New ! Computer Science MCQ Practise Tests



+1 First Revision Test Model

11th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Science

Time : 02:30:00 Hrs
Total Marks : 70
    I. Choose best suitable answer with option code:
    15 x 1 = 15
  1. The 2's complement of 11002 is _______.

    (a)

    00112

    (b)

    01002

    (c)

    00012

    (d)

    11002

  2. Which of the following is said to be the brain of a computer?

    (a)

    Input devices

    (b)

    Output devices

    (c)

    Memory device

    (d)

    Microprocessor

  3. Interactive Operating System provides

    (a)

    Graphics User Interface (GUI)

    (b)

    Data Distribution

    (c)

    Security Management

    (d)

    Real Time Processing

  4. Which command is used to cut file or folder?

    (a)

    File ⟶ Cut

    (b)

    Edit ⟶ Cut

    (c)

    Edit ⟶ Move

    (d)

    Format ⟶ Cut

  5. Omitting details inessential to the task and representing only the essential features of the task is known as

    (a)

    specification

    (b)

    abstraction

    (c)

    composition

    (d)

    decomposition

  6. If Fibonacci number is defined recursively as
    \(F(n)= \begin{cases}0 \ \mathrm{n}=0 \\ 1 \ \mathrm{n}=1 \\ \mathrm{~F}(\mathrm{n}-1)+\mathrm{F}(\mathrm{n}-2) \text { otherwise }\end{cases}\)
    to evaluate F(4), how many times F() is applied?

    (a)

    3

    (b)

    4

    (c)

    8

    (d)

    9

  7. Evaluate x = ++y+2y if y = 6 ________.

    (a)

    18

    (b)

    19

    (c)

    23

    (d)

    21

  8. A loop that contains another loop inside its body:

    (a)

    Nested loop

    (b)

    Inner loop

    (c)

    Inline loop

    (d)

    Nesting of loop

  9. Ready-to-use sub programs are called
    (i) pre-defined functions
    (ii) built-in functions
    (iii) user-defined functions

    (a)

    Only(i)

    (b)

    Only (ii)

    (c)

    Only (iii)

    (d)

    both (i) and (ii)

    (e)

    both (ii) and (iii)

  10. When accessing a structure member, the identifier to the left of the dot operator is the name of

    (a)

    structure variable

    (b)

    structure tag

    (c)

    structure member

    (d)

    structure function

  11. Insulation of the data from direct access by the program is called as

    (a)

    Data hiding

    (b)

    Encapsulation

    (c)

    Polymorphism

    (d)

    Abstraction

  12. By default, class members are treated as ________.

    (a)

    protected

    (b)

    private

    (c)

    either a or b

    (d)

    public

  13. Which of the following statement is true or false?
    (i) Overloading function refers to a functions having more than one distinct meaning
    (ii) The number and types of a function parameters are called overloaded signature

    (a)

    i-true, ii-true

    (b)

    i-true, ii-false

    (c)

    i-false, ii-false

    (d)

    i-false, ii-true

  14. class vehicle
    { int wheels;
    public:
    void input_data(float,float);
    void output_data();
    protected:
    int passenger;
    };
    class heavy_vehicle : protected vehicle {
    int diesel_petrol;
    protected:
    int load;
    public:
    void read_data(float,float)
    void write_data(); };
    class bus: private heavy_vehicle {
    char Ticket[20];
    public:
    void fetch_data(char);
    void display_data(); };
    The member function that is inherited as public by Class Bus

    (a)

    input_data(), output_data()

    (b)

    read_data(), write_data()

    (c)

    fetch _data(),display _data()

    (d)

    none of these

  15. Getting Government services through internet is known as ______.

    (a)

    e-filling

    (b)

    e-payment

    (c)

    e-govemance

    (d)

    e-shopping

  16. II. Answer any Six questions. Q. No 21 is compulsory:
    6 x 2 =14
  17. What are the components of a CPU?

  18. Define Decoder. 

  19. List out any two uses of Operating System?

  20. Distinguish between a condition and a statement.

  21. Define factorial of a natural number recursively

  22. Why is char often treated as integer data type?

  23. Write the output of the following program
    #include < string.h >
    #include < iostream >
    using namespace std;
    int main()
    {
    char source[] = "Computer Science";
    char target[20]="target";
    cout<< "\n String in Source Before Copied:" << source;
    cout << "\n String ill Target Before Copied:" << target;
    strcpy(target,source );
    cout << "\n String in Target After strcpy function Executed :" << target;
    return 0;
    }

  24. Why following array declaration is invalid?
    char str[2] ={'S', 'C', 'H', '0', 'L'};

  25. Why it is considered as a good practice to define a constructor though compiler can automatically generate a constructor?

  26. Which may be done in pursuit of criminal activity or hobby?

  27. III. Answer any Six questions. Q. No 31 is compulsory:

    6 x 3 = 18
  28. Write a short note on XNOR gate.

  29. Write few goals of scheduling.

  30. What is the difference between assignment operator and equality operator?

  31. Describe iterative statement.

  32. Write a C++ program to print multiplication table of a given number.

  33. Write the syntax and an example for structure.

  34. List some of the features of modular programming.

  35. Differentiate implicit call and explicit call of involving parameterized constructor.

  36. Discuss the benefits of constructor overloading?

  37. Can a derived class get access privilege for a private member of the base class? If yes, how?

  38. IV. Answer all in detail:
    5 x 5 =25
    1. Explain booting of computer and its types.

    2. Explain the characteristics of a microprocessor.

    1. Write the significant features of Ubuntu OS.

    2. Exchange the contents: Given two glasses marked A and B. Glass A is full of apple drink and glass B is full of grape drink. Write the specification for exchanging the contents of glasses A and B, and write a sequence of assignments to satisfy the specification.

    1. Write programs to find the sum of the following series:
      (a)  \(x-\frac { { x }^{ 2 } }{ 2! } +\frac { { x }^{ 3 } }{ 3! } -\frac { { x }^{ 4 } }{ 4! } +\frac { { x }^{ 5 } }{ 5! } -\frac { { x }^{ 6 } }{ 6! } \)
      (b)  \(x+\frac { { x }^{ 2 } }{ 2 } +\frac { { x }^{ 3 } }{ 3 } +...+\frac { { x }^{ n } }{ n } \)

    2. Explain Call by value method with suitable example.

    1. Write a C++ program to add two distances using the following structure definition
      struct Distance{
      int feet;
      float inch;
      }d1 , d2, sum;

    2. Explain the different methods of creating an object in C++.

    1. Debug the following program
      #include < iostream >
      using namespace std;
      class String
      {
      public:
      charstr[20];
      public:
      void accept_string
      {
      cout << "\n Enter String : ";
      cin>>str;
      }
      display_string()
      {
      cout< }
      String operator *(String x) //Concatenating String
      {
      String s;
      strcat(str,str);
      strcpy(s.str,str);
      goto s;
      }
      }
      int main()
      {
      String str1, str2, str3;
      str1.accept_string();
      str2.accept_string();
      cout << "\n\n First String is : ";
      str1=display_string();
      cout << "\n\n Second String is : ";
      str2.display_string();
      str3=str1+str2;
      cout>>"\n\n Concatenated String is : ";
      str3.display_string();
      return 0;
      }

    2. Define the constructors for the following
      definitions:
      class A { intX;
      floaty;
      public:
      A (int, float);
      };
      class B : public A
      { public:
      };

*****************************************

Reviews & Comments about HSC First Year Computer Science First Revision Test Model Question Paper 2019

Write your Comment