II Puc All Mcqs Cs

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

CHAPTER-1 TYPICAL CONFIGURATION OF COMPUTERS

1. __________ is the main circuit board inside a com puter which provides a platform for
all the components and peri pherals to com mu nicate with each other.
a) Motherboard b) CMOS c) BIOS d) Disk controllers

2. Which of these may be characterized by t he form factor, chipset:type of processor socket


used.
a) Motherboard b) CMOS c) BIOS d) Disk controllers

3. ________ refers to motherboard geometric, dimensions, arrangement and electrical components.


chipset coordi nates data transfer bet ween the various components of com puter system.
a) Chipset b) Processor c) Bus d) Form factor

4. _________is a main compon ent on the motherboard and is called the brai n of the computer.
a) Bus b) CMOS c) Processor d) Disk controllers

5. ________is defined as the frequency with which a processor executes instructions or the data is
processed.
a) Speed of cache b) Speed of Bus communication c) Speed of RAM
d) Clock speed of CPU

6. _______are the two chips in the core logic chipset on a PC motherboard. used to manage data
comm u nications between a CPU and a mot herboard.
a) ROM & RAM b) Cache & DDRAM c) Northbridge & Southbridge d) None of these

7. ___________is a small chip on the motherboard that holds a set of instructions to load the hardware
settings requi red to acti vate various devices like keyboards, monitors of disk drives.
a) BIOS b) CMOS c) Processor d) Disk controllers

8. _________is a type of memory chi p to store the date, time and system setup parameters.
a) BIOS b) CMOS c) Processor d) Disk controllers
9. _______ al l ows expanding the capabilities of a computer to give the computer new features or
increased performance.
a) Ports b) Controllers c) Slots d) Power connectors

10. __________is the circuit which enables the CPU to communicate with a hard disk. Floppy disk or
other ki nd of diskdri ve.
a) Power connectors b) Slots c) Disk controller d) None of these

11. ___________are u sed to connect extern al devices like printers, keyboards or scanners the
computer, which gets connected to the computer's motherboard.
a) Ports b) Controllers c) Slots d) Power connectors

12. ________is a collection of parallel wires that form a pathway lo carry add ress, data and control
signals.
a) Bus b) CMOS c) Processor d) Disk controllers

13. The numb.er of lines in the bus referred as __________of the bus.
a) Bandwidth b) Wirewidth c) Buswidth d) Broadwidth

14. _________connects all the major com ponents of computer such as CPU, memory
communicates.
a) Internal bu s b) External bus c) Control bus d) System bus

15. _______ connects an external devices to the system.


a) Internal bu s b) External bus c) Control bus d) System bus

16. Secondary memory is also known as?


a) Second pass memory b) Dynamic memory
c) Auxiliary memory d) Temporary memory

17. Which of the following are the two main components of the CPU?
a). Control Unit and Registers b). Registers and Main Memory
c). Control unit and ALU d). ALU and bus
18. Personal computers used a number of chips mounted on a main circuit
board. What is the common name for such boards?

a). Daughterboard b). Motherboard c). Father board d). Child board

19. What is the Expansion of ISA?


b) Industrial Standard Architecture b) International Standard Architecture
c) Industrial Standard Auxiliary device d) International standard advice

20. ALU means


a). Arithmetic Logic Unit b). Array Logic Unit
c). Application Logic Unit d). None of above

21. VGA is
a). Video Graphics Array b). Visual Graphics Adapter
c) Vertical Grid Array d) Visual Gate Array

22. UPS stands for:


a) Universal Power Supply b) Uninterrupted Power Supply
c) Universal Power system d) Uninterrupted power System

23. What is Cache Memory


a) High speed memory b) volatile Memory
c) Low speed memory d) Escape memory

24. How many bits of data are transferred in serial port?


a) One bit b) Two bits c) three bits d) four bits

25. Use of modem.


a) Modulates and demodulates signals b) emits the signals
c) Synchronizes the signals d) transfers the unwanted bits
26. __________ provides the path to transfer the data between CPU and Memory.
a) Internal bu s b) External bus c) Data bus d) System bus

27. The bus speed is measured in ___________.


a) MHz b) GB c) TB d) GB

28. __________ is a high speed memory available inside CPU in order to speed up access to
data and instructions stored in RAM memory.
a) Registers b) Cache memory c) SDRAM PROM

29. Expand DDRRAM____________


a) Dynamic data rate random access memory b) Double dynamic rate random access
memory
c) Double data rate random access memory d) Disk data rate random access memory

30. Expand PCI _____________


a) Personal component interface b) Peripheral component interconnect
c) Peripheral computer interconnect d) Peripheral computer interconnect

31. Expand SDRAM_________


a) Synchronous dynamic random access memory b) Synchronous disk read access
memory
c) Synchronous data read access memory d) Synchronous data random access
memory

33. The cache memory placed inside the CPU is ____________


a) L1 b) L2 c) L3 d) None of these

33. The cache memory placed in between the CPU and RAM is ____________
a) L1 b) L2 c) L3 d) None of these

34. USB port works on ___________ interface.


a) plug and play b) play and plug c) play and power d) play and port
35. Expand USB_____________
a) Universal synchronous bus b) United Synchronous bus
c) Universal serial bus d) United serial bus

CHAPTER-2 & 3 BOOLEAN ALGEBRA & LOGIC GATES

1. Who developed Boolean algebra?

a) George Boole b) Charles Babbage c) Herman Hollerith d) Blaise


Pascal

2. The another name for Boolean algebra is


a) Digital Algebra b) Switching algebra
C) NOT gate d) XOR gate

3. The other name Inverter gate is


a) Not gate b) OR gate c) AND gate d) XOR gate

4. which gate takes maximum one input signal


a) AND gate b) OR gate c) NOT gate d) XNOR gate

5. Which among the following is not a Boolean Postulate?


a) X+X=X b) X. X=0 b) 0.X = 0 d) 0 + X = x
6. Involution law states that

a) =X b) X.X = X c) X+X=X d) =0

7. Which of the following is not a De’ Morgan’s Theorem.

a) b) c) d) xyz = x.y.z
8. Choose the concept which does not belongs to the group
a) OR to AND b) AND to OR c) . to + d) + to |

9. Minterm is .
a) Product of n variables b) Sum of n variables
c) Division of n variables d) Mod of n variables

10. Maxterm is .
a) Product of n variables b) Sum of n variables
c) Division of n variables d) Mod of n variables

11. Which one is not a Derived Gate?


a) NOR b) NAND c) XOR d) OR

12. Karnaugh Map is used to .


a) Reduce the expression b) Increase the expression
c) Calculate the expression d) Format the expression

13. Indempotence Law states that


c) X + X = X b) X + Y = X c) X . X = 0 d) X + X = 1

14. Which among the following is not a commutative Law


a) x + y = y + x b) x . y = y . x c) x + y = y . x d) 2 + 3 = 3 + 2

15. Which one is the associative law?


d) x+(y+z) = (x+y)+z b) x+y+z = z+y+x c) x+yz = xy + xz d) yz =
z+y
16. Distributive Law states that
a)x(y+z) = xy+xz b) x+(y+z) = (x+y)+z
c) x(yz) = (xy)z d) x+y+z = z+y+x

17. Which among the following is not Absorption Law

a) x+xy = x b) x.(x+y) =x c)x+y=y+x d) None of these

18. Minterm notation is


a) m1 b) m3 c) m4 d) m5

19. Maxterm notation of X̄+y+z is

a) M1 b) M3 c) M4 d) M5

20. Minterm notation of x y z is


a) m1 b) m3 c) m5 d) m7

21. Maxterm notation of x+y+z is


a) M0 b) M1 c) M2 d) M3

22. How many variables we get in the reduced form for pair
reduction in K-Map

a) 3 b) 2 c) 4 d) 1
23. How many variables we get in the reduced form for Octet
reduction in K-Map

a) 3 b) 2 c) 1 d) 4

24. All the results of given possibilities are true or 1 then that is called
as______.

a) Truth table b) Tautology c) Fallacy d) Logic gate

25. All the results of given possibilities are false or 0 then that is called

as______.

a) Truth table b) Tautology c) Fallacy d) Logic gate


26. x+xy=x proves ____________
a) Involution Law b) Indempotence Law
c) Commutative Law c) Absorption Law

27. Logical way of representation of input & output signals through a gate is called
a) Logical variable b) Logic gate
c) Circuit algebra c) Relational algebra

28. Tabular representation of solving the possibilities to find truth values is called as
a) Truth table b) Tautology c) Fallacy d) Logic gate

29. Logical symbol of NAND gate is

a) b)

c) d)
30. Logical symbol of NOR gate is

a) b)

c) d)

31. Logical symbol of XOR gate is

a) b)

c) d)

32. Logical symbol of XNOR gate is

a) b)

c) d)
33. Logical symbol of OR gate is

a) b)

c) d)

34. Logical symbol of AND gate is

a) b)

c) d)

35. Logical symbol of NOT gate is

a) b)

c) d)
CHAPTER – 4 DATA STRUCTURES

1. A is a specialized format for organizing and storing data.


a) Data b) searching c) Data structure d) sorting.

2. An is a collection of elements of same type under same name.

a) Array b) Tree c) Graph d) structure

3. Queue works on the principle of .

a) FIFO b) LIFO c) POP d) None of


these

4. An array in which array elements are accessed with two subscripts is


known as
.

a) Single dimensional array b) Two-dimensional array


c) Multi-dimensional array d) Three-dimensional array.

5. ordered collection of items where an item is inserted at one


end called “rear end “and an item is removed at the other end called
“front end”.

a) Queue b) Stack c) Graph d) Tree

6. The term Push and Pop is related to ?

a) QUEUE b) ARRAY c) STACK d) STRING

7. Which is the pointer associated with the stack?

a) TOP b) SOP c) POP d) GAP

8. The operation performed on a stack are called ?


a) FIFO b) LIFO c) SIFO d) None of these

9. Operations on stacks are .

a) Push b) Stack c) Pop d) All of these

10. ________ is collection of facts.

a) Data b) Information c) Figures d) Relations

11. ____________operation is used to remove the data structures from the memory
space.
a) Delete b) Create c) Update
d)Destroy

12. ________operation is used to add new data structures for the program.
a) Delete b) Create c) Update
d) Destroy

13. __________ operation is used by programmers to access data within data structu re for the
operation updates or alters dates.
a) Delete b) Create c) Select d)
Destroy

14. __________ data structure are kind of data structure that has homogenous
elements.

a) Array b) Tree c) Graph d) None of these

15. Which of the following is the example for linear data structure?

a) Stack b) Queue c) Array d) All of the above


16. The process of accessing each data item exactly once to perform some
operation is called ____________.

a) Searching b) Sorting c) Traversing d) Inserting

17. The process of adding a new data item into the given collection of data items
is called __________.

a) Searching b) Sorting c) Traversing d) Inserting

18. The process of removing an existing data item from the given collection of data item from the
given collection of data item is called ____________.
a) Searching b) Deleting c) Traversing d) Inserting

19. The process of arrangement of data item in ascending or descending order is called _________ .
a) Searching b) Sorting c) Traversing d) Inserting

20. The process of combining the data .it ems of two structures to form a single structure is
called_________.
a) Merging b) Sorting c) Traversing d) Inserting

21. The array which stores the elements either in a row or in a column and having single subscript is
called ________.
a) Two-dimensional array b) One-dimensional array c) Multi-dimensional array
d) None of these

22. The array which stores the elements both in a row and in a column and having two subscripts is
called ________.
a) Two-dimensional array b) One-dimensional array c) Multi-dimensional array
d) None of these
23. Which of the following data structure follows static memory allocation?
a) Array b) Linked list c) Both a&b d) None of these

24. Which of the following data structure follows dynamic memory allocation?
a) Array b) Linked list c) Both a&b d) None of these

25. Data structu re in which a data item is connected to several other data items are called
as___________.
a) Linear data structure b) Primitive data structure c) Non-linear data structure
d) None of these
26. A node in a tree that has a child is called the _______node.

a) Leaf node b) Parent node c) Root node

d) None of these

27. The top most node in a tree is called ________ node.


a) Leaf node b) Parent node c) Root node

d) None of these

28. The tree in which each node has at most two descendants and is called as _______ node.

a) Binary tree b) Simple tree c) Single tree d) Composite tree

Chapter-7 & 8 Classes and Objects & Function Overloading

1. One of the following is not characteristics of OOPs

a) Abstraction b) inheritance c) Dynamic binding d) Interpreter

2. A smallest individual unit in a program or lexical unit is

a) Identifier b) Token c) Keyword d) Constants


3. A name given to the programming elements such as variables, arrays, functions etc.is a

a) Identifier b) keyword c) Constant d) Token

4. A function call is not known until the time of the call at runtime is the

a) Message passing b) dynamic binding c) Data hiding d) data abstraction

5. In one of the following feature, function can take multiple forms based on the type of
arguments, number of arguments and data type return value

a) Polymorphism b) data encapsulation c) Inheritance d) class

6. A basic building blocks for assigning program is

a) Class b) data c) object d) function

7. Permitting the user to use an object without knowing its internal working is called

a) Data hiding b) Polymorphism c) Data abstraction d) all the above

8. Two type of overloading are

a) Operator overloading and function overloading


b) b) Function overloading and class overloading
c) Data overloading and class overloading
d) Operator overloading and class overloading.

9. The reusability of code is performed in

a) Object b) Inheritance c) Polymorphism d) Encapsulation

10. Set of standards are not included in

a) OOP software b) POP software c) Both a and b d) None of these

11. The processing of data in object oriented programming is carried out by sending
messages to object is

a) Class b) object c) message passing d) abstraction


12. Two or more function s having same name but different types of or different number of
argumen ts is called _____________.

a) Function overloading b) Operator overloading c) Function overriding

d) Operator overriding

13. Compiler replaces a function call with the body of the function is called.

a) Friend function b) Inline function c) Member function

d) Non-member function

14. Non- member function which access privat e members of the class.

a) Friend function b) Inline function c) Member function

d) Non-member function

15. ____________ does not use either keyword friend or :: operator while defining a function .

a) Friend function b) Inline function c) Member function


d) Non-member function

16. The fu nction which is not affected by the access cont rol keywords.

a) Friend function b) Inline function c) Member function


d) Non-member function

17. Function overloading impl ements _____________.

a) Object b) Inheritance c) Polymorphism d) Encapsulation

18. Non-member function does not have access to the

a) Private members b) Public members c) Protected members


d) None of these
19. _________ specifies the scope of the data.

a) Data member b) Member function c) Class d) Access specifier

20. Default access specifier i s _____________.

a) Public b) Protected c) Private d) Default

21. The member accessible only with in the cl ass _______________

a) Public b) Protected c) Private d) Default

21. The member accessible by any function outside the cl ass _______________

a) Public b) Protected c) Private d) Default

22. ____________is used to define member function outside the.class.

a) Dot(.) operator b) Scope resolution operator(::) c) Pointer operator(*)


d) None of these

23. Copy of entire object is passed to function _________.

a) Pass by reference b) Pass by interference c) Pass by value d) None of these

24. Only address of the object is tran sferred to the function__________.

a) Pass by reference b) Pass by interference Pass by value d) None of these

25.Class members are accessed using__________.

a) Dot(.) operator b) Scope resolution operator(::) c) Pointer operator(*)


d) None of these
Chapter-9: Constructor & Destructors

1. Constructor does not take any arguments is a _____________.

a) Default constructor b) Parametrized constructor c) Copy constructor d) destructor

2. Constructor that takes one or more arguments is called _________.

a) Zero arguments constructor b) Parametrized constructor c) Copy constructor d)


destructor

3. ______constructor can be invoked by explicit or implicit call.

a) Zero arguments constructor b) Parametrized constructor c) Copy constructor d)


destructor

4. _____are being member functions that destroy an object automatically.

a) Zero arguments constructor b) Parametrized constructor


c) Copy constructor d) destructor

5. Destructor is preceded by a ______symbol.

a) $ b) # c) ~ d) @

6. _________is the class whose properties are inherited by another class.

a) Base class b) derived class c) Both a & b d) none of these.

7. _________is the class that inherits properties from base class (es).

a) Base class b) derived class c) Both a & b d) None of these

8. _____is a default visibility mode in inheritance.

a) Public b) protected c) private d) none of these.

9. A derived class with only one base class is known as____________________.

a) Single inheritance b) Multilevel inheritance c) Hierarchical inheritance d) Hybrid


Inheritance
10. The class can also be derived from the classes that are already derived is called____.

a) Single inheritance b) Multilevel inheritance c) Hierarchical inheritance d) Hybrid


Inheritance

11. Which keyword define used to define the inline function.

a) Friend b) Inline c) While d) object.

12. Friend function is a ___________function.

a) Member b) Non-member c) inline. d) Different.

13. There are __________types of constructor.

a)2 b)4 c)5 d) 3

14. A___________is a special member function that is used in classes to initialize the
objects of a class automatically.

a) constructor b) Non-member c) Inline d) Friend.

15. ________ are member functions that destroy an object automatically.

a) constructor b) Destructor c) Inline d) Friend.

16. Parameterized constructor can be invoked by ____________.

a) Explicit b) Implicit c) Both a and b d) Only a

17. constructor should have either ________ access

a) Public b) protected c) only b d) a or b


Chapter-10: Inheritance

1. Capability of one class acquiring properties from another class is called___

(a) Polymorphism (b) Abstraction (c) Overloading (d) Inheritance

2. Base class is called

(a) Sub class (b) Super class (c) Inherited class (d) Built-in class

3. Derived class is called

(a) Sub class (b) Super class (c) Main class (d) First class

4. A class whose properties are inherited by another class is

(a) Sub class (b) Base class (c) Inherited class (d) Derived class

5. A class which derives properties from another class

(a) Main class (b) Base class (c) Super class (d) Derived class

6. Advantages of inheritance is

(a) Reusing existing code (b) Easy to extend (c) Memory utilization (d) All the above

7. Symbol used while defining derived class

(a) :: (b) ; (c) . (d) :

8. Visibility mode defines

(a) Type of derivation (b) Type of data types (c) Type of function

(d) None of the above

9. If no visibility mode is specified, then by default the visibility mode is

(a) Public (b) Protected (c) Private (d) None of the above

10. In private inheritance public members of base class becomes members of derived class.

(a) Public (b) Protected (c) Private (d) All of the above

You might also like