[go: up one dir, main page]

0% found this document useful (0 votes)
43 views12 pages

11CS EM OneMarks 2025

The document contains a series of multiple-choice questions and additional questions related to computer science topics such as computer generations, number systems, Boolean algebra, computer organization, operating systems, and Windows OS. Each section includes questions that test knowledge on concepts like memory types, binary codes, and operating system functions. It serves as a study guide for students preparing for exams in computer science.

Uploaded by

lekham3209
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views12 pages

11CS EM OneMarks 2025

The document contains a series of multiple-choice questions and additional questions related to computer science topics such as computer generations, number systems, Boolean algebra, computer organization, operating systems, and Windows OS. Each section includes questions that test knowledge on concepts like memory types, binary codes, and operating system functions. It serves as a study guide for students preparing for exams in computer science.

Uploaded by

lekham3209
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

என்றும் மாணவர்கள் நலனில்

11
COMPUTER SCIENCE
Book back and Additional One Mark Questions with Answer
1. INTRODUCTION TO COMPUTERS
Choose the correct answer. D) Fifth Generation Computer
1. First generation computers used 13. Expansion of ALU is
(a) Vacuum tubes (b) Transistors A) Arithmetic and Literal Unit
(c) Integrated circuits (d) Microprocessors B) Automatic and Logistic Unit
2. Name the volatile memory C) Arithmetic and Logarithmic Unit
(a) ROM (b) PROM (c) RAM (d) EPROM D) Arithmetic and Logic Unit
3. Identify the output device 14. Expansion of RAM is
(a) Keyboard (b) Memory (c) Monitor (d) Mouse A) Radio Access Memory
4. Identify the input device B) Random Access Memory
(a) Printer (b) Mouse (c) Plotter (d) Projector C) Random Address Memory
5. ____ Output device is used for printing building plan. D) Random Access Member
(a) Thermal printer (b) Plotter 15. Expansion of ROM is
(c) Dot matrix (d) inkjet printer A) Read Only Memory
6. Which one of the following is used to in ATM B) Random Open Memory
machines C) Response Optional Memory
(a) Touch Screen (b) speaker D) Read Optional Memory
(c) Monitor (d) Printer 16. Expansion of Q.R. is
7. When a system restart which type of booting is used. A) Question Response B) Question Reader
(a) Warm booting (b) Cold booting C) Quick Response D) Quick Reader
(c) Touch boot (d) Real boot 17. Expansion of CRT is
8. Expand POST A) Cassette Radio Terminal B) Cathode Ray tube
(a) Post on Self Test (b) Power on Software Test C) Cathode Ray Terminal D) Cathode Rays Transfer
(c) Power on Self Test (d) Power on Self Text 18. Expansion of LCD is
9. Which one of the following is the main memory? A) Light Crystal Display B) Liquid Cathode Display
(a) ROM (b) RAM (c) Flash drive (d) Hard disk C) Liquid Crystal Display D) Least Crystal Display
19. Expansion of LED is
10. Which generation of computer used IC’s?
A) Liquid Emitting Diodes B) Least Emitting Diodes
(a) First (b) Second (c) Third (d) Fourth
C) Laser Emitting Diodes D) Light Emitting Diodes
ADDITIONAL QUESTIONS 20. Expansion of VGA is
11. Match. A) Video Graphics Array
a) 1st Generation Computer -i) Honeywell 6000 series B) Video Graphics Adapter
b) 2nd Generation Computer - ii) 1971-1980 C) Vector Graphics Adapter
c) 3rd Generation Computer - iii) Transistors D) Video Graphics Accessor
d) 4th Generation Computer - iv) Machine Language 21. The first computer monitor was part of the ________
a) iv, iii, i, ii b) i, iii, iv, ii computer system.
c) i, ii, iii, iv d) i, ii, iv, iii A) Xerox Alto B) IBM 1620
12. Which generation of computer used Ultra Large-Scale C) ENIAC1800 D) Pentium I
Integration? 22. Expansion of BIOS is
A) Second Generation Computer A) Basic Input Output Software
B) Third Generation Computer
B) Basic Input Output System
C) Beginners Input Output Services
C) Fourth Generation Computer
D) Basic Input Output Strategy
..1.. A. PRABHAKAR - 9442979144
2. NUMBER SYSTEMS
Choose the correct answer. 5. Expansion of BCD is
1. Which refers to the number of bits processed by a a) Binary Coded Decoder
computer’s CPU? b) Basic Coded Decimal
A) Byte B) Nibble C) Word length D) Bit c) Binary Coded Decimal
2. How many bytes does 1 Kilo Byte contain? d) Beginners Coded Decimal
A) 1000 B) 8 C) 4 D) 1024 6. The ASCII value for blank space is ________
3. Expansion for ASCII a) 32 b) 42 c) 48 d) 28
A) American School Code for Information Interchange 7. Expansion of EBCDIC is
B) American Standard Code for Information a) Extended Binary Coded Decimal Interchange Code
Interchange b) Extended Binary Coded Decimal Internet Code
C) All Standard Code for Information Interchange c) Example Binary Coded Decimal Interchange Code
D) American Society Code for Information Interchange d) Extended Binary Coded Decimal Information Code
4. 2^50 is referred as 8. ISCII stands for
A) Kilo B) Tera C) Peta D) Zetta a) International Standard Code for Information
5. How many characters can be handled in Binary Interchange
Coded Decimal System? b) Indian Standard Code for Information
A) 64 B) 255 C) 256 D) 128 Interchange
6. For 11012 the equivalent Hexadecimal is? c) Indian School Code for Information Interchange
A) F B) E C) D D) B d) Indian Society Code for Information Interchange
7. What Is the 1’s complement of 00100110? 9. The ASCII value of zero (0) is ________
A) 00100110 B) 11011001 a) 32 b) 42 c) 48 d) 28
C) 11010001 D) 00101001 10. The range of ASCII values for lower case alphabets is
8. Which amongst this is not an Octal number? from
A) 645 B) 234 C) 876 D) 123 a) 97 to 122 b) 87 to 112 c) 65 to 90 d) 85 to 110
ADDITIONAL QUESTIONS 11. The range of ASCII values for the upper-case
1. ‘0’and ‘1’ that the Computer can understand is called alphabets is
a) Machine language b) High-level language bit a) 97 to 122 b) 87 to 112 c) 65 to 90 d) 85 to 110
c) Assembly language d) Query structure language 12. MSB is
2. Binary numbers like 0 or 1 are called ________. a) Most Significant Byte b) Most Significant Bit
a) Byte b) Bit c) Nible d) Word c) Most simple bit d) Most successful bit
3. Nibble is a collection of ________ bits. 13. LSB is
a) 2 b) 4 c) 8 d) 16 a) Least successful bit b) Linear significant bit
4. 1 Kilobyte represents 1024 i.e. _______ bytes. c) Least simple bit d) Least significant bit
a) 240 b) 230 c) 220 d) 210
PART - II : BOOLEAN ALGEBRA
Choose the correct answer. ADDITIONAL QUESTIONS
1. Which is a basic electronic circuit which operates on 1. who proposed the basic principles of this algebra?
one or more signals? a) Boole George b) George Boole
(A) Boolean algebra (B) Gate c) Robert Boole d) Boole Robert
(C) Fundamental gates (D) Derived gates 2. Logical constants
2. Which gate is called as the logical inverter? a) 0, 1 b) -1, 0 c) -1, 1 d) -1, -2
3. In logical constants, True is represented by
(A) AND (B) OR (C) NOT (D) XNOR
a) A b) 0 c) 1 d) 𝐴
3. A + A =?
4. In logical constants, False is represented by
(A) A (B) O (C ) 1 (D) A
a) A b) 0 c) 1 d) 𝐴
4. NOR is a combination of? 5. A + 0 =?
(A) NOT(OR) (B)NOT(AND) (C ) NO(OR) (D) NO (NR) a) A b) 0 c) 1 d) 𝐴
5. NAND is called as …… Gates 6. A . 1 =?
(A) Fundamental Gate (B) Derived Gate a) A b) 0 c) 1 d) 𝐴
(C ) Logical Gate (D) Universal gate
..2.. A. PRABHAKAR - 9442979144
7. A . 𝐴 =? 10. The sign of the OR logical operation is
a) A b) 0 c) 1 d) 𝐴 a) (.) dot b) (+) plus c) Over bar d) (-) minus
8. A + 𝐴 =? 11. The sign of the NOT logical operation is
a) A c) 0 c) 1 d) 𝐴 a) (.) dot b) (+) plus c) Over bar d) (-) minus
9. The sign of the AND logical operation is
a) (.) dot b) (+) plus c) Over bar d) (-) minus
3. COMPUTER ORGANISATION
Choose the correct answer. (a) 28 (b) 1024 (c) 256 (d) 8000
1. Which of the following is said to be the brain of a 8. What is the capacity of 12cm diameter DVD with
computer? single sided and single layer?
(a) Input devices (b) Output devices (a) 4.7 GB (b) 5.5 GB (c) 7.8GB (d) 2.2 GB
(c) Memory device (d) Microprocessor 9. What is the smallest size of data represented in a CD
2. Which of the following is not the part of a (a) blocks (b) sectors (c) pits (d) tracks
microprocessor unit? 10. Display devices are connected to the computer
(a) ALU (b) Control unit through.
(c) Cache memory (d) register (a) USB port (b) Ps/2 port (c) SCSI port (d) VGA
3. How many bits constitute a word? connector
(a) 8 (b) 16 (c) 32 ADDITIONAL QUESTIONS
(d) determined by the processor used 1. The first general purpose microprocessor ________
4. Which of the following device identifies the location was developed by Intel Inc .
when address is placed in the memory address a) 1011 b) 4004 c) 0386 d) 0486
register? 2. RISC stands for
(a) Locator (b) encoder
a) Reduced Instruction Set Computers
b) Reduced Information Set Computers
(c) decoder (d) multiplexer
c) Random Instruction Set Computers
5. Which of the following is a CISC processor? d) Reduced Informal System Computers
(a) Intel P6 (b) AMD K6 3. CISC stands for
(c) Pentium III (d) Pentium IV a) Complete Instruction Set Computers
6. Which is the fastest memory? b) Complex Instruction Set Calculators
a) Hard disk (b) Main memory c) Complex Instruction Set Computers
(c) Cache memory (d) Blue-Ray disc d) Complete Instruction Set Calculators
7. How many memory locations are identified by a 4. Which of the following is not a RISC computer?
processor with 8 bits address bus at a time? a) Pentium IV b) Intel P6
c) AMD K6 d) Pentium II
4. THEORETICAL CONCEPTS OF OPERATING SYSTEM
Choose the correct answer. 6. File Management manages
1. Operating system is a A) Files B) Folders
A)Application Software B) Hardware C) Directory systems D) All the Above
C) System Software D) Component 7. Operating System Interactive provides
2. Identify the usage of Operating Systems A) Graphics User Interface (GUI)
A) Easy interaction between the human and comput B) Data Distribution
B) Controlling input & output Devices C) Security Management D) Real Time Processing
C) Managing use of main memory D) All the above 8. An example for single task operating system is
3. Which of the following is not a function of an A) Linux B) Windows C) MS-DOS D) Unix
Operating System? 9. The File management system used by Linux is
A) Process Management B) Memory Management A) ext2 B) NTFS C) FAT D) NFTS
C) Security management D) Complier ADDITIONAL QUESTIONS
4. Environment Which of the following OS is a 1. _________ is a set of instructions used to perform a
Commercially licensed Operating system? specific task in a computer.
A) Windows B) FEDORA C) UBUNTU D) REDHAT a) Hardware b) Software c) Program d) Statements
5. Which of the following Operating systems support 2. MS Word and VLC Player are
Mobile Devices? a) Application software b) System software
A) Windows 7 B) Linux C) BOSS D) iOS c) Databases d) Hardware
..3.. A. PRABHAKAR - 9442979144
3. It is a type of computer program that is designed to 6. Which operating system is most commonly used in
run the computer’s hardware and application mobile devices?
programs. a) Windows b) UNIX
a) Application software b) System software c) Linux d) Android
c) Databases d) Hardware 7. Expansion of GUI
4. A compiler belongs to which of the following a) Graphical User Internet
software? b) Graphical Used Interconnection
a) Application software b) System software c) Group User Interface
c) Databases d) Hardware d) Graphical User Interface
5. It is a system software which serves as an interface
between a user and a computer.
a) Application software b) Compiler
c) Operating system d) Hardware
5. WORKING WITH WINDOWS OPERATING SYSTEM
Choose the correct answer. 4. Windows version designed like a server on the
1) From the options given below, choose the network.
operations managed by the operating system. a) Windows 95 b) Windows NT
(a) Memory (b) Processes c) Windows 98 d) Windows XP
(c) Disks and I/O device (d) all of the above 5. In which windows version the Start button, Taskbar,
2) Which is the default folder for many Windows Windows Explorer and Start menu were
Applications to save your file? introduced?
(a) My Document (b) My Pictures a) Windows 95 b) Windows NT
(c) Documents and Settings (d) My Computer c) Windows 98 d) Windows XP
3) Under which of the following OS, the option Shift + 6. Windows XP was introduced in the year
Delete will permanently delete a file or folder? a) 1987 b) 1995 c) 2001 d) 2009
(a) Windows 7 (b) MS-DOS 7. The opening screen of Windows is called
(c) Linux (d) Android OS a) Work place b) Desktop c) Icon d) Window
4) What is the meaning of “Hibernate” in Windows 8. The horizontal bar below the desktop is called
XP/Windows 7? a) Taskbar b) Scroll bar
(a) Restart the Computer in safe mode c) Title bar d) Menu bar
(b) Restart the Computer in hibernate mode 9. Which consist of volume control, network, date
(c) Shutdown the Computer terminating all the and time etc.?
running applications a) Scroll bar b) Control Panel
(d) Shutdown the Computer without closing the c) System tray d) Settings
running applications 10. In Windows XP and Vista versions, the System icon
5) The shortcut key used to rename a file in windows is called as
(a) F2 (b) F4 (c) F5 (d) F6 a) My computer b) This PC
ADDITIONAL QUESTIONS c) This computer d) My PC
1. Which version of Windows was introduced as a 11. In Windows 8 and Windows 10 versions, the
mouse input device? System icon is called as
a) Windows 1.x b) Windows 2.x a) My computer b) This PC
c) Windows 3.x d) Windows 95 c) This computer d) My PC
2. Which version of Windows was introduced in 12. Match:
Control Panel feature? a. 16-bit - (i) Windows 95
a) Windows 1.x b) Windows 2.x b. 32-bit - (ii) Windows XP
c. 64-bit - (iii) Windows 8
c) Windows 3.x d) Windows 95
d. Start button was removed - (iv) Windows 1.x
3. Which version of Windows was introduced the
a) (i), (ii), (iii), (iv) b) (iv), (iii), (ii), (i)
Concepts of Multitasking?
c) (iv), (i), (ii), (iii) d) (ii),(iv),(i),(iii)
a) Windows 1.x b) Windows 2.x
c) Windows 3.x d) Windows 95
..4.. A. PRABHAKAR - 9442979144
6. SPECIFICATION AND ABSTRACTION
Choose the correct answer. (b) the responsibility of the user and the right of the
1. Which of the following activities is algorithmic in algorithm.
nature? (c) the responsibility of the algorithm but not the
(a) Assemble a bicycle. (b) Describe a bicycle. right of the user.
(c) Label the parts of a bicycle. (d) the responsibility of both the user and the
(d) Explain how a bicycle works. algorithm.
2. Which of the following activities is not algorithmic in 6. If i = 5 before the assignment i := i-1 after the
nature? assignment, the value of i is
(a) Multiply two numbers (b) Walk in the park (a) 5 (b) 4
(c) Draw a kolam (d) Swapping of two numbers (c) 3 (d) 2
3. Omitting details inessential to the task and 7. If 0 < i before the assignment i := i-1 after the
representing only the essential features of the task assignment, we can conclude that
is known as (a) 0 < i (b) 0 ≤ i
(a) specification (b) abstraction (c) i=0 (d) 0>=i
(c) composition (d) decomposition ADDITIONAL QUESTIONS
4. Stating the input property and the input-output 1. In our algorithmic notation, we use _________ to
relation a problem is known start a comment line.
(a) specification (b) statement a) double dashes (--)
(c) algorithm (d) definition b) double underscore (__)
5. Ensuring the input-output relation is c) single dash (-)
b) single underscore (_)
(a) the responsibility of the algorithm and the
right of the user.
7. COMPOSITION AND DECOMPOSITION
Choose the correct answer. (a) S1 ; S3 (b) S1 ; S2 ; S3
1. Suppose u, v = 10 ,5 before the assignment. What are (c) S1 ; S2 ; S2 ; S3 (d) S1;S2;S2;S2;S3
the values of u and v after the sequence of 5. If C is true, S1 is executed in both the flowcharts, but
assignments? S2 is executed in
1 u := v a) u, v = 5 ,5 (b) u, v = 10 ,5 (1) (2)
2 v := u (c) u, v = 5 ,10 (d) u, v =10,10
2. Which of the following properties is true after the
assignment at line 3?
1 -- i, j = 0
2 i, j := i+1, j -1 (a) i + j >0 (b) i + j < 0
3 --? (c) i + j = 0 (d) i = j
3. If C1 is false and C2 is true, the compound statement (a) (1) only (b) (2) only
1 if C1 (c) both (1) and (2) (d) neither (1) nor (2)
2 S1 6. How many times the loop is iterated?
3 else i := 0
4 if C2 while I ≠ 5
5 S2 i := i + 1
6 else (a) 4 (b) 5 (c) 6 (d) 0
7 S3 ADDITIONAL QUESTIONS
(a) S1 (b) S2 (c) S3 (d) None 1. An algorithm expressed in a programming language
4. If C is false just before the loop, the control flows is called a _______.
through 1 S1 2 while C 3 S2 4 S3 a) Program b) Output c) Control d) Statement
1 S1 2. It is a phrase that commands the computer to do an
2 while C
action.
3 S2
a) Program b) Output c) Control d) Statement
4 S3

..5.. A. PRABHAKAR - 9442979144


8. ITERATION AND RECURSION
Choose the correct answer. 4. Which of the following is not an invariant of the
1. A loop invariant need not be true assignment? m, n := m+2, n+3
(a) at the start of the loop. (a) m mod 2 (b) n mod 3
(b) at the start of each iteration (c) 3 X m – 2 X n (d) 2 x m – 3 x n
(c) at the end of each iteration 5. If Fibonacci number is defined recursively as
(d) at the start of the algorithm
2. We wish to cover a chessboard with dominoes, the
number of black squares and the number of white
squares covered by dominoes, respectively, placing a to evaluate F(4), how many times F() is applied?
domino can be modelled by (a) 3 (b) 4 (c) 8 (d) 9
(a) b := b + 2 (b) w := w + 2 6. Using this recursive definition{ a n= 1 if n = 0 a x an
(c) b, w := b+1, w+1 (d) b := w -1 otherwise how many multiplications are needed
3. If m x a + n x b is an invariant for the assignment a, b to calculate a10?
: = a + 8, b + 7, the values of m and n are
(a) m = 8, n = 7 (b) m = 7, n = -8
(c) m = 7, n = 8 (d) m = 8, n = -7 (a) 11 (b) 10 (c) 9 (d) 8

9. INTRODUCTION TO C++
Choose the correct answer. 6. Which of the following statements is not true?
1. Who developed C++? (a) Keywords are the reserved words which convey
(a) Charles Babbage (b) Bjarne Stroustrup specific meaning to the C++ compiler.
(c) Billgates (d) Sundar Pichai (b) Reserved words or keywords can be used as
2. What was the original name given to C++? an identifier name.
(a) CPP (b) Advanced C (c) An integer constant must have at least one digit
(c) C with Classes (d) Class with C without a decimal point.
3. Who coined C++? (d) Exponent form of real constants consist of two
(a) Rick Mascitti (b) Rick Bjarne parts
(c) Bill Gates (d) Dennis Ritchie 7. Which of the following is a valid string literal?
4. The smallest individual unit in a program is: (a) ‘A’ (b) ‘Welcome’ (c) 1232 (d) “1232”
(a) Program (b) Algorithm 8. A program written in high level language is called as
(c) Flowchart (d) Tokens (a) Object code (b) Source code
5. Which of the following operator is extraction (c) Executable code (d) All the above
operator in C++? 9. Assume a=5, b=6; what will be result of a&b?
(a) >> (b) << (a) 4 (b) 5 (c) 1 (d) 0
(c) <> (d) ^^ 10. Which of the following is called as compile time
operators?
(a) size of (b) pointer (c) virtual (d) this
DATA TYPES, VARIABLES AND EXPRESSIONS
A Choose the correct answer. 4. Which of the character is used as suffix to indicate a
1. How many categories of data types are available in C++? floating-point value?
(a) 5 (b) 4 (c) 3 (d) 2 (a) F (b) C (c) L (d) D
2. Which of the following data types is not a 5. How many bytes of memory is allocated for the
fundamental type? following variable declaration if you are using Dev
(a) signed (b) int C++? short int x;
(c) float (d) char (a) 2 (b) 4 (c) 6 (d) 8
3. What will be the result of following statement? char 6. What is the output of the following snippet? char ch
ch= ‘B’; cout << (int) ch; = ‘A’; ch = ch + 1;
(a) B (b) b (c) 65 (d) 66 (a) B (b) A1 (c) F (d) 1A

..6.. A. PRABHAKAR - 9442979144


7. Which of the following is not a data type modifier? 9. Which operator is used to access reference of a
(a) signed (b) int (c) long (d) short variable?
8. Which of the following operator returns the size of (a) $ (b) # (c) & (d) !
the data type? 10. This can be used as alternate to endl command:
(a) sizeof( ) (b) int ( ) (a) \t (b) \b (c) \0 (d) \n
(c) long ( ) (d) double ( )
10. FLOW OF CONTROL
Choose the correct answer. 5. How many types of iteration statements?
1. What is the alternate name of null statement? (A) 2 (B) 3 (C) 4 (D)5
(A) No statement (B) Empty statement 6. How many times the following loop will execute? For
(C) Void statement (D) Zero statement (int i=0; i<10; i++)
2. In C++, the group of statements should be enclosed (A) 0 (B) 10 (C) 9 (D) 11
within: 7. Which of the following is the exit control loop?
(A) { } (B) [ ] (C) ( ) (D) < > (A) for (B) while (C) do…while (D) if…else
3. The set of statements that are executed again and 8. Identify the odd one from the keywords of jump
again in iteration is called as: statements:
(A) condition (B) loop (A) break (B) switch (C) goto (D) continue
(C) statement (D) body of loop 9. Which of the following is called entry control loop?
4. The multi way branch statement: (A) do-while (B) switch (C) while (D) if-else
(A) if (B) switch 10. A loop that contains another loop inside its body:
(C) if … else (D) for (A) Nested loop (B) Inner loop
(C) Inline loop (D) Nesting of loop
11. FUNCTIONS
Choose the correct answer. 5. Which is return data type of the function prototype
1. Which of the following header file defines the of add(int, int);?
standard I/O predefined functions? A) int B) float C) char D) double
A) stdio.h B) math.h C) string.h D) ctype.h 6. Which of the following is the scope operator?
2. Which function is used to check whether a character A) > B) & C) % D) ::
is alphanumeric or not. ADDITIONAL QUESTIONS
A) isalpha() B) isdigit() 1. In which header file are the functions getchar(),
C) isalnum() D) islower() putchar(), gets() and puts() defined?
3. Which function begins the program execution? a) stdio.h b) math.h c) string.h d) ctype.h
A) isalpha() B) isdigit() 2. cout<<isalnum(‘$’); What is the output of the
C) main() D) islower() statement?
4. Which of the following function is with a return value a) -1 b) 0 c) 1 d) 2
and without any argument? 3. strcpy (s1, s2); What is the source string of this
A) x=display(int, int) B) x=display() statement?
C) y=display(float) D) display(int) a) S1 b) S2 c) Both d) None
12. ARRAYS AND STRUCTURES
Choose the correct answer. 4. By default, a string ends with which character?
1. Which of the following is the collection of variables A) \0 B) \t C) \n D)\b
of the same type that can referenced by a common 5. Structure definition is terminated by
name? (A) : (B) } (C) ; (D)::
A) int B) float C) Array D) class 6. What will happen when the structure is declared?
2. int age[]={6,90,20,18,2}; How many elements are (A) it will not allocate any memory
there in this array? (B) it will be declared and initialized
A) 2 B) 5 C) 6 D) 4 (C) it will allocate the memory
3. cin>>n[3]; To which element does this statement (D) it will be only declared
accept the value? A) 2 B) 3 C) 4 D)5
..7.. A. PRABHAKAR - 9442979144
7. A structure declaration is given below. (a) structure variable (b) structure tag
struct Time { (c) structure member (d) structure function
int hours; ADDITIONAL QUESTIONS
int minutes; 1. The size of the array should be specified with ____.
int seconds; a) [ ] b) { } c) < > d) ( )
}t; 2. In C++, the array is a ____ data type.
Using above declaration which of the following refers a) Basic b) Derived
to seconds. c) User defined d) None of these
(A) Time.seconds (B) Time::seconds 3. int num[ ] = {10, 20, 30, 4};
(C)seconds (D) t. seconds The size of the array is
8. Which of the following is a properly defined a) 10 b) 4 c) 5 d) 0
4. float price[3]; - How much memory space is allocated
structure?
for price in this statement?
(A) struct {int num;} (B) struct sum {int num;}
a) 3 bytes b) 6 bytes c) 12 bytes d) 24 bytes
(C) struct sum int sum; (D) struct sum {int num;};
5. A character array is
9. A structure declaration is given below. a) String b) Array of strings
Struct employee { c) Integer array d) None of these
int empno; 6. char str[2]={'5','+','A','B'}; - Write the correct
char ename[10]; statement.
}e[5]; a) char str[]={'5','+','A','B'};
Using above declaration which of the following b) char str[4]={'5','+','A','B'};
statement is correct. c) both (a) and (b) d) None of these
(a) cout<<e[0].empno<<e[0].ename; 7. int matrix[][3]={{10,20,30}, {40,50,60}, {70,80,90},
(b) cout<<e[0].empno<<ename; {100,110,120}};
(c) cout<<e[0]->empno<<e[0]->ename; Which statement is used to print the number 60 in
(d) cout<<e.empno<<e.ename; this declaration?
a) cout<<matrix[0][0]; b) cout<<matrix[0][1];
10. When accessing a structure member, the identifier to
c) cout<<matrix[1][2]; d) cout<<matrix[3][0];
the left of the dot operator is the name of
13. INTRODUCTION TO OBJECT ORIENTED PROGRAMMING TECHNIQUES
Choose the correct answer. 7. Which of the following concept encapsulate all the
1. The term is used to describe a programming essential properties of the object that are to be
approach based on classes and objects is created?
(A) OOP (B) POP (C) ADT (D) SOP (A) class (B) Encapsulation
2. The paradigm which aims more at procedures. (C) Polymorphism (D) Abstraction
(A) Object Oriented Programming 8. Which of the following is the most important
(B) Procedural programming advantage of inheritance?
(C) Modular programming (A) data hiding (B) code reusability
(D) Structural programming (C) code modification (D) accessibility
3. Which of the following is a user defined data type? 9. “Write once and use it multiple time” can be
(A) class (B) float (C) int (D) object achieved by
4. The identifiable entity with some characteristics and (A) redundancy (B) reusability
behaviour is. (C) modification (D) composition
(A) class (B) object (C) structure (D) member 10. Which of the following supports the transitive nature
5. The mechanism by which the data and functions are of data?
bound together into a single unit is known as (A) Inheritance (B) Encapsulation
(A) Inheritance (B) Encapsulation (C) Polymorphism (D) Abstraction
(C) Polymorphism (D) Abstraction ADDITIONAL QUESTIONS
6. Insulation of the data from direct access by the 1. FORTRAN and COBOL belong to which programming
program is called as category?
(A) Data hiding (B) Encapsulation (A) Object Oriented Programming
(C) Polymorphism (D) Abstraction (B) Procedural programming
..8.. A. PRABHAKAR - 9442979144
(C) Modular programming 3. C++, Java, VB.Net and Python belong to which
(D) Structural programming programming category?
2. PASCAL and C belong to which programming (A) Object Oriented Programming
category? (B) Procedural programming
(A) Object Oriented Programming (C) Modular programming
(B) Procedural programming (D) Structural programming
(C) Modular programming
(D) None of these
14. CLASSES AND OBJECTS
Choose the correct answer. ii) constructors are invoked automatically when the
1. The variables declared inside the class are known as objects are created.
(A) data (B) inline (C) method (D) attributes (A) True, True (B) True, False
2. Which of the following statements about member (C) False, True (D) False, False
functions are True or False? 8. Which of the following constructor is executed for
i) A member function can call another member the following prototype?
function directly with using the dot operator. add display( add &); // add is a class name
ii) Member function can access the private data of (A) Default constructor
the class. (B) Parameterized constructor
(A) i) True, ii) True (B) i) False, ii) True (C) Copy constructor
(C) i) True, ii) False (D) i) False, ii) False (D) Non-Parameterized constructor
3. A member function can call another member ADDITIONAL QUESTIONS
function directly, without using the dot operator 1. The most important feature of C++ is
called as (a) class (b) Abstraction
(A) sub function (B) sub member (c) Inheritance (d) Polymorphism
(C) nesting of member function 2. C++ was developed by
(D) sibling of member function (a) Bjarne Stroustrup (b) Dennis Ritchie
4. The member function defined within the class (c) Guido van Rossum (d) Bill Gates
behave like ........ functions 3. C++ was initially named
(A) inline (B) Non inline (C) Outline (D) Data (a) C WITH OBJECTS (B) C WITH CLASSES
5. Which of the following access specifier protects data (c) C++ CLASSES (d) C++ OBJECTS
from inadvertent modifications? 4. The body of the class is defined inside the curly
(A) Private (B) Protected (C) Public (D) Global brackets and terminated by a
6. class x (a) Comma (,) (b) Semicolon (;)
{ (c) Colon (:) (d) Dot (.)
int y; 5. What is the default accessibility of class members?
public: (a) private (b) protected (c) public (d) global
x(int z) 6. If all the members of the class are defined as _____
{y=z;} then the object of the class cannot access anything
} x1[4]; from the class?
int main() { (a) private (b) protected (c) public (d) global
x x2(10); 7. Member functions of a class are called as
return 0;} (a) Function (b) Constructor
How many objects are created for the above program (c) Destructor (d) Methods
(A) 10 (B) 14 (C) 5 (D) 2 8. Data members of a class are also called as
7. State whether the following statements about the (a) Variables (b) Constants
constructor are True or False. (c) Attributes (d) Methods
i) constructors should be declared in the private
section.

..9.. A. PRABHAKAR - 9442979144


15. POLYMORPHISM
Choose the correct answer. To print $ for 10 times
1. Which of the following refers to a function having (A) dispchar(); (B) dispchar(ch,size);
more than one distinct meaning? (C) dispchar($,10); (D)dispchar(‘$’,10 times);
(A) Function Overloading 4. Which of the following is not true with respect to
(B) Member overloading function overloading?
(C) Operator overloading (A) The overloaded functions must differ in their
(D) Operations overloading signature.
2. Which of the following reduces the number of (B) The return type is also considered for
comparisons in a program? overloading a function.
(A) Operator overloading (C) The default arguments of overloaded functions
(B) Operations overloading are not considered for Overloading.
(C) Function Overloading (D) Destructor function cannot be overloaded.
(D) Member overloading 5. Which of the following is invalid prototype for
3. void dispchar(char ch=’$’,int size=10) function overloading
{ (A) void fun (intx); (B) void fun (intx);
for(int i=1;i<=size;i++) void fun (char ch) ; void fun (inty);
cout<<ch; (C) void fun (double d); (D) void fun (double d);
} void fun (char ch); void fun (inty);
How will you invoke the function dispchar() for the
following input?
16. INHERITANCE
Choose the correct answer. 7. Which amongst the following is executed in the order
1. Which of the following is the process of creating new of inheritance?
classes from an existing class (A) Destructor (B) Member function
(a) Polymorphism (b) Inheritance (C) Constructor (D) Object
(c) Encapsulation (d) super class 8. Which of the following is true with respect to
2. Which of the following derives a class student from inheritance?
the base class school (A) Private members of base class are inherited to the
(a) school: student derived class with private
(b) class student : public school (B) Private members of base class are not inherited
(c) student : public school to the derived class with private accessibility
(d) class school : public student (C) Public members of base class are inherited but
3. The type of inheritance that reflects the transitive not visible to the derived class
nature is (D) Protected members of base class are inherited
(A) Single Inheritance (B) Multiple Inheritance but not visible to the outside class
(C) Multilevel Inheritance (D) Hybrid Inheritance 9. Based on the following class declaration answer the
4. Which visibility mode should be used when you want questions (from 9.1 to 9.4)
the features of the base class to be available to the class vehicle{
derived class but not to the classes that are derived int wheels;
from the derived class? public:
(A) Private (B) Public (C) Protected (D) All void input_data(float,float);
5. Inheritance is a process of creating new class from void output_data();
(A) Base class (B) abstract protected:
(C) derived class (D) Function int passenger;
6. A class is derived from a class which is a derived class };
itself, then this is referred to as class heavy_vehicle : protected vehicle {
(A) multiple inheritance (B) multilevel inheritance int diesel_petrol;
(C) single inheritance (D) double inheritance protected:
int load;
..10.. A. PRABHAKAR - 9442979144
public: ADDITIONAL QUESTIONS
void read_data(float,float) 1. In inheritance, the newly created class is
void write_data(); }; a) Parent class b) Sub class
class bus: private heavy_vehicle { c) derived class d) (b) or (c)
char Ticket[20]; 2. Which class is power packed in inheritance?
public:
a) Base class b) derived class
void fetch_data(char);
c) Both (a) & (b) d) Neither
void display_data(); };
3. A class without any declaration will have ______ size.
9.1. Which is the base class of the class
a) 1 byte b) 2 bytes c) 4 bytes d) 10 bytes
heavy_vehicle?
4. When defining a derived class, if there is more than
(a) Bus (b) heavy_vehicle (c) vehicle (d) both
one bae class, separate them by _______.
9.2. The data member that can be accessed from the
a) Comma (,) b) Semicolon (;)
function displaydata()
c) Semicolon (:) d) Dot (.)
(a) passenger (b) load (c) Ticket (d) All of these
5. Default the visibility mode is
9.3. The member function that can be accessed by an
a) private b) protected c) public d) None
objects of bus Class is
6. Whether classes are inherited with public, private,
(a) input_data(), output_data()
protected, which members of the base class are not
(b) read_data() ,write_data()
inherited in the declared class?
(c) fetch_data(), display_data()
a) private b) protected c) public d) None
(d) All of these
7. Which is executed in the reverse order of inherited
9.4. The member function that is inherited as public
class?
by Class Bus
a) Constructor b) Methods
(a) input_data(), output_data()
c) Destructor d) Objects
(b) read_data(), write_data()
(c) fetch_data(), display_data() (d) none of these
17. COMPUTER ETHICS AND CYBER SECURITY
Choose the correct answer. 8. E-commerce means
1. Which of the following is a set of moral principles (a) electronic commerce
that regulate the use of computers? (b) electronic data exchange
(a) piracy (b) programs (c) electric data exchange
(c) virus (d) computer ethics (d) electronic commercialization.
2. Commercial programs made available to the public 9. Distributing unwanted e-mail to others is called
illegally are known as (A) scam (b) spam (c) fraud (d) spoofing
(a) freeware (b) warez (c) piracy (d) software 10. Legal recognition for transactions are carried out by
3. Which one of the following are self-repeating and do (a) Electronic Data Interchange
not require a computer program to attach (b) Electronic Data Exchange
themselves? (c) Electronic Data Transfer
(A) cookies (b) worms (c) spyware (d) Trojans (d) Electrical Data Interchange
4. Which one of the following tracks a user visits a ADDITIONAL QUESTIONS
website? 1. “unauthorized copying of software” is referred as
(A) spyware (b) cookies (c) worms (d) Trojans a) Hardware theft b) Theft
5. Which of the following is not a malicious program on c) Correct operation d) Software piracy
computer systems? 2. ________ refer to the generally accepted standards
(A) worms (b) Trojans (c) spyware (d) cookies of right and wrong in the society.
6. A computer network security that monitors and a) Justice b) Morals
controls incoming and outgoing traffic is c) Honesty d) Discipline
(a) Cookies (b) Virus (c) Firewall (d) worms
7. The process of converting cipher text to plain text is
called
(a) Encryption (b) Decryption (c) key (d) proxy

..11.. A. PRABHAKAR - 9442979144


18. TAMIL COMPUTING
1. Which of the following is not a search engine?
(a) Google (b) Bing (c) Yahoo (d) Android
2. Which are familiar Tamil keyboard layouts that works on Android operating system in Smart phone using
phonetics?
(a) Sellinam (b) Ponmadal (c) both (a) and (b) (d) None of these
3. we can translate small english sentences into Tamil
(a) Thamizpori (b) Kamban (c) Azhagi (d) Ezhil
4. Which of the following was the first Tamil programming language?
(a) Kamban (b) Azhagi (c) Tamil Open Office (d) Ezhil

வாழ்த்துகளுடன்

அ. பிரபாகர்

XI, XII கணினி அறிவியல் (TM & EM)


XI, XII கணினி பயன்பாடுகள் (TM & EM)
XI, XII வேலைோய்ப்புத் திறன்கள் (TM மட்டும்)

விஜய் பப்ளிகேஷன்ஸ்
இராசிபுரம்

You might also like