CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL, KUMBAKONAM

Similar documents
VOLUME-I [ UNIT I & II ] CHAPTER 1-8 [ COMPLETE BOOK BACK ONE MARKS ]

PART I. Part II Answer to all the questions 1. What is meant by a token? Name the token available in C++.

+2 Volume II OBJECT TECHNOLOGY OBJECTIVE QUESTIONS R.Sreenivasan SanThome HSS, Chennai-4. Chapter -1

Padasalai.Net s Model Question Paper

Short Notes of CS201

CS201 - Introduction to Programming Glossary By

Chapter1 Overview of computers

Computer Science (330)

CHAPTER 9 INHERITANCE. 9.1 Introduction

STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING

AIR FORCE SCHOOL,BAMRAULI COMPUTER SCIENCE (083) CLASS XI Split up Syllabus (Session ) Contents

INTERNATIONAL INDIAN SCHOOL, RIYADH. Ch 1 C++ Revision tour

Interview Questions of C++

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run?

CHRIST THE KING BOYS MATRICULATION HR. SEC. SCHOOL, KUMBAKONAM

Split up Syllabus (Session )

Writing an ANSI C Program Getting Ready to Program A First Program Variables, Expressions, and Assignments Initialization The Use of #define and

STATE COUNCIL OF EDUCATIONAL RESEARCH AND TRAINING TNCF DRAFT SYLLABUS.

6.096 Introduction to C++ January (IAP) 2009

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Namma Kalvi Sample Question Papers. Computer Science

PART - I 75 x 1 = The building blocks of C++ program are (a) functions (b) classes (c) statements (d) operations

ACADEMIC YEAR PLANNING - F.Y.J.C. ( ) F.Y.J.C. COMPUTER SCIENCE (Theory)

SPLIT UP SYLLABUS SUBJECT : COMPUTER SCIENCE (083) SESSION: Class XI (Theory) C++ Duration: 3 hours Total Marks: 70

INHERITANCE. PART I Choose the correct answers

Tokens, Expressions and Control Structures

SRI SARASWATHI MATRIC HR SEC SCHOOL PANAPAKKAM +2 IMPORTANT 2 MARK AND 5 MARK QUESTIONS COMPUTER SCIENCE VOLUME I 2 MARKS

FORM 2 (Please put your name and form # on the scantron!!!!)

Pace University. Fundamental Concepts of CS121 1

Paytm Programming Sample paper: 1) A copy constructor is called. a. when an object is returned by value

I BSc(IT) [ Batch] Semester II Core: Object Oriented Programming With C plus plus - 212A Multiple Choice Questions.

3.Constructors and Destructors. Develop cpp program to implement constructor and destructor.

Object Oriented Programming. Assistant Lecture Omar Al Khayat 2 nd Year


R.PRAKASH COMPUTER TEACHER

Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS

Weiss Chapter 1 terminology (parenthesized numbers are page numbers)

Get Unique study materials from

Object Oriented Pragramming (22316)

Aryan College. Computer Fundamental. Introduction to Computer System

CS201- Introduction to Programming Current Quizzes

AN OVERVIEW OF C++ 1

Downloaded from

COIMBATORE EDUCATIONAL DISTRICT

VALLIAMMAI ENGINEERING COLLEGE

OBJECT ORIENTED PROGRAMMING USING C++ CSCI Object Oriented Analysis and Design By Manali Torpe

XII CS(EM) Minimum Question List N.KANNAN M.Sc., B.Ed COMPUTER SCIENCE IMPORTANT QUESTION (TWO MARKS) CHAPTER 1 TO 5 ( STAR OFFICE WRITER)

CS304 Object Oriented Programming Final Term

Fast Introduction to Object Oriented Programming and C++

CS 6456 OBJCET ORIENTED PROGRAMMING IV SEMESTER/EEE

HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE

Introduction to Programming Using Java (98-388)

SRE VIDYASAAGAR HIGHER SECONDARY SCHOOL

AHLCON PUBLIC SCHOOL, MAYUR VIHAR I, DELHI ASSIGNMENT CLASS XI Session Chapter 1: Computer Overview

XII- COMPUTER SCIENCE VOL-II MODEL TEST I

SASTRA MATRICULATION HIGHER SECONDARY SCHOOL KARUNGALIKUPPAM, KILPENNATHUR, TIRUVANNAMALAI VOLUME-I

Question Bank. Fundamentals Of Computer FYBCA (SEM - I)

SRE VIDYASAAGAR HIGHER SECONDARY SCHOOL. TWO MARKS

Chapter 1 INTRODUCTION

ONE MARKS QUESTION AND ANSWERS

Part II Answer to all the questions (2 Marks):

CHRIST THE KING BOYS MATRIC HR. SEC. SCHOOL, KUMBAKONAM CHAPTER 9 C++

Data Structures using OOP C++ Lecture 3

Chapter 15 - C++ As A "Better C"

elc International School

Chapter 6 Introduction to Defining Classes

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder

CHOICE BASED CREDIT SYSTEM (With effect from )

COMP322 - Introduction to C++ Lecture 02 - Basics of C++

PROGRAMMING IN C++ COURSE CONTENT

Syllabus for Computer Science General Part I

COMPUTER APPLICATION

[CHAPTER] 1 INTRODUCTION 1

BANK EXAMS COMPUTER KNOWLEDGE A) BASIC B) FORTRAN C) COBOL D) PASCAL E) JAVA

Cpt S 122 Data Structures. Introduction to C++ Part II

Learning Objectives. C++ For Artists 2003 Rick Miller All Rights Reserved xli

Kapil Sehgal PGT Computer. Science Ankleshwar Gujarat

IECD Institute for Entrepreneurship and Career Development Bharathidasan University, Tiruchirappalli 23.

I BCS-031 BACHELOR OF COMPUTER APPLICATIONS (BCA) (Revised) Term-End Examination. June, 2015 BCS-031 : PROGRAMMING IN C ++

CHAPTER 1 Introduction to Computers and Programming CHAPTER 2 Introduction to C++ ( Hexadecimal 0xF4 and Octal literals 031) cout Object

Computer Science XII Important Concepts for CBSE Examination Questions

OBJ. ORI.& MULT. PROG., M.C.Q. BANK, FOR UNIT -2, SECOND YEAR COMP. ENGG. SEM-4, 2012 PATTERN, U.O.P. UNIT-2

CS 376b Computer Vision

Government Polytechnic, Muzaffarpur. Name of the Lab: OBJECT ORIENTED PROGRAMMING

Sri Vidya College of Engineering & Technology

NEO CONVENT SR. SEC. SCHOOL, PASCHIM VIHAR, DELHI 63 Paper IP, Class XI-C, Unit Test 1 ( ) Answer Key Max. Marks: 40

Course Text. Course Description. Course Objectives. StraighterLine Introduction to Programming in C++

A506 / C201 Computer Programming II Placement Exam Sample Questions. For each of the following, choose the most appropriate answer (2pts each).

Distributed Real-Time Control Systems. Lecture 17 C++ Programming Intro to C++ Objects and Classes

C++ (Non for C Programmer) (BT307) 40 Hours

C++_ MARKS 40 MIN

KENDRIYA VIDYALAYA SANGATHAN BHUBANESWAR REGION SPLITUP SYLLABUS FOR COMPUTER SCIENCE CLASS XI

Borland 105, 278, 361, 1135 Bounded array Branch instruction 7 break statement 170 BTree 873 Building a project 117 Built in data types 126

Introduction to C++ Systems Programming

Object-Oriented Programming (OOP) Fundamental Principles of OOP

User. Application program. Interfaces. Operating system. Hardware

CS304 Object Oriented Programming

Week 0: Intro to Computers and Programming. 1.1 Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components

Lecture 03 Bits, Bytes and Data Types

Name :. Roll No. :... Invigilator s Signature :.. CS/B.TECH (NEW)/SEM-2/CS-201/ BASIC COMPUTATION & PRINCIPLES OF COMPUTER PROGRAMMING

Transcription:

11 TH STANDARD NEW SYLLABUS UNIT I FUNDAMENTALS OF COMPUTER AND WORKING WITH TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX) CHAPTER 1 INTRODUCTION TO COMPUTERS SECTION - A I. CHOOSE THE BEST ANSWER: t et t et t et 1. First generation computers used a) Vacuum tubes b) Transistors c) Integrated circuits d) Microprocessors 2. Name the volatile memory? t et a) ROM b) PROM c) RAM d) EPROM 3. Identify the output device? a) Keyboard b) Memory c) Monitor d) Mouse t et 4. Identify the input device? a) Printer b) Mouse c) Plotter d) Projector 5. Output device is used for printing building plan, flex board, etc. t et a) Thermal printer b) Plotter c) Dot matrix d) Inkjet printer 6. In ATM machines, which one of the following is used to a) Touch Screen b) Speaker c) Monitor d) Printer t et 7. When a system restarts which type of booting is used. a) Warm booting b) Cold booting c) Touch boot d) Real boot. 8. Expand POST t et w t t t t t t t t t t t t t t a) Post on self Test b) Power on Software Test c) Power on Self Test d) Power on Self Text t t 9. Which one of the following is the main memory? a) ROM b) RAM c) Flash drive d) Hard disk 10. Which generation of computer used IC s? t et t t a) First b) Second c) Third d) Fourth t et t t I. CHOOSE THE BEST ANSWER CHAPTER 2 NUMBER SYSTEMS SECTION - A 1. Which refers to the number of bits processed by a computer s CPU? t et t t a) Byte b) Nibble c) Word length d) Bit 2. How many bytes does 1 Kilo Byte contain? w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a) 1000 b) 8 c) 4 d) 1024 t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 1 t

3. Expansion for ASCII t et a) American School Code for Information Interchange b) American Standard Code for Information Interchange c) All Standard Code for Information Interchange t et d) American Society Code for Information Interchange 4. 2^50 is referred as a) Kilo b) Tera c) Peta d) Zetta t et 5. How many characters can be handled in Binary Coded Decimal System? a) 64 b) 255 c) 256 d) 128 6. For 11012 what is the Hexadecimal equivalent? t et a) F b) E c) D d) B 7. What is the 1 s complement of 00100110? a) 00100110 b) 11011001 c) 11010001 d) 00101001 t et 8. Which amongst this is not an octal number? a) 645 b) 234 c) 876 d) 123 t et I. CHOOSE THE BEST ANSWER PART - II - BOOLEAN ALGEBRA SECTION - A 1. Which is a basic electronic circuit which operates on one or more signals? t et a) Boolean algebra b) Gate c) Fundamental gates d) Derived gates 2. Which gate is called as the logical inverter? a) AND b) OR c) NOT d) XNOR t et 3. A + A =? a) A b) O c) 1 d) A 4. NOR is a combination of? w t t t t t t t t t t t t t t t t a) NOT(OR) b)not(and) c) NOT(NOT) d) NOT(NOR) t et t t 5. NAND is called as Gate w t t t t t t t t t t t t t t t t t t a) Fundamental Gate b) Derived Gate c) Logical Gate d) Electronic gate CHAPTER 3 COMPUTER ORGANIZATION SECTION - A I. CHOOSE THE BEST ANSWER t et t et t t t t t t t t 1. Which of the following is said to be the brain of a computer? a) Input devices b) Output devices c) Memory device d) Microprocessor 2. Which of the following is not the part of a microprocessor unit? t et t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 2 t

a) ALU b) Control unit c) Cache memory d) register t et 3. How many bits constitute a word? a) 8 b) 16 c) 32 d) determined by the processor used 4. Which of the following device identifies the location when address is placed in the memory address t et register? a) Locator b) Encoder c) Decoder d) Multiplexer 5. Which of the following is a CISC processor? t et a) Intel P6 b) AMD K6 c) Pentium III d) Pentium IV 6. Which is the fastest memory? a) Hard disk b) Main memory c) Cache memory d) Blue-Ray disc t et 7. How many memory locations are identified by a processor with 8 bits address bus at a time? a) 28 b) 1024 c) 256 d) 8000 8. What is the capacity of 12cm diameter DVD with single sided and single layer? t et a) 4.7 GB b) 5.5 GB c) 7.8GB d) 2.2 GB 9. What is the smallest size of data represented in a CD? a) Blocks b) Sectors c) Pits d) Tracks t et 10. Display devices are connected to the computer through. a) USB port b) PS/2 port c) SCSI port d) VGA connector CHAPTER 4 THEORETICAL CONCEPTS OF OPERATING SYSTEM SECTION - A I. CHOOSE THE BEST ANSWER t et 1. Operating system is a t et w t t t t t t t t t t t t t t t t a) Application Software b) Hardware c) System Software d) Component 2. Identify the usage of Operating Systems w t t t t t t t t t t t t t t t t a) Easy interaction between the human and computer b) Controlling input & output Devices t et t t t t c) Managing use of main memory d) All the above 3. Which of the following is not a function of an Operating System? a) Process Management b) Memory Management t et t t t t c) Security management d) Complier Environment 4. Which of the following OS is a commercially licensed Operating system? a) Windows b) UBUNTU c) FEDORA d) REDHAT t et t t t t 5. Which of the following Operating systems support Mobile Devices? w t t t t t t t t t t t t t t t t t t t t t t a) Windows 7 b) Linux c) BOSS d) ios t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 3 t

6. File Management manages t et a) Files b) Folders c) Directory systems d) All the Above 7. Interactive Operating System provides a) Graphics User Interface (GUI) b) Data Distribution t et c) Security Management d) Real Time Processing 8. Android is a w t t t t a) Mobile Operating system b) Open Source c) Developed by Google d) All the above t et t t 9. Which of the following refers to Android operating system s version? a) JELLY BEAN b) UBUNTU c) OS/2 d) MITTIKA CHAPTER 5 WORKING WITH THEORETICAL CONCEPTS OF OPERATING SYSTEM PART I WORKING WITH WINDOWS SECTION - A I. CHOOSE THE BEST ANSWER t et t et t t t t 1. From the options given below, choose the operations managed by the operating system. a) Memory b) Processor c) I/O devices d) All of the above 2. Which is the default folder for many Windows Applications to save your file? t et t t a) My Document b) My Pictures c) Documents and Settings d) My Computer 3. Under which of the following OS, the option Shift + Delete permanently deletes a file or folder? a) Windows 7 b) Windows 8 c) Windows10 d) None of the OS t et t t 4. What is the meaning of "Hibernate" in Windows XP/Windows 7? a) Restart the Computer in safe mode b) Restart the Computer in hibernate mode t et t t c) Shutdown the Computer terminating all the running applications d) Shutdown the Computer without closing the running applications 5. Which of the following OS is not based on Linux? t et t t a) Ubuntu b) Redhat c) CentOs d) BSD 6. Which of the following in Ubuntu OS is used to view the options for the devices installed? a) Settings b) Files c) Dash d) VBox_GAs_5.2.2 t et t t 7. Identify the default email client in Ubuntu. a) Thunderbird b) Firefox c) Internet Explorer d) Chrome 8. Which is the default application for spreadsheets in Ubuntu? This is available in the software launcher. t et t t a) Libre Office Writer b) Libre Office Calc c) Libre Office Impress d) Libre Office Draw 9. Which is the default browser for Ubuntu? w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a) Firefox b) Internet Explorer c) Chrome d) Thunderbird t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 4 t

10. Where will you select the option to log out, suspend, restart, or shut down from the desktop of Ubuntu t et OS? a) Session Indicator b) Launcher c) Files d) Search CHAPTER 6 SPECIFICATION AND ABSTRACTION I. CHOOSE THE BEST ANSWER t et t et 1. Which of the following activities is algorithmic in nature? a) Assemble a bicycle. b) Describe a bicycle. c) Label the parts of a bicycle. d) Explain how a bicycle works. 2. Which of the following activities is not algorithmic in nature? t et a) Multiply two numbers. b) Draw a kolam. c) Walk in the park. d) Braid the hair. 3. Omitting details inessential to the task and representing only the essential features of the task is known as t et a) Specification b) Abstraction c) Composition d) Decomposition 4. Stating the input property and the as:-output relation a problem is known a) Specification b) Statement c) Algorithm d) Definition t et 5. Ensuring the input-output relation is a) The responsibility of the algorithm and the right of the user. b) The responsibility of the user and the right of the algorithm. t et c) The responsibility of the algorithm but not the right of the user. d) The responsibility of both the user and the algorithm. 6. If i = 5 before the assignment i := i-1 after the assignment, the value of i is t et a) 5 b) 4 c) 3 d) 2 7. If 0 < i before the assignment i := i-1 after the assignment, we can conclude that a) 0 < i b) 0 i c) i = 0 d) 0 i t et CHAPTER 7 COMPOSITION AND DECOMPOSITION I. CHOOSE THE BEST ANSWER t et 1. Suppose u, v = 10, 5 before the assignment. What are the values of u and v after the sequence of assignments? t et 1 u := v 2 v := u w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a) u, v = 5,5 b) u, v = 5,10 c) u, v = 10,5 d) u, v = 10,10 t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 5 t

2. Which of the following properties is true after the assignment (at line3)? t et 1 -- i+j = 0 2 i, j := i+1, j-1 3 --? t et a) i+j >0 b) i+j < 0 c) i+j =0 d) i = j 3. If C1 is false and C2 is true, the compound statement 1 if C1 t et 2 S1 3 else 4 if C2 t et 5 S2 6 else 7 S3 executes t et a) S1 b) S2 c) S3 d) none 4. If C is false just before the loop, the control flows through 1 S1 t et 2 while C 3 S2 4 S3 t et a) S1 ; S3 b) S1 ; S2 ; S3 c)s1 ; S2 ; S2 ; S3 d) S1 ; S2 ; S2 ; S2 ; S3 5. If C is true, S1 is executed in both the flowcharts, but S2 is executed in t et t et t et a) (1) only b) (2) only c) both (1) and (2) d) neither (1) nor (2) t et 6. How many times the loop is iterated? i := 0 while i 5 i := i + 1 w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a) 4 b) 5 c) 6 d) 0 t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 6 t

CHAPTER 8 ITERATION AND RECURSION I. CHOOSE THE BEST ANSWER t et t et II. 1. A loop invariant need not be true a) At the start of the loop. b) At the start of each iteration c) At the end of each iteration d) At the start of the algorithm t et 2. We wish to cover a chessboard with dominoes, the number of black squares and the number of white squares covered by dominoes, respectively, placing a domino can be modeled by a) b := b + 2 b) w := w + 2 c) b, w := b+1, w+1 d) b := w 3. If m x a + n x b is an invariant for the assignment a, b : = a + 8, b + 7, the values of m and n are t et a) m = 8, n = 7 b) m = 7, n = -8 c) m = 7, n = 8 d) m = 8, n = -7 4. Which of the following is not an invariant of the assignment? m, n := m+2, n+3 a) m mod 2 b) n mod 3 c) 3 X m - 2 X n d) 2 X m - 3 X n t et 5. If Fibonacci number is defined recursively as 0 n = 0 t et 1 n = 1 F(n 1) + F(n 2) otherwise F (n)= to evaluate F(4), how many times F() is applied? t et a) 3 b) 4 c) 8 d) 9 6. Using this recursive definition t et 1 if n = 0 a x an -1 otherwise a n= how many multiplications are needed to calculate a10? t et a) 11 b) 10 c) 9 d) 8 t et CHOOSE THE BEST ANSWER: 1. Who developed C++? t et w t t t t t t t t t t t t t t t t t t t t t t UNIT III INTRODUCTION TO C++ CHAPTER 9 SECTION - A a) Charles Babbage b) Bjarne Stroustrup c) Bill Gates d) Sundar Pichai 2. What was the original name given to C++? t et t t w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 7 t

a) CPP b) Advanced C c) C with Classes d) Class with C t et 3. Who coined C++? w t t a) Rick Mascitti b) Rick Bjarne c) Bill Gates d) Dennis Ritchie 4. The smallest individual unit in a program is: t et t t a) Program b) Algorithm c) Flowchart d) Tokens 5. Which of the following operator is extraction operator of C++? a) >> b) << c) <> d) ^^ t et t t 6. Which of the following statements is not true? a) Keywords are the reserved words convey specific meaning to the C++ compiler. b) Reserved words or keywords can be used as an identifier name. t et t t c) An integer constant must have at least one digit without a decimal point. d) Exponent form of real constants consists of two parts 7. Which of the following is a valid string literal? t et t t a) A b) Welcome c) 1232 d) 1232 8. A program written in high level language is called as a) Object code b) Source code c) Executable code d) All the above t et t t 9. Assume a=5, b=6; what will be result of a&b? a) 4 b) 5 c) 1 d) 0 10. Which of the following is called as compile time operators? t et t t a) sizeof b) pointer c) virtual d) this t et t t I. CHOOSE THE BEST ANSWER: 1. What is the alternate name of null statement? CHAPTER 10 FLOW OF CONTROL SECTION - A a) No statement b) Empty statement (c) Void statement d) Zero statement t et t t 2. In C++, the group of statements should enclose within: a) } b) [ ] c) ( ) d) < > 3. The set of statements that are executed again and again in iteration is called as: t et t t a) Condition b) Loop c) Statement d) Body of loop 4. The multi way branching statement: a) if b) if else c) switch d) for t et t t 5. How many types of iteration statements? w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a) 2 b) 3 c) 4 d) 5 t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 8 t

6. How many times the following loop will execute? for (int i=0; i<10; i++) t et a) 0 b) 10 c) 9 d) 11 7. Which of the following is the exit control loop? a) For b) while c) do while d) if else t et 8. Identify the odd one from the keywords of jump statements: a) Break b) Switch c) goto d) continue 9. Which of the following is the exit control loop? t et a) do-while b) for c) while d) if-else 10. A loop that contains another loop inside its body: a) Nested loop b) Inner loop c) Inline loop d) Nesting of loop t et I. CHOOSE THE CORRECT ANSWER: t et CHAPTER 11 FUNCTIONS 1. Which of the following header file defines the standard I/O predefined functions? a) stdio.h b) math.h c) string.h d) ctype.h 2. Which function is used to check whether a character is alphanumeric or not. t et a) isalpha() b) isdigit() c) isalnum() d) islower() 3. Which function begins the program execution? a) isalpha() b) isdigit() c) main() d) islower() t et 4. Which of the following function is with a return value and without any argument? a) x=display(int, int) b) x=display() c) y=display(float) d) display(int) 5. Which is return data type of the function prototype of add(int, int);? t et a) int b) float c) char d) double 6. Which of the following is the scope operator? a) > b) & c) % d) :: t et t et I. CHOOSE THE CORRECT ANSWER CHAPTER 12 ARRAYS 1. Which of the following is the collection of variables of the same type that are referenced by a common name? w t t t t t t t t t t t t t t t t t t t t a) int b) float c) Array d) class t et t t 2. Array subscript always starts with which number? w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a)-1 b) 0 c) 2 d) 3 t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 9 t

3. int age[]=6,90,20,18,2}; How many elements are there in this array? t et a) 2 b) 5 c) 6 d) 4 4. cin>>n[3]; To which element does this statement accepts the value? a) 2 b) 3 c) 4 d) 5 t et 5. By default, the string ends with which character? a)\0 b) \t c) \n d) \b CHAPTER 12 STRUCTURES I. CHOOSE THE CORRECT ANSWER t et 1. By default, the string ends with which character? t et a)\0 b) \t c) \n d) \b 2. The data elements in the structure are also known as a) objects b) members c) data d) records t et 3. Structure definition is terminated by a) : b) } c) ; d) :: 4. What will happen when the structure is declared? t et a) It will not allocate any memory b) It will allocate the memory c) It will be declared and initialized d) It will be only declared 5. What is the output of this program? t et #include <iostream> #include <string.h> using namespace std; t et int main() struct student t et int n; char name[10]; t et }; student s; s.n = 123; t et strcpy(s.name, "Balu"); cout<<s.n; cout<< s.name <<endl; t et w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 10 t

return 0; t et } a) 123Balu b)balubalu c) Balu123 d) 123 Balu A structure declaration is given below. t et struct Time int hours; t et int minutes; int seconds; }t; t et 6. Using above declaration which of the following refers to seconds. a) Time.seconds b) Time::seconds c) Seconds d) t. seconds 7. What will be the output of this program? t et #include <iostream> using namespace std; struct ShoeType t et string name; double price; t et }; int main() t et ShoeType shoe1, shoe2; shoe1.name = "Adidas"; shoe1.price = 9.99; t et cout<< shoe1.name<< " # "<< shoe1.price<<endl; shoe2 = shoe1; shoe2.price = shoe2.price / 9; t et cout<< shoe2.name<< " # "<< shoe2.price; return 0; (a) Adidas # 9.99 t et Adidas # 1.11 w t t t t t t t t t t t t t t t t t t t t (b) Adidas # 9.99 t t Adidas # 9.11 8. Which of the following is a properly defined structure? w t t t t t t t t t t t t t t t t t t t t (c) Adidas # 9.99 t t Adidas # 11.11 w t t t t t t t t t t t t t t t t t t t t (d) Adidas # 9.11 t t Adidas # 11.11 a) struct int num;} b) struct sum int num;} c) struct sum int sum; d)struct sum int num;}; t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 11 t

A structure declaration is given below. t et struct employee int empno; t et char ename[10]; }e[5]; 9. Using above declaration which of the following statement is correct. t et a) cout<<e[0].empno<<e[0].ename; b) cout<<e[0].empno<<ename; c)cout<<e[0]->empno<<e[0]->ename; 10. Which of the following cannot be a structure member? t et d) cout<<e.empno<<e.ename; a) Another structure b) Function c) Array d) Variable of double datatype 11. When accessing a structure member, the identifier to the left of the dot operator is the name of a) Structure Variable b) Structure Tag c) Structure Member d) Structure Function t et CHAPTER 13 INTRODUCTION TO OBJECT ORIENTED PROGRAMMING TECHNIQUES I. CHOOSE THE CORRECT ANSWER: t et 1. The term is used to describe a programming approach based on classes and objects is a) OOP b) POP c) ADT d) SOP 2. The paradigm which aims more at procedures is. t et a) Object Oriented Programming b) Procedural programming c) Modular programming d) Structural programming 3. Which of the following is a user defined data type? t et a) Class b) Float c) Int d) Object 4. The identifiable entity with some characteristics and behavior is. a) Class b) Object c) Structure d) Member t et 5. The mechanism by which the data and functions are bound together into a single unit is known as a) Inheritance b) Encapsulation c) Polymorphism d) Abstraction 6. Insulation of the data from direct access by the program is called as t et a) Data hiding b) Encapsulation c) Polymorphism d) Abstraction 7. Which of the following concept encapsulate all the essential properties of the object that are to be created? t et w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a) Class b) Encapsulation c) Polymorphism d) Abstraction 8. Which of the following is the most important advantage of inheritance? w t t t t t t t t t t t t t t t t t t t t t t a) Data hiding b) Code reusability c) Code modification d) Accessibility t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 12 t

9. Write once and use it multiple time can be achieved by t et a) Redundancy b) Reusability c) Modification d) Composition 10. Which of the following supports the transitive nature of data? a) Inheritance b) Encapsulation c) Polymorphism d) Abstraction t et t et I. CHOOSE THE CORRECT ANSWER CHAPTER 14 CLASSES AND ITS OBJECTS 1. The variables declared inside the class are known as data members and the functions are known as a) Data functions b) Inline functions c) Member Functions d) attributes 2. Which of the following statements about member functions are true or false? t et i) A member function can call another member function directly with using the dot operator. ii) Member function can access the private data of the class. a) i-true, ii-true b) i-false, ii-true c) i-true, ii-false d) i-false, ii-false t et 3. A member function can call another member function directly, without using the dot operator called as a) Sub function b) Sub member c) Nesting of member function d) Sibling of member function t et 4. The member function defined within the class behave like a) Inline functions b) Non inline function c) Outline function d) Data function 5. Which of the following Access Specifier protects data from inadvertent modifications? t et a) Private b) Protected c) Public d) Global class x t et int y; public: x(int z) t et y=z; } t et } x1[4]; int main() t et x x2[10]; return 0; } t et w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 13 t

6. How many objects are created for the above program t et a) 10 b) 14 c) 5 d) 2 7. State whether the following statements about the constructor are true or false. i) Constructors should be declared in the private section. t et ii) Constructors are invoked automatically when the objects are created. a) True, True b) True, False c) False, True d) False, False 8. Which of the following constructor is executed for the following prototype? t et add display( add &); // add is a class name a) Default constructor b) Parameterized constructor c) Copy constructor d) Non Parameterized constructor t et 9. What happens when a class with parameterized constructors and having no default constructor is used in a program and we create an object that needs a zero-argument constructor? a) Compile-time error b) Domain error c) Runtime error d) Runtime exception. t et 10. Which of the following create a temporary instance? a) Implicit call to the constructor b) Explicit call to the constructor c) Implicit call to the destructor d) Explicit call to the destructor t et I. CHOOSE THE CORRECT ANSWERS: t et CHAPTER 15 POLYMORPHISM 1. Which of the following refers to a function having more than one distinct meaning? a) Function overloading b) Member overloading c) Operator overloading d) Operations overloading t et 2. Which of the following reduces the number of comparisons in a program? a) Operator overloading b) Operations overloading c) Function overloading d) Member overloading t et void dispchar(char ch= $,int size=10) t et } for(int i=1;i<=size;i++) cout<<ch; 3. How will you invoke the function dispchar() for the following input? t et To print $ for 10 times w t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t a) dispchar(); b) dispchar(ch,size); c) dispchar($,10); d)dispchar( $,10 times); 4. Which of the following is not true with respect to function overloading? t et t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 14 t

a) The overloaded functions must differ in their signature. t et b) The return type is also considered for overloading a function. c) The default arguments of overloaded functions are not considered for Overloading. d) Destructor function cannot be overloaded. t et 5. Which of the following is invalid prototype for function overloading a) void fun (intx); b) void fun (int x); c) void fun (double d); d) void fun (double d); void fun (char ch) ; void fun (int y); void fun (char ch); void fun (inty); t et 6. Which of the following function(s) combination cannot be considered as overloaded function(s) in the given snippet? void print(char A,int B); // F1 t et void printprint(int A, float B); // F2 void Print(int P=10); // F 3 void print(); // F4 t et a) F1,F2,F3,F4 b) F1,F2,F3 c) F1,F2,F4 d) F1,F3,F4 7. Which of the following operator is by default overloaded by the compiler? a) * b) + c) += d) = = t et 8. Based on the following program answer the questions (8) to (10) #include<iostream> using namespace std; t et class Point }; private: t et int x, y; public: t et Point(int x1,int y1) x=x1;y=y1; t et t et } void operator+(point &pt3); void show() cout << "x = " << x << ", y = " << y; } void Point::operator+(Point &pt3) x += pt3.x; t et w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 15 t

} int main() } y += pt3.y; t et t et Point pt1(3,2),pt2(5,4); pt1+pt2; pt1.show(); t et return 0; w t t t t t t 9. Which of the following operator is overloaded? t et t t a) + b) operator c) :: d) = 10. Which of the following statement invoke operator overloading? a) pt1+pt2; b) Point pt1(3,2),pt2(5,4); c) pt1.show(); d) return 0; t et t t 11. What is the output for the above program? a) x=8, y=6 b) x=14, y=14 c) x=8, y=6 d) = x=5, y=9 CHAPTER 16 INHERITANCE I. CHOOSE THE CORRECT ANSWERS: t et t t 1. Which of the following is the process of creating new classes from an existing class? t et t t a) Polymorphism b) Inheritance c) Encapsulation d) super class 2. Which of the following derives a class student from the base class school? a) school: student b) class student : public school t et t t c) student : public school d) class school : public student 3. The type of inheritance that reflects the transitive nature is a) Single Inheritance b) Multiple Inheritance c) Multilevel Inheritance d) Hybrid Inheritance t et t t 4. Which visibility mode should be used when you want the features of the base class to be available to the derived class but not to the classes that are derived from the derived class? a) Private b) Public c) Protected d) All of these t et t t 5. Inheritance is process of creating new class from w t t t t t t t t t t t t t t t t t t t t a) Base class b) Abstract c) Derived class d) Function 6. A class is derived from a class which is a derived class itself, and then this is referred to as t et t t t t a) Multiple Inheritance b) Multilevel Inheritance c) Single Inheritance d) Double Inheritance 7. Which amongst the following is executed in the order of inheritance? w t t t t t t t t t t t t t t t t t t t t t t a) Destructor b) Member function c) Constructor d) Object t et t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 16 t

8. Which of the following is true with respect to inheritance? t et a) Private members of base class are inherited to the derived class with private b) Private members of base class are not inherited to the derived class with private accessibility c) Public members of base class are inherited but not visible to the derived class t et d) Protected members of base class are inherited but not visible to the outside class 9. Based on the following class declaration answer the questions (from9.1 o 9.4) class vehicle t et int wheels; public: t et void input_data(float,float); void output_data(); protected: t et int passenger; }; class heavy_vehicle : protected vehicle t et int diesel_petrol; protected: t et int load; protected: int load; t et public: void read_data(float,float) void write_data(); t et }; class bus: private heavy_vehicle t et charticket[20]; public: void fetch_data(char); t et void display_data(); }; }; t et w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 17 t

9.1 Which is the base class of the class heavy_vehicle? t et a) bus b) heavy_vehicle c) vehicle d) both (a) and (c) 9.2 The data member that can be accessed from the function displaydata() a) passenger b) load c) Ticket d) All of these t et 9.3 The member function that can be accessed by an objects of bus Class is a) input_data(), b) read_data(),output_data()write_data() c) fetch_data(), display_data() d) All of these t et 9.4 The member function that is inherited as public by Class Bus a) input_data(), b) read_data(), output_data()write_data() c) fetch_data(), display_data() d) All of these t et class x int a; t et public : x() } }; t et class y x x1; t et public : y()} }; t et class z : public y,x int b; t et public: z() } }z1; t et w t t t t t t t t t t t t t t t t t t t t 10 What is the order of constructor for object z1 to be invoked? a) z, y,x,x b) x,y,z,x c) y,x,x,z d) x,y,z t et I. CHOOSE THE BEST ANSWER: t et w t t t t t t t t t t t t t t t t t t t t CHAPTER 17 COMPUTER ETHICS AND CYBER SECURITY t t t t t t t t w t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 18 t

1. Which of the following deals with procedures, practices and values? t et a) Piracy b) Programs c) Virus d) Computer ethics 2. Commercial programs made available to the public illegally are known as a) Freeware b) Warez c) Free software d) Software t et 3. Which one of the following are self-repeating and do not require a computer program to attach themselves? a) Viruses b) Worms c) Spyware d) Trojans t et 4. Which one of the following tracks a user visits a website? a) Spyware b) Cookies c) Worms d) Trojans 5. Which of the following is not a malicious program on computer systems? t et a) Worms b) Trojans c) Spyware d) Cookies 6. A computer network security that monitors and controls incoming and outgoing traffic is a) Cookies b) Virus c) Firewall d) Worms t et 7. The process of converting cipher text to plain text is called a) Encryption b) Decryption c) Key d) Proxy server 8. E-commerce means t et w t t t t t t t t t t t t a) Electronic commerce b) Electronic data exchange c) Electric data exchange d) Electronic commercialization. 9. Distributing unwanted e-mail to others is called. t et t t a) Scam b) Spam c) Fraud d) Spoofing 10. Legal recognition for transactions are carried out by w t t t t t t t t t t t t t t w t t t t t t t t t t t t t t a) Electronic Data Interchange b) Electronic Data Exchange t et t t t t t t c) Electronic Data Transfer d) Electrical Data Interchange t et t et t et t et t t t t t t t t t t t t t t t t t t t t t t t t CREATED BY P. SUBRAMANIAN M.Sc(I.T)., B.Ed., 9677066334 Page 19 t