0% found this document useful (0 votes)
618 views8 pages

Class 9 Question Paper New

This document contains a 50 question multiple choice quiz about computer programming concepts in Java. The questions cover topics like OOPs concepts, variables and data types, operators, control structures, and more. Each question provides 4 answer options with one correct answer.

Uploaded by

lalushah2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
618 views8 pages

Class 9 Question Paper New

This document contains a 50 question multiple choice quiz about computer programming concepts in Java. The questions cover topics like OOPs concepts, variables and data types, operators, control structures, and more. Each question provides 4 answer options with one correct answer.

Uploaded by

lalushah2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

SHRADHA COMPUTER

CLASSES Phone:
8777581756
Subject: Computer Applications Time Limit: 90 mins.
Class: 9 Full Marks: [100]

GROUP-A (Attempt all)


There are 50 questions in this group and are given below. All the
questions are mandatory. Each question carries one mark and has ONLY
one correct option.

1. Among the following, which of these is not a valid class specifier?

(a) Protected (b) Private (c) Pointer (d) Public

2. Find the odd one out:

(a) Efficient Code (b) Code Reusability (c) Redundant data (d) Modularity

3. Evaluate the expression when x=3, y=5 and z=10.

++z+y-y+z+x++

(a) 23 (b) 25 (c)20 (d)24

4. Byte data type range is:

(a) -128 to 128 (b) -127 to 128 (c) -127 to 127 (d) -128 to 127

5. Give the output of the following expression: 6-2+10%4+7

(a)13(b) 12 (c) 19 (d) 11

6. What is the primary function of an operating system?

(a) To manage hardware resources (b) To create documents

(c) To browse the internet (d) To play multimedia files

7. Which of the following is a non-volatile memory?

(a) RAM (b) ROM (c) Cache memory (d) Virtual memory

8. Give the value of the following expression when a=5, b=6 and c=8:

c*=a++*++b+c--+a-b++/b%c

(a) 256 (b) 398 (c)392 (d) 365


SHRADHA COMPUTER
CLASSES Phone:
9. Which programming paradigm focuses on dividing a program into smaller,
8777581756
reusable components?

(a) Procedural programming (b) Object-oriented programming

(c) Functional programming (d) Event-driven programming

10. Who is considered as the ‘Father of OOP paradigm’?

(a)Dennis Ritchie (b) James Gosling (c) Rasmus Lerdorf (d) Alan Kay

11. Find the output of the following code:

class Scc
(a){ 40 (b) 48 (c) 32 (d)38
public static void main(String args[])
12.
{ What will be the value of x after executing the following statement if x=15
int g=5;
and y=20.
System.out.println(+
+g*8);
} X=(x>y)?(y+x):(y-x);
}
(a) 55 (b)36 (c) 28 (d)35

13. Which of the following functions (methods) do not change the state of
an object?

(a) Pure Function (b) Impure function

(c) ReservedFunction (d)Both a and c

14. Formal parameters are also known as :


(a) Standard parameters (b) Virtual parameters
(c) Tertiary parameters (d) Dummy parameters

15. The parameters that appear in the method call are called
parameters.
(a) Actual (b) Formal (c) Partial (d) Both a & b
SHRADHA COMPUTER
CLASSES Phone:
16. If a function contains six return statements, how many8777581756
of them will
be executed?
(a) All the above (b) none of the statements
(c) 3 statements (d) Only one
17. A method is a named block of code within a .
(a) Function (b) Scope (c) Class (d) Both b & c
18. The && operator requires which among the following conditions to
be satisfied to represent a success for two relations?
(a) Both should be satisfied (b) Any one should be satisfied.
(c) None of them are satisfied. (d) None of these
19. The output in BlueJ occurs in which window?
(a) Console window (b) Terminal window (c) Both a and b (d) None of these
20. Which among the following function is equivalent to Math.sqrt(a)?
(a) Math.cbrt(a); (b) Math.pow(a,1/2)
(c) Math.pow(a,1/2.0); (d) Math.cbrt(a,1/2);
21. What value will Math.sqrt(Math.ceil(8.1))
return? (a) 3 (b) 9 (c) 3.0
(d) 9.0
22. A type of loop that is usually used when the number of iteration is known.
(a) for (b) while (c) do-while (d) None of these
23. In while and do-while loops, a statement causes control to be
transferred directly to the conditional expression that controls the loop.
(a) break (b) pause (c) start (d) continue
24. An object is represented by two attributes, out of which one
is characteristics and the other one is .
(a) Behaviour (b) Situation (c) Abstraction (d) Encapsulation
25. What was Java initially called?
a) Oak b) C c) Pine d) None of these
26. What is Java Programming Language?
A) A runtime system b) A set of development tools.
C) An Application Programming Interface (API) d) All of these
SHRADHA COMPUTER
CLASSES Phone:
27. Name the process that converts source code to bytecode.
8777581756
(a) Interpretation (b) Compilation (c) All of these (d) None of these
28. Name the programs that can be developed in such a way that it
remains embedded in a web page and runs on the viewer’s machine in a
secured manner by Java compatible browsers.
a. Applets b. Applications c. Both a and b d. None of these
29. What is the extension of the byte code in Java?
a. .java b. .class c. Both a and b d. None of these
30. Which among the following is a valid class name?
a. Simple Interest b. SimpleInterest c. 1SimpleInterest d. Simple@Interest
31. Which among the following is not a Token?
a. Keywords b. Literals c. Identifiers d. Data Type
32. Which among the following is a valid method of initialising?
a. boolean f=true; b. boolean f=True;
c. boolean f=’true’; d. None of these
33. Which among the following is not a punctuator?
a. ; semicolon b. , comma c. : colon d. . dot
34. The member ‘out’ object of the ‘System’ class belongs to which class?
a. System b. Print c. PrintStream d. Println
35. The statement a%2 will result to what if the value of a is an even number?
a. 0 b. 1 c. Both a and b d. None of these
36. Which among the following forms of operators works with three operands?
a. Unary b. Binary c. Trinary d. Ternary
37. Which among the following represents a syntax error?
a. Dividing an integer by zero.
b. Accessing an element that is out of bounds of an array.
c. Trying to store a value which is incompatible to a certain data-type.
d. Missing semicolon
38. Which among the following package is imported by default:
a. java.lang b. java.util c. Both a and b d. None of these
SHRADHA COMPUTER
CLASSES Phone:
39. Which among the following function returns the absolute value of
8777581756
a number?
a. Math.absolute( ) b. Math.neutral( ) c. Math.abs( ) d. Math.positive( )
40. Which among the following expression will return a random
integer between 5 and 10 both inclusive?
a. 5+(int)(Math.random()*6) b. 5+(int)(Math.random()*10)
c. 5+Math.random()*6 d. 5+Math.random()*10
41. What value will Math.sqrt(-9) return?
a. -3.0 b. 3.0 c. NaN d. None of these
42. Which among the following constants are used in switch-case statements?
a. char b. int c. float d. Both a and b
43. Which among the following relational operator is used to check for
the equality between two quantities ?
a. = b. == c. equals d. None of these
44. Which among the following logical operator is used to negate a condition?
a. && b. || c. ! d. All of these
45. An if statement inside another if statement is called .
a. Nested if b. Internal if c. Concentric if d. None of these
46. Which of these selection statements test only for equality?
a. if b. switch c. if and switch d. none of the mentioned
47. State whether the following statements about switch statement
are correct.
i. Switch statement often provides a better alternative than a large series of if-
else-if statements.
ii. The break statement is used inside the switch to terminate a
statement sequence.
a. True, False b. False, True c. True, True d. False, False
48. The conditional statement, can only test for equality, whereas
can evaluate any type of Boolean expression.
a. if, switch b. switch, if c. while, if d. if, while
SHRADHA COMPUTER
CLASSES Phone:
49. What will be the output of the following code snippet? 8777581756
int a=15; int b=25;
if((a<b)||(a=5)>15)
system.out.println(a);
else
system.out.println(b);

a. Error b. 15 c. 25 d. No output
50. What’s wrong? for (int k = 2, k <= 12, k++)
a. the increment should always be ++k
b. the variable must always be the letter i when using a for loop
c. there should be a semicolon at the end of the statement
d. the commas should be semicolons
51. Which looping process checks the test condition at the end of the loop?
a. for b. while c. do-while
d. no looping process checks the test condition at the end
52. In a group of nested loops, which loop is executed the most number of
times?
a. the outermost loop
b. the innermost loop
c. all loops are executed the same number of times
d. cannot be determined without knowing the size of the loops
53. How often is the inner loop of a nested loop run?
a. Forever b. One fewer time than the main loop
c. Each time the main loop is run d. One more time than the main loop
54. Name the categories used to specify Intellectual Property Rights.
a. Copyright b. Industrial Property c. Both a and b d. None of these
55. Right to privacy is part of which article of the Indian Constitution?
a. Article 12 b. Article 19 c. Article 21 d. Article 31
SHRADHA COMPUTER
CLASSES Phone:
56. Name the term that refers to a technique used to gain unauthorized
8777581756
access to a computer system or network and in some cases even
making unauthorized use of this access.
a. Virus b. Antivirus c. Malware d. Hacking
57. Where does Malicious Code Hide?
a. Email b. Web Content c. Legitimate Sites d. All of these
58. Name the type of Malware that prevents the user from using the
system, and may destroy files that were open at the time of the attack.
a. Denial of Service (DoS) Attacks b. Access Violations
c. Both a and b d. None of these
59. Name the program that contains hidden malicious functions but look
like something funny or useful such as a game or utility, but harms the
system when executed.
a. Trojans b. Virus c. Spyware d. All of these
60. Name the program that secretly gather information from the computer
it has infected and transmit the information to a different location.
a. Trojans b. Virus c. Spyware d. All of these

-------------------------------------HAPPY LEARNING----------------------------------
SHRADHA COMPUTER
CLASSES Phone:
ANSWER KEY: 8777581756

1. C 2. C 3B 4D 5a 6a
7b 8c 9b 10 d 11 b 12 d

13 a 14 d 15 a 16 d 17 c 18 a
19 b 20 c 21 c 22a 23d 24a
25a 26d 27b 28a 29b 30b
31d 32a 33e 34a 35a 36d
37d 38a 39c 40a 41c 42d
43b 44c 45a 46b 47c 48b
49b 50d 51c 52b 53c 54c

55c 56d 57d 58a 59a 60c

You might also like