(1)
Informal
description of Algorithm of steps in an algorithm is called
(a) Algorithm
(b) Psuedocode (c) Flow chart (d) Program
(2)
The
protocol used for transmission of data/information across the internet.
(a) ICMP
(b) SNMMP (c) HTTP (d) SFTP
(3)
The
implication p-Ã q is equivalent to its
(a) qà p
(b) l-à qà -p
(c) pà q
(d) là p-à q
(4)The
pointer pointing to a variable goes out of scope called
(a) Empty Pointer (b)
Null Pointer (c) Wild Pointer (d) Dangling Pointer
(5)
Which of the following technique used in cryptography to convert plain text
into a coded message.
(a) Algorithm (b)
Encryption (c) Decryption (d) Authorization
(6) Which of the
following is used as a database management system?
(a) MYSQL (b) Java (c) Perl
(d) Visual Basics
(7)
Function in Programming
(a) Set of instruction
that can be called repeatedly (b) Variable that can store multiple values (c) Command
that prints output (d) Loop that executes a set of number of items
(8)
Type of variable that can be used where the scope and extent of the variable is
within the method or statement block in which it is declared.
(a) Constant (b) Local
Variables (c) Global variable (d) Static Variable
(9)
The smallest unit of storing data is
(a) Byte (b) Bit (c)
Word (d) KB
(10)
The design approach that focuses on the need and preferences of the end users
(a) Information
Architecture (b) Interaction Design(c) User-Centered Design (d) User-Research
(11)
The Component of the Computer that holds data, program instruction that are
currently in used.
(a) Random Access Memory
(RAM) (b) Read only Memory(c) Hardisk (d) Extented Memory
(12)
How long is IPV6 address?
(a) 18 bits (b) 32 bits
(c) 64 bits (d) 128 bits
(13)
Which of the following is not suitable as a Cache replacement algorithm?
(a) Most frequently
used (b) First in First out(c) Least frequently used (d) Last in first out
(14)
Computer memory addresses are represented using
(a) Hexa decimal
numbers (b) Decimals numbers (c) Binary Numbers (d) Octal Numbers
(15)
UNICODE is an example of
(a) Character encoding
set (b) Driver (c) Software (d) Database
(16)
Default address of computer is
(a) 1.1.1.1 (b)
127.0.0.1 (c) 192.168.0.1 (d) 0.0.0.0
(17)
Which of the following is the type of software that is designed to prevent un-authorized access to a computer
network system or network?
(a) Backup Software (b)
Firewall (c) Antivirus (d) Phishing Software
(18)
A _______ presents a choice of operations or services that can be performed by
a system at a given time
(a) Icons (b) Menus (c)
Pointers (d) Windows
(19)
Which of the following is the type of software that is used create and edits
spreadsheets?
(a) GOOGLE docs (b)
Google sheet (c) Google Colab (d) Adobe Photoshop
(20)
The ability of the user system to modify the user interface is
(a) Recoverability (b) Observer
ability (c) Customizability (d) Responsiveness
(21)
The sorting algorithm which repeatedly swaps the adjacent elements if they are
in the wrong order
(a) Bubble sort (b)
Insertion sort (c) Adjacent sort (d) Quick Sort
(22)
In the context of database system ,a candidate key that consist of two or more
attributes that together uniquely identify an entity occurrences is called
_______________
(a) Compound Key (b) Composite Key (c) Primary
key (d) Foreign Key
(23)
Any Programming Language must have construct to support.
(a) Selection (b)
Sequence (c) Iteration (d) All of these
(24)
ASCII Stand for
(25)
_________expresses how many pixels are present in a display or entire screen
(a) Pixel count (b) Resolution (c) OpenGL (d)
Screen Pixel
(26)
For larger inputs, merge sort is faster than insertion sort
(a) True (b) False (c)
Cannot be determined (d) Sometimes
(27)
Worst space complexity of Queue is
(a) On2 (b) O (n) (c) O
(logn) (d) O (nlogn)
(28)Which
of the following is not a programming language?
(a) Python (b) HTML (c)
Java (d) Ruby
(29)Which
of the following is not a web browser?
(a) Chrome (b) Apache
(c) Firefox (d) Safira
(30)
What is the output of the following code?
Intnum1=5;
Intnum2=7;
Cout<<num1+num2;
(a) 5
(b) 7 (c) 12 (d) None of these
(31)
Which of the following is known as the language made up of binary coded
instruction?
(a) High level (b)
BASIC (c) C (d) Machine
(32)
________ is used to provide the specific implementation of a method which is
already provided by its super class
(a) Operator overloads
(b) Method Overload (c) Method overriding (d) Operator Overriding
(33)
Source Program is compiled to an intermediate form called _________
(a) Byte Code (b) Smart
Code (c) Executable Code (d) Psuedo Code
(34)
Colors Printer use the inks cartridges of
(a) Cyan Magenta Yellow
Black (b) Cyan Magenta yellow (c) Red Green blue (d) Red Green blue Black
(35)
Which of the following language does the Computer understand?
(a) Computer
Understands only C language (b) Computer Understand only assembly language (c)
Computer Understand only binary Language (d) Computer understand only BASIC
language
(36)
Which of the following is not a commonly used computer network topology?
(a) Bus (b) Star (c)
Ring (d) Hexagon
(37)
Which of the following is the correct way to get the length of string variable
in C++?
(a) Name Length () (b)
Length (name) (c) Name size () (d) Size (name)
(38)
Which of the following is the correct way to declare and initialize a string
varable in C++?
(a) String name=’john
‘(b) char name=’john’(c) string name
name=’john’(d) char name (5) {j,o,h,n}
(39)____________
describing the bundling of data and methods
operating on this data into one unit.
(a) Abstraction (b)
Polymorphism (c) Encapsulation (d) Aggregation
(40)
Which of the following are not the characteristics of High Level Language?
(a) Machine Code (b)
Platform Independent (c) interactive execution (d) User Friendly
(41)
When algorithm is written in the form of programming language, it becomes a
____
(a) Flowchart (b)
Psuedo code (c) Program (d) Syntax
(42)
What is the correct way to declare a constant integer in C++”
(a) Int constant x=5 (b)
Int x=5 (c) Intx Const5; (d) none of these
(43)
Which of the following is designed to control the operations of computer?
(a) User (b)
Application software (c) System Software (d) Utility Software
(44)
The condition “Every non-prime attribute has a full functional dependency on a candidate
key (attribute depend on the complete primary key is satisfied in.
(a) First Normal Form
(b) Second Normal Form (c) Extensive Normal Form (d) Un-Normalized Form
(45)
Software Process Model that incorporates risk assessment during iteration is
called
(a) Waterfall Process
Model (b) Prototype Process Model (c) Spiral Process Model (d) Rapid
Application Development Process Model
Answers:
b) Pseudocode
-
Pseudocode is an informal description of the steps in an algorithm.
(c) HTTP -
HTTP (Hypertext Transfer Protocol) is the protocol used for transmission of
data/information across the internet.
(a) q→p -
The implication p→q is equivalent to its contrapositive, which is q→p.
(d) Dangling
Pointer - When a pointer pointing to a variable goes out of
scope, it is called a dangling pointer.
(b) Encryption -
Encryption is the technique used in cryptography to convert plaintext into a
coded message.
(a) MYSQL -
MySQL is a database management system.
(a) Set of
instructions that can be called repeatedly - A function in
programming is a set of instructions that can be called repeatedly.
(b) Local
Variables - Local variables are used where the scope and
extent of the variable are within the method or statement block in which it is
declared.
(b) Bit -
The smallest unit of storing data is a bit.
(c)
User-Centered Design - User-Centered Design focuses on the
needs and preferences of end-users.
(a) Random
Access Memory (RAM) - RAM holds data and program
instructions that are currently in use.
(d) 128 bits -
IPv6 addresses are 128 bits long.
(d) Last in
First out - Last in First Out (LIFO) is not suitable as a
cache replacement algorithm.
(a)
Hexadecimal Numbers - Computer memory addresses are often
represented using hexadecimal numbers.
(a) Character
encoding set - UNICODE is an example of a character encoding set.
(b) 127.0.0.1
- 127.0.0.1
is the loopback address for the localhost.
(b) Firewall -
A firewall is designed to prevent unauthorized access to a computer network
system.
(b) Menus -
Menus present a choice of operations or services that can be performed by a
system at a given time.
(b) Google
Sheet -
Google Sheets is used to create and edit spreadsheets.
(c)
Customizability - The ability of the user system to
modify the user interface is customizability.
(a) Bubble
Sort -
Bubble sort repeatedly swaps adjacent elements if they are in the wrong order.
(a) Compound
Key -
A candidate key that consists of two or more attributes is called a compound
key.
(d) All of
these
- Any programming language must have constructs to support selection, sequence,
and iteration.
ASCII
stands for American Standard Code for Information Interchange.
(b)
Resolution - Resolution expresses how many pixels are present
in a display or entire screen.
(a) True -
For larger inputs, merge sort is generally faster than insertion sort.
(b) O (n) -
The worst space complexity of a queue is O(n).
(b) HTML -
HTML is not a programming language; it is a markup language for web pages.
(b) Apache -
Apache is a web server, not a web browser.
(c) 12 -
The code adds num1 and num2, resulting in 5 + 7 = 12.
(d) Machine -
The language made up of binary-coded instructions is machine language.
(c) Method
overriding - Method overriding is used to provide the specific implementation
of a method provided by its superclass.
(a) Byte Code
-
Source programs are compiled to an intermediate form called byte code in some
programming languages.
(a) Cyan
Magenta Yellow Black - Color printers use ink cartridges of
cyan, magenta, yellow, and black.
(c) Computer
Understands only binary Language - Computers understand
instructions in binary language.
(d) Hexagon -
Hexagon is not a commonly used computer network topology.
(c) Name size
() -
The correct way to get the length of a string variable in C++ is name.size().
(a) String
name = 'john' - The correct way to declare and initialize a string
variable in C++ is string name = 'john';.
(c)
Encapsulation - Encapsulation describes the bundling of data and
methods operating on this data into one unit.
(a) Machine
Code -
High-level languages do not directly represent machine code.
(c) Program -
When an algorithm is written in the form of a programming language, it becomes
a program.
(c) Int x
Const 5; - The correct way to declare a constant integer in
C++ is const int x = 5;.
(c) System
Software - System software is designed to control the
operations of a computer.
(b) Second
Normal Form - The condition "Every non-prime attribute has
a full functional dependency on a candidate key" is satisfied in the
Second Normal Form.
(c) Spiral
Process Model - The software process model that incorporates risk
assessment during iteration is the Spiral Process Model.
If there is any wrong answer write it in comments with explanation