#### 11th Public Exam March 2019 Important One Marks Questions

11th Standard

Reg.No. :
•
•
•
•
•
•

Computer Science

Time : 01:00:00 Hrs
Total Marks : 100
100 x 1 = 100
1. Expand POST

(a)

Post on self Test

(b)

Power on Software Test

(c)

Power on Self Test

(d)

Power on Self Text

2. Which one of the following is the main memory?

(a)

ROM

(b)

RAM

(c)

Flash drive

(d)

Hard disk

3. Which device is very safe and convenient for security instead of password?

(a)

Scanner

(b)

Fingerprint Scanner

(c)

Trackball

(d)

Retinal Scanner

4. Match the following

 (i) First Generation 1 ICS (ii) Second generation 2 VLSI (iii) Third Generation 3 Parallel Processing (iv) Fourth Generation 4 Vacuum tubes (v) Fifth Generation 5 Parallel computing (vi) Sixth Generation 6 Transistors
(a)

2,3,5,1,4,6

(b)

4,6,1,2,3,5

(c)

6,5,4,1,2,3

(d)

1,3,2,5,6,4

5. Which of the following concerned with the interactions between computers and human language?

(a)

Artificial Neurons

(b)

Neural network

(c)

Artificial intelligence

(d)

Natural language processing

6. The speed of inkjet printers generally range from _________

(a)

1-20 PPM

(b)

1-22 PPM

(c)

10-20 PPM

(d)

11-20 PPM

7. 2$\wedge$50 is referred as

(a)

kilo

(b)

Tera

(c)

Peta

(d)

Zetta

8. Which amongst this is not an Octal number?

(a)

645

(b)

234

(c)

876

(d)

123

9. Which gate is called as the logical inverter?

(a)

AND

(b)

OR

(c)

NOT

(d)

XNOR

10. 4 bits =................

(a)

Bit

(b)

Byte

(c)

Nibble

(d)

Word

11. The decimal equivalent of 0.0112 is.......

(a)

0.6875

(b)

0.1875

(c)

0.1785

(d)

0.5

12. In binary numbers, the signed negative number has a prefix?

(a)

-

(b)

0

(c)

1

(d)

2

13. The base of an octal number system is represented by............

(a)

2

(b)

8

(c)

7

(d)

None

14. The term data comes from the word_____________

(a)

number

(b)

datum

(c)

nibble

(d)

bit

15. Which of the following is not the part of a microprocessor unit?

(a)

ALU

(b)

Control unit

(c)

Cache memory

(d)

register

16. Which is the fastest memory?

(a)

Hard disk

(b)

Main memory

(c)

Cache memory

(d)

Blue-Ray disc

17. What is the capacity of 12cm diameter DVD with single sided and single layer?

(a)

4.7 GB

(b)

5.5 GB

(c)

7.8 GB

(d)

2.2 GB

18. Display devices are connected to the computer through __________

(a)

USB port

(b)

Ps/2 port

(c)

SCSI port

(d)

VGA connector

19. Microprocessor is driven by ..........

(a)

Clock pulses

(b)

ALU

(c)

Control unit

(d)

Register

20. Which of the following regulates the speed of the microprocessor?

(a)

Program counter

(b)

Instructions set

(c)

ALU

(d)

Clock

21. Which of the following bus is used to transfer information between the CPU and the memory?

(a)

System Bus

(b)

Data bus

(c)

Control Bus

(d)

22. Which has controls read or write operations?

(a)

(b)

Data bus

(c)

Control bus

(d)

System bus

23. How many types of Microprocessors are there?

(a)

2

(b)

4

(c)

3

(d)

8

24. How the different memory devices are arranged?

(a)

Capacity

(b)

Speed

(c)

Cost

(d)

All of these

25. Which of the following OS is a Commercially licensed Operating system?

(a)

Windows

(b)

UBUNTU

(c)

FEDORA

(d)

REDHAT

26. Android is a ________

(a)

Mobile Operating system

(b)

Open Source

(c)

(d)

All the above

27. Which operating system is used to access shared data and files any machine around the world?

(a)

Real time

(b)

Multiuser

(c)

Multiprocessor

(d)

Distributed

28. How many functionalities are there in OS?

(a)

4

(b)

5

(c)

3

(d)

2

29. Which one of the following is not a prominent operating system?

(a)

UNIX

(b)

iOS

(c)

GUI

(d)

Android

30. Which of the following in Ubuntu OS is used to view the options for the devices installed?

(a)

Settings

(b)

Files

(c)

Dash

(d)

VBox_GAs_5.2 ..2

31. Identify the default email client in Ubuntu?

(a)

Thunderbird

(b)

Firefox

(c)

Internet Explorer

(d)

Chrome

32. Which is the default browser for Ubuntu?

(a)

Firefox

(b)

Internet Explorer

(c)

Chrome

(d)

Thunderbird

33. In which version of windows the mouse was introduced?

(a)

1

(b)

2

(c)

3

(d)

95

34. What is the name of the bar which appear at the bottom of the screen?

(a)

Scroll bar

(b)

Title bar

(c)

(d)

35. The default name of folder created is _____

(a)

New

(b)

Folder

(c)

Folder new

(d)

New foldrer

36. Which are the symbols seen while collapsing and expanding the folder list in Windows explorer?

(a)

*,?

(b)

@,?

(c)

+,-

(d)

*,-

37. Which of the following linux server distribution is freeware?

(a)

Red Hat

(b)

SUSE

(c)

UBUNTU

(d)

all of these

38. 'My Computer' icon present in windows version.

(a)

XP

(b)

7

(c)

8

(d)

10

39. Stating the input property and the as output relation a problem is known

(a)

specification

(b)

statement

(c)

algorithm

(d)

definition

40. How many statements are there to alter the normal flow of control?

(a)

1

(b)

2

(c)

3

(d)

many

41. How many principles and techniques are there for designing algorithms?

(a)

1

(b)

2

(c)

3

(d)

4

42. An algorithm is composed of the statements

(a)

assignment

(b)

control flow

(c)

(a) and (b)

(d)

arithmetic

43. In the flowchart, the control flow of the algorithm represented by

(a)

rectangular

(b)

diamond shaped boxes

(c)

arrows

(d)

parallelogram boxes

44. How many cases executed atleast by case analysis statement?

(a)

2

(b)

1

(c)

3

(d)

4

45. While decomposing, each step can be further expanded to still finer steps are known as

(a)

compounding

(b)

conditional

(c)

specification

(d)

refinement

46. How many times the loop is iterated?
i:= 0
while i $\neq$5
i := i+ 1

(a)

4

(b)

5

(c)

6

(d)

0

47. If Fibonacci number is defined recursively as$f(n)=\begin{cases} 0n=0 \\ 1n=1 \\ f(n-1)+f(n-2)otherwise \end{cases}$to evaluate F(4), how many times F() is applied?

(a)

3

(b)

4

(c)

8

(d)

9

48. Which statements executed repeatedly as long as the loop condition is true?

(a)

Sequential

(b)

Abstraction

(c)

Iteration

(d)

Assignment

49. Which of the following is more powerful algorithms design technique closely related to iteration?

(a)

Specification

(b)

Abstraction

(c)

Recursion

(d)

Decomposition

50. Who coined C++?

(a)

Rick Mascitti

(b)

Rick Bjarne

(c)

Bill Gates

(d)

Dennis Ritchie

51. Assume a=5, b=6; what will be result of a&b?

(a)

4

(b)

5

(c)

1

(d)

0

52. Which of the following supports both procedural and oop concepts?

(a)

C

(b)

Java

(c)

C++

(d)

Basic

53. Fixed point constant are also called

(a)

Strong constant

(b)

Character constant

(c)

Integer constant

(d)

Floating point constant

54. A Hexadecimal Constant is always

(a)

Negative Number

(b)

Real Number

(c)

Positive Number

(d)

Integer

55. Which is not a logical operator?

(a)

&&

(b)

!!

(c)

!

(d)

&

56. Which of the following feature avoid name collection in C++?

(a)

Data hiding

(b)

Data abstraction

(c)

Object oriented

(d)

namespace

57. The extention of machine readable code of C++ is

(a)

.cpp

(b)

.c

(c)

.exe

(d)

.obj

58. The Boat datatype uses the precision of decimal digits is?

(a)

8

(b)

6

(c)

32

(d)

7

59. What is the alternate name of null statement?

(a)

No statement

(b)

Empty statement

(c)

Void statement

(d)

Zero statement

60. Which of the following is the exit control loop?

(a)

do-while

(b)

for

(c)

while

(d)

if-else

61. Which of the following statement is true?
(i) ; is a null statement
(ii) Empty statement are used as placeholders is loop statements

(a)

only (i)

(b)

only (ii)

(c)

both are true

(d)

both are wrong

62. What is the output of the followings program snippet if a=11?
int a;
switch (a)
{
case 0;
cout << "The number is zero" << break;
default;
cout << "The number is nonzem'' << break;
int b = a% 2;
swith (b)
{
case 0;
cout << "The number is event" << break;
case 1;
cout << "The number is odd" << break;
}
(i) The number is zero
(ii) The number is non zero
(iii) The number is even
(iv) The number is odd

(a)

both (i) and (iv)

(b)

both (ii) and (iii)

(c)

both (ii) and (i)

(d)

both (ii) and (iv)

63. Which of the following is not an Iteration statement in C++?

(a)

for

(b)

switch

(c)

while

(d)

none of these

64. Which of the following loop is an exit-check loop?
(i) for loop (ii) while loop (iii) do-while loop

(a)

only (i)

(b)

only (ii)

(c)

only (iii)

(d)

both (i) and (iii)

65. Which function is used to check whether a character is alphanumeric or not:

(a)

isalphai( )

(b)

isdigit()

(c)

isalnum()

(d)

islowert()

66. Which function begins the program execution?

(a)

isalphat()

(b)

isdigitt()

(c)

maint()

(d)

islower()

67. Which of the following character does not included in length of the string?

(a)

space

(b)

/n

(c)

/o

(d)

\o

68. c++ program execution always begins from

(a)

user-defined function

(b)

built-in function

(c)

maim()

(d)

string function

69. The parameters used in the function call are known as

(a)

actual

(b)

main

(c)

built-in

(d)

formal

70. Which of the following modifier enables to assign an initial value to a variable that cannot be changed later inside the body of the function?

(a)

constant

(b)

const

(c)

void

(d)

struct

71. If no datatype is explicitly mentioned, the return datatype is

(a)

int

(b)

float

(c)

char

(d)

long double

72. A structure declaration is given below:
struct Time
{
int hours;
int minutes;
int seconds;
} t;
Using above declaration which of the following refers to seconds.

(a)

Time.seconds

(b)

Time::seconds

(c)

seconds

(d)

t.seconds

73. What will be the output of this program?
#include< iostream >
using namespace std;
struct ShoeType
{
string name;
double price; .
};
int main ()
{
Shoe Type shoe 1, shoe2;
shoe 1.price = 9.99;
cout < shoe2 = shoe 1;
shoe2.price = shoe2.price / 9;
cout << shoe2.name << "#"< return 0;

(a)

(b)

(c)

(d)

74. If array is not initialized, all the array elements contain

(a)

initial value

(b)

garbage value

(c)

final value

(d)

no value

75. Write the output of the following snippet.
int n[4] = {50, 40, 30, 20};
int m = 3;
cout << n[m = m-1];

(a)

50

(b)

40

(c)

30

(d)

20

76. Which of the following concept encapsulate all the essential of the object that are to be created?

(a)

class

(b)

Encapsulation

(c)

Polymorphism

(d)

Abstraction

77. Which of the following has a set of functions of related type

(a)

procedures

(b)

subroutines

(c)

Modules

(d)

objects

78. Find the odd one out

(a)

Data Abstraction

(b)

Recursion

(c)

Modularity

(d)

Polymorphism

79. Which of the following statement is true or false?
(i) Abstraction reveals-the background details
(ii) An ability of a message to be displayed in more than one form is called polymorphism
(iii) Modularity means the systems is not divided in to set of functional units
(iv) Write once and use it multiple times is achived by class.

(a)

i-false, ii-true, iii-false, iv-true

(b)

i-true, ii-true, iii-false, iv-false

(c)

i-false, ii-false, iii-true, iv-true

(d)

i-true, ii-false, iii-true, iv-false

80. State whether the following statements about the constructor are True or False.
(i) constructors should be declared in the private section
(ii) constructors are invoked automatically when the objects are created.

(a)

True, True

(b)

True, False

(c)

False, True

(d)

False, False

81. If all class members of the class are defined as private, then the class become

(a)

fully freezed

(b)

fully accessable

(c)

partially freezed

(d)

partially accessable

82. An object created after the class declaration called

(a)

Global object

(b)

Local object

(c)

Normal object

(d)

in-line object

83. Classes include the special member functions called

(a)

constructors

(b)

destructors

(c)

inline function

(d)

outline function

(e)

both a and b

84. Which of the following function executes when class comes into scope?

(a)

destructor

(b)

inline

(c)

Normal

(d)

constructor

85. The parameterised constructor test t1(10,20) is an example of

(a)

Explicit call

(b)

Implicit call

(c)

Normal call

(d)

inline call

86. #include< iostream >
using namespace std;
class Point {
private:
int x, y;
public:
point(int x1,int y1)
{
x=x1;y=y1;
}
void operator+(Point&pt3);
void showO {cout << "x=" << x << " ,y=" << y;}
};
void Point::operator+(point &pt3)
{
x + =pt3.x;
y+=pt3.y;
}
int main ()
{
point ptl(3,2),pt2(5,4);
pt1+pt2;
pt1.show ();
return 0;
}
Which ofthe following operator is overloaded?

(a)

+

(b)

operator

(c)

::

(d)

=

87. The process of selecting the most appropriate overloaded function or operator is called

(a)

(b)

function's signature

(c)

function's prototype

(d)

88. Which of the following statement is true or false?
(i) A function's argument list is known as a function signature
(iii) Keyword 'operator' used to define the overloaded operator
(iv) ?:, :: cannot be overloaded

(a)

i-true, ii-false, iii-true, iv-true

(b)

i-false, ii-true, iii-false, iv-false

(c)

i-false, ii-false, iii-jrue, iv-true

(d)

i-true, ii-false, iii-false, iv-true

89. A class is derived from a class which is a derived class itself, then this is referred to as__________

(a)

multiple inheritance

(b)

multilevel inheritance

(c)

single inheritance

(d)

double inheritance

90. Which of the following statement is true or false?
(i) When a derived class inherits from many base classes is known as multilevel inheritance
(ii) When many derived classes are created from single base class called multiple inheritance
(iii) The transitive nature of inheritance is multilevel inheritance
(iv)  is an example of hierarchical inheritance.

(a)

(i) false, (ii) false, (iii) true, (iv) true

(b)

(i) true, (ii) false, (iii) true, (iv) true

(c)

(i) true, (ii) false, (iii) true, (iv) false

(d)

(i) false, (ii) false, (iii) false, (iv) true

91. Grandfather -. father - child relationship is an example of_________.

(a)

Multiple Inheritance

(b)

Hierarchical Inheritance

(c)

Multilevel Inheritance

(d)

Hybrid Inheritance

92. When classes are inherited with all the visibility modes but derived class cannot access the

(a)

private members

(b)

protected members

(c)

public members

(d)

both a and b

93. Which type of inheritance is illustrated by the following code?·
Class student {public: int marks;};
Class topper: public student {public:char grade};
Class overage {public: int marks-needed;};
Class section :public average {public: char name
[10]};
Class overall: public average
{public: int students};

(a)

single

(b)

multilevel and single

(c)

hierarchical

(d)

Hierarchical and single

94. Which one of the following tracks a user visits a website?

(a)

spyware

(b)

(c)

worms

(d)

Trojans

95. Which of the following is a crime which involves computer and network?

(a)

Phishing

(b)

Pharming

(c)

Hacking

(d)

Piracy

(e)

All of these

96. Which of the following statement is false?
(i) Users should not be truthful while using Internet
(ii) Each should respect the privacy of other users.
(iii) Users should strictly obey the cyber lay in computer usage
(iv) Users should share any information with unauthorized people.

(a)

only (iv)

(b)

Both (i) and (iii)

(c)

Both (i) and (iv)

(d)

only (i)

97. Which of the following crime that tricking people into believing something is not true?

(a)

Spam

(b)

Spoofing

(c)

Scam

(d)

Harvesting

98. Which of the following provide searching facilities in Tamil?

(a)

(b)

Bing

(c)

Safari

(d)

both a and b

99. Which ofthe following search engine gives Tamil virtual keyboard?

(a)

Bing

(b)

Yahoo

(c)

Safari

(d)

100. In India, 42% of users mostly used language in india?

(a)

Tamil

(b)

(c)

Malayalam

(d)

Telugu