#### 11th Public Exam March 2019 Important One Mark Question Paper

11th Standard

Reg.No. :
•
•
•
•
•
•

Computer Science

Time : 00:45:00 Hrs
Total Marks : 100
100 x 1 = 100
1. A first generation computers used ______.

(a)

Vacuum tubes

(b)

Transistors

(c)

Integrated circuits

(d)

Microprocessors

2. Which generation of computer used IC's

(a)

First

(b)

Second

(c)

Third

(d)

Fourth

3. Match the following

 (i) Expert System 1 Second Generation (ii) Batch Processing 2 Fourth Generation (iii) NLP 3 Six Generation (iv) Introduction of Laptop 4 Fifth Generation
(a)

4,1,3,2

(b)

1,3,2,4

(c)

3,4,1,2

(d)

4,3,1,2

4. The first digital computer name was

(a)

EDVAC

(b)

UNIVACI

(c)

ENIAC

(d)

IBM 1620

5. Which device converts light waves into electrical waves?

(a)

Digital Camera

(b)

Light pen

(c)

Track ball

(d)

OCR

6. The components of CPU _________

(a)

control unit

(b)

ALU

(c)

Memory unit

(d)

all the above

7. How many bytes does 1 KiloByte contain?

(a)

1000

(b)

8

(c)

4

(d)

1024

8. Expansion for ASCII

(a)

American School Code for Information Interchange

(b)

American Standard Code for Information Interchange

(c)

All Standard Code for Information Interchange

(d)

American Society Code for Information Interchange

9. For 11012 what is the Hexadecimal equivalent?

(a)

F

(b)

E

(c)

D

(d)

B

10. How the information entered in a computer?

(a)

Knowledge

(b)

data

(c)

ASCII Value

(d)

BCD

11. Data means..............

(a)

a set of values

(b)

a set of information

(c)

a set of records

(d)

a set of files

12. 4 bits =................

(a)

Bit

(b)

Byte

(c)

Nibble

(d)

Word

13. How many parameters can be considered to know the magnitude of the number?

(a)

2

(b)

4

(c)

3

(d)

5

14. The Right most bit on the binary digit carries the smallest weight is called..........

(a)

LSB

(b)

MSB

(c)

RMB

(d)

LMB

15. How many bits constitute a word?

(a)

8

(b)

16

(c)

32

(d)

determined by the processor used.

16. Which of the following is a CISC processor?

(a)

Intel P6

(b)

AMD K6

(c)

Pentium III

(d)

Pentium IV

17. What is the smallest size of data represented in a CD?

(a)

blocks

(b)

sectors

(c)

pits

(d)

tracks

18. Display devices are connected to the computer through __________

(a)

USB port

(b)

Ps/2 port

(c)

SCSI port

(d)

VGA connector

19. Which ofthe following is not included in computer organization?

(a)

I/O devices

(b)

Software

(c)

CPU

(d)

Main memory

20. 1 KB = .............Bytes.

(a)

1000

(b)

1024

(c)

512

(d)

256

21. In which memory contents can be erased using UV rays?

(a)

PROM

(b)

EPROM

(c)

ROM

(d)

EPROM

22. Which of the following interface transfers the uncompressed video and audio data to a computer monitor?

(a)

DVD

(b)

CD

(c)

HDMI

(d)

HDD

23. ____________is a magnetic disk on which you can store data.

(a)

compact disc

(b)

hard disk

(c)

DVD

(d)

flasg memory devices

24. ___________is commonly used to measure wave frequencies.

(a)

Hertz

(b)

internal memory

(c)

RAM

(d)

ALU

25. Operating system is a_____.

(a)

Application Software

(b)

Hardware

(c)

System Software

(d)

Component

26. File Management manages_______

(a)

Files

(b)

Folders

(c)

Directory systems

(d)

All the Above

27. In which operating system the user can exchange the data which each other in real time?

(a)

Distributed

(b)

Real time

(c)

Time sharing

(d)

Multi-user

28. Which management is the process of managing the operations implementation, maintenance of physical and virtual devices?

(a)

File

(b)

Process

(c)

Memory

(d)

Device

29. Which OS is the most popular Linux based open source software

(a)

Apple iOS

(b)

(c)

Windows

(d)

Blackberry

30. From the options given below, choose the operations managed by the operating system.

(a)

Memory

(b)

Processes

(c)

Disks and I/O devices

(d)

all of the above

31. Identify the default email client in Ubuntu?

(a)

Thunderbird

(b)

Firefox

(c)

Internet Explorer

(d)

Chrome

32. Which is the default application for spreadsheets in Ubuntu? This is available in the software launcher?

(a)

Libre Office Writer

(b)

Libre Office Calc

(c)

Libre Office Impress

(d)

33. Which of the following window element help to resize the windows?

(a)

Comers

(b)

Borders

(c)

(a) and (b)

(d)

Scroll bar

34. The organized file structure is referred to ______

(a)

Multilevel directory system

(b)

Hierarchical directory system

(c)

(d)

(a) or (b)

35. Which of the following statement is not true?
(i) The basic working platform of windows is not a desktop.
(ii) The opening screen of windows is called desktop.
(iii) The appearance of the desktop cannot be changed.
(iv) The desktop consists of icons and task bar.

(a)

Only (i), (iv)

(b)

Only (i) and (iii)

(c)

Only (iii)

(d)

Only (ii) and (iv)

36. Which of the statement is true?
(i) Window is a rectangular area in a dialog box.
(ii) Window does not includes a title bar.
(iii) Most of the window's area is not used to display the content.
(iv) Window cannot be overlaid

(a)

Only (iii) and (iv)

(b)

Only (i) and (ii)

(c)

Only (i) and (iii)

(d)

Only (iii) and (iv)

37. How many parent directory is allowed for a child directory?

(a)

2

(b)

Only One

(c)

More than 2

(d)

Less than 6

38. How many ways to create the new folder?

(a)

2

(b)

3

(c)

1

(d)

4

39. Omitting details inessential to the task and representing only the essential features of the task is known as

(a)

specification

(b)

abstraction

(c)

composition

(d)

decomposition

40. Which of the following is not an algorithm design technique?

(a)

Specification

(b)

Abstraction

(c)

Control flow

(d)

Composition

41. Which serves as a contract between the designer and users of the algorithm?

(a)

Abstraction

(b)

Specification

(c)

Composition

(d)

Decomposition

42. __________________statement is used to store a value in a variable.

(a)

Assignment

(b)

Sequential control flow

(c)

Alternative control flow

(d)

Iterative

43. Which of the following describes a test of the statement?

(a)

Order

(b)

Condition

(c)

Statement

(d)

Instruction

44. How many cases executed atleast by case analysis statement?

(a)

2

(b)

1

(c)

3

(d)

4

45. If C1 is false and C2 is true, the compound statement
1 if CI
2 SI
3 else
4 if C2
5 S2
6 else
7 S3
executes

(a)

S1

(b)

S2

(c)

S3

(d)

none

46. __________ is a diagrammatic notation for representing algorithms.

(a)

Pseudo code

(b)

Flowchart

(c)

Program

(d)

Languages

47. A loop invariant need not be true

(a)

at the start of the loop

(b)

at the start of each iteration

(c)

at the end of each iteration

(d)

at the start of the algorithm

48. Which of the following is a recursive solver case

(a)

Base case

(b)

Recursive case

(c)

loop case

(d)

Both a and b

49. In which year E W Dijkstra was awarded ACM Turing Award?

(a)

1972

(b)

1974

(c)

1970

(d)

1971

50. What will be the result of following statement? char ch= 'B';cout << (int) ch;

(a)

B

(b)

b

(c)

65

(d)

66

51. This can be used as alternate to endl command:

(a)

\t

(b)

\b

(c)

\0

(d)

\n

52. How many ways the numeric constants are classified?

(a)

2

(b)

3

(c)

4

(d)

6

53. Which operator denotes shift left bitwise?

(a)

>>

(b)

>>>

(c)

<<

(d)

<<<

54. The expansion of IDE is

(a)

Important Development Environment

(b)

Integrated Development Environment

(c)

Integrated Digital Environment

(d)

Integrated Digital Extension

55. Match the following
(i) >>      - (1) Assignment operator
(ii) >       - (2) logical operator
(iii) =      - (3) Arithmetic operator
(iv) %     - (4) Bitwise operator'
(iv)&&    -  (5) Relation operator

(a)

1,2,4,5,3

(b)

4,5,1,3,2

(c)

5,4,1,2,3

(d)

5,1,2,3,4

56. Match the following

 (i) int, char - (1) derived data type (ii) class - (2) Built-in data type (iii)Pointer - (3) User defined data type (iv) void - (4) fundamental data type

(a)

4,3,1,2

(b)

4,3,2,1

(c)

3,4,1,2

(d)

1,2,4,3

57. The literal meaning for datatype is empty space

(a)

int

(b)

empty

(c)

bool

(d)

void

58. Which of the following is also called automatic conversion?

(a)

Explicit

(b)

Type promotion

(c)

Type casting

(d)

Implicit

59. The multi-way branching statement:

(a)

if

(b)

if...else

(c)

switch

(d)

for

60. A loop that contains another loop inside its body:

(a)

Nested loop

(b)

Inner loop

(c)

Inline loop

(d)

Nesting of loop

61. How many kinds of statement used in C++?

(a)

3

(b)

2

(c)

(d)

only 1

62. A group of statements enclosed by { } is called

(a)

body statement

(b)

iterative statement

(c)

compound statement

(d)

continue statement

63. Which ofthe following is a selection statement?

(a)

for

(b)

while

(c)

do-while

(d)

none of these

64. Which of the following statement used to transfer control from one part to another part without any condition?

(a)

if

(b)

if-else

(c)

goto

(d)

if-else-if

65. Which of the following header file defines the standard I/0 predefined functions?

(a)

stdio.h

(b)

nnath.h

(c)

string.h

(d)

ctype.h

66. Which of the following function is with a return value and without any argument?

(a)

x=display(int, int)

(b)

x=display()

(c)

y=display(float)

(d)

display(int)

67. The body of the function always enclosed with

(a)

[]

(b)

{}

(c)

()

(d)

<>

68. The parameters" used in the function definition are known as

(a)

actual

(b)

formal

(c)

main

(d)

built-in

69. Which of the following refers to the accessibility of a variable?

(a)

return

(b)

inline

(c)

void

(d)

scope

70. Which of the following is a scope resolution operator?

(a)

;

(b)

?:

(c)

::

71. Which of the following statement is true or false?
(i) Strcat ( ) function appends copy of the character string pointed by the source to the memory location pointed by target.
(ii) strcpy () function appends copy of the character string pointed by the source to the end of the string pointed by the target.
(iii) strcmp ( ) and strlen ( ) function takes two arguments.
(iv) strcmp ( ) function compares the contents of strings lexicographically

(a)

(i) true, (ii) false, (iii) false, (iv) true

(b)

(i) false, (ii) true, (iii) false, (iv) false

(c)

(i) false, (ii) false, (iii) false, (iv) true

(d)

(i) false, (ii) false, (iii) false, (iv) false

72. cin >>n[3]; To which element does this statement accepts the value?

(a)

2

(b)

3

(c)

4

(d)

5

73. When accessing a structure member, the identifier to the left of the dot operator is the name of

(a)

structure variable

(b)

structure tag

(c)

structure member

(d)

structure function

74. Which of the following is exist between the object name and the member name?

(a)

dot

(b)

colon

(c)

comma

(d)

semicolon

75. Which of the following is used to access the pointer type members of the structure?

(a)

*

(b)

.

(c)

$\rightarrow$

76. Insulation of the data from direct access by the program is called as

(a)

Data hiding

(b)

Encapsulation

(c)

Polymorphism

(d)

Abstraction

77. Which of the following is an approach to programming?

(a)

Modules

(b)

Procedures

(c)

(d)

behaviour

78. Which of the following is the most important and powerful way of creating software?

(a)

Procedural Programming.

(b)

Modular Programming

(c)

Object Oriented Programming

(d)

Encapsulation Programming

79. Which of the following statement is true
(i) Object oriented programs are much larger than other programs
(ii) Object oriented programs require a lot of work to create.
(iii) Object oriented programs are slower than other programs because of their size

(a)

both (i) and (ii)

(b)

both (ii) and (iii)

(c)

only (iii)

(d)

all of these

80. The member function defined within the class behave like.

(a)

inline functions

(b)

Non inline function

(c)

Outline function

(d)

Data function

81. When a member function is defined outside a class, it behaves like

(a)

inline function

(b)

non-line function

(c)

procedural function

(d)

public function

82. Instantiating object is done using

(a)

inline function

(b)

outline function

(c)

constructor

(d)

initialize an object

83. Member function of a class can access all the' members irrespective of their?

(a)

data types

(b)

constructor definition

(c)

access specifiers

(d)

operator used

84. Which of the following statement true or false?
(i) default constructor created in the absence of user defined constructor
(ii) default constructor cannot allocates memory for the object.

(a)

i-true, ii-false

(b)

i-false, ii-true

(c)

i-true, ii-true

(d)

i-false, ii-false

85. Which of the following statement is true or false?
(i) Test (Test &);//parameterized constructor declaration
(ii) Test:: Test (Test &T) {}; //copy constructor definition
(iii) Test T1 (10,20);//object created for parameterized constructor
(iv) Test:: Test( ) {}; //non-parameterisied constructor definition

(a)

i-false, ii-true, iii-true, iv-false

(b)

i-true, ii-true, iii-false, iv-true

(c)

i-false, ii-true, iii-true, iv-true

(d)

i-false ii-true, iii-false, iv-true

86. Which of the following operator is by default overloaded by the compiler?

(a)

*

(b)

+

(c)

+=

(d)

==

87. Which of the following statement is true or false?
(i) Polymorphism means many shapes

(a)

i-true, ii-true, iii-false, iv-false

(b)

i-true, ii-false, iii-true, iv-false

(c)

i-false, ii-false, iii-true, iv-true

(d)

i-false, ii-true, iii-true, iv-false

88. Which of the following statement is true or false?
(iii) Function overloading helps by reducing the number of function names to be remembered
(iv) Scope resolution operator cannot be overloaded.

(a)

i-false, ii-true, iii-true, iv-false

(b)

i-true, ii-true, iii-true, iv-true

(c)

i-false, ii-false, iii-true, iv-true

(d)

i-true, ii-true, iii-false, iv-true

89. A class is derived from a class which is a derived class itself, then this is referred to as__________

(a)

multiple inheritance

(b)

multilevel inheritance

(c)

single inheritance

(d)

double inheritance

90. When a class derived from a class which it self is a derived class is called

(a)

Multiple

(b)

Multiple

(c)

hybrid

(d)

None of these

91. Which of the following class destructor expires first____________
(i) base class
(ii) derived class

(a)

only (i)

(b)

only (ii)

(c)

both (i) and (ii)

(d)

none of these

92. The private members of base class can be accessed indirectly by the derived class by using base class public or protected.

(a)

data members

(b)

access specifiers

(c)

member functions

(d)

visibility mode

93. Overriding of the members are resolved by using_________.

(a)

.

(b)

;

(c)

: :

(d)

this

94. Which of the following deals with procedures, practices and values?

(a)

piracy

(b)

programs

(c)

virus

(d)

computer ethics

95. Which of the following crime that tricking people into believing something is not true?

(a)

Spam

(b)

Spoofing

(c)

Scam

(d)

Harvesting

96. Which of the following statement is false?
(i) Duplicating and selling copyrighted programs is called software piracy
(iii) Unauthorized copying of software is called software piracy

(a)

only (i)

(b)

only (ii)

(c)

only (iii)

(d)

both (i) and (iii)

97. "Phishing without a trop" called

(a)

Hacking

(b)

Cracking

(c)

Pharming

(d)

Warehouse

98. In India, Which is the most widely language in Internet?

(a)

Tamil

(b)

Hindi

(c)

(d)

Malayalam

99. Which of the following provide searching facilities in Tamil?

(a)

(b)

Bing

(c)

Safari

(d)

both a and b

100. Which country provides all their services through the official website in Tamil?

(a)

Srilanka

(b)

America

(c)

Singapore

(d)

Malaysia