Database:-
------------------------------------------------------------------
Q1)Which is a database software?
a)
Oracle
b)
Access
c)
Db2
d)
A,b and c
Q2) in database , we can auto
increase the value for primary key
a)
True
b)
False
Q3) we can use MYSQL in GUI as well
as CUI interface.
a)
True
b)
False
Q4) In 1N, there should be an
atomic value for all fields.
a)
True
b)
False
Q5) In network database model,
a)
All relations are
supported.
b)
Only one to one is supported.
c)
It does not support any relationship
d)
None
Q6) To insert a record we use
a)
Insert command
b)
Insert into command
c)
Insert into() values()
command
d)
None
Q7) we can use delete and drop both
for same purpose.
a)
True
b)
False
Q8) XAMPP provides us
a)
A local development environment
b)
Helps us to code in database
c)
Helps us to code in php
d)
a, b and c
Q9)To add a new field, we use
a)
add command
b)
modify command with add column
c)
alter table
d)
none
q10) For given table t1(field1, field2,
field3), if we perform query
select * from t1; it will
a)
fetch all records
b)
fetch all fields with
all records
c)
fetch all fields with all records with given
condition
d)
a,b and c
q11) To link a table with another
table, we need a foreign key.
a)
True
b)
False
Q12) In a database, if there is
transitive dependency, it is said to be in
a)
1N
b)
2N
c)
3N
d)
A,b and c
Q13) DBA stands for
a)
Data Base Administrator
b)
Data Base All controller
c)
Data Base available
d) None
additional questions:-
1. This key that uniquely
identifies each record is called: 8.
a. Primary Key
b. Key Record
c. Unique Key
d. Field Name
2. Data dictionary is a
repository that manages
a. Memory
b. Metadata
c. Spell Checker
d.
Data Validator
3. Which of the following
is generally used for performing tasks like creating the structure of the
relations, deleting relation?
a. DML(Data
Manipulation Language)
b. Query
c. Relational
Schema
d. DDL(Data
Definition Language)
4. A Database Management
System is a type of software.
a. It is a type of
system software
b. It is a kind of
application software
c. It is a kind of
general software
d. Both A and C
5. Which of the following
refers to the level of data abstraction that describes exactly how the data
stored?
a. Conceptual Level
b. Physical Level
c. File Level
d. Logical Level
6. In general, a file is
basically a collection of all related
a. Rows & Columns
b. Fields
c. Database
d. Records
7. The term
"Data" refers to:
a. The electronic
representation of the information (or data)
b. Basic information
c. Raw Facts and
figures
d. Both A and C
8. The term
"SQL" stands for
a. Standard query
language
b. Sequential query
language
c. Structured
query language
d. Server-side query
language
9. An…………… is a set of
entities of the same type that share the same properties, or attributes.
a. Entity set
b. Attribute set
c. Relation set
d. Entity model
10. Which of the
following gives a logical structure of the database graphically?
a. Database
diagram
b. Entity
diagram
c. Architectural
representation
d. Entity-Relationship
diagram
11. The entity
relationship set is represented in E-R diagram as
a. Undivided rectangles
b. Dashed lines
c. Diamond
d. Double diamonds
12. In the…….. normal
form, a composite attribute is converted to individual attributes.
a. First
b. Second
c. Third
d. Fourth
13. A table on the
many side of a one to many or many to many relationship must:
a. Be in Second
Normal Form (2NF)
b. Be in Third Normal
Form (3NF)
c. Have a single
attribute key
d. Have a
composite key
14. Tables in second
normal form (2NF):
a. Eliminate all
hidden dependencies
b. Eliminate the
possibility anomalies of a insertion
c. Have a composite
key
d. Have all non key
fields depend on the whole primary key
15. Which-one of the
following statements about normal forms is FALSE?
a. BCNF is stricter
than 3 NF
b. Lossless,
dependency-preserving decomposition into 3 NF is always possible
c. Loss less,
dependency preserving decomposition into BCNF is always possible
d. Any relation with
two attributes is BCNF
16. Functional
Dependencies are the types constraints that are based on
a. Key
b. Key revisited
c. Superset key
d. None of the mentioned
17. Which is a
bottom-up approach to database design that design by examining the relationship
between attributes:
a. Functional
dependency
b. Database modeling
c. Normalization
d. Decomposition
18. Which forms
simplifies and ensures that there are minimal data aggregates and repetitive
groups:
a. 1NF
b. 2NF
C 3NF
d. All of the
mentioned
19. Which forms are
based on the concept of functional dependency:
a. 1NF
b. 2NF
C. 3NF
c.
4NF
20. A distributed
database is a collection of data which belong ………… to the same system but are
spread over the …….. of the network
a. Logically, sites
b. Physically, sites
c. Database, DBMS
d.
None of the above
21. In a distributed
Database reduction of redundancy is obtained by……………….
a. Data fragmentation
b. Data Replication
c. Data Sharing
d. None of the above
22. Which of the
following is/are the main goals of a distributed database?
a. Interconnection of
database
b. Incremental growth
c. Reduced
communication overhead
d. All of the above
23 The server process
that implements lock manager functionality, is called
a. Server Processes
b. Database Writer
Process
c. Manager processes
d. Lock Manager
Proceses
24. Storing a
separate copy of the database at multiple locations is which of the following?
a. Data
Replication
b. Horizontal
Partitioning
c. Vertical
Partitioning
d. Vertical
Partitioning
25. Which of the
following is a group of one or many attributes that uniquely identifies a row?
a. Key
b. Determinant
c. Tuple
d.
Relation
SAQ
- What are
data, information, database and database management system?
- Define data.
Differentiate between data and information.
- Define
database management system. Explain field, record, objects, and keys with
examples.
- What is
database? What are the objectives of database? Explain.
- Define data
and information. What are the advantages and disadvantages of database.
Explain
- Define
primary key, candidate key and alternate key. What are the importance of
primary key with suitable example.
- Explain DCL
and DQL with suitable examples.
- Differentiate
between centralized and distributed database.
- What is
RDBMS? Explain relational model of a database.
- What is data
normalization? What are the most important and widely used form of data
normalization?
- What is data
security? Why it is important in DBMS? Explain.
- Who is DBA?
Define roles and responsibilities of good DBA.
- What is key?
Explain different types of Key used in DBMS.
- What is
primary key? What are the features of good primary key?
- Write short
note on:
a.
DDL
b.
DML
c.
Primary key
d.
Foreign Key
e.
DCL
f.
DQL
g.
Data security
h.
DBA
i.
Data integrity
j.
Data security
k.
2NF
l.
Hierarchical model
m.
Key
n.
Data abstraction
o.
Relationship
p.
Data dictionary
q.
E-R diagram
LAQ:
- What is data
security? What are different data security methods? Explain.
- Why
normalization is needed? Explain different normalization techniques with
suitable examples.
- What are the
advantages and disadvantages of database? Explain briefly.
- Explain
centralized and distributed databases with a neat diagram. Discuss its
merits and demerits.
- Explain
different database models with suitable diagram. Also define its
advantages and disadvantages.
- What is data
integrity? Explain types of integrity with suitable examples.
- Write a SQL statement of the following
a.
Create database name as std.
b.
Create a table named student
including columns student_id, roll_num, first_name, last_name, and email.
c.
Insert three data into the table
student.
d.
Add another column phone_number.
e. Delete one data from the table.
Networking:-
MCQ
1.
Computer networking helps us to
a.
Share data
b.
Share files
c.
Share hardwares
d.
All of the above
2.
Networking can be centralized as well as
distributed.
a.
True
b.
False
3.
There are … types of communication modes.
a.
2
b.
3
c.
4
d.
1
4.
In simplex, we can send data only.
a.
True
b.
False
5.
In half duplex, we can send and receive data.
a.
True
b.
False
6.
In half duplex, we can communicate in both way
and at same time.
a.
True
b.
False
7.
What is the use of bridge in network?
a.
To connect LANs
b.
To separate LANs
c.
To control network speed
d.
A,b and c
8.
Which is the least congestion having network?
a.
LAN
b.
MAN
c.
WAN
d.
A, b and c
9.
What is Mbps?
a.
Mega Bits Per Second
b.
Mega Bytes Per Second
c.
Mega Bands Per Second
d.
a and b
10.
What is
the first octet value of class A?
a.
0-126
b.
128-191
c.
224-239
d.
192-223
11.
Which is the most common LAN protocol?
a.
UDP
b.
Ethernet
c.
HTTP
d.
SMTP
12.
Which of the following is not a bounded media?
a.
Fiber optical
b.
Radio wave
c.
satellite
d.
b ,c
13.
which protocol is more vulnerable to attacks?
a.
HTTPS
b.
HTTP
c.
UDP
d.
FTP
14.
Which topology is more reliable and secured?
a.
mesh
b.
star
c.
bus
d.
ring
15.
A distributed network configuration in which all
data passes through central computer is…
a.
Star
b.
Bus
c.
Point-to-point
d.
Ring
16.
Which of the following is unidirectional?
a.
Simplex
b.
Half duplex
c.
Full duplex
d.
None
17.
Which is not a transmission media?
a. Modem
b. Telephone
c. Coaxial Cable
d. Twisted Pair
18.
An example full duplex of data communication is
…
e.
Television
f.
FM
g.
Radio
h.
Internet
19.
Of the following which cannot be changed?
a.
MAC
b.
IP
c.
Subnet
mask
d.
DNS
20.
which of the following protocol is / are defined
in transport layer?
a.
ftd,
b.
tcp,
c.
udp,
d.
b and c
21.
The function of application layer is…
a.
Flow control
b.
Error control
c.
File transfer
d.
Access control
22.
Which layer is responsible for transmitting raw
bits from one node to another.
a.
Data link layer
b.
Physical layer
c.
Transport layer
d.
Presentation layer
23.
… are based on OSI reference model.
a.
Communications
b.
Data
c.
Networking standard
d.
All of the above
24.
The upper layer activities are performed by …
a.
Software
b.
Hardware
c.
RAM
d.
Register
25.
ISO first introduced reference model for data
communication in …
a.
1970 AD
b.
!980 AD
c.
1985 AD
d. 1975 AD
----------------------------------------------------------------------------------------------------
JS:-
Q1) JS is a
a.
Server side scripting language
b.
Client side scripting
language
c.
A and b
d.
None
Q2)We use … tag to embed JS code.
a.
<style>…</style>
b.
<script>…</script>
c.
<vbscript>…</vbscript>
d.
All of the above
Q3) We must put JS code inside head tag.
a.
True
b.
False
Q4) JS is
a.
Procedure oriented language
b.
Object oriednted language
c.
Object based language
d.
A,b and c
Q5)JS is a
a.
Compiler based language
b.
Interpreted language
c.
Assembler based language
d.
None of the above
Q6) JS file ,if used as an external source, uses extension
a.
.html
b.
.css
c.
.js
d.
All of the above
Q7)We can put JS code anywhere.
a.
True
b.
False
Q8)Which is used as comment in JS?
a.
//
b.
#
c.
/*…*/
d.
a,c
Q9) The JS statement must end with semicolon.
a.
True
b.
False
Q10) We use … to declare variable.
a.
Var
b.
Let
c.
Const
d.
A,b and c
Q11) Declaring variable in Js is mandatory.
a.
True
b.
False
Q12) which are/is the methods?
a.
Console.log()
b.
alert()
c.
window.alert()
d.
a,b and c
Q13)what would be the output of following code?
var
a=90;
var a;
console.log(a);
a.
undefined
b.
90
c.
0
d.
None of the above
Q14)If we use var a in our JS, it will store
a.
Numbers
b.
Strings
c.
Boolean value
d.
All of the above
Q15)There are … types of data types.
a.
Two
b.
Three
c.
Four
d.
None
Q16)In JS, undefined and null are same.
a.
True
b.
False
Q17) In JS, we get undefined output for a variable if
a.
It is not assigned any
value but printed in document
b.
It is assigned but not used
c.
If it is assigned null value
d.
If it has zero value
Q18)If we use following code ,
var naam=”Raman”;
var
ad=”from ktm”;
var
mer=naam+ad;
console.log(mer);
It will
print
a.
Raman
b.
From ktm
c.
Raman from ktm
d.
Uncaught error
Q19) duplication declaration of variable triggers an error.
a.
True
b.
False
Q20)If we use following code in JS program
Var a;
Const
a=7;
a=45;
Console.log(a);
It will
print
a.
7
b.
45
c.
Throw an error
d.
None
Q21) which is a valid variable declaration in JS?
b. var a1
c. var $a1;
d. a,b and c
Q22) In JS , we can use reserved word in any case.
a. True
b. False
Q23) In Js,in document.write(), we can use HTML tags with
arguments inside the parentheses.
a. True
b. False
Q24) The output of code
A=90;
a=10;
document.write(A/a) is
a.
10
b.
9
c.
0.9
d.
None
Q25) The % operator returns
b. Quotient
c. Power
d. None
Q26) == is called
b Equals to operator
c. Identical operator
d. None
PHP:-
C:-
Functions:
Q1) Function is an object with self-contained codes.
a)
True
b)
False
Q2) Function can be user defined and library.
a)
true
b)
false
Q3) To use library function, we must use its related header
files.
a)
True
b)
False
Q4) void factorial() is a … function
a)
Library
b)
User defined
c)
A and b
d)
None of the above
Q5) User defined functions must return some value.
a)
True
b)
False
Q6) In C language, user defined functions can be nested.
a)
True
b)
False
Q7) In C, we may use either top-down or bottom-up approach
for user defined functions.
a)
True
b)
False
Q8) The function
int fibo()
{
Statements;
}
Is called
a)
Function declaration
b)
Function definition
c)
Function end
d)
None of the above
Q9) Which is the correct declaration of function?
a)
void sum();
b)
void sum(int,int);
c)
int sum(int);
d)
all of the above
Q10) If we write sum(a,b), its type taken by compiler
itself, is
a)
int
b)
float
c)
char
d)
none of the above
Q11) For a function,
int
series()
{
int
a,I,s=0;
}
a,I and s are called
a)
local variables
b)
global variables
c)
register variables
d)
none of the above
Q12) For a function,
Char
name[100];
int series()
{
int
a,I,s=0;
}
‘name’ is
a)
local variables
b)
global variables
c)
register variables
d)
none of the above
Q13) If we write void sum(int a,int b), it is equivalent to
the
a)
void sum(int,int)
b)
void sum(int ,float)
c)
void sum(float,int)
d)
all of the above
Q14) In a function
void
series(int first,int last)
total
parameters are
a)
1
b)
2
c)
3
d)
4
Q15) In function
void series(int first,int last)
we can
initialize values for parameters ‘first’ and ‘last’
a)
True
b)
False
Q16) what is the output of following code?
void
s(int);
int main()
{
s(6);
return 0;
}
void s(n)
{
n=n+9;
printf”n=%d”,n);
}
a)
4
b)
15
c)
6
d)
All of the above
Q17) If we use auto int a; inside a function, it means
a)
It is a local variable
b)
It is a global variable
c)
It is an automatic variable which has local
scope.
d)
All of the above
Q18) what would happen to the value of v after calling the
function in following code?
int
main()
{
Function1();
Function1();
return
0;
}
void
Function1()
{
float
v=90.45;
printf(“v=%f”,v);
v++;
}
a)
The value remains unchanged.
b)
The value is lost after calling the function.
c)
A and b
d)
None of the above
Q19)For a variable to be global, we use/declare
a)
The variable outside the function
b)
The variable with keyword ‘extern’
c)
A and b
d)
None of the above
Q20) When we make global variable, it retains its value even
after calling the function.
a)
True
b)
False
Q21) The keyword ‘extern’ means
a)
Look the variable in same file
b)
Look the variable in other files
c)
Assign some memory permanently, during the
execution.
d)
A,b and c
Q22) If we use register int a=5; it will store value in
a)
High speed memory
register
b)
Hard disk
c)
Cd
d)
None of the above
Q23) To retain the value of variable int a=5; in multiple
calling of function, we use
a)
int static a=5;
b)
static int a=5;
c)
static+int a=5
d)
all of the above
Q24) If a function calls itself, it is called
a)
main()
b)
printf()
c)
recursive
d)
none of the above
Q25) Altogether we have 4 ways to use function with
parameter.
a)
True
b)
False
Q26)what would be the output of following piece of program
#include <stdio.h>
int z;
void f(int x)
{
x=2;
z+=x;
}
int main()
{
z=5;
f(z);
printf("z=%d",z);
return 0;
}
a)
5
b)
6
c)
7
d)
None of the above
Q27) what would be the output?
#include <stdio.h>
void f(int x)
{
return x;
}
int main()
{
f(7);
printf("result=%d",f(8));
return 0;
}
a)
0
b)
9
c)
2
d)
8
Q28) In following recursive function,we will get output …
#include <stdio.h>
int main()
{
int a=3;
printf("%d",f(a));
return 0;
}
int f(int x)
{
if(x>=3)
return 1;
else
return f(x-1);
}
a)
1
b)
2
c)
0
d)
None of the above
Q29) Suppose we have two functions
void
function1();
void
function2();
In our
program, we can call function1() from
function2().
a)
True
b)
False
Q30) what would be the output?
#include <stdio.h>
int main()
{
printf("%d",f(2));
return 0;
}
int f()
{
return 1;
}
a)
0
b)
1
c)
It will throw an error
d)
None of the above
Struct and union:
Q1) to use struct, we use
a)
Structure keyword
b)
struct keyword
c)
struct tag keyword
d)
none
Q2) structure stores
a)
similar items
b)
dis-similar items
c)
shares memory
d)
a,b,c
Q3)structure total memory consumed, is determined by
a)
largest member
b)
smallest member
c)
sum of members
d)
a,b,c
Q4) To access members of structure, we use
a)
member’s name
b)
member’s location
c)
variable’s name with
period operator
d)
none
Q5) We can initialize members inside the struct tag.
a)
True
b)
False
Q6) Suppose, we are given following code.
struct
name
{
Char
fname[100];
Char
lname[100];
}
This is
syntactically correct.
a)
True
b)
False
Q7) for given struct with tag student, if we write
struct
student variable,variable1;
It will
create ….. variables.
a)
1
b)
2
c)
3
d)
0
Q8)We can use variable of one struct inside another struct,
as variable.
a)
True
b)
False
Q9 We can use entire struct as an array.
a)
True
b)
False
Q10) typedef helps us to
a)
Create our own data type
b)
Create our own struct tag
c)
A and b
d)
None
Q11) Compared to array, struct helps us to copy our data
easily.
a)
True
b)
False
Q12)The default value of members of struct is
a)
1
b)
0
c)
-1
d)
None
Q13)The members of structure can be arrays or other
structures.
a)
True
b)
False
Q14)Structure and union are used to conserve memory.
a)
True
b)
False
Q15) If we use following code(small part)
typedef
struct
{
Char
name[100];
Char
address[100];
}a;
Then ‘a’ is called
a)
Variable
b)
‘a’ serves in place of
structure.
c)
A and b
d)
None
Q16) We can access members
of structures using pointers as we pass pointer to structure in a function.
a)
True
b)
False
Q17)When we use pointer to structure, its(structure) members
can be accessed using
a)
.
b)
+
c)
->
d)
None
Q18)We can pass structure to function.
a)
True
b)
False
Q19) when we use
typedef
int a newdatatype;
here,
newdatatype becomes a
a)
Variable
b)
Constant
c)
Data type
d)
Integer type of data
type
Q20) We use
….. keyword for union.
a)
struct
b)
union
c)
structure
d)
none
Q21) Union
shares memory
a)
true
b)
false
Q22)In union,
the total bytes occupied is the
a)
largest member
b)
smallest
member
c)
sum
of largest and smallest member
d)
all
of the above
Q23) A
union may be a member of a structure, and a structure may be a member of a
union.
a)
True
b)
False
Q24)In union,
we can access one member at a time.
a)
True
b)
False
Q25) We can
declare union inside structure.
a)
True
b)
False
From pointer
Q1) which is a pointer declaration?
a)
int *k;
b)
float *c;
c)
char *m;
d)
a, b and c
q2) pointer is used for
a)
dynamic memory
b)
fast execution
c)
to solve list related problems
d)
a,b and c
q3)IF we are given following code:
int
a=9,*k;
k=&a;
printf(“%d”,*k);
it will
print
a)
9
b)
23456
c)
8
d)
10
Q4) int *a[4]; will store
a)
4 Addresses
b)
10 addresses
c)
20 addresses
d)
A,b and c
Q5)If we write (a+0) for given array a[5], it will print
a)
Address
b)
Value
c)
A and b
d)
None
Q6)Pointer is a variable which stores
a)
Address
b)
Operator
c)
A library function
d)
A,b and c
Q7) In pointer, & is called
a)
Increment operator
b)
Scanf() operator
c)
Address operator
d)
None
Q8) If we use following code
int
*a,**b;
int
k=8;
k=&a;
b=*k;
printf(“b=%d\n”,b);
It
will print
a)
Address of k
b)
Address of a
c)
Address of k and a
d)
None
Q9)
A function can return a pointer as value.
a)
True
b)
False
Q10) We can pass pointer in a
function.
a)true
b) false
q11) We are given following code.
int a[5],int *k;
k=&a;
The value of k will be
a)
Address of a
b)
Base address of a
c)
End address of a
d)
A,b and c
Q12) For given array a[4], if we
print
(a+0)
and &(a+0) then
a)
They both will give address
b)
They both give address
of 0th location
c)
We will get values
d)
none
q13) when we use pointer for a
string, it will not use address.
a)
True
b)
False
Q14) A pointer can be initialized
to NULL.
a)
True
b)
Falses
Q15) ‘Pass by reference’ helps us
to… in our function.
a)
Return one value
b)
Return multiple values
c)
A and b
d)
None of the above
Q16)In a function void fact(int
*,float *), total pointers are
a)
1
b)
2
c)
0
d)
A,b and c
Q17) In C, a string is essentially a pointer to
its first character.
a)
True
b)
False
Q18) The output of following code
char
*name[4]={“Saman”,Ruman”,Bhuwan”,”Sunita”};
printf(“%s”,name[0]);
is
a)
Address of saman
b)
Address of ruman
c)
Saman
d)
A,b and c
Q19) A pointer nPtr, that points to an object of
type float is
a)
float *nPtr;
b)
float n*Ptr;
c)
int *nPtr;
d)
all of the above
Q20)
Write the function prototype
for a function called exchange that takes two pointers to floating-point
numbers x and y as parameters and does not return a value. For this, which is
the right answer ?
a)
void exchange(float *x, float
*y);
b)
int
exchange(float *x, float *y);
c)
float
exchange(float *x, float *y)
d)
a,b
and c
Datafile
Q1 which function is used to remove a file in c?
a)remove()
b)delete()
c)a and b
d) none of the above
q2) which is used to open a file?
a)
Fopen()
b)
fopen()
c)
open()
d)
a,b and c
q3) Which is the correct declaration of pointer to create a
buffer area in datafile?
a)
int *p;
b)
float *pk;
c)
FILE *k;
d)
Char *k;
Q4) which is the mode of writing?
a)
a
b)
w
c)
a and b
d)
none
q5) To write and read we use
a)
w+
b)
a+
c)
a and b
d)
none of
the above
q6) To know the exact location of marker/pointer while
writing data, we use
a)
ftell()
b)
fsay()
c)
fshow()
d)
all of the above
q7)rewind() function takes the pointer to original location.
a)
True
b)
False
q8) As we update data, we need to rename the file. For this
we use
a)rename()
b)change()
c)changethename()
d)a,b and c
q9)After opening a file using fopen(), if it is unable to
open that, it returns
a)
NULL
b)
Zero
c)
-1
d)
A,b andc
q10) which is the correct closing of two datafiles?
a)
Fclose(k,k1);
b)
fclose(k);fclose(k1);
c)
fclose(k+k1);
d)
none of the above
q11)EOF() function, while reading a file, returns
a)
-1
b)
1
c)
0
d)
1 &0
Q12) fseek() function works in
a)
3 modes
b)
2 modes
c)
1 mode
d)
A,b and c
Q13)If we want to write a block of bytes in a datafile , we
use
a)
putc()
b)
fputc()
c)
fwrite()
d)
a,b and c
q14)If we want to store data in a binary form in a datafile,
mostly, we use
a)
datafile with an extension .txt
b)
datafile with extension
.bin
c)
a,b
d)
none
q15)While opening file in an
append mode, it writes/stores data
a)
at the end
b)
at the beginning
c)
it does not write data
d)
none of the above
q16)If the file is successfully
closed, it(fclose()) returns
a)
1
b)
-1
c)
0
d)
None of the above
Q17) If we write data in same file
again and again, it will write data
a)
From the beginning
b)
From the ending point
c)
It will not write.
d)
A,b and c
Q18)while reading records using
fread(), as the file ends, it returns
a)
0
b)
1
c)
-1
d)
None
Q19) In the code
FILE
*p;
a)
FILE must be in upper
case
b)
FILE must be in lower case
c)
Any case we may use
d)
A,b and c
Q20) In the code
FILE
*k;
FILE
keyword exists in a
a)
<stdio.h>
b)
<conio.h>
c)
<stdlib.h>
d)
<math.h>
Q21) fopen() takes …. Arguments.
a)
Two
b)
Three
c)
Four
d)
All of the above
Q22) If we use fwrite(), it will write a block of bytes.
a)
True
b)
False
Q23) EOF, if used in data file, reads records until there is
not data/record to process.
a)
True
b)
False
Q24) Let, we have written records
“Data
file”
in a datafile data.txt. If we use
fseek(p,2, SEEK_SET), the marker will move to
a)
2nd location
b)
10th location
c)
0th location
d)
None
Q25) Records in random-access files are
not of uniform length.
a)
True
b)
False
OOP:-
Who invented OOP?
a) Andrea Ferro
b) Adele Goldberg
c) Alan Kay
d) Dennis RitchieWhich is not a feature of OOP in general definitions?
a) Efficient Code
b) Code reusability
c) Modularity
d) Duplicate/Redundant dataWhich was the first purely object oriented programming language developed?
a) Kotlin
b) SmallTalk
c) Java
d) C++When OOP concept did first came into picture?
a) 1980’s
b) 1995
c) 1970’s
d) 1993Which feature of OOP indicates code reusability?
a) Abstraction
b) Polymorphism
c) Encapsulation
d) InheritanceWhich among the following doesn’t come under OOP concept?
a) Data hiding
b) Message passing
c) Platform independent
d) Data bindingThe feature by which one object can interact with another object is _____________
a) Message reading
b) Message Passing
c) Data transfer
d) Data BindingIn multilevel inheritance, which is the most significant feature of OOP used?
a) Code efficiency
b) Code readability
c) Flexibility
d) Code reusabilityWhat is an abstraction in object-oriented programming?
a) Hiding the implementation and showing only the features
b) Hiding the important data
c) Hiding the implementation
d) Showing the important dataWhich access specifier is usually used for data members of a class?
a) Protected
b) Private
c) Public
d) DefaultWhich feature of OOP reduces the use of nested classes?
a) Inheritance
b) Binding
c) Abstraction
d) EncapsulationWhich of the following is not a property of an object?
a) Properties
b) Names
c) Identity
d) AttributesEncapsulation and abstraction differ as ____________
a) Hiding and hiding respectively
b) Binding and Hiding respectively
c) Hiding and Binding respectively
d) Can be used any wayInstance of which type of class can’t be created?
a) Parent class
b) Abstract class
c) Anonymous class
d) Nested classHow many types of access specifiers are provided in OOP (C++)?
a) 1
b) 2
c) 3
d) 4Which among the following can be used together in a single class?
a) Only private
b) Private and Protected together
c) Private and Public together
d) All three togetherWhich among the following can restrict class members to get inherited?
a) Private
b) Protected
c) Public
d) All threeWhich of the following is not type of class?
a) Abstract Class
b) Final Class
c) Start Class
d) String ClassClass is pass by _______
a) Value
b) Reference
c) Value or Reference, depending on program
d) CopyWhich of the following pairs are similar?
a) Class and object
b) Class and structure
c) Structure and object
d) Structure and functions
Recent trends:-
MCQ
1. Which among is not the functionality of robot?
a. Re-programability
b. Multifunctionality
c. Efficient Performance
d.
Responsibility
2. Which part of the robot provides motion to the manipulator and end
effect.
a. Controller
b. Sensor
C. Actuator
d. None of the above
3. What type of computing technology refers to services and application:
that typically run on a distributed network through virtualized resources?
a. Distributed Computing
b. Cloud Computing
C. Soft Computing
d. Parallel Computing
4. Which one of the following is Cloud Platform by Amazon?
a. Azure
b. AWS
C. Cloudera
d. All of the mentioned
5. In how many forms Big Data could be found?
a. 3
b. 5
c. 4
d. 2
6. It is a mediated environment which creates the sensation in a user of
being present in a (physical) surrounding.
a. WWW
b. VR
c. HMD
d. GUI
7. A type of VR environment in which subjects are visually isolated from
the real environment.
a. Immersive
b. Semi immersive
c. Non immersive
d.
Augmented
8. In this type of VR environment, the three-dimensional scene is
considered as a part of the physical environment.
a. Immersive
b. Non immersive
c. Semi immersive
d. Augmented
9. In this type of VR environment, the subjects can perform both in the
real and virtual environment.
a. Immersive
b. Semi immersive
c. Non irnmersive
d. Augmented
10. E-commerce has …….. scope than E-Business or Digital Business.
a. Higher
b. Narrower
b. Wider
d. More
11. Which segment does eBay belongs to.
a. B2B
b. B2C
c. C2B
d. C2C
12. An IOT is a collection of devices.
a. signal
b. machine to machine
c. interconnected
d. Network of Network
13. Which of the
following the way in which an IoT device is associated with data?
a. Internet
b. Cloud
c. Automata
d. Network
14. the application
of artificial intelligence is/are
a. expert system
b. Gaming
c. Vision system
d. All of the above
15. which of the
following describes e-commerce?
a. Doing business electronically
b. Doing business
c. sale of goods
d. All of the above
16. which of the
following layers provides end to end communication in IoT.
a. Logical layer
b. Datalink layer
c. Transport layer
d. Session layer
17.The
characteristics of the computer system capable of thinking, reasoning and
learning is known as
a. machine intelligence
b. human intelligence
c. artificial intelligence
d. virtual intelligence
18. The first AI
programming language was called:
a. BASIC
b. FORTRAN
c. IPL
d. LISP
19.Data in ___________ bytes
size is called Big Data.
20.Which of the following
are Benefits of Big Data Processing?
Short answer questions.
i. Define Ai? What are the applications of AI?
ii. Explain different components of AI.
iii. What do you mean by robotics? Explain its characteristics.
iv. Define cloud computing. Explain the advantages of cloud computing.
v. What do you mean by big data? Explain its characteristics and types.
vi. Explain big data with advantages and disadvantages.
vii. What do you mean by virtual reality? Explain its advantages and disadvantages.
viii. Define e-commerce and e-business. What are the advantages and disadvantages of e-commerce?
ix. What do you mean by e-medicine? Discuss its importance.
x. Explain mobile computing along with advantages and disadvantages.
xi. Explain internet of thing (IOT) along with advantages and disadvantages.
No comments:
Post a Comment