New ! Computer Applications MCQ Practise Tests



11th Public Exam March 2019 Important Creative One Mark Test

11th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 00:45:00 Hrs
Total Marks : 100
    100 x 1 = 100
  1. First generation computers used ______.

    (a)

    Vacuum tubes

    (b)

    Transistors

    (c)

    Integrated circuits

    (d)

    Microprocessors

  2. Which one of the following is used to in ATM machines

    (a)

    Touch Screen

    (b)

    Speaker

    (c)

    Monitor

    (d)

    Printer

  3. Which is the combination of hardware and software?

    (a)

    Programs

    (b)

    Computer

    (c)

    Data

    (d)

    Information

  4. Which of the following is not an output device?

    (a)

    Monitor

    (b)

    Projector

    (c)

    Scanner

    (d)

    Plotter

  5. Which of the following is a pointing device?

    (a)

    Keyboard

    (b)

    Scanner

    (c)

    Plotter

    (d)

    Mouse

  6. Which device is used to input by pressing one or more switches?

    (a)

    Keyboard

    (b)

    Mouse

    (c)

    Touch Screen

    (d)

    Keyer

  7. Expansion for ASCII

    (a)

    American School Code for Information Interchange

    (b)

    American Standard Code for Information Interchange

    (c)

    All Standard Code for Information Interchange

    (d)

    American Society Code for Information Interchange

  8. The 4 bit binary equivalent of -5 is......

    (a)

    1101

    (b)

    0101

    (c)

    1100

    (d)

    -101

  9. The 2's complement of 11002 is ________.

    (a)

    00112

    (b)

    01002

    (c)

    00012

    (d)

    11002

  10. Which coding schemes have 65000 representations?

    (a)

    Byte code

    (b)

    Binary code

    (c)

    Unicode

    (d)

    EBCDIC

  11. To convert an octal number of binary equivalent, each octal digit is expressed as....

    (a)

    3 bits form

    (b)

    4 bits form

    (c)

    8 bits form

    (d)

    2 bits form

  12. The binary equivalent of a hexadecimal digit C is repressed by.....

    (a)

    1010

    (b)

    1011

    (c)

    1101

    (d)

    1100

  13. How many memory locations are identified by a processor with 8 bits address bus at a time?

    (a)

    28

    (b)

    1024

    (c)

    256

    (d)

    8000

  14. Which of the following microprocessor is not the classification based on data size?

    (a)

     8

    (b)

    16

    (c)

    32

    (d)

    128

  15. Which of the following is a volatile memory?

    (a)

    ROM

    (b)

     PROM

    (c)

     EPROM

    (d)

    none of these

  16. How many control line is enough to have read or write operation?

    (a)

    Only One

    (b)

    Only Two

    (c)

    Only Four

    (d)

    More than One

  17. Which of the following statement is true?
    (i) RAM is not a main memory.
    (ii) RAM is in the form of ICs.
    (iii) RAM stores the information temporarily.
    (iv) RAM cannot be accessed by a collection of bits.

    (a)

    Only (i)

    (b)

    Only (ii) and (iii)

    (c)

    Only (iv)

    (d)

    Only (i) and (iv)

  18. File Management manages_______

    (a)

    Files

    (b)

    Folders

    (c)

    Directory systems

    (d)

    All the Above

  19. Real time OS are mostly used for

    (a)

    Robotics

    (b)

    Weather

    (c)

    Airline communication

    (d)

    Bank

  20. Expansion of FAT is ________.

    (a)

    File Allocation Table

    (b)

    File Arithmetic Table

    (c)

    Format Allocation Table

    (d)

    File Access Table

  21. Which OS created by Apple Inc?

    (a)

    Android

    (b)

    Windows

    (c)

    Unix

    (d)

    iOS

  22. From the options given below, choose the operations managed by the operating system.

    (a)

    Memory

    (b)

    Processes

    (c)

    Disks and I/O devices

    (d)

    all of the above

  23. Which OS used on webservers and super computers?

    (a)

    Unix

    (b)

    Windows

    (c)

    Linux

    (d)

    iOS

  24. The alternate name of the directory called ______

    (a)

    files

    (b)

    folders

    (c)

    information

    (d)

    data

  25. Which Ubuntu OS icon is equivalent to My computer icon?

    (a)

    This PC

    (b)

    Computer

    (c)

    Files

    (d)

    Explorer

  26. The sequence of directory names which leads to access a particular file name is called__________.

    (a)

    Sub Directory

    (b)

    Root Directory

    (c)

    Tree

    (d)

    Path

  27. Which option allows you to assign text, tables, graphics and other items to a key or key combination?

    (a)

    Autoformat

    (b)

    Automatic

    (c)

    Auto Text

    (d)

    Autographics

  28. Which of the following is a word processing software?

    (a)

    Word pro

    (b)

    MS. word

    (c)

    WPS word

    (d)

    all of these

  29. The opening screen of the openoffice is called_______.

    (a)

    Desktop

    (b)

    Office center

    (c)

    Starcenter

    (d)

    Openstar

  30. Which of the following is used to paste the cut or copied text?

    (a)

    Ctrl + P

    (b)

    Ctrl + V

    (c)

    Ctrl + Alt + V

    (d)

    Ctrl + C

  31. The text in a document can be changed to different cases uses the command_____.

    (a)

    Formant ➝ character case

    (b)

    Format ➝ Change case

    (c)

    Edit ➝ Change case

    (d)

    Tools ➝ Change case

  32. Which key is used to move the cell pointer in the forward direction within the worksheet?

    (a)

    Enter

    (b)

    Tab

    (c)

    Shift + Tab

    (d)

    Delete

  33. Which spread sheet software implement GUI?

    (a)

    Lotus 1-2-3

    (b)

    Visicalc

    (c)

    Ms - Excel

    (d)

    All of these

  34. A number 258 is treated as_______.

    (a)

    positive number

    (b)

    negative number

    (c)

    text

    (d)

    Time

  35. How many tabs are there in function wizard?

    (a)

    more than 2

    (b)

    more than 11

    (c)

    2

    (d)

    11

  36. How many ways are there open chart wizard?

    (a)

    2

    (b)

    more than 2

    (c)

    3

    (d)

    more than 3

  37. Which menu contains the Slide Transition option?

    (a)

    Slide Show

    (b)

    View

    (c)

    Tools

    (d)

    Format

  38. Which of the following is commonly known presentation programs?

    (a)

    Openoffice impress

    (b)

    MS Powerpoint

    (c)

    apple's keynote

    (d)

    All of these

  39. How many types of presentation backgrounds that impress provides?

    (a)

    11

    (b)

    12

    (c)

    24

    (d)

    none of this

  40. How many parts are there in main Impress window?

    (a)

    14

    (b)

    4

    (c)

    6

    (d)

    none of these

  41. What is the expansion of WLAN?

    (a)

    Wireless Local Area Network

    (b)

    Wired local Area Network

    (c)

    Wireless Local Area Netware

    (d)

    Wireless Area Netbande

  42. In which Network the coverage range is above 1000kms?

    (a)

    LAN

    (b)

    MAN

    (c)

    WAN

    (d)

    PAN

  43. Which of the following is not used to search for information on the www?

    (a)

    Yagoo

    (b)

    Google

    (c)

    Hotspot

    (d)

    Askjeeves

  44. __________ is the domain name for government institution.

    (a)

    .gov

    (b)

    .org

    (c)

    .org

    (d)

    .com

  45. ____________ is a unique number consisting of four parts separated by dots.

    (a)

    IP Number

    (b)

    PIN

    (c)

    Secret

    (d)

    None of these

  46. Mozila Firefox is a free and open source web browser developed by __________

    (a)

    Google Inc

    (b)

    Mozilla Corporation

    (c)

    Apple Inc

    (d)

    Microsoft

  47. Which of the following symbol is used to define a closing tag?

    (a)

    < >

    (b)

    %

    (c)

    /

    (d)

    \

  48. Which of the following known as elements of HTML?

    (a)

    Attributes

    (b)

    Tags

    (c)

    Operators

    (d)

    Data types

  49. ______________ is a special markup language used to create webpages.

    (a)

    C++

    (b)

    HTML

    (c)

    HTTP

    (d)

    None of these

  50. The attribute to specify the left margin is ____________

    (a)

    Leftmargin

    (b)

    Lmargin

    (c)

    LM

    (d)

    None of these

  51. The ____________ is an empty tag.

    (a)

    < br >

    (b)

    < hr >

    (c)

    Both A and B

    (d)

    None of these

  52. _______________ is the HTML elements (Tags).

    (a)

    Container elements

    (b)

    Empty elements

    (c)

    Both A and B

    (d)

    None of these

  53. ____________ is a container tag.

    (a)

    < html >

    (b)

    < bdoy >

    (c)

    < title >

    (d)

    All the above

  54. Which feature is used to call attention to the reader?

    (a)

    Highlight

    (b)

    Bold

    (c)

    Italics

    (d)

    Underline

  55. The default starting point of the ordered list is________.

    (a)

    0

    (b)

    1

    (c)

    3

    (d)

    10

  56. Web resources are connected in HTML using________.

    (a)

    body

    (b)

    Htrnl

    (c)

    link

    (d)

    table

  57. Link created within  a same document is known as________.

    (a)

    link

    (b)

    hyperlink

    (c)

    External link

    (d)

    Internal link

  58. ______ tag is used to define important text.

    (a)

    < strong >

    (b)

    < em >

    (c)

    < u >

    (d)

    < tt >

  59. ___________ is the attribute of < TD >, < TH > and < TR > tags used to specify the width of a cell in terms of pixels or percentage.

    (a)

    Align

    (b)

    Valign

    (c)

    Width

    (d)

    All the above

  60. In definition list, definition term is presented in between _________ tag.

    (a)

    < DT > ....... < /DT >

    (b)

    < DD > ..... < /DD >

    (c)

    < DL > ....... < /DL >

    (d)

    None of these

  61. Match the following:

    < textarea > inline
    < input > Video
    < bgsound > Multiple input
    < embed > Password
    (a)
    A B C D
    3 1 4 2
    (b)
    A B C D
    3 4 1 2
    (c)
    A B C D
    2 3 4 1
    (d)
    A B C D
    2 1 3 4
  62. Which of the following is not an attribute of < img > tag?

    (a)

    align

    (b)

    src

    (c)

    size

    (d)

    Hspace

  63. Which of the following is not an option of align attribute of < img > tag?

    (a)

    Left

    (b)

    Right

    (c)

    Middle

    (d)

    Justify

  64. _________ attribute is used to set the width of an image.

    (a)

    Width

    (b)

    Height

    (c)

    Vspace

    (d)

    Hspace

  65. __________ is the possible value of direction attribute.

    (a)

    Up

    (b)

    Down

    (c)

    Left / Right

    (d)

    All the above

  66. The __________ tag used to receive multiline text data as input.

    (a)

    < Textarea >

    (b)

    < Text >

    (c)

    < MultiText >

    (d)

    None of these

  67. Expansion of CSS

    (a)

    Cascading Style Schools

    (b)

    Cascading Style Scheme

    (c)

    Cascading Style Sheets

    (d)

    Cascading Style Shares

  68. Which of the following is not an advantages of CSS?

    (a)

    Maintainability

    (b)

    Reducing size

    (c)

    Reusability

    (d)

    Understand easily

  69. How many number of properties for each selector allowed in CSS declaration?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    many

  70. The < StyIe > tags are called as ____________ .

    (a)

    Page-Level Styles

    (b)

    Internal Style sheets

    (c)

    Either A or B

    (d)

    None of these

  71. ___________ is a style sheet language used for describing the formatting of a document written in HTML.

    (a)

    Inline

    (b)

    CSS

    (c)

    Either A or B

    (d)

    None of these

  72. The styles defined in ____________ can be reused in multiple HTML page.

    (a)

    Inline

    (b)

    CSS

    (c)

    Either A or B

    (d)

    None of these

  73. JavaScript ignores spaces that appear between

    (a)

    Command

    (b)

    Scripts

    (c)

    Tokens

    (d)

    Text

  74. The version of JavaScript introduced by Netscape and Sun Inc is?

    (a)

    2.0

    (b)

    1.0

    (c)

    3.0

    (d)

    1.2

  75. Which of the following statement is false?
    (i) The first character of a variable name must be letter or underscore
    (ii) Java script variable names are not case sensitive
    (iii) There is no limit to the variable name length
    (iv) Javascript keywords cannot be used as a variable name

    (a)

    Only (i)

    (b)

    only (ii)

    (c)

    both (ii) and (iv)

    (d)

    all the above

  76. How many types of scope variables in Javascript?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    many

  77. What is the value of a and b when the expression var a = 10, b = a++ is evaluated?

    (a)

    10, 10

    (b)

    11, 11

    (c)

    11, 10

    (d)

    10, 11

  78. In Javascript, ___________ scope is possible for a variable.

    (a)

    Local

    (b)

    Global

    (c)

    Both A and B

    (d)

    None of these

  79. < script type = "text / javascript" >
    x = 6 + "3";
    document write (x);
    < script > what will be the output?

    (a)

    6

    (b)

    9

    (c)

    63

    (d)

    Error

  80. The same portion of coole needs to be excuted many times is called________.

    (a)

    brancing

    (b)

    selections

    (c)

    loops

    (d)

    conditional brancing

  81. How many parts are there in Javascript for structure?

    (a)

    4

    (b)

    3

    (c)

    2

    (d)

    6

  82. The _________ statement evaluates an expression and executes one of two pieces of code, dending on the outcome.

    (a)

    if.. else

    (b)

    else if

    (c)

    switch

    (d)

    All the above

  83. The ________ statement executes the next iteration of the loop.

    (a)

    break

    (b)

    continue

    (c)

    for

    (d)

    do..while

  84. Larger programs are divided into smaller are called

    (a)

    modules

    (b)

    block

    (c)

    sets

    (d)

    Group

  85. Which of the following statement is not true?
    (i) The function name is any valid identifier
    (ii) The function parameter list contians only one valid variable name.
    (iii) The function parameter lists parameters are seperated by

    (a)

    only (ii)

    (b)

    only (iii)

    (c)

    only (i)

    (d)

    both (ii) and (iii)

  86. Which library function returns the element that has the ID attribute with the specified value_______.

    (a)

    is NAN ( )

    (b)

    stElementBy ID ( )

    (c)

    getelement By ID ( )

    (d)

    get element ID ( )

  87. Identify the correct statement from the following with respect to function.

    (a)

    Function invocations provide values or arguments for the function's parameters

    (b)

    Functions often use their argument values to compute a return value that becomes the value of the function invocation expression.

    (c)

    Sometimes functions are defined for commonly required tasks to avoid the repetition entailed in typing the same statements over and over.

    (d)

    All the above

  88. The large programs are divided into small programs are called___________

    (a)

    Modules

    (b)

    Blocks

    (c)

    Groups

    (d)

    None of these

  89. ________function returns true if the given value is not a number

    (a)

    isNaN( )

    (b)

    toUpperCase( )

    (c)

    toLowercase( )

    (d)

    All the above

  90. Which one of the following tracks a user visits a website?

    (a)

    spyware

    (b)

    cookies

    (c)

    worms

    (d)

    Trojans

  91. The act of gaining illegal access to a computer is called_________.

    (a)

    Hacking

    (b)

    Cracking

    (c)

    Phising

    (d)

    Piracy

  92. Which of the following program that demands payment after launching a cyber-attack on a computer system?

    (a)

    Spyware

    (b)

    Ransomware

    (c)

    Shareware

    (d)

    Moneyware

  93. Encryption and decryption are done by_________.

    (a)

    GUI

    (b)

    Cryptography

    (c)

    Cipher-text

    (d)

    Compiler

  94. Computer systems in general are____________

    (a)

    Vulnerable

    (b)

    Safe

    (c)

    Secured

    (d)

    None of these

  95. ________is used to protect data in communication system.

    (a)

    Encryption

    (b)

    Sampling

    (c)

    Warping

    (d)

    None of these

  96. Which of the following plays a vital role in ever man's life?

    (a)

    Mobile

    (b)

    Computer

    (c)

    Internet

    (d)

    Laptop

  97. Getting Government services through internet is known as_______.

    (a)

    e-filling

    (b)

    e-payment

    (c)

    e-governance

    (d)

    e-shopping

  98. computers are handle data and information as___________ system.

    (a)

    Binary

    (b)

    Decimal

    (c)

    Ocal

    (d)

    Hexa decimal

  99. The ASCII encoding system is applicable only for handling__________ language

    (a)

    English

    (b)

    Hindi

    (c)

    French

    (d)

    Tamil

  100. Identify the correct statement from the following.

    (a)

    An operating system should be easy to work and its environment should be in understandable form

    (b)

    Windows Tamil Environment interface shows all windows elements such as taskbar, desktop elements, names of icons, commands in Tamil

    (c)

    Among the various encoding scheme, Unicode is the suitable to handle Tamil

    (d)

    All the above

*****************************************

Reviews & Comments about 11th Standard Computer Applications Public Exam March 2019 Important Creative One Mark Test

Write your Comment