0% found this document useful (0 votes)
91 views2 pages

Slip Test 1-12cs

Uploaded by

ilavenil58
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views2 pages

Slip Test 1-12cs

Uploaded by

ilavenil58
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

SIR ISSAC NEWTON MATRIC HR.

SEC SCHOOL

STD : XII SLIP TEST – 01 MARKS : 25

SUB : COMPUTER SCIENCE (2024 - 25) TIME : 45 MIN

NAME : __________________________________

Q.N ANSWER THE FOLLOWING QUESTIONS


O
1 1. Which of the following defines what an object can do?
2.
(A) Operating System (B) Compiler (C) Interface (D) Interpreter

2 The functions which will give exact result when same arguments are passed are called

(A)Impure functions (B) Partial Functions (C) Dynamic Functions

(D) Pure functions

3 The values which are passed to a function definition are called

(A) Arguments (B) Subroutines (C) Function (D) Definition


4 Which of the following is a compound structure?

(A) Pair (B) Triplet (C) single (D) quadrat


5 Which of the following functions that build the abstract data type?

(A) Constructors (B) Destructors (C) recursive (D)Nested


6 Which of the following allow to name the various parts of a multi-item object?

(A) Tuples (B) Lists (C) Classes (D) quadrats


7 A sequence of immutable objects is called

(A) Built in (B) List (C) Tuple (D) Derived data


8 Which of the following is constructed by placing expressions within square brackets?

(A) Tuples (B) Lists (C) Classes (D) quadrats


9 Which of the following is used in programming languages to map the variable and object?

(A) :: (B) := (C) = (D) ==


10 Which of the following security technique that regulates who can use resources in a
computing environment?

(A) Password (B)Authentication (C) Access control (D) Certification

You might also like