New ! Computer Science MCQ Practise Tests



11th Public Exam March 2019 Important One Mark Question Paper

11th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Science

Time : 00:45:00 Hrs
Total Marks : 100
    100 x 1 = 100
  1. First generation computers used

    (a)

    Vacuum tubes

    (b)

    Transistors

    (c)

    Integrated circuits

    (d)

    Microprocessors

  2. Which generation of computer used IC's?

    (a)

    First

    (b)

    Second

    (c)

    Third

    (d)

    Fourth

  3. Match the following

    (i) Expert System 1 Second Generation
    (ii) Batch Processing 2 Fourth Generation
    (iii) NLP 3 Six Generation
    (iv) Introduction of Laptop 4 Fifth Generation
    (a)
    i) ii) iii) iv)
    4 1 3 2
    (b)
    i) ii) iii) iv)
    1 3 2 4
    (c)
    i) ii) iii) iv)
    3 4 1 2
    (d)
    i) ii) iii) iv)
    4 3 1 2
  4. The first digital computer name was _______.

    (a)

    EDVAC

    (b)

    UNIVACI

    (c)

    ENIAC

    (d)

    IBM 1620

  5. Which device converts light waves into electrical waves?

    (a)

    Digital Camera

    (b)

    Light pen

    (c)

    Track ball

    (d)

    OCR

  6. The components of CPU _________

    (a)

    control unit

    (b)

    ALU

    (c)

    Memory unit

    (d)

    all the above

  7. How many bytes does 1 KiloByte contain?

    (a)

    1000

    (b)

    8

    (c)

    4

    (d)

    1024

  8. Expansion for ASCII

    (a)

    American School Code for Information Interchange

    (b)

    American Standard Code for Information Interchange

    (c)

    All Standard Code for Information Interchange

    (d)

    American Society Code for Information Interchange

  9. For 11012 the equalent Hexadecimal equivalent is?

    (a)

    F

    (b)

    E

    (c)

    D

    (d)

    B

  10. How the information entered in a computer?

    (a)

    Knowledge

    (b)

    data

    (c)

    ASCII Value

    (d)

    BCD

  11. Data means..............

    (a)

    a set of values

    (b)

    a set of information

    (c)

    a set of records

    (d)

    a set of files

  12. 4 bits =................

    (a)

    Bit

    (b)

    Byte

    (c)

    Nibble

    (d)

    Word

  13. How many parameters can be considered to know the magnitude of the number?

    (a)

    2

    (b)

    4

    (c)

    3

    (d)

    5

  14. The Right most bit on the binary digit carries the smallest weight is called..........

    (a)

    LSB

    (b)

    MSB

    (c)

    RMB

    (d)

    LMB

  15. How many bits constitute a word?

    (a)

    8

    (b)

    16

    (c)

    32

    (d)

    determined by the processor used.

  16. Which of the following is a CISC processor?

    (a)

    Intel P6

    (b)

    AMD K6

    (c)

    Pentium III

    (d)

    Pentium IV

  17. What is the smallest size of data represented in a CD?

    (a)

    blocks

    (b)

    sectors

    (c)

    pits

    (d)

    tracks

  18. Display devices are connected to the computer through

    (a)

    USB port

    (b)

    Ps/2 port

    (c)

    SCSI port

    (d)

    VGA connector

  19. Which of the following is not included in computer organization?

    (a)

    I/O devices

    (b)

    Software

    (c)

    CPU

    (d)

    Main memory

  20. 1 KB = .............Bytes.

    (a)

    1000

    (b)

    1024

    (c)

    512

    (d)

    256

  21. In which memory contents can be erased using UV rays?

    (a)

    PROM

    (b)

    EPROM

    (c)

    ROM

    (d)

    EPROM

  22. Which of the following interface transfers the uncompressed video and audio data to a computer monitor?

    (a)

    DVD 

    (b)

    CD

    (c)

    HDMI

    (d)

    HDD

  23. ____________is a magnetic disk on which you can store data.

    (a)

    compact disc

    (b)

    hard disk

    (c)

    DVD

    (d)

    flasg memory devices

  24. ___________is commonly used to measure wave frequencies.

    (a)

    Hertz

    (b)

    internal memory

    (c)

    RAM

    (d)

    ALU

  25. Operating system is a

    (a)

    Application Software

    (b)

    Hardware

    (c)

    System Software

    (d)

    Component

  26. File Management manages

    (a)

    Files

    (b)

    Folders

    (c)

    Directory systems

    (d)

    All the Above

  27. In which operating system the user can exchange the data which each other in real time?

    (a)

    Distributed

    (b)

    Real time

    (c)

    Time sharing

    (d)

    Multi-user

  28. Which management is the process of managing the operations implementation, maintenance of physical and virtual devices?

    (a)

    File

    (b)

    Process

    (c)

    Memory

    (d)

    Device

  29. Which OS is the most popular Linux based open source software?

    (a)

    Apple iOS

    (b)

    Google Android

    (c)

    Windows

    (d)

    Blackberry

  30. From the options given below, choose the operations managed by the operating system.

    (a)

    Memory

    (b)

    Processes

    (c)

    Disks and I/O devices

    (d)

    all of the above

  31. Identify the default email client in Ubuntu?

    (a)

    Thunderbird

    (b)

    Firefox

    (c)

    Internet Explorer

    (d)

    Chrome

  32. Which is the default application for spreadsheets in Ubuntu? This is available in the software launcher?

    (a)

    Libre Office Writer

    (b)

    Libre Office Calc

    (c)

    Libre Office Impress

    (d)

    Libre Office Spreadsheet

  33. Which of the following window element help to resize the windows?

    (a)

    Comers

    (b)

    Borders

    (c)

    (a) and (b)

    (d)

    Scroll bar

  34. The organized file structure is referred to ______

    (a)

    Multilevel directory system

    (b)

    Hierarchical directory system

    (c)

    Multitasking directory system

    (d)

    (a) or (b)

  35. Which of the following statement is not true?
    (i) The basic working platform of windows is not a desktop.
    (ii) The opening screen of windows is called desktop.
    (iii) The appearance of the desktop cannot be changed.
    (iv) The desktop consists of icons and task bar.

    (a)

    Only (i), (iv)

    (b)

    Only (i) and (iii)

    (c)

    Only (iii)

    (d)

    Only (ii) and (iv)

  36. Which of the statement is true?
    (i) Window is a rectangular area in a dialog box.
    (ii) Window does not includes a title bar.
    (iii) Most of the window's area is not used to display the content.
    (iv) Window cannot be overlaid

    (a)

    Only (iii) and (iv)

    (b)

    Only (i) and (ii)

    (c)

    Only (i) and (iii)

    (d)

    Only (iii) and (iv)

  37. How many parent directory is allowed for a child directory?

    (a)

    2

    (b)

    Only One

    (c)

    More than 2

    (d)

    Less than 6

  38. How many ways to create the new folder?

    (a)

    2

    (b)

    3

    (c)

    1

    (d)

    4

  39. Omitting details inessential to the task and representing only the essential features of the task is known as

    (a)

    specification

    (b)

    abstraction

    (c)

    composition

    (d)

    decomposition

  40. Which of the following is not an algorithm design technique?

    (a)

    Specification

    (b)

    Abstraction

    (c)

    Control flow

    (d)

    Composition

  41. Which serves as a contract between the designer and users of the algorithm?

    (a)

    Abstraction

    (b)

    Specification

    (c)

    Composition

    (d)

    Decomposition

  42. _________statement is used to store a value in a variable.

    (a)

    Assignment

    (b)

    Sequential control flow

    (c)

    Alternative control flow

    (d)

    Iterative

  43. Which of the following describes a test of the statement?

    (a)

    Order

    (b)

    Condition

    (c)

    Statement

    (d)

    Instruction

  44. How many cases executed atleast by case analysis statement?

    (a)

    2

    (b)

    1

    (c)

    3

    (d)

    4

  45. If C1 is false and C2 is true, the compound statement
    1 if CI
    2 SI
    3 else
    4 if C2
    5 S2
    6 else
    7 S3
    executes

    (a)

    S1

    (b)

    S2

    (c)

    S3

    (d)

    none

  46. __________ is a diagrammatic notation for representing algorithms.

    (a)

    Pseudo code

    (b)

    Flowchart

    (c)

    Program

    (d)

    Languages

  47. A loop invariant need not be true

    (a)

    at the start of the loop

    (b)

    at the start of each iteration

    (c)

    at the end of each iteration

    (d)

    at the start of the algorithm

  48. Which of the following is a recursive solver case?

    (a)

    Base case

    (b)

    Recursive case

    (c)

    loop case

    (d)

    Both a and b

  49. In which year E W Dijkstra was awarded ACM Turing Award?

    (a)

    1972

    (b)

    1974

    (c)

    1970

    (d)

    1971

  50. What will be the result of following statement?
    char ch= 'B';
    cout << (int) ch;

    (a)

    B

    (b)

    b

    (c)

    65

    (d)

    66

  51. This can be used as alternate to endl command:

    (a)

    \t

    (b)

    \b

    (c)

    \0

    (d)

    \n

  52. How many ways the numeric constants are classified?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    6

  53. Which operator denotes shift left bitwise?

    (a)

    >>

    (b)

    >>>

    (c)

    <<

    (d)

    <<<

  54. The expansion of IDE is ________.

    (a)

    Important Development Environment

    (b)

    Integrated Development Environment

    (c)

    Integrated Digital Environment

    (d)

    Integrated Digital Extension

  55. Match the following

    (i) >> (1) Assignment operator
    (ii) > (2) logical operator
    (iii) = (3) Arithmetic operator
    (iv) % (4) Bitwise operator
    (iv) &&   (5) Relation operator
    (a)
    i) ii) iii) iv) v)
    1 2 4 5 3
    (b)
    i) ii) iii) iv) v)
    4 5 1 3 2
    (c)
    i) ii) iii) iv) v)
    5 4 1 2 3
    (d)
    i) ii) iii) iv) v)
    5 1 2 3 4
  56. Match the following 

    (i) int, char  (1) derived data type
    (ii) class (2) Built-in data type
    (iii)Pointer  (3) User-defined data type
    (iv) void (4) fundamental data type
    (a)
    i) ii) iii) iv)
    4 3 1 2
    (b)
    i) ii) iii) iv)
    4 3 2 1
    (c)
    i) ii) iii) iv)
    3 4 1 2
    (d)
    i) ii) iii) iv)
    1 2 4 3
  57. The literal meaning for datatype is empty space ________.

    (a)

    int 

    (b)

    empty

    (c)

    bool

    (d)

    void

  58. Which of the following is also called automatic conversion?

    (a)

    Explicit

    (b)

    Type promotion

    (c)

    Type casting

    (d)

    Implicit

  59. The multi way branch statement:

    (a)

    if

    (b)

    if...else

    (c)

    switch

    (d)

    for

  60. A loop that contains another loop inside its body:

    (a)

    Nested loop

    (b)

    Inner loop

    (c)

    Inline loop

    (d)

    Nesting of loop

  61. How many kinds of statement used in C++?

    (a)

    3

    (b)

    2

    (c)

    (d)

    only 1

  62. A group of statements enclosed by { } is called ________.

    (a)

    body statement

    (b)

    iterative statement

    (c)

    compound statement

    (d)

    continue statement

  63. Which of the following is a selection statement?

    (a)

    for

    (b)

    while

    (c)

    do-while

    (d)

    none of these

  64. Which of the following statement used to transfer control from one part to another part without any condition?

    (a)

    if

    (b)

    if-else

    (c)

    goto

    (d)

    if-else-if

  65. Which of the following header file defines the standard I/O predefined functions?

    (a)

    stdio.h

    (b)

    math.h

    (c)

    string.h

    (d)

    ctype.h

  66. Which of the following function is with a return value and without any argument?

    (a)

    x=display(int, int)

    (b)

    x=display()

    (c)

    y=display(float)

    (d)

    display(int)

  67. The body of the function always enclosed with _______.

    (a)

    []

    (b)

    {}

    (c)

    ()

    (d)

    <>

  68. The parameters used in the function definition are known as _______.

    (a)

    actual

    (b)

    formal

    (c)

    main

    (d)

    built-in

  69. Which of the following refers to the accessibility of a variable?

    (a)

    return

    (b)

    inline

    (c)

    void

    (d)

    scope

  70. Which of the following is a scope resolution operator?

    (a)

    ;

    (b)

    ?

    (c)

    ::

  71. Which of the following statement is true or false?
    (i) Strcat ( ) function appends copy of the character string pointed by the source to the memory location pointed by target.
    (ii) strcpy () function appends copy of the character string pointed by the source to the end of the string pointed by the target.
    (iii) strcmp ( ) and strlen ( ) function takes two arguments.
    (iv) strcmp ( ) function compares the contents of strings lexicographically

    (a)

    (i) true, (ii) false, (iii) false, (iv) true

    (b)

    (i) false, (ii) true, (iii) false, (iv) false

    (c)

    (i) false, (ii) false, (iii) false, (iv) true

    (d)

    (i) false, (ii) false, (iii) false, (iv) false

  72. cin >>n[3]; To which element does this statement accepts the value?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    5

  73. When accessing a structure member, the identifier to the left of the dot operator is the name of

    (a)

    structure variable

    (b)

    structure tag

    (c)

    structure member

    (d)

    structure function

  74. Which of the following is exist between the object name and the member name?

    (a)

    dot

    (b)

    colon

    (c)

    comma

    (d)

    semicolon

  75. Which of the following is used to access the pointer type members of the structure?

    (a)

    *

    (b)

    .

    (c)

    \(\rightarrow\)

    (d)

    ;

  76. Insulation of the data from direct access by the program is called as

    (a)

    Data hiding

    (b)

    Encapsulation

    (c)

    Polymorphism

    (d)

    Abstraction

  77. Which of the following is an approach to programming?

    (a)

    Modules

    (b)

    Procedures

    (c)

    Paradigm

    (d)

    behaviour

  78. Which of the following is the most important and powerful way of creating software?

    (a)

    Procedural Programming

    (b)

    Modular Programming

    (c)

    Object Oriented Programming

    (d)

    Encapsulation Programming

  79. Which of the following statement is true
    (i) Object oriented programs are much larger than other programs
    (ii) Object oriented programs require a lot of work to create.
    (iii) Object oriented programs are slower than other programs because of their size

    (a)

    both (i) and (ii)

    (b)

    both (ii) and (iii)

    (c)

    only (iii)

    (d)

    all of these

  80. The member function defined within the class behave like________functions.

    (a)

    inline

    (b)

    Non inline

    (c)

    Outline

    (d)

    Data

  81. When a member function is defined outside a class, it behaves like________.

    (a)

    inline function

    (b)

    non-line function

    (c)

    procedural function

    (d)

    public function

  82. Instantiating object is done using _______.

    (a)

    inline function

    (b)

    outline function

    (c)

    constructor

    (d)

    initialize an object

  83. Member function of a class can access all the members irrespective of their?

    (a)

    data types

    (b)

    constructor definition

    (c)

    access specifiers

    (d)

    operator used

  84. Which of the following statement true or false?
    (i) default constructor created in the absence of user defined constructor
    (ii) default constructor cannot allocates memory for the object.

    (a)

    i-true, ii-false

    (b)

    i-false, ii-true

    (c)

    i-true, ii-true

    (d)

    i-false, ii-false

  85. Which of the following statement is true or false?
    (i) Test (Test &);//parameterized constructor declaration
    (ii) Test:: Test (Test &T) {}; //copy constructor definition
    (iii) Test T1 (10,20);//object created for parameterized constructor
    (iv) Test:: Test( ) {}; //non-parameterisied constructor definition

    (a)

    i-false, ii-true, iii-true, iv-false

    (b)

    i-true, ii-true, iii-false, iv-true

    (c)

    i-false, ii-true, iii-true, iv-true

    (d)

    i-false ii-true, iii-false, iv-true

  86. Which of the following operator is by default overloaded by the compiler?

    (a)

    *

    (b)

    +

    (c)

    +=

    (d)

    ==

  87. Which of the following statement is true or false?
    (i) Polymorphism means many shapes
    (ii) Polymorphism is acheived through overloading
    (iii) Overloading means a name having only one distinct meaning
    (iv) Overload resolution means not selecting appropriate overloaded function

    (a)

    i-true, ii-true, iii-false, iv-false

    (b)

    i-true, ii-false, iii-true, iv-false

    (c)

    i-false, ii-false, iii-true, iv-true

    (d)

    i-false, ii-true, iii-true, iv-false

  88. Which of the following statement is true or false?
    (i) Function overloading reduces the number of comparison in a program
    (ii) Function overloading makes the program execute faster
    (iii) Function overloading helps by reducing the number of function names to be remembered
    (iv) Scope resolution operator cannot be overloaded.

    (a)

    i-false, ii-true, iii-true, iv-false

    (b)

    i-true, ii-true, iii-true, iv-true

    (c)

    i-false, ii-false, iii-true, iv-true

    (d)

    i-true, ii-true, iii-false, iv-true

  89. A class is derived from a class which is a derived class itself, then this is referred to as

    (a)

    multiple inheritance

    (b)

    multilevel inheritance

    (c)

    single inheritance

    (d)

    double inheritance

  90. When a class derived from a class which it self is a derived class is called ________.

    (a)

    Multiple

    (b)

    Multiple

    (c)

    hybrid

    (d)

    None of these

  91. Which of the following class destructor expires first____________
    (i) base class
    (ii) derived class

    (a)

    only (i)

    (b)

    only (ii)

    (c)

    both (i) and (ii)

    (d)

    none of these

  92. The private members of base class can be accessed indirectly by the derived class by using base class public or protected________.

    (a)

    data members

    (b)

    access specifiers

    (c)

    member functions

    (d)

    visibility mode

  93. Overriding of the members are resolved by using_________.

    (a)

    .

    (b)

    ;

    (c)

    : :

    (d)

    this

  94. Which of the following deals with procedures, practices and values?

    (a)

    piracy

    (b)

    programs

    (c)

    virus

    (d)

    computer ethics

  95. Which of the following crime that tricking people into believing something is not true?

    (a)

    Spam

    (b)

    Spoofing

    (c)

    Scam

    (d)

    Harvesting

  96. Which of the following statement is false?
    (i) Duplicating and selling copyrighted programs is called software piracy
    (ii) Downloading software illegally through network is called software piracy.
    (iii) Unauthorized copying of software is called software piracy

    (a)

    only (i)

    (b)

    only (ii)

    (c)

    only (iii)

    (d)

    both (i) and (iii)

  97. "Phishing without a trop" called _________.

    (a)

    Hacking

    (b)

    Cracking

    (c)

    Pharming

    (d)

    Warehouse

  98. In India, Which is the most widely language in Internet?

    (a)

    Tamil

    (b)

    Hindi

    (c)

    Kannada

    (d)

    Malayalam

  99. Which of the following provide searching facilities in Tamil?

    (a)

    Google

    (b)

    Bing

    (c)

    Safari

    (d)

    both a and b

  100. Which country provides all their services through the official website in Tamil?

    (a)

    Srilanka

    (b)

    America

    (c)

    Singapore

    (d)

    Malaysia

*****************************************

Reviews & Comments about 11th Standard Computer Science Public Exam March 2019 Important One Mark Question Paper

Write your Comment