-->

MCQ collections

 Database:-

 

------------------------------------------------------------------

 

Q1)Which is a database software?

a)       Oracle

b)      Access

c)       Db2

d)      A,b and c

Q2) in database , we can auto increase the value for primary key

a)       True

b)      False

Q3) we can use MYSQL in GUI as well as CUI interface.

a)       True

b)      False

Q4) In 1N, there should be an atomic value for all fields.

a)       True

b)      False

Q5) In network database model,

a)       All relations are supported.

b)      Only one to one is supported.

c)       It does not support any relationship

d)      None

Q6) To insert a record we use

a)       Insert command

b)      Insert into command

c)       Insert into() values() command

d)      None

Q7) we can use delete and drop both for same purpose.

a)       True

b)      False

Q8) XAMPP provides us

a)       A local development environment

b)      Helps us to code in database

c)       Helps us to code in php

d)      a, b and c

Q9)To add a new field, we use

a)       add command

b)      modify command with add column

c)       alter table

d)      none

q10) For given table t1(field1, field2, field3), if we perform query

select * from t1; it will

a)       fetch all records

b)      fetch all fields with all records

c)       fetch all fields with all records with given condition

d)      a,b and c

q11) To link a table with another table, we need a foreign key.

a)       True

b)      False

Q12) In a database, if there is transitive dependency, it is said to be in

a)       1N

b)      2N

c)       3N

d)      A,b and c

Q13) DBA stands for

a)       Data Base Administrator

b)      Data Base All controller

c)       Data Base available

d)      None

additional questions:-

 

1.   This key that uniquely identifies each record is called: 8.

a.   Primary Key         

b. Key Record             

c. Unique Key            

d. Field Name

 

2.   Data dictionary is a repository that manages

a.       Memory            

b. Metadata         

c. Spell Checker                  

d. Data Validator

 

3.   Which of the following is generally used for performing tasks like creating the structure of the relations, deleting relation?

a. DML(Data Manipulation Language)                                  

b. Query                     

c. Relational Schema                                                            

d. DDL(Data Definition Language)

 

4.   A Database Management System is a type of software.

a. It is a type of system software                           

b. It is a kind of application software

c. It is a kind of general software                              

d. Both A and C

 

5.   Which of the following refers to the level of data abstraction that describes exactly how the data stored?

a. Conceptual Level     

b. Physical Level         

  c. File Level                     

d. Logical Level

 

6.   In general, a file is basically a collection of all related

a. Rows & Columns                

b. Fields                         

c. Database                    

d. Records

 

7.   The term "Data" refers to:

a. The electronic representation of the information (or data)

b. Basic information

c. Raw Facts and figures

d. Both A and C

 

8.   The term "SQL" stands for

a. Standard query language

b. Sequential query language

c. Structured query language

d. Server-side query language

 

9.   An…………… is a set of entities of the same type that share the same properties, or attributes.

a. Entity set                        

   b. Attribute set              

c. Relation set               

d. Entity model

 

10. Which of the following gives a logical structure of the database graphically?

a. Database diagram             

b. Entity diagram                   

c. Architectural representation                      

d. Entity-Relationship diagram

 

11. The entity relationship set is represented in E-R diagram as

a. Undivided rectangles       

  b. Dashed lines         

  c. Diamond           

d. Double diamonds

 

12. In the…….. normal form, a composite attribute is converted to individual attributes.

a. First                               

b. Second                       

c. Third                 

 d. Fourth

 

13. A table on the many side of a one to many or many to many relationship must:

a. Be in Second Normal Form (2NF)

b. Be in Third Normal Form (3NF)

c. Have a single attribute key

d. Have a composite key

 

14. Tables in second normal form (2NF):

a. Eliminate all hidden dependencies

b. Eliminate the possibility anomalies of a insertion

c. Have a composite key

d. Have all non key fields depend on the whole primary key

 

15. Which-one of the following statements about normal forms is FALSE?

a. BCNF is stricter than 3 NF

b. Lossless, dependency-preserving decomposition into 3 NF is always possible

c. Loss less, dependency preserving decomposition into BCNF is always possible

d. Any relation with two attributes is BCNF

 

16. Functional Dependencies are the types constraints that are based on

a. Key              

  b. Key revisited             

c. Superset key            

d. None of the mentioned

 

17. Which is a bottom-up approach to database design that design by examining the relationship between attributes:

a. Functional dependency

b. Database modeling

c. Normalization

d. Decomposition

 

18. Which forms simplifies and ensures that there are minimal data aggregates and repetitive groups:

a. 1NF                         

b. 2NF                        

C 3NF                         

d. All of the mentioned                      

19. Which forms are based on the concept of functional dependency:

a. 1NF                        

b. 2NF                         

C. 3NF                       

c. 4NF

 

20. A distributed database is a collection of data which belong ………… to the same system but are spread over the …….. of the network

a. Logically, sites      

b. Physically, sites                           

  c. Database, DBMS                

d. None of the above

 

21. In a distributed Database reduction of redundancy is obtained by……………….

a. Data fragmentation             

b. Data Replication                

c. Data Sharing         

 d. None of the above

 

22. Which of the following is/are the main goals of a distributed database?

a. Interconnection of database

b. Incremental growth

c. Reduced communication overhead

d. All of the above

 

23 The server process that implements lock manager functionality, is called

a. Server Processes

b. Database Writer Process

c. Manager processes

d. Lock Manager Proceses

 

24. Storing a separate copy of the database at multiple locations is which of the following?

a. Data Replication

b. Horizontal Partitioning

c. Vertical Partitioning

d. Vertical Partitioning

 

25. Which of the following is a group of one or many attributes that uniquely identifies a row?

a. Key                         

b. Determinant                       

c. Tuple                      

d. Relation

 

 

SAQ

  1. What are data, information, database and database management system?
  2. Define data. Differentiate between data and information.
  3. Define database management system. Explain field, record, objects, and keys with examples.
  4. What is database? What are the objectives of database? Explain.
  5. Define data and information. What are the advantages and disadvantages of database. Explain
  6. Define primary key, candidate key and alternate key. What are the importance of primary key with suitable example.
  7. Explain DCL and DQL with suitable examples.
  8. Differentiate between centralized and distributed database.
  9. What is RDBMS? Explain relational model of a database.
  10. What is data normalization? What are the most important and widely used form of data normalization?
  11. What is data security? Why it is important in DBMS? Explain.
  12. Who is DBA? Define roles and responsibilities of good DBA.
  13. What is key? Explain different types of Key used in DBMS.
  14. What is primary key? What are the features of good primary key?
  15. Write short note on:

a.    DDL

b.    DML

c.     Primary key

d.    Foreign Key

e.    DCL

f.      DQL

g.    Data security

h.    DBA

i.      Data integrity

j.      Data security

k.     2NF

l.      Hierarchical model

m.   Key

n.    Data abstraction

o.    Relationship

p.    Data dictionary

q.    E-R diagram

 

LAQ:

  1. What is data security? What are different data security methods? Explain.
  2. Why normalization is needed? Explain different normalization techniques with suitable examples.
  3. What are the advantages and disadvantages of database? Explain briefly.
  4. Explain centralized and distributed databases with a neat diagram. Discuss its merits and demerits.
  5. Explain different database models with suitable diagram. Also define its advantages and disadvantages.
  6. What is data integrity? Explain types of integrity with suitable examples.
  7.  Write a SQL statement of the following

a.    Create database name as std.

b.    Create a table named student including columns student_id, roll_num, first_name, last_name, and email.

c.     Insert three data into the table student.

d.    Add another column phone_number.

e.    Delete one data from the table.

 

Networking:-

MCQ

1.       Computer networking helps us to

a.       Share data

b.       Share files

c.       Share hardwares

d.       All of the above

2.       Networking can be centralized as well as distributed.

a.       True

b.       False

3.       There are … types of communication modes.

a.       2

b.       3

c.       4

d.       1

4.       In simplex, we can send data only.

a.       True

b.       False

5.       In half duplex, we can send and receive data.

a.       True

b.       False

6.       In half duplex, we can communicate in both way and at same time.

a.       True

b.       False

7.       What is the use of bridge in network?

a.       To connect LANs

b.       To separate LANs

c.       To control network speed

d.       A,b and c

8.       Which is the least congestion having network?

a.       LAN

b.       MAN

c.       WAN

d.       A, b and c

9.       What is Mbps?

a.       Mega Bits Per Second

b.       Mega Bytes Per Second

c.       Mega Bands Per Second

d.       a and b

10.      What is the first octet value of class A?

a.       0-126

b.       128-191

c.       224-239

d.       192-223

11.   Which is the most common LAN protocol?

a.       UDP

b.       Ethernet

c.       HTTP

d.       SMTP

12.   Which of the following is not a bounded media?

a.       Fiber optical

b.       Radio wave

c.       satellite

d.       b ,c

13.   which protocol is more vulnerable to attacks?

a.       HTTPS

b.       HTTP

c.       UDP

d.       FTP

14.   Which topology is more reliable and secured?

a.       mesh

b.       star

c.       bus

d.       ring

15.   A distributed network configuration in which all data passes through central computer is…

a.       Star

b.       Bus

c.       Point-to-point

d.       Ring

16.   Which of the following is unidirectional?

a.       Simplex

b.       Half duplex

c.       Full duplex

d.       None

17.   Which is not a transmission media?

a. Modem

b. Telephone

c. Coaxial Cable

d. Twisted Pair

18.   An example full duplex of data communication is …

e.       Television

f.        FM

g.       Radio

h.       Internet

19.   Of the following which cannot be changed?

a.       MAC

b.        IP

c.        Subnet mask

d.       DNS

20.   which of the following protocol is / are defined in transport layer?

a.       ftd,

b.       tcp,

c.       udp,

d.       b and c

21.   The function of application layer is…

a.       Flow control

b.       Error control

c.       File transfer

d.       Access control

22.   Which layer is responsible for transmitting raw bits from one node to another.

a.       Data link layer

b.       Physical layer

c.       Transport layer

d.       Presentation layer

23.   … are based on OSI reference model.

a.       Communications

b.       Data

c.       Networking standard

d.       All of the above

24.   The upper layer activities are performed by …

a.       Software

b.       Hardware

c.       RAM

d.       Register

25.   ISO first introduced reference model for data communication in …

a.       1970 AD

b.       !980 AD

c.       1985 AD

d.       1975 AD

----------------------------------------------------------------------------------------------------

JS:-


Q1) JS is a

a.       Server side scripting language

b.       Client side scripting language

c.       A and b

d.       None

Q2)We use … tag to embed JS code.

a.       <style>…</style>

b.       <script>…</script>

c.       <vbscript>…</vbscript>

d.       All of the above

Q3) We must put JS code inside head tag.

a.       True

b.       False

Q4) JS is

a.       Procedure oriented language

b.       Object oriednted language

c.       Object based language

d.       A,b and c

Q5)JS is a

a.       Compiler based language

b.       Interpreted language

c.       Assembler based language

d.       None of the above

Q6) JS file ,if used as an external source, uses extension

a.       .html

b.       .css

c.       .js

d.       All of the above

Q7)We can put JS code anywhere.

a.       True

b.       False

Q8)Which is used as comment in JS?

a.       //

b.       #

c.       /*…*/

d.       a,c

Q9) The JS statement must end with semicolon.

a.       True

b.       False

Q10) We use … to declare variable.

a.       Var

b.       Let

c.       Const

d.       A,b and c

Q11) Declaring variable in Js is mandatory.

a.       True

b.       False

Q12) which are/is the methods?

a.       Console.log()

b.       alert()

c.       window.alert()

d.       a,b and c

Q13)what would be the output of following code?

                var a=90;

                var a;

                console.log(a);

a.       undefined

b.       90

c.       0

d.       None of the above

Q14)If we use var a in our JS, it will store

a.       Numbers

b.       Strings

c.       Boolean value

d.       All of the above

Q15)There are … types of data types.

a.       Two

b.       Three

c.       Four

d.       None

Q16)In JS, undefined and null are same.

a.       True

b.       False

Q17) In JS, we get undefined output for a variable if

a.       It is not assigned any value but printed in document

b.       It is assigned but not used

c.       If it is assigned null value

d.       If it has zero value

Q18)If we use following code ,

                var naam=”Raman”;

                var ad=”from ktm”;

                var mer=naam+ad;

                console.log(mer);

                It will print

a.       Raman

b.       From ktm

c.       Raman from ktm

d.       Uncaught error

Q19) duplication declaration of variable triggers an error.

a.       True

b.       False

Q20)If we use following code in JS program

                Var a;

                Const a=7;

                          a=45;

                Console.log(a);

                It will print

a.       7

b.       45

c.       Throw an error

d.       None

Q21) which is a valid variable declaration in JS?

a       var a;
b.       var a1
c.       var $a1;
d.       a,b and c

Q22) In JS , we can use reserved word in any case.


a. True
b. False

Q23) In Js,in document.write(), we can use HTML tags with arguments inside the parentheses.


a. True
b. False

Q24) The output of code

                A=90;

                a=10;

                document.write(A/a) is


a.       10
b.       9
c.       0.9
d.       None

Q25) The % operator returns

a.       Remainder
b.       Quotient
c.       Power
d.       None

Q26) == is called

a.      Assignment operator
b     Equals to operator
c.       Identical operator
d.       None

Q27)concat() is ...
a) integer method
b)string method
c)image method
d)none of the above

q28) ... is an identifier whose value changes during program execution.
a)constant
b)variable
c)function
d)none of the above

q29) ... returns today's date.
a)date()
b)data() method
c)image() method
d) d() method

Q30)... extracts a section of a string and returns a new string.

a)set() method
b)slice() method
c)split() method
d) st() method

Q31) ... defines flow of control within the program.

a)hardware
b)control structure
c)hyper program
d)super program

Q32)The client side scripts are visible to user.
a)True
b)False

Q33) Which is an object of data representation in JS?

a) var a=90;
b) var s={name:"Ram",age:23,address:"kathmandu"};
c) var bool=true;
d) var a=78.87;

Q34) The operator which gives type of data being used...

a) string operator
b) arithmetic operator
c)logical operator
d) typeof operator

Q35) which is not an event?

a)onmove
b)onclick
c)onmouseout
d)onmouserun

PHP:-

q1) PHP stands for

a) Preprocessor Home Page
b)Preprocessor House Page
c)Hypertext Preprocessor
d)Push the Home Page

Q2) PHP is a

a)client side script language
b)server side script language
c) string language
d) numeric language

Q3)PHP syntax is
a)<?php   ?>
b) <php>    ... </php>
c) <php   ...?>
d) <?php> ....?>
Q4) invalid variable is
a) $a
b) $_a
c) $1a
d) a$
Q4) Which is a data type in PHP?

a) integer
b) float
c) string
d) all of the above

Q5) The construct/function used to display output in PHP is
a) echo
b) echo()
c) console.log()
d) a and b

Q6) The operator that works on three operand is...
a) arithmetic
b)relational
c)logical
d) ternary
Q7) The unset() function is used to
a)unset a value for a variable
b)destroys the variable
c) a and b
d) none
Q8) 

 

C:-

Functions:

Q1) Function is an object with self-contained codes.

a)       True

b)      False

Q2) Function can be user defined and library.

a)       true

b)      false

Q3) To use library function, we must use its related header files.

a)       True

b)      False

Q4) void factorial() is a … function

a)       Library

b)      User defined

c)       A and b

d)      None of the above

Q5) User defined functions must return some value.

a)       True

b)      False

Q6) In C language, user defined functions can be nested.

a)       True

b)      False

Q7) In C, we may use either top-down or bottom-up approach for user defined functions.

a)       True

b)      False

Q8) The function

int fibo()

{

Statements;

}

Is called

a)       Function declaration

b)      Function definition

c)       Function end

d)      None of the above

Q9) Which is the correct declaration of function?

a)       void sum();

b)      void sum(int,int);

c)       int sum(int);

d)      all of the above

Q10) If we write sum(a,b), its type taken by compiler itself, is

a)       int

b)      float

c)       char

d)      none of the above

Q11) For a function,

                int series()

{

                int a,I,s=0;

}

a,I and s are called

a)       local variables

b)      global variables

c)       register variables

d)      none of the above

Q12) For a function,

                Char name[100];

int series()

{

                int a,I,s=0;

}

‘name’ is

a)       local variables

b)      global variables

c)       register variables

d)      none of the above

Q13) If we write void sum(int a,int b), it is equivalent to the

a)       void sum(int,int)

b)      void sum(int ,float)

c)       void sum(float,int)

d)      all of the above

Q14) In a function

                void series(int first,int last)

                total parameters are

a)       1

b)      2

c)       3

d)      4

Q15) In function

void series(int first,int last)

                we can initialize values for parameters ‘first’ and ‘last’

a)       True

b)      False

Q16) what is the output of following code?

                void s(int);

int main()

{

s(6);

return 0;

}

void s(n)

{

n=n+9;

printf”n=%d”,n);

}

a)       4

b)      15

c)       6

d)      All of the above

Q17) If we use auto int a; inside a function, it means

a)       It is a local variable

b)      It is a global variable

c)       It is an automatic variable which has local scope.

d)      All of the above

Q18) what would happen to the value of v after calling the function in following code?

                int main()

                {

                                Function1();

                                Function1();

                                return 0;

                }

                void Function1()

{

                float v=90.45;

                printf(“v=%f”,v);

                v++;

}

a)       The value remains unchanged.

b)      The value is lost after calling the function.

c)       A and b

d)      None of the above

Q19)For a variable to be global, we use/declare

a)       The variable outside the function

b)      The variable with keyword ‘extern’

c)       A and b

d)      None of the above

Q20) When we make global variable, it retains its value even after calling the function.

a)       True

b)      False

Q21) The keyword ‘extern’ means

a)       Look the variable in same file

b)      Look the variable in other files

c)       Assign some memory permanently, during the execution.

d)      A,b and c

Q22) If we use register int a=5; it will store value in

a)       High speed memory register

b)      Hard disk

c)       Cd

d)      None of the above

Q23) To retain the value of variable int a=5; in multiple calling of function, we use

a)       int static a=5;

b)      static int a=5;

c)       static+int a=5

d)      all of the above

Q24) If a function calls itself, it is called

a)       main()

b)      printf()

c)       recursive

d)      none of the above

Q25) Altogether we have 4 ways to use function with parameter.

a)       True

b)      False

Q26)what would be the output of following piece of program

#include <stdio.h>

int z;

void f(int x)

{

    x=2;

    z+=x;

}

int main()

{

    z=5;

    f(z);

    printf("z=%d",z);

    return 0;

}             

a)       5

b)      6

c)       7

d)      None of the above

Q27) what would be the output?

#include <stdio.h>

void f(int x)

{

    return x;

}

int main()

    f(7);

    printf("result=%d",f(8));

    return 0;

}

a)       0

b)      9

c)       2

d)      8

Q28) In following recursive function,we will get output …

#include <stdio.h>

 

int main()

{

   

    int a=3;

    printf("%d",f(a));

    return 0;

}

int f(int x)

{

    if(x>=3)

        return 1;

    else

    return f(x-1);

}

a)       1

b)      2

c)       0

d)      None of the above

Q29) Suppose we have two functions

                void function1();

                void function2();

                In our program, we can  call function1() from function2().

a)       True

b)      False

Q30) what would be the output?

#include <stdio.h>

int main()

{

    printf("%d",f(2));

    return 0;

}

int f()

{

    return 1;

}

a)       0

b)      1

c)       It will throw an error

d)      None of the above

 

Struct and union:

 

Q1) to use struct, we use

a)       Structure keyword

b)      struct keyword

c)       struct tag keyword

d)      none

Q2) structure stores

a)       similar items

b)      dis-similar items

c)       shares memory

d)      a,b,c

Q3)structure total memory consumed, is determined by

a)       largest member

b)      smallest member

c)       sum of members

d)      a,b,c

Q4) To access members of structure, we use

a)       member’s name

b)      member’s location

c)       variable’s name with period operator

d)      none

Q5) We can initialize members inside the struct tag.

a)       True

b)      False

Q6) Suppose, we are given following code.

                struct name

                {

                                Char fname[100];

                                Char lname[100];

                }

                This is syntactically correct.

a)       True

b)      False

Q7) for given struct with tag student, if we write

                struct student variable,variable1;

                It will create ….. variables.

a)       1

b)      2

c)       3

d)      0

Q8)We can use variable of one struct inside another struct, as variable.

a)       True

b)      False

Q9 We can use entire struct as an array.

a)       True

b)      False

Q10) typedef helps us to

a)       Create our own data type

b)      Create our own struct tag

c)       A and b

d)      None

Q11) Compared to array, struct helps us to copy our data easily.

a)       True

b)      False

Q12)The default value of members of struct is

a)       1

b)      0

c)       -1

d)      None

Q13)The members of structure can be arrays or other structures.

a)       True

b)      False

Q14)Structure and union are used to conserve memory.

a)       True

b)      False

Q15) If we use following code(small part)

                typedef struct

{

                Char name[100];

                Char address[100];

}a;

Then ‘a’ is called

a)       Variable

b)      ‘a’ serves in place of structure.

c)       A and b

d)      None

Q16) We can access  members of structures using pointers as we pass pointer to structure in a function.

a)       True

b)      False

Q17)When we use pointer to structure, its(structure) members can be accessed using

a)       .

b)      +

c)       ->

d)      None

Q18)We can pass structure to function.

a)       True

b)      False

Q19) when we use

                typedef int a newdatatype;

                here, newdatatype becomes a

a)       Variable

b)      Constant

c)       Data type

d)      Integer type of data type

Q20) We use ….. keyword for union.

a)       struct

b)      union

c)       structure

d)      none

Q21) Union shares memory

a)       true

b)      false

Q22)In union, the total bytes occupied is the

a)       largest member

b)      smallest member

c)       sum of largest and smallest member

d)      all of the above

Q23) A union may be a member of a structure, and a structure may be a member of a union.

a)       True

b)      False

Q24)In union, we can access one member at a time.

a)       True

b)      False

Q25) We can declare union inside structure.

a)       True

b)      False

From pointer

Q1) which is a pointer declaration?

a)       int *k;

b)      float *c;

c)       char *m;

d)      a, b and c

q2) pointer is used for

a)       dynamic memory

b)      fast execution

c)       to solve list related problems

d)      a,b and c

q3)IF we are given following code:

                int a=9,*k;

                k=&a;

                printf(“%d”,*k);

                it will print

a)       9

b)      23456

c)       8

d)      10

Q4) int *a[4]; will store

a)       4 Addresses

b)      10 addresses

c)       20 addresses

d)      A,b and c

Q5)If we write (a+0) for given array a[5], it will print

a)       Address

b)      Value

c)       A and b

d)      None

Q6)Pointer is a variable which stores

a)       Address

b)      Operator

c)       A library function

d)      A,b and c

Q7) In pointer, & is called

a)       Increment operator

b)      Scanf() operator

c)       Address operator

d)      None

Q8) If we use following code

        int *a,**b;

        int k=8;

        k=&a;

        b=*k;

        printf(“b=%d\n”,b);

        It will print

a)       Address of k

b)      Address of a

c)       Address of k and a

d)      None

Q9)  A function can return a pointer as value.

a)       True

b)      False

Q10) We can pass pointer in a function.

a)true

b) false

q11) We are given following code.

int a[5],int *k;

k=&a;

The value of k will be

a)       Address of a

b)      Base address of a

c)       End address of a

d)      A,b and c

Q12) For given array a[4], if we print

                (a+0) and &(a+0) then

a)       They both will give address

b)      They both give address of 0th location

c)       We will get values

d)      none

q13) when we use pointer for a string, it will not use address.

a)       True

b)      False

Q14) A pointer can be initialized to NULL.

a)       True

b)      Falses

Q15) ‘Pass by reference’ helps us to… in our function.

a)       Return one value

b)      Return multiple values

c)       A and b

d)      None of the above

Q16)In a function void fact(int *,float *), total pointers are

a)       1

b)      2

c)       0

d)      A,b and c

Q17) In C, a string is essentially a pointer to its first character.

a)       True

b)      False

Q18) The output of following code

char *name[4]={“Saman”,Ruman”,Bhuwan”,”Sunita”};

printf(“%s”,name[0]);

is

a)       Address of saman

b)      Address of ruman

c)       Saman

d)      A,b and c

Q19)  A pointer nPtr, that points to an object of type float is

a)       float *nPtr;

b)      float n*Ptr;

c)       int *nPtr;

d)      all of the above

Q20) Write the function prototype for a function called exchange that takes two pointers to floating-point numbers x and y as parameters and does not return a value. For this, which is the right answer ?

a)       void exchange(float *x, float *y);

b)      int exchange(float *x, float *y);

c)       float exchange(float *x, float *y)

d)      a,b and c

 

 

 

 

 

 

 

 

Datafile

 

Q1 which function is used to remove a file in c?

a)remove()

b)delete()

c)a and b

d) none of the above

q2) which is used to open a file?

a)       Fopen()

b)      fopen()

c)       open()

d)      a,b and c

q3) Which is the correct declaration of pointer to create a buffer area in datafile?

a)       int *p;

b)      float *pk;

c)       FILE *k;

d)      Char *k;

Q4) which is the mode of writing?

a)       a

b)      w

c)       a and b

d)      none

q5) To write and read we use

a)       w+

b)      a+

c)       a and b

d)      none  of the above

q6) To know the exact location of marker/pointer while writing data, we use

a)       ftell()

b)      fsay()

c)       fshow()

d)      all of the above

q7)rewind() function takes the pointer to original location.

a)       True

b)      False

q8) As we update data, we need to rename the file. For this we use

a)rename()

b)change()

c)changethename()

d)a,b and c

q9)After opening a file using fopen(), if it is unable to open that, it returns

a)       NULL

b)      Zero

c)       -1

d)      A,b andc

q10) which is the correct closing of two datafiles?

a)       Fclose(k,k1);

b)      fclose(k);fclose(k1);

c)       fclose(k+k1);

d)      none of the above

q11)EOF() function, while reading a file, returns

a)       -1

b)      1

c)       0

d)      1 &0

Q12) fseek() function works in

a)       3 modes

b)      2 modes

c)       1 mode

d)      A,b and c

Q13)If we want to write a block of bytes in a datafile , we use

a)       putc()

b)      fputc()

c)       fwrite()

d)      a,b and c

q14)If we want to store data in a binary form in a datafile, mostly, we use

a)       datafile with an extension .txt

b)      datafile with extension .bin

c)       a,b

d)      none

q15)While opening file in an append mode, it writes/stores data

a)       at the end

b)      at the beginning

c)       it does not write data

d)      none of the above

q16)If the file is successfully closed, it(fclose()) returns

a)       1

b)      -1

c)       0

d)      None of the above

Q17) If we write data in same file again and again, it will write data

a)       From the beginning

b)      From the ending point

c)       It will not write.

d)      A,b and c

Q18)while reading records using fread(), as the file ends, it returns

a)       0

b)      1

c)       -1

d)      None

Q19) In the code

        FILE *p;

a)       FILE must be in upper case

b)      FILE must be in lower case

c)       Any case we may use

d)      A,b and c

Q20) In the code

        FILE *k;

        FILE keyword exists in a

a)       <stdio.h>

b)      <conio.h>

c)       <stdlib.h>

d)      <math.h>

 

Q21) fopen() takes …. Arguments.

a)       Two

b)      Three

c)       Four

d)      All of the above

Q22) If we use fwrite(), it will write a block of bytes.

a)       True

b)      False

Q23) EOF, if used in data file, reads records until there is not data/record to process.

a)       True

b)      False

Q24) Let, we have written records

        “Data file”

in a datafile data.txt. If we use fseek(p,2, SEEK_SET), the marker will move to

a)       2nd location

b)      10th location

c)       0th location

d)      None

Q25) Records in random-access files are not of uniform length.

a)       True

b)      False

 

OOP:-


  1. Who invented OOP?
    a) Andrea Ferro
    b) Adele Goldberg
    c) Alan Kay
    d) Dennis Ritchie

  2. Which is not a feature of OOP in general definitions?
    a) Efficient Code
    b) Code reusability
    c) Modularity
    d) Duplicate/Redundant data

  3. Which was the first purely object oriented programming language developed?
    a) Kotlin
    b) SmallTalk
    c) Java
    d) C++

  4. When OOP concept did first came into picture?
    a) 1980’s
    b) 1995
    c) 1970’s
    d) 1993

  5. Which feature of OOP indicates code reusability?
    a) Abstraction
    b) Polymorphism
    c) Encapsulation
    d) Inheritance

  6. Which among the following doesn’t come under OOP concept?
    a) Data hiding
    b) Message passing
    c) Platform independent
    d) Data binding

  7. The feature by which one object can interact with another object is _____________
    a) Message reading
    b) Message Passing
    c) Data transfer
    d) Data Binding

  8. In multilevel inheritance, which is the most significant feature of OOP used?
    a) Code efficiency
    b) Code readability
    c) Flexibility
    d) Code reusability

  9. What is an abstraction in object-oriented programming?
    a) Hiding the implementation and showing only the features
    b) Hiding the important data
    c) Hiding the implementation
    d) Showing the important data

  10. Which access specifier is usually used for data members of a class?
    a) Protected
    b) Private
    c) Public
    d) Default

  11. Which feature of OOP reduces the use of nested classes?
    a) Inheritance
    b) Binding
    c) Abstraction
    d) Encapsulation

  12. Which of the following is not a property of an object?
    a) Properties
    b) Names
    c) Identity
    d) Attributes

  13. Encapsulation and abstraction differ as ____________
    a) Hiding and hiding respectively
    b) Binding and Hiding respectively
    c) Hiding and Binding respectively
    d) Can be used any way

  14.  Instance of which type of class can’t be created?
    a) Parent class
    b) Abstract class
    c) Anonymous class
    d) Nested class

  15. How many types of access specifiers are provided in OOP (C++)?
    a) 1
    b) 2
    c) 3
    d) 4

  16. Which among the following can be used together in a single class?
    a) Only private
    b) Private and Protected together
    c) Private and Public together
    d) All three together

  17. Which among the following can restrict class members to get inherited?
    a) Private
    b) Protected
    c) Public
    d) All three

  18. Which of the following is not type of class?
    a) Abstract Class
    b) Final Class
    c) Start Class
    d) String Class

  19. Class is pass by _______
    a) Value
    b) Reference
    c) Value or Reference, depending on program
    d) Copy

  20. Which of the following pairs are similar?
    a) Class and object
    b) Class and structure
    c) Structure and object
    d) Structure and functions

Recent trends:-

MCQ

1. Which among is not the functionality of robot?

a. Re-programability  

b. Multifunctionality 

c. Efficient Performance 

d. Responsibility

2. Which part of the robot provides motion to the manipulator and end effect.

 a. Controller 

b. Sensor 

C. Actuator 

d. None of the above

3. What type of computing technology refers to services and application: that typically run on a distributed network through virtualized resources?

     a. Distributed Computing 

b. Cloud Computing 

C. Soft Computing 

d. Parallel Computing

4. Which one of the following is Cloud Platform by Amazon?

a. Azure          

b. AWS      

C. Cloudera             

d. All of the mentioned

5. In how many forms Big Data could be found?

a. 3               

b. 5           

c. 4                 

d. 2

6. It is a mediated environment which creates the sensation in a user of being present in a (physical) surrounding.

a. WWW                               

b. VR                               

c. HMD                           

d. GUI

7. A type of VR environment in which subjects are visually isolated from the real environment.

a. Immersive 

b. Semi immersive 

c. Non immersive 

d. Augmented

8. In this type of VR environment, the three-dimensional scene is considered as a part of the physical environment.

a. Immersive 

 b. Non immersive 

c. Semi immersive   

d. Augmented

9. In this type of VR environment, the subjects can perform both in the real and virtual environment.

 a. Immersive 

b. Semi immersive 

c. Non irnmersive    

d. Augmented

10. E-commerce has …….. scope than E-Business or Digital Business.

a. Higher      

b. Narrower    

b. Wider                 

d. More

11. Which segment does eBay belongs to.

a. B2B                 

b. B2C         

 c. C2B 

   d. C2C

12. An IOT is a collection of devices.

a. signal     

b. machine to machine  

c. interconnected   

d. Network of Network

13. Which of the following the way in which an IoT device is associated with data?

a. Internet  

b. Cloud 

  c. Automata   

    d. Network

14. the application of artificial intelligence is/are

a. expert system   

b. Gaming  

c. Vision system  

d. All of the above

15. which of the following describes e-commerce?

a. Doing business electronically

b. Doing business

c. sale of goods

d. All of the above

16. which of the following layers provides end to end communication in IoT.

a. Logical layer          

b. Datalink layer   

    c. Transport layer  

d. Session layer

17.The characteristics of the computer system capable of thinking, reasoning and learning is known as

a. machine intelligence

 b. human intelligence 

c. artificial intelligence 

d. virtual intelligence

18. The first AI programming language was called:

a. BASIC

 b. FORTRAN 

c. IPL 

d. LISP

19.Data in ___________ bytes size is called Big Data.

A. Tera 

B. Giga 

C. Peta 

D. Meta

 

20.Which of the following are Benefits of Big Data Processing?

A. Businesses can utilize outside intelligence while taking decisions
B. Improved customer service
C. Better operational efficiency
D. All of the above

 

 

Short answer questions.

       i.      Define Ai? What are the applications of AI?

     ii.      Explain different components of AI.

  iii.      What do you mean by robotics? Explain its characteristics.

   iv.      Define cloud computing. Explain the advantages of cloud computing.

     v.      What do you mean by big data? Explain its characteristics and types.

   vi.      Explain big data with advantages and disadvantages.

vii.      What do you mean by virtual reality? Explain its advantages and disadvantages.

viii.      Define e-commerce and e-business. What are the advantages and disadvantages of e-commerce?

   ix.      What do you mean by e-medicine? Discuss its importance.

     x.      Explain mobile computing along with advantages and disadvantages.

   xi.      Explain internet of thing (IOT) along with advantages and disadvantages.



No comments:

Post a Comment