SHRADHA COMPUTER
CLASSES                                        Phone:
                                                                      8777581756
Subject: Computer Applications                                       Time Limit: 90 mins.
Class: 9                                                             Full Marks: [100]
                         GROUP-A (Attempt all)
There are 50 questions in this group and are given below. All the
questions are mandatory. Each question carries one mark and has ONLY
one correct option.
1. Among the following, which of these is not a valid class specifier?
(a) Protected          (b) Private           (c) Pointer        (d) Public
2. Find the odd one out:
(a) Efficient Code     (b) Code Reusability (c) Redundant data (d) Modularity
3. Evaluate the expression when x=3, y=5 and z=10.
                                     ++z+y-y+z+x++
(a) 23     (b) 25      (c)20         (d)24
4. Byte data type range is:
(a) -128 to 128        (b) -127 to 128            (c) -127 to 127            (d) -128 to 127
5. Give the output of the following expression:             6-2+10%4+7
(a)13(b) 12       (c) 19             (d)                   11
6. What is the primary function of an operating system?
(a) To manage hardware resources                           (b) To create documents
(c) To browse the internet                                 (d) To play multimedia files
7. Which of the following is a non-volatile memory?
(a) RAM             (b) ROM          (c) Cache memory                (d) Virtual memory
8. Give the value of the following expression when a=5, b=6 and c=8:
                              c*=a++*++b+c--+a-b++/b%c
(a) 256           (b) 398            (c)392                (d) 365
                            SHRADHA COMPUTER
                            CLASSES                    Phone:
9. Which programming paradigm focuses on dividing a program into smaller,
                                                       8777581756
reusable components?
(a) Procedural programming                         (b) Object-oriented programming
(c) Functional programming                         (d) Event-driven programming
10. Who is considered as the ‘Father of OOP paradigm’?
(a)Dennis Ritchie             (b) James Gosling            (c) Rasmus Lerdorf    (d) Alan Kay
11. Find the output of the following code:
  class Scc
(a){ 40               (b) 48                 (c) 32             (d)38
  public static void main(String args[])
12.
  { What will be the value of              x after executing the following statement if x=15
  int g=5;
and    y=20.
  System.out.println(+
  +g*8);
  }                                        X=(x>y)?(y+x):(y-x);
  }
(a) 55                (b)36                  (c) 28             (d)35
13. Which of the following functions (methods) do not change the state of
an object?
(a) Pure Function                   (b) Impure function
(c) ReservedFunction                (d)Both a and c
14. Formal parameters are also known as :
(a) Standard parameters                                         (b) Virtual parameters
(c) Tertiary parameters                                         (d) Dummy parameters
15. The parameters that appear in the method call are called
parameters.
(a) Actual            (b) Formal             (c) Partial        (d) Both a & b
                        SHRADHA COMPUTER
                        CLASSES                           Phone:
16. If a function contains six return statements, how many8777581756
                                                           of them will
be executed?
(a) All the above                               (b) none of the statements
(c) 3 statements                                (d) Only one
17. A method is a named block of code within a                 .
(a) Function        (b) Scope      (c) Class                  (d) Both b & c
18. The && operator requires which among the following conditions to
be satisfied to represent a success for two relations?
(a) Both should be satisfied              (b) Any one should be satisfied.
(c) None of them are satisfied.           (d) None of these
19. The output in BlueJ occurs in which window?
(a) Console window (b) Terminal window (c) Both a and b (d) None of these
20. Which among the following function is equivalent to Math.sqrt(a)?
(a) Math.cbrt(a);                          (b) Math.pow(a,1/2)
(c) Math.pow(a,1/2.0);                     (d) Math.cbrt(a,1/2);
21. What value will Math.sqrt(Math.ceil(8.1))
return? (a) 3                 (b) 9             (c) 3.0
    (d) 9.0
22. A type of loop that is usually used when the number of iteration is known.
(a) for          (b) while        (c) do-while      (d) None of these
23. In while and do-while loops, a statement causes control to be
transferred directly to the conditional expression that controls the loop.
(a) break               (b) pause               (c) start               (d) continue
24. An object is represented by two attributes, out of which one
is characteristics and the other one is         .
(a) Behaviour       (b) Situation     (c) Abstraction        (d) Encapsulation
25. What was Java initially called?
a) Oak          b) C          c) Pine           d) None of these
26. What is Java Programming Language?
A) A runtime system                                     b) A set of development tools.
C) An Application Programming Interface (API) d) All of these
                       SHRADHA COMPUTER
                       CLASSES                           Phone:
27. Name the process that converts source code to bytecode.
                                                         8777581756
(a) Interpretation      (b) Compilation         (c) All of these     (d) None of these
28. Name the programs that can be developed in such a way that it
remains embedded in a web page and runs on the viewer’s machine in a
secured manner by Java compatible browsers.
a. Applets       b. Applications          c. Both a and b          d. None of these
29. What is the extension of the byte code in Java?
a. .java         b. .class         c. Both a and b          d. None of these
30. Which among the following is a valid class name?
a. Simple Interest b. SimpleInterest c. 1SimpleInterest d. Simple@Interest
31. Which among the following is not a Token?
a. Keywords      b. Literals       c. Identifiers           d. Data Type
32. Which among the following is a valid method of initialising?
a. boolean f=true;                             b. boolean f=True;
c. boolean f=’true’;                           d. None of these
33. Which among the following is not a punctuator?
a. ; semicolon         b. , comma              c. : colon          d. . dot
34. The member ‘out’ object of the ‘System’ class belongs to which class?
a. System        b. Print             c. PrintStream               d. Println
35. The statement a%2 will result to what if the value of a is an even number?
a. 0           b. 1           c. Both a and b              d. None of these
36. Which among the following forms of operators works with three operands?
a. Unary           b. Binary            c. Trinary      d. Ternary
37. Which among the following represents a syntax error?
a. Dividing an integer by zero.
b. Accessing an element that is out of bounds of an array.
c. Trying to store a value which is incompatible to a certain data-type.
d. Missing semicolon
38. Which among the following package is imported by default:
a. java.lang           b. java.util       c. Both a and b          d. None of these
                        SHRADHA COMPUTER
                        CLASSES                          Phone:
39. Which among the following function returns the absolute value of
                                                         8777581756
a number?
a. Math.absolute( )     b. Math.neutral( )       c. Math.abs( )      d. Math.positive( )
40. Which among the following expression will return a random
integer between 5 and 10 both inclusive?
a. 5+(int)(Math.random()*6)               b. 5+(int)(Math.random()*10)
c. 5+Math.random()*6                      d. 5+Math.random()*10
41. What value will Math.sqrt(-9) return?
a. -3.0            b. 3.0           c. NaN             d. None of these
42. Which among the following constants are used in switch-case statements?
a. char       b. int          c. float       d. Both a and b
43. Which among the following relational operator is used to check for
the equality between two quantities ?
a. =       b. ==              c. equals          d. None of these
44. Which among the following logical operator is used to negate a condition?
a. &&         b. ||            c. !      d. All of these
45. An if statement inside another if statement is called                           .
a. Nested if       b. Internal if   c. Concentric if            d. None of these
46. Which of these selection statements test only for equality?
a. if      b. switch          c. if and switch                  d. none of the mentioned
47. State whether the following statements about switch statement
are correct.
i. Switch statement often provides a better alternative than a large series of if-
else-if statements.
ii. The break statement is used inside the switch to terminate a
statement sequence.
a. True, False          b. False, True           c. True, True             d. False, False
48. The conditional statement, can only test for equality, whereas
can evaluate any type of Boolean expression.
a. if, switch           b. switch, if            c. while, if        d. if, while
                     SHRADHA COMPUTER
                     CLASSES                               Phone:
49. What will be the output of the following code snippet? 8777581756
int a=15; int b=25;
if((a<b)||(a=5)>15)
system.out.println(a);
else
system.out.println(b);
a. Error        b. 15              c. 25             d. No output
50. What’s wrong? for (int k = 2, k <= 12, k++)
a. the increment should always be ++k
b. the variable must always be the letter i when using a for loop
c. there should be a semicolon at the end of the statement
d. the commas should be semicolons
51. Which looping process checks the test condition at the end of the loop?
a. for                             b. while                          c. do-while
d. no looping process checks the test condition at the end
52. In a group of nested loops, which loop is executed the most number of
times?
a. the outermost loop
b. the innermost loop
c. all loops are executed the same number of times
d. cannot be determined without knowing the size of the loops
53. How often is the inner loop of a nested loop run?
a. Forever                                 b. One fewer time than the main loop
c. Each time the main loop is run          d. One more time than the main loop
54. Name the categories used to specify Intellectual Property Rights.
a. Copyright    b. Industrial Property         c. Both a and b      d. None of these
55. Right to privacy is part of which article of the Indian Constitution?
a. Article 12           b. Article 19           c. Article 21        d. Article 31
                       SHRADHA COMPUTER
                       CLASSES                            Phone:
56. Name the term that refers to a technique used to gain unauthorized
                                                          8777581756
access to a computer system or network and in some cases even
making unauthorized use of this access.
a. Virus          b. Antivirus            c. Malware              d. Hacking
57. Where does Malicious Code Hide?
a. Email          b. Web Content                 c. Legitimate Sites    d. All of these
58. Name the type of Malware that prevents the user from using the
system, and may destroy files that were open at the time of the attack.
a. Denial of Service (DoS) Attacks                    b. Access Violations
c. Both a and b                                       d. None of these
59. Name the program that contains hidden malicious functions but look
like something funny or useful such as a game or utility, but harms the
system when executed.
a. Trojans              b. Virus          c. Spyware              d. All of these
60. Name the program that secretly gather information from the computer
it has infected and transmit the information to a different location.
a. Trojans        b. Virus          c. Spyware              d. All of these
-------------------------------------HAPPY LEARNING----------------------------------
            SHRADHA COMPUTER
            CLASSES               Phone:
                 ANSWER KEY:      8777581756
1. C   2. C      3B      4D     5a       6a
7b     8c        9b      10 d   11 b     12 d
13 a   14 d      15 a    16 d   17 c     18 a
19 b   20 c      21 c    22a    23d      24a
25a    26d       27b     28a    29b      30b
31d    32a       33e     34a    35a      36d
37d    38a       39c     40a    41c      42d
43b    44c       45a     46b    47c      48b
49b    50d       51c     52b    53c      54c
55c    56d       57d     58a    59a      60c