a b c a b
79 80 81 82 83 84 85 86 87 88

a b d a b c c c d d

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Chapter-10: Inheritance

88. Capability of one class acquiring properties from another class is called___

(a) Polymorphism (b) Abstraction


(c) Overloading (d) Inheritance
89. Base class is called

(a) Sub class (b) Super class


(c) Inherited class (d) Built-in class

90. Derived class is called

(a) Sub class (b) Super class


(c) Main class (d) First class
91. A class whose properties are inherited by another class is

(a) Sub class (b) Base class


(c) Inherited class (d) Derived class
92. A class which derives properties from another class

(a) Main class (b) Base class


(c) Super class (d) Derived class
93. Advantages of inheritance is

(a) Reusing existing code (b) Easy to extend


(c) Memory utilization (d) All the above

94. Symbol used while defining derived class

(a) :: (b) ;
(c) . (d) :

95. Visibility mode defines

(a) Type of derivation `(b) Type of data types


(c) Type of function (d) None of the above

96. If no visibility mode is specified, then by default the visibility mode is

(a) Public (b) Protected


(c) Private (d) None of the above

97. In private inheritance public members of base class becomes members of derived
class.

(a) Public (b) Protected


(c) Private (d) All of the above

98. Which of the following is most used visibility mode in inheritance?

(a) Public (b) Protected

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
(c) Private (d) None of the above

99. Which of the following is most used inheritance?

(a) Public (b) Protected


(c) Private (d) All of the above
Chapter-11: Pointers

100. Pointer is used to store

(a) Memory address (b) Value


(c) Data (d) Information

101. Which of the following is the correct way to declare a pointer?

(a) int *ptr; b) int ptr;


(c) int &ptr; d) All of the above

102. Which of the following operator is used to declare pointer?

(a) * (b) &


(c) = (d) ~

103. Which of the following operator is used to initialize pointer?

(a) * (b) &


(c) = (d) ~

104. Memory allocated during runtime is memory allocation

(a) Compile time (b) Dynamic


(c) Static (d) None of the above

105. _______new operator is used to create memory during

(a) Compile time (b)Runtime


(c) Static time (d) None of the above

106. operator is used delete memory created during runtime

(a) new (b) delete


(c) NOT (d) AND

107. ______is the collection of addresses?

(a) Array of objects (b) Array of pointers


(c) Array of elements (d) Array of variables.

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

108. ____is the built in pointer that hold the address of the object defined for a class

(a) this pointer (b) new


(c) delete (d) AND

109. Pointers pointing to object of a class called

(a) Array of pointers (b) Class pointers


(c) Object pointer (d) This pointer

110. is the structure that include an element that points to another structure of same
type

(a) Memory heap (b) Self-referential structure


(c) Structure (d) Memory pool

111. Dynamically allocated memory not deleted remains occupied called

(a) Orphaned memory (b) Memory pool


(c) Stream (d) Structure

88 89 90 91 92 93 94 95 96 97

d b A B B D D A c c

98 99 100 101 102 103 104 105 106 107

a d a a a c b a b a

108 109 110 111

a d b a

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

CHAPTER-13: DATABASE CONCEPTS


Answer all the questions. Each question carries one mark. I Select the correct answer
from the choices given: (Repeated answers will not be considered)

112. Which of the following Application of database________________?


a) Telecommunication b) Finance c) banking d) All of these.
113. ___________is a collection of related information.
a) Information b) database c) Relation d) Tuple
114. ____________is a set of values for an attribute in that column
a) Domain b) database c) Relation d) Tuple
115. Collection of record is called as a____________.
a) Record b) domain c) column d) table.
116. A software package used to manage the databases and run operations in the data is
known as _________
a) Database management system. b) Structured Query Language
c) Information management d) All of these
117. An _________in DBMS is a real-world thing or a real-world object which is
distinguishable from other objects in the real world.
a) Attribute b) Entity c) Domain d) Weak entity
118. _______ is a set of data values that are given to an entity.
a) Attribute b) Entity c) Domain d) Instance
119. An _______is a characteristic which represents the entity.

a) Attribute b) Entity c) Domain d) Instance

120. A row of a table that represents a complete information about a particular entity is

called as a ______________

a) Record b) table c) row d) column

121. Which of the following not belongs to datatypes of DBMS?

a) Integer b) String c) Date d) primary key

122. The RDBMS terminology for a row is

a) Tuple b) relation c) attribute d) degree

123. Which of the following is a valid SQL type?

a) CHARACTER b) NUMERIC c) FLOAT d) All of the above

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
124. _________is a repository of an organization’s electronically stored data.
a) Data ware house b) Reporting
c) Data mining d) Metadata
125. _____________are components of data ware house.
a) Data ware house & reporting b) Reporting & Metadata
c) Data mining & Metadata d) none of these
126. ___________ is concerned with the analysis and picking out relevant information.
a) Data ware house b) Reporting
c) Data mining d) Metadata
127. SQL stands for__________________.
a) Structured Query language b) Procedural Language
c) Theoretical Language d) Unstructured Language
128. SQL statements should be terminated by a______________.
a) Semicolon b) comma c) dot d) quotes

129. DDL stands for ______________


a) Data duality Language b) Data Definition Language
c) Data Definition Level d) Dual Data Language
130. _____________command used crate a new table.
a) ALTER b) CREATE c) DROP d) INSERT
131. ___________command modifies an existing table.
a) ALTER b) CREATE c) DROP d) INSERT
132. _________________command is used to delete table in SQL.
a) ALTER b) CREATE c) DROP d) DELETE
133. _________________Stands for Data Manipulation Language.
a) Data duality Language b) Data Definition Language
c) Data Manipulation Language d) Dual Data Language
134. _________________command will create a record.
ALTER b) CREATE c) DROP d) INSERT

135. ____________command modifies the existing rows (records) in a table.


a) ALTER b) UPDATE c) DROP d) INSERT
136. __________________command rows (records) from a table from the database.
a) DELETE b) CREATE c) DROP d) INSERT

137. SELECT command is used for querying or retrieving data from a table in the
database.
ALTER b) CREATE c) DROP d) INSERT

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

138. DCL Stands for__________________.


a) Data duality Language b) Data Definition Language
c) Data Manipulation Language d) Data Control Language
139. What is the purpose of GRANT command in SQL?

a) Take back privileges granted from the user b) Gives a privileges to user.

c) Take back and delete from the user d) All of the above

140. __________________takes back privileges granted from user.

a) GRANT b) REVOKE c) ROLLBACK d) COMMIT


141. TCL stands for.
a) Transaction Control Language b) Data Definition Language
c) Data Manipulation Language d) Data Control Language
142. ________________makes all the changes made by statements issued permanent.

a) GRANT b) REVOKE c) ROLLBACK d) COMMIT

143. _________________Undoes all changes since the beginning of a transaction or since a


save point.
a) GRANT b) REVOKE c) ROLLBACK d) COMMIT

144. The which constraints not available in SQL?


a) Primary Key b) Foreign key,
c) Not NULL d) Condition key

145. ____________ constraints define a column or combination of columns which uniquely


identifies each row in the table.
a) Primary Key b) Foreign key,
c) Not NULL d) Check
146. _________________ constraints identify any column referencing the Primary Key in
another table.
a) Primary Key b) Foreign key,
c) Not NULL d) Check
147. __________ Constraints ensures all rows in the table contain a definite value for the
column which is specified as Not Null.
a) Primary Key b) Foreign key,
c) Not NULL d) Check

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
148. _________ constraints ensure that a column or a group of columns in each row have a
distinct value.
a) Primary Key b) Foreign Key, c) Not NULL d) Unique Key
149. ___________constraints define a business rule on a column. All the rows must satisfy
this rule.
a) Primary Key b) Foreign Key, c) Check d) Unique Key
150. The ___________ operator is used to checks the membership condition specified by the
list of values.
a) BETWEEN b) IN c) NOT d) AND
151. _________operator is used to output data which lies in a range of values.

a) BETWEEN b) IN c) NOT d) AND

152. _____________________ are the logical operators of SQL.

a) OR b) AND c) NOT d) All of the above


153. SQL Supports comparison operators are
a) =, >, <, >=, <=, <> or != or ^= b) BETWEEN, IN, NOT, AND

c)&, *, #, @, !, ~ d) None of the above


154. RDBMS stands for
a) Relational Data Mankind System b) Relation Data Manipulation System
c)Relational Database Management System d) Rotation Database Management System.
155. SQL Group Functions are
a) ADD, DIV, SUB, MULT STA, HALT
b) AVG, MIN, MAX, SUM and COUNT etc.
c) BETWEEN, IN NOT AND, STA
d) SELECT, INSERT, UPDATE, DELETE, DROP
156. ______is dummy table containing a single row and single column provided by SQL.
a) DOUBLE b) SINGLE c) DUAL d) DOW

112 113 114 115 116 117 118 119 120 121

d b a d a b d a a d

122 123 124 125 126 127 128 129 130 131

a d a b c a a b b a

132 133 134 135 136 137 138 139 140 141

d c d b a d b b a

142 143 144 145 146 147 148 149 150 151

d c d a b c d c a b

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)

157. Collection of rows and columns is called as

158. ________is a collection of interrelated data?

159. Data duplication is called as .

160. ____________is a software for creating and managing databases?

161. Protection of data is the .

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)
(Data Abstraction, Internal level, Physical level, Conceptual level, view level.)

162. The process of hiding irrelevant details from user is called____________.


163. ________________ is the lower level of data abstraction.
164. Internal level is also known as_____________________________.
165. ________________of abstraction deals with logical structure of the entire database.
166. The highest level of abstraction that deals with the user’s view of the database is

called ______________.

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(Tuple, Rectangle, MySQL, ISAM, Schema)


167. The structure of database is called as____________.
168. ____________is the symbol used to represent entity?
169. Row of a table is also called as____________.
170. __________Software for creating and managing databases?
171. ___________is a combination of serial and random file organization?

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(View, Diamond, Oracle, Data mining, DBA)

172. __________level is also called as external level in data abstraction.

173. __________is the symbol used to represent relationship in E-R diagram?

174. Person who have the authorization to access, monitor data base is_________

175. _____is a software for creating and managing databases?

176. Extracting and discovery of knowledge from large amount of data is called ______

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(E.F Codd, Hashing, Candidate, Data warehousing, Instances)

177. _________keys are the keys which are not currently selected as primary key.

178. _____is the repository of organizations electronically stored data?

179. Father of relational algebra is__________.

180. ___________is set of values in each row.

181. Algorithm used in random or direct access file organization is___________.


Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(Attributes, Data security, Information, Data model, End users)


182. Abstract model that describes how data is represented and used is
183. ______describes the characteristics of an entity.
184. The processed for of data is
185. ______are the people who access the database for querying, updating, generating
repots.
186. ______________is an example for advantages of DBMS.

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(Alternate key, Data Model, Foreign key, staging, domain)


187. Key which is not selected as primary key is

188. _________key combines two database tables.

189. Set of values for an attribute in each column is__________

190. ________describes how data is represented and used.

191. Process of cleaning, standardized and loading data in data warehouse is called___

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(one-tier, Data independence, serial file organization, tuple, Attribute)


192. Each column is identified by distinct header called_________

193. ________is the architecture where users directly sit on DBMS and uses it.

194. Each row in a table is called

195. _______stores data in serial order in the database.

196. Ability database to modify schema at one level without affecting it on another level
is__
Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(Tree, domain, DBMS, entity, Database)


197. Set of values for an attribute in each column is

198. ____is an application software used for creating, updating, managing

database?

199. Hierarchical model follows structure.

200. _______is a collection of logically related data?

201. ___________is an object like table?

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Fill in the blanks choosing the appropriate word/words from those given in
brackets. (Repeated answers will not be considered)

(one-tier, Data independence, serial file organization, network model, Attribute)

202. Each column is identified by distinct header called________

203. ___________is a data model that follows graph structure.

204. Each row in a table is called___________

205. ____________stores data in serial order in the database.

206. Ability database to modify schema at one level without affecting it on another level
is _

Fill in the blanks choosing the appropriate word/words from those given in

brackets. (Repeated answers will not be considered)

(Hierarchical model, Number, random file organization, tuple, G-sat)

207. __________is an example for data mining software?

208. __________is a data model that follows tree structure?

209. Each row in a table is called__________.

210. ______________stores data in random order in the database.

211. An example for data types used is DBMS is____________.

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

CHAPTER-14: SQL COMMANDS


212. Which of the following attributes can be considered as a choice for primary key?
a) Name b) Street c) Roll No d) Subject

213. What is the full form of SQL?


a) Structured Query Language b) Structured Query List

c) Simple Query Language d) none of these

214. What is the full form of DDL?


a) Dynamic Data Language b) Detailed Data Language

c) Data Definition Language d) Data Derivation Language

215. What does DML stand for?


a) Different Mode Level b) Data Model Language

c) Data Mode Lane d) Data Manipulation Language

216. Which of the following keywords will you use in the following query to display the
unique values of a column dept_name!

Select ______dept_name from company;

a) ALL b) From c) Distinct d) Name

217. The _______clause of select query allows us to select only those rows in the result that
satisfy a specified condition
a) where b) from c) having d) like

218. Consider following SQL statement. What type of statement is this?


Select * from employee;

a) DML b) DDL c) DCL d) Integrating constraint

219. The term _____is used to refer to a field in a table


a) Attribute b) Tuple c) Row d) Instance

220. By default, ORDER by Clause lists the results in _______order


a) Descending b) Any c) Ascending d) Both 1 and 3

221. The ______keyword eliminates redundant data


a) SELECT b) WHERE c) DISTINCT d) None of these

222. The _________constraint provides a default value to column when the Insert into
statement does not provide a specific value.

a) DEFAULT b) UNIQUE c) CHECK d) NOT NULL

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

223. The __________constraint ensures that all values in a column are distinct.

a) DEFAULT b) UNIQUE c) CHECK d) NOT NULL

224. The ___________constraint ensures that all values in column satisfy certain conditions.

a) DEFAULT b) UNIQUE c) CHECK d) NOT NULL

225. ____________ is used to identify each row in table.

a) FOREIGN KEY b) UNIQUE c) CHECK d) PRIMARY KEY

226. To delete some data from tables ________________command is used.

a) DELETE b) SELECT c) UPDATE d) DROP

227. The _________command lets your drop a table from the database.

a) DELETE b) SELECT c) UPDATE d) DROP

228. _____________Key is non-key column of a table (child table) that draws its values form

primary key of another table (parent table)

a) FOREIGN KEY b) UNIQUE c) CHECK d) PRIMARY KEY

212 213 214 215 216 217 218 219 220 221

c a c d c a a a d c

222 223 224 225 226 227 228 229 230 231

a b c d a b d

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

Chapter-15: Network Concepts


229. UDP stands for _____________________.

a) User Data Power b) User Datagram Protocol

c) Uniform data protocol d) User protocol

230. HTTP stands for ___________________

a) Hyper Text Transfer Protocol b) High Text Transfer Protocol

c)Hyper Text Transmission Protocol d) Hyper Text Trivial Protocol

231. URL stands for _____________________

a) Uniform Resource Location b) Uniform Resource Locator

c) Uniform Reservation Location d) Uniform Road Location

232. ___________is the process of efficiently selecting a path in a network along which

the data packets will travel their destination.

a) Routing b) bridging c) switching d) NIC

233. _______Address refers to the unique physical address to each NIC card assigned by

NIC manufacture.

a) NIC b) NAC c) MAC d) MIC

234. Most commonly used transmission media in wireless networks are.

a) Microwave b) Radio wave c) Satellite wave d) All of these

235. Most commonly used transmission media in wired networks are.

a) Twisted pair cable b) Co-axial cable c) Optical-fiber d) All of these

236. ________is a device that connects dissimilar networks.

a) Gateway b) Bridge c) Hub d) Switch

237. ________is a phenomenon that connects the things (smart devices) to the internet

over wired or wireless connections.

a) FM b) RFID c) IoT d) AM

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
238. On a _______channel each interface serves as both transmitter and receiver but

only one interface can transmit at a time.

a) Simplex b) Half-duplex c) Full-duplex d) None of these

239. __________ can be classified by frequency and wave length

a) Radio wave b) IR rays c) Micro wave d) All of these

240. __________ is host computer that requests for some services from a server

a) Peer to peer b) client - server c) client d) server

241. __________ is a computer on the network that facilitate the sharing of data,

software and hardware resources

a) Peer to peer b) client - server c) client d) server

242. A work station that can be doubled up as a server and client is known as________

a) Client b) server

c) dedicated server d) non-dedicated server

243. _________ may have a geographical area up to 1km

a) LAN b) WAN c) MAN d) PAN

244. A__________ refers to a pre-decided set of rules using which all parties of a network

connect and interact with one another

a) VOIP b) Protocol c) HTTP d) SLIP

245. __________ is not a component of computer network

a) HUB b) Router c) switch d) Volt meter

246. ________ is attached to a host so as to establish network connections.

a) Cable b) LAN c) NIC d) WAN

247. The networks spread across countries or on a very big geographical area

a) LAN b) WAN c) MAN d) PAN

248. ______refers to all the legal and regulatory aspects of Internet and World Wide Web.

a) Cyber law b) Criminal law d) Police law d) online law

249. Server exclusively used for serving files related requests are called _______.

a) Print server b) Cache memory c) file server d) none of these

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

CHAPTER -16 & 17: - Internet & Open source _Web designing
250. ___________ is a collection of computer networks all over the world.
a) Intranet b) Internet c) computer d) interspace

251. ___________ is a software application that enables the user to interact with web
page information
a) Computer b) server c) Browser d) all the above

252. ___________ is the service of internet.


a) World wide web b) HTTP c) SLIP d) FTP

253. ____________ is a collection of all web pages.


a) package b) server c) domain d) Website

254. ___________ is a system for exchanging messages through a computer network.


a) Packets b) domain c) E-mail d) all the above

255. _________is/are the disadvantages of e-mail.

a) virus b) phishing c) Hacking d) All the above

256. ___________ is a program which has the potential to harm the computer system.
a) Virus b) OS c) Thread d) word

257. ___________ is an email which can be used to send unsolicited messages and
unwanted advertisements.
a) Inbox b) sent c) draft d) Spam

258. __________ is the act of breaking into computer security.


a) Browsing b) hacking c) surfing d) chatting

259. __________ is discussion groups on internet.


a) Newsgroup b) news c) chat d) discussion group

260. __________ is business dealing by internet.


a) Commerce b) E-commerce
c) Internet commerce d) statistical commerce

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
261. ___________ is a system to search files through dictionary structures.
a) Chatting b) SERP c) Gopher d) ASK

262. ___________ is a program to access remote computer on internet.


a) Telnet b) HTTP c) FTP d) Gopher

263. ___________ is the expansion of FTP.


a) Fund Transfer Protocol b) Fire Transfer Protocol
c) File Transfer Protocol d) Fee Transfer Protocol

264. ___________ is used to transfer the files on internet.


a) SLIP b) PPP c) HTTP d) FTP

265. ___________ is a web document which is suitable for WWW and accessed by a web
browser.
a) Image b) Text Page c) Webpage d) Graph

266. ___________________ is an application protocol for distributed, collaborative,


hypermedia information systems.
a) SLIP b) HTTP c) FTP d) PPP

267. ___________ is a hierarchical distributed naming system for computers.


a) BPS b) NPS c) DNS d) DPS

268. ____________ is also known as web address.


a1) PRL b) WRL c) VRL d) URL

269. _______________ is a software code that is designed search for information on


WWW.
a) Chatting b) Search Engine
c) Translator d) Access

270. __________________ is an expansion for HTML.

a) Higher Text Markup Language b) Higher Thing Markup Language

c) Hyper Text Markup Language d) Hyper Thing Markup Language

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

271. ____________is not a tag in HTML.


a)<html> b)<http> c)<body> d)<head>

272. ___________ tag is used to display a list.


a) <ul> b)<ol> c) both 1 & 2 d) none

273. _________ is the formatting tag in HTML.


a)<b> b)<input> c)<c> d) <g>

274. ________ tag is used for hyperlink.


a) <a> b)<link> c)<hyper> d)<hyperlink>

229 230 231 232 233 234 235 236 237 238

b a b a c d d a c b

239 240 241 242 243 244 245 246 247 248

a c d c a b d c b a

249 250 251 252 253 254 255 256 257 258

c b c a d c d a d b

259 260 261 262 263 264 265 266 267 268

a b c a c d c b c d

269 270 271 272 273 274 275 276 277 278

d c b c a a

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

NETWORKING CONCEPTS
1. Interconnection of autonomous computer is called _________

a) Internet b) Hotspot c) Wi-Fi d) Network

2. ARPANET stands for

a) Advanced Report Projects Agency Network

b) Advanced Report Projects Agent Network

c) Advanced Report Projects Area Network

d) Advanced Research Projects Agency Network

3. OSI stands for ________________

a) Open system Integrated b) Open source interconnection

c) Open system Internet d) Online system interconnection

4. ____________ is concerned with transmitting raw bits

a) Application layer b) Presentation layer c) Networking layer d) Physical layer

5. _____________ contains a variety of protocols

a) Physical layer b) Presentation layer c) Transporting layer d) Application layer

6. ________ layer concerned with syntax and semantics of the information.

a) Presentation b) Network c) Transport d) Physical

7. ___________Layer controls the operation of the subnet.

a) Application b) Transport c) Network d) Physical

8. __________ Layer is to accept data from above layer and split it up into smaller units

a) Transport b) Session c) Network d) Presentation

9. IC stands for

a) Internet protocol b) Internet process

c) Interconnection process d) Interspace protocol

10. HTTP stands for

a) Hypertext transfer protocol b) High text transfer protocol

c) High text typing process d) Hyper texting text process

11. ___________ is the standard protocol to transfer any types of files

a) FTP b) SLIP c) PPP d) LAN

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

12. SLIP stands to _____________

a) Serial line internet protocol b) Serial line interconnection protocol

c) Serial line interspace process d) Server line internet protocol

13. PPP stands for

a) Point to point process b) Process to point process

c) Point to process point d) Point to point protocol

14. _________ is a client / server software program

a) Interconnection b) Independent

c) Interspace d) Internet

15. Server can be of ________ types dedicated server and non – dedicated server

a) 2 b) 4 c) 3 d) 5

16. LAN stands for

a) Local area network b) Loss area networking

c) Local architecture network d) Local across network

17. The networks spread across the countries are known as _________

a) MANs b) LANs c) WANs d) WAN

18. Appearance or layout of a network is called _______ topology

a) Internet b) Network c) Interconnection d) Session

19. _________ topology consists of a single length of transmission medium into which
the various nodes are attached.

a) Star b) Ring c) Mesh d) Bus

20. _______ topology is the combination of bus and star topology.

a) Root b) Branch c) Tree d) Mesh

21. _________ refer to the computer that are attached to a network and are seeking to
share the resource of the network.

a) Client b) Nodes c) Server d) All the above

22. ______ is an application level protocol with the lightness and speed necessary for
distributed, collaborative, hypermedia information system.

a) FTP b) IP c) HTTP d) TCP

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

23. ________ is a layered set of protocol

a) IP b) HTTP c) FTP d) PPP

24. The _________ layer allows users on different machines to establish sessions
between them.

a) Application b) Presentation c) Physical d) Session

25. MIME stands for

a) Mail interconnected multi electronics b) Mail internet mail electric

c) Multipurpose internet mail extensions d) Multipurpose interspace mail


extensions

26. UTP stands for

a) Universal twisted pair cable b) Universal tested pair cable

c) Unshielded twisted pair cable d) Upper twisted process cable

27. DGM stands for

a) Data grade medium b) Data general medium

c) Digital grade medium d) Digital general medium

28. __________ is used to segment networks into different sub networks

a) Bridge b) Switch c) Shielded d) Network

29. A ____ is a device that lets you link two similar type networks together

a) Switch b) Bridge c) Router d) Hub

30. On small networks, a workstation that can double as a server is known

a) Dedicated server b) Non – dedicated server

c) Dedicated client d) Non – dedicated client

31. LCP stands for

a) Loss control process b) Link control protocol

c) Least control process d) Load control protocol

32. ___________ topology, nodes are connected together in an arbitrary fashion.

a) Tree topology b) Ring topology c) Graph topology d) Mesh topology

33. The transmission making use of radio frequency is termed as

a) Radio wave b) Micro wave c) Satellite wave d) None of these

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
34. A _______ is a device that can handle different protocols

a) Bridge b) Router c) Gateway d) Physical

35. A _______ is a hardware device used to connect several computers together.

a) Network b) System c) Protocol d) Hub

36. _______ is a device that amplifies a signal being transmitted on the network

a) Repeater b) Bridge c) Gateway d) Switch

37. SMS stands for

a) Super message service b) Short message service

c) Short message sending d) Sending more service

38. Sim typically have memory from

a) 15 too 84kb b) 20 to 64kb c) 25 to 84kb d) 16 to 64kb

39. SIM stands for

a) Super internet message b) Subscriber identity module

c) Short internet message d) Slow internet module

40. Wimax can provide broadband wireless access upto 30 miles for ______

a) Fixed station b) Wireless c) Identity d) Cookies

41. __________ are messages that a web server transmits to a web browser so that a web
server can keep track of the user’s activity on a specific web site.

a) Crackers b) Hackers c) Cookies d) Virus

42. The _______ are malicious programmers who break into secure systems.

a) Crackers b) Network c) Topologies d) Network

43. __________ is a malicious program that requires a host and is designed to make a
system sick

a) Quick heal b) Computer virus c) Kaspersky d) K7

44. Wi – Fi refer

a) Wireless fixing b) Wireless fidelity c) Wired fixing d) None of the above

45. Radio wave can be classified by frequency and ________

a) Width b) Velocity c) Wavelength d) Length

46. The __________ transmission used direct line – of – slight

a) Circuit b) Infrared c) Switch d) Laser

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
47. __________ allow you to combine the power of your digital computer with the global
reach of the telephone system.

a) Modem b) Telephone c) Circuit d) Switch

48. A __________ is a device that connects dissimilar networks.

a) Bridge b) Gateway c) Router d) All the above

49. ____________ is meant to server subscribers at homes or offices.

a) WLL b) WLC c) GSM d) SIM

50. A __________ is a live, visual connection between two or more people residing in
separate locations for the purpose of communication.

a) PPP b) OSI c) SMS d) VC

51. A ____________ is a venue that offers wi – fi access.

a) Wi – fi b) Chat c) VC d) Wi Max

52. The GSM standard for digital cell phones was established in Europe in the mid
________

a) 1960 b) 1975 c) 1980 d) 8019

53. The ________ in wireless networks refers to the “generation” of the underlying
wireless technology.

a) G b) B c) M d) N

54. The ________ technology is providing up to 25 Mbps connectivity speed.

a) 2G b) 4G c) 3G d) 5G

55. ___________ form the most secure level of authorization.

a) Bio metric system b) Firewall c) Authorization d) Authentication

56. ________ applies security mechanisms when a connection is established.

a) Proxy server b) Application gateway

c) Packet filter d) Circuit level gateway

57. In India the cyber laws are contained in the information technology act, 2000 which
was notified on __________ October 2000.

a) 15 b) 17 c) 20 d) 10

58. _____ virus use protocols and commands of computer network to spread themselves
on the network.

a) Macro b) File infectors c) Network d) Boot sector

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23

59. __________ is more commonly known today is a computing platform widely used by
IT service companies.

a) Cloud Technology b) Python c) C++ d) Network

60. __________ form of coaxial cable is thinner and it can have maximum segment
length of 185 meters.

a) Thick net b) UTP cable c) Co axial d) Thin net

61. __________ is the basis for most internal office telephone wiring.

a) VGM b) DGM c) HTTP d) IP

62. A variation of bus topology is the ___________ topology.

a) Ring b) Tree c) Mesh d) Root

63. The purpose of a _________ is also sharing of the hardware and the software
resources among its users.

a) LAN b) WAN c) MAN d) Network

64. Dedicated server is known as __________ server.

a) Printer b) Modem c) File d) Non – dedicated

65. __________ was the first protocol for relaying the IP packets over dial – up lines.

a) FTP b) SLIP c) MIME d) URI

66. A ___________ is a physical thing, appearing on an Ethernet or some wire.

a) Session b) ARPANET c) Transport d) Packet

67. A __________ is a unit of data, which is what the protocols deal with

a) Data link b) Data gram c) Physical d) Application

68. ____________ is the base communication protocol of the internet.

a) TCP b) HTTP c) FTP d) PPP

69. ____________ sharing provides sharing and grouping of data files over the network.

a) Print b) File c) Email d) Scanner

70. The _________ layer is used to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer.

a) Application b) Physical c) Data link d) Session

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
ANSWER

1. d) Network

2. d) Advanced Research Projects Agency Network

3. d) Online system interconnection

4. d) Physical layer

5. d) Application layer

6. a) Presentation

7. c) Network

8. a) Transport

9. a) Internet protocol

10. b) High text transfer protocol

11. a) FTP

12. a) Serial line internet protocol

13. d) Point to point protocol

14. c) Interspace

15. a) 2

16. a) Local area network

17. c) WANs

18. b) Network

19. d) Bus

20. c) Tree

21. b) Nodes

22. c) HTTP

23. a) IP

24. d) Session

25. c) Multipurpose internet mail extensions

26. c) Unshielded twisted pair cable

27. a) Data grade medium

28. b) Switch

29. d) Hub

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
30. b) Non – dedicated server

31. b) Link control protocol

32. d) Mesh topology

33. a) Radio wave

34. c) Gateway

35. d) Hub

36. a) Repeater

37. b) Short message service

38. d) 16 to 64kb

39. b) Subscriber identity module

40. a) Fixed station

41. c) Cookies

42. a) Crackers

43. b) Computer virus

44. b) Wireless fidelity

45. c) Wavelength

46. d) Laser

47. a) Modem

48. b) Gateway

49. a) WLL

50. d) VC

51. a) Wi – fi

52. c) 1980

53. a) G

54. d) 5G

55. a) Bio metric system

56. d) Circuit level gateway

57. b) 17

58. c) Network

59. a) Cloud Technology

Prepared by Ranganath.C, Lecturer in Cs


II PU COMPUTER SCIENCE MCQ-2022-23
60. d) Thinnet

61. a) VGM

62. b) Tree

63. c) MAN

64. c) File

65. b) SLIP

66. d) Packet

67. b) Data gram

68. a) TCP

69. c) Email

70. b) Physical

Prepared by Ranganath.C, Lecturer in Cs

You might also like