Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Set-1
9. ……………. Is a pile in which items are added at one end and removed from the other.
A) Stack
B) Queue
C) List
D) None of the above
10. ………… is very useful in situation when data have to stored and then retrieved in reverse order.
A) Stack
B) Queue
C) List
D) Link list
11. Which of the following is not the type of queue?
A) Ordinary queue
B) Single ended queue
C) Circular queue
D) Priority queue
12. The property of binary tree is
A) The first subset is called left subtree
B) The second subtree is called right subtree
C) The root cannot contain NULL
D) The right subtree can be empty
13. State true or false.
i) The degree of root node is always zero.
ii) Nodes that are not root and not leaf are called as internal nodes.
A) True, True
B) True, False
C) False, True
D) False, False
14. Any node is the path from the root to the node is called
A) Successor node
B) Ancestor node
C) Internal node
D) None of the above
15. State true of false.
i) A node is a parent if it has successor nodes.
ii) A node is child node if out degree is one.
A) True, True
Answers
1. D) All of the above
2. A) AVL tree
3. C) Implementation level
4. A) Last in first out
5. C) True, True
6. D) None of above
7. D) None of the above
8. A) push, pop
9. B) Queue
For more MCQs of Data Structure visit: http://www.siteforinfotech.com/p/data-structure-mcq-sets.html
Solved Multiple Choice Questions of Data Structure
10. A) Stack
11. B) Single ended queue
12. D) The right subtree can be empty
13. C) False, True
14. B) Ancestor node
15. B) True, False
16. D) None of the above
17. D) All of the above
18. A) Directed tree
19. B) Binary tree
20. C) True, True
Related Posts
Set-2
1. A directed graph is ………………. if there is a path from each vertex to every other vertex in the
digraph.
A) Weakly connected
B) Strongly Connected
C) Tightly Connected
D) Linearly Connected
2. In the …………….. traversal we process all of a vertex’s descendents before we move to an adjacent
vertex.
A) Depth First
B) Breadth First
C) With First
D) Depth Limited
17. There is an extra element at the head of the list called a ……….
A) Antinel
B) Sentinel
C) List header
D) List head
18. A graph is a collection of nodes, called ………. And line segments called arcs or ……….. that connect
pair of nodes.
A) vertices, edges
B) edges, vertices
C) vertices, paths
D) graph node, edges
19. A ……….. is a graph that has weights of costs associated with its edges.
A) Network
B) Weighted graph
C) Both A and B
D) None A and B
20. In general, the binary search method needs no more than ……………. comparisons.
A) [log2n]-1
B) [logn]+1
C) [log2n]
D) [log2n]+1
Answers
1. B) Strongly Connected
2. A) Depth First
3. B) True, True, False
4. C) a-iii, b-i, c-ii
5. B) (N+1)/2
6. A) Linear search
7. D) True, True
8. C) Merge Sort
9. A) True, True
10. B) Bipartite
11. B) 0 and -1
12. C) r=(r+1)% QUEUE_SIZE
13. C) Both i and ii
14. B) Linked Lists
15. C) 4
16. D) Traversal
17. B) Sentinel
18. A) vertices, edges
19. C) Both A and B
20. D) [log2n]+1
Related Posts
Set-1
11) In a linked list the .......... field contains the address of next element in the list.
A. Link field
B. Next element field
C. Start field
D. Info field
16) A ........ is a linear list in which insertions and deletions are made to from either end of the structure.
A. circular queue
B. random of queue
C. priority
D. dequeue
17) Indexing the........ element in the list is not possible in linked lists.
A. middle
B. first
C. last
D. anywhere in between
18) A linear list in which the pointer points only to the successive node is......
A. singly linked list
B. circular linked list
C. doubly linked list
D. none of the above
19) .......... may take place only when there is some minimum amount (or) no space left in free storage
list.
A. Memory management
B. Garbage collection
C. Recycle bin
D. Memory management
20) A linear list in which the last node points to the first node is ........
A. singly linked list
B. circular linked list
C. doubly linked list
D. none of the above
Answers
1) B. for the size of the structure and the data in the structure are constantly changing.
2) D. traversal
3) A. Underflow
4) A. 2
5) D. List traversed in two directions
6) B. AVAIL
7) A. 0
8) C. circular linked list
9) B. Two fields
10) A. first record of the actual data
11) A. Link field
12) B. predecessor node
13) A. List
14) A. small batches of records from a file
15) B. Sentinel
16) D. dequeue
17) A. middle
18) A. singly linked list
19) B. Garbage collection
20) B. circular linked list
Related Posts
Set-2
1) To insert a new node in linked list free node will be available in........
A. Available list
B. Avail list
C. Free node list
D. Memory space list
3) A ..... list is a header list where the node points back to the header node.
A. Circular header
B. Grounded header
C. Two way header
D. One way header
6) The pointer that points to the first node in the list is........
A. FIRST
B. AVAIL
C. TOP
D. REAR
9) The list that requires two pointer variables FIRST and LAST is called........
A. Circular list
B. Header list
C. One way list
D. Two way list
10) If the availability list is null, then the condition is said to be.........
A. nil block
B. availability list underflow
C. availability list overflow
D. memory loss
13) A .......... is a header list where the last node contains the null pointer.
A. grounded header list
B. bottom header list
C. down header list
D. dropped header list
15) A ............. is a header list where the last node points back to the header node.
A. rounded header list
B. circular header list
C. common header list
D. forward header list
19) Which of the following conditions checks available free space in avail list?
A. Avail=Null
B. Null=Avail
C. Avail=Max stack
D. Avail=Top
20) A linear list in which each node has point to the predecessor and successors nodes is called ........
A. singly linked list
B. circular linked list
C. doubly linked list
D. linear linked list
Answers
1) B. Avail list
2) B. one way chain
3) A. Circular header
4) C. 2
5) A. Polynomials
6) A. FIRST
8) C. two way chain
9) D. Two way list
10) B. availability list underflow
11) C. free pool
12) D. None of the above
13) A. grounded header list
14) A. successor node
15) B. circular header list
16) D. all of the above
17) C. 3
18) A. it is possible to get into infinite loop
19) A. Avail=Null
20) C. doubly linked list
Related Posts
Set-1
1) C. Searching
2) C. Merge Sort
3) A. Insertion sort
4) D. Tree Sort
5) Sorting a file F usually refers to sorting F with respect to a particular key called.....
A. Basic key
B. Primary key
C. Starting key
5) B. Primary key
6) D. O(n logn)
7) Selection sort first finds them .......... element in the list and put it in the first position.
A. Middle element
B. Largest element
C. Last element
D. Smallest element
7) D. Smallest element
9) The operation that combines the element is of A and B in a single sorted list C with n=r+s element is
called....
A. Inserting
B. Mixing
C. Merging
D. Sharing
9) C. Merging
10) C. heap
11) .......... sorting is good to use when alphabetizing large list of names.
A. Merge
B. Heap
C. Radix
D. Bubble
11) C. Radix
13) Which of the following sorting algorithm is of divide and conquer type?
A. Bubble sort
B. Insertion sort
C. Quick sort
D. Merge sort
16) If the number of record to be sorted large and the key is short, then ...... sorting can be efficient.
A. Merge
B. Heap
C. Radix
D. Bubble
16) C. Radix
18) If the number of record to be sorted large and the key is long, then ...... sorting can be efficient.
A. Merge
B. Heap
C. Quick
D. Bubble
18) C. Quick
20) B. O(n2)
Related Posts
Set-2
1) D. Item is the last element in the array or item is not there at all
2) If the number of records to be sorted is small, then ...... sorting can be efficient.
A. Merge
B. Heap
C. Selection
D. Bubble
2) C. Selection
3) The complexity of sorting algorithm measures the ...... as a function of the number n of items to be
sorter.
A. average time
B. running time
C. average-case complexity
D. case-complexity
3) B. running time
4) D. binary search algorithm is not efficient when the data elements more than 1500.
6) D. pointer array
7) A. O(n)
9) C. O(n2)
12) ............order is the best possible for array sorting algorithm which sorts n item.
A. O(n logn)
B. O(n2)
C. O(n+logn)
D. O(logn)
12) C. O(n+logn)
14)........ Sorting algorithm is frequently used when n is small where n is total number of elements.
A. Heap
B. Insertion
C. Bubble
D. Quick
15) Which of the following is not the required condition for binary search algorithm?
A. The list must be sorted
B. There should be the direct access to the middle element in any sub list
C. There must be mechanism to delete and/or insert elements in list.
D. Number values should only be present
Set-1
1) ......... form of access is used to add and remove nodes from a queue.
A. LIFO, Last In First Out
B. FIFO, First In First Out
C. Both a and b
D. None of these
2) A. LIFO
3) B. Back
6) C. Stacks
7) A. Reverse
8) A. Push
9) C. Pop
10) A pointer variable which contains the location at the top element of the stack is called.....
A. Top
B. Last
C. Final
D. End
10) A. Top
Set-2
1) A. Overflow
2) B. Underflow
3) A. Before insertion
5) A. Front=Null
8) ............. is a collection of elements such that each element has been assigned a processing priority.
A. Priority queue
B. Procedure queue
C. Main queue
D. Interrupt queue
8) A. Priority queue
9) Link fields hold pointers to the .......... element in the linked representation of stack.
A. Neighboring
B. Last
C. First
D. Middle
9) A. Neighboring
10) Reversing a great deal of space for each stack in memory will...........
A. Decrease the numbers of times overflow may occur
B. Increase the numbers of times overflow may occur
C. Increase the number of times underflow may occur
D. Increase the number of times underflow may occur.
Set-1
1) D. traversal
2) A. Threaded trees
3) B. Terminal nodes
4) Trees are said .......... if they are similar and have same contents at corresponding nodes.
A. Duplicate
B. Carbon copy
C. Replica
D. Copies
4) D. Copies
5) Every node N in a binary tree T except the root has a unique parent called the ......... of N.
A. Antecedents
B. Predecessor
C. Forerunner
D. Precursor
5) B. Predecessor
7) C. Empty
8) C. 3
9) D. External node
Set-2
1) While converting binary tree into extended binary tree, all the original nodes in binary tree are.......
A. Internal nodes on extended tree
B. External nodes on extended tree
C. Vanished on extended tree
D. Intermediate nodes on extended tree
2) In a binary tree, certain null entries are replaced by special pointers which point to nodes higher in
the tree for efficiency. These special pointers are called.........
A. Leaf
B. Branch
C. Path
D. Thread
2) D. Thread
3) The in order traversal of tree will yield a sorted listing of elements of tree in....
A. Binary trees
B. Binary search trees
C. Merging
D. AVL Trees
4) A binary tree whose every node has either zero or two children is called.........
A. Complete binary tree
B. Binary Search tree
C. Extended binary tree
D. E2 tree
5) The post order traversal of a binary tree is DEBFCA. Find out the pre order Traversal.
A. ABFCDE
B. ADBFEC
For more MCQs of Data Structure visit: http://www.siteforinfotech.com/p/data-structure-mcq-sets.html
Solved Multiple Choice Questions of Data Structure
C. ABDECF
D. ABDCEF
5) C. ABDECF
6) B. FAEKCDHGB
7) In linked representation of Binary trees LEFT[k] contains the ........ of at the node N, where k is the
location.
A. Data
B. Location and left child
C. Right child address
D. Null value
7) A. Data
10) B. Leaf
Related Posts
Set-3
2) B. Edge
3) D. Path
7) C. Threads
8) A graph is said to be ........... if there is a path between any two of its nodes
A. Connected
B. Coupled
C. Attached
D. Allied
8) A. Connected
9) D. Complete
11) D. Digraph
12) Graph G is .............. if for any pair u, v of nodes in G there is a path from u to v or path from v to u.
A. Leterally connected
B. Widely Connected
C. Unliterally connected
D. Literally connected
Related Posts
UNIVERSITY OF CALICUT
B.Com
(Specialisation - Computer Application)
V Semester
FUNDAMENTALS OF COMPUTERS
Question Bank & Answer Key
9. ..........is a combination of hardware and software that facilitates the sharing of information
between computing devices.
a. network b. peripheral c. expansion board d. digital device
10. Coded entries which are used to gain access to a computer system are called
a. Entry codes b. Passwords c. Security commands d. Code words
11. Which of the following statements is true ?
a. Minicomputer works faster than Microcomputer
b. Microcomputer works faster than Minicomputer
c. Speed of both the computers is the same
d. The speeds of both these computers cannot be compared with the speed of advanced
12. You organize files by storing them in
a. archives b. folders c. indexes d. lists
13. What type of resource is most likely to be a shared common resource in a computer
Network?
a. Printers b. Speakers c. Floppy disk drives d. Keyboards
14. Which device is required for the Internet connection?
a. Joystick b. Modem c. CD Drive d. NIC Card
15. What is a light pen?
a. A Mechanical Input device b. Optical input device
c. Electronic input device d. Optical output device
16. UNIVAC is
a. Universal Automatic Computer b. Universal Array Computer
c. Unique Automatic Computer d. Unvalued Automatic Computer
17. CD-ROM stands for
a. Compactable Read Only Memory b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory d. Compact Disk Read Only Memory
18. ALU is
a. Arithmetic Logic Unit b. Array Logic Unit
c. Application Logic Unit d. None of above
19. VGA is
a. Video Graphics Array b. Visual Graphics Array
c. Volatile Graphics Array d. Video Graphics Adapter
20. IBM 1401 is
a. First Generation Computer b. Second Generation Computer
c. Third Generation Computer d . Fourth Generation Computer
32. The amount of vertical space between lines of text in a document is called
a. double-space b. line spacing c. single space d. vertical spacing
33. Example of non-numeric data is
a. Employee address b. Examination score c. Bank balance d. All of these
34. What is embedded system?
a. The programme which arrives by being wrapped in box.
b. The programme which is the permanent part of the computer
c. The computer which is the part of a big computer
d. The computer and software system that control the machine
35. First page of Website is termed as-
a. Homepage b. Index c. JAVA script d. Bookmark
36. . ..................... Is the appearance of typed characters?
a. Size b. Format c. Point d. Colour
37. When a file is saved for the first time
a. a copy is automatically printed
b. it must be given a name to identify it
c. it does not need a name
d. it only needs a name if it is not going to be printed
38. Office LANS, which are scattered geographically on large scale, can be connected by the use
of corporate
a. CAN b. LAN c. DAN d. WAN
39. Where are data and programme stored when the processor uses them?
a. Main memory b. Secondary memory
c. Disk memory d. Programme memory
40. . ............... represents raw facts, where-as................. is data made meaningful.
a. Information, reporting b. Data, information
c. Information, bits d. Records, bytes
41. What characteristic of read-only memory (ROM) makes it useful?
a. ROM information can be easily updated.
b. Data in ROM is non-volatile, that is, it remains there even without electrical power.
c. ROM provides very large amounts of inexpensive data storage.
d. ROM chips are easily swapped between different brands of computers.
42. What do you call the programs that are used to find out possible faults and their causes?
a. operating system extensions b. cookies
c. diagnostic software d. boot diskettes
76. The system unit of a personal computer typically contains all of the following except:
a. Microprocessor b. Disk controller c. Serial interface d. Modem
77. A computer program that converts an entire program into machine language is called a/an
a. Interpreter b. Simulator c. Compiler d. Commander
78. A computer program that translates one program instructions at a time into machine language
is called a/an
a. Interpreter b. CPU c. Compiler d. Simulator
79. A small or intelligent device is so called because it contains within it a
a. Computer b. Microcomputer c. Programmable d. Sensor
80. A fault in a computer program which prevents it from working correctly is known as
a. Boot b. Bug c. Biff d. Strap
81. A self replicating program, similar to a virus which was taken from a 1970s science fiction
novel by John Bruner entitled the Shockwave Rider is
a. Bug b. Vice c. Lice d. Worm
82. A state. is a bi-stable electronic circuit that has
a. Multivibrator b. Flip-flop c. Logic gates d. laten
83. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
a. Spam b. Trash c. Calibri d. Courier
84. DOS stands for
a. Disk Operating System b. Disk operating session
c. Digital Operating System d. Digital Open system
85. Who is the chief of Microsoft
a. Babbage b. Bill Gates c. Bill Clinton d. none of these
86. Which of the following are input devices?
a. Keyboard b. Mouse c. Card reader d. Any of these
87. Examples of output devices are
a. Screen b. Printer c. Speaker d. All of these
88. Which of the following is also known as brain of computer
a. Control unit b. Central Processing unit
c. Arithmetic and language unit d. Monitor
89. IBM stands for
a. Internal Business Management b. International Business Management
c. International Business Machines d. Internal Business Machines
90. ............ translates and executes program at run time line by line
a. Compiler b. Interpreter
c. Linker d. Loader
105. Data becomes ................ when it is presented in a format that people can understand
and use
a. processed b. graphs c. information d. presentation
106. The term ............. designates equipment that might be added to a computer system to
enhance its functionality.
a. digital device b. system add-on c. disk pack d. peripheral device
107. A ............ is a microprocessor -based computing device.
a. personal computer b. mainframe c. workstation d. server
108. RAM can be treated as the ......... for the computer's processor
a. factory b. operating room c. waiting room d. planning room
109. Which of the following are the functions of a operating system
a. Allocates resources b. Monitors Activities
c. Manages disks and files d. All of the above
110. To move a copy of file from one computer to another over a communication channel is
called?
a. File transfer b. File encryption
c. File modification d. File copying
111. The primary function of the ............ is to set up the hardware and load and start an
operating system
a. System Programs b. BIOS
c. CP d. Memory
112. What kind of memory is both static and non -volatile?
a. RAM b. ROM c. BIOS d. CACHE
113. .......... is computer software designed to operate the computer hardware and to provide
platform for running application software
a. Application software b. System software
c. Software d. Operating system
114. The ......... is the amount of data that a storage device can move from the storage
medium to the Computer per second
a. data migration rate b. data digitizing rate
c. data transfer rate d. data access rate
115. A device, which is not connected to CPU, is called as .......
a. land-line device b. On-line device
c. Off-line device d. Device
116. What is the other name for programmed chip?
a. RAM b. ROM c. LSIC d. PROM
175. Collecting personal information and effectively posing as another individual is known
as the crime of:
a. Spooling. b. Identity theft.
c. Spoofing. d. Hacking.
176. Malicious software is known as:
a. Badware. b. Malware.
c. Maliciousware. d. Illegalware.
177. A program that performs a useful task while simultaneously allowing destructive acts is
a:
a. Worm. b. Trojan horse.
c. Virus. d. Macro virus.
178. An intentionally disruptive program that spreads from program to program or from disk
to disk is known as a:
a. Trojan horse. b. Virus.
c. Time bomb. d. Time-related bomb sequence.
179. In 1999, the Melissa virus was a widely publicised:
a. E-mail virus. b. Macro virus.
c. Trojan horse. d. Time bomb.
180. What type of virus uses computer hosts to reproduce itself?
a. Time bomb b. Worm
c. Melissa virus d. Macro virus
181. The thing that eventually terminates a worm virus is a lack of:
a. Memory or disk space. b. Time.
c. CD drives space. d. CD-RW.
182. When a logic bomb is activated by a time-related event, it is known as a:
a. Time-related bomb sequence. b. Virus.
c. Time bomb. d. Trojan horse.
183. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
a. Time-related bomb sequence. b. Virus.
c. Time bomb. d. Trojan horse.
184. What is the name of an application program that gathers user information and sends it
to someone through the Internet?
a. A virus b. Spybot
c. Logic bomb d. Security patch
185. ------ is the measurement of things such as fingerprints and retinal scans used for
security access.
a. Biometrics b. Bio measurement
c. Computer security d. Smart weapon machinery
186. What is the most common tool used to restrict access to a computer system?
a. User logins b. Passwords
b. Computer keys d. Access-control software
187. Hardware or software designed to guard against unauthorized access to a computer
network is known as a(n):
a. Hacker-proof program. b. Firewall.
c. Hacker-resistant server. d. Encryption safe wall.
188. The scrambling of code is known as:
a. Encryption. b. a firewall.
c. Scrambling. d. Password proofing.
189. To prevent the loss of data during power failures, use a(n):
a. Encryption program. b. Surge protector.
c. Firewall. d. UPS.
190. ------Is defined as any crime completed through the use of computer technology.
a. Computer forensics b. Computer crime
c. Hacking d. Cracking
191. ------ refers to electronic trespassing or criminal hacking.
a. Cracking b. Jacking
c. Spoofing d. Smarming
192. The first electronic computer was developed by
a. J.V. Attansoff b. Bill Gates
c. Simur Cray d. Winton Serf
193. Snowbol is an/a---------
a. Operating system b. HLL
c. Software d. Search engine
194. Switching device of fifth generation computer is--------
a. Vacuum tubes b. Transistors
c. IC d. VLSI
195. ---------- computers operates essentially by counting
a. Portable computer b. Hybrid computer
c. Analog computer d. Digital computer
196. ---------- computer is small general purpose micro computer, but larger than portable
computer
a. Hybrid b. Digital c. Desktop d. Laptop
197. Cathode Ray Tube is a form of.......
a. Keyboard b. Mouse c. Monitor d. Mother board
198. Trackball is a...........
a. Input device b. Output device
c. Programming language d. Software
199. ............. computer is a medium sized computer
a. Micro b. Mainframe c. Super d. Mini
200. ........... computer are of large size
a. Micro b. Mainframe c. Super d. Mini
201. Note book, laptop,palm,hand-held computers are coming under the category of.........
computer
a. Digital computer b. Mainframe computer
c. Portable computer d. Hybrid computer
202. Light pen and joystick are............
a. Algorithm b. Input devices
c. Output devices d. Portals
203. Touch Screen is............
a. Input device b. Output device
c. Both a & b above d. None of these
204. .............printer is the cheapest in terms of price and operating cost
a. Inkjet b. Laser
c. Thermal d. Dot matrix
205. .......... printer is a non-impact printer and is quite in working
a. Inkjet b. Laser
c. Thermal d. Dot matrix
206. .......... are high-end printers
a. Inkjet b. Laser
c. Thermal d. Dot matrix
207. ......... are used for plotting graphs and design on papers
a. Trackball b. Joystick
c. Light pen d. Plotters
208. Daisy wheel, Drum, chain etc are the .............
a. Flow chart b. Mouse
a. Super computer b. PC
c. Laptop d. PDA
ANSWER KEY
Q.No
Answer Q.No Answer Q.No Answer Q.No Answer Q.No Answer
1 a 55 b 109 d 163 c 217 c
2 b 56 c 110 a 164 b 218 c
3 b 57 c 111 b 165 d 219 c
4 a 58 b 112 b 166 d 220 b
5 a 59 a 113 b 167 b 221 c
6 c 60 d 114 c 168 a 222 a
7 a 61 a 115 c 169 b 223 b
8 b 62 b 116 c 170 d 224 b
9 a 63 b 117 c 171 d 225 b
10 b 64 c 118 b 172 c 226 a
11 a 65 c 119 b 173 b
12 b 66 a 120 a 174 c
13 a 67 c 121 a 175 b
14 b 68 d 122 c 176 b
15 b 69 d 123 b 177 b
16 a 70 d 124 a 178 b
17 a 71 c 125 a 179 a
18 a 72 b 126 a 180 b
19 a 73 b 127 b 181 a
20 b 74 a 128 a 182 c
21 a 75 b 129 a 183 c
22 d 76 d 130 a 184 b
23 b 77 c 131 b 185 a
24 a 78 a 132 c 186 b
25 a 79 d 133 b 187 b
26 d 80 b 134 b 188 a
27 a 81 d 135 d 189 d
28 a 82 b 136 b 190 b
29 b 83 a 137 b 191 a
30 c 84 a 138 c 192 a
31 c 85 b 139 c 193 b
32 b 86 d 140 a 194 d
33 a 87 d 141 b 195 d
34 d 88 b 142 c 196 c
35 a 89 c 143 a 197 c
36 b 90 b 144 c 198 a
37 b 91 c 145 a 199 d
38 d 92 a 146 d 200 b
39 a 93 d 147 c 201 c
40 b 94 a 148 d 202 b
41 b 95 a 149 b 203 c
42 c 96 a 150 d 204 d
43 d 97 c 151 a 205 a
44 c 98 a 152 c 206 b
45 b 99 a 153 b 207 d
46 b 100 a 154 a 208 d
47 d 101 b 155 b 209 b
48 b 102 c 156 b 210 c
49 c 103 c 157 b 211 d
50 d 104 d 158 d 212 d
51 b 105 c 159 c 213 d
52 a 106 d 160 d 214 d
53 c 107 a 161 b 215 a
54 a 108 c 162 d 216 a
QUES.Which of the following type of class allows only one object of it to be created?
A.Virtual class
B.Abstract class
C.Singleton class
D.Friend class
A.Copy constructor
B.Friend constructor
C.Default constructor
D.Parameterized constructor
a.Static function
b.Friend function
c.Const function
d.Virtual function
QUES.Which of the following concepts means determining at runtime what method to
invoke?
A.Data hiding
B.Dynamic Typing
C.Dynamic binding
D.Dynamic loading
QUES.Which of the following term is used for a function defined inside a class?
A.Member Variable
B.Member function
C.Class function
D.Classic function
A.Call by value
B.Call by reference
C.Default arguments
D.Call by pointer
A.Function
B.Class
C.Object
D.Operator function
A.Encapsulation
B.Abstraction
C.Data hiding
QUES.Which of the following concepts means determining at runtime what method to
invoke?
A.Data hiding
B.Dynamic Typing
C.Dynamic binding
D.Dynamic loading
QUES.Which of the following term is used for a function defined inside a class?
A.Member Variable
B.Member function
C.Class function
D.Classic function
A.Call by value
B.Call by reference
C.Default arguments
D.Call by pointer
A.Function
B.Class
C.Object
D.Operator function
A.Encapsulation
B.Abstraction
C.Data hiding
D.Data binding
A.Operator
B.Function
C.Object
D.Macro
QUES.Which of the following concepts provides facility of using object of one class inside
another class?
A.Encapsulation
B.Abstraction
C.Composition
D.Inheritance
A.1
B.2
C.3
D.4
A.Int
B.Double
C.String
D.Class
A.Data hiding
B.Dynamic typing
C.Dynamic binding
D.Dynamic loading
A.Top-down
B.Bottom-up
C.Right-left
D.Left-right
D.Both A and B.
B.class data members are public by default while that of structure are private.
QUES.Which of the following concepts means wrapping up of data and functions together?
A.Abstraction
B.Encapsulation
C.Inheritance
D.Polymorphism
QUES.Which of the following concepts means waiting until runtime to determine which
function to call?
A.Data hiding
B.Dynamic casting
C.Dynamic binding
D.Dynamic loading
A.>>
B.<<
C.+
D.=
A.iostream
B.istream
C.ostream
D.ifstream
A.Class
B.member functions
C.Constructor
D.Destructor
D.Initialize objects
QUES. Which one of the following options is correct about the statement given below? The
compiler checks the type of reference in the object and not the type of object.
A.Inheritance
B.Polymorphism
C.Abstraction
D.Encapsulation
D.Both A and B
A.Virtual function
B.Operator function
C.Const function
D.Static function
D.Both A and B.
QUES.Which of the following factors supports the statement that reusability is a desirable
feature of a language?
D.Both A and B.
QUES.Which of the following ways are legal to access a class data member using this
pointer?
A.this->x
B.this.x
C.*this.x
D.*this-x
A.Operator overloading
B.Function overloading
C.Templates
A.Only I is true.
C.Only II is true.
QUES.What happens if the base and derived class contains definition of a function with same
prototype?
D.Base class object will call base class function and derived class object will call derived
class function.
QUES.Which of the following are available only in the class hierarchy chain?
D.Member functions
A.Multiple
B.Multilevel
C.Distributive
D.Hierarchical
A.[]
B.->
C.?:
D.*
QUES.In which of the following a virtual call is resolved at the time of compilation?
D.Both A and B.
D.Both A and C
QUES.Which one of the following is the correct way to declare a pure virtual function?
D.void Display(void) = 0;
QUES. Which of the following header file includes definition of cin and cout?
A.istream.h
B.ostream.h
C.iomanip.h
D.iostream.h
A.overload
B.operator
C.friend
D.override
D.Both A and B.
{}
A.Multilevel inheritance
B.Multiple inheritance
C.Hybrid inheritance
D.Hierarchical Inheritance
QUES.Which one of the following is correct about the statements given below?
A.Only II is correct.
C.Only I is correct.
A.public
B.private
C.protected
D.friend
A.protected
B.public
C.private
D.friend
QUES.What is correct about the static data member of a class?
A.A static member function can access only static data members of a class.
B.A static data member is shared among all the object of the class.
D.Both A and B.
A.Abstraction
B.Inheritance
C.Dynamic binding
D.Encapsulation
B.Donald E. Knuth
D.Bjame Stroustrup
b)By making all the methods abstract using the keyword ‘abstract’ in a class
a)By providing at least one pure virtual method (function signature followed by ==0;)
in a class
‘abstract’ in a class
a)It is cost-effective
a)Namespaces refer to the memory space allocated for names used in a program
d)Namespaces provide facilities for organizing the names in a program to avoid name
clashes.
a)Namespaces refer to the memory space allocated for names used in a program
d)namespaces provide facilities for organizing the names in a program to avoid name
clashes
a)Exception Handling
b)Reflection
c)Operator Overloading
d)Namespaces
a)Polymorphic inheritance
b)Multilevel inheritance
c)Hierarchical inheritance
d)Multiple inheritance
QUES:A constructor that does not have any parameters is called____________ constructor.
a. Custom
b. dynamic
c. static
d. default
QUES:If default constructor is not defined, then how the objects of the class will be created?
d.none of these
a. Only 1,2,4
b. 1,2,4,5
c. 1,3,5
d. 1,4,5
d. None of these
a. throws
b. throw
c. threw
d. thrown
QUES:The code of statements which may cause abnormal termination of the program should
be written under_________ block
a. try
b. catch
c. Finally
d. None of these
a. Try
b. catch
c. throw
d. finally
QUES:In C++ how many return statements are allowed in a non-void function?
a) 1
b) as many as you like
c) 0
d) 2
a. auto
b. void
c. asm
d. None of these
a. True
b. False
a. virtual function
b. static function
c. friend function
d. const member function
QUES:When a virtual function is redefined by the derived class, it is called___________
a. Overloading
b. Overriding
c. Rewriting
d. All of these
a. Virtual class
b. Sealed class
c. Pure Local class
d. Abstract Class
a. Derived class should provide definition for all the pure virtual functions
b. Derived class also become abstract if fails to implement pure virtual functions
c. Objects of derived class can’t be created if it fails to implement pure virtual functions
d. All of these
QUES:A virtual function that has no definition within the base class is called____________
a. Polymorphism
b. Encapsulation
c. Inheritance
d. Both a and c
QUES:When a child class inherits traits from more than one parent class, this type of
inheritance is called _______________ inheritance.
a. Hierarchical
b. Hybrid
c. Multilevel
d. Multiple
QUES:class X, class Y and class Z are derived from class BASE. This is _____________
inheritance
a. Multiple
b. Multilevel
c. Hierarchical
d. Single
QUES:The derivation of Child class from Base class is indicated by ____ symbol.
a. ::
b. :
c. ;
d. |
QUES: If the derived class is struct, then default visibility mode is_______
a. public
b. protected
c. private
d. struct can’t inherit class
a. protected members of the base class become private members of derived class
b. public members of the base class become private members of derived class
c. both a and b
QUES:A class can contain objects of other classes and this phenomenon is
called__________
a. Relationship
b. Object Association
c. Containership
d. None of these
a . ->*
b. .*
c. ::*
d. both a and b
a. Data Hiding
b. Data Encapsulation
c. Data Abstraction
d. All of these
QUES:Only functions of the class can access the data of the class and they(functions)
provides the interface between data, objects and the program. This kind isolation of the data
from direct access by the program is called_______________
a. Data Abstraction
b. Data Hiding
c. Data Binding
d. Data Encapsulation
QUES: __________________ is the OOP feature and mechanism that binds together code
and the data it manipulates, and keep both safe from outside world.
a. Data Binding
b. Data Encapsulation
c. Data Storing
d. Data Abstraction
a. top-down
b. procedural
c. bottom-up
d. all of these.
a. Operator
b. Functions
c. Objects
d. Data types
a. Nested class
b. Block class
c. Local class
d. It is not possible
a)overloading
b)overriding
c)static binding
d)dynamic binding
QUES:In multiple inheritance
a) return function
b) caller
c) called function
d) none of the mentioned
QUES:Which other keywords are also used to declare the class other than class?
a) struct
b) union
c) object
d) both a & b
d)template;
A) int x;
B) int &x;
C) ptr x;
D) int *x;
QUES:. The compilers converts all operands upto to type of the largest operand is called as
…………
A) typeconversion
B) expression
C) evaluation
D) precedence
A)Operator overloading
B)Function overloading
C)Templates
QUES.What happens if the base and derived class contains definition of a function with same
prototype?
D)Base class object will call base class function and derived class object will call derived
class function.
A)Data hiding
B)Dynamic typing
C)Dynamic binding
D)Dynamic loading
A)Virtual polymorphism
B)Transient polymorphism
C)Ad-hoc polymorphism
D)Pseudo polymorphism
QUES.. What does a default header file contain?
a) prototype
b) implementation
c) declarations
d) none of the mentioned
QUES.In which type does the enumerators are stored by the compiler?
a) string
b) integer
c) float
d) none of the mentioned
1. */ Comments */.
2. ** Comment **.
3. /* Comment */.
4. { Comment }.
a. Start().
b. System().
c. Main().
d. Program().
QUES.What punctuation is used to signal the beginning and end of code blocks?
a. { }.
d. ( and ).
b. Real.
c. Int.
d. Double.
a. :=
.b. =.
c. equal.
d. = =.
a. &.
b. &&.
c. |.
d. |&.
QUES.There is a unique function in C++ program by where all C++ programs start their
execution with ______________.
a. start().
b. begin().
c. main().
d. output().
b. Static
c. Register
d. Auto
a. 0.
b. Infinitely.
c. 1.
d. Variable.
a. Break.
b. Goto
c. Exit.
d. Switch.
QUES.In a group of nested loops, which loop is executed the most number of times?
d. Cannot be determined without knowing the size of the loops bottom of form
b. iteration.
c. culmination.
d. pass through.
QUES.. Which looping process checks the test condition at the end of the loop?
a. For.
b. While.
c. Do-while.
a. 1.
b. 2.
c. 3.
d. 4.
QUES.. Variables that are declared, but not initialized, contain __________.
a. blank spaces.
b. zeros.
c. “garbage” values.
a. 0.
b. 1.
c. 2.
d. none of these.
QUES.. Variables with names that describe the data stored at that particular memory location
are called ________________.
a. identifiers.
d. mnemonic variables.
a. identifier.
b. constant.
c. data type.
d. base.
1. variable_name=expression.
2. datatype=expression.
3. variable=expression.
4. datatype=expression1.
QUES.. The compilers convert all operands up to the type of the largest operand are called as
______.
1. expression.
2. evaluaton.
3. typeconversion.
4. precence.
QUES. ______ variables are permanent variables within their own function or file.
1. Auto.
2. Static.
3. Extern.
4. Register.
1. auto.
2. static.
3. extern.
4. register .
ANSWER: D
QUES.. _______ is referred to fixed value that the program may not alter.
1. Constant.
2. Variable.
3. Expression.
4. Keywords.
ANSWER: A
QUES. _____ is a named location in memory that is used t hold the value that may be
modified by the program.
1. Expression.
2. Keyword.
3. Variable.
4. Identifiers.
ANSWER: C
1. array declaration.
2. class definition.
3. pointer declaration.
4. variable declaration.
ANSWER: B
1. public.
2. private.
3. protected .
4. automatic.
ANSWER: C
QUES.. _______ is the elements of a class that are called member or data member.
1. Pointer.
2. Variable.
3. Character.
4. Identifier.
ANSWER: B
QUES.A ________ function has access to all private and protected members of the class for
which it is a friend.
1. friend.
2. member.
3. nonmember.
4. void.
1. Friend.
2. Member.
3. Inline.
4. Void.
ANSWER: C
1. Constructor .
2. Destructor.
3. Array.
4. Pointer.
ANSWER: A
1. Objects.
2. Destructors .
3. Arrays.
4. Reference.
ANSWER: B
QUES.. Which of the following type of class allows only one object of it to be created?
1. Virtual class
2. Abstract class
3. Singleton class
4. Friend class
ANSWER: C
1. structure.
2. union.
3. enumeration.
4. type def.
ANSWER: A
QUES.. ________ function is a function that calls itself repeatedly.
1. friend.
2. inline.
3. recursive .
4. member.
ANSWER: C
1. reference.
2. structure.
3. pointer.
4. array.
ANSWER: A
QUES.. ________ is the process of using the same name for two or more functions.
1. Function Overloading.
2. Operator Overloading.
3. Default Function.
4. Constructors.
ANSWER: A
QUES.. _____ is used to prevent problems when one object is used to initialize others.
1. Default Constructor.
2. Parameterized Constructor.
3. Copy Constructor.
4. Overloading Operator.
ANSWER: C
1. Keywords.
2. Variables.
3. Identifiers.
4. Operators.
ANSWER: D
QUES.. _________ function is not a member of the class which does not have “this” pointer.
1. Inline.
2. Friend.
3. Member.
4. Void.
ANSWER: B
QUES. The ______ function receives the pointer to the region of memory to be free.
1. new.
2. delete.
3. free.
4. alloc.
ANSWER: B
ANSWER: A
QUES.. The class that acquires the properties of parent class is called _________ class.
1. base.
2. inherited.
3. derived.
4. public.
ANSWER: C
1. class.
2. variable.
3. array.
4. pointer.
ANSWER: A
QUES.The inherited member access specification is to employ _______ within the derived
class.
1. class declaration.
2. private declaration.
3. public declaration.
4. access declaration.
ANSWER: D
QUES.. The ______ is used to create generic function and classes.
1. class.
2. template.
3. specifier.
4. identifier.
ANSWER: B
QUES.. The _________ defines a general set of operation that will be applied to various
types of data.
1. generic function.
2. member function.
3. function overloading.
4. operator overloading.
ANSWER: A
QUES.. The function ________ displays its first argument at the tab position requested by its
argument.
1. tab.
2. out .
3. tabout.
4. tab( ).
ANSWER: C
1. tabout ( ).
2. tab.
3. out.
4. tab ( ).
ANSWER: B
1. Default
2. Break
3. Protected
4. Asm
ANSWER: C
1. Pointer.
2. This.
3. Enum.
4. Array.
ANSWER:2
1. constructor.
2. destructor.
3. pointer.
4. temp.
ANSWER: C
QUES. ________ is a unary operator that returns the memory address of its operand.
1. &.
2. ++.
3. _ _.
4. ||.
ANSWER: A
1. cin.
2. gets.
3. out.
4. cout.
ANSWER: D
QUES.The functions that are used to access the file in non-sequential fashion _______ and
_____.
1. seekf( ) , seekp ( ).
2. seekg( ), seekp( ).
3. seekp( ), seekf ( ).
4. beg( ), seekx( ).
ANSWER: B
1. keyword.
2. address.
3. type.
4. pointer.
ANSWER: C
1. generic.
2. template.
3. virtual.
4. friend.
ANSWER: B
1. wrong_alloc.
2. re_alloc.
3. malloc.
4. bad_alloc.
ANSWER: D
1. view.
2. using.
3. additive.
4. show.
ANSWER: B
1. Static.
2. Dynamic.
3. Typeid.
4. Typedef.
ANSWER: C
QUES.. The current position of each file pointer using the functions _____ and _____.
ANSWER: A
1. eof( ).
2. getline( ).
3. putline( ).
4. clear( ).
ANSWER: A
1. sw.
2. ws.
3. wt.
4. skipws.
ANSWER: B
QUES.. The ______ is a short function that gets or sets the value of a private instance
variable.
1. inline.
2. friend.
3. accessor.
4. void.
ANSWER: C
ANSWER: A
ANSWER: A
1. stdio.
2. iostream.
3. conio.
4. std.
ANSWER: B
1. out.
2. print.
3. cin.
4. cout.
ANSWER: D
1. function.
2. structure.
3. variable.
4. key word.
ANSWER: C
QUES.. _____ is the data type that can accommodate char that require more than 8-bits.
1. char.
2. wchar_t.
3. w char.
4. char_t.
ANSWER: B
1. wout.
2. print.
3. w_cout.
4. cout.
ANSWER: A
1. back space.
2. new line.
3. octal number.
4. hexadecimal number.
ANSWER: C
1. free.
2. delete.
3. clear.
4. remove.
ANSWER: A
1. l value.
2. r value.
3. value.
4. assignment.
ANSWER: A
1. insertion.
2. extraction.
3. greater than.
4. lesser than.
ANSWER: B
1. . !.
2. &&.
3. %.
4. /.
ANSWER: C
QUES.. ____________ operation inserts zero bits into low order bits of result.
1. shift.
2. shifting left.
3. shifting right.
4. append.
ANSWER: B
1. -=.
2. &=.
3. ^=.
4. *=.
ANSWER: C
1. ?: .
2. ?: =.
3. :?.
4. ?=.
ANSWER: A
1. %.
2. ( ).
3. ||.
4. ?:.
ANSWER: B
1. global.
2. local.
3. file.
4. function.
ANSWER: D
QUES.When local & global variable have same name to refer global variable_____________
operator is used.
1. ?:
2. :
3. ::
4. <<
ANSWER: C
QUES.. The result of a relational or logical expression is of type _________.
1. integer.
2. float.
3. boolean.
4. character.
ANSWER: c
QUES.. A _____________ local variable preserves its variable between function calls.
1. extern.
2. static.
3. register.
4. auto.
ANSWER: B
1. xtern.
2. static.
3. register.
4. auto.
ANSWER: C
QUES.. Which one of the following is correct assignment of the variable min to zero?
1. min = = 0;
2. min =+ 0
3. min = 0;
4. min ++ 0
ANSWER: C
1. printer.
2. keyboard.
3. CPU.
4. mouse.
ANSWER: B
1. >>.
2. <.
3. >.
4. <<.
ANSWER: D
1. 1count .
2. count.
3. counta.
4. count_a.
ANSWER: A
QUES.. A/An ________ integer can hold both positive and negative values.
1. unsigned.
2. positive.
3. negative.
4. signed.
ANSWER: D
QUES.. The primary difference between float and double is in the ____ of the value they
hold.
1. address.
2. magnitude.
3. sign.
4. decimal point.
ANSWER: B
1. int.
2. float.
3. bool.
4. void.
ANSWER: D
1. \b.
2. \s.
3. \bs.
4. \ba.
ANSWER: A
QUES.The specification of the number 100 as long int is _____.
100. L100.
101. 100.
102. 100L.
103. 100I.
ANSWER: C
1. Data hiding
2. Dynamic Typing
3. Dynamic binding
4. Dynamic loading
ANSWER: C
QUES.. The automatic conversion of all char and short int values to int is called _______.
1. integral promotion .
2. type promotion.
3. value promotion.
4. cast.
ANSWER: A
QUES.The operands converted up to the type of largest operands are called _____.
1. integral promotion.
2. type promotion.
3. value promotion.
4. cast.
ANSWER: B
1. data.
2. index.
3. elements.
4. subscripts.
ANSWER: C
QUES.. The elements of an array can be accessed by providing integer expression called
____.
1. superscripts.
2. elements.
3. values.
4. subscripts.
ANSWER: D
QES.. The second element of the array int zones[5]= { 43,54,56,76,78} can be accessed by
________.
1. zones[2].
2. zones[1].
3. zones[3].
4. zones[4].
ANSWER: B
ANSWER: A
QUES.. In a two dimensional array called list with dimensions 4 X 9 the element 2,3 can be
accessed by using the expression _____.
1. list[3][2].
2. list[2,3].
3. list[2][3].
4. list[3,2].
ANSWER: C
QUES.. The size of operator returns the size of variable or type in _____.
1. bits.
2. nibble.
3. bytes.
4. char.
ANSWER: C
1. compile time.
2. intrinsic.
3. extraction.
4. ternary.
ANSWER: A
1. *.
2. &.
3. &&.
4. ~.
ANSWER: B
ANSWER: A
QUES.. Which of the following is not true with the reference variable?
1. References eliminate the overhead associated with passing large data structures as
parameters.
2. It cannot be used to reduce complex notation .
3. References eliminate pointer dereference notation.
4. It is a copy alias for another variable.
ANSWER: B
1. register.
2. static.
3. extern.
4. auto.
ANSWER: C
1. iteration.
2. jump.
3. selection.
4. conditional.
ANSWER: C
QUES.The conditional expressions are evaluated from _____.
1. top down.
2. bottom up.
3. middle.
4. end.
ANSWER:A
1. for.
2. if.
3. if else.
4. switch.
ANSWER: D
QUES.. Variables that are declared, but not initialized, contain _______.
1. blank spaces.
2. zeros.
3. “garbage” values .
4. nothing – they are empty.
ANSWER: C
1. char,float.
2. float,int.
3. int, char.
4. char, float.
ANSWER: C
QUES.. The code and data are called ______ of the class.
1. instances.
2. instance variables.
3. members.
4. object.
ANSWER: C
1. data.
2. code.
3. object.
4. function.
ANSWER: A
1. object.
2. template.
3. function.
4. array.
ANSWER: C
QUES.. ___ operator links the name of the object with the name of the member.
1. ->
2. .(Dot)
3. &
4. *
ANSWER: B
QUES.. Each object has its own copies of the class _______.
1. data.
2. code.
3. function.
4. instance variables.
ANSWER: D
1. ::
2. .
3. ->.
4. *.
ANSWER: A
1. start().
2. begin().
3. main().
4. output().
ANSWER: C
QUES.The _____ function is a short function that gets or sets the value of a private instance
variable.
1. inline.
2. accessor.
3. member.
4. recursive.
ANSWER: B
QUES. Inline is a ____
1. command.
2. statement.
3. request .
4. class.
ANSWER: C
1. inline.
2. accessor.
3. member.
4. recursive
ANSWER: A
QUES.A ___ declaration defines a new type that links code and data.
1. class.
2. array.
3. pointer.
4. variable.
ANSWER: A
QUES.. A ________ converts from an object of the type of the constructor parameter to an
object of the class.
1. conversion function.
2. member function.
3. class conversion.
4. conversion constructors.
ANSWER: D
QUES. ________ function converts an object of the class in which you define the function to
an object of different data type.
1. conversion function.
2. member function.
3. class conversion.
4. conversion constructors.
ANSWER: C
1. class.
2. object.
3. variable.
4. pointer.
ANSWER: B
1. identifiers.
2. keywords.
3. access specifiers.
4. type of class.
ANSWER: C
QUES.The ______ access specifier allows functions or data to be accessible to other parts of
the program.
1. private.
2. protected.
3. public.
4. inherited.
ANSWER: C
QUES.. The protected access specifier is needed only when _______ is needed.
1. inline function.
2. file.
3. friend function.
4. inheritance.
ANSWER: D
1. static.
2. non-static.
3. auto.
4. register.
ANSWER: B
1. class.
2. pointer.
3. arrays.
4. variables.
ANSWER: A
QUES.. One of the methods to stop the execution of the function is by calling the standard
________ function.
1. goto.
2. jump.
3. stop.
4. exit.
ANSWER: D
QUES.What is a Constructor?
ANSWER: A
QUES.The ______ term refers to the value that is used to call a function.
1. parameter.
2. argument.
3. variable.
4. pointer.
ANSWER: B
1. argument.
2. parameter.
3. variable.
4. array.
ANSWER: B
QUES.. The _____ is the variables that contain the address of other variables.
1. function.
2. string.
3. pointer.
4. identifier.
ANSWER: C
1. &.
2. *.
3. &&.
4. !.
ANSWER: A
QUES.The ________ operator is used to return the value of the variable to which the pointer
points.
1. reference.
2. dereference.
3. dot.
4. arrow.
ANSWER: B
1. variable.
2. address.
3. keyword.
4. instance.
ANSWER: D
1. int x;
2. int &x;
3. ptr x;
4. int *x;
ANSWER: D
QUES.Which of the following gives the memory address of integer variable a;?
1. *a;
2. a;
3. &a;
4. address(a);
ANSWER: C
QUES.Which of the following gives the memory address of a variable pointed to a pointer a?
1. *a;
2. a;
3. &a;
4. address(a);
ANSWER: A
QUES.Which of the following gives the value stored at the address pointed to by the pointer
a?
1. a;
2. val(a);
3. *a;
4. &a;
ANSWER: C
1. New.
2. Malloc.
3. Create.
4. Value.
ANSWER: B
1. Free.
2. Delete
3. Clear.
4. Remove.
ANSWER: A
ANSWER: D
ANSWER:B
1. union.
2. structure.
3. function.
4. class.
ANSWER: A
QUES.For a binary member operator function, the left operand is passed through _____ .
1. pointer.
2. reference.
3. this.
4. parameter.
ANSWER: C
QUES.A ________ function is a function that has no body inside its base class.
1. inline.
2. friend.
3. constructor.
4. pure virtual.
ANSWER: D
1. template.
2. generic.
3. friend.
4. class.
ANSWER: A
1. friend function.
2. template function.
3. virtual function.
4. special function.
ANSWER: B
QUES.. The specific version of the generic function created by the compiler is called as
______.
1. specialization.
2. generalization.
3. general function.
4. template function.
ANSWER: A
1. derived.
2. child.
3. base.
4. abstract.
ANSWER: C
1. inheritance.
2. overloading.
3. overriding.
4. interface.
ANSWER: D
1. float.
2. real.
3. switch.
4. double.
ANSWER: C
1. :=.
2. v
3. equal.
4. = =.
ANSWER: D
ANSWER: B
ANSWER: C
ANSWER: D
1. stdlib.h.
2. iomanip.h.
3. console.h.
4. conio.h.
ANSWER: B
1. floor address.
2. foundation address.
3. first address.
4. base address .
ANSWER: D
QUES.You have a variable myNum that has the value 5. You want to print your variable to
the screen. How would you do it?
ANSWER:
1. Keywords.
2. Variables.
3. Identifiers.
4. Operators.
ANSWER: D
1. back space.
2. new line.
3. octal number.
4. hexadecimal number.
ANSWER: C
ANSWER: C
ANSWER: B
QUES.. Which of the following term is used for a function defined inside a class?
1. Member Variable
2. Member function
3. Class function
4. Classic function
ANSWER: B
ANSWER: D
1. <iostream>.
2. <string>.
3. <sstring>.
4. <sstream>.
ANSWER: D
1. <iostream>.
2. <string>.
3. <sstring>.
4. <sstream>.
ANSWER: C
1. Static function
2. Friend function
3. Const function
4. Virtual function
ANSWER: B
1. mutable.
2. default.
3. readable.
4. volatile.
ANSWER: D
QUES.. The size of following variable is not 4 bytes in 32 bit systems is _______.
1. int.
2. long int .
3. short int.
4. float.
ANSWER: C
1. 1
2. 13
3. 5
4. 0
ANSWER: D
1. \t.
2. \v.
3. \f.
4. \w.
ANSWER: D
QUES.What is the correct value to return to the operating system upon the successful
completion of a program?
2. 2.
3. 1.
4. 0.
5. programs do not return a value.
ANSWER: C
QUES.. What punctuation is used to signal the beginning and end of code blocks?
1. { }.
2. -> and <-.
3. BEGIN and END.
4. ( and ).
ANSWER: A
ANSWER: A
1. parameters.
2. parenthesis.
3. curly braces.
4. none of these.
ANSWER: B
ANSWER: D
ANSWER: C
ANSWER: D
1. letters.
2. digits.
3. underscores.
4. spaces.
ANSWER: D
1. papername.
2. writername.
3. typename.
4. printname.
ANSWER: C
1. while.
2. until.
3. do.
4. for.
ANSWER: B
1. 1.
2. 2.
3. 3.
4. 4.
ANSWER: B
1. break.
2. goto.
3. exit.
4. switch.
ANSWER: D
ANSWER: D
1. <ctype.h>.
2. <math.h>.
3. <time.h>.
4. <stdlib.h>.
ANSWER: A
QUES.The built-in library function isalnum( ) is testing to determine if the argument is ___.
ANSWER: D
QUES.The built-in library function ceil(x) requires the _______ header file.
1. <ctype.h>.
2. <math.h>.
3. <stdlib.h>.
4. <time.h>.
ANSWER: B
ANSWER: B
ANSWER: B
QUES.. The rand( ) built-in library function _____.
ANSWER: C
ANSWER: C
ANSWER: B
QUES.Which of the following header files is required for creating and reading data files?
1. ofstream.h.
2. fstream.h.
3. ifstream.h.
4. console.h.
ANSWER: B
ANSWER: C
1. creating a file.
2. reading a file.
3. appending a file.
4. removing a file.
ANSWER: B
ANSWER: C
1. C language.
2. Java Language.
3. C# language.
4. B language.
ANSWER: A
ANSWER: A
1. Abstract.
2. Virtual.
3. Dynamic.
4. Typeid.
ANSWER: B
1. Exception Handling.
2. Reflection.
3. Operator Overloading.
4. Namespaces.
ANSWER: B
ANSWER: D
ANSWER: B
ANSWER: A
QUES.What is the implicit pointer that is passed as the first argument for non-static member
functions?
1. self pointer.
2. std::auto_ptr pointer.
3. Myself pointer.
4. this pointer.
ANSWER: D
QUES.. If X is the name of the class, what is the correct way to declare copy constructor of
X?
1. X(X arg).
2. X(X* arg).
3. X(const X* arg).
4. X(const X& arg).
ANSWER: D
1. = (assignment operator).
2. == (equality operator).
3. -> (rrow operator).
4. :: (cope resolution operator).
ANSWER: D
ANSWER: B
ANSWER: A
ANSWER: A
QUES.. How many copies of a class static member are shared between objects of the class?
ANSWER: A
ANSWER: A
QUES.When is std::bad_alloc exception thrown?
ANSWER: A
1. <memory>.
2. <alloc>.
3. <autoptr>.
4. <smartptr>.
ANSWER: A
QUES.. Which of the following correctly describes the meaning of namespace feature in
C++?
1. Namespaces refer to the memory space allocated for names used in a program.
2. Namespaces refer to space between the names in a program.
3. Namespaces refer to space between the names in a program.
4. Namespaces provide facilities for organizing the names in a program to avoid
name clashes.
ANSWER: D
QUES. ____________ operation inserts zero bits into low order bits of result.
1. Shift.
2. Shifting left.
3. Shifting right.
4. Append.
ANSWER: B
ANSWER: D
QUES.. Minimum number of temporary variable needed to swap the contents of 2 variables
is ________.
1. 1.
2. 4.
3. 2.
4. 0.
ANSWER: D
1. a file in which records are arranged in a way they are inserted in a file.
2. a file in which records are arranged in a particular order.
3. a file which is stored on a direct access storage medium.
4. none of the above.
ANSWER: C
1. It is cost-effective.
2. It has large storage capacity.
3. It has highest speed.
4. It is easily portable.
ANSWER: C
1. Zero
2. One
3. Two
4. As many as we want
ANSWER: A
1. Repositioning.
2. Truncating.
3. Readable.
4. Appending.
ANSWER: C
1. Access method.
2. Auxiliary storage management.
3. Free integrity mechanism.
4. None of the above.
ANSWER: D
QUES.. Which of the following concepts means wrapping up of data and functions together?
1. Abstraction
2. Encapsulation
3. Inheritance
4. Polymorphism
ANSWER: B
ANSWER: D
QUES.Which of the following concepts means waiting until runtime to determine which
function to call?
1. Data hiding
2. Dynamic casting
3. Dynamic binding
4. Dynamic loading
ANSWER: C
1. int
2. double
3. string
4. Class
ANSWER: D
1. operator
2. function
3. object
4. macro
ANSWER: C
ANSWER: B
ANSWER: B
1. datatype.
2. parameter .
3. variable.
4. array.
ANSWER: B
QUES.Value of ix+j, if i,j are integer type and ix long type would be _____.
1. integer.
2. float.
3. long integer.
4. double precision.
ANSWER: C
1. stdio.
2. iostream.
3. conio.
4. std.
ANSWER: B
1. ::
2. ..
3. ->.
4. *.
MCQ of Web Designing – Set 1
by Ganesh Maharjan
Answers
1 – A / 2 – A / 3 – B / 4 – A / 5 – C / 6 – D / 7 – A / 8 – B / 9 – A / 10 – A
MCQ of Web Designing – Set 2
by Ganesh Maharjan
Answers
1 – C / 2 – B / 3 – A / 4 – C / 5 – A / 6 – B / 7 – C / 8 – A / 9 – B / 10 – B
MCQ of Web Designing – Set 3
by Ganesh Maharjan
Answers
1 – D / 2 – D / 3 – A / 4 – C / 5 – D / 6 – C / 7 – D / 8 – C / 9 – A / 10 – B
MCQ of Web Designing – Set 4
by Ganesh Maharjan
4.1 What is the correct syntax in HTML for creating a link on a webpage?
A. <LINK SRC= “ghumti.html”>
B. <BODY LINK = “ghumti.html”>
C. <A SRC = “ghumti.html” >
D. < A HREF = “ghumti.html”>
4.2 Which of the following is an attribute of <Table> tag?
A. SRC
B. LINK
C. CELLPADDING
D. BOLD
4.3 Choose the correct HTML tag to make the text bold?
A. <B>
B. <BOLD>
C. <STRONG>
D. Both A) and C)
4.4 Which HTML tag would be used to display power in expression (A+B)2 ?
A. <SUP>
B. <SUB>
C. <B>
D. <P>
4.5 Choose the correct HTML code to create an email link?
A. <A HREF = “ganesh@ghumti.com”></A>
B. <A HREF = “mailto:ganesh@ghumti.com”></A>
C. <MAIL>ganesh@ghumti.com </MAIL>
D. <A MAILHREF = “ganesh@ghumti.com”></A>
4.6 Choose the correct HTML tag for the largest heading?
A. <H1>
B. <H6>
C. <H10>
D. <HEAD>
4.7 Output of XML document can be viewed in a
A. Word Processor
B. Web browser
C. Notepad
D. None of the above
4.8 What is the correct way of describing XML data?
A. XML uses a DTD to describe data
B. XML uses a description node to describe data
C. XML uses XSL to describe the data
D. XML uses a validator to describe the data
4.9 Comments in XML document is given by:
A. <?_ _ _ _>
B. <!_ _ _ _!>
C. <!_ _ _ _>
D. </_ _ _ _>
4.10 Which statement is true?
A. An XML document can have one root element
B. An XML document can have one child element
C. XML elements have to be in lower case
D. All of the above
Answers
1 – D / 2 – C / 3 – D / 4 – A / 5 – B / 6 – A / 7 – B / 8 – C / 9 – C / 10 – A
MCQ of Web Designing – Set 5
by Ganesh Maharjan
This set of MCQ Questions is related to Web Designing. This series of Multiple Choice
Questions (MCQs) covers Web Deigning Language and Tools such as HTML, XHTML, Java Script,
Web Topology & Terminology, Domain Name, Web Hosting & etc. Here is the 5th Set of this series.
Answers
1 – B / 2 – D / 3 – A / 4 – B / 5 – D / 6 – B / 7 – A / 8 – C / 9 – A / 10 – D