0% found this document useful (0 votes)
17 views6 pages

Practical Exam 2080

computer

Uploaded by

Ratna Rajya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

Practical Exam 2080

computer

Uploaded by

Ratna Rajya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SET 1 D) Affordable to all

SET II
Tick the correct answer.
1. Which of the statements are used in DDL? Choose the best alternative:
A) Create, alter and drop B) Create, insert and select [1x9=9]
C) Insert, update and delete D) Delete, alter and drop
2. With SQL, how do you select all the records from a table named “Persons” where the 1. NIC card is used for LAN connection.
value of the column “FirstName” ends with an “a”? a. True b. False
A) SELECT * FROM Persons WHERE FirstName‟a‟ 2. Spiral is a_____________.
B) SELECT * FROM Persons WHERE FirstName LIKE „a%‟ a. Software
C) SELECT * FROM Persons WHERE FirstName LIKE „%a‟ b. Testing phase
D) SELECT * FROM Persons WHERE FirstName =‟%a%‟ c. System Development model
3. Which of the following statements is true about a star network topology? d. None of the above
A) Each device is connected to a switch or hub 3. Who carries out the coding part?
B) Each device is connected to each other a. Programmer b. System Analyst c. Client d. None
C) Each device is connected in a trunk 4. Physical layout of computer in network is called…
D) Each device is connected to a terminal a. Network
4. Which of the following is the correct syntax to display "Stay Safe" in an alert box using b. internet
JavaScript?
A) alert-box("Stay Safe"); B) confirm("Stay Safe"); c. Topology
C) msgbox("Stay safe"); D) alert("Stay Safe"); d. None of the above
5. What is the use of <A> tag? 5. ________ is a component of multimedia.
A) To insert an image B) To create a link a. Speaker c. Monitor
C) To create a hyperlink D) To create a list
b. Sound card d. All of them
6. What is the output of given C program?
6. ______ data type contains numbers having decimal point.
void main(){
char str1[] = "FIRST"; char str2[20]; strcpy(str2,str1); a. Char b. Int c. Float d. None
printf("%s %s ",str1,str2); printf("%d", (str1!=str2)); 7. To use the strcpy() function, which header file should be included?
printf("%d", strcmp(str1,str2)); } a. conio b. stdio c. string d. math
A) FIRST FIRST 0 0 B) FIRST FIRST 1 1
C) FIRST FIRST 1 0 D) FIRST FIRST 0 1 8. The last value of the series in looping is called …….
a. Test Expression b. initialization
7. Where is a class derived in inheritance?
c. Increment/decrement d. All of them
A) Superclass B) Subclass C) Subsetclass D) Relativeclass 9. Which operator is logical OR operator?
8. Which of these is the correct order of the SDLC? a. || b. ! c. && d. None
A) Analysis, Design, Coding, Testing, Implementation
B) Analysis, Design, Testing, Implementation, Coding
C) Implementation, Coding, Analysis, Design, Testing
D) Design, Testing, Implementation, Coding, Analysis
9. Why is cloud computing popular nowadays?
A) Cost-sharing and easily accessible
B) As modern technology and costly
C) Accessible and freely available
SET 3 SET 4
I. Choose the best alternative: [1x9=9]
Group 'A'
1. The ________ is the physical path over which a message travels. I. Choose the best alternative: [19=9]
a. protocol b. medium c. signal d. None
2. The key that uniquely identifies a record is called 1. Who carries out the analysis phase?
a. Field name b. Unique key c. Primary key d. Key record a. Programmer b. System Analyst c. Client d. None
3. Systems are modified whenever 2. Decision tree is a tool to :
a. User's requirement change. a. Design System
b. New computers are introduced in the market b. Test The system
c. New software tools become available in the market c. Selling the system
d. Other similar organization modify these system d. None of the above
3. ________ is message sending through electronic medium.
4. __________ is used to input records in MS-Access. a. Internet c. Post
a. Report b. Table c. Form d. None b. Email d. Hardcopy.
5. Network that covers the longest distance is called______.
4. One- Dimensional array has ___ row or column.
a. LAN b. MAN c. WAN d. HAN
a. 2 b. 1 c. 4 d. 5
6. Where is a class derived in inheritance? 5. To use the strlen() function, which header file should be included?
a. Superclass B) Subclass C) Subsetclass D) Relativeclass a. conio b. stdio c. string d. math
6. Relational Operators are :
7. ____________can hold dissimilar data.
a. Comparison of data b. addition of variables
a. array b. structure c. pointer d. variable c. Logical treatment d. All of them
8. Which operator is used to compute the integer division? 7. Which operator is logical AND operator?
a. / b. \ c. % d. None a. || b. ! c. && d. None
9. Which loop is pre-test loop? 8. Which loop is post-test loop?
a. for loop b. while loop c. do..while loop d. None
a. while loop b. do..while loop c. for loop d. None
9. In C, int data type has memory allocation of :
a. 4 bytes b. 2 bytes c. 8 Bytes d.1 bytes

123
SET 5
I. Choose the best alternative:
[19=9]

1. MS-Access is _______________.
SET 6
a. Relational Database Management System.
b. Word Processing Software I. Choose the best alternative:
c. Presentation Software [19=9]
d. None of the above
1. C is a _______________.
2. Table is __________ MS-Access.
a. Relational Database Management System.
a. a Primary Element b. Filtered information c. Data Collection
d. None b. Structured programming language
3. An illegal activity done through internet that harms other intellectual right c. Presentation Software
is : d. None of the above
a. Murder. b. Suicide. c. Cyber Crime. d. 2. Query is __________ in MS-Access.
Virus. a. Object b. Required output c. Data Collection d. None
4. ____________can hold similar data.
3. The component of multimedia is :
a. array b. structure c. pointer d. variable
a. Speaker b. Sound card c. Microphone d.
All
5. Which operator is used to compute the integer division? 4. ____________can hold dissimilar data.
a. / b. \ c. % d. None a. array b. structure c. pointer d. variable
6. Which loop is pre-test loop? 5. OR logical operator in C is denoted by:
a. for loop b. while loop c. do..while loop d. None a. / b. || c. % d. None
7. In C, '7' is a? 6. For menu driven program, we use ________ control structure.
a. Numeric constant b. Character constant c. Number d. None a. for b. while c. switch d. do
8. Which of the following falls in control structure? 7. A character constant must inside ________.
a. switch case b. loops c. if else d. All of them a. ' ' b. " " c. { } d. ( )
9. Which of the following is valid for JavaScript 8. Which data type holds numbers with decimal point?
a. Var sname; b. Int sname; c. Char sname; d. None; a. int b. float c. char d. All of them
9. Which of the following displays a box in JavaScript?
a. document.write b. alert c. printf; d. None;

124
a. math.h b. string.h c. conio.h
d. ctype.h
9. Which of the following keyword is used for creating a function in
JavaScript?
a. Void b. Int c. Main d. Function
SET 7
Choose the best alternative:
[19=9]
1. Library function pow() belongs to which header file?
a. stdio.h b. conio.h c. math.h d. string.h
2. Which of the following is/are the main goals of a distributed database? SET 8
Choose the best alternative:[19=9]
a. Interconnection of database
1. Who carries out the analysis phase?
b. Incremental growth
a. Programmer b. System Analyst c. Client d.
c. Reduced communication overhead None
d. All of the above 2. Decision tree is a tool to :
3. An unauthorized user is a network _______ issue: a. Design System b. Test The system
a. Performance b. Reliability c. Security d. All c. Selling the system d. None of the above
4. What is the full form of SQL?. 3. ________ is message sending through electronic medium.

a. Structured Query List a. Internet b. Email c. Post d. Hardcopy.

b. Simple Query Language 4. One- Dimensional array has ___ row or column.

c. Structured Query Language a. 2 b. 1 c. 4 d. 5

d. None 5. To use the strlen() function, which header file should be included?

5. PHP is an example of ________ scripting language.


a. conio b. stdio c. string d.
math
a. Server side b. Client side c. Browser side d.
6. Relational Operators are :
None
a. Comparison of data b. addition of variables
6. Using encapsulation data security is _________. c. Logical treatment d. All of them
a. Not ensured b. Ensured to some extend c. Purely 7. Which operator is logical AND operator?
ensured d. Very low
a. || b. ! c. && d. None
7. If the mode in file in C includes b after the initial letter, what does it
indicate? 8. Which loop is post-test loop?
a. text file b. big text file c. binary file a. while loop b. do..while loop c. for loop d. None
d. blueprint text 9. In C, int data type has memory allocation of :
a. 4 bytes b. 2 bytes c. 8 Bytes d.1 bytes
8. Library function getch() belongs to which header file?

125
9. Which of the following is valid for JavaScript
a. Var sname; b. Int sname; c. Char sname; d. None;

SET 9
I. Choose the best alternative:
[19=9] SET 10
1. MS-Access is _______________. 1. In which normal form of database, atomicity is introduced?
a. Relational Database Management System. b. Word Processing Software A) First B) SecondC) Third D) Fourth
c. Presentation Software d. None of the above 2. Which of the following techniques is not implemented to protect a
2. Table is __________ MS-Access. database?
a. a Primary Element b. Filtered information A) Rollback BC) Recovery D) Firewall
c. Data Collection d. None 3. Which one of the following SQL commands is executed to display
3. An illegal activity done through internet that harms other intellectual right all the records having a second letter in the LNAME (LAST NAME)
is : as “A” from the customer table?
a. Murder. b. Suicide. c. Cyber Crime. A) SELECT * FROM CUSTOMER WHERE LNAME LIKE “?A
d. Virus. %”; B) SELECT * FROM CUSTOMER WHERE LNAME LIKE
“_A%”; C) SELECT * FROM CUSTOMER WHERE LNAME
4. ____________can hold similar data.
LIKE “A%”; D) SELECT * FROM CUSTOMER WHERE LNAME
a. array b. structure c. pointer d. variable LIKE “%A”;
4. Which of the following is an incorrect IP address?
5. Which operator is used to compute the integer division? A) 192.168.0.1
a. / b. \ c. % B) 192.168.1
d. None C) 172.255.0.0
6. Which loop is pre-test loop? D) 202.10.79.4
5. Which of the following is a server-side scripting language?
a. for loop b. while loop c. do..while loop d. None
A) JavaScript
7. In C, '7' is a? B) MySql
a. Numeric constant b. Character constant c. Number d. None C) PHP
8. Which of the following falls in control structure? D) Jquery
a. switch case b. loops c. if else d. All of them

126
6. Which of the following keywords are used to declare a variable in
JavaScript?
A) int or var B) float or let C) var or let D) char or var
7. Which of the following commands is executed in PHP to
concatenate the variables $x with $y?
A) $x + $y B) $x=$y C) concat ($x,$y)
D) $x.$y
8. Which statement is incorrect about the object-oriented approach?
A) Emphasis is on data rather than procedure.
B) Data is hidden and cannot be accessed.
C) Objects communicate through functions.
D) It supports abstract data but not the class.
9. Which of the following feasibility study is concerned with cost
benefit analysis?
A) Technical feasibility B) Economic feasibility
C) Operational feasibility D) Schedule feasibility Group

127

You might also like